Skip to content

Cloud-based collaboration and productivity tools are old hat, securing them is new school

 

When a company asks itself whether or not to go off premises with its IT infrastructure, security may not be a top consideration. However, with the massive shift to working from home, and the vast employment of cloud-based collaboration and productivity tools, it should be.

Along with lockdowns and vaccine trials, news of the large-scale hack of the SolarWinds Orion platform and an intrusion campaign targeting IT services companies that ran outdated versions of the Centreon IT monitoring tool sent users a wake-up call early this year. These events drove home the point that cyberthreats are increasingly homing in on cloud-based systems, productivity and collaboration platforms, their users and the IT admins tasked with making it all run smoothly. These are the very means that enable businesses to find efficiencies, focus on core competencies, and ensure business continuity; they are also fast becoming critical points of business security.

While clearly critical, what few IT admins, SOC teams or CISOs may have counted on was the scale of risks unleashed when entire service platforms are targeted by threat actors. In March 2021, a third large-scale disruption reminded business users of cloud services of the vulnerabilities faced by our new productivity and collaboration architecture. If you haven’t guessed, we are discussing the rampant exploitation of Microsoft Exchange, in which ESET researchers identified more than 10 different threat actors or groups that likely leveraged this vulnerability chain, feasting off exposed internet-facing servers and sending shock waves across the IT industry.

New behaviors require new security
If we rewind to the time just prior to the COVID-19 pandemic and look at businesses hunting for security solutions, we’d find that ESET had just introduced ESET Cloud Office Security (ECOS). Bolstering security for Microsoft 365, including OneDrive and Exchange Online, ECOS proved easy to implement and manage for SMB and Enterprise customers alike. Within weeks of its launch, MSPs could also offer ECOS in managed environments, simplifying security provision and reporting for cloud customers via the ECOS dashboard.

As ECOS was put through its paces, the pandemic accelerated the need to overcome issues around productivity costs and business continuity, driving ever more businesses to the cloud. We’ve seen “crowd everything” – from funding to gaming and, of course, business collaboration, all of which have blossomed over the past 15-plus months. Yet, while the pandemic has cemented these as common practices and tools, increasing attention must be paid to securing them.

To that end, ECOS now extends protection to Microsoft Teams and SharePoint Online. This is a big plus for SMBs and others who are operating in the cloud because it hardens protection for business continuity via the very tools that allow distributed work and collaboration.

Try our interactive demo

The protection of organizations from supply-chain attacks as per SolarWinds Orion, intrusions like the Centreon case, or exploitations of internet-facing services like the Microsoft Exchange attacks – impacting thousands of businesses and institutions globally – can be a major challenge to organizations, especially to those ill-prepared. In some of these cases, attackers appear to have infiltrated systems and persisted there for substantial periods of time. These attacks were primarily carried out – at least in the initial stages – by advanced threat actors who command high levels of skills and resources. Simply said, you have to fight your own (network’s) battles, and service providers have to fight theirs.

What ESET Cloud Office Security can do
While the onus of properly configuring and securing the large-scale infrastructure described above lies on both service providers and their clients, it can, does and will impact any and all users of the technology. Endpoint protection, cloud-based or not, will not change the fact that the duty to prevent and mitigate these incidents falls rather heavily on end users as well.

When these incidents do occur, we can expect super blooms of ransomware and other malicious campaigns that seek to leverage the extensive periods of vulnerability and access to impacted networks. As such, if you use the tool, you have signed up for a role in securing your environment; that is the status quo.

While the majority of attacks and disruptions faced by organizations haven’t stemmed from these large-scale events, mitigating the impact largely mirrors more common threats and comes down to addressing the “what can be controlled” in a business’s own environment. Considering the near-universal uptake of productivity tools, a product like ECOS goes a long way in adding immediate protections for the most popular, including Exchange Online, OneDrive, SharePoint Online and Teams.

Spam and malware
For the benefit of IT admins who need to manage protection for 25 seats or more, ECOS delivers an effective multi-tenant and scalable service, protecting all major Microsoft 365 cloud services, such as Exchange Online mailboxes, OneDrive, Teams and SharePoint Online, against malware. On top of that, Exchange Online is also protected against phishing and spam emails.
ESET Cloud Office Security can be managed through a web-based console with user-centric, issue-centric and group-centric views. It also checks all incoming emails delivered to a customer’s Microsoft 365 inbox. Our award-winning antispam technology works as the first layer, filtering out spam messages with near-100% accuracy. The second layer is our malware scanner, which detects malicious or suspicious attachments. The third layer protects against phishing (anti-phishing). Learn more about these features here.

Every file that is uploaded to OneDrive, shared via SharePoint, or transferred via Teams, is checked using our powerful malware detection engine, which leverages the same technology as ESET’s endpoint solutions. If the engine detects a dangerous file, it is placed in quarantine, where it is accessible only by administrators; the user remains protected.

To back that up, admins benefit from ECOS’s easy-to-use cloud console, which gives an overview of quarantined items and immediately notifies them when a detection occurs.

images 1. and 2. ECOS mangement dashboard view of Detections and Quarantined items

Renewing the promise of the cloud?
The large-scale attacks seen in Q1 2021 certainly put a few dents into cloud operations and collaboration platforms; however, one of the main benefits of moving infrastructure to the cloud, and also common to this product, is the ease of initial deployment. ECOS can secure these systems quickly.

In cases where customers have a Microsoft 365 plan, purchase an eligible ECOS license and have an ESET Business Account (for which registration is free) or an ESET MSP Account, it takes an average of five minutes to connect ECOS to a Microsoft 365 environment and initiate protection.

Scaling for maturity of security operations
A major benefit to scalable systems like ECOS is that configuration can be suited to company size and maturity of IT security staff. First, you’ll get your protection, then options to leverage further features.

ECOS ensures admins get a quick overview of what is happening in their company’s instance of Microsoft 365 from a security perspective. It also provides crucial information about the total number of protected users, license usage, those users who are the largest spam, malicious and phishing email recipients, and the top suspicious OneDrive, SharePoint and Teams accounts or groups/sites. This can be viewed over a timescale of 24 hours, 7 days and 30 days. Also provided is a dedicated view for Exchange Online, OneDrive, SharePoint and Teams detections with spam, malware and phishing traffic charts and total numbers of detections.

What has Cloud Office Security seen in its first year?
Many businesses that have onboarded the (now) indispensable productivity tools have done so confident that the inbuilt security provided by Microsoft is sufficient to maintain business continuity, and, more broadly, to keep their systems safe. By Microsoft’s own account, a lot of “us” are on Microsoft 365 and Teams. As of Q3 2020, Microsoft reported 258 million monthly active Microsoft 365 business users, and 75 million daily active Teams users. That’s on top of the 1.2 billion active users of Microsoft Office.

The wide acceptance of these products enables, to a large degree, modern business and governance the world over. Their success also means they are targeted in various ways, from poisoned macros in Word documents sent via Outlook emails to incidents of exploitation of Microsoft Exchange servers. Neither security by design nor Microsoft’s native security have completely stopped these security challenges for users. This is to be expected for such large infrastructure, and for the outsized user numbers.

With cloud-based elements like Microsoft 365, Teams and SharePoint, using these key Microsoft products strongly warrants users adding further security measures. ECOS is cost-effective, easy/rapid to deploy and scalable across the entire range of business and institutional sizes.

ESET’s award-winning engine, the same as used in ESET Mail Security, is used in ECOS to scan all incoming and outgoing emails and attachments in Exchange Online for spam, phishing and malware. Read more about ECOS’s protection against threats vectoring from email here:

images 3-6. ECOS Dashboard views for: Exchange, OneDrive, Teams, SharePoint

In 2021, via the ECOS’s many dashboards, IT Admins and SOC Teams alike were able to see threats – significant threat types that slipped by Microsoft’s native security:

1. HTML/Fraud: A detection name covering a diversity of HTML-based content, distributed with the aim of gaining money or other profit from the victim’s involvement. This includes scam websites, as well as HMTL-based emails and email attachments.
2. HTML/Phishing.Agent: A detection name for malicious HTML code often used in a phishing email’s attachment. When such an attachment is opened, a phishing site is opened in the web browser, posing as an official banking, payment service or social networking website. The website requests credentials or other sensitive information, which is then sent to the attacker.
3. DOC/Fraud: A detection name mainly covering Microsoft Word documents with various types of fraudulent content, primarily distributed via email. The goal of this threat is to profit from the victim’s involvement, often by persuading the disclosure of online account credentials or sensitive data. Documents often contain links to websites where victims are asked to fill in personal data.
While malicious documents vectoring from email and poisoned websites still comprise the largest proportion of threats to business ecosystems, we shouldn’t forget these also track to newer SharePoint-based features that mushroomed in popularity under COVID-19. These files can and do make their way to SharePoint.

Company culture and IT administrator settings are critical here. Adding a layer to securing collaboration platforms is essential because part of productivity entails speed. Users’ caution or attention may flag when working within Teams or SharePoint, which raises the risk of compromised documents making it into your environment.

To find out more, or to get a free trial of ESET Cloud Office Security, read more here.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

CyberLink Releases New FaceMe® Security – an End-to-end Facial Biometric Solution for Security, Access Control and Health Checks

Enhanced compatibility with mainstream VMS from Milestone, Network Optix and VIVOTEK, and support for NVIDIA Jetson

TAIPEI, TAIWAN – Mar 31 2021 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, today announced significant enhancements to FaceMe® Security, adding to its already impressive set of facial-recognition-based features such as people identification and contactless access control. The updates include the ability to identify people with a high degree of precision even when wearing a mask, as well as mask detection and temperature measurement for health control. The solution now offers enhanced compatibility to a number of mainstream video management systems (VMS) and further optimization to chipset support, including the cost-effective NVIDIA Jetson platform.

CyberLink Releases New FaceMe® Security – an End-to-end Facial Biometric Solution for Security, Access Control and Health Checks

FaceMe® Security comes with all the features needed to enable automated and contactless security monitoring, access control and health checks, each of which are relevant to organizations of all types and sizes, in all sectors of the economy. Small business owners can literally setup affordable single-computer, single-camera systems on their own. The same FaceMe® Security solution’s robust and scalable architecture enables a rapid and easy deployment by system integrators anywhere, from single-location businesses to very large organizations, addressing use cases relevant across a wide range of industries and sectors, including retail, manufacturing, warehousing, office management, hospitality and many others.

Its flexibility, such as the ability to connect into existing IP cameras and run on multiple types of computers and workstations, often allows integrators to implement FaceMe® Security across entire organizations, all from the server room. The polyvalence of its features and a collection of APIs ensure a seamless integration into systems such as visitor management, employee time and attendance, access control and automated door operation, in addition to connecting easily into existing surveillance and monitoring systems.

The newest edition of FaceMe® Security Workstation allows for real-time face detection and facial template extraction at the edge. Optimized to run across a wide range of edge-based hardware, FaceMe® Security Workstation can be deployed on high-end Windows workstations equipped with single or multiple NVIDIA Quadro GPUs for heavily trafficked areas of up to 80,000 people per hour. For mid-sized sites with traffic ranging from 2,000 – 6,000 people per hour, such as a warehouse, FaceMe® Security Workstation can be deployed on NVIDIA Jetson AGX Xavier or Xavier NX, providing modest levels of performance with a significantly lower financial and energy costs.

FaceMe® Security’s notification API supports mainstream VMS (video management systems), including Milestone, Network Optix Nx Witness and VIVOTEK VAST2. FaceMe® Security enables real-time detection of VIP, block-listed and tagged personnel entering surveillance zones and triggers a notification to the VMS, informing security personnel of real-time events.

“Biometric and vision technologies are setting new standards for IP surveillance deployments. Not only can solutions using top-tier facial recognition accurately verify identity, even for faces partially covered by a mask, but they can also detect if the mask is worn properly,” said Dr. Jau Huang, CEO of CyberLink. “Powered by the world’s leading facial recognition technology, FaceMe® Security is an all-inclusive solution that can completely overhaul existing IP surveillance infrastructures to deliver the latest security, access control and health screening capabilities, for organizations of all sizes, across all industries.”

In addition to its built-in features, FaceMe® Security offers two add-ons that expand its capabilities to provide complete time and attendance as well as integrated health screening. The FaceMe® Security Check-In add-on can be deployed on light-weight PCs at building entrances for real-time, on-screen identity verification along with check-in information. The FaceMe® Security Health add-on provides an inconspicuous health-monitoring solution for any facility. The AI engine detects if a person is wearing a mask properly over the nose and mouth, verifies their identity, and measures their body temperature. When detecting a person with elevated body temperature or someone not wearing a mask, a notification including the person’s picture and location is sent instantly to security personnel for further actions.

For more information about FaceMe® Security, please visit:

https://www.cyberlink.com/faceme/solution/security

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

The risks of lack of access protection in cloud environments

The cloud concept is less and less a buzzword and more of a need. Everyone, from application developers, executives, and students, is benefiting from the flexibility and reliability of cloud-based solutions.

Although the cloud has evolved a lot in recent years, there are still risks involved. One of the main concerns of cybersecurity professionals is the protection of access in cloud environments.

The cloud hosts data for thousands and thousands of people – including third parties, employees, and customers – which increases the attack surface. A successful attack can be fatal for many companies, and directly affect business continuity.

In this article, we explore some of the main risks associated with the lack of protection in cloud access. Also, we explain how some basic actions can be strategic to mitigate the risks of lack of management and access protection in cloud environments.

With a little planning, you can effectively mitigate these risks and take advantage of all that the constantly evolving cloud has to offer. Keep reading on and find out what risks you are exposed to due to the lack of protection for cloud accesses.

 

Lack of Governance

Do you have control of the data in your cloud environment? Do you know what information your employees have access to? Do outsourced employees have limited and controlled access to your cloud? The answers to these questions indicate whether your organization has good governance in the cloud or not.

Cloud governance ensures that all actions, from the implementation of a new server to the interactions of systems and data security, are properly managed.

The move from local infrastructures in companies to cloud environments adds layers of complexity to the protection of systems. It also means that more people in your company have the potential to impact these systems. That is why it is essential to develop and maintain a cloud governance model for access management.

By designating who has access to each part of the asset, information, and system management, your governance plan will determine the necessary limits on who can access and impact your infrastructure.

As mentioned earlier, this is especially important considering how easy it is to deploy new servers and other assets in the cloud. The last thing you want is applications and IT initiatives that are not properly managed, impacting your systems architecture and negatively impacting customers and users.

Controlling access to your cloud’s critical assets is essential for a more reliable environment, especially if you outsource software development to other companies.

 

Data Breaches

Data breaches are a major cybersecurity concern as the amount of data transmitted over the internet has been growing exponentially. This continuous transfer of information makes it possible for attackers anywhere to attempt to breach data in almost any company they choose.

What are the main ways in which a data breach can occur? The simplest way to view private data is to steal someone else’s login credentials to enter a system.

To that end, attackers apply a series of strategies to get their hands on the logins and passwords of a company’s employees. This is a big risk associated with the lack of access protection in your cloud because even less-skilled attackers can easily access your company’s data.

Internal threats are also a form of a data breach. These threats involve employees who have access to protected information, deliberately exposing that data, often for personal gain. In that sense, when there is no proper access control to manage what employees and outsourced people do in the cloud environment, this threat can become real.

Access control is a way to minimize risks associated with data breaches, ensuring that your employees have only the minimum access and permissions necessary to do their job.

 

Non-Compliance With Market Laws and Regulations

New laws such as the LGPD (General Data Protection Law) are increasingly demanding the development of a series of procedures for data protection from Brazilian companies. The law should be applied to any organization that performs operations with personal data, such as the collection, transmission, storage, or processing of data from Brazilians…

If your company fits into this segment, it is important to understand how access protection failures in your cloud environment can negatively affect business.

In cases where a breach of personal data occurs and if your company has not taken the required basic protection measures, you may suffer penalties, such as regulatory fines from the LGPD, which can reach 2% of revenues or R$ 50 million reais. Also, when it comes to cloud environments, you need to know where your cloud provider is located.

As an example, if your provider is located in any region of Europe, you should also seek compliance with the GDPR (General Data Protection Regulation) in order not to suffer penalties.

Meanwhile, in the payment methods market, certifications such as the PCI DSS (Payment Card Industry Data Security Standard) determine the importance of access control and management for cloud environments and define strong security policies for protecting customers.

Another example of regulation required by the payment methods market is Bacen’s Resolution 4658. The resolution is meant to guide procedures and controls to reduce cyber vulnerabilities and meet cybersecurity goals in cloud environments. Not complying is not an option for businesses.

 

Your Company and Your Customers at Risk

Cloud providers can guarantee compliance for their infrastructure and environment, but compliance with security and risk mitigation requirements is still entirely your responsibility.

We have already discussed access risks in cloud environments, so it is important to remember what is at risk. A breach of your data or your customer’s data can be devastating, depending on the type of data and the breach extent.

The costs of investigating and resolving a breach, associated legal expenses, and losses to a company’s reputation can be enough to make its business unfeasible.

senhasegura can help your company control risks in the cloud:

  • Fully integrating and implementing two layers of privileged account security: for both the service provider and the customers.
  • Reinforcing administrative access to virtual machines.
  • Incorporating senhasegura into task automation tools to transparently provision new accounts via APIs.
  • Systematically resetting standard passwords as part of the provisioning process.
  • Providing individual responsibility for all privileged user activities.
  • Isolating, monitoring, and recording all sessions.
  • Replacing encrypted and visible application credentials with rotating credentials to improve security.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.