Skip to content

CloudCasa 獲 ComputerWeekly 認可為關鍵的 Kubernetes 災難還原解決方案

親愛的 CloudCasa 用戶,

我們非常高興與您分享一個好消息!CloudCasa 獲知名科技媒體 ComputerWeekly 認可為 Kubernetes 災難還原的關鍵解決方案。

在最近一篇名為 「Kubernetes 災難還原:五個關鍵問題」 的文章中,ComputerWeekly 將 CloudCasa 列入推薦的專業工具之一,用於 Kubernetes 的備份和還原。這篇文章探討了 Kubernetes 環境中災難還原的關鍵要素,並強調使用「Kubernetes-aware」工具來確保有效保護的重要性。

作為 CloudCasa 的用戶,您已經在保護 Kubernetes 環境方面走在前面。 這次來自 ComputerWeekly 的認可進一步強調了我們解決方案在滿足 Kubernetes 備份和災難還原複雜需求上的價值和有效性。

我們為能夠引領 Kubernetes 保護的潮流而感到驕傲,並堅持提供一流的服務,確保您關鍵的容器工作負載安全無虞。

關於 Catalogic 的 CloudCasa
Catalogic 的 CloudCasa 是雲端原生備份、還原和遷移解決方案的領先供應商,專為保護 Kubernetes、雲端數據庫及雲端原生應用而設。CloudCasa 提供強大且易於使用的數據保護,確保業務持續性和合規性。

關於 Version 2 Digital
Version 2 Digital 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 Digital 提供廣被市場讚賞的產品及服務。Version 2 Digital 的銷售網絡包括中國大陸、香港、澳門、台灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

CloudCasa 獲 ComputerWeekly 認可為關鍵的 Kubernetes 災難還原解決方案

親愛的 CloudCasa 用戶,

我們非常高興與您分享一個好消息!CloudCasa 獲知名科技媒體 ComputerWeekly 認可為 Kubernetes 災難還原的關鍵解決方案。

在最近一篇名為 「Kubernetes 災難還原:五個關鍵問題」 的文章中,ComputerWeekly 將 CloudCasa 列入推薦的專業工具之一,用於 Kubernetes 的備份和還原。這篇文章探討了 Kubernetes 環境中災難還原的關鍵要素,並強調使用「Kubernetes-aware」工具來確保有效保護的重要性。

作為 CloudCasa 的用戶,您已經在保護 Kubernetes 環境方面走在前面。 這次來自 ComputerWeekly 的認可進一步強調了我們解決方案在滿足 Kubernetes 備份和災難還原複雜需求上的價值和有效性。

我們為能夠引領 Kubernetes 保護的潮流而感到驕傲,並堅持提供一流的服務,確保您關鍵的容器工作負載安全無虞。

關於 Catalogic 的 CloudCasa
Catalogic 的 CloudCasa 是雲端原生備份、還原和遷移解決方案的領先供應商,專為保護 Kubernetes、雲端數據庫及雲端原生應用而設。CloudCasa 提供強大且易於使用的數據保護,確保業務持續性和合規性。

關於 Version 2 Digital
Version 2 Digital 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 Digital 提供廣被市場讚賞的產品及服務。Version 2 Digital 的銷售網絡包括中國大陸、香港、澳門、台灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

How to find D-Link routers on your network

D-Link released a Security Announcement regarding vulnerabilities found within two of their DIR-X WiFi 6 routers (DIR-X5460 – AX5400, DIR-X4860 – EXO AX AX4800) and one of their non-US Mesh routers (COVRX1870 – AX1800).

  • CVE-2024-45694 is rated critical, with CVSS score of 9.8, and allows for an unauthenticated attacker to potentially execute arbitrary code.

  • CVE-2024-45695 is rated critical, with CVSS score of 9.8, and allows for an unauthenticated attacker to potentially execute arbitrary code.

  • CVE-2024-45696 is rated high, with CVSS score of 8.8, and allows for unauthorized access by an attacker.

  • CVE-2024-45697 is rated high, with CVSS score of 9.8, and allows for unauthorized access to the system by an attacker and the ability to execute arbitrary commands.

  • CVE-2024-45698 is rated high, with CVSS score of 8.8, and allows for unauthorized access to the operating system by an attacker and the ability to execute arbitrary commands.

What is the impact?

Successful exploitation of the critical vulnerabilities through a stack overflow allows attackers to perform remote code execution (RCE) by sending malicious requests to vulnerable devices. The high severity vulnerabilities affect the target device’s telnet service. CVE-2024-45696 allows for an attacker to forcibly enable telnet on the device, but must be on the same network as the device to log in through the telnet service. CVE-2024-45696, CVE-2024-45697, and CVE-2024-45698 allow for an attacker to log in to the telnet service using hard-coded credentials, if the service is enabled.

Are updates or workarounds available?

D-Link has issued patches for each of the affected devices available for download in the Affected Models section of the announcement.

How to find potentially vulnerable systems with runZero

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

mac_vendor:"D-Link"

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

The Importance of Upgrading Your Networking Hardware

The Importance of Upgrading

When thinking about keeping your network safe, upgrading networking hardware is often overlooked. It’s hard enough to get everything to play nicely together, and once it does, the last thing you want to do is disrupt that delicate balance. Plus, there’s a lot of planning, a lot of meetings, and probably a lot of money to spend. No wonder just the thought of upgrading infrastructure makes most admins want to run and hide.

Not upgrading, though, can put you at risk in a variety of ways.

EOL?  EOE?  EOS? SOL!

Nothing gold can stay, and that is as true for networking hardware as much as anything else.  As vendors develop new and exciting feature sets, old hardware gets strained more and more until, finally, it just can’t keep up.  You might not necessarily be interested in those new features – as long as the packets are flowing, who needs the latest and greatest?  And that makes sense – there’s a lot to be said for not being an early adopter.  As cool as cutting-edge innovation often sounds, it sometimes fails to deliver on its promises  (Look at the ill-fated Lily Drone, the Juicero Juicer, and the Cisco Umi – all products that showed great promise, but fell far short of expectations.)

We all understand how important it is to at least keep up with security updates, but products don’t get updates forever.  Watch out for these 3 phases of the product life cycle signify it’s time to get ready for replacements:

EOE: End of Engineering

No new features or fixes will be developed during this phase, although critical security fixes might still be released, and you can still get support….although the answer to most of your support questions will probably be “Upgrade.”

EOS: End of Support

There is no support and probably no security fixes (although if a critical vulnerability is uncovered, you might get a patch). For all intents and purposes, the product is dead. You might be able to get support assistance to upgrade, or they might help you if you run into an already-known bug.

EOL: End of Life

Stick a fork in it; it’s done – no support, no patches, no nothing.  For all intents and purposes, this product no longer exists.

Still Lurking Out There

Why does it matter if something still has vendor support?  Well, just because the vendor has seemingly forgotten about these devices does not mean hackers have.  Here’s an example:  In 2021, six years after Western Digital ended support for their My Drive line of external hard drives, a remote code execution bug resulted in many users losing all of their data.  The worst part is the vulnerability was reported to Western Digitial in 2018, a full three years before the bug was exploited, but since support for the drives had already ended Western Digital chose not to fix it.  

Sometimes those new features become default standards.  Devices in the late 90’s that shipped with 802.1a or 802.1b wireless networks were quickly rendered obsolete when a critical design flaw was found in  WEP.  Anyone not wanting a laughably easy to hack wireless password had to get completely new hardware.  Now all networking hardware ships with some form of WPA enabled.  

If you’re still not convinced, consider this: you could run afoul of the law if you use out-of-date hardware.  Many regulatory standards like GDPR, HIPAA, PCI DSS and more require organizations to take reasonable steps to protect sensitive information.  If you are the victim of a data breach, you will have a hard time justifying the use of old hardware.  It could also impact your certifications – if you maintain SOC 2 or ISO 27001, EOL hardware might put you out of compliance.   

Upgrading networking may not be the most exciting prospect, but as technology evolves and grows, it’s crucial to ensure you’re not falling behind. Proactive upgrades not only enhance your ability to stay secure, but they also keep you safe from regulatory and legal penalties in the case of a data breach.  Investing in the future by keeping your network infrastructure current will ensure you can support your organization’s goals for security, growth, and innovation going forward.  

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Threat Undetected: 5 Ways Cybercriminals Gain Unauthorized Access to Your Clients Network

Your MSP clients’ cybersecurity posture is only as strong as your weakest link. The question is, do you know where your weakest link is?

Is it an unsecured endpoint that a third-party vendor has access to?

How about those unfamiliar SaaS apps your remote team is using without IT approval? 

Or maybe it’s that unpatched software quietly running on a server you haven’t checked in months?

A single high-risk vulnerability can give an attacker everything they need to infiltrate your network. What you have on your hands is a potential breach in the making. In this blog, we’ll break down 5 common ways cybercriminals gain unauthorized access to your network and how you can prevent them. Ready? Let’s go.

5 Common Ways Cybercriminals Gain Unauthorized Access to Your Network

  1. Phishing attacks: Do your employees know how to properly spot a fake email? Not according to data taken from Fortra’s 2023 Gone Phishing Tournament. The study revealed that 33.2% of untrained end users will fail a phishing test. Things get even uglier for remote workers. Research found that 47% of employees cited distraction as the reason for falling for a phishing scam while working from home. Phishing attacks are becoming tougher to detect every day. Without advanced email security and training, your employees could accidentally open a malicious URL or give away sensitive PII data by replying to the scammer’s email. Not ideal.

How to prevent it: Conduct routine phishing simulations and invest in employee training. Ensure that all employees are well-trained in spotting suspicious-looking emails, URLs, and file attachments. Encourage them to raise a red flag if they suspect something “phishy” because it can help spare your organization from a costly phishing attack.

Have I Been Pwned is a great resource that lets you check if your email has been compromised for free.

  1. Compromised passwords: Are your employees still writing down their passwords on sticky notes? Do they use weak passwords such as “123456” or their birthdays which can be cracked with a brute force attack in a matter of seconds?

There’s also a very good chance your employees might be reusing the same password to access multiple accounts, both for work and personal use. Kaspersky analyzed over 32 million emails and found that only 23% of passwords are strong enough to resist hackers. Compromised passwords can lead to unauthorized access to sensitive systems and applications. Attackers can also leverage reused passwords to escalate privileges and move laterally within your network, causing further damage.

How to prevent it: Implement multi-factor authentication (MFA) and enforce strong password policies across the organization. Go over security protocols and ensure that all employees understand best practices, such as increasing the level of difficulty of their passwords and using a mix of both letters and numbers that exceed 16 characters. Require password changes every 60-90 days. And if you see any sticky notes or pieces of paper with passwords on someone’s desk, shred them!

  1. Excessive permissions: When was the last time you checked user permissions? A month ago? 3 months? Longer? Excessive permissions pose a serious security risk. Privilege creep refers to the gradual accumulation of network access levels beyond what an individual needs to perform their job.

For instance, it wouldn’t make much sense for someone in HR to have access to cloud databases or be set up as an AWS cloud user. Employees and third parties who are no longer with the company must have their permission sets revoked immediately. Don’t let those stale accounts linger. Excessive permissions can lead to account hijacking and unauthorized network access. You know what usually comes next, right? A headline-worthy data breach. No one needs that.

How to prevent it: Conduct a regular access permission inventory across all of your accounts to minimize the threat surface. Revoke access for inactive accounts the second an employee leaves the company or when your contract ends with a third-party vendor or supplier. If an employee changes roles, they should be granted temporary access and permissions during the transition period to ensure that they have access only to what is needed and nothing more.

  1. Unsecured endpoints: Data taken from Verizon showed that 90% of successful cyberattacks and as many as 70% of successful data breaches originate at endpoint devices. The question your IT team needs to answer is which devices are connected to the company network from a personal laptop or iPhone?

A single compromised endpoint can serve as a point of entry and give an attacker carte blanche to wreak havoc over your network. But this is where the real security concern begins. Do you know which devices are being managed and which are flying under the radar waiting to be compromised? Something as small as a USB drive that is either lost or stolen can cause a massive breach.

How to prevent it: Perform device posture checks to verify that all devices accessing the network meet security policies. This is especially important for enforcing BYOD policies for remote workers accessing the company network from personal devices. You should also conduct a thorough cyber risk assessment to identify potential vulnerabilities related to endpoint devices and ensure that security measures are in place to address them.

  1. Shadow IT: Did you authorize that new cloud app, or better yet, do you even know about it? Shadow IT presents a real security threat for organizations. Without visibility into these unapproved apps, sensitive information might get leaked, resulting in data loss and other security risks.

A study by Capterra found that 57% of SMBs have had high-impact shadow IT efforts occur outside the purview of their official IT department. Let’s face it, IT professionals certainly have their work cut out for them, but if they don’t have a clear understanding of all the tools and applications in use, their ability to enforce security policies and protect sensitive data is severely compromised. The introduction of more unknown apps to the network translates into more security gaps that could be exploited by malicious actors.

How to prevent it: Implement DLP tools to monitor, detect, and block the unauthorized transfer of sensitive data through unsanctioned apps. This will help ensure that even if shadow IT applications are being used, the risk of data leakage is greatly minimized.

Prevent Unauthorized Network Access with Guardz Cloud Data Protection

Keep malicious actors and critical assets out of your network with Guardz Cloud Data Protection. Guardz helps prevent data exposure by scanning cloud accounts for excessive permissions, inactive users, risky cloud misconfigurations, and any suspicious user behavior through advanced machine learning capabilities.

Guardz helps prevent data exfiltration and alerts your IT team once an incident has been identified so you can apply the necessary security policies immediately. Streamline cloud data protection and permission visibility with Guardz.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×