Skip to content

回到網絡保護的基礎

Gartner Reviews NAC Tools for 2021

Old-time marathon winner and runner Bill Rodgers once made the comment that, “Every race is totally different.” And if this is true in the relatively predictable world of marathon running, it is even more accurate in the race against cyberterrorism, where – whether we like it or not – each day brings with it unforeseen challenges that threaten the integrity of the network.

The question is how best to approach network protection successfully despite the ongoing development of unexpected threats. The truth is that throughout 2016, we’ve had more than ample opportunity to consider this question. From the involvement of hackers in the U.S. elections to the IoT DDoS attacks of October 21, last year saw some shocking stories of breaches. With all of that behind us, 2017 is not a moment too early to take stock, explore the options – and perhaps, go back to the basics and adopt some old-new security strategies that provide greater visibility, improved resilience, increased automation, and better security.

An Unfortunate Side of “Things”

The distributed infrastructures of today’s networks make businesses more vulnerable to attacks, with IoT and BYOD adding a huge degree of complexity. The threat is simply greater – so much so that, according to Gartner (as quoted on TechCrunch here), the security market is predicted to grow to the whopping size of $120 billion by 2020.
As pointed out in the eBook, The Top 5 Misconception of IoT Network and Device Security, IoT devices represent the weakest link of today’s corporate network. To make matters worse, because most users are unaware of the threat, most devices are not even set up securely. (to learn more, read the eBook preview here.)

Because Seeing is Believing

Part of why IoT and BYOD have changed the situation so drastically is that new devices (both managed and unmanaged) are constantly being connected. Any device connected to the network can potentially function as a gateway into your infrastructure.

It has become all too common for there to be a “disconnect” between the number of devices the average IT administrator thinks is attached to the network, and how many devices are actually there. Shockingly, it is not unusual for the disparity to be as high as 20-30 percent.

In approaching the protection of any network, visibility is key – because you cannot protect what you cannot see.

An Innovative Approach to Today’s Security Challenges

A Next-Gen network visibility and access control management solution such as Portnox CLEAR continues to provide ongoing and comprehensive protection against hackers. With Portnox CLEAR, an organization can be hermetically covered, and IT and CISOs regain the visibility and continuous risk assessment they need.
Portnox CLEAR gives you 100% visibility of all devices, including managed and unmanaged devices. With this comes greater control and security, and the ability to develop new strategies – particularly, segmentation of IoT devices, so that they only access a limited part of the network.

The Need for Speed

Portnox CLEAR handles the complexity of today’s networks through Continuous Risk Analysis (CRA), which provides more flexibility than the approach of a one-time “grant or deny.” CRA is built to provide protection in a reality that involves a broad range of devices as well as “anytime, anywhere” connectivity.
CRA is a response to the need to act fast in the geo-distributed mobile workforce of BYOD and IoT. Replacing the old tactic of periodically scanning, CRA provides a real-time approach to network admission control that allows you to continually assess endpoint risks to the network.

Putting It All in Context

Portnox CLEAR also offers an unprecedented degree of context awareness, monitoring changes in hundreds of parameters and correlating multiple context attributes. This provides an adaptive and more analytic approach to risk determination, and facilitates the development of security assessments that are much more comprehensive – taking into account considerations such as time, network location, user identity, and scenario.
Context awareness is particularly significant to today’s cybersecurity because it facilitates the discovery of anomalies – both as relate to device behavior, and as relate to the status of the network.

100% Visibility and Real-Time Access Control

Portnox CLEAR offers ongoing network visibility and access management control so that you can keep your network safe, with real-time risk assessment that mitigates the cybersecurity threats.
As a cloud-based endpoint security management solution with context-aware security assessment capabilities, Portnox CLEAR is up to the challenge of optimally protecting the security of your network.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

您的公司真的為網絡攻擊做好準備了嗎? 第2部分

In the previous article, we discussed the importance of digital transformation to business, and how this process brings various information security issues with it. Now we will talk a little bit about what are the most common cyberattacks on businesses today and what a weak cybersecurity posture can do to your business, particularly in the healthcare, technology, and payment industries.

See below why the loss of privileged credentials poses serious business risks and how your company can initiate a cyberattack response plan.

What Are Privileged Credentials?

 It is becoming more common to hear about cyberattacks developed by people inside an organization than by outside hackers. This happens because its users, and particularly its most privileged users, are the biggest threat to its cybersecurity. After all, privileged credentials are also called keys to the kingdom, as they provide access to critical actions, such as modifying domain controller settings or transferring financial resources from an organization’s accounts.

These users already have keys to your kingdom and therefore it can be incredibly difficult to identify them and prevent them from abusing their privileges. An unsatisfied employee or someone who should never have had access to sensitive data can financially harm an organization and easily destroy its reputation. 

Knowing this, everyone (not just IT and security teams) must understand what it means to be a privileged user and what you can do to help mitigate the threats they pose. Thus, in times of increased regulatory requirements, including new data protection legislation such as LGPD and GDPR, ensuring the protection of privileged credentials is more than reducing cyber risks and avoiding multi-million-dollar sanctions, it is ensuring business continuity.

What Are Cyber Threats Involving Privileged Credentials?

Because your privileged user accounts have higher access levels than other users, they need to be monitored more closely. The threats privileged user accounts pose can generally be summarized into three main categories.

Accidental Insider Threat

A significant proportion of insider threats are unintentionally caused. All users make mistakes, including those with privileged access. Due to the types of data they have access to, the mistakes privileged users make have far more serious consequences. 

A careless user can make a change to critical business data without thinking about the consequences. Or they can grant unnecessary access to a file share when there is no need for such access. All of these actions unnecessarily put data at risk.

Malicious Insider Threat

Because your privileged user accounts already have access to sensitive data, intentional misuse can be harder to detect than a stranger trying to gain illegitimate access. These people sometimes use the fact that they are not monitored as closely as other users to intentionally abuse their privileges. Their attacks can be opportunistic or premeditated, but they can be devastating anyway.

Outside Invader

External attackers often target your privileged user accounts as they can use the elevated privileges to move around the network undetected. They might try to trick your privileged users into providing them with credentials through phishing attacks, or might try to gain access through brute force.

What Are the Strategies That Can Be Used to Respond to Cyberattacks?

When an incident happens, time is crucial. The longer it takes to respond, the more likely the risks will increase. That’s why it is essential to have an incident response plan. By preparing yourself in advance, you can act quickly to identify and mitigate damage. 

Here are five important activities for developing an effective incident response plan.

Understand Cybersecurity Incidents

What is crucial here is that organizations understand what is normal in their environment and what the potential risks are. If an organization does not know what a normal scenario looks like, how would it detect the abnormal or malicious one?

An information security risk assessment conducted annually or whenever you make significant changes to your organization will help you answer these questions as you analyze how your confidential information is used and how issues can arise.

Make Sure Your Scope Is Appropriate

The number of risks you identify will be incredibly huge, and realistically you won’t be able to deal with all of them.

You must therefore decide which risks to prioritize. Your decision should be based on an assessment of each threat’s potential damage and the likelihood of its occurrence.

Create An Incident Response Plan

With your most important threats identified, it is time to create an incident response plan to deal with them. This is a six-step process:

Preparation: The policies, procedures, governance, communication plans, and technology controls you will need to detect a security incident and continue operations once it occurs.

  1. Identification: Organizations need to be able to detect a potential incident. They must understand what information is available and in what location. Logs also need integrity. Can you trust that an attacker has not changed the logs?
  2. Containment: How you will isolate the problem and prevent it from causing further damage.
  3. Eradication: You should confirm what happened and answer any other questions the organization has.
  4. Recovery: The process of returning to business as usual.
  5. Lessons Learned: The processes of evaluating the implications of procedures and policies, collecting metrics, meeting reporting and compliance requirements, and identifying lessons that need to be learned.

Train Your Team

The success of your incident response plan depends on how well your team executes it. This includes not just the people responsible for creating and executing the plan, but everyone in your organization.

After all, their work can be interrupted when the plan goes into effect, so you need to make sure they are prepared. This means informing them of the plan, explaining why it is in place, and providing the necessary training to enable them to follow it.

Roles, responsibilities, dependencies, and authorization are also critical. Is the incident team empowered to make difficult and important decisions that could impact the organization’s operations?

Final Thoughts

Cybersecurity is an important topic for every business in today’s hyperconnected world. With fast-growing technologies like cloud, mobility, and virtualization, the security boundaries are a bit blurred and not every organization adequately protects its valuable and confidential information. 

As a result, cyberattacks and data leaks occur more frequently and that is why they are no surprise in the field of Information Security. With the increasing sophistication of attacks on organizations of all sizes, the question is not whether a company will suffer a cyberattack, but when that attack will occur and what the consequences will be. 

Controlling privileged actions in an organization’s infrastructure enables IT systems to be protected from any attempt to perform malicious actions such as theft or improper modifications to the environment – both inside and outside the company. 

In this context, a Privileged Access Management (PAM) solution can be considered an important tool to speed up the deployment of a cybersecurity infrastructure. Privileged Access Management is an area of identity security that helps organizations maintain full control and visibility over their most critical systems and data. 

A robust PAM solution ensures that all user actions, including those taken by privileged users, are monitored and can be audited in the event of a security breach. Privileged access control not only reduces the impact of a breach but also builds resilience against other causes of disruption, including insider threats, misconfigured automation, and accidental operator error in production environments. 

Schedule a demo and find out why senhasegura is the best-rated PAM solution (4.8/5) among competitors in Gartner Peer-insights.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.