Keepit was honored in three categories: Cloud Security, Data Loss Prevention and Disaster Recovery/Business Continuity.
COPENHAGEN, DENMARK, December 13, 2024 – Keepit, a global provider of a comprehensive cloud backup and recovery platform, is proud to announce it has been recognized at the prestigious 2024 Security Today CyberSecured Awards. The company secured top honors in three categories: Cloud Security, Data Loss Prevention and Disaster Recovery/Business Continuity.
· WINNER #1 in the category: Data Loss Prevention
· WINNER #2 in the category: Disaster Recovery/Business Continuity
· WINNER #3 in the category: Cloud Security (Tie)
Security Today, a leading source for security professionals, unveiled the winners in a press release, recognizing Keepit’s outstanding contributions to the cybersecurity landscape. The CyberSecured Awards celebrate innovation and excellence in cybersecurity solutions.
“The Keepit platform helps companies future-proof their businesses against ever-increasing cyberthreats. With our industry-leading backup and recovery capabilities, companies can rely on continued access to business-critical data, even if they’re targeted by cyberattacks. We’re honored that the Keepit platform was recognized by Security Today’s CyberSecured Awards”,” says Michele Hayes, CMO at Keepit.
Keepit’s commitment to innovation, security, and reliability has positioned the company as a leader in the cybersecurity industry. The Keepit platform was recognized in four categories at the Top Infosec Innovator 2024 Awards, including “Cutting Edge Cloud Backup”, “Most Innovative Cyber Resilience”, “Hot Company Data Security Platform” and “Hot Company Ransomware Protection of SaaS Data”.
About Keepit At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Think about how many times you’ve logged into a system using just a password, and how easy it would be for someone to guess that password — or worse, steal it!
While two-factor authentication (2FA) added a much-needed layer of security beyond just a password, it still leaves room for vulnerabilities. That’s where three-factor authentication (3FA) steps in.
3FA is changing the game for IT teams by taking security a step further. It combines three layers of identity verification to make unauthorized access almost impossible! 😎
Read along to understand what 3FA is, how it works, and why it matters for SMEs like yours.
Understanding Authentication Factors
Authentication revolves around verifying that the person accessing a system is indeed who they claim to be.
This verification relies on three primary factors:
Knowledge factor (what you know): This includes passwords, PINs, or answers to security questions, where the user provides information that only they know. While this is the oldest form of authentication, it is also themost vulnerable to breaches.
Possession factor (what you have): This involves physical items such as a security key, authenticator app, or a TOTP (time-based, one-time password) sent to a registered device. The idea is that the person trying to gain access has possession of something unique.
Inheritance factor (what you are): Biometric authentication like facial recognition, fingerprints, or iris scans fall under this category. These methods leverage physical characteristics that are unique to the individual and difficult to replicate.
3FA leverages all three factors simultaneously to verify identity, making it exponentially harder for cybercriminals to bypass security protocols. ✌️
What Is 3-Factor Authentication?
As 3FA combines all three factors — knowledge, possession, and inheritance, it creates themost secure form of authentication available today.
While 2FA relies on just two of these factors (often knowledge and possession), 3FA adds another layer of assurance by requiring the user to authenticate with their unique biometric data as well.
For instance, when accessing a corporate system, a user might need to:
Enter their password (knowledge factor).
Verify their identity with a security key or authenticator app (possession factor).
Complete the process with facial recognition or a fingerprint scan (inheritance factor).
This additional layer ensures that even if two factors are compromised — say, someone steals your password and security key — they still can’t gain access without your biometric information.
Benefits of 3-Factor Authentication
With cybersecurity threats constantly evolving, SMEs often lack the robust security measures of larger organizations, making them prime targets for hackers. This is why 3FA is worth considering 👇
Stronger Security
By requiring three independent layers of verification, 3FA makes it incredibly hard for attackers to breach your systems.
Even if a hacker gets hold of a password and a stolen security key, they’ll still need biometric data, which is much harder to fake.
Regulatory Compliance
Many industries have strict data protection regulations, like GDPR, HIPAA, or PCI DSS. Implementing 3FA can help SMEs meet these requirements and avoid hefty fines.
Increased Trust
Whether it’s your employees, customers, or partners, people want to know that their data is safe. Using 3FA demonstrates a commitment to security, boosting confidence in your organization.
Future-Proofing
3FA positions your business as ready for the next wave of cybersecurity challenges, reducing potential liabilities!
Let’s now look at how 3FA actually works and its best use cases.
How 3FA Works in Real Life
Paint a picture of an IT manager logging into their system containing sensitive customer data. The 3FA process typically looks like this:
The manager types in their password.
They plug in their security key or open their authenticator app to generate a one-time code.
They finish the login process by scanning their fingerprint or using facial recognition.
Each step verifies a different aspect of their identity, creating a nearly foolproof barrier against unauthorized access.
3FA is especially effective in scenarios where the stakes are high, such as:
High-security systems: Protecting sensitive business data and intellectual property from cyberattacks.
Large financial transactions: Adding an extra layer of assurance for payments or account changes above a certain threshold.
Remote work: Ensuring employees accessing systems remotely are thoroughly authenticated.
Challenges of 3FA (and How to Overcome Them)
While 3FA offers top-notch security, it’s not without its challenges:
Usability: Adding a third authentication step can feel tedious for users but the solution for this is to invest in tools, like facial recognition or security keys, that streamline the process without compromising security.
Cost: For tools like biometric scanners or secure hardware tokens, implementing 3FA requires a financial investment. This might feel daunting, but the long-term benefits of avoiding breaches and building trust are worth the cost! 🙌
Technology compatibility: As not all systems and devices support 3FA out of the box, SMEs need to assess their infrastructure and make upgrades wherever necessary.
This generally involves evaluating both software compatibility and hardware capabilities to ensure a smooth implementation.
The Future of Authentication Is Passwordless
Since passwords are easy to forget, easy to steal, and often reused across accounts, they are quickly becoming outdated. So, what’s next?
Emerging technologies like advanced biometric authentication and behavioral analytics are further changing the IT game. For instance, some systems are able to analyze how you type or move your mouse to verify your identity.
While 3FA is the gold standard today, the future of authentication promises even more seamless and secure options.
Evaluate current security protocols: Identify vulnerabilities and assess whether current systems support multi-factor authentication (MFA).
Invest in advanced tools: Acquire the necessary tools such as security keys, biometric devices, and authenticator apps.
Train employees: Educate employees on the importance of 3FA and provide step-by-step guidance on using authentication tools effectively.
Monitor and optimize: Continuously review authentication logs and update systems to ensure ongoing protection against emerging threats.
JumpCloud streamlines this process by integrating MFA and other advanced security measures into a single, scalable solution. ⚡
Enhance Security with JumpCloud’s 3FA
With the rise in cybersecurity threats, SME IT teams need solutions that go beyond the basics and 3FA is one such advanced solution.
If you’re looking to strengthen your IT security and keep breaches at bay, adopting 3FA is a must. JumpCloud makes it simpler than ever by seamlessly integrating advanced authentication methods, including 3FA, into your existing workflows.
What’s more, with JumpCloud you can enhance security, ensure compliance, and build trust across your organization without sacrificing usability! Start a self-guided demo to see how.
About JumpCloud At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Remote work and cloud infrastructure have revolutionized productivity, but they’ve also introduced new risks. A larger digital footprint means more opportunities for cyberattacks, data loss, or accidental deletions. Prevention is critical, but when things go wrong, a robust backup system is your safety net.
CloudM Backup offers a dedicated, automated, and compliant solution to safeguard your data in minutes. Here’s how to get started in five simple steps:
Step 1: Set up your storage bucket in Google Cloud Storage
Start by creating a secure destination for your data backups. A storage bucket in Google Cloud Storage is where your data will be saved.
To create your bucket, you’ll need:
A Google Cloud billing account
Permissions to create or manage a GCP project
TIP: Automate the setup process using our PowerShell script for faster, error-free configuration. Full instructions are available in our Knowledge Base.
If you already have a Google Cloud Storage bucket, you can skip to Step 2!
Step 2: Assign permissions to your Backup admin
Designate a backup admin to manage and restore your data. For more control, create a new admin role with specific permissions. Permissions can be assigned via the settings page of your CloudM account.
Permissions to assign:
Edit Backup Configuration & Policies
Backup User Restoration & View Status
Backup Shared Drives Restoration & View Status
To manage Organizational Units (OUs) and Smart Teams, assign permissions such as:
Manage OUs
Manage Smart Teams
Manage Smart Teams Priority
Manage Users
View OU Hierarchy
TIP: Limit admin access by creating a role scoped to specific Organizational Units (OUs). Assign the role to users via the ‘Assigned Users’ tab.
play_circle
Step 3: Enable domain-wide delegation for seamless access
Set up a domain-wide delegated service account to connect your Google Cloud Storage bucket and apply backup policies. This step ensures efficient API usage and uninterrupted access. Visit our knowledge base for detailed instructions.
Step 4: Connect your Google Cloud Storage bucket to CloudM Backup
With your bucket ready, link it to CloudM Backup for synchronization. Simply navigate to the storage configuration page, select your bucket, and provide a Service Account key.
TIP: Test your connection to confirm everything works smoothly before proceeding.
Step 5: Create and assign your Backup policy
Craft customized backup policies to define what gets backed up and for how long.
Navigate to ‘Create and Edit Policies’ and choose the policy type (Users or Shared Drives).
Assign policies to OUs, Smart Teams, or Shared Drives as needed.
TIP: Regularly review and adjust your policies to stay compliant with evolving regulations.
Sit back and relax
With these five steps, you’re now backup-ready! CloudM Backup ensures your organization’s data is protected, compliant, and recoverable, providing peace of mind and reliable business continuity.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About CloudM CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.
Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.
By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.
With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.
Summary: Discover 2024’s major ransomware attacks in healthcare, logistics, and manufacturing. Learn how advanced solutions like NordLayer help prevent and mitigate these threats
Ransomware attacks in 2024 have escalated to new heights, surpassing the scale and sophistication of threats seen in 2023. Attackers have becomemore aggressive than the previous year, using advanced tactics such as double and triple extortion. Organizations are not only facing encrypted files but also the threat of a data breach, with stolen data being leaked or even sold on the dark web. This increases the risks of reputational damage and regulatory penalties.
No organization is immune, and attackers now use more accessible tools like Ransomware as a Service (RaaS). Industries once considered less vulnerable, such as logistics and energy, have increasingly been in the crosshairs alongside traditionally targeted sectors like healthcare and education. This year alone, ransom payments have skyrocketed—rising from under $200,000 in early 2023 to $1.5 million in June 2024—with some organizations shelling out tens of millions of ransomware payments to regain access to their systems or prevent private data from being exposed.
In this blog post, we’ll examine the most significant ransomware incidents of 2024, their impacts, and practical measures your organization can take to strengthen cybersecurity.
Major ransomware attacks of 2024
Ransomware attacks in 2024 have become increasingly sophisticated and common, affecting industries worldwide and causing lasting financial and operational damage. Here are some of the most notable incidents of the year:
Date: February 2024 Impact: A phishing campaign exploited vulnerabilities in Change Healthcare’s email systems, deploying ransomware that encrypted critical operations. Services like claims processing and prescription drug management were disrupted across numerous U.S. hospitals, affecting thousands of providers and millions of patients.
The attackers demanded $22 million, which the company paid to restore essential services swiftly and limit disruptions to patient care. Strengthening cybersecurity has become key for healthcare providers, and tailored tools like NordLayer help safeguard personal data and ensure continuity.
Date: February 2024 Impact: Attackers stole 14 million customer records, including sensitive information like driver’s licenses, passports, and financial data. Latitude Financial decided not to pay the ransom, aligning with Australian government policies that discourage ransom payments. They stated that paying the ransom would not guarantee the secure return of data and could encourage further attacks. Instead, the company focused on restoring systems, contacting affected customers, and strengthening its cybersecurity measures.
Financial institutions can mitigate risks with NordLayer’s robust network security solutions, which safeguard critical systems and help meet regulatory compliance.
Date: March 2024 Impact: A global non-profit supporting orphans (the organization’s name hasn’t been disclosed) was targeted by a ransomware group that encrypted sensitive files, including children’s photographs and medical records. The attackers initially demanded a ransom large enough to bankrupt the organization. After learning it was a non-profit, they lowered their demand.
However, this incident shows how non-profits, with limited defenses but valuable data, are becoming prime targets. Organizations can protect themselves with NordLayer’s security tools, which are tailored to address unique vulnerabilities in the sector.
Date: May 2024 Impact: A LockBit ransomware attack encrypted corporate files and stole sensitive data dating back to 2005, disrupting operations for the telecommunications equipment manufacturer. The attackers threatened to release the stolen information if their ransom demands were unmet. The incident underlined the manufacturing sector’s vulnerability to such sophisticated threats.
This security breach is a stark reminder of the need forproactive cybersecurity measures. To mitigate risks like this, NordLayer offers tailored network security solutions for manufacturing industries to help protect critical systems and data.
Date: June 2024 Impact: The Brain Cipher ransomware group targeted Indonesia’s National Data Center, disrupting critical government services, including immigration processing at Jakarta’s airport. The attack encrypted sensitive data and temporarily paralyzed various government operations, highlighting the vulnerability of national infrastructure to sophisticated cyber threats.
Date: June 2024 Impact: CDK Global, a key software provider for North American car dealerships, fell victim to a BlackSuit ransomware attack. Dealerships had to revert to manual processes for sales and paperwork, causing delays in registrations and transactions. The attack compromised sensitive customer data, such as social security numbers and bank account details, exposing millions to potential fraud.
CDK Global temporarily shut down its systems, creating substantial operational and financial challenges for dealerships dependent on its digital solutions. To speed up recovery, CDK Global reportedly paid a $25 million ransom in cryptocurrency. Despite the payment, the impact lasted about two weeks, with most systems restored by early July.
Software and IT companies can enhance security with NordLayer’s solutions, which help mitigate vulnerabilities and maintain operational efficiency.
Date: July 2024 Impact: The ransomware attack on Japan’s busiest port targeted the port’s computer systems, encrypting critical data and disrupting operations. As a result, cargo handling and customs clearance processes were severely impacted, causing shipment delays and creating a ripple effect throughout international trade networks.
The incident underscored the vulnerabilities in critical infrastructure and the need for robust cybersecurity measures in transportation. NordLayer offers tailored solutions for retail companies to protect dynamic networks and global supply chains, ensuring continuity even in the face of sophisticated threats.
These incidents highlight the urgent need for organizations to adopt comprehensive cybersecurity strategies. Ransomware attacks continue to grow in both sophistication and impact, making it crucial to counter these evolving threats.
Online threats keep evolving
Ransomware attacks are growing in sophistication, using tactics like double extortion, where stolen data is threatened with public release unless a ransom is paid. The increasing accessibility of Ransomware as a Service (RaaS) has lowered the entry barrier, enabling less-skilled cybercriminals to execute high-impact attacks with more frequently.
Key trends in 2024 include:
Higher ransom demands: The financial stakes are higher than ever. Ransom payments in 2024 are now exceeding $10 million in many cases, with some organizations facing demands well beyond that. Attackers are increasingly targeting organizations with high-value data or critical infrastructure, knowing the urgency to recover will push companies to pay.
Target expansion: While healthcare, finance, and education have long been prime targets for ransomware groups, other critical sectors like logistics and energy are now in the crosshairs. As supply chains and energy grids become more interconnected and reliant on digital systems, these industries face greater risks of disruptions with global consequences.
Advanced tactics: Ransomware groups are not only focusing on traditional on-premise networks but also exploiting vulnerabilities in cloud environments, which is becoming a bigger concern. This highlights the need for more advanced, tailored security solutions.
These trends show how ransomware incidents are becoming more sophisticated and multifaceted. This increases the potential for significant damage and calls for organizations to adopt more comprehensive, layered defense strategies.
Protecting against ransomware threats
A comprehensive strategy involves protecting not just your systems but also your data and network infrastructure. Each layer of defense plays a crucial role in minimizing the impact of a ransomware attack and preventing it from escalating. Below are essential strategies organizations should adopt:
1. Identify vulnerabilities and patch systems
Many ransomware attacks exploit vulnerabilities in outdated systems. To address known vulnerabilities and maintain a secure network, regularly update software. Ensure that all systems—operating systems, applications, and firmware—are consistently patched. This process should include automated updates where feasible, and IT teams should conduct routine vulnerability scans to identify and fix any weak points before they can be exploited.
2. Use endpoint detection
Use endpoint security solutions to identify and neutralize threats early. These tools not only detect ransomware but also offer insights into the nature of the attack, helping teams understand how it infiltrated the network. Ensure these solutions are configured to alert IT staff of suspicious activity and automatically block unauthorized file encryption attempts.
3. Implement multi-factor authentication (MFA)
MFA adds an extra layer of security, ensuring only authorized users can access sensitive systems, especially those handling sensitive or critical data. By requiring additional verification steps, such as a mobile authentication app, biometric verification, or a hardware token, MFA helps prevent unauthorized access even if login credentials are compromised.
4. Segment the network
Network segmentation isolates critical systems, much like fire doors prevent the spread of fire in a building. This limits the spread of ransomware within the network and minimizes potential damage. You can achieve it by segmenting critical applications, databases, and other high-value assets into subnets with strict access controls.
5. Backup data regularly
Frequent backups of important data should be a cornerstone of your ransomware defense strategy. Regularly schedule backups and ensure they are stored in secure, immutable formats that prevent tampering. The 3-2-1 rule—three copies of data, two different storage types, and one off-site—can provide extra security. Verify the integrity of backups periodically and run simulated recovery drills to confirm that data can be restored efficiently in case of an attack.
6. Train employees
Educate staff on recognizing phishing and other tactics used by ransomware groups. Awareness is a vital defense against social engineering attacks. Beyond that, offer comprehensive training on recognizing signs of suspicious activity, safe browsing practices, and the importance of reporting incidents promptly. Consider including scenario-based training that immerses employees in real-world attack simulations, reinforcing proper responses in a controlled environment.
7. Get cyber insurance
Cyber insurance can help organizations recover financial losses from a ransomware attack, including ransom payments, recovery costs, and legal fees. Cyber insurance can be an important financial safety net, but it’s not a substitute for solid security practices. Make sure the policy clearly defines what qualifies an insurable event and what documentation or proof is required for claims.
How NordLayer enhances security
NordLayer aligns closely with the recommended strategies to protect against ransomware:
1. Identity vulnerabilities and patch systems. With the Device Posture Security (DPS) feature, NordLayer identifies device types and their operating system versions accessing sensitive data. DPS provides timely notifications when a device with an outdated OS version connects to the network, enabling proactive measures such as restricting access to private gateways for devices that don’t meet security rules.
2.Endpoint protection. NordLayer offers Download Protection to block malicious files before they can infect devices and spread malware, which could lead to ransomware attacks.
3. Implement multi-factor authentication (MFA). NordLayer facilitates advanced authentication layers to bolster Zero Trust Network Access (ZTNA). Beyond basic MFA, NordLayer supports additional methods like Single Sign-On (SSO), IP allowlisting, and encrypted connections, ensuring that access to sensitive systems remains secure.
4. Segment the network. Customers can implement granular network segmentation Using Access Control Lists (ACL) within NordLayer’s Cloud Firewall tool. This isolates critical applications and high-value assets, minimizing lateral movement and potential damage in case of a breach.
5. Backup data. While NordLayer does not directly handle backups, its security measures protect access to systems where backups are stored.
6. Cyber insurance. Although NordLayer does not directly offer cyber insurance, pairing NordLayer with NordProtect provides a comprehensive solution for securing critical infrastructure.
By integrating these features, NordLayer supports organizations in addressing ransomware threats while reinforcing their overall security framework.
Lessons from 2024
The top ransomware attacks of 2024 are a stark reminder that no organization is immune to ransomware threats. Whether it’s healthcare organizations, financial firms, or critical infrastructure, the potential for a data breach remains high.
By adopting proactive measures and advanced cybersecurity solutions like NordLayer, businesses can strengthen their defenses and minimize the impact of ransomware attacks. As the threat landscape evolves, staying ahead of cybercriminals is not just a necessity—it’s a responsibility.
About Nord Security The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.
About NordLayer NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Small Business Vulnerability: Limited cybersecurity awareness makes SMBs prime targets for sophisticated malware campaigns like More_eggs.
The Role of MSPs: Managed Service Providers (MSPs) must adopt proactive security measures to stay ahead of threats.
The Need for Modern Solutions: Tools like phishing simulations, endpoint protection, as well as a more unified platform approach can strengthen defenses at the foundation.”
The cybersecurity world is no stranger to evolving threats, but the resurgence of the More_eggs malware campaign has captured fresh attention. In December 2024, a report revealed new iterations of this malware, highlighting its enhanced evasion techniques and tailored attack chains. For SMBs and the MSPs safeguarding them, this is a clarion call to reevaluate their cybersecurity strategies.
What Is More_eggs?
More_eggs is a backdoor malware associated with the Golden Chickens malware-as-a-service (MaaS) framework. It is used by cybercriminals to infiltrate networks, enabling follow-up attacks like data theft, ransomware, and cryptojacking.
Chain of Attack
Campaign 1: VenomLNK → RevC2
VenomLNK: An LNK file contains an obfuscated BAT script that downloads a decoy PNG file (API documentation) from a remote server.
RevC2: An info-stealing backdoor communicates with a C&C server using WebSockets. It can steal passwords, execute commands, and capture screenshots.
Campaign 2: VenomLNK → Venom Loader → Retdoor
VenomLNK: Writes VBS and BAT scripts to the Windows temporary directory. The VBS script triggers the BAT script to download a decoy cryptocurrency image and a malicious base.zip file from a remote server.
Venom Loader: A custom-made loader decodes and delivers the Retdoor backdoor via PS1 scripts.
Retdoor: Sends continuous HTTP POST requests to the C&C server with system details, executes encoded commands, and hides under system processes like “GoogleUpdate.”
Breaking Down the Terminology
Backdoor: A backdoor is a type of malware that bypasses standard authentication methods to gain unauthorized access to a system. This allows attackers to remotely control resources like databases and file servers. With this access, they can execute system commands, steal sensitive data, or install additional malware undetected.
Loader: A loader is a malicious tool designed to infiltrate devices and deliver harmful software (payloads). Once inside a system, loaders can gather system information, install other types of malware such as trojans or data stealers, and prepare the environment for further attacks.
These tools allow attackers to bypass conventional defenses, making them especially dangerous for SMBs with limited resources.
The Devastating Impact to Small Businesses”
Low Security Awareness: SMBs often lack dedicated IT teams and cybersecurity expertise. Employees may unknowingly click malicious links or open infected attachments, triggering the malware long before anyone knows what is happening.
Financial and Operational Fallout:
Data Exposure: Breaches can result in regulatory fines and loss of customer trust.
Operational Disruption: Ransomware and data theft can paralyze critical business functions.
Reputational Damage: A compromised reputation can lead to client attrition.
Stealth and Persistence: More_eggs thrives on its ability to evade detection, establishing long-term persistence and enabling subsequent attacks.
MSP’s Role in Defending SMBs
MSPs are pivotal in addressing these challenges, serving as the first line of defense for SMBs. Here’s how they can combat threats like More_eggs:
1. Enhance Employee Awareness
Recurring Training: Use interactive videos and quizzes to teach employees how to spot phishing attempts and malicious files.
Phishing Simulations: Conduct periodic tests to evaluate and improve employee vigilance.
2. Deploy Advanced Endpoint Security
Endpoint protection solutions ensure continuous monitoring of all devices, especially crucial in hybrid or remote work environments. EDR tools with advanced NGAV capabilities are most effective at blocking this family of malware
3. Strengthen Email Security
Email remains a leading attack vector, with 90% of attacks originating from Phishing email. MSPs should deploy tools that scan attachments and URLs, proactively preventing threats like phishing and spoofing.
4. Implement Incident Response Plans
Regularly back up data and prepare a clear response plan to minimize downtime and financial loss in the event of an attack.
Proactive Measures for SMBs and MSPs
Unified Security Platforms: Tools that integrate Microsoft 365, Google Workspace, and endpoint protection enable MSPs to deliver holistic security.
Browser Protections: Real-time detection of malicious sites and phishing attempts can significantly reduce risk.
AI-Powered Solutions: Automation and predictive analytics allow MSPs to anticipate and mitigate evolving threats.
The Final Word
The More_eggs campaign underscores the urgent need for proactive cybersecurity. SMBs are particularly vulnerable, but MSPs armed with the right tools and strategies can make a decisive difference.
Solutions like Guardz not only protect against advanced threats but also simplify the complex security landscape for SMBs. Want to learn more? Visit Guardz.com today.
About Guardz Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Organizations have become heavily dependent on Windows-based laptops and desktops. According to Statcounter, Windows holds the largest market share at 73.41% as of October 2024[1]. This makes managing and securing Windows devices and the data they contain, a critical aspect of security.
To enhance these management and security efforts, Scalefusion UEM offers GeoFencing for Windows devices, a feature that automatically secures Windows devices and data based on their physical location. By defining specific geographic boundaries, businesses can proactively enforce security measures, ensuring that devices entering or leaving these zones are automatically protected.
To provide you with a better understanding, this blog explains how Scalefusion’s GeoFencing for Windows can enhance the security of your Windows-based devices and servers, keeping your data safe and secure.
Understanding GeoFencing for Windows 10 and above Devices
Geofencing is a virtual perimeter that allows organizations to create predefined virtual boundaries around real geographic areas. For Windows devices, geofencing enables IT administrators to restrict user’s actions on the device based on its location.
By defining these virtual boundaries through a Unified Endpoint Management solution, organizations ensure that devices comply with their security protocols when entering or leaving designated zones. This includes restricting access to sensitive data, enabling specific apps, and sending alerts to administrators.
Geofencing works by using location-based services such as GPS, Wi-Fi, or cellular networks. When a Windows device crosses the defined boundary, it triggers pre-configured actions automatically. For instance, if a device exits an organization’s premises, it may block access to its networks or resources.
This capability enhances security by preventing unauthorized access risks and improves operational efficiency by automating policy enforcement, making geofencing a critical feature for modern IT management.
The need for Windows GeoFencing in modern enterprises
In the early stages of geofencing, it was primarily used by retailers to send SMS notifications to potential customers, driving engagement and foot traffic. However, with the advancements in tech and a sudden rise in the use of mobiles and desktops in enterprise settings, geofencing capabilities also evolved.
Today, modern enterprises use geofencing to monitor and manage fleets of endpoints, including mobile devices, desktops, and laptops based on their location. While geofencing initially gained traction for tracking Android and iOS devices, its application expanded with the increasing reliance on Windows-based desktops and laptops.
Organizations today are heavily reliant on Windows devices for daily operations. The significance of geo-fencing in modern businesses lies in its ability to provide real-time device location. Geofencing addresses the growing need for location-based security, ensuring sensitive organizational data remains protected based on device location.
Irrespective of the type of workforce – on-premise, remote, or globally distributed, organizations face common challenges like managing a large inventory of Windows devices, securing sensitive data, and adhering to compliance standards. Geofencing addresses them by enabling IT admins and businesses to define rules and policies based on the device location for maintaining device and data security.
For CIOs and IT admins of modern-day enterprises, adopting Windows geofencing is not just about enhancing security – it’s about staying ahead of modern IT challenges. Geofencing aligns context-based device management with current business needs, allowing enterprises to operate smarter and more efficiently.
With vs. Without GeoFencing: A comparison
The table below highlights the key differences between operating with and without geofencing, demonstrating how it enhances security, compliance, and device management.
Aspect
Without Geofencing
With Geofencing
Data Security
Increased risk of unauthorized data access.
Restrict access to sensitive data or applications outside designated zones.
Device Usage Control
Lack of control over device usage in sensitive locations.
Monitor company devices or assets across multiple locations.
Compliance Management
Challenges in ensuring compliance with local policies.
Ensure adherence to data protection laws by enabling location-based policies.
Device Location
Unable to track the location of lost or stolen devices
Track the exact location of the lost, unattended, or stolen devices
Industry-Specific Use Cases of Windows GeoFencing
Windows devices are widely adopted across industries due to their versatility, scalability, and extensive software compatibility. Below are use cases of industries that benefit from Windows geofencing:
1. Corporate Sector
Corporate organizations rely on Windows devices for tasks such as document creation, collaboration, and accessing business applications. Geofencing helps enforce location-based policies to secure data access by ensuring knowledge workers can access devices and company resources only within designated office premises or authorized locations.
For instance, a consulting firm like Deloitte may use geofencing to restrict access to confidential project files and applications on Windows devices to office premises or approved locations, ensuring data security and compliance.
2. Healthcare
Healthcare organizations maintain private patient records on their devices. Geofencing ensures that sensitive patient data can only be accessed within designated hospital or clinic premises, reducing the risk of data breaches.
For example, a hospital using Windows laptops and tablets ensures compliance with HIPAA by geofencing access to devices with medical records on hospital premises.
3. Education
Modern educational institutions have IFPDs installed for teaching purposes. Moreover, students use Windows devices in computer labs. Geofencing ensures that when these devices are within campus boundaries students and teachers access only appropriate websites and applications maintaining a controlled environment.
For instance, a university deploys Windows laptops for exams and geofences them to specific classrooms, ensuring students cannot access external networks or resources during the test.
4. BFSI
Windows devices in banks and financial institutions are used for maintaining customer transactions and data. Geofencing restricts access to sensitive customer databases to office locations, ensuring compliance with financial regulations such as PCI DSS.
For example, a bank like JPMorgan Chase must use geofencing to ensure financial data on their Windows devices is accessible only within branch locations or secure office environments.
Key features of Windows GeoFencing with Scalefusion UEM
Scalefusion’s Windows Geofencing allows you to track the movement of Windows-based devices and servers across predefined geographical boundaries. This feature creates a virtual perimeter around a specific region, enabling seamless tracking of Scalefusion-managed devices as they enter or exit the designated area. Here are some features you get to leverage:
1. Customizable Geofences
Scalefusion enables you to remotely create and manage multiple geofences at once. You can create two types of geofences for your Windows devices:
a. Circular GeoFence
A circular geofence creates a defined area based on a central point and a specified radius. This type of geofence is ideal for straightforward work locations. For example, users can access applications or log in to their devices only within the boundaries of an office or a school building. Circular geofences are quick to configure and particularly effective for smaller or regularly shaped areas.
b. Polygonal GeoFence
A polygonal geofence offers more granular customization allowing users to draw irregular boundaries on the map. This feature is useful for complex or non-standard locations, such as large industrial zones or university campuses. By marking precise points on the map, IT administrators can establish more accurate boundaries, ensuring that devices are managed in line with the specific location needs.
2. GeoFence-based Switch Profile
Scalefusion’s Windows Workflows lets you schedule automatic switching to pre-configured device profiles based on the GeoFence event. For example, school laptops can automatically switch to a restricted profile when they enter a geofenced campus, limiting access to educational apps and websites. However, outside the campus, they may revert to a flexible device profile while still maintaining essential security controls.
3. GeoFence Compliance
GeoFence Compliance allows you to create compliance based on the ‘moved in’ and ‘moved out’ events. For example, a hospital can create a GeoFence around its premises, restricting the access of sensitive patient data to devices once they enter the fenced area. This helps healthcare organizations maintain compliance with regulations like HIPAA, ensuring that patient information is protected while blocking data access outside designated areas.
4. GeoFence Logs
Geofence logs record device activity whenever a device enters or exits the designated geofenced area. These logs include precise timestamps of each event for accurate tracking.
5. Real-Time Alerts
Scalefusion provides real-time notifications in case a device breaches a geofence. This allows you to take timely data security measures such as remote data wipe and device lock. Real-time alters enable you to make informed decisions to ensure data security by preventing device or data abuse.
Take a step towards advanced Windows Geofencing with Scalefusion UEM
Scalefusion UEM Windows Geofencing offers a simple and effective way to enhance security and manage devices based on location. By setting up customizable geofences and automated workflows, you can ensure that devices stay secure and compliant, on-site or remote. Scalefusion UEM is a smarter step towards modern Windows device management for your IT teams.
About Scalefusion Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
BRATISLAVA — December 4, 2024 — ESET, a global leader in cybersecurity solutions, is proud to announce the publication of its 2023 Carbon Footprint Report. This comprehensive report underscores ESET’s dedication to transparency, accountability, and environmental sustainability, reflecting the company’s ongoing efforts to mitigate its environmental impact and progress toward a net-zero future.
The report reveals that ESET Group’s total carbon footprint for 2023 is 8,146.34 tonnes CO2e using the location-based method and 7,835.06 tonnes CO2e using the market-based method. Greenhouse gas (GHG) emissions per employee amount to 3.38 tonnes CO2e. The majority of the total carbon footprint comes from indirect emissions within ESET Group’s value chain (Scope 3), representing 79% of all emissions.
Compared to 2022, ESET Group’s total GHG emissions increased by 25%, with GHG emissions per employee rising by 16%. The increase is attributed to the inclusion of additional offices previously excluded from data collection, increased business travel attributed to the significant and lasting changes in how businesses operate, driven by the adaptations made during the COVID-19 pandemic, an increase in the number of employees (by 7%), as well as a return to offices in most locations, and more accurate data collection overall year on year.
Despite these increases, ESET has made significant strides in reducing emissions from stationary combustion and fugitive emissions, thanks to implementing various measures to ensure efficient use of heating and cooling through timers, thermostats, and zoning in many offices. That has resulted in an 11% decrease in emissions from stationary combustion, which is due to the use of natural gas and CNG for heating, an 82% decrease in fugitive emissions for A/C unit leakages, and only a 1% increase in purchased heat emissions.
Palo Luka, ESET’s Global COO, said: “We remain committed to our Global Environmental Strategy and will continue to work tirelessly toward reducing our environmental impact. We plan to do this by increasing the use of renewable energy, enhancing energy efficiency, and promoting sustainable practices across all our operations, individually through employees, business partners, and throughout our supply chain. Our ultimate goal is to leave the planet in a better state for future generations.”
According to Luka, the use of renewable energy helps create demand for more sustainable technologies, and the company’s hope is that, where possible, they can contribute toward influencing more options and higher-quality renewable energy sources. In 2023, 36% of electricity consumed in our offices around the world is from renewable sources, with emissions from purchased electricity category contributing the most to the company’s Scope 2 emissions (87%). Furthermore, although energy consumption in our external data centers has increased by 17% between 2022 and 2023, the emissions from external data centers are almost zero as ESET is using responsible providers and 100% renewable energy.
Read about ESET’s commitment to environmental sustainability here.
About ESET For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Holiday Cyber Threats are No Joke: Learn how phishing scams are evolving during the festive season and the proactive steps MSPs can take to mitigate these risks.
Anticipating 2025’s Challenges: Differentiate your services, enhance your marketing strategies, and solidify client relationships in a highly competitive landscape.
Harness Community Support: Collaborate with fellow MSPs to share insights, best practices, and strategies for overcoming industry hurdles.
As 2024 comes to a close, MSPs are entering 2025 with a mix of opportunities and challenges. The holiday season isn’t just a busy time for retail and services; it’s also a high-risk period for cybersecurity, with attackers exploiting festive distractions. Beyond the holidays, MSPs must address a competitive market, refine their value propositions, and reinforce client trust. This blog covers it all—holiday threats, year-round challenges, and strategies to win in 2025.
Holiday Cyber Threats: A Gift to Hackers
The holiday season brings joy and an uptick in cyber threats. Businesses often operate at reduced capacity during the holidays, leaving gaps in their defenses. Meanwhile, employees are bombarded with emails promoting last-minute sales or urgent holiday tasks, creating fertile ground for phishing scams.
Phishing Scams: The “Exclusive Discount” Trap
In December 2023, a global SMB lost over $500,000 when employees unknowingly entered sensitive information into a fake website mimicking a well-known e-commerce retailer. The phishing email included a “time-sensitive” coupon for holiday deals, creating urgency and bypassing employees’ usual caution.
For MSPs, these attacks represent a dual challenge:
Protect Clients: Ensure their systems and employees are prepared to detect and avoid phishing schemes.
Safeguard Operations: Strengthen internal security measures to avoid becoming a stepping stone for attackers targeting your clients.
Guardz AI-Powered Phishing Simulation
To help MSPs and their clients combat this threat, Guardz offers an AI-powered phishing simulation tool. This tool replicates real-world phishing attempts, teaching employees to identify malicious emails and reducing the likelihood of human error. By incorporating this into your services, you can provide clients with a robust defense against phishing—a particularly valuable offering during the holiday season.
The MSP Landscape in 2025: Challenges and Opportunities
As the calendar turns to 2025, MSPs face three primary challenges: increased competition, the need for smarter marketing, and the battle to retain clients.
1. Rising Cyber Threats: Beyond the Holidays
While phishing dominates the holiday season, cyberattacks are evolving year-round. In 2024, ransomware-as-a-service (RaaS) surged, with SMBs being a primary target. For example:
Case Study: A small healthcare clinic in California suffered a ransomware attack in March 2024, resulting in the loss of sensitive patient data and $250,000 in recovery costs. The attackers exploited vulnerabilities in outdated software—a gap that proactive MSPs could have addressed.
How MSPs Can Help:
Conduct regular vulnerability assessments.
Offer advanced endpoint protection and real-time monitoring.
Provide ongoing security awareness training, including Guardz’s phishing simulations.
2. Staying Competitive in a Crowded Market
The MSP market is expected to grow significantly in 2025, making differentiation more critical than ever. It’s no longer enough to offer generic IT support—MSPs must position themselves as strategic partners.
Strategies to Differentiate:
Specialized Services: Focus on verticals like healthcare, education, or retail, where you can build deep expertise.
Holistic Solutions: Emphasize bundled offerings like Guardz’s Secure and Insure, which combines cybersecurity and insurance.
Outcome-Focused Messaging: Frame your services in terms of measurable results, such as reduced downtime or improved compliance.
3. Marketing Smarter, Not Harder
Effective marketing remains a challenge for many MSPs, but it’s essential for growth in 2025. The key is to stand out with targeted, high-value campaigns.
Practical Marketing Tips:
Content is King: Publish blogs, videos, and webinars that address your target audience’s pain points.
Leverage Data: Use analytics to understand client needs and tailor your messaging.
Collaborate with Vendors: Partner with companies like Guardz for co-marketing opportunities and resources.
Explore Niche Platforms: Don’t underestimate the power of communities like Reddit or LinkedIn groups to reach decision-makers.
Retaining Clients in 2025: Building Long-Term Trust
Client retention is more critical than ever, as the cost of acquiring new clients continues to rise. To keep clients loyal, MSPs must consistently demonstrate value and adapt to their evolving needs.
Retention Strategies:
Proactive Communication: Schedule quarterly reviews to showcase your successes and propose improvements.
Innovative Offerings: Keep your services fresh by integrating new tools like Guardz’s AI-powered platform for real-time threat detection and response.
Client Education: Equip your clients with the knowledge to recognize threats, using tools like phishing simulations to reinforce their defenses.
Guardz: Your Partner in the Journey
At Guardz, we understand the unique challenges MSPs face, and we’re here to help you navigate them. Our unified platform is designed to empower MSPs with tools like real-time threat detection, automated response capabilities, and phishing simulations, making it easier to deliver unparalleled value to your clients.
Beyond technology, we’re committed to fostering a thriving MSP community. Join the conversation on ourGuardz Online Community on Reddit, where you can connect with peers, share insights, and seek advice on everything from cyber threats to marketing strategies.
Looking Ahead to a Secure 2025
As we step into 2025, the stakes for MSPs have never been higher. From holiday cyber threats to year-round challenges like competition and client retention, success will require vigilance, adaptability, and collaboration.
Guardz is here to support you with cutting-edge tools and a robust community. Together, we can turn challenges into opportunities and make 2025 a year of growth and success for MSPs.
Ready to tackle the new year? Join the Guardz community and let’s secure the future together.
About Guardz Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Choosing the right migration approach for your project
A successful migration starts long before you move the first file, and the consequences of insufficient planning and preparation can be disastrous. Back in 2019, British bank TSB locked millions of customers out of their accounts, following a failed IT migration. In 2022, the bank was fined over £48 million for its failure to manage the migration effectively.
Three migration approaches: pros and cons
1. Traditional migration (waterfall methodology)
The traditional approach involves migrating bulk mail and drive items, followed by regular, smaller (delta) migrations of new and modified files.
By moving bulk data upfront and capturing recent files with delta migrations, traditional migrations minimise downtime. There are some drawbacks – you need robust processes to track, detect, and sync delta migrations accurately. And the initial bulk migration is resource-intensive.
Traditional migrations are linear, making it harder to change tactics once the project is in motion. This type of migration is a solid fit for high-volume systems with active users but might be too rigid for simple migrations or time-limited projects.
2. Delta-first migration
Delta-first migrations are like traditional migrations in reverse.
New and recently updated (delta) data is migrated first. Then historical (bulk) data is migrated later. It’s a less conventional approach but gives users immediate functionality with minimal operational impact.
Teams can move into the destination platform faster, and incremental delta migrations mean the bulk migration is smaller (and faster).
There are limitations, though. You need to maintain source and destination platforms throughout the migration. Separating delta and bulk data requires robust tracking mechanisms to manage transfers. Dependencies between delta and bulk data mean certain files may not function properly until the full migration is complete, and you need to sync both data types continuously.
3. Google migration mould (domain switch)
A Google migration mould lets users keep their domain name when moving from an existing Google workspace to a new one. A company could benefit from this approach if they’re moving to a new workspace but need to keep their existing domain name and email addresses.
There’s a specific methodology which requires temporary domains to do the bulk migration, and a domain switch during the delta migration. Google’s tailored advanced migration settings such as selective data transfers and preserved permissions for shared drives, calendars, and files make the process easier.
There are drawbacks though – Google API limits restrict the number of daily data transfers, and certain types of data (such as comments in a document) might not be migrated. Using a cloud migration service can get you past some of these limitations.
How to know which migration approach is right
To determine the right approach for your next migration, we recommend you work backwards. The most pressing outcome of the migration will most likely dictate the approach:
Goal: Limited downtime and business continuity
If limited downtime and business continuity are your main focus, a traditional approach ensures historical data is available for your go-live date. You can migrate users simultaneously with a big bang cutover, and avoid downtime by scheduling the migration over a weekend or planned closure.
Goal: Speed
If you’re looking for speed, choosing not to migrate permissions on folders and files, selecting a specific date range (e.g. the last 12 months’ data), and getting users to delete unwanted data can speed things up.
Goal: Vacating incumbent platform immediately
If your priority is vacating the platform immediately, a delta migration that moves recent data – say, 30 days’ worth – means you can go live fast. Then, you can backfill your target destination with historical data post-cutover.
Other factors that influence how quickly you can complete a migration include:
Amount and type of data
Data per user
Folder, file, and email count
Media (MIME) types
A lack of documentation for legacy systems
Ability to coexist in two different environments
Can you combine migration approaches?
Combining migration approaches is possible and may in some cases be necessary to work around more complex migration scenarios and conflicting goals. Here’s an example:
A multinational company wants to prioritize its specific users and teams in their migration. The company completes a bulk migration for non-critical users and shared drives during planned downtime. Then, the company completes a delta-first migration for critical teams and executives’ recent data (e.g. the last 30 days) into the target system for immediate access. Historical data is backfilled post-cutover to limit delays.
CloudM can help you make the best choice
You can count on CloudM Migrate for a smooth migration. Choose from white glove migration services where we take care of the migration for you. Or get tailored training and advice through our consulting services that equip your team with the skills to deliver frictionless migrations.
About Version 2 Limited Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About CloudM CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.
Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.
By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.
With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.