Skip to content

量化 ROI:透過治理影子 AI 降低總體持有成本 (TCO)

AI 的採用不再只是趨勢,而是一場衝刺。雖然高達 81% 的 AI 使用 發生在 IT 部門的可視範圍之外,但這種「影子 AI (Shadow AI)」現象正帶來巨大的財務風險。為了保護企業盈餘,IT 領導者必須從單純的偵測轉向以投資報酬率 (ROI) 為核心的治理模型。

$4.88M 資料外洩平均成本
$2.2M 治理帶來的平均節省
4% 潛在全球營收罰金

影子 AI 隱藏的 TCO 三大支柱

在 AI 時代,總體持有成本 (TCO) 已延伸至軟體授權之外,更包含了因使用未經審核的工具而產生的「風險持有」成本:

修復成本 修復由 AI 產生的代碼錯誤(幻覺)或清理因不安全指令 (Prompt) 導致的資料外洩所需的人力成本。
破碎的數據資產 當企業專有資訊被困在個人的大型語言模型 (LLM) 孤島中而非集中管理時,所造成的價值損失。
合規性法律責任 未能通過稽核以及違反歐盟《AI 法案》或 GDPR 等標準所帶來的財務衝擊。

治理紅利:計算 ROI

治理影子 AI 是一項避免成本 (Cost Avoidance) 的戰略。透過實施自動化安全控制,組織可以有效消除「影子稅」。根據 IBM 2024 年的報告,廣泛使用安全 AI 與自動化技術的組織,其外洩成本平均可降低 220 萬美元 —— 這是企業主動治理所獲得的直接紅利。

成本控制的財務框架 (NIST AI RMF)

應用以下四個步驟,將影子 AI 負債轉化為受管資產:

  • 治理 (Govern): 以「安全使用政策」取代全面禁用,為員工提供一條安全的採用路徑。
  • 對照 (Map): 利用偵測工具照亮網路中運行的所有應用程式。
  • 衡量 (Measure): 針對高頻率使用的未授權工具進行財務與安全風險評估。
  • 管理 (Manage): 透過單一平台集中管理存取權限,強化身分驗證控制。

結論:戰略性創新

IT 領導者擁有獨特的機會,在推動創新的同時,嚴格保護組織的財務健康。透過揭開影子 AI 的面紗,您將不再把資源消耗在隱藏風險中,而是開始投資於安全且可擴展的增長。

關於 JumpCloud

在 JumpCloud,我們的使命是建立一個世界級的雲端目錄。我們不僅是將 Active Directory 演進至雲端,更是重新定義現代 IT 團隊的工作方式。JumpCloud 目錄平台是一個統一的目錄,旨在管理您的用戶、其 IT 資源、您的裝置群組,以及它們之間的安全連線,並提供全面的控制、安全性和可視性。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

JumpCloud:打造零信任時代的雲端身份與裝置管理核心平台

在當今零信任與分散式工作環境下,企業對統一身份管理、存取控制、裝置安全與 SaaS 應用治理越來越依賴強大平台。JumpCloud 作為雲端身份與裝置管理解決方案,以其雲目錄、SSO、多因素驗證與裝置管理功能,成為許多中小企業與大型企業的安全基礎架構核心。
JumpCloud 的使命是建立世界一流的雲端目錄。這不僅是將 Active Directory 遷移到雲端,更是對現代 IT 團隊運作方式的革新。 JumpCloud 目錄平台是一個使用者、其 IT 資源、裝置群組以及它們之間安全連接的目錄,提供全面的控制、安全性和可視性。

【產品特色】

  • 雲端目錄即服務(Directory as a Service):JumpCloud 提供雲端目錄功能,取代傳統地端 Active Directory,集中管理用戶身份與資源存取控制。
  • 支援多平台設備管理:可同時管理 Windows、Mac、Linux 裝置,統一政策、補丁與設定,提升 IT 管理效率。
  • 單一登入(SSO):支援 SAML 2.0、LDAP 等協議,讓使用者只需一組憑證便可安全登入多種雲端與內部應用。
  • 多因素認證(MFA):強化登入安全,大幅降低憑證被濫用的風險。
  • 零信任安全原則:基於「永不信任、持續驗證」理念,跳脫傳統防火牆邊界模型,提高整體資安防護能力。

【產品核心優勢】

  • 提升安全姿態與治理:JumpCloud 能建立統一身份管理政策與最小權限原則,有助於符合合規要求(如 ISO、SOC2 等)。
  • 降低 IT 成本與複雜性:透過雲端架構整合身份、存取與裝置管理功能,可減少多套系統與重複授權費用。
  • 遠距與混合工作最佳化:真正實現遠程部署、零接觸註冊(Zero Touch Enrollment)、自動政策推播,支援現代工作模式與異地員工。
  • 資料視覺化:平台具備日誌與稽核功能,有助於制定資安策略與追蹤異常行為。

【產品應用情境】

  • 企業雲端資源統一登入:企業需管理多種 SaaS 應用(如 Google Workspace、Microsoft 365、Atlassian、GitHub 等),JumpCloud 提供 SSO 與存取控管。
  • 裝置政策與補丁管理:IT 需要統一推送安全更新與補丁,提高裝置安全性。
  • 身份生命週期自動化:員工入職、自動加入其所需的應用與群組;離職時自動取消所有存取權限。
  • 影子 IT 偵測與治理:透過 SaaS 發現功能,識別未經批准使用的雲端應用,避免資安與成本浪費。

【適合行業】

  • 金融與銀行業:高安全合規需求、MFA 與資安審計能力有助於滿足監管要求。
  • 醫療與健康產業:須管理敏感健康資料(PHI),結合身份保護與裝置控管可減輕洩漏風險。
  • 教育機構:處理大量使用者與跨平台裝置需求,中央身份管理與SSO可降低支援成本。
  • 中小企業:希望快速導入雲端目錄、提升安全性而不需大量前期投入機房設備。

關於 JumpCloud

在 JumpCloud,我們的使命是建立一個世界級的雲端目錄。我們不僅是將 Active Directory 演進至雲端,更是重新定義現代 IT 團隊的工作方式。JumpCloud 目錄平台是一個統一的目錄,旨在管理您的用戶、其 IT 資源、您的裝置群組,以及它們之間的安全連線,並提供全面的控制、安全性和可視性。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

AI 治理:安全採用 AI 的關鍵政策

大規模安全導入 AI 的數據、身份與整合治理

人工智能 (AI) 已迅速從實驗性項目,轉變為 IT 策略的核心組成部分。大多數組織不是已經在使用 AI,就是正在積極規劃大規模部署。這場巨大的轉變,要求 IT 團隊必須緊急重新思考如何管理基礎設施、保護身份和確保敏感數據的安全。

快速採用帶來了顯著的風險。AI 系統會與關鍵基礎設施互動、處理機密資訊,甚至可能自主執行決策。如果缺乏健全的治理,這將導致安全漏洞和重大的合規性問題。您現在制定的政策,將決定 AI 成為組織的競爭優勢或昂貴的負債。

核心任務:治理 AI 以防範「影子 AI」

大多數 IT 領導者深切關注 AI 採用失控的風險,許多組織擔心未經審查的整合和合規性暴露。良好的治理是解決之道。清晰的政策確立了 AI 可用於何處、誰必須批准新工具,以及如何監控其使用情況。

影子 AI 的風險

政策對於防止 「影子 AI」(Shadow AI) 至關重要,即團隊在沒有 IT 監督的情況下部署未經批准的工具。這種缺乏可見性的情況,會瞬間打開數據洩漏和智慧財產權暴露的大門。主動治理可確保減少意外發生,並為關鍵系統提供更好的保護。

五項核心 AI 治理政策

為了安全地向前邁進,IT 領導者必須在以下五個領域定義規則:

  • 1. 正式的整合審查與批准: 每個新的 AI 整合都必須遵循由 IT 安全或架構團隊主導的正式審查流程。這項政策確保在工具上線 之前,必須完成強制性的安全掃描、數據流審查和合規性驗證。
  • 2. 機器身份與存取管理 (IAM): AI 工具依賴服務帳號和機器人,但這些通常管理不善。政策必須要求實施強大的 IAM 實踐,包括將服務帳號的權限限制在最低需求,並要求定期輪換 API 金鑰和憑證。
  • 3. 嚴格的數據治理與分類: AI 模型的可靠性取決於其輸入數據的品質。政策必須強制執行數據分類(例如:公開、機密),並要求敏感數據在用於 AI 訓練或推理之前,必須經過加密、清洗和驗證。這能確保系統可靠並隨時準備好進行稽核。
  • 4. 監控與事件回應框架: 可見性是關鍵。政策必須定義哪些 AI 相關事件(身份活動、整合、數據存取)將被記錄,哪些安全閾值會觸發警報,以及 AI 相關事件應如何被升級和調查。
  • 5. 變更管理與文件紀錄: 每個已部署的 AI 工具或整合都需要詳細的書面紀錄。政策必須強制要求對工具的目的、風險評估和數據來源進行徹底的文件紀錄,並記錄所有後續的變更和更新。這有助於簡化稽核並防止未經授權的部署。

引領 AI 採用的下一步

AI 是現代 IT 中不可逆轉的一部分。目標不再是阻止其使用,而是以一種安全、可擴展且符合業務目標的方式進行治理。透過現在就制定明確的政策——正式批准整合、仔細管理機器身份、保護數據、監控活動和記錄每次變更——您的團隊就能獲得安全使用 AI 所需的控制權。

儘早採取行動:實施這些治理步驟,以避免後續產生高昂的安全和合規性問題。

要深入了解像您這樣的組織如何採用和保護 AI,請下載 JumpCloud 最新的 IT 趨勢特別報告。

引領 AI 需要掌控,而非混亂。

關於 JumpCloud

在 JumpCloud,我們的使命是建立一個世界級的雲端目錄。我們不僅是將 Active Directory 演進至雲端,更是重新定義現代 IT 團隊的工作方式。JumpCloud 目錄平台是一個統一的目錄,旨在管理您的用戶、其 IT 資源、您的裝置群組,以及它們之間的安全連線,並提供全面的控制、安全性和可視性。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

IT 自動化的三大層次:確保安全、簡化流程並擴展業務規模的藍圖

IT 自動化路線圖:實現可持續業務增長

業務成長令人振奮——直到它壓垮您的 IT 團隊。隨著新員工加入和新市場的開拓,過去適用於小團隊的手動流程很快就變得難以為繼。IT 團隊被重複性的任務淹沒,造成了拖慢整個組織的瓶頸。

這並非失敗的跡象,而是需要進化的信號。本文提供了一份清晰的藍圖,助您擺脫被動、手動的 IT 模式。我們將探討自動化成熟度的三個層次,協助您建立一個安全、可擴展的系統,這個系統將促進成長,而非阻礙成長。

第一層:基礎自動化 — 馴服重複性任務

當公司規模尚小時,逐一處理建立使用者帳戶或設定筆記型電腦等任務是可行的。但當您的員工人數從 20 人增長到 200 人時,這種手動方法將會造成混亂。

基礎自動化是第一步,也是最關鍵的一步。它的目標是處理那些消耗團隊時間和精力的高頻率、低複雜度的任務。透過將這些例行工作自動化,您可以減少人為錯誤、確保一致性,並釋放您的團隊,讓他們專注於更具策略性的專案。

數據顯示:一份 2025 年的預測指出,69% 的日常管理工作將被自動化,這凸顯了企業將重複性任務交給科技的巨大趨勢。

基礎自動化的「快速見效」項目:

  • 自動化使用者旅程:將您的身分供應商與您的人力資源資訊系統 (HRIS) 同步。這能確保新進員工在第一天就獲得所需權限,並在他們離職時立即撤銷權限——從而彌補一個主要的安全漏洞。
  • 零接觸裝置設定:無需 IT 人員接觸硬件,即可自動配置和部署新裝置,並套用正確的設定、軟體和安全策略。
  • 自動化政策強制執行:在您的所有裝置上自動應用並強制執行磁碟加密、密碼複雜度和螢幕鎖定計時器等安全政策,以維持合規性。

第二層:流程串聯 — 統一您的技術堆疊

一旦個別任務實現自動化,下一個成熟度層次就是跨不同系統串聯流程。大多數組織都苦於「技術擴散 (tech sprawl)」——由各種互不相連的工具拼湊而成,造成了資訊孤島和營運摩擦。

這迫使 IT 團隊浪費時間在系統之間手動核對數據。事實上,平均每個組織使用 9.3 種不同的工具來執行核心 IT 功能,但只有 19% 的組織表示已實現完全統一的環境。這個層次旨在彌合這些差距,為使用者、裝置和存取權限建立一個單一事實來源 (single source of truth)

此階段的關鍵舉措包括:

  • 深度整合 HRIS 與 IAM:超越基本的同步。建立直接的連結,使您 HR 系統中的狀態變更(如晉升或部門調動)能自動觸發所有關聯應用程式中正確的權限更新。
  • 整合您的工具:透過將功能重疊的工具整合到一個統一的平台中,來逆轉技術擴散。這能降低複雜性、減少成本,並透過集中管理和可視性來提升您的安全態勢。

第三層:智慧化協作 — 從被動反應到主動預防的 IT

自動化成熟度的最高層次,是將 IT 從一個被動的支援部門,轉變為一個積極主動的策略夥伴。在這個階段,由業務事件自動觸發完全協調、數據驅動的工作流程,讓您的 IT 環境能夠動態地應對不斷變化的情況。

這種先進的協作模式能夠預測需求,並在風險影響業務之前就將其化解,其背後通常由現代化的數據管道和機器學習技術所驅動。

數據的力量:截至 2025 年,超過 70% 的組織正在使用數據和機器學習 (ML) 管道來訓練生成式 AI 模型,而這正是驅動此層級複雜自動化的相同技術。

智慧化協作環境的關鍵能力包括:

  • 自動化事件應變:當發生可疑登入等安全事件時,系統會在幾秒鐘內(而非數小時)自動觸發應對工作流程,例如將裝置從網絡中隔離或鎖定使用者帳戶。
  • 適應性存取控制:採用零信任 (Zero Trust) 理念,動態地做出存取決策。使用者的權限可以根據其位置、裝置的安全狀態或異常行為進行即時調整。
  • 預測性分析:利用 AI 和機器學習來預測硬件故障,或識別可能預示新興安全威脅的模式,讓您在問題導致停機前就加以解決。

通往可持續成長之路

成長應該是機遇,而不是營運的負擔。從自動化基礎任務到建立一個完全智慧協作的環境,這趟旅程為您提供了一條清晰的路徑,打造一個能與您的業務輕鬆同步擴展的 IT 計劃。這不僅僅是為了解決眼前的問題——而是為了奠定一個為未來做好準備的基礎。

準備好將這些原則付諸行動了嗎?探索 JumpCloud 如何幫助您自動化工作流程、串聯您的 IT 技術堆疊,並為各個成長階段建立穩固的基礎。

關於 JumpCloud

在 JumpCloud,我們的使命是建立一個世界級的雲端目錄。我們不僅是將 Active Directory 演進至雲端,更是重新定義現代 IT 團隊的工作方式。JumpCloud 目錄平台是一個統一的目錄,旨在管理您的用戶、其 IT 資源、您的裝置群組,以及它們之間的安全連線,並提供全面的控制、安全性和可視性。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

將網路框架轉化為您的 MSP 的競爭優勢

《MSP的信任藍圖:將網絡安全框架轉化為您的競爭優勢》

在一個擁擠的市場中,您該如何具體證明您的MSP(託管服務供應商)真正致力於安全?對於英國和澳洲的MSP來說,答案就在於政府支持的安全框架,它們能將最佳安全實踐轉化為您最強大的業務差異化優勢。

像是英國的「網絡基礎安全認證 (Cyber Essentials)」和澳洲的「八大關鍵策略 (Essential Eight)」等框架,可能看起來只是又一道合規的障礙。但如果您不把它們看作是一張檢查清單,而是視為一個能將您的安全技術堆疊標準化、建立客戶堅定信任並解鎖新收入的策略藍圖呢?

本指南將為您剖析這些框架的意義、比較其異同,並說明您如何利用它們來建立一個更安全、更成功的MSP。

英國的標準 playbook:解密Cyber Essentials (CE) 與 CE Plus

對於英國的MSP而言,由英國國家網絡安全中心 (NCSC) 推出的Cyber Essentials是網絡防禦的基礎標準。它旨在防禦最常見的網絡威脅,並建立在五項關鍵技術控制之上:防火牆、安全組態設定、使用者存取控制、惡意軟件防護及修補程式管理。

  • Cyber Essentials (CE)

    一份自我評估,用以證明您已具備必要的防護措施。

  • Cyber Essentials Plus (CE+)

    更進一步,由獨立的稽核員進行實地的技術稽核,以證明您的控制措施確實有效,從而提供更高層級的保證。

這對您的MSP為何重要?這不僅關乎您自己…您的客戶同樣在意。

對您的客戶而言,CE是您在安全方面盡職調查的清晰標誌。對您的MSP而言,它是一個策略工具。CE提供了一個信譽卓著的基準,讓您可以將安全服務標準化、簡化營運流程並建立不容置疑的信任。至關重要的是,它通常是英國政府及國防部供應鏈中企業的強制性要求,為您打開通往高價值新合約的大門。

澳洲的基準:理解Essential Eight

在澳洲,澳洲網絡安全中心 (ACSC) 則提供了Essential Eight。這並非一次性的證書,而是一個成熟度模型,旨在指導組織在三個不同的成熟度級別上實施其八項關鍵控制措施。

Essential Eight因其務實、貼近真實世界的焦點而備受推崇,它專注於緩解當今最普遍的威脅,從機會主義的勒索軟件到複雜的針對性攻擊。

全球洞察:打造一個「集兩者之大成」的安全標準

雖然這些框架在世界的兩端各自發展,但它們有著相同的DNA,都優先考慮如修補漏洞、保護組態設定和限制管理員權限等關鍵控制措施。

然而,真正的洞見來自於它們的差異。Essential Eight在三個領域上特別強調,英國的MSP可以採納這些領域來打造更具韌性及更高價值的服務:

  1. 應用程式控管

    主動防止未經批准或惡意的程式執行。

  2. Microsoft Office巨集強化設定

    封鎖或審查來自網絡的巨集,這是勒索軟件常見的攻擊途徑。

  3. 強制性每日備份

    確保透過每日備份重要資料、軟件和組態設定,您能從任何事件中迅速恢復。

透過整合這些原則,兩國的MSP都能建立一種超越單純合規的安全態勢,並提供卓越的保護。

MSP的執行引擎:您達成可規模化合規的工具組

理解框架是一回事;在您所有客戶群中一致地實施它們則是另一回事。這正是統一平台對於效率和執行力變得至關重要的原因。

  • 在每個端點上強制執行合規

    真正的合規要求在每台裝置上都有一致的政策執行力,無論其位置或作業系統為何。使用集中的裝置管理解決方案,您可以強制執行磁碟加密、作業系統更新和螢幕鎖定等安全設定,確保每個端點都符合框架要求。

  • 保護每個身分

    兩個框架都極力強調控制存取權限。現代化的方法是結合身分與存取管理(IAM) 來執行「最低權限原則」。正如我們的合作夥伴The Light的Chris Pearson所言,這正是MSP看到最直接效益的地方:

從合規負擔到競爭優勢

Cyber Essentials和Essential Eight不僅僅是證書。它們是策略性框架,賦予您能力去將服務標準化、教育客戶您所提供的價值,並以具體的方式證明您的安全資質。

了解標準與大規模執行標準之間的差距,正是MSP贏得新業務或被市場淘汰的關鍵所在。而這正是JumpCloud for MSPs旨在彌合的差距。

JumpCloud的平台將身分與存取管理 (IAM) 和裝置管理整合到單一的統一解決方案中。這消除了使用由零散工具拼湊而成的系統的需求,讓您可以透過單一管理平台,有效率地執行兩個框架中最關鍵的控制措施:

  • Cyber Essentials

    無縫管理使用者存取控制、修補程式管理和安全組態設定。

  • Essential Eight

    強制執行應用程式控管、管理特權存取並保護端點。

透過將這些框架與統一平台嵌入到您的服務交付中,您不僅僅是打勾了事——您正在建立一個更安全、更具韌性且利潤更高的MSP。正如另一位合作夥伴FIFUM的Chris Notley所說。

關於 JumpCloud

在 JumpCloud,我們的使命是建立一個世界級的雲端目錄。我們不僅是將 Active Directory 演進至雲端,更是重新定義現代 IT 團隊的工作方式。JumpCloud 目錄平台是一個統一的目錄,旨在管理您的用戶、其 IT 資源、您的裝置群組,以及它們之間的安全連線,並提供全面的控制、安全性和可視性。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

終結存取混亂:使用JumpCloud簡化並保護使用者存取權限

永無止境的存取權限請求:利用 JumpCloud 簡化並保護使用者存取

用掌控取代混亂,讓 IT 團隊不再為存取問題而煩惱。

 

永無止境的存取權限請求、令人抓狂的電子郵件、過時的試算表、以及惱人的安全風險。長久以來,IT團隊一直被困在一種混亂的手動流程中來管理使用者存取權限——這種零散破碎的方法不僅拖慢了員工的生產力,還造成了危險的安全漏洞。

這不僅僅是不便,更是一個巨大的阻礙。Strongdm的一項調查發現,超過64%的組織表示,因存取問題導致他們每天或每週都面臨生產力損失。手動流程使得「最低權限原則」幾乎無法執行,從而增加了人為錯誤和潛在資安事件的風險。

是時候用掌控取代混亂了。

隆重推出 JumpCloud Access Requests

今天,我們非常興奮地宣布推出 JumpCloud Access Requests,這是一個顛覆性的解決方案,旨在讓IT團隊和託管服務供應商(MSPs)處理使用者存取權限和治理的方式現代化。

透過擺脫手動請求和分散的系統,JumpCloud Access Requests提供了一個單一、集中的平台,來自動化、保護和稽核每一個存取決策。現在,IT團隊可以停止忙於應付存取問題的救火工作,轉而開始主動強化安全性、提升效率並賦予員工能力。

統一化方法的核心優勢

JumpCloud Access Requests 在最重要的領域帶來了可衡量的影響:

  • 釋放生產力:透過自助服務入口網站消除令人沮喪的瓶頸,讓使用者能自行請求所需資源。這能大幅減少服務台的案件量,並讓員工更快地獲得所需資源以投入工作。
  • 強化安全性:輕鬆執行最低權限原則。我們可配置的多階段審批流程確保在沒有適當權限的情況下,任何存取權都不會被授予,同時為您提供對所有變更清晰、集中的檢視。
  • 輕鬆實現合規:為每一次的請求、批准和拒絕,都保留一份完整且不可變動的稽核軌跡。這讓您隨時準備好接受稽核,節省無數小時並消除合規報告的痛苦。
  • 整合您的IT生態系統:透過連接您整個技術堆疊的存取工作流程來打破資料孤島。與ITSM、HRIS以及像Jira和Slack這樣的即時通訊應用程式整合,以觸發操作並將請求資料同步至第三方票務系統,從而提供無縫的流程和統一的體驗。

強大功能,簡化管理

  • 自助服務入口網站:提供一個直觀的自助服務入口網站,讓終端使用者可以請求存取各種資源,包括單一登入 (SSO) 應用程式。這能加速授權過程、改善使用者體驗,並減輕IT團隊的行政負擔。
  • 可配置的審批流程:輕鬆定義客製化的多階段審批流程。將請求路由給主管、資源所有者或特定的審批群組,確保每個決策都有合適的人員參與。
  • Webhook 整合:與您現有的IT工具(如Jira、Slack和客製化應用程式)無縫整合。JumpCloud的Webhook整合使IT團隊能夠自動化下游任務、發送即時通知,並保持系統同步。
  • 全面的稽核能力:從最初的請求到最終的批准,每一個動作都被記錄在詳細且防竄改的日誌中,為IT團隊提供無與倫比的可見度,並使報告變得輕而易舉。

立即試用 JumpCloud Access Requests

管理存取權限不必是手動、耗時或充滿風險的。JumpCloud Access Requests現已推出,為IT團隊提供一個更智慧、更安全的方式,透過單一管理平台來管理使用者存取權限。

藉由自動化審批、最低權限原則的執行以及完整的稽核軌跡,您終能簡化存取管理並在不增加複雜性的情況下強化您的安全態勢。

 

為什麼需要單點登錄和密碼管理器

Passwords are the bane of user and admin existence.

Keeping track of hundreds of passwords is tough, and employees inevitably forget them. When that happens, they’re frustrated that they can’t access the tools they need to do their job, and IT teams waste their precious time on lock-out tickets.

To circumvent this aggravating process, many employees create simple passwords or reuse them, which threatens their employer’s security and puts customer data at risk.

Many IT teams try to mitigate these issues by implementing single sign-on (SSO) or a password manager. But using just one or the other can still put a burden on IT and leave the company vulnerable to breaches. 

What organizations really need is a unified approach to access that will enforce password health while allowing IT to control all target systems and support multiple authentication types. But is that even possible?

Below we’ll review why unmanaged passwords are so risky, describe the pitfalls of standalone SSO, and explain what a new world could look like when SSO and a password manager are implemented together.

The Dangers of Unmanaged Passwords

Unmanaged passwords are often a key component of cyberattacks, which are only getting more prevalent as employees have to remember more and more passwords to complete their day-to-day work. For example, Verizon’s 2022 Data Breach Investigations Report found that stolen login credentials were associated with half of all data breaches — a 30% increase from 2017.

And data breaches aren’t cheap. In 2022, the average cost of a data breach in the US was $9.44M, up from $9.05M last year. Plus, they tarnish a brand’s reputation, leading to further revenue losses.

But password management is expensive even without a breach. The average password reset can cost companies $70. When extrapolated to an entire organization, that adds up quickly.

While IT can send regular reminders to update passwords and educate employees on what makes a strong password, that’s not enough to mitigate risks. And those practices don’t reduce strain on IT either.

A password manager can reduce the chances of a breach and decrease pressure on IT by:

  • Enforcing password requirements – to comply with NIST 800-63 guidelines
  • Generating strong passwords – to ensure password length and complexity 
  • Rotating passwords – to ensure people are updating their passwords frequently
  • Syncing across operating systems and devices – to prevent as many lockouts as possible

While password managers certainly help, they still force employees to login into every application individually and, ideally, require additional layers of authentication to protect a user’s master password. 

Resource Access With and Without SSO

Single sign-on, or SSO, is related to password management because it grants access to multiple applications after users provide one set of login credentials. 

Without SSO, users still must remember and type in a username and password for every application they want to connect to. In that situation, you run the risk of employees sharing passwords, keeping sticky notes with their passwords on them, reusing passwords for several different applications, or creating passwords that are extremely easy to guess.

As discussed above, these habits can cause devastating financial and reputational damage. SSO and other Identity-as-a-Service platforms lessen the chances of a breach and decrease IT load by:

But SSO doesn’t solve everything — it doesn’t generate passwords, enforce password policies, or rotate passwords like a password manager can.

Benefits of a Password Manager + SSO

Combining the benefits of a password manager and SSO gives you the best of both worlds.

Users no longer have to create hundreds of complex passwords and worry about forgetting them. With a password manager and SSO, you can meet password-based access needs while imposing new authentication practices, including federation and multi-factor authentication (MFA). Adding more security best practices increases the protection of valuable IP and sensitive customer data.

The best joint password manager and SSO solutions store passwords locally on endpoints, making it tougher for hackers to get the data they want. In addition, some come with a relay infrastructure, allowing users to share passwords via end-to-end encrypted communication.

Ultimately, users get access to sites and services quickly, while IT admins can monitor and enforce password health on the back end without slogging through a slew of password reset tickets.

Secure Single Sign-On and Password Management With JumpCloud

The fact of the matter is that no one SSO or password management solution is going to safeguard your company from attacks and dramatically reduce IT’s workload. To truly accomplish those two objectives, you need to unify your tech stack and consolidate your IT tooling. Luckily, that’s what you get with the JumpCloud Directory Platform, which combines SSO and password management into a cloud-based directory.

With JumpCloud’s robust yet easy-to-use platform, IT can lay the foundation for unified access across all users, systems, and authentication types, including MFA. JumpCloud also has a newly released password manager, and its open directory infrastructure streamlines the login process for your employees. IT staff also benefit from having more time and budget to focus on strategic initiatives.

Ready to get started? Try JumpCloud for free, or schedule a demo today.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

JumpCloud Cloud RADIUS 和 Azure AD 身份驗證

As businesses continue returning to the office, more and more MSPs are being pressed to ensure that employees are able to return with minimal pain. Wi-Fi connectivity is often the very first issue that users will run into in a new office setting, so MSPs are finding that they must revisit how they handle the security of the wireless networks that they manage. 

Common Wi-Fi Security Vulnerabilities

It’s very likely that your customers have their Wi-Fi set up with a guest network for visitors to use and a pre-shared key that employees are given on the first day of their employment. However, this authentication method is only marginally better than having no password at all and is very dangerous if the Wi-Fi provides access to domain-associated resources. 

Addressing Connection Concerns

Being that your customers’ Wi-Fi keys are likely older than COVID-19, there has never been a better time to switch to a tried and tested solution: RADIUS. With RADIUS configured, network authentication takes place against a directory that has been configured to allow a user’s existing login credentials (username and password) to grant and revoke access to network resources. 

RADIUS adds a much needed layer of security between users and a Wi-Fi network, while also bringing added convenience to your customers’ wireless networks. While RADIUS comes with a plethora of benefits, implementation can feel intimidating — but, it doesn’t have to be!

Using JumpCloud’s Cloud RADIUS Feature

In order to set up RADIUS for a client, you will need a directory to use as the source of truth for user authentication, and JumpCloud has the perfect solution for you. Here at JumpCloud, we leverage our powerful open directory platform to offer a high-quality, easy-to-use Cloud RADIUS solution that our customers love, giving them cloud-directory-fueled authentication and MFA to keep their networks secure and efficient. 

  1. Utilizing the Full Functionality of JumpCloud Alone

In addition to its Cloud RADIUS feature, implementing JumpCloud’sopen directory platform opens the door to a variety of other important features such as SSO, MDM, software deployment, and policies to help manage your users and endpoints. 

In effect, with JumpCloud, you will not only be able to address your clients’ immediate network security and user experience needs, but you’ll also be able to position your services in a new way. You’ll be able to offer current and potential customers a more forward-facing and expansive service using all of JumpCloud’s capabilities — including helping clients consolidate their technology stack or adding much needed features into their IT infrastructure.

Now, I know what you’re thinking: “That’s great, but I am not in a position to migrate directory services. I simply want to deploy RADIUS to improve Wi-Fi and VPN authentication, and I already have customers using Azure Active Directory (AAD).”

Well, I have some good news for you: you can leverage your existing Azure AD environments in harmony with JumpCloud thanks to our new feature: RADIUS Authentication with Azure AD Credentials.

  1. Using JumpCloud’s RADIUS Feature With Azure AD

Surprisingly (or maybe ironically?) enough, the implementation of RADIUS with Azure AD is reliant upon on-prem resources, with physical servers needing to be allocated to perform the required tasks. JumpCloud is a strong proponent of equipping MSPs and IT professionals with world-class tools to get their jobs done effectively, which means we focus on creating solutions for problems like this.

This means that we’ve made it so you can leverage JumpCloud’s Cloud RADIUS feature while maintaining Azure AD as the source of truth for your directory needs, effectively giving you the best of both worlds, with no on-prem setup necessary. This means that your customers can enjoy secure networks while improving ease of access to networks among their credentialed employees. On that same note, what this means for you, is that you now have a cloud-based RADIUS solution that can be implemented for any of your customers without gutting their existing directories.

Getting Started With Cloud RADIUS

Here are some guides to help you begin launching Cloud RADIUS across your MSP business and your clients’ orgs.

 

Cloud RADIUS Benefits

Check out some of the benefits that JumpCloud’s RADIUS solution will give to your clients:

  • Improved user experience that only requires a single, unique password to connect to networks and resources to get work done both in the office and remotely via a VPN.
  • Streamlined user onboarding and offboarding due to the activation or deactivation of a single set of secure credentials compared to many different usernames and passwords.
  • Fewer help desk tickets related to the pain associated with changing a PSK (pre-shared key) for a Wi-Fi network.
  • Simplified compliance that’s easier to prove by getting rid of a shared network password that anyone can get ahold of.
  • Easier network access for your techs. They’ll no longer be scrambling to figure out Wi-Fi passwords when performing site visits (this will also drastically lower the chance of a tech needing to huddle to one corner of a closet to get the single bar of LTE signal available for their hotspot to connect to your documentation service to find the Wi-Fi password. Definitely not speaking from personal experience. Sidenote: Why did they stop putting a network port on laptops?).

Ultimately, the largest benefit of having Cloud RADIUS from JumpCloud implemented is that you now have a solution that can be easily replicated across your entire customer base. Whether you’re working with a company that has never touched a directory service before (which JumpCloud can easily help with), or a customer that has been holding onto that 12 year-old server for dear life, JumpCloud is here to help you modernize your customers’ infrastructure. 

With Cloud RADIUS, your service offerings around network management can fully revolve around a single authentication standard, your hardware vendor of choice, and a unified support approach that will delight your customers. 

JumpCloud for MSPs

At JumpCloud, we are serious about setting MSPs up for success when working with in-office, hybrid, and fully remote clients. To do this, we have developed a dedicated platform for MSPs, called JumpCloud for MSPs. 

JumpCloud for MSPs is an open directory platform that enables our partners to centralize identity, authentication, access, and device management capabilities under one umbrella without having to tear and replace any existing infrastructure. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

新的一天,新的想法

This morning, like many before it, I woke up and thought, “Today is the day I come up with some  magical blog post idea that changes someone’s world!” I showered, threw on my Global Panini attire and a pair of Uggs slippers, cooked up an omelet, and made a pourover (my new obsession).

I plodded downstairs to the office and fired up the computer. I opened a new document, raised my hands to the keyboard and — nothing. Complete brain freeze. 

It’s hard to be amazing week after week. I know you feel this too. You have IT projects that are stacked up. Your boss is on you week after week to make their world more secure without adding friction for the users. Or your MSP is feeling stagnant and you need to come up with some new services to offer — or figure out how to offer your current services in a different way.

The week over week of having to be “on” all the time…it diminishes your ability to be creative after a while. Problem-solving becomes what keeps you from getting out of bed each morning instead of driving you to be 1% better every day. I get that. I hear you loud and clear.

The Block is Real

This creativity block thing is real. Very real. And if you were just doing IT for the fun of it — creating a playspace for yourself — you wouldn’t have to worry. But, folks, this IT thing is what you get paid to do. You can’t just say, “too bad, so sad” and head off to the zoo, y’know? 

Over here in the MacAdmins community, we have a great Slack instance where people are doing amazing things and being really creative. You go there, looking for something – a solution, some inspiration, a new job – but you’re still left uninspired. And you wonder why. Could be burnout. Could be general tiredness. Could be something else – let’s explore.

Brainstorming

At a recent standup (yes I now speak the language Agiletongue) I asked for a lift from my brilliant and creative teammates. Ideas, people, I needed ideas! It didn’t matter how outrageous they were. In fact, the more outrageous, the better. Anything is a springboard. As we’ve talked about previously, brainstorming requires a plethora of input and little to no judgment. 

And as a response to my request I got….nuthin. No ideas. Not a one. I wonder if it’s just the heat of this unbelievably hot summer cooking our brains or if people are just plumb wore out from current events. No clue, but nobody had any ideas for me. 

The next day, though, someone pinged me with an idea. “What about recipes?” they  said. “It’ll be fun,” they said.

I work for a tech company. Our product does (amongst other incredible things) device and identity management. IT stack centralization. MDM and security management. Automation. With my IT background, I hear the word “recipe” my brain goes to GitHub and shell scripts and munki and other IT management types of things. But, alas, that is not what they meant.

They meant real recipes. Food recipes. Don’t get me wrong, I like food. It’s an important part of my day to day life. But, hmmm…was this a weird ploy to turn this into a happy homemaker column? I was both confused and a little offended but I stuck with the discussion knowing that I’d find out if I just let them talk. 

How Does That Fit Into Tech?

Little by little the discussion started to make sense. 

Us admins are under a lot of pressure to be perfect all the time. For many (if not all) of us, one mistake can cost our companies their reputation (not to mention financial and productivity loss). In some cases, if a mistake is big enough, it could cost our jobs or our client. So if you weren’t feeling stressed before you started reading this, you probably are now. Sorry!

One way to get past the stress is to get up from your chair, step away from your desk, and get active doing something that is not related to tech (if stepping away won’t get you in trouble, that is).

Thinking about other things is a great way to open channels that allow you to come up with solutions. We’ve all experienced this — our best ideas come in the middle of the night; or the middle of a shower

Points to anyone who, by now, has accurately predicted where this is going.

A Story and a Treat

picture of baked food on a table
Mom baked every item on this table.

Growing up in my house meant that there was a plethora of home-baked goods. I don’t mean, a few store-bought cookies. I mean my mother baked. Daily. And there were always people over who didn’t live in this house.

The counter always had a few different kinds of cookies, a cake, maybe brownies, and on special occasions there were eclairs in the fridge. There were always bowls and beaters waiting to be licked clean and getting to the frosting bowl first meant you had to hide behind a locked door, lest someone steal it right out of your hands.

But one particular tradition we had was that on our birthday we got to choose our favorite dinner and our favorite cake. Mom wasn’t the best cook (I won’t say food was overcooked and dry and we’re probably lucky we didn’t all get food poisoning regularly, but…oh, I guess I will say it), but she could definitely bake.

So my choice was always spaghetti with meatballs (safe and really hard to mess up) and mom’s chocolate banana layer cake. I used to call it my migraine cake because every time I’d eat it I would end up with a migraine. Also, it was worth it every single time. I don’t do that anymore because now I know that my post-cake morbidity was due to celiac — but I can still taste it in my memory.

Here It Is

And, so, it is with a full heart and a now-hungry tummy that I gift you this recipe. Posting it here serves two purposes: 

  • Getting up and doing something completely different from your work frees up your brain and refreshes your spirit.
  • Eating something delicious can reduce your stress level. Even if it’s not a healthy option, a treat is good for the soul.

The recipe card (mom retyped every one of her recipes onto an index card with our Selectric typewriter that only had an all-caps ball) is well-worn. It has food stains all over it. It may have even gotten a bit too close to the heat. But it’s still here and someday it will be passed down to someone in the family. 

Chocolate Banana Cake 

recipe card from the 1960's

Serves: 16 

Baking time: 30-35 minutes

Notes: This cake is best when frosted between layers and on the outside with a buttercream frosting.

Ingredients:

  • 2 ¼ cups sifted flour
  • 1 tsp baking powder
  • ¾ tsp baking soda
  • 1 tsp salt
  • 1 tsp vanilla extract
  • ½ cup sour milk
  • ⅔ cup shortening (may substitute butter or margarine)
  • 1 ½ cup sugar
  • 2 eggs
  • 2 ounce Bakers chocolate
  • 1 cup mashed ripe bananas

Directions:

  1. Preheat oven to 350º Fahrenheit.
  2. Sift together flour, baking powder, baking soda, and salt.
  3. Cream shortening together with the sugar until fluffy. 
  4. Add eggs, one at a time, beating after each addition to shortening mixture.
  5. Mix chocolate in with egg and shortening. Stir in vanilla extract.
  6. Add the dry ingredients, alternating with the banana and milk in small amounts.
  7. Turn into two 9-inch greased pans.
  8. Bake for 30–35 minutes or until a toothpick inserted into cakes comes out clean.
  9. Let the cake cool completely before removing from pans and frosting.

Nutrition Information*: 1 slice (1/16th of the cake) contains 241 Calories, 11.1g Total Fat, 4g Saturated Fat, 21mg Cholesterol, 220mg Sodium, 355.5g Total Carbohydrates, 1.4g Dietary Fiber, 20.3g Total Sugars, 3.2g Protein

*Note that this does not include the nutrition facts of the buttercream frosting

Let us know if this helped reduce your stress by baking it or by eating it. Or both! Join us in the community and tell us your favorite recipe for freeing up your IT brain.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

威脅中小企業的 6 種常見網絡攻擊

October is Cybersecurity Awareness Month, and this year’s theme is See Yourself in Cyber, which focuses on the individual’s role in cybersecurity. This month, the JumpCloud blog will focus on helping you empower everyone in your organization to do their part regarding cybersecurity. Tune in throughout the month for more cybersecurity content written specifically for IT professionals and MSPs.

When we think of cyberattacks, we tend to envision the biggest and most disastrous ones — ones that involve well-known companies, expose tons of important data, and cause some serious fallout and public mistrust. While these attacks are real and dangerous, they’re not the only ones out there. 

The reality is that cyber attacks affect businesses of all sizes and in all industries. Sometimes, our focus on the big ones can eclipse the less flashy ones that are just as dangerous to small and medium-sized enterprises (SMEs). In fact, a 2021 survey found that over 42% of small business respondents had experienced a cyber attack within the last year.

Mounting a viable defense starts with understanding what you’re up against — and even understanding the basics of common threats and defense measures can go a long way. The following are six of the most common attack vectors that can hit SMEs. 

1. Ransomware 

Because the largest ransomware attacks tend to dominate news cycles, many people don’t realize that ransomware attacks on SMEs are common as well. In fact, 50-70% of ransomware attacks are aimed at small businesses.

What Ransomware Looks Like for SMEs

Ransomware generally follows the same basic principles in attacks of all sizes: adversaries seize and lock a company’s data or assets and promise to return them upon payment of a ransom. For large enterprises, these ransoms can reach into the millions. For SMEs, they are often smaller — ransoms as low as $10,000 are common. While this may sound like a silver lining for SMEs, there’s a darker motive at play: adversaries know SMEs will pay them.  

For established enterprises with decades of built-up resources, six-figure ransoms and the downtime associated with an attack are painful, but not often a death sentence. For SMEs with tighter resources, this isn’t always the case — the downtime and loss of data access alone can be crippling for a tightly-run SME. To adversaries, this means SMEs will fight to get their data back — so they demand a “reasonable” ransom and can expect with near-certainty that the SME will pay it. According to research, more than half of them do. 

The Ramifications

The ramifications of a data breach to your employees, customers, partners, and reputation are grave: a Ponemon study found that 65% of consumers whose data was breached lost trust in the company that experienced the breach. 

What’s more, paying the ransom doesn’t guarantee that your data hasn’t been compromised or shared when under the adversary’s control. Of the 59% of SMEs who said they had paid a ransom in a survey, only 23% got all their data back.

In fact, paying up can endanger your organization further: it tells hackers that you are willing and able to pay ransoms to reclaim your data. And now that they’re familiar with your defenses and architecture, they’ll have an easier time attacking you again. Unfortunately, repeat attacks are highly likely — either from the same criminal organization, or from another organization that the attackers sold your information to. 

2. Supply-Chain Attacks 

Most of us are familiar with supply chain attacks, where an infection starts with a large corporation and spreads as it comes into contact with other businesses through the supply chain. And while we’re likely to hear about supply-chain attacks on large businesses, news sources don’t always report on their trickle-down effects on smaller businesses in the supply chain.

How Supply-Chain Attacks Affect SMEs

In supply-chain attacks, SMEs aren’t usually direct targets, but rather casualties resulting from a larger breach. Thus, large supply-chain attacks have ramifications on many of the target organization’s partners, customers, or vendors. In REvil’s attack on Kaseya’s VSA software, for example, many of those impacted were SMEs that used the product. In another example, the famous SolarWinds breach was originally believed to have affected a few dozen organizations. It actually impacted over 250.

3. Phishing and Its Variants

Some of the most basic and low-effort tactics remain common — and effective — infiltration methods. Phishing remains one of the top three threats SMEs face, even despite increasing organizational awareness around it. 

The reason phishing is still so common is two-fold: 

  1. It is effective for adversaries. From the cybercriminal’s point of view, phishing is relatively easy to deploy, and it often yields lucrative results. It takes few resources and minimal skill to launch phishing attacks, and yet they continue to dupe employees into sharing credentials, network access, and other sensitive (and, for cybercriminals, profitable) information and assets. 
  1. It preys on human error. Unlike many other attack vectors that leverage vulnerabilities in systems, phishing uses social engineering to take advantage of human nature (and human error) to gain initial entry. It only takes one mistake to allow an attack to take hold — and the average organization has a 37.9% phishing test fail rate.

Targeted Phishing in SMEs

Cybercriminals have refined tactics to mount more targeted and precise attacks with different types of phishing. Spear-phishing, for example, involves background research to convincingly target individuals rather than bulk-sending a list to a group of recipients. This personalization and specific targeting makes spear-phishing attempts harder to spot — like the popular scam that involves posing as the target’s boss in a text or email. These messages often use conversational language and use the names of the target and the boss, which can make them quite convincing. 

Some adversaries take this type of attack a step further with whaling, which uses spear-phishing tactics to target company executives. Because executives have extensive access to systems and data, whaling is particularly popular — especially with SMEs, where scarce resources could hamper their ability to adequately train leaders on security and phishing awareness and best practices. 

4. Software Vulnerability Exploits 

Leveraging software vulnerabilities is a common way to gain access into an organization’s systems. Often, exploited vulnerabilities are known and even have patches available. In fact, many of the top exploited vulnerabilities were found years ago — for example, a Microsoft Office vulnerability found in 2017 continues to plague businesses that haven’t kept up with their patches. In a Ponemon survey, 60% of respondents who had experienced a breach said it could have occurred through a known vulnerability that had a patch available, but the organization hadn’t applied it. 

Why SMEs Are Vulnerable

Routine patching is a critical basic cyber hygiene activity, and it is highly effective at blocking this type of attack. However, large-scale organizations are more likely to have formal patch management solutions in place than SMEs, which can make SMEs an easier target. In a 2022 JumpCloud survey, only about half of SME respondents said they were confident that their organization’s patch management strategy was sufficient to protect against known vulnerabilities. 

5. Account Takeover

As businesses move to the cloud and dispersed infrastructure becomes the norm, identity has increasingly come to define the new perimeter. Because identity permeates every element of the infrastructure, it has become a common infiltration point. In fact, the number of password-stealing attacks on SMEs around the world increased by almost 25% from 2021 to 2022, and nearly 80% of attacks leverage identity to compromise credentials. 

How ATO Attacks Work

In account takeover (ATO) attacks, adversaries gain access to the network by taking over a user’s account. Account access can be gained through various means, including password-stealing ware, social engineering, and using (often, by purchasing) the credentials of already-breached accounts. Once the adversary has taken over the account, they can access resources and move around the network under the guise of a legitimate user. This makes account takeovers difficult to detect. 

6. Advanced Persistent Threats

SMEs that work with large enterprises may be more susceptible to advanced persistent threats (APTs), which are sophisticated attacks carried out stealthily over an extended period of time. APTs typically consist of infiltration, lateral movement toward targeted data or assets, and exfiltration. APTs can start from any ingress point, and can enter through methods as simple as a phishing attack or stolen password.

For example, an adversary could gain the credentials of an employee with base-level permissions through a phishing scam, then take over the account to analyze the network and gather permissions, access and store the target data, and finally exfiltrate it to sell for profit.

APTs are harder to detect in sprawled IT environments, which are common in SMEs that have grown quickly. IT sprawl limits the ability to fully carry telemetry data from one element to another, which makes infiltration and lateral movement hard to detect. 

Shoring Up SME Security 

Because cybersecurity attacks on SME attacks don’t always make headlines, SMEs often underestimate their vulnerability and underinvest in security. However, adversaries have something to gain from just about any business; SMEs face many of the same threats that enterprises do. 

The attacks above are some of the most common, but SMEs face a multitude of threats via many different vectors. And while it’s impossible for anyone to achieve 100% immunity from threats, it’s possible for SMEs to develop a strong, reliable security program that deflects most attacks. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.