AVM-Cloud-LogoAVM-Cloud-LogoAVM-Cloud-LogoAVM-Cloud-Logo
  • SOLUTIONS
    • MegaMenu
      • Menu Desc
        Featured Solution Compute Compute for RDS Container Services Disk Connectivity Network & Security Co-Location Data Protection Analytics Managed Service License Subscription Marketplace Digital Workspace

        Virtual Private Cloud

        Multi-tenancy based cloud with logical separated network and compute resources that allows isolated and customizable virtual network environments; able to leverage AVM Cloud’s solutions.

        Dedicated Host

        A multi-tenancy based cloud with dedicated resources, able to enjoy the benefits of public cloud without noises from neighbours.

        AVM Cloud Fusion

        A hybrid cloud data protection solution which backs up and replicates your data and systems on-permises to AVM Cloud.

        Cloud-in-A-Box

        An on-premise OPEX model. Great for workloads that need to be in close proximity with users and other infrastructure.

        Sovereign Cloud

        Moving towards data sovereignty with AVM Cloud

        How Do I Work From Home Securely?

        STD DR : vCPU/vRAM

        vCPU & vRAM resources can also be purchased for Disaster Recovery to protect against site failure.

        HI-MEMORY: vCPU/vRAM

        High memory ratio compute resources to cater for memory intensive workloads.

        STD : vCPU/vRAM

        Compute resources consists of CPU and RAM. These resources allows the execution of applications in a cloud environment.

        Database Licenses & Compute Resources

        Two distinct types of databases are offered: MS SQL and Postgre SQL, each providing a range of alternatives concerning the computational resources essential for the database.

        AVM Tanzu Containers (ATC)

        Mandatory Kubernetes Starter pack which consists of setup cost which includes a NSX edge, load balancer, a jump host and one public IP required to access the cluster.

        Storage Tier 0/1/2 Disk

        AVM Cloud offers 3 different tiers of storage.

        Object Storage (S3)

        Object Storage is a storage which manipulates and manages data storage as granular units known as objects.

        Storage Tier with L2 Link

        Layer 2 (L2) links are available for customers who subscribes for DR services. It is most often used to transfer data between the primary & secondary datacenter

        NFS Disk

        For applications which need to share the same data as different applications and have the shared storage de-coupled from the server, customers can subscribe to NFS services.

        Dedicated Port Gateway

        For co-location customers who want their devices in the datacentre to be connected to other devices or networks, customers need to subscribe to this service to enable the physical connectivity between devices.

        Cable Extension Services

        For co-location customers aiming to establish connections between their datacenter devices and external networks must opt for this service.

        DDOS Protection

        For customers who subscribed to a dedicated link from the telco and require clean pipe to the internet with DDOS protection, the service is available from the price list.

        Internet Bandwidth

        For customers whose applications operate within the AVM Cloud, and demand access to the public internet—whether to provide external services or retrieve data from external networks into the AVM Cloud environment.

        Public IP

        For customers whose applications necessitate access to the public internet and a public routable IPv4 address, they have the option to specify the quantity of IP addresses required.

        Kiwisyslog Server

        Customers who need to monitor their devices, such as servers, switches, firewalls, and routers, AVM Cloud’s Syslog Server offers a simple solution for collecting and viewing to ease syslog messages analysis.

        SSL VPN

        For administrators and users to connect to their VPC remotely and securely, each VPC will need to subscribe to SSL VPN services that provide a VPN gateway from anywhere in the world to connect to the resources within their VPC securely.

        NSX Load Balancing

        It is part of the services from the software defined network within the virtualization layer. This add-on service is for the edge gateway to provide additional services for local load balancing.

        AVM WAF Service

        Web application firewall service that filters, monitors, and block malicious HTTP traffic to and from a web service.

        AVM CA

        AVM Cloud acts as the private trusted entity that is used to distribute Certificates that can be used to authenticate servers during communication.

        Content Delivery Network

        AVM Cloud subscribes to a CDN (Content Delivery Network) services that spans its’ coverage around the world with the capabilities to provide content locally to its’ users.

        Fortigate Firewall (Virtual)

        Fortigate Firewall is a next-generation firewall to protect customer’s infrastructure within AVM Cloud. The virtual edition firewall is presented as a first line of defense from the outside world. For added protection, customers can opt to have multiple firewalls to create segments within their infrastructure to increase the protection.

        NSX Edge for VPC Gateway

        This gateway service provides NAT, routing and networking services that connect networks within the VPC to networks outside of their VPC.

        Global Load Balancing

        For customers that require load balancing of workload across multiple zones and even cloud service providers, customers can subscribe to this service.

        Deep Security & Agent-Based Anti-Malware

        AVM Cloud is an operator of PAAS which includes management of services up to the OS level, including managing the security of the OS from patching it to protect against vulnerability or malware.

        Full Rack or Partial Rack

        For customers who have their own physical equipment, for example Hardware Security Module, AVM Cloud provide co-location services.

        Smart Hand

        Tenants that have physical hardware in server co-location services who may need assistance in a break-fix scenario can subscribe to the Smart Hand service. Our data centre staff on-site can assist in receiving the RMA part, swap out the faulty part, and RMA the faulty part back to the vendor.

        L2 Link (Zone 1 and Zone 3)

        High bandwidth low latency network between Zone 1 and Zone 3 where customers that have workload on both zones can use this network for communication purposes.

        Snapshot Service

        Snapshot is a data protection feature that the external storage, at a point in time, will copy the data in the storage that can be recovered or restored in the event of any data corruption or deletion that affect the services.

        Replication Service

        For customers who wish to selectively nominate certain VMs to be replicated to the alternate data centre for data protection.

        Backup Capacity

        Customers can request for backup services for any VM that is provisioned in the cloud.

        AVM Insight Analytics

        For clients seeking a publicly accessible data collector, this service can be availed through the acquisition of the appropriate credentials.

        AVM Enforce Managed Firewall, WAF & LB

        Customers can subscribe to this service and offload their own IT personnel from the operation task of managing and monitoring firewall, load balancer and Web Application Firewall (WAF) in their AVM VPC subscription.

        AVM Enforce Technical Account Manager (TAM)

        This service encompasses direct engagement with AVM Cloud's TAM.

        AVM Enforce Data Transfer

        Efficient and reliable data transfer service to migrate a large amount of data through data transfer through a physical storage device. This eliminates the bottleneck caused by bandwidth availability.

        AVM Enforce Managed OS, Backup & DR

        With our Cloud Managed Backup Service, tenants in Malaysia can subscribe to it and offload their own IT personnel from the operation task of managing, monitoring OS, backup and DR of the VM in their AVM VPC subscription.

        AVM Enforce Managed Cyber Security

        Providing optimum cyber security service, customers also can request for Security Information and Event Management (SIEM) services for each of the security devices in their infrastructure.

        Server OS

        One of the benefits of moving workload into the cloud is to focus on your business and not on the complexity of IT.

        MS SQL Database

        Customers have the option of choosing enterprise edition, standard edition, web edition and express edition with different sizing in terms of the number of vCPU and vRAM available.

        2-Factor Authentication

        2-Factor Authentication (2FA) is for application developers to enhance authentication and authorization for their application.

        PAM & Session Monitoring

        The offered service incorporates a Session Monitoring feature, encompassing both Command Line Interface (CLI) and Graphic User Interface (GUI) modes.

        Remote Desktop

        AVM Cloud's Horizon DaaS RDSH (Remote Desktop Session Host) offers an entry-level solution enabling multiple users to simultaneously connect and utilize a single Windows Operating System, gaining access to applications in tandem.

        Virtual Desktop

        The AVM Virtual Desktop Services offers a solution that empowers organizations to adopt flexible work arrangements without relinquishing control over desktop management.

  • SECTORS
    • MegaMenu
      • Menu Desc
        Conglomerate Fast Food Chain Finance Services

        Conglomerate

        Into the world of diversification

        Fast Food Chain

        Bringing technology and the fast-food chain industry together

        Finance Services

        The future of financial services is now

  • RESOURCES
    • MegaMenu
      • Menu Desc
        Blog & News E-Books Videos
        20/06/2023
        20/06/2023
        Blog
        Categories
        • Blog

        Is Disaster Recovery the same as Business Continuity Planning?

        15/10/2022
        15/10/2022
        Blog
        Categories
        • Blog

        Can failing to protect customer data cause your business to fail?

        MORE LIKE THIS

        E-Books

        Browse through individual pages and catch a glimpse of the captivating content that awaits you

        Videos

        Explore AVM Cloud’s collection of engaging and informative videos

  • ABOUT
  • GET IN TOUCH
  • SOLUTIONS
  • SECTORS
    • CONGLOMERATE
    • FAST FOOD CHAIN
    • FINANCE SERVICES
  • RESOURCES
    • BLOG & NEWS
    • E-BOOKS
    • VIDEOS
  • ABOUT US
  • GET IN TOUCH
All Systems OperationalLogin
✕
Reduce Business Disruptions with Desktop-as-a-Service (DaaS)
23/10/2020
What Is A Disaster Recovery Plan?
13/11/2020

How Do I Work From Home Securely?

30/10/2020
Categories
  • Blog
Tags
  • 2020
Image by Gerd Altmann from Pixabay

The coronavirus pandemic—the infection officially designated as COVID-19—is causing upheaval across the globe. Aside from the serious economic and public health implications, one very practical impact of shelter-in-place dictums is to force many companies to support remote working where they can. The most recent data tells us that in 2017, eight million Americans worked from home at least some of the week — amounting to around 5% of US workers. However, the events of the past few weeks are driving what is being described in certain sectors as the biggest shift to home working since 9/11.

This will ensure that many companies can continue functioning while helping to achieve social distancing to minimize the spread of the virus. But there are challenges, particularly to smaller businesses that don’t have IT security teams to assist with the transition. Hackers are primed and ready to take advantage of home workers, whose machines and devices may not be as secure as those in the office. There’s also a risk that workers are more distracted by current events when working at home, creating more opportunities for cyber-criminals to strike.

This isn’t just about hackers stealing your personal log-ins and information to sell on the dark web. In a home-working context, corporate data and systems may also be at risk. It takes just one unsecured remote worker to let the bad guys in. The damage they end up doing may be particularly difficult for employers to weather given the extreme economic pressures already on many firms.

With that in mind, therefore, let’s take a look at some of the major threats to home workers and their organizations, and what can be done to keep the hackers at bay.

The main threats:

Phishing messages are by far the number one threat to home workers. Cyber-criminals are using widespread awareness of COVID-19, and a desire for more information on the outbreak, to trick users into clicking on malicious links or opening booby-trapped attachments. Many are spoofed to appear as if sent by trusted organizations such as the US Centers for Disease Control and Prevention (CDC) or the World Health Organization (WHO). They may claim to offer more information on the spread of the outbreak, tips on staying safe, and even provide details of how to get a non-existent vaccine online.

If you click through on a malicious link, the next stage of the attack could:


  • Take you to a convincing-looking log-in page (e.g., for Microsoft Outlook, Office 365, or any popular cloud apps) where your username and password could be harvested by hackers. With these, they have a foothold in the organization which could provide the foundation for a serious information-stealing attack.
  • Covertly initiate a malware download. This malware could exploit unpatched vulnerabilities on your computer to infect not just your machine but the entire corporate network it’s connected to, with ransomware, cryptojacking malware, banking trojans, information-stealing threats, and much more

Brute forcing is another way for hackers to hijack your cloud accounts. They use previously breached username/password combos and run them through automation software to try them across billions of websites and apps. Because users reuse passwords across numerous accounts, the bad guys often get lucky and are able to unlock additional accounts in this way. Home workers using Microsoft Teams, Slack, Zoom and other cloud platforms for collaboration and productivity may be targeted.

Malicious smartphone apps are another threat to home workers. These may be disguised to trick the user into believing they’re downloading a COVID-19 tracker, for example. In reality, it could infect the device with ransomware, info-stealers, or other malware. That device could then spread the same malware to the corporate network, if it is connected to it via the home network.

Smart device threats are also a concern for home workers. More and more of us are investing in smart home devices. From voice assistants to smart speakers, connected refrigerators to smart TVs, it’s estimated that there’ll be as many as 128 million smart homes in the US by the end of this year. However, often these consumer-grade devices don’t have strong built-in protection. They may use weak, factory-default passwords and/or contain multiple software vulnerabilities that are rarely patched by the manufacturer, if at all. The risk is that hackers could hijack one or more of these devices and use them as a stepping stone into the home and then corporate network – as we’ve demonstrated in previous research.

Friends and family could also introduce new cyber-threats, as they will also be confined largely to the home. That means they’ll be logging on to the home network with their own mobile devices, which may not be as well protected from threats as they should be. Once again, such threats could spread quickly from the home network to infect the enterprise network if it’s connected without adequate security controls. Another risk is of children using unsecured remote learning platforms, which may offer cybercriminals opportunities to hijack accounts, steal information and spread malware onto the network.


Image by Markus Spiske from Pixabay

What are the hackers after?

Home workers represent an attractive target in their own right. After all, personal information and log-ins (home banking, Netflix, webmail etc) can be easily sold for a profit on dark web marketplaces. However, organizations represent a much bigger, potentially more lucrative pay day for cyber-criminals. While corporate PCs and networks might be fairly well secured, the rush to support home working may have left gaps the bad guys are keen to exploit.

By first compromising the home worker, and then pivoting through unsecured channels to the corporate network, hackers could spread ransomware, steal sensitive company IPs, infect work networks with crypto-mining malware, or steal large volumes of customer data. They may also look to hijack employees’ corporate email or other accounts as the first part of a multi-stage information-stealing attack. There have even been new warnings of Business Email Compromise (BEC) attacks in which employees (usually those working in the finance department) are contacted by someone posing as a senior exec and ordered to wire business funds to a new bank account.

Working safely at home

With so many techniques at their disposal, it’s easy to imagine that the bad guys have the upper hand. But by putting a few best practices in place, there are things businesses and employees can do today to reduce home working security risks.

Consider the following:


  • User awareness exercises to improve the ability of home workers to spot phishing attacks.
  • Ensure all home workers are outfitted with anti-malware for any devices used for work. Trend Micro Maximum Security is an excellent place to start for PCs and Macs, while Trend Micro Mobile Security can help secure Android and Mobile devices.
  • Require strong, unique passwords for all accounts, stored in a password manager, such as Trend Micro Password Manager.
  • Enhance the above by switching on two-factor authentication for all enterprise accounts that have it (including any cloud platforms).
  • Always use a VPN for communication between home and corporate networks.
  • Ensure staff have a clear route to report any security incidents.
  • Switch on automatic updates for all home computer systems (operating systems and software).
  • Ensure smart home devices are on latest software version and have strong passwords or 2FA.
  • Use a network security solution like Trend Micro Home Network Security to secure your home network. It not only provides a secure baseline for working at home, with its web and content threat protections; you can block your kids’ use of the internet and YouTube while you’re having conference calls or doing other bandwidth-intensive work on the remotely-accessed corporate network.
  • Tightly enforce endpoint security policies: if possible, only allow work devices to connect to the corporate network, and/or employee devices that have been previously scanned for threats.

Credits to the original author: Trend Micro Blog


AVM Cloud will be presenting in Trend Micro’s AMEA Forum – CLOUDSEC 2020. This virtual forum will be held on the 24th – 26th November 2020 featuring various experts spanning across 11 countries. Register yourself today https://www.cloudsec.com/index.html.

About CLOUDSEC

Founded in 2011, CLOUDSEC has established itself as a global community for cybersecurity experts and professionals. The event aims to inspire technology professionals and users to embark on a continuous learning journey to explore and learn about industry trends, best practices and new technologies to secure the digital infrastructure and manage the technological risks of their organizations in safely supporting their corporate goals.

And this year, CLOUDSEC goes Virtual, presenting an immersive, broadcast-quality special event with the same incredible benefits as our in-person gathering, plus a few surprises! This year, it extends beyond 11 countries to reach a much wider audience. These events are vendor-neutral and feature presentations by industry experts who address a plethora of real-world challenges and current strategies. It is important for us to come together to share lessons learn and hear firsthand from industry leaders, government agencies, commercial organizations, professional associations, technology vendors, and cybersecurity professionals from around the world.

Share

Related Posts

20/06/2023
20/06/2023
Blog
Categories
  • Blog

Is Disaster Recovery the same as Business Continuity Planning?

Do you like it?
Read more
15/10/2022
15/10/2022
Blog
Categories
  • Blog

Can failing to protect customer data cause your business to fail?

Do you like it?
Read more
09/11/2021
09/11/2021
Blog
Categories
  • Blog

Immutable Backup Storage

Do you like it?
Read more
Share

More news

20/06/2023

Is Disaster Recovery the same as Business Continuity Planning?


Read more
15/10/2022

Can failing to protect customer data cause your business to fail?


Read more
09/11/2021

Immutable Backup Storage


Read more

The leading cloud computing services provider in Malaysia

Step into an intelligent future. Get started today.

enquiry@avmcloud.net

©2023 AVM Cloud. All rights reserved.

  • Privacy Policy
SOLUTIONS
  • Compute
  • Compute for RDS
  • AVM Tanzu Kubernetes (ATC)
  • Disk
  • Connectivity
  • Network & Security
  • Co-Location
  • Data Protection
  • AVM Insight Analytics
  • AVM Enforce Managed Service
  • License Subscription
  • Marketplace
  • Digital Workspace
FEATURED SOLUTIONS
  • Virtual Private Cloud
  • Dedicated Host
  • AVM Cloud Fusion
  • Cloud-in-a-Box
  • Sovereign Cloud
SECTORS
  • Conglomerate
  • Fast Food Chain
  • Finance Services

RESOURCES
  • Blog & News
  • E-Books
  • Videos
COMPANY
  • About
  • Get In Touch
  • Login
AVM Cloud. All rights reserved. Terms of use Privacy Policy