Skip to content

我們已進入網絡安全危機時代

Cyber Security Crisis: An Origin Story

The 2020s are quickly being defined as a decade of globalism driven by digital connectivity, technological innovation and the questioning of socioeconomic norms that have persisted since the early 20th century. If the 1970s gave rise to the “me” generation, the 2020s can only be described as the “now” generation. Information at unprecedented scale is available at our fingertips – anywhere, anytime, in nearly any format. This has changed the expectations of the average consumer and the military-industrial complex alike. We communicate online, we work online, we wage war online.

In this new digitally connected age, data has become the world’s most valuable resource. Data means power. Those that hold it have the edge. This applies to individuals, businesses and governments alike. With data at such a premium, it’s no wonder a market for data theft has flourished – after all, it’s human nature. For every good deed, a bad deed lays in wait. 

The hacker represents the modern day boogie man – lurking out in the digital ether, unseen…but we know he’s there. It’s a delicate balance, especially at the corporate level. Companies play digital defense because they possess the data, whether it be financial, legal, personal or otherwise. Hackers innovate, finding new ways into corporate networks, devices and applications. This continuum has in turn created the cyber security market, where vendors strive to make a quick buck by plugging the latest hole in corporate infrastructure. But it’s been a losing battle thus far because security solutions that come to market are reactionary to problems their customers are already facing. The black hats have the element of surprise, and companies typically don’t know what hit them until it’s too late. 

This new digital dystopia is here to stay. And while it might make you want to shield your eyes like an episode of Black Mirror, the outlook for data protection and cyber security is not as bleak as it may seem. The first step to resolution (or general improvement), is to acknowledge that a cyber security crisis exists, and to identify our current challenges and shortcomings in order to pave a path forward.

Today, corporate networks are expanding and evolving in true Darwinistic fashion thanks to architectural advancements, new networking protocol standards, device proliferation, hybrid work policies…you could write a dissertation on this topic alone. The point is: the corporate network now extends to wherever authorized devices can connect to gain access to company resources.

More, More, More: Exacerbating the Cyber Security Crisis

All of this proprietary, confidential or merely sensitive data being accessed across these parts of the network is no longer safe behind your castle walls. The physical headquarters still exists, but it’s basically just a “fat” branch like any other satellite office or employee working from home. 

This complexity has driven cyber risks and costs to dangerous new heights. The number of significant cyberattacks globally is increasing and includes devastating ransomware attacks that are breaching even the most secure networks. But are we really surprised? Cyber defense (and offense) is the national security priority for every developed country on Earth. We’ll never know the global investment made into clandestine black hat innovation for the sole purpose of destabilizing the digital footprints of nations perceived to be threats. We may not want to. Ignorance here really can be bliss.

The Bad News

There were on average 270 attacks per company over the year, a 31% increase over 2020. Third-party risk continues to dominate: successful breaches to the organization through the supply chain have increased from 44% to 61%. (Accenture)

As they’ve adopted these new extortion approaches, ransomware gangs have become greedier. The average ransom demand was $5.3 million. That’s up 518% from the 2020 average of $847,000. (Palo Alto)

32% of organizations say security is not part of the cloud discussion from the outset and they’re trying to catch up. Reasons preventing take-up of the cloud revolve around security issues: about one-third of all respondents say poor governance and compliance is a problem, that cloud security is too complex and that they do not have the internal skills to structure a proper cloud security framework. (Accenture)

The Good News

82% of IT executives say their budgets have increased in the last year. IT security budgets are now up to 15% of all IT spending, 5 percentage points higher than reported in 2020. (Accenture)

49% of IT executives said their top security priority is the protection of sensitive data. (IDG)

The global median dwell time – the duration between the start of a security intrusion and when it’s identified – has dropped to below a month for the first time, standing at 24 days in 2021. That means incidents are being identified twice as quickly as they were year-over-year. (ZDNet)

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

GREYCORTEX Mendel 3.8 現已推出

We have released a new version of GREYCORTEX Mendel

You will now have even deeper insight into your IT and OT networks thanks to the customizability and versatility of GREYCORTEX Mendel 3.8.

GREYCORTEX Mendel 3.8 Features List

 

Dynamic monitoring of IT and OT network

Visualize your network assets in a broader context

We bring broader and clearer insights into your network with new automated or manual classification of devices and subnets into logical parts according to given criteria.
You are also able to create and assign a tag for all network assets including enhanced information. You can classify or process the tagged devices and subnetworks using other logical operations.
With individual tags, it is possible for you to monitor any changes that occur on your devices. This gives you an overview of the network in a broader context.



Better overview of network security

Keep your network security under control

Mendel interprets all events captured in your network with more clarity thanks to the MITRE ATT&CK® framework.
Events in the network are classified according to:
 —  MITRE ATT&CK® tactics and techniques
 —  Proofpoint rules
 —  Top events – you can see the most relevant events at the top

Wider options for network data retrieval

Choose your own view of your data

GREYCORTEX Mendel 3.8 is capable of deeper and more advanced data analysis than ever before. 
Thanks to the redesigned analysis module, you can  define any view over your processed and stored data using attributes, metrics and other variables.

Easier deployment of GREYCORTEX Mendel 

See all your subnets straight after deployment

Immediately after deploying GREYCORTEX Mendel 3.8 to your network, Mendel starts the process of finding and classifying all subnets by itself.
Thanks to this categorization at this early stage of deployment, you can orientate in the network quickly and clearly. 
A hidden subnet could be a potential threat to your entire network. Now you can avoid the danger using this new enhancement.

Asset Discovery

Do you know what is hiding in your OT/ICS network?

Search for information about the OT devices in your network proactively. GREYCORTEX Mendel supports many OT protocols, giving you the ability to see all devices in your network and also find detailed information about them. You will get such details as manufacturer, serial number, the last revision date of hardware or software, and much more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

SafeDNS贏得了最佳價值軟件獎

We are happy to announce that SafeDNS web-filtering service has won the Best Value Software award at SoftwareSuggest Winter Recognition Awards 2022.

To quote SoftwareSuggest, “To save businesses’ resources and prevent their staff from wasting work time SafeDNS provides a sophisticated cloud-based solution for web filtering which also increases users’ safety online by blocking botnets, malware, and phishing resources filter out most internet ads and content users consider irrelevant and inappropriate.”

SafeDNS team would like to thank SoftwareSuggest for their high appraisal, as well as our partners and customers for their trust and feedback. They always help us work towards improving our service.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.