Skip to content

Removal Notice

We are pleased to inform you that our Head Office will be relocated to following address with effect from 9 JUN 2022 (Thu): 遷往新地址如下:

Unit 1105, 11/F, AXA Tower, Landmark East, 100 How Ming Street, Kwun Tong, Kln, Hong Kong

Telephone & facsimile numbers remain unchanged:

Sales Hotline: (852) 2893 8860 / Email: sales@version-2.com.hk 
Support Hotline: (852) 2893 8186 / Email: support@version-2.com.hk
Fax: : (852) 2893 8214

Customer Service Centre still located in Room 803, Lemmi Centre, 50 Hoi Yuen Road, Kwun Tong
for order collection.

Thank you for your kind attention.

Yours faithfully,
Version 2 Limited

 

ESET 發現著名手提電腦品牌內含 UEFI 漏洞

國際資安大廠 ESET 發現 Lenovo(聯想)手提電腦的韌體存在 3 項 UEFI 漏洞,這三個漏洞是於去年(2021)由研究人員發現,並於該年 10 月通報給原廠;含有這三個漏洞的手提電腦款式甚多,包括 Lenovo IdeaPad 3、Legion 5 Pro-16ACH6 H、Yoga Slim 9-14IYL05 等系列,全球使用者人數可能多達數百萬人。

三個漏洞中,有兩個(CVE-2021-3971 和 CVE-2021-3972)漏洞,可讓黑客關閉針對 SPI 快閃記憶體的機制,而 SPI 快閃記憶體係用以儲存 UEFI 韌體程式碼;這樣黑客即可在電腦啟動(boot)期間執行非由原始製造廠(Original Equipment Manufacturer, OEM)提供簽署的程式碼。

另一個漏洞 CVE-2021-3970 則可讓本地端的黑客,利用此漏洞提升執行權限,並且於本土端執行任意程式碼。

Lenovo(聯想)已提供新版韌體,修復上述三個漏洞外,也在官網提供所有含有上述漏洞的手提電腦型號清單;ESET 資安專家建議所有使用 Lenovo 品牌筆記型電腦的用戶,應立即核對自己使用的產品是否列名於清單內,同時立即升級至最新版本韌體,以免遭黑客利用這三種已知漏洞發動攻擊。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

The Great Resignation as a Threat to Data Security

The Great Resignation is trend in which large numbers of employees have voluntarily been resigning from their jobs. As of August 2021, 65% of people in the United States were looking for a new job and 25% had quit. According to a Tessian survey of IT leaders, 71% said that the Great Resignation has increased security risks.

People and data are the most valuable resources that companies have. Make sure that your company does not lose either during the Great Resignation. It is very common that employees take data with them when they leave their jobs.

Curious to know why people take a company’s data with them?

  • They think the information will help them in their new job.
  • They worked on the document, so they believe it belongs to them.
  • They share the data with their new employer.

Insider threats are on the rise and are amplified by digital workspaces, flexible and remote work, the agile behavior of companies without strict policies and now also by the Great Resignation. The overall number of incidents has increased by 44 percent in the last two years. 29% of employees admitted that they took data with them when they quit (Tessian).

Which departmental employees are most likely to take data with them?

  • Marketing (63% of respondents admitted taking data)
  • HR (37% of respondents admitted taking data)
  • IT (37% of respondents admitted taking data)

Data security is now more important than ever before. We are in a time when employees are leaving their jobs or employers are terminating employees’ contracts due to the anticipated recession. To ensure that your business is not harmed, you should protect your data. 

How to prepare for the Great Resignation and not lose any data

    • Establish an offboarding process
    • Set security policies
    • Identify your sensitive data and monitor who has access to it
    • Educate your employees about proprietary data
    • Use a DLP solution

With Safetica you have all your security policies in your hands. Decide whether you want to simply log all operations, notify users about risk and allow them to proceed, or restrict an operation entirely. Perform a security audit and locate your sensitive data across your environment and see who accesses it and how.

    The solution runs in the background and keeps data secured.

    Here are some specific use-cases for how Safetica protects your data:

    • Blocks sending emails to private email addresses or restricts specific email domains
    • Blocks data capture (like screenshots)
    • Restricts usage of private/unencrypted personal devices
    • Restricts data upload to the cloud
    • Notifies employees about potential risky operations


    On top of all this, Safetica is super simple to implement and use. With our cloud-native SaaS DLP Safetica NXT, you can protect your data from day one. Get a free trial and check it out yourself.

    About Version 2 Digital

    Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

    Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

    About Safetica
    Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

    The all-seeing eye can’t wear a patch

    The expert technologists around you, that digital magazine, your mother and your horoscope have already warned you more than once: 

    IT monitoring is a prerequisite for your company’s health!

    Visibility. Not a blind spot in your monitoring

    But, of course, as much as you strive to be inclusive when it comes to keeping a close eye on the parts that make up your network, some systems end up escaping your attention.

    The so-called blind spots

    But instead of accepting this as an inevitable heavy cross (which, in addition, entails a great cost for your business), consider getting down to work and:

    At the very least, avoid what you don’t see from damaging your IT infrastructure and the business processes that depend on it.

    Remove the patch! Trace and perfect high visibility

    Of course, you might be wondering:

    What should a monitoring strategy include?

    It is a very frequent question, which requires some zeal and work.

    The determination of your monitoring strategy, in favor of greater IT visibility, must begin with creating an outline or index with the relevant information of the systems from all your platforms.

    This will make it easier for the individual aspects of each system to be delivered and broken down. You will have before you the parts that interest you, the most appropriate ones, for a deeper evaluation level.

    Take this outline, collaborate with the cool IT team of your organization, now actually help to define and implement monitoring with full visibility of all your IT assets.

    You can take it as a high school group project!

    These renewed aspects to be monitored will include:

    • Observation of specialized hardware devices.
    • The cloud-based networks you are using.
    • Traffic paths across all systems, including hybrid cloud configurations.
    • That long et cetera that remains to be defined.

    And yet, there will still be that possibility that some systems will remain hidden. 

    It will then be necessary to resort to the use of more comprehensive monitoring tools to help their discovery.

    Is perfect monitoring possible?

    I’m afraid perfect monitoring coverage is just an illusion.

    Even if you have all the award-winning or top-notch monitoring tools at your disposal, it will never be enough to guarantee a coverage of perfect monitoring.

    We tell you from experience:

    Many monitoring tools create the false illusion of seeing absolutely everything within your infrastructure. 

    It is so that you have a certain sense of security.

    Sometimes it is noticeable when some data packets, which contain sensitive information, disappear from view for a while, appearing, as if by magic, within another system from your network.

    Here’s solid proof of a blind spot in your monitoring.

    And this test only sheds light on the current capacity of monitoring tools.

    So it may sound tempting to get hold of all the monitoring tools on the market so you don’t miss anything, but, come on, this will only lead to a system hypertrophy that will provide you with a false sense of security.

    Now what? Is there a technological miracle that escapes us? A definitive monitoring tool that works over good and evil and provides true security and visibility at the height of Sauron’s own igneous eye?

    Go further: Machine learning

    Clarity is the essence of a successful IT department

    That’s right, security protocols and configurations must be very clear, such as for example, the knowledge of which servers host each application.

    It is also more than advisable to find out the status of all the organization’s assets.

    Clarity is the root with which to reach, by pulling, the hows and whys of the system’s blind spots.

    To achieve this clarity/enlightening you must, of course, have the right tools. Tools with which to perform advanced analysis, with which to cross the different levels and layers of your network.

    Your monitoring tool should, at the most fundamental level, bring together the complex layers of monitoring data from the multiple platforms you monitor, as well as employ intuitive levels of machine learning to help uncover hidden computing assets.

    If you use monitoring tools based on machine learning you reduce the time you spend on executing the root cause analyses, while obtaining a full picture of the IT assets.

    Machine learning will also help you eliminate monitoring silos, which, as many of you know, tend to become an burdensome manual task that takes too much time from our precious IT administrators.

    Pure and high visibility on a single screen

    I’ve scared you very much. But actually, identifying the isolated pieces of technology in your stack and centralizing them for effective monitoring and management is an achievable goal.

    Monitoring configurations in a single screen give you an advantage.

    Mainly thanks to their capacity to represent data from multiple infrastructure sources and to display them in a single view.

    These configurations provide a unique vision of the internal operation of a network and help to identify the misled IT assets that must return to the fold.

    With this type of solution, you obtain peace of mind and the capacity to operate effectively in the most complex and accelerated IT environments, while you automate the most concise tasks, for true full monitoring.

    Conclusions

    Obtaining full visibility of your environment by means of monitoring seems like an impossible task, buuut things can be different!

    If you try it at least, you will see in a moment how you obtain higher security levels and higher response capacity in the face of incidents.

    But you know, before running the 100 meters you have to learn to walk.

    And to end the visibility gap you must do some soul-searching of your systems, identify each point to be monitored, and release the silos, so that comprehensive management and monitoring of your systems is possible.

    From here, where else, we advise that if you are truly looking for a solution to get rid of blind spots from your monitoring, take a look at what Pandora FMS can offer you!

    Resources

    Pandora FMS plugin library

    Pandora FMS official forum

    I want to learn more!

    Nuestro Trial

    About Version 2 Digital

    Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

    Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

    About PandoraFMS
    Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
    Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

    ×

    Hello!

    Click one of our contacts below to chat on WhatsApp

    ×