Lexmark assigned a CVSS score of 9.0 (“critical” severity rating) to this vulnerability (tracked as CVE-2023-23560), which allows server-side request forgery (SSRF) via the Web Services feature listening on port 65002 of affected printers. A successful attacker can exploit this vuln in a chain to gain code execution as root on vulnerable devices. Lexmark’s advisory states that, as of last week, they are not aware of anyone currently exploiting this vulnerability, but proof-of-concept exploit code is publicly available.
Are updates available?
All firmware versions (release numbers 081.233 and prior) for affected printer models contain this vulnerability (CVE-2023-23560). Lexmark has made firmware updates available for each affected device, via release numbers 081.234 and later (see Lexmark’s advisory for specific release version details per affected printer).
If updating firmware isn’t a near-term option for admins/owners of affected printers, Lexmark does offer a straightforward mitigation:
Disabling the Web-Services service on the printer (TCP port 65002) blocks the ability to exploit this vulnerability. The port can be blocked by following process: “Settings”->“Network/Ports”- > “TCP/IP”- > “TCP/IP Port Access” then uncheck “TCP 65002 (WSD Print Service )” and save.
How do I find potentially vulnerable Lexmark printer assets with runZero?
Please note that the following query relies on you having already performed a scan with our latest Explorer/scanner release (v3.4.22), which now includes the scanning of port 65002. Alternatively, you can perform a new scan using an older Explorer/scanner, just add port 65002 to the Included TCP ports list under the Advanced tab of your task settings prior to running the scan.
From the Asset Inventory, use the following pre-built query to locate Lexmark printer assets which may need remediation:
type:printer AND vendor:Lexmark AND tcp_port:65002
As always, any prebuilt queries are available from our Queries Library. Check out the library for other useful inventory queries.
About runZero runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Happy New Year, NordPassers. We’re starting the year with a few important updates. Here’s what to expect in this release:
B2B TOTP. It might sound like random letters pieced together, but this means that NordPass Business users can now use TOTP functionality on Android devices. How exciting is that?
AUTOFILL ISSUE REPORTING BETA. Is autofill not working as expected on your favorite browser? You can now tell us what’s wrong. Look for the Feedback (Beta) when filling in passwords.
NordPass 3.50
This time we worked on nitty gritty details to make your password management experience even smoother. Here’s what to expect with this release:
MORE BROWSERS WITH BETTER AUTOFILL. We added native autofill support to Tor, Via, Phoenix, Maxthon; meaning that if you use any of these browsers it will now be easier for NordPass to recognize input fields and fill your passwords.
MINOR DESIGN CHANGES TO AUTOFILL SETTINGS.
BUG FIXES.
NordPass 3.49
We’re happy to present you with a new release. Here’s what we’ve got this time:
UI IMPROVEMENTS. New users will see an updated onboarding design, while the veterans will notice slight changes to the new password history feature.
BUG FIXES.
NordPass 3.48
No big announcements from us this time. However, we hope you’ll still enjoy an updated NordPass version with fewer bugs.
NordPass 3.47
We’re happy to present you with a new release. Here’s what we’ve got this time:
RATE NORDPASS IN-APP. Are you enjoying NordPass so far? Look for a pop-up to rate NordPass and help others choose their password manager.
AUTOFILL IN VIVALDI BROWSER. You will now fill your passwords and other information easier when using the Vivaldi browser.
IMPROVED AUTOFILL FOR OTHER LANGUAGES. If your browser is set to your local language, autofill will now pick it up quicker and help you save your passwords.
NordPass 3.46
No major updates this time, just a new and improved app release with fewer bugs for you to bump into – enjoy!
NordPass 3.45
Building good things takes time. So since the last release, we have focused on catching and eliminating pesky bugs.
NordPass 3.44
It’s a big day today. Premium users, get ready. From now on, you’ll be able to monitor breaches.
Your Breach Scanner can now scan breaches while you sleep. Set up an email you’d like us to monitor and will check breaches for you. If we find your email, we’ll notify you so you can take immediate action and protect your data. Look for this new functionality by going to the Breach Scanner.
P.S. We also fixed some bugs to improve your overall experience.
NordPass 3.43
No big announcements from us this time. However, we hope you’ll still enjoy an updated NordPass version with fewer bugs.
NordPass 3.42
This time we’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy!
NordPass 3.41
We’re happy to present you with a new release. Here’s what we’ve got this time:
PROFILE PHOTO. You can now add your favorite photo instead as your profile icon. With a customized profile icon, it’s easier to recognize your profile when sharing items or switching accounts.
NATIVE AUTOFILL ON BRAVE. This means your autofill and autosave experience has just leveled up. It will now be easier for us to recognize password fields and fill in your information.
BUG FIXES.
NordPass 3.40
Building good things takes time. So since the last release, we focused on catching and eliminating pesky bugs.
NordPass 3.39
No big announcements from us this time. However, we hope you’ll still enjoy an updated NordPass version with fewer bugs.
NordPass 3.38
This time we’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy!
NordPass 3.37
Building good things takes time. So since the last release, we have mainly focused on catching and eliminating pesky bugs.
NordPass 3.36
A new week and a new NordPass release. Here’s what we’ve got:
NEW SETTING: CLEAR COPY ITEM DATA. When you copy your password or other item data, it’s typically saved in the clipboard. To avoid pasting it somewhere you didn’t intend; you can now choose the clipboard to clear after a set time.
LITHUANIAN LANGUAGE. For our Lithuanian friends out there, you can now use NordPass in your mother tongue. Simply head to Settings to change the language.
BUG FIXES.
NordPass 3.35
We’re happy to present you with a new release. Here’s what we’ve got:
SWITCH ACCOUNT. A long-awaited feature is here! If you have a few NordPass accounts, like personal and business, switching between them will now be a breeze. Just click on your profile account and look for a “Switch Account” button.
CARD PIN. From now on, you can also add your PIN when saving your card details. Don’t worry; it won’t be autofilled. It’s for your reference only.
BUG FIXES.
NordPass 3.34
Happy pancake day, people! Though if it were up to NordPass, every day would be a pancake day. In the meantime, while you are enjoying your pancakes, donuts, or pastries, we are presenting you with a new NordPass release with fewer bugs.
NordPass 3.33
Our bug busters have been working hard since the last time you heard from us. That’s why today we can proudly present another NordPass release with even fewer bugs. We hope you’ll like it.
NordPass 3.32
Did you know that January has one of the most depressing days? It’s called Blue Monday, they say. Good that it’s over. But if you are still feeling a little bit blue, here’s what you can do to survive this winter:
Enjoy the outdoors, go for a walk or take up a new sport;
Connect with a long-lost friend or family member;
Run the Data Breach Scanner and update your vulnerable passwords. Once you do, select “Resolved” for the updated passwords and they won’t appear next time you run the scan.
NordPass 3.31
Like last year, in 2022, we’ll strive to become a better, smoother-running, and more user-friendly app. So why not start with this week? We present you with a new NordPass version with fewer bugs and Autofill issues.
NordPass 3.30
We hope you are not sick and tired of Christmas songs, even if you’ve heard them a million times before. And we hope that you are not stressed buying last-minute presents or thinking about a Christmas menu. But if you’re, it will all be ok.
After all, ‘It’s the most beautiful time of the year.’ Merry Christmas!
P.S. And here’s a new NordPass release to bring you a little cheer.
NordPass 3.29
Did you know that if your password is ‘ginger,’ it would take a hacker less than 1s to guess it? If you use NordPass, we know you can do better than that. Create strong and unique passwords with your NordPass mobile app, and don’t let any Grinch steal your Christmas (or your accounts) this year.
NordPass 3.28
It’s 5 weeks until Christmas! Yes, it’s time to buy presents for your loved ones. But do you sometimes slip and buy gifts for yourself instead? Because we do. Don’t tell this to anyone.
So if you slip this year, don’t worry too much about it. You can save up to 75% of NordPass Premium plans and give the so-needed peace of mind for you and your family guilt-free.
We’re making the NordPass app for Android better, smoother, slicker – one release at a time. How exactly? Read all the highlights in our release notes and make sure to never miss a new version – we want you to get all the best stuff.
NordPass 3.27
–Beep beep– app update incoming:
Native autofill on Chrome. Simply put, Nordpass is now better at recognizing login fields. It means smoother and faster autofill!
Data Breach Scanner update. If you use a leaked password for several accounts, the app will notify you about accounts put at risk. Remember to update them!
Title suggestions. Running out of ideas for naming items in your vault? No worries – NordPass will suggest using the website name for the title.
Usual bug-fixing business.
NordPass 3.26
Trick or treat? Who are we kidding? It’s always just treated here at NordPass. So here’s our Halloween treat to you – a brand new NordPass release. Don’t worry, nothing to be scared of—just a smoother running version of your password manager.
NordPass 3.25
Getting your data stolen isn’t nice. But if that happens to you, it’s important to identify the stolen information and act quickly. That’s why from this release, you can use the Breach Scanner to find out the type of data that was leaked and see it in plain text.
We also wanted to improve our communication with you. So from now, if you open the app and see a red dot next to a bell icon, just know that it’s some important information from us to you.
NordPass 3.24
Seasons change. Leaves turn yellow and brown. It might be sad, but don’t feel too down. Just remember, your passwords are safe and sound.
And if you don’t like amateur rhymes, that’s fine. With this release, you’ll have less bugs in your life.
NordPass 3.22
Good things are meant to be shared, right? That’s why now, when you invite a friend to try NordPass, we’ll award both of you with a free month of Premium (max 3 months). You can invite as many friends as you wish. Just head to the app, select “Invite a friend,” and send the invite.
NordPass 3.21
What do you have in the box this time NordPass? Well, let me see…
Email or username suggestion. That’s right, now when creating a new item, you only need to enter a few letters in the username field, and NordPass will suggest filling it with one of your already used ones.
Autofill fixes.
Bug fixes, bug fixes, and more bug fixes.
NordPass 3.20
It’s the end of the summer, eh? You must be sad. Or happy? Maybe because you’ve just got NordPass at the end of summer sale. Or perhaps you live down under, and it’s actually not the end of the summer but the end of winter. Either way, we hope you’ll enjoy a new NordPass version with fewer bugs and more love.
NordPass 3.19
Random fact of the day: Did you know that there’s a bunch of ladies working at NordPass? Yes, we don’t follow any stereotypes here. So in this release, we want to thank all the women who tirelessly and continuously work to make NordPass a better password manager.
NordPass 3.18
Hola! Last week we presented you NordPass in Italian. Can you guess what we have in store this week? Yes, that’s right. NordPass is now available in Spanish! Head to Settings to update your language preferences.
And, of course, we continue to work on any pesky bugs you or we identify. Bye, bugs!
NordPass 3.17
Buongiorno! What a year this was for Italy. First the Eurovision, then Euro Cup, and now, coincidence or not, NordPass. Yes, you are right, you can now use NordPass in Italian, and it doesn’t matter if you are enjoying the sun in Rome or simply practicing your Italian skills. You can change your language preference in Settings.
And of course, what release is without bug fixes? We crushed them too.
NordPass 3.16
Hey NordPass user, do you like scrolling? Not when I’m looking for a password, you will say. Yeah, we thought so. That’s why we introduced a quick scroller. Now when scrolling through your items, you’ll see that they are grouped. Go on, find your passwords with ease.
P.S We have also resolved those pesky bugs. Bye-bye, bugs.
NordPass 3.15
Searching for bugs… Loading… Loading… Bugs found… BUGS FIXED!
*Works only if you install the update first to put those BUG FIXES in place. Stay safe and happy!
NordPass 3.14
Sharing is caring, right? Well, now you can select multiple items and share them all at once. Easy peasy. Just always make sure you trust the people you share your credentials with.
NordPass 3.13
You know that moment when you create a super-strong password with NordPass Generator and forget to save it? Yeah, we’ve been there too. That’s why you’ll now see a little clock icon in your Generator. Tap on it to see previously generated passwords.
And, of course, we won’t release a new NordPass version without getting rid of as many bugs as possible.
NordPass 3.12
You want strong and unique passwords, simple – you generate them with the Password Generator. But what if you want a strong password you need to remember? Yes, we thought about this too.
So in this release, you’ll see some changes to your Password Generator. Now you can generate passwords made out of words, spaces, hyphens, and much more. How cool is that?
NordPass 3.11
We’re coming back with a bunch of updates to help you make your accounts even more secure.
PASSWORD HEALTH INTEGRATION. You can now see how healthy your password is by opening the item — no need to go to Password Health. If your password could be stronger, you’ll see “weak, old, or reused” next to it.
P.S. There’s more. We’ve fixed a ton of autofill bugs for a smoother login experience.
NordPass 3.10
Are your passwords healthy or vulnerable? If you haven’t checked it yet, now is a good time. We’ve just revamped the Password Health tool, and it’s looking better than ever. It’s so much easier to use too. Check it out.
Anything else? Of course! Our team is continuously working on improving the Autofill feature so that you’d have a smooth one-click-to-login experience.
NordPass 3.9
If you haven’t tried the Breach Scanner yet, now you have a reason. We completely revamped the design. Oh boy, it looks even more pleasing to the eye.
What are you waiting for? Go and make sure your accounts are secure.
NordPass 3.8
Bonjour. Comment ça va? Yes, our French-speaking friends, this release is for you! NordPass is now available in French. Head to Settings and change the language.
In other news:
LIMITED RIGHTS CHANGES. From now on, once you receive an item with Limited Rights, it’s for you only. No further shares allowed.
B2B GROUPS. NordPass Business users say hello to Groups. Now it will be easier to share passwords with a group of people all at once. Think, your Marketing or Finance department.
NordPass 3.7
Sometimes what we do is either too difficult to explain or too difficult to see. Yes, you guessed it. This week we put all our effort into finding and getting rid of bugs. We hope we’ll have something more exciting for you next week.
NordPass 3.6
Sprichst du Deutsch? Then we have good news for you. You can now enjoy NordPass in German. Just go to your settings and change the language.
But that’s not it. We have some exciting news for anyone who speaks french too. Stay tuned. 😉
NordPass 3.5
This release theme? Fixes, fixes, and more fixes. Quality over quantity. So what did we actually do?
Found and got rid of your beloved dark theme bugs.
Improved Autofill by killing nasty bugs.
Other teeny-tiny bug fixes.
NordPass 3.4
No breaking news this time. We know. We’ll do better! Just business as usual and a ton of bug fixes for a smoother app experience.
NordPass 3.3
Guten Tag, – says NordPass. Yes, that’s correct. If your phone’s default language is German, you can now enjoy NordPass in your preferred language. Anything else? Of course! More bug fixes.
NordPass 3.2
Well, hello there. It’s NordPass calling with a shiny brand new release. Here’s what we’ve got:
CHANGES IN 2FA SETUP. Now two-factor authentication will be set up for your Nord Account and applied to all Nord products you might use.
AUTOFILL AND AUTOSAVE ISSUES FIXED, so you could continue saving and filling passwords quicker than you can blink.
DARK MODE BUGS FIXED. Minor bugs were found since we released the dark mode. Nothing to worry about; they are now gone.
NordPass 3.1
Still recovering from the last release? If you haven’t heard (or seen it yet), you can now enjoy NordPass dark mode!
Unfortunately, we are not superheroes, so we can’t drop any big news today. Plus, it wouldn’t be fun this way. So this time, we worked on some maintenance tasks to keep your app running smoothly:
COPY CHANGES to help you navigate through the app.
AUTOSAVE ISSUES FIXED to help you save those passwords in a click.
BUG FIXES. Because no release is complete without them, right?
NordPass 3.0
Where’s the drumroll, please? You ready? You’d better sit down for this one. I’m serious; sit down. OK, you’re finally sitting.
I’m just scared you’ll fall and hurt yourself once you hear this, that’s all. Oh, I know. It’s so annoying when someone is creating tension but not telling you what this is all about, right?
Ready, set, new release! What can you expect to see in the new and shiny NordPass 2.17?
AUTOFILL FIXES. Slowly but surely, we are conquering the net and one website at a time, making signing in easier than ever. Magic x2!
ADD CREDIT CARD WITH NFC. Yes, you heard it. You can now scan your credit cards and keep them in NordPass by simply touching your card against your phone. Magic!
NordPass 2.16
8 letters, 2 words, one meaning.
9 letters, 3 words, one feeling.
We felt kind of nervous to say it out loud… But again, they say – don’t talk, just act. So we’re bringing you yet another collection of chocolate-flavoured, hand-picked BUG FIXES to express how much WE LOVE YOU. Please update to enjoy even smoother app experience.
NordPass 2.15
Once upon a time, a password manager named NordPass lived. They wanted to become the best password manager there ever was, and did it one release at a time.
AUTOFILL ISSUES FIXED. Salvador Dali said not to fear perfection as we’ll never reach it, but we’ll still give it a good go.
QUICK ACTIONS ADDED. Just click on the app and quickly access Password Generator, search your items, or add a new password.
TOOLS AND MENU REWORK. Now you can enjoy a much cleaner and Menu, Settings, and Tools tab.
NordPass 2.14
AbraCadabra boom! No, it’s not magic. It’s just your passwords and credit cards information filling in quicker and smoother than ever before. Bye-bye, annoying bugs who tried to stop you.
What else can you expect in this release? Some copy changes to make the app easier to navigate, and we are super excited to share with you some news – Dark theme is coming soon.
NordPass 2.13
New Year, new NordPass release. Here’s what you’ll see in the latest version:
AUTOFILL IMPROVEMENTS. The sky’s the limit for this one.
BETTER LOOKING ITEMS. Items with no accounts have just become more stylish, or in other words, more colorful.
AUTOSAVE IMPROVEMENTS, so you could save your passwords in a blink of an eye.
EASY-TO-UNDERSTAND PASSWORD FORMATTING. We hear you; telling apart 0 from O when creating passwords isn’t easy, but it will be from now on.
NordPass 2.12
Yeah, Christmas will be different this year. But we’ve still got something to spread a little cheer.
In this release, you will see:
ITEM ACTION FIXES, which we noticed when scrolling through an item’s action list.
COPY CHANGES to make your app easier to navigate.
AUTOFILL FIXES, so you could smoothly log in to even more websites and apps.
MULTISELECT AND SORTING. You can now select multiple items and move them to a specified folder or Trash and sort them by Title or Date Last Used.
NordPass 2.11
NordPass has turned 1 year old, can you believe it? We can honestly say that this year, we are the most grateful for YOU, our dear NordPass user. You, who believed in us and drove us to release one update after another.
So here’s one more. Full of even more design edits, bug fixes, and love:
MINOR DESIGN AND COPY CHANGES because who doesn’t like a good-looking app. AUTOFILL BUG FIXES, so you could log in to your favorite websites and apps quicker than you can count to three.
NordPass 2.10
ADD/EDIT ITEM FIXES. Next time you add a new item, or edit an existing one, pay attention to the new design. Sleek, isn’t it?
IN-APP SHARED ITEM NOTIFICATION. Someone shared an item with you? You’ll get a notification in your app instantaneously. Forget emails.
BUG FIXES. No bugs allowed in our app.
NordPass 2.9
NORDPASS BUSINESS AVAILABLE ON ANDROID. Business people beware, it’s your time to shine. Fill in passwords on mobile browsers and apps (like a boss!), sign in to your accounts with a fingerprint (like a boss!), and never ever have those dreadful phone calls with Brian from IT because you forgot your computer password after a long long holiday (Ouch!).
NordPass 2.8
SECURE NOTES FORMATING – FIXED. It looks like we’ve accidentally deleted text formating options on a previous app update. Sorry about that! Formating is back and now ready for your bold, italic or quoted notes more than ever before.
DESIGN IMPROVEMENTS. A little treat for eagle-eye users – please welcome those charming menu icons and precise text formatting.
AUTOFILL IMPROVEMENTS. No app update was or will be released without this one.
BREACH REPORT. Now this one may feel like a fun lottery, except the fact that it’s probably better not to ‘win’ anything. By clicking a ‘Scan’ button, you can find out if any of your accounts were ever caught in data breaches. Fingers crossed, they’re not.
AUTOFILL IMPROVEMENTS. Even more websites are ready to autofill your passwords.
DESIGN IMPROVEMENTS only eagle eyes will spot. We all know who lies in the details, right?
NordPass 2.6
PASSWORD HEALTH CHECKER. If you hear someone coughing and no one is at home – that might be a password in your vault. Take a chance to use this new fancy tool for making your precious passwords stronger and happier (and accounts safer) without leaving the house.
AUTOFILL IMPROVEMENTS. You probably might start thinking that we are making up this one each time, just to add something to the release notes. The truth is that with each update, we are getting closer to perfection.
NordPass 2.5
NORDVPN. Nobody likes snoopers – especially online ones. Luckily, VPN helps. Look for getting NordVPN in Menu – surf the Internet privately, no matter where your path may lead you.
AUTOFILL IMPROVEMENTS. Every time you tap NordPass icon to autofill, there’s an actual person who copies and pastes your login details. Wait, do they see your passwords?! No, of course not – they are trained to work wearing blindfolds. We hired more people to this department, so “auto”fill is now way better.
NordPass 2.4
They say – small changes make a big difference. Behold – the update with a bunch of app upgrades is here. Let’s see what we’ve got here:
VISUAL IMPROVEMENTS. Mirror mirror on the wall, who is prettiest of them all? Well, our designer’s brush made some magic tweaks, so the answer is clear now – it’s those tiny cute little app icons. Lookin’ good!
APP LOADING FASTER. Need for speed? You’re welcome! Fasten your seatbelt and put the pedal to the metal – the project “Make the app faster” was completed successfully.”
BUG FIXES. Dear sneaky bugs, thanks for visiting, farewell, let’s never meet again.”
NordPass 2.3
AUTOSAVE. We’ve invited web browsers and mobile apps to the summer password-training camp. Result: those who attended will now suggest saving your credentials to the vault. Whenever you type them manually.”
OTHER IMPROVEMENTS. We also did some tinkering under the hood to make your password-managing experience even smoother.”
NordPass 2.2
PERSONAL INFO. Ready to fill online forms even quicker? Keep your name, email, phone number and address in the vault to fill delivery info or other online forms. Faster than ever.
AUTOFILL IMPROVEMENTS. Brought to life by popular demand, the project “Make autofill better” was completed successfully. The result: the app automatically fills your credentials on even more apps and websites.
NordPass 2.1
ADD ITEM TO FOLDERS. Instantly – when creating or editing an item. Just select a folder, and you’re good to go.
VISUAL IMPROVEMENTS. Mirror mirror on the wall, who is the prettiest of them all? FYI, our designer’s brush made some small visual improvements in the vault. Lookin’ good!
AUTOFILL IMPROVEMENTS. You report – we improve. Win-win!
NordPass 2.0
APP DESIGN IMPROVEMENTS. Here you go. A piece of nicely, freshly baked update – straight from the oven. Enjoy these deliciously sweet visual improvements and improved password-managing experience. Bon Appéti
NordPass 1.9
NORD ACCOUNT. Meet new and simplified way to sign up and log into NordPass.
STRONGER MASTER PASSWORDS. Added some guidance for leveling-up your Master Password. For even better vault protection.
UPDATED SHARED ITEM VIEW. An easier way to find out who has access to shared items.
AUTOFILL IMPROVEMENTS. More websites will be pleased to autofill your credit card details. Faster online checkouts FTW.
NordPass 1.8
SWIPE DOWN TO SYNC ITEMS. The best thing since sliced bread – refresh the vault by swiping down to sync your items across devices.
INTERFACE CHANGES. No more going ‘home’ to find the item you need. Browse vault categories to browse items.
You say ‘AUTOFILL’, we say ‘IMPROVEMENTS’. Nothing else to add but even smoother app experience.
ADD LOGIN – AT FLOATING BUTTON. All you need is milk and cookie – for adding new logins. One more addition for native browser lovers!
NordPass 1.7
SETTINGS – SAVED. The app was sometimes forgetful about your settings. It went through some memory training, and things are now much better – no more forgotten preferences.
PASSWORD GENERATOR IMPROVEMENTS. Strong passwords everywhere – generate some while creating new logins.
TEXT FORMATTING. Jazz up your notes – make them bold, make them italic – make them FUN.
AUTOFILL IMPROVEMENTS. Autofill is now multilingual – fill in credentials to even more websites and apps.
Also, fewer app crashes.
NordPass 1.6
This update is oddly satisfying. Meet and greet:
FOLDERS. All that sorting, managing, organizing, arranging, categorizing, and many more synonyms to describe one thing – that pleasure putting your items in order. Or in folders – just as you like it.
COPY SELECTED TEXT. You can now select only a part of the text in your note. Finally! Smoother copying – faster pasting.
TEXT UPDATES. The magic of great copy in the app is invisible – you might not notice it, but it helps to do the job.
NordPass 1.5
Let’s run the password-managing world with this update:
AUTOFILL improvements. More supported browsers, more flawless autofilling and saved time.
PASSWORD GENERATOR. We’ve heard you, and now we proudly announce: password generator is ready at your command. Let’s begin the new ge-ne-ra-tion for stronger passwords.
Our designers and copywriters felt inspired by their muses, so they added some nice brush flicks at the app. Hopefully, we’re getting closer to becoming a piece of art someday.
NordPass 1.4
Are you ready? Here’s what’s new with NordPass:
NATIVE AUTOFILL feels like heaven. Those cosmic odysseys of saving new passwords to the vault are so intuitive, fast, and smooth like never before. Relax and enjoy the journey.
Look, mom, no hands! Meet FACE UNLOCK – an amazing addition to accessing your vault with biometrics. Put that p-p-p-poker face on and unlock NordPass on the go.
Some minor bugs were caught and added to our trophy collection.
NordPass 1.3
Hey you! What’s new with NordPass:
Vault SCREENSHOTS. You may now screenshot not only your crush’s stories on social media but also your vault. Of course, you can also disable them for even better protection of your vault. Handy, right?
ITEM IMPORT from mobile browsers. No fancy words needed – it’s simply an awesome feature itself.
Some minor catches at the bug-hunting department. Bang!
NordPass 1.2
We woke up like this. What’s new with NordPass:
Tap tap tap. All flawless, shiny and new interface for tablet fanboys and cheer girls. Enjoy scrolling your vault miles away on a bigger screen.
Scan scan scan. Texts, books, magazines, credit cards, road signs, billboards – whatever your heart desires. It’s a kind of magic.
Fix fix fix. Minor fixes under the hood – nothing too fancy, just making sure to be the coolest guy on the block.
NordPass 1.1
NordPass has leveled up!
IN:
ITEM SHARING. Sharing is always about caring. From now on you will be able to share your items in the vault via phone. Safe and easy, of course.
IN-APP PURCHASES. Forget password stress without getting off the couch – you can now upgrade to NordPass Premium with a few taps on your screen.
OUT: various small bugs. Goodbye fellows, it was nice to meet you but we doubt we ever miss you.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Imagine: there’s a new security threat. How do you find out if your organization is affected? You might research the CVE to gauge the severity and impact of the vulnerability. You might perform a vuln scan — if there’s a vuln check available. At some point, you’ll eventually end up with a list of devices that you need to update.
What are your next steps?
The cost of not tracking asset ownership
In an ideal world, your asset inventory would be the first place you would look for information. However, the reality is: most organizations have their asset inventory data distributed across multiple solutions and maintained by different teams. So instead of being able to focus on mitigating issues, your security team spends an inordinate amount of time doing detective work. And for security practitioners, time is of the essence.
Asset inventory is the first step to getting context around a device: the hardware, OS, software, etc. But what about who owns it? More and more, knowing who is responsible for an asset is as important as knowing what an asset is. Without clear asset ownership tracking, you waste a lot of time going from team to team, person to person, trying to find out who is responsible for an asset.
Let’s take a look at three reasons why a lack of asset ownership can adversely impact your business.
Reason #1: Forgotten assets can be costly
One of the biggest obstacles to tracking asset ownership is humans. Humans are dynamic, often upgrading to new equipment, changing roles, or even leaving organizations entirely. As a result, assets are often left abandoned, unmanaged, and unowned. Documenting asset ownership manually, like in a spreadsheet, means that the data becomes outdated very quickly. Effective asset ownership tracking requires regular updates and attention. Without a major investment of time and resources to maintain asset ownership tracking, stale data will continue to plague your organization. For example, consider infrastructure that no longer has an owner, but is still racking up recurring expenses. These forgotten assets can be costly over time.
Reason #2: Lack of asset ownership can lead to service outages
Your business relies on having systems that are working efficiently. Systems need to be updated, upgraded, and maintained regularly to ensure that everything runs smoothly and outages do not occur. However, what would happen if a specific system needed a configuration update to continue to operate? How would you know who to go to?
Oftentimes, it’s a goose chase. You start with one person (or team) and hope they can point you in the right direction. While you’re chasing down the appropriate person to help you, access to the systems you need may be shuttered or months may have passed by. These consequences can be detrimental to business – especially if these systems directly impact revenue.
Nearly a decade has come and gone between these major vulnerabilities, and yet, building comprehensive asset inventory and tracking asset ownership continues to be a challenge. One of the biggest challenges faced by security teams is that they often need to rely on asset owners to take action to update and secure their devices. However, tracking down the right asset owner can be a bit of a journey through a myriad of data sources – from CMDBs to VMs to EDRs to device logs to spreadsheets. The amount of time that security teams spend hunting for information is a hindrance to fast response and remediation times.
Tracking asset ownership with runZero
runZero 3.5 introduces the ability to track asset owners in your inventory. Asset owners can be anyone in your organization who can help you remediate issues. For most organizations, assets will likely have multiple owners, such as an individual, team, and business unit. For example, a laptop might have an assigned device user, business owner, IT owner, and security owner. Each of these assignments will help you zero in on the right person who can take action on the device, based on the situation. Let’s take a look at how runZero can help you track different types of owners within your organization.
What are ownership types?
In runZero, ownership types help you classify and assign ownership to assets. There is a default ownership type, called Asset Owner, which automatically pulls owner data from integrations you have configured. Otherwise, you can add up to nine custom ownership types based on what your organization needs. For example, you might want to have ownership types for the security owner, IT owner, and business owner.
Name – The name of the asset ownership type, such as IT owner.
Reference – You can set the reference to user, group, or none. If set, you will be able to easily search within the user or group inventories for owners that match the display name.
Visibility – You can set the visibility to hidden or visible. This setting controls the ability to view the asset owner from the asset inventory and asset details page.
After you have created your ownership types, you’re ready to start assigning owners within your asset inventory. Let’s take a look at how you can do this in runZero.
How to assign ownership to assets in runZero
There are a couple of ways to assign asset owners: manually or automatically through rules and the API. However, the most efficient way to apply ownership is through rules, which allows you to set up specific conditions and automate the assignment of asset ownership after each scan. For example, let’s say you want to assign an IT owner for all firewalls. Here’s how you can do it with rules:
From the Rules page, create a rule using the asset-query-results event type. Based on this event type, the query will run against the asset inventory after a scan completes.
Give the rule a descriptive name, like Automate IT ownership for firewalls.
Configure the rule with the following conditions:
Run the following query after a scan completes: type:firewall and the number of matches is greater than 0.
If there is a match on the query, take the following action: modify the asset and set the ownership of the matching assets. This value for the owner can be any name. For our example, we will assign the IT owner to someone on the team named Tim.
Make sure the rule is enabled. If it is not, it will not run.
Save the rule.
Each time a scan completes, this rule will check for matching conditions and perform the configured actions.
Viewing ownership data for an asset
Now that you’ve set up ownership types and automated ownership assignment, let’s take a look at how you can view this data in runZero. You can view ownership information from two areas of the console: the asset inventory and the asset details page.
There’s a new column in the asset inventory called Owners, which will list the owners for the asset. If there are multiple owners, there will be a plus (+) sign to indicate that there are more for you to view. The owner name that gets displayed in the inventory table depends on the order you have them ranked on the ownership types page. The highest ranked ownership type will take precedence. In our example, we have our IT owner ranked first, so we will see our IT owners displayed in the inventory table. Other owners will be viewable by hovering over the plus (+) sign. From the asset inventory page, you can select some assets then use the Manage asset ownership button to manually update the owner for those devices.
From the asset details page, there is a new ownership section that lists all the visible owners assigned to that asset. If the ownership type has a reference set (to user or group), you’ll be able to click on the magnifying glass next to the owner name to search within those inventories for matching results. From the asset details page, you can go to Manage > Asset ownership to manually update the owner for that specific device.
Searching the inventory for assets based on owners
Now that you have asset ownership data in your inventory, you can search for assets that match specific ownership criteria. To enable searching based on ownership attributes, the following new keyword terms have been added:
owner – Filter by asset owner name, such as Tim.
has_owner – Filter assets by whether or not they have an owner. Use t or f as your input.
owner_count – Use a comparison operator (>, >=, <, <=, =)to filter assets by count.
ownership_type – Filter by ownership type, such as IT owner.
Here are a few useful queries (based on some common use cases):
has_owner:f – Searches for assets that don’t have an owner assigned.
ownership_type:"IT owner" – Searches for assets by ownership type.
owner_count:>1 – Searches for assets that have more than one owner.
For example, if you need to gauge the number of unowned (and likely unmanaged) assets in your inventory, the query has_owner:f would help identify assets that don’t have an owner. Inversely, you can use has_owner:t to see all the ones that do have an owner. Between these two results, you can discern how well you’ve got your asset ownership data covered. To see how well your organization is tracking asset owners, you can also check out the asset ownership goal from the dashboard.
Zero in on unowned assets on your network
Imagine: there’s a new security threat. Thankfully, you have an asset inventory that includes asset ownership data. With a solid program and solution in place to track asset owners, you’ve eliminated unnecessary time spent chasing down people. You can focus on remediation.
If you’re a runZero Enterprise customer, you can check out the ownership capabilities by going to the new Ownership page in your console. You’ll notice a new menu item for it under Global Settings. Otherwise, if you’re new to runZero, sign up for a free trial to test out this new feature for 21 days.
About runZero runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Can any employee access company resources from anywhere and at any time? It depends on the company’s infrastructure. Recently established businesses have more chances to provide access wherever their teams are. However, companies with legacy architectures need to readapt to have the same time and place flexibility.
Every company infrastructure setup is unique. Therefore, it may require a different approach to solving the same challenges — like how users can access office-based data, applications, or devices while not being present on that particular site.
The most common solution is to choose VPN for security purposes and enablement of distributed teams. However, the VPN selection depends on its type and existing company network arrangement.
If your target is to enable employees to securely connect to different offices and branches of the organization despite being elsewhere, Site-to-Site VPN is the option to explore.
Site-to-Site solution using NordLayer
Site-to-Site allows users to reach office-bind resources on HQ, your assigned office, or another company branch while not actually being on-site. It is a type of VPN that establishes an encrypted connection to a requested resource on the company network.
NordLayer’s cloud-based feature elevates typical industry Site-to-Site capabilities by connecting not just different corporate sites and resources but by enabling both on-site present and remote users to connect to any company resource on the network.
Therefore, connection to a single physical location via a virtual private gateway using VPN translates into user connection to all devices and resources assigned to a company router or firewall.
How does NordLayer’s Site-to-Site feature work?
The cloud-based feature can be enabled by connecting NordLayer’s virtual private gateway to the company’s router or firewall.
Moreover, cloud-based Site-to-Site makes it possible to configure a dedicated VPN server to connect to cloud service providers like Amazon AWS, Google Cloud, or Azure.
Users with VPN access – whether present in the branch office, HQ, or remote – can connect to the company network and access the added internal resources and the on-site devices connected to the router/firewall, even though they don’t support a VPN connection.
Remote user connection:
Connection from a company branch:
Connection from HQ:
NordLayer’s Site-to-Site feature requires virtual private gateways and physical location configuration. Once it’s ready, a VPN connects users to the local company network and allows them to access company resources like applications, data, computers, or printers.
The same logic applies to users accessing the company’s cloud service provider resources. VPN established connection and router/firewall configuration to support IKEv2 Site-to-Site functionality with a static public IP address can provide access to resources for employees despite their location.
Shortly, suppose an employee for a job needs to access your organization’s customer information stored in a database located in HQ, the email server that stands in an office branch on another continent and needs to print it out while working from home. In that case, it’s all available via NordLayer’s Site-to-Site VPN functionality.
How NordLayer’s Site-to-Site is different?
Traditional WAN companies have an architecture based on an all-to-one setup when business units – remote locations and resources of the corporate – are connected to one main point.
Such organizations exploit extensive legacy Site-to-Site architectures that employees use to connect to the network’s main point, allowing them to access company-enclosed resources from different locations. This type of network architecture delivers interconnectivity yet lacks remote flexibility and has downsides affecting network performance, efficiency, and scalability.
As a solution to legacy Site-to-Site, NordLayer is developed to provide flexible and simple problem-solving to the general downsides of using legacy networking. When focusing on the feature functionality, the distinction between legacy setup and cloud-based remote network access solution comes from overcoming the limitations of traditional Site-to-Site solutions.
Cloud-based NordLayer solution handles legacy infrastructure challenges of increasing remote connections with quick integration to the existing architecture. It reverts performance–efficiency–scalability limitations to company advantage:
Decreased deployment time and expenses. NordLayer solution is fully hardware-free and compatible with hardware-based or hybrid existing infrastructures. Functionalities can be deployed within minutes and don’t require complex costs and long delivery times, focusing on time-to-value for the organization.
Maintained security and productivity levels. NordLayer Site-to-Site distributes encrypted user traffic to company resources based on the request nature without affecting connection quality instead of bulk processing all users to a primary point of connection and allocating to requested resources afterward.
User traffic distribution. The feature decreases the heavy traffic load directing users to the internet resources, internal data centers, servers, or applications in a more streamlined manner. Therefore, the increased remote user traffic peaks don’t impact performance quality as with a traditional Site-to-Site setup.
Efficiency and scalability. Naturally, user traffic distribution significantly reduces on-site equipment use managing the ad-hoc demand to upgrade. On the contrary, cloud-based Site-to-Site functionality enables the company to scale on demand without resource-intensive planning.
The feature brings another level to team performance in business operations using Site-to-Site. NordLayer’s cloud-based feature ‘helps cut hardware-ing and distance corners’, bringing efficiency to secure data sharing and authorized access of on-site devices within the organizations, even if physically impossible.
Benefits of Site-to-Site VPN
Primarily, Site-to-Site VPN allows for establishing non-office-only based connections. The VPN enables secure data transfers and trusted user activity between the on-premise network and the public network established over the internet.
Implementing NordLayer on top of your existing infrastructure, Site-to-Site unlocks effective and robust cybersecurity measures for various organizational aspects.
Increased network security
Sensitive data and confidential information is the target of most cyber attacks. Thus, encrypted data transfers between organization members utilizing Site-to-Site, whether in the office or remote, help safeguard against data breaches.
Streamlined business operations
Team performance is heavily related to the availability and capacity of the company network. Therefore, Site-to-Site feature maintains a good speed and stable data traffic flow to provide users with quality connectivity and constant access to resources that influence business continuity.
Flexible and scalable protection
Hardware-free Site-to-Site configuration is a beneficial add-on to the existing company network, even the largely hardware-based ones. Thus, the reaction-to-action time to solve ad-hoc challenges is multiple times shorter and easier. It requires minimal resources and provides a solution based on business needs within minutes.
Entering NordLayer’s Site-to-Site
NordLayer solution provides a modern approach-based Site-to-Site VPN. The feature allows present and remote employees to access data and devices in multiple corporate environments.
Using our remote network access solution to enable Site-to-Site VPN for the organization, IT admins have to follow simple actions to configure the feature. First, they need to create VPN gateways via the Control Panel as entry points into the network and assign teams or role-based employees to access the gateway so they can enter the company network. Site-to-Site has to be configured for every company unit for the seamless cooperation of teams.
With fewer systems to manage, unlimited scalability, flexibility, and easy setup, companies can ensure smooth and productive connections for their users and maintain high-security levels of the business.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
The year was 2023 — three years after the pandemic started (and came close to an end), yet 75% of global workers were fully convinced remote work was the new normal. But what’s the actual status of remote work, and what perspectives does it have?
The pandemic became a massive sandbox that proved people don’t necessarily need to be nurtured by the office culture to be productive.
Workers argue that flexibility is their right whether they prefer to work in the best countries for remote work, like Germany, Denmark, the US, or any other location of their choice if the job is completed as requested. Management counters with the importance of organizational environment and team bond effectiveness created only by the presence in the office.
Both sides have their points, so what’s next — will we return to an on-site-only setup or transition to fully remote? Will more companies compromise on hybrid work after all? Let’s see where the remote work projections are guiding us.
How new is the ‘new normal’ of remote work?
It would be incorrect to say that remote work didn’t exist before 2020. Freelancers were the pioneers of working online — an adventurous and free-spirited career path. Before the pandemic, 2,9% of ‘teleworkers’ globally were exclusively working remotely. For instance, in the US market, only 6% had never worked in any kind of remote work setup.
The scope of work from home mainly spiked because of a safety measure to prevent virus spread. Even though the alertness settled and life started returning to normal, in 2022, at least occasional remote workers reached 62% globally.
According to Gallup research results, only 2 out of 10 people returned to the old routine — entirely on-site jobs. Meanwhile, the rest of 8 out of 10 employees are split between remote and hybrid work arrangements in the US.
The discussion mainly circles whether employees want to work exclusively remotely (49%) or want to share their time between home and the office (46%). Yet the same research reveals that only 6% of employees see the ideal work environment exclusively on-site.
Remote work tendency: to increase or decrease?
The swing in the longevity of time spent at home before and after the pandemic compares drastically. Let’s fact-check.
According to Statista, remote work in the US before the 2020s was a relatively rare yet existing event, occurring 1-2 times per week. However, 3-4 and 5+ days of work from home per week in the post-pandemic period replaced the then-popular 1-2 days/week work from home.
Talking numbers, the remote workforce reached 53%, and the pool of employees that never worked from home decreased by 13% after COVID-19.
The data of the US-based respondents reflects the increasing trend of staying at home rather than working from the office.
2020 was the rush-hour year, so comparing the difference jump from 2019 to 2021, the number remains increasing as the amount of remote workers has tripled. If we take data from 2018-2021, the fully remote workforce grew four times bigger.
How has remote work escalated in Europe? The growing tendency of remote work in European countries is also significant.
Eurostat data from 2019-2021 illustrates the increasing number of employed people spending more and more time working from home. The average of EU Member States climbed from
14,6% WFH sometimes or usually* in 2019,
20,9% WFH sometimes or usually in 2020 to
24,4% WFH sometimes or usually in 2021.
In 2021, the usually only working individuals made just a little less than sometimes or usually in 2019 — 13% in contrast to 14,6%. Note that ’usually’ refers to at least half of the work days spent working from home in a reference period of 4 weeks.
The shift is evident in both the US and Europe — remotes were quick to adapt to the circumstances and increasingly function between the office and home, identifying as remote workers.
Let’s not forget that the covid-era introduced a new work-life cultural concept, ‘workation,’ that combines working and vacationing simultaneously. Therefore, it’s challenging to believe that trend swing will take the working world back to the close-to-none remote setup.
Remote work perspective
It’s worth defining the happy medium for understanding remote work. There are different opinions — for some, it’s home-only; for others — home-never. A hybrid work setup seems acceptable for most organizations and employees that can apply non-site work arrangements.
The perspective of hybrid model growth should double from 42% in 2021 to 81% in 2024, according to AT&T findings. The forecast predicts almost one in four Americans will work remotely by 2025.
The prediction is supported by the forecast of conferencing software (like Teams, Zoom, or Google Meet) market growth — in 2021, it reached $14.6 billion worth, and in 2026 is expected to reach as high as $27.3 billion worth. The growing demand shows the need to communicate remotely in the future.
Hybrid work influencing factors
What are the influencing factors for hybrid work escalations — is it just the peer pressure of employees? 83% of professionals say they would decline a job offer without offering flexible work options, according to International Working Group.
Expectations are high as almost everyone (97%) expects organizations to be flexible regarding the work environment. FlexJob indicates that more than half (57%) of organization members would change jobs if they weren’t allowed to work hybrid. After all, 77% of employees see flexibility as the second most important factor after salary in their employment.
The reasoning behind it can be based on preference to save time on commuting, make Mondays less anxious without knowing you must show up in the office at 8 AM, or work from a different city or country.
Productivity and engagement in remote work
Hybrid or remote work help achieve a better work-life balance that resolves into a positive chain reaction. Employees and organizations notice that staff is exposed to less stress, leading to workers being more present and engaged despite online environments.
It proves that hybrid work isn’t entirely a one-way road. At first, being unavailable to observe employees’ activity on-site might have needed convincing the management of the hybrid work benefits.
According to Zippia’s Remote Work Statistics report, 32.2% of managers agree that productivity has increased after the 2020 remote work shift. Generally, 68% of organizations say there’s been an improvement in employee productivity since the remote work arrangements.
Return or not to return?
The determination to work remotely is clear for most of the employees. Besides the long list of benefits the workers learned by heart, 20% of the workforce who vouch for flexibility would agree to give up vacation time over office-defined work.
The worth of remote work can be calculated more precisely — a typical organization saves an average of $11,000 per employee yearly if the employee spends half of the working time outside the office.
Saving funds and time open more personal, team, and company opportunities. Organizations have a better chance to scale globally. It brings us to a solution to a raging issue of limited talent pool companies struggle with significantly.
Talent and remote work
Knowledge workers are in high demand to cover the growing need for professionals in all industries. According to Uplers’ research, 69% of companies face a shortage of skilled talent, and geographic limitations are one of the leading factors reserving the reach of the potential talent pool.
According to the Upwork study, companies with remote or hybrid work policies appear to be less negatively impacted by talent shortage — only every third of such organizations see a limited talent pool as a challenge. Half of the knowledge workers who provide computer programing, IT, marketing, and business consulting services to companies are freelancers.
Regarding company size, large companies tend to have a higher demand for talent that turns over with more noticeable talent shortages compared to small or medium-sized companies.
According to Manpower data, 64% of small companies (10-49 employees) struggle to find the right profile workers, while 72% of medium-sized companies (50-249 employees) and 74% of large enterprises (250+ employees) are impacted by a deficiency of skilled professionals.
Remote work by industry
Technological advancements and flexibility allow companies of various industries to adopt hybrid work for its benefit. It’s noticeable that consulting-type services are quicker to move to telecommute. The trend can be justified by the opportunities to unlock markets worldwide, streamline the workload, and better prepare for modern technological setups.
Taking hybrid work through the industry axis, IT is the leading industry to adopt remote work. Finance, customer service, healthcare, marketing, education, and sales industries are primary areas to explore and utilize the benefits of the remote workforce.
Remote work and security
The massive migration to remote work during the pandemic was kick-started for safety reasons. However, home offices opened gaps for cybersecurity vulnerabilities that many companies weren’t exposed to before.
According to Statista, cyberattacks are one of the major risks concerning organizations. Cyber threats increased exponentially with the growing number of unprotected home networks and distributed teams.
The other top risks on the list include human error, cloud computing vulnerabilities, mobile device security, and loss of corporate data and information, as the concerns of organizations in Europe and the US.
Securing hybrid environments
Many organizations proved flexible in times of change — growing cyberattacks and risks were repulsed with security and hybrid work-adapted business solutions. Transitioning to cloud environments allow companies not only to enable remote workers but implement hybrid infrastructure models to support new ways of working.
Circumstances determined businesses’ push to improve network security even though upgrading existing legacy architectures wasn’t in the strategy.
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
New ransomware variant: Try2Cry! It tries to worm onto other computers by infecting any USB drive connected to the device, hoping it will be used on another computer at some point. Is uses the LNK files to disguise the malware.
About Bullwall BullWall is a fast-growing international cybersecurity solution provider with a dedicated focus on protecting critical data during active ransomware attacks. We are the only security solution able to contain both known and unknown ransomware variants in seconds, preventing encryption and exfiltration across all data storage types.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
The deadline for CISA BOD 23-01 compliance is coming up on April 3, 2023. In less than two months, federal civilian executive branch (FCEB) departments and agencies must have implemented solutions to fully meet the requirements outlined in the directive, including the ability to automate asset discovery every 7 days and initiate on-demand discovery within 72 hours of receiving a request from CISA.
One of the key takeaways from the directive is the importance of identifying unmanaged assets on the network because of the risks they introduce. A fully comprehensive asset inventory is the only way to fully address the directive.
When CISA first issued this directive, we’d hear agencies say, “We already have an asset inventory through our CAASM. We’re in good shape!” While Cyber Asset Attack Surface Management (CAASM) solutions can definitely help with building asset inventory and reducing cyber risk, they may not be enough to meet the requirements in the directive–especially if they are leveraging an API-only approach.
Challenges with API integrations-only approach
Most CAASMs leverage an API-only (or a very API-dominant) approach to bring asset data from hundreds (or even thousands) of security and management tools into the solution. Theoretically, with a shared data set, security and IT teams can focus on improving their cyber asset hygiene and security posture, and not spending time tracking down information. However, the truth is: the information in the CAASM is often incomplete, and data quality may be unreliable.
Let’s dig into some of the key challenges of relying on CAASMs that only offer an API-based approach and what you can do instead.
Challenge #1: Finding unmanaged assets
Over and over again, we hear security teams say, “We can’t protect or manage what we don’t know.” Exacerbated by common issues like shadow IT, rogue access, and oversight, unmanaged devices continue to fly under the radar, creating potential entry points for attackers. Unmanaged devices are usually the first foothold for attackers because they tend to miss security controls and don’t have an owner maintaining them.
Many CAASM vendors claim that unmanaged devices can be solved by leveraging integrations with existing tooling. This approach ignores the fact that security teams have tried to use data from vulnerability scanners and EDR agents for asset inventory without success. These approaches cannot find unmanaged assets because they typically require credentials to scan or deploy, which are not available for rogue, IoT, and OT devices. As a result, these teams will continue to miss unmanaged devices if they rely on their vuln scanners or EDR agents for asset inventory.
Ultimately, the completeness and accuracy of the data in a CAASM will depend on the quality of the sources you use. While an integration-based approach is a good way to discover managed assets, it’s not the most effective one for unmanaged ones. The best way to discover unmanaged assets is through unauthenticated scanning.
Challenge #2: Getting accurate data
Most CAASMs build asset inventories from API imports with third-party solutions, like vuln scanners and EDRs; they don’t discover assets independently. Instead, they rely on their security and IT stack for asset inventory, so the data is only as good as the source itself. You can generally get a lot of depth about managed devices through integrations, but the quality may be inconsistent and/or inaccurate. Many solutions, like your vuln scanner and EDRs, are not purpose-built for asset inventory, so fingerprinting falls below expectations. Instead, you may get some basic information about the device, like the IP address, MAC address, and vendor, which isn’t significantly helpful for asset inventory. And on top of that, you’re completely in the dark about unmanaged devices.
According to Gartner, data quality affects labor productivity by about 20%. The lack of access to high-quality, accurate data impacts the ability for security teams to make decisions quickly, especially in the face of critical events. To deliver on its full promise, CAASMs need to complement these data sources with active discovery to accurately fingerprint assets.
Complement your integrations-based approach with active scanning for full asset inventory
CAASMs can help with comprehensive asset inventory–if complemented with unauthenticated active discovery. This approach ensures that you’re able to cover all your bases for the CISA BOD 23-01 directive. With a scanner that leverages a security-research based approach to accurately fingerprint devices with high-fidelity, you can feel confident that you have a comprehensive asset inventory of managed and unmanaged assets.
By combining active scanning with an integrations-based approach, managed assets get the benefit of being enriched with additional attributes, while unmanaged assets are identified and fingerprinted.
About runZero runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.