Skip to content

Chrome 瀏覽器防禦 Cookie 竊取漏洞: 對中小企業 (SMBs) 和管理服務供應商 (MSPs) 的影響

重點摘要: 

最近的惡意軟件成功繞過了 Chrome 的防禦機制,利用安全漏洞威脅大量企業,尤其是那些沒有專門 IT 安全團隊的公司。 
中小企業 (SMBs) 由於缺乏資源,無法時刻關注系統更新,這讓它們更容易成為攻擊目標。
管理服務供應商 (MSPs) 需加強對客戶系統的監管,確保定期進行程式修補和更新,以降低新興的網絡安全風險。

近期,信息竊取軟件開發者成功突破了 Google Chrome 新推出的「應用綁定加密」安全功能,這一功能旨在保護存儲於瀏覽器中的 Cookies 和密碼等敏感數據。雖然 Google 提升了安全性,惡意攻擊者仍迅速找到繞過該功能的方法,使得企業面臨更大的網絡風險。

Chrome 127 首次推出「應用綁定加密」,利用 Windows 服務加密 Cookies 和密碼,該服務擁有系統級權限。本應防止用戶級別的惡意軟件竊取這些敏感數據,但像 Meduza Stealer、Whitesnake 和 Lumma Stealer 這樣的惡意軟件卻能繞過這一防禦,竊取數據而不會觸發安全警報或需要更高級別的系統權限。

什麼是信息竊取軟件?

信息竊取軟件是一類專門設計來秘密收集個人身份信息 (PII) 和支付卡信息 (PCI) 的惡意軟件,例如登錄憑證、會話 Cookies 及其他個人或企業數據。這些惡意軟件通常通過釣魚郵件、惡意下載或系統漏洞進行部署,而不需要管理員權限。一旦系統被感染,所竊取的數據可能會被出售於暗網或用於進一步的網絡攻擊。

Chrome「應用綁定加密」防禦被突破後,信息竊取軟件的威脅大幅增加,即使以前受加密保護的數據也能輕易被盜取。對企業來說,這可能會導致重大數據洩露,從客戶數據受損到網絡全面遭入侵,風險不可忽視。

對企業的影響:中小企業的風險為何更高

惡意軟件繞過 Chrome 安全防線,對中小企業 (SMBs) 的影響尤其顯著。這些企業往往缺乏足夠的資源來定期更新系統或進行員工網絡安全培訓,使它們更容易成為信息竊取軟件的目標。此類攻擊可能會:

1. 洩露機密信息:企業的憑證、客戶數據和敏感文件可能被竊取,導致數據洩露。
2. 財務損失:被竊取的信息可能被用於存取銀行帳戶或發動勒索軟件攻擊,造成嚴重的經濟損失。
3. 信譽損害:安全漏洞會損害企業聲譽,導致客戶流失及市場信任度下降。

對於中小企業來說,此類安全事故可能帶來毀滅性後果,除了需要支付昂貴的恢復費用,還可能面臨法律訴訟及監管處罰。

根據 Guardz 研究部門的報告,許多用戶將密碼和支付信息存儲在瀏覽器中,或使用網上銀行和支付平台,但這增加了風險,因為瀏覽器的 Cookie 竊取軟件甚至可以繞過多重身份驗證 (MFA)。

例如,用戶登錄網站或應用程式時,瀏覽器會儲存會話 Cookie,該 Cookie 包含當前會話的信息。如果攻擊者竊取了這個 Cookie,他們便可劫持用戶的會話,無需重新輸入憑證便能未經授權地存取帳戶。雖然 Chrome 的「應用綁定加密」功能旨在防止這類數據被竊取,但某些情況下,這項新技術卻意外降低了防禦效果,甚至使攻擊者更容易入侵。這一變化還可能使防病毒軟件更難偵測到攻擊,並簡化了應提供強大保護的加密流程。

因此,企業必須持續進行系統監控並加強程式修補管理,才能應對不斷演變的安全威脅。

MSPs 減少信息竊取風險的角色

管理服務供應商 (MSPs) 是保護中小企業免受這些新興威脅的關鍵角色。Chrome 最近的漏洞暴露了保持系統更新和程式修補的重要性,MSPs 必須確保其客戶系統得到最新保護,並採用多層次的安全策略。此外,MSPs 應加強客戶教育,定期檢查系統漏洞,並利用能夠檢測和阻止信息竊取軟件的工具。

MSPs 還可以幫助 SMBs 實施更嚴格的安全政策,如多重身份驗證和安全的網絡瀏覽習慣,以減少惡意軟件滲透的風險。通過領先於網絡安全趨勢,MSPs 可以防止小漏洞演變成大規模的數據洩露。

網絡安全意識文化是企業有效保護的關鍵

網絡安全意識活動是企業多層次安全防禦的重要部分。這些活動可以幫助員工了解最新的網絡威脅,如釣魚攻擊或惡意軟件感染,並幫助他們識別和避免危及公司安全的行為。由於人為失誤往往是網絡安全中最脆弱的環節,知識豐富的員工可以成為額外的防線。定期的培訓和模擬攻擊演習能確保員工保持警覺,並減少因無知或疏忽而成為攻擊目標的風險。通過培養網絡安全意識文化,企業可以大幅提升其整體安全防禦能力。

Guardz:利用 AI 驅動檢測與響應,賦能 MSPs

在 Guardz,我們理解 MSPs 在保護 SMBs 免受快速發展的威脅(如信息竊取軟件)方面的挑戰。為此,我們提供的 AI 驅動統一檢測與響應平台為 MSPs 提供先進的工具,主動檢測、隔離並減少威脅,防止其對企業造成損害。使用 Guardz,MSPs 可以在保持高效與經濟性的同時,為客戶提供增強的安全保障。

關於 Guardz
Guardz 為管理服務提供商 (MSP) 和 IT 專業人士提供一個人工智能驅動的網絡安全平台,專門設計來保護小型企業免受網絡攻擊。我們的統一檢測與響應平台能夠全面保護用戶、電子郵件、設備、雲端目錄和數據。透過簡化網絡安全管理,我們讓企業能夠專注於發展業務,同時減少安全管理的複雜性。Guardz 結合強大的網絡安全技術和豐富的專業知識,確保安全措施持續受到監控、管理和改進,預防未來的攻擊並降低風險。

關於 Version 2 Digital
Version 2 Digital 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 Digital 提供廣被市場讚賞的產品及服務。Version 2 Digital 的銷售網絡包括中國大陸、香港、澳門、台灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

為何您需要定期進行模擬釣魚郵件測試?透過 Guardz 工具,提前部署主動的安全防護措施

主要重點:

釣魚攻擊對中小企業的威脅:中小型企業(SMBs)經常成為釣魚攻擊的目標,因此員工培訓非
常重要。
定期模擬提升防禦能力:定期進行釣魚模擬有助於員工識別並應對釣魚攻擊,降低攻擊成功的風
險。
有效的培訓是關鍵:有挑戰性且持續進行的釣魚模擬,可以顯著提高員工辨別釣魚攻擊並正確應
對的能力。


您能辨認釣魚郵件嗎?

希望答案是「可以」,但對於大型企業來說,這個問題更具挑戰性。根據 2023 年的「Gone Phishing Tournament」調查,擁有 1 萬名以上員工的公司中,有 10.3% 的員工可能會點擊釣魚 郵件中的惡意鏈結。換句話說,這代表著平均約有 1,000 名員工可能會無意中洩露敏感數據給黑 客,而這本來可以通過定期的釣魚模擬輕鬆避免。

為什麼釣魚模擬如此重要?

釣魚模擬是網絡安全中的一項測試,旨在通過發送模擬的釣魚郵件來測試員工能否識別並應對這 些潛在的攻擊。即使配備了垃圾郵件過濾器和先進的安全工具,若員工未受過培訓,有害郵件仍 然可能到達員工的收件箱。更糟糕的是,這些郵件可能不會被舉報給 IT 部門。

研究顯示,僅有18.3% 的釣魚模擬郵件會被正確舉報,這並不讓人放心。釣魚模擬能夠教育員工 如何及時舉報可疑郵件,並加強他們的警覺性。即使是訓練有素的員工,在分心時也可能無意中 點擊看似來自可信來源的惡意附件,特別是當郵件語氣模仿公司內熟悉的同事時。

此外,AI 生成的釣魚攻擊增加了新的難度。研究發現,60% 的參與者會成為 AI 自動化釣魚攻擊 的受害者,並且整個釣魚過程可以通過大語言模型(LLMs)自動化,使攻擊成本降低 95% 以上 ,同時保持較高的成功率。

定期進行釣魚模擬有助於減少這類攻擊的風險。

釣魚模擬是如何運作的?

釣魚模擬通常提供多種模板,模仿真實的釣魚攻擊。這些模擬可以測試員工識別可疑郵件的能力 ,並根據具體操作進行評估。可以根據部門或用戶群進行區分,並設置測試的時間和頻率。

關鍵指標包括:

  • 開信率
  • 點擊率(CTR)
  • 失敗率
  • 附件開啟率
  • 點擊舉報比率
  • 改善情況

應該重點培訓那些未能識別出關鍵釣魚信號的員工,如:

  • 轉發釣魚郵件給同事的人
  • 開啟附件的人
  • 沒有舉報釣魚企圖的人

幾個月後再次測試這些員工,觀察他們是否有所改善。如果整體團隊的表現依然不佳,應考慮強 化安全意識計劃,並重新審視現有的安全政策和流程,確保它們與最新的釣魚手法和社交工程攻 擊保持一致。

4 種有效實施釣魚模擬的方法

測試頻率:您應該每月或每季進行一次釣魚模擬。經常更換釣魚範本,確保員工不斷接觸到不同 的攻擊手法。

避免可預測性:不要每天在相同時間發送模擬郵件,隨機化測試的時間和間隔,保持員工的警覺 性。

引入遊戲化機制:通過創建排行榜、徽章和獎勵制度來增強模擬的趣味性,讓釣魚模擬不再是一 項令人頭痛的任務,而是變得具有挑戰性和吸引力。

逐步提高難度:除了基本釣魚攻擊,還可以模擬目標性釣魚攻擊,甚至進行多階段的釣魚模擬, 這些攻擊會逐步建立信任,最終發動攻擊。能識別這類複雜攻擊的員工已具備高水平的釣魚防範 意識。

後續培訓:模擬結束後,對員工進行跟進培訓至關重要。您可以製作簡潔明瞭的指南或圖解,幫 助員工記住如何識別釣魚攻擊並提高他們的防範意識。

無論是管理一個 30 人的團隊,還是運營擁有數萬名員工的大型企業,每個人都應該接受有關釣 魚攻擊的培訓,防患於未然。

使用 Guardz 預防釣魚攻擊

別等到有人點擊了真正的釣魚連結才採取行動。現在就透過 Guardz 釣魚模擬工具,提前部署主 動的安全防護措施。

Guardz 利用 AI 和大型語言模型(LLM)快速生成逼真的釣魚場景和個性化的電子郵件範本,操 作只需幾秒鐘。

操作方式非常簡單:選擇一個範本,滿意後點擊「指派」。你還可以根據特定受眾或行業需求設 置篩選條件,精準地進行針對性測試。模擬完成後,Guardz 將提供詳細的結果報告。

使用 Guardz 來保護你的員工和關鍵數據,免受釣魚攻擊威脅。

立即預約演示,了解更多詳情。
version-2.com.tw/guardz



關於 Guardz
Guardz 為管理服務提供商 (MSP) 和 IT 專業人士提供一個人工智能驅動的網絡安全平台,專門設 計來保護小型企業免受網絡攻擊。我們的統一檢測與響應平台能夠全面保護用戶、電子郵件、設 備、雲端目錄和數據。透過簡化網絡安全管理,我們讓企業能夠專注於發展業務,同時減少安全 管理的複雜性。Guardz 結合強大的網絡安全技術和豐富的專業知識,確保安全措施持續受到監 控、管理和改進,預防未來的攻擊並降低風險。

關於 Version 2 Digital
Version 2 Digital 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、 多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、 銷售點、分銷商及合作夥伴,Version 2 Digital 提供廣被市場讚賞的產品及服務。Version 2 Digital 的銷售網絡包括中國大陸、香港、澳門、台灣、新加坡等地區,客戶來自各行各業,包括 全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的 消費市場客戶。

探索 Guardz 專為 MSP 設計的最新功能

為了不斷提升產品的功能和安全性, Guardz 宣布一系列重要的產品更新,這些更新專為管理服務供應商(MSP)設計,旨在提供更細緻的控制和更大的靈活性,幫助他們更好地管理客戶的網絡安全需求。

電郵文件類型過濾功能  

針對日益增長的客戶需求,Guardz 在電郵安全中推出了更靈活的文件過濾功能。此功能允許針對每位客戶自定義攔截或允許特定文件類型(如 WAV)。這項管理功能位於安全控制 > 電郵保護 > 阻擋列表中。

主要特色:

文件類型自定義過濾:用戶現在可以攔截或允許指定的文件類型,例如 WAV 文件,幫助企業根據客戶需求靈活制定電郵安全策略。
進階管理選項:在安全控制 -> 電郵保護中,管理員可以找到進一步配置選項,簡化設置電郵掃描規則的過程。
全局與客戶級別管理:此功能支援全局 MSP 設置,為所有客戶設置默認規則,但也允許管理員針對每個客戶進行個性化設置,提供更大的靈活性。

功能優勢:

提高安全性:通過阻擋潛在危險的文件類型,有效降低電郵攻擊風險。
靈活控制:根據企業需求調整電郵掃描規則,提升整體電郵安全管理效率。
簡易管理:集中的管理界面讓政策實施和調整變得更加輕鬆。

功能改進:

偵測警報更新
我們對偵測電郵警報進行了全面改進,以提升通知的清晰度、相關性和用戶體驗。
重點強調偵測嚴重性:警報將突出顯示偵測事件的嚴重性,幫助用戶迅速確定優先處理的問題。
詳細的用戶與設備信息:警報中提供了關於涉及用戶和設備的詳細信息,方便管理員快速了解問題範圍並採取行動。
即將推出:更多電郵通知功能即將迎來類似的改進,敬請期待。 

隱藏演示數據功能
我們在客戶頁面新增了一個「演示數據」切換按鈕,方便管理員快速隱藏或顯示演示數據。MSP 現在可以使用演示數據來展示平台功能,而不必洩露實際客戶的敏感數據,這成為一種既安全又有效的銷售工具。當演示數據隱藏時,這些數據將不會計入匯總報告中,以確保數據報告的準確性。

這些更新進一步體現了我們致力於為 MSP 提供領先工具和功能的承諾,幫助提升安全性、控制力和用戶體驗。更多更新和功能改進即將推出,敬請期待!

 

關於 Guardz
Guardz 為管理服務提供商 (MSP) 和 IT 專業人士提供一個人工智能驅動的網絡安全平台,專門設計來保護小型企業免受網絡攻擊。我們的統一檢測與響應平台能夠全面保護用戶、電子郵件、設備、雲端目錄和數據。透過簡化網絡安全管理,我們讓企業能夠專注於發展業務,同時減少安全管理的複雜性。Guardz 結合強大的網絡安全技術和豐富的專業知識,確保安全措施持續受到監控、管理和改進,預防未來的攻擊並降低風險。

關於 Version 2 Digital
Version 2 Digital 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 Digital 提供廣被市場讚賞的產品及服務。Version 2 Digital 的銷售網絡包括中國大陸、香港、澳門、台灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Guardz Launches ‘Community Shield’ – Free Plan to Strengthen MSP Cybersecurity Posture



  • Guardz introduces the Community Shield Plan, a free, comprehensive cybersecurity platform tailored for MSPs to protect their internal operations.
  • The plan offers MSPs unified detection and response capabilities across identities, emails, devices, and data, enabling them to safeguard their own operations without financial strain.
  • This initiative aims to bolster MSPs’ security, reflecting Guardz’s appreciation and continued support for the MSP community. 




MSPs operate at the intersection of technology and trust. Tasked with managing diverse customer environments, they navigate a complex web of point solutions, each with its own set of challenges and vulnerabilities. This responsibility places a significant burden on MSPs, who must ensure not only the security of their clients but also their own operations. With access to vast amounts of sensitive information, MSPs have become prime targets for cybercriminals, and the rise in supply chain and cloud attacks only adds to the pressure.

Today, the digital landscape is more dangerous than ever. Cyber threats are evolving, and MSPs find themselves in the crosshairs. The need to bolster internal security is not just a priority; it’s a necessity.  The challenge is clear: how can MSPs effectively safeguard their operations without stretching their resources too thin?

We are thrilled to announce the launch of the Guardz Community Shield Plan, which aims to empower MSPs to secure and insure their internal operations easily. The Community Shield plan offers a unified platform that provides unified detection and response capabilities across identities, emails, devices, and data—all at no cost.

This innovative plan allows MSPs to establish a strong security foundation without the burden of financial commitment. With access to the full suite of the Guardz advanced security controls, MSPs can now focus on what they do best—protecting their clients—while resting assured that their operations are equally safeguarded. For those looking to extend this high level of protection to their clients, the Community Shield plan seamlessly integrates with the Guardz cost-effective solutions.

“This offering is our commitment to supporting and protecting the MSP community, reflecting our appreciation for the partnership and trust we are building together,” said Dor Eisner, CEO and Co-Founder of Guardz. “We’ve gained so much from this collaborative community, and now we want to give back. By providing the Guardz platform for free, we aim to support MSPs’ growth and success while keeping their businesses secure. We believe that a secure MSP is better equipped to foster secure environments for their clients, creating a ripple effect of enhanced cybersecurity across the board and, ultimately, a safer digital world.”

The Guardz Community Shield plan is available immediately. Interested MSPs can sign up for a free two-week trial and claim their free licenses directly from the product.  To learn more and sign up, click here.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Beyond Cyber Essentials: A Look into Diverse Cybersecurity Standards

Ransomware payments last year exceeded $1 billion, a trend projected to persist this year as a significant cybersecurity threat for all types of businesses, with reports that 69% of SMBs are unprepared to deal with the next cyberattack. However, many seek to meet global standards that assist them in strengthening their cybersecurity posture, defending against ransomware and other cybersecurity threats, and opening up new business opportunities. One such standard is the Cyber Essentials.

The 5 Security Controls of Cyber Essentials 

Cyber Essentials, launched in 2014 as a UK-based standard for cybersecurity controls and practices, was initiated by the National Cyber Security Centre (NCSC). Similar to many other cybersecurity standards, it helps businesses identify which clients are using effective cybersecurity practices and implementing proper data security. This, in turn, facilitates new business relationships, including those with the UK government. The Cyber Essentials includes five different security controls that are meant to defend against 80% of cybersecurity attacks. 

They include:

  • Firewalls and routers. Check anti-virus software and internet gateways routinely to prevent the use of default passwords and unauthenticated access. Remove permissions once they are no longer needed. Approve and document all rules for firewalls together with both an approved individual and the organization. 
  • Patch management. Ensure all software is licensed, supported, and patched within 14 days of an update release. Routinely fix vulnerabilities scored as “high” or “critical.” All vulnerabilities with a CVSS v3 score of “7” should also list the fixes.
  • Malware protection. Keep software up-to-date and configured to scan files when accessed. Web pages should also be scanned automatically when accessed through a web server, and connections to malicious software sites should be prevented.  
  • Access control. Protect against malicious attackers gaining access to systems and networks by only allowing authorized individuals to access accounts. Use a combination of authorization and authentication methods to accomplish this. 
  • Secure configuration. Misconfigurations are one of the most common sources of data breaches. Ensure your services and networks are properly configured to reduce the number of vulnerabilities malicious threat actors can potentially exploit.  

5 Alternative Cybersecurity Frameworks and Standards

While there may be some overlap between the Cyber Essentials and other cybersecurity standards, each 

  • ISO 27001. An international standard was formally adopted in 2005 by the International Organization for Standardization (ISO). Its goal is to facilitate the effective implementation, use, and improvement of information security management systems (ISMS) within a business and its third parties. 
  • NIST Cybersecurity Framework (CSF). Initiated by Obama in 2014 to improve the cyber resilience of critical infrastructure, it is now the most common set of voluntary standards adopted by businesses. It provides all businesses with a simple set of steps to execute to strengthen their cyber resilience. 
  • PCI DSS. A cybersecurity standard for businesses who transmit, store or generate data related to credit and debit card payments. Its goal is to protect consumers against fraud and data theft. 
  • GDPR. A regulation focusing on the data privacy of customers in the European Union or businesses who process customers’ data in the European Union. 
  • HIPAA. Developed in 1996, the Health Insurance Portability and Accountability Act (HIPAA) is a U.S. regulation aimed at protecting patient health information (PHI). 

Evaluating the Effectiveness of Alternative Cybersecurity Frameworks

The Cyber Essentials were developed with a specific use case in mind, one in which an attacker uses publicly available tools and techniques to launch security attacks. Although it broadly covers the five security controls mentioned, it may not be comprehensive enough for businesses in specific industries with specific compliance requirements and complex IT environments that encounter evolving cybersecurity risks. On the other hand, its broad scope makes it easier to implement for businesses of all sizes across industries.

Alternative cybersecurity standards and frameworks such as ISO 27001, PCI DSS, NIST CSF, and HIPAA have detailed guidelines for improving cybersecurity posture and protecting sensitive information according to their industries. While they are comprehensive and effective, they are limited in scope and can be harder to implement in larger organizations that have detailed requirements. Noted exceptions are the NIST CSF, which is adaptable and flexible for businesses in different industries but also consumes resources when implemented in larger organizations. The GDPR is also an effective regulation but can be difficult to implement due to its broad scope. It also focuses on legal aspects of data privacy rather than data protection. 

The Perfect Combination of Cybersecurity Standards 

Businesses that seek to replace the Cyber Essentials with an alternative cybersecurity framework must first evaluate whether or not it also covers these five security controls and has UK accreditation. Any additional framework should also require evidence that it tests against these controls or assesses the overall outcome (e.g., to manage the risk of an internet attack). 

Implementing alternative standards that complement the Cyber Essentials rather than replacing it can give your business additional recognition as a company that has a strong cybersecurity posture and implements best practices. However, implementing multiple regulations can also drain resources and be challenging depending on the requirements. Before adopting an additional cybersecurity framework, a business should ask itself which security threat it is trying to defend against. They should then explore which combination of standards might be the most relevant in defending against those threats. 

How Guardz Protects MSP Client Data 

As ransomware and other looming cybersecurity attacks increase against businesses, governments may develop stricter cybersecurity regulations and standards. Although businesses should continue staying informed of different types of compliance, they need a multi-layered approach and solution to these evolving threats in parallel. Guardz enables MSPs to streamline cybersecurity by automating detection and response across user data, devices, emails, and cloud directories from a single pane of glass.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Guardz Raises the Bar with More Feature Advancements

At Guardz, we are committed to staying ahead of the curve and continuously improving our platform to provide your clients with the most robust protection against evolving cyber threats. 

From advanced ransomware detection to streamlined email security management and customizable phishing campaign content, our latest updates are designed to elevate your client security posture and ensure you’re equipped to tackle even the most sophisticated cyber threats. 

Ransomware Early Detection & Response

Endpoint Security at Guardz has taken a great leap forward with the latest Early Ransomware Detection and Response capabilities.

  1. The new File Integrity Check is a feature that installs and monitors a “bait” file on the device and will trigger an issue as soon as these files are edited or modified in any way (including encryption). This serves as an indication of ransomware or other malware messing with files.  
  2. As a strong response to this and other threat detections, Device Isolation can be initiated to disable all the network connections on the endpoint and actively prevent the flow of packets to/from the device.  These new capabilities can be found in the Device Details drawer as well as in the relevant issues.  

Email Threshold Enhancements


Improving the effectiveness and manageability of email security is a key focus in the Guardz platform.  To this end, we are introducing a simplified approach to email thresholds, High, Medium, and Low, allowing admins to select the appropriate action for each level of risk.

These enhancements replace the old email scale and allow admins to confidently and transparently apply caution banners and quarantine.
The 3-level approach enables proactive protection while minimizing disruptions to email security workflows.

Customize Phishing Campaign Content



Due to popular demand, it is now possible to edit the content, subject and title of phishing simulation campaigns. The content will remain AI-generated but will allow admins to make necessary tweaks without regenerating the whole email.

Key Benefits:

  • Tailored Messaging: Customize email content to better suit your organization’s tone and style.
  • Enhanced Engagement: Craft compelling subject lines and titles to increase reliability.
  • Improved Effectiveness: Fine-tune phishing campaign emails to resonate more effectively with employees, maximizing the impact of your security awareness.

Take control of your phishing simulations and personalize your campaigns for optimal results.

Coming Soon

  • Windows Server Support – Beta

    Expanding on our device agent enhancements, we’re excited to announce that support for Windows Servers has now entered beta.
    It is now possible to ensure comprehensive endpoint security across a broader range of organization devices.

    The Windows Server agent supports the following versions: 2016, 2019 and 2022

    If you would like to join our beta, feel free to reach out via email or chat!
  • New Report: Security Business Review

    The Guardz ROI report has been a popular way for MSPs to communicate security risks to their customers while also showing the value they bring.  This redesigned “ROI Report” is a comprehensive approach to provide end customers with a clear and concise overview of their security posture on a monthly or quarterly basis.

    Key Features:
    • Summarized Data: The Security Business Review Report offers summarized data on the security-related activities managed through Guardz. From threat detection to risky users, you’ll get a holistic view of the organization’s security landscape.
    • Comparison with Previous Period: Gain insights into your security progress over time by comparing current results with those from previous periods. Identify trends, track improvements, and make data-driven decisions to enhance security posture.
    • Behavioral Analysis: Understand how your customer behaves from a security standpoint. The report provides valuable insights into user behavior, system vulnerabilities, and potential risks, empowering stakeholders to proactively address security challenges.

We can’t wait for you to experience the newest updates! Keep your eyes peeled for more to come!

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.