Skip to content

7 tips to prevent cyber attacks during remote work

The year 2021 has arrived, and organizations of all types and sizes are continuing their efforts to adapt their workforce to the new work reality imposed by the Covid-19 pandemic. People, who were previously working using corporate devices and infrastructure within its security perimeters, have been forced to quickly change their approach, now working from their homes and accessing the same resources as before lockdowns. And according to Cisco research published in the Future of Secure Remote Work report, even with the introduction of a vaccine against the coronavirus, IT decision-makers believe that a significant part of this workforce will continue to operate remotely, thereby accelerating the move to Cloud-based models and their projects linked to digital transformation.

Many companies, however, did not have the adequate infrastructure to support a huge number of people working from their homes, let alone to ensure that sensitive data was not exposed. The change introduced by the pandemic has created a strong demand for digital solutions, bringing an important mission for the Information Security teams: not only to protect the company, its employees, and customers but also to guarantee business continuity. A Promon survey of 2,000 remote workers provides some worrying data: almost two-thirds of them had not received any cybersecurity training in the past 12 months. Besides, 77% of them are not concerned with data security while working from their homes. It is worth remembering that data protection laws provide for heavy sanctions in case of data leaks. If the personal data of Brazilians are leaked, for example, a company is subject to fines that can reach 2% of revenues or 50 million reais.

In this context, the Covid-19 pandemic also brought new attack vectors to this entire remote workforce. With so many people using insecure devices and networks to perform their daily activities, malicious attackers saw an opportunity to exploit security gaps introduced by this form of work. Also according to the Cisco report, 61% of decision-makers have reported an increase of 25% or more in cyber threats since the pandemic began in March 2020. And for those who think cybersecurity is something that concerns only global organizations, this increase in threats is also reported by small (55%) and medium-sized (70%) companies. But what aspects should Information Security leaders consider in order to guarantee the security of data transmitted via unprotected devices and networks?

Virtual Private Network, or VPN – as a basic tool in the kit of those who want to guarantee data security, VPNs are old known to IT teams. In addition to the function of avoiding geographical restrictions, the use of these tools also improves privacy on the internet. Also, a VPN allows you to encrypt all internet traffic through devices;

Wi-Fi, or Wireless Connections – most Wi-Fi networks are secure in some way. However, when outside their workspaces, employees should be aware that using public wireless networks is one of the preferred targets for malicious agents to spy on internet traffic and collect sensitive data

Home Routers – many people do not change the passwords for their home routers when they are installed, which increases the risk of falling victim to a cyberattack. To prevent any malicious attacker from having access to the home network and thus gaining improper access to critical data, the first step includes changing the router’s password. Also, it is interesting to encourage employees and third parties to check and install device firmware updates.

Passwords – In these times, it is more important than ever that your passwords are properly protected. Unfortunately, many people use the same password for multiple-service access credentials, both personal and corporate. This means that if a malicious attacker has access to a compromised password, it will be much easier to gain access to other services, including corporate accounts. Therefore, it is recommended to use a PAM solution to manage these privileged credentials.

Multi-Factor Authentication – often, strong passwords are not enough to protect systems from unauthorized access. If a criminal has access to a credential compromised in a data leak, it is not difficult to compromise other user accounts. Thus, by using multi-factor authentication, such as confirmation via an OTP (One-Time Password) generated by an application or SMS, it is possible to add an extra layer of protection to user accounts;

Backups – all user files must be configured to be backed up, preferably in a cloud-based environment. If there is a cyberattack through malware, such as ransomware, and the data is not properly saved, it is not possible to recover it without paying a ransom, which can directly affect the victim’s activities and even the business continuity;

Phishing – in addition to investing in cybersecurity solutions, it is also necessary to train employees appropriately to learn how to deal with phishing attempts or other social engineering-based attacks by malicious attackers to gain improper access to systems. One way to address this problem is to alert employees how to detect suspicious emails from unknown senders, especially if it involves any user action, such as clicking a link or opening an attachment. Even messages received from trusted senders must be considered and verified before they are opened.

As remote work becomes more and more common, companies of all sizes need to implement infrastructure in addition to the appropriate policies to minimize their exposure to cybersecurity risks. The list we presented here is a good start to give an idea of what should be considered in order to create an adequate policy to ensure the protection of the remote workforce. In this way, it is possible to reduce the risks of cyberattacks and avoid heavy penalties from data protection laws, which can affect the trust of employees, partners, suppliers, and even business continuity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

How to use IPEVO’s Mirror-Cam with third party ...

IPEVO Mirror-Cam 是個小巧卻功能強大的工具,可幫助學生及專業人士線上溝通與學習。 Mirror-Cam 具有易攜帶、輕巧且直覺的設計,將筆電內建的攝影鏡頭變成實物攝影機,透過 Mirror-Cam的反射,立即在螢幕上看到筆電鍵盤上發生的所有活動。

Mirror-Cam的創新設計提供了俯角視野,創造出一個展示空間,讓學生在其中筆記、創作速寫、解決數學問題、解說文件、大聲朗讀和做許多事情。專業人士只要將工作放在筆電鍵盤上,便可輕鬆的即時在線上展示工作內容和修改。Mirror-Cam包裝附上一塊小白板,可以完美放在任何筆電的鍵盤上。 Mirror-Cam有著可調整的小翼板、口袋尺寸和輕巧的設計,適合各種尺寸筆電和Chromebook,並方便隨身攜帶。

最重要的是,Mirror-Cam可與Zoom、Google Meets、Skype、Microsoft Teams、Webex和Go to Meeting等第三方通訊軟體一起使用。搭配IPEVO Visualizer軟體,Mirror-Cam提供了一種新奇且省錢、在視訊時分享文件或實物的方式(Mirror-Cam 一組6入裝,僅售1,280元)。

以下是使用步驟,說明如何使用Mirror-Cam及視訊會議軟體分享文件或實物,以及如何解決使用時的鏡像問題。

所需設備

步驟說明

以下是IPEVO Mirror-Cam在第三方通訊軟體中進行螢幕分享的設定步驟。

  1. 將Mirror-Cam安裝在筆電或Chromebook的鏡頭前,請看簡易設定的操作影片、或參考以下說明。
  2. DownloadIPEVO Visualizer軟體到筆電,啟動軟體,接著選擇筆電鏡頭作為攝影鏡頭的來源。
  3. 將文件放在Mirror-Cam下,並於IPEVO Visualizer軟體中檢查即時影像。
  4. 使用IPEVO Visualizer軟體的「旋轉」功能內之「鏡像」功能以調整鏡像,然後文件便會按照使用者看到的樣子正確顯示在螢幕上。

  5. 可使用梯形校正功能,以數位對齊投影影像的頂部或底部。

  6. 準備就緒後,在筆電上啟動Zoom、Google Meets、Skype、Microsoft Teams、Webex或Go to Meeting等通訊軟體,以開啟或加入會議。
  7. 在第三方通訊軟體的會議視窗口中找尋「螢幕分享」按鈕。

  8. 選擇「 Visualizer」視窗。請注意,可能需在使用的第三方通訊軟體中選擇「分享應用程式視窗」。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。

Scale Computing Announces HC3 Video Surveillance and Security Solutions

INDIANAPOLIS – February 2, 2021 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, is introducing a video surveillance and security solution optimized to consolidate video storage, video management and analytics workloads. Scale Computing HC3 is an IT infrastructure platform with the performance, ease of use and resilience required to support surveillance, security and IoT requirements.

Building server and storage infrastructure to support critical video surveillance needs is easy with Scale Computing HC3 Software and Hyperconverged Infrastructure Appliances. HC3 automatically handles hardware failures, making the system easy to manage from day one and easy to “scale out” to expand resources when they are needed without adding additional “islands” to manage in the process. This is a great improvement from legacy video where systems adding additional legacy server based VMS / NVR monolithic systems was expensive and time consuming.

Recent protests in Minneapolis impacted three Jerry’s Foods locations and like many businesses in the region, Jerry’s Foods experienced property damage and stolen goods. As the situation unfolded, the IT team at Jerry’s Foods wanted access to each store’s video surveillance system, but needed to move quickly. Rapid, trouble-free implementation and deployment allowed the local IT team to move the small and lightweight Scale Computing HE150 servers from one location to another in less than an hour.

“Of our affected stores, one video surveillance system was running on Scale Computing and Digital Watchdog, the other was running on Digital Watchdog without Scale Computing,” Miller said. “We were impressed when we were able to quickly and easily move servers from one location to another, but our operations team was thrilled that we were up and running and watching video from a safe location within an hour. We’re constantly blown away by the simplicity and functionality of Scale Computing HC3, especially in a moment of uncertainty. It’s safe to say, I’m sleeping better at night.”

HC3 is delivered as a family of modular building block appliances with the intelligent infrastructure software included and pre-loaded. Additional HC3 nodes can be added to expand the overall HC3 cluster pool of storage and/or compute resources as needed without adding anything new to manage, so IT and security leaders can buy the resources as needed. HC3 nodes are available with a variety of resources and capabilities from high capacity magnetic storage, low latency NVMe and flash storage, a wide range of processor and RAM configurations as well as GPU.

One of the UK’s premier suppliers of plastic packaging, M&H deployed hyperconverged infrastructure and edge computing on its video surveillance system to keep premises secure and optimise scalability. “We are super satisfied with how our Blue Iris Video Management Software runs on Scale Computing’s HC3 solution. It is secure, efficient, and fast enough to handle all of our video surveillance and we have not had any issues with it. It has truly ticked all the boxes, because of this we now have the majority of our IT equipment running on Scale Computing,” said Rob Mellor, Director of IT at M&H Plastics.

VMS Software Solutions

  • VMS software for Windows or Linux can be installed inside a HC3 virtual machine.
  • Popular VMS software tested on HC3 includes MIlestone XProtect VMS, Genetec Security Center / Omnicast, Digital Watchdog DW Spectrum, Blue Iris, Pelco VideoXPert and many others.
  • Scale Computing HC3 is Milestone Verified and listed in the Milestone Marketplace

“HC3 software is intelligent infrastructure software that runs applications reliably. As a video surveillance and security solution we offer a flexible, reliable, and secure IT platform capable of being deployed quickly, managed both locally and remotely, and has self-healing technology that reduces the overall amount of time spent on IT support and maintenance,” said Jeff Ready, CEO and co-founder, Scale Computing.

The Scale Computing Video Surveillance and Security solution is available today. For more information please visit https://www.scalecomputing.com/video-and-surveillance-infrastructure-solutions

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

訊連科技FaceMe®於最新NIST人臉辨識測試名列前茅 為全球排名第6及排除中國廠商之全球第1之開發廠商

【2021年1月26日,台北訊】 全球頂尖AI臉部辨識領導廠商訊連科技(5203.TW) 宣布,旗下FaceMe® AI臉部辨識引擎於2021年1月份最新公布於美國國家標準暨技術研究院(National Institute of Standards and Technology/ NIST)臉部辨識技術基準測試(Face Recognition Vendor Test/ FRVT)中再創佳績,於實境照比對測試項目(WILD 1E-5)中以96.98%辨識率,名列全球第6之開發團隊*,更是排除中國廠商後,於該測試項目全球排名第1。

訊連科技FaceMe®於最新NIST人臉辨識測試名列前茅 為全球排名第6及排除中國廠商之全球第1之開發廠商

「臉部辨識技術基準測試」由美國國家標準暨技術研究院所設立,為全球最具權威的臉部辨識演算法評比,其評比結果受到全世界高度矚目。實境照比對為NIST FRVT 1:1中難度最高、且最具指標意義之測試項目,係比對安控攝影機拍攝之實境照片,通常會有角度不佳、局部遮蓋、光線不佳等較難以辨識之情形,應用場景可涵蓋智慧安控、智慧警政、智慧城市、智慧交通及智慧零售等多樣化場景。

訊連科技FaceMe®在2021年1月最新公布的NIST測試報告中,於實境照比對測試項目(WILD 1E-5)中以96.98%辨識率,以開發團隊排名高居全球第6,更是排除中國廠商後,成為該測試項目全球排名第1的廠商。FaceMe®可提供沒有資安疑慮的臉部辨識技術,是各式專案及標案中採用台灣開發的臉部辨識技術首選,更可幫助IoT/AIoT廠商於面向全球市場的產品中導入無資安疑慮的刷臉技術。

「近年來,臉部辨識技術已陸續於全球各應用領域落地。在台灣市場,也可看到越來越多的智慧城市、智慧警政、智慧安控等相關應用,陸續導入臉部辨識。」訊連科技執行長黃肇雄表示:「臉部辨識除了準確度外,更是重要的資安及國安議題。對於台灣本地專案來說,FaceMe®提供了高準確度的臉部辨識,更可排除資安疑慮,是全球頂尖、台灣第一的臉部辨識解決方案。」

FaceMe®為專為邊緣運算(Edge Computing)打造的臉部辨識引擎,無論是建置在搭載高階處理器及圖像加速卡的伺服器和工作站、或是搭配輕量化處理器的IoT邊緣運算裝置,皆可針對不同的硬體配置進行優化,為系統整合商帶來快速,彈性且精準的人臉辨識解決方案,並可導入各種應用領域中,如智慧安控,訪客控管,公共安全,智慧零售和智慧家庭等。針對COVID-19疫情升溫,口罩辨識及配戴口罩的臉部辨識亦是重點指標,FaceMe®亦提供口罩偵測及配戴口罩進行人臉辨識等功能,可提供高達95%的辨識率,適合運用於醫療院所、辦公室及工廠等地,進行配戴口罩時的人流偵測及門禁管制。

更多關於FaceMe®的訊息,請至: https://tw.cyberlink.com/faceme/

*註:基於2021年1月19日公布之FRVT 1:1 結果。於測試中,單一開發團隊可提交多個臉部辨識演算法。訊連科技FaceMe®於WILD Photo 1E-5項目中,以3.02%拒認率,於所有演算法中排名第7。若以開發團隊(提交多個演算法者仍視為單一團隊) 排名,則於所有開發團隊中名列第6。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

How You Should Prevent Ransomware Attacks On Your Industrial Networks

This Week, Ransomware Slams Westrock & Other industrial Organizations

Earlier this week, the operations at $17 billion packaging firm WestRock were disrupted by a ransomware attack that impacted both its IT and OT (operational technology) networks. Two days later, a massive $27 billion chain operator Dairy Farm Group was also attacked by ransomware, with the attackers demanding a $30 million ransom. Those are just a sample of successful ransomware attacks from this week alone.

Since the outbreaks of Wannacry & NotPetya ransomware attacks in 2017, we’ve been witnessing daily occurrences of attacks affecting OT networks that originated in the IT side. The U.S. National Security Agency (NSA) also highlighted this issue for this very simple reason. It works.

Ransomware Works

That’s the simplest way to explain why incidents of ransomware attacks have sharply increased over the last year — with no end in sight. The number of ransomware attacks has jumped by 350 percent since 2018, the average ransom payment increased by more than 100 percent this year, downtime is up by 200 percent and the average cost per incident is on the rise, according to a recent report from PurpleSec.

Threat actor groups with names such as Ryuk, Egregor, Conti, Ragnar Locker, and many others are ruthless, well-funded and are willing to target anyone; from COVID-19 vaccine manufacturers, automotive manufacturers, critical infrastructure, governments and hospitals to get their payday. In fact, the first ransomware related death happened this past September, when a German hospital was infected with ransomware and couldn’t treat patients during the Covid-19 outbreak.

As part of SCADAfence’s mission to protect the lives and safety of civilians, we’ve put together this guide to help you prevent ransomware in your industrial organization.

The Ransomware Encryption Process

Let’s go back to the beginning, and discuss how these attacks encrypt systems in the first place.

From the previous ransomware attacks we’ve researched, we learned that from the minute the attackers get initial access, they can encrypt the entire network in a matter of hours. In other cases attackers would spend more time in assessing which assets they want to encrypt and they’d make sure they get to key servers such as storage and application servers.

Most of the recent ransomware attacks you’re reading about in the news try to terminate antivirus processes to make sure that their encryption process will go uninterrupted. Recent ransomware variants such as SNAKE, DoppelPaymer and LockerGoga even went further by terminating OT related processes like Siemens SIMATIC WinCC, Beckhoff TwinCAT, Kepware KEPServerEX, and the OPC communications protocol. This made sure the industrial process was interrupted, and this increased the chances that the victims paid the ransom. These types of ransomware attacks were seen in the recent attacks of Honda and ExecuPharm.

OT Security Challenges with Ransomware

Diagram #1 – An OT Security Challenge: Industrial Components Exposed to Encryption

From what we’ve seen, ransomware generally encrypts Windows and Linux machines. We still haven’t seen any PLCs being encrypted. However, many industrial services are run on Windows / Linux machines – such as Historians, HMIs, Storage, Application Servers, Management Portals and OPC Client/Servers.

In many cases, ransomware operations would not stop in the IT network, and will also attack OT segments. More encrypted devices means a higher monetary ransom demand from the attackers.

Organizations must be able to monitor & detect threats across the IT/OT boundary in order to effectively identify risks before reaching process-critical end-points.

Ransomware Prevention in Industrial Networks

Diagram #2 – Ransomware Prevention: How You Can Prevent Ransomware Attacks On Your Industrial Networks 

Some of the tools and techniques that ransomware operators are using are on the same level that nation-state threat actors are using on targeted espionage campaigns.


Diagram #3 – Tactics, Techniques & Procedures most commonly used in Ransomware Attacks

We recommend that organizations practice these common security procedures to minimize their risk of ransomware infection on each step of the kill chain:

Initial Access:

  1. RDP
    1. If possible, replace RDP with a remote access solution that requires two-factor authentication, many VPNs now support that. This will require attackers to be verified by, for example, a code sent via SMS.
    2. If you choose to still use RDP, make sure its Windows Update is enabled and is working.
  2. Email Phishing
    1. Educate the organization’s employees about phishing attacks. Employees should be suspicious of emails that don’t seem right and not click on suspicious links.
    2. Install an Anti-Phishing solution.
  3. Software vulnerabilities of internet-facing servers
    1. Scan your organization’s IP range from outside the network. Verify that all exposed IP/ports are what you expect them to be.
    2. Make sure that automatic security updates are enabled for your exposed services. If one of your services (such as web servers, for example) does not have that feature, consider changing it to a similar one that has this feature.

Lateral Movement:

  1. Firewalls & Windows Update – Enable firewalls on all of your workstations and servers.
    Make sure that Windows Update is enabled. This will ensure that your machines will be patched for the latest vulnerabilities and will also be less prone to lateral movement techniques. Microsoft constantly updates their security policies and their firewall rules.
    One good example is that they disabled the remote creation of processes using the Task Scheduler ‘at’ command.
  2. Endpoint Protection

Endpoint protection works. Beyond blocking classic hackers’ techniques, some also have defenses against ransomware and will protect your assets from encryption.

  1. Network Segmentation
    Ideally, you would want to minimize the risk of your industrial network being impacted when suffering a ransomware attack.
    1. To the possible extent, separate the IT network from the OT network segment. Monitor and limit the access between the segments.
    2. Use different management servers to the OT and IT networks (Windows Domains, etc). By doing so, compromising the IT domain will not compromise the OT domain.
  2. Constant Network Monitoring
    A constant network monitoring platform (we happen to know a really good one), will help you identify threats while analyzing network traffic and will help you see the bigger picture of what’s happening in your network.
  3. Data Exfiltration
    Monitor your network for unusual outbound traffic. Everyday user activity should not generate uplink activity higher than about 200MB/daily per user.

How SCADAfence Helps You

We provide a comprehensive solution – The SCADAfence’s platform which was built to protect industrial organizations like yours from industrial cyber attacks (including ransomware). It also helps you implement better security practices amongst its built in features. Some of these include:

  • Asset Management
  • Network Maps
  • Traffic Analyzers

These tools will help your organization to implement better network segmentation, to make sure that your firewalls are functioning properly, and that every device in the OT network is communicating only with the ones that they should be communicating with. You will also be able to spot assets that are not where they’re supposed to be, for example, forgotten assets in the DMZ.

The platform, which is also the highest rated OT & IoT security platform, also monitors the network traffic for any threats, including ones that are found in typical ransomware attacks; such as:

  • Security exploits being sent across the network.
  • Lateral movements attempts using latest techniques.
  • Network scanning and network reconnaissance.

In an event of a security breach, SCADAfence’s detailed alerts will help you to contain these threats as quickly as possible. Ultimately, we built this tool to help industrial organizations to understand their attack surface, to implement effective segmentation and constant network monitoring for any malicious or anomalous activity.

Video: The Anatomy of a Targeted Ransomware Attack:

We’d like to share with you a true story of a recent incident response to an industrial ransomware cyberattack. SCADAfence’s incident response team assists companies in cyber security emergencies. In this video, we will review a recent incident response activity in which we took part. This research has been published with the goal of assisting organizations to plan for such events and reduce the impact of targeted industrial ransomware in their networks.

For more detailed information on this story, we prepared a full whitepaper here: https://www.scadafence.com/resource/anatomy-of-a-targeted-ransomware-attack/

Additional credits: Yossi Reuven and Michael Yehoshua have also contributed to this comprehensive guide.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×