Skip to content

【產品資訊】企業360°全方位的PAM管理平台─Senhasegura

特權存取管理 (PAM ) 是一種網路安全策略,專注於控制和保護 IT 環境中具有較高存取權限的帳戶。這些帳戶具有特殊權限,如果受到威脅,可能會對組織造成嚴重損害。


為什麼 PAM 很重要?
網路攻擊經常針對特權帳戶,使攻擊者能夠不受限制地存取機密資料和關鍵系統。 senhasegura PAM 解決方案透過以下方式幫助減輕這些風險:

  1. 嚴格的存取控制:senhasegura PAM 解決方案確定誰有權存取帳戶、何時以及出於什麼目的
  2. 監控和稽核:監控並記錄帳戶活動以偵測可疑行為
  3. 憑證保護:憑證被安全地儲存和加密
  4. 代理訪問:允許透過senhasegura 監視帳戶的訪問,記錄所有使用者操作以供以後審核
  5. 命令控制:允許在代理存取期間阻止特定命令,防止執行有害操作


安全第一的解決方案將重新定義您的身分安全性原則
senhasegura 的革命性創新有效防止特權攻擊,使其成為業界最全面的保護人類和機器身分的解決方案。它經濟實惠且全面,可確保為您組織的關鍵資產提供優質保護,同時提供無與倫比的客戶支援。包含:

  1. 安全特權訪問:PAM Core透過集中控制、實施詳細的存取限制、監督使用者活動和建立深入的稽核追蹤來專業的管理特權帳戶
  2. 安全的遠距工作:Domum Remote Access將遠端使用者安全的連結到內部系統、管理詳細的存取控制權、監控使用者會話並採用多重驗證
  3. DevOps秘密管理:DevOps Secret Manager透過存取控制、自動秘密輪調、與現有DevOps工具整合以及全面的報告和分析來安全的保護敏感資料
  4. 證書管理:證書管理器及中並自動化證書管理、監控證書狀態並與證書頒發機構合作
  5. 端點和設備保護:Endpoint Manager透過監督應用程式使用情況、指派特定權限、管理憑證以及提供全面的報表和分析來實施最低權限原則
  6. 個人密碼管理器:MySafe將使用者憑證權的儲存在加密的保管庫中、產生高強度密碼、自動登入並促進安全的資訊共用
  7. 雲端身份和存取管理:Cloud IAM透過多因素身分驗證、基於角色的控制、稽核追蹤和詳細報告以及與目前身份提供者的相容性來簡化身份管理
  8. 雲端權力和基礎設施管理:雲端權利透過基於角色的控制、持續的風險監控、與雲端提供者的無縫整合以及易於報告的審計追蹤來簡化權利管理


Senhasegura 成功的核心在於其 360° 特權平台,這是一個強大且使用者友好的解決方案,旨在保護特權使用者和機器的安全。 Gartner、KuppingerCole 和 ITRG 等產業分析師一致認為 Senhasegura 是 PAM 領導者,因為該平台在保護敏感資料、降低風險和確保合規性方面非常有效。值得注意的是,Senhasegura 還擁有PAM 行業中最快的價值實現時間 (TTV) 和最低的擁有成本,這使其成為尋求全面特權存取安全的組織的有吸引力的選擇。


【 Senhasegura/特權帳號管理解決方案】 https://version-2.com.tw/senhasegura/#products&domum  
✽ 歡迎電話洽詢台灣二版專業資安團隊(02)7722-6899

關於 Segura®
Segura® 致力於確保企業對其特權操作與資訊的自主掌控。為此,我們透過追蹤管理者在網絡、伺服器、資料庫及眾多裝置上的操作,有效防範資料竊取。此外,我們也協助企業符合稽核要求及最嚴格的標準,包括 PCI DSS、沙賓法案(Sarbanes-Oxley)、ISO 27001 及 HIPAA。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

什麼是自帶技術以及如何實現?

 

Bring Your Own Technology (BYOT) is a practice adopted by companies that allow employees to use their own personal devices at work.

The adoption of this concept favors professionals, who use devices with which they are familiar, and companies, which invest less in technological devices. To learn more, read our text to the end!

Bring Your Own Technology (BYOT) started among executives who had access to cutting-edge technology useful to their work.

Over time, other professionals have begun to use their own mobile devices in the companies in which they work, which benefits companies and employees themselves.

On the other hand, ensuring information security in a context where employees access corporate data directly from their tablets, smartphones, and other electronic devices is challenging. With that in mind, we prepared this article on the subject. Here you will see:

1. What Is Bring Your Own Technology?

2. What Is the Importance of BYOT For a Company and Its Employees?

3. Does BYOT Have Disadvantages?

4. What Is a BYOT Example?

5. What Is the Difference Between BYOT and BYOD?

6. How to Ensure the Security of External Devices?

7. About senhasegura

8. Conclusion

Enjoy the read!

1. What Is Bring Your Own Technology?

Bring Your Own Technology (BYOT) is an increasingly common practice in the corporate environment, where employees of a company choose and purchase their devices.

This concept refers especially to mobile devices, such as tablets, laptops, and smartphones, and refers to the integration between these devices and users, as well as the expectation of people to have their devices customized and not chosen by the organization in which they work.

Bring Your Own Technology (BYOT) can also be understood as Bring Your Own Device (BYOD).

2. What Is the Importance of BYOT For a Company and Its Employees?

As we have mentioned in the introduction to this article, BYOT favors the company and the employees themselves. This is because most professionals prefer to use the devices with which they are familiar, becoming much more productive.

Moreover, encouraging Bring Your Own Technology allows companies to save money by reducing investments in their own equipment.

3. Does BYOT Have Disadvantages?

Organizations that adhere to BYOT need to be more attentive to information security. This is because their employees can access malicious files, making their devices more vulnerable to leaks of sensitive information, and these devices do not always comply with the company’s trust standards or are evaluated by the IT department.

In addition to the lack of security related to BYOT, professionals can take more work home, compromising their time off and getting overwhelmed.

4. What Is a BYOT Example?

BYOT refers to devices, such as tablets, computers, laptops, and smartphones, belonging to professionals and used in corporate contexts, internal or external to the company.

5. What Is the Difference Between BYOT and BYOD?

As we have mentioned in this article, BYOD is a concept that means ?Bring Your Own Device.? That is, the term refers to the practice of authorizing company employees to work using their own devices.

This concept has three variations: BYOT, BYOP, and BYOPC. The first is Bring Your Own Technology, the second is Bring Your Own Phone. BYOPC stands for Bring Your Own PC.

6. How to Ensure the Security of External Devices?

The main practices that can optimize security in the context of Bring Your Own Technology are:

  • Establish a password policy;
  • Ensure the privacy of company data;
  • Limit the use of the devices; and
  • Learn how to proceed in case of dismissals.

Check out each of these practices more closely:

  • Establish a password policy

Using strong passwords is an efficient way to prevent data breaches. Thus, companies that have adopted BYOT must require their employees to create secure passwords, guided by the following good practices:

  • Opt for long passwords, preferably with 14 characters or more;
  • Create a full combination of characters, which gathers numbers, upper and lower case letters, and symbols;
  • Avoid words easily found in dictionaries, in addition to names of companies, products, and people;
  • Do not reuse previously used passwords;
  • Do not use words written backward as a password; and
  • If possible, use a password vault, so you do not have to memorize several complex passwords.
  • Ensure the privacy of company data

It is important to make it clear to employees that the company’s data belongs only to the organization, in addition to presenting a privacy policy and showing what will be the consequences in the event of confidential information leaks.

  • Limit the use of the devices

Although the devices belong to employees, their use should be restricted in the corporate environment. In this sense, they should avoid using certain resources when in the organization’s network.

  • Learn how to proceed in case of dismissals

There must be a security protocol in case of the dismissal of employees. Ideally, the data on the employee’s device should be deleted/blocked as soon as possible to ensure this information does not reach the wrong people.

7. About senhasegura

We are from senhasegura, an organization specializing in cybersecurity, whose main purpose is to guarantee the digital sovereignty of the companies that hire us, providing control over actions and privileged data and avoiding unauthorized access and leaks of confidential data.

To achieve this goal, we follow the lifecycle of privileged access management through machine automation, before, during, and after accesses.

Moreover, we work to avoid disruptions to companies’ operations, which can impact their performance; we automatically verify the use of privileges; and we bring organizations into compliance with audit criteria and standards such as HIPAA, PCI DSS, ISO 27001, and Sarbanes-Oxley.

8. Conclusion

In this article, you saw that:

  • Bring Your Own Technology is an increasingly common practice in corporate IT, where employees from a company bring their own technologies to work.
  • This practice is welcomed by employees, who use devices which they are used to, and by companies, which have access to technology and at the same time reduce costs with the acquisition of equipment;
  • On the other hand, the use of personal devices at work increases vulnerability to cyber threats, since not all devices comply with company security standards;
  • BYOT refers to devices such as tablets, computers, laptops, an
    d smartphones;
  • This concept has three variations: BYOT, BYOP, and BYOPC.
  • To ensure the security of external devices, it is essential to establish a password policy, ensure the privacy of company data, limit the use of devices, and have a security protocol in case of dismissals.

 

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

senhasegura 參與 ISA 全球網絡安全聯盟

The topic of cyber threats is becoming increasingly present on the agendas of organizations of all sizes and verticals. With the intensification of the digital transformation movement through the introduction of technologies such as 5G and the Internet of Things, ensuring the protection of infrastructure will be an even greater challenge for organizational leaders.

One of the preferred targets of malicious attackers are organizations that use Industrial Control Systems (ICS). ICS processes critical data and is responsible for the functioning of sectors such as telecommunications, logistics, energy generation, and the healthcare sector. These sectors are a vital part of countries’ economies, forming part of what we call critical infrastructure. According to a Kaspersky study, during the second half of 2021, almost 40% of industrial devices were targeted at least once. These attacks bring significant consequences not only for these organizations but for society as a whole.

One of the biggest examples of the damage that attacks on this type of organization bring occurred in 2017. That year, Maersk, a logistics giant, fell victim to the NotPetya malware, a virus with high propagation and destruction capacity that encrypted its data. The attack caused infected devices to simply stop working, affecting the continuity of its operations and bringing revenue losses.

In addition, various governments around the world have shown concern about the impact associated with cybersecurity, especially those linked to critical infrastructure. This has caused an increase in the activity of regulating how companies implement appropriate cybersecurity controls in industrial environments.

As part of the effort to ensure the cybersecurity of control and automation systems, the International Society of Automation (ISA) developed the 62443 series of standards. These standards are internationally recognized and have been adopted by the International Electrotechnical Commission and the United Nations. The ISA 62443 standards define requirements and procedures for the implementation of safe industrial and automation systems, as well as best security practices for these systems. The adoption of the ISA 62443 standards allows industrial organizations to address the challenges related to the cybersecurity of their systems and eliminate the gaps between operations and Information Technology in their infrastructure.

Moreover, with the aim of increasing awareness and protection capability of ICS in industrial and critical infrastructure installations and processes, ISA created the Global Cybersecurity Alliance (GCA). The cybersecurity alliance created by ISA brings together automation and system control providers, IT infrastructure suppliers, service providers, system integrators, and end-users to address threats to ICS together.

ISAGCA also works to stimulate the adoption of the ISA 62443 standards, which allows for increased awareness, knowledge sharing, and tool development to assist organizations in implementing the entire cybersecurity protection lifecycle. ISAGCA members are also committed to working together with government agencies, regulators, and other stakeholders around the world.

ISAGCA members include leading technology and industrial application providers, among which is Senhasegura. senhasegura’s participation in ISAGCA since its foundation allows for the application of our experience in protecting privileged access to achieve the alliance’s objectives, especially those related to ICS protection. senhasegura’s participation in the alliance also allows for identifying gaps, reducing risks, and ensuring that member companies have the appropriate tools to protect their infrastructure from malicious attacks.

All of these aspects also show the commitment of the entire senhasegura team and ISA to the effective security of industrial environments, as well as the importance of advancing together to ensure the application of these standards, methods, and best practices for the protection of industrial systems. In this way, it is possible to ensure not only the security of organizations but of society as a whole.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

CISA 和 FBI 發布 ESXiArgs 勒索軟件恢復腳本

The US Cyber Security and Infrastructure Agency (CISA) and the Federal Bureau of Investigation (FBI) released this week a recovery guide for the ESXiArgs ransomware, which has harmed thousands of companies globally.

This was because malicious attackers were allegedly taking advantage of known vulnerabilities in unpatched, out-of-service or outdated versions of VMware ESXi software. Through these “loopholes” they would be deploying ESXiArgs ransomware on ESX servers, rendering these devices unusable.

The recovery tool can be found at this link and has been used by numerous corporations, who managed to recover encrypted items without paying a ransom to attackers.

However, CISA warns that to use this resource, it is essential to understand how it works. In this sense, companies harmed by ESXiArgs should evaluate the recommendations present in the README file, which comes with the script.

The number of servers infected by ESXiArgs in several countries has already exceeded 3 thousand. According to the victims, in order to decrypt the data, the hackers requested about 2 Bitcoins, which is equivalent to approximately US$ 22,800 (as of the present moment).

In addition, malicious attackers would have demanded payment of the ransom within three days, as a condition for not disclosing the organizations’ sensitive data.

As per Rapid 7, ESXiArgs attempted to shut down virtual machines by killing a process in the virtual machine’s kernel that handles I/O commands, however, in some cases it was unsuccessful as organizations were able to recover their data.

The recovery script developed by CISA in conjunction with the FBI is based on the work of researchers Enes Sonmez and Ahmet Aykac, and shows how victims can rebuild virtual machine metadata from disks that the malware was unable to encrypt.

In practice, the function of the script is to create new configuration files that allow access to the VMs and not delete encrypted files. However, CISA makes no guarantees that the script is secure.

VMware recommends that companies implement the patch released in 2021 for the vulnerability exploited by ESXiArgs. Organizations that do not fix the flaw should temporarily disable the ESXi Service Location Protocol (SLP) or still keep port 427 disabled.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

用戶和實體行為分析如何幫助網絡安全

Cyberattacks are increasingly sophisticated, making traditional digital security tools insufficient to protect organizations from malicious actors.

In 2015, Gartner defined a category of solutions called User and Entity Behavior Analytics (UEBA).
Its big advantage is monitoring suspicious behaviors of human users and devices in corporate networks through algorithms and machine learning, determining if there are threats and issuing alerts to security teams.

In this article, we explain more about this subject, which is extremely important for the security of your company. To facilitate your reading, we divided our text into the following topics:

  • What Is User and Entity Behavior Analytics?
  • How Does UEBA Work?
  • What Are Its Three Pillars?
  • What Are the Benefits of UEBA?
  • Disadvantages of User and Entity Behavior Analytics
  • Best Practices for User and Entity Behavior Analytics
  • What Is the Difference Between SIEM and UEBA?
  • UEBA X NTA
  • What Is UBA and What Is It For?
  • What Is the Difference Between UBA and UEBA?
  • senhasegura UEBA Solution
  • About senhasegura
  • Conclusion

Enjoy the read!

What Is User and Entity Behavior Analytics?

User and Entity Behavior Analytics (UEBA) is a digital security feature that uses algorithms and machine learning to identify abnormal behaviors in users, routers, servers, and endpoints of a network.

In practice, this technology allows alerting IT administrators about anomalies and automatically disconnecting users with unusual behavior from the network, as it monitors human and machine behavior.

With this, it helps detect people and equipment that could compromise an organization’s system, strengthening its digital security and sovereignty.

How Does UEBA Work?

To ensure the effectiveness of User and Entity Behavior Analytics, it is necessary to implement this feature in the organization’s infrastructure, which can be targeted by malicious attackers.

Moreover, many corporations ask their employees to install this solution on their home routers to avoid risks. This is because the professional may have to access the corporate network using their own router, generating security vulnerabilities.

It is very simple to understand how UEBA works. Let’s imagine an unauthorized user steals an employee’s credentials and accesses the network. This does not make them capable of imitating this employee’s usual behavior.

Therefore, UEBA issues alerts, which reveal suspicious behavior to IT administrators. A UEBA solution has three essential elements. They are analytics, integration, and presentation.

Analytics collects and organizes data about the behavior of human users and entities to determine what should be considered normal. Through this system, profiles are created of how each user behaves when accessing the network. Thus, one can develop models that allow the identification of suspicious behavior.

With the growth and evolution of corporations, it becomes necessary to integrate UEBA into other security systems. Through proper integration, UEBA solutions compare information collected from different sources, which optimizes the system.

Finally, the presentation involves how User and Entity Behavior Analytics responds to abnormal behaviors. It depends on what is defined by the company.

Some UEBA systems are configured to simply create an alert, suggesting an investigation for IT administrators. Others are configured to perform additional actions, such as disconnecting an employee with abnormal behavior.

What Are Its Three Pillars?

According to Gartner, a UEBA solution has three pillars:

  • Use cases;
  • Data sources; and
  • Analytical methods.

Use cases refer to the behavior of human or machine users reported by User and Entity Behavior Analytics, which monitors, identifies, and alerts about anomalies. Unlike systems that perform specialized analysis, UEBA technology needs to be relevant to different use cases.

When we talk about data sources, we refer to repositories of information that feed into UEBA, since User and Entity Behavior Analytics does not collect data directly from IT environments.

Analytical methods are what enable UEBA to identify abnormal behavior. They include threat signatures, statistical models, rules, and machine learning.

What Are the Benefits of UEBA?

Traditional security solutions have proven ineffective at protecting corporations from sophisticated cyberattacks, which has boosted the rise of User and Entity Behavior Analytics, as it allows one to identify even the smallest of unusual behaviors.
Its main benefits include:

Broad Approach to Cyberattacks

In addition to monitoring the behavior of human users, UEBA monitors devices such as endpoints, servers, and routers, which are often targeted by malicious attackers.

Thus, User and Entity Behavior Analytics detects a wide variety of cyberattacks, including insider threats, compromised accounts, brute force attacks, and DDoS.

Operational Efficiency

With the use of artificial intelligence and machine learning, UEBA solutions can replace the workforce of IT employees, which represents a benefit for corporations and security teams.

Nevertheless, User and Entity Behavior Analytics does not generate a drastic reduction in IT staff, especially in larger organizations, due to the complexity of security requirements, which require skilled people to configure systems and guide employees.

These professionals may also be responsible for investigating abnormal behaviors if the company decides to investigate them before taking measures.

In addition, IT analysts can develop other projects, working strategically for business growth.

Cost Reduction

With the reduction of the IT team, an organization consequently reduces costs. Also, by detecting abnormal behavior and preventing cyberattacks, companies prevent losses by stopping activities.
They also avoid having their customers’ and employees’ data exposed, which could result in fines due to data protection laws.

Risk Reduction

With professionals connected to corporate networks, including in a home environment, vulnerabilities caused by cyber threats increase gradually, making protection solutions in silos insufficient.

For IT teams, it is impossible to manually monitor all devices in use. Hence the perks of UEBA solutions.
It is worth mentioning that UEBA resources are not limited to ensuring information security. They also enable compliance with security standards for regulated industries, avoiding problems that could lead to lawsuits and fines for companies, as previously mentioned.

Disadvantages of User and Entity Behavior Analytics

The UEBA solutions also have some negative aspects. The first one is its high price, which can make this technology inaccessible to small and medium-sized businesses.

Another disadvantage of User and Entity Behavior Analytics is the slow deployment. Although many vendors claim this system can be deployed in a short time, Gartner customers say that in simple use cases, it can take three to six months, and in complex situations, it can take up to 18 months.

In addition, the view UEBA offers over network behaviors is restricted as its logs are enabled on a small part of a corporation’s network.

It is also important to keep in mind UEBA needs third-party logs to work. Failures in the generation of these logs impact its function.

Best Practices for User and Entity Behavior Analytics

User and Entity Behavior Analytics is designed to identify abnormal behaviors of humans and machines.
However, this solution should not be used in isolation but associated with other mo
nitoring systems, in order to improve the digital security of an organization. Other best practices for companies using UEBA resources are:

  • Avoiding false alerts and overloading of generated data, taking advantage of big data resources, and using machine learning and statistical analysis;
  • Creating security policies taking into account insider and external threats;
    Ensuring that only information security professionals receive alerts from UEBA; and
  • Not underestimating the risks posed by unprivileged user accounts, as hackers can increase privileges to gain access to sensitive systems.

What Is the Difference Between SIEM and UEBA?

Like UEBA, Security Information and Event Management (SIEM) features tools that make it possible to improve information security through normal patterns and suspicious behaviors.

The notable difference is that User and Entity Behavior Analytics uses data from human and machine user behavior to define what is normal.

Because SIEM is rule-based, malicious actors can circumvent these guidelines to attack a corporation. Also, SIEM detects threats that happen in real-time, but it is inefficient to prevent sophisticated attacks performed over months or years.

UEBA, on the other hand, is not based on rules, but on risk-scoring techniques and algorithms, which make it possible to detect abnormal behavior over a much longer period.

UEBA X NTA

Like UEBA, Network Traffic Analysis (NTA) solutions are based on machine learning, advanced analytics, and security rules, and monitor user behavior on corporate networks. Moreover, it detects suspicious actions and threats.

However, this technology has other advantages. One is to allow companies to visualize everything that happens on their network, including in the context of a cyberattack. NTA also makes it possible to create network profiles and devices, with easy deployment.

We emphasize these two solutions should be used in a complementary way, since NTA alone does not track local events, nor detect advanced security problems.

What Is UBA and What Is It For?

User Behavior Analytics (UBA) is a technology that allows one to identify unusual or abnormal behaviors, detect intrusions, and minimize their consequences.

Through UBA solutions, one can discover an invasion promoted by cybercriminals or find out if an employee is misusing the data to which they have access.

The focus of User Behavior Analytics is on user analytics, their accounts, and identity, not machine behavior.

What Is the Difference Between UBA and UEBA?

The difference between UBA and UEBA is that, in the first case, we refer to a solution that monitors human users to detect any anomalies in their behavior.

The extra “e” in UEBA extends monitoring to machine entities such as routers, servers, endpoints, and devices in general.

The acronym was updated in 2017 by Gartner to show that in addition to tracking human users, it is essential to identify threats related to devices and applications.

senhasegura UEBA Solution

senhasegura has a UEBA solution embedded in its PAM security platform, which allows one to monitor the behavior of human and machine users automatically.

This technology features a self-learning mechanism to identify and respond to changes in users’ behavior patterns and access profiles.

Some of the main characteristics are:

  • Analysis of user session based on behavioral history;
  • Identification of accesses and check of suspects by a series of criteria;
  • Identification of unusual behavior with abnormality alerts for SIEM/SYSLOG;
  • Detailed dashboards with a visual representation of incidents and threats, which allow a security team to act quickly;
  • Algorithms are continuously adjusted to user behavior.

Its benefits include:

  • Restriction of privilege abuse;
  • Fast detection of attacks and compromised accounts;
  • Control over the user’s administrative actions;
  • Automatic response to suspected credential theft.

About senhasegura

We, from senhasegura, are part of the group of information security companies MT4 Tecnologia, founded in 2001, and we aim to provide digital sovereignty to our customers through the control of privileged actions and data.

With this, we prevent data leaks and theft, as we manage privileged permissions before, during, and after access through machine automation. We work to:

Optimizing the performance of companies, avoiding interruption of operations;
Performing automatic audits on the use of permissions;
Auditing privileged changes to detect abuse of privilege automatically;
Providing advanced solutions with the PAM Security Platform;
Reducing cyber threats; and
Bringing the organizations that hire us into compliance with audit requirements and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

Conclusion

In this article, you saw that:

  • User and Entity Behavior Analytics uses algorithms and machine learning to identify abnormal behaviors in users, whether they are humans or machine entities;
  • This solution allows alerting IT administrators about anomalies and automatically disconnecting users with unusual network behavior;
  • To ensure the effectiveness of User and Entity Behavior Analytics, it is necessary to install this feature on the organization’s and employees’ devices;
  • A UEBA solution has three essential elements. They are analytics, integration, and presentation;
  • According to Gartner, a UEBA solution also has three pillars: the use cases, the data sources, and the analytical methods;
  • The benefits of UEBA include: a broad approach to cyberattacks, reduction of human labor, cost reduction, and risk reduction;
  • Among its negative aspects, the high price and slow deployment stand out;
  • The creation of security policies that take into account insider and external threats is among the best practices in the use of UEBA solutions;
  • It is also recommended to consider the risks presented by users without privileges;
    SIEM differs from UEBA because it is rule-based and detects only threats that occur in real-time.
    NTA allows organizations to view all the activities that occur on their network, including in the context of a cyberattack, and enables the creation of network profiles and devices, with easy deployment;
  • The difference between UBA and UEBA is that the first provides for the monitoring of human users and, in the second case, it is extended to machines.

 

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

美國運輸安全管理局 (TSA) 的新網絡安全要求

cybersecurity requirements

On the last March 7th, the Transportation Security Administration (TSA) issued a new emergency amendment requiring regulated airlines and airports to increase their capacity to face cyber attacks. The measure was taken less than a week after the United States government announced its national cyber security strategy, following similar requirements directed at freight and passenger rail carriers.

According to the issued statement, TSA’s priority is to protect the United States transportation system, working collaboratively with stakeholders and offering safe, secure, and efficient travel. This was necessary due to hackers who have attacked the aviation industry using different invasion methods.

In July 2022, American Airlines was a victim of a phishing attack, granting unauthorized access to its IT environment. In addition, various airports in the United States were targeted by DDoS attacks in October of the same year.

For this reason, regulated entities affected by the TSA must promote the following actions:

  • Develop network segmentation policies and controls, ensuring that operational technology systems continue to function securely in case of a compromise of IT;
  • Create access control measures, protecting critical systems from unauthorized access;
  • Implement continuous monitoring and detection policies and procedures to identify and respond to cyber security threats and anomalies; and
  • Reduce the risks of exploitation of uncorrected systems by applying security patches and updates on operating systems, applications, drivers, and firmware through a risk-based methodology.

Previously imposed requirements for aircraft operators and airports include establishing a cyber security point of contact, developing and adopting a cyber security incident response plan, conducting a cyber security vulnerability assessment, and reporting significant cyber security incidents to the Cybersecurity and Infrastructure Security Agency (CISA).

Conclusion

In conclusion, the new amendment issued by the TSA is their latest effort to ensure that transportation operators improve their ability to address cyber threats. In this article, we covered its goals and importance.

According to Cybersecurity Ventures, the world ended 2020 with 300 billion passwords to protect. And the trend shows this number will increase dramatically. Email accounts (personal and professional), banking services, corporate systems, devices, and applications are some examples that require authentication through passwords. And with the increase in the number of data leaks, it is easy to find compromised credentials on forums on the dark web being sold for pennies.

And yes, we know that it is not easy to manage so many passwords. Even the most tech-savvy can struggle to manage and protect credentials in so many different environments. In times of personal data protection legislation, such as LGPD and GDPR, ensuring the protection of such data has become more than a security requirement – it is a business must.

Despite all the risks associated with their use, many users and companies use passwords that are easy to guess, such as numbers or sequential letters (123456 or abcdef). SolarWinds itself, the victim of a serious attack on its supply chain, was using the password solarwinds123 in its infrastructure. Certainly, your email password or mine is stronger than the one used by this American technology company.

So, on this World Password Day, here are some tips that should be considered by users to keep their data protected:

  1. Use long and complex passwords. This prevents hackers from using techniques to guess them. However, just using complex passwords may not be enough to protect them from hackers.
  2. Many devices are configured with default passwords. Change them immediately.
  3. Avoid reusing your passwords on different accounts. Also, constantly check if you have already been the victim of a data leak through senhasegura Hunter. If so, change your passwords immediately.
  4. Configure your passwords to be changed frequently. The ideal is at least every 3 months.
  5. Do not write down, store in an easily accessible place, or share your passwords with others, thus avoiding unauthorized access.
  6. Consider password management solutions, or even privileged access management (PAM), to manage the use of systems and devices.
  7. Use Multiple-Factor Authentication (MFA) mechanisms to add a layer of security to your accounts.
  8. Set up means of retrieving access, such as including phone numbers or emails.

Passwords are one of the oldest security mechanisms in the computing world and are also one of the main attackvectors by hackers. And in the “new normal” era, with increasing threats resulting from the covid-19 pandemic, it is vital that users be alert and properly protect their digital identities. In this way, we can avoid cyberattacks that can cause considerable damage not only to people, but also to companies. And on this World Password Day, remember: security starts with you!

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

國際數據隱私日:為什麼這個日期很重要?

On January 28, we celebrate the International Day for the Protection of Personal Data, or Data Privacy Day. This date leads us to reflect on the importance of laws that safeguard the correct processing of private information in the most diverse countries. Data Privacy Day began with an educational action by the Council of Europe, which began celebrating the date in 2007, and two years later, in 2009, the United States followed. The purpose of Data Privacy Day is to make people aware of best practices for protecting their personal data in the online environment, especially on social media. Nowadays, the day is celebrated in 47 member states of the European Union, the United States, and countries such as Canada, Israel, and Brazil. We prepared this article to address topics related to Data Privacy Day. To facilitate your understanding, we divided our text into the following topics:
  • Data Protection Day: Background
  • How Data Protection Laws Work
  • About GDPR
  • LGPD: Brazilian Data Protection Law
  • How to Protect Personal Data
  • About senhasegura
  • Conclusion
Enjoy the read!

Data Protection Day: Background

In April 2006, the Council of Europe chose January 28 to celebrate Data Protection Day. The date was stipulated in reference to Convention 108, established on January 28, 1981, which addresses the automated processing of personal data. This document was signed by all member states of the Council in the period, to ensure the fundamental right to privacy, including good data processing practices. Currently, it is celebrated to make people aware of its importance, taking into account that, every day, organizations collect and process more information, which needs to be monitored so that the rights of data subjects are not put at risk.

How Data Protection Laws Work

Data protection laws establish personal information protection policies, determining how corporations should treat the data of their customers, employees, and business partners. In practice, it is necessary for individuals, companies, and governmental organizations to apply certain rules related to how they handle this information, such as collection, processing, and storage, to ensure compliance with current legislation. Moreover, companies wishing to conduct business with another country must respect the data protection laws present in both nations.

About GDPR

European standards regulating the use of personal information in electronic environments are contained in the General Data Protection Regulation (GDPR), which requires the responsible use of personal information. Its mass spread is still recent. For this reason, not all countries in Europe have adhered to the GDPR. On the other hand, countries that conduct commercial transactions with European nations should pay attention to the requirements of the Regulation, which addresses criteria such as consent of owners, notification of data breach to authorities, and users’ rights, including:
  • Being notified about the collection and use of their personal information;
  • Requesting a copy and details on how the collection is performed, what data is being collected, and who has access to it;
  • Requiring rectification of incomplete or incorrect data;
  • Demanding that their data be deleted within 30 days;
  • Restricting their personal information;
  • Ensuring the transfer of personal data securely;
  • Opposing the way data is used (except for information used by legal authorities).

LGPD: Brazilian Data Protection Law

The General Data Protection Law (LGPD) is Brazilian legislation that has the function of protecting the personal information of citizens living in Brazil. It details what personal data is and what information should be prioritized when protecting it. According to the LGPD, even companies based outside the country must respect the rules established by the legislation.

How to Protect Personal Data

It is possible to have control over your data through good practices that reinforce its security. Here are some of them:
  • Keep your devices’ software up-to-date to prevent threats that could damage your devices and compromise your personal data;
  • Verify that web pages are reliable before inserting your data, making sure that addresses start with http:// or https:// and that the lock icon or security certificate is present;
  • Avoid exposing personal information on social media such as Facebook, LinkedIn, Instagram, and TikTok, and set up your privacy in posts;
  • Do a general scan to know what data is being shared and, if necessary, disable options;
  • Do not enter sensitive data on public Wi-Fi networks;
  • Use strong passwords. For this, you can combine uppercase, lowercase, numbers, and special characters. It is also important to avoid obvious things like names, phone numbers, and dates of birth.

About senhasegura

We, from senhasegura, are part of MT4 Tecnologia, a group of companies focusing on information security, founded in 2001 and operating in more than 50 countries. Our commitment is to provide digital sovereignty and security to our clients, grant control over privileged actions and information, and prevent data breaches and leaks. For this, we follow the lifecycle of privileged access management through machine automation, before, during, and after accesses. In short, our initiatives aim to:
  • Avoid interruption of companies’ activities, which may impair their performance and profitability;
  • Provide advanced PAM solutions;
  • Automatically audit privileged changes in order to identify privilege abuses;
  • Automatically audit the use of privileges;
  • Reduce cyber threats; and
  • Bring organizations into compliance with audit criteria and standards such as HIPAA, PCI DSS, ISO 27001, and Sarbanes-Oxley.
Conclusion In this article, we have shown the importance of Data Protection Day and laws related to the preservation of personal information, in addition to some measures that can be adopted to protect sensitive data. Was our content relevant to you? Then share it with someone also interested in the topic.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

您如何為您的公司選擇最佳的網絡安全項目?

The IBM Cost of a Data Breach 2022 report brought a lot of information that shows the importance of choosing a good cybersecurity project for your organization.

According to information extracted from this document which included interviews with more than 3,600 people working in companies that had their data violated, it was possible to find alarming conclusions.

First, 83% of the organizations surveyed suffered some kind of breach between March 2021 and March 2022. Also, 60% of these attacks increased prices for customers.

It has also been identified that 79% of critical infrastructure organizations have not implemented a zero-trust plan to prevent cyber threats, and 19% of violations occur due to a compromised business partner.

Faced with so many digital security gaps, it can be difficult to know where to start deploying a cybersecurity project. Therefore, we address this issue here. To facilitate your reading, we divided our text into topics. These are:

  • About Cybersecurity
  • Importance of Cybersecurity
  • Cybersecurity Project: What Is It, and What Is Its Importance?
  • What Are the Five Types of Cybersecurity?
  • People, Processes, and Technologies: Crucial Elements for the Success of Every Cybersecurity Project
  • Guidelines for Prioritizing Cybersecurity Projects within a Company
  • Key Cyber Threats Faced by Companies
  • About senhasegura
  • Conclusion

Enjoy the read!

About Cybersecurity

When we talk about cybersecurity, we refer to a set of technologies, procedures, and methods used to prevent attacks on devices, programs, data, and networks, avoiding the activity of hackers and ensuring the privacy of a company’s data, which must be protected from insider and external threats and natural disasters.

However, accelerated by the Covid-19 pandemic, digital transformation has brought several vulnerabilities, such as those related to remote work. As a result, there was a significant increase in data leaks, phishing emails, and account invasions.

Importance of Cybersecurity

Currently, processes in companies are migrating to the online world due to digital transformation, which can “facilitate” the loss of information of great importance to a business.

Thus, organizations need to invest in cybersecurity in order to ensure their operations and prevent threats, such as malware, viruses, and phishing.

One should also be aware that malicious attackers have been improving their techniques over time, so it is increasingly challenging to maintain data security and avoid compromised business.

Another novelty is data protection laws, which have been holding organizations accountable for the exposure of sensitive information from their customers, employees, and business partners, generating million-dollar sanctions.

In practice, these legislations have several requirements to be respected in order to avoid accidental or intentional data loss.

That is, investing in a good cybersecurity project is the recommended measure to avoid inconvenience, financial losses, loss of credibility, and closure of companies.

Cybersecurity Project: What Is It, and What Is Its Importance?

Cybersecurity projects are aimed at promoting digital security within any company. Its importance lies in the possibility of avoiding cyber threats, such as hacker invasions. It also contributes to the fact that errors -whether deliberate or not, of employees or third parties – have fewer impacts on the organization and reduce the possibility of losses, such as: loss of data, credibility, millionaire sanctions imposed by data protection laws, which can even cause the end of a business. And in small companies, this is even more crucial: according to a Cisco study, 60% of organizations affected by a cyberattack shut down operations within 6 months of the incident.

What Are the Five Types of Cybersecurity?

There are five types of cybersecurity. These are:

  • Critical Infrastructure Security;
  • Application Security;
  • Network Security;
  • Cloud Security; and
  • Internet of Things (IoT) Security.

Check out each of them in detail below:

Critical Infrastructure Security

What Is It?
When talking about critical infrastructure security, we refer to the area that contemplates the security of systems, networks, and assets in industries that are essential to ensure the security of a country’s economy, health, and public services. These sectors include the chemical, communications, utilities, energy, and financial industries.

What Are the Challenges?
A major challenge for critical infrastructure is the security issues its systems present versus the limited protection features.

Application Security

What Is It?
Application security is essential as these programs have increasingly become targets for hackers. It consists of practices adopted to make them more secure, which occurs during their development and then after their implementation.

What Are the Challenges?
Ensuring application security requires tracking all the tools developed for these applications. It is also important to be aware of the future needs of a company, which may require software aimed at a more complex infrastructure.

Network Security

What Is It?
Network security is a term that refers to hardware and software solutions, as well as procedures aimed at protecting the network and data against cyberattacks. In practice, this concept includes network analysis, application security, access control, and antivirus software, among other factors.

What Are the Challenges?
The main challenge of network security is to maintain protection in increasingly complex structures, with a large volume of cyber threats and several functionalities used in corporations, which also represent new problems.

Cloud Security

What Is It?
As companies suffer the impact of digital transformation, they become more dependent on cloud solutions and need to adopt measures that ensure digital security in this context.

This is because outsourced providers may even be responsible for infrastructure management, but the accountability for any exposed data remains with the organization as well.

What Are the Challenges?
The challenges of companies adopting cloud solutions are related to the ability to meet security criteria in a dynamic environment, which can generate a lack of visibility in accessing and using data.

Internet of Things (IoT) Security

What Is It?
Internet of things security is associated with protecting devices connected directly to the cloud in gadgets, such as surveillance cameras. Its function is to protect designed devices, without taking into account aspects of cybersecurity and data protection.

What Are the Challenges?
The greatest challenge associated with the internet of things security refers to human activity. In practice, with the increased connectivity of these devices, it is necessary to instruct users on the change of default passwords and the need for updates, for example.

On the other hand, many users do not see these devices as targets of attacks and end up ignoring best security practices during their development and use.

People, Processes, and Technologies: Crucial Elements for the Success of Every Cybersecurity Project

An efficient cybersecurity project does not only involve the five types of digital security covered in the previous topic. It is also important to take other essential elements into account. They are: people, processes, and technology.

Here’s what you need to know about these aspects:

People

When it comes to cybersecurity projects, investing in cutting-edge technology is not enough. It is essential to train users to respect security protocols and ensur
e the protection of company data.

In practice, your employees increase security risks in a variety of ways.
Among them, we can highlight:

Clicking on URLs and Opening Suspicious Emails

It is necessary to make your employees aware of the risks involved in this practice and encourage the exclusion of emails from fake addresses to protect sensitive data.

Keeping the Same Password for a Long Period

To ensure the security of your company, employees’ passwords must be changed regularly. In addition, strong combinations should be used, and it is not recommended to reuse the same password in different services.

Due to the difficulty in memorizing so many passwords, we also recommend the use of a password vault, which will only require the memorization of a single code.

Personal Browsing

Many people use the devices of their companies for personal purposes, such as accessing social media, shopping, or paying bills. The big problem is that this behavior facilitates the work of malicious agents who want to collect information. Therefore, ask your employees to use their own devices, not corporate ones, for personal browsing.

Lack of Backups

Many people still fail to perform backups when finishing their tasks. Nevertheless, it is of paramount importance to back up the system files. So, employees should understand they need the help of the IT team with these functions.

Unattended Devices

Leaving devices on desks unattended and without blocking them is a fairly common practice, which can also cause damage to the security of a company. For this reason, it is essential to make employees aware of the importance of preserving data contained in these devices and maintaining their control.

Processes

Information security professionals use numerous processes to protect sensitive data. In practice, they need to identify and combat cyber threats, protecting information and responding to incidents.
Besides being implemented, these processes must be documented to save time and financial resources, and preserve customer confidence in cases of cyberattacks.

To counter cybersecurity-related risks, we recommend using the Cybersecurity Framework, developed by the National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce, after former U.S. President Barack Obama signed an executive order in 2014.

Technology

After the deployment of security processes, it is indispensable to assess the tools available to avoid cyber threats.

For this, you must consider two types of technology: those that will help you prevent and combat attacks, such as antivirus, DNS filtering, and malware protection; and those that need protection, including computers, routers, and the cloud.

Previously, we could rely on security perimeters. Now, migration to cloud environments, remote work, and policies like Bring Your Own Device (BYOD) have made it easier for hackers to work.

Guidelines for Prioritizing Cybersecurity Projects within a Company

A cybersecurity project is essential to not overwhelm IT staff with unnecessary work and to ensure the company’s ability to deal with a cyberattack.

However, to create and run your cybersecurity project, you must take some action. They are as follows:

Understanding Your Company’s Goals

Each organization has its strategic goals, which should guide the creation of the cybersecurity project. Therefore, it is important to evaluate the company’s vision and its business and cybersecurity strategies.

This information will provide a basis for the development of the project and will be a guide to gradually know if it is, in fact, efficient.

To understand the strategic goals of the company, read documents related to the subject and talk to top management to know their priorities.

Discovering the Reason Behind the Project

Cybersecurity projects can be motivated by several reasons, although all of them need to prevent and combat cyber incidents in common.

In practice, the project can be an awareness and training campaign on cybersecurity, the implementation or updating of a security system, compliance with new laws and regulations, etc.

Understanding what the project’s motivation is will certainly contribute to establishing priorities, directly impacting the company’s operations.

Determining the Value of the Project

Here, when we talk about value, we are referring to the importance of a cybersecurity project for an organization. That is, it is convenient to analyze how it will impact stakeholders and what its real importance is to the business. A project that adds great value must necessarily be prioritized.

Analyzing the Urgency

It is important to assess the urgency of the cybersecurity project to determine whether it should be prioritized or can wait. But remember that priorities can and should be modified as changes occur.

Detailing the Aspects that Affect the Project’s Success

A successful cybersecurity project depends on a number of factors, including budgets, deadlines, and return on investment (ROI), among other things.

On the other hand, it is often impossible to execute a project due to unfavorable circumstances. Therefore, it is advisable to know what can affect the project’s success in advance.

Ranking the Cybersecurity Project According to the Priority

With the information on goals, objectives, and possibilities of success in hand, it is time to establish an order of priorities through an overall classification, which can be score-based.

Defining How Many Projects Can Be Executed at a Time

Probably, the organization will not be able to assume all priority projects at once. Thus, the solution is to work on them in a phased manner, creating a queue of plans to execute.

Another recommendation is to run the fastest ones first and then the ones that require more time and effort.

Sharing Findings with Top Management

Before starting the cybersecurity project, it is essential to meet with leaders and share the information gathered. This is because the findings can serve as insights to change the order of priorities of the projects, requiring top management to be on board.

Working Flexibly

Working with cybersecurity projects requires flexibility, after all, priorities can be modified according to context. By the way, this occurred in most companies after the beginning of Covid-19, which accelerated the mass adoption of remote work and brought new demands to security teams.

Key Cyber Threats Faced by Companies

The following are the main cyber threats that should be considered by a cybersecurity project:

  • Ransomware;
  • Phishing;
  • Attacks on Mobile Devices;
  • Attacks Using QR Codes;
  • Denial-of-Service (DDoS) Attacks; and
  • LotL and AVT Attacks.

See the detailed explanation of each of them below:

Ransomware

This type of cybercrime works like this: the attacker blocks a network or system and asks for millionaire amounts in exchange for the release of information, which may not be returned, but sold to other criminals. Due to the lack of efficient cybersecurity mechanisms in companies, this tactic is very common.

Phishing

Another common crime in the virtual environment is phishing, which consists of sending counterfeit emails, and pretending to be a legitimate organization. With this, malicious agents convince their victims to share personal information or take action to their benefit.

There are also some types of very sophisticated phishing attacks, such as very realistic audio recordings produced through artificial intelligence.

Attacks on Mobile Devices

With many people working remotely, the use of personal devices for corporate purposes and the use of corporate devices for personal purposes tend to occur more frequently.
This increases security vulnerabilities, especially in the face of malware
attacks on devices.

Attacks Using QR Codes

Currently, cybercriminals use QR Codes to deploy malware applications, infecting their victims’ phones and stealing their bank details.
For this reason, it is advisable to check the code provided by the company before accessing it.

Denial-of-Service (DDoS) Attacks

This type of attack occurs when the hacker overloads a machine with traffic, disrupting its normal operation and making a service unavailable to users. In practice, the attack is performed through a single computer.

LotL and AVT Attacks

Less known, Living off the Land (LotL) attacks do not need to create malicious files to access a company’s systems because they use gateways that already exist.
Advanced Volatile Threat (AVT) attacks allow access to an organization’s data as quickly as possible.

About senhasegura

We, from senhasegura, are part of MT4 Tecnologia, a group of companies specializing in digital security, founded in 2001 and operating in more than 50 countries.

Our main objective is to ensure digital sovereignty and security for our clients, granting control over privileged actions and data and avoiding theft and leaks of information.

For this, we follow the lifecycle of privileged access management through machine automation, before, during, and after accesses.

These are also our commitments:

  • Avoid interruptions in the activities of companies, which may impair their performance;
  • Automatically audit the use of privileges;
  • Automatically audit privileged changes to identify privilege abuses;
  • Provide advanced PAM solutions;
  • Reduce cyber risks;
  • Bring organizations into compliance with audit criteria and standards such as HIPAA, PCI DSS,
  • ISO 27001, and Sarbanes-Oxley.

Conclusion

In this article, you saw that:

  • Cybersecurity is a set of technologies, procedures, and methods used to prevent cyberattacks;
  • Digital transformation has brought new vulnerabilities to IT structures;
  • Companies should invest in cybersecurity to prevent threats, such as malware, viruses, and phishing;
  • Data protection laws hold organizations accountable for the exposure of sensitive information of their customers, employees, and business partners;
  • Cybersecurity projects are aimed at promoting digital security within any company;
  • There are five types of cybersecurity: critical infrastructure security, application security, network security, cloud security, and Internet of Things (IoT) security;
  • People, processes, and technology stand out among the crucial elements for the success of a cybersecurity project;
  • To define the priorities of cybersecurity projects within a company, one needs to understand the organization’s objectives, find out the reason for each project, determine its value, assess its urgency, detail aspects that interfere with its success, rank projects in order of priority, define how many projects it is possible to execute at a time, share the findings with top management, and work flexibly;
  • The main threats faced by companies are ransomware, phishing, mobile device attacks, attacks using QR Codes, denial-of-service (DDoS) attacks, and LotL and AVT attacks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

機器身份管理最佳實踐

Remote work and the adoption of cloud computing surfaced the concept of identity as a perimeter.
In this sense, although it is not new, identity security first gained urgency as malicious attackers began to use machine identity management and access to achieve their goals.

Currently, hackers have been successful in targeting Active Directory and identity infrastructure to move laterally on networks with vulnerabilities.

It is worth mentioning that the use of multifactor authentication (MFA) is growing, but it is still necessary to configure, maintain, and monitor the identity infrastructure properly.

In this article, we will explain everything about this subject. To facilitate your reading, we divided our text into topics. These are:

  • What is Machine Identity?
  • Importance of Machine Identity Management
  • Challenges in Machine Identity Management
  • Seven Best Practices in Machine Identity Management
  • Other Best Practices
  • About senhasegura
  • Conclusion

Enjoy the read!

What is Machine Identity?

Just as people use usernames and passwords to protect their identities, machines have their unique identifications protected by these credentials, as well as keys and certificates.

Without proper machine identity management, it becomes impossible to guarantee the confidentiality of data obtained by authorized devices and to prevent this information from being transferred to unauthorized machines.

In practice, a machine with a compromised identity can damage the company’s digital security. This is because hackers can use them to gain privileged access to data and resources from the organization’s networks.

Moreover, by stealing or forging a machine identity, an attacker is able to impersonate a legitimate machine and obtain sensitive data.

To account for the volume, variety, and speed of changes in machine identity, one needs to strategically manage a complex and rapidly changing data set.

Through appropriate policies and controls, machine identity management contributes to optimizing a corporation’s cybersecurity, reducing risks, and ensuring compliance with security requirements.

Importance of Machine Identity Management

Proper machine identity management is critical to preventing compromised credentials, keys, and certificates from being used to invade infrastructure, giving access to sensitive data, or being used to create fraudulent tunnels and hide malicious actions.

It also allows one to track the exponential growth in the number of machines to keep their identities secure and track the evolution of cloud services, which can expose machine identities to hacker action.

With the correct machine identity management, it is also possible to protect mobile devices, sensors, and robots, which can communicate and store sensitive information using encryption.

In addition, we live in a context where machines have increasingly intelligent functions, replacing people in activities that require logical reasoning and thinking, and machine identity management allows us to interact securely with this type of equipment.

Challenges in Machine Identity Management

In the previous topic, we showed the importance of machine identity management in data protection. However, we know efficient machine identity management can be quite challenging.

One of the reasons is the increase in IT and OT devices, which also increases the number of credentials, certificates, and keys.

Also, traditional practices are insufficient to meet the demands of machine identity management, which can cause cyberattacks and interruption of activities.
In this sense, the most common challenges are:

Visibility

With a large number of machine identities, it becomes difficult to keep track of existing credentials and know where they are. With this, hidden certificates can expire without anyone noticing, causing an interruption in activities.

Besides being difficult to locate all certificates on a company’s network, some of them are on devices outside the network perimeter, which can go unnoticed by audit processes.

Compliance

To ensure compliance with security requirements, it is essential to regulate the issuance, validity, security levels, and access. Thus, the lack of proper machine identity management, which contemplates TLS/SSL certificates and SSH keys, opens gaps for the action of malicious agents.

Storage

It is very common for certificates and keys to be stored in spreadsheets and distributed by email, however, as the number of machine identities increases, their control in spreadsheets is susceptible to errors.

Manual Management

Manual machine identity management is also a mistake, as it makes the process slow and error-prone.

In practice, applications and devices do not go online quickly after manually registering and provisioning certificates. In addition, manual renewal, revocation, and auditing may cause interruptions in activities.

Seven Best Practices in Machine Identity Management

Here are some practices you need to adopt in your organization’s machine identity management:

Identify This Type of Identity in the Infrastructure

Two hundred and sixty-seven thousand: this is the average number of internal certificates that an IT organization has, according to the Ponemon Institute. Many of these certificates are old, with the possibility of being encoded or hidden among other identities.

To get a sense of it, in a survey by Vanson Bourne, 61% of companies admitted they do not have full knowledge of their keys and certificates for devices. Of these, 96% claimed to suffer consequences such as violations, interruption of systems, and financial losses.

To ensure proper machine identity management, you need visibility into the devices your company uses. Therefore, it is essential to verify this type of identity in the infrastructure.

The good news is that you can count on the support of senhasegura for this: we were considered by Gartner as best in class for the discovery and integration of privileged credentials.

Periodically Rotate Machine Identities

Another indispensable measure is to rotate machine identities periodically to prevent their misuse by malicious users.

This is because when keys and certificates remain the same for a long time, they can be targeted by hackers, who use known API calls with a real certificate to gain access to critical resources and data.

To avoid this problem, organizations must have authorization from source machines, cloud connections, portable devices, application servers, and API interactions. Moreover, certificates should be updated frequently.

Implement Privileged Access Management solutions

To perform proper machine identity management, we also recommend the use of Privileged Access Management (PAM) tools. This type of solution prevents cyberattacks as it grants each user only the access necessary to perform their tasks.

We, from senhasegura, are leaders in this market and can help you protect the machine identities of your organization.

Implement Automation in the Environment Through RPA and PTA

Robotic Process Automation (RPA) consists of the use of technological tools to automate operational and transactional tasks, such as sending e-mails, checking financial data, preparing receipts, and managing payrolls.

Privileged Task Automation (PTA) automates an organization’s workflow tasks, ensuring they are completed at any time without stopping operations. These two mechanisms contribute to preventing violations motivated by human errors.

Nevertheless, it is necessary to manage the identities of software robots, starting with the definition of the best policies on how to integrate them.

Reduce Risk w
ith Zero Trust Plans

To provide more security to machine identity management, it is advisable to adopt the concept of zero trust in equipment. That is, it is not enough for corporate users to be frequently authenticated, it is necessary to extend this standard to devices.

The problem is that, despite already adopting this people-focused work model, many companies still consider device authentication a challenge.

Include the Cloud in the Machine Identity Management Plan

With the digital transformation accelerated by the Covid-19 pandemic, many companies started operating in the remote work model, using cloud solutions.

Therefore, when we talk about machine identity management, it is necessary to think of solutions that contemplate cloud environments.

Ideally, one should apply an approach that centralizes functions and enables them to manage multiple cloud deployments.

Adopt Machine Identity Management Solutions

Companies need to have teams specifically responsible for machine identity management, preventing certificates and keys from remaining unmanaged.

And to optimize this work, it is advisable to adopt automated machine identity management solutions that manage the entire certificate lifecycle.

Automated solutions are very effective and allow scalability in organizations, following the implementation of new technologies. However, machine identities should not be implied but expressly assigned.

Other Best Practices

Here are some other best practices for you, who need to deal with machine identity management.

Ensure Visibility

For no machine to be left unmanaged, it is indispensable to make a scan of all certificates and keys. This search should include devices that are outside the network perimeter. In addition, it is important to know the location, CA, and expiration date of each certificate.

Count on Centralized Management

Centralizing machine identity management is a way to simplify its implementation across environments, devices, and workloads. It is also possible to group certificates, taking into account their type, level of criticality, and expiration date.

Proper machine identity management protects communication and prevents the action of malicious attackers.

Use Self-Service

It is possible to use self-service for the provision, renewal, and revocation of certificates, making machine identity management more efficient. In this sense, to keep identities well protected and limit the actions of teams, you just need to implement role-based access controls and privileges.

Store Certificates and Keys in Secure Locations

Digital certificates and SSH keys should be stored in centralized and secure locations, preferably on encrypted devices. Moreover, access to these devices should be limited to privileged users with the use of strong passwords and RBAC.

These measures ensure the security of the machine identity, even if the network is compromised.

Key Rotation

Many companies are vulnerable to the action of malicious former employees, who have access to old certificates, keys, and encrypted algorithms. To avoid this problem, we strongly recommend changing old keys to new ones.

Automation

As we have already suggested, automation is the solution to most cybersecurity issues. In the case of machine identity management, automating this process ensures keys and certificates are always up to date and allows you to avoid problems such as interruption of activities.

Perform Audits Frequently

Performing frequent audits on machine identities is important because this process allows one to detect and eliminate issues such as weak passwords, unauthorized or expiring certificates, and old and unused keys.

For this, you can use an audit solution provided by third parties. Thus, it is possible to avoid interruption of activities, prevent violations, and optimize machine identity management.

About senhasegura

We, from senhasegura, are part of the group of information security companies MT4 Tecnologia, founded in 2001, and we aim to provide digital sovereignty to our customers through the control of privileged actions and data.

With this, we prevent data leaks and theft, as we manage privileged permissions before, during, and after access through machine automation. We work to:

  • Optimizing the performance of companies, avoiding interruption of operations;
  • Performing automatic audits on the use of permissions;
  • Auditing privileged changes to detect abuse of privilege automatically;
  • Providing advanced solutions with the PAM Security Platform;
  • Reducing cyber threats; and
    Bringing the organizations that hire us into compliance with audit requirements and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

Conclusion

In this article, you saw that:

  • Machines have their unique identities protected by keys and certificates;
  • The increase in IT and OT machines generates a significant growth in the number of certificates and keys;
  • Without proper machine identity management, it becomes impossible to guarantee the confidentiality of data obtained by authorized machines and to prevent this information from being transferred to unauthorized ones;
  • Malicious actors can use compromised machine identities to gain privileged access to data and resources from the organization’s networks;
  • Machine identity management contributes to optimizing the cybersecurity of a corporation;
  • It also allows one to keep up with the exponential growth in the number of machines and protect mobile devices, sensors, and robots;
  • The main challenges in machine identity management are: visibility, compliance, storage, and manual management;
  • Some of the best practices for this management are: recognizing machine identities, rotating these identities periodically, implementing Privileged Access Management solutions, implementing automation in the environment, reducing risks through the Zero Trust concept, including cloud solutions in machine identity management, and adopting automated machine identity management solutions;
  • It is also essential to ensure the visibility of devices, rely on centralized management, use self-service, store certificates and keys in secure places, and perform audits frequently;
    senhasegura was considered by Gartner as best in class for discovery and integration of privileged credentials;
  • In addition, the company provides a PAM solution, which avoids cyberattacks through the Principle of Least Privilege.

Did you like our content on machine identity management? Then share it with someone who may be interested in the topic.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

The Highlights of the IBM Cost of a Data Breach 2022 report

Companies of all sizes and industries should be concerned about the impacts of a data breach, since, according to the IBM Cost of a Data Breach 2022 report, its average cost is $4.35 million, and 83% of companies had more than one breach.

With this in mind, we prepared an article exploring the main information collected by this document. To facilitate your reading, we divided our text into topics. These are:

  • What Is the IBM Cost of a Data Breach Report?
  • IBM Cost of a Data Breach 2022 report: What’s New
  • Main Data Collected in the IBM Cost of a Data Breach 2022 Report
  • Topics with Detailed Results
  • Suggested Security Recommendations in the Report
  • About senhasegura

Enjoy the read!

What Is the IBM Cost of a Data Breach Report?

The IBM Cost of a Data Breach report is an annual survey of data breaches, which provides insights into hundreds of breaches so that the public can understand current cyber threats.
With nearly 20 editions, this document provides IT professionals with tools to deal with security risks, showing which factors can favor or help prevent cyberattacks.

IBM Cost of a Data Breach 2022 report: What’s New

In its latest edition, the IBM Cost of a Data Breach report has conducted more than 3,600 interviews with professionals from 550 companies that suffered violations between March 2021 and March 2022.
The questions made during the interviews aimed to evaluate the costs of organizations to respond to data breaches in the short and long term.

What’s more: the report has assessed the causes and consequences of the violations that occurred in 17 industries located in different countries and regions, and addressed the impact of certain factors and technologies to reduce losses.

Here are some new things from the IBM Cost of a Data Breach report:

  • The 2022 edition has brought analyses related to extended detection and response, the use of risk quantification techniques, and the impacts of individual technologies on zero-trust security structures;
  • It analyzed what contributes to higher data breach costs and the effects of supply chain commitments and the gap in security skills;
  • It examined areas of cloud security vulnerability to critical infrastructure;
  • It assessed, in greater depth than in previous years, the impacts of ransomware and destructive attacks; and
  • It studied the phenomenon of remote work, which many companies adopted due to the covid-19 pandemic.

Main Data Collected in the IBM Cost of a Data Breach 2022 Report

Check the key findings from the IBM Cost of a Data Breach 2022 report:

  • The average cost of a data breach was $4.35 million in 2022, an increase of 2.6% over the previous year, when the average cost was $4.24 million;
    83% of the companies studied suffered more than one data breach and only 17% said this was their first breach;
  • 60% of organizations had to increase the price of their services or products because of a data breach;
    The average cost of a data breach for the critical infrastructure organizations surveyed was $4.82 million – $1 million more than the cost for companies from other segments;
  • 28% of critical infrastructure organizations have suffered a destructive or ransomware attack, and 17% have been violated because of a compromised business partner;
  • Cyberattacks on companies with deployed security and automation AI cost $3.05 million less than violations on organizations that do not invest in these resources;
  • The average cost of a ransomware attack fell from $4.62 million in 2021 to $4.54 million in 2022;
    Stolen or compromised credentials remain a leading cause of data breaches, accounting for 19% of breaches in the 2022 study;
  • Leaks involving credentials are the ones that take the longest to be detected. On average, 327 days are required for identification and remediation;
  • Only 41% of the organizations in the study have deployed zero-trust security architecture;
    Violations related to remote work cost, on average, about $600,000 more if compared to the global average;
  • 45% of violations in the study occurred in the cloud;
  • The average cost of health-related violations has increased by almost $1 million, reaching $10.10 million;
  • The top five countries and regions with the highest average cost of a data breach were the United States, the Middle East, Canada, the United Kingdom, and Germany.

Topics with Detailed Results

The IBM Cost of a Data Breach 2022 report analysis 16 topics. These are:

  • Global Highlights;
  • Data Breach Lifecycle;
  • Initial Attack Vectors;
  • Key Cost Factors;
  • Security and Automation AI;
  • XDR Technologies;
  • Incident Response (IR);
  • Quantification of Risk;
  • Zero Trust;
  • Ransomware and Destructive Attacks;
  • Attacks on the Supply Chain;
  • Critical Infrastructure;
  • Cloud Violations and Cloud Model;
  • Remote Work;
  • Skills Gap; and
  • Mega Violations.

The following are five of these topics in detail:

Data Breach Lifecycle

We call the lifecycle of a data breach the time elapsed between the discovery of the breach and its containment.

According to the IBM Cost of a Data Breach 2022 report, the average time to identify and contain a data breach is currently 277 days. In 2017, the average time was 287 days, that is, 3.5% more.

In 2021, it took an average of 212 days to detect a violation and 75 days to contain it. In 2022, it took 207 days to identify the violation and 70 days to contain it.

The report has also shown that the less time an organization takes to identify and contain a data breach, the less its financial impact is.

However, the cost difference between a lifecycle of more than 200 days and a lifecycle of less than 200 days was lower in 2022 than in 2021: in 2021, the difference was $1.26 million, the largest in seven years and, in 2022, it was $1.12 million.

Incident Response

Relying on an incident response team reduces the average cost of a data breach and, according to the IBM Cost of a Data Breach 2022 report, 73% of the companies that participated in the survey claimed to have an incident response plan.

The report also pointed out that the average cost of a violation in these companies in 2022 was $3.26 million versus $5.92 million spent by companies without incident response resources, a difference of $2.66 million. In the previous year, this difference was $2.46 million, and in 2020, $1.77 million.

Zero Trust

The implementation of a zero-trust security architecture was performed by 41% of the companies that participated in the IBM Cost of a Data Breach 2022 report. In 2021, this number was lower: 35%.

The study also revealed companies that deployed zero trusts saved almost $1 million with data breaches when compared to those that did not invest in this concept.

This is because the average cost of a violation was $4.15 million in organizations with zero trust deployed and $5.10 mi
llion in companies that did not use the same approach.

When we talk about implementing zero trust in a mature stage, the economy is even greater, reaching more than $1.5 million. Companies with early-stage zero trust practices spent an average of $4.96 million on data breaches, while for those that had these practices consolidated, the average cost was $3.45 million.

Cloud Violations and Cloud Model

The Covid-19 pandemic has accelerated the mass adoption of remote work by organizations and, consequently, the use of technologies such as cloud computing, impacting cybersecurity.

However, the IBM Cost of a Data Breach 2022 report brings interesting data on the subject, which was analyzed for the second year: according to the document, 45% of violations occurred in the cloud. Moreover, the costs of breaches in private clouds are significantly higher than in hybrid clouds.

Another revealing fact is that 43% of companies claimed they were still in the early stages of their practices protecting cloud environments, showing that, in general, organizations still need to evolve a lot.

Nevertheless, the most worrying fact is that 17% of companies have yet to take any action to protect their cloud environments.

Remote Work

Since the beginning of the pandemic, the IBM Cost of a Data Breach report analyzes the impacts of remote work on data breaches. In its 2022 edition, the survey has shown data breach costs were higher for companies that have more employees working remotely.

In practice, companies that have between 81% and 100% of employees working outside the corporate environment had an average cost of $5.10 million. Companies with less than 20% of their team working remotely had to bear an average cost of $3.99 million, a difference of $1.11 million (24.4%).

In addition, the average cost of a data breach was $4.99 million for companies that had remote work as the cause of the breach, while this loss was $4.02 million when remote work was not the cause.

Suggested Security Recommendations in the Report

The IBM Cost of a Data Breach 2022 report also contains important security recommendations on its pages, which can help prevent problems with data breaches. Check them out:

Adopting a Zero Trust Security Model

According to the results of the study, organizations that implemented a zero-trust approach in their security at a mature stage have saved $1.5 million. Therefore, it is convenient to adopt this security model in your company to reduce the financial impacts of a data breach.

Protecting Cloud Environments with Policies and Encryption

Companies that have adopted mature cloud security practices have saved $720,000 compared to those that did not care about the subject. Thus, it is recommended to invest in security policies, data encryption, and homomorphic encryption to prevent data breaches.

Using Incident Response Manuals

Another highly recommended practice is to create and test incident response manuals, as companies that regularly test their plan have saved $2.66 million in violations over those that do not rely on an IR plan team or test.

Improving Incident Detection and Response Times

Added to security and automation AI, Extended Detection and Response (XDR) capabilities contribute to reducing the average costs of a data breach as well as its lifecycle. The study pointed out that companies with XDR deployed have reduced the lifecycle of a violation by 29 days, on average, when compared to organizations that did not implement XDR, saving $400,000.

Monitoring Endpoints and Remote Employees

Finally, the IBM Cost of a Data Breach 2022 report reinforces the need to monitor endpoints and remote workers, showing that violations caused by this modality cost almost $1 million more than violations in which remote work was not a factor.

About senhasegura

We, from senhasegura, are a company specializing in cybersecurity. Our mission is to provide our clients with sovereignty over their actions and privileged information.
To do this, we offer our PAM solution, which helps companies protect themselves from all the threats presented in the IBM Cost of a Data Breach 2022 report.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.