Page 1,132«..1020..1,1311,1321,1331,134..1,1401,150..»

Cloud security needs a new playbook, and it starts with Wiz – Open Access Government

Every day, we see new challenges emerging with cloud security which teams struggle to tackle.

For example, how do you get visibility into your decentralised, rapidly changing environment? How to prioritise the real risks and eliminate the noise of legacy tools? How do we ingrain security into the culture of cloud teams and get developers to remediate?

Organisations are adopting the cloud in more significant numbers, from small businesses to large enterprises. They see the benefits of scalability, flexibility and cost-effectiveness for their business.

But the cloud has also led to the most significant transformation to security in our lifetimes, and organisations are grappling with the unique new security challenges to protect their resources and data in the cloud.

Cloud security operations are a critical aspect of protecting an organisations cloud. Organisations must clearly understand the security risks and the appropriate measures to protect their environment.

In this practical guide, we will detail the journey organisations can take to achieve a cloud security operating model that enables visibility across a rapidly growing environment and appropriate measures to secure that environment efficiently.

This guide will provide a series of simple steps to build a cloud security foundation and mature your practice over time. By following these best practices, organisations can improve their overall cloud security posture and better protect their assets in the cloud.

The cloud is the most significant transformation to security in three important ways. The environment is entirely different development teams are now building in the cloud faster and with more decentralisation than ever before.

As a result, the environments are highly dynamic, with resources constantly being created, updated and deleted. This dynamic nature of the cloud makes it more challenging to keep track of and secure all resources across clouds and architectures.

Decentralised teams are also bringing in countless technologies that improve their efficiency. As a result, security teams must increasingly cover a multi-cloud, multi-architecture, constantly changing surface area. 2021s Log4Shell crisis demonstrates the difficulty for teams even to identify where they may have exposure across an increasingly complex and dynamic environment.

Cloud environments are now shared and controlled by third-party providers. With the public cloud, these environments are, by default, on the Internet or can be easily exposed to the Internet with a single configuration.

While exposure can happen simply, the underlying risk factors can be challenging to spot. Verizons annual DBIR report routinely cites complex intrusion attacks that combine two or more risk factors as the most common attack vector for data breaches.

This becomes even more difficult to monitor for and protect amid the unprecedented velocity and scale of attacks of todays landscape, where exposure can be exploited to become a breach in hours. Exposed databases are consistently one of the top breaches we read about in the news, underscoring the difficulty of securing an organisations crown jewels.

Development teams own their infrastructure, and each team chooses and deploys its own technologies. Centralised architectural choices can quickly become obsolete if they are not approved or adopted by decentralised teams.

An organisations people, processes and technology also face challenges in light of the new environment and risks. Many organisations must adapt their security practices and redefine traditional security approaches and processes that are not well-suited for the cloud environment.

There must also be a concerted focus on education as an increasing number of cloud teams building in the cloud often lack cloud security expertise. Security teams themselves need to learn the security risks of the cloud and implement new security processes and technologies to protect their resources. Many organisations need experts with deep domain expertise in cloud, architecture or risk vector.

Finally, teams must reconsider their tooling as many legacy technologies amplify overall cloud challenges with siloed views of the cloud environment and risk. For example, traditional tools may only look at a single architecture, such as containers or are only used by security teams, not DevOps teams. This leads to organisational siloes that make it more difficult for security and development teams to identify and remediate security issues.

Wizwww.wiz.io

Editor's Recommended Articles

More here:
Cloud security needs a new playbook, and it starts with Wiz - Open Access Government

Read More..

Verizon Business elevates fixed-wireless offering with new … – Verizon

What you need to know:

Verizon Business Internet Portal allows customers to view and manage their fixed wireless connections, router configurations, and native security features via one easy-to-use cloud-based dashboard, accessible from virtually anywhere and at no additional charge to fixed wireless plans.

Verizon Business Internet Security solutions offer immediate cybersecurity protection with no installation or IT support required. Available in two paid tiers.

NEW YORK - Verizon Business is elevating its fixed-wireless business internet offering with all new native security features and a cloud-based router management dashboard, giving customers remote self-service capability to address performance, security, and visibility needs in one centralized location. The solutions are available to businesses of all sizes as simple-to-add enhancements to Verizon fixed-wireless plans, with nothing to install and no special equipment or in-house IT support necessary.

At no additional charge to Verizon Business Internet customers, the Verizon Business Internet Portal allows businesses to monitor and self-manage their entire portfolio of fixed-wireless connections, without relying on service calls or IT experts. The Portal is accessible from virtually anywhere via verizon.com and using a customers existing My Business credentials. The cloud-based interface means large enterprises can centrally monitor and control vast device deployments, and small and medium businesses can easily scale up as they grow, without depending on IT support to manage connections.

Verizon Business Internet Portal capabilities include:

Performance monitoring and diagnostics for all routers, regardless of manufacturer: router online/offline status, signal strength, speed testing, and Wi-Fi health check with performance management, including historical data reporting, performance improvement recommendations, and equipment upgrade capabilities

Critical network-management features: remote Wi-Fi password management, device rebooting, and enhanced view and management of devices connected to your network, including IP addresses

Advanced settings: local administration lock, save/restore router configurations, IP passthrough, firewall settings

Bulk configuration management for customers with multiple Verizon Business Internet lines

The Portals remote accessibility is also a significant advantage for hybrid or highly distributed work environments. Firms can manage equipment spanning their own physical locations and the work-from-home/WFX deployments afforded to remote employees. Beyond being able to monitor and make network-critical changes through the Portal, organizations can also order replacement devices for routers needing to be upgraded.

Housed in the Business Internet Portal, Verizon Business Internet Security comes in two tiers of service as a paid enhancement to LTE or 5G Business Internet plans. The embedded, network-native security features can be activated immediately with nothing new to install, and management is clear and intuitive via the Verizon Business Internet Portal. The two tiers of VBIS service are:

Verizon Business Internet Security Plus ($10 per line per month), which includes ransomware protection, phishing prevention, anti-malware, malicious website blocking, security insights and reporting via the Verizon Business Internet Portal, and more.

Verizon Business Internet Security Preferred ($20 per line per month), which includes all Plus features plus enhanced, customizable protections such as content filtering, block/allow for specific URLs, block/allow for specific IP addresses, and advanced security configuration enablement via the Verizon Business Internet Portal.

Verizon Business Internet Security solutions offer protection for devices on the same router and can block fixed devices from visiting malicious websites or downloading malicious content, a common challenge for small and medium businesses especially. By placing a layer of security at the Internet gateway, threats can be intercepted before ever reaching the end device. The Verizon Business Internet Portal logs and reports blocked threats, so you can see your Verizon Business Internet Security solutions at work for you every day.

Debika Bhattacharya, Chief Product Officer, Verizon Business, on the Verizon Business Internet Portal and Verizon Business Internet Security:

With these enhancements, Verizon Business' fixed-wireless offering has never been more compelling or more distinguished in the marketplace. The Verizon Business Internet Portal and Verizon Business Internet Security make management and cybersecurity simple, easy to use and accessible for our business customers. There's no installation, no IT support, and no headaches, and users gain more control and better visibility into the security and performance of their connections and devices, all on one dashboard.

Debika Bhattacharya, on Verizon Business Internet Security:

Verizon Business Internet Security can benefit companies of any size. Large enterprises can secure vast deployments of equipment with an embedded layer of defense that can be activated immediately and seamlessly. But these solutions are especially beneficial for small and medium-sized businesses, which dont always have the resources or internal expertise to manage their security. Verizons Data Breach Investigations Report released earlier this month revealed that the cost of cyberattacks like business email compromise and ransomware are on the rise, with the latter doubling over the last two years. This is especially worrying for small and medium-sized businesses, considering they are more likely than large businesses to have their credentials stolen (54% to 37%), resulting in other malicious actions like ransomware. Verizon Business Internet Security helps head off these vulnerabilities at the pass by taking the guesswork out of cybersecurity set-up and offering protection the second our customers turn it on.

Jason Leigh, Research Manager for Mobility & 5G Services at IDC:

Business fixed wireless access [FWA] connections are expected to grow at a 39% CAGR over the next five years, reaching 5.3 million business FWA lines in use by 2027, with much of that growth coming from multi-location businesses, such as banking, healthcare, construction, and retail. Yet for those businesses utilizing multiple FWA lines, deployment and oversight of FWA has previously been a case-by-case, site-by-site process. A singular, cloud-based management portal allows a business, no matter the size of its IT operations, to easily monitor and configure the entire scope of its FWA connectivity remotely from router passwords to policy management and is essential to realizing the flexibility, scalability, and ease of use promise that FWA offers. says Jason Leigh, Research Manager for Mobility & 5G Services at IDC. And incorporating a network-native security service streamlines the ability of businesses to secure their operations, and further accelerates the value that businesses can realize through the adoption of FWA.

Read the original here:
Verizon Business elevates fixed-wireless offering with new ... - Verizon

Read More..

CERT-In issues Guidelines on Information Security Practices for government entities – BusinessLine

The Indian Computer Emergency Response Team (CERT-In) on Friday issued Guidelines on Information Security Practices for government entities for safe and trusted Internet.

These guidelines apply to all Ministries, Departments, Secretariats, and Offices specified in the First Schedule to the Government of India (allocation of business) Rules, 1961, along with their attached and subordinate offices, it said. They also include all government institutions, public sector enterprises, and other government agencies under their administrative purview.

The government has taken several initiatives to ensure an open, safe and trusted and accountable digital space. We are expanding and accelerating on Cyber Security with focus on capabilities, system, human resources and awareness, Rajeev Chandrasekhar, Minister of State for Electronics & Information Technology & Skill Development and Entrepreneurship, said.

Recognising the significance of a secure and trustworthy digital environment, the government has formulated policies aimed at ensuring an open, safe and trusted and accountable Internet for its users. It remains fully aware of the growing cyber threats and attacks present in todays digital world, he said.

These guidelines are a roadmap for government entities and industry to reduce cyber risk, protect citizen data, and continue to improve the cyber security ecosystem in the country. They will serve as a fundamental document for audit teams, including internal, external, and third-party auditors, to assess an organisations security posture against the specified cybersecurity requirements, CERT-In said.

The guidelines include various security domains such as network security, identity and access management, application security, data security, third-party outsourcing, hardening procedures, security monitoring, incident management, and security auditing.

For instance, for desktop/laptop/printer security in office, the guidelines suggest to Use only Standard User (non-administrator) account for accessing the computer/ laptops for regular work. Admin access to be given to users with approval of CISO only.

Similarly, use of complex passwords with a minimum length of 8 characters, using a combination of capital letters, small letters, numbers and special characters; Never store any usernames and passwords on the Internet browser; and do not store any payment related information on the Internet browser.

Apart from adhering to the best practices in the field they also include guidelines prepared by the National Informatics Centre for Chief Information Security Officers (CISOs) and employees of Central government Ministries/ Departments to enhance cyber security and cyber hygiene.

Here is the original post:
CERT-In issues Guidelines on Information Security Practices for government entities - BusinessLine

Read More..

Survey reveals mass concern over generative AI security risks – CSO Online

A new Malwarebytes survey has revealed that 81% of people are concerned about the security risks posed by ChatGPT and generative AI. The cybersecurity vendor collected a total of 1,449 responses from a survey in late May, with 51% of those polled questioning whether AI tools can improve internet safety and 63% distrusting ChatGPT information. What's more, 52% want ChatGPT developments paused so regulations can catch up. Just 7% of respondents agreed that ChatGPT and other AI tools will improve internet safety.

In March, a raft of tech luminaries signed a letter calling for all AI labs to immediately pause the training of AI systems more powerful than GPT-4 for at least six months to allow time to "jointly develop and implement a set of shared safety protocols for advanced AI design and development that are rigorously audited and overseen by independent outside experts." The letter cited the "profound risks" posed by "AI systems with human-competitive" intelligence.

The potential security risks surrounding generative AI use for businesses are well-documented, as are vulnerabilities known to impact the large language models (LLM) applications they use. Meanwhile, malicious actors can use generative AI/LLMs to enhance attacks. Despite this, there are use cases for the technology to enhance cybersecurity, with generative AI- and LLM-enhanced security threat detection and response a prevalent trend in the cybersecurity market as vendors attempt to help make their products smarter, quicker, and more concise.

In Malwarebytes' survey, only 12% of respondents agreed with the statement, "The information produced by ChatGPT is accurate," while 55% disagreed, a significant discrepancy, the vendor wrote. Furthermore, only 10% agreed with the statement, "I trust the information produced by ChatGPT."

A key concern about the data produced by generative AI platforms is the risk of "hallucination" whereby machine learning models produce untruths. This becomes a serious issue for organizations if its content is heavily relied upon to make decisions, particularly those relating to threat detection and response. Rik Turner, a senior principal analyst for cybersecurity at Omdia, discussed this concept with CSO earlier this month. "LLMs are notorious for making things up," he said. "If it comes back talking rubbish and the analyst can easily identify it as such, he or she can slap it down and help train the algorithm further. But what if the hallucination is highly plausible and looks like the real thing? In other words, could the LLM in fact lend extra credence to a false positive, with potentially dire consequences if the T1 analyst goes ahead and takes down a system or blocks a high-net-worth customer from their account for several hours?"

Read more from the original source:
Survey reveals mass concern over generative AI security risks - CSO Online

Read More..

Security news from the week beginning 26th June 2023 – – Enterprise Times

Check Point Software, Sophos, Trend Micro, WatchGuard, and Zimperium published security reports last week. ManageEngine revealed that it had attained a Spanish cybersecurity certification. LogRhythm published a press release rounding up its success in H1 2023, and VMWare announced a partnership with AMD and Samsung.

Check Point released the 2023 Cloud Security Report. Key findings from the report based on over 1000 responses included:

TJ Gonen, VP of Cloud Security at Check Point Software Technologies, commented, Our survey found that cloud misconfigurations are the foremost concern for todays CISOs. However, what sets successful cloud security organizations apart, is not only the ability to identify misconfigurations, but also to grasp their contextual relevance and prioritize their resolution.

Understanding which misconfigurations truly pose a risk to business operations is paramount. As is the capability to swiftly and effectively address those vulnerabilities to maintain a strong security posture. It is imperative for enterprises to select a comprehensive solution that goes beyond surface-level detection.

Check Point Software also published its Environmental, Social, and Governance (ESG) report for 2022. The report covers Check Points sustainability-related projects, technology, business and activities over the last twelve months.

Key highlights include how Check Point is increasing Digital resilience, focusing on Carbon neutrality, its social responsibility, governance and ethics.

Gil Shwed, Founder and CEO at Check Point, said: Our report is an accurate reflection of what weve achieved so far, as well as a glimpse of our future plans. ESG is of paramount importance to us, and were taking definitive steps to continuously improve. From committing to achieving carbon neutrality by 2040, to extending cyber education programs to eager learners worldwide, these actions and many more embody what I believe to be the essence of Check Point making the world safer while also making it better.

LogRhythm reviewed its success, and the product updates rolled out over the first half 2023. It reviewed the improvements to its Axon, SIEM, and NDR solutions.

Chris OMalley, CEO of LogRhythm, commented, LogRhythm demonstrates in our actions a dedication to improving security analysts experience by providing them with the tools they need to navigate the evolving threat landscape effectively. Our latest product enhancements empower security analysts, improve operational efficiency, and offer unparalleled visibility into potential risks. We remain committed to our customers success and resilience against cyber threats.

LogRhythm also celebrated achievements such as:

The company also won several notable awards, including the Frost & Sullivan Competitive Leadership Awards, the Colorado Technology APEX Awards and the Globee Gold Awards.

ManageEngine announced that it has successfully obtained the Spanish governments Esquema Nacional de Seguridad (National Security Framework) certification. The company achieved this certification in the INTERMEDIATE (medium) category in its first attempt after a rigorous evaluation of all its cloud and on-premises solutions by BDO, an independent audit firm.

The evaluation, encompassing audits of the companys European Union data centres (located in Dublin and Amsterdam), announced ManageEngine as a certified company that met all the compliance policy requirements.

Rajesh Ganesan, president of ManageEngine, commented, Regulatory frameworks ensure high levels of trust for citizens using government, public and private digital services. Over the last 13 years, the National Security Framework (ENS) has evolved into a comprehensive framework that helps companies make modern technologies more secure so people can use them with confidence.

We at ManageEngine are excited to receive this certification, which is a testament to our continued efforts to fulfil the needs of our Spanish customers.

Sophies published the The State of Ransomware in Manufacturing and Production 2023 report. It found that the adversaries successfully encrypted data in 68% of ransomware attacks against this sector. This is the highest reported encryption rate for the sector over the past three years and is in line with a broader cross-sector trend of attackers more frequently succeeding in encrypting data.

Manufacturers are increasing the use of backups, 73% (58% 2022) but are taking longer to recover, 55% recovered in less than a week (2022 67%)

John Shier, field CTO Sophos, commented, Using backups as a primary recovery mechanism is encouraging, since the use of backups promotes a faster recovery. While ransom payments cannot always be avoided, we know from our survey response data that paying a ransom doubles the costs of recovery. With 77% of manufacturing organizations reporting lost revenue after a ransomware attack, this added cost burden should be avoided, and priority placed on earlier detection and response.

Longer recovery times in manufacturing are a concerning development. As weve seen in Sophos Active Adversary reports, based on incident response cases, the manufacturing sector is consistently at the top of organizations needing assistance recovering from attacks. This extended recovery is negatively impacting IT teams, where 69% report that addressing security incidents is consuming too much time and 66% are unable to work on other projects.

Sophos recommend several actions for manufacturers that other sectors are already taking:

Trend Micro sponsored and published a SANS Institute report, Breaking IT/OT Silos With ICS/OT Visibility. The report reveals that enterprise Security Operation Centers (SOCs) are expanding their capabilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks.

Bill Malik, vice president of infrastructure strategies at Trend Micro, said, IT-OT integration is already driving digital transformation for many industrial organizations, but to effectively manage risk in these environments, IT and OT security operations (SecOps) must also converge. OT security programs may be lagging, but theres a fantastic opportunity to close the visibility and skills gap by consolidating onto a single SecOps platform like Trend Vision One.

The study also reveals the top challenges organisations looking to expand SecOps face.

Trend Micro also published an Omdia report that revealed that most enterprises invest 5-10% of their IT budgets specifically on private 5G network security, despite an assumption that the technology is secure by default. They will spend $12.9B on Private Network Security by 2027.

The research reveals that 72% of global enterprises believe the 3GPP approach1 to private 5G security is sufficient. These network architectures were built with security in mind, and because they are private, they are inherently more secure than public 5G. However, that doesnt mean they are impenetrable to determined attackers. The report highlights requirements and priorities shared by security leaders for their 5G deployments.

Greg Young, vice president of cybersecurity at Trend Micro, commented, When it comes to private 5G network technology, theres no such thing as secure by default, so its reassuring that enterprises are looking to add their own protections. What will be crucial going forward is educating this new user base about where the most critical security gaps are and what a shared responsibility model will look like in these environments.

VMWare has announced that it is joining forces with AMD, Samsung, and members of the RISC-V Keystone community to simplify the development and operations of confidential computing applications. VMware researched, developed and open-sourced the developer-focused Certifier Framework for Confidential Computing project.

AMD, Samsung and VMware aim to address a significant barrier to adopting confidential computing by standardising on an easy-to-use, platform-independent API for creating and operating confidential computing applications.

Kit Colbert, CTO of VMware, said, Confidential Computing has the potential to secure workloads no matter where they run including in multi-cloud and edge settings. The challenge has been to help customers adopt and implement the standard with ease. The collective efforts of the growing ecosystem of contributors to Certifier Framework will help bring those benefits to bear to ISVs, enterprise customers, and Sovereign Cloud providersenabling them to use this emerging technology more easily and effectively.

WatchGuard announced the findings of its latest Internet Security Report, detailing the top malware trends and network and endpoint security threats analyzed by WatchGuard Threat Lab researchers in Q1 2023. The key findings included the following:

Corey Nachreiner, the chief security officer at WatchGuard, commented, Organizations need to pay more active, ongoing attention to the existing security solutions and strategies their businesses rely on to stay protected against increasingly sophisticated threats.

The top themes and corresponding best practices our Threat Lab have outlined for this report strongly emphasize layered malware defenses to combat living-off-the-land attacks, which can be done simply and effectively with a platform for unified security run by dedicated managed service providers.

Zimperium published its Global Mobile Threat Report 2023. Key findings included the following:

Jon Paterson, CTO of Zimperium, commented, There is a fundamental issue that todays modern organizations must contend withhow can they capitalize on the opportunities of being mobile-powered without being exposed to evolving risks.

To thrive, it is critical that they employ a mobile-first security strategyone where they continually prioritize and assess risk as close to the user and device as possible, and baseline and continuously assess vulnerability posture to operate in a known state with complete visibility.

They must take responsive action on risk detection: leverage zero trust and conditional access workflows, leverage XDR and autonomous, 3rd party integrations and ensure they assess and stay updated on global privacy regulations and the risks that affect apps they develop and use.

Security News from the week beginning 19th June 2023

See original here:
Security news from the week beginning 26th June 2023 - - Enterprise Times

Read More..

WatchGuard Threat Lab Report Reveals New Browser-Based Social … – Dark Reading

SEATTLE June 28, 2023 WatchGuard Technologies, a global leader in unified cybersecurity, today announced the findings of its latestInternet Security Report, detailing the top malware trends and network and endpoint security threats analyzed by WatchGuard Threat Lab researchers in Q1 2023. Key findings from the data show phishers leveraging browser-based social engineering strategies, new malware with ties tonation states, high amounts of zero day malware, living-off-the-land attacks on the rise, and more. This edition of the report also features a new, dedicated section for the Threat Lab teams quarterly ransomware tracking and analysis.

"Organizations need to pay more active, ongoing attention to the existing security solutions and strategies their businesses rely on to stay protected against increasingly sophisticated threats," said Corey Nachreiner, chief security officer at WatchGuard. "The top themes and corresponding best practices our Threat Lab have outlined for this report strongly emphasize layered malware defenses to combat living-off-the-land attacks, which can be done simply and effectively with a platform for unified security run by dedicated managed service providers."

Among its most notable findings, the Q1 2023 Internet Security Report reveals:

Consistent withWatchGuardsUnified Security Platform approachand the WatchGuard Threat Labs previous quarterly research updates, the data analyzed in this quarterly report is based on anonymized, aggregated threat intelligence from active WatchGuard network and endpoint products whose owners have opted to share in direct support of WatchGuards research efforts.New for this Q1 2023 analysis, the Threat Lab team has updated the methods used to normalize, analyze, and present the report findings. While previous quarterly research results have primarily been presented in the aggregate (as global total volumes), this quarter and going forward the network security results will be presented as per device averages for all reporting network appliances.The full report includes additional detail around this evolution and the rationale behind the updated methodology, as well as details on additional malware, network, and ransomware trends from Q1 2023, recommended security strategies, critical defense tips for businesses of all sizes and in any sector, and more.

For a more in-depth view of WatchGuards research, read the complete Q1 2023 Internet Security Reporthere.

About WatchGuard Technologies, Inc.

WatchGuard Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security Platform approach is uniquely designed for managed service providers to deliver world-class security that increases their business scale and velocity while also improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect more than 250,000 customers, the companys award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure Wi-Fi. Together, they offer five critical elements of a security platform: comprehensive security, shared knowledge, clarity & control, operational alignment, and automation. The company is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visitWatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter (@WatchGuard), onFacebook, or on theLinkedIn Companypage. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them atwww.secplicity.org.Subscribe to The 443 Security Simplified podcastatSecplicity.org, or wherever you find your favorite podcasts.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

See original here:
WatchGuard Threat Lab Report Reveals New Browser-Based Social ... - Dark Reading

Read More..

Dont Get Hacked. The Increased Risk Of Cyber-Threats And How Family Offices Can Protect Themselves – Forbes

not all about the technology. Many attacks originate from complex social engineering.Pawel Czerwinski on Unsplash

As any person operating in the digital world will know, you open yourself up to vulnerability, simply by opening an internet browser. But for family offices, this risk is even more pernicious and cybersecurity attacks are increasingly on the rise. As Boston Private points out, Over a quarter (26%) of family offices have suffered a cyberattack. In almost two-thirds of these cases, it happened within the last 12 months. As the discussion around the importance of daily offices digitising their operations picks up pace, if ever there was a time for family offices to get serious about their digital security, its now.

Like any cyber attacks, the biggest threats posed to family offices arent that different from those experienced by the rest of the world. The difference, however, comes in what is at stake for family offices. Family offices should be acutely aware of several key cybersecurity risks. This includes phishing and ransomware attacks, data breaches, insider threats, and third-party risks, all of which can lead to significant financial and reputational damage, says Eton Solutions CIO Muralidhran Nadarajah. The emergence of generative AI has introduced new threat vectors, with hackers now capable of creating sophisticated deep fakes and phishing/vishing attacks using analyzed voice, video, email, and social media data.

The need for heightened vigilance is paramount in this new era of threats, especially as many of these sophisticated attacks are orchestrated by state actors. Naturally, the biggest concern for family offices is financial, due to the level of wealth theyre dealing with, but this isnt the only theyre at risk of losing. Sophisticated modern cyberattacks today will almost always have a physical-world component. In the case of family offices, this can be deep research or intel that the attackers obtained or compiled, which will bring the quality of their phishing attack or social engineering to the next level, says Tobias Jaeger, Founder & CEO of Falcone International. A family office is often run by a small group with a lot of power and doesn't necessarily follow the same decision-making routes and operational rules as an investment firm with similar AUM (assets under management). This makes it easier for attackers to shortcut certain actions that these individuals would never do otherwise.

The reality is that social engineering is often where attacks start and not necessarily highly technical hacking or exploits.

The reality of knowing that your family office could be so vulnerable is a pretty grim one, but fortunately for family offices, theyre in a slightly better position than most to protect themselves. Etons Muralidhran Nadarajah notes that large single family offices have the resources to create dedicated security departments and infrastructure for effective data protection.

So, what are some ways they can protect themselves? According to Tony Gebely CEO of Annapurna, tackling family office cybersecurity isnt one-dimensional and should be approached internally, as well as externally. Cybersecurity is not a technology problem, it is a multifaceted challenge that extends far beyond the realm of technology, he says, and trying to resolve it alone isnt the way to go. Employing best practices will bolster efforts to some extent, but this is a very risky approach. Utilizing a third-party expert to identify and prioritize risks within the family system is the best approach to achieving cyber resilience.

Concierge Cyber, CEO Kurtis Suhs echoes this, and adds the priority to audit processes should be on par with auditing people and technology. Family offices need to address people, processes and technology. People: Does the family office require security awareness training for all employees? Processes: Does the family office network have a Written Information Security Plan (WISP) that addresses policies such as email security, mobile devices, business continuity, disaster recovery, physical security, and incident response? Technology: Does the family office utilize multi-factor authentication and endpoint protection?

The bottom line is, there is no silver bullet when it comes to cyber protection and in the same way a family office would default to external expertise when engaging in an unfamiliar asset class, they should consider the same here. Annapurnas Tony Gebely advises family offices to understand what they seek to gain by investing in cybersecurity, but ultimately, this cost would be lower than dealing with a breach. Falcones Tobias Jaeger seconds this, The cost of fixing a problem can easily be a factor of 100x compared to an investment into measures that would have prevented the issue in the first place.

Before launching any process updates, Concierge Cybers Kurtis Suhs suggests starting with a vulnerability test. This would include an external scan of their network for outsider threats and an internal scan for insider threats. Any discovered high vulnerabilities should immediately be remediated and medium threats should be addressed within 30 days.

From there, he says the entire organization must embrace a protective mindset. Cybersecurity risk management involves the entire C-Suite. For example, Legal should evaluate third-party contracts, particularly those vendors that maintain PII, with respect to mutual indemnity and hold harmless provisions, says Suhs. The CFO should ensure the family office has a call back requirement with their financial institutions. The Chief Security Officer should implement multi-factor authentication, endpoint protection and oversee vulnerability testing. The Facilities Manager should ensure that the family office has physical security to protect tangible assets. And most importantly, the family office should have a cyber incident response plan and annually test that plan to ensure business continuity, he continues.

And even once a strategy has been put in place, it will only succeed with constant monitoring and status updates. Etons Nadarajah says Implementing security measures, continuous staff training, consistent system monitoring, crafting incident response plans, conducting third-party assessments, backing up data, and enforcing multi-factor authentication are all vital practices for robust cybersecurity. An essential addition to these practices is a regular audit of the family office's security posture and a vulnerability assessment by a recognized external party. This process instils confidence in the sufficiency of the security framework in place. The work concerning family offices cybersecurity is not a once-off task. It is a constantly evolving process due to the ever-changing threat landscape.

In short, the more that family offices think about embracing tech, the more they will have to grapple with increasing cybersecurity risks that can result in significant financial and reputational damage. To protect themselves, family offices should prioritize digital security and employ best practices but most crucially seek external expertise. A two-factor approach that combines internal and external audits and processes is advised for long-term safeguarding.

By investing in cybersecurity measures, family offices can mitigate risks and avoid costly breaches, but this wont succeed without also conducting vulnerability tests, implementing protective measures, and continuously monitoring the organizations security framework.

I help design and incubate the family offices of the future. Starting with a clear purpose, we help plan for continued family involvement over the coming generations and build solid, innovative businesses. Founder of Simple, a family office insight & strategy company, that supports the future private wealth owners to use their capital to create the better world they would like to live in.

See the article here:
Dont Get Hacked. The Increased Risk Of Cyber-Threats And How Family Offices Can Protect Themselves - Forbes

Read More..

International Experts Share Cybersecurity Tips at Hong Kong Forum … – PR Newswire

Two-day Event Provides Primer on Latest Internet Security and DNS Industry Trends

SINGAPORE, June 28, 2023 /PRNewswire/ -- The second Asia Pacific (APAC) Domain Name System (DNS) Forum 2023 will be held on 45 July 2023 at the Hong Kong Convention and Exhibition Centre in Hong Kong. Approximately 400 people from the Asia Pacific region have registered for the hybrid event, which will take place in Hong Kong for the first time. The forum is co-organized by the Hong Kong Internet Registration Corporation Limited (HKIRC) and the Internet Corporation for Assigned Names and Numbers (ICANN).

The event will bring together experts from different fields, including DNS architects, network engineers, cybersecurity experts, and business leaders. The forum provides a platform for stakeholders from around the world to convene and discuss issues related to the latest Internet developments, such as DNS abuse, big data applications, digital transformation, cybersecurity, and the marketization of Internet infrastructure.

"The DNS is the fundamental 'glue' that holds the Internet together. Continued growth of the Internet, as well as emerging technologies and services, all rely on the Internet's unique Identifier systems, which ICANN helps to keep working through its coordination role. We look forward to sharing more on this with the participants," said ICANN Senior Vice President and Chief Technology Officer, John Crain.

Expressing his pleasure with working with ICANN, HKIRC Chairman Simon Chan, B.B.S., J.P. said, "We are honored to work with ICANN to host this regional event in Hong Kong. As a leading player in the Internet industry, HKIRC is committed to promoting the development of a secure, stable, and resilient Internet infrastructure in Hong Kong and beyond. This event provides a unique opportunity to bring together industry experts to discuss critical issues facing the Internet today."

The forum features a range of topics related to the diverse applications of DNS and its significance in shaping the digital landscape, with particular emphasis on the contribution of DNS to digital transformation and the digital economy.

One of the key topics to be discussed at the event is cyber-attacks and DNS abuse. Experts will highlight the importance of implementing comprehensive security measures and DNS management practices to prevent cyber-attacks and DNS abuse, which are two different but related issues that organizations need to be aware of in today's digital environment. Attendees will gain actionable insights on how to combat these threats and protect their DNS infrastructure.

The forum will also showcase the latest trends and innovations in big data, digital infrastructure, blockchain technology, and artificial intelligence. These developments offer great potential to facilitate the adoption of big data, digital infrastructure, and the digital economy, encouraging users to embrace the digital future. Attendees will be provided with practical strategies for success in these areas.

The growth of the Internet has played a key role in fostering the digital economy, digital infrastructure, and promoting smart cities. As technology continues to advance, the importance of the Internet and digital infrastructure is likely to only continue to grow, providing new opportunities for economic growth and improving the quality of life for people in cities around the world.

Visit the APAC DNS Forum 2023 website for more information. Registration is free and required to attend the event (virtually or in person). The closing date for registration is 2 July 2023.

About ICANN

ICANN's mission is to help ensure a stable, secure, and unified global Internet. To reach another person on the Internet, you have to type an address - a name or a number - into your computer or other device. That address must be unique, so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world. ICANN was formed in 1998 as a not-for-profit public-benefit corporation and a community with participants from all over the world.

About HKIRC

Hong Kong Internet Registration Corporation Limited (HKIRC) is a not-for-profit and non- statutory corporation designated by the HKSAR Government to administer the registration of Internet domain names under .hk and country-code top level domains. HKIRC provides registration services through its registrars for domain names ending with .com.hk, .org.hk, .gov.hk, .edu.hk, .net.hk, .idv.hk, ., .., .., .., .., .., .hk and ..

Photo - https://mma.prnewswire.com/media/2142767/HKIRC.jpgLogo - https://mma.prnewswire.com/media/1810953/ICANN_Logo.jpg

SOURCE ICANN

Read the original:
International Experts Share Cybersecurity Tips at Hong Kong Forum ... - PR Newswire

Read More..

Surfshark VPN Review (2023): Features, Pricing, and More – TechRepublic

With the rise in data breaches, many businesses look for ways to improve internet security and enhance online privacy. One way is by deploying a Virtual Private Network (VPN). One VPN provider making waves in the industry is Surfshark. Founded in 2018, with more than 3,200 servers in 100 countries, Surfshark provides businesses with many capabilities, such as malware protection, an ad blocker, identity protection, data breach alert and an antivirus utility. This comprehensive review delves into the latest Surfshark VPN software examining its pricing and notable features as well as its pros and cons.

Pricing

Surfshark offers a seven-day free trial and three pricing plans, each providing a slew of features including unlimited devices, leak protection, a kill switch and AES-256 encryption. All plans come with a 30-day money-back guarantee. Below is the breakdown of the costs.

Apart from the above plans, there are additional costs for customers who want to add extra services like antivirus, real-time alerts and an anonymous search engine option.

Highlighted below are the key features that make Surfshark a compelling choice for those seeking a reliable VPN solution.

One of Surfsharks notable strengths is its extensive multiplatform support. Surfshark can be used on Windows, macOS, Linux, iOS, Chromebook and Android. Its also compatible with multiple devices, such as PCs, smartphones, routers and smart TVs. This cross-platform compatibility allows users to protect their online activities across all their devices.

The unlimited device connection offered across all pricing plans is what sets Surfshark apart from many VPN providers. With a single subscription, users can connect to unlimited devices simultaneously. This feature is particularly beneficial for businesses with many employees or individuals with an extensive device ecosystem. This feature also ensures that users can safeguard all their devices without worrying about hitting connection limits or incurring additional costs.

To ensure secure and private connections, Surfshark provides users with a selection of VPN protocols, including WireGuard, OpenVPN, and IKEv2. Surfshark employs robust AES-256-GCM encryption, which is regarded as a highly secure encryption standard.

Surfshark also ensures the security of user logins by encrypting them in their database, guaranteeing that no unauthorized individuals can decrypt or access the stored login information. Even in the unlikely event of a server data breach, Surfshark says that encrypted user logins will remain indecipherable and protected from unauthorized access.

SEE: The best encryption software

The split tunneling feature or bypasser, as Surfshark labels it, allows users to selectively encrypt their data, making it easier to choose the information they want to protect. With this feature, users can use two different IP addresses simultaneously, ensuring a higher level of privacy and security. This feature also allows users to maintain their original internet speed on the traffic they dont want to encrypt, ensuring a seamless browsing experience.

Figure A

Surfsharks MultiHop feature is for users who require an extra layer of anonymity and security. By routing connections through multiple servers in different locations, MultiHop adds an additional level of encryption and anonymity, making it harder for anyone to trace online activities. This feature is particularly valuable for businesses handling sensitive data or IT professionals working with confidential information that needs adequate protection.

Figure B

Intrusive ads and online trackers can hinder productivity and may even compromise privacy. Surfshark includes a built-in ad and tracker blocker known as CleanWeb, which helps eliminate annoying ads, cookie pop-ups and tracking attempts on computer devices. This feature has recently been upgraded and can be installed separately as a browser extension on Chrome, Edge and Firefox or together with the Surfshark VPN service. By enabling this feature, users can enjoy a cleaner and more focused browsing experience while minimizing the risk of being tracked by advertising networks or malicious entities.

Figure C

While Surfshark offers a range of impressive features and benefits, its always a good idea to explore alternative VPN options to find the one that best suits your specific requirements. There are three notable alternatives to Surfshark worth considering.

NordVPN is a popular name in the VPN market and stands as a worthy alternative to Surfshark. The VPN has about 5,710 servers in 60 countries and provides a lot of features such as Meshnet, which allows users to create their own private encrypted network for file sharing, a dedicated IP for easy access to IP-restricted networks and a threat protection feature that helps combat malware, intrusive ads and web trackers. NordVPN is also compatible with multiple operating systems like Windows, macOS, Android, iOS and Linux. With a single subscription, users can connect up to six devices.

ExpressVPN is another top contender known for its exceptional speed and security features. With servers in 94 countries, ExpressVPN offers features like smart location, which automatically selects the best VPN server location based on various factors, including download speed, latency and distance. Express VPN also offers split tunneling, a network lock kill switch, private DNS and a threat manager that blocks sites and apps from communicating with trackers.

CyberGhost VPN is another VPN option worthy of consideration. This VPN service is known for its extensive server network. With a straightforward and intuitive interface, its a good choice for business users seeking a hassle-free VPN experience. With 9,107 servers in 91 countries, CyberGhost VPN provides a large server network, offering broader options for accessing geo-restricted content and maintaining a stable connection. With one subscription, users can connect up to seven devices a bargain compared to some other VPN providers. CyberGhost is compatible with Windows, macOS, Android, iOS and Linux operating systems. Users can also configure CyberGhost VPN to work on routers, smart TVs and the Amazon Fire TV Stick.

Surfshark, like every other software product, has its strengths and weaknesses.

SEE: Get 3 years of rock-solid protection with Surfshark VPN

Surfshark is most suitable for small and medium-sized businesses looking for a VPN service that offers unlimited device connection, multiplatform device support and strong security and no-log policy features. With Surfsharks unlimited device connection offering available on all plans, businesses with an extensive collection of computing devices can get the best value for their money. Additionally, Surfshark is also ideal for individuals with streaming needs that require bypassing geolocations, as the VPN enables users to bypass geo-restrictions and access their favorite streaming platforms from anywhere in the world.

This review involved a detailed assessment of Surfsharks features, including its security protocols, server network, device compatibility and cost. Examining these features helped us to evaluate its overall performance and user experience. Furthermore, we supplemented our research by studying user reviews and testimonials from reputable review sites, to ensure a well-rounded understanding of its strengths and weaknesses as experienced by customers.

Visit website

NINJIO prepares organizations to defend against cyber threats through their engaging, video-based training courses. They earned the highest score among providers named "Customer's Choice" in Gartner's 2022 "Voice of the Customer Security Awareness Computer-Based Training report. Teams love NINJIO because of their Hollywood-style microlearning episodes, each based on recent, real-world breaches. Click below to get the full Gartner report and 3 free episodes, and see why everyone loves NINJIO.

Learn more about NINJIO Cybersecurity Awareness Training

Visit website

Dashlane secures your data with a patented security architecture and AES256-bit encryption, the strongest method available. Employees can securely share encrypted passwords with individuals or groups- instead of sending them unsecurely over email or Slack. Try Dashlane Business for free

Learn more about Dashlane

Visit website

Endpoint Central is one super app to manage your enterprise IT, from endpoint management to end-user security. Streamline and scale every IT operation from device enrolling/onboarding to retiring for multiple device types across different platforms. Perform patching, distribute software, manage mobile devices, deploy OS, keep track of hardware/software inventory, and remotely troubleshoot end-user issues while shielding them from cyberattacks. Get a free 30-day trial on unlimited endpoints.

Learn more about ManageEngine Desktop Central

Read next: Surfshark vs NordVPN (2023): In-depth comparison

Read the rest here:
Surfshark VPN Review (2023): Features, Pricing, and More - TechRepublic

Read More..

Iowa Air National Guardsman Pleads Guilty to Possessing Child … – Department of Justice

Kevin Swanson, 35, from Sioux City, Iowa, entered a guilty plea in federal court on May 4, 2023, to possession of child pornography.

In a plea agreement, Swanson admitted that between August 2020, and August 2021, he used an Internet-based, peer-to-peer (P2P) network to knowingly receive visual depictions of minors engaged in sexually explicit conduct, including depictions involving prepubescent minors who had not reached the age of 12. Swanson had over 1,168 images and 4 video files of child exploitation materials.

Sentencing before United States District Court Chief Judge Leonard T. Strand will be set for a later date after a presentence report is prepared. Swanson was taken into custody by the United States Marshal pending sentencing. Swanson faces a sentence of up to 20 years imprisonment without the possibility of parole, a fine of not more than $250,000, a mandatory special assessment of $100 and a term of supervised release of at least 5 years to life.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys Offices and the Criminal Division's Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.usdoj.gov/psc. For more information about internet safety education, please visit http://www.usdoj.gov/psc and click on the tab resources.

The case was investigated by Homeland Security Investigations, the Sioux City Police Department, and the Nebraska State Patrol. The case is being prosecuted by Assistant United States Attorney Kraig R. Hamit.

Court file information at https://ecf.iand.uscourts.gov/cgi-bin/login.pl.

The case file number is 22-4080. Follow us on Twitter @USAO_NDIA.

Read this article:
Iowa Air National Guardsman Pleads Guilty to Possessing Child ... - Department of Justice

Read More..