Russia Now Claims to be Target of Increasing Cyberattacks after US Hacking Allegations

January 16, 2017 | 132 views

Russian security officials are claiming that Moscow is being targeted by cyberattacks from around the world, in response to US accusations that Russia is ‘aggressively targeting’ information networks across Europe and the United States. Nikolai Patrushev, secretary of Russia’s Security Council has told a regional newspaper that Russia is facing an increasing number of attempts from intruders to infiltrate its information networks. The claim comes within weeks of U.S. intelligence agencies accusing Russia and its President Vladimir Putin of triggering a cyberattack campaign in the run up to the 2016 presidential elections.

Spotlight

eMazzanti Technologies

eMazzanti Technologies is your outsourced IT consultant servicing clients worldwide for over 17 years. We specialize in a wide range of IT Services that can help grow you business exponentially. Our experienced IT engineers can quickly provide expert analysis of your business technology and suggest an IT solution that will increase your business productivity, business growth and business security. No matter what, we will meet and exceed your business expectations with a suite of technology services that includes antivirus solutions, network security, application control, cloud computing, virtualization, PCI compliance, video security, remote support, email security, spam filtering as well as POS and retails solutions.

OTHER ARTICLES
PLATFORM SECURITY

Top 5 Tactics for Improving Cloud Security Hygiene for Businesses

Article | July 11, 2022

In the past couple of years, the world has gone through a rapid digital transformation, which has led to a deeper penetration of modern technologies such as cloud computing, artificial intelligence, data analytics, and others. As a result, smart businesses are shifting their digital resources to the cloud to benefit from features such as streamlined operations, centralized data storage, increased operational flexibility, and hassle-free data transition. As per a study conducted in 2022, nearly 94% of businesses around the world are using at least one cloud service. Every enterprise possesses large volumes of sensitive data, including financial statements, business designs, employees’ identity information, and others. As organizations worldwide migrate from on-premises working to a remote working model, more data is being stored in the cloud than ever before, making cloud security one of the most crucial aspects for businesses today. 5 Proven Tips to Strengthen Cloud Security Hygiene for Businesses With the advent of cloudification and the increasing use of cloud-based applications, the prevalence of cybercrime has increased significantly. For instance, in the wake of the COVID-19 outbreak, there has been a significant spike in cybercrime, with reports of a 600% increase in malicious emails. Furthermore, a report from the United Nations says that cybercrime will cost the world economy $10.5 trillion every year by 2025. Even though cloud networks, such as Google Cloud, Microsoft Azure, and Amazon Web Services, have their own data protection measures for securing the cloud services they provide, it does not mean that businesses utilizing these services should rely solely on their security measures and not consider adopting additional measures. So what are the tactics modern businesses should adopt to improve cloud security hygiene? Let’s see: Deploy Multi-Factor Authentication (MFA) When it comes to keeping hackers out of user accounts and protecting sensitive data and applications used to run a business online, the traditional username and password combination is often not enough. Leverage MFA to prevent hackers from accessing your cloud data and ensure only authorized personnel can log in to your cloud applications and critical data in your on- or off-premise environment. MFA is one of the most affordable yet highly effective controls to strengthen your business's cloud security. Manage Your User Access It is crucial for your business to ensure adequate permissions are in place to protect sensitive data stored on cloud platforms. Not all employees need access to certain applications and documents. To improve your cloud security and prevent unauthorized access, you need to establish access rights. This not only helps prevent unauthorized employees from accidentally editing sensitive company data but also protects your company from hackers who have stolen an employee's credentials. Monitor End User Activities Real-time analysis and monitoring of end-user activity can help you detect anomalies that depart from usual usage patterns, such as logging in from a previously unknown IP address or device. Identifying these out-of-the-ordinary events can stop hackers and allow you to rectify security before they cause mayhem. Create a Comprehensive Off-boarding Process After an employee leaves your firm, they should no longer have access to any company resources, including cloud storage, systems, data, customers, or intellectual property. Unfortunately, completing this vital security duty is sometimes put off until several days or weeks after an employee has left. Since every employee is likely to have access to a variety of cloud platforms and applications, a systemized deprovisioning procedure can assist you in ensuring that all access permissions for each departing employee are revoked and prevent information leaks. Provide Regular Anti-Phishing Training to Employees Hackers can acquire access to protected information by stealing employees' login credentials using social engineering techniques such as phishing, internet spoofing, and social media spying. As a result, cybersecurity has now become a collective responsibility, making comprehensive anti-phishing training necessary to educate your employees about these threats. As unscrupulous hackers frequently come up with new phishing scams by the day, regular anti-phishing training is essential for developing formidable cloud security. Bottom Line Cloud security hygiene no longer consists solely of strong passwords and security checks. Instead, it is a series of innovative procedures that organizations use nowadays to leverage cloud networks. With more businesses moving towards the cloud and cyberattacks on the rise, it is the responsibility of your organization to remain vigilant and protect itself from cyberattacks.

Read More
ENTERPRISE SECURITY

A Look at Cryptographic Use Case Trends Around the World

Article | August 2, 2022

Securing data, assets, and transactions is ever critical especially now with increased innovation, customer demand, and the need to navigate a complex regulatory landscape — not to mention staying ahead of evolving cyber threats. As a result, organizations of all sizes and in every country around the world require implementing cryptography solutions to help secure everyday business. This includes managing and securing transactions, managing encryption keys, authenticating identities, providing message integrity, and encrypting data and applications. From the largest global banks and payment processors that process thousands of transactions a second to the micro merchants that are newly accepting payments, cryptography works behind the scenes to ensure payments are secure and sensitive information is protected. Whenever and wherever cryptography is at work, organizations turn to either hardware or cloud options (or a combination of both) to ensure data and transactions are secure and compliant. Common cryptographic themes across industries and across countries: 1. Cloud adoption is happening across the board with payment processing taking the lead 2. Smaller FinTechs are innovating big time 3. Companies are continually seeking help to meet regulations, especially when it comes to data localization Since writing Cryptographic Management Trends Around the Globe, I talked again with Futurex team members from our offices around the world, including Ruchin Kumar, vice president, South Asia; Mark Howland, senior business development, EMEA; and Santos Campa, vice president, LAC, for more cryptographic insights and perspectives, including drilling down on cryptographic use cases to see what’s similar and what’s unique across regions. Let’s take a look at each region: South Asia, EMEA, and LAC. South Asia: Payment Ecosystem Thriving in South Asia Ruchin Kumar emphasized that the payment ecosystem in South Asia, particularly India, is thriving — indicating that financial services are the largest consumers of hardware security modules (HSMs) and cryptography in the entire region. HSMs play an important role in South Asia, securing the root of trust, keeping the private keys secure, managing Public Key Infrastructures (PKIs), and managing digital signing for non-repudiation and message integrity. In fact, he said, India represents almost 95% of HSM use cases in all of South Asia. Payment systems and securing payments go hand-in-hand with the standards and regulations required for payments/financial services. These include regulations set by Unique Identification of India (UIDAI), National Payments Corporation of India (NPCI), Payments Council of India (PCI), Information Technology Act of India, 2000 and its amendments 2008/2011/2016. Kumar sees organizations use general purpose HSMs for digital signing for non-repudiation and message integrity and payment HSMs used for acquiring, switching, card issuance, green PIN, and other payment application security needs (these types of HSMs are required by regulations). What’s on the horizon? From Kumar’s perspective, organizations are doing a lot of testing and evaluation for cryptography inclusion in their infrastructure and many organizations are looking into tokenization for security and agility, especially with Internet of Things (IoT), blockchain, and AI emerging. Additionally, remote key loading is becoming more sought after because every device in the field these days — ATMs, point-of-sale devices, handheld devices — requires key exchange with centralized servers. Companies in South Asia See Cryptography-as-a-Service and Local Data Centers Critical for Data Residency and Localization Over the past two years, most organizations in South Asia have adopted the cloud on a large scale, including using the cloud as a resource to host their critical applications. Security has played a big role in this cloud migration, with organizations wanting to retain ownership and control of their encryption keys. As a result, many organizations have turned to Futurex’s VirtuCrypt cloud HSM and key management service for both security and meeting regulatory compliance. Futurex’s data centers in India West and India Central help to power cryptographic automation, speed, latency, and data residency and data localization. “Local data centers provide customers a lot of assurance in terms of data residency, data localization, and key localization, which earlier was a barrier to move to the cloud. Now that Futurex’s cryptography services are hosted within Indian geography, we have seen a big difference in organizations migrating to HSM-as-a-service,” says Kumar. India is well-known as a FinTech hub for start-ups and innovation, with many unicorns emerging, according to Kumar. Progressive companies look to service-based, OpEx models for their applications as well as for cryptography. OpEx models offer flexibility, money savings, and serve as a resource for those needing help with cryptographic management. EMEA: Cloud and Payments Dominate HSM Use in Europe, Middle East, and Africa Cloud adoption is also rapidly increasing in EMEA, with many organizations looking to HSM virtualization technology, especially for payment applications. According to Mark Howland, “Customers are asking, ‘can we cut down our use of hardware, our reliance on hardware, and have the payment applications that we are heavily invested in, spun up and spun down seasonally?” Howland notes that smaller companies and VC-backed companies are more nimble and lean toward innovation by implementing such things as cryptography-as-a-service to meet PCI regulations. The early adopters are those organizations in the finance and payment industry, as consumer demand and pandemic adjustments have led to innovative payment processing including mobile payments and SoftPOS. Like South Asia, smaller companies including those in financial software and services, see the value of OpEx-based HSM cloud services, such as Futurex’s VirtuCrypt. Organizations across EMEA are deploying HSMs for POS key management, PIN management, and virtualization. What’s ahead? Howland sees that many organizations are, again, moving to a service-based model, looking at application encryption, encrypting data at rest, and the overall protection of data in all industry sectors, not just traditional high-security finance customers. LAC: Trends in Cryptography Use in Latin America and the Caribbean What’s trending in LAC? According to Santos Campa, he is seeing a mixture of both on-premises cryptographic architecture and cloud payment demands. Several banks already have a huge investment in their hardware infrastructure — their own data centers, racks, servers, etc. However, at least 35% of customers are converting from these on-premises architectures to cloud HSMs. Many are opening new branches or are creating new FinTechs inside their organizations. “We’re seeing the majority of organizations moving to the cloud, or at least moving part of their operations to the cloud,” says Campa. “It's very important for many organizations to keep control and management of the key lifecycle.” Again, much like other parts of the world, the financial sector is the big mover and shaker in terms of cryptographic implementations, using cryptography for PIN validation, key management, and tokenization. According to Campa, the cloud continues to be very important and beneficial, especially the ability to integrate cloud payment HSMs with the public cloud including AWS, Azure, and Google. As organizations are adding new models, such as transaction processing models, a must-have is a secure, compliant cryptographic solution — compliant with PCI and local and regional regulations throughout Latin America — that will allow them to scale. A nice-to-have is an OpEx option to give flexibility and cost savings. Pandemic trends have paved the way to make cryptographic management more streamlined — such as visualization and remote key management — and not needing to physically go to the data center. “Organizations are looking to a cryptographic platform that is future-proofed, one that is going to provide the best quality of service and support in the market,” says Campa. All around the globe, organizations are looking to innovate payments and embrace the cloud, keeping security, agility, and cryptography top of mind.

Read More
PLATFORM SECURITY

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | July 29, 2022

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | February 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More

Spotlight

eMazzanti Technologies

eMazzanti Technologies is your outsourced IT consultant servicing clients worldwide for over 17 years. We specialize in a wide range of IT Services that can help grow you business exponentially. Our experienced IT engineers can quickly provide expert analysis of your business technology and suggest an IT solution that will increase your business productivity, business growth and business security. No matter what, we will meet and exceed your business expectations with a suite of technology services that includes antivirus solutions, network security, application control, cloud computing, virtualization, PCI compliance, video security, remote support, email security, spam filtering as well as POS and retails solutions.

Related News

DATA SECURITY, ENTERPRISE IDENTITY

Keeper Security's Cybersecurity Census Finds U.S. Businesses are Unprepared for Escalation in Cyberattacks

Keeper Security | September 15, 2022

Keeper Security, the leading provider of zero-trust, zero-knowledge and FedRAMP Authorized cybersecurity software, today released findings from its second annual Cybersecurity Census. The report explores insights from IT decision-makers at businesses and organizations across the U.S., revealing that most respondents expect the onslaught of cyberattacks to intensify over the next year, yet 32% lack a management platform for IT secrets–posing a significant risk to organizational security. The 2022 U.S.Cybersecurity Census Report explores the ongoing threats of cyberattacks and the need for cybersecurity investment. The report maps the evolving cybersecurity landscape as hybrid and remote work have transformed businesses over the past two years. According to survey findings, the average U.S. business experiences 42 cyberattacks annually—between three to four each month. Still, fewer than half (44%) of respondents provide their employees with guidance or best practices for governing passwords and access management. IT leaders reveal a lack of preparedness for cyberattacks U.S. businesses face many cyberattacks each year, significantly impacting their organizations. Most respondents agree the total number of attacks will increase over the next year, with 39% predicting the number of successful cyberattacks will also rise. Most organizations in the U.S. believe they're prepared to fend off cyberattacks, with 64% of respondents rating their preparedness at least an eight on a 10-point scale and 28% rating themselves as a 10/10. At the same time, the majority of respondents (57%) say it is taking longer to respond to attacks and only 8% say responses are getting faster. Though most report feeling prepared for attacks, leaders admit their tech stacks lack essential tools. Nearly one-third of respondents (32%) lack a management platform for IT secrets, such as API keys, database passwords and privileged credentials. 84% are concerned about the dangers of hard-coded credentials in source code but 25% don't have software to remove them. More than one-quarter of respondents (26%) said they lack a remote connection management solution to secure remote access to IT infrastructure. With the rise in hybrid work and remote work, this is a significant security gap. This lack of investment in cybersecurity tools is alarming, especially considering the lasting impact of cyberattacks that survey respondents revealed. Nearly one-third (31%) suffered a disruption of partner or customer operations in the wake of a cyberattack and the same percentage experienced theft of financial information. 18% of organizations experienced theft of money, with the average amounting to more than $75,000, while 37% lost $100,000 or more. 23% experienced the inability to carry out business operations. In addition to direct costs, cyberattacks can cause lasting damage to business perception and client trust. More than one-quarter of respondents (28%) suffered reputational damage due to a successful cyberattack and 19% reported losing business or a contract. "The volume and pace at which cyberattacks are hitting businesses is increasing and with that come severe financial, reputational and organizational penalties," said Darren Guccione, CEO and co-founder of Keeper Security. "Leadership must prioritize cybersecurity, enabling their security teams to address rapid shifts in technology and distributed remote work. The impact these shifts have on cybersecurity are both pervasive and extreme. Building a culture of trust, accountability and responsiveness is critical." U.S. businesses must take immediate action against cyber threats Cybersecurity is a pillar of every good business and these findings underscore the need for business leaders to make cybersecurity a part of organizational culture. U.S. business leaders are working to source the necessary talent to stay secure. Nearly three-quarters (71%) of respondents have made new hires in cybersecurity over the past year and 58% say they've increased cybersecurity training. A devastating cyberattack is one stolen password away, but despite this threat, fewer than half (48%) of respondents state they have plans to invest in password management, visibility tools for network-based threats or infrastructure secrets management. Only 44% of respondents provide their employees with guidance and best practices governing passwords and access management. 30% of respondents allow employees to set and manage their passwords and admit that employees often share access to passwords. A mere 26% have a highly sophisticated framework for visibility and control of identity security. Many organizations are considering future investments with 73% of respondents expecting their cybersecurity budgets to increase. However, they face being outmatched by rising external threats and the demands created by existing weaknesses. Cybersecurity in company culture Employees understand the dangers of both external and internal threats. An overwhelming 79% of IT professionals are concerned about a breach from within their organization and 47% have suffered a breach of that nature. As more employees work remotely, businesses must rethink their investments in order to maintain security. In fact, 40% of respondents highlighted remote and hybrid work as a top concern, with rising external threats close behind at 39%. IT leaders themselves admit a lack of transparency in cyber incident reporting within their organizations, with nearly half of respondents (48%) being aware of a cyberattack, but keeping it to themselves. Businesses must foster a sense of trust and transparency in their organizations, creating an open dialogue to recognize the scale of the cybersecurity challenges their organization faces. Only with that recognition can resources be devoted to education and embedding a cybersecurity mindset into the organization's culture. Keeper's 2022 U.S. Cybersecurity Census Report demonstrates that cyberattacks present a profound and ongoing threat. Preventative measures, including investment, education and cultural shifts, are essential for businesses to drive resilience and protect their organizations from cybercriminals. Methodology The report yielded results from 516 IT leaders and decision-makers in businesses across the U.S. About Keeper Security Keeper Security, Inc. ("Keeper") is transforming the way organizations and individuals protect their credentials, secrets, connections and sensitive digital assets to significantly reduce the risks of identity security-related cyberattacks, while gaining visibility and control. Keeper is the leading provider of zero-trust and zero-knowledge security cloud services trusted by millions of people and thousands of organizations for password management, secrets management, privileged access, secure remote infrastructure access and encrypted messaging.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Hillstone Networks Targets Cyberattacks at Network Edge with High-End Next Generation Firewall Offerings

Hillstone Networks | August 25, 2022

Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor. According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one breach. Cyberattacks are not abating, and the cost, damages and recovery from a single breach continue to rise. Against an aggressive cyberattack backdrop, the volume and complexity of traffic in today’s IT environments continue to exponentially increase due to the expansion of different services such as videos, apps, and cloud-based-everything. With increased connectivity to services comes an increased complexity of vulnerabilities to secure against. Secure An Expanded Network Edge with Hillstone A-Series Next Generation Firewalls Enterprises need high-performing next-generation firewalls to meet today’s bandwidth requirements, service levels, and defend against more advanced threats. As the network edge expands from the traditional on-premises network perimeter, IT teams now must secure unforeseen levels of depth, as all layers of the IT stack must be secured at the edge. Minimize the Speed versus Security Trade-off with Proprietary Hardware Acceleration Engine IT teams regularly compromise one need over another, based on budget or resources. Hillstone’s proprietary Hardware (HW) Acceleration Engine offloads network traffic from the processor, allowing more resources to be dedicated for comprehensive security services, bringing streamlined threat detection and prevention capabilities to high-traffic applications and scenarios. The HW Acceleration Engine delivers ultra-low latency in network packet forwarding, allowing the NGFW to sift through and secure even the most latency-sensitive applications, including multimedia streaming, broker services, and other high-volume transactions. Native Cyberresilience Combined with High Throughput/Low Latency Deliver on App and Customer Experience Raw processing speed, with throughputs of 200 Gbps and 280 Gbps, allow for packet forwarding within a few microseconds, delivering quality of service across networks. Enterprise-grade security features come native with these offerings, including comprehensive and advanced threat protection for known and unknown malware with multiple security services, including Intrusion Prevention, IP Reputation, URL Filtering, Anti-Spam, Anti-Virus, Cloud Sandbox, Botnet C2, among others. “Because today’s network traffic across all applications and services is increasing both in complexity, and in volume across hybrid and multi-cloud deployments, a high performing NGFW is no longer optional – it is now mandatory. “Today’s data centers, edge locations, service providers are looking for a powerful solution that delivers on multiple fronts – security, performance, and customer experience. The new NGFW offerings deliver the on the needs of our customers today with the flexibility of multiple deployment models.” Tim Liu, co-founder & CTO, Hillstone Networks The A-Series NGFW is a solid platform for enterprise customers to enable an SD-WAN solution to bridge connectivity and security needs. The integration consolidates network VPN and security in one device or client, allowing for a faster, lower-cost and more secure local internet connection at remote locations. In addition, customers can also unlock a Zero Trust Network Access (ZTNA) solution, to meet remote access security requirements, including identity-based, least-privileged secure access, as well as context-aware, adaptive access control, enhancing both security and effectiveness for the remote connections. About Hillstone Networks Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence, and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.

Read More

How COVID-19 and Remote Working Increased Risks of Cyberattacks on Australian Businesses

Tech Guide | July 18, 2020

Abrupt and unexpected are two of the adjectives most commonly used when describing the shift to working remotely that the global workforce has faced in response to the COVID-19 pandemic. No sector has been spared, including government operations, private businesses, and institutions of education.This seismic shift not only impacted the millions of people who found themselves working from home for the first time in Australia and around the globe, but it also stressed the complex technology infrastructures that were unexpectedly required to support massive amounts of traffic.Businesses and leaders in technology have met the challenges posed by the recent work at home reality head on. Unfortunately, intertwined with the positive work being done to make working from home possible, there are hackers and bad actors who have seen this sudden change as an opportunity to exploit potential weaknesses in the technological infrastructure backing the newly decentralized workforce.In their haste to get employees back to work and provide their products and services to customers, some enterprises have been blinded to the increasing security risks that having employees work from home present.

Read More

DATA SECURITY, ENTERPRISE IDENTITY

Keeper Security's Cybersecurity Census Finds U.S. Businesses are Unprepared for Escalation in Cyberattacks

Keeper Security | September 15, 2022

Keeper Security, the leading provider of zero-trust, zero-knowledge and FedRAMP Authorized cybersecurity software, today released findings from its second annual Cybersecurity Census. The report explores insights from IT decision-makers at businesses and organizations across the U.S., revealing that most respondents expect the onslaught of cyberattacks to intensify over the next year, yet 32% lack a management platform for IT secrets–posing a significant risk to organizational security. The 2022 U.S.Cybersecurity Census Report explores the ongoing threats of cyberattacks and the need for cybersecurity investment. The report maps the evolving cybersecurity landscape as hybrid and remote work have transformed businesses over the past two years. According to survey findings, the average U.S. business experiences 42 cyberattacks annually—between three to four each month. Still, fewer than half (44%) of respondents provide their employees with guidance or best practices for governing passwords and access management. IT leaders reveal a lack of preparedness for cyberattacks U.S. businesses face many cyberattacks each year, significantly impacting their organizations. Most respondents agree the total number of attacks will increase over the next year, with 39% predicting the number of successful cyberattacks will also rise. Most organizations in the U.S. believe they're prepared to fend off cyberattacks, with 64% of respondents rating their preparedness at least an eight on a 10-point scale and 28% rating themselves as a 10/10. At the same time, the majority of respondents (57%) say it is taking longer to respond to attacks and only 8% say responses are getting faster. Though most report feeling prepared for attacks, leaders admit their tech stacks lack essential tools. Nearly one-third of respondents (32%) lack a management platform for IT secrets, such as API keys, database passwords and privileged credentials. 84% are concerned about the dangers of hard-coded credentials in source code but 25% don't have software to remove them. More than one-quarter of respondents (26%) said they lack a remote connection management solution to secure remote access to IT infrastructure. With the rise in hybrid work and remote work, this is a significant security gap. This lack of investment in cybersecurity tools is alarming, especially considering the lasting impact of cyberattacks that survey respondents revealed. Nearly one-third (31%) suffered a disruption of partner or customer operations in the wake of a cyberattack and the same percentage experienced theft of financial information. 18% of organizations experienced theft of money, with the average amounting to more than $75,000, while 37% lost $100,000 or more. 23% experienced the inability to carry out business operations. In addition to direct costs, cyberattacks can cause lasting damage to business perception and client trust. More than one-quarter of respondents (28%) suffered reputational damage due to a successful cyberattack and 19% reported losing business or a contract. "The volume and pace at which cyberattacks are hitting businesses is increasing and with that come severe financial, reputational and organizational penalties," said Darren Guccione, CEO and co-founder of Keeper Security. "Leadership must prioritize cybersecurity, enabling their security teams to address rapid shifts in technology and distributed remote work. The impact these shifts have on cybersecurity are both pervasive and extreme. Building a culture of trust, accountability and responsiveness is critical." U.S. businesses must take immediate action against cyber threats Cybersecurity is a pillar of every good business and these findings underscore the need for business leaders to make cybersecurity a part of organizational culture. U.S. business leaders are working to source the necessary talent to stay secure. Nearly three-quarters (71%) of respondents have made new hires in cybersecurity over the past year and 58% say they've increased cybersecurity training. A devastating cyberattack is one stolen password away, but despite this threat, fewer than half (48%) of respondents state they have plans to invest in password management, visibility tools for network-based threats or infrastructure secrets management. Only 44% of respondents provide their employees with guidance and best practices governing passwords and access management. 30% of respondents allow employees to set and manage their passwords and admit that employees often share access to passwords. A mere 26% have a highly sophisticated framework for visibility and control of identity security. Many organizations are considering future investments with 73% of respondents expecting their cybersecurity budgets to increase. However, they face being outmatched by rising external threats and the demands created by existing weaknesses. Cybersecurity in company culture Employees understand the dangers of both external and internal threats. An overwhelming 79% of IT professionals are concerned about a breach from within their organization and 47% have suffered a breach of that nature. As more employees work remotely, businesses must rethink their investments in order to maintain security. In fact, 40% of respondents highlighted remote and hybrid work as a top concern, with rising external threats close behind at 39%. IT leaders themselves admit a lack of transparency in cyber incident reporting within their organizations, with nearly half of respondents (48%) being aware of a cyberattack, but keeping it to themselves. Businesses must foster a sense of trust and transparency in their organizations, creating an open dialogue to recognize the scale of the cybersecurity challenges their organization faces. Only with that recognition can resources be devoted to education and embedding a cybersecurity mindset into the organization's culture. Keeper's 2022 U.S. Cybersecurity Census Report demonstrates that cyberattacks present a profound and ongoing threat. Preventative measures, including investment, education and cultural shifts, are essential for businesses to drive resilience and protect their organizations from cybercriminals. Methodology The report yielded results from 516 IT leaders and decision-makers in businesses across the U.S. About Keeper Security Keeper Security, Inc. ("Keeper") is transforming the way organizations and individuals protect their credentials, secrets, connections and sensitive digital assets to significantly reduce the risks of identity security-related cyberattacks, while gaining visibility and control. Keeper is the leading provider of zero-trust and zero-knowledge security cloud services trusted by millions of people and thousands of organizations for password management, secrets management, privileged access, secure remote infrastructure access and encrypted messaging.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Hillstone Networks Targets Cyberattacks at Network Edge with High-End Next Generation Firewall Offerings

Hillstone Networks | August 25, 2022

Hillstone Networks, an innovative and accessible cybersecurity solutions provider, today unveiled new models in the Hillstone Networks A-Series Next Generation Firewalls (NGFW), the A7600 and A6800, to help enterprises secure their expanding network edge, deliver powerful network security capabilities, and drive sustainability with solutions in a compact 1RU form factor. According to IBM’s Cost of a Breach 2022 report, 83% of organizations studied have had more than one breach. Cyberattacks are not abating, and the cost, damages and recovery from a single breach continue to rise. Against an aggressive cyberattack backdrop, the volume and complexity of traffic in today’s IT environments continue to exponentially increase due to the expansion of different services such as videos, apps, and cloud-based-everything. With increased connectivity to services comes an increased complexity of vulnerabilities to secure against. Secure An Expanded Network Edge with Hillstone A-Series Next Generation Firewalls Enterprises need high-performing next-generation firewalls to meet today’s bandwidth requirements, service levels, and defend against more advanced threats. As the network edge expands from the traditional on-premises network perimeter, IT teams now must secure unforeseen levels of depth, as all layers of the IT stack must be secured at the edge. Minimize the Speed versus Security Trade-off with Proprietary Hardware Acceleration Engine IT teams regularly compromise one need over another, based on budget or resources. Hillstone’s proprietary Hardware (HW) Acceleration Engine offloads network traffic from the processor, allowing more resources to be dedicated for comprehensive security services, bringing streamlined threat detection and prevention capabilities to high-traffic applications and scenarios. The HW Acceleration Engine delivers ultra-low latency in network packet forwarding, allowing the NGFW to sift through and secure even the most latency-sensitive applications, including multimedia streaming, broker services, and other high-volume transactions. Native Cyberresilience Combined with High Throughput/Low Latency Deliver on App and Customer Experience Raw processing speed, with throughputs of 200 Gbps and 280 Gbps, allow for packet forwarding within a few microseconds, delivering quality of service across networks. Enterprise-grade security features come native with these offerings, including comprehensive and advanced threat protection for known and unknown malware with multiple security services, including Intrusion Prevention, IP Reputation, URL Filtering, Anti-Spam, Anti-Virus, Cloud Sandbox, Botnet C2, among others. “Because today’s network traffic across all applications and services is increasing both in complexity, and in volume across hybrid and multi-cloud deployments, a high performing NGFW is no longer optional – it is now mandatory. “Today’s data centers, edge locations, service providers are looking for a powerful solution that delivers on multiple fronts – security, performance, and customer experience. The new NGFW offerings deliver the on the needs of our customers today with the flexibility of multiple deployment models.” Tim Liu, co-founder & CTO, Hillstone Networks The A-Series NGFW is a solid platform for enterprise customers to enable an SD-WAN solution to bridge connectivity and security needs. The integration consolidates network VPN and security in one device or client, allowing for a faster, lower-cost and more secure local internet connection at remote locations. In addition, customers can also unlock a Zero Trust Network Access (ZTNA) solution, to meet remote access security requirements, including identity-based, least-privileged secure access, as well as context-aware, adaptive access control, enhancing both security and effectiveness for the remote connections. About Hillstone Networks Hillstone Networks’ innovative and accessible cybersecurity solutions reshape enterprise and service provider security, enabling cyber resilience while lowering TCO. Providing comprehensive visibility, superior intelligence, and rapid protection to see, understand, and act against cyberthreats from edge to cloud, Hillstone is favorably rated by leading analysts and trusted by global companies.

Read More

How COVID-19 and Remote Working Increased Risks of Cyberattacks on Australian Businesses

Tech Guide | July 18, 2020

Abrupt and unexpected are two of the adjectives most commonly used when describing the shift to working remotely that the global workforce has faced in response to the COVID-19 pandemic. No sector has been spared, including government operations, private businesses, and institutions of education.This seismic shift not only impacted the millions of people who found themselves working from home for the first time in Australia and around the globe, but it also stressed the complex technology infrastructures that were unexpectedly required to support massive amounts of traffic.Businesses and leaders in technology have met the challenges posed by the recent work at home reality head on. Unfortunately, intertwined with the positive work being done to make working from home possible, there are hackers and bad actors who have seen this sudden change as an opportunity to exploit potential weaknesses in the technological infrastructure backing the newly decentralized workforce.In their haste to get employees back to work and provide their products and services to customers, some enterprises have been blinded to the increasing security risks that having employees work from home present.

Read More

Events