BUI is proud to announce its selection as a Managed Extended Detection and Response (MXDR) partner for Microsoft’s new business security services, Microsoft Security Experts.
Microsoft Security Experts was unveiled this month and includes three new managed services: Microsoft Defender Experts for Hunting, Microsoft Defender Experts for XDR, and Microsoft Security Services for Enterprise. Two existing services – Microsoft Security Services for Modernization and Microsoft Security Services for Incident Response – are now also part of this portfolio.
As an MXDR partner, BUI will work in conjunction with Microsoft to manage extended detection and response services for some of the largest enterprise customers globally, from threat monitoring to mitigation and investigation.
“We’re excited to continue our security journey with Microsoft,” says BUI Managing Director Ryan Roseveare. “This new collaboration builds on our longstanding relationship, and we look forward to working alongside Microsoft to help customers protect and defend their IT environments from emerging cyberthreats.”
In 2021, Microsoft security technology blocked over 9.6 billion malware threats and more than 35 billion phishing emails and malicious messages. “Technology is critical, but it’s the combination of leading technologies, comprehensive threat intelligence, and highly skilled people that makes for a truly effective security posture,” notes Vasu Jakkal, Microsoft Corporate Vice President: Security, Compliance, Identity, and Management.
Roseveare agrees. “The cybersecurity landscape is incredibly complex. You need comprehensive tools and holistic knowledge to navigate it successfully. Here at BUI, we’ve focused on building both: our Cyber Security Operations Centre is a state-of-the-art facility designed to leverage and integrate with Microsoft technology, and our security specialists are world-class technologists with a deep understanding of the challenges that businesses are facing today.”
BUI’s tried-and-tested blend of people, process and technology will be critical going forward, adds Roseveare, given the alarming increase in the number and sophistication of cyberattacks.
BUI was part of a select group of Microsoft Partner organisations involved in the development of Microsoft Security Experts. As a Microsoft Azure Expert MSP, a managed security service provider, and a member of the Microsoft Intelligent Security Association, BUI is consistently recognised as a strategic partner for cybersecurity innovation. BUI holds nine Microsoft Advanced Specializations – including Cloud Security and Threat Protection – and earned Microsoft South Africa’s Security Partner of the Year Award in 2021, 2020, and 2019.
“We’re serious about security. We always have been,” says Roseveare. “We’ve earned the trust and loyalty of customers around the world because we provide the best possible security solutions and the right advice. As an MXDR partner for the Microsoft Security Experts portfolio, we’ll continue to put our expertise to work for customers – because we’re here to help them safeguard their business resources, from the endpoint to the cloud,” he concludes.
Cybercriminals are targeting businesses large and small to try to gain access to sensitive, confidential, or proprietary data and resources.
What steps have you taken to prevent a breach? Stay ahead of threat actors by choosing a managed detection and response service from BUI.
We’re excited to add two new advanced specializations to our Microsoft portfolio: Cloud Security and Calling for Microsoft Teams.
The Cloud Security Advanced Specialization is awarded only to Gold Microsoft Partners with deep technical knowledge related to Microsoft’s cloud security products, and a successful track record of implementing comprehensive protection across Microsoft Azure and hybrid cloud environments.
To earn the Calling for Microsoft Teams Advanced Specialization, Partners must have extensive experience deploying and managing voice solutions in Microsoft 365, and must be able to integrate modern telephony for customers who require end-to-end communication.
As enterprises accelerate their digital transformation initiatives to enable remote and hybrid work, holistic security should be a key consideration, says Managing Director Ryan Roseveare. “Cloud adoption is taking place at a rapid rate, but it’s also taking place at a time when cyberthreats are more serious, more sophisticated, and more frequent than ever,” he notes. “A single mistake or misconfiguration could leave your enterprise vulnerable to attack, and you cannot afford such exposure when hackers are actively targeting businesses, almost constantly, every day.”
“Here at BUI, our approach is ‘build secure and deploy secure’,” continues Roseveare. “We make security part of the process from day one. We work with our customers to understand their unique challenges, and we help them to make the most of Microsoft’s cloud security products so that their digital environments are fully protected. Our expertise, certified by this Cloud Security Advanced Specialization and several others, is what gives our customers the peace of mind to move to the cloud confidently,” he adds.
BUI already holds advanced specializations in Adoption and Change Management, Identity and Access Management, Microsoft Windows Virtual Desktop, Teamwork Deployment, Threat Protection, and Windows Server and SQL Server Migration to Microsoft Azure, as well as 16 Microsoft competencies in cloud productivity, cloud solutions, and cybersecurity, among other solution areas.
The Calling for Microsoft Teams Advanced Specialization recognises BUI’s capabilities in creating modern voice solutions for a work-from-anywhere world, explains Cloud Centre of Excellence Lead Dhiren Boodhia. “With remote and hybrid work here to stay for many enterprises, there’s a demand for phone-calling technologies that combine unified communications and teamwork,” he says.
Calling in Microsoft Teams has rich functionality to enable people to place and receive calls, transfer calls, and mute or unmute calls. “For end-users, the experience is similar to traditional telephony, but with additional features and the power and scale of the cloud,” continues Boodhia, describing how end-users can use a mobile device or a headset with a laptop or personal computer to place calls to anyone listed in their online address book.
“Calling in Microsoft Teams delivers truly seamless communication, but it must be deployed correctly and securely. The implementation process can be quite complex, especially if it involves Microsoft 365 service deployment, networking changes, and the provisioning or porting of large volumes of telephone numbers. Expert hands are needed, and that’s why our specialists are trusted to help enterprises transition from on-prem phone systems to cloud-based ones – as quickly, efficiently, and cost-effectively as possible,” concludes Boodhia.
The BUI Cyber SoC is a state-of-the-art facility backed by world-class Microsoft security technology, including Azure Sentinel.
Take a look inside to see our teams in action, or contact us today to explore next-generation security solutions for your enterprise.
We’re proud to announce that we’ve earned the Threat Protection Advanced Specialization from Microsoft in recognition of our proven success in deploying Microsoft Threat Protection, Microsoft Cloud App Security, and Azure Sentinel workloads.
The Threat Protection Advanced Specialization is the fourth such Microsoft accreditation that our company has earned in recent months: BUI also holds advanced specializations in Adoption and Change Management, Windows Virtual Desktop, and Identity and Access Management.
“Security has always been a core focus area for us,” explains Chief Technology Officer Willem Malan. “We strive to give customers the best technology, the most comprehensive guidance, and the most innovative solutions to help them protect their digital estates from evolving threats. The Threat Protection Advanced Specialization is not only an acknowledgement of our premier technical capabilities, but also an indication of our commitment to value-driven service,” he says.
As cyberattacks become more sophisticated and more frequent worldwide, it is imperative for customers to be proactive about security, continues Malan. “To safeguard your business effectively, you need the right expertise and the right resources. BUI specialists are already leveraging next-generation tools for threat detection, investigation, and remediation to provide holistic security services to customers. Beyond that, we are actively expanding our range of Microsoft competencies and pursuing new opportunities to deliver even greater support to businesses that are adapting to remote-work and hybrid-work scenarios in the pandemic era,” he adds.
BUI was the first South African company to achieve Microsoft Azure Expert Managed Services Provider status, and joined the Microsoft Intelligent Security Association (MISA) last year. Top-tier cloud and security skills, as well as collaboration within the wider cybersecurity industry, enable us to better serve our own customers, states Malan.
“Advanced specializations, including our latest one in threat protection, position us to deliver relevant, cutting-edge solutions for complex workplaces. And industry associations, like MISA, provide us with important insights into global security trends. As security advisors and partners, we are making sure that our customers receive unrivalled service and support at every stage of their journey with us,” he says.
Malan describes Azure Sentinel, Microsoft’s cloud-native security information and event management platform, as a crucial part of the modern security stack. “It’s an incredibly powerful tool for continuous, real-time visibility across the IT ecosystem. And it’s a single pane of glass that brings structure and simplicity to security operations. Our customer deployments have been very successful, and the results speak for themselves: reduced risk exposure and faster threat detection and response,” he explains.
SEE HOW WE DO IT | Take a look inside the BUI Cyber SoC
As business organisations search for scalable, cost-effective ways to protect their networks, servers, endpoints, databases, applications, and users from cyberthreats, Malan believes two factors will determine the technology partners they choose: reputation and expertise. “We have a longstanding and award-winning relationship with Microsoft, and customers trust us to deliver the right solutions for their needs. For more than two decades, we’ve helped enterprises to design, deploy, and manage their IT assets securely. We’re excited to continue this tradition as we engage with customers who want to protect and defend their critical systems and data,” he concludes.
Register for our 15-minute security webinars this March and get relevant advice and tips from our specialists.
Browse through our webinar topics and register to secure your spot. It’s quick, easy, and free! Just sign up, and show up.
It’s official! BUI has been named a Microsoft Azure Expert Managed Services Provider (MSP). We’re extremely proud to be the first South African company to achieve this distinction, which is currently held by only a select group of Microsoft Partners worldwide.
The Microsoft Azure Expert MSP programme recognises Microsoft Partners with the proven expertise and capability to deliver the highest quality of managed end-to-end Microsoft Azure cloud services, from initial planning and design through to implementation, operation, and optimisation.
“This is a fantastic achievement for BUI and a win for our customers,” says Managing Director Ryan Roseveare. “This is an acknowledgement of our skills and competencies around Microsoft Azure and benefits our company and our customers. It shows that we are in the top tier of globally recognised Microsoft Partners, and that we are highly successful when it comes to managing modern cloud environments. As more and more South African businesses explore cloud-based solutions, the need for Azure specialists grows. We’re proud to rank among the best, and to support local companies.”
Roseveare’s sentiments are shared by Technical Director Willem Malan: “Now, more than ever, I think customers are looking for the best partners to support them through digital transformation. We have attained Microsoft Azure Expert MSP status and that is certainly a validation of our abilities, but more importantly, it’s an assurance for our customers. It shows that we’re equipped to provide truly world-class service, and to deliver Azure cloud services at scale for enterprises across the board.”
To participate in the Azure Expert MSP programme, Microsoft Partners must meet stringent requirements defined by Microsoft and independently evaluated by third-party auditors.
“The process is rigorous,” explains Malan. “Our teams have been assessed on everything from technical aptitude to customer deliveries, and we’re delighted with the positive feedback received. We’re fortunate to have so many talented, passionate people who are committed to delivering business value for our customers,” he says.
“We congratulate BUI on their Azure Expert MSP recognition and look forward to working alongside them, to help more customers make the move to the cloud as a critical enabler of digital transformation. It is a digital transformation journey that for many has accelerated exponentially, as the need for remote working has increased. Our partners are a cornerstone of the Microsoft ecosystem, now more than ever, as we navigate towards a post COVID-19 business landscape that creates hybrid workplaces that are secure, cost efficient and streamlined,” says Lillian Barnard, Managing Director of Microsoft South Africa.
“We’re honoured to have earned this prestigious accreditation, and we look forward to helping more customers benefit from the security and scalability of Microsoft Azure,” concludes Roseveare.
We’re going to implement the DMARC email security standard for our existing customers, free of charge, as part of our ongoing efforts to help create a safer internet.
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication system designed to protect an email domain from cyberattackers who may try to compromise the owner, brand, or business through domain spoofing, phishing, or cyber fraud.
Created by PayPal together with Google, Microsoft, Yahoo! and other industry leaders, the DMARC protocol leverages two existing email authentication techniques – SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) – while adding a reporting function that provides visibility into the domain owner’s email ecosystem.
As a domain owner, you want to have peace of mind about the emails that are being sent under your banner. Not only for your reputation, but for the reputation of your business, too. You want to know that your staff, customers, partners, and suppliers are receiving legitimate emails from real representatives of your organisation, not scammers impersonating you or your people. DMARC assures all those who receive your emails that the messages are authentic and trustworthy – and that they originated from your true domain.
There were an estimated 3.9 billion active email users last year – and that number is expected to reach 4.2 billion by 2022. Email is a big part of our personal and professional lives – but it’s also an information-rich environment that attracts malicious actors. For cybercriminals, the ability to mimic a business through email is extremely valuable, and could open the door for data theft, identity theft, and account fraud.
More than a million organisations – including Amazon, Apple, Cisco, Dell, Facebook, LinkedIn, and Twitter – are already using DMARC to help secure their email. DMARC is considered best practice by industry leaders around the globe. We’ve decided to deploy DMARC for our customers because we want to make sure that they have comprehensive email protection, in compliance with the latest standards.
We’ve enlisted local technology startup Sendmarc to help us do this as seamlessly as possible. The South African company, co-founded by entrepreneurs Keith Thompson, Sam Hutchinson, and Sacha Matulovich, specialises in DMARC implementation and monitoring.
The Sendmarc software gathers, interprets, and analyses DMARC data reports to provide actionable insights for domain owners. It takes a complex collection of technical data and makes it clear, visual, and easy to understand so that domain owners can see exactly what’s happening in their email environments – and then take steps to address any issues detected.
Phishing plays a role in over 90 percent of all cyberattacks – and that’s why it’s critical for domain owners to be proactive about email security. Brands and businesses can’t afford to ignore the fact that cyberattackers are constantly searching for new ways to steal money, personal information, credit card data, and login credentials. Email will remain a target, but the DMARC protocol can help strengthen cyber resilience at the domain level.
Customers will receive correspondence from BUI, outlining the steps for DMARC deployment and providing additional resources to help them understand the benefits of this email security measure.
The DMARC protocol will then be added to the customer’s DNS, and approximately 4-6 weeks later, the customer will receive a report outlining any issues detected.
Managing cybersecurity for an increased remote workforce requires careful consideration of the people and protocols throughout your business.
South Africa’s nationwide COVID-19 lockdown has made remote work a business necessity. And while you may have supported a handful of work-from-home employees before the pandemic, a rapid transition to a fully remote workforce is likely to test your capabilities. There isn’t a one-size-fits-all solution when you pivot from a traditional, physical hub to a virtual workspace, but there is one critical concern that should guide your actions: cybersecurity.
Effective cybersecurity requires both visibility and control. When your day-to-day business operations are centralised, it’s simpler for IT personnel to safeguard data and resources. They’re able to monitor networks, supervise hardware and software usage, and help govern employee behaviour to insulate your company from cyberthreats. They’re gatekeepers and guardians with defined perimeters, 360-degree views, and the power to manage endpoints and end users alike.
But what happens when your employees have to work remotely from their homes? What happens when they use household wi-fi, personal devices, and public applications to keep in touch with colleagues and complete job-related tasks? And what happens to your corporate security posture when it’s suddenly linked to domestic ecosystems that you cannot see and do not own?
The digital landscape has been changed by COVID-19. The threat landscape has been changed as well. One of the biggest challenges for cybersecurity teams right now is the protection of remote workers (and workloads) in a fluid environment where the risks have been greatly amplified by the current social and economic circumstances. While businesses are grappling with the coronavirus fallout on all fronts, cyberattackers are looking for novel ways to exploit systemic vulnerabilities and individual fears. Security measures that factor in technological and human considerations are more important than ever before. You need to look at your protocols and your people as you adjust your defensive strategy for the continuing lockdown, and the future beyond it. Our remote-work checklist will help you to close the gaps and strengthen cyber hygiene…
Few organisations were equipped to transform their employees into remote workers at the pace required for sustained productivity after South Africa’s lockdown announcement in March. Travel limitations and retail restrictions also made it difficult to purchase new corporate hardware for personnel to use at home. As a result, there are several remote-work scenarios in play: staff using company-owned devices; staff using their own devices; staff using borrowed devices from friends and relatives; or a combination of these.
A comprehensive policy that outlines the terms and conditions of remote access to corporate resources, as well as the roles and responsibilities of everyone involved, can reduce the risk of costly disputes in the event of a security incident. Your business may also have additional legal obligations regarding the handling of personally identifiable information and intellectual property in such circumstances, and you may need to consult an expert for guidance on the applicable local and international laws.
Make sure that your employees understand the importance of system updates, program updates, and software patches as part of a healthy cybersecurity routine – and be prepared to offer additional support to those who do not usually perform these tasks on their own.
You can also put device maintenance and protection under your corporate umbrella with a cloud-based endpoint management platform like Microsoft Intune, which gives you the ability to manage and secure company-owned and employee-owned Android, iOS, Windows, and macOS devices.
Check that all devices used by remote workers have adequate firewalls and up-to-date antivirus software installed. This is particularly important for the smartphones, tablets, and laptops that employees use personally and professionally.
Windows 10 has Windows Defender Antivirus built in, and if your IT teams are monitoring endpoints with Intune or a similar solution, then you may have additional functionality to improve the cyber safety nets around remote devices.
Your employees’ home office environments may be shared by their spouses, partners, children, roommates, or even tenants. And their home networks may support web-enabled appliances like smart TVs, or IoT automation systems like lighting control, or wearable technology like fitness trackers, in addition to their own portable devices. Every connected item is a potential gateway for cyberattackers.
You can buffer corporate resources against this wider threat landscape by enforcing the use of Virtual Private Networks (VPNs) and remote desktop applications. Make sure that remote workers do all they can to safeguard their home wi-fi routers as well, in terms of physical security (making it tamper-proof) and cybersecurity (changing its default password out of the box).
Implementing multi-factor authentication will help you to maintain control over core system access and protect sensitive business data. The extra steps that remote users have to take to verify their identities are essential security checkpoints for your organisation – and additional obstacles for malicious actors.
Phishing attacks are increasing as cybervillains move to exploit the public demand for coronavirus-related news and information. And you may already know that around 80% of data breaches are linked to compromised, weak, or reused passwords. Enabling MFA can help you to secure every employee login, no matter where the employee is located.
You have to account for the fact that technical aptitude differs from person to person, and that remote work in itself may be daunting for employees who are more comfortable in a communal office where the IT department is a few metres away. Make sure remote staff know who to contact for everyday troubleshooting and emergency intervention, so that they don’t have to look for workarounds and quick fixes that could compromise their cybersecurity, and by extension, your company’s as well.
SEE HOW WE DO IT | Step inside the BUI Cyber Security Operations Centre
The COVID-19 pandemic may have pushed you to explore remote productivity earlier than you’d planned – but if you make cybersecurity the guiding principle for your remote workers today, then they’ll be better prepared to face the digital environment of the future.
We’ve embraced the idea of the modern workplace, and we’ve helped many of our customers to do the same. Neil du Plessis, our cloud solutions security architect, will discuss rapid deployment for remote work in our webinar on 27 May 2020.
He’ll be covering key areas including secure connectivity, secure collaboration, and business productivity options for small and medium-sized enterprises, with a special focus on Microsoft Teams.
Zoom CEO Eric Yuan says the company is working to address privacy and security concerns, but cyber experts and government agencies have already raised the alarm regarding:
In response, many organisations have strongly discouraged the use of Zoom, or banned the software altogether.
Likewise, we do not recommend your business use Zoom until these vulnerabilities are patched
OUR ADVICE
Rather use Microsoft Teams. Microsoft’s powerful communication tool is your best option for secure online video-conferencing. If you don’t already have Teams as part of your Microsoft licensing package, the free version is available now. Learn more.
Get the Zoom For Teams add-on. If you’re required to participate in an external Zoom meeting, then use this app to do so from within your Microsoft Teams environment, with full control over your conference participation.
BUI is fully operational during the COVID-19 lockdown period and our specialists are available to help you make the most of Microsoft Teams. Contact us today.