Skip to content

Keepit for monday.com | Data Resilience Guide

While monday.com is essential for daily operations, relying on its native “Trash Can” for data governance is a significant risk. In a world of ransomware and accidental deletions, true business continuity requires an independent recovery strategy.

The Shared Responsibility Model: monday.com ensures the platform is available; you are responsible for ensuring the data inside it is protected from loss, theft, or corruption.
Automated Daily Backups
Daily snapshots of items, boards, and columns with zero manual effort.
Point-in-Time Restore
Recover specific boards or items to their exact state from any historical point.
Ransomware Protection
Immutable, air-gapped storage ensures your backups are shielded from malicious threats.
Unified SaaS Security
One platform to secure your entire stack: Jira, Confluence, Miro, and monday.com.
 

Operational Continuity, Guaranteed

Losing months of project data due to a misclick or a malicious insider shouldn’t be a risk factor for your creative and technical teams. Keepit ensures that your institutional knowledge remains accessible, compliant, and secure—no matter what happens in the production environment.

Zero Standing Privileges in Practice

We are pleased to invite you to an exclusive webinar:

Zero Standing Privileges in Practice

Static accounts are a magnet for attackers—whether they are used by people or machines. To achieve true security, organizations must move to Zero Standing Privileges (ZSP).

Join us to learn how Segura automates “Just-in-Time” access for both users and applications. Discover how to replace hardcoded secrets and “always-on” admin rights with temporary, ephemeral identities that vanish the moment the job is done.

🗓️ Date: 13 May 2026, Wednesday 🕒 Time: 3pm – 4pm SGT 💻 Venue: Gotowebinar 🌐 Language: English 👨🏻‍💻 Speaker: Kenneth Lo

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

Graylog 7.1: May the Logs Be With You

2025-12-22   A log correlation engine automates the process of linking fragmented event data across diverse systems, transforming raw logs into real-time, actionable insights. By normalizing data and applying correlation rules, it reduces alert fatigue, accelerates incident detection (MTTD), and enables faster root cause analysis for improved security and operational efficiency.

Continue reading

runZero 4.9: IT/OT Topology & Attack Path Mapping

In converged IT/OT environments, visibility is the foundation of defense. runZero 4.9 moves beyond asset lists to provide a unified source of truth, visualizing reachability and highlighting the risks that matter most.
Strategic Insight: 30% of OT assets are typically only one hop away from an internet-exposed device. runZero identifies these hidden “bridges” before attackers do.
 

Attack Path Mapping

Visualize 2D and 3D trajectories from initial compromise to operational shutdown. Identify high-risk pivot points and harden your choke points.

 

Sub-Asset Discovery

Peer behind protocol gateways like Modbus and BACnet to enumerate the PLCs and fieldbus devices that were previously invisible.

 

Bridge Detection

Automatically surface “multi-homed” devices connected to multiple networks, bypassing your firewall and segmentation strategies.

 

Operationalizing the Air-Gap

Stop relying on the “Segmentation Illusion.” runZero 4.9 ensures your air-gap is a reality by unmasking “insecure by design” protocols and identifying the forgotten workstations that turn minor IT breaches into catastrophic operational failures.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Connect for Windows: Frictionless Security

Portnox Connect for Windows

Eliminating the Onboarding Friction in Secure Access

Onboarding users to a secure, certificate-based network has traditionally been a logistical challenge. Portnox Connect for Windows removes the complexity, allowing organizations to maintain the highest security standards while providing a “two-click” experience for the end user.
Why Automation Matters: Manual certificate installation and network configuration are prime sources of misconfiguration. By automating these tasks, Portnox reduces support tickets and eliminates the human error that leads to vulnerabilities.
 

Operational Impact

For IT Teams: Reduced helpdesk volume, faster hardware rollouts, and guaranteed policy compliance across all endpoints.
For End Users: A clean, intuitive onboarding wizard that handles security configurations in the background.
 

Zero Trust Ready

In modern, perimeter-less environments, consistent verification is essential. Portnox Connect ensures that every Windows device is properly provisioned and verified before gaining network access—seamlessly aligning your fleet with a Zero Trust security framework.

2026 MSP Threat Report Summary

The era of the “break-in” is over. Attackers are now leveraging valid credentials and session tokens to bypass traditional perimeters. The latest telemetry from Guardz highlights a shift toward quiet, identity-driven campaigns.

89%
SMBs with confirmed credential compromise
2,000%
Spike in Google Workspace OAuth abuse
25:1
Non-human to human identity ratio
 

The Evolution of Stealth: BEC 3.0

Attackers are moving away from loud malware and toward “living-off-the-land” techniques. By monitoring legitimate email threads for weeks, adversaries use AI-generated voice and context-aware messaging to authorize fraudulent transactions without ever triggering a security flag.

 

RMM: The New Command & Control

RMM tool abuse now accounts for 26.2% of all endpoint threats. By exploiting legitimate tools like ScreenConnect and NinjaRMM, attackers create encrypted channels that are indistinguishable from authorized MSP traffic.

 

Immediate Operational Priorities

  • Phishing-Resistant MFA: Standardize on FIDO2/Passkeys to prevent session hijacking.
  • OAuth Governance: Audit application grants and enforce admin-level approval requirements.
  • Behavioral Monitoring: Monitor inbox rules and non-human identity patterns in real-time.
  • Kill Legacy Auth: Disable outdated protocols via Conditional Access to prevent MFA bypass.

Download the full 2026 State of MSP Threat Report

Healthcare Guide: HIPAA-Compliant Remote Access

In an era where healthcare professionals work across diverse locations, the traditional network perimeter has dissolved. Protecting electronic Protected Health Information (ePHI) requires more than just a password; it requires a comprehensive Zero Trust strategy.

Market Insight: In 2025, the average cost of a healthcare data breach rose to $7.42 million, marking the 14th consecutive year the industry has held the highest breach costs.

The Core Compliance Framework

Administrative

Managing the human element: risk assessments, incident response plans, and continuous training.

Physical

Hardening the environment: Device encryption and secure workstation management.

Technical

The digital vault: Multi-factor authentication (MFA) and AES-256 bit data encryption.

The Business Associate Agreement (BAA)

Compliance is a shared mandate. Before any vendor handles patient data, a BAA must be executed. This contract ensures that third-party partners implement the same rigorous security standards as the provider. Organizations like NordLayer offer a HIPAA BAA to streamline this legal and technical requirement.

Strategic Implementation

  • Zero Trust Network Access (ZTNA): Verifies every connection attempt based on user identity, device health, and context.
  • Principle of Least Privilege: Grants users access only to the specific clinical systems required for their role.
  • Continuous Auditing: Maintains immutable logs of all remote sessions to ensure audit readiness for the HIPAA Security Rule.

Penta Security Achieves Triple Recognition at 2026 Globee Awards

CVE-2026-3854: GitHub Enterprise Server RCE

Risk Impact: Successful exploitation allows for complete system compromise. Immediate patching is required.

Required Updates

BranchPatch Version
3.14.x3.14.25+
3.15.x3.15.20+
3.16.x3.16.16+
3.17.x3.17.13+
3.18.x3.18.7+
3.19.x3.19.4+

 

Network Hunting

Use the following query in your runZero Software Inventory to locate all GHES installations:

vendor:=GitHub AND product:="Enterprise%"

Post-Mortem: Defeating Conversational Phishing

Phishing has evolved. Today’s most dangerous attacks don’t use malware—they use social engineering. By mimicking the tone of professional security researchers, attackers are attempting to hack your sense of responsibility rather than your network.

The Core Lesson: Security tools are designed to surface risk, but human intuition is required to validate it. Defense-in-depth is only effective when technology and training act in concert.

 

The Anatomy of the Attack

The threat actor utilized a classic “responsible disclosure” lure. By addressing our leadership directly and requesting to report a “critical vulnerability,” they manufactured a professional obligation that encouraged us to engage. Crucially, the email contained no malicious links or attachments—it was designed purely to initiate a conversation.

 

The Defense Strategy

We avoided compromise through a two-layered defense:

  • Layer 1 (Technical): Our email filter correctly applied a “First-time sender” yellow warning banner, serving as the initial trigger for caution.
  • Layer 2 (Human): A security-trained team member utilized the five-minute verification rule: researching the sender’s digital footprint, the authenticity of the consultancy, and cross-referencing industry patterns.

 

Building a Culture of Readiness

To defend against modern social engineering, security awareness must shift from static presentations to dynamic, ongoing habits:

  • Continuous Training: Replace annual presentations with regular, short-burst sessions on emerging threats.
  • Real-World Simulations: Test your team with spoofed meeting invites and urgent alerts to build operational instincts.
  • Inclusivity: Executive and administrative staff are prime targets; ensure your program covers them comprehensively.

The attackers are patient and professional. Your best defense is not a better spam filter, but the disciplined pause before hitting Reply.