CyberNews from JustWorks – Issue #6

Keeping you up to date on the latest in tech and cyber. Feel free to forward to interested colleagues and acquaintances.


Deep Phishing

Margaret Tarrant - "Little red riding hood"

Cyber criminals are taking advantage of AI to generate deeply personalized and complex attacks, known as Deep Fakes. Like the Wolf dawning Grandma’s garbs to fool Little Red Riding Hood, scam artists can impersonate trusted parties like never before to bring down our guards. By formulating attacks via AI with information that would seemingly be too uniquely accurate to be a scam, people are more susceptible to becoming victims of fraud than ever before.

Bloomberg reports that Banks are expecting Cyber Crime to cost $8 trillion this year, and on track for $10.5 Trillion in 2025. With the ability to create innumerable individualized attacks, the protectors of Cyber Security are having to ramp up efforts to avoid losing the battle against criminals. It will take a culture of Cyber awareness and increased education to put up a fight.

Many organizations are reporting very specific attack vectors that are so skillfully crafted to impersonate their usual vendors and clients, that they are worried at the increased possibility of personnel taking the bait. AI can generate all types of sophisticated impersonations from voice clones, visuals, and language patterns, pushing the limits of what the rational mind can differentiate between real and fake.

Learn how you can combat the coming cyber struggles with SecureWorks and our new advanced email protection service.


MOVE it on Down the Road

https://www.youtube.com/watch?v=zrncsyZ9YLA

The Cyber Security landscape mounts up as larger, more critical, infrastructure is increasingly targeted.

The MOVEit file service ransomware attack had the Oregon Department of Transportation (ODOT) lost without direction. Anyone with a state issued ID or Drivers License had their information compromised, including details like name, address, and social security number. The massive scope of the data breach, affecting over 3.5 million people, left ODOT in shock and they did not make any acknowledgment of the attack for months. Claiming they didn’t want to release any statements until after a forensic investigation, which took several months to complete following the breach.

Once ODOT finally publicly addressed the hack, surprised Oregonians expressed their fears of widespread identity theft and were disgruntled at being unaware for months that their personal information was caught in the dark web. Furthermore, ODOT was just one entity that was affected by the worldwide ransomware attack on MOVEit.

Government services are clearly in hacker’s sights, and data from the UK Govt. shows that the larger your organization is, the more likely you are to be targeted. Do you know anyone lacking secure file services? Have them contact JustWorks today and we can deploy secure file systems for their IT.


Easy Co-Editing

Egnyte recently released an integration with Microsoft Office 365, allowing you to Co-Edit files simultaneously with other colleagues. Have a PowerPoint or Excel document that you and your team are completing? Well, now you no longer have to worry about who works on the file, or when. Co-Edit allows everyone to access the same file, at the same time, so that projects can progress with real time collaboration ensuring all edits are captured in one file. This means no one is stuck waiting for their turn, and you won’t have worry about checking multiple file versions to capture everyone’s edits. All of this works directly inside your desktop Office 365 apps, providing full utilization of computing power compared to web based collaboration.

With the new PDF Viewer and Editor in the Web UI, working on documents is significantly streamlined.

https://helpdesk.egnyte.com/hc/en-us/articles/16577351731597-PDF-Viewer-and-Editor-for-WebUI

No longer will you need to save files locally and then open them with specific PDF editing apps. The PDF Viewer allows you to view any PDF directly in a browser, while the Editor allows editing directly inside the viewer with 30+ annotation, form filling, and form creation tools. Now you can make changes from anywhere, and on any device.

Contact us if you’re interested in using these new features.


CyberNews Archive

JustWorks Soaring Above the Clouds

Inspired by the best professional services in the world, JustWorks likens our practices to that of today’s finely tuned Airlines.

In Case of Emergency

Photograph: Christopher Doyle

In Aerospace and IT you want to do everything possible to avoid a mistake – the consequences can be extremely serious !

The first step in planning for the worst, is to make sure everything is readily visible. As you make your way to your seat on an airplane, you’ll see that every crucial component is clearly labelled so that it can be found in an instant, even when the smoke is rolling through the cabin. We document every process and clearly label all equipment for quick asset identification, so that in an emergency there is no guess work for what we need to get our hands on.

Sometimes emergencies take the Red-Eye flight. That’s why we constantly monitor crucial infrastructure and enable a wide variety of contact channels so that customers can easily get a hold of us when things become turbulent. Justworks always maintains a stock of spare equipment so that our customers can be back up and running the moment something breaks, not stuck troubleshooting hardware issues on customer’s time. 

Now, through our SecureWorks offering, we can help customers formulate their own custom seat-back safety pamphlets (aka Security Plans), that detail exactly how systems can be brought back online in the event of a digital or physical disaster.

Now Boarding

Photograph: Gary Hershorn/Getty Images

JustWorks has honed our process for new customers to quickly onboard all user and device information, so that everyone in your organization can easily get up and flying day 1.

All our customers need to do is flip on their overhead help light (by phone, email, text, or chat) and our IT stewards will be there in industry-leading response times. Our streamlined and customizable personnel onboarding & offboarding processes make changes to your travel party a breeze.

Pre-flight checks are a necessary part of every voyage. That’s why we continuously monitor and audit devices and users, ensuring we are ready when issues take off. Like the touch displays in the cockpit, JustWorks’ endpoint agents allow us a window into the entire IT environment from anywhere, so that we can solve issues remotely as soon as they are identified.

Maintaining a Fleet

Every plane needs a great crew. With nearly 30 years in the industry we know how to bring on the right talent to power our IT Solutions. We empower our stewards with an deep knowledge base crafted over decades, so that they have access to the proper and specific information needed. Since we bring all of our crew up to speed, we have co-pilots at the ready to prevent delayed flights caused by members being unavailable. Maintaining a fleet means having airplanes that function nothing short of optimally. From network hardware to cloud vendors, JustWorks deploys only the best hardware and software available.

CyberNews from JustWorks – Issue #5

Keeping you up to date on the latest in tech and cyber. Feel free to forward to interested colleagues and acquaintances.


Chat Bot not Jackpot: Chat GPT & IT Solutions

Chat GPT and other AI platforms are being scrutinized for their potential to solve problems at a speed and scale exceeding human norms. What human lead tasks today would be done more efficiently and could be replaced fully by AI in the future?

While many people’s considerations drift to the hypothetical endgame of idealized Artificial Intelligence, JustWorks maintains a realistic outlook on computer generated responses and have thoroughly tested Chat GPT’s ability to solve technical problems – one might think that IT would be a field in which Chat GPT would excel. However, our testing has showed that Chat GPT is only provides the correct response to a wide variety of IT problems around half of the time. This is largely due to two of AI’s limits:

  • How it is prompted (hard to do!)
  • Only being able to draw conclusions from the data set it is trained on

As IT Solutionaries, we know that effective service results from the ability to solve novel issues as they arise. In a fast paced environment where issues need to be resolved accurately and in a timely manner, there simply isn’t room for this degree of error.


The Bay Area Cools Off

Businesses in the Bay Area saw employment costs heat up as wages rose at an accelerated rate in 2021/22. However, it appears the climate is shifting as companies adjust to post-pandemic conditions.

Early this year, we reported on tech companies lightening payroll with large job cuts as financial tides went out. Data from the Labor Department shows, these loses have taken a toll on Silicon Valley with counties reporting average weekly salaries decreases of around 20 percent compared to 2021 !

It appears companies are looking to the horizon and choosing to keep those vital jobs which keep the cogs turning and shying away from highly specialized and cost intensive positions. Many organizations across The Bay Area are likely relieved to see they are not going to be priced out of the market for finding the right talent.


Sophos Adaptive Attack Protection

Sophos recently added the ability for Sophos Endpoint to dynamically apply active protection when an on hands keyboard attack is detected. This is next level capability can recognize malicious behaviors in real-time and gives customers valuable time to neutralize active adversaries before a breach occurs. Interest in Adaptive Attack Protection is widespread as companies face the threat of insider attacks with growing numbers of non-localized workers and handling the challenges of complying with cyber security standards with on-site visitors. Watch how

Sophos continues to top the G2 Grid® as the only cybersecurity provider that qualifies as a Leader across:

  • Endpoint Protection Suites
  • Endpoint Detection and Response (EDR)
  • Extended Detection and Response (XDR)
  • Firewall Software
  • Managed Detection and Response (MDR)

G2 independent, verified customers rated Sophos the #1 overall XDR and Firewall solutions. We have many years of experience implementing Sophos to provide the best cyber security for our customers.

If you’d like to know how you can utilize Sophos to achieve the best protection, give us a call on 866-JUSTWOR or email info@justworks.net


CyberNews Archive

Clouds come down to Earth, and prices go up, with a bang

The end of easy money, Elon Musk’s re-organisation of Twitter, and inflation have brought reality to cloud service platforms with a speed no one predicted.
Those us operating ordinary businesses have always known that cash flow is king and profitability is the definition of success. The idea that we might have a few thousand extra employees we don’t need any more would be crazy. But 300,000 redundancies later, and still counting, reality is catching up to the tech sector with a vengeance.

What does this mean for the customers ?

Price increases.

Every cloud business now has to have a plan to get cash positive and profitable, otherwise they won’t be able to access any further funding.
We expect to see quite eye-popping increases in cloud service pricing across the board over the next 12 months. To give one example, Google Enterprise platform pricing has gone from $12 to $28 in a year. That’s 133% “inflation”!

JustWorks Analysis

We have always advocated for the value of cloud services for what they enable, not what they save, based on our real life experience of tech deployment and our understanding of the mechanics of cloud services. Cloud services liberate businesses to operate more flexibly and adapt faster to changing markets. They transfer the burdens of lifecycle management, data backup, and security to the same people that write the apps – that’s more efficient but it does not eliminate the costs.
Increased attention to cybersecurity locally, nationally, and globally is combining with these changes to increase the cost of technology for every business. We may not welcome it, but it is unavoidable.

How JustWorks can help

Over 25 years we have built a business that stands on the same side of the table as our customers. We take on the risks of vendor selection, reliability, demand surge, and design. We also negotiate deals that leverage our scale and channel relationships to provide access to superior features and better pricing than any customer could on their own.
We may not be able to protect you from the general direction of price rises but we will do our upmost to make the transition as smooth and manageable as possible. Having JustWorks on your side means you can be confident that we are working every day to control costs and increase value.
To keep cybersecurity costs down we launched our SecureWorks service last year. This service provides the most cost effective way for businesses to boost their defenses and establish compliance. Customers have seen their audit scores move from D- to B+ in just a few months.

Whatever you want to do, we can help you do it better, faster, cheaper and more simply. If you are considering any changes, let us know how we can Make IT Simple for you.

CyberNews from JustWorks – Issue #4

Keeping you up to date on the latest in tech and cyber. Feel free to forward to interested colleagues and acquaintances.


Ransomware on the Rise

Cyber Security becomes more valuable by the day as attacks increase in frequency and complexity.

Microsoft reports they experience 300 million fraudulent attempts to access their cloud services everyday. Sophos reports on providers of “hacking as a service” increasing through 2022 and into this year.

At this rate, insurance execs are warning that Cyber attacks will soon be joining Natural Disasters in being uninsurable. The enormity of the impacts cyber attacks could have, if critical infrastructure is targeted, is simply too large for insurance companies to anticipate and remediate.

This fear was made real here in the Bay Area when the City of Oakland recently declared a State of Emergency after it fell victim to a ransomware attack that disabled key technical infrastructure and brought city services to a halt. By encrypting Oakland’s data with their own key, the hackers now have sole control over that data and are releasing small portions of employee information to demonstrate their capability and bolster their demands. Understanding your own Cyber Security readiness is critical as threat actors increase their activity.


Managing Your Detection and Response

At JustWorks we have been implementing the Gartner leading cybersecurity managed detection & response, Sophos MDR, for our customers to ensure they have 24/7/365 threat detection and response. Sophos’ Endpoint and Network monitoring approach ensure our customers’ IT Systems are secure no matter where they work. Utilizing AI threat identification to prevent attacks in conjunction with a dedicated team of specialized cybersecurity experts to handle the intensive work, Sophos MDR offers the best Cybersecurity as a Service, while keeping costs and resources down.

Sophos services can also help at any stage of a cyber attack. Whether you would like to assess if your data has already been compromised, or are currently in the middle of an active attack, Sophos’ round the clock SOC can respond to and resolve attacks rapidly.

If you’d like to know more about how we can implement Sophos MDR for your business systems, give us a call on 866-JUSTWOR or email info@justworks.net


It’s 10 PM, do you know where your children are logged in?

As the White House backs a Senate Bill that would ban Tik Tok for Federal Employees, it’s time to think about what apps your family is giving their information to. This short and very polished film by the Financial Times highlights the challenges for managing identity security for youth in today’s digital society.

Watch it at home with your family to get a conversation started.

CyberNews from JustWorks – Issue #3

Keeping you up to date on the latest in tech and cyber. Feel free to forward to interested colleagues and acquaintances.


2023 kicks off with tech turmoil

Seems like every tech business in California is rushing to lighten their payroll ahead of what many expect to be a tough year ahead. Even Microsoft!

This is when the tide goes out and we all find out who has been swimming naked. With so many tech businesses based on new revenue models, who will survive the coming changes ?

Evaluating tech vendors is what we do at JustWorks. It requires in-depth knowledge of the tech industry, the history of firms (who has bought who recently), technical evaluation of the products/services they offer, analysis of each vendor’s cyber security posture, and market intelligence to determine if they have a sustainable position against their competition. This is not work that most companies can do for themselves, which is why vendor selection is large part of our work and a significant value we add for our customers.


The End of Passwords …

Bill Gates predicted the death of the password around 15 years ago. In fact, password use has risen, and they remain the default method of authentication for a huge range of services, both at work and home. 

Increasingly complex password requirements place an unrealistic demand on users. Inevitably, users devise their own coping mechanisms to cope with ‘password overload’. This includes re-using the same password across different systems, using simple and predictable password creation strategies. Sound familiar?

Every company needs to do 3 things right now to stop password overload becoming a cyber security threat to the business:

  • Stop making users change their passwords!
  • Turn on MFA for all remote access. Make every login a proper security check. If the login is at an unusual time of day or from a new location/computer/browser, then ask for another security factor.
  • Get a Business subscription to 1Password. Inevitably there will be passwords that need to be shared across teams and you need to have vaults that are controlled by the company, not the user! Every employee added to a 1Password Business accounts get a free subscription for their personal/family use.

ZTNA is coming in February

We are excited to announce that JustWorks is adding Zero Trust Network Access (ZTNA) from Sophos to our fixed fee services starting in just a few days.

Zero trust refers to a way of controlling access where every request is validated from the ground up and permission is only granted when a valid user authenticates themselves on an approved computer to access an application they are authorized for.

If you’d like to know more “zero trust” for your business systems, give us a call on 866-JUSTWOR to email info@justworks.net


CyberNews Archive

Useful graphics on passwords and many other cyber security subjects available from the NCSC.

CyberNews from JustWorks – Issue #2

Keeping you up to date on the latest in tech and cyber. Feel free to forward to interested colleagues and acquaintances.


Cyber Gets Serious

Cybersecurity risk is the #1 concern for businesses large and small according to the 2021 Travelers Risk Index.

Our analysis of a cybersecurity questionnaire from Travelers Business Insurance shows responses are required for 56 requirements from the NIST 800-171 standard, including 40% classified as Advanced in the CMMC framework. Of those 39 require enhanced JustWorks management, and 17 require specific internal policies and processes.

It’s time to get serious about cyber. Every business needs a security plan and a continuity plan for I.T. — not just for insurance.

The SecureWorks add-on plan for JustWorks customers is now available with 4 service levels to suit your business needs. Let’s get a SecureWorks plan started for your business.

Making IT Security Simple | JustWorks
Making IT Security Simple | JustWorksjustworks.net
JustWorks does it again! We have been Making IT Simple for over 25 years and now we are making Cyber Security & Compliance simple too. SecureWorks is the new add-on service that turns a confusi…

Cooling IT

Keeping IT systems cool is no laughing matter. The recent heatwave in the UK caused systems at 2 major hospitals to literally melt down! They have been offline for over 2 weeks and porters are running around with test results on bits of paper, trying to find patients!

Good design, up-to-date equipment, and active monitoring are keys to preventing this kind of problem. That’s why these principles are baked (excuse the pun) into every JustWorks design.

What is “zero trust” ?

Techies love buzzwords and the term “zero trust” is the buzz of 2022. But what does it mean?

Zero trust refers to a way of organising computer systems in which no one and no devices are assumed to be trustworthy.

On a typical office network the PCs on everyone’s desks are assumed to be computers that have already been configured to meet the business’ security standards. So there are few, if any, limits placed on what they talk to or how they respond to other devices on the network.

In a “zero trust” environment every computer treats every other device as a stranger, until proven otherwise. This helps stop, or at least control, the spread of malicious code across a network.

The spread of ransomware in recent years means that very few networks are still configured to be “all trust” nowadays. Most are somewhere in the middle. If you still have to use a VPN to connect to your office, that’s probably because the office systems are too trusting and so they need to be more strongly protected (even though it makes life harder for users).

If you’d like to know how close to “zero trust” your business systems are, give us a call on 866-JUSTWOR to email info@justworks.net

CyberNews from JustWorks – Issue #1

Hello and welcome to the new newsletter from JustWorks.

We will keep you up to date on the latest cybersecurity and information technology developments. Just what you need to know, when you need to know it.

We will keep this simple (just like our services). If you have any questions or would like any futher information just reply to let us know.

In this edition: planning, zooming, and safety at home.

Do forward this on to anyone else you know that needs to keep up on the latest cybersecurity for business.


Ukraine, crypto, and cyber attacks

Russia’s aggression in Ukraine has coincided with a reduction in cyber attacks (and, tangentially, in crypto currency values).

Not what we expected.

Perhaps the “Fancy Bears” are distracted with trying to take down Ukraine’s IT systems and so there’s been less focus on attacking the rest of us? Just a guess, but in any case now is the time to review all the potential weak points in your cyber security plan.

They will be back, you can be sure of that!

If you haven’t got a cybersecurity plan: you don’t know how [in]secure you are. Get started on a plan now!

Zoomin’ IT

Covid made “zoom” a verb. Shorthand for online video meetings, “zoom” has become a household word. Now zoom can be your phone system too.

Building on the global infrastructure they put in to deliver high quality video, zoom have easily been able to add voice service that is just as clever at managing itself as the speed of your Internet connection changes second by second.

With direct, private peering with the world’s public telephone networks, zoom offers high levels of security for their phone service.

But, like everything else in the cloud: it’s only as secure as you configure it to be!

If (when) you do switch to an online phone system, get an expert in identity management to set it up properly.

Stay cybersafe at home too!

Cybersecurity doesn’t stop at the office door. Make sure your personal systems at home are protected too — you’re only as secure as your weakest point.

Get Sophos Home for all your home computers, especially the kids! Covers up to 10 computers for less than the cost of one fancy coffee a month.

Making IT Security Simple


JustWorks does it again! We have been Making IT Simple for over 25 years and now we are making Cyber Security & Compliance simple too. SecureWorks is the new add-on service that turns a confusing and complicated problem into a structured service that allows JustWorks customers to achieve the highest standards for the lowest cost. NIST/CMMC compliance programs typically cost tens or even hundreds of $000s, involve a bevy of consultants making life as complicated as possible, to justify absurdly high fees. Not JustWorks. We make Make IT Security Simple – and low cost!

Many JustWorks customers are finding that cyber-insurance and supply chain requirements are requiring more stringent security controls and that they need to report more formally on their compliance level. To meet these requirements we are launching a SecureWorks service add-on that can be tailored to the compliance objectives of your organization. (Brochure download)

SecureWorks includes 24x7x365 Security Operations Centre monitoring of your network, firewalls and computers with proactive investigations of any security threats. In order to meet the NIST 800-171/CMMC 3.0 Foundational cyber-security requirements we are offering JustWorks customers a specially priced package that helps you self-certify compliance with those requirements.

As part of the SecureWorks service we will meet with your team for regular Compliance Reviews to manage progress towards with your chosen objective. We provide an online portal through which we can jointly manage the development of your policies, the implementation of secure practices, and produce reports and plans to satisfy compliance status requests.

What’s included in SecureWorks:

  • Exclusive SecureWorks FrameWork : online CyberSecurity Compliance Management web portal
  • Multiple simultaneous compliance objectives across requirements and time frames
  • On demand reporting and production of:
    • System Security Plan
    • Security Incident Response Plan
    • IT Recovery & Continuity Plan
    • Plan of Action & Milestones (POA&M)
  • Event logging for incidents and reviews
  • NIST 800-171 Controls and CMMC 3.0 Practices matrix allowing selection of compliance level objectives for right now, and for development towards higher levels in the future
  • Compliance Reviews for joint progression of compliance
  • Policy directives and templates to speed up the development of company policies
  • 24x7x365 Security Operations Center (SOC) monitoring with proactive threat hunting*
  • Policy-based control of content across multiple cloud content repositories*

The normal JustWorks services provide the controls needed to comply with the CMMC 2.0 Foundational compliance level. SecureWorks adds structured implementation, progression and reporting capabilities to those services.

SecureWorks Multi-Compliance Dashboard

SecureWorks Advanced

For NIST 800-171 and CMMC 3.0 Advanced level compliance, SecureWorks Advanced packages can include security upgrades* to the various cloud services that are part of every modern business’ IT infrastructure. JustWorks cloud file service can be upgraded to include project folders, 100GB file size, mobile PDF editing, unlimited retention, automated permissions auditing, extra ransomware protection, workflows, and unusual behavior detection to guard against malware and intellectual property loss*. Compliance policies can be extended to include data stored on cloud services such as Office365 and Google Workspace as well as the servers in your office*. JustWorks cloud identity service can be upgraded to Adaptive Authentication* that makes company-wide adoption of Multi-Factor Authentication (MFA) responsive and effective.

Every business needs to be on a journey to better cyber security, and proving that can lower insurance costs and help you win new customers as part of a secure supply chain.

Call us today and let’s get started on a journey to better cyber security together. 408-369-7585.

* additional licensing required

Continuity Planning – COVID-19

The possibility of interruptions to normal business loom as a result of potential actions that may be needed to contain and delay the impact of Coronavirus COVID-19. It’s time to make sure plans are in place should matters escalate.

What JustWorks is doing:

JustWorks operations and support services will continue as normal within the constraint of any ‘social distancing’ measures introduced. That is to say that our remote support operations are fully resistant to limitations on travel however we may be unable to perform on site support in the event that restrictions to travel and social contact are introduced.

Our support operations are fully enabled to ‘work from anywhere’ so there will be no reduction in support services.

  • All communications (email, phone, video) are fully cloud based
  • All technical support and management functions are fully cloud based

All JustWorks customers operate fully independent systems that do not rely on any systems or services operating out of JustWorks facilities.

What our customers should do:

Prepare for interruption.

In the event that travel and social distancing measures interrupt normal business operations customers should prepare for the maintenance of as much continuity as possible.

The link below will give you a good guide to the kinds of measures and plans you should develop. Primarily you should be thinking of:

  • Team leaders to coordinate work rotas and scheduling in the event that your employees have their travel restricted.
  • Communicate to your customers what your plans and expectations of business continuity are.

Get the ebook on continuity planning here.

What we can do together:

Remote working

Let JustWorks know if you expect to have employees work remotely. We can make sure that the systems are in place to enable that.

Services that available:

  • Remote file system access
  • Remote control of and access to in-office systems
  • Full video communications infrastructure allowing everyone to communicate, chat and meet online at any time
  • Phone number migration to cloud-based systems allowing calls to be routed to and answered from anywhere
  • Setup & configuration of laptops or home computers to securely access the company’s systems

Don’t hesitate to contact us with any questions and requests for further assistance.