DATA SECURITY

Lack of Remote and Hybrid Work Policies Put Education Industry at Risk for IT Security Issues

Apricorn | July 23, 2021

The leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, Apricorn, has announced various findings for the education sector from the Apricorn Global IT Security Survey, 2021. The survey says the education industry lacks concern about security threats from employees and, due to limited IT security policies related to remote work, has a greater risk for cybersecurity breaches and data loss than other industries. For example, 69.4% of respondents say, as targets that attackers can use to access data, employees at their organizations don't think of themselves,  compared to 37.5% in information technology (IT).

The survey was to compare cybersecurity policies of various industries about hybrid and remote work. More than 400 respondents completed the survey. Unfortunately, the education industry constantly lags behind many other healthcare, manufacturing, IT, and financial services when executing lost/stolen devices and data security policies. Remarkably, compared to 55% in IT, only 26% of respondents in the education industry agreed that they have policies regarding lost/stolen devices.

Many education institutions, in the Fall, will be returning to in-person instruction; however,  in the education sector, most survey respondents (90.77%) said a hybrid work option exists. Organizations in education demonstrated a trend of allowing employee choice when it comes to policy adherence when asked about policies and procedures that have been put in place regarding transporting data and devices. Compared to an average of 52% for other top industries, only 20% of education organizations require encrypted hardware. More than half of EDUCATION organizations permit the use of personal USB devices.

About Apricorn

Founded in 1983, Apricorn is a leading provider of secure storage innovations to prominent companies in education, healthcare, finance, and government throughout North America, EMEA, and Canada. Apricorn products have become the trusted standard for a myriad of data security strategies worldwide. Under the Apricorn brand, numerous award-winning products and patents have been developed.

Spotlight

"You think your environment is secure, but it isn't. Employees are stealing data, committing fraud, and leaking information - all putting your business at risk. How do they do it? Can you stop it? Discover more in this white paper.

So, you've got your environment set up to fend off most external attacks. That's great - except that you probably haven't begun to address the biggest threat to your business: the threat from within. Employee fraud, corporate espionage and plain old theft are constant threats to your business, and they all come from within your walls. Removable storage devices, cloud-based file sharing and Webmail, among other common technologies, give your workers free rein to steal from you and put your operation at risk. But it doesn't have to be that way."

Spotlight

"You think your environment is secure, but it isn't. Employees are stealing data, committing fraud, and leaking information - all putting your business at risk. How do they do it? Can you stop it? Discover more in this white paper.

So, you've got your environment set up to fend off most external attacks. That's great - except that you probably haven't begun to address the biggest threat to your business: the threat from within. Employee fraud, corporate espionage and plain old theft are constant threats to your business, and they all come from within your walls. Removable storage devices, cloud-based file sharing and Webmail, among other common technologies, give your workers free rein to steal from you and put your operation at risk. But it doesn't have to be that way."

Related News

SOFTWARE SECURITY

AttackIQ Announces Integration with Vectra AI

AttackIQ | April 25, 2022

AttackIQ®, the leading independent provider of Breach and Attack Simulation (BAS) systems, today announced a new integration with Vectra®, an AI-driven threat detection and response platform. The integration facilitates joint customers to detect attacks that circumvent existing security controls and make sure rapid response to emerging threats. "In today's hyper-complex threat environment, organizations must think proactively and adopt advanced security capabilities to prevent successful attacks. This integration will allow our customers to validate the efficacy of the Vectra AI platform by utilizing AttackIQ's PCAP replay and related network scenarios to find and fix coverage gaps throughout their security infrastructure before adversaries exploit them." Carl Wright, Chief Commercial Officer at AttackIQ AttackIQ has a "assume breach" mentality, knowing that an attacker will breach an organization's perimeter defenses not if, but when. The AttackIQ Security Optimization Platform, which leverages automated breach and attack simulation technology and the MITRE ATT&CK framework, enables companies to assess the performance of their security controls, recognize misconfigurations or coverage gaps, and prioritize resources on areas with the highest possibility of risk exposure. Geert Busse, Head of Next-Gen Solutions Pre Sales EMEA, Westcon said that "It is exciting to see AttackIQ and Vectra joining forces to help customers enable a proactive, threat-informed defense. As key vendors in our Westcon Next Generation Solutions go-to-market strategy, these two organizations are the backbone of our technology pillar, focusing on defense against emerging threats by delivering automation, integration and efficiency that our industry needs to detect and stop the latest generation of Threat Actors." The Vectra Platform leverages security-led artificial intelligence (AI) to enable threat detection and response, ensuring that threats are identified and stopped before they have a chance to cause havoc. The platform collects data from network packets and logs to provide visibility into businesses' public cloud and SaaS environments, federated identity infrastructure, and data center networks. Vectra's proprietary technique to using artificial intelligence to detection analyzes all detections to prioritize risks and map events to the MITRE ATT&CK architecture without relying on noise or hunting. Additionally, it facilitates proper remediation and speedy reaction through other security tools already installed in your security stack.

Read More

DATA SECURITY

SGS Cybersecurity Services can help you take advantage of digital opportunities while also protecting you from cyber threats.

SGS | March 09, 2021

SGS, the world's driving review, confirmation, testing and certificate organization, assists customers with taking advantage of advanced freedoms while alleviating hazards with its SGS Cybersecurity Services, a coordinated cybersecurity arrangement. Innovation has numerous advantages. It makes individuals' lives more secure and more advantageous, expands wellbeing potential, and offers new encounters at work, home and when voyaging. In any case, there are huge difficulties as well. At the point when innovation is abused it can make weaknesses, is difficult to anticipate, and can contrarily affect individuals' regular daily existences. For organizations, cybercrime can have disastrous impacts, for example, information and security breaks, prompting monetary harm and reputational obliteration. To defy this advancing cybersecurity scene, governments and partners around the globe are chipping away at setting up new guidelines and guidelines. It is basic for associations to build their cybersecurity development to support their market position. A digital secure culture should be inserted and cycles and conventions ought to be created to help it. This can require some serious energy, yet hoodlums won't stand by, thus brief activity is required.

Read More

DATA SECURITY

Perfect storm of cybersecurity risks threatens the hybrid workplace

HP Wolf Security | November 01, 2021

HP Inc. today released its latest HP Wolf Security report: Out of Sight & Out of Mind, a comprehensive global study highlighting how the rise of hybrid work is changing user behavior and creating new cybersecurity challenges for IT departments. The research shows that a growing number of users are buying and connecting unsanctioned devices outside of IT’s purview. It also highlights that threat levels are rising, with attackers increasingly successful at bypassing defenses and tricking users into initiating attacks through phishing. All of this is making IT support more complex, time-consuming, and costly than ever. The report combines data from a global YouGov online survey of 8,443 office workers who shifted to Working from Home (WFH) during the pandemic, and a global survey of 1,100 IT decision makers conducted by Toluna. Key findings include: New Shadow IT buying and installing endpoints with security out of mind: ‘Shadow IT’ typically refers to non-IT departments deploying software beyond the purview of IT. This shadow is now spreading, with individuals procuring and connecting devices without being checked by IT. 45% of office workers surveyed purchased IT equipment (such as printers and PCs) to support home working in the past year. However, 68% said security wasn’t a major consideration in their purchasing decision, while 43% didn’t have their new laptop or PC checked or installed by IT, and 50% said the same of their new printer. Phishing becoming increasingly successful: 74% of IT teams have seen a rise in the number of employees opening malicious phishing links or attachments on emails in the last 12-months. 40% of office workers surveyed aged 18-to-24 have clicked on a malicious email with almost half (49%) saying they have done so more often since working from home. Of office workers that clicked or nearly clicked a link, 70% didn’t report it to IT – 24% didn’t think it was important, 20% cited the “hassle factor”, while 12% had a fear of reprisal or being punished. Increase in devices being compromised fuels growth in rebuild rates: 79% of IT teams report rebuild rates increased during the pandemic. Rebuild rates directly correlate to the number of endpoints that require wiping and reimaging because they have been compromised, which implies more attackers are successfully breaching outer defenses. The real figure could be higher still: 80% of IT teams worry that employee devices might be compromised and they don’t know about it. "People often don't know if they have clicked on something malicious, so the real numbers are likely much higher," comments Ian Pratt, Global Head of Security for Personal Systems, HP Inc. "Threat actors don't always announce themselves, as playing the 'long game' to move laterally and infiltrate higher-value infrastructure has proven to be more lucrative. For example, by using cloud backups to exfiltrate sensitive data in bulk, encrypting data on servers, then demanding a multi-million-dollar ransom.” Pratt continues: "It shouldn't be this easy for an attacker to get a foothold - clicking on an email attachment should not come with that level of risk. By isolating and containing the threat you can mitigate any harmful impact, preventing persistence and lateral movement." With threats rising, it’s becoming more difficult for IT teams to deliver security support. 77% of IT teams said the time it takes to triage a threat has increased in the past year, while an estimated 62% of alerts relating to the endpoint are false positives, leading to wasted time. With IT teams tied up dealing with alerts, it’s becoming harder for them to onboard employees and identify threats: 65% of IT teams said that patching endpoint devices is more time-consuming and difficult due to the mass shift to home working, while 64% said the same of provisioning and onboarding new starters with secure devices. As a result, IT teams estimate the cost of IT support in relation to security has risen by 52% in the last 12-months. 83% of IT teams said the pandemic has put even more strain on IT support because of home worker security problems, while 77% of IT teams say homeworking is making their job much harder and that they fear teams will burnout and consider quitting. “As IT continues to grow in complexity, security support is becoming unmanageable,” Pratt concludes. "For hybrid working to be a success, IT security teams need to be freed from spending hours provisioning and fielding user access requests so they can focus on tasks that add value. We need a new security architecture that not only protects against known and unknown threats, but that helps to reduce the burden to liberate cybersecurity teams and users alike. By applying the principles of Zero Trust, organizations can design resilient defenses to keep the business safe and recover quickly in the event of a compromise.” HP is helping organizations to secure the hybrid workplace by delivering endpoint security that provides teams with greater visibility and management tools. With HP Wolf Security1 organizations benefit from robust, built-in protection from the silicon to the cloud, and BIOS to browser. HP Wolf Security provides the ideal support for securing the hybrid workplace – for example HP Sure Click Enterprise2 reduces the attack surface by rendering malware, delivered via email, browser or downloads, harmless through threat containment and isolation. HP Wolf Security enables teams to deliver defense-in-depth and enhanced protection, privacy, and threat intelligence, gathering data at the endpoint to help protect the business at large. About HP Wolf Security From the maker of the world’s most secure PCs3 and Printers4, HP Wolf Security is a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services.

Read More