Skip to content

讓安全政策隨行動辦公室的時空主動變換

2019年年底開始爆發的COVID-19疫情持續漫延,因為疫情的關係帶動了遠距工作及遠距學習的新型工作及生活方式。俗話說東北有三寶,行動工作也要有三寶 — 筆電、手機、充電寶(行動電源)。新世代行動工作者只要有筆電、手機、再加上行動上網,隨時隨地都可以工作、學習。

但其實遠距或行動工作處處潛藏著危機,日本IPA調查2021年資訊安全10大威脅,其中第三名是今年新入榜,針對遠距工作等新常態工作方式的攻擊。過去一年多以來日本疫情一直控制不下來,東京都、大阪府等已經實施了好幾次緊急事態對策。不只賞櫻活動降溫,今年連五一黃金週也泡湯了,東京奧運延後了一年還不一定能辦成。精品科技在東京的子公司從去年3月東京開始爆發大規模疫情後,一直到目前都採取居家辦公,我們和NTT DATA等合作伙伴的活動也全都改成線上會議。這些新工作常態正面臨著前所未有的挑戰與威脅,這也讓有心人士有可趁之機。

 

亞洲和歐洲方面。根據Space Three Two在2020年11月調查,疫情讓倫敦辦公室使用率自大流行前的44%降至28%;另外一旦所有防疫限制解除,員工希望每週平均花2.7天待在公司,這個數字在疫情爆發之前是4.5天!遠見雜誌在2020年3月爆發第一波疫情時的調查顯示,未來工作型態的三大趨勢分別是,工時彈性、工作多元、雲端遠距與行動辦公。而2021年1月思科的未來工作力研究報告指出,即使辦公室如常開放,絕大多數員工仍希望享有更多自主權,自由選擇在家或在辦公室工作及管理工作時間,並且希望未來能以視訊軟體或其他通訊工具,取代傳統電話會議及實體會議。因此企業應慎重規劃提供遠距辦公者與辦公室同等級的數位工具,並且強化員工對科技與數位方面的技能訓練及資訊安全意識。

分析歸納新世代行動工作者的工作及生活,大致會有以下這些情境以及活動,這些情境或活動也都面臨不同的資安風險:

  • 帶著公司筆電趴趴走
  • 隨時隨地上網公器私用
  • 遠距會議
  • VPN連回公司存取內部資源
  • 存取公司租用的雲端服務
  • 遠端桌面操作公司內部電腦

 

首先,針對行動工作必備的三寶,因為帶著筆電到處趴趴走,筆電遺失的風險也跟著提高。在Ponemon的調查報告指出,失竊的筆電中,有6成以上沒有採用加密保護,沒有習慣備份的也有6成多。當筆電失竊時,其中的機密資料是防護的重點,X-FORT提供以下對策:

  • 硬碟防謢:拆下硬碟看不到內容
  • SVS加密:機密檔案偷不走
  • FAC資料夾保護及自動備份:受保護的資料不會被加密勒索

其次,行動工作者隨時隨地上網、工作,也面臨有形或無形的攻擊,像是利用免費WiFi引誘不知情者連線,或是使用一些駭客工具或硬體裝置做實體的入侵竊取。當然一直無所不在的惡意網站、釣魚信件等資安事件也是耳熟能詳。針對這些有形無形的攻擊,X-FORT也提供了連線安全、裝置安全、郵件安全、軟體安全等安全對策。尤其是應用程式控管,我們已經驗證了確實可以有效的阻止目前知名的勒索軟體攻擊事件。

第三,針對遠距工作新常態,遠距會議是最常用的工具之一,但是這些遠距會議或即時通訊軟體都是安全的嗎?員工的使用方式安全嗎?我們建議應該在適當的時機提醒資安風險,限制可以使用的即時通訊軟體以及遠距會議軟體,控管上傳檔案等措施。

第四,遠距工作通常需要存取公司內部資源,一般是讓員工使用公司配發的筆電,或是員工家中的電腦,VPN連回公司工作。企業需要具有敵我識別的能力,區分這些連入公司VPN的設備,是員工使用公司配發的電腦連入公司,還是利用私人電腦或網咖等公司外部電腦連入公司,也要防止VPN帳號/密碼被竊或外洩後被不當登入利用。因此企業通常會在內部設置VDI,或是開放公司內部員工原本使用的電腦遠端桌面登入使用,運用跳板的方式避免直接把內部資源對VPN連入的設備開放。因此內部個人電腦開放遠端桌面,依不同情形需採取不同的安全政策,(1)在公司直接使用 (2)由外部遠端桌面連入使用。簡單原則是近端(公司內部)電腦需要安全把關,遠端(公司外部)電腦/使用者需要敵我識別。

 

前三種情境可設定為公司行動工作端點的標準控管政策(使用者政策、離線政策、暫時政策)。但考慮更具有彈性、減少管理負擔的方式,則應該預先分析行動工作者各種操作及情境,區分低、中、高風險等級,制定不同的安全政策,以滿足各種工作情境所需資源並適度做好風險控管。之後可分別套用X-FORT EDR事件反應,或是依工作情境自動切換安全政策。讓端點保護系統能偵測使用者的工作型態或情境,依組織預先制定的安全政策,切換不同的控管規則,除了滿足遠距工作或行動工作應有的資源,也能依情況自動採取較彈性或是較嚴格的規則,適當的保護遠距辦公及行動辦公的資料安全。

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

ESET Research at RSA Conference 2021: Android stalkerware on the rise

BRATISLAVA – Mobile stalkerware, which is software silently installed by stalkers onto victims’ mobile devices without their knowledge, is on the rise, ESET Research finds. In 2019, ESET telemetry recorded almost five times more Android stalkerware detections than in 2018, and in 2020, almost 1.5 times more were recorded than in 2019. In addition, ESET Research has discovered serious vulnerabilities in Android stalkerware apps and their monitoring servers that could result in serious user impact if exploited. “Security: The Hidden Cost of Android Stalkerware” will be presented today, May 17, 2021, by ESET researcher Lukáš Štefanko from 11:20 to 12:00 PDT (20:20 to 21:00 CEST).

For stalkerware vendors, to stay under the radar and avoid being flagged as stalkerware, their apps are in many cases promoted as providing protection to children, employees, or women, yet the word “spy” is used many times on their websites. “Searching for these tools online isn’t difficult at all; you don’t have to browse underground websites,” explains Štefanko.

ESET researchers manually analyzed 86 stalkerware apps for the Android platform, provided by 86 different vendors. This analysis identified many serious security and privacy issues that could result in a third party – an attacker – taking control of a victim’s device, taking over a stalker’s account, intercepting a victim’s data, framing a victim by uploading fabricated evidence, or achieving remote code execution on a victim’s smartphone. Across 58 of these Android applications, ESET discovered a total of 158 security and privacy issues that can have a serious impact on a victim; indeed, even the stalker or the app’s vendor may be at some risk.

Among the most prevalent issues were insecure transmission of users’ personally identifiable information; storage of sensitive information on external media; exposure of sensitive user information to unauthorized users; server leak of stalkerware client information; and unauthorized data transmission from device to server.

“Following our 90-day coordinated vulnerability disclosure policy, we repeatedly reported these issues to the affected vendors. Unfortunately, to this day, only six vendors have fixed the issues we reported in their apps,” says Štefanko.

For more technical details about ESET’s analysis of Android stalkerware, read the blogpost “Android stalkerware threatens victims further and exposes snoopers themselves” and the white paper “XYZ” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

Based on our detection telemetry, usage of Android stalkerware is increasing

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET  
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

SaaS vs onPremise: Pros, Cons and Cost Analysis

SaaS vs onPremise, do you use the cloud?

Do you use the cloud?

Be aware that we’re not saying that you are in cloud nine, but that you may most likely be using the cloud. That is, if you use Google mail, Microsoft Office 365 office suite or you take a photo with your cell phone and then it gets automatically uploaded to iCloud or something similar, you are using the cloud.

The cloud, as an abstract concept, encompasses a series of technical terminology such as SaaS, IaaS, PaaS, etc. The good thing about the concept of the cloud is that you can guess what it does thanks to the metaphor: we do not know where our data are, or how they get there, nor does it matter much for us, because it is far away and it does not affect us. The great success of the cloud of the 21st century has been to find an especially powerful metaphor that omits the complexity behind that technology and gives us peace of mind.

The concept of using third-party infrastructure for “our stuff” is the oldest thing in computing. In fact, back in the 60s of the last century, most computing worked like this. You connected to a large machine from a computer that was not as such, but a screen and a keyboard. Then the microcomputer craze turned around and every computer was self-sufficient. Now, almost a century later, we have rediscovered that it is more efficient to have everything centralized in one big system.

I have nothing against the cloud. Well, my life is not at stake, unless for example, I entrust the IT infrastructure of my business to the cloud. This is what happened to a number of companies in Asia, such as CITEX or BitMax that used the Amazon cloud (AWS) to host their Bitcoin exchange service (Exchangers), well, them and also the Asian sites from Adobe, Business Insider, Expedia, Expensify, FanDuel, FiftyThree, Flipboard, Lonely Planet, Mailchimp, Medium, Quora, Razer, Signal, Slack, Airbnb, Pinterest, SendGrid and a few hundred more. The cloud is not infallible, the cloud is comfortable.

Today many companies have relied so much on the cloud that it is impossible to take a step back, get out of the cloud, because they would literally have to remake the system with another technology. The cloud is easy but implies total dependence on the provider, especially in technologically optimized systems such as Amazon’s. It’s too good a candy to resist.

Realistically, if you’ve already risen to the sky and are floating with the clouds, and the technology that supports your business is floating above your head, it may not be easy or comfortable to go back, in fact, you may have probably already realized that the cloud is not cheap at all and the costs are increasing over time, and are difficult to predict.

Well, it’s already in, and it’s not going to change, so you should at least be able to keep an eye on what your provider is doing. Monitor the quality of service they offer you and make sure for yourself, because who is watching the watchdog? That’s right, do it yourself, trust no one, do it with your own systems, don’t use a cloud system to monitor another cloud system, put your feet on the ground and buy yourself an umbrella, just in case it rains.

The “lifetime” model: onPremise

On the contrary, we have the classic model of “buying the software” and using it however you want, wherever you want and, whenever you want you change programs without much thought. Oddly enough, this is really the new model, the pay-per-use model that SaaS has copied predates conventional software licenses. The onPremise model gives you the right to use the software on your own computers, in your own facilities and where the manufacturer or software owner does not have any access or rights. The only requirement is to pay for it and use it under the conditions approved by the license you acquired.

Cost analysis: onPremise vs SaaS

The onPremise model has some undeniable advantages, the main one being data security. As it is running on your systems, you own both the information and the processes that use that information. This has legal and business implications, since changing providers can be easier than when you use its SaaS equivalent.

Although it may seem a lie, in the long term the SaaS model is more expensive than the onPremise model, and above all, with the onPremise model it is much easier to estimate the Total Cost of Ownership (TCO) in the medium term. This can be easily demonstrated if we compare the costs in the subscription/pay-per-use model (SaaS) and the license ownership model (onPremise) for one, three and five years.

  • Suppose a SaaS license annual cost is €5,000/year. In this case it is pure OPEX (operating costs).
  • Let’s picture an onPremise license whose annual cost is €10,000 the first year, and whose annual maintenance cost is 20% (which is the standard in the market). That supposes a renewal cost of €2000/year. In this case, it is pure CAPEX (investment in assets, software).
 SaaS onPremise
1 year5,000 €10,000 €
3 years15,000 €14,000 €
5 years25,000 €18,000 €

There are intangible factors, such as input barriers, higher in onPremise models, and output barriers, higher in SaaS models. It is also true that an onPremise installation involves additional costs: those of infrastructure, operation and training.

In certain types of applications with little added value such as office tools, the SaaS model is here to stay. Office 365 or Google Docs are a perfect example.

In other cases, such as Adobe Photoshop, the onPremise model has been combined with a pay-per-use -subscription- model (but without being SaaS) combined with the conventional onPremise licensing model.

Summary of arguments in favor of each model

SaaSonPremise
Security depends on the provider.Security depends on the customer.
The responsibility for the operation lies with the supplier.The data is owned by the customer.
Savings in infrastructure and operating costs.Lower long-term license costs.
Ease of financing (monthly or quarterly payment).Easier-to-plan long-term costs.
OpexCapex
Lower input barriers.Higher input barriers.
Higher output barriers.Lower output barriers.
Faster deployment times.It is easier to integrate with the rest of the business processes.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

SafeDNS received the Global InfoSec Award during the 2021 RSA Conference

The 9th Annual Global InfoSec Awards saw SafeDNS virtually rewarded by the Cyber Defense Magazine and the Cyber Defense Awards during the RSA Conference USA 2021 for the cybersecurity industry. SafeDNS has been recognized as the internet filtering market leader.

This newest award comes in addition to other recognitions SafeDNS received over the past 10 years in the cybersecurity sphere for its internet filtering solutions.

Earlier this year, SafeDNS released a new interface for its web filtering dashboard, thus coupling clean design, better user-friendliness, and sophistication to provide a unique experience to its customers.

The whole SafeDNS team thank its customers and partners for their support and permanent feedback that has continuously allowed its team to come up with improved, simpler, cost-effective, and robust web filtering solutions.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

ESET earns top award in SE Labs’ Enterprise Endpoint Protection test

BRATISLAVA – ESET, a global leader in cybersecurity, has earned the highest possible award in SE Labs’ Q1 2021 Enterprise Endpoint Protection test, the AAA award, for ESET Endpoint Security. ESET has claimed the AAA award for the third time, following recognition from SE Labs in both Q1 and Q3 of 2020.

A leading independent testing company, SE Labs aims to improve information technology security by assessing products and services designed to detect attacks and protect against intrusions. SE Labs tested 9 endpoint security solutions between January and March 2021 to evaluate product efficacy at detecting and protecting against threats in real time. ESET Endpoint Security received a total accuracy rating of 1,116, along with the second highest total accuracy percentage of 99%.

ESET Endpoint Security is designed to protect endpoints using multiple layers of protection, including Advanced Machine Learning, Host-based Intrusion Prevention System (HIPS), Exploit Blocker, Advanced Memory Scanner, and UEFI Scanner. In testing, the solution was exposed to a mixture of targeted attacks and public web-based threats. The results demonstrate that ESET Endpoint Security is consistently effective at blocking malicious URLs, handling exploits, and correctly classifying legitimate applications and websites.

Jiri Kropáč, Head of Threat Detection Labs at ESET, commented: “We are thrilled to be recognized by SE Labs with an AAA award for the third time. The award reflects our commitment to providing enterprise customers with the absolute best in cybersecurity solutions and highlights our consistent efforts to provide robust and reliable products as the threat landscape evolves in complexity. Testing our solutions in real-world environments is crucial in confirming to users that their businesses, data, and employees are in the best possible hands when it comes to malicious actors and cyberattacks. With cybersecurity as a top priority for businesses across the globe, ESET is proud to provide organizations with cutting-edge technology of the highest quality.”

You can find out more about ESET Endpoint Security here.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET  
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×