Page 8 - SkypeBuzz Test
P. 8
SkypeBuzz
8 by Telecom Reseller
3rd Quarter 2016
DAVID BERGQUIST CONTINUED FROM PAGE 3
ransomware “macros” in a Word document and be create during topology publication as well as
your business may be in jeopardy.
allowing these groups access to the required data
on the share as needed
RECOGNIZING RANSOMWARE
l Allowing “Everyone” “Full Control” to
“Locky” ransomware is a new variant ( rst the shares could be dangerous in ransomware
appearing in February of 2016) most commonly situations as the infection can spread quickly to
distributed via e-mail. It will o en contain a le shares whether they are drive mapped or not:
subject line similar to “ATTN: J-98223146” and
Not to mention, this allows anyone to be able
a message similar to “Please see the attached to access the share once they have access to the
invoice” with a Word document attachment environment
containing malicious macros. “Locky” will scan
all local drives and unmapped network shares 3. Updates - Ensuring your clients and servers
for les, encrypt them, and rename them making are current with the latest updates can protect
it very di cult to recover from. e following against old and new vulnerabilities such as
screen capture provides an example of such a ransomware:
message:
l Ensure that all critical security operating
Other known types of Ransomware include systems are up to date to minimize vulnerabilities
CryptoLocker, CryptoWall, and TorrentLocker. l Ensure virus scanner, spyware, malware, and
ese types of ransomware are commonly threat detection utilities running on clients and
distributed via e-mail with attachments or links servers are up to date
to web sites that end up infecting your computer, Caption Xxxxxx
l Invoke daily updating, automatic scanning,
encrypting les, and suggesting the user pay a and reporting, and of virus scanner, spyware,
ransom to unencrypt those les. Some types of can be encrypted and / or inaccessible until you malware, and threat detection utilities:
ransomware can prevent you from using your pay a ransom. Microso Lync 2013 and Skype
Being aware of a possible threat may help deter it
computer in normal fashion, stopping access to for Business Server 2015 clients and servers both from spreading allowing you to isolate the problem
web browsers or even preventing you from using require the use of a “File Share” to obtain, store, to a single PC, Server, or location before it has a
Windows.
and replicate data amongst other servers within chance to spread through the entire organization
the topology, in order to provide full functionality l Updates, scans, and reporting of malicious
HOW CAN I SPECIFICALLY on a regular basis.
code and so ware can be impended via group
PROTECT MY LYNC / SKYPE FOR l In regards to “Sharing”, ensure that policies or through the product itself ensure all
BUSINESS ENVIRONMENT?
“Everyone” does not have “Full Control” of the subscribers are up to date and safe
When your environment is infected with Lync / SFB le share:
ransomware your network le shares can be held l Lync / Skype for Business can function 4. O ce Products - Guard against opening
for ransom, preventing access to computers and without “Everyone” added once deployed.
emails (Outlook), Word documents (or any O ce
even services and applications on such computers. l “Everyone” can be added during the initial program) that contain macros. In Word / Excel/
Here are some things to think about to ensure installation allowing successful deployment and Outlook, go to: File, Options, Trust Center, Trust
your Lync / Skype for Business environments are publication of the topology
Center Settings, Macro Settings and “Disable
secure from Ransomware:
l However, once the topology is published, this all Macros without noti cation”. You could also
can be removed as Lync / Skype for Business will con gure this via Group Policy or during the
1. Backups – If compromised by ransomware, add its own required groups and permissions to install of the product(s). Macros can be controlled
access to PC’s and/or servers could be a ected the le share upon successful completion of the as shown here:
in addition to access to certain services and/or topology being published
applications:
l Lync / Skype for Business will apply the Caption Xxxxxx
5. Awareness - Make users aware. Some things
l Either by means of existing back up following groups and permissions to the le share you can do make users aware are as follows:
technology, or by running back-up scripts on each upon successful publication of the topology:
“Everyone” to have “Read Only” access; however, l Send out companywide emails from IT
of the Lync / Skype for Business servers, ensure l RTCHSUniversalServices – Allow Change / the groups outlined above are all that’s required to warning of these types of threats so that the
you have weekly or even daily backups of your Read
function properly once deployed
general populous is aware
environment
l RTCComponentUniversalServices - Allow l In regards to “security” on the Lync \ Skype l Print out and distribute yers and post them
l You may be able to recover your Change / Read
for Business le share, “Everyone” should not in popular areas such as near drinking fountains,
compromised entity / data from a backup l RTCUniversalServerAdmins - Allow Change have “Full Control”:
restrooms, kitchens, and common areas
allowing you rid yourself of the issue
/ Read
You can get away with “Read” permissions for l Distribute the warning during mandatory
l RTCUniversalCon gReplicator – Allow ‘Everyone” at a minimum, however “System”, company meetings or team meetings so users
2. File Share Permissions – If compromised by Change / Read
“Local admins”, and the “Lync / SFB admins” know how to recognize and deal with these types
ransomware, les and folders located on a share
l At a minimum, you could con gure
should have rights allowing the permissions to
of threats. n
CONTINUED FROM PAGE 7
Technosoft Launches
New Uni ed
interactions,” said Avi Margolin, CEO of
Desktop Screen. Since all recording is done provisioning and targeting. RECITE also
Numonix.
on the server, no client-side resources are features advanced capabilities, including Communications
“Congratulations to Numonix for being
needed for voice, video or chat recordings.
Duplicate Media Streaming for third-party
honored with a Communications Solutions RECITE bene ts include:
integrations such as Analytics
Solutions Lab in
Product of the Year Award,” said Rich l Seamless recording. All Microsoft O365 l Proactive Monitoring. Proactive
Tehrani, CEO, TMC. “Numonix’s RECITE is interactions are recorded to the cloud, and continuous monitoring ensures Bellevue, Washington
truly an innovative product and is one of including Voice, Video, Chat and Desktop uninterrupted service.
the best solutions brought to market in the Screen.
l Comprehensive Activity Logs. User
past 12 months that facilitates business- l Regulatory compliance. RECITE is a Activity Logs help organizations meet BELLEVUE, WA – Technoso Corporation, a
transforming voice, data and video SOX, HIPAA, PCI, Dodd-Frank, and MIFID-2 stringent internal and external compliance leading provider of cutting-edge IT and BPM
communications.”
compliant recording solution.
requirements and provide an Audit
services, has announced the opening of the
Numonix, a Microsoft Silver l Secure Recordings. All recorded Trail to assist in both compliance and “UCPE Lab”, Uni ed Communications Product
Communications partner and preferred interactions are encrypted end-to-end from troubleshooting.
Engineering lab based in Bellevue, Washington.
recording solution provider for recording capture to storage.
l Compatibility With Leading Voice and Located at 1951 152nd PL NE, the UCPE Lab
on-premise and hybrid deployments of l Centralized Administration. Web-based UC Platforms. RECITE is compatible with is a development and testing facility that was
Skype for Business, also works closely with access and administration provides easy leading voice and UC platforms, including strategically developed in close proximity to
Microsoft to maintain interaction recording and secure access to recordings.
Allworx, Avaya, Broadsoft, Cisco, Mitel, Microso , its co-engineering partner. Technoso ’s
compliance for Skype for Business users l Real-time Active Directory Monitoring. ShoreTel, Switchvox and Toshiba.
vision is to achieve a 360 Relationship with
migrating to O ce 365.
Administrators are enabled to provision l Choice of Endpoint. RECITE supports all “Skype for Business” product engineering group
Robust, Flexible and Scalable Recording and decommission users in real-time endpoints, including Skype for Business and as well as with “Skype for Business” Partners and
Solution for the O365 Hybrid Cloud
without having to manage multiple Microsoft Lync® clients, Polycom telephones Customers.
RECITE for Microsoft O365 enables platforms.
and other third-party telephones, including “Microso is a market leading innovator in the
cloud-based interaction recording, storage, l Quality Management. RECITE includes those that support BToE.
fast-growing Uni ed Communications (UC)
management and retrieval of recordings via built-in contact center features, including Now available from Numonix’s global category and they understand better than most
its hybrid cloud integration and Web-based Live Monitoring, Agent Scoring and dealer network, RECITE scales from ve to the critical importance of extending ‘Skype for
portal without installing any software into Reporting at no additional charge.
thousands of users.
Business’ platform to increase market share,”
the enterprise’s network. RECITE records all l Flexibility. RECITE features RECAP More at www.NumonixRecording.com and
modalities, including Voice, Video, Chat and
(API) for system management, user
www.tmcnet.com. n
CONTINUES ON PAGE 11

