1 / 20

Qubic Group PLC - Comprehensive Cloud Voice and Data Services

Qubic Group PLC is a specialist voice and data integrator, offering a diverse range of enterprise-grade cloud voice and data services, infrastructure and desktop support, and on-premise to cloud migration management. With highly trained staff and a proven track record of sales revenue growth, Qubic Group is a trusted provider for businesses in the UK and abroad.

schaff
Download Presentation

Qubic Group PLC - Comprehensive Cloud Voice and Data Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of Qubic Group plc

  2. Brief company overview • Formed in 1995 as a specialist voice and data integrator • Headquartered in St. Albans • Sales revenue growth in excess of 30% in last 2 years • Supporting multiple sites across the UK and abroad • Diverse client list of Public and Private Sector clients • Highly trained staff • Think Nexus, a range of enterprise grade cloud voice and data services as well as infrastructure and desktop support • Management and coordination of on-premise to cloud migration

  3. Think Nexus end-user provision • Computing • Telephony • Connectivity • Cybersecurity • Continuity • Support • Professional Services

  4. Comprehensive continuity and disaster recovery planning • Develop high-availability designs through distributed Qubic Core Nexus • Proactive system monitoring with enforced patching and upgrade protocols • Provision of back-up circuits from multiple Tier 1 connectivity providers • Automated, incremental back-up regime to provide a clean restore point • High availability SIP trunks and non-geographic numbering for telephony resilience

  5. NOC providing 24/7 remote monitoring and fix • Published SLAs – different response times from immediate to eight working-hours depending on the impact on the operation • Service availability; • Working Hours (9 to 5) • Extended Hours (8 to 8) • Round the Clock (24/7) • Remote diagnosis and fix, telephone helpdesk or onsite visits as required • Regular scheduled on-site engineering days if required

  6. Accreditations

  7. Case Study – Summary • Zero days malware attack • In excess of 1million turnover lost per day (total 4 days) • Manufacturer – reliant on machinery connected to the IT network (specialised printers for example) • At the time a potential customer who asked Qubic to come in having lost faith in their current IT provider • Only a signature based antivirus deployed • No asset inventory or cyber attack plan/ response

  8. Case Study – Details • 800 endpoints (desktops, laptops, servers, printers) • Windows 2003 servers with security flaws • Specialised printers used for high level design work • No patch management or schedule • No cyber awareness training provided to staff • Entire business has been shutdown and unable to work • Small in house IT team were unable to resolve as the current anti virus could not detect and remove the malware

  9. Case Study – Virus Context • Zero-day malware is a specific kind of malicious software that has only recently been discovered. In general, a zero-day phenomenon is one that is not previously known about or anticipated. • Virus name – Emotet, Qakbot, Trickbot • Contains the capability to harvest and exfiltrate sensitive information

  10. Case Study - First approach • Quarantine a small number of servers to learn about the virus and work on a solution • Contact our anti malware support team to find a virus definition and correct deployment method • Ask the internal IT team to make a list of high priority critical services that need to be restored first (asset register)

  11. Case Study – Remediation • Disconnect all endpoints from the network – resulted in a complete shutdown of the business. • Install anti malware console and push out a group policy to ensure all endpoints were reconnected to the network • Commenced cleaning of all workstations • Restore critical systems according to priority list • Patched windows severs to latest updates

  12. Case Study – Support • Qubic engineers remained on site to ensure no further infections or replication onto any remote systems • Due to the level of attack and type of virus all users were forced to change passwords and a stronger password policy was deployed • Communication with board and key stakeholders to provide details of actions and recommendations

  13. Case Study – Results • Qubic now manage patching and support • Professional services provided to ensure Business Continuity • Prevention options (multi layer approach) • Response plan (not what if but when) • Crisis management team (internal/ external) • Clear communication to key stakeholders for future events and testing • Technical advice provided with regards to infrastructure and legacy equipment

  14. smartnumbers by Qubic • smartnumbers is a cloud-based telephony service that puts you in control of calls into your organisation. • The service works with your existing telecoms infrastructure to enhance call routing and provide protection against network failure, adverse weather or other emergency situations. • No need to deploy new hardware or software. • Used by UK emergency services to protect their 999 calls. • Used by retailers such as: • Pets at Home;  • Travis Perkins;  • Autoglass

  15. Use Dial Plans for Business Continuity • Route inbound calls to any dialable telephone Number. • Create multiple dial plans for different scenarios. • Up to five dial plans can be loaded into the service for activation. • Additional dial plans can be stored off-line. • Invoke dial plans at any time via the web portal or any telephone to instantly re-route calls.

  16. Contact Centre Fraud • Contact centres are increasingly seen as the weak link in the fight against fraud. • Most people may understand what phishing is however they are not aware of the use of multiple channels by an attacker or when its occurring. • Building a profile or obtaining information can be planned and consistent.

  17. Reduce Financial Loss & AHT • The smartnumbers service has privileged access to call signalling data (Ofcom regulated) • Inspecting calls in the carrier network enables smartnumbers to complete detailed analysis to identify suspicious calls before the call touches your telecoms infrastructure. • The service examines more than 50 attributes of the Call DNA in real-time to identify suspicious calls pre answer, before the call enters the IVR.

  18. Call DNA Analysis • Identify suspicious calls by examining more than 50 attributes of the Call DNA. • Incoming calls are tagged in real-time with the type of risk the call represents, such as: • Spoofed numbers. • Withheld calls. • Call type, such as VoIP. • Calls from blacklisted numbers, including calls where the presentation ID is withheld. • Calls from international locations. • Suspicious behaviour such as repeat calls, especially from withheld numbers.

  19. Prevention/ Policy Management • Create a strategy to help handling and managing suspicious calls. • Configure the routing of trusted and high-risk calls for each customer facing number. • Manage the volume of suspicious calls that are diverted per hour. • Create a group of agents who handle suspicious calls ensuring more security. (Fraud prevention group or more experience staff) • Pre-answer agent notification to highlight the call’s risk level.

  20. Qubic Group plc Qubic House C1 The Courtyard Alban Park Hatfield Road St Albans AL4 0LA Main Switchboard: 0330 041 2700 Service Line: 0330 102 7272 www.qubicgroup.com

More Related