Page 3 - SkypeBuzz Test
P. 3




2nd Quarter 2016
SkypeBuzz by Telecom Reseller 3 
Keeping your Lync/Skype Business Environment safe from Ransomware
Solving the 

Application 
WHAT IS RANSOMWARE?
susceptible to ransomware - if not more so. 
Network Ransomware is any type of malicious
David Bergquist
Businesses, or course, host high volumes of 
so ware that infects a computer system users which increases the chance that someone 
Disconnect
restricting access in some way, demanding
may open an e-mail containing one of these by, UC Engineer at Enabling 
that the user pay a “ransom” to remove the attack vectors. Furthermore, business host
Technologies Corp. (www. 
restriction. “Locky” is a type of Ransomware and house personal computers (PC’s) and enablingtechcorp.com)
Branko Miskov
that is relatively new to the scene. “Locky”,
servers. Some aspects of businesses cannot 
as an example, encrypts the users’  les using them to be used to restore  les that have been function properly without computers or the 
by Branko Miskov, VP of Product AES encryption and then demands payment encrypted! Nasty stu , to say the least. So how data they contain.  is is where ransomware 
Marketing at Exinda (www.exinda. through some form of digital currency service does it propagate? Ransomware is primarily takes advantage making users and businesses 
com)
to decrypt the user  les. Ransomware targets distributed via emails including attachments; alike pay a fee to return to normal operations. 
Mlarge amounts of  le extensions, and even more however, it can also be distributed via fake  e thought is to make the fee an amount that 
ore and more of your business critical importantly can encrypt data on unmapped update popups such as Flash Flayer, Adobe is feasible where the business would end up 
applications have moved to the cloud. network shares. Ransomware can completely Reader, or Java Runtime, when browsing web losing more if they didn’t pay to have access to 
You might have started with Salesforce
change the name of your  les in addition
sites.
their data. If precautions haven’t been taken, it 
and slowly added more applications like Skype for to encrypting and moving them, making it We are a Business, we are safe!
only requires a single user in the organization 
Business or O ce 365.  ese apps that once lived very di cult to restore your data. As if this A common misconception is that this type opening an email containing one of these
in your data centre or on your desktop are now
wasn’t enough, ransomware can also delete of malware targets single users. However, 
in the cloud.  is is not only indicative of today’s your Shadow Volume Copies - disallowing
businesses are commonly targeted and just as
CONTINUES ON PAGE 3
environment, but also of more to come.
Since migrating to the cloud, one of the biggest 
challenges we’re hearing from our customers is 
that applications no longer behave reliably or 
consistently. When applications reside on your 
network you have a large amount of bandwidth 
and resources that you can control to improve 
performance. But once you move to the cloud 
you introduce a number of other factors that 
can potentially impede the performance of that 
application and adversely a ect user Quality of 
Experience (QX).
And once QX is impacted, employee adoption 
su ers. Which isn’t really surprising. Would you 
rather deal with dropped call a er dropped call 
using Skype for Business or just pick up your 
mobile phone? If an application doesn’t perform 
reliably it forces users to move to other methods 
or apps that will get the job done.  is is one of 
IT’s biggest problems - ‘Shadow IT.’
Generally, when we talk about improving Quality 
of Experience today the focus is on tra c shaping 
within the network to prioritize applications
and ensure bandwidth. A lot of organizations
do this today, they create QoS policies in order 
to prioritize and safeguard that app by ensuring 
unsanctioned tra c doesn’t interfere. Which is 
a viable solution if the problem exists within the 
network, but troubleshooting applications in the 
cloud can be much more challenging.

THE DISCONNECT
In the IT environment there is group responsible 
for managing applications in the cloud and, 
typically, a separate group that is responsible for 
managing the network. When a problem occurs 
each group has a piece of the puzzle, but are le  
without a complete picture and can only see
one part of the problem.  is is when the  nger 
pointing begins and regardless of whether it is the 
network causing the issue, it is usually targeted as 
the  rst source.
Enterprises are struggling to control cloud- 
based applications because they simply don’t have 
the right tools.  ere is no visibility beyond the 
network edge.  e biggest sore spot for these IT 
teams is having to troubleshoot the application 
and network separately in an attempt to pinpoint 
where the issue is. Is it the application or is it the 
network? And not only that, but how do you  x 
it? A er you  gure it all out, the time to resolve 
can take 3 or more hours.

CLOSING THE GAP
So what’s the secret?  e key to ensuring Quality 
of Experience is gaining end-to-end visibility 
and control across the entire application path 
including both the network and the service. You 
need to be able to gather data not only from the 
network, but from the application itself in order 
to provide the same level of visibility as with in- 
house datacenter apps.
If you can correlate application data with 
network information for a complete end-to-end 
view of tra c, down to the device level, you will 
be able to pinpoint and quickly resolve issues 
before they adversely impact the network. n




   1   2   3   4   5