Work-From-Home Cyber Security Risks: Three Ways to Protect Your Network

prnewswire | August 26, 2020

Responding to the rapid increase in work-from-home cyber security incidents at small and midsized businesses (SMBs), DIGIGUARD is now focusing its Cyber Threat Protection Services on remote workforce IT security. "Managing and monitoring work-from-home (WFH) employees includes cybersecurity risk management. Controlling network access helps protect valuable business and customer data from cybercriminals," said DIGIGUARD's Harvey Yan. At a minimum, Yan urges SMBs do three things: Secure and update network perimeter defenses along with endpoints that access the network such as computers, laptops and mobile phones.

Spotlight

A recent Ponemon Institute survey, Intelligence Driven Cyber Defense, sponsored by Lockheed Martin, surveyed security and risk professionals regarding their organization's cybersecurity programs and methodologies. The express purpose of the survey was to collect feedback about resource allocation and implementation in organizations that are proactively addressing the need to reduce risks posed by cyber adversaries such as hackers and cyber criminals. The survey aimed to answer the question: are organizations embracing new approaches, like an intelligence-driven cyber defense strategy, to protect themselves as cyber attacks become more recurrent and severe? The key findings of the survey can be arranged into three specific themes including challenges addressing cybersecurity risks, cybersecurity strategies missing the mark and achieving an intelligence driven cyber defense.

Spotlight

A recent Ponemon Institute survey, Intelligence Driven Cyber Defense, sponsored by Lockheed Martin, surveyed security and risk professionals regarding their organization's cybersecurity programs and methodologies. The express purpose of the survey was to collect feedback about resource allocation and implementation in organizations that are proactively addressing the need to reduce risks posed by cyber adversaries such as hackers and cyber criminals. The survey aimed to answer the question: are organizations embracing new approaches, like an intelligence-driven cyber defense strategy, to protect themselves as cyber attacks become more recurrent and severe? The key findings of the survey can be arranged into three specific themes including challenges addressing cybersecurity risks, cybersecurity strategies missing the mark and achieving an intelligence driven cyber defense.

Related News

SOFTWARE SECURITY

Absolute Software Reveals Resilient Zero Trust Security Advances

Absolute Software | April 11, 2022

Absolute Software, a leading provider of self-healing endpoint and secure access solutions, today announced enhancements to its Secure Access product portfolio (formerly NetMotion by Absolute), allowing customers to reduce risk and improve UX in today's borderless, and work-from-anywhere environments. Absolute is introducing a number of new product improvements with this version, including self-healing Zero Trust Network Access (ZTNA), a resilient deployment architecture, and increased network and ZTNA policy intelligence. Absolute was recently named a Representative Vendor in Gartner's Zero Trust Network Access Market Guide for February 2022. Among the important findings in the report, Gartner states, “An increased focus by end-user organizations on zero trust strategies — and a desire to provide a more secure, flexible hybrid workforce connectivity — is driving increased interest in the ZTNA market.” Joe Savarese, EVP of Secure Access Products at Absolute said that “This release is an important milestone in our mission to be the leading ZTNA solution for the perimeter-less workplace, differentiated by resilience and reliability. The results from our customer beta test – our largest and most successful to date – validate that these new capabilities meet urgent and significant customer needs. As seamless secure access has become imperative for the perimeter-less workplace, administrators need easy-to-implement ZTNA solutions that deliver both maximum security and an optimal user experience.” IT and security professionals can now secure essential infrastructure, apps, devices, and data without sacrificing user productivity thanks to these product upgrades. The following are some of the advantages: Truly resilient ZTNA: Absolute's self-healing ZTNA client for Windows is capable of autonomously repairing or reinstalling itself if tampered with, unintentionally deleted, or otherwise ceased operating – guaranteeing that it stays healthy and provides the full intended value. Resilient deployment architecture: Absolute has introduced Resilience to its distributed network architecture utilizing active-active server technology, bringing the advantages of Software-as-a-Service (SaaS) to customer-managed settings, such as high availability, horizontal scale-out, and zero downtime updates. This ground-breaking solution allows individual system components to self-heal in the case of a breakdown and assures that other servers may take over if necessary, preventing interruption or denial-of-service to end users without the need for administrator involvement. Dynamic re-authentication and secure access enforcement: Customers may now more easily implement current cloud authentication solutions to reduce the risk exposure associated with compromised credentials via dynamic re-authentication and secure access enforcement. Enhancements include the ability to challenge a user's security credentials if circumstances or the environment change and compel them to re-authenticate using an existing mechanism, such as Multi-factor Authentication (MFA). Foundational zero trust security: New ZTNA policy actions improve the basis of zero trust security posture, boosting the capacity to safeguard workers from accessing harmful apps and network locations and restricting lateral movement. Expanded diagnostics and monitoring capabilities: Enhanced diagnoses and monitoring capabilities: With the introduction of Absolute Insights for Network, the firm has expanded its current diagnostics and monitoring capabilities (formerly NetMotion Mobile IQ). This includes ARM device support for MacOS and Windows, as well as improved intelligence for 5G networks (e.g., signal quality, network availability, network coverage, and network usage) and ZTNA policy enforcement (e.g., policy-blocked hosts/websites, addresses/ports, and web reputation) to reduce phishing, smishing, and other malicious activity.

Read More

DATA SECURITY

XM Cyber Partners with Italy-based Value-Added Distributor ICOS

XM Cyber | May 06, 2021

XM Cyber, the multi-award-winning leader in cyberattack path management, today announced that it has signed an agreement with Italy-based value-added distributor (VAD) ICOS. This agreement will enable ICOS to offer XM Cyber solutions in the Italian market to help organizations protect their most critical assets. "XM brings a new approach that uses the attacker perspective to find and remediate critical attack paths toward organizations' crown jewels across on-premises and multi-cloud networks," explained Erez Jacobson, Channels Sales Director, EMEA & APAC, XM Cyber. "We are a fast-growing business and need to scale through our partners ecosystem. The agreement with ICOS is an exciting development to consolidate our footprint in the Italian market." ICOS is a partner of some of the leading technology vendors in the sector, offering resellers the infrastructure and cybersecurity solutions that are most in line with the new paradigms of enterprise IT. About XM Cyber XM Cyber is the global leader in cyberattack path management. The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by focusing allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization's "crown jewels" – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.

Read More

END POINT PROTECTION

SentinelOne and Mimecast have teamed up to provide better end-to-end threat protection for corporate devices and email

SentinelOne | February 07, 2022

SentinelOne, an independent cybersecurity platform firm, announced a new integrated solution with Mimecast to increase end-to-end threat prevention, speed incident response, and reduce security team delays. SentinelOne and Mimecast allow security teams to take advantage of cooperative defenses and quickly respond to attacks across email and endpoints using XDR automation for a holistic approach to incident response. Security operations teams are stretched to the limit investigating and remediating each incident as tactics change, threat actors' sophistication grows, and new vulnerabilities are discovered regularly. Email continues to be one of the most widely used attack channels. According to Mimecast's State of Email Security report for 2021, risks have increased by 64% during the pandemic, and 70% of businesses expect to be impacted by an email-borne attack. As a result, organizations are looking for integrated defenses to safeguard email and improve incident response capabilities while reducing complexity, minimizing risk, and relieving pressure on an already overworked security team. “Email inboxes are often a prime vector for attacking the enterprise. Mimecast detects new threats through our multi-layered inspection capabilities, helping security operations teams who are still spending too much time on the manual collection, normalization, and prioritization of data,” said Julian Martin, VP Ecosystem & Alliances, Mimecast. “Our integration with SentinelOne solves for this challenge, improving and accelerating the incident response capabilities we offer our customers. As the cyber threat landscape continues to expand, detecting and responding to these threats in real-time is crucial for an organization’s security infrastructure,It’s important to leverage trusted security platforms like those offered by SentinelOne and Mimecast to help identify and mitigate the risk of cyberattacks.” Ahmed Shah, Senior Vice President of Strategic Alliances, Optiv The integrated solution from SentinelOne and Mimecast strengthens and accelerates incident response capabilities across all security layers, including email, endpoints, and the cloud. For example, when a threat is detected in SentinelOne, the integration takes automatic measures like suspending a particular user's email, blocking that user's email, or quarantining the email account. “The speed and sophistication with which adversaries are attacking organizations has become staggering, and too often SOC teams are burdened with investigating security issues as opposed to solving them,” said Yonni Shelmerdine, VP Product Management, SentinelOne. “The integrated solution enables our customers to accelerate incident response and contain threats faster by automatically quarantining affected users in Mimecast. This ultimately reduces complexity, minimizes risk, and decreases the demands on SOC teams.” With XDR automation, Mimecast and SentinelOne's combined solution provides never-before-seen holistic protection across client email and endpoints, dramatically increasing end-to-end threat detection and incident response.

Read More