【媒體報導】Nord Security跨入威脅情資領域,整合暗網監控與攻擊面管理

以個人端VPN服務NordVPN著稱,Nord Security持續擴展資安產品版圖,去年上半發表威脅暴露管理平臺(Threat Exposure Management Platform),名為NordStellar,可針對企業面臨的網路威脅、資料外洩、帳號遭劫持、釣魚詐騙等惡意活動,提供偵測與應變的能力,號稱可降低勒索軟體攻擊的風險。今年上半,代理商台灣二版開始推廣這套解決方案。

NordStellar的最大賣點,在於運用自動監控機制,提供廣泛的防護,以及涵蓋員工、品牌、企業的暗網監控能力,可預防使用者帳號遭人冒用與侵入、識別暴露在惡意軟體攻擊威脅的程度,縮短企業偵測資料外洩活動的時間,避免員工身分遭竊取,並且節省投入這些工作所需耗用的人力資源。

及早掌握企業相關資訊是否出現在暗網

去年7月NordStellar開放暗網監控功能的測試,Nord Security表示,這項防護能整合多個來源的網路威脅情報,例如,暗網論壇、深網搜尋引擎、不法市場、駭客社群、Telegram頻道,追蹤與查詢與公司有關聯的多個關鍵字,一旦出現被提及的內容,企業能獲得警示,可提高主動識別相關資安風險來源的能力,進而及早採取保護自身與客戶的行動,預防後續可能發生的資安事故或商譽損失。

一般而言,上述的地下管道可能出現許多重要的威脅情資,像是偽裝合法產品但內嵌惡意軟體的應用軟體、遭竊的顧客帳戶、企業的後門,都會在此進行拍賣,對於企業與資安廠商而言,若能掌握這些來源的相關動向,就有機會早一步降低或緩解相關的風險,同時,也能從攻擊者的角度,了解與釐清企業本身存在的資安防護空隙。

除此之外,企業也能透過NordStellar,確認這些管道是否存在外洩員工資料、惡意軟體活動的信號,並且提供預防顧客帳號遭冒用的解決方案。

提供外部攻擊面管理功能

到了今年2月,NordStellar正式擴增攻擊面管理(Attack Surface Management,ASM)的功能,可針對組織暴露在網際網路環境的數位資產,提供持續監控與評估能力,協助資安團隊發現與管理未經授權且暴露在安全風險下的IT資源,提升「影子IT」狀況的能見度與IT營運效率。

而且,此系統提供的ASM可自動探查組織的資安防護缺口,改善整體資安態勢,確保資安團隊具備足以有效管理攻擊面的洞察分析資訊,對於可能導致的資安風險,也會列出處理的優先順序,促使矯正工作能聚焦在最重大的狀況,如此一來,也便於後續可盡量縮小暴露在外部資安威脅能夠攻擊的部分,抑制攻擊行動得以成功的因素,進而符合弱點評估層面的法規遵循需求。

  

NordStellar在此提供兩個模組。首先,是資產自動探查,能透過多種處理程序的執行,像是網域名稱列舉、網頁爬取,以及其他可取得開放來源情資的方法,對組織所有可連接網際網路的資產,例如網站伺服器、應用系統、連網設備,進行自動識別與分門別類,產生整個IT基礎架構的具體對應。

第二是外部弱點管理,能對找到的資產執行監控,以及運用被動建立服務指紋(passive service fingerprinting)的方式,與掃描已知漏洞等程序,獲得相關資訊,這些情報將有助於企業提升後續復原的效率。

除此之外,NordStellar的ASM也會根據嚴重程度、濫用可能性,以及潛在的衝擊,評估漏洞處理的優先順序。

若新的漏洞出現、攻擊面有異動,NordStellar的ASM將提供即時警示,以及企業攻擊面與相關風險的全面報告。

結合多種分析技術,持續監督企業網域名稱是否遭人非法註冊

針對網域名稱搶先註冊(cybersquatting或Domain squatting)的威脅,NordStellar開始提供採用AI分析技術而成的偵測功能,由於網路釣魚、散播惡意軟體、寄放詐騙內容等手法,經常搭配這類攻擊,因此,企業也必須具備察覺與預防的能力。

這項功能可自動偵測既有與新登記在案的網域名稱,檢查它們是否非常類似已存在的各個品牌,並且持續追蹤網域名稱的有效期間,以及變更的狀況,協助企業及早得知品牌已遭遇這類攻擊,並從中獲得洞察分析資訊,阻止網路犯罪者繼續冒用這些網域名稱。

Nord Security表示,他們不僅使用基本的字串比較,也搭配能精準識別的演算法,並且運用相似度判定的演算法、威脅情資餵送服務的資料,以及WHOIS這個通用的網域名稱註冊資訊查詢服務,決定網域名稱的風險。

此外,NordStellar也導入基於AI技術而成的解決方案,分析對方這麼做的意圖,進一步檢驗資安威脅的類型、可信程度、嚴重等級、支撐判定的證據,並產生接下來著手處理的建議步驟,例如,更深入調查網域名稱狀態、向網域註冊機構發出移除域名的請求,或是從網路的層級封鎖域名。

若偵測到網域名稱搶先註冊的狀況,NordStellar也提供即時警示與通知,能基於用戶設置的事件類型與風險等級等種種條件,經由電子郵件、協同作業平臺Slack,以及NordStellar平臺本身,發送相關資訊提醒用戶注意。關於調查可疑網域名稱的功能操作上,這套系統除了整合上述的相似度分析與WHOIS資訊整合,也提供螢幕擷圖、網域名稱跳轉鏈追蹤(Redirect Chains)等方式,進行蒐證與解析。

藉由上述功能的使用,Nord Security希望能縮短企業因應這類攻擊行為的時間,在事態嚴重性升級之前,就能採取預防行動。

產品資訊

NordStellar
●代理商:台灣二版
●原廠:Nord Security
●建議售價:基礎版每年3千美元起,5個使用者與1個網域,監控200個資產
●版本區分:基礎版、核心版、企業版
●防護功能:網路威脅監控(資料外洩監控、暗網監控、網域名稱搶先註冊偵測)、外部攻擊面管理(外部弱點掃描)、網路威脅情報
●可預防的資安威脅類型:帳號遭搶走、連線階段遭綁架、網域名稱搶先註冊

【註:規格與價格由廠商提供,因時有異動,正確資訊請洽廠商】

媒體報導轉載:iThome( https://www.ithome.com.tw/review/170112

 

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

NordLayer:12 項常見 BYOD 安全風險與緩解策略

近年來,「自攜設備」(Bring-Your-Own-Device, BYOD)政策已迅速普及。根據 2022 年的一項調查,超過 60% 的組織機構允許員工使用個人裝置處理公務。這一趨勢彰顯了 BYOD 的諸多效益:員工可以在其熟悉的流動裝置上維持高效率工作,而企業則能降低硬件成本,並拓展遙距工作的可能性。然而,BYOD 的安全隱憂也隨之增加。資訊安全專家警示,資料竊取、惡意軟件感染及其他相關風險正不斷攀升。這些 BYOD 的潛在危險不僅可能中斷企業營運,甚至可能導致敏感資料外洩。因此,當使用者將 BYOD 裝置連接至企業網絡時,部署適當的安全措施刻不容緩。

下文將深入探討 12 項主要的 BYOD 安全風險,並提供相應的緩解策略。同時,將介紹 NordLayer 如何運用先進工具,為安全的 BYOD 政策提供支援。

 

BYOD 對現代資訊安全的意涵為何?

BYOD 意指員工利用個人裝置(如智能手機、平板電腦或手提電腦)處理公務。許多企業發現,這種彈性不僅能提振員工士氣,亦有助於降低營運成本。然而,便利性的背後也潛藏著安全威脅。當員工使用自有硬件時,IT 管理人員的管控能力會受到限制。多元的作業系統與軟件版本,使得統一監管變得更加複雜。若缺乏健全的 BYOD 安全政策,相關的安全漏洞便會隨之增生。BYOD 的網絡安全威脅涵蓋了惡意應用程式、過時軟件,以及為攻擊者敞開大門的入侵點,最終可能導致嚴重的資料遺失或系統服務中斷。

為防範重大的 BYOD 安全事件,完善的流動裝置管理(MDM)機制至關重要。IT 團隊必須導入裝置安全工具、強制執行安全規範,並嚴密監控網絡存取活動。若未能落實這些步驟,BYOD 所帶來的風險很快便會超過其效益。

 

主要 BYOD 安全風險與緩解策略

要確保 BYOD 的安全性,首先必須了解員工日常面臨的普遍風險。企業往往忽略弱密碼這類看似簡單的問題,無形中增加了資料外洩的風險。以下各節將逐一剖析這些風險,並提供易於實行的策略來降低潛在威脅。遵循這些步驟,將能有效強化貴組織的整體 BYOD 安全防護。

 

1. 密碼強度不足

密碼強度不足是個嚴峻的挑戰。Microsoft 軟曾發現,高達 4400 萬個帳戶仍在使用先前已遭外洩的密碼。若員工重複使用或選用過於簡單的密碼,個人及企業的敏感資料便極易成為攻擊者的目標。

解決方案:強制執行嚴格的密碼政策(要求足夠長度、高複雜性、禁止重複使用歷史密碼)與多重要素驗證(MFA),可顯著降低風險。根據一份報告指出,MFA 能阻擋超過 99.9% 的帳戶盜用攻擊。

 

2. 不安全的 Wi-Fi 連線

開放式 Wi-Fi 熱點讓攻擊者有機可乘,得以窺探使用者的私人連線內容。BYOD 使用者時常連接咖啡廳、機場等公共場所的 Wi-Fi。若員工透過未受保護的公共 Wi-Fi 處理敏感資料,相關的安全風險將急遽攀升。

解決方案:加強員工教育訓練,教導其避免在缺乏保護的情況下連接未知或開放的 Wi-Fi 網絡。務必使用安全的 VPN 加密所有網絡連線。此舉不僅能保護個人裝置,更有助於降低因不安全網絡所衍生的 BYOD 威脅與漏洞。

 

3. 過時的作業系統

老舊的軟件版本容易引來安全威脅。許多個人裝置的使用者會忽略系統更新,或關閉自動修補功能。攻擊者常利用這些已知的安全漏洞,發動針對性的 BYOD 攻擊。

解決方案:確保所有 BYOD 裝置都能及時接收並安裝更新。為作業系統、應用程式及驅動程式啟用自動安裝功能。採用企業級瀏覽器有助於實現集中化管理。此外,NordLayer 的「裝置合規性檢查」(Device Posture Security)功能,能限制未符合修補要求的裝置存取網絡,從而協助確保整體合規性。藉此可防止因系統過時而削弱企業的整體防禦能力。

 

4. 惡意應用程式

員工可能基於娛樂、提升生產力或便利性等原因安裝各種應用程式。然而,部分流動應用程式可能暗藏惡意軟件。這些惡意程式可能竊取企業內部資料,或破壞裝置本身的安全性。

解決方案:利用流動裝置管理(MDM)工具監控裝置上已安裝的應用程式。封鎖已知的高風險應用程式,並宣導員工應從官方或受信任的來源下載 App。這有助於及早發現並攔截有害軟件,進而降低 BYOD 的相關安全風險。

 

5. 薄弱的存取控制

不當的角色權限管理,可能授予使用者超出其工作所需的過高權限。此舉增加了企業資料遭意外存取或竊取的風險。一旦攻擊者成功入侵某個帳戶,便可能在內部系統中橫向移動,存取更多敏感資料。

解決方案:導入零信任(Zero Trust)架構原則。對企業資料進行分級分區,並嚴格限制資源的存取權限。雲端防火牆能實現精細化的權限管控,有效保護關鍵資產。這些措施有助於限制攻擊者的橫向移動範圍,降低帳號憑證一旦失竊所造成的衝擊。

 

6. 個人儲存導致的資料外洩

員工時常將公務資料儲存在個人裝置中。部分員工甚至會在未加密的情況下,將檔案同步至個人的雲端儲存服務。這些行為不僅暴露了 BYOD 的安全隱患,更升高了整體的資安疑慮。

解決方案:強制要求對儲存在個人裝置上的所有公務檔案進行加密處理。為個人資料與公司資料提供安全的隔離容器(Secure Container)。將您的網絡安全解決方案與資料外洩防護(DLP)系統整合,藉此保護靜態儲存與傳輸過程中的資料安全。此措施可降低因使用未受控管的儲存空間而導致資料遺失的風險。

 

7. 裝置遺失或失竊

裝置失竊是個日益嚴峻的問題。全球每年有超過 7000 萬台流動裝置遺失或遭竊。若裝置中存有未加密的公務資料,便可能導致未經授權的非法存取。BYOD 裝置一旦遺失,不僅可能暴露儲存於其上的所有資料,更可能為攻擊者提供潛在的「入侵破口」,尤其在裝置缺乏適當安全防護的情況下。著名的 Lifespan Health System 案例中,便因一台未加密的失竊手提電腦,導致超過兩萬名病患的個人資料外洩,最終被處以 104 萬美元的罰款。

解決方案:啟用遙距資料清除(Remote Wipe)功能與高強度密碼鎖。建立強制通報機制,要求員工在裝置遺失後立即回報 IT 部門。在這種情況下,迅速採取應對措施,是防止重大企業資料外洩的關鍵。

 

8. 影子 IT(Shadow IT)

當員工繞過 IT 部門,私自採用未經核准的工具或雲端服務時,便產生了所謂的「影子 IT」。例如使用個人即時通訊軟件、或來路不明的檔案共享平台等。這類未受監管的行為不僅增加了 BYOD 的管理難度與安全風險,更可能衍生出潛藏的安全漏洞。

解決方案:制定清晰的 BYOD 安全政策,明確規範允許使用的軟件與服務。加強員工資訊安全意識培訓,使其了解使用未經審核平台所潛藏的風險。部署企業級瀏覽器也有助於封鎖對未授權工具的存取。及早偵測並加以管理,可防止影子 IT 問題惡化,演變成嚴重的 BYOD 安全威脅。

 

9. 社交工程攻擊

網絡釣魚(Phishing)及其他社交工程手法,常誘騙使用者洩露登入憑證等敏感資訊。攻擊者常發送看似合法且具說服力的電子郵件或訊息。個人裝置的普遍使用增加了此類風險,因為使用者可能在同一裝置上混合處理個人事務與公務。

解決方案:強化員工訓練,教導其務必驗證訊息來源,切勿輕易點擊不明連結。啟用強效的垃圾郵件過濾器與即時網域信譽檢查機制。NordLayer 可協助封鎖已知的惡意網域,從源頭阻斷這類攻擊。然而,持續提升使用者的安全意識,對於有效防範社交工程攻擊來說,仍然至關重要。

 

10. 缺乏裝置活動監控

部分企業未能有效追蹤記錄個人裝置上的活動狀況。若可疑活動未能及時被偵測,便可能醞釀成更嚴重的 BYOD 安全事件。當異常的檔案傳輸或登入行為未被察覺時,攻擊者便能肆無忌憚地活動。

解決方案:部署端點偵測與應變(EDR)或類似監控工具,以偵測異常活動。定期檢視系統日誌,關注非上班時間的資料傳輸、以及重複登入失敗等異常警訊。許多解決方案能提供跨多個端點的集中式監控儀表板。即時的警報通知,能讓 IT 團隊在微小跡象演變成重大事故前迅速介入處理。

 

11. 網絡分段不足

若所有裝置,不論類型或使用者,都連接至同一個扁平的子網絡,BYOD 的風險暴露面將大幅增加。單一裝置一旦遭到入侵,便可能危及整個企業網絡與內部資料。在這種網絡架構下,BYOD 所引發的安全威脅將更難以被控制與隔離。

解決方案:應根據使用者角色與裝置類型,對網絡進行適當的分段(Segmentation)。務必將訪客網絡與存放核心資源的伺服器網段徹底隔離。NordLayer 的網絡保護平台支援更精細的微分割(Micro-segmentation)技術。藉由限制橫向移動的可能性,可大幅降低單一裝置遭入侵時所造成的潛在衝擊。

 

12. 離職程序不完善

員工離職後,其對公司系統的存取權限可能未能被及時、完整地撤銷。導致其帳號在個人裝置上,於離職許久後依然保持有效狀態。這種情況會帶來持續性的 BYOD 安全風險,即使該員工的角色已發生變動。例如,一名前 Cisco 工程師便曾非法存取公司網絡並造成重大損害,導致 Cisco 需額外投入相當於 140 萬美元的員工工時進行修復,並向受影響客戶退款近 100 萬美元。

解決方案:建立並嚴格執行標準化的離職程序(Offboarding Protocol)。確保在員工離職時,立即撤銷其所有存取憑證、停用相關帳戶,並清除裝置上的企業應用程式與資料。NordLayer 能從單一管理介面簡化使用者生命週期的管理,這有助於降低因存取權限滯留而引發的潛在資料竊取風險。

 

運用 NordLayer 保障 BYOD 安全

BYOD 提升了工作彈性,卻也伴隨著遞增的安全風險。NordLayer 能同時保護個人與公司發放的裝置,確保使用者安全地存取所需資源。NordLayer 的網絡保護平台整合了網際網絡安全防護、網絡存取控制(NAC)以及安全遙距連線功能。無論員工身在何處,皆能確保企業網絡的安全無虞。

企業級 VPN(Business VPN)不僅加密所有網絡流量,更支援共享或私有閘道器,並提供專用 IP 選項。服務據點遍及全球 30 多個地區,確保團隊成員享有快速且安全的存取體驗。此平台亦能協助攔截惡意網站、具風險的檔案下載及其他不必要的網絡流量,同時確保傳輸中的資料全程保持加密狀態。藉由零信任存取控制(ZTNA)模型,唯有通過驗證的使用者與合規裝置才能建立連線。相關安全政策確保只有符合規範的裝置,才能存取企業內部資源。

NordLayer 的企業級瀏覽器(Enterprise Browser)能為 SaaS 應用及網頁服務提供額外的安全保護層。它可以阻擋惡意網頁轉址、限制敏感資訊的輸入,並強制落實既定安全政策。該瀏覽器同時支援公司管理的裝置與員工自攜的非管理裝置,確保唯有受信任的使用者,方能存取敏感的企業資源。NordLayer 的整合式工具讓實施 BYOD 更加安全可靠,但要維持高度安全性,仍需搭配定期的軟件更新、安全性測試,以及強健的身份驗證機制。結合運用 VPN、ZTNA 與企業瀏覽器,讓您的企業能以更低的安全風險,安心擁抱 BYOD 帶來的優勢。

 

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

NordLayer – 適用於企業的可切換網路安全平台

NordLayer 是由 Nord Security 開發的企業級網路安全解決方案。Nord Security 是全球知名的網路安全公司,以開發 NordVPN、NordPass、NordStellar 等產品聞名,致力於提供高效、可靠的網路安全技術。隨著企業工作環境的數位化與遠端辦公的普及,企業對於網路安全的需求日益增加。NordLayer 針對這些需求,提供靈活的網路保護機制,確保企業員工能夠安全存取內部資源,同時降低網路安全風險。

NordLayer 特色
NordLayer 為企業提供了一個可擴展、易於管理且高度安全的網路安全平台,能夠保護企業的數據、應用程式和員工遠端存取安全。其主要特色包括:

  • 安全遠端存取:使用端到端加密技術,確保員工從任何地點都能安全存取內部資源。
  • 可切換伺服器:提供全球多個伺服器節點,允許企業選擇最佳連線路徑,提升連線速度與穩定性。
  • 基於雲端的安全管理:不需額外硬體設備,IT 團隊可透過雲端控制面板進行即時設定與監控。
  • 多重身份驗證 (MFA):強化登入安全性,防止未授權存取企業內部系統。
  • IP 白名單與存取控制:允許企業限制特定 IP 位址存取內部資源,提升安全性與存取管理能力。
  • 整合現有 IT 基礎架構:支援與 Microsoft Azure、AWS、Google Cloud 及各種 SSO(單一登入)解決方案整合。

【核心優勢】
1.靈活性與可擴展性
NordLayer 採用訂閱式服務模式,企業可依據需求擴展或縮減使用範圍,無論是中小型企業還是跨國公司,都能快速部署並適應不同的安全需求。

2.高效能與穩定性
透過全球多個伺服器節點,NordLayer 確保企業員工能夠享受低延遲、高效能的網路體驗。即使在網路負載較高的情況下,仍能維持穩定連線。

3.強大的安全防護
NordLayer 採用軍事級加密技術,確保所有數據傳輸都受到保護。此外,內建的零信任架構(Zero Trust Architecture, ZTA)進一步提升了安全性,確保每次存取請求都受到驗證與授權。

4.簡單易用的管理後台
NordLayer 提供直覺式的雲端管理介面,IT 管理員能夠輕鬆監控網路活動、設定存取權限及進行系統更新,減少管理負擔。

5.合規性與法規遵循
NordLayer 支援 GDPR、ISO 27001 及其他國際安全標準,確保企業能夠符合法規要求,降低法律風險。

【應用場景】
1.遠端與混合辦公模式

  • 在當前遠端辦公普及的趨勢下,企業需確保員工在家或外出辦公時能夠安全存取內部系統。
  • NordLayer透過加密連線與身份驗證,防止未經授權的存取,降低遠端工作帶來的資安風險。
  • 適用於 IT、行銷、諮詢等需要靈活辦公模式的企業。

2.多分支機構與全球化企業

  • 企業在不同國家或地區設有辦公室時,NordLayer 可確保內部網路通訊的安全性,避免資料外洩。
  • 透過虛擬專屬網關 (Virtual Private Gateway),各地辦公室的員工能夠透過 NordLayer安全連線內部系統,而不需要昂貴的專線連線 (MPLS)。
  • 適用於跨國企業、物流公司、零售品牌等多據點組織。

3.雲端與 SaaS 應用保護

  • 使用 AWS、Azure、Google Cloud 或其他 SaaS 服務的企業,需確保雲端應用程式的存取安全。
  • NordLayer允許企業設置存取控制規則,例如限制特定 IP 或使用多重身份驗證 (MFA) 來提高安全性。
  • 適用於科技公司、數據分析公司、雲端應用開發商等。

4.防止數據洩露與內部資安管理

  • 企業內部可能存在敏感資訊,如財務報表、客戶資料、產品開發計劃等,若遭受攻擊或內部人員濫用,可能導致嚴重損失。
  • NordLayer可透過角色與權限管理,確保僅有授權人員可以存取特定資源,降低數據外洩風險。
  • 適用於銀行、保險公司、醫療機構等需要高度機密性的行業。

5.確保公共 Wi-Fi 連線安全

  • 員工可能會在咖啡廳、機場或共享辦公空間等公共場所使用不安全的 Wi-Fi 進行工作。
  • NordLayer提供加密 VPN 連線,確保數據傳輸安全,避免駭客攔截機密資訊。
  • 適用於經常出差的商務人士、新聞記者、自由工作者等。

【適合行業】
1.科技與 IT 服務業

  • 企業內部可能有大量機密數據、程式碼與客戶資訊,NordLayer可確保研發團隊的安全連線環境。
  • IT 服務公司經常需要遠端管理客戶的系統,使用 NordLayer可確保操作過程的安全性。

2.金融與保險業

  • 涉及客戶的銀行帳戶、交易數據與個人資訊,NordLayer可確保員工與客戶之間的通訊安全,避免詐騙與資料外洩。
  • 符合 GDPR、PCI-DSS 等金融行業的資安標準,提高監管合規性。

3.醫療與生命科學

  • 醫院、診所與醫療研究機構處理大量病患數據與研究資料,NordLayer提供 HIPAA 合規的安全連線方式。
  • 遠端醫療與醫療 IoT 設備的數據傳輸也能透過NordLayer保護。

4.法律與諮詢服務

律師事務所、商業顧問公司等機構常處理高度敏感的客戶資訊,NordLayer 能夠提供端對端的加密保護,確保所有通訊不被攔截或竄改。

5.製造業與供應鏈管理

  • 製造業公司需在全球各地管理供應鏈與合作夥伴,NordLayer 可確保生產管理系統 (MES) 和供應鏈數據的安全性。
  • 適用於智慧工廠、物流公司、進出口貿易企業等。

6.教育機構與研究機構

  • 大學、研究單位與教育機構需要保護學術研究數據,防止未經授權的存取或洩漏。
  • 適用於提供遠端學習、在線教學與國際合作研究的機構。

NordLayer提供靈活的安全解決方案,適用於各行各業,無論是保護遠端員工、確保雲端存取安全,還是提升內部網路防護,都能幫助企業建立更強大的資安防禦體系。

隨著數位化與遠端工作的趨勢持續發展,企業面臨的網路安全挑戰日益增加。NordLayer 透過強大的加密技術、靈活的存取管理、零信任架構及全球伺服器支援,為企業提供全面的網路安全解決方案。無論是小型企業還是大型跨國組織,NordLayer 都能協助企業提升安全性、保護機密數據並降低網路攻擊風險。

透過 NordLayer,企業能夠在不影響生產力的情況下,確保業務運行的安全性與穩定性,使員工能夠隨時隨地安心地存取企業內部資源,迎接數位化時代的挑戰。

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

MSP 的資料外洩防護(DLP)策略劇本:打造高價值的資安服務

在現今這個平均資料外洩成本超過 440 萬美元的時代,資料遺失防護(DLP)已從企業的奢侈品,轉變為核心業務的必要條件。對於託管服務供應商(MSP)而言,這是一個關鍵的機會:提供高價值的安全服務,以保護客戶、加深信任並創造持續性收入。 本劇本提供了一個全面的框架,幫助 MSP 建立並交付有效的 DLP 服務,涵蓋從初始策略到驅動它的工具等所有層面。

MSP 提供 DLP 服務的必要性

資料遺失防護是一套用於識別、監控和保護敏感資料的策略與工具,無論資料處於使用中、傳輸中或靜止狀態。對於 MSP 來說,提供 DLP 服務不再是可選項,它能讓您:
  • 成為值得信賴的安全顧問:超越基本的 IT 支援,提供針對人為錯誤、內部風險和資料外洩等威脅的策略性保護。
  • 降低客戶法律責任:協助客戶符合法規要求(如 GDPR 和 HIPAA),並避免高額的資料外洩罰款。
  • 交付可衡量的價值:透過主動降低風險和強化安全態勢來證明投資回報(ROI),從而證明更高價值服務層級的合理性。

有效 DLP 服務的六大支柱

為您的客戶建立一個強大的 DLP 策略,需要一個結構化、多層次的方法。遵循這六個關鍵支柱,以創造一個全面且有效的服務。
  1. 客戶資料探索與分類:您無法保護您不知道存在的東西。第一步是使用 DLP 工具掃描客戶的整個網絡 — 包括雲端儲存、端點和個人設備 — 以繪製所有敏感資料的地圖。一旦識別出來,根據其敏感度進行分類(例如,公開、機密、高度機密),以指導您的保護策略。
  2. 實施端到端加密:在資料被識別後,下一步是將其加密。加密將敏感資訊轉換為安全的代碼,使其對未經授權的使用者不可讀。這是保護傳輸中(在網絡上移動)和靜止中(在儲存中)資料的基本控制措施。
  3. 實施精細的存取控制:根據您的資料分類,實施嚴格的存取控制。這透過定義使用者角色並根據「最小權限原則」分配權限來實現 — 使用者應只能存取其工作絕對必要的資料。這是降低內部威脅最有效的方法之一。
  4. 持續資料監控與威脅偵測:DLP 策略不是「設定後就遺忘」。您必須持續監控資料以偵測危險的使用者行為和潛在的資料外洩。這包括監控使用中的資料(被存取或修改時)、傳輸中的資料(透過電子郵件或應用程式共享時)和靜止中的資料(在儲存中)。
  5. 建立客戶可用的事故應變計畫:當資料外洩發生時,迅速且有組織的應變至關重要。為每位客戶建立一份詳盡的事故應變計畫,概述識別、遏制和根除威脅的步驟,以及通知受影響方。這能將損害降至最低並加速恢復。
  6. 提供員工安全培訓:由於人為錯誤仍是資料外洩的主要原因,持續的員工培訓至關重要。為您的客戶團隊提供定期培訓,教導他們如何識別釣魚攻擊、遵守資料保護政策和養成良好的憑證衛生習慣。這有助於建立強大的、安全至上的文化。

使用 NordLayer 為您的 DLP 服務賦能

執行全面的 DLP 策略需要正確的工具。NordLayer 為 MSP 提供了設計用於驅動有效 DLP 服務的系列功能。
  • 針對支柱 3(存取控制):NordLayer 的網絡存取控制(NAC)和身份與存取管理(IAM)功能確保只有經過授權和符合規範的設備才能連接到網絡,同時保證正確的使用者擁有對正確資料的存取權限。
  • 針對支柱 4(資料監控):雲端防火牆讓您能夠保護雲端流量,實施精細的過濾規則,並降低內部威脅和資料外洩的風險。
  • 針對支柱 2(加密):進階的 AES 256 位元加密保護所有傳輸中的資料,確保即使被攔截也無法讀取。

透過合作夥伴關係發展您的業務

希望提升您的安全服務並為客戶提供更多價值嗎?NordLayer 合作夥伴計畫提供進階安全解決方案,幫助您的 MSP 業務成長。

關於 NordStellar
NordStellar 是一款威脅暴露管理平台,讓企業能在威脅升級前檢測並應對網絡威脅。作為平台和API 提供,NordStellar可洞察威脅行為者的活動及其對受損數據的處置方式。NordStellar 由Nord Security 設計,該公司以其全球知名的數碼私隱工具 NordVPN 而聞名。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

什麼是攻擊面管理 (Attack Surface Management – ASM) 及 NordLayer 如何提供幫助

重點摘要

  • 攻擊面管理(ASM)旨在識別、分類、排定優先順序並監控企業數碼資產所有潛在的網絡攻擊切入點
  • 核心 ASM 功能包括資產識別、風險分類、漏洞優先排序和持續監控
  • 實施 ASM 涉及漏洞分析、評估供應商,以及在部署後建立相關政策
  • 漏洞管理則負責識別、分析和解決跨網絡和裝置的安全風險
  • 企業可以透過零信任策略、安全遙距存取、強身份驗證和保護性備份來降低攻擊面風險

 

什麼是攻擊面?

企業的攻擊面指的是所有漏洞、弱點和潛在切入點的總和,黑客可能利用這些切入點來獲得未經授權的系統或數據存取權限。網絡攻擊面越大,暴露的區域越多,成功入侵的風險就越高。攻擊面管理側重於識別和減少這些暴露點。

  • 已知資產
    這些是 IT 資產,例如安全團隊已知且已在網絡上主動配置的裝置、應用程式和基礎設施。已知資產會定期接受監控和安全狀態評估。
  • 未知資產
    相反地,未知資產是指未識別的裝置、影子 IT 系統或在網絡上運作而安全團隊不知情的未經授權應用程式。這些流氓元素會顯著增加風險,因為它們缺乏適當的安全控制。
  • 流氓資產(Rogue Assets)
    雖然也是未經授權的,但流氓資產專指已被劫持或入侵以進行惡意活動(例如部署勒索軟件)的已知資產。偵測這些資產可能具有挑戰性。
  • 供應商連線
    除了內部資產之外,企業的供應商和第三方整合也會擴大外部攻擊面。雲端供應商、SaaS 工具、承包商和合作夥伴可能會引入新的漏洞,需要加以監控和保護。

企業可以透過持續發現和評估構成外部暴露數碼攻擊面的所有這些組件,隨著時間的推移有系統地降低其整體網絡風險。

 

攻擊面管理的範例

企業的攻擊面由所有暴露於潛在威脅的資產組成,包括內部部署系統、雲端資產、面向網絡的資產和流動裝置。隨著企業進行數碼轉型,其攻擊面會不斷擴大和變化,引入新的攻擊媒介和網絡風險。

為了更好地理解攻擊面的概念,讓我們看看一些具體範例,以及惡意行為者如何利用它們:

  • Web 應用程式:Web 應用程式是常見的攻擊媒介,因為它們通常暴露於公共網絡,並且可能包含攻擊者可以利用的漏洞,以獲得未經授權的敏感數據存取權限
  • 雲端環境:雲端環境引入了新的網絡風險,例如錯誤配置的安全設定、不安全的 API 和共享資源 —— 攻擊者可以利用這些漏洞來存取敏感數據或對其他雲端租戶發動攻擊
  • 第三方風險:第三方供應商和合作夥伴可能會在企業的網絡中引入新的漏洞;例如,供應商的受損系統可能會為攻擊者提供進入企業網絡的立足點
  • 遙距存取:遙距存取解決方案(例如 VPN 和遙距桌面協定 (RDP))可能成為攻擊者的目標,以獲得公司網絡的存取權限
  • 物聯網裝置:物聯網(IoT)裝置(例如安全攝影機和智能恆溫器)容易受到攻擊,並為攻擊者提供進入企業網絡的立足點

 

為什麼攻擊面管理很重要?

攻擊面管理至關重要,因為它可以幫助企業更好地了解和控制日益複雜的 IT 生態系統,其中包含許多潛在的攻擊者切入點。隨著企業採用雲端服務和遙距工作解決方案,並與更多第三方整合,企業的攻擊面會迅速擴大。

任何這些暴露區域中未修補的漏洞都可能導致嚴重的數據洩露。全面的攻擊面監控和緩解使團隊能夠透過持續識別和解決安全弱點和漏洞,在威脅發生之前領先一步。

 

攻擊面管理的組成部分

鑑於我們剛才介紹的廣泛暴露區域,攻擊面管理需要一個戰略性的、持續的流程,才能正確地識別和降低風險。

有效攻擊面管理計劃的核心組成部分包括:

  • 識別:基本步驟之一是進行徹底的發現,以識別內部網絡和雲端基礎設施中的惡意或流氓資產。由於每個資產都可能隱藏特定的漏洞,因此需要全面的可見性才能為緩解計劃提供資訊
  • 分類:並非所有漏洞都構成相同的風險,因此必須根據嚴重程度和對企業網絡的潛在影響,對識別出的問題進行分類和分級。這使得可以優先考慮最關鍵的暴露區域
  • 優先排序:對漏洞進行分類後,安全團隊可以根據風險等級,有策略地優先排序補救措施。此優先排序會指導系統地部署緩解措施的實施藍圖
  • 監控:攻擊面是動態的,因此監控必須是一個持續的過程,以快速發現數碼資產中出現的新漏洞。快速發現可以實現快速響應,防止漏洞被利用。

 

如何實施攻擊面管理

即使是小型企業也可能擁有巨大的攻擊面。黑客可以利用每個面向網絡的資產來進入內部網絡。許多攻擊面管理供應商承諾他們的產品是「一鍵式」解決方案,但其實施是一個多步驟的過程。

在攻擊者之前發現漏洞並加以修補有助於維護企業的安全性。持續的網絡安全漏洞評估可以顯著降低風險。

 

攻擊面管理常見問題

  • 是否有攻擊面管理工具?
    是的,有幾種商業攻擊面管理解決方案和平台可從網絡安全供應商處獲得。這些工具旨在幫助企業自動發現、監控和評估其在面向網絡的已知和未知資產上的整個外部攻擊面這些解決方案使用網絡掃描、程式碼分析、數據挖掘和威脅情報等技術,持續繪製企業在 Web 應用程式、網域、IP、程式碼儲存庫等方面的網絡暴露情況。它們可以偵測未知 / 流氓資產、監控錯誤配置的系統,並根據風險確定補救措施的優先順序。
  • 企業如何保護自己免受網絡攻擊?
    攻擊面管理可以透過提供對企業網絡中內部和外部資產的持續可見性和監控,幫助企業最大限度地降低風險並防範可能的攻擊媒介。透過識別已知漏洞和安全漏洞並確定其補救措施的優先順序,企業可以最大限度地減少其攻擊面可見性,並防範潛在威脅安全團隊和威脅情報也可以提供攻擊面管理解決方案,以幫助安全領導者決定將資源集中在哪裡。持續發現和滲透測試也有助於識別新的攻擊媒介,並確保企業的暴露管理策略是最新的

 

什麼是外部攻擊面管理?

外部攻擊面專指暴露於公共網絡的組件 —— 網站、伺服器、雲端基礎設施和可從公司網絡外部存取的資源。這是最容易受到外部網絡威脅行為者攻擊的區域。強大的外部攻擊面管理和安全營運對於防止源自網絡攻擊的入侵、數據洩露和系統洩密至關重要。

 

NordLayer 如何提供幫助?

NordLayer 提供以安全服務邊緣(Security Service Edge – SSE)為中心的網絡管理解決方案,以滿足動態企業的需求。它提供公司網絡的完整概覽,允許將其劃分為單獨的團隊和閘道,並最大限度地減少攻擊面。

使用 NordLayer,您可以拒絕來自越獄裝置的連線,以保護您的網絡免受潛在風險。這對於實施「攜帶裝置(BYOD)」政策的企業來說非常有益,這些企業通常擁有很大的攻擊面。這是更好地控制內部網絡並最大限度地減少企業暴露於網絡威脅的絕佳起點。

聯絡我們的團隊,了解更多方法,這可以改善貴公司企業的網絡安全狀態。

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

專用 IP (Dedicated IP)與共享 IP(Shared IP): 哪個更適合您?

在管理 IT 基礎建設時,其中一個關鍵問題是選擇專用 IP 還是共享 IP。兩者各有優缺點,最終選擇應根據您的具體需求和優先順序來決定。

本文將深入探討專用 IP 和共享 IP 之間的差異,並提供您在選擇時應考慮的因素,協助您充分了解這兩種方案,並做出最適合您業務需求的明智決策。

什麼是 IP?

網際網絡協定(IP)是一組規範數據如何在網際網絡上傳輸的規則。它讓不同的裝置能夠透過共享系統相互溝通。使用者通常不會直接與 IP 位址互動,而是透過網域名稱。DNS 解析器負責檢索唯一的 IP 識別碼。

每個連接網際網絡的裝置都有一個獨特的 IP 位址,確保數據可以準確地傳輸到該裝置和從該裝置傳輸。數據封包的路由是透過結合來源和目的地 IP 位址來完成的。

此外,IP 位址有兩個版本:IPv4 和 IPv6。IPv4 是較舊的版本,使用 32 位元格式,最多可容納 43 億個獨特位址。IPv6 則使用 128 位元格式,可容納數量龐大的獨特位址。這是一種前瞻性的措施,可提供更多可用的位址組合。

什麼是共享 IP?

共享 IP 或動態 IP 是指多個使用者共用的 IP 位址。就外部 IP 位址而言,單一網絡上的多個使用者會使用同一個共享 IP 位址連線到網際網絡。此 IP 位址由網際網絡服務供應商(ISP)分配,並由連接到該網絡的所有裝置共享。

ISP 負責管理共享 IP 位址的輪換,並在其使用者群之間輪換這些位址。共享 IP 位址通常從 ISP 維護的位址池中分配,以改善資源使用率,任何使用者都無法獨佔。這有助於降低 IP 位址的維護成本,並提升 ISP 的使用效率。

共享 IP 如何運作?

共享 IP 位址的運作方式與其他 IP 位址相同 —— 它支援兩個目的地之間的數據交換。由於共享 IP 位址會在大量使用者之間輪換,因此外部網站無法區分透過共享 IP 位址池存取網站的裝置或使用者。

這可能會導致一些問題,例如:

  • 難以識別特定裝置:當多個裝置共用同一個 IP 位址時,就很難識別造成問題或從事可疑活動的特定裝置
  • 聲譽問題:如果使用共享 IP 位址的任何裝置從事垃圾郵件、網絡釣魚或其他惡意活動,可能會導致該共享 IP 位址被列入黑名單,進而對使用該 IP 位址的所有裝置的聲譽產生負面影響
  • 效能考量:共用 IP 位址本身不會降低網際網絡速度或效能。然而,當多個使用者共用相同的網絡資源(例如頻寬或伺服器容量)時,某些使用者的過度使用可能會導致其他使用者的回應時間變慢或效能降低

不過,在內部,同一共享 IP 位址上的每個裝置或使用者都會擁有一個獨特的內部 IP 位址。網絡會使用稱為網絡位址轉換(NAT)的程序,在外部共享 IP 位址和每個裝置的內部 IP 位址之間進行轉換。

什麼是專用 IP?

專用 IP 是指由單一實體獨佔的 IP 位址,而不是在多個使用者或裝置之間共享。通常需要支付額外費用才能取得,通常是透過 ISP、VPN 服務、託管供應商或其他網絡服務供應商。這些位址由區域網際網絡註冊管理機構(RIR)分配,通常用於安全遙距存取、電子郵件傳遞和其他特殊網絡需求。

在某些情況下,企業需要對其 IP 位址進行更嚴格的控制,這時專用 IP 就非常有用。允許列表(僅限制特定資源的存取權限給批准的 IP 位址)有助於網絡管理員最大限度地減少安全漏洞,並降低未經授權存取的風險。

專用 IP 如何運作?

專用 IP 會獨自分配給特定的裝置或使用者,而不是在多個裝置或服務之間共享。這表示位址不會重置或分配給其他使用者。

缺點是專用 IP 位址通常需要額外費用。然而,它們能提供更大的網絡管理控制權。例如,網絡管理員可以透過指定允許列表中的專用 IP 位址來防止未經授權存取內部系統。如此一來,只有符合的 IP 才能被允許連線,從而防止入侵者嘗試連線。此外,擁有固定的 IP 可以減少使用者在瀏覽時必須填寫的驗證碼數量,並降低 IP 被列入黑名單的風險,從而實現更快、更安全的連線。

專用 IP 與共享 IP 位址的比較

專用 IP 和共享 IP 位址之間的主要差異在於其專有性。共享 IP 位址可供所有使用者免費使用,且其所有權會輪換。而專用 IP 位址則保留給單一實體。

在大多數情況下,共享 IP 位址符合成本效益,且不需要任何維護。然而,在商業環境中,使用專用 IP 位址通常更有意義。

  • 電子郵件行銷:企業經常使用外部專用 IP 位址向客戶發送大量電子郵件。與共享 IP 不同,專用 IP 可確保乾淨的寄件者聲譽,因為它不受其他使用者行為的影響。這能更好地控制電子郵件的送達率和聲譽管理,降低電子郵件被標記為垃圾郵件的風險
  • 網站託管:專用 IP 位址通常由需要高安全性或有特定法規遵循要求的企業使用。這能更輕鬆地確保網站或 Web 應用程式與同一伺服器上的其他網站隔離,並降低跨站污染的風險
  • 虛擬私人網絡(VPN):需要遙距存取其內部網絡的企業(例如遙距員工或承包商)會使用專用 IP 位址。專用 IP 位址可確保遙距使用者始終連線到同一個 IP 位址,從而提供更高的安全性和控制力。這也為網絡管理員提供了更多安全客製化選項。

簡而言之,共享 IP 位址既便宜又易於維護,但缺點是網絡安全風險較高。另一方面,專用 IP 位址提供更高的控制力、私隱性和安全性,但成本也較高。

選擇共享 IP 或專用 IP 取決於您的需求 —— 無論是電子郵件行銷、網站託管還是安全遙距存取。如果網絡安全和受控遙距存取是您的優先事項,那麼專用 IP 可以提供額外的保護層。

NordLayer 提供專用 IP 位址,以建立虛擬私人閘道、啟用 IP 白名單,並實施多層網絡安全措施。這可確保安全存取公司資源,同時維持網絡的可見性和控制力。

透過 NordLayer,您可以簡化安全存取,無需額外的硬件投資,也能隨著公司企業的成長輕鬆擴展。立即聯絡我們,深入了解專用 IP 如何強化您的網絡安全策略。

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

2023 年創業成功的 5 個關鍵商業應用程序

Starting a business is in itself a daunting task, but keeping it successful on top of that requires immense effort and skill. A tight budget and so many choices when it comes to managing said business can take a toll on any startup. Moreover, a huge part of maintaining that success is having the right tools. 

Woman sits on sofa and uses her smartphone with a smile on her face.Nowadays, enterprise applications and software play a vital role when it comes to having a flourishing business as they help keep organizational and scaling headaches to a minimum. From office management to cybersecurity solutions, we’ve compiled a list of apps that will take your startup to the next level!

Flanco – for your office and property management

Flanco introduces itself as “the future of workspace” – and for good reason! It’s an office app that helps manage desk space and workplace resources. Need to easily book a desk or meeting room? Flanco has got you covered. Need to know which meeting rooms are booked in real time? Flanco comes to the rescue once again. Not to mention that the app itself has an intuitive interface and is fairly simple to use. For startups, it’s an all-in-one property manager. Effortlessly manage assets, accounting, vendor contracts, parking – Flanco has it all.

Slack – for your organizational communications

Slack is definitely king when it comes to communicating with the team, and doing so quickly and efficiently. A rock-solid communication platform will always be a crucial cog in the successful startup, especially when so many things are discussed on the go. Message people directly, create project-focused channels, or break into smaller chats to share key information with relevant stakeholders. Slack has searchable history and numerous app integrations that just make the job easier. In addition, you can set up reminders, add team members in the middle of conversations to keep them in the loop, and that’s only the tip of the iceberg when it comes to this app.

NordLayer – for your business privacy and security

Business cybersecurity is a must, period. In this day and age, when it comes to protecting your assets, customers, and team, there can be no shortcuts. Having your business fortified is essential – and NordLayer does just that and more. A robust network access security tool, it has numerous useful features like shared gateways for employees, DNS filtering, and other tricks to keep you secure. NordLayer will ensure that your company’s resources are protected and employees can securely access their work from anywhere. Furthermore, it offers a centralized control panel for convenient payment, features, and user management. Already have an existing company infrastructure? No worries, NordLayer can be easily integrated into Azure, Google Workspace, AWS and more.

Notion – for your docs and project management

Project management is no easy task, especially when there are multiple projects, deadlines and stakeholders involved. Want to keep track of the status of your project? Need to know what’s already been done? Notion is the tool you need. It’s useful for keeping tasks in order, and having workflows, docs, and guidelines in one place. You can create your own Wiki, and Notion even helps with building roadmaps and planning sprints. It’s a great tool for a neat and uncomplicated visual workflow in general. Another excellent feature is the ability to integrate it with Jira, Slack, Google Drive, and other apps for a truly seamless workflow.

Hootsuite – for your social media management

Let’s face it, competition is everywhere. If you’re running a business, social media is a tried-and-trusted approach to being seen, heard, and having a place under the sun. Social media is important for numerous reasons – increasing brand awareness, receiving direct feedback, customer engagement, and posting relevant content. However, managing multiple social media accounts can be a bit of a hassle. This is where Hootsuite comes in. This tool helps to schedule and publish content, monitor trends, and understand your audience. Everything can be done from a single handy dashboard, saving you precious time and resources.

Just the tip of the iceberg

This apps list for startups only scratches the surface of the myriad of possibilities out there. Depending on the category and profile of your business, there are dozens if not hundreds of apps and tools that could help you raise and maintain a successful business. These are just a few of what we think would be a good base to start out with, as they cover the most fundamental of needs. As mentioned previously, having the right tools can immensely help to stay on track, meet your goals, and simply be better organized – this is what tools are made for!


5 business apps for startup success in 2023

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

垃圾箱潛水應用內存

Penetration testers hunt for weak spots in applications so vulnerabilities can be fixed before bad actors find them. One way to find those weak spots is to inspect application memory to see if sensitive data is being stored in a way that hackers can access. In this article, we’ll explain how pen testers use the memory inspection process to strengthen app security.

What is memory inspection?
Applications have memories — data that is generated from application processes is then stored within the app’s files, either on a device or in the cloud. If an app hasn’t been set up securely, a hacker could dive into those files and retrieve sensitive data.

White hat hackers — the people who hunt for vulnerabilities so they can be patched — can also use these same methods for good. By searching through the memories of mobile and desktop apps, as well as inspecting the installer file contents, they can unearth potential risks and keep users safe.

Dumping the memory

The first step in the inspection process is extracting the memory from an application. This is easily done on a Windows OS — we just open the task manager and create a dump file. On a Unix operating system, the relevant information is kept in /proc/<PID>/mem and /proc/<PID>/maps.

MacOS, on the other hand, requires us to boot into recovery mode and disable System Integrity Protection. This feature protects processes from being modified or tampered with. Having done this, we can then make a process dump.

Memory dumping gets a bit trickier when we approach mobile applications. Mobile devices usually require root privileges in order to extract the contents from an app’s memory with the help of the Frida tool.

After this step, we should be left with a “.txt” or a “.dmp” file which contains the extracted memory. It is a good idea to run this file through the “strings” utility to filter human-readable strings of a particular length because the dump might contain non-ASCII characters.

Searching for secrets

Once we have dumped the memory, we can start working with what we have. Primarily, we are now searching for information that reveals the following:

  • Session identification values

  • Access tokens

  • Service account credentials

  • Personally identifiable information

  • Authentication passwords

  • Database connection strings

  • Encryption keys and other master secrets

  • Data of a higher security classification than the logging system is allowed to store

  • Commercially sensitive information

  • Information that is illegal to collect in the relevant jurisdictions

  • Information a user has opted out of collection, or not consented to

The sensitive information listed above could be used by malicious actors for their own benefit. If this information is available through memory inspection, that’s a problem that needs to be fixed.

It would also be a good idea to use automated scripts that are able to pick out various access tokens, API keys, and any other values. For example, the following regex rule can be used to find AWS keys:

((‘|”)((?:ASIA|AKIA|AROA|AIDA)([A-Z0-7]{16}))(‘|”).*?(n^.*?){0,4}((‘|”)[a-zA-Z0-9+/]{40}(‘|”))+|(‘|”)[a-zA-Z0-9+/]{40}(‘|”).*?(n^.*?){0,3}(‘|”)((?:ASIA|AKIA|AROA|AIDA)([A-Z0-7]{16}))(‘|”))+

Source: I scanned every package on PyPi and found 57 live AWS keys | Tom Forbes

Understanding the risks

With many applications now storing data and running processes in the cloud, the risks posed by hackers who dumpster dive app memory are even greater. If bad actors can find service account credentials, Google API keys, and Firebase URLs in the dump, they could use these to their advantage.

Usually, service account credentials are used to retrieve an application’s remote configuration. If an attacker gets hold of valid credentials to access cloud systems that are improperly configured, no amount of firewalls can keep them from accessing the computing, network, and storage assets in that cloud environment.

It should be noted, however, that leaving account keys in the memory is not a problem as long as the IAM is configured correctly and the principle of least privilege is applied.

A penetration tester should pay close attention to the scope of tokens left in app memory as well as privileges to service accounts, both of which can be as dangerous as the exposed service account credentials.

Even if we do not find any security vulnerabilities, memory inspection is still worthwhile. We might discover unused tokens or accounts that are no longer needed, and deleting these can cut costs in addition to reducing security risks.

Fixing the vulnerabilities

The purpose of memory inspection is to find possible vulnerabilities and sensitive data that might be exposed. Afterwards, such vulnerabilities have to be fixed.

The principle of least privilege should be applied when resolving memory issues. Keep only absolutely necessary data and throw out everything else. This is a simple concept that will limit the potential for you to disclose sensitive information.

Checking application memory may be considered low hanging fruit in the cybersecurity world. However, any information stored or processed in a client’s memory is available to administrators and should be regularly checked from the vendor’s side.

We all make mistakes, and it is useful to carry out an inspection periodically. Doing so not only helps us to find and fix the errors but also deepens our understanding of the application’s inner workings.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

2022 年必須知道的網絡安全統計數據

Cybersecurity is a critical concern for organizations worldwide. In 2022, we saw an unprecedented increase in the number and severity of cyber attacks. With more people working remotely, organizations have become more vulnerable to attacks. Cybercriminals continue to target businesses across all industries, using various tactics to breach networks and access personal data.

This article will delve into the most significant cybersecurity statistics of 2022, including the key numbers, data breaches with the most substantial impact, vulnerable industries, types of attacks, prevention actions, and the cost of cybercrime. Understanding these statistics is mandatory for businesses to develop effective security strategies and protect their data from malicious actors.

Key numbers of 2022 

  1. A staggering 82% of all breaches involved the “human element” using stolen credentials, phishing, human error, and misuse. (Verizon)

  2. Data compromises, such as data breaches, exposure, and leakage, impacted over 422 million people. (ITRC)

  3. Supply chain attacks accounted for 19% of all cyber security incidents. (IBM)

  4. In Q4 of 2022, the number of cyberattacks worldwide reached an unparalleled level, with each organization experiencing an average of 1168 attacks per week. (Checkpoint)

  5. Servers were involved in 84% of all cyber security incidents, with web application servers and mail servers accounting for 56% and 28% of these incidents, respectively. (Verizon)

  6. Nearly half of all cyber security incidents (47%) pertained to personally identifiable information (PII), while another 46% involved authentication credentials. Payment card data was affected in only 7% of the incidents. (Verizon)

  7. Cyberattacks surged in the USA, with a staggering 57% increase. Latin America experienced a 29% increase, while Europe and Singapore both saw a 26% increase. Meanwhile, the UK encountered a shocking 77% spike in cyberattacks. (Checkpoint)

  8. 83% of organizations experienced more than one data breach. (IBM)

  9. There was a 38% increase in global cyberattacks compared to the previous year. (Checkpoint)

  10. Almost 1 billion emails were exposed, affecting one in five internet users. (AAG)

The top 10 most significant data breaches of 2022

We present the most impactful data breaches of the last year.

10. The Axie Infinity’s crypto theft

Axie Infinity is an online video game that uses Ethereum-based cryptocurrencies and NFTs. As the games services heavily rely on blockchain service Ronin, cyber criminals managed to infiltrate the system. They were able to take control of the network and send 173,600 ethers worth about $600 million and withdraw $25.5 million worth of coin. This has now become one of the largest thefts in the history of cryptocurrencies and online gaming.

9. Cash App data breach

In April, a disgruntled former employee of Cash App, a payment company, took it upon himself to breach the company’s system. The hacker managed to access sensitive reports, including the names, portfolio values, and brokerage account numbers of more than 8 million clients, which they then stole.

8. Costa Rica’s government ransomware attack

The Costa Rican government suffered a major cyberattack when the Conti ransomware gang successfully breached their systems. The group gained access to highly valuable data, which they stole and then demanded a hefty ransom of $20 million.

This forced the Central American government to declare a state of emergency. Shockingly, weeks after the attack, 670 GB of data, representing 90% of the information that had been accessed, was posted to a leak site by the threat group.

7. Neopets data breach

Last July, a database with account details of 69 million Neopets game users was found for sale on an internet forum. The data included names, email addresses, zip codes, genders, and birth dates. An inquiry found that cyber attackers had infiltrated the Neopets IT systems and had unauthorized access to it for a prolonged period, from January 3, 2021, to July 19, 2022, spanning over 18 months.

6. Revolut data breach

In September 2022, a data breach occurred at fintech start-up Revolut, resulting in personal information of more than 50,000 users being accessed by a third-party. The breached data included names, addresses, and partial payment card information. However, Revolut assured that the card details were masked. The Lithuanian government commended Revolut for taking immediate action to eliminate the attacker’s access to the data once the breach was detected.

5. Shein data breach

In October, Shein and Romwe’s parent company Zoetop Business was fined $1.9 million by the state of New York for not disclosing a data breach that impacted 39 million customers. The breach occurred in July 2018 when a malicious third party accessed Shein’s payment systems. Shein was informed by their payment processor that their system had been infiltrated and customer card data had been stolen. The discovery was made after the credit card net
work found Shein customers’ payment details for sale on the dark web.

4. Hacker allegedly hits both Uber & Rockstar

Between September 15-19, a hacker allegedly targeted both Uber and Rockstar. In the Uber breach, the hacker accessed the company’s internal servers using malware installed on a contractor’s device. They then posted a message to a company-wide Slack channel and reconfigured Uber’s OpenDNS to display a graphic image to employees on some internal sites.

In the same timeframe, the Rockstar Games’ developer suffered a network intrusion, leading an unauthorized third party to illegally access and download confidential information, including gameplay footage of the unreleased Grand Theft Auto 6 game. The hacker claimed they obtained the footage by hacking into a Slack channel used for communication about the game.

3. Medibank data leak

Australian healthcare and insurance provider Medibank detected “unusual activity” on its internal systems on October 13. By November 7, Medibank announced that a hacker had stolen the confidential data of 9.7 million past and present customers, including personally identifying information and medical procedure codes. Despite the hacker’s demands for ransom, Medibank refused to pay.

On November 9, the hacker released files containing customer data labeled “good-list” and “naughty-list,” with the latter reportedly including sensitive information on those who sought medical treatment for HIV, drug addiction or alcohol abuse, and mental health issues like eating disorders. The hacker posted a file labeled “abortions” containing information on claimed procedures to a site backed by the Russian ransomware group REvil on November 10.

2. BidenCash data breach

On October 12, carding marketplace BidenCash made public the details of 1.2 million credit cards expiring between 2023 and 2026. The leaked information, which included other necessary details for making online transactions, was posted on the dark web site for free.

BidenCash had leaked the details of a few thousand credit cards in June, likely as a promotional stunt, and as the site had launched new URLs in September due to a series of DDoS attacks, some experts speculated that this new release could be another attempt at advertising.

1. Twitter data breach

Twitter faced accusations of attempting to cover up a major data breach that compromised the personal information of millions of users. In July, a hacker who went by the name ‘devil’ claimed to have the data of 5.4 million Twitter accounts for sale on BreachForums, including email addresses and phone numbers belonging to celebrities, companies, and regular users.

The stolen data also included information from “OGs,” which are highly desirable Twitter handles consisting of one or two letters or a word with no misspelling, numbers, or punctuation. The hacker demanded a minimum of $30,000 for the database. The data breach, resulting from a vulnerability in Twitter’s system that was discovered in January, caused significant concern among the public and further highlighted the ongoing need for strong cybersecurity measures.

Most targeted industries in 2022

As we embark on a new year, the cyber threat landscape is continuously evolving, making it more challenging for organizations to keep up with the pace of these attacks. From ransomware to phishing scams, no industry is immune to cyber threats.

This list highlights the top 10 most targeted industries in 2022, based on the IBM X-Force 2022 Threat Intelligence Index report. And hopefully, a better understanding of the threat landscape in different industries can help organizations adopt robust cybersecurity strategies to safeguard their systems, data, and customers against cybercriminals.

Media & telecommunications – 0.5%

Last year, media and telecommunications industries remained relatively unscathed, with a mere 0.5% of incidents reported. However, it is worth noting that external remote services such as VPNs and valid domain accounts were often exploited to gain unauthorized access, resulting in ransomware attacks.

The consequences of these attacks were severe, ranging from data theft, leaks, and destruction to extortion, and involved the deployment of data exfiltration tools and ransomware. Despite their low incidence rate, the potential impact of cyber threats on media and telecom companies cannot be underestimated.

Transportation – 3.9%

Transportation dropped from seventh to ninth place in the 2022 X-Force report, but the industry remained a frequent target, accounting for 3.9% of incidents. Phishing was the primary method of initial access, with links, attachments, and spear phishing equally represented. Valid local accounts were also exploited in 33% of cases, while valid cloud accounts were used in 17%.

The top objectives were server access and deployment of remote access tools, followed by spam campaigns, ransomware, backdoors, and defacement. Data theft was the most common outcome, occurring in half of all cases, with extortion and brand reputation damage also common. European transportation entities were the hardest hit, accounting for 62% of cases, with Asia-Pacific in second place at just over 37%.

Government – 4.8%

Government entities were one of the prime targets of cyberattacks in 2022, with backdoors and DDoS attacks accounting for 25% of cases each. Public sector networks contain a wealth of sensitive information, making them a popular objective for cyber espionage campaigns aimed at stealing PII and other data. Malicious Office documents were found in 17% of cases, while the remaining 83% involved cryptominers, credential acquisition tools, ransomware, and web shells.

X-Force attributed incidents in this sector to cybercriminals, insider threats, hacktivists, and state-sponsored groups conducting espionage, each accounting for an equal share. Infection vectors were primarily public-facing applications and spear phishing attachments, with valid default accounts exploited in 20% of cases. Asia-Pacific governments were hit the hardest, with 50% of cases, followed by Europe at 30% and North America at 20%.

Healthcare – 5.8%

Still being the top object of international cyberattacks, the healthcare industry experienced a decline from sixth place in 2021. X-Force responded to approximately 5%-6% of healthcare cases in the last three years. Backdoor attacks and web shells were prevalent, accounting for 27% and 18% of cases, respectively.

Adware, BEC, cryptominers, loaders, reconnaissance and scanning tools, and remote access tools made up 9% of cases each. Most of the observed impacts were from reconnaissance at 50%, while data theft and digital currency mining each accounted for 25% of cases. European-based healthcare entities were targeted the most, comprising 58% of incidents, with the remaining 42% in North America.

Education – 7.3%

Backdoor attacks in the education sector comprised 20% of incidents
X-Force responded to. Ransomware, adware, and spam each accounted for 13% of incidents. Exploitation of public-facing applications was the most common initial access vector at 42%, followed by spear phishing attachments at 25%. Asia-Pacific was the region with the highest number of cases at 67%, followed by North America at 27%, and Latin America at 6%.

Retail and wholesale – 8.7%

The retail and wholesale industry maintained its position as the fifth-most targeted industry, as per the X-Force report for 2022. Spear phishing emails with malicious links were the most common initial access vector at 33%. Ransomware, backdoors and BEC were the most common attack types, each accounting for 19% of incidents.

Victims experienced extortion in half of the cases, while credential harvesting and financial loss were observed in 25% of cases each. North America and Latin America had the highest number of cases at 39% each, while Europe accounted for 22% of incidents.

Energy – 10.7%

The energy sector, encompassing electric utilities and oil and gas companies, was the fourth-most targeted industry with 10.7% of attacks. Attackers commonly gained initial access through the exploitation of public-facing applications (40%), spear phishing links (20%), or external remote services (20%). Botnets were the top method of attack in 19% of cases, followed by ransomware and BEC at 15% each.

North American organizations were the most targeted at 46%. Incidents involved data theft and extortion in 23% of cases, while credential harvesting and botnet infections were observed in 15% of cases each. The energy sector faces pressure from various global factors, particularly those exacerbated by Russia’s aggression in Ukraine and its impact on the already unstable global energy trade.

Professional, business & consumer services – 14.6%

The professional services industry, including consultancies and law firms, was the target of 52% of cyber attacks in this category. Business services, such as IT and advertising, accounted for 37% of attacks, while consumer services made up 11%.

Ransomware and backdoor attacks were the most frequent types of attacks, with public-facing applications and remote services being the top infection vectors. Extortion was the most common attack type.

Finance & insurance – 18.9%

Last year the finance and insurance organizations were the target of 18.9% of cyber attacks, earning it second place in this list. Despite a slight decrease in attacks over the past few years, finance and insurance organizations remain prime targets due to their advanced digital transformation and cloud adoption progress.

Backdoor attacks were the most common objective at 29%, followed by ransomware and maldocs at 11% each. Spear phishing attachments were the top infection vector, responsible for 53% of attacks. Europe experienced the highest volume of attacks at 33%, followed by Asia-Pacific at 31%. Latin America, North America, and the Middle East and Africa experienced approximately 15%, 10%, and 10% of incidents, respectively.

Manufacturing – 24.8%

The manufacturing industry was the most targeted in 2022, with backdoors being deployed in 28% of incidents and spear phishing and public-facing applications being the top infection vectors at 28% each. External remote services accounted for 14% of incidents, while spear phishing links and valid default accounts were tied for third place at 10%.

Extortion was the top impact on manufacturing organizations, followed by data theft and leaks. The Asia-Pacific region had the most incidents at approximately 61% of cases, while Europe and North America tied for second place at 14%. Latin America accounted for 8% of incidents, and the Middle East and Africa had 4%.

Most common cyber attacks in 2022

With the increasing use of technology in our daily lives, cybercriminals are finding new ways to exploit vulnerabilities in web applications, cloud services, Internet of Things (IoT) devices, and human behavior.

We present to you the top 10 list of cyber attacks with the hope that you can take steps to protect yourself and your data from potential cyber threats in the future.

10. SQL injection & Cross-site Scripting (XSS)

SQL injection and Cross-site Scripting (XSS) are common types of cyber attacks in 2022 that exploit vulnerabilities in web applications. SQL injection attacks can be used to insert malicious code into an SQL database, potentially giving attackers access to sensitive information or control over the entire system. Use parameterized queries to prevent SQL injection attacks and keep your software up-to-date.

XSS attacks use third-party online resources to insert malicious scripts into legitimate websites or applications to obtain user information. Attackers commonly use JavaScript, Microsoft VBScript, ActiveX, or Adobe Flash for XSS attacks. Web apps are often vulnerable to XSS attacks when they receive user input without validating or encoding it in their output.

9. Cloud jacking

Cloud jacking, also known as cloud hijacking, targets data stored in external cloud services such as Salesforce or Microsoft Azure. Hackers exploit poorly secured loopholes to steal data since modern enterprises increasingly use cloud-based services. Since most users do not store many files locally, cyber criminals find targeting the centers housing the data more worthwhile. Common methods include exploiting cloud provider management software vulnerabilities or cracking default security configurations.

8. Internet of Things (IoT) attacks

An IoT attack targets Internet of Things devices or networks, allowing hackers to take control of devices, steal data, or join a network of infected devices to execute DoS or DDoS attacks. The IoT encompasses a wide range of internet-connected devices, from smartphones to smart home appliances, making them vulnerable to cyberattacks.

Attackers can exploit IoT devices to launch attacks on other devices, causing significant damage that can be challenging to detect. There was a noticeable increase of IoT attacks last year.

7. Insider threats

Insider threats refer to the risks associated with an organization’s own staff. These threats can come from rogue employees with malicious intent or from employees who are simply negligent. In some cases, hackers can bribe insiders to help them gain access to sensitive information. However, the line between insider threat and whistleblower can sometimes be blurry.

Unlike social engineering, where attackers pretend to have legitimate access, insiders actually have legitimate access but use it for malicious purposes. Organizations must have policies and procedures to detect and prevent insider threats. It’s also reported that insider threats have risen 44% over the past two years.

6. Man-in-the-Middle attack

Man-in-the-middle attacks aim to steal sensitive information by intercepting and manipulating messages between two parties who believe they are communicating directly and securely. While most communication channels use some encryption to make such snooping attempts more difficult, expired SSL certificates on various websites and the use of freemium VPNs, proxies, or public wifi can create open gaps that attackers can exploit.

Attackers can read, modify, or even delete data during such attacks,
which can be challenging to detect. To protect against man-in-the-middle attacks, it is essential to use encryption whenever possible, be mindful of which websites and emails you access, and avoid using public networks. Estimates show that 35% of exploits involve man-in-the-middle attacks.

5. Dictionary, brute-force & password spray attacks

Cyber attackers use various methods to break into password-protected systems, including dictionary attacks, brute-force attacks, and password spray attacks. A dictionary attack involves systematically entering every word in a dictionary as a password or key to decrypt an encrypted message. On the other hand, a brute-force attack involves automated trial and error by spraying all possible character combinations and lengths into a password field until a match is found. More than 80 percent of breaches involve brute-force or the use of lost or stolen credentials.

Meanwhile, password spray attacks, involve hackers trying many common passwords against many different accounts using automated software. To protect yourself, use strong and unique passwords, enable two-factor authentication if available, and avoid using common words or phrases that can be easily guessed.

4. Social engineering

Social engineering is a cyber attack that exploits human vulnerability rather than system weaknesses. It involves tricking individuals into revealing sensitive information through deception. Threat actors may even impersonate someone else to gain physical or remote access to a target system.

Unfortunately, these attacks are still prevalent in 2022, as approximately one-third of data breaches occur due to social engineering. It is important to remain vigilant and cautious of unsolicited communication, verify identities, and practice proper security protocols to avoid falling victim to these attacks.

3. Malware, ransomware & spyware

Malware is a type of malicious code designed to carry out specific tasks that hackers want, including taking over, using as a gateway, stealing data, or disabling the target’s machine. In 2021, the average organization faced 1,748 attempts to be infected with malware. The same trend held true last year, with malware attacks being one of the most popular cyberattack types.

Meanwhile, ransomware is a more specific form of malware that infects a machine’s storage and encrypts stored data, demanding payment for decryption. These attacks can be highly profitable for hackers, as organizations often pay the ransom with no guarantee of a successful outcome.

Keyloggers are a type of spyware that captures every keystroke made on a device, allowing malicious actors to access sensitive information such as passwords and credit card numbers. Keylogger spyware is typically installed on a user’s device by clicking on a malicious link or attachment. Protect yourself from keyloggers by using strong and unique passwords for all accounts, as well as enabling two-factor authentication where possible.

2. DoS and DDoS

DoS and DDoS attacks flood servers or routers with requests, making it impossible for legitimate users to access a website or service. Attackers may use botnets or darknet marketplaces to orchestrate large-scale attacks. Defend against these attacks by having a robust firewall and keeping software up-to-date. These attacks are difficult to defend against, so be vigilant and prepared. According to reports, DDoS attacks grew 150% compared to the year before.

1. Phishing & vishing

Phishing, the list’s leader, tricks users into revealing sensitive information by posing as a legitimate institution. Attackers often use genuine-looking emails that redirect victims to fake websites where they input their actual credentials. Once attackers have the user’s information, they can take over their account, blackmail them, or sell the data on dark web marketplaces.

Vishing, a combination of voice and phishing, tricks victims into revealing confidential information through social engineering tactics. Protect yourself by being suspicious of emails asking you to click on links or download attachments. If in doubt, contact the company directly to verify the email’s legitimacy. Phishing attacks amount to more than 255 million attacks, a 61% increase in the rate of phishing attacks compared to 2021.

The top 10 must-take actions to protect your organization from cyberattacks

With the increasing sophistication of cybercriminals, it’s crucial to take proactive steps to safeguard your organization’s sensitive data and protect it in all ways possible.

Here we’ll explore the top 10 must-take actions to secure your business from cyber incidents. Implementing these measures can significantly reduce the risk of potential financial and reputational damage.

10. Backup your data regularly

Regularly backing up your data is crucial for protecting your organization against cyber attacks. In the event of a ransomware attack, having backup servers allows you to restore your data without having to pay a ransom.

However, ensuring that your backups are secure and protected from cyber threats is essential. Negligently leaving data backups unprotected in public cloud services can leave them vulnerable to cyber criminals. Organizations can recover quickly from a cyber attack using data backups and maintain business continuity.

9. Have a response plan in place

Even with all the necessary precautions, it’s impossible to guarantee that a cyber attack won’t happen. That’s why having a well-designed response & risk management plan is crucial to minimize the damage caused by a cyber attack. A comprehensive response plan should include:

  • Clear steps for containing the attack.

  • Notifying stakeholders.

  • Restoring operations as quickly as possible.

It’s important to regularly review and update the plan to ensure it remains effective and relevant to your organization’s evolving risks and operational needs. The impact of a breach can be minimized by having a response plan in place. Quickly and effectively responding to a cyber attack can get your organization back to normal operations.

8. Conduct regular security audits

Regular security audits are a crucial step in protecting organizations from cyberattacks. These audits can help identify vulnerabilities in systems and processes, allowing organizations to address them before hackers can exploit them.

Hiring an external audit firm or cybersecurity consultant agency can provide valuable insights into potential weak points in a network. By actively seeking out and addressing these vulnerabilities, organizations can save themselves the cost and headache of dealing with a successful hacking attempt in the future.

7. Engage in active threat monitoring

Active threat monitoring is critical in protecting an organization from cyber attacks. Network monitoring tools can be used to detect unusual ac
tivity that could signal an ongoing attack.

By monitoring network activity, organizations can quickly detect and respond to security incidents, including suspicious activity, using intrusion detection systems to alert the security team to potential threats.

6. Control access to your network & resources

Controlling access to your network and resources is essential for protecting your organization from cyberattacks. With the rise of remote work and temporary employees, enforcing security policies for every worker or device is difficult, increasing the risk of malware infections and insider threats.

IP allowlisting can help mitigate these risks by limiting access to only the resources required to complete their work. Organizations should also limit access to sensitive data to only those employees who need it, reducing the risk of unauthorized access and data breaches. Organizations can better protect their network and data from potential security incidents by controlling access.

5. Encrypt your data

Encrypting your organization’s data, especially user passwords, is critical in preventing cyber attacks. Hashing and salting are effective methods of encryption that scramble passwords into unintelligible characters and add additional elements before hashing, making them impossible to reverse-engineer.

Unfortunately, many significant data breaches occur because encryption was not implemented. As a business manager, prioritize data encryption to enhance the security of your user data. By adopting encryption, you can significantly reduce the likelihood of a data breach and protect your organization’s sensitive data.

4. Keep software updated

It’s crucial for organizations to keep their software up-to-date. Outdated software is an easy target for hackers always looking for vulnerabilities to exploit. This is especially true for large organizations, as their large pool of users may postpone updates. Therefore, it’s recommended to have forced updates to ensure that all machines are updated with the latest patches.

Additionally, it’s important to have antivirus and anti-malware software installed, kept up-to-date, and run regular scans to detect and remove any malicious software that could harm the system.

3. Secure your network & hardware

Securing your network and hardware is crucial in protecting your organization from cyberattacks. Hackers often exploit unpatched loopholes and other vulnerabilities to gain access to your system. To minimize the attack surface, take all possible steps to secure every endpoint device.

One effective measure is enforcing the use of a virtual private network (VPN) when accessing sensitive company documents to secure the exchanged data and prevent unauthorized access. Additionally, services such as NordLayer can provide a safety net to further enhance your network and data security. By securing your network and hardware, you can significantly reduce the risk of a cyberattack and protect your organization’s sensitive information.

2. Enforce strong passwords and multi-factor authentication

Using weak passwords, such as ‘Tom1234,’ can make user accounts vulnerable to cyber attacks. To prevent this, organizations should implement password complexity requirements and provide guidance on using password phrases, which are secure and memorable.

Also, multi-factor authentication (MFA) systems should be used, which require multiple factors to verify a user’s identity. MFA provides reliable assurance of an authorized user’s identity, reducing the risk of unauthorized access and providing better data protection than passwords alone.

1. Regularly train your workforce on cybersecurity awareness

Regularly training your workforce on cybersecurity awareness is one of the most critical steps to protect your organization from cyberattacks. Employees, especially those working remotely, are often the weakest link and can unintentionally introduce security vulnerabilities.

Organizations can reduce their risk of a cyber attack by educating employees on best practices such as using strong passwords, identifying phishing emails, and reporting suspicious activity. A well-trained employee will be able to identify different types of cyber threats and distinguish them from genuine ones, as most cyber attacks follow common patterns. It’s essential to provide ongoing training that reflects your enterprise’s risks and proper responses to future attacks since cyberattacks are evolving daily.

The cost of cybercrime & security incidents

The cost of cybercrime in 2022 is at an all-time high. Companies are facing an average cost of $4.35 million due to data breaches alone, with 60% of these breaches resulting in increased prices passed on to customers. In the UK, businesses have had to bear an average cost of £4200, while nearly 1 in 10 US organizations remain uninsured against cyber attacks.

These numbers are just the tip of the iceberg, indicating that constant vigilance and strong security measures are necessary to protect sensitive data and minimize the financial risks that come with cybercrime.

In this part, we delve into the cost of cybercrime in 2022 and examine the key findings that underscore the importance of organizations taking proactive steps to guard against potential cyber threats.

5. $4.35 million – average total cost of a data
breach

In 2022, the average data breach cost hit an unprecedented peak of $4.35 million, surging by 2.6% from the previous year’s average cost of $4.24 million. This year-on-year increase has been consistent, with the average cost rising by a staggering 12.7% from $3.86 million as reported in 2020. These statistics demonstrate the relentless nature of cyber attacks, highlighting the need for constant vigilance and robust security measures to counter these threats.

4. $4.82 million – average cost of a critical infrastructure data breach

When analyzing critical infrastructure organizations, such as those operating in financial services, industrial, technology, energy, transportation, communication, healthcare, education, and public sector industries, the average cost of a data breach was notably higher at $4.82 million. This cost was $1 million more than the average cost of data breaches in other industries.

Shockingly, 28% of critical infrastructure organizations studied had been subjected to destructive or ransomware attacks, whereas 17% had encountered a breach due to their business partners’ security compromise. These findings underscore the importance of strengthening cyber security strategies for critical infrastructure organizations and their third-party partners to safeguard against potential cyber threats.

3. $4.54 million – average cost of a ransomware attack

Ransomware attacks accounted for 11% of all breaches, marking a 41% increase from the previous year’s figures of 7.8%. Despite this surge, the average cost of a ransomware attack experienced a slight decrease, from $4.62 million in 2021 to $4.54 million in 2022. However, this cost was still marginally higher than the average total data breach cost, which stood at $4.35 million.

These findings highlight the continued threat of ransomware attacks and the necessity for organizations to implement robust preventive measures to mitigate the associated risks.

2. $1 million – average difference in cost where remote work was a factor

Security breaches caused by remote work resulted in significantly higher costs compared to those without remote work involvement. On average, the costs associated with remote work-related breaches were nearly $1 million higher, with a reported cost of $4.99 million, as opposed to $4.02 million for breaches unrelated to remote work.

This difference amounts to remote work-related breaches costing approximately $600,000 more than the global average cost. These figures underscore the financial risks and consequences associated with remote work and the importance of implementing strong security measures to safeguard sensitive data when remote work is necessary.

1. $9.44 million – average cost of a breach in the United States

The top five countries and regions that experienced the highest average cost of a data breach were the United States, with a staggering $9.44 million, followed by the Middle East at $7.46 million, Canada at $5.64 million, the United Kingdom at $5.05 million, and Germany at $4.85 million. Notably, the United States has held the top position for 12 consecutive years.

Additionally, the country with the highest growth rate from the previous year was Brazil, with a significant increase of 27.8% from $1.08 million to $1.38 million. These findings reveal the persistence and costly nature of cyber attacks, irrespective of location, emphasizing the importance of maintaining robust cyber security measures to prevent such incidents.

To sum up 2022

As we close out 2022, it’s clear that cyber security continues to be a top concern for businesses of all sizes and industries. The year saw unprecedented levels of attacks, with organizations worldwide experiencing an average of 1168 attacks per week in Q4 alone.

Unsurprisingly, the human element was involved in a staggering 82% of all breaches, with phishing and stolen credentials continuing to be a significant concern. Despite the increase in attacks, however, many businesses still don’t have adequate security measures, and the cost of cybercrime continues to rise.

To protect their data and assets in 2023, organizations must prioritize implementing effective security strategies, risk management plans and staying up-to-date on the latest threats and prevention techniques.

If your organization needs top-notch cybersecurity solutions, NordLayer provides flexible and easy-to-implement tools for all businesses. Get in touch with our specialists today for more information.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

網絡分段在 PCI DSS 中的作用

PCI-DSS is the set of security standards that seeks to extend consistent data protection practices across the credit processing industry. Any organization handling credit card data must comply with PCI-DSS regulations.

PCI-DSS compliance places a major burden on businesses, especially small and medium-sized enterprises. But companies can reduce the cost of compliance by intelligently scoping their credit processing environment.

Segmentation allows IT teams to apply network segmentation to protect credit card data while reducing the need to secure less critical system components.

This blog will introduce network segmentation in PCI-DSS. We will look at how segmentation works and how it contributes to robust financial sector cybersecurity strategies.

What is network segmentation?

Network segmentation separates network resources to control access and enhance security. In the context of PCI-DSS, network segmentation divides the cardholder data environment (CDE) from other system components.

Separating the cardholder data environment from other resources allows businesses to secure cardholder data. This is a major challenge of cybersecurity in finance. With proper segmentation, hackers will struggle to move from off-scope endpoints and apps to the CDE. Data breaches are much less likely.

Segmentation is not a PCI-DSS requirement. It complements other compliance tools such as encryption, access management, and firewall protection. If you have any doubts about core requirements, check out our PCI-DSS compliance checklist for more information.

However, the PCI Security Standards Council (SSC) has issued guidance advising companies to employ segmentation if possible.

As the SSC says, “Effective segmentation can greatly reduce the risk of CDE systems being impacted by security weaknesses or compromises originating from out-of-scope systems.” But it is not a magic bullet. Segmentation must work with other technologies and controls to achieve PCI-DSS compliance.

Understanding PCI DSS network segmentation scope

When discussing network segmentation for PCI-DSS, it’s important to assess the “scope” of controls required.

Scope refers to the extent of protection required to achieve compliance. Establishing PCI-DSS scope is a critical priority before applying segmentation.

Proper scoping provides security teams with the visibility and knowledge needed to locate and defend critical data. Scoping allows you to segment cardholder data from other parts of the network, boosting security and cutting costs.

There are three main categories to think about when carrying out a PCI-DSS assessment.

In-scope assets

Network resources that make direct contact with cardholder information. This includes payment systems, points of sale, credit card databases, communication tools, and even CRM systems. If an app or device holds credit card data, it is “in scope.”

Connected-to assets

These systems connect to in-scope assets but do not hold card data themselves. They may not require segmentation but must be tightly secured as part of the CDE.

Out-of-scope assets

Anything without access to the cardholder data environment is defined as “out of scope” and does not require the same level of protection.

The PCI-DSS regulations state that “even if the out-of-scope system component was compromised, it could not impact the security of the CDE.” This is a good way of approaching the scoping task.

If system components provide attackers with indirect access to cardholder data, it qualifies as in-scope. If not, you can relegate it to a lower priority level and concentrate resources where they matter most.

“Flat” networks where system components are connected to a single network switch are an important exception. In these cases, the entire network is categorized as in-scope.

In flat network settings, there is no such thing as an out-of-scope system. If an attacker gains access to any node on the network, they can potentially spread to systems handling credit data.

Why scoping matters to network segmentation

PCI-DSS scoping is a crucial first step in the segmentation process. You cannot create segments protecting cardholder data unless you know where that data resides.

Scoping maps data locations and flows. Compliance teams build a picture of how credit card data moves throughout the network, where it is stored, and who requires access. This provides a solid foundation for creating accurate and effective network segments.

Scoping also ensures that the segmentation process covers every asset. Security teams can start from the assumption that everything is in scope. They can then eliminate out-of-scope assets from the CDE and apply precise segmentation for cardholder data.

How to implement network segmentation for PCI DSS?

When carrying out a PCI-DSS assessment, it’s essential to keep one thing in mind: segmentation is not a substitute for comprehensive cybersecurity controls and policies. Network segmentation is part of a wider toolkit, not a solution to your compliance worries.


Having said that, PCI-DSS best practices advise that companies segment the cardholder data environment from other network systems. So how should you approach this task?

Network segmentation applies specific security controls to create sub-networks containing critical cardholder data. There are various ways of achieving this, including:

Firewall barriers between the rest of the network and cardholder data

Firewalls regulate network traffic across the CDE perimeter, preventing unauthorized access requests.

Data loss prevention (DLP) solutions

DLP tracks the movement of critical data, and works in tandem with firewall protection. Users cannot move or copy protected data without authorization. Security controls automatically block any unauthorized transfers.

Physical access controls for in-scope devices

Some workplaces may impose physical identity checks between CDE-connected devices and other offices or workstations.

Air gaps

Physical air gaps can also divide cardholder data from other network assets. Companies may choose to use two separate systems for payment processing and general operations.

Identity and access management (IAM) systems and multi-factor authentication (MFA)

Authentication systems require multiple credentials for any login. Secure network zones can require extra credentials before granting access.

Zero Trust controls on user privileges

Network managers should keep the number of users with administrative privileges as low as possible. Cardholder data environment access should only be available for users with appropriate permissions. All user access is seen as illegitimate until proven otherwise.

Continuous activity monitoring

Security teams can automate monitoring to track suspicious behavior. Tracking systems raise alerts when out-of-scope assets request access to a network segment within the CDE.

When you decide how to apply segmentation, the core challenge is determining which assets are in-scope and what lies out-of-scope.

Security teams must interview employees throughout the organization to understand how they use data. Employees can provide invaluable information about where cardholder data resides – knowledge that may not be immediately obvious.

The next step in PCI-DSS compliance is ensuring that network segmentation covers every part of the CDE. Elements to consider include:

  • Applications handling cardholder data. This could cover web apps and locally hosted databases.

  • Authentication servers and internal firewalls that connect with or defend the CDE. Protecting sensitive authentication data is a critical priority.

  • Security services that ensure data security and guard cardholder data. This includes intrusion detection systems, malware scanners, and anti-virus tools.

  • Log storage servers and backups. Any audit logs must be properly secured, including connections between active payment databases and historical logs.

  • Virtual machines, apps, hypervisors, or virtual routers that store or process cardholder data.

  • Network infrastructure such as routers, switches, hardware firewalls, and any other equipment that connects to the CDE.

  • Network servers handling cardholder data flows from sites of payment and within the corporate network. This may include web, mail, proxy, and DNS servers.

  • Third parties. Any third-party applications or users with access to payment or cardholder data storage systems lie within the CDE.

The critical task when applying PCI-DSS controls is mapping connections. Any endpoint or application that can access cardholder data needs to be secured.

It isn’t always easy to discover connections between system components. But a comprehensive planning process will generate enough information to keep your data breach risk low.

How can NordLayer solutions help?

Network segmentation is a critical part of PCI-DSS compliance. It allows organizations to separate the cardholder data environment from other system components. Attackers seeking access via remote devices or insecure endpoints will find it much harder to extract cardholder data.

NordLayer can help you build a security setup that meets PCI-DSS requirements. Our PCI-DSS compliance solutions make it easy to segment networks to protect cardholder environments. With Nordlayer, you can:

  • Create groups of network users and assign different network access privileges to each group.

  • Create Virtual Private Gateways for specific groups, resources, or websites.

  • Use IP allowlisting with Dedicated IP addresses to allow authorized users and block others.

In the near future, we will also offer Cloud firewall functionality. This will simplify segmenting cloud-based credit processing environments with granular and flexible access controls.

However, network segmentation is not a single solution. Companies must couple PCI-DSS network segmentation with other security tools to be compliant. Nordlayer can help here as well. In addition to segmentation, our tools can help you:

  • Install secure remote access solutions to transmit cardholder data safely.

  • Set user permissions to block unauthorized access to every network segment.

  • Employ quantum-safe cryptography in tunnel encryption to hide your traffic and online activity from users on the open internet.

  • Put in place multi-factor authentication for users accessing cardholder data. Ensure only trusted users can handle customer information and keep data breach risks low.

Make PCI-DSS compliance manageable by partnering with an experienced security provider. Get in touch with the NordLayer team to explore smart data security solutions that make damaging data breaches much less likely.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.