All Articles
Policies
Digital Edge publishes this policies to make sure everybody get meaningful choices about how and why data is collected and used, and ensuring that you have the information you need to make the choices that are right for you across our products and services.
Digital Edge committed to ISO standards and publishes bridging polciy as well as some other global policies.
ISO 27001-2013 High Level Information Security Policy
Contact Us
If you have any questions or complaints about our policies, write or call our Compliance Team:
Digital Edge Ventures Inc – Compliance Team
7 Teleport Drive Staten Island New York 10311
Call us: 1-718-370-3352
Email us: compliance@digitaledge.net
Security Update Cyber Incident Reporting
Digital Edge’s Security Team assists clients with cyber security forensics and often hears the question – “what is the proper way to report to law enforcements?” As a company, we aim to aid our clients in informing them on the right steps to take when dealing with a cyber-incident. There is a growing number of cyber networks that were seriously attacked and this is not a matter to be taken lightly. This is why Digital Edge feels it is important to know the right procedure. These incidents can result in serious consequences with the capability of causing lasting harm. By reporting these incidents, the government can assist them with agencies that can investigate the incident, lessen the consequences, and help avoid these cyber incidents in the future.
Please click here for more information.
If you feel that you need assistance from the Digital Edge Security team, please contact us at support@DIGITALEDGE.NET or open a ticket through Digital Edge web site at https://www.digitaledge.net.
IMN’s Cloud Service Provider CEO Panel
At The Provider Forum on Data Centers & Cloud Services Infrastructure (East), in Washington DC, on June 9, 2016, Digital Edge’s own, Michael Petrov participated as a panelist for the IMN’s Cloud Service Provider CEO Panel. Michael was proud to be joined by three other top CEO’s in the field, Peter Feldman, CEO of Datagryd, Yan Ness, CEO of Online Tech, and Steven Vincinaza, CEO of Cirrity. This high quality panel was moderated by Kemal Hawa, a Shareholder from Greenberg Traurig, LLP.
The audience was engaged and excited to hears this panels answers to questions like:
- “What are you doing to remain competitive in a market dominated by a few 800 pound gorillas? Are you specializing? Will there continue to be opportunities for mid-market providers? How do you see your business model evolving?”
- “Is a national scale needed today? How are you building out your ecosystem? What are your growth strategies? Where do you see untapped opportunities? What do you look for in a partner?”
- “How are end-user needs/expectations evolving? How are you meeting these? What does it take to stand out from the crowd in Cloud services marketing, sales and delivery today?”
- “Cyber security and risk management: How are you protecting your clients’ data? How are you managing these costs? What is the future of security in the Cloud?”
This panel was a big success! Great Job Mike!
Security Update: Was TeamViewer Hacked? Digital Edge Believes it was a Backdoor Dropped by Trojan.MulDrop6.39120
Digital Edge’s Security Team is monitoring the situation with TeamViewer hacking allegations. The news broke last week – some TeamViewer users complained that intruders gained access to their computers through TeamViewer program.
TeamViewer denied any hacking allegations but shortly following, its service was knocked off by a DDoS attack aiming DNS services, leaving more questions to TeamViewer’s Security Team.
1. Even though the situation is still not clear, the Digital Edge Security Team sides with security expects blaming a BackDoor Trojan discovered in May of 2016. The signature for the Trojan was added on 05/26/2016. The version of Trojan - BackDoor.TeamViewer.49 utilizes TeamViewer as its backdoor implementation and is delivered by Trojan.MulDrop6.39120 through Adobe vulnerability. Even though the Trojan is supposed to hide the TeamViewer interface and use its functions in the background, we believe that mutation of the virus (the virus uses advanced hiding techniques) can create an unpredicted effect on the systems with legitimately installed TeamViewer causing effect described by users that reported the compromise.
Please click here for more details.
As a result, we do believe that it is safe to use TeamViewer, unless your system does not have updated antivirus and does not have all latest patches installed. By saying that, the Digital Edge team urges to cautiously use this product, as there is no confirmation from TeamViewer’s Security Team or reputable security companies that our analysis is correct
2. Digital Edge security team has contacted all clients using TeamViewer and discussed preventive measures.
3. If you are using TeamViewer please click here to see our advice how to verify that your TeamViewer was not hacked.
If you feel that you need assistance from the Digital Edge Security team please contact Danielle Saladis at dsaladis@DIGITALEDGE.NET.
Digital Edge is committed to providing the highest levels of security within all the IT infrastructure environments under its care. In order to achieve this utmost goal for all of our clients, we continuously maintain vigilance both on the productive side of IT as well as on its destructive side. We thus send out news and security bulletins such as this one from time to time to ensure that our clients are informed and educated on any important developments in IT security and are fully aware of what we are doing to ensure that we and our clients are always at the Cutting and at the Digital Edge of technology.
DE Reviews: Verizon Security Breach Report
Digital Edge reviews Verizon’s 2016 Security Breach Report, this report partners with companies in order to provide the public with critical security information. This Security Breach Report includes the number of security breaches, the types of attaches, as well as successful attacks.
Digital Edge Case Study: Exchange Infrastructure as a Service
Digital Edge builds Infrastructure as a Service (IaaS) solutions based on our close relationships with our hardware and software manufacturing partners. The IaaS based Exchange infrastructure utilizing Fortinet product stack is outlined in this document.
The Cloud Revolution: What is the Next Step?
Are we done with the cloud revolution? Is the crusade against hardware over? Was getting rid of the hardware from our closets the final goal? Right, the cloud movement started with the goal to free up IT departments from the subject that is universally hated – hardware related headaches, from renewals, end of lives, end of supports, those sticky VARs, capital investment, to the constant feeling that when you invest capital into your new hardware that you are losing 10-20% of your money’s value right away. This feeling is comparable to the notion of buying a new car and driving out of the dealership – the car is now not worth that same as when you signed the contract, minutes before.
Security Updates For April
For the past few months, the security community did not surprise its audience with anything interesting, but this week there have been a few updates worth to share:
- The administrative web services interface in Juniper ScreenOS before 6.3.0r21 allows remote attackers to cause a denial of service (reboot) via a crafted SSL packet. There are more denial types of vulnerabilities found in Juniper software.
- Multiple gnu_glibc libraries vulnerabilities potentially exposing threat to cause denial of service were discovered.
- The most interesting is Xen overflow vulnerability. This vulnerability allows guest to corrupt physical host. Those type of vulnerabilities are troubling security professionals, showing that information technology should not blindly trust virtualization encapsulation.
All Digital Edge managed or co-managed clients will be patched according to individual schedules.
If you feel that you need assistance from the Digital Edge Security team please contact Danielle Saladis at dsaladis@DIGITALEDGE.NET.
Please click here for more information.
Digital Edge is committed to providing the highest levels of security within all the IT infrastructure environments under its care. In order to achieve this utmost goal for all of our clients, we continuously maintain vigilance both on the productive side of IT as well as on its destructive side. We thus send out news and security bulletins such as this one from time to time to ensure that our clients are informed and educated on any important developments in IT security and are fully aware of what we are doing to ensure that we and our clients are always at the Cutting and at the Digital Edge of technology.
Cyber Security Attack Vectors and Classification
Digital Edge has decided to simply classified types of attacks, so that when we discuss tools and vectors we will refer this document.
1. Frontal Assault
1.a - Code Tampering: This type of attacks are conducted from outside of a client's, by probing open ports and trying to force the code behind those ports to do unwanted actions, allowing hackers either remote execution, illegal upload with further execution, or system crash.
1.b - Brute Force: An attacker uses techniques that are trying multiple combinations of passwords and keys trying to pick correct combination.
1.c - Denial Attack: When an attacker creates either a large number of requests or specifically crafted requests or both at the same time to cause a client's system to stop responding.
1.d - Floods: An attacker creates large amount of traffic, produced by hacker's controlled infected machines - "bots or zombies" to simply overflow capacities of the client networks or their ISPs.
2. Internal Assaults
2.a - Browser Scripting Attacks: During this attack, a hacker is convincing a user to go to a malicious website. Such website has a java or other scripting code that cause client's browser to perform unwanted actions, infect the computer, download unwanted software, etc.
2.b - Email Attacks: During this attack, a hacker tricks a user to open an attachment that has a code that causes the opening program such as MS Office, Adobe PDF viewer, etc. to perform unwanted actions, such as infect the computer, download unwanted software etc.
2.c - Removable Media Attacks: This attack is conducted through an infected removable media. A USB memory card may have a malicious software that is executed when the storage is attached to the client's computer.
2.d - BOYD Device Attack: A hacker would be able to infect client's personal desktop or personal phone and wait for when the user will bring it to the office. The infected "own" device can spread infection inside the local network.
In the future, the Digital Edge Security Team will publish Security Solutions Reviews which will always refer to this classification, specifying which security challenge the solution is supposed to solve.
Evolve: Evolution of the Data Center
On Tuesday, April 5, Digital Edge was pleased to be a Premier Sponsor of Evolve: Evolution of the Data Center, a networking event focused on discussing IT Solutions that can improve efficiencies of the data center and the B2B environment. As our industry rapidly evolves, there was packed house at the iconic Monarch Rooftop Lounge in Manhattan gathered together to exchange knowledge and network.
As a top-tier, Enterprise Cloud Solution Provider, Digital Edge’s CEO, Michael Petrov gave a crowd pleasing presentation on the price efficiency of Managed Enterprise Cloud Solutions vs. Unmanaged Public Cloud. If you want to check Digital Edge’s Cloud Price Assessment tool, please click here! Additionally, if you have an RFP or a project and want us to participate in the conversation, please click here.
Together with our partners, Telehouse, Fujitsu, Huawei, and PSSC Labs, Digital Edge was proud to have hosted the “must attend” event of the spring, while gaining and sharing insights and building relationships with colleagues, clients, partners, prospects, and friends. Thank you all to attended and Digital Edge looks forward to seeing you again soon! Check out our photos from the night here!