In reality, it's not someone sitting somewhere,
wearing a black hoodie
trying to hack your company.
It’s mostly major botnets that do the work
of trying to break in.
Microsoft’s Artificial Intelligence (AI), machine learning
makes it possible to stop things that we people
don’t stand a chance of stopping.
What one person would normally need 1 or 2 days to do
we can manage in half an hour with Microsoft.
These are the solutions that Innofactor is using.
Otherwise, we don’t stand a chance.
It varies tremendously.
Is it an attack intended to do damage,
or is it to get hold of information?
Is it an attack to get access to something you have
which is specific to your business?
The first phase of a typical attack is the recognition phase.
You find out everything you can about the company or the individuals,
you don’t always do anything in particular in that phase,
but then you have the delivery phase.
Probably everyone has heard of phishing.
That’s when you cast your line into a business and
see if you get any bites.
What generally happens is that people either reply to an e-mail,
or they click on content that activates,
which is not good.
In the next phase a malware is installed
on the PC, server or network.
For many hackers, the point is to get hold of rights.
To use the exploit, if possible, to get higher up,
in the system and obtain domain ownership.
If they use a crypto virus or ransomware virus, as it’s called,
then they will say: "I’ve locked your information now,
you can get it back, but you’ll have to pay for it."
And often, it’s not one person sitting there sending out e-mails but
very often this is an automated process.
We’ve chosen Microsoft because we think it’s the best option for our customers.
ATP is short for Advanced Threat Protection.
Microsoft ATP has three products.
They are Office 365 ATP, Azure ATP and Microsoft Defender ATP.
Microsoft Defender linked via the cloud to Microsoft
is hugely powerful.
What’s cool about Microsoft, is that they see you
as a unique user, so they are continually learning,
via their AI model, how you handle data.
If you get to work at eight o’clock every day,
fetch your coffee, sit down, log on,
start working, and then go home at four o’clock.
You do that day in, day out.
Then, suddenly one day you log on from Brazil.
At four o’clock in the morning.
Microsoft can then say: hey, this is a little unusual.
You will then be asked to confirm your identity.
So, the AI model has learned more
about your work schedule and made you safer.
Incredibly good products, no two ways about it.
If you are just a little safer than your neighbor or competitor
it may turn out that you won’t be hacked.
They’re more likely to go after softer targets.
It’s unbelievable how many businesses
in the world don’t have any security.
You could say that every single layer of security
can be seen as a barrier in an obstacle course.
To get to the finish line, you have to get over the first hurdle,
if you stumble, you may just give up.
But if you clear one, you have to jump over another.
If you fall on that one, you may give up, and so on.
To go all the way, you have to clear all the hurdles,
the more hurdles there are, the more trouble it is.
Security costs, but not being secure, costs even more.
It’s not that you need to do everything at once.
It’s not that if you first want to have just a part of it, you have to have it all.
You use what you need.
Don’t go into the cloud without being sure that
you have basic security.
Once we have set up the systems we want
the last phase that we always want to go through,
is to run workshops.
To share information with the customer: what we’ve done, what we do,
how do you want to handle this in the future?
We also hold courses for Microsoft
on their products, at Microsoft.
After all, Innofactor Norway won Security Partner of the Year this year.
As I usually say, IT is a product that has to be kept fresh.
Security is also a product that has to be kept fresh.
You have to always keep learning and always try to keep a step ahead.
That’s what Innofactor tries to be.
To lead the market in the cloud and security.