Skip to content

What is the CCPA?

The California Consumer Privacy Act (CCPA) is a data protection law that came into effect on January 1, 2020. The CCPA is designed to give California consumers greater control over their personal information that is collected, received, used, shared, and/or sold (i.e. ‘processed’) by businesses. The CCPA is often compared to the European Union’s General Data Protection Regulation (GDPR) as it provides similar rights and protections to consumers.

The CCPA requires businesses to be transparent about their data collection and sharing practices, as well as to provide individuals with certain rights over their personal information, and to implement reasonable security measures to protect that information.

Today, we’re exploring CCPA. Let’s jump in right away.

Who must comply with the California Consumer Privacy Act?

The CCPA applies to businesses that operate in California and collect, and store with personal consumer data of California’s residents, and meet one or more of the following criteria:

  1. Have an annual gross revenue of over $25 million.

  2. Buy, receive, share or sell the personal information of 50,000 or more California consumers, households, or devices.

  3. Derive 50% or more of their annual revenue from selling California consumers’ personal data.

The CCPA also applies to businesses that control or are controlled by a business that meets the above criteria and share common branding.

What is the definition of personal information?

The CCPA defines personal information as any information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.

The definition of personal information by the CCPA may also include but is not limited to names, aliases, postal addresses,, email addresses, social security numbers, IP addresses, biometric information and other information that helps to directly or indirectly identify a person.

Data Covered by the CCPA

CCPA is designed to ensure that individuals are the ones in control of their data, and because of that the act defines the way business should process individuals’ personal information.

This includes information obtained from the consumer directly or indirectly, such as through a third party. The CCPA also covers information about a consumer’s household, such as their family members’ names and ages.

However, the CCPA excludes certain data, such as publicly available information, deidentified or aggregated consumer information, and data covered by other laws, such as the Health Insurance Portability and Accountability Act (HIPAA).

What are the CCPA Requirements?

  1. Right to know what personal information is being collected, used, shared and sold

  2. Right to request deletion of personal information

  3. Right to opt-out of the sale or sharing of personal information

  4. Right to access personal information in a portable and easily understandable format

  5. Right to non-discrimination for exercising their CCPA rights

  6. Right to correct Inaccurate Personal Information

  7. Right to Limit Use and Disclosure of Sensitive Personal Information

Businesses must also provide notice to consumers at or before the time of collection of their personal information. The notice must inform consumers of the categories of personal information that will be collected, the purposes for which the personal information will be used, and the categories of third parties with whom the information may be shared.

Furthermore, businesses must implement robust security measures to protect consumers’ personal information from unauthorized access, destruction, modification, or disclosure. On top of that companies are also expected to establish and maintain reasonable practices and procedures for responding and honoring to consumer requests.

H2: CCPA Compliance Checklist

Organizations subject to the CCPA should take several steps to comply with the law.

  • Conduct a data inventory to identify personal information collected, used, and sold.

    To meet CCPA requirements, organizations should conduct a thorough review of their data practices to identify the personal information collected, used, and sold. This inventory should include a comprehensive assessment of data sources, purposes for which the information is collected, categories of third parties with whom information is shared, and security measures implemented to protect information.

  • Update privacy policies to include CCPA-required notices.

    Organizations must ensure that their privacy policies are updated to include CCPA-required notices, which should be clear, concise, and written in plain language. The privacy policy must inform consumers of their CCPA rights, such as the right to access personal information, the right to request deletion of personal information, and the right to opt-out of the sale of their personal information.

  • Implement processes for receiving and responding to consumers’ requests.

    To comply with the CCPA, organizations must have effective processes in place for receiving and responding to consumers’ requests. These requests may include access to personal information, deletion of personal information, or opting-out of the sale of personal information. Organizations should establish procedures to verify requesters’ identities and respond to requests within the CCPA’s required timeframe.

  • Provide an opt-out mechanism for the sale of personal information.

    Organizations wishing to comply with the CCPA must provide a mechanism for consumers to opt-out of the sale of their personal information. This mechanism should be easy to use and prominently displayed on the organization’s website.

  • Train employees on CCPA compliance.

    To comply with the CCPA, organizations must train their employees on CCPA compliance, including a review of CCPA requirements and guidance on handling consumer requests. Employees who handle personal information must also receive training on security policies and procedures.

  • Implement reasonable security measures to protect personal information.

    Organizations must implement reasonable security measures to protect personal information. This includes physical, technical, and administrative safeguards to prevent unauthorized access, use, and disclosure of personal information.

  • Monitor and update compliance measures as necessary.

    To maintain CCPA compliance, organizations must continuously monitor and update their compliance measures as necessary. Among other things, this includes regular review and updating of privacy policies, employee training on new requirements, and ensuring that their processes for receiving and responding to consumer requests are effective.

What new law goes into effect beginning January 1, 2023?

In November 2020, California voters passed Proposition 24, the California Privacy Rights Act (CPRA). The CPRA is designed to amend and extend the original CCPA.

Not only does the CPRA expand consumer rights, but it also brings fresh rules to the table. The right to correction allows consumers to have incorrect information rectified while the right to limit sensitive personal information will give them greater control over their data in general.

Consumers can also request information on automated decision-making and opt-out of the use of such technologies.

The CPRA went into effect on 1st of January, 2023 and is now state-wide law.

Are there any penalties for violating CCPA?

Penalties for violating CCPA are very real. Businesses that fail to comply with the CCPA may face fines of up to $7,500 per violation. Consumers also have the right to bring a private action against a business that violates their CCPA rights.

What is the difference between GDPR and CCPA?

While the CCPA and GDPR share similarities, there are some key differences between the two laws. The GDPR applies to businesses that collect and process the personal data of individuals in the European Union, while the CCPA applies to businesses that collect and process the personal data of California residents only.

The GDPR also gives individuals more rights, such as the right to object to the processing of their personal data and the right to restrict processing in certain circumstances. The CCPA, on the other hand, gives consumers the right to opt-out of the sale of their personal information.

Another difference between the two laws is that the GDPR applies to all businesses, regardless of their size or revenue, while the CCPA only applies to larger businesses that meet certain criteria.

What does CCPA mean for cybersecurity?

In terms of cybersecurity, the CCPA has significant implications. Companies that collect and store personal information are required to implement reasonable security measures to protect that data from unauthorized access or theft.

Under the CCPA, companies can be held liable for breaches that occur due to their failure to implement reasonable security measures. This means that companies must ensure that they have robust cybersecurity policies, procedures and tools in place to protect consumer data. The CCPA also requires companies to conduct regular risk assessments and to update their security measures as needed.

Overall, the CCPA represents a significant shift in the way that companies collect, store, and use personal information and at the same time provides Californian consumers with greater control over their data. On top of that the CCPA holds companies accountable for protecting that data from unauthorized access or theft. As such, the CCPA is likely to have a positive impact on cybersecurity by encouraging companies to take their data privacy and security obligations seriously.

CCPA and NordPass Business

Organizations can ensure the security of personal information through the security measures that the legal act encourages to implement in order to comply with CCPA. One of effective security measures is a password manager such as NordPass Business. Password management is a crucial aspect of data security, and NordPass Business provides organizations with an easy-to-use, yet robust solution that can help them implement security measures needed to comply with the CCPA.

Firstly, NordPass Business can help you ensure that passwords across the organization are unique and complex. With the option to generate strong and unique passwords for each account, organizations can rest assured that their users’ accounts are secure.

NordPass Business allows organizations to securely share passwords. Sharing passwords can be a security risk, but in some cases, it is necessary for business operations. NordPass Business provides a secure way for organizations to share passwords, ensuring that only authorized users can access personal information. This feature is especially important for organizations that have employees working remotely or have multiple team members who need access to certain accounts.

By using NordPass Business to store passwords, organizations can demonstrate that they are taking measures to protect their users’ personal information.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to reset your forgotten Zoom password

In today’s world, Zoom has become an essential tool for both personal and professional communication. Whether you’re conducting a virtual meeting with colleagues or catching up with friends and family, Zoom is the go-to platform. However, with so many passwords to remember, it’s not uncommon to forget your Zoom password. If you’re in this situation right now, don’t worry – resetting your forgotten Zoom password is a straightforward process.

In this article, we’ll guide you through the steps to reset your Zoom password, answer frequently asked questions, and provide tips to keep your passwords secure.

How do I change my Zoom password?

Before we dive into resetting a forgotten Zoom password, let’s look at how to change the password. Changing your Zoom password regularly is an essential security measure, especially if you use Zoom for confidential meetings. To change your password, simply follow these steps:

  1. Log in to your Zoom account on the web portal.

  2. Click “Profile” in the left-hand menu.

  3. Scroll down to “Password” and select “Edit.”

  4. Enter your current password, followed by a new password.

  5. Click “Save changes.”

You’re all set now.

How do I reset my Zoom Password?

Resetting your Zoom password is not that much different from changing it. Here are the steps to reset your forgotten Zoom password:

  1. Open your browser and go to zoom.us/forgot_password.

  2. Enter the email address associated with your Zoom account.

  3. Verify the reCAPTCHA.

  4. Click “Send” and wait for the reset password link to arrive in your email inbox.

  5. Check your email inbox for an email from Zoom with a link to reset your password. If you can’t find the email in your inbox, check your Spam folder.

  6. Click on the link in the email.

  7. Enter your new password.

  8. Enter it again for confirmation.

  9. Click “Save.”

  10. You have successfully reset your password and can now log in to the Zoom web portal.

Can I get into a Zoom meeting without a password?

It is possible to set up a Zoom meeting without a password, and it’s also possible to join a meeting without a password.

However, if you’re hosting a Zoom cloud meeting, it’s essential to set up a password to protect your meeting from unwanted guests. Without a password, anyone with the meeting ID can join your Zoom conference, which can lead to unwanted interruptions or something far worse — actual security breaches.

You can set up a Zoom meeting password by navigating to the Zoom website and logging into your account. From there, you can schedule a new meeting and enable the “Require meeting password” option. This will generate a unique password that you can share with your participants to ensure secure access to your meeting.

FAQ regarding a forgotten Zoom password

How to reset a password for a user in your account

If you are a Zoom account administrator and need to reset a password for a Zoom client user in your account, follow these steps:

  1. Log in to the Zoom website.

  2. Click on “User management” in the left-hand menu.

  3. Click on the user’s name.

  4. Scroll down to “Password,” and click “Edit.”

  5. Enter the new password.

  6. Click “Save changes.”

The user will receive an email with the new password.

I can’t reset my password on Zoom

If you are having trouble resetting your Zoom password, there are a few things you can try. First, make sure you are entering the correct email associated with your account. If you are still having trouble, try clearing your browser cache and cookies, and then try resetting your password again.

I didn’t receive a confirmation email

Sometimes, you may not receive the confirmation email from Zoom. This could happen for a variety of reasons, including issues with your email provider, spam filters, or incorrect email address. If you don’t receive the confirmation email within a few minutes, check your spam folder to see if it was mistakenly marked as spam. If it’s not in your spam folder, try requesting another email by clicking on the “Resend confirmation email” button on the Zoom website.

If you clicked on the reset password link in the email and it has expired, you will need to request a new one. Go to the Zoom website and click on the “Forgot password” button. Enter your email address, and then click on the “Send” button. Zoom will send you a new password reset link via email, and you can click on it to create a new password. Make sure to reset your password as soon as possible after receiving the link to avoid it expiring again.

Keep your Zoom password safe with NordPass

In today’s digital age, passwords are an integral part of our daily lives. From online shopping to social media and beyond, we rely on passwords to keep our personal information secure. However, with so many different accounts to manage, it can be challenging to remember every login detail. That’s where a password manager such as NordPass comes in handy. NordPass is a secure and user-friendly password manager that can help you store and manage all of your passwords safely in one place.

With NordPass, you don’t have to worry about forgetting your Zoom password ever again. NordPass securely stores passwords, credit card details, personal information and secure notes in a single place. What’s great about this is that you can easily access your Zoom or any other password from any device using the NordPass app. Everything you store in NordPass is secure thanks to advanced encryption technology.

On top of all that NordPass makes the online experience much more enjoyable. Thanks to autosave and autofill, you will no longer need to worry about coming up with passwords or manually typing them whenever you want to access one of your online accounts. Give NordPass a try and get peace of mind online.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Small business cybersecurity: the importance of proactive safety measures

Small businesses are on the front line of cybersecurity. At any moment, cyberattacks could extract confidential data, damage network infrastructure, or even cause total business failure.

The risks are real. According to Verizon, 60% of small businesses that suffer cyber attacks go out of business within 6 months. Healthcare company Wood Ranch Medical is a great example. The small operator was bankrupted by a 2019 ransomware attack that prevented access to sensitive patient records.

Despite cases like Wood Ranch Medical, most small businesses fail to allocate enough time and resources to counter cyber-threats.

Don’t fall into that trap. Instead, follow this guide to implement robust cybersecurity measures. With our help, you can counter the most dangerous cyber threats faced by SMBs. Let’s find out more.

Understanding the threat landscape for SMBs

The first thing to understand is that small businesses face a diverse range of cyber threats. Any one of them could ruin your reputation and lead to regulatory fines.

Attackers can lurk for months and monitor traffic. They can steal sensitive client data or lock it away until victims pay a ransom. Or they could cause technical damage, ruining network infrastructure.

SMBs can’t afford these consequences. But how do you handle critical cybersecurity threats?

Prevention starts from awareness of the most common threats and how they fit into cybersecurity for small businesses.

Types of cyber attacks

Here’s a list of the most common types of online threats.

All of them threaten small businesses.

1. Phishing

Phishers use social engineering techniques to fool small business employees. With a few pieces of information, attackers can easily convince time-poor workers to make dangerous decisions. This might involve emails pretending to come from colleagues or trusted third parties. The links in these emails lead to malicious sites or initiate malware downloads.

2. Ransomware

Ransomware locks down high-value data and demands a ransom from targets. If attackers control these targets, they can demand a high price to restore access. And small businesses are not always able to pay.

3. Spyware

Spyware tracks data flowing through network assets and sends this information to controllers outside the targeted organization. Some spyware is legitimate. For instance, advertisers sometimes use it to deliver targeted ads. But the majority of spyware is malicious and linked to data extraction.

4. Viruses

Viruses spread between devices and their effects range from relatively light disruption to complete system failure. Some viruses remain dormant for long periods. Others set to work immediately. In all cases, small businesses need updated and effective antivirus software to defend their perimeter.

5. Malware

Malware extends beyond ransomware and spyware. For example, businesses might encounter trojans or worms that stay below the radar until activated. Bots are also common. These agents latch onto devices and create “swarms” to launch wide-scale attacks.

6. Man-in-the-middle attacks

Man-in-the-middle attacks target insecure wifi connections. Attackers can intervene between remote access workers and the corporate network. If the connection is unencrypted, hackers can harvest information from corporate network traffic and steal confidential data.

7. SQL injection

SQL injection uses SQL code to request access to valuable databases. This generally occurs via web forms connected to SQL databases. For small businesses, this could include employee gateways or payment forms. Securing web assets is absolutely essential.

8. DDoS attacks

Distributed denial-of-service attacks involve botnets featuring hundreds or thousands of agents. Botnets direct massive amounts of traffic at their target with the aim of overwhelming networks. Larger organizations may have the resources to absorb DDoS floods. But with attacks averaging 5.17 Gbps, small business websites can easily fold under the pressure.

9. Zero-day exploits

Zero-day exploits target recently documented software vulnerabilities. In these situations, vendors probably haven’t developed patches, exposing users to opportunist attackers. Small businesses rely on anti-virus, communications, and data management tools in everyday work. But any of these tools can become vulnerable overnight.

10. DNS tunneling

DNS tunneling injects malicious code into networks via DNS queries. This allows hackers to seize control of local DNS servers. When that happens, a small business can lose control of its website and network assets. DNS tunneling exploits insecure firewalls, but SMBs often retain legacy firewall products. That’s a bad idea when successful attacks can ruin reputations in seconds.

11. XSS attacks

XSS (or Cross Site Scripting) injects malicious code via web applications and browser-side scripts. XSS attacks allow attackers to change website designs, adding undesirable content. They can launch malicious software, infecting business networks and customer devices. It allows hackers to spoof legitimate identities by hijacking cookies. All of that is bad news for SMBs.

Cybersecurity best practices for small businesses

Small businesses need cybersecurity strategies that deal with critical threats. But how can you implement an effective strategy with a small business budget?

SMBs lack the resources of corporations. But cybersecurity for small businesses must still protect sensitive data and network resources. Here are some best practices to follow that balance cost and efficiency.

1. Implement a strong password policy

Employees should only use strong passwords to log into your company network. Weak passwords are easy to guess or brute force. This makes mounting attacks much simpler.

Require employees to use 10-15 character passwords. Demand a mixture of upper and lower case letters, numbers, and symbols. Enterprise-wide password management tools can help. They make storing and changing passwords easier, eliminating much of the risk of human error.

Combining password hygiene with anti-virus software and firewall protection is also good practice. That way, you can filter potential threats and authenticate users effectively.

2. Schedule regular backups

Cyber-attacks can lead to the deletion of data or system failures that compromise important workflows. This makes it vital to back up high-priority data regularly. Use secure cloud services or external locations away from your core network.

3. Train employees in cybersecurity basics

Digital cybersecurity controls rely upon human knowledge and behavior. The way employees act when encountering cyber threats is a crucial part of a small business security setup. That’s why it’s vital to focus on what is known as the human firewall.

Strengthen the human firewall by training employees to spot phishing emails and malicious links. They must know the company password and access management policies. Remote workers should also understand how to connect securely, as well as the risks of using an insecure public wi-fi network.

4. Use threat prevention measures to reduce cyber attack risks

Minimize cyber security risks by adding antivirus software and malware scanning tools to your network traffic. Use VPNs to encrypt data and anonymize user IP addresses. Create allowlists to screen user identities, admitting only authorized addresses.

Take action to secure your local network as well. You may need to upgrade your wifi network from WEP to WPA2. Check that your router SSID is anonymized and consider upgrading your firewall to add features like Deep Packet Inspection.

5. Implement protection for sensitive information

Encrypt high-value data like personnel records and customer financial information. If you rely on SaaS or PaaS tools, use any cloud data protection tools provided by your Cloud Service Provider.

Use privileges management to limit freedom within network boundaries. Confidential data should only be available to users who need it in their working tasks. That way, when a data breach occurs, attackers will struggle to access and extract data.

Minimize the number of users with administrative privileges. Avoid giving single users the power to make fundamental network changes.

Consider using Data Loss Prevention tools as well. These tools track the location and state of important data. They block data transfers to unauthorized devices and log potentially dangerous access requests. If you handle high-risk, high-value data, DLP could be a sound investment.

6. Create an Incident Response Plan

Small businesses must prepare for cybersecurity incidents. Aim to restore normal working conditions as soon as possible while protecting data and neutralizing active threats.

Carry out a risk assessment for the threats detailed above. Include an assessment of where critical data resides. Assign an individual with the responsibility to protect important data. And connect every resource with risk-reduction strategies.

Create a recovery plan for all critical assets. This should include security scans to identify any malware or virus infections. Document access requests during the security alerts and determine whether data loss has occurred.

SMBs need to be ready to act as soon as possible when cybersecurity issues arise. Be proactive and make sure everyone is aware of incident response procedures.

7. Focus on secure remote access

Many small businesses allow employees to work from home. Sales representatives may also travel widely but require access to central resources. In both cases, remote access creates cybersecurity risks.

Require strong passwords and MFA for remote connections. Consider requiring employees to use an approved VPN service when working from home. Staff may store confidential information on smartphones, creating additional risk. Enforce strict data protection policies for mobile devices.

Make sure your cyber security tools cover both on-premises and cloud resources. Remote workers can bypass central network routers if they connect to SaaS apps. This can create security gaps and compromise visibility.

8. Manage third parties securely

Small businesses rely on third-party vendors, but partners can act as vectors for cyber attackers. For example, CRM providers may not encrypt data securely, putting client data at risk. Virus checkers or low-quality VPNs may transmit spyware.

Check all third parties and ensure they have rock-solid security policies. Trust nobody, and always ask for security assurances if you aren’t sure.

9. Enable 2FA or MFA

Small companies need to secure the network edge with robust authentication procedures. 2-factor authentication or multi-factor authentication are the best options here. These tools request multiple identification factors whenever users connect to network assets. This makes it far harder to obtain access illegitimately.

If MFA is too burdensome for employees, consider using it only for administrator accounts. Or try user-friendly 2FA procedures such as fingerprint scanning. Balance user experience and security. But always go beyond simple password protection.

Ensure your company’s sensitive information is protected

Data protection is the most important cybersecurity goal for small businesses. Data losses lead to huge reputational damage and regulatory penalties. It’s critically important to secure data and show evidence that confidential information is protected. Basic data protection measures include:

  • Encrypting important databases

  • Filtering access with privileges management

  • Strengthening malware and firewall protection.

  • Using Data Loss Prevention tools

  • Educating employees about data security policies.

Beyond those actions, it’s also a good idea to check your data security posture. The Cybersecurity & Infrastructure Security Agency (CISA) provides a free “cyber hygiene” check. This is a good starting point. It should help you find vulnerabilities and identify areas of improvement.

Penetration testing also mimics the activities of hackers, providing a good measure of your data security setup. Robust testing will dramatically reduce the risk of data breaches in the future.

Cybersecurity checklist for small businesses

Small businesses should have a comprehensive cybersecurity plan that guides their efforts.

Follow this checklist to make sure you include the right security measures:
  1. Data protection – Apply encryption, DLP, and privileges management. Prioritize high-value data.

  2. Threat reduction – Put in place virus and malware scanning, and firewall protection.

  3. Incident response – Ensure rapid restoration of critical assets with full security checks.

  4. Backups – Regularly back up important data. Use secure cloud or external storage solutions.

  5. 2FA or Multi-Factor Authentication – Apply robust authentication to ensure legitimate access.

  6. Education – Provide full security training for all employees with a focus on phishing risks.

  7. Remote access – Ensure safe, user-friendly remote access. Enforce strong mobile device security.

  8. Strong passwords – Use strong, regularly changed passwords. Install password management tools to automate procedures.

How can NordLayer help?

Nordlayer is the ideal partner to help small businesses secure their data. We offer a variety of solutions to strengthen network defenses and manage employee identities.

Device Posture Checks make working from home safer. Nordlayer’s systems assess every device connection. If devices fail to meet security rules, posture checks deny access. Users will instantly know about access requests from unknown or compromised devices.

IP allowlisting lets you exclude unauthorized addresses at the network edge. IAM solutions use multifactor authentication and Single Sign On to admit verified identities. Virtual Private Gateways anonymize and encrypt data, adding more remote access protection. And our Cloud VPN services lock down hard-to-secure cloud assets that small businesses rely on.

Nordlayer makes achieving compliance goals easier and provides a safer customer experience. To find out more, get in touch with our sales team today.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How CMHA protected sensitive client data in dynamic team environments

Canadian Mental Health Association (CMHA), Alberta South Region (CMHA, ASR), is a mental health non-profit, charitable organization in Canada. CMHA, ASR serves the Southwestern Alberta Region. As part of a nationwide mental health organization, it delivers a wide range of services that contribute to all people’s well-being. Dedicated teams support people in need through housing, crisis services, case management, peer support, Wellness Recovery, information and referral, service navigation, education, and advocacy. From a rapid response operation to providing information to an emergency helpline, CMHA, ASR is here to help people walk through the most challenging moments of their lives.

The CMHA Alberta South Region operates in an area of approximately 200,000 people. It is located next door to two large indigenous communities with over 16,000 people living on and off the reserve. The organization’s nature and a team of 50 specialists working on several projects mean a dynamic and fast-paced workplace. Managing employee attrition and onboarding, working between program sites or at the regional hospital emergency department, and protecting sensitive client data require watertight and responsive security measures to support the daily CMHA operations. Wesley Chenery, the IT Specialist at the CMHA Alberta South Region, reveals the technological backstage of handling these challenges. 

The challenge

One-man army to initiate and contain sensitive data controls

CMHA’s case is unique to the nature of the service model and its place in the health care system in Alberta. Although the organization does not fall under all the regulatory conditions within the public health care system, it is contractually mandated to follow compliance standards like HIPAA and other general data protection regulatory requirements. Yet, most of the security measures are applied by a proactive approach to avoid any potential negative outcomes of client data loss.

Our work culture requires a specific set of skills to be on board with what we do and offer to people. Unlike many more complex government organizations with layers of staff to support departmental needs, I am alone responsible for IT, statistics, and centrally administrating the CMHA’s client-data registry.

Click to tweet

CMHA uses a client management system called ‘Efforts and Outcomes (ETO),’ where all client data is stored. The organization must follow government standards to keep data solely in Canada — it cannot bounce between servers in different countries.

“The information has to be stored in the local data centers, and transfers must find a route that stays within Canada — other restrictions and policies regarding data are designed and implemented at our own discretion.”

Click to tweet

Contractual requirements and government regulations clearly outline data collection security standards. The organization is committed to maintaining high standards of compliance.

Another challenge CMHA faces is ongoing staff change. In a relatively short time, five employees tend to leave the organization, and another five join. A high rate of employee attrition and onboarding creates underlying security issues. Thus, access controls must be carefully managed to disconnect former employees and add new joiners in order to mitigate security risks.

So how does a company with limited resources can streamline its security policies and get ahead of security risks in one of the most cyber-targeted sectors?

The solution

A helping hand for defending data from cyberattacks

A service provider that provides an extensive range of services from hospital presentation aftercare to housing vulnerable individuals, from completing taxes to the monitoring of prescribed medication or guidance on reintegration into society – must represent and maintain trust. Strict internal policies and different tools help to achieve this goal.

Every computer and phone had to run security software that was controlled centrally by the network administrator. Every endpoint had its cookies and internet data wiped out every half-hour or when a browser was closed. Moreover, the browser was running an internet protection tool, and for a VPN, CMHA used an in-house server which was getting old and expensive to maintain. It is also worth mentioning that the internet in Canada is not that fast.

“There were many issues with in-house maintenance as hardware downgrades over time. You have to renew your licenses non-stop and buy accounts for new users — it’s just ridiculously expensive.”

Click to tweet

Besides, there was no option for backup with the on-site server — you lose power, and everyone loses connection. Upgrading the legacy infrastructure for better efficiency and getting more features demonstrated a need for a new solution that is well-developed and affordable.

The solution had to support the IT manager’s daily operations, not burden them. It also had to be simple and intuitive for fast user onboarding, turning money and time to value.

“We used a really old and non-automated system to connect people from the VPN. I’d have to log into the server manually, unplug employees, change over their IP addresses, and afterward get them all set up again. It was extremely time-consuming.”

Click to tweet

Employees are not allowed to connect to public networks. However, they must be mobile as the staff’s workplace might transform into hospitals or encampments. Thus, the tool must be running on their devices.

To eliminate as many risks as possible, CMHA performs cybersecurity awareness training for its employees. There’s a strict work-only device usage policy not to mix business and personal activities on provided laptops and cellphones. Company policies allow user activity monitoring to ensure top-level compliance and client data security.

Why choose NordLayer

NordLayer provides Control Panel with visibility on user activity and controls, with features like Always On VPN, KillSwitch, or ThreatBlock managed centrally. Automation and simple controls allow for saving IT manager’s time and monitoring network safety on a unified scale.

“The biggest feature that I’m really liking is the KillSwitch — it has saved us a couple of times.”

Click to tweet

Once somebody got into CMHA’s network and started changing their setting static IP address. The threat actor was overriding the computer and trying to re-direct our outgoing traffic. But when they hit Implement, all organization computers lost internet, stopping them from getting onto the company’s computers.

“The malware virus was designed to sit underneath our programs and slowly transfer data. I’m guessing it would have probably taken about a month to realize there was an attack before anything started acting funny.”

Click to tweet

Because of the feature, computers went down instead of connecting to the router, where the attacker left a malicious program to transfer all organization information to them. Instead, it hinted to the IT manager that someone was on the network — therefore, data was secured, and the router went into the garbage.

Malicious activity and software can stay undetected on the network for months until the damage is done irreversibly. Threat actors collect or lock away sensitive data for ransomware – one of the most destructive types of cyberattacks – exposing client personal information and making businesses face risks and losses.

The outcome

Effectively-used time to take care of organization security

Sensitive client data in the mental health sector, dynamic teamwork arrangements, and only one person to make it work technically and securely poses a major challenge to anyone.

Therefore, even support-oriented organizations need assistance to make their work easy and effective. A solution like NordLayer is focused on eliminating the complexity and inconvenience outdated hardware brings to security administrators.

“With NordLayer, I receive so few calls about network issues. Unless you are connecting to the right network, you won’t be able to use our systems — an immediate reminder to employees that they need to change the network instead of contacting me to troubleshoot via phone.”

Click to tweet

The right tools give more time, flexibility, and visibility to complicated and sometimes even destructive events in the organizational cybersecurity ecosystem. Besides security features, NordLayer enables to extract user activity data, useful for reporting and auditing, ensuring the security approach is compliant.

Pro cybersecurity tips

Despite the background and certificates in cybersecurity, real-life experiences bring the best insights into what methods and processes work best. Therefore, every story matters, it’s just important to hear it and apply it to your own case.

Wesley Chenery, IT Specialist of CMHA, Alberta South Region, shares the points of importance every security manager should consider and share with their organizations:

Using the right tools, you have better chances to be ahead of unfortunate events that threaten your organization’s network security. A proactive and safety-first mindset in evaluating risks and possible attack scenarios can become a vital element in business continuity. Make sure to upgrade to effective and efficient solutions — contact us to discover your options to improve the way the security of your company.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How User and Entity Behavior Analytics Helps Cybersecurity

User and Entity Behavior Analytics

Cyberattacks are increasingly sophisticated, making traditional digital security tools insufficient to protect organizations from malicious actors.

In 2015, Gartner defined a category of solutions called User and Entity Behavior Analytics (UEBA).
Its big advantage is monitoring suspicious behaviors of human users and devices in corporate networks through algorithms and machine learning, determining if there are threats and issuing alerts to security teams.

In this article, we explain more about this subject, which is extremely important for the security of your company. To facilitate your reading, we divided our text into the following topics:

  • What Is User and Entity Behavior Analytics?
  • How Does UEBA Work?
  • What Are Its Three Pillars?
  • What Are the Benefits of UEBA?
  • Disadvantages of User and Entity Behavior Analytics
  • Best Practices for User and Entity Behavior Analytics
  • What Is the Difference Between SIEM and UEBA?
  • UEBA X NTA
  • What Is UBA and What Is It For?
  • What Is the Difference Between UBA and UEBA?
  • senhasegura UEBA Solution
  • About senhasegura
  • Conclusion

Enjoy the read!

What Is User and Entity Behavior Analytics?

User and Entity Behavior Analytics (UEBA) is a digital security feature that uses algorithms and machine learning to identify abnormal behaviors in users, routers, servers, and endpoints of a network.

In practice, this technology allows alerting IT administrators about anomalies and automatically disconnecting users with unusual behavior from the network, as it monitors human and machine behavior.

With this, it helps detect people and equipment that could compromise an organization’s system, strengthening its digital security and sovereignty.

How Does UEBA Work?

To ensure the effectiveness of User and Entity Behavior Analytics, it is necessary to implement this feature in the organization’s infrastructure, which can be targeted by malicious attackers.

Moreover, many corporations ask their employees to install this solution on their home routers to avoid risks. This is because the professional may have to access the corporate network using their own router, generating security vulnerabilities.

It is very simple to understand how UEBA works. Let’s imagine an unauthorized user steals an employee’s credentials and accesses the network. This does not make them capable of imitating this employee’s usual behavior.

Therefore, UEBA issues alerts, which reveal suspicious behavior to IT administrators. A UEBA solution has three essential elements. They are analytics, integration, and presentation.

Analytics collects and organizes data about the behavior of human users and entities to determine what should be considered normal. Through this system, profiles are created of how each user behaves when accessing the network. Thus, one can develop models that allow the identification of suspicious behavior.

With the growth and evolution of corporations, it becomes necessary to integrate UEBA into other security systems. Through proper integration, UEBA solutions compare information collected from different sources, which optimizes the system.

Finally, the presentation involves how User and Entity Behavior Analytics responds to abnormal behaviors. It depends on what is defined by the company.

Some UEBA systems are configured to simply create an alert, suggesting an investigation for IT administrators. Others are configured to perform additional actions, such as disconnecting an employee with abnormal behavior.

What Are Its Three Pillars?

According to Gartner, a UEBA solution has three pillars:

  • Use cases;
  • Data sources; and
  • Analytical methods.

Use cases refer to the behavior of human or machine users reported by User and Entity Behavior Analytics, which monitors, identifies, and alerts about anomalies. Unlike systems that perform specialized analysis, UEBA technology needs to be relevant to different use cases.

When we talk about data sources, we refer to repositories of information that feed into UEBA, since User and Entity Behavior Analytics does not collect data directly from IT environments.

Analytical methods are what enable UEBA to identify abnormal behavior. They include threat signatures, statistical models, rules, and machine learning.

What Are the Benefits of UEBA?

Traditional security solutions have proven ineffective at protecting corporations from sophisticated cyberattacks, which has boosted the rise of User and Entity Behavior Analytics, as it allows one to identify even the smallest of unusual behaviors.
Its main benefits include:

Broad Approach to Cyberattacks

In addition to monitoring the behavior of human users, UEBA monitors devices such as endpoints, servers, and routers, which are often targeted by malicious attackers.

Thus, User and Entity Behavior Analytics detects a wide variety of cyberattacks, including insider threats, compromised accounts, brute force attacks, and DDoS.

Operational Efficiency

With the use of artificial intelligence and machine learning, UEBA solutions can replace the workforce of IT employees, which represents a benefit for corporations and security teams.

Nevertheless, User and Entity Behavior Analytics does not generate a drastic reduction in IT staff, especially in larger organizations, due to the complexity of security requirements, which require skilled people to configure systems and guide employees.

These professionals may also be responsible for investigating abnormal behaviors if the company decides to investigate them before taking measures.

In addition, IT analysts can develop other projects, working strategically for business growth.

Cost Reduction

With the reduction of the IT team, an organization consequently reduces costs. Also, by detecting abnormal behavior and preventing cyberattacks, companies prevent losses by stopping activities.
They also avoid having their customers’ and employees’ data exposed, which could result in fines due to data protection laws.

Risk Reduction

With professionals connected to corporate networks, including in a home environment, vulnerabilities caused by cyber threats increase gradually, making protection solutions in silos insufficient.

For IT teams, it is impossible to manually monitor all devices in use. Hence the perks of UEBA solutions.
It is worth mentioning that UEBA resources are not limited to ensuring information security. They also enable compliance with security standards for regulated industries, avoiding problems that could lead to lawsuits and fines for companies, as previously mentioned.

Disadvantages of User and Entity Behavior Analytics

The UEBA solutions also have some negative aspects. The first one is its high price, which can make this technology inaccessible to small and medium-sized businesses.

Another disadvantage of User and Entity Behavior Analytics is the slow deployment. Although many vendors claim this system can be deployed in a short time, Gartner customers say that in simple use cases, it can take three to six months, and in complex situations, it can take up to 18 months.

In addition, the view UEBA offers over network behaviors is restricted as its logs are enabled on a small part of a corporation’s network.

It is also important to keep in mind UEBA needs third-party logs to work. Failures in the generation of these logs impact its function.

Best Practices for User and Entity Behavior Analytics

User and Entity Behavior Analytics is designed to identify abnormal behaviors of humans and machines.
However, this solution should not be used in isolation but associated with other monitoring systems, in order to improve the digital security of an organization. Other best practices for companies using UEBA resources are:

  • Avoiding false alerts and overloading of generated data, taking advantage of big data resources, and using machine learning and statistical analysis;
  • Creating security policies taking into account insider and external threats;
    Ensuring that only information security professionals receive alerts from UEBA; and
  • Not underestimating the risks posed by unprivileged user accounts, as hackers can increase privileges to gain access to sensitive systems.

What Is the Difference Between SIEM and UEBA?

Like UEBA, Security Information and Event Management (SIEM) features tools that make it possible to improve information security through normal patterns and suspicious behaviors.

The notable difference is that User and Entity Behavior Analytics uses data from human and machine user behavior to define what is normal.

Because SIEM is rule-based, malicious actors can circumvent these guidelines to attack a corporation. Also, SIEM detects threats that happen in real-time, but it is inefficient to prevent sophisticated attacks performed over months or years.

UEBA, on the other hand, is not based on rules, but on risk-scoring techniques and algorithms, which make it possible to detect abnormal behavior over a much longer period.

UEBA X NTA

Like UEBA, Network Traffic Analysis (NTA) solutions are based on machine learning, advanced analytics, and security rules, and monitor user behavior on corporate networks. Moreover, it detects suspicious actions and threats.

However, this technology has other advantages. One is to allow companies to visualize everything that happens on their network, including in the context of a cyberattack. NTA also makes it possible to create network profiles and devices, with easy deployment.

We emphasize these two solutions should be used in a complementary way, since NTA alone does not track local events, nor detect advanced security problems.

What Is UBA and What Is It For?

User Behavior Analytics (UBA) is a technology that allows one to identify unusual or abnormal behaviors, detect intrusions, and minimize their consequences.

Through UBA solutions, one can discover an invasion promoted by cybercriminals or find out if an employee is misusing the data to which they have access.

The focus of User Behavior Analytics is on user analytics, their accounts, and identity, not machine behavior.

What Is the Difference Between UBA and UEBA?

The difference between UBA and UEBA is that, in the first case, we refer to a solution that monitors human users to detect any anomalies in their behavior.

The extra “e” in UEBA extends monitoring to machine entities such as routers, servers, endpoints, and devices in general.

The acronym was updated in 2017 by Gartner to show that in addition to tracking human users, it is essential to identify threats related to devices and applications.

senhasegura UEBA Solution

senhasegura has a UEBA solution embedded in its PAM security platform, which allows one to monitor the behavior of human and machine users automatically.

This technology features a self-learning mechanism to identify and respond to changes in users’ behavior patterns and access profiles.

Some of the main characteristics are:

  • Analysis of user session based on behavioral history;
  • Identification of accesses and check of suspects by a series of criteria;
  • Identification of unusual behavior with abnormality alerts for SIEM/SYSLOG;
  • Detailed dashboards with a visual representation of incidents and threats, which allow a security team to act quickly;
  • Algorithms are continuously adjusted to user behavior.

 

Its benefits include:

  • Restriction of privilege abuse;
  • Fast detection of attacks and compromised accounts;
  • Control over the user’s administrative actions;
  • Automatic response to suspected credential theft.

About senhasegura

We, from senhasegura, are part of the group of information security companies MT4 Tecnologia, founded in 2001, and we aim to provide digital sovereignty to our customers through the control of privileged actions and data.

With this, we prevent data leaks and theft, as we manage privileged permissions before, during, and after access through machine automation. We work to:

Optimizing the performance of companies, avoiding interruption of operations;
Performing automatic audits on the use of permissions;
Auditing privileged changes to detect abuse of privilege automatically;
Providing advanced solutions with the PAM Security Platform;
Reducing cyber threats; and
Bringing the organizations that hire us into compliance with audit requirements and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

Conclusion

In this article, you saw that:

  • User and Entity Behavior Analytics uses algorithms and machine learning to identify abnormal behaviors in users, whether they are humans or machine entities;
  • This solution allows alerting IT administrators about anomalies and automatically disconnecting users with unusual network behavior;
  • To ensure the effectiveness of User and Entity Behavior Analytics, it is necessary to install this feature on the organization’s and employees’ devices;
  • A UEBA solution has three essential elements. They are analytics, integration, and presentation;
  • According to Gartner, a UEBA solution also has three pillars: the use cases, the data sources, and the analytical methods;
  • The benefits of UEBA include: a broad approach to cyberattacks, reduction of human labor, cost reduction, and risk reduction;
  • Among its negative aspects, the high price and slow deployment stand out;
  • The creation of security policies that take into account insider and external threats is among the best practices in the use of UEBA solutions;
  • It is also recommended to consider the risks presented by users without privileges;
    SIEM differs from UEBA because it is rule-based and detects only threats that occur in real-time.
    NTA allows organizations to view all the activities that occur on their network, including in the context of a cyberattack, and enables the creation of network profiles and devices, with easy deployment;
  • The difference between UBA and UEBA is that the first provides for the monitoring of human users and, in the second case, it is extended to machines.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×