This National Cyber-Security Awareness Month, Focus on Patch Management

 

Every day it seems like there is another cyber-attack impacting small businesses. Per the Ponemon Institute, 61% of small businesses have experienced a cyber-attack in the past 12 months (up from 55% the previous year)1. In fact, the U.S. Securities and Exchange Commission estimates that most targeted cyber-attacks are directed at small businesses2.

As this landscape is rapidly changing and October is national cyber-security awareness month, it’s more important than ever for IT and MSP professionals to take the time to understand their vulnerabilities and to learn how to proactively protect themselves.

A key area where IT professionals can improve their ability to proactively protect themselves is against ransomware attacks. 52% of small businesses reported experiencing a ransomware attack in the past year and this number is on the rise1.

Luckily, there are tools available to IT professionals to help them proactively combat ransomware attacks. These tools focus on patching known vulnerabilities, which is an extremely effective way to stay ahead of cyber-attacks. Per Fortinet, 90% of cyber-attacks in the last year could have been avoided if people updated and patched their systems3. In addition, the research found that, of companies who experienced a cyber-attack, 60% experienced a successful attack for which a patch had been available for over a decade3.

The importance of utilizing these patch management tools is shown through the recent WannaCry cyber-attack.

WannaCry was a destructive ransomware attack that impacted more than 100 countries4. For the vulnerability that was attacked, Windows had released a patch a month prior. All the companies that fell victim to the attack had not implemented the Windows patch which left most IT departments and MSPs scrambling the days after the attack to lock-down and ensure their systems were properly patched. If these organizations had been proactive with updating their patching, they would have prevented the attack from impacting their networks and daily business operations.

With national cyber-security awareness month upon us, we should all be thinking through the best practices we should implement to improve our security and minimize our risks – and patch management is one of the best places to start.

 

  1. Ponemon Institute, ‘2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)’, 2017. ​
  2. U.S. Securities and Exchange Commission, ‘The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses’, 2015.
  3. Fortinet, ‘Report: Dissecting Our Q2 Threat Landscape Research’, 2017.
  4.  Smarter MSP, ‘The Most Telling Cyber-Attacks and Data Breaches of 2017’, 2017.

 

         

LogMeIn Central Named a Leader for Endpoint Management Software

Based on G2 Crowd’s unbiased user reviews, LogMeIn Central has been named a leader for Endpoint Management software! G2 Crowd pulls in customer satisfaction data from real user reviews to determine each vendor’s satisfaction score and more than 15 data points from G2 Crowd’s user reviews, publicly available information, and third-party sources to determine each vendor’s market presence score.

LogMeIn Central is proud to have the following accolades highlighted:

  • Leader for Endpoint Management software
  • Top Momentum Leader for Endpoint Management software
  • #1 Easiest To Use solution

To learn more, visit: https://www.g2crowd.com/categories/endpoint-management  

G2 Crowd, a real-time and unbiased user review site empowers business buying decisions by highlighting the voice of the customer.

Their review platform leverages more than 400,000 independent and authenticated user reviews read by more than 1.5 million buyers each month. G2 Crowd’s model brings transparency to B2B buying—changing the way decisions are made.

         

Did you watch our latest Master Class?  

Last week, we hosted our second Central Master Class. These Master Classes are quarterly webinars that are designed to go in-depth into two features of Central to ensure that you’re using the product to the best of its abilities.  In our latest Master Class, we dove into the User Management and Alert features.

In this Master Class, we covered: 

  • How to simplify your user management by arranging users into groups and controlling permissions 
  • The fundamentals of setting-up, monitoring, and acting on Alerts to proactively address issues before they occur  
  • A closer look at how these features will make it easier for you to take control of critical IT task 

To watch this Master Class as well as previous Master Classes, visit:  https://www.logmein.com/central/resources/masterclasses 

 

         

IDC Reports: Endpoint Management Challenges Posed by Today’s Cyberthreats

The cyber-security landscape is ever evolving, and IT professionals must remain up-to-date with the current state of IT infrastructure to proactively protect themselves from threats.

To learn more about the current state of IT infrastructure, we reached out to an IDC Analyst, Phil Hochmuth, and asked him to evaluate 5 key questions related to effectively managing one’s IT infrastructure in today’s security landscape.

Download this report to learn: 

  • What are the key trends around endpoint management and the latest cyberattack methods? 
  • How are IT teams set up to handle sophisticated attacks?   
  • What are the biggest mistakes internal IT organizations can make in terms of endpoint management? 
  • What is the cost of making mistakes around endpoint management?    
  • What are the mission-critical capabilities that organizations should look for when evaluating an endpoint management solution?  

Download the report here.

 

 

         

Evaluating Endpoint Management Solutions? This Buyer’s Guide Can Help

We know IT teams wear a lot of hats and that there are numerous solutions available to enhance endpoint infrastructure security and increase productivity. Researching and selecting the right endpoint management solution can be overwhelming, so we’ve put together a practical guide for the time and resource-constrained IT professional to facilitate the search.

Download this guide to uncover:

  • The critical need for comprehensive endpoint management
  • 10 key questions to shape your search
  • Must-have features and capabilities
  • The value your solution should deliver
  • How LogMeIn Central can help

Download Here

         

You Speak, We Listen: New Central Improvements Based on Your Feedback 

Our customers are always our number one priority. We want to continuously innovate and enhance the Central platform so that we can better serve your interests and make your lives a little bit easier.  One of the ways we are working towards this goal is by listening to your feedback and making the product improvements that you request. 

We’re excited to release a handful of improvements requested by our customers. Read about the improvements below and watch the video to see our Product Manager, Kevin Kuchera, walk through each of these improvements live in the product.  

Deployment Link  

We simplified the process of copying deployment links by adding a column on the deployment tab that allows you to copy the deployment link with the click of one button. This makes it easier to share the link in a SMS messenger or email. 

PowerShell 

One2Many now allows PowerShell commands! Use this powerful scripter to push out multi-line commands.  

One2Many Color Coding 

When writing long or complicated scripts in One2Many, we heard that it was difficult to keep track of key inputs. We added color coding to our One2Many scripts to help. Now it functions similar to a script editor, minimizing syntax errors by highlighting numeric values in green and text strings in red.    

Increased Reporting Capabilities  

We’ve added a new report to our toolbox. You can now see those who have been managing files or accessing computers from the back-end (background access) with an accurate duration. 

LogMeIn for Linux-Beta 

We recently released a Linux-beta. Try the product to easily add Linux machines into your Central account and get zero-configuration terminal access from any browser. Download now for full access.

 

         

Upcoming Live Webinar with LogMeIn’s CTO

From our latest research report, Uncovering the Harsh Realities of Endpoint Management, we invite you to join our live webinar and Q&A session on August 1st at 11AM with LogMeIn’s Chief Technology Officer, Sandor Palfy, and Director of Product Marketing, Rachael Stockton. We’ll be diving into specific trends in the technology space and what it all means to you as an IT professional.                                                                                                                                                                                                                                                                    Attend this webinar to learn:
  • How endpoint management has evolved and why having a comprehensive endpoint management solution is no longer a nice-to-have but rather an absolute necessity.
  • Market trends and business threats driving the need to change our approach from reactive to proactive to keep our organizations secure.
  • How to implement proactive measures to manage and project your endpoint infrastructure from cyber-attacks.

Register here: https://attendee.gotowebinar.com/register/7459720592977017346?source=blog

Sandor has over 18 years of experience in the technology and development sector – if you have any questions for him about the endpoint management landscape, email them to us, and we’ll try to cover them during the session!
         

Uncovering the Harsh Realities of Endpoint Management

The workplace is evolving, and cybersecurity concerns and the risk of security breaches are higher than ever. According to the Ponemon Institute, 54% of companies experienced one or more successful attacks that compromised data and/or IT infrastructure in 2018, proving that the majority of today’s organizations are struggling to secure their endpoints. For many, endpoint security risk has become unmanageable, and companies are paying a prohibitive cost for each successful attack – $5 million for a large organization or an average of $301 per employee.

From the biggest ransomware attack in history (WannaCry) to two security vulnerabilities that put nearly all operating systems and computers at risk (Spectre and Meltdown), IT professionals are on high alert to improve their security measures, but many are struggling to determine how to implement proactive measures to manage and protect all endpoints from cyber-attacks.

In our latest research study, we surveyed 1,000 IT professionals across North America and Europe about the security landscape and uncovered market trends and business threats driving the need to make endpoint management a top priority. We revealed current tactics and proactive measures IT professionals can take to better protect their organizations from breaches.

To learn more, check out the infographic below, and download the full report here:

 

         

The Surprising State of IT Security: 4 Key Trends Revealed

Whether it’s malware or hackers or viruses, they pose significant threats to businesses and companies around the world, and rightfully so. These continue to evolve – and get smarter – making risk management a consuming task for IT teams and MSPs. According to the AV Test Institute, there were over 700 million known malware instances in 2017 and that number continues to rise year over year. What’s even scarier is how commonplace breaches and attacks are – almost 60% of IT teams have experienced a breach or attack at some point.

But rather than becoming more skilled at handling these threats, IT teams are more challenged by them now than ever before. And there are plenty of reasons for that. With the proliferation of devices such as laptops, smartphones, tablets, and the rise of account-based information that lives in the cloud, employees and companies are more at risk than ever, and IT teams are scrambling to keep up with rapidly-changing tech behaviors.

In our research study, we heard from 500 IT professionals on everything related to anti-virus and security management – their current processes, challenges, and overall take on the overwhelming task of protecting their computers and customers from threats. Check out the infographic below to learn the 4 trends we uncovered in the current state of IT security.

LogMeIn_State_of_IT_Final_standard_res

         

Solving for a Lack of IT Visibility & Control

Technology is a double-edged sword for IT. On one hand, it makes life easier with instant access to information, eliminates traditionally manual tasks, and allows us to better protect and manage the IT environment. On the other hand, it’s given a new life to rogue employees who can sign up for accounts and conduct business completely outside of IT’s line of sight and certainly out of their control.

You can’t protect what you can’t see. That is the elusive problem known as shadow IT. The challenge is gaining visibility into this hidden world, knowing the applications that are in use, and protecting company data without impacting the employee’s productivity.

This problem is largely based on the use of employee-introduced, non-sanctioned cloud apps. Last October, Ovum released research finding that 78% of IT executives say they do not control all the cloud apps their employees use for work, and a quarter say they only control half of the cloud apps being used through the organization.

With no oversight of these apps, there is little protection against the exposure of sensitive corporate data, with an unknown quantity of touch points and security behaviors outside the control of the IT team. Companies must put the right policies and technology in place to address password problems, without becoming the enemy of the employees.

Almost 68% of those surveyed by Ovum acknowledged that these open doors open the company to significant risk, whether that’s a phishing attack, ransomware, or social engineering attack. However, the challenge is how to address these risks without taking up even more time of the IT team’s already full plate.

How IT Can Take Back Control

While it can appear overwhelming to tackle the problem of shadow IT within your business, it doesn’t have to be. To help you approach this problem, we’ve provided three critical steps to get you started on taking back control of the apps and security of your organization:

  • Audit your employees’ cloud apps – As we said before, you can’t protect what you can’t see, and the first step to seeing all the apps in use is to ask. Do an audit of all the apps and tools that employees are using through a survey. Even if you don’t capture everything, you’ll learn about many of the tools in use and raise awareness with employees that IT needs to be in the loop as they bring in new apps. Once you have a clearer picture of your business’ app ecosystem, start to consider Single Sign-On and password management tools to give you management over those apps that give you visibility into usage and allow you to enforce policies that keep those accounts more secure.
  • Setup automated software updates – Don’t get caught with outdated software, which was the catalyst for the Equifax breach back in September 2017. This is an easy fix. Leverage endpoint management technology like LogMeIn Central, which enables you to pair the ability to push patch updates, with the ability to automate the process and setup alerts so a service is never outdated for long.
  • Require multi-factor authentication (MFA) – If you haven’t already, introduce your employees to multi-factor authentication. Start with your user directory, whether it’s Active Directory, Azure or G-Suite, and require employees to add this second layer of protection to the account. Once employees are comfortable with MFA on their email, they’ll be more comfortable adding it to other apps as well.