Skip to content

How to share your Wi-Fi password

Access to a fast internet connection through Wi-Fi has become indispensable in both our professional and personal lives. Consequently, it’s now common for us to want to share Wi-Fi access with colleagues at work and loved ones at home so they can easily connect to the Internet at high speeds as well.

However, with threats like Man-in-the-Middle (MITM) Attacks and Packet Sniffing, where cybercriminals try to intercept or manipulate communication, sharing Wi-Fi passwords must be done cautiously. So, in this article, we’ll explore a few safe and convenient methods for sharing Wi-Fi passwords.

How to share a Wi-Fi password on iPhone, iPad and MacBook

Sharing a Wi-Fi password between Apple devices, such as iPhone, iPad, and MacBook, is quite straightforward — especially if the devices are up-to-date with the latest iOS, iPadOS, or macOS versions. In fact, the entire sharing process can be completed in three easy steps. They are:

  1. Turn on Wi-Fi and Bluetooth on both Apple devices and keep them nearby.

  2. Select the Wi-Fi network on the device you want to connect.

  3. A prompt will appear on the other device sharing the password. Tap Share Password, then tap Done.

How to share a Wi-Fi password on Android devices

Sharing a Wi-Fi password using an Android device can also be done without too much effort. There are two ways you can approach it:

  1. Create a QR code

    If your device is running an Android 10 system or higher, you can share your Wi-Fi password by creating a QR code. For that, go to Settings and access your device’s Wi-Fi settings. Next, tap the gear or information icon next to the Wi-Fi network for which you want to share your password and select Share to generate a QR code. The person seeking Wi-Fi access can either scan the QR code using their device’s camera or navigate to the device’s Wi-Fi settings, select Add network, and then scan the code.

  2. Use the Nearby Share feature

    Access your device’s Wi-Fi settings, select the network you wish to share, and then choose Nearby or Nearby Share. Your device will scan for nearby devices, enabling you to choose the one you want to share Wi-Fi access with. The recipient will receive a connection request on their device, which they’ll need to accept to get access to the Wi-Fi network.

How to share a Wi-Fi password on Windows devices

As far as we are aware, there’s no quick and easy method available to share Wi-Fi passwords from Windows devices at the moment. This means that to share your password with someone, you’ll need to provide it to them directly or use third-party software for that. If you’ve forgotten your Wi-Fi password, you can retrieve it by following these steps:

  1. Go to Windows settings and choose the Network & Internet tab.

  2. Navigate to the Network and Sharing Center.

  3. Locate the network for which you want to share the password.

  4. Click on Wireless Network Properties.

  5. Access the Security tab and click on the Show characters box to see the password.

Once you check what your Wi-Fi password is, you can share it with the intended recipient.

Top security practices for sharing a Wi-Fi password

Sharing Wi-Fi passwords through Apple or Android devices relies on operating system services, which may not be completely secure. Additionally, there are always instances where we need to share passwords with people using devices from different brands. In both cases, following specific security guidelines is essential to prevent password breaches. Here’s what we recommend you should do.

Firstly, when sharing a password, opt for secure methods like encrypted platforms or in-person exchange, avoiding the public eye or unprotected communication channels.

Furthermore, ensure your Wi-Fi network is secured with WPA2 or WPA3 encryption protocols to deter unauthorized access. Avoid older and less secure encryption standards such as WEP.

Additionally, consider generating temporary passwords for your guests. Many routers provide the option to create time-limited guest passwords, which is ideal for short-term visitors.

Best tip — Use a password manager to store and share your passwords

If, at this point in reading this article, you wish there was a single solution that would allow you to quickly and securely share all your passwords, including the one for Wi-Fi, let us assure you that such a solution exists, and it’s called NordPass.

NordPass is a cybersecurity tool that enables you to store, manage, and share passwords, passkeys, credit card details, and other sensitive information with ease. Because it is encrypted, it ensures that storing and sharing passwords is much more secure, while its intuitive interface makes the whole process effortless.

Moreover, NordPass features a Data Breach Scanner, a feature that allows you to check if your data, including your passwords, has been compromised in a breach. That way, you can stay informed about the security of your credentials and take immediate action when necessary.

So, if the security of your Wi-Fi passwords and other credentials is important to you, try NordPass to be able to share them without second thoughts.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NordLayer feature release: Active Session Timeout

Make complexities of network security a strategic advantage with a new feature designed within the Zero Trust Network Access (ZTNA) framework, NordLayer’s Active Session Timeout.

This feature redefines how session times are managed, adding a robust layer of security to the modern digital workspace. This latest addition to the NordLayer suite empowers IT administrators with unprecedented control over session lifespans and enhances network security by mitigating risks associated with prolonged sensitive resource access.

Feature characteristics: what to expect

  • The feature is engineered to automatically log users out of the NordLayer application and Control Panel regardless of whether the user has been actively using the NordLayer service or not.

  • The minimal session duration period is 1 day, and the maximum (and default) session time is 30 days.

  • Central implementation & configuration via Control Panel.

  • Available for all subscription plans.

Problem to solve: Active Session Timeout enforces re-authenticated connections and shortened exposure time periods to increase network security with an automated process.

How does it work?

This feature enforces logout and re-authentication, which is crucial for every organization as an additional security measure. IT administrators can customize session duration time within the Control Panel, and it’s applicable for both Control Panel and NordLayer application users.

  • Once the session duration time is set, the countdown begins, no matter whether the user was logged in and connected to the gateway during that time period or not.

  • Upon reaching the specified duration, the session ends automatically, necessitating re-authentication for further access.

This blend of simplicity, automation, and security ensures that the user experience is fluid while network integrity remains uncompromised.

What problem does it solve?

The rise of remote work and the proliferation of personal devices in professional settings have introduced new layers of complexity in network security. Active Session Timeout  is NordLayer’s answer to these challenges:

  • Reducing exposure time: in case of device theft or loss, the shortened session duration decreases the window for potential unauthorized access.

  • Auto-logout safeguard: users are automatically logged out after the set period, providing a safety net for those who might forget to manually terminate their sessions.

  • Compliance and security alignment: the feature enables organizations to adhere more closely to their internal security policies and compliance requirements by enforcing periodic user re-authentication.

  • Enhanced flexible work policies: Active Session Timeout control supports organizations with Bring-your-own-device (BYOD) and remote work policies.

Security by design

NordLayer’s Active Session Timeout is more than just a feature—it’s a strategic ZTNA framework addition to your organization’s cybersecurity posture. This feature not only adds an extra security layer but also integrates seamlessly with existing security protocols.

By allowing precise control over session lengths, it reduces the chances of session hijacking and other related cyber threats. The feature is particularly beneficial for organizations handling sensitive data, as it ensures that sessions are only active for as long as necessary, thereby protecting both organizational and personal data.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How secure are your company’s social media, really?

Social media — the missing piece in a cybersecurity puzzle

When asked about why cybercriminals target passwords, most people typically think of common motives like stealing sensitive data, hijacking accounts for ransom, or infecting systems with malware to disrupt operations. But in an exclusive interview for NordPass, Dennis-Kenji Kipker, a Professor of IT Security Law and Research Director at cyberintelligence.institute, brought to light a sometimes overlooked aspect — that some attackers may steal credentials just to get access to a company’s social media platforms and wreak havoc. He said:

 

As an attacker, I could also try to attack the whole social media system of a company and have the company’s communications under control. […] Data, if disclosed, could cause very considerable damage not only to the company as an abstract legal entity, but also to all people involved in business relationships with that company and, of course, the employees.

Dennis-Kenji Kipker

Professor of IT Security Law and Research Director at cyberintelligence.institute

Simply put, Professor Kipker points out that mishandling passwords for social media accounts can lead to more than just losing access. It can also result in losing the trust of partners and customers, which can then lead to financial losses. How do we know things like these could happen? Because similar incidents have occurred in the past.

Real-life examples of huge social media takeovers

A major corporation stuns everyone by announcing its acquisition by a primary rival; a government agency spreads fake news causing chaos in the cryptocurrency market; a renowned music label reports the passing of one of its top artists — these are not plot ideas for the next season of Black Mirror. They are real instances where false information was shared through the official social media channels of popular organizations, leading many people to believe it was true.

That’s right. The first situation refers to the 2013 Twitter hack of Burger King, where cybercriminals seized control of the company’s Twitter account to spread false news alleging that Burger King had been acquired by McDonald’s. The second incident occurred in 2024 and involved the Twitter hack of the Securities and Exchange Commission (SEC). In this case, cyber attackers exploited the SEC’s account to falsely announce the approval of spot-Bitcoin exchange-traded funds, leading to a significant surge in Bitcoin’s price. The third example pertains to the 2016 incident involving the hacking of Sony Music’s Twitter account, during which cyber attackers circulated a hoax about the death of the pop star Britney Spears.

While not officially confirmed, it’s widely suspected that these social media takeovers stemmed from compromised passwords or actions leading to password breaches, such as phishing or malware. As expected, each incident damaged the affected company’s reputation, occasionally resulting in significant consequences and, at other times, causing less severe repercussions.

Of course, as you can imagine, these are but three out of hundreds, if not thousands, of other similar cases. This begs the question: why did these events occur in the first place? 

Why do social media takeovers happen?

The first reason, as hinted earlier in this article, is that businesses often overlook the security of their social media accounts. While they focus on protecting their internal systems from malware and other threats, they sometimes neglect the security of their social media presence.

Another factor may be businesses’ tendency to prioritize their core operations over social media security, assuming these platforms are inherently safe and require no additional steps to safeguard against potential risks.

The next critical aspect is when organizations overlook the necessity of removing access to social media accounts when employees leave their positions. This creates a dual risk: first, if ex-employees are dissatisfied, they can post damaging content, harming the company’s reputation. Second, inactive accounts can become targets for hackers, allowing them to use them as gateways to take over the company’s social media channels.

Then, there’s the issue with passwords. At NordPass, we use the phrase, “For almost every task at work, there’s a password.” This rings true as most business operations necessitate the use of password-protected accounts. However, as highlighted in our Top 200 Most Common Passwords report, many individuals — regardless of their job title or position within the company — use weak passwords that can be easily cracked. Moreover, many employees use the same password across multiple accounts and services, amplifying the risk of a breach.

We also need to touch upon the irresponsible sharing of passwords among company members, often done through chat, email, or… written notes (yikes!). If some business leaders were to inquire about how their staff members share passwords for company social media accounts like LinkedIn, Instagram, or Facebook, they might be alarmed by the lack of security practices in place.

Of course, losing access to company social media accounts can also happen due to phishing, malware attacks, or other cyber intrusions targeting unsuspecting employees. However, ensuring passwords are strong and securely managed at all times decreases the chances of falling victim to such cyber threats, thus protecting the integrity and security of company social media accounts.

What if your company’s social media gets hacked?

Although it’s not overly challenging to imagine the outcomes of a social media takeover, being informed about the potential consequences can provide stronger motivation for us all to take action. 

First and foremost, a social media takeover can lead to severe reputational damage. Malicious actors have the power to tarnish an organization’s reputation by posting damaging content or spreading false rumors. This could result in the loss of key business partners and clients. Even when it’s clear that the content in question is the work of cybercriminals, rebuilding relationships with partners and customers can be more challenging than expected.

Another major risk, closely tied to reputational harm, is financial loss. When cybercriminals hijack a company’s social media channels and spread false information, it can cause existing customers to turn away and deter potential customers from engaging with the brand. As a result, the company may experience a significant decline in sales revenue, and face heightened difficulty in securing investments or loans. Not to mention the fact that the time and resources required to address the aftermath of a social media takeover can impede the company’s focus on growth.

A hostile social media takeover can also result in a loss of privacy for the company’s members. In other words, it opens the door to personal information being exposed or misused, potentially resulting in identity theft or attempts to exploit someone’s private image. Repairing such damage could require years of effort and resources beyond what the company initially anticipated.

Yes, social media takeovers can be prevented

Let’s shift our focus away from discussing the reasons and dangers of social media takeover and concentrate on solutions to the problem at hand — of which there are a couple.

To effectively prevent social media takeovers, a company must first recognize the threat. As highlighted earlier, many individuals may not even realize that cybercriminals target passwords to seize control of business social media channels. Therefore, the first step is to raise awareness across the organization and establish clear guidelines for accessing and sharing social media platform credentials among company members. This includes determining who can access the credentials, specifying who they can be shared with, and deciding what actions to take when a social media manager or anyone with access to company social media leaves the organization.

Step two involves utilizing today’s available technology to allow employees to securely handle the company’s social media account credentials. This can be achieved by adopting a robust password manager like NordPass. How so?

How NordPass can help your company in this regard

First, NordPass is an easy-to-use yet technologically advanced password manager that allows organization members to securely store, manage, and share passwords, passkeys, credit card details, and other sensitive information.

Beyond that, NordPass is a cybersecurity tool that allows you to monitor access to your company resources, including social media channels. Plus, it enables you to quickly identify weak, old, and re-used passwords in your company, and check whether company credentials have been compromised in a breach. 

As a result, NordPass can be a valuable tool for organizations looking to protect their social media accounts from misuse by outsiders  — all while enhancing performance and efficiency.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Malware Threat Research 2020-2023

If you ask Google or AI what malware is, they’ll likely break it down as software meant to disrupt your systems, networks, or devices — but this description alone might not convince you of its significant threat.

Your perspective on malware is likely to change when you engage with someone who has suffered greatly because of it or once you delve into the latest facts on cyber attacks. It’s in these moments that you truly grasp the reality of malware as a legitimate and substantial threat.

In collaboration with independent third-party researchers, we analyzed cybersecurity incident data from January 2020 to September 2023 to assess and show you how big of a threat malware is today.

Here’s what we discovered…

Key findings from the research

1. With nearly 3 million attacks in 2023, malware has spread like a biological virus

While you may not find it surprising that the number of malware attacks has increased over the last few years, the speed at which this issue has been escalating might catch you off guard.

In 2020, approximately 614,144 malware-related incidents were reported. However, this number surged to 2,898,142 in 2021 and nearly doubled again in 2022, reaching 4,858,963. As you can see, these are not minor differences but massive leaps highlighting a substantial increase in the scale of the problem.

number of malware attacks 2020-2023 graph

In 2023, there were 2,678,841 malware attacks reported. However, before you assume that this signals a gradual resolution of the problem, let us highlight some details that — unfortunately — indicate it’s not yet time to celebrate.

To start, the malware incident data we’ve examined covers only the first 9 months of 2023, implying that the total number of cases for the entire year will more than likely be higher.

Moreover, a troubling trend observed by numerous IT experts is the increasing frequency of successful attacks. This indicates that cybercriminals are employing more and more sophisticated hacking methods and focusing on more targeted approaches. Simply put, this means we’re observing fewer malware attacks overall, but more of them are accurate. This is further evidenced by the continuous growth in the number of successfully executed unique email attacks, as depicted in the graph below.

number of successful unique email attacks graph

How does malware spread? Email is a common culprit, where spam and phishing tricks convince users to click on harmful links or download infected attachments. Careless browsing, like clicking on pop-ups, can also lead to visiting malicious websites that stealthily download malware.

Within organizations, coworkers clicking on malicious links can spread malware through the internal network, infecting multiple devices at the same time. Another risk comes from bundled software, where malware sneaks in with seemingly trustworthy downloads, causing users to unknowingly install various harmful programs — from annoying adware to data-stealing spyware.

2. Brazil, the USA, and India have the most malware-affected users

In the analysis of cybersecurity incidents, the focus was also on examining the global distribution of cases related to malware. Presented below are the top 15 countries with the highest number of malware-affected users (drawing from data spanning from October 2020 to November 2023):

  1. Brazil — 9,659,846 affected users

  2. USA — 6,966,426 affected users

  3. India — 6,914,742 affected users

  4. Indonesia — 5,354,246 affected users

  5. Vietnam — 3,611,798 affected users

  6. Egypt — 3,516,376 affected users

  7. Mexico — 3,042,467 affected users

  8. The Philippines — 2,926,483 affected users

  9. Turkey — 2,888,663 affected users

  10. Pakistan — 2,849,788 affected users

  11. Columbia — 2,655,695 affected users

  12. Thailand — 2,523,671 affected users

  13. Argentina — 2,300,732 affected users

  14. Peru — 2,215,622 affected users

  15. France — 2,142,316 affected users

Despite securing the top rank in the 2020 Global Cybersecurity Index (GCI) with a score of 100 index points, the United States of America holds second place for the most users impacted by malware — with a staggering number equivalent to the entire population of Massachusetts. Notably, five other nations in the Americas and seven in Asia are grappling with the impacts of the malware situation.

The study also reveals that France takes the lead for the highest number of users affected by malware in Europe. This may be attributed to several factors, such as the country’s substantial internet usage (82% of the population) and the increased likelihood of economically and politically charged cyberattacks against French users.

3. RedLine is the most common type of malware

Malware comes in various types and forms like adware, spyware, ransomware, trojan horses, and keyloggers. Each one possesses specific functionalities that can compromise one’s digital security. However, certain types of malware are more popular than others.

According to the research, the most prevalent types of malware in the last four years have been:

  1. RedLine

    RedLine is a type of malware designed to collect data from web browsers, applications, email and messaging apps, and cryptocurrency wallets. In simple terms, it functions as a remote access trojan, enabling cybercriminals to steal and transfer sensitive user data, which is later sold on the dark web. The research reveals that RedLine attacks constitute 59% of the total records collected — surpassing the runner-up Vidar by 3.2 times.

  2. Vidar

    Vidar is malicious software designed to steal sensitive information, including login credentials, credit card details, cryptocurrency wallets, and browser history, from infected systems. The stolen data can be used for identity theft or financial fraud — or it can be sold on the dark web. As previously noted, RedLine constituted nearly two-thirds of all the analyzed attacks. However, Vidar remains a considerable threat, comprising 18% of the total number of attacks.

  3. Raccoon

    Raccoon, also known as Raccoon Stealer, is a type of information-stealing malware designed to extract sensitive data from the computers of its victims. This includes, but is not limited to, login credentials and credit card information.
    Raccoon Stealer typically spreads through malicious websites, phishing emails, or other deceptive methods. Once it infects a system, it can covertly send the stolen information to a server operated by cybercriminals.
    Raccoon cases account for 12% (21% between July 2022 and April 2023) of malware attacks analyzed for this research.

Other common types of malware include AZORult, CryptBot, Taurus, and Meta.

incidents by malware type graph

Why have these malware types become more widespread? One reason might be that they are easier to create and deploy. Furthermore, using these types of malicious software may offer greater financial rewards for cybercriminals compared to other methods. The popularity of specific malware is also influenced by the constantly evolving landscape of cyber threats, technological vulnerabilities, and shifts in the digital environment.

4. Tens of millions of credential records were stolen from social media and entertainment platforms

Given the widespread practice of storing sensitive data on cloud servers, email accounts, and social media, it comes as no surprise that these platforms are prime targets for cybercriminals. However, the actual numbers will raise a few eyebrows.

So brace yourself for some eye-opening statistics as we explore the top domains associated with the biggest number of data theft incidents caused by malware and unveil the staggering number of records that fell into the wrong hands.

Most targeted domains*:

  1. accounts.google.com – 8.2 million of stolen records

  2. facebook.com – 5.9 million of stolen records

  3. login.live.com – 5.6 million of stolen records

  4. m.facebook.com – 3.2 million of stolen records

  5. Instagram.com — 3.1 million of stolen records

  6. discord.com – 3.1 million of stolen records

  7. netflix.com – 3 million of stolen records

  8. roblox.com – 2.8 million of stolen records

  9. com.facebook.katana – 2.5 million of stolen

  10. records amazon.com – 2.4 million of stolen

  11. records paypal.com – 2.3 million of stolen records

  12. twitter.com – 2.3 million of stolen records

The information above indicates a consistent trend of cybercriminals stealing data from widely used digital platforms. This highlights the necessity for enhanced cybersecurity measures to ensure secure data storage and access.

However, it is ultimately up to the user to take proactive steps to actively educate themselves on protecting their credentials and take appropriate follow-up measures.

*NordPass is not endorsed by, maintained, sponsored by, affiliated, or in any way associated with the owners of the mentioned domains. Domains are listed solely for the purpose of accurately reporting information related to cybersecurity incident data.

What you can do to protect yourself from malware threats

First and foremost, protection against malware – whether for individual users or entire organizations – relies on awareness and a sense of responsibility for implementing appropriate security measures for systems, platforms, and data in use. Therefore, everyone needs to take proactive steps in this regard, as without such engagement, achieving adequate protection becomes challenging.

Here are four actions you can take to enhance your protection against malware:

  1. Raise awareness: By learning about different types of malware and sharing this knowledge with others, you can effectively reduce the risk of being targeted. Awareness campaigns, for example, play a crucial role in helping people identify suspicious activities like phishing emails or dubious website links.

  2. Use antivirus software: Using antivirus software is essential for detecting and removing malware from your devices. A good antivirus constantly scans your system for known malware signatures and behaviors, offering a vital layer of defense against various threats.

  3. Update your systems regularly: Regularly updating your operating system, applications, and firmware is vital as it addresses known security vulnerabilities frequently targeted by malware. These updates typically include security patches and bug fixes, bolstering your system’s defenses against potential cyber threats.

  4. Use a password manager: Using a password manager allows you to create and store unique, complex passwords for each of your accounts, lowering the risk of unauthorized access. By securely storing your credentials, password managers help prevent malware from stealing your login information and accessing sensitive accounts.

How NordPass can help protect your sensitive data and account access

NordPass is a cybersecurity solution designed to help businesses and individuals protect their data and minimize the threat of malware attacks. How so?

First, NordPass is an end-to-end encrypted credentials manager. This means you can use it to securely generate, store, manage, and share passwords, passkeys, credit card information, and personal data — and do so knowing that they are all protected by advanced encryption algorithms.

Second, NordPass facilitates the implementation of single sign-on (SSO) and multi-factor authentication (MFA). You can use it to present employees with a convenient yet highly secure method of logging in to the company accounts.

Third, organizations can use NordPass as an identity and access management (IAM) tool to control and monitor access to company resources in real time. In other words, with NordPass, a company can see exactly who accessed what and when and manage access privileges with ease.

In addition, NordPass goes the extra mile by utilizing a Master Password. Most browser password managers lack this feature, making them more susceptible to malware attacks.

Naturally, our product is equipped with many other features like Autofill, Data Breach Scanner, and Password Health, all designed to enhance your cybersecurity and help defend against malware-related attacks. If you’re interested in exploring these features and gaining a comprehensive understanding of our platform, we invite you to visit our website.

Stay safe!

 

Methodology

NordPass, in partnership with third-party researchers, analyzed various sets of credentials sourced from a 6.6TB database. The study involved examining the source website and the type of malware used to steal the data (such as Redline, Vidar, Taurus, Raccoon, Azorult, and Cryptbot). No personal data was acquired or purchased by NordPass to conduct this study.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How encryption evolved to protect us from ISPs

Why ISPs monitor our traffic 

ISPs are usually large telecommunications companies that manage the networks – digital subscriber line (DSL), cable, fiber optic, satellite, etc. – that facilitate ‘the information superhighway’ of internet traffic. ISPs also distribute modems and routers (usually an all-in-one box) that enable us to use the internet on multiple devices at home or elsewhere. It is through this infrastructure that ISP monitoring takes place.

It’s important to note that there are a few legitimate reasons as to why an ISP might monitor our traffic. Here are a few examples:

  • Service quality – ISPs allocate bandwidth to optimize service based on use. For example, streaming and online gaming require high speed, uninterrupted connections, so they’re given a higher priority. Simpler web activities like browsing or sending emails, which aren’t as sensitive to minor hiccups or delays, are given a lower priority.

  • Security – ISPs monitor traffic for signs of malicious activities like malware distribution, phishing attacks, and DDoS (Distributed Denial of Service) attacks. They do this primarily to keep their user base secure and intact, but can also market security upgrades and products.

  • Customer support – With a clear overview of user home networks, devices, and traffic patterns, ISP customer support can solve issues faster – and cheaper. They can often remotely access ISP-provided routers as well.

  • Regulation – ISPs can be legally obliged to pass user data to law enforcement in certain cases and are required to monitor traffic for illegal activity.

  • Targeted advertising – You stream movies? Oh, you need a 4K TV! ISPs build user profiles based on web activity, then upsell products to you or pass your profile to data brokers for targeted advertising.

There are cases when ISPs sell your data. A 2021 Federal Trade Commission report found that, in the US: “Even though several ISPs promise not to sell consumer personal data, they allow it to be used, transferred, and monetized by others, and hide disclosures about such practices in the fine print of their privacy policies.”

How ISPs monetize our data. Source: Federal Trade Commission

How ISPs monetize our data. Source: FTC

What stops ISPs from collecting your data?

1. Regulatory requirements

  • The EU’s GDPR tightly controls how ISPs collect, store, and process personal data, which generally ensures a higher level of privacy for users.

  • The US is lacking in this area, with no broad federal legislation in place, resulting in a state-by-state patchwork of privacy laws.

  • Australia, Brazil, Canada, the EFTA countries, Japan, South Korea, and Switzerland have all enacted data protection regulations.

2. Encryption

In the old days (the wild ‘90s), there was none – ISPs could see everything. Except for some e-commerce and banking services, encryption was almost non-existent. Then in 1995, Taher Elgamal of Netscape developed Secure Sockets Layer (SSL) to secure transactions. This innovation started us down the long and winding road of encryption protocols and their eventual wide scale adoption.

A brief history of SSL to TLS

Secure Sockets Layer (SSL) was developed by Netscape, the pioneering web browser developer, as a protocol to secure transactions. SSL 2.0 was the first version released to the public in 1995. SSL 3.0, which fixed many of the vulnerabilities found in SSL 2.0, came in 1996. The groundwork was laid for future internet security protocols.

Transport Layer Security (TLS) was introduced in 1999 as TLS 1.0 by the Internet Engineering Task Force. Since then, TLS has been the internet’s security standard, undergoing multiple updates and improvements. TLS 1.2, released in 2008, added support for stronger encryption algorithms and was widely adopted for its enhanced security features.

TLS 1.3 arrived in 2018. With a simplified “handshake” process, fewer interactions were needed between client and server to authenticate one another and establish a secure connection. Boasting faster and more robust cryptographic algorithms, TLS 1.3 was a big step forward in speed, security, and privacy.

As of February 2024, 99.9% of the 150,000 most popular websites support TLS 1.2. 67.8% support TLS 1.3, and that number is growing every day.

Timeline of SSL to current day.

SNI: Scaling up the internet

Server Name Indication (SNI), an extension to TLS introduced in 2003, massively scaled up the internet’s hosting capacity. By specifying the target hostname during the “Client Hello” message (the first step in the TLS handshake), multiple HTTPS websites or services could now share a single IP address. With IPv4 addresses running out at the time (total exhaustion occurred in 2011), this was essential to keeping the internet up and running.

SNI was integrated with the QUIC protocol in 2021, boosting performance and security further. But a problem remained. SNI is unencrypted and exposes the hostname (website) that the client is trying to connect to. This issue was highlighted when certain governments including South Korea’s began using SNI filtering as a more precise means of censorship and surveillance. SNI’s purpose had been abused by ISPs and governments to collect data.

ESNI, ECH: Final piece of the security puzzle – or not?

So along came Encrypted Server Name Indication (ESNI). Introduced in 2018, it aimed to do exactly what it says on the tin: encrypting SNI. But it would only serve as a stopgap. Cloudflare, the web services company who helped develop the standard, said: “While ESNI took a significant step forward, it falls short of our goal of achieving full handshake encryption. Apart from being incomplete — it only protects SNI — it is vulnerable to a handful of sophisticated attacks.”

Most recently in line was Encrypted Client Hello (ECH) with the more ambitious goal of encrypting the entire Client Hello message. Cloudflare rolled out ECH as a TLS 1.3-exclusive extension in September 2023, but disabled it the following month to address “a number of issues”. A re-release is planned for 2024.

However, even with ECH in place, privacy concerns won’t fully go away. ECH doesn’t fully circumvent traffic analysis or ‘sniffing’ techniques that can reveal metadata like connection times, duration, packet sizes, and more – enough to start a basic user profile for tracking. And users’ IP addresses are still always exposed when online. The Internet Protocol routes online traffic, and the client-server model for data transmission wouldn’t work without visible IP addresses.

DNS: Falling short in privacy

Closely related to the IP routing system is the Domain Name System (DNS), known as ‘the internet’s phone book.’ DNS maps domain names to IP addresses. When you type a domain name like www.example.com into your browser search bar, the browser has to find out the domain’s corresponding IP address in order to request the domain’s content for you. To do this, your computer first sends a request to a DNS server, which returns the domain’s IP address (e.g. 142.250.105.100). Without this system, your browser wouldn’t know where to go.

The problem is, ISPs often run their own DNS servers to take a peek as these requests are filled. ISP-provided routers come preconfigured to direct your DNS queries to their proprietary servers. And if ISPs control a DNS server, they can effectively block the use of Encrypted Client Hello by not including ECH configurations in the HTTPS resource records returned to clients.

Protocols like DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT), which encrypt DNS requests, offer solutions to this issue. Not to be outdone, ISPs started operating their own DoH services, controlling DNS settings, and limiting configuration changes. Some providers even argued that DoH is not in the consumer’s interest. Remember: if the ISP runs the DoH service, they can see your online activities.

Even without using DNS or connecting to the wider internet, ISP-managed routers can collect information about the devices connected to them. They can track the unique Media Access Control (MAC) of each device. MAC allows devices to communicate on a local network segment, with the data being openly visible to anyone on the same network. ISPs use software on their routers to capture, fingerprint, and identify devices and their MAC addresses.

What can we do while we wait for ‘total’ encryption?

There are a few things you can take care of.

1. Be aware if you use an ISP managed router

Did it arrive at your door, perhaps with a technician ready to install it, after you signed up? Then it’s managed by the ISP, or at least set to their favored default configurations. Log in to the router, change the default password, and make sure you’re using at least WPA2 encryption. Keep in mind that if you’re using wifi calling (WhatsApp, Facetime, etc), your speech travels through these devices – another reason to fortify your network security.

2. Use a trustworthy DNS server

Look for public, privacy-focused public DNS servers. For example, Cloudflare DNS (1.1.1.1) doesn’t log DNS traffic, doesn’t save your IP address, and doesn’t sell user data to advertisers.

3. Use a VPN

Virtual private networks (VPNs) can protect your online activity by encrypting traffic going from your device to a VPN server. This server then handles your internet requests, shielding them from ISP surveillance. This protection extends to DNS queries if you use the VPN’s DNS server. Of course, using a VPN transfers your trust from the ISP to the VPN provider. That’s why no logs VPNs are among the best ways for keeping yourself safe and secure online today.

What are deepfakes?

Definitions first: Deepfakes are highly realistic synthetic video or audio created with AI models. These deep learning (hence “deepfake”) models are trained on huge quantities of data to mimic a person’s facial expressions, lip movements, and vocal patterns.

Deepfakes are created with Generative Adversarial Networks (GANs), where two models work together (or more accurately, against each other) for optimum results. One model, the generator, creates the fake content, while its partner model, the discriminator, acts as a judge. Low quality fake content is rejected, the convincing material is accepted, and the discriminator constantly pushes the generator to improve across iterations. The result? Convincing videos of people saying or doing things they never did.


The cybersecurity challenge

Deepfakes, unsurprisingly, pose significant cybersecurity risks. Identity theft, fraud, and authentication exploits are all made easier with this technology. A Hong Kong finance worker was fooled into transferring $25 million to fraudsters due to a deepfake impersonation of the company’s CFO.

In another high-tech heist, a company director’s voice was cloned. The cyber conmen got away with $35 million. Vishing (voice phishing) and other social engineering techniques have just received the equivalent of a supercharged power-up with deepfakes.

In the political sphere, deepfakes are being used to influence public opinion. Thousands of citizens in New Hampshire received calls that appeared to use AI to impersonate President Joe Biden’s voice, who urged them to skip voting in the January Democratic primary election. The calls were traced back to a company in Texas with suspicious motives and funding.

Soon after this event, fake videos of megastar Taylor Swift announcing her support for Donald Trump circulated online. In an election year balanced on a knife edge, further devious use of deepfakes could do a lot of damage.


Battling against the fakes

Efforts are underway to combat the deepfake threat. Social media and content platforms like TikTok, YouTube, Meta, and Twitter are implementing policies and features to detect, label, or remove misleading AI-generated content.

OpenAI’s DALL-E generated images now include digital watermarks in image metadata. Google has gone a step further with SynthID, which embeds a watermark directly into the pixels of the image. But none of these methods are infallible. A recent study by University of Maryland students found that “our attacks are able to break every existing watermark that we have encountered.”

On the legislative and regulatory side, the FCC promptly banned AI in robocalls following the election interference calls. Currently only about ten states target deepfake content, and these have generally prioritized non-consensual pornographic material. There’s no overarching federal legislation yet, but the No AI FRAUD Act, if enacted, would “provide individual property rights in likeness and voice.” The EU’s AI Act, which will demand transparency from creators of synthetic content, is currently being finalized.

How you can detect deepfakes

Here are a few tips to spot deepfakes:

  • Unnatural movements, poor lip syncing

  • Shadows in the wrong places

  • Vocal inconsistencies, unusual tone/inflection

A good rule of thumb is to verify information from multiple sources before believing it (or sharing it further). And some timeless advice that applies always and forever: Be skeptical of anything that seems too good (or bad) to be true, especially online.

Check out the new Cyberview episode on your favorite platform:

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Web3 security: risks and best practices for staying safe

Web3 stands out as a new wave of innovation, offering a future where users have more control over their data and online interactions. However, this potential also brings new challenges, especially in security. Let’s carefully look into the security risks of Web3, giving you the information you need to move forward in this exciting yet risky area safely. 

Key takeaways

  • Web3 marks the start of a decentralized internet, focusing on better privacy, security, and control over data for users.

  • Companies like IBM, Walmart, and Visa are embracing Web3. They’re navigating through complex tech and changes in how things are done but find value in the stronger security and smoother operations it offers.

  • The security setup of Web3 relies on spreading out data, using secure codes, and self-executing contracts to protect against common online threats.

  • Despite its advantages, Web3 isn’t free from security challenges such as issues in contract code or scams aiming to steal information.

  • Moving to Web3 in a way that works well means putting together a solid plan for staying safe, keeping up with new information, and using the right tech.

What is Web3?

Web3 represents the internet’s new era, embracing decentralization and blockchain technology. This approach contrasts with Web2’s centralized model, where big tech firms hold the reins. This shift aims to give people back control over their data, prioritizing their privacy and security, which were major concerns in the previous internet phase.

Thanks to a growing interest in cryptocurrencies, decentralized apps, and smart contracts, Web3 is expanding quickly. Its core values include transparency, the empowerment of users, and a secure, unchangeable record of transactions. The goal is to build an internet that values fairness and centers around its users.

The transformative impact of Web3 on businesses

Web3 offers businesses enhanced security by distributing data across decentralized networks. Many companies, big and small, are exploring it. IBM, a technology giant, uses blockchain to streamline operations and increase data integrity. Walmart, a retail powerhouse, employs blockchain technology to build supply chain transparency and consumer trust. Visa, a global payments leader, settles transactions in cryptocurrency, exploring decentralized finance’s potential. Nike, a sportswear innovator, ventured into digital assets by acquiring a digital sneakers studio and tapped into new markets. Starbucks, a coffeehouse chain, introduces a blockchain loyalty program offering customers transparency in their coffee journey. Maersk, the world’s largest shipping company, improves global trade efficiency with its blockchain solution, TradeLens.

Despite these benefits, businesses face challenges like technological complexity and regulatory uncertainty. Adapting to Web3 requires shifts in corporate culture toward decentralization.

Web3’s cybersecurity backbone

Web3 cybersecurity includes features that make the digital world safer and more trustworthy. Let’s go through them one by one, explaining what each is and how it boosts security.

Web3 cybersecurity features

  1. Decentralization spreads data across many nodes, which reduces the risk of big data breaches and eliminates single points of failure. This setup makes it harder for attackers to compromise the entire system.

  2. Cryptography involves complex algorithms to secure data and transactions. It ensures that information is only accessible to those who are supposed to see it, keeping data confidential and integral.

  3. Immutable ledger is a record that no one can change once something is added. This transparency prevents tampering and builds trust among users, as everyone can see the transaction history.

  4. Smart contracts automatically execute transactions when conditions are met. This reduces the chance of errors and fraud since no human intervention is needed once the contract is set.

  5. Identity and access management (IAM) controls who gets access to what information. It verifies the identity of users and restricts access to sensitive data, ensuring that only authorized persons can see it.

  6. The Zero Trust model follows the principle of never trusting anyone by default, even if they are inside the system. It always requires verification, which minimizes unauthorized access.

  7. Tokenization turns rights to an asset into a digital token. This secures ownership and exchange of assets by encrypting the details and storing them on the blockchain.

  8. Privacy-enhancing technologies let people complete transactions without exposing personal information. Techniques like zk-SNARKs allow for transaction privacy, providing security without sacrificing confidentiality.

  9. Two-factor authentication (2FA) adds an extra layer of security by requiring a second verification, reducing the risk of unauthorized access.

  10. Permissioned blockchain allows organizations to manage who can join their network. This control over access makes private transactions more secure.

Together, these features build a safer Web3 environment, where data is protected and trust is a cornerstone.

Cybersecurity risks of Web3

Despite its robust security framework, Web3 is not immune to cybersecurity risks. Understanding them is the first step toward mitigating potential security issues.

Smart contract vulnerabilities

Sometimes, smart contracts on blockchain networks have flaws. These issues can allow unauthorized access or cause financial losses. Conducting audits on these contracts is a key part of keeping Web3 safe, as it helps find and fix these issues early.

Phishing attacks

Phishing attacks trick users into giving away sensitive information. They often target crypto wallet users with fake emails or websites. Teaching people about these dangers and using two-factor authentication can really help lower the chances of these attacks succeeding.

Front-running

Front-running is when someone acts on information about upcoming transactions in decentralized finance (DeFi) to their benefit. This practice can make decentralized apps less fair and secure.

Sybil attacks

A Sybil attack occurs when someone creates many fake identities to disrupt a decentralized network. This can undermine how decentralized apps work. Using strong identity and access management solutions is necessary to prevent such problems.

51% attacks

If a group gets control of most of a blockchain’s computing power, they can manipulate the network. Ensuring the mining power is spread out and making the blockchain technology more secure are good ways to stop these attacks.

DeFi exploits

DeFi platforms can have security weaknesses that might be exploited, leading to big losses. Doing regular checks on these platforms and their smart contracts helps find and address security gaps.

Rug pulls

Rug pulls occur when crypto project developers suddenly take all the invested money, leaving investors with nothing. Having clear transparency and community involvement can help avoid these scams in decentralized projects.

Privacy issues

Blockchain technology does make transactions more private and secure. But, there’s still a chance that transactions could accidentally reveal someone’s identity.

Network congestion

When blockchain networks get too busy, it slows down transactions and can raise costs. Developing scalable solutions and designing efficient networks are important to keep Web3 working smoothly and securely.

Regulatory compliance risks

As laws around Web3 keep evolving, staying on top of these changes is crucial for projects, especially those in DeFi and cryptocurrencies. Being aware of and following these laws helps Web3 projects avoid legal issues and succeed in the long run.

Best practices for staying safe in Web3

Adopting a proactive approach to security is essential in navigating the Web3 landscape safely. Here are key best practices to consider.

Web3 security best practices

Conduct regular security audits

Regular security audits, including smart contract audits, are crucial for spotting and fixing security vulnerabilities in smart contracts and decentralized applications (dApps).

During these audits, security experts examine the code to confirm its safety and correct operation. This kind of review is vital because it helps prevent potential exploits and attacks that could compromise the system.

Smart contract audits are a specialized part of these examinations, focusing on the integrity and security of the contracts that automate operations and transactions on the blockchain.

Implement two-factor authentication (2FA)

2FA adds an extra layer of security beyond just a password, requiring users to provide a second piece of evidence of their identity. It’s crucial for protecting accounts, especially for crypto wallets and exchange platforms. Major crypto exchanges advocate for using 2FA.

Use a hardware wallet for crypto assets

Storing crypto assets in a hardware wallet is one of the safest methods, as it keeps the assets offline and out of reach from online threat actors. Hardware wallets have proven effective against many Web3 security threats. They are particularly suitable for individuals and companies holding significant crypto assets.

Educate yourself and your team

Education on Web3 security is fundamental. Understanding the landscape of security threats can empower individuals and organizations to make informed decisions and adopt safe practices.

This includes learning about phishing scams, the importance of private key management, and the latest security threats. Companies like the Ethereum Foundation often host workshops and provide resources, underscoring the importance of continuous education in mitigating security risks in Web3.

Leverage decentralized identity solutions

Decentralized identity solutions offer a secure and privacy-preserving way of managing identities online. By allowing users to control their identity without relying on central authorities, these solutions reduce the risk of identity theft and fraud. Microsoft’s ION, a decentralized identity network built on the Bitcoin blockchain, showcases how such technology can be implemented.

Keep software and wallets updated

Regular software and wallet updates ensure that you have the latest security enhancements and bug fixes. Developers constantly update their applications to address new threats and security vulnerabilities. Neglecting updates can leave you exposed to security risks that have already been fixed in newer versions. This practice is crucial for all users and companies in the Web3 space to maintain high levels of security.

Practice safe transaction habits

Safe transaction habits include double-checking addresses before sending crypto, using trusted platforms, and verifying smart contract actions. These habits can prevent common mistakes that lead to losses.

While this practice is fundamental for everyone in the Web3 ecosystem, it is especially critical for businesses engaging in frequent and large-scale transactions.

Monitor smart contract and wallet activities

Monitoring tools can provide real-time alerts on suspicious activities, helping users and developers react quickly to potential security threats. This proactive approach can prevent significant losses by detecting unauthorized transactions or changes in smart contract behavior.

Platforms like Etherscan offer services that enable both individuals and companies to keep an eye on their assets and smart contracts, enhancing overall Web3 security.

Use secure communication channels

Secure communication channels are vital for discussing sensitive information, such as transaction details or private keys. Encrypted messaging apps or secure email services can protect against eavesdropping and phishing attacks. This practice is particularly important for organizations that handle large amounts of sensitive data, ensuring that internal communications are not vulnerable to security risks.

Implement a robust access control system

A robust access control system ensures that only authorized personnel access critical systems and information. This can include using multi-signature wallets for company funds and Identity and Access Management (IAM) solutions for controlling access to sensitive data. Such measures are crucial for organizations to protect against insider threats and unauthorized access.

Plan for incident response

Having an incident response plan in place is critical for quickly addressing security breaches. This plan should include steps for isolating affected systems, communicating with stakeholders, and conducting a post-mortem analysis to prevent future incidents. Additionally, some companies offer services that help track stolen funds.

Participate in bug bounty programs

Bug bounty programs encourage the discovery and reporting of vulnerabilities in software and systems. Participating in or hosting such programs can uncover and resolve security issues before malicious actors can exploit them. Several platforms host bug bounty programs for various Web3 security projects.

Diversify asset holdings

Diversifying asset holdings can mitigate the risk of major losses due to attacks or downturns in specific cryptocurrencies or platforms. By spreading investments across different assets and storage solutions, individuals and companies reduce their exposure to any single point of failure.

This strategy is particularly relevant in the volatile Web3 market, where the value and security stability of assets can dramatically change. Real-world examples include investment firms and crypto funds that allocate their portfolios across various blockchain networks, crypto assets, and DeFi platforms to safeguard against unforeseen security threats.

Conclusion

Web3 technology, with its decentralized networks, smart contracts, and tools that enhance privacy, plays a key role in making the digital world safer and more trustworthy. Decentralization spreads data across several places, which makes it more resilient against attacks and breaches. Cryptography keeps transactions and data safe, while records that no one can change boost transparency and trust. All these parts work together to create a strong foundation for Web3 cybersecurity, offering new ways to secure digital interactions.

Yet, diving into Web3 comes with its own set of challenges. Issues like security vulnerabilities in smart contracts, phishing attacks, and other security threats are real concerns that need careful attention.

When considering moving to Web3, it’s wise to take a careful but positive stance. The opportunity Web3 offers to change how businesses operate and interact with customers is immense. However, stepping into this new territory should be done with a solid plan for security.

It’s important to carry out regular security audits, which include checking smart contracts thoroughly to spot and fix any weak spots. Using two-factor authentication, teaching teams about the security risks they might face, and using advanced security measures like IAM and Zero Trust solutions are all effective ways to reduce these risks. To ensure your business is secure as you navigate Web3, NordLayer offers the tools and support you might need. Our sales team is here for you; don’t hesitate to reach out.

What are deepfakes?

Definitions first: Deepfakes are highly realistic synthetic video or audio created with AI models. These deep learning (hence “deepfake”) models are trained on huge quantities of data to mimic a person’s facial expressions, lip movements, and vocal patterns.

Deepfakes are created with Generative Adversarial Networks (GANs), where two models work together (or more accurately, against each other) for optimum results. One model, the generator, creates the fake content, while its partner model, the discriminator, acts as a judge. Low quality fake content is rejected, the convincing material is accepted, and the discriminator constantly pushes the generator to improve across iterations. The result? Convincing videos of people saying or doing things they never did.


The cybersecurity challenge

Deepfakes, unsurprisingly, pose significant cybersecurity risks. Identity theft, fraud, and authentication exploits are all made easier with this technology. A Hong Kong finance worker was fooled into transferring $25 million to fraudsters due to a deepfake impersonation of the company’s CFO.

In another high-tech heist, a company director’s voice was cloned. The cyber conmen got away with $35 million. Vishing (voice phishing) and other social engineering techniques have just received the equivalent of a supercharged power-up with deepfakes.

In the political sphere, deepfakes are being used to influence public opinion. Thousands of citizens in New Hampshire received calls that appeared to use AI to impersonate President Joe Biden’s voice, who urged them to skip voting in the January Democratic primary election. The calls were traced back to a company in Texas with suspicious motives and funding.

Soon after this event, fake videos of megastar Taylor Swift announcing her support for Donald Trump circulated online. In an election year balanced on a knife edge, further devious use of deepfakes could do a lot of damage.


Battling against the fakes

Efforts are underway to combat the deepfake threat. Social media and content platforms like TikTok, YouTube, Meta, and Twitter are implementing policies and features to detect, label, or remove misleading AI-generated content.

OpenAI’s DALL-E generated images now include digital watermarks in image metadata. Google has gone a step further with SynthID, which embeds a watermark directly into the pixels of the image. But none of these methods are infallible. A recent study by University of Maryland students found that “our attacks are able to break every existing watermark that we have encountered.”

On the legislative and regulatory side, the FCC promptly banned AI in robocalls following the election interference calls. Currently only about ten states target deepfake content, and these have generally prioritized non-consensual pornographic material. There’s no overarching federal legislation yet, but the No AI FRAUD Act, if enacted, would “provide individual property rights in likeness and voice.” The EU’s AI Act, which will demand transparency from creators of synthetic content, is currently being finalized.

How you can detect deepfakes

Here are a few tips to spot deepfakes:

  • Unnatural movements, poor lip syncing

  • Shadows in the wrong places

  • Vocal inconsistencies, unusual tone/inflection

A good rule of thumb is to verify information from multiple sources before believing it (or sharing it further). And some timeless advice that applies always and forever: Be skeptical of anything that seems too good (or bad) to be true, especially online.

Check out the new Cyberview episode on your favorite platform:

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Empowering women in tech: success stories

 
The tech industry faces a talent shortage, with an estimated 85 million unfilled positions by 2030. One contributing factor is the underrepresentation of women, who currently comprise only 22% of Europe’s tech workforce and 34.4% of the largest US tech companies. However, at Nord Security, we’re happy to be above the industry standard, with nearly 40% of our colleagues being women. Meet four exceptional women in our community – Toma Jonuškaitė, Rima Miselytė, Gintarė Kučiauskienė, and Sigita Jurkynaitė – who are making significant contributions to the industry and shaping our cyber future.

The myth-busting truth about women in tech

Tech – not just for men

In the 1840s, Ada Lovelace, a mathematician and writer, drafted the first computer algorithm, unknowingly paving the way for the future of technology. Recognized as the world’s first computer programmer, she shattered stereotypes and demonstrated that women can excel in tech alongside men.

Despite their proven capability in tech, not all see themselves fitting into this male-dominated industry.

“Our NordSwitch program is a prime example,” she says. “Out of 600 applicants, we selected 21. Surprisingly, even 13 of them were women making bold career switches. One shifted from being a professional harpist to an Engineer, and another transitioned from teaching English in South Korea and Lithuania to becoming a Junior Data Engineer.”

Despite the big underrepresentation of women still in the tech industry, a wave of change is happening. Deloitte’s findings reveal that from 2019 to 2022, women’s participation in tech saw an 11.7% surge in technical roles. The rise in women in leadership roles is even more encouraging, soaring by nearly 20%. This trend signals a brighter and more inclusive future for tech, inspiring more women to join and thrive in this dynamic field.

Tech is not (all) rocket science

Tech jobs, including cybersecurity, are challenging due to the rapidly evolving nature of the industry and the complexity of the systems involved. However, the difficulty varies depending on personal aptitude and interests.

Gintarė Kučiauskienė, a champion for diversity at Nord Security, holds the role of Product Owner at our flagship service, NordVPN. Though her position is technical, Gintarė explains that with foundational tech knowledge, strong analytical thinking, problem-solving, time management, and communication skills, the Product Owner role is well-suited to women who want to thrive in tech.

As a Product Owner, her responsibilities involve overseeing team deliverables and ensuring the product’s quality, monitoring user engagement and satisfaction, and compliance with legal standards. Additionally, she inspects the product for vulnerabilities or security flaws.

Summarizing her experience, Gintarė emphasizes her role’s complexity and demands: “The PO role indeed requires juggling many tasks simultaneously, but with a bit of knowledge in the field, it’s manageable. Although we develop techy stuff at Nord Security, it’s not NASA, and we’re not building a rocket. If I can thrive here, any woman can,” she encourages.

Rima Miselytė, Solutions Architect at NordPass and NordLocker, also supports the statement, saying that it’s just a stereotype that tech is complex and advanced.

As a Solutions Architect, she assists engineering teams in discussing, analyzing, and building more scalable and robust solutions for NordPass and NordLocker products. She plays a key role in driving the products’ major initiatives, empowering teams to develop their solutions by providing guidelines and reference architecture.

“The role requires understanding both technical capabilities and business needs and concerns to provide the technical guidelines. You need to be flexible, adaptive, and truly creative here. It’s an excellent role for engaging and communicating with everyone across the organization to design and build solutions as a team. All these aspects are what I enjoy the most about my role,” shares Rima Miselytė.

These are just a few examples of the roles in which women can truly excel in tech. Discover more opportunities at Nord Security.

Tech for non-techies

The truth is that you don’t necessarily need to be technical to work in tech. Apparently, 43% of roles advertised by tech companies were non-technical, found a study from Glassdoor.

Gintarė Kučiauskienė, Product Owner at NordVPN, expands on this idea:

Toma Jonuškaitė is one such example, holding an Employer Brand Manager role at Nord Security. She’s one of the key people shaping and promoting the company’s image as a desirable place to work. Despite not having a technical background, her career path has always been intertwined with it:

“I started my career as a business journalist, focusing on tech and automotive sectors (e.g., doing new car test drives). Later on, I switched to communications, public relations, and marketing. My experiences spanned from managing events in the gaming industry, including international conferences like Gamescom and GDC, to launching innovative products across the Baltics tobacco industry.”

There are way more roles for women looking to make their mark in the tech industry without needing deep tech knowledge, from sales, legal, and administration to design, marketing, risk, and more.

In addition, numerous strategic roles demand not just a grasp of technology but also a strong set of interpersonal skills. Our Information Security Manager, Sigita Jurkynaitė, underscores the importance of communication and teamwork.

“I work closely with diverse teams to maintain the highest international security standards. This role heavily involves maintaining info security documentation and refining processes. While these tasks may appear mundane, they are crucial for ensuring that what’s on paper works well in reality. This involves effective communication with colleagues across various departments, from HR and software development to communications and IT administration, ensuring our strategies are successfully implemented. This role gives me a unique chance to deeply understand our company and drive meaningful improvements in our security posture.”

Sigita also highlights that her position allows room for creativity, particularly in designing security awareness and training initiatives. “I love that I can let my imagination run wild, developing engaging and original content that strengthens our security culture.”

In essence, the tech industry offers a place for everyone, man and woman, with technical backgrounds or without, to innovate, create, and make a lasting impact in the industry.

Women powering the tech industry forward

The tech industry’s vast job opportunities and attractive pay packages are compelling reasons for women to explore careers in IT. Beyond these advantages, women’s involvement significantly propels the industry forward.

  1. Bridging the talent gap

     

    With cybersecurity alone reporting more than 36,000 open positions in the public sector and more than 700,000 available jobs in the private sector globally, the tech industry faces a pronounced talent shortage. “We’re facing a huge gender gap in technology, and one of the reasons why – is that the importance of inclusion is often overlooked,” emphasizes Sigita Jurkynaitė, Information Security Manager. She underscores that embracing diversity is crucial in seeking to close this gap.

    According to McKinsey research, that could become a reality. If Europe could achieve a 45% female workforce in the tech sector by 2027, it could bridge the talent shortage and potentially increase European GDP by up to €600 billion.

     

  2. Driving innovation

     

    Diverse teams are proven to be more innovative, reveals the Harvard Business Review study.

     

    Rima Miselytė, a Solutions Architect at NordPass Engineering, highlights the value of women in engineering, coding, and cybersecurity in crafting better solutions and software. Gintarė Kučiauskienė from NordVPN adds that products designed by diverse teams are more capable of addressing the varied pain points of a broad demographic, including users with special needs, underscoring the tangible benefits of diversity in creating universally accessible technology.

     

  3. Boosting performance

     

    Increased innovation creates growth in revenue and performance. Research from McKinsey found that, on average, organizations that prioritized gender diversity in their executive teams outperformed their competitors by 20% in terms of profitability.

     

  4. Enhancing talent attraction and retention

     

    Organizations fostering inclusive culture find it easier to recruit a more diverse staff. As a result, they have a 22% lower turnover rate, finds Deloitte. Additionally, women in executive roles are more likely to hire other women, enhancing the visibility of females in tech positions and inspiring their peers to pursue similar paths.

     

    Rima Miselytė, Solutions Architect at NordPass, agrees with this, saying that her colleagues in tech had a huge impact on her career:

“I’ve been lucky enough to have teammates who taught me confidence in my abilities and helped me to find my way in the tech industry (even if that forced me to get out of my comfort zone). At Nord Security, we also have plenty of successful women at all levels, from dedicated employees to great leaders, who actively lead and help grow by their determination and passion.”

How to get into tech?

Aside from those who have completed four-year degrees in IT, there are other pathways you can take when changing careers and getting into tech. To help you get there, we have listed some of the ways you can explore:

  1. Identify your desired tech role

    Dedicate time to exploring and comprehending the various roles within the tech industry. If a particular career sparks your excitement or passion, prepare to put in the effort. “Be curious, open-minded, and willing to learn from others,” advises Rima Miselytė, Solutions Architect at NordPass.

     

  2. Find out the needed skills

    Our Information Security Manager, Sigita Jurkynaitė, suggests beginning with finding the skills that are necessary for your desired role. They can be transferable (a core set of skills and abilities that go beyond a particular role) and specific, non-transferable skills unique to a domain. Typically, they’re outlined in job ads.

    For those eyeing a career in information security, Sigita outlines a skills matrix useful for the field:

    Blog woman in tech inside blog 4Gain knowledge and practice

  3.  

    As mentioned above, it’s not necessary to have a degree in IT. There are many other paths that help “new-collar workers” (skilled employees with a nontraditional education) gain skills and excel in their desired positions. You can join IT schools, but you can also participate in boot camps, online learning, open-source projects, reskilling, mentorship programs, and more.

     

    For those seeking to dive into the information security field, Sigita Jurkynaitė suggests exploring the tech career pathways, which list all the courses and certifications needed to gain the necessary knowledge.

     

    To help you gain job-ready skills, you can join internships or reskilling programs, like the one we just announced at Nord Security – NordSwitch, which is designed for people dreaming of switching careers to tech.

     

    This year, we’re seeking individuals – both women and men – keen on pivoting to roles in InfoSecurity, Data Analytics/Science, SysAdmin/SRE/DevOps, C++, GO, SWIFT, Android/Kotlin, Risk, Conversion Rate Optimization (CRO), and Sales Development (SDR).

     

    Applications are open until April 15. Selected candidates will get a 6-month paid internship contract, work together with our expert teams, and, in some cases, receive a permanent work contract.

    Apply to NordSwitch

  4. Build your network

     

    Entering the tech world is all about making the right connections. In fact, experts suggest at least 80% of all jobs, are filled through a personal and professional network.

    Attending meetups and conferences is an excellent strategy to put yourself on the map. If you’re based in Lithuania, explore our cybersecurity meetups – NordCamp.

     

  5. Start job hunting

     

    When you’re ready to find your place in tech, use every available resource to enhance your job search and increase your chances of landing a role that suits you perfectly. Follow your dream company’s websites and social media channels. Extend your search to platforms like LinkedIn, Glassdoor, and GitHub to discover open positions.

What are deepfakes?

Definitions first: Deepfakes are highly realistic synthetic video or audio created with AI models. These deep learning (hence “deepfake”) models are trained on huge quantities of data to mimic a person’s facial expressions, lip movements, and vocal patterns.

Deepfakes are created with Generative Adversarial Networks (GANs), where two models work together (or more accurately, against each other) for optimum results. One model, the generator, creates the fake content, while its partner model, the discriminator, acts as a judge. Low quality fake content is rejected, the convincing material is accepted, and the discriminator constantly pushes the generator to improve across iterations. The result? Convincing videos of people saying or doing things they never did.


The cybersecurity challenge

Deepfakes, unsurprisingly, pose significant cybersecurity risks. Identity theft, fraud, and authentication exploits are all made easier with this technology. A Hong Kong finance worker was fooled into transferring $25 million to fraudsters due to a deepfake impersonation of the company’s CFO.

In another high-tech heist, a company director’s voice was cloned. The cyber conmen got away with $35 million. Vishing (voice phishing) and other social engineering techniques have just received the equivalent of a supercharged power-up with deepfakes.

In the political sphere, deepfakes are being used to influence public opinion. Thousands of citizens in New Hampshire received calls that appeared to use AI to impersonate President Joe Biden’s voice, who urged them to skip voting in the January Democratic primary election. The calls were traced back to a company in Texas with suspicious motives and funding.

Soon after this event, fake videos of megastar Taylor Swift announcing her support for Donald Trump circulated online. In an election year balanced on a knife edge, further devious use of deepfakes could do a lot of damage.


Battling against the fakes

Efforts are underway to combat the deepfake threat. Social media and content platforms like TikTok, YouTube, Meta, and Twitter are implementing policies and features to detect, label, or remove misleading AI-generated content.

OpenAI’s DALL-E generated images now include digital watermarks in image metadata. Google has gone a step further with SynthID, which embeds a watermark directly into the pixels of the image. But none of these methods are infallible. A recent study by University of Maryland students found that “our attacks are able to break every existing watermark that we have encountered.”

On the legislative and regulatory side, the FCC promptly banned AI in robocalls following the election interference calls. Currently only about ten states target deepfake content, and these have generally prioritized non-consensual pornographic material. There’s no overarching federal legislation yet, but the No AI FRAUD Act, if enacted, would “provide individual property rights in likeness and voice.” The EU’s AI Act, which will demand transparency from creators of synthetic content, is currently being finalized.

How you can detect deepfakes

Here are a few tips to spot deepfakes:

  • Unnatural movements, poor lip syncing

  • Shadows in the wrong places

  • Vocal inconsistencies, unusual tone/inflection

A good rule of thumb is to verify information from multiple sources before believing it (or sharing it further). And some timeless advice that applies always and forever: Be skeptical of anything that seems too good (or bad) to be true, especially online.

Check out the new Cyberview episode on your favorite platform:

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Insider threat prevention: key strategies

As technology continues to advance, the methods of malicious actors also evolve. As a result, cybersecurity has become a critical concern for organizations of all sizes. The 2023 Verizon report highlights that 74% of all breaches involve a human element, with internal actors accounting for 19% of cybersecurity breaches. In light of these statistics, protecting your business from insider threats becomes crucial.

Insider threats can pose significant risks to your organization’s sensitive data and operations, yet they are often overlooked. In this blog post, we will explore the world of insider threats, their unique risks, and key strategies for prevention.

Organizations can take proactive steps to protect themselves from this critical cybersecurity challenge by gaining a better understanding of insider threats. We will also provide real-life examples, best practices for mitigation, and how NordLayer can assist in fortifying your defenses.

Key takeaways

  • Insider threats can cause harm through data theft, fraud, sabotage, or unintentional actions.

  • The three main types of insider threats are malicious insiders, negligent insiders, and compromised insiders. It is essential to understand the motivations and behaviors of each type to mitigate and prevent insider threats effectively.

  • Best practices for insider threat prevention include access controls, employee training, user monitoring, multi-factor authentication, and clear policies.

  • Using advanced network security tools like NordLayer’s Network Access Control (NAC solution), which offers features such as Cloud Firewall and Device Posture Security, can help contain internal threats and control access.

What is an insider threat?

An insider threat is any current or former employee, contractor, or business partner who intentionally or accidentally misuses their access or insider knowledge to harm an organization’s IT systems, networks, or data. Insider threats can take many forms, including data theft, fraud, sabotage, and unintentional harm caused by careless actions or human error. Insider attacks can be divided into different types depending on the intention behind the actions.

Types of insider threats

Typically, there are three types of insider threats:

Types-of-insider-threats

  • Malicious insiders who aim to cause harm deliberately through actions like data theft, sabotage, or espionage

  • Negligent insiders whose careless actions like falling for phishing scams can unintentionally compromise security

  • Unsuspecting insiders whose credentials were stolen or devices were compromised by outsiders

Note that these types of insider threats can overlap or blend into each other.

Real-life examples of insider threats

Insider threats, including financial losses, reputational damage, legal liabilities, and operational disruptions, can severely affect organizations. When sensitive security information is exposed, it can be used by malicious actors to commit fraud, steal intellectual property, or launch further attacks against the company or its partners.

In some cases, the exposure of sensitive data can also lead to regulatory fines and legal penalties, particularly if it includes personally identifiable information or other confidential data.

Moreover, the loss of classified data can erode customer trust and damage the organization’s reputation, making it difficult to attract and retain customers, partners, and employees. In some cases, the impact of an insider threat can be felt for years, causing long-term damage to the organization’s bottom line and its ability to compete in the market. To illustrate the potential impact of internal threats, let’s have a look at some of the most infamous cases in recent history.

WikiLeaks in 2010

Chelsea Manning, a former US Army soldier, leaked classified military documents that included diplomatic cables, military reports, and videos of military operations in Iraq and Afghanistan. The release of the documents caused diplomatic tensions between the US and other countries, and Manning was sentenced to 35 years in prison.

The incident also led to calls for greater transparency and accountability in government operations and sparked a debate about the role of whistleblowers in exposing government misconduct.

National Security Agency (NSA) leak in 2013

Perhaps one of the most infamous cases of an insider threat, Edward Snowden leaked classified information from the NSA, exposing sensitive surveillance programs to the media. The leaked documents revealed that the NSA was collecting vast amounts of data on American citizens, including phone records and internet activity, without their knowledge or consent.

The leak sparked a global debate about privacy, surveillance, and the role of intelligence agencies in democratic societies. It also damaged the NSA’s reputation and strained its relationships with other countries, particularly those whose citizens were targeted by the agency’s surveillance programs.

Twitter compromise in 2019

An insider helped social engineer their way into compromised accounts on high-profile users like Barack Obama, Bill Gates, and Elon Musk. The cybercriminals then used these accounts to send out tweets promoting a Bitcoin scam. The fallout from the hack was significant.

The incident caused widespread confusion and concern among Twitter users, and the company’s stock price temporarily dropped as a result. The breach also raised questions about the security of social media platforms and the potential consequences of insider risks in this context.

How to prevent insider threats: best practices

As we have seen from the examples, internal threats can have serious consequences for organizations, including financial losses, reputational damage, and legal liabilities. To protect against these risks, companies need to take a proactive approach to cybersecurity.

By following best practices for insider risk management, organizations can reduce the risk of data breaches, fraud, and other forms of malicious activity. Here are some of the most effective strategies that help prevent insider threats.

The-best-practices-for-preventing-insider-threats

Implement access controls

Access controls are a critical component of insider threat detection and prevention. By limiting access to security information based on job roles and responsibilities, you can ensure that only authorized personnel can access classified data.

This approach is known as the principle of least privilege, which means that users are given only the access they need to perform their job functions. Regularly reviewing and updating permissions is also essential to ensure that access is appropriate and necessary. This process can help prevent unauthorized access, accidental or intentional data leaks, and other forms of malicious activity.

Employee training

It is essential to educate employees on cybersecurity best practices, including how to identify phishing attempts, use strong passwords, and report suspicious activities to the security teams. Providing regular training and awareness programs can help your staff stay up-to-date. Additionally, fostering a culture of security within the organization is equally important, where employees grasp the significance of safeguarding and are more likely to follow security policies and procedures.

Multi-factor authentication (MFA)

Multi-factor authentication is an additional layer of security that requires users to provide two or more forms of authentication before accessing sensitive data. Implementing MFA wherever possible can secure against illegal access and prevent breaches, even if a malicious actor has stolen a user’s password. Requiring a temporary code sent to a user’s phone in addition to a password can prevent insider attacks and make it much more difficult to gain access to private data. Based on statistics, having MFA increases protection in 50% of the cases.

Encryption

Encrypting confidential information both in transit and at rest is essential to protect against unauthorized access. Encryption scrambles data so that it is unreadable without the decryption key. This means that even if an attacker gains access to encrypted data, they will not be able to read it. Encryption can help protect data from being stolen or intercepted, and it is a key element of a comprehensive insider threat prevention strategy.

Establish clear policies

Developing and enforcing clear security policies is critical to preventing insider threats. These policies should cover data handling, acceptable technology use, and reporting procedures for security incidents. By having clear policies in place, employees understand expectations and boundaries. Regular reviews and updates are necessary to keep policies relevant and effective. Additionally, consistent enforcement ensures that the employees follow them.

Monitor user behavior

Conducting thorough background checks for new hires can help identify potential risks before they become a problem. Utilizing security tools to detect unusual or suspicious user behavior, such as accessing company resources, can also help identify potential threats.

Unusual access patterns can be a red flag, such as an employee accessing classified data outside of normal business hours or from an unusual location. Changes in user behavior, such as an employee becoming disgruntled or expressing dissatisfaction with their job or a sudden increase in downloads or transfers of private data, can also indicate an internal threat.

Once insider attacks have been detected, it is important to take immediate action to mitigate the potential damage. This may include revoking access to classified data, conducting an investigation to determine the extent of the breach, and taking steps to prevent further unauthorized access. Security teams should have a clear plan in place for responding to internal threats, including who to contact, how to contain the threat, and how to communicate with affected parties.

How NordLayer can help

NordLayer provides a multi-layered cybersecurity approach to protect your organization from insider threats. By integrating advanced encryption protocols, secure remote access capabilities, and robust network access control tools, NordLayer ensures comprehensive protection for your data and networks.

With NordLayer’s Cloud Firewall service, organizations can exercise granular control over access to internal resources and cloud tools, enhancing security with an extra layer of control. This feature allows organizations to implement advanced network segmentation strategies, dividing the network into smaller segments.

Different user groups, teams, and roles can only access the specific segments relevant to their job, preventing unnecessary lateral movement across the wider network. Through tailored access controls, it minimizes the risk of data leaks from unauthorized access within the system.

Moreover, NordLayer’s Network Access Control (NAC) solution offers adaptive security features—such as Single sign-on (SSO), Devise Posture Security, Virtual Private Gateway with fixed IP address, and MFA—that authenticate users and devices, enabling secure access across various platforms.

The key to insider threat protection is a combination of technology, policies, and people. While technology provides the tools to establish safeguards and enforce access controls, policies provide guidelines for secure usage. Moreover, engaged employees trained to recognize and report potential risks can help prevent threats from occurring in the first place.

Thus, with product managers and engineers constantly monitoring the threat landscape and responding by strengthening NordLayer’s solutions, we can help security teams create a more secure environment for their organizations.

Don’t let insider threats compromise your business. Start your journey towards a more secure future with NordLayer today.

What are deepfakes?

Definitions first: Deepfakes are highly realistic synthetic video or audio created with AI models. These deep learning (hence “deepfake”) models are trained on huge quantities of data to mimic a person’s facial expressions, lip movements, and vocal patterns.

Deepfakes are created with Generative Adversarial Networks (GANs), where two models work together (or more accurately, against each other) for optimum results. One model, the generator, creates the fake content, while its partner model, the discriminator, acts as a judge. Low quality fake content is rejected, the convincing material is accepted, and the discriminator constantly pushes the generator to improve across iterations. The result? Convincing videos of people saying or doing things they never did.


The cybersecurity challenge

Deepfakes, unsurprisingly, pose significant cybersecurity risks. Identity theft, fraud, and authentication exploits are all made easier with this technology. A Hong Kong finance worker was fooled into transferring $25 million to fraudsters due to a deepfake impersonation of the company’s CFO.

In another high-tech heist, a company director’s voice was cloned. The cyber conmen got away with $35 million. Vishing (voice phishing) and other social engineering techniques have just received the equivalent of a supercharged power-up with deepfakes.

In the political sphere, deepfakes are being used to influence public opinion. Thousands of citizens in New Hampshire received calls that appeared to use AI to impersonate President Joe Biden’s voice, who urged them to skip voting in the January Democratic primary election. The calls were traced back to a company in Texas with suspicious motives and funding.

Soon after this event, fake videos of megastar Taylor Swift announcing her support for Donald Trump circulated online. In an election year balanced on a knife edge, further devious use of deepfakes could do a lot of damage.


Battling against the fakes

Efforts are underway to combat the deepfake threat. Social media and content platforms like TikTok, YouTube, Meta, and Twitter are implementing policies and features to detect, label, or remove misleading AI-generated content.

OpenAI’s DALL-E generated images now include digital watermarks in image metadata. Google has gone a step further with SynthID, which embeds a watermark directly into the pixels of the image. But none of these methods are infallible. A recent study by University of Maryland students found that “our attacks are able to break every existing watermark that we have encountered.”

On the legislative and regulatory side, the FCC promptly banned AI in robocalls following the election interference calls. Currently only about ten states target deepfake content, and these have generally prioritized non-consensual pornographic material. There’s no overarching federal legislation yet, but the No AI FRAUD Act, if enacted, would “provide individual property rights in likeness and voice.” The EU’s AI Act, which will demand transparency from creators of synthetic content, is currently being finalized.

How you can detect deepfakes

Here are a few tips to spot deepfakes:

  • Unnatural movements, poor lip syncing

  • Shadows in the wrong places

  • Vocal inconsistencies, unusual tone/inflection

A good rule of thumb is to verify information from multiple sources before believing it (or sharing it further). And some timeless advice that applies always and forever: Be skeptical of anything that seems too good (or bad) to be true, especially online.

Check out the new Cyberview episode on your favorite platform:

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Dealing with a loved one’s digital presence after they’re gone: What does our new study reveal?

What happens to someone’s email when they pass? Or how do you close a deceased person’s social media profiles? Do the digital pieces of our existence just fade into nothingness or maybe remain out there indefinitely?

These and other questions are no longer just morbid curiosity but rather something that most of us will have to tackle in our lifetime. Taking care of your loved ones digital legacy can be  challenging, not only because of the obvious emotional load but also because you might not know where and how to start.

Today, we’re diving into the topic of digital legacy and our latest research on the challenges related to its management.

Research findings

At NordPass, we recently conducted a market study on digital legacy — the online privacy paradox of a deceased person. It revealed that in order to close all accounts of the deceased, you have to equip yourself with loads of different documents, collect as much information about the deceased as possible, and be ready to use all kinds of communication channels.

During the research, we found that about 36% of analyzed online platforms publicly provide guidance on how to manage accounts posthumously. The information presented on their websites or other official channels allowed our team to draw some illustrative conclusions.

First, the process of managing digital legacy is not only filled with red tape but also rather varied across different platforms and services. In some cases, you might be asked to fill out an online form, while in other instances a platform might ask you to contact them via email, phone, post, or even schedule an in-person appointment.

When you request an account closure for a deceased person, the platforms usually ask for official documentation, including, but not limited, to death certificates, personal identification, and even legal confirmation of the right to manage a deceased’s estate. Researchers noticed that to close down the majority of a deceased’s accounts, you might need to provide over 20 different documents.

It means that, in theory, certain platforms might ask only for, let’s say, your passport, deceased’s death certificate, and the last will, while other sites might require completely different documents. This could be an obituary, birth or marriage certificate, last will, power of attorney, a small estate affidavit, or other documents. In certain cases, these documents might be required to be officially translated and notarized, which is yet another burden.

In addition to legal documentation, platforms ask for various information about the deceased. For instance, a full legal name, display name, username, email, phone number, social security number, account number, or full payment information used to pay for the platform’s service. This extended list of required information can be rather overwhelming, especially because we often don’t have ready access to all the details of our loved ones’ online accounts and financial activities. Not knowing these specifics can add to the stress and overall emotional burden during an already difficult time.

While there are many cases when people simply leave their deceased relatives’ or friends’ accounts hanging out there on the internet indefinitely, our researchers also looked into platforms’ policies regarding inactive accounts. They found that a quarter of companies publicly note that they remove inactive accounts. Of those, most do so after two years of inactivity, but some say they remove the accounts only after seven years.

Up to 6% of the analyzed platforms also offer internet users another way to handle online accounts — to memorialize the account of the deceased, which means it remains publicly visible but is marked for people to know the person is deceased.

Considering the sheer number of online accounts that a person accumulates over their lifetime, many of which are forgotten, the task of completely terminating a person’s digital footprint once they pass becomes a challenging, if not all-out, impossible task. Another study that we’ve recently conducted showcased that, on average, a person has around ​​168 passwords on their hands. Unfortunately, even if you have all the necessary documentation and procedural knowledge, the accounts of a deceased person might linger on the internet indefinitely just because you never knew about them, and that’s something that we might need to come to terms with.

Research methodology: The market desk research was conducted by NordPass. The company’s researchers evaluated 100 popular online platforms worldwide, chosen based on Statista and SimilarWeb information.

To conduct this study, researchers looked only at publicly available sources online—platforms’ owned websites or official accounts. They looked for information on how to close deceased accounts and investigated how many platforms provide such information, what procedures they offer, what documents and personal information items they ask for, and what are their policies regarding inactive accounts.

What is digital legacy, and why it’s important

You can think of digital legacy as a collection of data and overall presence left behind online when someone passes. The data includes social media profiles, email accounts, photos stored online, online shopping accounts, and other digital interactions. Just as physical possessions are part of someone’s life, digital content can also be an inseparable part of an individual’s legacy that needs to be managed once they’re no longer here.

Emotional importance

Today, the moments we cherish, more often than not, end up stored online. Just think about it: Photos, videos, as well as conversations are stored on social media platforms. When taking care of your loved ones digital legacy, consider whether the loved one wished to terminate their online data or was okay with allowing you to make the choice.

Quite often, digital legacies, much like traditional wills, can carry substantial financial and legal weight. It is critical to handle such digital assets to ensure that the accounts are appropriately closed or transferred to legal heirs. Failing to do so could lead to legal disputes.

Security concerns

Unsecured digital legacies are prone to breaches and data misuse. Cybercrooks are essentially free to try and access inactive accounts for as long as they like to get their hands on the data behind the account. All that data might be used for identity theft or fraud. Ensuring the security of posthumous accounts protects not only the person’s legacy but also the surviving relatives’ private and financial data.

Tips and strategies to ease digital legacy management

If you find yourself in a situation where you’re tasked with managing someone’s digital legacy, here are some tips to make the complex and emotionally overwhelming process a little bit easier and more efficient.

Start with financial accounts

When it comes to the first steps in effective digital legacy management and planning, focus on financial accounts first: These include bank accounts, investment portfolios, digital payment apps, and similar. Try to prioritize closing or transferring such accounts to prevent any financial losses or troubles. Furthermore, once you close down the financial accounts, you will also essentially cut out any subscriptions that a deceased person might have had and, by extension, those accounts as well. Taking care of accounts related to finance will likely take up a sizable chunk of time due to excessive red tape associated with finance, but once those accounts are sorted, everything else will go down quicker and easier.

Advise your loved one to use digital legacy features

Today, quite a few online services and platforms offer distinct features designed to manage accounts once someone passes away. For example, Facebook allows users to appoint a “Legacy Contact,” who can manage a user’s account in the event of their death. Apple and Google have also introduced ways to designate individuals who can access the deceased account. Consider having a talk with your loved ones about such features and their importance.

Secure account information

Using a password manager to manage logins along with other sensitive data is recommended not only for when you are alive and well but as a part of your digital legacy management. Password managers provide storage for passwords and often come equipped with a variety of security features that allow you to protect sensitive data that you might come across while dealing with a deceased’s digital legacy. For instance, NordPass comes with Emergency Access—a feature that allows you to designate an individual who would have access to your NordPass vault in the case of an emergency.

Educate and prepare

These days, it is absolutely critical to be aware of the digital legacy concept; after all, it concerns every one of us. While the topic might be morbid, discussing digital legacies with your family and friends is essential. It’s important to encourage them to take their own steps in managing their digital presence as well as to make your loved ones aware of your digital legacy plans.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Protect sensitive data: a guide for your business

In a world where a DNA test can unlock the stories of our past, it was hard to imagine these discoveries leading to danger. DNA testing kits, often given as gifts, opened up new worlds of understanding about where we come from. 

But in October 2023, a significant data breach turned these journeys of discovery into something much more troubling. A bad actor not only accessed but categorized this data, targeting people based on their heritage, like those with Ashkenazi Jewish and Chinese backgrounds. This incident sparked fears, especially when it coincided with violence in Israel and Gaza.

This breach served as a reminder of the risks associated with handling sensitive information and the devastating impact of a security breach. The response from 23andMe, the company involved, drew criticism for not doing enough to protect its users’ data and for blaming the victims.

This event highlights how crucial it is to protect sensitive data. It shows us why understanding sensitive data and ensuring its safety is so important. Keeping sensitive information secure is not just about technical steps; it’s about protecting our identity and privacy. In this article, we’ll explore the nature of sensitive data and discuss ways to safeguard it.

Understanding sensitive data

Sensitive data is information that needs careful handling to prevent harm to a person or an organization if it gets leaked. It covers various personal and business details that laws protect or are private by nature. This includes things like social security numbers, bank details, health records, and secret business information such as security plans or unique technologies.

Click to tweet

Keeping sensitive data safe is key to avoiding identity theft, financial loss, and preserving privacy. To protect sensitive data, it’s important to follow strong security practices, comply with data protection laws, and always prioritize the safety of personal information. These efforts help in securing sensitive data against unauthorized access and data breaches.

Examples of sensitive data

No one ever wants to face a security breach or lose any data. Yet, losing sensitive information can have far worse consequences than losing ordinary data. While it may seem that sensitive data only refers to personal identifiable information, its scope is actually much broader. Here’s a list to help you understand whether your business deals with sensitive information:

Examples of sensitive data

  1. Personal Identifiable Information (PII): data that can identify an individual, such as names, social security numbers, and home addresses.

  2. Financial information: bank account numbers, credit card details, and investment information.

  3. Health information: medical records, treatment history, and insurance details, which are essential for protecting patient privacy.

  4. Employment information: details like employee ID numbers, payroll information, and performance evaluations.

  5. Educational records: student IDs, academic history, and admission applications.

  6. Legal information: criminal records, legal disputes, and court documents. Securing sensitive data in this category is vital for respecting individuals’ privacy and upholding justice.

  7. Commercially sensitive information: trade secrets, business strategies, and customer information, which are critical for a company’s competitive edge.

  8. Biometric data: fingerprints, DNA profiles, and facial recognition data.

  9. Internet and network information: IP addresses, login IDs, and browsing histories.

  10. Government-issued IDs and documents: passports, driver’s licenses, and social security cards. Protecting these documents is essential for preventing identity theft.

  11. Location data: GPS data and travel itineraries that can reveal an individual’s movements.

  12. Communications: private emails, text messages, and chat histories. Ensuring this data’s security helps protect personal information and prevent unauthorized access.

As you can see, the range of sensitive data is quite extensive. If your business handles any of these types of information, it’s crucial to consider how to protect it. It’s about safeguarding your stakeholders’ trust and preventing a security breach that could have devastating consequences. Securing sensitive data should be a top priority for your business.

Compliance regulations for protecting sensitive data

Compliance regulations guide organizations on how to keep sensitive data safe from security violations.

The General Data Protection Regulation (GDPR) in the European Union is a key example. It provides strict rules for handling data and ensures people have control over their personal information.

In the United States, the California Consumer Privacy Act (CCPA) lets people manage their own data, affecting how companies deal with sensitive information.

Healthcare and finance are areas with their own rules. In the U.S., the Health Insurance Portability and Accountability Act (HIPAA) keeps patients’ health information private. The Payment Card Industry Data Security Standard (PCI DSS) sets rules for businesses that process credit card payments.

Following these rules is about more than avoiding penalties. It’s about building trust by protecting sensitive data.

How to protect sensitive data

Securing sensitive data involves a blend of strategies to keep information safe from data compromises.

Ways to protect sensitive data

Adopt Zero Trust architecture

Zero Trust architecture is becoming essential as cyber threats grow more sophisticated.

It operates on the principle that no one inside or outside the network is trusted by default. Every access request is verified.

This method is especially effective in environments where remote work is common, as it can significantly reduce the risk of breaches. However, due to its complexity and cost, small businesses might find it challenging to implement. For instance, large corporations like Google have successfully adopted Zero Trust to secure their networks.

Use Advanced Endpoint Protection

Advanced Endpoint Protection, through EDR (Endpoint Detection and Response) or XDR (Extended Detection and Response) solutions, provides comprehensive monitoring and response to threats targeting devices connected to a network.

It’s valuable for companies with many endpoints to protect, including remote devices. Industries like finance and healthcare, which deal with a lot of sensitive data, can benefit greatly from this method.

However, it might be less effective in environments that do not regularly update or patch their systems. But it’s generally challenging to protect systems that aren’t kept up-to-date. Think back to the Wannacry attack, which affected over 300,000 computers globally. This happened largely because of neglected Windows system updates. Even if your operations need to run 24/7, scheduling those patches and updates is crucial.

Encrypt data

Data encryption secures information at rest and in transit, making it unreadable without a decryption key. It’s a fundamental practice for all types of companies, from small businesses to large enterprises.

Encryption is critical for industries such as healthcare and banking, where data privacy is a legal requirement. However, encryption can be less effective if the encryption keys are not managed securely or outdated encryption methods are used.

Enable multi-factor authentication (MFA)

MFA improves security by requiring users to provide two or more verification factors to access sensitive data. It’s particularly effective in preventing unauthorized access due to stolen or weak passwords. MFA suits all types of companies. However, it may be less effective if users choose insecure backup authentication methods, like easily answered security questions.

Deploy Cloud Access Security Brokers (CASBs)

CASBs protect data as they move to and from the cloud, making them essential for businesses using cloud services. They help enforce security policies and provide visibility into cloud application usage.

CASBs are particularly useful for organizations with a significant cloud presence but may offer limited benefits for companies not utilizing cloud services extensively. Large companies like Netflix use CASBs to secure their cloud environments.

Conduct regular security audits and penetration testing

Security audits and penetration testing identify and address vulnerabilities. They are crucial for maintaining a strong security posture.

They benefit organizations of all sizes but are particularly critical for those in sectors with high regulatory requirements, such as finance and healthcare.

However, these practices require skilled professionals to conduct, which might be a barrier for smaller organizations.

Secure your supply chain

It’s important to make your supply chain secure because attackers often search for weak spots to attack. Make sure every supplier and partner follows your security rules. This builds a strong defense together.

If you run a small business, you can start by discussing security steps with your suppliers. Bigger companies might check their suppliers’ security more formally and help them get better at protecting data.

Plan incident response

A predefined incident response plan will help organizations respond quickly and effectively to a security breach. This approach is suitable for all companies, as it minimizes the damage and costs associated with data breaches. But don’t forget to regularly update the plan and train employees on their roles during an incident.

Use artificial intelligence (AI) and machine learning (ML)

AI and ML are used for predictive threat detection and behavioral analytics. They help identify potential threats before they occur.

Using AI for cybersecurity is particularly useful for large organizations with vast amounts of data to analyze for cyber threat patterns.

Apply data masking and tokenization

Data masking and tokenization protect sensitive information in non-secure environments by replacing it with non-sensitive equivalents. This method is great for development and testing environments where real data is risky to use. But it’s unnecessary for companies that do not use sensitive data outside secure environments.

How NordLayer can help

NordLayer’s Secure Access Service Edge (SASE) solution is changing how businesses protect sensitive data by merging network and security features into a unified, cloud-based service. This method makes it easier to secure sensitive data, lowers the chance of data breaches, and aids in preventing identity theft by using cutting-edge technologies like SD-WAN and security services.

By choosing SASE, companies can safeguard data security for all users and devices. It is a reliable method for protecting personal information and sensitive data from the constantly changing threats.

NordLayer provides businesses with various tools to protect sensitive data, including SaaS security, secure remote access, and threat prevention. These tools join forces to offer thorough protection for sensitive data, improve data security, and ensure secure data processing. This simplifies the management of security policies and reduces the complexity found in traditional security setups.

NordLayer addresses business needs for sensitive data protection in any setting. Contact our sales team for a simplified solution for securing data processing and reducing the risk of security breaches.

What are deepfakes?

Definitions first: Deepfakes are highly realistic synthetic video or audio created with AI models. These deep learning (hence “deepfake”) models are trained on huge quantities of data to mimic a person’s facial expressions, lip movements, and vocal patterns.

Deepfakes are created with Generative Adversarial Networks (GANs), where two models work together (or more accurately, against each other) for optimum results. One model, the generator, creates the fake content, while its partner model, the discriminator, acts as a judge. Low quality fake content is rejected, the convincing material is accepted, and the discriminator constantly pushes the generator to improve across iterations. The result? Convincing videos of people saying or doing things they never did.


The cybersecurity challenge

Deepfakes, unsurprisingly, pose significant cybersecurity risks. Identity theft, fraud, and authentication exploits are all made easier with this technology. A Hong Kong finance worker was fooled into transferring $25 million to fraudsters due to a deepfake impersonation of the company’s CFO.

In another high-tech heist, a company director’s voice was cloned. The cyber conmen got away with $35 million. Vishing (voice phishing) and other social engineering techniques have just received the equivalent of a supercharged power-up with deepfakes.

In the political sphere, deepfakes are being used to influence public opinion. Thousands of citizens in New Hampshire received calls that appeared to use AI to impersonate President Joe Biden’s voice, who urged them to skip voting in the January Democratic primary election. The calls were traced back to a company in Texas with suspicious motives and funding.

Soon after this event, fake videos of megastar Taylor Swift announcing her support for Donald Trump circulated online. In an election year balanced on a knife edge, further devious use of deepfakes could do a lot of damage.


Battling against the fakes

Efforts are underway to combat the deepfake threat. Social media and content platforms like TikTok, YouTube, Meta, and Twitter are implementing policies and features to detect, label, or remove misleading AI-generated content.

OpenAI’s DALL-E generated images now include digital watermarks in image metadata. Google has gone a step further with SynthID, which embeds a watermark directly into the pixels of the image. But none of these methods are infallible. A recent study by University of Maryland students found that “our attacks are able to break every existing watermark that we have encountered.”

On the legislative and regulatory side, the FCC promptly banned AI in robocalls following the election interference calls. Currently only about ten states target deepfake content, and these have generally prioritized non-consensual pornographic material. There’s no overarching federal legislation yet, but the No AI FRAUD Act, if enacted, would “provide individual property rights in likeness and voice.” The EU’s AI Act, which will demand transparency from creators of synthetic content, is currently being finalized.

How you can detect deepfakes

Here are a few tips to spot deepfakes:

  • Unnatural movements, poor lip syncing

  • Shadows in the wrong places

  • Vocal inconsistencies, unusual tone/inflection

A good rule of thumb is to verify information from multiple sources before believing it (or sharing it further). And some timeless advice that applies always and forever: Be skeptical of anything that seems too good (or bad) to be true, especially online.

Check out the new Cyberview episode on your favorite platform:

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.