Multi-Factor Authentication in Microsoft 365: What You Need to Know

Multi-Factor Authentication in Microsoft 365: What You Need to Know

Multi-factor authentication (MFA) is a widely accepted security measure, but it is not foolproof. Even when MFA is enabled, organisations can still be vulnerable to attacks if their MFA policies are misconfigured.

Oreta has found that many organisations misconfigure MFA policies in their Microsoft 365 cloud environments. This can allow attackers to bypass MFA and gain unauthorised access to sensitive data.

Here are some of the most common MFA misconfigurations:

  • Enabling MFA for only some users. This leaves users who are not required to use MFA vulnerable to attack.
  • Allowing users to bypass MFA for certain applications or devices. This can make it easier for attackers to gain access to sensitive data.
  • Not enforcing MFA for all sign-in attempts. This can allow attackers to gain access to an account by simply guessing the user’s password.

Organisations should carefully review their MFA policies to ensure that they are properly configured. They should also regularly test their MFA policies to ensure that they are working as intended.

Conditional Access Policies (CAPs) are a powerful tool for controlling access to Microsoft 365 and Azure AD resources. However, CAPs can be complex to configure and manage, and misconfigurations can lead to security vulnerabilities.

We have observed several CAP issues that can be used to bypass MFA. These issues include:

  • Using the wrong conditions in a CAP rule. For example, a CAP rule that only applies to users in the United States could be bypassed by an attacker who logs in from another country.
  • Excluding certain users or devices from a CAP rule. For example, a CAP rule that requires MFA for all users could be bypassed by an attacker who uses a device that is excluded from the rule.
  • Not enforcing MFA for all sign-in attempts. For example, a CAP rule that requires MFA for all sign-in attempts could be bypassed by an attacker who uses a compromised password to log in.

Permitting Mobile Devices

Whether intentional or not, Oreta often finds mobile devices exempted from MFA CAP. This exemption is often made to reduce friction for users who need to check emails or documents on the go. However, the source of a device can be easily spoofed by changing the “User Agent” request. This means that an adversary on a Windows device could pose as an iPhone, bypassing MFA.

To mitigate this risk, it is important to enforce MFA for all users, regardless of the device they are using. Additionally, organisations can implement additional security measures such as Mobile Device Management (MDM) or Mobile Application Management (MAM) compliance.

Unintentionally Permitting Linux Devices

Only relatively recently (Burrage, 2022) has Microsoft added Linux as a device platform for rules to be applied against. Organisations are often surprised to find that Linux has been retroactively applied to rules in the “bypass” state. Review old rules to ensure Linux devices are not granted unexpected additional rights.

Exempted Service Accounts

Service accounts are not designed to interact with users, so they cannot respond to multi-factor authentication (MFA) requests. As a result, administrators often disable MFA for these accounts. However, this can leave them vulnerable to attack.

During penetration tests, Oreta consultants have found service accounts that have been in use since 2010 and have passwords like “Password1.” This is a major security risk.

To mitigate this risk, organisations should use Conditional Access Workload Identities (CAWI) to block untrusted external authentication events for service accounts. CAWI allows organisations to define policies that require service accounts to only authenticate from trusted locations.

In addition, organisations should use a privileged access management (PAM) solution to ensure that service accounts are secure. PAM solutions can help to manage service account passwords, enforce least privilege, and audit access to service accounts.

Opt-In Selective Enforcement

When configuring a conditional access policy (CAP), one of the variables that must be set is “to which groups should this apply to?”. Many organisations have an ALL-STAFF group that new users are added to as part of the onboarding process. This group is then used to enforce MFA for all new users. However, if an old user is not retroactively added to this group, or slips through the onboarding process, they will not be subject to MFA. This leaves these users in a vulnerable state.

To mitigate this risk, MFA enforcement should be set to opt-out by default. This means that all users will be required to use MFA, unless they are explicitly exempted. Any exemptions should be carefully considered and audited.

By setting MFA enforcement to opt-out by default, organisations can help to ensure that all users are protected, regardless of when they joined the organisation.

Exempted Applications

Sometimes, MFA may be implemented for users and devices on a wide scale, but it may not cover all applications within an organisation. Software as a Service (SaaS) applications within a given tenancy can also be subject to exceptions in terms of conditional access policies (CAPs). For instance, one organisation enforced MFA for the Microsoft suite but neglected to include Confluence. Upon closer examination, it was discovered that this Confluence instance contained sensitive information, which allowed Oreta testers to gain remote access to the internal network without MFA. It is essential for organisations to regularly review application exemptions and ensure that users do not store their credentials in easily accessible knowledge bases.

Trusted Locations

Organisations typically have an MFA exemption policy for users originating from “trusted” networks, such as their VPN or offices. However, these network ranges are often broad and sometimes overlap with guest Wi-Fi networks. This creates a potential security vulnerability where threat actors could walk past an office, obtain an authentication token without MFA, and then continue to use that token remotely. To mitigate this risk, it is important to ensure that the designation of “trusted” locations is minimal and that these locations are genuinely trustworthy.

Oreta ran a red team/blue team exercise on a client in the finance industry. In a red /blue team exercise, the red team is made up of offensive security experts who try to attack an organisation’s cybersecurity defences. The blue team defends against and responds to the red team attack. On a red team, Oreta obtained username and password credentials via a password spray. On authenticating to Microsoft 365 it was found that MFA was enforced through the browser. Typically, the tool MFASweep (dafthack, 2022) is executed to find low-hanging fruit in CAPs – by mimicking a mobile device – but this did not result in a bypass on this test. What is important to remember is that CAP is evaluated holistically. Many rules may be evaluated during a given authentication event. As a result, Oreta testers were able to brute-force combinations of known devices, applications, and Microsoft login endpoints to find the combination of CAP to obtain access. Upon authenticating with a Linux user agent and a spoofed “Windows Config Designer” source application ID to the Microsoft Graph API endpoint, the CAP were satisfied and provided the consultant access to the organisations cloud without the need for MFA.

Conclusion

Microsoft Conditional Access Policies, when properly implemented, offer organisations powerful capabilities for granular control and auditing of authentication events, aligning with the principle of defence in depth. However, the complexity of these policies can lead to nested issues that may result in unexpected or unintended outcomes. Conducting a static review of policies is always recommended, but it is also beneficial to evaluate effective policies from an offensive perspective to verify that what is defined in theory aligns with actual practice. When defining Conditional Access Policies, it is important to ensure that they are:

  • Exclusive by default
  • Clear in purpose
  • Properly labelled
  • Consistently applied with minimal exceptions
  • Regularly audited to detect abnormal login flows.

Contact us now to evaluate your MFA policies.

The Importance of Network Services in the Age of Remote Work

The Importance of Network Services in the Age of Remote Work

The landscape of work has undergone a remarkable transformation in recent years, with remote work becoming an integral part of the professional world. This shift has highlighted the crucial role that network services play in ensuring the success and efficiency of remote work setups. As we navigate the complexities of a digital age, the reliability, security, and accessibility of network services have emerged as fundamental pillars supporting the modern workforce.

1. Reliable Connectivity:

In the age of remote work, a stable and high-speed internet connection is no longer a luxury but a necessity. Network services provide the backbone for seamless communication, collaboration, and data sharing. From virtual meetings to cloud-based applications, the ability to connect reliably enables remote employees to perform their tasks without the limitations of traditional office spaces.

2. Enhanced Collaboration:

Collaboration lies at the heart of productive remote work, and network services facilitate this collaboration by enabling real-time communication and sharing of resources. Video conferencing, instant messaging, and file-sharing platforms rely on strong network infrastructure to ensure that team members can work together despite physical distances. The ability to collaborate effectively enhances creativity, innovation, and teamwork, fostering a sense of unity among remote teams.

3. Data Security and Privacy:

With the rise of remote work, concerns about data security and privacy have intensified. Network services play a critical role in safeguarding sensitive information by implementing encryption, firewalls, and other cybersecurity measures. Ensuring that remote employees can securely access company resources, databases, and applications requires a robust network infrastructure that shields against potential cyber threats.

4. Flexibility and Accessibility:

Remote work empowers employees to balance their professional and personal lives, and network services are pivotal in enabling this flexibility. Cloud-based services allow remote workers to access files and applications from any location, making it easier to stay productive while traveling or working from home. The accessibility offered by network services promotes a healthy work-life balance, ultimately leading to increased job satisfaction and employee retention.

5. Scalability and Adaptability:

The demands on network services have evolved rapidly with the surge in remote work. Businesses need network solutions that are scalable and adaptable to accommodate changes in workload and user numbers. The ability to adjust network capacity ensures that remote teams can continue to function optimally, even during peak usage periods. This scalability also future-proofs businesses against evolving technological needs.

6. Challenges and Solutions:

While network services offer immense benefits, they also present challenges. Network outages, bandwidth limitations, and cybersecurity threats can disrupt remote work operations. To mitigate these challenges, businesses must invest in redundant network setups, regular maintenance, and cybersecurity training for employees. Collaboration with reliable network service providers can help address these concerns effectively.

In the age of remote work, network services have proven to be a linchpin for successful and efficient operations. They provide the foundation for reliable connectivity, enhanced collaboration, data security, flexibility, and scalability. As businesses continue to embrace remote work as a permanent part of their operations, the importance of robust and dependable network services cannot be overstated. By recognising and investing in the critical role that network services play, organisations can ensure that their remote teams thrive in an interconnected and digitally empowered world.

The Rising Significance Of Australian Signals Directorate 8 In Cybersecurity

The Rising Significance Of Australian Signals Directorate 8 In Cybersecurity

Frequently, we encounter headlines about yet another organisation succumbing to a cyber-attack. Despite the abundant news coverage and the industry’s clear emphasis on cyber security, 48% of Australian executives still expressed low confidence in their organisation’s capability to subjectively evaluate cyber risks. To enhance your organisation’s cybersecurity stance and shift towards a proactive rather than reactive approach, it is imperative to adopt the ASD Essential 8. By doing so, you can be assured that your confidential data remains secure, and your reputation remains intact.

What is Essential 8?

The Australian Signals Directorate (ASD) Essential 8 is a set of eight security controls that organisations can implement to protect themselves against cyber threats. The Essential 8 was first published in 2016, and it has since become a widely accepted benchmark for cyber security best practices.

The growing importance of the Essential 8 stems from various factors, primarily driven by the rapidly evolving threat landscape. In recent years, attackers have adopted highly sophisticated methods to infiltrate organisations’ systems and compromise data. The ACSC received over 76,000 cybercrime reports, an increase of nearly 13 per cent from the previous financial year. This equates to one report every 7 minutes, compared to every 8 minutes last financial year. In response to these escalating threats, the Essential 8 offers a comprehensive set of controls that empower businesses to effectively counter and mitigate such risks. Consequently, the following reasons highlight why the Essential 8 has emerged as a crucial component in bolstering cybersecurity:

  • Empowers businesses to remain current and proactive in countering emerging threats.
  • Encompasses an extensive array of controls, effectively mitigating diverse security risks.
  • Endorsed by multiple government and industry organizations, lending it unwavering credibility and legitimacy.
  • Effortlessly implementable and maintainable, rendering it an ideal solution for organisations of any scale.

While the Essential 8 does not function as an impenetrable titanium shield and cannot ensure absolute immunity to cyber-attacks for organisations, its implementation can significantly raise the bar for attackers, making their success far more challenging. For those seeking to enhance their organisation’s cyber security posture, the Essential 8 serves as an excellent starting point. By adopting the Essential 8 practices, organisations can substantially bolster their defences against potential attacks.

Implementation of the Essential Eight Maturity Model

The Essential Eight Maturity Model comprises of four maturity levels (0 to 3). The higher levels of maturity protect entities against moderate-to-high degrees of sophistication in adversary tradecraft and targeting. As of July 2022, it is a core requirement of the PSPF that entities implement the Essential Eight strategies to at least Maturity Level 2.

The Essential Eight Maturity Model comprises the following eight strategies:

  • Application control: ensures only corporate approved software applications can be executed on a computer, protecting against the execution of malicious applications.
  • Patch applications: applying vendor patches or other vendor mitigations prevents known vulnerabilities in applications from being exploited.
  • Configure Microsoft Office macro settings: limits macro programs embedded in Microsoft Office files from executing, thereby preventing potential malicious activity.
  • User application hardening: limits the use of potentially exploitable user application functionality to only what is required and removes particularly vulnerable software altogether.
  • Restrict administrative privileges: limits the unnecessary provision of administrative privileges, reducing the potential for these to be exploited by adversaries to gain full access to computers and data.
  • Patch operating systems: applying vendor patches or other vendor mitigations prevents known vulnerabilities in operating systems from being exploited.
  • Multi-factor authentication: requires users to present multiple authentication credentials to log in, rather than just using a passphrase, thereby preventing adversaries logging in as a user if they know the user’s passphrase.
  • Regular backups: making a copy of data, software, and configuration settings, storing it securely and periodically testing the ability to restore it, enables data and computers to be restored after an incident such as ransomware or computer hardware failure.

The Essential Eight Maturity Model recommends that organisations implement the Essential Eight using a risk-based approach. Where the strategies cannot be implemented, these exceptions should be minimised, and compensating controls should be used to manage the resulting risk. If the gap is effectively mitigated, the entity may self-assess their maturity against that strategy.

The Essential 8 is a valuable set of security controls that can help organisations protect themselves against cyber threats. By implementing these controls, organisations can make it much more difficult for attackers to succeed.

If you are interested in learning more about the Essential 8 or would like a no obligation chat contact us now.

Find out more about Oreta’s cybersecurity services here.

How to Choose the Right Cloud Provider for Your Business

How to Choose the Right Cloud Provider for Your Business

Introduction

As a Chief Technology Officer (CTO), the success of your organisation heavily relies on your ability to make informed decisions regarding technology and service providers. Amidst the rapidly evolving landscape of IT solutions, selecting the right service provider has become an intricate and daunting task. The ever-expanding array of options, the fine nuances in offerings, and the criticality of making the right choice make this process akin to navigating a labyrinth.

In this blog post, we will explore the guideline for selecting the ideal cloud provider to suit your business needs. Whether you’re grappling with cloud solutions, software development, cybersecurity, or any other technological facet, join us as we uncover the secrets to effectively discerning the ideal service provider that aligns with your organisation’s unique needs and propels your business towards sustained success.

When choosing the right cloud provider, you should consider the below factors:

Deep Expertise
Scalability Support
Customer Service
Managed Services
Migration Support and Security

Deep Expertise

The mark of an outstanding cloud service provider lies not just in the array of services it offers, but in the depth of its knowledge and expertise. This enables the provider to understand a business’s unique needs, make insightful recommendations, and craft solutions that not only meet current requirements but also align with the future growth trajectory of the business.

According to a Gartner report, almost all legacy applications migrated to public cloud infrastructure as a service (IaaS) will need optimisation to become more cost-effective by 2024. This underscores the critical role of a cloud provider’s expertise in maximising the benefits of cloud solutions.

A cloud provider’s deep expertise is essential for maximising cloud potential while minimising risks and complexities because it allows for:

  • Strategic Alignment: Deep expertise aids in selecting a cloud solution that aligns with your business goals, driving efficiency and innovation.
  • Risk Mitigation: A knowledgeable provider can navigate the complexities of cloud implementation, minimising risks such as operational disruptions and security vulnerabilities.
  • Optimal Resource Utilisation: Expert providers can help identify the cloud services that deliver the most value for your unique needs, ensuring effective resource usage.
  • Futureproofing: An expert provider stays updated with latest trends, helping your business adapt and leverage these advancements, safeguarding your technology investment.
  • Vendor Management: Deep expertise simplifies navigation through the complex cloud ecosystem, ensuring seamless integration between different vendors.

Some pivotal questions to ask your cloud provider about their expertise should include:

  • Can you describe your experience with cloud solutions similar to our needs?
  • What is your process for understanding our business needs and aligning them with the right cloud solution?
  • How do you ensure the solutions you provide are future-proof?
  • Can you explain how you mitigate risks during cloud migration and implementation?
  • What strategies do you employ for optimal resource utilisation in the cloud?
  • Can you share your experience managing multiple vendors in the cloud ecosystem?

Scalability Support

Leveraging cloud technology’s scalability is a crucial strategic advantage, yet executing it effectively demands meticulous planning and execution. True cloud service provider (CSP) focus on crafting a scalable architecture, continuously monitor resource usage, and timely resource augmentation to handle increased traffic. This thorough approach guarantees uninterrupted, high-quality performance, even during rapid business growth, propelling organisations into their digital future.

RightScale’s 2020 State of the Cloud Report shows that 31% of businesses see cloud cost optimisation as a significant challenge when scaling cloud services, emphasising the necessity of professional scalability support.

The quality of scalability support is crucial when selecting a cloud service provider for the following reasons:

  • Future Growth: Scalability support ensures the IT infrastructure grows with the business, accommodating increased traffic, data, and complex applications without performance loss.
  • Cost Efficiency: The elasticity of cloud solutions, allowing resources to scale based on demand, ensures businesses pay only for what they use, optimising IT spending.
  • Performance Maintenance: Scalability support guarantees consistent service to customers, even as the business scales.
  • Innovation Support: Scalability enables quick testing and implementation of new ideas without heavy upfront investment, propelling innovation.

Some pivotal questions to ask your cloud provider about their scalability support should include:

  • How will your cloud solutions adapt to our growing needs, such as increased traffic or data volume?
  • What is your strategy for adding resources to accommodate our business growth?
  • How do you maintain high performance levels as the demands on our cloud resources increase?
  • How does scaling up or down reflect on our billing and overall cloud expenses?
  • Can you provide examples of how you’ve helped other businesses scale their cloud services successfully?

Customer Service

A CSP should place exceptional customer service at the forefront of its operations. This includes offering rapid, professional, and comprehensive support to all clients. A dedicated support team should work diligently to address any issues or queries, ensuring minimal disruption to clients’ operations and maintaining the highest level of customer satisfaction.

According to the Microsoft 2020 State of Global Customer Service report, 58% of customers say customer service is a very important factor when choosing a brand, signifying the vital role of customer service in client decision-making. As Bill Gates once said, “Your most unhappy customers are your greatest source of learning,” emphasising the importance of responsive and effective customer service in any business.

Effective customer service is crucial when selecting a cloud service provider due to the following reasons:

  • Immediate Assistance: In today’s fast-paced digital world, quick resolution of issues is paramount. Good customer service ensures swift and effective responses, minimising potential downtime.
  • Product Understanding: A customer service team with deep product knowledge can guide businesses to better utilise their cloud services, boosting operational efficiency.
  • Relationship Building: Exceptional customer service fosters a strong business relationship, promoting trust and long-term commitment.
  • Issue Prevention: Proactive customer service can identify and rectify potential issues before they escalate, improving overall system reliability.

Some pivotal questions to ask your cloud provider about their customer service should include:

  • What is your support response times, and do you provide 24/7 assistance?
  • How does your team handle issue escalation and resolution?
  • Can you provide specific examples of how your customer service team has gone above and beyond to support a client?
  • How do you gather and incorporate customer feedback into your services and support?

Managed Services – Cloud Operations

An ideal cloud service provider should extend beyond basic cloud platform offerings by providing managed services. These services enhance cloud infrastructure and security, including the management of data, networks, applications, and services. The provider should focus on managing and monitoring these aspects, enabling businesses to focus on their core operations.

According to a report from MarketsandMarkets, the managed services market is expected to grow from USD 223.0 billion in 2020 to USD 329.1 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 8.1% during the forecast period. This data highlights the increasing demand and value businesses place on managed services in the realm of cloud computing.

The inclusion of managed services is vital when choosing a cloud service provider for the following reasons:

  • Operational Efficiency: Managed services allow businesses to concentrate on their core tasks by outsourcing IT management, thus improving productivity.
  • Cost Savings: Managed services can lead to significant cost savings by reducing the need for in-house IT teams and infrastructure.
  • Risk Reduction: With expert handling of IT aspects, managed services help mitigate the risk of data loss, downtime, and cyber threats.
  • Access to Expertise: Managed services bring specialised knowledge and skills, which can lead to better IT decision-making and innovation.

Some pivotal questions to ask your cloud provider about their managed services should include:

  • What managed services do you offer, and how do they enhance the base cloud services?
  • How do your managed services improve operational efficiency and security?
  • Can you provide examples of how your managed services have added value to other businesses?
  • How does your managed services model reflect on our overall cloud expenses?

Migration / Integration Support and Security

The ideal cloud service provider should offer comprehensive support for migrating existing systems to the cloud, integrating cloud resources with existing systems, and ensuring robust security measures. This encompasses planning and executing an efficient migration, ensuring seamless integration with the business’s existing infrastructure, and implementing advanced security protocols to protect the business’s data and applications.

According to a 2020 report by Fortinet, 74% of organisations have moved some applications into the cloud and then moved them back on-premises, indicating the complexities of the migration process. Moreover, a Gartner study found that through 2025, at least 99% of cloud security failures would be the customer’s fault, emphasising the need for expert migration, integration, and security support.

Migration, integration support and security are critical when selecting a cloud service provider for the following reasons:

  • Smooth Transition: Expert support ensures a seamless migration, minimising disruption to business operations.
  • Optimised Performance: Proper integration allows businesses to leverage their cloud services fully, enhancing performance and efficiency.
  • Data Protection: Robust security measures protect sensitive business data from unauthorised access and cyber threats.
  • Risk Reduction: Expert planning and execution of the migration process mitigate risks of data loss or system downtime. Similarly, stringent security measures help prevent potential cyber threats.

Some pivotal questions to ask your cloud provider about their mitigation support and security should include:

  • What is your process for migrating systems to the cloud, and how do you ensure minimal disruption to our operations?
  • How do you ensure seamless integration between the cloud services and our existing systems?
  • What security measures do you have in place to protect our data and applications in the cloud?
  • Can you provide examples of migrations, integrations, and security measures you’ve successfully implemented for other businesses?

Conclusion

Choosing the right cloud service provider is crucial for businesses aiming to maximise cloud potential. An exceptional provider’s deep expertise leads to insightful recommendations and future-proof solutions that align with your goals while minimising risks. Scalability support ensures cost efficiency and high performance during rapid growth, enabling quick implementation of new ideas.

Additionally, outstanding customer service fosters trust and minimizes downtime. Managed services enhance operational efficiency, cut costs, and mitigate risks. Comprehensive support for migration, integration, and security ensures a smooth transition and data protection. By asking pivotal questions, you can partner with the right provider for a successful digital future.

At Oreta, we stand as the premier cloud service provider for businesses in Australia. With our deep expertise, proven track record, and strong partnerships with major cloud platforms, we deliver exceptional solutions tailored to our clients’ unique needs. Our focus on managed security services, compliance assistance, scalability support, transparent pricing, and outstanding customer service is what sets us apart. We ensure seamless migration and integration processes, enabling businesses to unlock the full potential of the cloud. Trust Oreta as your strategic cloud partner and experience the power of cloud technology to drive your business forward.

Contact us now for a no obligation chat.

The Future of ICT Service Operations in 2024: Key Insights and Predictions

The Future of ICT Service Operations in 2024: Key Insights and Predictions

Is your business prepared to deliver and securely manage the rapidly evolving ICT landscape? As we approach 2024, it’s timely to explore the insights and predictions that will shape the future of ICT operations. In this blog, we delve into five key points that highlight the anticipated changes, discuss the origins of these insights, and provide actionable steps for businesses to take advantage of these predictions.

1. The Rise of AI-driven Automation
2. Increased Emphasis on Cybersecurity
3. Accelerated Adoption of Cloud Services
4. Growing Demand for Edge Computing Services
5. Further expansion and adoption of DevOps approach

The Rise of AI-driven Automation

The integration of Artificial Intelligence (AI) into ICT operations will revolutionise the industry. By 2024, AI will become a core component of service delivery, enabling advanced automation, predictive analytics, and proactive problem-solving. This shift will improve operational efficiency, reduce downtime, and enhance overall delivery experience.

This highlights the rapid advancements in AI technology and its successful implementation in various sectors. For instance, companies like Amazon, Google, and Microsoft have already leveraged AI-driven automation in their cloud platforms to optimise resource allocation, security, and performance. The proven benefits of AI in these contexts highlight its potential for driving similar transformation in your ICT operations delivery.

According to Gartner, by 2024, businesses that implement AI in their operations will witness a 30% reduction in IT infrastructure costs. Moreover, a report by Deloitte reveals that companies leveraging AI-driven automation in managed services achieve a 20% increase in customer satisfaction ratings.

To leverage this insight, businesses should look to invest in AI capabilities and expertise. They can embrace AI-powered monitoring tools that provide real-time insights, automate routine tasks, and identify potential issues before they impact operations. By proactively adopting AI-driven automation, businesses can streamline their ICT operations, improve service levels, and enhance customer satisfaction.

The future of ICT operations in 2024 promises ground-breaking transformations through AI-driven automation. By embracing this insight, businesses can gain a competitive edge, improve operational efficiency, and elevate customer experience.

Increased Emphasis on Cybersecurity

As technology continues to advance, so do the threats posed by cybercriminals. In 2024, there will be a heightened focus on cybersecurity within ICT operations. Businesses will further prioritise robust security measures, proactive threat detection, and swift incident response to safeguard their data and infrastructure from evolving cyber threats.

According to Cybersecurity Ventures, cybercrime damages are expected to reach $10.5 trillion annually by 2025, underscoring the critical need for robust cybersecurity measures. Additionally, a study by Accenture revealed that 68% of business leaders believe their cybersecurity risks are increasing.

This prediction arises from the escalating frequency and sophistication of cyber-attacks across industries. High-profile data breaches and ransomware incidents have underscored the critical importance of cybersecurity. The rise of interconnected devices, cloud adoption, and remote work have further amplified the need for robust managed security services.

Businesses should invest in comprehensive cybersecurity solutions and consider partnering with managed service providers (MSPs) that specialise in cybersecurity. Implementing multi-layered defences, conducting regular security assessments, and educating employees on best security practices are crucial steps. Organisations need to adopt a proactive approach to cybersecurity to stay ahead of potential threats in 2024 and beyond.

Accelerated Adoption of Cloud Services

In 2024, businesses will increasingly embrace cloud services to optimise their IT infrastructure and operations. The flexibility, scalability, and cost-efficiency offered by cloud solutions will drive organisations to migrate their applications and data to the cloud. ICT operations and external service providers will play a crucial role in assisting businesses with cloud adoption, migration, and ongoing management.

According to Gartner, by 2024, more than 45% of IT spending on infrastructure, software, and services will shift from traditional solutions to the cloud. Additionally, a study by Flexera revealed that 93% of enterprises have a multi-cloud strategy, highlighting the growing popularity of cloud solutions.

The ongoing shift towards cloud computing and the undeniable benefits it offers in 2024 is causing an accelerated adoption of cloud services. Organisations across industries have experienced the advantages of cloud solutions, such as reduced infrastructure costs, enhanced accessibility, and improved collaboration. As businesses seek to leverage these benefits, the demand for cloud managed services will continue to surge.

To capitalise on this prediction, businesses should assess their existing IT infrastructure and identify suitable applications for cloud migration. They should partner with experienced service providers who can guide them through the entire cloud adoption journey. This includes developing a comprehensive migration strategy, ensuring data security and compliance, and optimising cloud resources for maximum efficiency.

Growing Demand for Edge Computing Services

In 2024, the demand for edge computing services will witness significant growth. With the proliferation of Internet of Things (IoT) devices and the need for real-time data processing, businesses will rely on edge computing to minimise latency and enhance efficiency.

According to IDC, by 2024, over 50% of new enterprise IT infrastructure will be deployed at the edge rather than in traditional data centres. Additionally, Gartner predicts that by 2025, 75% of enterprise-generated data will be processed at the edge. These statistics highlight the growing significance of edge computing in the managed services landscape.

The increase reliance on IoT devices and the need to process data closer to the source is leading to the growing demand for edge computing services. Industries such as manufacturing, healthcare, and retail require low-latency computing capabilities to enable real-time decision-making and reduce dependence on centralised data centres. Edge computing provides a decentralised approach, and its potential benefits have been showcased in various use cases and pilot projects.

To leverage this prediction, businesses should evaluate their data processing needs and identify areas where edge computing can provide significant advantages. They should partner with vendors and / or service providers who possess expertise in edge computing architecture, deployment, and management. By embracing edge computing services, businesses can enhance their operational efficiency, improve customer experience, and gain a competitive edge.

Further adoption of DevOps practices

In 2024, there will be an increasing integration of DevOps principles and practices within ICT operations. Businesses will recognise the value of aligning development and operations teams to drive efficiency, agility, and continuous improvement. Organisations will adopt DevOps methodologies to streamline service delivery, enhance collaboration, and accelerate go to market innovation.

This prediction arises from the growing recognition of DevOps as a transformative approach to software development and operations. DevOps principles, such as automation, continuous integration, and continuous delivery, have proven to optimise workflows, reduce errors, and enhance overall productivity. As businesses seek to achieve faster time-to-market and deliver seamless customer experiences..

According to a survey conducted by Puppet, organisations that have successfully integrated DevOps practices experienced 63% fewer failures and recovered 168 times faster from incidents. Additionally, the State of DevOps report by DORA (DevOps Research and Assessment) found that elite performers in DevOps achieve 208 times more frequent deployments and have a 106 times faster mean time to recover from incidents. These statistics highlight the tangible benefits of adopting DevOps practices.

To take advantage of this prediction, businesses should embrace a DevOps mindset and culture. They should foster collaboration between development and operations teams, automate processes wherever possible, and adopt tools that facilitate seamless integration and continuous delivery. Partnering with managed service providers who have expertise in DevOps practices will further enable organisations to drive efficiency and innovation.

As we approach 2024, the future of ICT operations holds transformations that businesses should consider and evaluate. Oreta is doing the same and already adopting AI-driven automation, to enhance customer experience. Oreta’s expertise in ICT infrastructure, Cloud platforms and ICT operations positions them as trusted partner for businesses seeking to optimise their IT operations.