Archive for the ‘qubenews’ Category

Someone Gives a Damn – Qube Does!

Thursday, January 5th, 2017

Qube donates over a thousand gifts to show those that find this time of year lonely and difficult that ‘Someone Gives a Damn’ our Christmas charity project.

Qube MS translate and “Humanise” all aspects of Computing. Our technical champions de-mystify technology both in and out of the Cloud.  We enable you to orchestrate your entire technology lifecycle by deploying your infrastructure of choice, with the service provider of your choice.  Keeping true to our company ethos we extended our ‘human’ side and donated 1,000+ gifts to worthy causes and local charities.  Originally set up by Polly Arrowsmith, CEO, the ‘Someone Gives a Damn’ project is now fully supported by all staff who are aware and want to do their bit for those that can find the festive season a very lonely and difficult time.

Although we still have a few donations left to give, so far the ‘Someone Gives a Damn’ project has delivered beautifully presented hand wrapped gifts to many London charities and worthy causes including a woman’s refuge, children’s charities, OAP Christmas parties, plus mental health and homeless charities.

Although we are unable to wave a magic wand, we hope that, by donating and hand delivering gifts we let those less fortunate that someone does care and make Christmas that little bit more bearable for them.

The story behind ‘Someone Gives a Damn’

When Polly was 9, her mother travelled back to her family home in Lapland and unfortunately, had a car crash.  This resulted in the family unable to spend Christmas together and the box of presents her mother sent didn’t arrive in time.

Polly recalls “My father took my sister and I to stay with family and friends, however, Christmas morning proved even more difficult as not only was my mother not there our relatives opened a huge pile of presents, whilst my sister and I unwrapped a box of chocolates, only to have the family dog eat them later.   I know this sounds like the script for a new Christmas film but the experience made me realise that not everyone has the idealistic family Christmas portrayed on the TV. So when I was able to I personally started to donate and volunteer to help worthy causes and charities.”

Having shared her story with the rest of the team it was clear Polly wasn’t alone in wanting to help, and now because we care Qube staff regularly volunteer at events, charities, wrap or donate.

Do you know of a London Charity worthy of a donation?

As a business we believe in putting our customers needs first and this project is no different, and so, for this year we’d like to increase the reach of our ‘Someone Gives a Damn’ project. However, disappointingly we had a number of no responses or a denial of donation due to policies, but as it’s not in our nature to give up we’d like to invite you to send details of why your nominated worthy cause or London Charity should be be considered for donations of toys, toiletries and chocolates this year to someonegivesadamn@qubems.com

About Qube Managed Services

Qube Managed Services has been successfully addressing Customers service requirements since 2001, building up a vast amount of knowledge and experience. Our core competencies and focus have always been reliability, high quality offerings and excellent technical service to our clients. Qube are small enough to care for any size of customer and service, but large enough to rely on. Qube serve as the backbone for all your cloud computing products and services. Incorporating technology vendors and solutions, allowing an organisation to build, deploy, integrate and deliver their choice of traditional and cloud computing solutions.

Qube MS translate and “Humanise” all aspects of Computing. Our technical champions de-mystify technology both in and out of the cloud, enabling you to orchestrate your entire technology lifecycle by deploying your infrastructure of choice, on the service provider of your choice, all while managing, monitoring, scaling and healing everything in the same place.

Someone Gives a Damn – Qube Does!

Wednesday, December 21st, 2016

Press Release

16th December 2016

Someone Gives a Damn – Qube Does!

 

Qube donates hundred’s of gifts to show those that find this time of year lonely and difficult that ‘Someone Gives a Damn’ their Christmas charity project

Qube MS translate and “Humanise” all aspects of Computing. Our technical champions de-mystify technology both in and out of the cloud, enabling you to orchestrate your entire technology lifecycle by deploying your infrastructure of choice, on the service provider of your choice.  Keeping true to the company ethos Qube show their ‘human’ side and donate hundred’s of gifts to worthy causes and charities.

Originally set up by Polly Arrowsmith, CEO, Qube Managed Services the ‘Someone Gives a Damn’ project is now fully supported by employees who understand what it’s like to not have much at Christmas and what a lonely time of year for many this can be.

So far, Someone Gives a Damn has delivered hand wrapped gifts all beautifully presented to over 8 charities, including a woman’s refuge, 2 children’s charities, 2 OAP Christmas parties, plus mental health and homeless charities.

Although Qube is unable to wave a magic wand, it hopes that, by donating and hand delivering over 700 gifts to 12 London based charities it shows someone cares and to make Christmas that little bit more bearable.

 

Is your charity worthy of a donation?

Polly has been showing the true meaning of Secret Santa for many years and donating on an individual basis for many years and decided to increase the reach this year.  However, surprisingly and disappointingly Qube have had either no response or a denial of donations from their offer of donations due to policies.  As it’s not in their nature to give up they are inviting you to send details of why your worthy cause or London Charity would like to be considered for donations of toys, toiletries and chocolates, contact Someonegivesadamn@qubems.com .  And the gifts will be delivered before Christmas.

 

The story behind ‘Someone Gives a Damn’

When Polly was 9, her mother travelled back to her family home in Lapland and unfortunately, had a car crash.  This resulted in the family being unable to spend Christmas together and the box of presents her mother sent for the family didn’t arrive in time.

Polly recalls “My father drove my sister and I from Aberdeen to Cardiff so we could spend Christmas with family and friends. However, Christmas morning proved to be even more difficult as not only was my mother not there we watched relatives open huge pile of presents, whilst my sister and I received a box of Milk Tray each only to have the family dog eat them later.   I know this sounds like the script for a Christmas film it left a real mark on me and made me realize not all children and adults celebrate the idealistic family Christmas portrayed on the TV. So when I was able to I’ve regularly personally donated and volunteered time to help worthy causes and charities.”

Having shared her story with colleagues at Qube MS it became very clear that Polly wasn’t alone in wanting to help in some shape or form, whether it be time off work and volunteer at events or charities or wrapping or donating gifts.

 

About Qube Managed Services

Qube Managed Services has been successfully addressing Customers service requirements since 2001, building up a vast amount of knowledge and experience. Our core competencies and focus have always been reliability, high quality offerings and excellent technical service to our clients. Qube are small enough to care for any size of customer and service, but large enough to rely on. Qube serve as the backbone for all your cloud computing products and services. Incorporating technology vendors and solutions, allowing an organization to build, deploy, integrate and deliver their choice of traditional and cloud computing solutions.

Qube MS translate and “Humanise” all aspects of Computing. Our technical champions de-mystify technology both in and out of the cloud, enabling you to orchestrate your entire technology lifecycle by deploying your infrastructure of choice, on the service provider of your choice, all while managing, monitoring, scaling and healing everything in the same place.

www.qubems.com

Contact: Marketing@qubems.com

Telephone: 020 7150 3800

Qube Managed Services Limited achieves ISO/IEC 27001:2013 re-certification

Thursday, February 18th, 2016

Qube Managed Services delivers “independently verified” dedicated, personalised business critical application support throughout the Co-location, Cloud, Managed Hosting and Hybrid journey. We are  proud to announce our re-certification to the ISO 27001:2013 Information Security standard for a further 3 years.
Since first achieving ISO27001 accreditation in 2013, we have continually monitored and improved our Information Security Management System (ISMS). We have a structured approach to Information Security which ensures the Confidentiality, Integrity and Availability of customers and partner’s information.

ISO/IEC 27001 is the leading standard for information security management. It has been implemented by public and commercial organisations and provides the framework for creating, monitoring and improving an Information Security Management System (ISMS). An ISMS is a framework of policies and procedures that include all legal, physical and technical controls in our Information Risk Management process.

Simon Neal, CSMO at Qube commented: “Independent Certification by The British Standards Institution, reinforces Qube’s commitment and ability to deliver such a secure offering and is fundamental for every aspect of our services. Our ISO 27001 certification gives our clients the confidence in the physical and digital security of their data, while our highly secure DDoS and threat Intelligence tools protects and identify threats before they infiltrate our Co-location and Cloud customers data, systems and network”.
For more information visit www.qubems.com

June 2015 – Qube Ranked #1 on Netcraft Again!

Friday, July 3rd, 2015

Netcraft independently measures and makes available the response times of leading worldwide hosting providers’ sites. The performance measurements are made at fifteen minute intervals from separate points around the internet, and averages are calculated over the immediately preceding 24 hour period.

Qube has now been ranked #1 by Netcraft 14 times since recording started in April 2010.

Netcraft stated: Qube Managed Services had the most reliable website during June, responding successfully to all of Netcraft’s requests. This is Qube’s fourth appearance in the top ten in 2015, continuing its strong showing from 2014 when it placed in the top ten in eleven months, and came first on four occasions. Qube is based in London and offers managed private cloud hosting services from datacentres in London, New York and Zurich.”

6 Truly Shocking Cyber Security Statistics

Tuesday, June 30th, 2015

Written by Peter Glock for IT Governance:

We’re now halfway through the year, so I thought I’d take a look back at some of the most shocking cyber security statistics so far.

Shocking cyber security stats

  1. 98% of tested web apps are vulnerable to attack

Trustwave’s 2015 Global Security Report found that a staggering 98% of tested web applications were vulnerable to attack. Web apps are everywhere now, and it is essential that updates and patches are installed so that known vulnerabilities are addressed.

  1. 90% of large organisations reported suffering a security breach

The Department of Business, Innovation & Skills’ 2015 Information Security Breaches Survey was published at the beginning of June and was stuffed full of disturbing statistics. The report highlights how cyber attacks affect nearly every organisation, with 90% of large and 74% small organisations suffering a breach in 2014.

  1. 75% of directors are not involved in the review of cyber security risks

We’ve written about this story a few times this year. Research undertaken by PwC for their 2015 Global State of the Information Security Survey found that only 25% of directors are actively involved in reviewing security and privacy risks. Shocking behaviour.

  1. 93% of DPA breaches are caused by human error

People: the weakest link in the cyber security chain. The Information Commissioner’s Office reported that 93% of incidents it investigated in Q4 of 2014-15 were caused by human error.

  1. Online banking fraud increases 48% year-on-year

Figures published in the first quarter of 2015 by Financial Fraud Action UK (FFA UK) found that losses from online banking fraud rose by 48% in 2014, costing £60.4 million. It identified a total of 53,192 individual incidents.

According to the FFA, “A key driver behind increasing levels of fraud continues to be fraudsters tricking customers into revealing personal and financial information, normally over the telephone.”

  1. 144% increase in successful cyber attacks on businesses

CYREN’s 2015 Cyberthreat Yearbook report begins “Enterprises of all sizes are now besieged by cybercrime at an alarming rate”. It found that successful cyber attacks on businesses of all sizes increased by 144% over a four-year period, adding further weight to the argument that organisations should now aim for cyber resilience: the ability to not only repel but also respond to a cyber attack.

 

More SaaS to Meet Demand – Securing Business Futures

Wednesday, June 24th, 2015

Written by Jill Kyte for Cloud Passage:

Businesses face a massive amount of pressure to stay competitive in their markets. Stakeholders, both internal policy-makers and external consumers demand speed, reliability, and convenience. Will SaaS save the day?

Consumers have become accustomed to personalized real-time engagements with businesses. Competitors are looking at ways to provide better availability, cost savings, innovations, greater efficiencies and an ability to scale as they grow. What are the biggest factors fueling this agility? Cloud adoption and SaaS offerings. In today’s market, operating without considering the cloud comprises significant disadvantages.

As businesses adapt to the changing landscape, they find themselves looking for ways to transform their products and services to fit their consumers and end-users’ expectations. Consumers embody a certain type of stubbornness, demanding to have it ‘their way,’ causing businesses to move themselves away from traditional infrastructures, and premise based applications and security. They are moving quickly into the cloud and developing or utilizing more SaaS applications to take advantage of a way to adapt and create the end-user experience in a timely manner that will work for the demands of their individualized business. 

SaaS Adoption to Meet Business Demands

To keep up with this ever-moving market, companies without the cloud, perhaps unsurprisingly, are looking to adapt it quickly. Cloud and SaaS adoption is critical for businesses to stay ahead — one where the dangers of rapid adoption take second place to the dangers of not participating. This market, according to The Financial Times, is expected to reach $290 billion by 2018.

There may be another factor at play, however. IBM recently reported three interesting trends in how tech employees are moving in response to cloud and SaaS adoption. The company found that roughly 85 percent of all new software is being built for the cloud; 72 percent of developers are creating applications designed for the cloud and, by 2016, it estimates that roughly one-fourth of the world’s applications will be available on the cloud. The cloud is clearly the popular choice!

Those factors may explain why companies are placing a high priority on SaaS. In fact, researchers estimate that cloud computing will become the dominant technology model within the next 10 to 15 years, replacing traditional data centers. There is a sense of urgency to stay ahead, and SaaS adoption is the perfect tool to achieve success.

However, there is still the realistic fact that customer and business security and compliance concerns can make or break the success of a SaaS solution.

Security Purpose-Built for the Cloud

Employing a security solution that is purpose-built for the cloud is necessary. It deploys rapidly and scales with business growth. It also protects cloud instances in real-time as they are added and dismissed, and it automates standard security procedures faster than any IT team could possibly manage. SaaS providers and businesses looking for a security solution should feel a sense of ease as they discover CloudPassage Halo, our premier security automation platform. Halo deploys within minutes and scales with the needs of the business.

As we recently outlined in our white paper, “Automating Security for Greater SaaS Success,” companies should not only be conscious of how they are changing their business applications but also be aware that this action can be a catalyst to move to a security approach that will not cause friction in cloud environments, allowing security policies and requirements to easily adapt to the needs of fast-moving markets. As the research continues to show the value of cloud adoption, it becomes increasingly more important for businesses to adequately secure themselves and find protection solutions that will harmonize with their objectives by making it faster and easier to reach new audiences.

Closing the gaps in EU cyber security

Tuesday, June 23rd, 2015

Written by Thomas Boué for Computer Weekly:

Inconsistent approaches to cyber security across Europe are undermining attempts to harmonise policy and preparedness in the EU

 

Bolstering cyber security is a challenge facing boardrooms and government officials around the world. While technology is enabling us to be smarter about how we communicate, create and solve problems, it has also introduced risks that must be managed.

European officials, including representatives from the UK, are closing in on negotiations for an EU Network and Information Security (NIS) Directive, which is the EU’s first attempt at crafting cyber security legislation.

The NIS Directive is aimed at harmonising cyber security laws and improving pan-European co-ordination on cyber security incidents. This is no small feat when brokering an agreement among 28 countries. A recent analysis from the Business Software Alliance (BSA) charts just how big a task officials have before them.

The BSA EU Cyber Security Dashboard examines national cyber security laws and policies across the EU, and finds an unhelpful patchwork exists when it comes to cyber preparedness. While some countries have strong cyber security legal frameworks – the UK, Germany and Estonia, for example – others still have much work to do.

There are also considerable discrepancies between countries’ operational capabilities when it comes to cyber threats. The result is gaps and fragmentation that put the entire European market at risk.

Encouragingly, most countries recognise cyber security should be a national priority, with a particular focus on ensuring the cyber resilience of critical infrastructure. Truly critical services, such as transport, energy and banking, are where disruption from cyber incidents could do the most harm.

Yet, more than half of EU member states have yet to go through the process of assessing and establishing priorities for providers of critical services and infrastructure.

Lack of co-operation

Among other gaps the report highlights is a lack of co-operation between governments and the private sector on cyber security. This issue was similarly called out by US president Barack Obama in February 2015, when he signed an executive order aimed at encouraging better information sharing between US public and private sectors about cyber attacks.

Likewise in Europe, most infrastructure is owned by the private sector, making public-private co-operation essential. Yet only a handful of European countries have an established framework for public-private partnerships on cyber security. The more communication and co-ordination taking place between EU, national governments and the private sector, the more resilient all of us will be in the face of evolving cyber security threats.There are fundamental elements of a strong legal cyber security framework. These range from establishing strong legal foundations and a comprehensive and regularly updated cyber security strategy, to engendering trust, working in partnership and promoting cyber security education. These building blocks provide valuable guidance for national governments that are ultimately responsible for implementing cyber security rules and policies.

Protectionist rules

But there are also worrying developments around the world, as some governments use cyber security as justification for protectionist rules that reduce choice and undermine cyber protections.

Policymakers should avoid country-specific cyber security standards, obligations to disclose sensitive information, such as source code or encryption keys, data localisation requirements, or preferences for indigenous providers, among other unhelpful policies. Such policies undercut cyber security rather than improving it. They also impose unfair market access barriers on global producers and service providers, whether intended or not.

As the UK and other EU member states attempt to complete work on the NIS Directive and agree on common language with the European Parliament and the European Commission over the coming months, harmonisation should be top of mind.

The aim of the directive should be to establish a foundation of cyber security preparedness, with harmonised rules grounded in a risk-based approach and focused on providers of truly critical infrastructure and services.

Cyber threats take no notice of national borders. The sooner we raise the level of cyber resilience across all EU member states – particularly for Europe’s most critical infrastructure – the closer we’ll be to securing our governments, citizens and businesses against malicious cyber attacks. We’re much stronger if we’re in it together.

CIF: Server 2003 death to breathe life into cloud

Friday, June 19th, 2015

Written by Hannah Breeze for CRN:

Cloud Industry Forum claims almost 80 per cent of firms use at least two cloud services

 

The Cloud Industry Forum (CIF) predicts the end of support for Windows Server 2003 will boost the already booming cloud industry in the UK.

According to its latest research, 78 per cent of the 250 senior IT and business decision makers it surveyed have formally adopted two or more cloud services, and the adoption rate for cloud in the UK stands at 84 per cent. When the survey was first carried out in 2010, the adoption rate was just 48 per cent.

Half of all respondents to the survey, which was performed in February, expect to move their entire IT estate to cloud in the future, with 16 per cent claiming they want to do this as soon as practically possible.

CIF chief executive Alex Hilton said cloud is on the up.

“Cloud computing has come a long way in just a few short years,” he said. “[Since 2010] cloud has moved from the edge of the IT estate to its centre, and it is now largely regarded as just another way that we do IT.”

Last week, reseller Annodata said the government IT framework G-Cloud would likely surge in popularity as Windows Server 2003 came to the end of support this July. CIF’s Hilton said the entire cloud industry would benefit.

Hilton agreed. “Looking to the year ahead, we have every confidence that the cloud’s momentum will be maintained, helped in no small part by the retirement of Microsoft Windows Server 2003 and Microsoft Small Business Server 200,” he said.

“While first-time adoption is likely to slow somewhat, penetration of cloud services within organisations, which appears to be happening at a faster rate than we had anticipated, will continue unencumbered. Assuming, that is, that cloud service providers can effectively put forward the business case for adoption and build further confidence among end users by improving levels of accountability, capability and transparency.”

Growing cyber threats challenging cost reduction as reason to use managed services

Thursday, June 18th, 2015

Written by Karl Flinders for Computer Weekly:

Mid-sized companies plan to use more managed services and many see it as improving security

Over a third of IT operations at mid-sized companies will move to an outsourced managed service over the next five years, as IT directors seek security as well as cost reductions.

Outsourcing to save money is still the main motivation for taking up a managed service, but businesses that lack huge IT resources and struggle to keep up with the changing cyber crime landscape are increasingly outsourcing for security.

A survey carried out by Vanson Bourne for communications supplier Daisy found companies are planning to move 37% of their IT to a managed service over the next five years. A total of 67% said this is to reduce costs, and 55% said growing cyber threats are driving them to outsource security.

The other main reasons to move to managed services include the desire to gain organisational agility (50%) and a drive to optimise existing IT resources (40%).

“The combined business objectives of cost reduction and the insatiable desire to accelerate innovation mean the adoption of an IT managed service is becoming an increasingly attractive proposition for many organisations,” said Andy Bevan, director of client solutions at Daisy Corporate Services.

“At the same time, the risk of cyber attack – growing significantly and visibly over recent years – has prompted an increasingly stringent regulatory environment for all sectors, forcing organisations to jump through far more compliance hoops.

“As a result, many businesses are now finding it is easier, and significantly more cost-effective, to outsource their security management to a service provider with the certifications and expertise necessary to tackle the rapidly changing threat landscape to protect their data, customers and reputation,” added Bevan.

While big companies with large IT teams and IT budgets might see the outsourcing of security as a step too far, small and mid-sized firms feel safer if supported by experts.

Mark Lewis, outsourcing lawyer at Berwin Leighton Paisner, said cost has always been a part of any outsourcing decision, but security is an increasingly influential factor.

“The complexity of managing and keeping up to date with cyber threats is leading smaller companies, and those not regulated to outsource,” he said, adding that it remains to be seen whether this is the right decision.

DDoS attacks on sale for $2 an hour

Wednesday, June 17th, 2015

Written by Doug Woodburn for CRN:

Cybercriminals can now purchase DDoS attacks for $2 (£1.32) an hour from a rampant online marketplace of tools and services.

That is according to a new white paper analysing the growth of the “as-a-service” nature of cybercrime penned by two senior technical bods at security vendor McAfee.

The study seeks to shatter the perception that all cybercriminals are technical masterminds. Instead, all they need to bring a global corporation of their choosing to its knees is a credit card.
“We are witnessing the emergence of a whole new breed of cybercriminal. As a result, the volume of cyberattacks is likely to increase…” said report authors Raj Samani, vice president and chief technology officer EMEA and Francois Paget, senior threat research engineer at McAfee.

The study highlighted a service offering to launch a DDoS attack on behalf of would-be attackers from as little as $2 per hour, for a one- to four-hour attack. A DDoS attack lasting five to 24 hours was priced at $4 an hour, with a 24- to 72-hour attack costing $5 an hour.

The service simply required attackers to inform it of which site they wish to launch a DDos attack against, decide how much they are willing to pay, and initiate the service. The service also earnestly admitted that it does not offer refunds “due to the nature of our business”.

“What may surprise many of us is the low cost of the service,” Samani and Paget wrote. “This may demystify the sophisticated portrayal of today’s hacker.”

This is just one example of a vast array of services and tools that make up a tumescent online marketplace wannabe cybercriminals can use to gather components of a cyberattack – or outsource the process altogether, the study found.

Prospective attackers can use the marketplace to procure stolen credit card numbers and online banking login information. In the US, the credit card number of a Visa Gold/Premier credit card will fetch $25. This figure rises to $100 if a PIN is supplied and $200 with a PIN and good balance. An AMEX Gold card with the credit card number alone goes for $50.

Stolen bank login information commands a higher price than credit card numbers, with prices ranging from two to 10 per cent of the account’s balance.

Exploits can be purchased to take advantage of vulnerabilities, but they can also be rented. The CritX toolkit, for instance, charges by the day and recently advertised for $150 a day, Mcafee said. Meanwhile, so-called “bulletproof” hosting providers – firms which knowingly provide web or domain hosting to cybercriminals – can charge between $50 and $400 for their services per month.

Troels Oerting, head of EC3 European Cybercrime Centre – who wrote the white paper’s foreword, said: “Today’s cybercriminals do not necessarily require considerable technical expertise to get the job done, nor, in certain cases, do they even need to own a computer. All they need is a credit card.

“A marketplace offering cybercrime tools and services provides would-be criminals with an arsenal that can either be used as a component of a cyberattack or a handy way of outsourcing the process entirely.”