<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sonema</title>
	<atom:link href="https://www.sonema.com/en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.sonema.com</link>
	<description>Your Future, Our Commitment</description>
	<lastBuildDate>Thu, 18 Dec 2025 16:11:20 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>On the importance of network quality of service</title>
		<link>https://www.sonema.com/en/2022/11/on-the-importance-of-network-quality-of-service/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Wed, 02 Nov 2022 17:11:21 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6608</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Today&#8217;s digital world is pushing companies to develop ever more complex and reliable networks that support ever more important uses. For companies, connectivity &#8211; whether between employees, between autonomous systems or with customers and prospects &#8211; remains a vital component of the smooth running of its infrastructure. And indeed, a guarantor of its activity.</p>
<p>The evolution of data traffic models towards cloud services, the explosion of mobile devices, the development of connected objects: these are all factors that are imposing structural changes on companies&#8217; communication networks. </p>
<p>Finally, there are many factors that can lead to breakdowns, and therefore to partial or total interruption of activity: cutting of submarine cables, natural disasters, geomagnetic disturbances, theft of copper sections, wars and other geopolitical events, radio jamming, etc. However, certain industries, notably banking, have needs, and even requirements, for uninterrupted connectivity, whatever the situation.</p>
<p>What are the solutions to mitigate these risks? How to maintain an optimal quality of service in all situations?</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>An essential and complex network</h2>
</p>
<p>In the connected enterprise, the network is the keystone. It is a critical infrastructure, just like all the other operational units that make up the entire enterprise.<br />
Whatever the sector, the network is essential to the business, linking head offices, production sites and subsidiaries, employees and customers; carrying critical data, hosting business applications. </p>
<p>Over the years, IT networks have seen their complexity grow constantly. They have to adapt and take into account new uses, such as teleworking, new transmission media, such as LTE and 5G, new devices, such as mobile devices and the development of BYOD (Bring Your Own Device). These networks also face increasing threats of malicious attacks.</p>
<p>The needs are therefore growing, and so is the complexity of the networks supporting all these usecases and devices. The use of multiple vendors, each with their own hardware and software layers, and the use of various transmission media do not always allow for an overview of the entire network. Configuration and monitoring become complicated and spread over many &#8220;black boxes&#8221;.</p>
<p>A basic approach to connectivity is no longer sufficient. The need for infrastructure flexibility, resilience and scalability is greater than ever to better manage, control and evolve enterprise networks.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What is at stake?</h2>
<p>&nbsp;</p>
<p>The stakes are high here, since the company lives through its ability to communicate not only with the outside world, but also between its different branches. A functioning network is the assurance of a functioning company.</p>
<p>It is no longer unusual for companies to have multiple network access points. For example, it is conceivable that a bank with many branches might prefer to use satellite connectivity (VSAT), which is well known for its reliability and uptime. But VSAT bandwidth is expensive; depending on the needs, terrestrial MPLS, especially fibre optics, could be preferred. This type of link offers higher bandwidth at a lower cost, but at the cost of sometimes less reliable connectivity, or even, in the case of fibre, no coverage.</p>
<p>Connectivity via LTE/5G can also be added to this. But these means are constrained by local congestion at the transmitting tower, and it is difficult to guarantee a level of bandwidth via this medium.</p>
<p>Modern network uses, which involve the global management of complex flows, are incompatible with the low bandwidth of VSAT, or with degraded terrestrial links, or with a sudden drop in bandwidth on a locally overloaded 5G link.</p>
<p>The issue, then, is quality of service. Some applications are more or less sensitive to network outages, latency or bandwidth; for the company to continue to do its business, these applications must be functional. Dedicating a specific link to an application, according to its use, would be ideal, but during a service interruption, its operation would be completely stopped, which is not optimal, or even unacceptable, depending on the business.</p>
<p>It should also be noted that many companies now use SaaS cloud solutions such as Microsoft 365 or business applications. These applications are then hosted in one or more datacenters, at a distance from the company itself. This further reinforces the need for stable and reliable connectivity.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><blockquote><p>A functioning network is the assurance of a functioning company.</p></blockquote></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What solutions?</h2>
</p>
<p>It is then a question of implementing solutions to optimise the company&#8217;s network, take into account changing needs, take advantage of new technologies available to safeguard business activity and improve the user experience.</p>
<p>By employing hybrid network technologies, the undesirable effects of a service interruption or change in network conditions can be mitigated. By routing traffic over one or more links depending on the application, continuous operation is ensured, while protecting against service interruption caused by a particular link.</p>
<p>By coupling this network hybridisation with SD-WAN solutions, it is possible to control an entire IT network, and direct data flows over the right channel, taking into account its type, usefulness and criticality. </p>
<p>By consolidating all network links to the outside world into a global infrastructure, it is possible to optimise routing, offer specific SLAs depending on the application, control the entire network and minimise service interruptions. By centralising its management, it also becomes easy to control its security: via new generation firewalls (NGFW), protection against threats, regardless of their origin, is ensured on all links at once.</p>
<p>It also provides complete visibility of all flows on the network, their characteristics, volumes, and performance. This makes it easier to spot potential problems before a failure occurs. Selective routing can also be offered according to the applications accessed, an important feature when cloud usage is becoming more and more important. </p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What results?</h2>
</p>
<p>By migrating the network to hybrid solutions based on SD-WAN services, it is possible to multiply the advantages of each transmission medium and divide their disadvantages.</p>
<p>By directing the flows to the optimal medium for its use, one ensures increased user comfort and, above all, almost permanent connectivity, since it is possible to redirect the flows via other channels if these are degraded.</p>
<p>A high uptime, via a hybridisation of its means of communication, guarantees the company continuous operation. Finally, permanent monitoring makes it possible to guarantee the resilience of the network, serving the performance of applications and the user experience.</p>
<p>A one-stop-shop approach, combining an interconnected network, relevant IT expertise and fine-tuned management of all infrastructure components, can therefore meet the needs of companies and guarantee an optimal quality of service.</p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="1920" height="1280" src="https://www.sonema.com/wp-content/uploads/2019/10/Skyview.jpg" alt="" title="Skyview" srcset="https://www.sonema.com/wp-content/uploads/2019/10/Skyview.jpg 1920w, https://www.sonema.com/wp-content/uploads/2019/10/Skyview-1280x853.jpg 1280w, https://www.sonema.com/wp-content/uploads/2019/10/Skyview-980x653.jpg 980w, https://www.sonema.com/wp-content/uploads/2019/10/Skyview-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1920px, 100vw" class="wp-image-4398" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>For over 30 years, Sonema has been offering its customers VSAT, hybrid network and SD-WAN connectivity solutions, while supporting our customers in their hosting and security projects.</p>
<p>For more information, <a href="/en/contact/">please contact us</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloud security: a priority against a growing number of attacks</title>
		<link>https://www.sonema.com/en/2022/06/cloud-security-a-priority-against-a-growing-number-of-attacks/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Mon, 20 Jun 2022 12:57:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6477</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The cloud has become the preferred hosting model for virtually every industry in the last decade. The cloud, as a paradigm, is seeing the fastest adoption since the early days of computing.</p>
<p>A new model means a new threat model: whether you are running a private cloud or using outsourced hosting, security is more than ever a key issue in today&#8217;s IT systems.</p>
<p>New developments in the financial sector, with the rapid growing of Fintechs and applications around the new European framework called PSD2, as well as other initiatives around the world such as Open Banking, are pushing the entire banking sector towards cloud solutions, or a mix of traditional hosting and cloud (called hybrid cloud). But what are the security implications of such a model?</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Why the cloud for the banking industry?</h2>
</p>
<p>In recent years, the banking sector has seen the arrival of many new players on the market. As society moves towards an increasingly digital world, new banks, or neo-banks, have arrived on the market in order to meet the demands of these users who are keen on new technologies; a complete digital management of accounts is at the heart of all neo-banks’ service offer.</p>
<p>Following the success of these neo-banks, many large traditional players have started developing 100% digital offers, without local branches or offices, offering contactless payments, mobile payments, online account management, and advisors who can be reached via chat, at virtually any time of day. Through dedicated brands (such as B For Bank for BNP Paribas, Boursorama Banque for Société Générale, and many others in France and other countries), banks can experiment with the services of the future, aimed at today&#8217;s customer.</p>
<p>All these new offers require, however, a radical change in the banks’ IT infrastructure: previously, only a few parts of the banking information system were exposed. These include SWIFT access, access to online banking, or payments via SMS.<br />
Today, there is a swath of applications requiring complete access to customers’ data, directly through machine-to-machine application interfaces (APIs).</p>
<p>All these new applications have a development cost, but above all a hosting cost: this is where hybrid cloud solutions can come into play.<br />
By enabling the rapid development and deployment of new applications, and with unparalleled agility and availability, the cloud is enabling the rapid expansion of digital services offered by banks to meet the tough competition from neo-banks and fintechs.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What model of threats?</h2>
</p>
<p>A new paradigm means new threats: with an ever-increasing attack surface exposed, an increase in attacks on information systems, and a hosting model that has different security requirements, the impact of poor security could be catastrophic, especially for an industry such as banking, which is subject to strict regulations from institutions.</p>
<p>DDoS attacks, ID theft, data theft, unauthorised access: traditionally hosted, on-premises information systems are already the target of many attacks; the same attacks can target the cloud, but the lack of visibility could further increase the impact of such attacks.</p>
<p>Operational security is, in general, guaranteed by cloud providers; thanks to replication of facilities, multiple redundancies and backups, as well as numerous certifications, it can typically be assumed that the providers&#8217; infrastructures are rather well monitored. To date, there are virtually no examples of data theft directly attributed to the providers of these services.</p>
<p>While providers are assumed secure, the cloud puts the onus of data security on its customers: access configuration, real-time access auditing, performance monitoring, web filtering, credential theft prevention&#8230; Data theft in the cloud is most often caused by configuration errors, or lack of monitoring. It is therefore essential that a 360° security solution is also implemented within the cloud.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What cloud security solutions exist?</h2>
</p>
<p>There are new solutions that also take into account cloud hosting, that are offered by some security vendors. The most modern concept, which meets ever-increasing customer expectations, is SASE, for Secure Access Secure Edge.</P></p>
<p>One of the primary goals of SASE is to bring together all the innovations in remote application access, CASB, SD-WAN, ZTNA (Zero Trust Network Access), FWaaS (FireWall as a Service), application gateways, threat prevention, Internet of Things and data leakage prevention, and converge them into a single coherent solution, allowing administrators to know <strong>who</strong> is connecting to <strong>what</strong>, and <strong>when</strong>, in a completely holistic fashion, so allow or deny access to resources based on policies, all administered directly from the cloud.</p>
<p>Beyond the threats to the hosting of new applications, the challenges of the hybrid workplace, full remote workstations and access to more and more cloud applications, or even SaaS, are covered by such a solution.</p>
<p>p>Using a SASE solution promises an overview of the entire data stream, from any device, to any destination, created by any user.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What are the benefits of SASE?</h2>
</p>
<p>The convergence provided by SASE solutions offers many advantages to companies in the management of its networks and users. By centralising access management, SASE makes network security policies consistent in a way never before possible.</p>
<p>The benefits of such consistency are numerous, and mainly due to a perfect visibility of all network flows – their origin, their destination and the authentication of each of them – the IT teams have a complete and detailed view of everything that happens on the network.<br />
These solutions allow for increased efficiency of IT services, reduced security risks, and simplified access management.</p>
<p>For users, centralising access management and authentication at all points on the network provides increased security, while simplifying their daily lives; by using a central authentication authority, user identity checks are made easier. By simplifying and strengthening security, without making it burdensome, productivity and user satisfaction are increased.</p>
<p>For the company in general, a unified security policy through SASE solutions allows a reduction in operational costs, a better scaling of IT policies, and an increased and consistent security. These advantages also bring external benefits, such as a reduction in the risk of data leakage, and therefore a preservation of the brand image.</p>
<p>Such a convergence therefore allows for a consistent, simplified and more agile security policy. In a world where the cloud will represent an increasingly important part of the hosting of services, it is essential to have a solution that allows access control to data.</p>
<p>Among the suppliers of such a solution, Gartner lists Fortinet and NetSkope as references in the SASE market.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Conclusion</h2>
</p>
<p>Cloud solutions are here to stay, and all industries will, at their own pace, move towards one type of cloud solution or another that best suits their needs. These new solutions are responding to new challenges of rapid growth, and cannot be ignored. However, especially in the financial industry, security requirements dictate that all incoming and outgoing data flows must be carefully managed, especially with the expanded attack surface that these new solutions imply.</p>
<p>The SASE security concept is emerging in the market as the convergence of all cloud and security innovations in the market to provide a unified solution to attacks and misconfigurations. It provides a view of the entire network to secure all exchanges, both between the Internet and internal systems, and within the local network.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>For over 30 years, Sonema has been offering its customers unified telecommunications solutions, as well as hosting solutions, network and system security solutions, cloud solutions, and support from its network experts.</p>
<p>For more information, <a href="/en/contact/">please contact us</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The OMOA Group chooses Sonema to implement their telecoms and back-up infrastructure</title>
		<link>https://www.sonema.com/en/2022/05/the-omoa-group-chooses-sonema-to-implement-their-telecoms-and-back-up-infrastructure/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Thu, 12 May 2022 18:05:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6446</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><em>Monaco-Lomé, 11th May 2022</em> — <strong>As part of their efforts to enhance operational security, the OMOA Group has chosen Sonema to deploy a dedicated infrastructure interconnecting their electronic payment systems.</strong></p>
<p>Sonema has installed a secure VSAT network interconnecting the Operator Payment System datacentre in Lomé, (a subsidiary of the OMOA Group) to OMOA’s customers including banks and financial institutions across 11 African countries. This connectivity solution, which is critical for providing real-time secure access banking services relies on Sonema’s teleport facilities in France.</p>
<p>Sonema has complemented this solution whilst supporting the implementation of a Business Continuity Plan for Operator Payment System Togo, by hosting the OMOA Group’s virtual backup servers in its PCI-DSS-compliant datacentre in France. These servers will be managed directly by the OMOA subsidiary teams in Lomé, a new digital hub in sub-Saharan Africa.</p>
<p>The OMOA Group’s vision is to provide the people of Africa with secure and innovative methods of payment to contribute to the economic development of both individuals and countries. Thanks to their strong regional presence, OMOA promotes inclusive economic growth by acting as a strategic partner to their clients, enabling businesses and customers to conduct electronic payments securely on all platforms across Africa.</p>
<p>With this new installation, OMOA’s electronic payment processing and card personalisation centre now has a highly resilient network for business applications and can provide a reliable electronic payment platform to their customers while providing support for the digitalisation of their banking services, making them securely accessible across all channels on a 24/7 basis.</p>
<p>Philippe LERMUSIAUX, the Director of Operator Payment System: “<em>This new telecom infrastructure will enable us to provide widespread access to a range of electronic and digital services for customers of banks and financial institutions in Africa. This is a significant step forward that will increase the number of people living in these territories who have access to banking services, which is an essential condition for promoting the financial inclusion of these populations.</em>”</p>
<p>Yves DU SAULT, Sonema’s Deputy Sales Director: “<em>We are honoured that the OMOA group has chosen to entrust Sonema with this new project. This decision reinforces Sonema’s position as a key partner for operators in the African electronic payment ecosystem. All of Sonema’s teams are dedicated to providing support for the expansion of the OMOA group.</em>”</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>About Sonema</h2>
<p>In a digital environment which is continuously evolving, data control and exploitation are and will remain an integral part of competitiveness and distinctiveness of companies. It has become essential to set up a strategy to secure flows and protect data.</p>
<p>By operating and managing scalable, bespoke telecommunications solutions, Sonema supports its customers in their projects every day. With commitment in mind, and with a strong understanding of what is at stake, we want to be a proactive partner for our customers by allowing them to concentrate on the heart of their profession and on their business innovation.</p>
<p>Faithful to our values of respect, transparence and responsibility, we place trust at the heart of the relation with our customers.</p>
<p>Sonema, also means:</p>
<ul>
<li>66 colleagues who are committed to our customers, every day</li>
<li>767 customer installations in 45 countries</li>
<li>37 certified partners all over the African continent</li>
</ul></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>About the OMOA Group</h2>
<p>The OMOA Group is the leading player in Africa for innovative and secure payment solutions. Close to its customers with a true global digital payment platform, OMOA Group is the strategic partner of banks, microfinance institutions, telecom operators, institutions and administrations. By offering our clients advice, we provide them with an upstream marketing strategy and ensure successful partnerships through our turnkey and tailor-made offers across the entire payment value chain.</p>
<p>As a Full Digital Payment Provider, we provide secure payment services, electronic payment processing, secure management of ATM, POS, mobile and mPos networks. We also provide embedded payment applications, customised innovative digital solutions, marketing for both hardware plus card production and personalisation services. Our digital solutions offer our customers a unique customer experience thanks to our privileged relationship and our local presence.</p>
<p>Excellence, Service, Passion, Respect, Integrity and Talent are the values that drive the daily operations of all our employees in order to best serve the interests of each of our clients. This is the E.S.P.R.I.T OMOA!</p>
<p>More information: <a href="https://www.omoa-group.com/">www.omoa-group.com</a></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://www.sonema.com/press-release-omoa-ops-sonema/">Download the press release (PDF)</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DRP/BCP: an essential tool in the protection of African banks</title>
		<link>https://www.sonema.com/en/2022/05/drp-bcp-an-essential-tool-in-the-protection-of-african-banks/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Tue, 03 May 2022 16:35:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6418</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Digitalisation is transforming the financial sector, bringing a new threat model. Having a resilient business continuity strategy in place has never been a higher priority. As financial institutions become increasingly digitalised, new operational resilience challenges emerge.</p>
<p>The preservation of a company&#8217;s information systems is essential to its smooth operation, and its continuity is a major stake, especially in the event of problems or natural disasters. Business interruption caused by IT failure can be fatal to companies, no matter their size.</p>
<p>One of the main defences against these hazards consists in implementing disaster recovery and/or business continuity plans (DRP-BCP). But what do they consist of? How to implement them? And what are the challenges of these plans?</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What is at stake?</h2>
</p>
<p>Beyond the mandatory compliance, imposed by regulators, implementing business continuity and recovery plans for banking institutions attempts to answer 5 major questions:</p>
<ul>
<li>How to return to a normal level of activity in a short time, without major data loss;</li>
<li>How to communicate with various stakeholders in the event of a crisis;</li>
<li>How to limit the consequences in terms of financial costs and damage to the brand image;</li>
<li>How to ensure operational resilience;</li>
<li>How to monitor the emergence of new threats.</li>
</ul>
<p>It should be noted that most African monetary zones makes having a DRP-BCP mandatory, to varying degrees of thoroughness. The ECCAS includes this obligation in the COBAC R – 2008/01 regulations. Contingency and business continuity plans are the subject of Chapter 3 of WAEMU Circular 04-2017/CB/C on risk management in credit institutions and financial companies in the union.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Definitions</h2>
<p>&nbsp;</p>
<h3>Disaster Recovery Plan (DRP)</h3>
<p>A Disaster Recovery Plan (DRP) is an internal procedure for the recovery of a company&#8217;s activity in the event of the failure of its information system, among other things. DRP can plan for partial or full business activity recovery.</p>
<p>The objective of this plan is to anticipate and mitigate the effects of a disaster, such as a flood, a fire, or other natural disasters, but also of attacks on your company&#8217;s IT infrastructure. The plan has to be assessed beforehand, listing all the sensitive business data and applications to be duplicated and backed up, but also has to account for the training of people within your company who will be responsible for putting this DRP into action in the event of a crisis.</p>
<p>Being preventive, it should of course be defined and put in place before a disaster. Depending on the size of your infrastructure, developing an effective DRP can take up to a year to properly map the critical parts of your systems.</p>
<p>A DRP does not generally aim to back up and protect everything: that is generally untenable in terms of resources. Their main objective is to identify what is critical to the operation of the business, even at reduced capacity, in order to restore activity as quickly as possible in the event of problems.</p>
<p>&nbsp;</p>
<h3>Business Continuity Plan (BCP)</h3>
<p>A BCP (Business Continuity Plan) has a broader scope: the aim here is to maintain the activity of a company in the event of a major failure, <strong>while it is happening</strong>.</p>
<p>The COVID-19 global pandemic crisis is an example of the major disruptions that BCP are designed to prepare for. Several scenarios need to be planned for in a BCP, generally divided into 4 distinct natures:</p>
<ul>
<li>IT systems failure;</li>
<li>impracticality of the premises;</li>
<li>extreme worsening of conditions or interruption of market operations;</li>
<li>the massive unavailability of skills.</li>
</ul>
<p>This article deals here in particular with the IT infrastructure, which is nowadays critical to the functioning of companies. In this context, a business continuity plan makes it possible to maintain high availability and to continue working, even in the event of an incident..</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What is the difference between DRP and BCP?</h2>
<p>&nbsp;<br />
To better explain the difference between the two type of plans, let’s take a different example, on another scale: your computer&#8217;s power supply. A BCP, here, could be a UPS connected to your computer. In the event of power loss, a battery system takes over automatically and transparently. There is no loss of power, and your computer continues to function in the same way as it would when connected to the mains. A signal is emitted, telling you that you are on the backup system; but you can continue working without losing your work, as long as the backup power remains, until the power grid returns to function.</p>
<p>A DRP would be more like an external hard drive, where you regularly back up your work. In the event of a power failure, you would simply recover your backup, for example on a battery-powered laptop, and resume your activity, albeit from a slightly older point in time: the time of your last backup.</p>
<p>On the scale of a complete information system, the same situation applies: a DRP is an effective backup of your data and applications to be recovered in the event of a crisis; a BCP is a duplicated system in real time, which can take over in the event of problems.</p>
<p>The difference between the two is, ultimately, in the acceptable amount time for the company to recover from a production or activity shutdown: a BCP guarantees business continuity, a DRP a rapid recovery.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What are the objectives of DRP-BCP?</h2>
<p>&nbsp;</p>
<p>DRPs-BCPs cannot be effective unless they include all the critical elements that make up your information system. If the scope is too narrow, there is a risk that your activity will be degraded too much, or even be impossible to resume, in the event of problems. Too broad, and the recovery plan becomes a runaway cost.</p>
<p>One of the primary goals in establishing a good DRP-BCP is therefore to define the exact scope of what is needed to keep the business running. This may be a list of physical servers, databases, software, an e-mail system, etc. Each company is unique in its operations and will therefore have different requirements.</p>
<p>This is why it is important to call on trusted experts when mapping what is to be protected: it is easy to see that backing up the company&#8217;s internal chat logs is perhaps less important than backing up or maintaining the billing and accounting system. Again, it is through careful assessment that a list of the information system&#8217;s critical points can be established.</p>
<p>Two important values must then be defined: the RTO (Recovery Time Objective) and the RPO (Recovery Point Objective). The first is the maximum downtime of your critical systems; the second is the maximum time it is acceptable to lose data.</p>
<p><img loading="lazy" decoding="async" src="https://www.sonema.com/wp-content/uploads/2022/05/diagramme-rpo-rto-en.png" alt="" class="wp-image-6406 aligncenter size-full" width="812" height="406" /></p>
<p>This is where DRPs and BCPs differ greatly: the DRP will always have an RTO greater than zero and an RPO greater than or equal to zero. A BCP, on the other hand, will always have both RTO and RPO equal to zero.</p>
<p>In the case of the banking industry, a DRP might typically have an RTO of one or two hours, depending on the services covered; the RPO must be zero, as it is essential not to lose any transactions to avoid loss of funds. In France, the Comité de la Réglementation Bancaire et Financère (CRBF) imposes that businesses in the financial sector must have a contingency plan for business continuity. In the United States, and more generally worldwide, PCI-DSS imposes strict data backup rules. Similar legislation and regulations exist in most countries, to ensure the continuity of operations expected of the banking world.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>How to implement a DRP-BCP?</h2>
<p>&nbsp;</p>
<p>Once the critical infrastructures have been identified and the recovery times decided, it is then a matter of putting in place an effective backup strategy within the framework of a DRP, or the duplication of systems within the framework of a BCP.<br /> <br /> <br /><img loading="lazy" decoding="async" src="https://www.sonema.com/wp-content/uploads/2022/05/lifecycle-drp-bcp-1024x247.png" alt="" class="wp-image-6415 aligncenter size-large" width="1024" height="247" /><br /> </p>
<p>A detailed backup policy should be defined and followed. A basic rule, known in the IT industry, is the <strong>3-2-1</strong> rule: three backups, on two different types of media, with one of the copies offsite (i.e. away from your premises; the further the better). The aim here is to maximise the chances of data recovery, in the event of a natural disaster, or technical failure: by using two types of media (e.g. magnetic storage, and tape storage), and by having one copy far away geographically, it becomes easier to make sure a working copy exists.</p>
<p>It is also essential and mandatory to regularly test backups and the backup system to ensure that they can be restored in the event of damage. A tragically famous example would be MySpace, a social network from the turn of the century; all the content posted by its users from the site&#8217;s inception until 2015 was lost during a datacentre move. The backups had been silently corrupted for years, and could not be recovered. Although this data cannot really be considered critical, the losses destroyed the remaining reputation that the platform enjoyed.</p>
<p>BCPs go even further: we are now duplicating your critical infrastructure on your premises, but more ideally in a geographically remote location, or in a private cloud. These installations must be duplicated in real time or very regularly. This way, an &#8220;emergency&#8221; information system is always available and up to date, ready to be deployed in case of problems.</p>
<p>In a situation where there are bandwidth constraints and the RTO may be longer than one hour, it may be possible to use the connection you already have outside business hours to back up critical data during this period. This lessens the impact on connectivity during the business day, but adds the risk of losing the day’s worth of data in the event of a disaster. A BCP almost doubles the bandwidth requirements (at least on exchanges between critical systems), but ensures virtually no business interruption.</p>
<p>In any case, it is absolutely critical to clearly document all these procedures, to train the disaster response teams, and to continually test all crisis scenarii; countless examples in 2020 showed the importance of a business continuity plan during the early stages of the pandemic, and the institutions that were able to come out on top were those that were prepared to respond in the event of a disaster, in an organised and planned manner.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What are the benefits of DRP-BCP?</h2>
<p>&nbsp;<br />
Companies are increasingly resorting to DRPs and BCPs; a major concern for the company being having its data backed up. In an increasingly digitised world, information systems play an important role in the functioning of a company. The loss of data can have a big impact on a business, or even shut it down completely; some companies will not recover from such an event.</p>
<p>Implementing a disaster recovery or business continuity plan allows to continue to provide service to customers and to restore information systems within a reasonable timeframe. In the case of natural or man-made disasters, a BCP can even be a competitive edge, if your competitors also suffer from the same disaster.</p>
<p>This is the IT implementation of the popular adage, &#8220;prevention is better than cure&#8221;.<br />
The opportunity to establish a BCP also allows you to map in detail what is critical to the functioning of your business. A better understanding of what is critical can also help to focus attention on certain systems in a cyber security policy, which is a key focus today, especially with the advent of new financial tools, the development of cryptocurrency and an ever-increasing demand for digitisation of all financial and government services. The stakes are growing exponentially, and data security will be the keystone of the banking world&#8217;s durability and resilience.</p>
<p>Finally, it is also a very useful part of a crisis management plan; having made decisions in advance, it becomes easier to bounce back from problems.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Sonema offers support and hosting solutions for PRA-PCA in its privately owned Tier-III datacenter that meets PCI-DSS requirements. Sonema also offers a range of IT and telecom solutions to meet all your company&#8217;s needs.</p>
<p>For more information, <a href="/en/contact/">please contact us</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Is PCI-DSS? Definition, Requisites, Importance and Certification</title>
		<link>https://www.sonema.com/en/2022/03/what-is-pci-dss-definition-requisites-importance-and-certification/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Mon, 07 Mar 2022 10:00:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6361</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In a previous article, we discussed the subject of penetration testing, its issues and its indications. One of these guidelines is the PCI-DSS compliance check, which includes a requirement for vulnerability testing every 90 days. But what exactly is PCI-DSS? Does it apply to your business? What are the requirements, and what is at stake in this standard?</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What Exactly Is PCI-DSS?</h2>
&nbsp;
The Payment Card Industry &#8211; Data Security Standard is a standard that applies to all actors in the payment chain: anyone who processes, transmits and stores payment card information is concerned. Initially founded by the 5 major card companies, this standard is now managed by an independent agency, the PCI Security Standards Council (PCI-SSC).

The standard defines two categories:

&nbsp;
<ul>
	<li><strong>The merchant</strong>: any company or individual that accepts card payments. It is to the merchant that the customer gives his information as a cardholder, and represents the first link in the electronic payment chain;
&nbsp;</li>
	<li>The <strong>Service Provider</strong>, or <strong>hosting provider</strong>: any company that stores, processes, or transmits payment card information on behalf of another company. These service providers can be thought of as intermediaries that provide various payment services to merchants. Some companies are considered to be both merchants and service providers: a telecommunications company, for example, receives card information from a customer for payment, and at the same time enables its transmission. They are therefore considered both a merchant and a service provider.</li>
</ul></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>The Challenges of PCI-DSS</h2>
&nbsp;
The PCI-DSS standards exist to protect not only end users, but also all links in the chain: preventing bank data theft through a set of restrictive but comprehensive standards strengthens the protection of users, intermediaries, banks and merchants.

It is also a standard that has become mandatory to follow in most cases, to deal with Visa, Mastercard, JCB, Discover, American Express, and virtually all credit card issuers. This is why a comprehensive data security policy must be considered, and also maintained, through regular vulnerability testing and penetration testing.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_28  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>PCI-DSS Requirements</h2>
&nbsp;
The PCI-DSS consists of 12 sections, each of which is intended to contribute to the security of cardholder data. These requirements can be summarised by the following objectives:
&nbsp;
<table class="sonema-tables">
<caption>Source: <a href="https://www.pcisecuritystandards.org/">https://www.pcisecuritystandards.org/</a></caption>
<tbody>
<tr>
<th style="text-align: center">Intended Goal</th>
<th style="text-align: center">PCI-DSS Requirement</th>
</tr>
<tr>
<td rowspan="2">
<p>Build and Maintain a Secure Network and Systems</p>
</td>
<td>
<p>1. Installing and maintaining a firewall configuration to protect cardholder data.</p>
</td>
</tr>
<tr>
<td>
<p>2. Changing vendor-supplied defaults for system passwords and other security parameters.</p>
</td>
</tr>
<tr>
<td rowspan="2">
<p>Protect Cardholder Data</p>
</td>
<td>
<p>3. Protecting stored cardholder data.</p>
</td>
</tr>
<tr>
<td>
<p>4. Encrypting transmission of cardholder data over open, public networks.</p>
</td>
</tr>
<tr>
<td rowspan="2">
<p>Maintain a Vulnerability Management Program</p>
</td>
<td>
<p>5. Protecting all systems against malware and performing regular updates of anti-virus software.</p>
</td>
</tr>
<tr>
<td>
<p>6. Developing and maintaining secure systems and applications.</p>
</td>
</tr>
<tr>
<td rowspan="3">
<p>Implement Strong Access Control Measures</p>
</td>
<td>
<p>7. Restricting access to cardholder data to only authorized personnel.</p>
</td>
</tr>
<tr>
<td>
<p>8. Identifying and authenticating access to system components.</p>
</td>
</tr>
<tr>
<td>
<p>9. Restricting physical access to cardholder data.</p>
</td>
</tr>
<tr>
<td rowspan="2">
<p>Regularly Monitor and Test Networks</p>
</td>
<td>
<p>10. Tracking and monitoring all access to cardholder data and network resources.</p>
</td>
</tr>
<tr>
<td>
<p>11. Testing security systems and processes regularly.</p>
</td>
</tr>
<tr>
<td>
<p>Maintain an Information Security Policy</p>
</td>
<td>
<p>12. Maintaining an information security policy for all personnel.</p>
</td>
</tr>
</tbody>
</table></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_29  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Compliance Assessment</h2>
To certify the compliance of an information system with the PCI-DSS standards, an external entity, called <em>Qualified Security Assessors</em> (QSA), will either produce a <em>Report of Compliance</em> (ROC) or assist the company in completing a <em>Self-Assessment Questionnaire</em> (SAQ).

There are 4 levels of PCI-DSS compliance for merchants, depending on the volume of transactions they process annually:

&nbsp;
<table class="sonema-tables">
<tbody>
<tr style="text-align:center">
<th>Merchant Level</th>
<th>E-commerce Transactions<br />Volume (Per Year)</th>
<th>Requirements</th>
</tr>
<tr style="text-align:center">
<td>1</td>
<td >6 million+</td>
<td style="text-align:left"><p>1. Report of Compliance + Certification of Compliance (ROC + AOC) following an annual audit done by a QSA</p><p>2. Vulnerability scan, including a comprehensive penetration test</p></td>
</tr>
<tr style="text-align:center">
<td>2</td>
<td>1 to 6 million</td>
<td rowspan="3" style="text-align:left">
<p>1. SAQ</p>
<p>2. Vulnerability scan</p>
<p>3. PCI-DSS Certification of Compliance (AOC)</p>
</td>
</tr>
<tr style="text-align:center">
<td>3</td>
<td>20,000 to 1 million</td>
</tr>
<tr style="text-align:center">
<td>4</td>
<td>Fewer than 20,000</td>
</tr>
</tbody>
</table></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_30  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>The Self-Assessment Questionnaire (SAQ)</h3>
&nbsp;
This questionnaire consists of a series of closed-ended questions designed to assess an entity&#8217;s PCI-DSS readiness. It is to be completed by all PCI-DSS entities not exceeding the transaction volume that requires a compliance report.

There are a variety of questionnaires depending on the exact nature of the payment data processing by the company seeking certification. These range from 20 to 300 questions.

A company can decide to choose and complete this questionnaire itself, or it can involve an independent assessor.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_31  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Vulnerability Scan</h3>
&nbsp;
A vulnerability scan is the use of a vulnerability analysis tool on all networked applications within an organisation that can be accessed from the Internet, or in some cases from an intranet (e.g. in the case of private sites accessed from a VPN by customers).
These scans are performed by a PCI-SSC approved vendor every 90 days to maintain compliance.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_32  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Certificate of Compliance (AoC)</h3>
&nbsp;
The certificate of compliance is simply a declaration completed and signed by the service provider or merchant, attesting it has completed the self-assessment questionnaire and adheres to the PCI-DSS rules. This attestation can also be completed by the assessor if the company&#8217;s situation makes it subject to a compliance report (Level 1 merchants).</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_33  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Report of Compliance (RoC)</h3>
&nbsp;
In contrast to the certificate of compliance and the Self-Assessment Questionnaire, the Report of Compliance has to be issued by a Qualified Security Assessor (QSA). These assessors are appointed by the PCI-SSC, and independently certify compliance with the PCI-DSS rules.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_34  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>The Importance of PCI-DSS</h2>
&nbsp;
Although PCI-DSS is not a <em>de jure</em> standard and legally required for payment data processing, it is <em>de facto</em> a standard, as it is a required by virtually all payment card companies.
However, it is important to note that cardholder data is considered by some countries to be PII (Personally Identifiable Information), and therefore falls under the scope of the GDPR (General Data Protection Regulation). While not clearly outlined in the law, any data that can identify a person, such as unique identification numbers, is considered personal data. As such, cardholder data may be considered PII.

In addition, some US states refer directly to the PCI-DSS standard in their legislation, making it a <em>de facto</em> mandatory standard. Credit card issuers can, and have, refused service to a merchant or service provider that are not compliant with the standard.

All of these considerations make PCI-DSS, although not mandatory, a &#8220;seal of quality&#8221;, and an important aspect of networked system security. All the PCI-DSS rules can also constitute a good starting point for all your sensitive data security, and not just payment data; it is a solid base for strengthening the security of information systems.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_35  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Sonema&#8217;s networks and data centres are regularly audited by an external firm and are PCI-DSS compliant. For over 30 years, Sonema has been providing its customers with tailor-made connectivity, hosting and security solutions to meet their most demanding needs. 

For more information, <a href="/en/contact/">contact us</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Penetration testing: an essential tool in your security arsenal</title>
		<link>https://www.sonema.com/en/2022/03/penetration-testing-an-essential-tool-in-your-security-arsenal/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Thu, 03 Mar 2022 10:00:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6344</guid>

					<description><![CDATA[Les tests de pénétration, aussi appelés pentests ou piratage éthique, sont des outils essentiels pour constituer une stratégie de sécurité défensive et offensive au sein d’un réseau informatique. Mais en quoi consistent-ils ? Quels sont les différents types de tests ? Et dans quelle mesure sont-ils essentiels ? Tour d’horizon en 2022.]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_36  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Penetration testing, also known as pentesting or ethical hacking, is an essential tool in building a defensive and offensive security strategy within a computer network. But what are they, exactly? What are the different types of tests? And to what extent are they essential?</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_10 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_37  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What Is a Pentest?</h2>
<p>A penetration test, or pentest, is an &#8220;acceptable&#8221; form of hacking, in the sense that these attacks are controlled, desired, and aim to evaluate the security of a computer system. A penetration test is not to be confused with a vulnerability assessment, which is purely theoretical: a penetration test is, in a nutshell, an attempt to hack into your systems, by actors authorised to do so.</p>
<p>Pentests fall into two broad categories: traditional — or manual — tests, and automated tests.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_38  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Are There Different Types of Manual Penetration Tests?</h2>
&nbsp;
These pentests fall into three broad categories:</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_39  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Black Box Testing</h3>
&nbsp;
<p>Black box testing involves attacking a system or network without any prior knowledge of its composition. It is therefore the type of test that will most closely resemble a real attack by a malicious actor. These tests can identify exposed vulnerabilities, configuration errors, and even human weaknesses that can lead to the successful exploitation of a network, through social engineering.

Although these tests are the closest to real world conditions, they have many disadvantages: since they are based on research and hypothesis-building, it is difficult to identify all the flaws that may be lurking in a network.

They are also, by their exploratory nature, tests that can last several months, thus increasing their cost. Finally, the thoroughness of this type of penetration test depends even more on the expertise of the pentester, since the testing is done &#8220;blind&#8221;.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_40  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>White Box Testing</h3>
&nbsp;
The opposite of black box testing is white box testing. Here, the pentesters generally have access to a complete description of the network to be attacked, credentials to all parts of the network and, if applicable, the source code of the applications used within the network.

This type of test is very complete, and saves a lot of time in simulating attacks. In a very short time, it is possible to use multiple attack vectors on each part of the network, or even to create a copy of the network to attack it without impacting the production network.

These tests are more comprehensive and quicker, but sometimes lack objectivity, as some obvious flaws in the network could take precedence over more subtle vectors. You also need to have absolute confidence in your pentesters, who will have a complete mapping of your network as well as the &#8220;keys to the kingdom&#8221;.

It should be noted that, although it remains rare, some security companies have had their networks infiltrated: IT security being a moving target, is never infallible!</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_41  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Grey Box Testing</h3>
&nbsp;
This type of test combines aspects of the previous two types: the client gives the pentesters limited information about their network, typically connection information to a piece of network equipment. These tests typically simulate an &#8220;attack from within&#8221;, or an external attack by a trusted third party (who has, for example, been attacked themselves).

This type of testing simulates what kind of access a privileged user could gain with login information you provide, and is just as important as a &#8220;blind&#8221; attack.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_42  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Which Manual Test to Choose?</h2>
&nbsp;
The main objective of a pentest is to identify, evaluate and protect possible attack vectors on a network, equipment or business tool. A black box test is the quickest to implement: testers only have to try to penetrate the system without any prior knowledge of the network. But these can miss important attack vectors; despite being quick to implement, a comprehensive black box test can be very time consuming, depending on the size of the target.

White and grey box testing, on the other hand, greatly reduces the total attack time, but has the major disadvantage that testers, having knowledge of the network, may change their behaviour compared to a real attacker, and miss some attack vectors that might be easier to exploit.</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_43  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Automated Testing</h2>
&nbsp;
There is also a whole group of technologies known as Breach and Attack Simulation (BAS), which make it possible to largely automate the work of searching for security vulnerabilities. 

These are relatively recent technologies; however, they allow a continuous evaluation of attack vectors, and are becoming an essential complement to a complete security policy, especially for companies subject to PCI-DSS and GDPR, where the response to an attack must be rapid, and the affected users notified within 72 hours.

BAS provides, through thorough probing throughout a network, a comprehensive dashboard showing potential weaknesses in a network, and ways to remedy them. They are becoming invaluable tools in IT security monitoring and remediation, particularly in the context of PCI-DSS, where regular testing is required for continued certification. </div>
			</div><div class="et_pb_module et_pb_text et_pb_text_44  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What Is the Purpose of Penetration Testing?</h2>
&nbsp;
Manual penetration testing is an invaluable tool for assessing the security of a computer network or application at any given time. Coupled with automated tests, they form a passive and active line of defence to protect your data and that of your users.

In 2020, around 15,000 new vulnerabilities were identified, across a wide range of applications. The top 30 vulnerabilities in the list are responsible for 98% of the damage to corporate networks and data. Moreover, the average time to remediate a vulnerability is over 200 days in 2021.

Recently, an extremely easy-to-exploit flaw in an incredibly popular library, log4j, was discovered. The extent of the damage from the discovery of this flaw has not yet been assessed, although patches for it already exist. Log4j is included in a lot of software packages, and could very well be hidden deep within a business application you use, or appliances, tools, and software purchased from a third party.

In this case, a pentest would allow you to identify the exploitable vectors in your network in order to patch them. New vulnerabilities are discovered every day, so this is a process that should be repeated regularly.

If your company is subject to PCI-DSS, penetration testing is one of the security auditing requirements. A careful evaluation of the vulnerability vectors of a network allows you to better defend your network, in the face of a growing number of attacks every day. Our next article will discuss the importance of PCI-DSS, and how penetration testing is an essential part within its rules.</div>
			</div><div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1864" height="1051" src="https://www.sonema.com/wp-content/uploads/2022/03/Pentest360-UK.png" alt="" title="Pentest360-UK" srcset="https://www.sonema.com/wp-content/uploads/2022/03/Pentest360-UK.png 1864w, https://www.sonema.com/wp-content/uploads/2022/03/Pentest360-UK-1280x722.png 1280w, https://www.sonema.com/wp-content/uploads/2022/03/Pentest360-UK-980x553.png 980w, https://www.sonema.com/wp-content/uploads/2022/03/Pentest360-UK-480x271.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1864px, 100vw" class="wp-image-6356" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_45  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Sonema offers a complete range of automated and manual pentesting solutions. For more than 30 years, we have been providing our customers with tailored connectivity, hosting and security solutions, to meet their most demanding needs. 

For more information, <a href="/en/contact/">contact us</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SONEMA teams up with the Crayon Group to offer our customers Microsoft Cloud services and support them with their digital transformation</title>
		<link>https://www.sonema.com/en/2022/01/sonema-teams-up-with-the-crayon-group-to-offer-our-customers-microsoft-cloud-services-and-support-them-with-their-digital-transformation/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Fri, 14 Jan 2022 20:54:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6263</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_11 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_46  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The digital business transformation phenomenon is accelerating, driven partly by the impact of the Covid-19 pandemic on businesses. Within this context, companies must adapt and develop a hybrid approach to working conditions by enabling their employees to work remotely, thereby taking advantage of Cloud innovations while optimising their investments. In order to encourage digital business transformation, these tools must address challenges including time saving, improved team cooperation and enhanced data management.</p>
<p>To meet these new standards whilst addressing our customers’ issues and helping them implement Microsoft solutions, Sonema has teamed up with Crayon, a leading distributor of Microsoft365 and Azure products:</p>
<h4><strong>Microsoft 365</strong></h4>
<p>An all-in-one bundle which includes all of Microsoft’s desktop software in a single subscription. The bundle includes M365 Apps for enterprise: Office 365, Teams, Exchange and Windows10 as well as the EMS (Enterprise Mobility + Security) modules. It is a global solution designed to meet all the challenges facing businesses today in terms of employee productivity, team mobility management and corporate data security.</p>
<h4><strong>Azure</strong></h4>
<p>Azure is a bundle of over 300 cloud computing services for businesses and developers. The range of services includes IaaS resources, Platform as a Service (PaaS) and Software as a Service (SaaS) options, allowing companies to access cloud services without the need to manage servers: Azure SQL Database, Visual Studio, DataMarket, Windows Azure Media Services, Azure CDN.</p>
<h4><strong>Support</strong></h4>
<p>We provide additional support for training, migration services and licence optimisation plus advice for development proposals.</p>
<p>These new offers will be developed using Sonema and Crayon’s local presence in Africa and will use Microsoft’s data centres in Europe and South Africa allowing businesses to access their data at any time.<br />
To optimise connectivity to Microsoft services, Sonema also offers an ExpressRoute connectivity service, which is particularly well suited for use with Microsoft Cloud services.</p>
<p>« Crayon was one of the first partners to receive Azure Expert MSP status globally in 2018. This status has enabled us to develop a comprehensive managed services portfolio and strengthen our technical expertise. We are delighted to be able to work with Sonema’s teams and to support them in providing this offer to their customers, » says Gwenaël PASQUET, Managing Director of Crayon France.</p>
<p>For Catherine DELOM, Managing Director of SONEMA: « Currently we offer our customers scalable, high-performance and resilient connectivity and security services. This partnership with Crayon, who are one of the Top 10 Microsoft LSPs, allows us to increase our value proposition and to meet our customers’ requirements for Microsoft Cloud services, which are essential to business development, whether it be through collaborative work, messaging or data protection tools. »</p>
<p>&nbsp;</p>
<h3><strong>ABOUT CRAYON</strong></h3>
<p>Crayon helps clients build a business and technical foundation for successful digital transformation through a reliable service framework enabling our clients to scale and optimise their IT assets to unlock the untapped potential in IT and innovation.</p>
<p>Headquartered in Oslo, Norway, Crayon has more than 3,000 employees in over 50 locations worldwide.</p>
<p>More information : <a href="https://www.crayon.com">www.crayon.com</a> &#8211; Press contact : M<span style="display:none">abcdef</span>ela<span style="display: none">NO-SPAM</span>nie.Coff<span style="display: none">NOSPAM</span>ee@cra<span style="display:none">NOSPAN</span>yon.co<span style="display:none">NOSPAM</span>m &#8211; <a href="tel:+4746748648">+47 46 74 8648</a></p>
<p>&nbsp;</p>
<h3><strong>ABOUT SONEMA</strong></h3>
<p>Sonema has been supporting its customers for more than 20 years in their projects on the African continent. With a committed mindset based on a strong understanding of the issues, Sonema want to be a proactive partner by allowing them to focus on their core business and business innovations.</p>
<p>Through its one-stop-shop approach and network of local partners, Sonema provides tailor-made and scalable solutions for highly resilient satellite, terrestrial and hybrid networks as well as security and hosting services.</p>
<p>Remaining faithful to its values of respect, transparency and responsibility, Sonema place trust at the heart of its customer relationships.</p>
<p><strong> </strong></p>
<ul>
<li>66 members of staff committed to its customers, every day;</li>
<li>767 customer installations across 45 countries in Africa;</li>
<li>37 certified local partners all over the African continent.</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_1_wrapper et_pb_button_alignment_center et_pb_module ">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://www.sonema.com/press-release-sonema-crayon/" target="_blank">Download the press release (PDF)</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Various Use Cases of SD-WAN</title>
		<link>https://www.sonema.com/en/2021/11/the-various-use-cases-of-sd-wan/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 15:26:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6228</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_12 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_47  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><!-- divi:paragraph -->As an essential component in the digital transformation of companies, Wide-Area Networks (WAN) must evolve to become resilient, scalable and secure architectures, and thus respond to the necessary changes in networks. Growing digital needs, a democratization of cloud usages: the last few years have seen the emergence of new connectivity technologies, offering ever more controlled quality of service and increasingly minimized service interruptions.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph -->Today, let&#8217;s take a look at SD-WAN, a recent evolution in connectivity technologies.</p>
<p><!-- /divi:paragraph --></p></div>
			</div><div class="et_pb_module et_pb_divider et_pb_divider_0 et_pb_divider_position_ et_pb_space"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_48  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 id="h-what-is-sd-wan">What is SD-WAN?</h2>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>SD-WAN (<em>Software-Defined Wide-Area Network</em>) is a software-based approach to managing a WAN. It virtualizes a network link through the aggregation of multiple connectivity solutions. It has been touted in recent years as the <em>next big thing</em> in telecommunications.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>SD-WAN allows for greater flexibility by separating the physical part of the network from its control and management planes. This approach has several key benefits:</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:list --></p>
<ul>
<li>Increased resiliency, through the multiplication and diversification of link types, and intelligent routing;</li>
<li>A pragmatic operational cost structure, as bandwidth can be increased via less expensive connectivity options such as Internet access or 3G/4G;</li>
<li>Link security via next generation firewall (NGFW) equipment;</li>
<li>A global visibility of the network and an increased agility on evolutions.</li>
</ul>
<p><!-- /divi:list --><!-- divi:paragraph --></p>
<p>Initially, the technology was presented as a way to save bandwidth, thanks in particular to the intelligent routing of different types of traffic on a network. Today, the main benefit put forward by users and manufacturers is the optimization of the availability and latency perception of applications, allowing a better user experience.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" src="https://www.sonema.com/wp-content/uploads/2021/11/SDWAN-UK.png" alt="" class="wp-image-6241 aligncenter size-full" width="1348" height="460" srcset="https://www.sonema.com/wp-content/uploads/2021/11/SDWAN-UK.png 1348w, https://www.sonema.com/wp-content/uploads/2021/11/SDWAN-UK-1280x437.png 1280w, https://www.sonema.com/wp-content/uploads/2021/11/SDWAN-UK-980x334.png 980w, https://www.sonema.com/wp-content/uploads/2021/11/SDWAN-UK-480x164.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1348px, 100vw" /></p>
<p><!-- /divi:paragraph --><!-- divi:heading --></p></div>
			</div><div class="et_pb_module et_pb_divider et_pb_divider_1 et_pb_divider_position_ et_pb_space"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_49  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>How does it work?</h2>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>This technological approach therefore promises many improvements in service quality. But how does the technology work in practice?</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-good-planning-is-the-key-to-good-operations"><a></a> Good planning is the key to good operations</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>First of all, the customer&#8217;s needs must be accurately defined. Depending on the network topology, the connectivity options available on site and the specificities of the applications used, the approaches will be different.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>The first step is to accurately assess the customer&#8217;s <em>business case</em>; the returns on investment will not necessarily be the same depending on the use.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-mapping-network-traffic"><a></a> Mapping network traffic</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>Once this business case has been established, the careful planning phase can start, by communicating with the client and carrying out a <em>site survey</em><em> </em><em>to</em> identify the various sources of network traffic. It becomes then possible to classify the criticality of each network flow, in order to prioritize them.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-the-equipment"><a></a> The equipment</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>Specific equipment is required at both interconnection points: typically, an <em>appliance </em>(physical or virtual) will be installed at the receiving end, at the customer&#8217;s site, and another one, which will manage the other end of the connection, is installed in a datacenter, in the case of a centralized architecture of the customer, or on all or part of the client’s network sites.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>Many vendors provide many different features; for example, Fortinet offers solutions integrated with a whole ecosystem oriented towards security, or Aruba (formerly Silverpeak) is more oriented towards flow optimization.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-connectivity"><a></a> Connectivity</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>It is now necessary to connect these two endpoints together. All types of connections are compatible here, and this is what makes this technology special: the flows will be routed on the link offering the necessary characteristics for a specific stream. One of the important steps will be to set up the SD-WAN appliances by defining the desired SLAs for intelligent traffic routing. For example, real-time applications, where latency and/or <em>jitter </em>are critical and should ideally be kept to a minimum, will be routed over the link offering the right characteristics. In the case of a critical application, it is even possible to transmit the data twice, on two separate links, to ensure that if one of the two links were to be degraded, the data would still reach its destination.</p>
<p><!-- /divi:paragraph --><!-- divi:heading --></p></div>
			</div><div class="et_pb_module et_pb_divider et_pb_divider_2 et_pb_divider_position_ et_pb_space"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_50  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 id="h-what-result">What result?</h2>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>Through careful and well-prepared deployment, increased quality of service and connection stability is achieved while minimizing service interruptions. This quality is also achieved without the need for costly bandwidth increases to the primary link.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>These technologies act in a completely transparent way for the end user: sudden degradation or disconnection on a network link will have no impact on the data stream. Dynamic routing or <em>load balancing, </em>which balance the network load on several links, would fail altogether if one of the links suddenly disconnect.</p>
<p><!-- /divi:paragraph --><!-- divi:heading --></p></div>
			</div><div class="et_pb_module et_pb_divider et_pb_divider_3 et_pb_divider_position_ et_pb_space"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_51  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 id="h-what-are-the-benefits-of-using-sd-wan">What are the benefits of using SD-WAN?</h2>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>The potential benefits of SD-WAN are numerous, and by extension so are its <em>business cases.</em></p>
<p><em></em></p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-availability-of-critical-applications"><a></a> Availability of critical applications</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>If your business depends on a remote application, whether it is a business application or a cloud application, SD-WAN can improve its availability, by allowing automatic switching between various links depending on their characteristics. If your application is sensitive to latency, jitter, or even just available bandwidth, SD-WAN can ensure that it is always prioritized, even if one of your links goes down, to improve the user experience.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-optimizing-access-to-microsoft-cloud-services">Optimizing access to Microsoft Cloud Services</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>Some SD-WAN solutions can improve access to cloud services like Microsoft 365 or Azure. They detect Microsoft points of presence to route traffic to the <em>edge </em>points closest to the user, thereby reducing latency and/or jitter to ensure the best application performance.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-bandwidth-optimization">Bandwidth optimization</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>If your application sometimes requires occasional bursts of extra bandwidth, SD-WAN can, for example, &#8220;overflow&#8221; your traffic onto a secondary link to keep your application connected. This allows you to benefit from very high availability VSAT connectivity, as well as an MPLS, fiber or terrestrial ADSL link for occasional bandwidth needs, in addition to VSAT.</p>
<p>&nbsp;</p>
<p><!-- /divi:paragraph --><!-- divi:heading {"level":3} --></p>
<h3 id="h-secure-connectivity">Secure connectivity</h3>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>The use of applications, especially in the cloud, requires a high level of security. SD-WAN meets this need through permanent security and encryption, by implementing anti-virus and anti-spam solutions, intrusion prevention and detection (IDS/IPS), application filtering and through complete control of the authentication process.</p>
<p><!-- /divi:paragraph --><!-- divi:heading --></p>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_divider et_pb_divider_4 et_pb_divider_position_ et_pb_space"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_52  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 id="h-when-not-to-use-sd-wan">When not to use SD-WAN?</h2>
<p><!-- /divi:heading --><!-- divi:paragraph --></p>
<p>The use of SD-WAN is evaluated on a case-by-case basis: depending on the characteristics of the links available between the points to be connected and your needs, SD-WAN can improve the quality of service for your network applications. However, SD-WAN is not suited for all networks; there are several factors to consider in determining whether or not SD-WAN will benefit you.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>One of the key factors in choosing SD-WAN is the variety of link types available between your two networks to be connected: the greater the variety, the more SD-WAN makes sense. Coupling Internet bandwidth to an MPLS or VSAT link, to minimize service interruptions and match bandwidth capacity requirements, will always be more economical. SD-WAN will allow you to intelligently route all your traffic in an optimal, secure and more cost effective way than by purchasing more bandwidth on your main link.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>A large swath of new solutions are becoming available, such as low earth orbit (LEO) satellite fleets, 5G in large cities, or the deployment of new submarine cables. SD-WAN will allow you to use these new technologies alongside your existing links, in order to increase their bandwidth and availability, in a transparent way, but also to completely change their architecture: a network, today in MPLS, can be turned into a 100% Internet network.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>The increase in the use of cloud solutions is also a critical factor: the more your applications are hosted in the cloud, the more important it is to be connected to them at all times. The resiliency of SD-WAN means that you can always be connected, no matter what happens, as multiple channels are used to connect your applications to your network.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>Finally, there is a cost factor to consider: an increase in bandwidth may be sufficient for your needs, although diversifying links will always bring a benefit in terms of resilience to outages.</p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>It is therefore necessary to carefully prepare an audit of your existing network, define your needs and carry out an expert evaluation by network engineers who will be able to precisely direct your connectivity needs and set up an evolution path.</p></div>
			</div><div class="et_pb_module et_pb_cta_0 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_promo_description"><h2 class="et_pb_module_header">Want To Know More?</h2><div><p>Sonema has been provding connectivity services to its customers for 30 years, whether VSAT or terrestrial. We also offer a range of associated services to secure connectivity and improve network performance, such as SD-WAN. For more information, <a href="/en/contact/">contact us.</a></p></div></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_promo_button" href="https://www.sonema.com/en/services/connectivity/sd-wan/">Learn more about SD-WAN</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Managing user credentials and privileged access: a major challenge</title>
		<link>https://www.sonema.com/en/2021/10/managing-user-credentials-and-privileged-access-a-major-challenge/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Thu, 07 Oct 2021 16:26:30 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6184</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_13 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_53  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Encrypting data at rest, regularly auditing access, on-site security and monitoring for data leakage are just a few of the measures you can take to protect your corporate data. But all these measures quickly fall apart if users knowingly or unknowingly reveal their passwords. How to protect your data against password theft? An overview of the challenges of privileged access management.</h3>
<p>&nbsp;</p>
<h2>Credential theft is commonplace</h2>
<p>The security level of an networked information system is generally dependent on its weakest link. Often, this is the user: it is difficult to find the perfect balance between minimal inconvenience and maximum security.</p>
<p>Phishing, ransomware, social engineering, or sometimes even physical data theft, the opportunities to have one&#8217;s credentials stolen are numerous, and it is often noticed too late to mitigate the impact. Regularly, huge lists of logins and passwords appear on the Internet. Sometimes, it is the system administrators who are at fault, due to a bad server configuration, an accidental upload of a test database, or simply because the application used by your company does not apply certain necessary security measures. By exploiting these vulnerabilities, some individuals manage to gather large swaths of user credentials, most often valid.</p>
<p>To date, the largest list of accounts is called <strong>&#8220;Collection #1&#8221;</strong>; in 2019, a 2.7 billion rows database, containing 773 million unique email addresses, as well as passwords associated with each of those rows was leaked.</p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1802" height="910" src="https://www.sonema.com/wp-content/uploads/2021/10/image-17.png" alt="Collection #1" srcset="https://www.sonema.com/wp-content/uploads/2021/10/image-17.png 1802w, https://www.sonema.com/wp-content/uploads/2021/10/image-17-1280x646.png 1280w, https://www.sonema.com/wp-content/uploads/2021/10/image-17-980x495.png 980w, https://www.sonema.com/wp-content/uploads/2021/10/image-17-480x242.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1802px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-6181" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>Collection #1 is a series of 12,000 text files uploaded on MEGA, totaling 87 GB of user credentials.<br /><a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/" rel="nofollow noreferrer noopener" target="_blank">Source: Troy Hunt</a></p></div>
					</div>
				</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_54  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>This list does not mention which websites those databases were stolen from; it would be tempting to think that such a list is unusable. Unfortunately, most users reuse their passwords, making these thefts quite viable, even if the credentials have not been stolen from your systems: by using a technique called credential stuffing, which involves testing stolen username and password pairs on a target from one of these stolen account sources, an attacker can hope that a user has reused their password.</p>
<p>Akamai, a leading Internet service provider, estimated in 2017 that credential stuffing could cost companies up to $5 million per attack, primarily in application downtime, lost customers and time invested by IT teams. Additionally, there is an estimated monetary loss of $500,000 to $54 million, assuming that 1% to 100% of your users&#8217; accounts are compromised, respectively.</p>
<p>The same vendor indicated that the number of credential stuffing attacks on financial services providers is steadily increasing, with a 45% increase between 2019 and 2020. 3.4 billion attacks specifically using this modus operandi were conducted on online services of banks worldwide in 2020 alone.</p>
<p>&nbsp;</p>
<h2>Stolen credentials are not only a matter of corporate data</h2>
<p>In addition to the loss of time and money that credential stuffing causes, if such a data breach impacts your business, your legal responsibility may also be engaged: the GDPR (General Data Protection Regulation), explicitly classifies logins and passwords as PII (Personally Identifiable Information). Thus, any leak of such identifiers or data, whether or not due to negligence, must be notified to all users as soon as it is detected, and no later than 72 hours after the discovery; any failure to comply with this obligation may cause your company to pay a fine of up to 2% of its turnover as compensation for the breach.</p>
<p>&nbsp;</p>
<h2>How to mitigate such losses?</h2>
<p>While not inevitable, the theft or loss of credentials can be mitigated:</p>
<h3>Employee awareness</h3>
<p>The first line of defense lies with the users of these credentials. Offer specific training to identify phishing, encourage users to report any breach they notice, or any loss of credentials they experience, <strong>without</strong> <strong>repercussions</strong>.</p>
<p>The sooner the loss of credentials is discovered, the faster it can be dealt with; in the case of a dissemination of part or all of your customer base, you can also protect yourself more quickly from the consequences of a data leak if you spot it early enough.</p>
<h3>Strengthen security by adapting security protocols</h3>
<p>Historically, it was recommended to change your password on a regular basis. Specifically, NIST, the American technology standards institute, recommended changing your password frequently, usually every 42 days, at most. However, it was found that such a policy causes users to use a much weaker password, knowing that they will have to change it in the near future.</p>
<p>It was also found that a long password is more secure than a complex one; NIST guidance calls for a minimum of 8 characters.</p>
<p>But a secure password is no longer enough; authentication techniques called &#8220;multi-factor&#8221; must be used:</p>
<h3>Implement multi-factor authentication (2FA, MFA)</h3>
<p>Multi-factor authentication, by verifying a user&#8217;s login attempt through something they have (a temporary password generator), in addition to something they know (their traditional password) adds a layer of security in the case of data leakage attacks.</p>
<p>The user proves that he is the instigator of the connection through his smartphone, through a dedicated generating device, through a physical security key (FIDO type) or through a one-time code book. If the system is well implemented (and does not allow resetting these additional factors via email, or allows overriding it in case of unavailability), the security level is greatly increased.</p>
<p>However, beware of authentication SMS, as SIM cards can be hijacked directly from cell phone operators.</p>
<h3>Set up access audit and privileged access management systems</h3>
<p>In the context of access to company resources, it may be appropriate to add to these policies a continuous access audit system and privileged access management system. By using a jump-box system with secure access, it is easy to limit and control access to resources by forcing users through a well-surveilled &#8220;bottleneck&#8221;. This will allow the capture of exchanges, the granular recording of accesses, and will also make it possible not to reveal the connection credentials to certain systems, in favor of the user&#8217;s identification, via a &#8220;bank safe&#8221; system.</p>
<p>These systems also make it possible to quickly revoke access to all privileged resources, without having to reset sometimes inaccessible passwords.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>I have experienced a credential leak, or my login information has been stolen: what should I do?</h2>
<p>In the first case, the absolute emergency is to disable access to all privileged resources. Once this is done, a mechanism for invalidating all user accounts must be triggered, so that they can reset their passwords.</p>
<p>All users affected by such an information leak must also be notified within 72 hours according to the GDPR.</p>
<p>If your credentials have been stolen, it is important to do a personal &#8220;mini-audit&#8221;: if you use the password that has been stolen on several services, all accounts on these services are considered as compromised, and the passwords will have to be reset immediately, individually, on each service.</p>
<p>&nbsp;</p>
<h2>Our advice</h2>
<p>Within your organization, it is important to focus on continuous auditing of privileged access, and a sound password policy, to minimize the impact that data leaks could have. While not absolutely inevitable, accidents do happen and can be very costly to a company&#8217;s operations.</p>
<p>The importance of multi-factor authentication and privileged access control is a powerful bulwark against credential leaks.</p>
<p>&nbsp;</p>
<p><em>Sonema has been helping its customers for over 30 years with their growing connectivity needs, and also offers solutions for privileged access control (PAM), multi-factor authentication and security auditing. For more information, <a href="/en/contact/">contact us</a>.</em><i></i></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to prevent and mitigate ransomware attacks?</title>
		<link>https://www.sonema.com/en/2021/09/how-to-prevent-and-mitigate-ransomware-attacks/</link>
		
		<dc:creator><![CDATA[Sonema]]></dc:creator>
		<pubDate>Thu, 23 Sep 2021 12:00:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.sonema.com/?p=6138</guid>

					<description><![CDATA[Toujours plus pesante au fur et à mesure des années, cette nouvelle manifestation du crime organisé coûte aux entreprises et aux institutions des sommes exponentiellement plus élevées. Mais qu’est-ce qu’un rançongiciel ? Qui sont derrière ces attaques ? Quel est leur impact, et comment s’en prémunir ? Tour d’horizon en 2021.]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_14 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_55  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4></h4>
<h4>This new manifestation of organized crime is costing companies and institutions exponentially more money as the years go by. But what is ransomware? Who is behind these attacks? What is their impact, and how can you protect yourself against them? An overview in 2021.</h4>
<p>&nbsp;</p>
<h2 class="western">What is ransomware?</h2>
<p>Ransomware is a type of unwanted software, or malware, that has the particularity of taking data, computers, servers, or even mobile devices hostage. The authors of these piece of nefarious software typically demand a ransom in order to regain access to your data or devices.</p>
<p>Although these attacks have been cropping up over the past several years, the very first ransomware largely pre-dates the Internet: in 1989, Dr. Joseph Popp, a Harvard biologist, allegedly distributed 20,000 floppy disks around the world, offering educational software about AIDS. However, once the software was launched from the diskette, it triggered a routine that would encrypt the files on the victims&#8217; hard drives after a few days. The ransom was a few hundred dollars sent to a post office box in Panama to receive the decryption disk.</p>
<p>Today&#8217;s ransomware usually presents itself via email, with a fake invoice to pay, a bank statement or an e-commerce receipt, or sometimes even appears to come from a trusted address within your company. Once the attachment is opened, this malicious software starts encrypting all your data with a military grade cipher, then blocks access to your device. Instructions appear on your desktop, most often asking you to pay a substantial sum in cryptocurrencies to receive the key to decrypt your data.</p>
<p>However, you don&#8217;t always have to open a booby-trapped email to get infected: a significant number of recent attacks have been carried out by exploiting known software vulnerabilities that are not always updated in time by the system administrators of the networks that have succumbed to the attacks.</p>
<p>WannaCry is an example of such an attack, exploiting a weakness in Windows. In May 2017, this ransomware spread from PC to PC, reaching more than 100 million computers in total. Microsoft had already offered an update fixing the exploited flaw (EternalBlue) two months prior; affected users had simply failed to update Windows.</p>
<p><span style="font-style: normal;"></span></p>
<h2 class="western">Who is behind these attacks?</h2>
<p>In most cases, it is impossible to trace the source of all these attacks. Global intelligence agencies are sometimes able to identify the developers of such software based on a few clues. For example, many ransomware programs are developed in such a way that they do not trigger on computers using Russian, Ukrainian or Syrian as their language, suggesting that the perpetrators are of one of these nationalities.</p>
<p>Even when the intelligence services manage to find these cybercriminals, few are arrested.</p>
<p>It is even possible, on some specialized forums on the Darknet, to rent the services of these ransomware (a form of Ransomware as a Service): the latest one, REvil, was a notorious example. The actors behind REvil seemingly have disappeared around July 13 or 14, 2021, no longer responding to requests. It is common for groups to disappear however, only to resurface under a different name later on, so the threat is still very real.</p>
<p><span style="font-style: normal;"></span></p>
<h2 class="western">The impact of Ransomware</h2>
<p>IIt is difficult to estimate the real impact of ransomware, but estimates in the hundreds of millions of dollars were seen as early as 2017. With the number of attacks constantly increasing, this figure is most likely an underestimate. The SARS-CoV-2 pandemic has only amplified the attacks, as corporate networks are becoming more and more open, with employees needing to connect from home in order to continue working.</p>
<p>In 2021, United Health Services, one of the largest providers of hospital care services in the U.S., reported in its public accounts a $67 million loss due to ransomware attacks on their networks.</p>
<p>In an even more recent example, Colonial, the company that operates a crucial pipeline for the transportation of natural gas and gasoline in the United States, paid the ransom demanded by the cyber criminals several hours after the attack. The ransom was 75 bitcoins, or $4.4 million at the current rate. The attack disrupted oil distribution throughout the northwestern United States, prompting residents to stockpile gasoline by any means possible for fear of a shortage.</p>
<p>No one is safe: in 2020, an Ivorian insurance company revealed at a trade show that multiple coordinated attacks on their systems cost them 1.2 billion CFA francs. It is estimated that this same year, cybercrime cost Africa nearly 2,200 billion CFA francs (3.3 billion euros).</p>
<p>We can see that the impact is not limited to the cost of the ransom itself; in addition to this, there is the cost of business interruption, with sometimes devastating effects; some reports of ransomware attacks in hospital systems have caused the death of patients in intensive care.</p>
<p>These attacks are also sometimes an opportunity for hackers to steal business data from companies; to these costs must be added the leakage of potential data (industrial processes and secrets, intellectual property&#8230;).</p>
<p>&nbsp;</p>
<h2 class="western">How Can I Defend Against Ransomware?</h2>
<p>Security systems are never infallible. The more complex corporate networks are, the larger the attack surface is: it is important to have multiple strategies to counter these attacks, and failing that, to have a quick recovery plan.</p>
<p>The ANSSI (French National Agency for the Security of Information Systems) proposes a guide containing a wealth of information on the various countermeasures, which can be summarized as follows:</p>
<p>&nbsp;</p>
<h3 class="western">Keep backups of your data</h3>
<p>The first point, which probably is the most important, is to regularly back up the company&#8217;s data. These backups will be critical in the case of a ransomware attack, but also for many accidents that may occur (fire, theft, loss of devices).</p>
<p>However, it is not enough to back up data to an external drive: if, at the time of an attack, the external drive is connected to an infected machine, the data on that external drive will be encrypted in turn.</p>
<p><span style="font-style: normal;"><span style="text-decoration: none;"></span></span></p>
<h3 class="western">Keep Software and Systems Up-to-Date</h3>
<p>In the case of unattended attacks, a software flaw, sometimes an old one, is involved. It is therefore essential to keep all systems up to date, and never delay the updates proposed by the publishers of the software you use: servers, computers, cell phones, but also external computers connecting to your network, and even printers, scanners and other connected devices.</p>
<p>It is also important to keep anti-virus and anti-malware tools up-to-date on all machines.</p>
<p>&nbsp;</p>
<h3 class="western">Limit and Control Users Rights to Networked Resources</h3>
<p>By ensuring that users are not administrators of their machines, and by limiting access on a granular basis to files stored on your servers, you will be able to soften the impact of an attack should it ever occur. Often, privileged accounts are used to allow ransomware to spread more widely within your network; increased auditing of network access can be a good way to guard against an attack that could cripple your entire business.</p>
<p>&nbsp;</p>
<h3 class="western">Control Access to Internet</h3>
<p>By filtering the connection to the outside world, ransomware attacks can be detected and even prevented from being carried out. Setting up a secure gateway further reduces the risk of ransomware by blocking its download or preventing the exfiltration of data to malicious servers.</p>
<p>&nbsp;</p>
<h3 class="western">Monitor Event Logs</h3>
<p>By setting up an event monitoring system, with the help of a SOC/SIEM platform, it is possible to identify alerts that could be precursors to ransomware attacks. Pooling the log files of an entire network gives a bird&#8217;s eye view over the entire network, allowing to identify unusual behavior of the various devices connected to the network early.</p>
<p>&nbsp;</p>
<h3 class="western">Educate Employees</h3>
<p>All existing mitigation techniques can block a significant number of attacks, but not all of them; therefore, educating your employees about the dangers of ransomware is one of the fundamentals of a complete defense against its dangers. IT staff should not be left out of the equation, as they have access to administrative software with higher privileges on the network; the compromise of one of their workstations could put the entire network at risk, including backups.</p>
<p>&nbsp;</p>
<h2 class="western">Useful Resources</h2>
<p>Initiatives, led by Interpol, exist and sometimes provide universal decryptors for certain ransomware. The <a href="https://www.nomoreransom.org/">NoMoreRansom</a> website contains a large number of decryptors, sometimes allowing to recover data without paying a ransom. These decryptors are becoming increasingly rare, however, as the complexity and quality of the attacks increase every day.</p>
<p>&nbsp;</p>
<h2 class="western">Conclusion</h2>
<p>A ransomware attack can have devastating effects on your business, but it is not fatal; with the right response plan and comprehensive defenses, it is possible to quickly return to normal activity. This type of attack is quickly becoming the norm, compared to the viruses of yesteryear, and is sure to make headlines for many years to come.</p>
<p>For over 30 years, Sonema has been supporting its customers in network, security and hosting. We offer a wide range of solutions that respond directly to the challenges of companies that care about their data. For more information, <a href="/en/contact/">contact us</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
