

Publish Date
27/09/2022
Categories
Blogs Hot Topic
Your brand is a key business asset. It’s your trust bank which says who you are and what you offer but increasingly brands are at risk from cybercriminals who are impersonating them to entrap unsuspecting victims.
In the UAE, Sharjah Police has now launched an awareness campaign about the dangers of cyber brand impersonation (spoofing) after witnessing a sharp increase in the number of people falling foul of fraudulent schemes involving fake emails and WhatsApp messages.
At the launch of its ‘Be Aware: Stop, Think, Protect’ campaign, Sharjah Police revealed a 70% rise in cybercrime reports in the emirate in the past two years and it’s looking to help people identify when they’re being targeted by cyber criminals.
The most common forms of cybercrime are phishing and online brand impersonation attacks that trick people, including customers and employees, into opening attachments from unofficial sources, clicking on unknown links, and sharing sensitive personal information, including passwords and banking logins.
Cloud cybersecurity services provider Mimecast says cybercriminals are increasingly hijacking trusted brands and launching cyberattacks from lookalike web and email domains to increase their chances of successfully duping victims and that many companies remain vulnerable due to a lack of technology and robust security policies.
In its 2021 survey Mimecast discovered that consumers in the Middle East are more risk averse than others. In Saudi Arabia 75% of consumers and 78% in the UAE said they would stop spending with even their favourite brands if they fell victim to a phishing attack involving them. Compare that to a global average of 57% and you can understand the level or risk adversity in the region. Furthermore, over 80% of consumers in the Middle East also believe brands have a responsibility to protect them and themselves from email and website impersonation.
Mimecast’s latest State of Email Security 2022 report found that while things are getting better, they are still not great. It revealed that only 42% of organizations in Saudi Arabia and 38% in the UAE, are somewhat prepared – or not prepared at all – to deal with attacks that spoof their email domains.
Deploying online brand protection tools can help companies identify and take down malicious websites which impersonate their web and email domains before customers fall victim and these, according to Mimecast, should be supported by a sturdy regime of regular cyber awareness training so that all employees can detect and avert the risks.
Employees who receive suspicious email communications on their work email address should immediately report it to their security teams who can contain the threat, protect the organization, and keep threats from spreading to customers and partners.
Mimecast says some tell-tale signs that you’re being targeted by a scammer, include:
If staff receive any of the above, they should:
If the worst does happen and an employee does fall for the scam and share personal information, they should:
Authorities in the region are increasing penalties for cybercrime. In the UAE, Article (11) of the Federal Decree-Law No. 34 of 2021 stipulates that any person who creates a fake website, online account or e-mail impersonating a natural or legal person, will face imprisonment and/or a fine of not less than Dh50,000 and not more than Dh200,000, or one of the two penalties. Offenders can be jailed for a minimum of two years, if they use or allow anyone to use the fake website, online account, or e-mail to cause harm to an impersonated victim. In Saudi Arabia, the Public Prosecution has reaffirmed that a jail term of three years and fines of up to SR2 million can be imposed on those who create or send fake links, texts or electronic messages that impersonate government agencies, bodies, or financial or service institutions to fraudulently obtain money or financial data.
Mimecast reports signs that businesses are taking the online phishing and brand spoofing threats more seriously by turning to resources to detect instances of brand mimicry and counterfeit websites. In its 2022 survey, Mimecast found that more than three-fourths of respondents (76%, up from 72% the previous year) were using monitoring services.
Mimecast says companies are making use of Domain-based Message Authentication, Reporting and Conformance (DMARC) to protect their brands. This email authentication protocol helps safeguard companies against domain spoofing by determining whether an email originated from within the domain with which it is associated. The Mimecast 2022 survey revealed 89% of respondents are already using DMARC or are in the process of implementing or considering implementing it within the next year.
If you would like to know more about DMARC and how you can safeguard your brand online, get in touch with our experts now on +97144553100 or email: sales.uae@cobweb.com.
Publish Date
11/08/2022
Categories
Blogs
Artificial intelligence (AI) has been given a huge vote of confidence with a declaration by the UAE’s Minister of Industry and Advanced Technology, Dr. Sultan Al Jaber that it is one of the “most important economic and social game changers of our era.”
Such is the scale of AI’s game-changing capability that Dr Sultan believes it could contribute up to 14 per cent of the country’s gross domestic product – equal to $97.9 billion – by the end of the decade.
At Cobweb we fully concur with Dr. Sultan’s assertion of AI as a gamechanger. We’re already using it to dramatically change up operations for our forward-thinking clients – particularly those with heavy data flows.
We have one client in the travel and hospitality sector, for instance, who turned to us to migrate the input of its lengthy partner contracts to Microsoft’s Azure Form Recognizer (AFR). This Microsoft AI-powered service applies advanced machine learning to extract text, key-value pairs, tables, and structures from documents automatically and accurately, transforming documents into usable data at a fraction of the time and cost.
The upshot of this migration is significant labor and cost benefits as well as increased efficiency and productivity resulting from increased speed of activating previously manually inputted contracts and elimination of human error risks and associated rectification delays. Indeed, the manual input of contractual data, which could previously take up to 10 days to complete and verify, delaying revenue returns, was reduced via AI to an incredible 15-minute process!
Leveraging AI, particularly the Microsoft Azure Form Recognizer is much easier than you might think. For instance, in the case of the travel and hospitality client, we familiarized ourselves with the client’s existing contract processing system and then, using a few contract samples, tailored a successful proof-of-concept process of AFR’s cognitive service where inbuilt advanced machine learning was able to speedily recognize and understand contract details, extract, and upload the data. AFR’s machine learning application also means any abnormalities are identified for human intervention and that the more the system is used, the more the AFR service learns to consistently improve the operation.
If, in this data-driven era, you find yourself with increasingly heavy data flows AI will deliver time and cost savings while also massively boosting uploads, activation and analysis to deliver a sharper competitive edge and business opportunities. AFR can be tailored to individual business needs. With just a few samples, you can tailor Form Recognizer to understand your documents, both on-premises and in the cloud and turn them into usable data at a fraction of the time and cost so you can focus more on acting on the information, rather than compiling it.
What’s more you don’t have to worry about your data being at risk. AFR keeps your data private. Microsoft does not use any customization of documents; the customization is exclusively yours and you are in control of your data.
Want to know more how you can save time & money while boosting productivity with the secure Azure Form Recognizer – call us now on +97144553100 or email: sales.uae@cobweb.com.
Artificial Intelligence is not just the future but our present. To know how AI can impact your business, tell us a bit about yourself.
Publish Date
20/07/2022
Categories
Blogs
Your cloud needs will fluctuate in line with your evolving business requirements so regular reassessment of the Azure resources makes business sense. Choosing the right Azure sizes and tiers to meet your current needs and to use Reservations and Azure Hybrid Benefit to switch to a 1-or 3-year commitment term instead of pay-as-you-go meters could save you money. Here are some things to consider in your reassessment.
This is an unassigned resource. It can be left behind when its parent resource is deleted, or it may have been created for a temporary purpose and then left behind, such as a disk snapshot. These resources have a cost, so deleting them will save money. Sometimes they have been left intentionally, such as reserving the IP address for later use or keeping the disk as a backup in case its data is needed later, but often they are just forgotten. Azure now asks if you want to delete the associated resources when you delete a VM, but it’s still worth checking to see if you have any orphaned resources in your Azure subscription.
Unused resources may also be costing you money. If you identify them, you can delete them. Sometimes resources are running in Azure, and no one knows what they are, or why they are there. So, check if you have resources that are not being utilized, delete them, and save.
In Azure you can set tags on almost every resource. We recommend setting clearly identifiable tags for ‘Created by’ and ‘Created on’ as well as tags with project codes, cost/department codes, delete by dates, etc. Tags can be updated, so can be used for auditing purposes and it helps to know the who, what, why when you later reassess the resource. Azure policies can also be applied to subscriptions that can be used to limit the size of resources that can be created and the regions they can be created in – this can save money by stopping someone from accidentally deploying an expensive resource. Policies can also be used to enforce tags, stopping the resource from being deployed if the tag hasn’t been set.
Azure managed disks are attached to Azure VMs to provide them with persistent storage. All VMs must have one OS disk and may optionally have more data disks. Managed disks are available in several tiers, including Standard HDD, Standard SSD and Premium SSD. Microsoft recommends Premium SSD for production workloads as they have better/more consistent performance characteristics, but these are the most expensive. If the VM is turned off overnight or at the weekend, the disk continues to incur cost, even though it’s not using the Premium SSD’s premium performance. If your VM is to be stopped for a while, you can save money by converting it to a Standard HDD (cheapest) while it’s off and then back to a Premium SSD when the VM needs to be reactivated. This can be done manually but it’s better to script it as part of the on/off automation.
If you deploy resources into a lab or running a PoC where the resources are only needed for short periods, bear in mind that it’s not just VMs that can be turned off to save money, many other resources can be too. Searching the Microsoft documentation for each resource type that you have deployed to see if you can stop or de-allocate it. If it can’t be done in the Portal, it may be possible via PowerShell or the Azure CLI.
This is a Portal tool that can be used to drill into your Azure costs and break them down by timeframe, region, resource group, resource type or even individual resources. It lets you visualize your spending in various ways and hunt for ways to save money. You can create custom views and then have them emailed to you daily, weekly, or monthly. This saves you from having to regularly visit the Portal to view these reports, allows you to forward them to other people who may not have access to the Portal, and include them in presentation or reports.
Azure offers many ways to save money and it’s worth looking into each of them to see if you can benefit. However, it can take time and effort to get it right and that’s where our Azure experts can help. We can advise on the recommended resource SKUs and tiers for your specific and evolved needs, the best use of Reservations and CSP Software Subscription licensing, and our cost assessments can highlight other areas where you could save money in Azure. To find out more contact us now on call us now on +97144553100 or email: sales.uae@cobweb.com.web’s Managing Director commented on the achievement, “Innovation is part of our core values – the IT world is one where change is constant so you have to keep innovating to stay ahead of the bad guys. The Covid-19 lockdown saw a massive transition to hybrid and home working, where our customers went from controlled office environments to remote working with employees using their own devices that we needed to help control and protect. We expanded our portfolio of services to protect customers. Ultimately, we are a people business and it is their knowledge, expertise, passion and obsession for serving our customers that makes the difference.”
Publish Date
05/07/2022
Categories
Blogs
Businesses with heavy data flows are often weighed down with the need to manually input lengthy contract details which can delay implementations and leave them exposed to human error – causing further delays which can be costly.
But now these organizations can harness the power of Artificial Intelligence to speed up the process, lift the humdrum from data input staff and get contracts implemented faster, giving them more time to secure business. The answer is Microsoft’s Azure Forum Recognizer which can be tailored to individual business needs.
It’s an AI-powered document extraction service that understands your forms and quickly extracts text and structure from them to accelerate your business processes.
It works by applying advanced machine learning to accurately extract text, key-value pairs, tables, and structures from documents. With just a few samples, you can tailor Form Recognizer to understand your documents, both on-premises and in the cloud and turn them into usable data at a fraction of the time and cost so you can focus more on acting on the information, rather than compiling it.
You don’t have to worry about your data being at risk. Form Recognizer keeps your data private. Any customization of documents is not used by Microsoft – it’s exclusively yours. What’s more you control your data by using containers you decide where Form Recognizer processes your data—supporting consistency in hybrid environments across data, management, identity, and security. And added peace of mind comes from the fact that Form Recognizer is part of Azure Applied AI Services, backed by Azure infrastructure and enterprise-grade security, availability, compliance, and manageability.
Want to know more how you can save time & money while boosting productivity with Azure Form Recognizer – call us now on +97144553100 or email: sales.uae@cobweb.com.
Publish Date
25/05/2022
Categories
Blogs
Our new Tiger Technology partnership means you can now store, protect, & manage your critical data with the advanced Tiger Bridge solution. This connects your locally stored data with cloud/tape/disk storage while preserving its original format. Thus, making it ideal for organizations with intense data loads. This software-only solution can be installed and configurated in minutes with no additional hardware or virtual appliances required. What’s more your workflow won’t be disrupted as Tiger Bridge integrates at the level of your file system and/or network share. While your team works, policies operate transparently in the background to replicate your data to your storage of choice. You can also optimize your hardware investment through storage extension to the cloud based on a pay-as-you-go model.
Tiger Bridge is the solution for the ‘Data Is King’ era. Its key features include:
Caters to organizations of any size and scale:
Future proofed: Keeps and retrieves data intact and it is future-proof for use with Big Data, Artificial Intelligence or Machine Learning tools.
What next?
Data is now the lifeblood for efficient, sustainable organizations. Tiger Bridge enables you to manage the increasing complex data storage landscape. To discover more, call us now on +97144553100 or email: sales.uae@cobweb.com
Publish Date
12/05/2022
Categories
Blogs
The much anticipated ‘State of Email Security Report’ from email security specialist Mimecast, is out and makes insightful reading. On the downside, it paints a picture of “markedly increased apprehension over the dire consequences of an email-borne attack” with 8 out of 10 I.T. specialists surveyed believing it is likely, extremely likely, or even inevitable that their organizations will suffer negative consequences this year because of an email-based cyberattack – 10% more resignation than last year. Mimecast puts the pessimism down to organizations now operating remote and hybrid working environments and being more reliant on email, collaboration tools and other electronic communications. On the upside, it says more IT executives, particularly in Saudi Arabi and the UAE, are looking to automate and upskill their cyber defenses.
Saudi Arabian and UAE participants in Mimecast’s global survey gave a pessimistic assessment of the year ahead: The vast majority said it is likely to inevitable that they will suffer a negative business impact from an email-borne attack in 2022. More than a third reported an increase in their attack surface across such vital departments as IT (36%), human resources (37%) and finance (35%). Citing the challenges ahead, more than three-quarters (76%) admitted their cybersecurity approach is reactive, not proactive but the good news, says Mimecast is that “Many of the IT executives seemed intent to turn the tide on digital transformation, with cyber defenses.
And here are the defensive approaches now being pursued:
The Saudi/UAE survey respondents say they are defending against year-on-year increases in:
Mimecast’s global survey with Saudi Arabian and UAE participation surfaced some additional insights:
Regional Cyber Risk Landscape:
The Mimecast report says across the Middle East, malware attacks reached 161 million in the first half of 2021, up 17% year-on-year. The governments of Saudi Arabia and the UAE continue to take steps to address the risk to their economies.
The UAE is taking steps to become as a trusted digital hub globally such as the adoption of cybersecurity standards for government agencies, a cybersecurity showcase of innovations and the recently unveiled UAE Personal Data Protection Law while in Saudi Arabia, the government has imposed national data privacy legislation, implemented a cybersecurity regulatory framework for communications service providers and updated cybersecurity provisions under the third revision of its Cloud Computing Regulatory Framework.
Are you Cyberfit to address the increasing threat landscape? Find out with our security assessment. We’ll identify any shortfalls and make the best recommendations to keep you safe! Call us now on +97144553100 or email: sales.uae@cobweb.com
Publish Date
06/04/2022
Categories
Blogs
Endpoint management is essential for any successful organization’s tech strategy, so why is it that more than 30% of businesses don’t even know how many endpoints they have? Because there are so many out there and many believe that if they have an anti-virus, anti-malware solution, they’re safe – they might be for some solutions but that that was then, this is now. In today’s hybrid and remote working world, you have more endpoints than ever – servers, workstations, point-of-sale devices, mobile and IoT devices – and all are vulnerable gateways in an era where we access documents and data from multiple devices enabling threats within and without.
Most data breaches are insider jobs which can quite simply be employee negligence. As endpoints are potential access pathways to your corporate network, a single wrong click on an unsecured device can unwittingly lead to a serious security breach and installing malware on a single machine won’t raise the drawbridge.
Any digital storage device can be compromised by viruses, worms, Trojans, and ransomwares so it’s vital to have a defense solution that scans constantly and has central access control to protect you from the ever-widening attack arsenal.
You are in the mobile commerce era, yet mobile devices including smartphones and tablets are connected to your network so need to be included in endpoint security. Think of cloud storage as your Fort Knox against data breaches.
Traditional antivirus software is reactive. It jumps into action when an endpoint is infected to halt further damage. What you need is something that stops it in it tracks before it ever reaches the endpoint which requires web intrusion detection, prevention, and web filtering.
With today’s comprehensive data regulations, such as the recently implemented UAE Personal Data Protection Law, you need an audit trail on any data breach to defend you against crushing penalties. Microsoft’s Cloud-hosted endpoint security software logs all activities.
Microsoft’s Defender for Endpoint is an endpoint security solution that is built into Windows 10 and Microsoft’s robust cloud service. It offers vulnerability management, endpoint protection, detection and response, mobile threat defense, and managed services in a single, unified platform – which means unified billing, less administration, single renewal timelines and the ‘sleep at night’ awareness that you’ll receive regular product auto-updates so as the threat landscape evolves, so too will your protection. This enterprise endpoint security product supports Mac, Linux, and Windows operating systems, along with Android and iOS and helps networks prevent, detect, investigate as well as respond to threats for end-user devices such as tablets, mobiles, laptops, servers and more.
Being Cloud-based Microsoft Defender for Endpoint does not need any additional hardware, software or infrastructure deployment while also supporting auto-updates meaning your endpoints are protected and updated 24/7.
Microsoft’s Defender for Endpoint provides advanced threat protection that includes antivirus, antimalware, ransomware mitigation, and more, along with centralized management and reporting. Built on Microsoft’s powerful Azure cloud, every customer gets a dedicated tenant which secures their data making it only available through Azure Active Directory Authentication. Microsoft Defender for Endpoint’s core features offer preventative protection, post-breach detection, automated investigation, and responses to possible breaches. Network is secured through the product’s unrivalled capabilities including threat and vulnerability management; attack surface protection; next-generation protection; endpoint detection and response; attack surface reduction abilities; automated investigation and remediation; Microsoft Secure Score for Devices which assesses network security and Microsoft Threat Experts – the all-new managed threat hunting service. Defender for Endpoint also delivers protection to hybrid settings. When network devices are identified, security administrators receive the latest security vulnerabilities and recommendations to address them.
Defender for Endpoint’s automated investigation response capability enables you to respond quickly to incoming threats. Its automated investigation response provides automatic remediation enabling complex threats to be addressed within minutes.
If you’d like to streamline your network endpoints with a unified approach, call us for advice now on +97144553100 or email: sales.uae@cobweb.com
Publish Date
14/03/2022
Categories
Blogs
In 2017, Microsoft 365, the successor to the long Microsoft Office product family, was launched. Alongside the name change came many new cloud features and capabilities empowering users to be more productive and collaborative, whilst improving security for a business’s entire IT environment. Since then, Microsoft has continued to develop the product set to meet market demands. Even with these changes, many businesses still view Microsoft 365 as a suite of Office applications. In this article we discuss why a Microsoft 365 subscription is more than just these applications.
Many features within the Microsoft applications suite are designed to allow users to collaborate, communicate and work together. As all traditional office applications have moved to the cloud, it means that multiple users can work on the same document in real-time, on any device. The advent of hybrid work has shown how important remote collaboration is for all businesses.
Another hybrid work challenge is communication whilst employees work in different locations. This is easily solved with the implementation of Teams. With Teams, employees can meet, chat, call and collaborate all in a single application. For many businesses this has negated the need for office phone systems, as Teams is a fully function unified communications platform. As the modern workplace has evolved over the past two years, Microsoft has consistently updated its product set to make the change as seamless as possible.
Some lesser-known product within a Microsoft 365 subscription are Power Platform applications which enable employees to create code-free applications and processes that streamline the way businesses work. The three Power Platform applications in a Microsoft 365 subscription are Power Apps, Power Automate and Power Virtual Agents.
Power Apps allows teams to build and launch apps using prebuilt templates, drag and drop simplicity and quick deployment. These apps can connect to hundreds of data sources, including other Microsoft 365 subscription applications.
Power Automate enables users to easily streamline repetitive tasks with automation. Like Power Apps, Power Automate is a low-code solution, with drag and drop tools and pre-built connectors, allowing employees of all skill levels to automate repetitive, mundane tasks.
Power Virtual Agents is an app in Microsoft Teams, where businesses can easily create their own chatbots that answer questions posed by other employees or team members. This can create a better employee experience, whilst increasing productivity and information accessibility.
A Microsoft 365 subscription includes many security features to protect a business’s Microsoft estate, as well as employees’ devices. A Microsoft 365 Business Basic and Business Standard subscription includes Basic Mobility and Security. With this, businesses can secure and manage mobile devices with management policies and access controls.
A Microsoft 365 Business Premium subscription includes Enterprise Mobility and Security (EMS advanced security features, including endpoint protection, mobile device management, Conditional Access and more. Recently Microsoft Defender for Business, which enables businesses to use Microsoft 365 as their security ecosystem, has been added to a Business Premium subscription, which includes web content filtering, automated investigation and response and endpoint detection and response.
Office applications within the Microsoft 365 suite =are designed to increase productivity as well as other productivity applications, such as Planner, Whiteboard and Lists.
Microsoft Planner is a visual task management solution that organizes teamwork and increases productivity. In Planner users can create Kanban boards with content rich cards including files, checklists, and labels.
Microsoft Whiteboard is an infinite virtual whiteboard for effective meetings and engaging learning. It is now built into Teams, allowing multiple users to write on the whiteboard for brainstorming and group planning.
Microsoft Lists is technically a software to create lists but is so much more than that. Lists allows users and teams to easily track information and organize their work. A key Lists feature= is the ability to start a list based off a pre-built template. Some of these templates include issue trackers, event itineraries, asset tracking, project planner and social media calendars.
These are just some of the many features packed into a Microsoft 365 subscription. If you want to find out more, contact us today.
Publish Date
07/02/2022
Categories
Blogs
The UAE Federal Decree Law No. 45 of 2021 on Protection of Personal Data (the “Law”) is now effective. To help you better understand its requirements, we joined forces with Abdo Rafiq & Partners, Attorney & Legal Consultants and Badi Fattah, Head of Corporate Commercial practice who will speak about the new Law. Here Badi answers some of your most pressing questions on the new law.
The Law became effective on 2 January 2022 however, there is an implementation period. As of the current position, all businesses are required to comply with the Law within 6 months of issuance of the Executive Regulations.
Summary: Expect 6 to 12 months
The Law has been published; however, further details remain to be clarified in the Executive Regulations which are to be issued within 6 months of the Law being promulgated. It is expected the Executive Regulations may be issued as early as March 2022.
Summary: Yes, but more details are to follow
The Law applies to:
Summary: The Law has extra-territorial reach
There are number of categories exempted but as far as data collection for commercial purposes is concerned, businesses collecting personal data in or outside the UAE are required to comply with the new Law.
Summary: Government entities mostly
A single national data privacy regulator – the UAE Data Office – has been decreed which will be responsible for issuing policies, handling complaints and supervising implementation of the data protection regime among other things.
Summary: The UAE Data Office
The Law does not expressly state the penalties and categories, which will be determined through the Executive Regulations. All sanctions & penalties under the UAE criminal penal code shall continue to apply as per the previous regime.
Summary: To be issued
Although the Law does not expressly stipulate this, it is most likely the Executive Regulations will have an express provision or as alternative businesses will be legally advised to adopt the practice of issuing up to date privacy policies.
Summary: Yes, most likely
There are various categories under the Law which permit legitimate processing of personal data, consent from a Data Subject is generally needed however the Law already provides for specific circumstances where consent may not be required.
Summary: No, there are other bases
Cross-Border Personal Data transfers will be subject to restrictions in line with whether the destination country/territory has an adequate level of protection.
Summary: Will be permitted but with protocols/safeguards
Yes, the Law does impose obligations including maintaining records on data processing, impact assessments and reporting data breaches in accordance with the law and the Executive Regulations.
Summary: Yes, there will be in due course
If you want to know more about your responsibilities under the UAE’s new data protection law, watch the recorded session of our ‘Data Protection Town Hall’. Expert lawyer, Badi Fattah is joined by Microsoft security expert, Berfin Gokoglu to drill down into the law from an IT perspective and answer your questions. You can watch the Town Hall here.
This is the managed, collaborative package for any company big or small, from start-ups to midgrade SMBs with around 25 staff who value and prioritize collaboration, particularly the remote collaboration which is hallmarking next normal business operations.
If you have staff working from home, or to a hybrid or fully remote schedule, or you have off-site offices and locations or want to collaborate and liaise online with clients/suppliers, this is the secure solution that lets you operate safely and collaborate effectively all over the world with all the necessary tools and settings in place.
Review our bundled offerings, and earmark what you think suits you.