• Skip to primary navigation
  • Skip to main content
Carbon60

Carbon60

The Managed Cloud Difference

  • Show Search
  • Contact Us
  • Get Started
Hide Search
  • Cloud Adoption
    Cloud Adoption

    Starting or continuing on your cloud journey — whether public, private or hybrid — is a complex undertaking. But no matter your company size or industry, our cloud consulting experts can help with end-to-end solutions to plan, migrate and operate your business in the cloud.

    • Cloud Readiness Assessment

      Chart a new course for your IT environment with a Cloud Readiness Assessment. With a proven process, we take into consideration your technology, people and business strategy and tailor a public, private or hybrid cloud environment that will set your organization up for success.

      Learn more
    • Cloud Migration Services

      Cloud migration can transform your business and give you a competitive edge – when done properly. Our cloud experts will help you move complex workloads to the right cloud environment, the right way – tailored for your specific needs.

      Learn more
    • Cloud Launchpad
    • Modernization
    • Cloud Security & Compliance
  • Managed Cloud
    Managed Cloud

    Get the most out of the cloud and keep your IT team out of the weeds. Gain predictability and control around security, compliance, agility, reliability, performance – and cost – by tapping into our standard-setting managed cloud services.

    • Managed Private Cloud

      Safe, stable, fast, compliant, secure and fully managed – get a reliable and data sovereign cloud infrastructure platform for your applications.

      Learn more
    • Managed Public Cloud

      Experience matters. Whether you choose Managed AWS, Azure or Google Cloud, we can take care of the heavy lifting while you focus on your business.

      Learn more
    • Cloud Backup
    • Cloud Disaster Recovery
    • Security
    • Managed Public Cloud
    • Cloud Disaster Recovery
    • Applications
  • Industries
    Industries

    When it comes to financial services, healthcare, public sector and technology – there is simply no room for error or uncertainty when it comes to data security and compliance. There are specific and important considerations that we are well-versed in navigating. We’re trusted by governments and organizations to safely house mission-critical functions every day.

    • Financial Services

      Increase go-to-market speed, while meeting SOC2, PCI-DSS and OSFI B10 regulatory and organizational obligations.

      Learn more
    • Healthcare

      Get secure, scalable high-performance data, while improving the patient experience and addressing every compliance and privacy requirement.

      Learn more
    • Public Sector
    • Technology
  • Partners
    Partners

    Simply put – the right technology and the right platform is the one that’s right for your business. We’re highly certified and experienced in the major public clouds – so regardless of complexity, customization or preference – we’re well-equipped to have your back every step of the way.

    • AWS

      AWS Premier Partner with 100+ AWS certifications and counting.

      Learn more
    • Microsoft Azure

      Gold Microsoft Azure Partner with core competencies and certifications.

      Learn more
    • Google Cloud
    • VMware
  • Insights
    Insights

    Sharing knowledge and expertise is a big part of how we’ve evolved - and how we help our customers.

    • Blog

      Stay up to date with the latest trends and developments in the fast-moving world of digital transformation.

      Read
    • Events

      Make sure to join us for our next event and connect with cloud experts who have a lot to share.

      Attend
    • Resources

      Your toolkit to do a deeper dive with case studies, info sheets, checklists and more.

      Explore
  • About
    About

    We’re on a mission to bring digital transformation to more businesses, by making forward-thinking cloud strategy – and high-performance cloud services – more accessible.

    • Leadership

      Meet the leadership team who are driving our vision forward.

      Learn more
    • About Carbon60

      Learn more about who we are, and how we help our customers evolve with confidence.

      Learn more
    • Careers
    • News
  • Contact Us
  • Get Started

The Unique Challenge of Securing a Remote Workforce

October 15, 2020

It’s been over six months since the World Health Organization first declared the COVID-19 pandemic, and within that timeframe the way we work has changed dramatically. As we discussed in our webinar back in May, the initial phases of remote workforce rollout presented a number of valuable lessons; prominent among them the importance of endpoint security.

Where initially the challenge of transitioning the workforce from office to home was focused primarily on the availability and mastery of various software applications, our gaze quickly shifted to a number of very real security risks.

Within the first quarter of 2020, large scale data breaches had risen by 273%[1] as compared to the same time last year. It stands to reason- as companies transitioned to their home offices, the number of networks in use multiplied exponentially, with the vast majority unsecure. Where workers in the office connected to a safe, secure corporate network, workers at home are connecting via personal devices on average home wifi networks.

It’s fertile ground for cybercriminals to wreak havoc on the corporate threat landscape. So many access points, so little time! Ransomware attacks are up by 90%, destructive attacks by 102%, and island-hopping attacks by 33%1. And while even the largest enterprises can experience severe consequences from an attack, the uptick in cybercrime has the potential to be fatal for small to mid-sized businesses.

Prevention and Detection: The Next Frontier
Moving through the summer and into the fall, at Carbon60 we’ve seen many of our clients identify the need to increase endpoint security as a main priority. And we’ve harnessed our expertise to deliver a robust set of managed security services to protect against this year’s unique set of threats to critical server infrastructure and customer endpoints.

Endpoint protection is comprised of security solutions that address endpoint security issues, protecting them against zero day exploits, attacks, and even data leaks that may occur as a result of human error.

The goal of endpoint protection is twofold:

Stop Known Threats
Suspicious behaviour is identified using automated blocking of known and new attacks.

Harden Against the Future
Rapid incident response removes threats and ensures that endpoints are resilient to new and repeat attacks.

And while the breadth of cyberthreats is indeed varied, there is a single factor that will largely dictate the success of any comprehensive endpoint protection program: Speed.

The 1-10-60 Rule
The speed with which a threat is identified and eradicated is also referred to as “breakout time”. It’s a key metric that can be used as a watermark with which to measure the efficacy of endpoint security programs. This three-pronged metric is broken down as:

1) Detection Time (1:00 minute to Detect)
How quickly can an organization discover that a threat has occurred or is about to occur?

2) Investigation Time (10:00 minutes to Investigate and Understand)
How quickly can an organization understand the nature and scope of the attack and determine a plan of action?

3) Response Time (60:00 minutes to Contain)
How quickly can an organization eradicate the threat and mitigate damage?

Current best practices dictate that a threat should be detected in under 1 minute, investigated completely in less than 10 minutes, and eradicated in less than 60 minutes. Hence the 1-10-60 rule.

At Carbon60, 1-10-60 is our mantra as we assist our clients in upgrading their endpoint protection to the level of efficacy necessary for a remote workforce.

Why Carbon60?
Clients contact us for many different reasons, but the main factor in choosing us as their managed service provider lies in our unparalleled expertise. Whether your organization has recently faced a threat and needs to protect against future breaches (and fast), or you simply do not have the internal resources to provide the protection necessary in 2020, Carbon60 can help. Carbon60’s managed endpoint protection service, powered by CrowdStrike, protects your assets 24×7 no matter where the data resides. Threat hunting technology is combined with next-generation antivirus and endpoint detection to eliminate blind spots that traditional AV software misses.

For the most elusive threats, a team of Carbon60 experts investigate and nullify compromised endpoints on your behalf, preventing lateral spread. We work alongside your team to support the full incident response lifecycle, determining the root cause and corrective actions to ensure your environment is hardened against future business disruption.

To learn more about how Carbon60’s services can assist your organization, reach out to our team today.


[1] CNBC, “Cybercrime Ramps Up Amidst Coronavirus Chaos, Costing Companies Billions”, https://www.cnbc.com/2020/07/29/cybercrime-ramps-up-amid-coronavirus-chaos-costing-companies-billions.html

Cloud, Security, The Carbon60 Blog

Subscribe to receive Carbon60 news

Stay up to date on insights, blog articles, events and services from Carbon60 delivered to your inbox.

Subscribe
Carbon60
  • Cloud Adoption
    • Cloud Readiness Assessment
    • Cloud Migration Services
    • Cloud Launchpad
    • Modernization
    • Cloud Security & Compliance
  • Managed Cloud
    • Managed Private Cloud
    • Managed Public Cloud
    • Cloud Backup
    • Cloud Disaster Recovery
    • Security
    • Applications
  • Industries
    • Financial Services
    • Healthcare
    • Public Sector
    • Technology
Follow us on LinkedIn Follow us on Twitter Follow us on YouTube

© Copyright Carbon60 2023

  • Privacy Policy
  • Terms & Conditions
  • Contact Us