Skip to content

OpenTelemetry: A modern observability standard

In the first part of our blog series about observability, we covered the basic principles of observability and explained how it differs from the classical monitoring term. In this article, we’ll discuss OpenTelemetry and its instrumentation approaches.

Blog thumbnail 2022 11 24 2

 

OpenTelemetry

Please check out our first article on observability to gain a fuller context for the topic we’re about to discuss. OpenTelemetry is currently the most actively developed standard in the field of observability. It is being adopted as the Cloud Native Computing Foundation incubating project. Born primarily as a merging of former OpenTracing and OpenCensus standards, OpenTelemetry continues to gain popularity, with its supporters including representatives of Google, Microsoft, and Uber.

The goal of the OpenTelemetry project is to introduce a standardized open solution for any development team to enable a proper observability layer in its project. OpenTelemetry provides a standard protocol description for metrics, tracing, and logging collection. It also collects APIs under its nest instrumentation for different target languages and data infrastructure components.

Below is a visualization of the overall scope of OpenTelemetry (credits to CNCF):

The development of specifications and all related implementations is being run in an open way in Github, so anyone involved can propose changes.

Different instrumentation implementations for different languages are in development. The current state of readiness can always be found on a related page of official documentation (for example, PHP).

Logs

Logs are the oldest and best-known type of telemetry signals, and they have a significant legacy. Log collection and storage is a well-understood task, with many solutions being established and widely adopted to carry it out. For example, the infamous ELK (or EFK) stack, Splunk, and Grafana Labs recently introduced the Loki project, a lighter alternative to ElasticSearch.

The main problem is that logs are not integrated with other telemetry signals – no solutions offer an option to correlate a log record with a relative metric or trace. Having the opportunity to do this can form a very powerful introspection framework.

OpenTelemetry specifications try to solve this problem with a logging format standard proposal. It allows correlating logs via execution context metadata, timing, or a log emitter source.

However, right now the standard is at an experimental stage and under heavy development, so we won’t focus on it here. The current specifications can be found here.

Metrics

As discussed previously, metrics are numeric data aggregates representing the software system’s performance. Through aggregation, we can develop a combination of measurements into exact statistics during a time window.

The OpenTelemetry metrics system is flexible. It was designed to be like this to cover the existing metric systems without any loss of functionality. As a result, a move to OpenTelemetry is less painful than other alternatives.

The OpenTelemetry standard defines three metrics models:

  • Event model — metric creation by a developer on the application level.

  • Stream model — metric transportation.

  • Time Series model — metric storage.

The metrics standard defines three metric transformations that can happen in between the Event and Stream models:

  • Temporal reaggregation reduces the number of high frequency metrics being transmitted by changing the resolution of the data.

  • Spatial reaggregation reduces the number of high frequency metrics being transmitted by removing some unwanted attributes and data.

  • Delta-to-cumulative reduces the size of high frequency metrics being transmitted via a move from absolute numbers (cumulative) to changes between different values (delta).

We will talk about the Stream and Time Series models in the third part of our blog series, where we will discuss signal transportation and storage. For now, let’s focus on the Event model, which is related to instrumentation.

The process of creation for every metric in OpenTelemetry consists of three steps:

  • Creation of instruments that will generate measurements – particular data points that we evaluate.

  • Aggregation of measurements into a View – a representation of a metric to output from the instrumented software system.

  • Metric output – the transportation metrics to storage using a push or pull model.

The OpenTelemetry measurements model defines six types:

  1. Counter – non-negative, continually increasing monotonic measurement that receives increments. For example, it may be a good fit for counting the overall number of requests the system has processed.

  2. UpDownCounter – the same as the Counter, but non-monotonic, allowing negative values. It may be a good fit for reporting the amount of requests being currently processed by the system.

  3. Histogram – multiple statistically relevant values distributed among a list of predefined buckets. For example, we may be interested not in particular response time but in the percentile of response time distribution, it falls into (a Histogram would be useful here).

  4. Asynchronous Counter – the same as the Counter, but values are emitted via a registered callback function, not a synchronous function call.

  5. Asynchronous UpDownCounter – the same as the UpDownCounter, but values are emitted via a registered callback function, not a synchronous function call.

  6. Asynchronous Gauge – a specific type for values that should be reported as is, not summed. For example, it may be a good fit for reporting the usage of multiple CPU cores – in this case, you will likely want to have the maximum (or average) CPU usage, not summed usage.

Through Aggregations in OpenTelemetry, measurements are being aggregated into end metric values that afterward will be transported to storage. OpenTelemetry defines the following measurements as Aggregations:

  • Drop – full ignore of all measurements.

  • Sum – a sum of measurements.

  • Last Value – only the last measurement value.

  • Explicit Bucket Histogram – a collection of measurements into buckets with explicitly predefined bounds.

  • Exponential Histogram (optional) – the same as the Explicit Bucket Histogram but with an exponential formula defining bucket bounds.

A developer can define their own aggregations, but in most cases, the default ones predefined for each type of measurement will suit the developer’s needs.

After all aggregations have been done, additional filtering or customization can be carried out on the View level. To summarize, an example of a simple metric creation is the following (in GoLang):

import “go.opentelemetry.io/otel/metric/instrument”

 

counter := Meter.SyncInt64().Counter(

 

“test.counter”,

 

instrument.WithUnit(“1”),

 

instrument.WithDescription(“Test Counter”),

 

)

 

// Synchronously increment the counter.

 

counter.Add(ctx, 1, attribute.String(“attribute_name”, “attribute_value”))

Here we create a simple metric consisting of one counter-measurement. As you can see, many details we discussed are hidden but can be exposed if the developer needs them.

In the next part of our blog series, we will talk about metrics transportation, storage, and visualization.

Traces and spans

As we discussed previously, traces represent an execution path inside a software system. The execution path itself is a series of operations. A unit of operation is represented in the form of a span. A span has a start time, duration, an operation name, and additional context attached to it. Spans are interconnected via context propagation and can be nested (one operation can consist of multiple smaller operations inside itself). The resulting hierarchical tree structure of spans represents the trace – an entire execution path inside a software system.

The internal span structure can be visualized like this:

Here is an example of the simplest span creation (in GoLang):

import “go.opentelemetry.io/otel/trace”
 
var tracer = otel.Tracer(“test_app”)
 
// Create a span

 

ctx, span := tracer.Start(ctx, “test-operation-name”,

 

trace.WithSpanKind(trace.SpanKindServer))
 
testOperation()

 

// Add attributes

 

if span.IsRecording() {

 

span.SetAttributes(

 

attribute.Int64(“test.key1”, 1),

 

attribute.String(“test.key2”,“2”),

 

)

 

}
 
// End the span

 

span.End()

Now we have our first trace.

A trace can be distributed through different software microservices. In this case, so as not to lose the interconnection, OpenTelemetry SDK can automatically propagate context through the network according to the protocol being used. One example is the W3C Trace Context HTTP headers definition. However, not all language SDKs support automatic context propagation, so you may have to instrument it manually depending on the language you use.

Detailed documentation about traces with format explanations can be found here.

Signal interconnections

The ability to interconnect different types of signals makes an observability framework powerful. For example, it allows you to identify a service response that took too long via metrics and, in one click, jump to the correlating trace of this response execution to identify what part of the system caused the slow processing.

Signals in OpenTelemetry can be interconnected in a couple of ways. One is the use of Exemplars – specific values supplied with trace, logs, and metrics. These consist of a particular record ID, time of observation, and optional filtered attributes specifically dedicated to allowing a direct connection between traces and metrics. Detailed documentation about Exemplars can be found here.

Another approach to signal interconnection is the association of the same metadata with the use of Baggage and Context. Baggage is a specific value supplied with traces, logs, and metrics that allows you to annotate it and consists of user-defined pairs of keys and values. By annotating corresponding metrics and traces with the same values in Baggage, the user can correlate them. Detailed documentation about Baggage can be found here.

Conclusion

We covered the pillars of OpenTelemetry and some details of application instrumentation. But we don’t just need to instrument our applications – we should also introduce tooling for the aggregation, storage, and visualization of the signals we supply. In the third part of this series, we will discuss tooling and the OpenTelemetry collector component in detail.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Migrate your VFE licenses to Google Cloud Storage to save thousands at renewal time

It’s that time of the year again.

No, not the holiday season. It’s nearly the start of Google’s financial year, and, with that, time for a lot of you to renew your Google Workspace licenses. This year though, you might get hit by an unexpected surprise. Umer Hamid, one of our dedicated Google Sales Architects at CloudM, explains why.
“Around this time of year, I find customers getting in touch with me in a panic. In January, they will be renewing their Google Workspace license, but this time, it’s going to cost thousands more. Why? Because they have a few hundred Vault Former Employee (VFE) licenses gathering dust. As Google phases out free VFE and replaces them with paid Archived User (AU) licenses, many businesses find $$$ added to their bill.”

Ouch!

Well, what can you do to beat the bill (or at least make a considerable dent in it), whilst keeping compliant with data retention rules and regulations? Especially when you have a lot of data to move, are short on time, and you are restricted by Google’s limit of allowing only 20 VFE licenses to be migrated at any one time? Don’t worry! Here is the approach that Umer has suggested to our customers that are also facing this daunting situation.

Step 1

Quite simply, use CloudM Migrate to move all the required data in bulk and at speed from Google Vault into your own Google Cloud Storage, completely owned and managed by you as part of your Google Cloud Platform. Instead of paying for individual AU licenses for every offboarded employee, you will only have to pay the data storage cost. With the VFE data export limit of 20 concurrent users in place, some businesses might struggle to move all of their suspended users to storage before the renewal deadline, but CloudM Migrate is one of the fastest and most reliable ways to chip away at the number of AU licenses you might need, significantly reducing the figure you will need to pay out.  

Step 2

Phew! It was close but you’ve managed to migrate all that data (or at least a significant chunk) before your renewal date. Now though, how do you make sure that you never have a large amount of expensive Google licenses sitting idle, and costing you money at renewal time, ever again? CloudM Archive comes to your rescue! All you need to do is configure CloudM Archive so that it can offboard data to your Google Cloud Storage buckets, and add the Archive step to your CloudM Automate Offboarding Workflows. When an employee leaves, their email and drive data will automatically be sent to whichever bucket you specify on the Workflow. Using CloudM Archive, your data is secure, easily searchable and instantly restorable, and will automatically be deleted as part of data retention policies so you always stay compliant.  

Read our Counting the (recurring) costs of AU licenses blog for a more in-depth look at how CloudM Archive continues to save you money and time, year in, year out.

If your Google Workspace license renewal is coming up quickly, and you want to avoid paying out for unnecessary AU licenses, the quicker you act, the more you will save. Umer and the team are on hand to help you so get in touch today.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

This Thanksgiving, Be Thankful for OT Security | SCADAfence

Thanksgiving – when families get together and express gratitude for everything they have, accompanied by good food and hopefully great football. For most families and network security teams who just feel like family, this is a great time for looking back and evaluating the past year and giving thanks for how far we’ve come. 

Continue reading

CISA BOD 23-01 requires asset visibility and vulnerability detection as foundational requirements

On October 3, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) released the Binding Operational Directive (BOD) 23-01: Improving Asset Visibility and Vulnerability Detection on Federal Networks. This directive requires all Federal Civilian Executive Branch (FCEB) departments and agencies to comply with a set of cybersecurity requirements by April 3, 2023. Under the directive, asset visibility and vulnerability detection capabilities must be improved to meet the requirements outlined by CISA.

The BOD 23-01 strives to improve visibility and vulnerability detection on federal networks. However, the issues addressed by this directive are not exclusive to federal agencies. Asset inventory and vulnerability management are encouraged as best practices for all organizations, even though only FCEB agencies are legally required to comply by the April 3, 2023 deadline. In fact, CISA Director Jen Easterly told reporters, “Knowing what’s on your network is the first step for any organization to reduce risks.”

Asset visibility is foundational to cyber security

Cyber security is a universal challenge where asset inventory plays a major role. In other words, knowing your asset inventory is necessary for effective cyber security practices to be implemented. Easterly also said, “While this Directive applies to federal civilian agencies, we urge all organizations to adopt the guidance in the directive to gain a complete understanding of vulnerabilities that may exist on their network. We all have a role to play in building a more cyber resilient nation.” Regardless of whether or not an organization is a federal civilian agency, asset inventory should be the first step in reaching meaningful risk mitigation.

Modern cyber security practices require multi-part defensive measures. As technology has evolved, so have the threats to our security. More recently, the diversification of network environments in the civilian workplace has made network security and tracking more difficult. What had been a gradual transition to hybrid networks as the norm escalated rapidly during the pandemic, forcing security teams to suddenly manage on-premise, hybrid, and cloud networks more quickly than they were prepared to do. Network visibility now faces new challenges as networking environments have shifted.

There are too many assets to be tracked via manual methods, like spreadsheets. Not to mention unknown assets that may have been missed by traditional discovery methods. If you don’t know about an asset, how can you scan it for vulnerabilities?

Asset visibility is a critical building block for security measures, allowing you to have context around every asset connected to your network. You can leverage this data to assess endpoint detection and response (EDR) and vulnerability scan gaps in your network security. Thus ensuring you have strong, comprehensive network security coverage.

BOD 23-01 requires asset inventory and vulnerability enumeration

The number of assets has only continued to increase over time and CISA says “continuous and comprehensive asset visibility is a basic precondition for any organization to effectively manage cybersecurity risk.” In a 2021 US Senate report, federal agencies highlighted common asset and vulnerability challenges regarding their cyber security posture. That’s where CISA BOD 23-01 comes into play.

government cyber security diagram

BOD 23-01 focuses specifically on asset discovery and vulnerability enumeration which, as indicated in the diagram above, are critical pieces of any cyber security program. By April 3, 2023, federal civilian agencies need to have taken steps to comply with the following requirements:

  • Perform automated asset discovery every 7 days, covering a minimum of the organization’s IPv4 space.
  • Ingest on-demand vulnerability scan reports within 72 hours of a CISA request and be able to present findings to CISA within 7 days.
  • Perform vulnerability enumerations every 14 days with detection signatures that are no more than 24 hours old.

This criteria demands automated, on-demand, and rapid asset discovery capabilities. For many organizations, the volume of assets is too large for manual processing. BOD 23-01 aims to ensure federal agencies can keep up with their asset visibility and tracking. Automation must be able to report vulnerability data into a CDM dashboard to comply with BOD 23-01. CISA BOD 23-01 implementation guidelines specify what assets types fall within the scope of this directive, such as bring-your-own-device (BYOD) assets, communication devices, and more.

Asset discovery and vulnerability enumeration

The CISA BOD 23-01 requires that asset discovery capabilities must be able to capture high-fidelity data for managed and unmanaged devices. This data must be readily available, and presented in a digestible format to be considered compliant with the new directive. But asset discovery is only half the battle. There are several agencies that use vulnerability scanners to conduct discovery in addition to the traditional use of conducting vulnerability assessments. Vulnerability scanners are not an effective way to meet the new CISA requirements for asset inventory because they have limitations in terms of when they can run and how long the scans can take. FCEB agencies, and other organizations are encouraged, need a discovery solution that enables same-day response.

Asset discovery and vulnerability enumeration are the focal points of BOD 23-01. These two aspects of cyber security empower organizations to “better account” for assets and risks that have previously been unknown, and therefore unprotected, within their networks. While the CISA BOD 23-01 aspires to discover and protect the critical infrastructure and networks of the government, the same values can be applied to networks at large, no matter how the network is structured.

Asset discovery is a foundational security measure

The BOD 23-01 states, “Asset visibility is the building block for operational visibility.” Organizations must be able to identify IP addresses directly in the network as well as associated IP addresses. BYOD, cloud, and other assets are included in this identification requirement. IPv4 addresses need to be accounted for in their entirety at a minimum, though full visibility of other IP addressable assets are highly encouraged.

There are several ways to perform asset discovery, including active, passive, and external scanning. Each method will bring certain assets to light, but these methods also come with their own challenges.

  • Active: An active scan transmits network packets or queries local hosts and then analyzes responses. In other words, active scanning creates traffic for the network. If you are scanning a network with fragile devices, ensure that you pick a scanner that has been designed to safely scan these devices.
  • Passive: These scans observe traffic that traverses the network adapter the scanner is configured to listen in on. Passive scanning collects data about the assets actively talking on a limited section of the network, limiting visibility to a singular “choke point” and active assets. Passive collection is difficult to deploy across a sprawling organization. Encrypted protocols have made passive asset inventory increasingly harder.
  • External: External attack surface management (EASM) tools provide a perimeter view of IP addresses outside your network. Scanning external attack surfaces helps with gaining visibility to external hosts or exposed services, reconnaissance in penetration testing, and more. However, network owners can opt to hide their IP ranges, preventing those assets from showing up on your scan. Additionally, these are conducted without direct access to the network so visibility may be limited even further.

Effective asset discovery capabilities will deliver visibility into both internally and externally facing assets. As a result, you’ll have a more comprehensive asset inventory, allowing you to quickly identify and track when assets come online or go offline.

Critical vulnerabilities must be enumerated within 72 hours

Cyber security programs must be able to identify asset-specific vulnerabilities on-demand to comply with BOD 23-01 requirements. This applies to any information technology or operational technology asset that is accessible via IPv4 or IPv6 networks. BOD 23-01 mandates that agencies enumerate vulnerabilities across all discovered assets, such as operating systems, software and versions, potential misconfigurations, and missing updates. However, vulnerability enumeration has its own challenges and limitations with fingerprinting.

On top of struggling to meet data requirements, vulnerability management solutions lack the ability to meet the requirements outlined in CISA BOD 23-01, particularly, the 72 hour response timeline. Vulnerability scan times can vary greatly, depending on the business restrictions in place. Oftentimes, teams need to wait until the new vulnerability checks are available in order to scan for the newest security flaw. The solutions then need to scan the network again, which often requires waiting for the next maintenance window. This makes the required 72 hour response time extremely challenging to meet.

A modern approach to identifying potentially vulnerable systems much faster is to decouple the network scan from the vulnerability analysis. A modern asset discovery solution will be able to scan the hardware and software assets on the network with enough detail that it already contains enough information to identify potentially vulnerable systems. As a result, security teams can identify potentially impacted systems in minutes by querying the database. This approach is much faster than the traditional path of waiting for updated vulnerability checks, updating the scanners, scanning the network, and running reports on the new vulnerability.

Reducing the network security threat surface through asset inventory and vulnerability management solutions is critical to one’s overall security posture. One tool without the other is not enough to comply with the recent directive. Asset inventory and vulnerability management solutions work together to provide a clearer picture of an organization’s security posture.

How runZero helps comply with BOD 23-01

runZero is a comprehensive asset inventory solution that uses active, unauthenticated scanning capabilities as well as the ability to pull in third-party data, for example from vulnerability scanners, for a full picture of your network. runZero was founded by HD Moore, the creator of Metasploit, with cyber security fundamentals in mind. The runZero scan engine was designed from scratch to safely scan fragile devices.

runZero can help with administering asset discovery and inventory management in several ways including:

  • Discover the entire IPv4 space in less than 7 days: BOD 23-01 requires that the entire RFC 1918 space is scanned every 7 days for asset inventory. Most scanning technologies, especially vulnerability scanners, will struggle to cover an entire agency in this amount of time. runZero can cover the entire internally addressable RFC 1918 space overnight. runZero can also scan the agency’s external perimeter.
  • No credentials required: BOD 23-01 states that “asset discovery is non-intrusive and usually does not require special logical access privileges.” runZero features a proprietary unauthenticated active scanner that was designed with asset inventory in mind. Many other solutions require credentials to obtain enough information about systems
  • Respond rapidly to imminent threats: BOD 23-01 requires agencies to “develop and maintain the operational capability to initiate on-demand asset discovery and vulnerability enumeration to identify specific assets or subsets of vulnerabilities within 72 hours of receiving a request from CISA and provide the available results to CISA within 7 days of request.” After a new vulnerability story breaks, vulnerability scanners often take 1-2 weeks to create a vulnerability check for new vulnerabilities before agencies can even start testing. In most cases, you can use runZero’ existing scan data to find affected systems in a matter of seconds without having to rescan.
  • Get asset context on enumerated vulnerabilities: runZero integrates with Tenable, Rapid7 and Qualys to import vulnerability data into the asset inventory to provide contextual information on what assets a vulnerability was found on as well as the network context of the asset. In addition, runZero makes it easy to check that your vulnerability scanners are covering all of your subnets, highlighting any security control coverage gaps.
  • Import asset inventory data to the CMDB or Agency Data Lake: According to the CISA CDM architecture diagram, active scanners should push their data into the CMDB, which publishes data to the agency data lake that feeds the CDM. runZero integrates with CMDBs (e.g. ServiceNow). Some agencies that do not have an existing CMDB may even choose to aggregate data in runZero directly and feed the Agency Data Lake from there. runZero integrates with vulnerability scanners, endpoint detection and response (EDR) solutions, mobile device management (MDM) software, Microsoft Active Directory / Azure AD, attack surface management vendors, and cloud hosting providers to aggregate and consolidate all asset data in a single platform. It then offers a simple JSON export API to pull the asset inventory into a data lake.

Discover internal and external assets

runZero discovers internal and external assets, providing the high-fidelity context needed to fulfill BOD 23-01 requirements. Set up recurring unauthenticated scans to keep your asset inventory awareness up. Alerts for new asset connections or existing asset changes can be easily added to your scans. You can also conduct on-demand scans as needed and get the asset contextualization you need in minutes, complete with downloadable, digestible reports that you can present to your team (or CISA).

To meet the requirements outlined in BOD 23-01, your asset discovery solution needs to be able to quickly capture high-fidelity asset data on everything within your firewall as well as exposed services to properly assess your asset vulnerabilities. runZero can give you a strong picture of your external attack surface. Through active scanning and integrations, runZero augments data found by taking inputs from internal IPs that have been discovered and identifying public-facing hosts. Additionally, our unauthenticated scans can discover assets on a network without requiring a username/password. This approach is unobtrusive, because it doesn’t require credentials and agent deployment is time consuming and only covers managed assets.

Build a comprehensive asset inventory

A complete asset inventory includes unmanaged devices, internal and external assets, and having relevant data available on all of these assets. This level of visibility is essential both for strengthening your security posture and for meeting BOD 23-01 requirements. Unauthenticated scanning is the best way to quickly capture this information without having to worry about system fragility or resource-intensive setup like with agent-based solutions.

runZero creates a comprehensive picture of your asset inventory through on-demand unauthenticated scans and integrations, giving you more accurate fingerprinting of your assets, including those you don’t know about. You can find unmanaged devices and see when assets come on or offline in your network. Additionally, runZero gives you full control of your scans and queries, including the ability to create custom queries, generating alerts for specific assets in your scan results.

Enrich assets with vulnerability data

runZero leverages asset data from multiple sources, as well as its own unauthenticated scanner, to deliver full visibility into assets across any environment. Integrations with vulnerability scanners, like Tenable, Qualys, and Rapid7, will help you:

  • Add additional asset context to your vulnerability data
  • Find gaps in your vulnerability scan coverage
  • Respond to emerging vulnerabilities faster

Search web screenshots for oddities, identify outliers, and see assets that may need to be patched with on-demand custom queries. For example, let’s assume developers were aware of Log4Shell on the first day. They weren’t able to immediately go into their systems to find and fix the vulnerability because no one had checks available on day one. As a result, teams typically had to wait for their vuln scanner to have the checks available and then wait for a maintenance window to scan their targets resulting in delays in their ability to assess and remediate issues.

During one of our case studies, a customer that had been using ServiceNow ITOM (IT Operation Management) realized they struggled with getting all of the asset data they needed. This was especially true for their unmanaged assets, but they didn’t have the desired data for their managed assets either. The customer said, “The team looked at Qualys as an alternative data source for ServiceNow Discovery, but the system (scanned through appliances) was too slow.”

Log4Shell highlighted the importance of having the ability to quickly search an existing inventory to find assets that may be impacted by a new vulnerability without having to run a new vulnerability scan. runZero was able to provide prebuilt queries to help customers find potentially affected assets before vulnerability scanners had checks available for products and services using the Log4J.

runZero exceeds the asset visibility requirements of BOD 23-01

CISA BOD 23-01 was created to strengthen the overall cyber security posture of federal civilian agencies by requiring improvements around asset inventory and vulnerability management. With several tools and methods being used to conduct these practices, the new timeline requirements will force agencies to evaluate existing processes to comply with BOD 23-01 runZero will unify and enrich asset data from your existing security tools to deliver visibility across your internally and externally facing assets. You can take runZero for a test run with our free 21-day Enterprise trial or get a demo to learn how runZero can help your business. Contact us if you’d like to test our self-hosted version.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

New CyberLink Report Finds Over 131 Million Americans Use Facial Recognition Daily and Nearly Half of Them to Access Three Applications or More Each Day

Facial recognition use is highest for protection of sensitive data and personal information; consumers most likely to opt-in to improve safety and boost convenience

LOS ANGELES, CA — NOVEMBER 22, 2022 — CyberLink, a pioneer of AI and creator of FaceMe®, a leading facial recognition technology, released today the first edition of its ground breaking report entitled FaceMe | Face of the Future, unveiling high levels of consumer adoption of facial recognition, particularly among Gen Z and millennials, for multiple mobile applications and consumer venues including airports, banks and medical offices. The report informs businesses of the many other ways consumers would like to use this technology, provided it’s secure, is used with their consent, and addresses their privacy concerns.

The report, which polled 2,455 Americans, reveals:

  • Roughly 176 million Americans use facial recognition,132 million of them use their face on at least one application per day, with 75% of 18- to 34-year-olds having adopted the technology and 57% of this age group using it daily.
  • Of the people who use facial recognition, unlocking their phone, laptop or other personal computer is the most common use at 68%, followed by 51% using it to log-in to an app on a phone (i.e., healthcare portal or ticketing app)
  • Beyond mobile app use, people are most open to facial recognition technology for improved safety at airports (55%), banks (54%), and medical offices (53%)

“There’s this perception that people are not ready for facial recognition technology, yet, almost all of us are using it every day in one way or another,” said Dr. Jau Huang, Chairman and CEO of CyberLink, the creator of FaceMe. “New use cases for AI-based computer vision and facial recognition are constantly emerging. The explosion of mobile apps, the password nightmare they generated, and the face login solution that followed drove initial adoption in the mass market. Now, many see AI-based automation as a key solution to the current labor crisis. Traditional and online businesses are applying facial recognition to a wide set of activities, ranging from security and access control to self-service, statistics, and the many facets of customer experience. Be ready, there is a lot of facial recognition coming ahead!”

The study, conducted online with the third-party research firm YouGov, uncovered not only that consumers are ready for facial recognition use in new settings, but also that they expect certain guarantees (such as the choice to opt out) in order to support its use. The report and findings can be found at https://www.cyberlink.com/faceme/insights/whitepaper/general/731/faceme-facial-recognition-report .

Consumers Most Open to Facial Recognition Technology at Airports, Banks and Medical Offices

The data reveals that those Americans willing to opt-in to facial recognition technology in any setting, are most open to facial recognition to improve safety at Airports (55%), banks (54%) and medical offices (53%). Notably, respondents prioritized these same settings when it came to facial recognition to improve convenience and overall enhanced experience. The office (39%), hotels (30%), sports stadiums (29%), public transportation (28%), retail and grocery stores (26%) and restaurants/bars (23%) were all also selected by more than 1 in 5 of these consumers as settings they’d be comfortable opting-in to using facial recognition technology.

 

Data Protection and Convenience are Top Motivators

The highest percentage of those open to using facial recognition technology said they would be open to facial recognition while shopping at a store, eating at a restaurant or traveling if it better protected their data, personal information, and assets (54%). A large portion said they would consider it for improved safety at their home and workplace (42%). Convenience was also important with 45% of those open to using facial recognition in these settings saying they would do so if it reduced time spent waiting in line and 43% saying the same if it allowed them to get what they needed faster and more conveniently. Ensuring proper mask wearing (23%), eliminating human contact (20%), and getting a VIP experience (20%) were all of lesser but not insignificant importance.

Generations Differ on Willingness to Adopt Facial Recognition

According to the report, facial recognition adoption can vary depending on the demographic. 57% of 18–34-year-old people use some sort of facial recognition at least once a day compared to 40% of people aged 35-54 and 24% of people ages 55 and older. Younger demographics are also more particular than other groups about knowing their face won’t be saved or sold (43%; 4-8 points higher than other groups) and being provided with clearly explained signage and terms of conditions (37%; 4-8 points higher than other groups). Once consumers are onboarded onto the technology, 75% used it at least once a day, showing strong endorsement by existing users.

The FaceMe | Face of the Future Report is available here.

​​

Methodology:

The total sample size was 2,455 US adults aged 18+. The survey was conducted online between September 6 and September 8, 2022. The figures are weighted and are representative of all US adults (18+).  YouGov is registered with the Information Commissioner and abides by and employs members of the British Polling Council.

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Lessons learned from the Uber data breach

Uber employees last month discovered a hacker intrusion into their internal network. This was possible because the attacker announced his feat on the organization’s Slack channel, as well as sharing it with the New York Times, which brought the story about the Uber data breach to light.

This isn’t the first time a data breach has occurred at Uber. Previously, the company had to pay a fine of US$148 million due to the theft of data from 57 million users and 7 million drivers worldwide in the year 2016.

The 2016 attack further prompted the conviction of former Uber CSO Joe Sullivan for hiding data breaches and theft from authorities.
In this article, we??re going to dig into the two times Uber data was breached and the lessons learned from those intrusions. To facilitate your understanding, we have divided our text into topics. They are:

  • How did the data breach at Uber happen?
  • How did Uber respond to the hack?
  • What was the impact for the organization?
  • Who is responsible?
  • How did the 2016 Uber data breach occured?
  • About senhasegura
  • Conclusion

Good read!

How did the Uber data breach happen?

An attacker is believed to have purchased an Uber contractor’s corporate password on the dark web after their personal device was infected with malware, exposing their credentials.

The contractor received multiple requests for two-factor login approval and ended up releasing access to the attacker, who was able to log into the collaborators account and gain access to various tools, such as the organization’s Slack.

Known as an MFA fatigue attack, this social engineering technique involves bombarding the victim’s authentication app with push notifications so that they accept and allow access to their accounts and devices.

He then posted a message on the Slack channel announcing the Uber data breach. He complained that the company’s drivers are underpaid, as well as exposing screenshots showing assets he has gained access to, such as Amazon accounts, Web Services and code repositories.

How did Uber respond to the hack?

According to Uber’s website, its security monitoring processes allowed it to quickly identify and respond to the attack.

Their focus would have been on ensuring that the hacker no longer had access to their systems, thus protecting user data, as well as investigating the scope and consequences of the incident.
His actions included:

  • Identify employee accounts that could be compromised and
  • block their access to request a password reset;
  • Disable tools potentially affected by data breach at Uber;
  • Reset access to keys for internal services;
  • Prevent new code changes;
  • Require employees to re-authenticate when restoring access to internal tools, as well as strengthen policies related to multiple factor authentication (MFA); and
  • Expand monitoring of the internal environment.

What was the impact for the organization?

Also according to information released by Uber, the hacker had access to the company’s internal systems, but investigations are still ongoing. On the other hand, it was already possible to obtain some information:

  • Uber did not find access to its production systems, that is, to public-facing tools; user accounts and databases with their information;
  • The company encrypted its users’ credit card and health data, providing them with more protection;
  • It also revised its codebase, which did not point to attacker access to customer data stored in its cloud environments;
  • Apparently, the hacker downloaded internal Slack messages and information from an internal invoice management tool;
  • The attacker was also successful when he tried to join Uber’s dashboard on HackerOne, where there are bugs. However, the bugs accessed by it have already been fixed;
  • Despite being able to keep its services running during the process, Uber had its support operations impacted due to the need to disable internal tools.

Who is responsible?

What we do know about the hacker is that he claims to be 18, did nothing to hide the Uber data leak, and likely his actions were not motivated by financial gain through espionage, extortion or ransomware.

Furthermore, he is believed to be a member of a group of cybercriminals called Lapsus$, which has already breached Microsoft, Samsung and Cisco, among other major corporations. The US Department of Justice and the FBI are investigating the case.
How did the 2016 Uber data breach occured?

The news about a data leak at Uber, which took place in 2016, also became public some time ago. At the time, cybercriminals had access to the data of 57 million users worldwide, in addition to 7 million drivers, which 600 thousand are from the United States.

When Uber discovered the hack, it did not communicate the victims. Other than that, he paid a hacker to keep the fact secret. This conduct violated state law and prompted the Pennsylvania attorney general to demand changes in the organization’s corporate behavior.
In addition, Uber had to pay $148 million in a national settlement, which was distributed among the 50 states and the District of Columbia.

Another consequence was the recent conviction of former Uber CSO Joe Sullivan for obstructing Federal Trade Commission proceedings and covering up the hack. He faces up to eight years in prison on the charges.

About senhasegura

We, at senhasegura, are part of MT4 Tecnologia, a group of companies focused on digital security, founded in 2001 and active in more than 50 countries.

Our main objective is to ensure digital sovereignty and security to our contractors, granting control of privileged actions and data and preventing theft and leakage of information.

For this, we follow the life cycle of privileged access management through machine automation, before, during and after access. We also work for:

  • Avoid interruptions in the activities of the companies, which may impair their performance;
  • Automatically audit privilege usage;
  • Automatically audit privileged changes to identify privilege abuses;
  • Offer advanced PAM solutions;
  • Reduce cyber risks;
  • Bring organizations into compliance with audit criteria and standards such as HIPAA, PCI DSS, ISO 27001 and Sarbanes-Oxley.

Conclusion

In this article, we show you how a data breach occurred at Uber recently and another in 2016. If you found it interesting, share it with someone who wants to know more about this topic.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

SafeDNS named top-rated cybersecurity software

SafeDNS has been featured as a top-rated product in Software Advice’s FrontRunner Report 2022 for Cybersecurity Software category. Here’s our placement in the Grid report:

SafeDNS is also proud to announce its multiple award-winning streak in 2022 by Capterra. We were recognized in Capterra Shortlists in 2 categories this year as Emerging Favorite: Cybersecurity & Endpoint Protection.

Thanks to our clients who made it possible! We received some stellar reviews on Capterra:

“Safe DNS is a company that accomplishes what they commit to offering. They have great customer service and competitive pricing.” [Scott M.]

“SafeDNS is a solid DNS based content filtering solution. The reliability and consistency is great.” [Thomas M.]

“SafeDNS is a really great product, we have been using it for over 5 years now and it’s really robust.” [Jason T.]

To be as happy as our customers are with the DNS Security we provide, start your free trial for Business now with 20% off. Use code BlackFriday_20 at purchase.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

ESET launches APT Activity Report highlighting activities of Russia-, North Korea-, Iran- and China-aligned threat actors, including attacks on aerospace and defense industries

  • ESET launches new APT Activity Report; the first installment covers the period of May-August 2022 (T2 2022).

  • ESET Research saw no decline in the activity of Russia-, China-, Iran-, and North Korea-aligned APT groups.

  • Ukraine is still a prime target of Russia-aligned threat groups eight months after the invasion.

  • Aerospace and defense industries continue to be of high interest to North Korea-aligned groups, along with financial and cryptocurrency firms and exchanges.

  • China-aligned groups were able to leverage various vulnerabilities and previously unreported backdoors.

  • The growing number of Iran-aligned groups continued to focus their efforts mainly on various Israeli verticals.

BRATISLAVA — November 14, 2022 — Accompanying the successful ESET Threat Report, ESET Research launches the ESET APT Activity Report, aiming to provide a periodic overview of ESET’s findings on the activities of advanced persistent threat (APT) groups. In the first installment, covering T2 2022 (May-August 2022), ESET Research saw no decline in the APT activity of Russia-, China-, Iran-, and North Korea-aligned threat actors. Even more than eight months after the Russian invasion, Ukraine continues to be a prime target of Russia-aligned APT groups such as the infamous Sandworm, but also Gamaredon, InvisiMole, Callisto, and Turla. The aerospace and defense industries, along with financial and cryptocurrency firms and exchanges, continue to be of high interest to North Korea-aligned groups.

“We have noticed that in T2 2022, several Russia-aligned groups used the Russian multiplatform messaging service Telegram to access C&C servers or as an instrument to leak information. Threat actors from other regions were also trying to gain access to Ukrainian organizations, both for cyber espionage and intellectual property theft,” elaborates Jean-Ian Boutin, Director of ESET Threat Research.

“The aerospace and defense industry remains of interest to North Korea-aligned groups – Lazarus targeted an employee of an aerospace company in the Netherlands.  According to our research, the group abused a vulnerability in a legitimate Dell driver to infiltrate the company, and we believe this to be the first-ever recorded abuse of this vulnerability in the wild,” continues Boutin.

Financial institutions and entities working with cryptocurrency were targeted by North Korea-aligned Kimsuky and two Lazarus campaigns. One of these, dubbed Operation In(ter)ception by ESET researchers, branched out of its usual targeting of aerospace and defense industries when it targeted a person from Argentina with malware disguised as a job offer at Coinbase. ESET also spotted Konni using a technique employed by Lazarus in the past – a trojanized version of Sumatra PDF viewer.

China-aligned groups remained highly active, using various vulnerabilities and previously unreported backdoors. ESET identified a Linux variant of a backdoor used by SparklingGoblin against a Hong Kong university. The same group leveraged a Confluence vulnerability to target a food manufacturing company in Germany and an engineering company based in the US. ESET Research also suspects that a ManageEngine ADSelfService Plus vulnerability was behind the compromise of a US defense contractor whose systems were breached only two days after the public disclosure of the vulnerability. In Japan, ESET Research identified several MirrorFace campaigns, one directly connected to the House of Councilors election.

The growing number of Iran-aligned groups continued to focus their efforts mainly on various Israeli verticals. ESET researchers were able to attribute a campaign targeting a dozen organizations in Israel to POLONIUM and identify several previously undocumented backdoors. Organizations in or linked to the diamond industry in South Africa, Hong Kong, and Israel were targeted by Agrius in what ESET Research considers a supply-chain attack abusing an Israeli-based software suite used in this vertical. In another campaign in Israel, indicators of possible tool-use overlap between MuddyWater and APT35 groups were found. ESET Research also discovered a new version of Android malware in a campaign conducted by the APT-C-50 group; it was distributed by a copycat of an Iranian website and had limited spying functionality.

For more technical information check the full “ESET APT Activity Report” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Can your home device be a threat to you?

Have you ever thought that your vacuum cleaner may not only sweep your floor but also listen to your conversations? Or that your home security cameras might be used by someone else to stalk you? Smart gadgets are making our lives easier, but they can also pose a serious risk to our property, privacy, and even life if they fall into the hands of hackers. If you don’t want to become their next cybercrime victim, let’s take a look at some of the potentially risky connected devices surrounding you and ways to protect your security.
 

Blog image 2022 11 09 1

 

Innocent-looking smart toys

AI-powered and internet-connected toys provide much more than just entertainment for children. They boost creativity and develop social, motor, problem-solving, and other skills that can significantly impact their future performance. However, buying smart toys can be a not-so-smart idea – along with bringing kids joy, they can also attract hackers and identity thieves.

Security flaws are common, even in toys from parents’ most-trusted toy brands. Mattel’s Wi-Fi-connected Barbie doll, My Friend Cayla, Fisher-Price’s Chatter Bluetooth telephone, VTech InnoTab Max, Furby Connect doll, and many other toys have been labeled by cybersecurity experts as spying devices. Because of their security gaps, hackers can turn their cameras and microphones on and use them to see and hear everything the toy sees and hears. Moreover, fraudsters can interact with your children, give them orders, extract secrets or collect data, and track their location. In addition, the data collected can be used for blackmail and ransom demands or sold on the dark web or to advertisers.

Spying webcams

The desire to protect your home space from burglars can backfire – you can find yourself being spied on by others. That’s exactly what happened to Amazon’s Ring and Google’s Nest security cameras when malicious actors hacked them to surveil, threaten, and insult people who own them.

In one case, a home’s Ring camera loudspeaker started playing a song that a girl heard, so she went to investigate. When she came into the room where the camera was located, a deep masculine voice spoke to her through the camera speaker, saying that he was Santa Claus and calling her racist slurs.

In another Ring hack case, the virtual intruder harassed a woman, calling her vulgar names and asking her to respond.

Similar situations have also occurred with Nest camera holders. A few families reported that hackers talked to them through these cameras and messed with house thermostats by cranking up the heat.

These are just a few examples of how you can unexpectedly become a victim of cybercrime, which in addition to home security cameras, can happen with baby monitors or even pet cams.

Risky home cleanliness

The truth is that robot vacuum cleaners make life much easier. You can mind your own business while a robot vacuum sweeps your house. Although it may seem that cleaning dust from the floor is its sole task, in the hands of fraudsters, it can have a wholly different purpose as a spying device that may make you a victim of cybercrime.

Researchers revealed that hackers who gained access to a robot vacuum cleaner could get a house map or its GPS as well as record people’s conversations by repurposing its LiDAR sensors to act as microphones. In addition, some robot vacuums can enable hackers to take control of the vacuum or even watch the live video feed produced by the device. All this collected data can be sold to advertisers or used by criminals to plan a robbery or other crimes.

Deadly medical devices

It is no longer surprising that we can become victims of cybercrime when our bank card details are stolen or our mobile devices or online accounts are hacked. All this is nothing compared to what can happen when malicious actors hack into medical devices such as pacemakers, implanted defibrillators, drug-infusion pumps, and other health tech gadgets, which can have fatal consequences.

In 2017, the FDA recalled 465,000 pacemakers after the security firm, MedSec, found security flaws that could allow hackers to reprogram the devices and put patients’ lives at risk. For the same reason, doctors replaced former U.S. Vice President Dick Cheney’s heart defibrillator so it couldn’t be hacked by terrorists who might try to kill him. Infusion pumps automating the delivery of medications and nutrients into patients’ bodies can also become deadly weapons if hackers increase the doses. Moreover, such hijacked healthcare devices can be used to steal personal or medical records or even urge victims to go to the hospital by sending them false messages about their medical condition, so they leave their houses unattended.

How to protect

While some of the above-mentioned connected devices have no recorded cases of anyone maliciously hacking them, various investigations by cybersecurity experts have shown that the potential for problems exists. Therefore, security measures must be put in place to avoid any possible threats.

  • Don’t recycle passwords. Create complex and unique ones for all your connected devices and accounts.

  • Where it’s possible, set up multi-factor authentication (MFA).

  • Use secure Wi-Fi and make sure its password is hard to guess.

  • If you have a problem remembering different passwords for your accounts, use a password manager.

  • Always keep the software of your devices up to date. Updates patch potential security flaws.

  • When the device is not being used, for example, a vacuum robot or kid’s toy, unplug it or turn it off, so it stops collecting data.

  • If it’s possible to use the device without the internet, disconnect it.

  • Make sure that the smartphone you have connected to your devices is malware free.

  • Stay vigilant, and don’t provide your or your kid’s personally identifiable information if it’s not necessary. For example, children’s toys can be updated without knowing your kid’s age. However, be sure to provide the correct contact details so that developers can notify you of possible updates or security flaws.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Why Integrated Network Security Architecture is the Future

Integrated network security architecture is the design of a network to defend against cyber attacks. It is simply securing a network by integrating different security features. It is a systematic approach to designing and implementing a set of cybersecurity measures that are synergistic and mutually supportive to one another, to provide an increased level of protection.

With an integrated network security architecture, you can integrate multiple layers of protection into one cohesive system. This includes technologies, people, processes and policies. These layers work together to provide comprehensive protection for the company’s IT resources and data. It involves selecting hardware, software and services, their configuration and deployment, and how they are managed.

The security method is often referred to as the “defense-in-depth” approach. This means that it focuses on protecting data from a variety of different angles, as opposed to using just one single method. No wonder it has proven to be the most effective means of securing your network.

The three main layers of network security architecture are:

I. The Physical Layer

This includes everything from the cables and wireless antennas to the actual devices that make up your network. It is a form of perimeter protection that shields your network from wireless interference.

II. The Data Link Layer

This is where all data passes through on its way to being transmitted over the network. By default, this poses a vulnerable pathway requiring network and data protection.

III. The Network Layer

It is also referred to as endpoint protection because it is the last layer to ensure your network’s security.

Why is Integrated Network Security Architecture Important?

The integration of network security architecture is important as it helps to protect the network against cyber threats. It effectively provides a holistic view of the entire system, which is necessary for maintaining a secure and reliable network environment.

Network security is a vital part of any organization’s IT infrastructure. It is important to have an integrated network security architecture in place to protect the organization’s data and resources. This is especially crucial for organizations or even individuals that have data that they want to protect.

Four Proven Practices In Integrated Network Security Architecture

I. Perform a Threat Assessment of Your Organization’s Networks

A threat assessment is a process of identifying the potential threats to an organization and then determining how these threats might be realized. This would help to determine what measures to take to prevent it, thereby protecting your network and data.

Therefore, during any threat assessment, the first thing to do is to identify the assets in your organization. This aims to determine what would be at the risk in an attack. By putting yourself in the shoes of an attacker, you will be able to detect the assets that need to be protected.

The next step is to determine what type of threats might be present. It is important to know what kind of technology your company uses and how it might be vulnerable. Note that the major difference between threats and vulnerability is that threats are those who would want to cause harm, while vulnerabilities are weaknesses that the threats can exploit.

The last step is to develop a response plan for preventing, detecting, and responding to threats. This includes prioritizing the threats and vulnerabilities based on their level of severity and probability of occurrence.

When it comes to integrated network security architecture, threats can be categorized in two ways:

  • Technical Threats – A technical threat is when a system or network is compromised through a computer exploit or malware that disrupts its operations. This type involves exploiting security vulnerabilities in software or hardware to gain access to data and resources. Some common examples are; hacking, malware, denial of service attacks, etc.
  • Non-Technical Threats – This takes a more hands-on approach and can consist of things like insider fraud and theft of trade secrets.

II. Conduct a Business Impact Analysis

A business impact analysis is a process that can help an organization identify its risks and impacts related to network disruptions or attacks. It also helps businesses understand the vulnerabilities they might have.

It serves as a methodology that can be used to assess the impacts of disruption that might occur in the event of a cyber attack.. The analysis should be conducted by the risk management team, with input from other stakeholders within the organization.

The main objective of this analysis is to identify and prioritize risks and impacts, as well as to understand how an event will affect different parts of the organization. Analysis should also help in understanding how much time is required for recovery after a disruption or attack.

This type of analysis helps the business make decisions to mitigate its risks and impacts for the future. If an organization fully understands what would happen if there were network disruptions or attacks on their systems, it will help them understand the precise impact it might have on their business operations. Moreover, it could also prepare them for a scenario where events could happen more frequently in the future.

III. Develop a Strategy for Handling Security Incidents

Security incidents are occurring these days at an unprecedented rate. This includes any event that can negatively impact the confidentiality, integrity, or availability of an organization’s data.

It is important to have a strategy in place for how to handle them, which includes clear priorities, responsibilities, and procedures. Below is a tested incident response plan template or incident response process that you need to emulate.

IV. Assess the Severity of the Situation

When faced with a security threat, the first step is to assess the severity of the security incident and determine whether it needs to be handled by higher-level personnel or not.

If it does, they should be notified and assigned responsibility for handling the incident. If not, then a lower-level employee should take on responsibility for handling it themselves or with assistance from someone else who is available and qualified to do so.

Your assessment should follow this pattern:

  • Think about the threats that you are likely to face.
  • Make sure that your plan is flexible enough to adapt to new threats as they emerge.
  • Consider the need for interoperability with other networks, such as your partners’ networks, suppliers’ networks and customers’ networks, when designing your network architecture.
  • Determine the level of protection needed, and how much funding is available before designing your security architecture and plan.

Consider your business needs and how much risk you are willing to take on, your when designing your security architecture and plan so that these factors can be aligned.

Contain the Damage

The second priority in handling a security incident is to contain the damage. This includes notifying those who need to know, containing the spread of any virus or malware, and preventing future incidents. Depending on the type of breach, this may include initiating a forensic investigation or contacting law enforcement.

Your containment strategy should:

  • Properly segment networks with firewalls
  • Perform vulnerability assessments
  • Implement intrusion detection systems
  • Install antivirus protection on all devices
  • Use two-factor authentication for access to data and accounts
  • Protect endpoints with endpoint security solutions
  • Ensure that servers are patched and updated regularly
  • Encrypt sensitive data that is stored on the network or devices

Prevent Similar Future Attacks

The third priority when it comes to integrated network security architecture is to identify what happened and how it happened. This includes identifying who and what data was affected by the breach, if any other systems were compromised, and how to prevent similar future attacks.

Make sure that your prevention plan encompasses the two implementations below:

  • Develop an operational plan
  • Implement controls to address identified risks in the system design, physical architecture, logical architecture designs, and operational plans.

IV. Assign IT Staff to Identified Roles & Tasks

By having a dedicated IT security team, you can effectively delegate security roles and responsibilities to ensure quick detection and mitigation of present and future security threats.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。