Cyber Threat Predictions for 2022

December 6, 2022

In recent years, have seen an unprecedented rise in cybercrime.

The research, developed by FortiGuard Labs, shows a nearly 11-fold increase in ransomware in the 12 months between July 2020 and June 2021. It also confirmed an increase in attacks on high-profile targets, including the supply chain attack on SolarWinds and the disruption of Colonial Pipeline and JBS Meats, affecting thousands of organizations and millions of people who have nothing to do with IT.

  • Using advanced extended detection and response that block critical malware functions, such as contacting a C2 server to download a malicious payload;
  • Integrated Sandboxing technology across the network, including next-generation firewalls (NGFWs), secure email gateways, and cloud-based security solutions whether as a standalone solution or as part of a virtual firewall;
  • Implementing automation and analytics tools designed to recognize attack patterns and techniques, such as behavioral analytics and deceptive network strategies and solutions combined with honeypots;
  • Using any tools designed to detect and interrupt a threat also needs to be augmented with advanced artificial intelligence (AI) systems that have been trained to spot anomalous behavior and that can sift through and correlate log files and indicators of compromise (IOCs) to detect complex, multifront attacks.

Get know the predictions for 2022 bellow

Cyber Threat Predictions for 2023

January 23, 2023

In 2022, Fortinet made several predictions about how the threat landscape would evolve, ranging from attackers spending more effort on pre-attack activities to an increasing number of attack attempts impacting operational technology (OT).

At the beginning of 2023, Fortinet looked at how some of their predictions fared, and how they expect these threats to evolve as they plan for this year.

Fortinet predicted an increase in new vulnerabilities and more "left-hand" activity, or pre-attack reconnaissance and weaponizations, among attackers, paving the way for further escalation in the growth of Crime-as-a-Service(CaaS). And in the first half of 2022 alone, the number of new ransomware variants identified by Fortinet increased by nearly 100% compared to the previous six-month period, with the FortiGuard Labs team documenting 10,666 new ransomware variants in H1 2022, compared to just 5,400 in H2 2021.

This explosive growth in new ransomware variants is largely due to the growing popularity of RaaS on the dark web.

Like streaming media or food delivery apps, Fortinet expects cybercriminal organizations to embrace subscription-based services and purchase plug-and-play ransomware for a quick payday. To increase the pressure on victims, RaaS operators often threaten to release stolen data on the dark web if their demands aren't met.

While the number of ransomware variants introduced is skyrocketing, largely due to RaaS, ransomware payments are also on the rise. The U.S. Treasury Department's Financial Crimes Enforcement Network (FinCEN) reported that organizations paid nearly $600 million for ransomware in the first half of 2021, putting the U.S. on track to surpass the combined payouts of the previous decade in a single year.

According to one survey, 72% of respondents said they have a ransom policy in place, and the procedure for 49% of them is to pay the ransom outright.

Fortinet now predicts that the CaaS market will expand significantly through 2023 and beyond, with new exploits, services, and structured programs soon to be offered to threat actors through subscription models.

Cybersecurity Remains Mission Critical

December 6, 2022

The wild and digital world can be frightening and challenging, especially for small and midsize businesses. As technologies become more distributed and interconnected, the cyber threat landscape continues to evolve and become more complex and dangerous.

HPE is one of the organizations struggling the most to stay ahead of an endless, ever-growing collection of security threats and vulnerabilities. Limited money and resources regularly become synonymous with threats for these types of organizations. As a result, they need expert information, knowledge, and assistance to ensure they are getting cybersecurity right.

Through this paper, you will be able to:

  • An explanation of common business circumstances that make cybersecurity challenging
  •  A quick overview of five common security threats: phishing, malware, ransomware, data breaches, and compromised passwords
  • Three best practices for improving security posture by building cybersecurity expertise, increasing user security awareness, and creating and enforcing security policies.

Today's threats and vulnerabilities require a highly systematic and strategic approach to security. This means a greater focus on identifying and prioritizing the protection and defense of their most valuable assets.

Data Center Migration

October 23, 2023

OSP IT Services and Solutions Migration

ITCenter successfully transformed the Data Center migration, reducing costs, mitigating business risks, and improving operational efficiency. This extensive migration project involved a dedicated team, collaborative partnerships, and the successful transfer of hundreds of servers and significant amounts of data, ensuring operational excellence in the ever-evolving IT landscape.

Challenge

Transferring Data Center services and solutions in two critical phases.

Timing: 

January 2023 – September 2023

February to April: Setup Phase

  • Opening a new room and installing all necessary technologies: network, storage, backups, virtualization PoDs, server installation, and ensuring conditions for necessary accommodations.
  • Installation at the Tagus DC of components necessary for the migration process.
  • Infrastructure testing leading to the ready-for-service status of various technologies.
  • Green light for the second project phase (migration) with migration tests concluded by the end of April 2023.

May to September: Migration Phase

  • Migration of physical and virtual servers.
  • Migration of networks/security and transformation of configurations: service, backups, management, point-to-point connections, and VIPs/balancing.
  • Migration of reverse proxy publications (evolution from TMG to A10 technology).
  • Migration of all backup policies.
  • Migration of all associated storage (33 storage racks).

August to September: Decommissioning Phase

  • Decommissioning and/or upgrading obsolete technologies: AIX operating systems; TMC technology (reverse proxy); domain controllers and their respective VMWARE PoDs.
  • Removal of 55 tons associated with racks, servers, backup robots, storage, network, among other components.

Main Goals:

  • Transformation of Infrastructure (Server, Storage, Data Center Network, Load Balancers + Firewalls)
  • Reduction of Total Cost of Ownership (TCO)
  • Mitigation of Business Risks (Business Continuity)
  • Enhancement of Operational Efficiency and Go-To-Market (GTM) Capabilities

Project Highlights

Sustainable Impact:

  • Reduction of space equivalent to 20 padel courts.
  • Decrease in annual energy consumption equivalent to powering 335 homes.
  • Removal of 55 tons of weight.

Technological Renewal:

  • Transfer of over 500 servers and migration of 900TB of information.
  • Reduction of 460 physical servers in the Data Center.

Teamwork:

  • Execution in a record time of 4 months.
  • Dedication and teamwork are crucial for successful project completion.


Explore more about our successful Data Center migration

Débloquez l'avenir de la gestion des données.

February 5, 2024
Experience a revolution in data storage with ITCenter and Dell PowerStore.

Pourquoi choisir ITCenter et Dell PowerStore ?

Des solutions de données sans faille conçues pour votre entreprise. ITCenter, en collaboration avec Dell PowerStore, offre une expertise et une technologie inégalées pour répondre à vos besoins en gestion des données.

Transformation numérique sans effort :

Efficacité, évolutivité et expertise. Bénéficiez d'une approche centrée sur les données, offrant des solutions de stockage évolutives et efficaces, complétées par l'expertise en migration et en sécurité d'ITCenter.

Automatisation simplifiée pour le succès :

Automatisation intelligente à votre service. Dell PowerStore simplifie les opérations, et ITCenter optimise les processus, garantissant un parcours numérique fluide et réussi pour votre entreprise.

Innovation pour demain :

Dell PowerStore. S'adapter rapidement aux changements du marché. Partenaire avec ITCenter pour exploiter la vitesse, la flexibilité et l'innovation de Dell PowerStore, permettant à votre entreprise de rester en tête dans un paysage numérique dynamique.

Autonomisation holistique des entreprises :

Installation, configuration, intégration, migration, opérations informatiques. Les experts d'ITCenter vous guident à travers chaque phase, de l'installation aux opérations continues, garantissant que votre entreprise est autonomisée tout au long de la transformation numérique.

Prêt à façonner votre avenir ? Embarquez dans ce voyage.


Financial Fraud Rising: Key Strategies to Combat Sophisticated ATO Attacks

December 6, 2022

The present white paper is research requested by F5 and produced by Aite Group to approach Strategies to Combat Sophisticated ATO Attacks.

In a short period of time, the global pandemic has dramatically shifted the way commerce is transacted. The online and mobile channels for banks and retailers alike are seeing sharp increases in transaction volume, as face-to-face commerce shifts to digital channels.

This white paper discusses the myriad challenges risk executives face as they seek to address the escalating threat environment while at the same time ensuring a seamless customer experience.

It then discusses the solutions available to help strike this balance. As criminals up the ante in the cybercrime arms race, it is important for firms to leverage equally sophisticated countermeasures, such as artificial intelligence and machine learning analytics.

To F5 and Aite Group, the Key takeaways from the white paper include the following:

  • Increases in the attacks surface for the organized crime rings that have long been targeting these channels with advanced automated tactics. 
  • Heightens the urgency of deploying technology that can detect sophisticated credential stuffing and API attacks while not unduly burdening the user experience.

Organized crime rings will continue to enjoy their advantage in the lopsided chess game, but more firms are investing in sophisticated technology that will checkmate their attackers. This highlights the importance of making sound decisions when choosing how to combat the rapidly escalating threat of credential stuffing and API abuse.

Four essential steps to adopting IT as a service

December 6, 2022

Organizations are on a transformation journey to keep pace.

Cloud scaling and pay-per-use flexibility has been a catalyst for that transformation.

While they may benefit from the flexibility of a public cloud resources, they generally also require an on-premises solution. According to Gartner, over 75% of midsize and large organizations will have adopted a multicloud or a hybrid cloud strategy by 2021.

This paper guides organization on how to deliver the cloud experience on-premises. A quick review of the three basic approaches to obtaining IT resources:

1. On-premises compute: a capital expense model.

2. Public cloud: a subscription or pay-per-use model.

3. Public cloud-like on-premises: a pay-per-use, elastic IT consumption model. Commonly referred to as IT as a service (ITaaS).

The benefits to the business of a cloud experience include faster project deployments, higher value products, increased operational efficiencies, and financial transparency that directly associates cost to consumption.

As organizations embrace a multi-cloud model, they expect all their IT environments to keep up.

Hardware Maintenance card image

Hardware Maintenance

March 16, 2023

IT Operations are an increasingly critical part of the business. As technology has become more complex, so have the systems that support it. Today, technology departments have to ensure that the entire technological ecosystem supports the business in multiple dimensions.

We can help your company focus on your core business while maintaining a high quality of service for your operations.

HOW IT WORKS: 

Single hardware failures can interrupt your service for an indefinite time, and being offline can be damaging to your business.
Every time equipment in your data center fails, you simply place a call, and our team will promptly solve the problem.
The service includes on-site visits, labor, and parts, so there’s no additional cost for any repair.

SERVICE LEVEL

The Service Level Agreement (SLA) is as flexible as you need it to be

You can define different levels to match the priorities attached to your equipment.

SPOC

Single Point of Contact

Multiple brands and models within a data center can lead to a stressful and time-consuming task whenever something fails. By acting as your Single Point of Contact, our team takes the lead as soon as you call.

MONITORING

Avoid predictable failures

Our Hardware Maintenance service can be empowered with a preventive maintenance layer with addition of monitoring capabilities.

By monitoring your data center equipment:

  • Detection of pre-failure signs asap
  • Act in advance to reduce the impact on your service

OFFICIAL SUPPORT OR THIRD-PARTY MAINTENANCE

We offer both support options to offer the solution that best suits your needs

Although our service is based on Third-Party Maintenance (TPM), we know the official support can at times be the better option.

That’s why we help you define which maintenance suits each equipment, so you can get a customized service that is still respectful of your interests.

   

THIRD-PARTY MAINTENANCE

Increase savings with TPM

  • Your maintenance contract savings can go up to 70% if you opt for TPM

Extend the life of your IT

  • Make the most out of your data center equipment               

"TPM contracts can offer customers 50% to 70% savings off net OEM support prices.” - Gartner, August 2019

ITCenter Academy Launches New Development Course

May 26, 2023

We are thrilled to announce the launch of our “Development” course at ITCenter Academy. As a result of ITCenter’s collaboration with CESAE Digital, this course aims to provide participants with essential skills in application development, database management, and software testing.

Our training program is designed to empower you with the expertise needed to thrive in the ever-evolving field of software development. By the end of the course, you will have the opportunity to shape your career as a software programmer, mobile application developer, software analyst (QA), or systems architect, contributing to complex and internationally renowned projects.

Course Details:

Mode: Hybrid

Timings:
Start: July 3rd, 2023

End: March 31st, 2024


Location:
ITCenter | Europarque | Santa Maria da Feira

To ensure a conducive learning environment and personalized attention, we are offering limited spots.

Only 20 open positions are available, so secure your place now!

Who Should Attend?

  • Individuals aged 18 and above;
  • High school graduates or technical-professional course completers;
  • Bachelor's degree holders in Computer Engineering, Mathematics, or related fields.

Prerequisites:

  • Availability to commit to the course;
  • Eagerness to learn and grow;
  • Strong communication skills;
  • Ability to work effectively in a team.

Gains:

  • Training grant;
  • Daily meal allowance;
  • Coverage of transportation expenses.


Study program:

  • Theoretical Component: 550 hours (7 hours per day, 5 days per week -35 hours)
  • Practical Component: 400 hours (8 hours per day, 5 days per week - 40 hours)



Don't miss this incredible opportunity to enhance your skills and embark on a rewarding career in software development


Emailing us at academiadesenvolvimento@itcenter.odoo.com

Applications until June 16th

academiadesenvolvimento@itcenter.odoo.com