Skip to content

引入 runZero 的新 ServiceNow 服務圖集成:為您的 CMDB 獲得更高的數據準確性

Big news: runZero now integrates with ServiceNow Service Graph. The runZero Service Graph integration offers a robust solution for organizations who need to get a comprehensive and up-to-date view of asset data across IT (information technology), OT (operational technology), cloud, and remote environments. This new integration will quickly and easily enrich CMDBs with high-fidelity, contextualized asset details, superseding the existing ETL integration.

The importance of data quality in CMDBs

According to Gartner, nearly one third of CMDB challenges stem from data completeness or quality concerns, which highlights the importance of prioritizing data quality in an organization’s configuration management database (CMDB). This is not just a theoretical concern: Gartner also notes that 99% of organizations using CMDB tooling who do not address configuration item data quality gaps will experience visible business disruption. This makes sense when you consider that IT infrastructure and services are critical components of most modern businesses. Without accurate information about these assets, it becomes difficult to make informed decisions related to security, compliance, risk management, and more.

To deliver better and complete visibility across your environment, the Service Graph Connector brings your runZero asset inventory into your ServiceNow CMDB. With better data quality in your CMDB, you can ensure they get managed in accordance with your organization’s policies. By leveraging runZero’s ServiceNow Service Graph integration, you can improve your CMDB accuracy and reduce the likelihood of costly disruptions caused by inaccurate data. You can be confident that you’re operating on every asset–even the ones your CMDB didn’t know about.

Eliminate data quality gaps and improve IT/IoT/OT asset visibility with runZero’s ServiceNow Service Graph integration

Many organizations are turning to Cyber Asset Management (CAM) solutions to gain better visibility into IT, IoT, and OT assets. These solutions can help proactively identify unmanaged devices and uncover security risks within networks. By using both API data sources and unauthenticated active scanning, runZero is one of the few solutions capable of discovering unmanaged IT, IoT, and OT devices. This approach is especially valuable in OT environments, where visibility may be limited.

runZero’s ServiceNow integration provides you with a powerful tool to improve your asset inventory and cyber asset management. With this integration, you can gain better visibility into IT, IoT, and OT assets, as well as identify and address data quality gaps. This can help you reduce the cost of downtime, improve labor productivity, and get more value from your CMDB investments. In addition, runZero’s active scanner is safe to use in OT environments, ensuring that you can get the most out of your cyber asset management solutions without compromising the safety of your systems. Dozens of organizations are using runZero’s combination of integrations and active discovery, including those in manufacturing, healthcare and utilities, to achieve full asset inventory.

How Capgemini helped their client get better quality data for their CMDB

Let’s take a look at the real world implications of not having a dedicated cyber asset management solution in place.

Capgemini, a global IT consulting firm, was contracted by a French manufacturer and retailer of luxury products to deploy an asset discovery solution and set up the integration with the new CMDB to store the company’s IT asset inventory. However, they were struggling to get the data they needed using MID Servers–especially for managed assets such as routers and switches. They knew they had to explore other asset discovery options.

One of the primary requirements established for the project was unauthenticated asset discovery. The IT department, part of the holding company, was having a hard time collecting credentials for service accounts for many parts of the business. Without credentials, ServiceNow was struggling to inventory most assets. As Capgemini looked into other solutions, they discovered runZero, which delivered everything their client needed: speed, accuracy, a rich API, and unauthenticated scans. runZero’s asset discovery was fast, efficient, and worked without credentials. With runZero, they found 2.5x as many devices as ServiceNow.

After seeing the results with runZero, Capgemini has other ideas for capitalizing on its capabilities. As they work with clients in future projects, runZero will give them an accurate picture of their client’s asset inventory enabling them to provide precise project plans with known scope, schedule, and cost estimates.

Ready to get better results from your CMDB investments? To get started, sign up for runZero and then get the ServiceNow Service Graph integration on the SNOW marketplace.

Be confident in your CMDB’s data quality

runZero is a cyber asset management solution that delivers full asset inventory–quickly, easily, and safely. The solution enriches CMDBs with detailed asset and network data from a purpose-built unauthenticated active scanner. Discover every asset–even the ones your CMDB didn’t know about. 

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

runZero 3.7:自定義集成和 SDK

What’s new with runZero 3.7?

  • Custom integrations and Python SDK
  • ServiceNow Service Graph Connector for runZero
  • Protocol improvements
  • New and improved fingerprints

Custom integrations and Python SDK

runZero Enterprise customers can now import assets from custom sources using the runZero SDK. The new Python SDK supports runZero’s custom integration API functions for ease of automation and use for those familiar with Python. These custom integrations allow for creating and importing asset types not previously supported within runZero, along with assigning the integration a name, description, and custom icon. Once imported, you can manage these custom integration sources from the runZero UI, and remove them from assets if desired. This will allow you to build new integrations and further enrich the asset data within runZero.

ServiceNow Service Graph Connector for runZero

The runZero Service Graph connector is now available in the ServiceNow marketplace. The connector can automatically pull your runZero asset data into your CMDB, merging with your ServiceNow data to improve asset visibility and accuracy. This connector does not replace the ServiceNow IntegrationHub ETL integration; both the connector and integration are available to Enterprise customers.
ServiceNow Service Graph connector for runZero

Protocol improvements

The 3.7 release includes improved support for the Checkmk host agent. Checkmk is an open source host monitoring service and is deployed as part of many solutions and network appliances. Customers with Checkmk in their environment will benefit from improved software inventory and EDR detection for these assets. The accuracy of operating system fingerprinting has also been improved using available Checkmk data.
The scanner now supports the Steam In-Home Streaming Discovery Protocol, allowing for identification of devices running the Steam client from Valve Software.

New and improved fingerprints

A number of fingerprints and fingerprint capabilities have been improved in this release. These improvements include fingerprinting of TLS stacks, better coverage of Roku devices based on AirPlay responses, and improved OS fingerprinting of devices speaking the BACnet protocol.
New fingerprints were added for products by Abbott, Aruba, Audioscan, Bayer, Canon, Ciena, Cisco, Crestron, FloLogic, GE HealthCare, GE MDS, Google, H3C, Huawei, IBM, Keyence, Meross, Logitech, NetApp, Panduit, Proofpoint, Roku, Quantum, Raritan, Roku, Shelly, SonicWall, Tesla, TP-Link, and VMware.

See runZero 3.7 in action

Watch the video to see a preview of some of the newest features in runZero, including the ServiceNow connector, Checkmk protocol parser, and custom integrations leveraging the Python SDK.

Release notes

The runZero 3.7 release includes a rollup of all the 3.6.x updates, which includes all of the following features, improvements, and updates.

New features

  • Customers with an enterprise license can now create custom integrations and import assets from any external asset data source using the runZero Python SDK.
  • Improved performance and reliability of metrics calculations.
  • Improved performance of the vulnerabilities inventory.
  • AWS permission errors are now more detailed to make troubleshooting easier.
  • A bug where the asset ownership tag was not able to be changed successfully has been resolved.
  • A bug where email addresses were case sensitive on sign in has been resolved.
  • A bug where the “Create Organization” button appeared disabled but was still clickable has been resolved.
  • A bug preventing the Asset Ownership goals toggle from being clickable has been resolved.
  • Upgraded npcap to version 1.73
  • Fingerprint updates.

Security fixes

  • A bug that could show cross-tenant Queries and their associated author email addresses was resolved. This issue only applied to a cloud-hosted version of the runZero platform that was live for slightly more than two hours on March 29th, 2023. Any customers affected by this issue received a detailed notice. This affected version 3.6.14.
  • A bug that could allow an organization admin to see the names of other organizations in the tenant, even without explicit access, has been resolved. This affected versions 3.6.0 to 3.6.5.
  • A bug that could expose limited information about an organization to cross-tenant users has been resolved. This issue could have allowed an attacker that guessed the v4 UUID of an organization to view the name, description, and top-level statistics (asset count, service count, task count, etc.) without appropriate authorization. This affected versions 3.6.0 to 3.6.4.

Product improvements

  • Improved quality of errors reported by the CLI Scanner.
  • Improved user experience of user management.
  • Improved user experience of organization management.
  • Packets sent/received are now visible from the tasks preview.
  • Enterprise customers can now scan all ports and up to a /8 at a time using the hosted scan engines.
  • Attribute searches and reports are now faster in large organizations.
  • It is now possible to download the task log for a failed scan.
  • Hosted scans no longer ignore responses from common firewalls.
  • Daily asset expiration now records an assets-expired event with the count.
  • The task-failed event now includes information about the associated Explorer.
  • Scans can now configure specific probes for Subnet and Host pings.
  • Asset queries can now surface overlaps in asset names, IP addresses, and MAC addresses across inventory.
  • Behavior around parent/child organizations has been improved.
  • A change to Chrome which caused web screenshots to fail has been addressed.
  • Alert rules now support software and vulnerability queries.
  • Asset ownership now supports references to runZero users and groups.
  • Vulnerability inventory now includes an Exploit status, indicating whether the vulnerability is known exploitable. The Exploit status will only be populated for vulnerabilities imported after this release.
  • Datagrids across the UI no longer use the incorrect theme.
  • Task WLAN listing functionality has been improved to enforce a timeout if the underlying utility is slow or unresponsive.
  • The maximum time to complete an SNMP walk is now configurable.
  • The default maximum time to complete an SNMP walk has been increased to 5 minutes from 1 minute.
  • The maximum results for an SNMP walk have been increased to 8k from 4k.
  • Assets owned by a runZero user will now be displayed on the user details page.
  • The Reason column in the failed tasks table will now properly persist the hidden state between page loads.
  • Saved queries can now be created for software, vulnerabilities, and screenshots.
  • Attribute reports now group unique values within a single key.
  • The View More link is now accessible for in-progress tasks.
  • Asset owner names now suggest auto-complete options.
  • Accessibility improvements.
  • Client-side timezone updates.
  • Improved performance of the organization details page.

Integration improvements

  • The AWS integration now supports the GovCloud partition for assumed roles.
  • Validation warnings for internal IPs when using LDAP and InsightVM integrations has been improved.
  • Filtering of non-unique MAC addresses has been improved to better support Cisco virtual MAC addresses.
  • Cisco virtual MAC addresses are now handled more consistently.
  • Increased timeouts for the Tenable integration.
  • Improved reliability of CrowdStrike credentials verification.
  • The API response for a PUT request to /org/sites now returns the details of the new site.
  • Improved reliability of the Tenable integration.
  • API requests to apply tags to one or more assets now complete much faster.

Bug fixes

  • A race condition that could occur during self-hosted installation has been resolved.
  • A bug that could cause the Tenable connector to fail intermittently for some customers has been resolved.
  • A bug that could cause task details not to render on the task overview screen has been resolved.
  • A bug that could prevent organization administrators from creating new projects has been resolved.
  • A bug that could prevent some CrowdStrike software from importing successfully has been resolved.
  • A bug that caused misaligned values when exporting assets to CSV has been resolved.
  • A bug that could cause the SSO page to render off screen has been resolved.
  • A bug that could prevent asset modifications triggered by alert rules has been resolved.
  • A bug that could prevent the dashboard from loading successfully has been resolved.
  • A bug that caused misaligned values when exporting assets to CSV has been resolved.
  • A bug that could cause assets to incorrectly merge has been resolved.
  • A bug that could prevent validation of hostname scan targets has been resolved.
  • A bug that could lead to inaccurate asset correlation has been resolved.
  • A bug which could result in runZero attributes being removed from Offline assets has been resolved.
  • A bug that could prevent subnet stats from being exported has been resolved.
  • A bug that could prevent analysis queries from running for directory users and groups has been resolved
  • A bug that prevented match counts from being displayed on the queries page has been resolved
  • A bug that could prevent updating assets with a large number of vulnerabilities has been resolved
  • A bug that prevented access to runZero canned Queries has been resolved.
  • A bug that could lead to the self-hosted installer not removing temporary files has been resolved.
  • A bug that led to slow SNMP scans of specific Cisco switches has been resolved.
  • Addresses bug where recurring tasks that are “Removed” were still showed in the tasks page after the associated site is deleted
  • A bug preventing asset owners from being updated has been resolved.
  • A bug that could result in inaccurate vulnerability counts for assets has been resolved.
  • A bug that could prevent a subset of vulnerabilities from being saved for multi-source assets has been resolved.
  • A bug that caused errors for Crowdstrike integrations with large amounts of applications has been resolved.

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

社交網絡如何讓您的生物識別數據面臨風險

Social networks have become integral to our lives, enabling us to share photos, videos, and audio to connect with others, build our social presence, and even generate income. However, by sharing this content, we may unintentionally expose our faces, irises, fingerprints, voices, and other biometric patterns to hackers, who can exploit them for malicious purposes.

In this blog post, together with Andrius Januta, Cybersecurity Technical Manager at Nord Security, we’ll explore how content shared online can be used to steal our biometrics and discuss ways to protect ourselves from this threat. Let’s dive in.

Biometric data: What is it?

Biometric data, or biometrics for short, are body measurements and calculations related to an individual’s biological, physical, and behavioral characteristics. This can range from DNA, blood type, signature, and walking gait to the more commonly known fingerprints, face, iris, and voice patterns.

Each person’s biometrics are unique, so they offer a superior alternative to passwords for ease of use and enhanced privacy and security. As a result, biometric identification has become increasingly widespread, not only in high-security facilities but also in people’s everyday lives.

Today, over 80% of smartphones offer biometric capabilities for their users, enabling device unlocking, user authentication for purchases, and confirmation of sensitive actions within various applications.

Social networks: An endless source of biometrics

Our digital lives are dominated by biometric features that can be exposed on social media platforms like Facebook, Twitter, Instagram, YouTube, TikTok, and others. So by posting seemingly innocent-looking eye makeup, unboxing or live-painting videos, profile photos, stories featuring our daily life, and voicemails, we’re also sharing our unique identifiers with the world.

Rapidly advancing technology and media platforms supporting high-resolution image and video can inadvertently expose our face, iris, fingerprints, and voice patterns that can be cloned and used by threat actors.

How can biometric recognition systems be fooled?

Face, iris, fingerprints, and voice patterns are the four most common biometrics that can easily be harvested from social networks.

Andrius Januta, Cybersecurity Technical Manager at Nord Security, says that while, in general, biometric data offers greater security than passwords, several cases also demonstrate its inherent vulnerabilities.

  • Facial recognition systems can be fooled by gathering high-quality images or videos of an individual, which can then be utilized to craft makeup that mimics another person’s facial features, produce hyper-realistic masks, generate 3D renderings, fabricate full-size head replicas, and even employ deepfake technology.

  • Fingerprint recognition systems, designed to permit authorized users to unlock or access applications, can be compromised by silicone fingerprint replicas or even crafted duplicates made from wood glue.

  • Iris recognition systems are generally more challenging to falsify compared to facial and fingerprint equivalents. Nevertheless, A. Januta highlights that a few years ago, a high-resolution photograph of the iris, in combination with a contact lens, was sufficient to mimic an eye for unlocking personal devices.

  • Voice recognition systems are widely used in smart home devices, banking, and finance. However, voice cloning AI software can replicate the voice captured from video or audio messages. Important to highlight is that today, even a short three-second recording is enough to create a high-quality replica of someone’s voice.

Malicious use cases

While it’s possible that biometric data can be extracted from social networks, the majority of it doesn’t leak directly from these platforms. Rather, the greater risk for biometric data leaks is from poorly secured databases. In both cases, exposed biometric data can be exploited in various malicious cases.

Accessing devices and accounts

With access to your personal devices and a convincing replica of your facial features, fingerprint, or iris, a cybercriminal can bypass authentication requirements to unlock your device. As a result, they can gain full access to your private information, including contact lists, personal photos and videos, work files, financial data, login credentials, and other sensitive documents.

They can access online shopping portals and financial accounts and make unauthorized withdrawals, transactions, or purchases. They could install malicious software on your device to extract data or monitor your activities. A compromised device may even be used to distribute spam or malware to others.

Accessing services or committing fraud

Exposed biometric data can also enable fraudsters to impersonate you when accessing various services and facilities. This may include unauthorized entry to restricted areas and accessing financial, educational, governmental, or medical services. A.Januta adds that in some countries, biometric data already enables people to withdraw money from ATMs, enter sports events, and even pay for goods in supermarkets.

Equipped with your biometric data, threat actors can impersonate you while committing crimes. Examples of this include wearing hyper-realistic masks to take loans, accessing bank accounts using AI-synthesized voice clones, or scamming contacts with deepfakes, which according to A. Januta is one of the most common cases today.

He mentions that in one of the cases, threat actors impersonated a Binance executive, copying his image during video meetings and compromising multiple crypto projects. In another case, fraudsters created a deepfake video of one American in which he encouraged his friend to invest in Bitcoin mining.

Compromising your reputation

Deepfake videos or AI-generated images can falsely portray you participating in inappropriate activities or experiencing emergencies. Additionally, this data could be employed to fabricate your fingerprints at crime scenes or impersonate your voice in vishing schemes aimed at your family members.

How to protect biometric data?

Biometric system spoofing is like a cat-and-mouse game. Once cybersecurity specialists or threat actors find a vulnerability in biometric recognition systems that can be exploited, biometric system providers and tech companies quickly fix them. While it’s less likely to happen to average people, high-profile individuals like celebrities, businesspeople, or politicians remain vulnerable, so we cannot overlook the potential risks associated with the exposure of biometric data on social media,” warns A. Januta.

To address these concerns, A. Januta offers a range of practical suggestions for safeguarding our biometric information and preventing its extraction from social networks.

  • Be cautious about sharing biometrics on social media: Stay vigilant when posting videos or images that may expose your unique biometric features, such as fingerprints, face, or iris patterns.

  • Modify media quality and cover sensitive areas: Reduce the resolution of videos and images featuring you, and consider editing or blurring sensitive biometric information before sharing.

  • Opt for less exposed biometric factors: Choose biometric authentication methods that are less commonly exposed publicly or have a lower risk of being compromised, such as iris or retina.

  • Review shared media thoroughly: Scrutinize any media featuring your biometrics before sharing it on social networks, ensuring that no unintended exposure occurs.

  • Conduct regular media searches: Periodically search for your own image online and assess the context in which your images appear, taking necessary actions to remove any unwanted or potentially harmful exposure.

  • Prioritize multi-factor authentication (MFA): Use biometrics that are less exposed for single-factor authentication, or better yet, incorporate biometrics as part of a multi-factor authentication process rather than relying solely on a single biometric factor.

  • Use an additional hardware authentication device: Enhance security with a FIDO-enabled hardware device, providing an extra layer of protection against unauthorized access via standardized protocols.

  • Instead of biometrics, use complex and unique passwords: For less important accounts, use strong passwords, just don’t forget to update them regularly and securely store them in a reputable password manager.

  • Exercise caution with new services and technologies: Be vigilant when providing your biometric data to emerging services or technologies, and ensure that these entities have robust security measures in place to protect your sensitive information.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


檔案類型檔案名稱下載分享
產品資料Atera for MSPs Features List (PDF)
產品資料Atera for IT Departments Features List (PDF)

Board of Innovation 如何管理安全以保護其團隊合作和客戶數據

Board of Innovation is a global innovation firm imagining tomorrow’s products, services, and businesses – and creating them today. The company joins forces with the world’s most ambitious businesses to make what life needs next.

Working with prospects and new ideas requires creative flexibility that the company initially doesn’t want to block with security restrictions and limitations. On the other hand, protecting business and client data remains one of the company’s top priorities. Hence, Mehdi Lahmamsi Pinel, Global Operations & IT Manager at Board of Innovation tells how juggling those equally important things in the context of cyber threats aligns with the right security approach. 

The challenge

Trust over control within client confidentiality

The company culture at Board of Innovation is based on trust and employee enablement. These are critical elements for a creative industry. To succeed, the company is remote-first, and collaboration with freelancers and consultants of different backgrounds supplements full-time employees to generate new-of-the-kind products and services.

“Board of Innovation team is diverse as we have around 100 people of about 30 different nationalities in 60 places varying in cities, countries, and continents.”

Click to tweet

Yet, with a dynamic network of company innovators, consultants who move to client facilities, and third-party partners, IT managers face many challenges maintaining high levels of security that don’t interfere with team workflow.

“Business with client companies makes data security and confidentiality imperative, balancing it with the IT Manager’s responsibility to ensure the team works efficiently and effectively.”

Click to tweet

Board of Innovation works with high-profile companies and industry leaders. High traffic of changing projects, collaborators, and partners also requires precise supervision to mitigate the risks.

Since employees are unrestricted with their choices of how they want to work, self-awareness of the entire organization must be on board to achieve security goals. But how does one define the proper data protection standards and make security implicit yet not dominant? It’s a tough and subtle challenge for the IT manager to tackle.

The solution

Depicting minimums of must-security

With evaluation of team setup, work environments, and the need for flexibility, a VPN solution was the most straightforward tool for Board of Innovation. It enables many different security protocols defined in the company. One of the policies is establishing a safe connection to the company network — this is where NordLayer comes into play.

A newly assigned IT manager started by reviewing the then-current cybersecurity strategy applied in the organization. Deployed by the previous responsible manager, Board of Innovation already had an ongoing NordLayer subscription. Yet, it needed a strategy that fits company culture to its benefit.

“I’ve started by revisiting and improving the existing cybersecurity setup. NordLayer was there but not utilized to its fullest potential.”

Click to tweet

So what needed to be added to create a sound cybersecurity strategy that works?

The company has a secure network access solution in place. VPN is a mandatory factor of encrypted connection, and every organization member has to familiarize themselves and agree to data protection policies.

“Whether our collaborators and employees use personal or corporate devices for the job, they must acknowledge internal IT security policies to follow.”

Click to tweet

Board of Innovation follows a streamlined approach to managing its workforce — company policies define access levels to internal data. To put policies into force, corporate devices became a connecting point for every user with access to company resources.

“Mandatory apps like NordLayer and tools for password management, specific internet navigation, and work organization are pre-installed by default. That’s how we enforce security via device management on corporate devices.”

Click to tweet

Having the tools that fulfill internal and client data security requirements relieves the security manager from dependency on employees. And having those corporate devices set up and readily distributed to the hands of the workforce is half the job done.

Users have to launch VPN once connecting to untrusted networks wherever and whenever they work, and the admin can supervise the whole process if the rules are followed.

Why choose NordLayer

Creative freedom and trust are the fou
ndation of the Board of Innovation culture. Thus, any tools and solutions used to keep up with the security requirements must be convenient and simple, enabling and not disrupting the workers.

The organization decided to keep the NordLayer solution due to its user-friendliness. Moreover, the well-known service provider has to sustain being a reputable vendor of a safe and efficient solution.

Role and endpoint management leaves more space for protecting digital company assets by enforcing authenticated user identities. More granular network access segmentation enables careful supervision over the organization members. 

How NordLayer enables data security on different network layers

Systems and policies allow the IT manager to achieve consistency in business processes and operations. Having an overview on the NordLayer dashboard makes it easier to see who complies with the rules, like having the 2FA enabled. Moreover, or get a report of the connection history.

The outcome

Streamlined consistency aligned with internal policies 

Now, Board of Innovation has all workforce onboarded to the NordLayer solution. The solution present in every corporate device and combined with two-factor authentication makes it easier for the IT manager to ensure policies are up and running.

“We distribute NordLayer licenses to all organization members and contributors as a basic rule in our company. We aim to reinforce security policies in as many places as possible.”

Click to tweet

The remote network access solution enables the organization to collaborate with various clients, partners, and freelancers. Managing access to internal resources and project information creates barriers to stopping data leaks and breaches. And importantly, security policies don’t overcome and interrupt innovators’ creativity and workflow.

“Using NordLayer is so easy — simply open the user interface, choose a gateway, get connected, and here you go.”

Click to tweet

All that is left for the IT manager is to distribute access and privileges to internal resources according to the company policies and check that everyone is on board with the process. 

Pro cybersecurity tips

Sharing best practices is what helps businesses of any industry innovate in their own way of security. Creating a strategy for protecting the company network and securing information of different levels can be based on the most unconventional and unexpected advice. Thus, this time just like every time, we asked Mehdi Lahmamsi Pinel, the Global Operations & IT Manager at Board of Innovation, to share his professional insights on business cybersecurity:

Have you ever hesitated to impose security policies because they might overcrowd business operations and disrupt employees’ daily work? Creative freedom and simplicity can remain a priority since cybersecurity doesn’t have to become dominant yet effective and efficient.

NordLayer solution secures and enables every way of working, even if you want to prioritize trust and flexibility. The application, running in the background, simply does its job encrypting connections and segmenting the teams wherever the employees are. They can combine organization-provided devices with personal endpoints securely enabling BYOD policy within the company and IT managers can attend to their work stress-free. Sounds good? Reach out to learn more about NordLayer possibilities.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


檔案類型檔案名稱下載分享
產品資料Atera for MSPs Features List (PDF)
產品資料Atera for IT Departments Features List (PDF)

2023 年值得關注的頂級網絡安全趨勢

Much like seasonal flu, cyber threats are constantly evolving every year. While the coronavirus curve has been, for the most part, flattened and more enterprises opened up their offices for on-premise employees, the number of cyberattacks continues to grow. Even last year, cyberattacks increased by 38% in 2022, compared to 2021.

Even without covid as a catalyst, businesses are still becoming more digital, leading to increased attacks. In this environment, cybersecurity is a real challenge, and both business managers and network administrators have a real head-scratcher on their hands. Here are our predictions on the cybersecurity trends for this year.

Cybersecurity is no longer an IT manager’s concern. It’s something that comes into play when making key business decisions. Data breaches can turn the business upside down with penalties and loss of customer trust. It’s a challenge that can come from outside and inside with improperly configured networks.

As digital transformation is becoming more prevalent among businesses, so does the increase of various threats. Here are the eight main cybersecurity trends shaping this year’s digital environment.

Top cybersecurity trends for 2023 blog visual web 1400x843Chat GPT-enforced attacks

Soon after OpenAI launched the intelligent chatbot ChatGPT, it was quickly revealed that it could do more than just form responses across many knowledge domains. Cybercriminals have already started to use this tool for building hacking tools, while scammers are gathering knowledge to build similar chatbots to use for impersonation.

While the publicly available ChatGPT-coded tools are quite rudimentary, it seems that it’s only a matter of time before hackers can turn the AI to their advantage. In general, the least of its contributions is that it lowers the entry threshold by being a huge help for novice malware developers. Even without coding assistance, it helps to write genuine-sounding phishing emails for hackers.

Although ChatGPT has various safeguards to prevent it from being used for exploitation, this is something that businesses should keep in mind. Artificial intelligence is going mainstream which levels the playing field for hackers and can put increased pressure on your cybersecurity plan.

Remote and hybrid employees risks

After the pandemic, businesses have settled with hybrid workforce models. In some cases, these models are relics of a period when the Covid-19 outbreak forced the digital transition. As this development had to happen very quickly and not interrupt business operations, this also meant that the security measures weren’t always without gaps.

This blend of employees working on-premises, remote working contractors, and a wide variety of their used company-issued and personal devices makes it a colossal job to secure everything. For IT administrators, the attack surface is too huge to oversee everything that is happening. As data breach cases pile up, we’ll likely continue to see an increased interest in securing business networks and balancing them with workplace flexibility.

Automation of cybersecurity

As hackers themselves are starting to leverage AI for their exploits, it’s only natural that businesses should keep up. Data sources multiply exponentially, so automation is necessary to crunch numbers before humans can analyze them. This allows companies to get the best of both worlds and dramatically improve their cybersecurity status.

Various sources show that successful AI pairings can extend network visibility by up to 35%. These developments clearly show that AI has the potential to be a key component when transforming network security operations. Leveraging machine learning moves organizations forward and builds more sophisticated systems to withstand the most complex online threats.

International state-sponsored attacks

While state-sanctioned cyberattacks are nothing new, the ongoing war in Ukraine marked a turning point for a steep increase. Russia remains largely isolated from the rest of the Western world, and 64% of Russian hacking was directed directly at Ukraine. These are huge numbers, even without factoring in hacking attempts at their allies. Cyber espionage is escalating in other areas as the US recently shot down the Chinese surveillance balloon.

As all this is happening, a business can easily be caught in the crossfire. This makes private companies and critical infrast
ructure organizations prime targets for credential theft, vulnerability exploitation, or ransomware. In such a climate, not having a cybersecurity plan in place is a severe liability, and businesses will likely take action to address IT security shortcomings.

Building a security-aware culture

According to Verizon, 85% of breaches involve a human element, so investing in cybersecurity technologies but skimping on the workforce is missing the forest for the trees. In today’s climate, thinking that cybersecurity risks are a problem for the IT department can blow up when you least expect it. Every single employee must be aware of potential cyber risks and know how to deal with them.

In some cases, this may require building transparent information security policies. In others, security awareness training may be necessary. Security culture building will become a key factor in many organizations this year. As social engineering attack numbers aren’t subsiding, there’s no other way to combat these threats than through company culture.

Data breaches will continue to increase

Data breaches increase yearly more than they did the previous year, and this year will be no exception. Data is still one of the most valuable assets, and organizations still leave plenty of room for attackers to exploit gaps in the fence. Building a firm infrastructure isn’t cheap or simple, either, so most companies exist hoping they won’t be the next target.

This said prevention is much more effective (and cheaper) than settlements, lawsuits, and fines for data security violations. Yet, many businesses still rely on legacy software without any risk management policy and procedure updates. We can expect that more businesses will be caught off guard this year while others will try to learn from others’ mistakes rather than their own.

Global recession serves as a catalyst for hackers

As many experts are warning about economic downturns, this can catalyze cybercrime. Most cyberattacks are financially backed, so as the economy shrinks due to global geopolitical events like Russia’s war in Ukraine, this sends a shockwave throughout all spheres of life. Hacking, therefore, can become a lucrative option if a person has the skills and no other options to earn a living wage.

Hackers-for-hire, therefore, may emerge in search of easy money, which can have various devastating consequences for companies. While some might perform penetration tests or collect bug bounties, others may not be so ethical. This should be considered, especially in Europe, considering its geopolitical tensions.

Credential stealing will continue to rise

Various reports show that mobile device vulnerabilities targeting credentials are on the rise. Hackers know that employees use their IoT devices to access the company network. So these devices are user-managed. They tend to have quite more vulnerabilities that hackers could exploit.

What also helps hackers is that most systems are still protected with only passwords. It’s especially easy to crack such a setup when employees reuse the same passwords. A move towards passwordless or hardware identity tokens is happening slowly. This proves to be a lucrative opportunity for thieves. Some experts claim that we’ll also see more second-factor authentication exploits via SMS and push-based multi-factor authentication solutions this year.

Tips on how to prepare your business for 2023

To prepare for this year, companies should start with budgeting. The amount spent on cybersecurity in 2021 and 2022 should be a benchmark for the 2023 budget. It should also adjust according to how many significant changes occurred in the organization and the cybersecurity landscape.

Adjusting the cybersecurity budget according to your company size is also common. A rule of thumb is to allocate at least 10-20% of your total budget. Revising the budgeting plan as you go is always a good idea. Cybersecurity threats and landscape can change a lot throughout the year, so staying flexible is one of the methods to stay ahead of the curve.

How can NordLayer help to protect your business in 2023?

Most recent developments in cyberspace are relevant to every business as most of them will be affected by them. Organizations need trustworthy allies to deter cyber threats as the threats keep piling up.

A modern remote network access solution like NordLayer is developed to integrate threat, network, and security management centrally to provide an explicit range of issue-targeted features. Especially with the help of a convenient design that combines cloud-based platforms, data privacy protection, and access control security strategies. 

NordLayer covers security with a centralized control interface and product integration to existing infrastructure. It provides secure remote access solutions for hybrid environments and implements zero trust for distributed workforces conveying everything to the cloud environment.

Achieve a multilayered security protection network and data environment — secure your business in 2023 with NordLayer — reach out to talk more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


檔案類型檔案名稱下載分享
產品資料Atera for MSPs Features List (PDF)
產品資料Atera for IT Departments Features List (PDF)

雲端軟件開發:優勢與挑戰

Digital transformation touched most businesses operating today, and the transition to the cloud is an important step. The cloud became a primary environment for creating new software, particularly for software developers and IT professionals. Combining flexibility and efficiency for the price served as the new way of doing business.

Yet, not everything was all moonlight and roses — the outsourced model also brings a fair share of cybersecurity risks. This creates a head-scratcher for network administrators and developers in balancing the benefits with the risks to ensure a streamlined mode of operation that is as effective as it’s secure. Let’s take a deep dive into all things cloud software development.

What is cloud computing?

Cloud computing is an infrastructure model in which resources and processes are outsourced to data centers rather than done internally. This method relies on the public internet as the primary mode of delivery, allowing a much wider reach than possible using conventional methods.

Cloud computing often provides services like data storage, management, device access, networking, and cybersecurity. Externalizing these operations to cloud-based infrastructure allows businesses to focus their efforts elsewhere. In addition, this also enables them to flexibly adjust their operations according to their needs allowing them to be changed at a moment’s notice. It’s a key driving force behind the startup culture and innovations.

Service models

Reliable, fast, and secure services are what every customer takes as a baseline. Businesses are pressed to deliver on the highest level at all times. However, IT infrastructures can’t always stretch that fast, nor can every business owner issue blank checks for upgrades.

Cloud computing solves these pressing issues by providing a streamlined model delivered via the internet. According to specific business requirements, cloud computing services are classified into three distinct models.

Software as a Service (SaaS)

SaaS is primarily used for the delivery of web applications. Fully managed by the service provider, cloud software is accessed remotely and typically has pricing based on plans and subscriptions. In most cases, this provides a much cheaper solution that manages software internally and relieves the teams from the need to perform maintenance.

Platform as a Service (PaaS)

PaaS offers a remotely accessible environment allowing developers to build and deliver software applications. This bypasses the need to use Integrated Development Environments, which are expensive and difficult to set up and maintain. The model includes everything you’d need to start working on your applications, like various middleware tools and operating systems. PaaS uses the same pay-as-you-go model as other remaining cloud service models.

Infrastructure as a Service (IaaS)

IaaS offers core cloud computing services like servers, storage, and networking on demand. This type helps a company to adjust company resources on demand. In cases when new applications have launched, this type also helps to quickly provision them and extend the reliability of existing infrastructure. Usually, payment costs are collected based on using a particular resource, allowing you to install and manage your software on top.

Cloud deployment models

The cloud services deployment model may also have various distinct particularities like ownership, scale, access rights, etc. It defines the location of the servers your organization will be using, what can be changed, and the needed input from the client. This distinguishes different cloud deployment types.

Public cloud

As you can probably guess from the name, the public cloud is available for everyone to access. It’s provided for the general population, making it the least secure cloud type. Owned and managed by the cloud services provider, this type doesn’t require much maintenance but is also the most difficult to secure. On other hand, some public clouds are free to use, while some require a subscription to move beyond the basic plan. 

Private cloud

The polar opposite of the public cloud is a private type — it’s reserved for a single user using separate hardware. Often incorporated into the organization’s infrastructure, the private cloud facilitates handling all the hardware and software services within its perimeter. It offers the most flexibility of all the cloud service types allowing an organization to customize even the tiniest aspects of the setup.

Hybrid cloud

Hybrid combines the best private and public cloud features using proprietary software. This allows hosting applications in a safe environment and cheaper service due to reliance on the public internet. In a way, this functions like a partially locked public cloud with much more customization options.

Benefits of software development in the cloud

If your business rapidly expands, cloud technology is a natural addition to improving your operations. This allows you simultaneously to improve productivity and give more opportunities for your internal teams. Here is a list of the principal benefits related to cloud computing.

1. Scalability

Traditional server hosting always met various constraints as it was based on physical hardware — the capacity can only be proportional to your internal server stack. Cloud computing turns this premise on its head, removing all constraints. No matter the organization’s size or budget, it’s possible to find an option to fit any budget. 

When a bigger capacity is needed, allocating more servers to combine their processing power is easy. Various server service providers also offer flexible memory or CPU adjustments, so it’s possible to customize the cloud computing setup to the smallest details.

2. Cost-efficiency

For businesses looking for various entry points to test the waters before committing to a full-scale infrastructure, the cloud computing model’s cost efficiency is the key benefit. Unlike hosting everything internally, cloud doesn’t need any upfront investments, making it a perfect starting spot to increase usage, on a need basis.

Pricing-wise, cloud service providers widely adopt pay-per-usage fees, meaning that organizations are only charged for the resources they use. This means it’s much more convenient to manage overspending and provides a safety net if the operations need to be quickly shrunk. 

3. Disaster recovery and redundancy

No matter which method for application and data hosting a business chooses, emergency data recovery methods will have to be set up. Admittedly, cloud services should be much easier as they come out of the box with easy data mirroring and backup solutions.

Traditional on-premise setups will have to be configured from the ground up, meaning that additional investments are very likely. Setting the mirroring within the internal perimeter doesn’t help in case the whole network becomes infected. This could potentially damage the backup as well. This is one of the biggest advantages of cloud computing.

4. Fast provisioning of resources

Relying only on the currently available on-premises leaves companies with only a few resources. Various software development and test environments require thorough planning
in advance and take a while to get running. However, with the cloud model, everything can be available instantly.

Brand-new environments for testing or development purposes can be created instantly. This can speed up cloud software development by skipping preparation steps and getting the work environment ready instantly. The cloud provider periodically introduces new adjustments, ensuring that the prepared application seamlessly integrates into the new technological landscapes.

5. Multiple models and offerings

The cloud model is less restrictive and doesn’t operate in one-size-fits-all absolutes. By design, it’s flexible and aims to adapt to accommodate the organization’s needs, not the other way around.

On average, each provider has at least several options to choose from, while most will allow even greater personalization for an extra fee. As it was mentioned previously, various internal and outsourced cloud infrastructure models can be combined to develop a hybrid approach if that’s the direction in which a business wants to progress. 

6. Wide geographic reach

Unlike on-premises hardware, cloud-based infrastructures have a much wider reach. This can be helpful when connecting your globally distributed workforce and reaching your customers. The latter could be improved by optimizing the server load by leveraging cloud architecture.

Even if an application is hosted in a single location, a distributed cloud model allows users to easily access it through multiple points of presence scattered around the globe. This is further facilitated by content delivery networks allowing instant access to various resources and services.

7. Easy deployment

The innate flexibility of cloud infrastructures brings easy deployment capabilities. In practice, some operations could be automated by integrating various cloud processes into your existing setup. This could significantly speed up the application testing process.

Simultaneously this allows a business to ramp up the cloud software development speed allowing instant updates in testing environments. If everything works well, the slots could be easily swapped to go into production. This works wonders for testing new features and ensuring new upgrades work as intended before releasing them to the public.

Possible challenges of cloud software development

While it opens many doors of possibilities, cloud software development isn’t without its fair share of challenges. Outsourcing can be difficult, especially for companies with a functioning system. Here are the major challenges that face cloud application software development.

Seamless interoperability

The major challenge facing organizations that are considering cloud frameworks is interoperability. The written code needs to work with multiple cloud providers despite their differences. This even gets more complex when portability is involved. The same code might be difficult to transfer from one environment to another.

This needs to be addressed by introducing standards and facilitating data access across different software platforms. For this reason, operating protocols must be highly standardized to avoid potential interoperability errors.

Performance issues

When we’re talking about the cloud, we’re talking about distributed physical servers. This still means that their physical location is important, and customer connection to them could impact their experience.

Therefore it’s important to prepare in advance and figure out which data centers will be hosting your data. It will be much easier to set everything up correctly in advance rather than to plan the move once the operations are up and running. End-to-end testing is critical. Cutting corners will result in an inefficient mechanism that hurts your company in the long run. 

False promises of scalability

While it is true that all cloud computing providers can provide scalability, this still has the constraints of the provider’s capacity. Scalability is always limited to the number of resources a provider has, so if your scaling needs are beyond what the provider can deliver, you may be stuck with a service that doesn’t cover your needs.

The key risk here is choosing a predefined program that isn’t as flexible or adjusted to your needs. In some cases sticking with a hybrid model allows for the best solutions from the best worlds.

Reliability and availability

While the cloud model helps to maintain high uptime for cloud apps, this isn’t always a guarantee. Cloud providers rarely offer around-the-clock service, so outages could be left unresolved. Similarly, the provider might not inform leniently about maintenance schedules or other problems.

This requires additional effort on the client’s part. The used cloud service should be monitored using additional tools. Things like service usage and performance should be something that an organization knows at all times.

Dependency on the provider

When building applications, it is very convenient to tailor-make the code to work best within its cloud environment. However, this also has the side-effect of becoming heavily reliant on the external partner for your operations. Sometimes, changing the provider might be expensive, time-consuming, or difficult from a technical standpoint.

Your services should follow good architecture practices to avoid being tangled with underlying service logic if a business decides to move operations elsewhere. For developers, this means understanding different protocol particularities and responsibly adjusting application behavior.

Programming modes

Developing applications in the cloud require different programming skills. While most developers are familiar with SQL operations passing application-specific functions aligned with federated data sources, cloud software developments don’t work the same way. This requires developers to adopt query-oriented processing to derive federated data sets performing complex queries or function compositions that align better with cloud computing models.

Application security

Outsourcing such critical elements as application software development means their access should be heavily restricted. This makes application security a challenge due to the web delivery model and the state of the browsers.

For this reason, the connection outside the browser must be properly secured using encryption and tunneling protocols. Still, it’s a broad topic that could be addressed separately.

What measures should developers take to secure software in the cloud?

Transferring developing workflows in the cloud is one of the most important moves that a company could make. While it provides various benefits for developers, security is one of the most important concerns related to it. Here’s how it could be improved.

1. Establish governance policies

Clearly defined governance policies help to achieve better security in cloud software development operations. They put procedures and policies in place and give employees clear guidance in the workplace.

When aligned with your company’s internal security requirements, these policies create a holistic system defining organization-wide operational standards. This even out security across the board, creating transparent processes.

2. Segment your network

An architectural approach of dividing networks into smaller segments helps to manage various security risks in case of a data breach. As free lateral movement across the network is restricted, hackers are isolated within a subnet limiting the pa
ce and time during which they could undetected could stage an attack.

Resources can be shared between segments, so no additional processing power is needed. In addition, this approach helps from the security standpoint and allows control of traffic flow between subnets based on granular policies.

3. Automate security processes

Security automation is an essential component of a solid cloud software development operations model. Code analysis could be automated during the building and testing phases. Meanwhile, infrastructure as code practices can automate configuration management. Finally, various potential threats could be instantly responded to without human intervention preventing potential damage.  

4. Conduct vulnerability management

Identification, evaluation, and security vulnerability reporting is a critical procedure that is paramount to secure cloud software development. Applications should be provided to the customer if they have unresolved known vulnerabilities. Otherwise, hackers could easily exploit them. Penetration testing mechanisms are therefore needed to assess potential exploits better and address critical application shortcomings.

5. Regularly audit security

Organizations’ security practices should match their policies. If the two don’t align, this catalyzes a cybersecurity incident. Periodic evaluations of security practices should be one of the cybersecurity strategy pillars. Various improvements should also be considered helping to set benchmarks and progress measurements.

How NordLayer can help secure the cloud

As the cloud-first approach is a firmly established infrastructure organization method among modern businesses, its security is one of the most important disciplines of modern cybersecurity. Application software development relies heavily on cloud computing to make the heavy lifting possible, but this must always be secure.

NordLayer offers cloud-native tools incorporating ZTNA practices within a Secure Service Edge model. Allowing secure remote access by encrypting traffic from end to end can protect data, whether it’s hosted locally or on the cloud.

Features like IP allowlisting enable network administrators to approve authenticated connections and block everything else. This helps to create an airtight system that provides a secure access model when using external cloud services.

Get in touch with the NordLayer team and explore our cloud-based products today.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


檔案類型檔案名稱下載分享
產品資料Atera for MSPs Features List (PDF)
產品資料Atera for IT Departments Features List (PDF)

senhasegura 參與 ISA 全球網絡安全聯盟

The topic of cyber threats is becoming increasingly present on the agendas of organizations of all sizes and verticals. With the intensification of the digital transformation movement through the introduction of technologies such as 5G and the Internet of Things, ensuring the protection of infrastructure will be an even greater challenge for organizational leaders.

One of the preferred targets of malicious attackers are organizations that use Industrial Control Systems (ICS). ICS processes critical data and is responsible for the functioning of sectors such as telecommunications, logistics, energy generation, and the healthcare sector. These sectors are a vital part of countries’ economies, forming part of what we call critical infrastructure. According to a Kaspersky study, during the second half of 2021, almost 40% of industrial devices were targeted at least once. These attacks bring significant consequences not only for these organizations but for society as a whole.

One of the biggest examples of the damage that attacks on this type of organization bring occurred in 2017. That year, Maersk, a logistics giant, fell victim to the NotPetya malware, a virus with high propagation and destruction capacity that encrypted its data. The attack caused infected devices to simply stop working, affecting the continuity of its operations and bringing revenue losses.

In addition, various governments around the world have shown concern about the impact associated with cybersecurity, especially those linked to critical infrastructure. This has caused an increase in the activity of regulating how companies implement appropriate cybersecurity controls in industrial environments.

As part of the effort to ensure the cybersecurity of control and automation systems, the International Society of Automation (ISA) developed the 62443 series of standards. These standards are internationally recognized and have been adopted by the International Electrotechnical Commission and the United Nations. The ISA 62443 standards define requirements and procedures for the implementation of safe industrial and automation systems, as well as best security practices for these systems. The adoption of the ISA 62443 standards allows industrial organizations to address the challenges related to the cybersecurity of their systems and eliminate the gaps between operations and Information Technology in their infrastructure.

Moreover, with the aim of increasing awareness and protection capability of ICS in industrial and critical infrastructure installations and processes, ISA created the Global Cybersecurity Alliance (GCA). The cybersecurity alliance created by ISA brings together automation and system control providers, IT infrastructure suppliers, service providers, system integrators, and end-users to address threats to ICS together.

ISAGCA also works to stimulate the adoption of the ISA 62443 standards, which allows for increased awareness, knowledge sharing, and tool development to assist organizations in implementing the entire cybersecurity protection lifecycle. ISAGCA members are also committed to working together with government agencies, regulators, and other stakeholders around the world.

ISAGCA members include leading technology and industrial application providers, among which is Senhasegura. senhasegura’s participation in ISAGCA since its foundation allows for the application of our experience in protecting privileged access to achieve the alliance’s objectives, especially those related to ICS protection. senhasegura’s participation in the alliance also allows for identifying gaps, reducing risks, and ensuring that member companies have the appropriate tools to protect their infrastructure from malicious attacks.

All of these aspects also show the commitment of the entire senhasegura team and ISA to the effective security of industrial environments, as well as the importance of advancing together to ensure the application of these standards, methods, and best practices for the protection of industrial systems. In this way, it is possible to ensure not only the security of organizations but of society as a whole.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

HIPAA 最低必要標準的基本指南

The HIPAA Minimum Necessary Rule applies to all Protected Health Information (PHI). And includes physical documents, spreadsheets, films, and printed images, patient data stored or processed electronically, and information communicated verbally.

Every covered entity and business associate must make reasonable efforts to ensure minimal access to Protected Health Information for a particular use. But how does it work in practice? And how can you interpret “reasonable effort” or “minimum necessary disclosure“? Read our complete guide on the HIPAA Minimum Necessary Standard.

The ABC of HIPAA compliance

Let’s start with what HIPAA is. Passed in 1996 by the US government, the Health Insurance Portability and Accountability Act (HIPAA) obligates every covered entity to protect sensitive health information. Five HIPAA rules define how healthcare professionals should proceed when they handle sensitive data. One of them, the HIPAA Privacy Rule, outlines patients’ rights regarding their health information and regulates who can access it.

 

HIPAA compliance ensures healthcare providers meet the regulatory requirements for Protected Health Information (PHI). For example, an insurance company can only get the reasonably necessary information on a patient’s clinical history. Or if a journalist requests a plastic surgeon to disclose their celebrity patient data, they can’t do that. In short, every covered entity must follow HIPAA regulations. And restrict access to their PHI. 

Why is it critical to be HIPAA-compliant?

HIPAA compliance is essential for healthcare organizations and patients. Here is why: 

  • It ensures healthcare organizations securely handle sensitive information according to the same rules.

  • It gives patients peace of mind about their sensitive data by keeping strict security checks on who can access it and why. 

So, is complying with the HIPAA Privacy Rule important only because of the law? Violating HIPAA rules indeed results in high penalties. Also, HIPAA compliance builds patients’ trust and your organization’s reputation. And boosts your staff morale. 

What is the HIPAA Minimum Necessary Standard?

The HIPAA Minimum Necessary Standard is a component of the HIPAA Privacy Rule. It states that covered entities must make reasonable efforts to ensure minimum access to physical or electronically protected health information.

But since both terms, “minimum necessary information” and “reasonable efforts,” are not defined in HIPAA, what do they mean? They mean that a covered entity can only share necessary information upon request. And decide about the disclosure or restriction of specific parts of information.

Also, the HIPAA Minimum Necessary Standard states that a rational justification for the decision should always follow.

Sounds complex? Let’s examine some examples to clarify how the HIPAA Minimum Necessary Standard works. 

  • A doctor can only access patient records except for their social security number, billing information, and other sensitive information unrelated to treatment. 

  • A billing specialist can obtain the name of the test that a patient did but not the results.

  • An insurance company can only get information about a patient’s records relevant to the request related to the insured event, not the whole medical history.

  • A physician can’t disclose a patient’s medical diagnosis to unauthorized personnel or third parties. 

Every covered entity must limit unnecessary or inappropriate access and disclosure of their patients’ sensitive data.

When does the HIPAA Minimum Necessary Standard apply?

As we said before, the HIPAA Minimum Necessary Standard applies to all HIPAA-covered entities and healthcare providers, such as:

  • Hospitals.

  • Insurance companies.

  • Healthcare clearing houses.

  • Business associates who provide services to healthcare services providers.

 It compels these organizations to take reasonable actions to limit oversharing of PHI. 

Exceptions to the HIPAA Minimum Necessary Standard 

There is an exception for every rule. And the HIPAA Minimum Necessary Standard is no different. Here we have six exceptions to the uses and disclosures of PHI. 

1. Patient’s access to their medical history

A patient of a covered entity has the right to access their own Protected Health Information. To do so, they need to make a written request.

2. Treatment of a patient

A healthcare provider may access a patient’s PHI for the purpose of treatment. It also applies to consultations between providers regarding a patient.

3. The HIPAA rules enforcement

The Department of Health and Human Services asks for a disclosure of PHI based on the HIPAA Enforcement Rule

4. Consent of the person whose PHI is in question

A patient may allow a covered entity to disclose or use their PHI, but he or she must sign an authorization. 

5. Requests required by law

HIPAA-covered entities may disclose PHI without authorization for judicial or administrative proceedings, for example, in adult abuse, neglect, or domestic violence. 

6. Requests required for compliance with HIPAA

It concerns uses or disclosures needed for compliance with the HIPAA Administrative Simplification Rule that ensures consistent electronic communication and data exchange across the U.S. healthcare system.

How to carry out the HIPAA Minimum Necessary Rule in your company

Before implementing the HIPAA Minimum Necessary Standard, check if your organization has adequate policies and procedures. Here is our guide to HIPAA compliance.

Establish your organization’s policy

The policy and procedures should identify the following:

  • Who within your organization can access sensitive data to perform their duties

  • The categories or types of PHI 

  • The conditions appropriate to access.  

It’s also crucial to consider the exceptions you must make, to whom they apply, and under what circumstances. 

Control access to PHI and monitor complia
nce

Develop role-based permissions and determine what information various employees or third parties need. Instal monitoring software solutions to ensure your staff can access only the necessary PHI.

Define your business associate’s access to PHI 

Before you sign an agreement with a new business associate, agree on what data they can access. 

Keep documentation

Demonstrate compliance with the HIPAA Minimum Necessary Standard by keeping all the relevant documents, such as policy changes and employee training,

Train employees on HIPAA compliance

Make sure they know how to follow the HIPAA Minimum Necessary Standard and what sensitive data can be transferred, to whom, and in what circumstances. It will help you avoid HIPAA violations.

Who determines the HIPAA Minimum Necessary Standard?

For routine or recurring requests, a covered entity must have a protocol to limit the disclosure of Protected Health Information to the minimum. For non-routine disclosures, covered entities must develop reasonable criteria for determining and limiting the disclosure. Each such request must be reviewed individually.

Here are a few cases when a reasonable judgment is permitted:

  • A researcher asks for information and suitable documentation from an Institutional Review Board or Privacy Board.

  • A workforce member or a covered entity’s business associate requests minimum necessary information for a stated purpose.

  • A covered entity asks another entity for minimum necessary information.

  • A public official or an agency needs minimum necessary information for public health purposes. 

How often is the HIPAA Minimum Necessary Standard violated?

Although the exact number of violations is not specified, HHS Enforcement Highlights claims the HIPAA Minimum Necessary Standard violations are the fifth most common non-compliance events. There is also no data on who reports these violations, whether self-reported or submitted by covered entities, patients, or health plan customers.

So, what kind of situations violate the HIPAA Minimum Necessary Rule?

  • A doctor requires access to a patient’s medical records to treat them and simultaneously accidentally accesses sensitive data, such as their Social Security number or payment details.

  • A gynecologist gossips with their colleague over lunch about a celebrity patient being pregnant. A cafeteria waitress overhears it, and the Minimum Necessary Rule is violated.

  • An IT professional performs maintenance work on a hospital’s database and clicks on a few files with patients’ medical records. Since they didn’t have permission, they violated the Minimum Necessary Rule.

  • A nurse reveals information about a patient having hepatitis C in a hallway. If other patients can hear it, they can file a complaint that his PHI was disclosed without permission.

The effects of sharing more than the minimum necessary PHI

The consequences of HIPAA violations are significant. Apart from financial penalties, organizations lose their reputation, patient trust, and their ability to operate a business. Filefax, a medical storage company, agreed to pay$100,000 to settle potential HIPAA violations of the HIPAA Privacy Rule. And although Filefax shut its doors during the Office for Civil Rights investigation, it still didn’t escape additional fines and penalties.

However, the Privacy Rule allows incidental or accidental disclosures.

Let’s explain it with examples. Suppose an authorized individual, such as a physician, provides a patient’s PHI to another authorized person, also a physician, and by mistake, they share records of another patient. In that case, we are talking about accidental disclosure breaking HIPAA rules. What about incidental exposure? A person visiting their relative at the hospital may see another patient’s x-ray or can overhear nurses talking about a patient. And in this way, they incidentally access Protected Health Information. 

How can NordLayer help?

Storing patient data in a cloud has become the primary archiving method in the healthcare industry. And healthcare organizations need modern security solutions that help them follow HIPAA regulations.

NordLayer’s policies, standards, and procedures were reviewed by independent assessors who concluded we meet the security objectives outlined in the HIPAA Security Rule. And we have the appropriate measures for securing access to Protected Health Information according to HIPAA requirements.

NordLayer’s HIPAA-compliant solutions can protect endpoints with your organization’s sensitive information, adding an extra security layer to access your network, cloud tools, or databases. Contact us if you want to learn more about how we can help.

Disclaimer: This article has been prepared for general informational purposes and is not legal advice. We hope that you will find the information informative and helpful. However, you should use the information in this article at your own risk and consider seeking advice from a professional counsel licensed in your state or country. The materials presented on this site may not reflect the most current legal developments or the law of the jurisdiction in which you reside. This article may be changed, improved, or updated without notice.



企業網絡安全:保護企業的基本指南

Enterprise cybersecurity protects company applications, data, and infrastructure from online threats. It protects local networks, cloud assets, and remote devices and aims to bolster enterprise security by countering hackers. By doing so, it minimizes the risk of data breaches.

This article will explain the scope and role of enterprise cybersecurity. We will look at some of the most recent cyber threats, as well as best practices to neutralize those dangers. And we will finish with a quick cybersecurity checklist to make implementing changes easier.

Why is enterprise security important?

Enterprise cybersecurity matters because companies must focus on data and network protection. Aside from that overarching need, there are several reasons to make cybersecurity a corporate priority:

  • Data breaches. Recent years have seen a rapid acceleration in the frequency and scope of data leaks. Countless small businesses have suffered, and many have gone out of business. Enterprise security excludes malicious actors and reduces financial and reputational damage.

  • Multi-layered protection. Enterprise cybersecurity creates a series of connected enterprise network defenses. This makes life far harder for would-be attackers. The more time it takes to access critical data, the lower the chances of hackers succeeding.

  • Risk management. Cybersecurity strategies systematically consider every aspect of data protection. Planners gain maximum awareness of network architecture. This includes connected devices, user behavior, identity management, threat detection, and data integrity.

  • Secure business growth. Enterprise cybersecurity helps businesses scale safely. Adding new branches, employees, and applications can compromise cybersecurity. Robust security measures accompany every network expansion, allowing stress-free long-term growth.

  • Third-party management. Enterprise cybersecurity assesses and manages third-party risks. Companies can choose secure partners and work safely to achieve their business goals.

  • Company-wide learning. A solid strategy for cyber security companies educates employees and strengthens the overall security posture. Without an enterprise-wide security plan, employees may miss phishing or authentication training.

Overview of common cyber threats for large organizations

The first step in solving enterprise cybersecurity worries is understanding critical threats.

An effective cybersecurity strategy assesses the risks from critical threats and implements controls to neutralize them.

Social engineering (Phishing)

Most data breaches start with a social engineering attack. Attackers persuade their targets to click malicious attachments. Or they entice users to visit websites infected with malware. They might send emails purporting to come from trusted co-workers or trusted partners. In some cases, phishing attacks involve phone or video conversations to build trust and plan attacks.

Phishing attackers work hard to create believable personas and stories. Only well-trained employees can spot their activities, which are hard for automated tools to detect. So building phishing awareness is an enterprise cybersecurity priority.

Malware

Malware is malicious software that disrupts networks and extracts valuable data. There are many different forms.

Ransomware locks applications until targets pay attackers. Spyware infects networks and sends information to malware operators. Trojans look legitimate but actually implant hazardous code. And worms replicate automatically throughout your network, causing havoc as they spread.

Advanced persistent threats (APTs)

APTs are a specific form of malware with special relevance for enterprise cybersecurity. These threats remain resident on network infrastructure for long periods. For instance, the APT in the 2018 Marriott data breach was present for four years. In that time, it extracted vast amounts of sensitive information, with catastrophic results.

APTs are harder to detect than most malware agents. Companies need advanced detection systems to block, discover, and neutralize persistent threats.

Distributed denial of service (DDoS) attacks

DDoS attacks use bots to direct huge floods of traffic at network devices. Sudden traffic bursts can override network defenses and take down hardware. This results in downtime and lost activity. But the effects can be even worse.

In some cases, these attacks cover malware attacks. Attackers use the traffic flood to enter networks undetected. Enterprises need ways to cut the risk and consequences of botnet attacks.

Insider threats

Company insiders also pose an enterprise cybersecurity risk. Employees can assist phishers by providing information such as personal data or contact details. Many “whaling” attacks on executive-level targets start this way.

Disgruntled workers can extract data and sell it on the dark web. They could send project files to competitors or disrupt workflows via sabotage.

Third-party risk management

Most companies work with third parties to run their infrastructure and deliver services. But any third party could become an enterprise cybersecurity problem.

Third parties could use excessive privileges to extract sensitive data. They could accidentally provide login credentials for malicious outsiders. Both are potential security disasters.

Risk management is essential. Assess third parties and make them follow company security policies. Be careful when acquiring overseas assets. Acquired divisions or smaller companies could pose a security risk.

Best practices for enterprise cybersecurity

Protecting enterprise networks can seem overwhelming. But managing security is much easier with an enterprise cybersecurity strategy. Follow the enterprise security best practices below to develop a strategy that works.

Use MFA for all users

The first critical enterprise security measure is robust authentication. Ask for more than one authentication factor when users log in. You could use biometric scanners, one-time password tokens, or smartphone authentication. Find a style that fits your workforce needs.

Prioritize administrative accounts with the greatest privileges. When attackers access them, they can roam freely and inflict the greatest damage. Make high-privilege accounts as hard to access as possible.

Extend MFA to mobile apps and remote access APIs. Enforce strong passwords for every user. Deliver password policies to all devices when they come online. Automate offboarding procedures to delete accounts when employees leave.

Use IDS/IPS to detect threats

Add another enterprise cybersecurity layer by installing Intrusion Detectio
n Systems (IDS) or Intrusion Prevention Systems (IPS). IDS and IPS perform roughly the same role. They operate continuously and track traffic flowing through the network. They detect threats rapidly by comparing traffic to global threat databases.

IDS/IPS tools also alert managers about unauthorized file transfers. They flag unusual changes in administrative privileges. And they determine whether sudden network slow-downs are connected to cyber attacks.

Prevention systems powered by machine learning let you automate threat detection. They are not a replacement for firewalls and antivirus tools. Instead, IDS/IPS tools are valuable to the enterprise security arsenal.

Carry out regular security assessments and penetration testing

Enterprise security requires testing to make sure security systems are effective. Regularly monitor and test your security systems to uncover network vulnerabilities.

  • Check endpoint security. Are remote devices covered by VPNs and authentication systems? Do you have full awareness of all connected endpoint devices?

  • Check web assets for code flaws. Any minor mistakes could enable SQL injection attacks.

  • Assess updating policies. Are critical apps and devices updated in a timely fashion? If not, you could face a higher risk from Zero Day Exploits.

  • Assess partner organizations carefully and vet their security processes. Put in place systems to detect suspicious activity, such as “impossible logins” from many locations.

  • Audit privileges management systems. Role Based Access Controls (RBAC) segment networks and limit access to critical data. Regularly assess user permissions to avoid privileges creep.

  • Penetration testing also helps you understand how attacks occur. They simulate intrusions, providing insights about weaknesses and areas to improve.

Implement data encryption

Encrypt confidential data at rest on your network and in motion between network endpoints. Use a Virtual Private Network to protect remote access devices and encrypt data flows. Leverage encryption tools provided by cloud service providers.

For watertight data security, consider using end-to-end data protection software. Data security tools encrypt files wherever they move. Systems track the location of data and who is accessing it. And they block unauthorized removal from network settings. This level of protection makes it far easier to comply with data security standards like CCPA or GDPR.

Prioritize crisis management

Planning for emergencies is a core part of enterprise cybersecurity. Assume that data breaches will happen. Put procedures in place to respond and restore network operations as quickly as possible.

A good approach to crisis management is to identify, react, and rebuild:

  • Identify threats immediately with cutting-edge threat detection software

  • React straight away. Inform clients if their data is at risk. Quarantine malicious agents and assess the scope of any data breaches.

  • Rebuild business operations safely. Use data backups to restore web portals and SaaS apps to their previous state. Audit security weaknesses and check for APTs. Communicate clearly with customers. Be transparent about the measures you are taking.

Data backup and post-incident reviews

Data backups restore operations and safeguard customer data. Choose a secure cloud or off-site backup provider to store critical data. If possible, store more than two copies of high-priority files, and make daily backups of the most valuable data.

Enterprise cybersecurity does not need complete backups of other company data. That would become hard to manage at scale. But it’s a good idea to incrementally back up critical application workloads. Store enough data to restore systems following a security incident.

It’s also important to review disaster recovery processes after cyberattacks. Assess whether data backups were effective and secure. Track the speed of system restoration and any data corruption following restart.

Solutions for enterprise cyber security

What are the best solutions to the enterprise cybersecurity dilemma? It makes life easier if we break down enterprise security into three core areas.

Network security

Companies need to ensure secure access to network resources. Network security solutions include:

  • End-to-end encryption of all critical data

  • Endpoint protection via remote access VPNs

  • Single Sign On and MFA systems to exclude unauthorized users

  • Antivirus and antimalware tools

  • Password management to strengthen credentials

  • Employee training to detect phishing

  • Security policies are distributed to every endpoint

Cloud security and data protection

Enterprise cybersecurity must lock down cloud assets and the data held in cloud environments. Solutions here include:

  • Privileges management to limit access to resources employees need

  • Cloud VPN systems anonymize users and encrypt data in motion

  • Cloud-native firewalls regulate access and block threats

  • Use of encryption provided by CSP

  • SD-WAN architecture covering all network assets

Use of security information and event management (SIEM) systems

SIEM tools proactively track threats across enterprise networks. This extends beyond basic network security. SIEM solutions include:

  • IDP/IPS systems to actively detect threats

  • Use of global threat intelligence to combat the latest vulnerabilities

  • Machine learning to achieve granular threat detection

  • Forensic dashboards for full security visibility

  • In-depth reporting for security development and compliance audits

Cybersecurity checklist for enterprises

A comprehensive enterprise security plan includes best practices and the latest technological solutions. Consult this checklist to cover every critical area:

  1. Use MFA to regulate network access

  2. Add extra authentication factors for admin accounts

  3. Assign minimal user privileges in line with Zero Trust ideas

  4. Secure remote devices with VPNs

  5. Require strong, regularly-changed passwords

  6. Encrypt all high-value data

  7. Use DLP tools to track valuable data

  8. Use IDS/IPS tools to track threats in depth

  9. Back up data regularly

  10. Audit backups and threat responses to ensure quick disaster recovery

  11. Regularly test your security systems

  12. Risk assess core threats and create response plans

  13. Train all staff to detect phishing attacks

How can NordLayer help with enterprise security?

Enterprises face a complex range of cybersecurity threats. They need trusted cybersecurity partners to protect data and manage access. Nordlayer will help you put in place the correct security tools to protect business networks.

Our Cloud VPN service enables secure access to SaaS apps anywhere. Secure remote access manag
ement tools make segmenting network resources and assigning privileges easy. And threat detection systems at the network edge block potential threats before they breach network perimeters.

Strengthen your enterprise security today to avoid financial damage. Contact NordLayer and build an enterprise cybersecurity strategy that suits your business needs.