Skip to content

Portnox Aids Credit Unions in Meeting New NCUA ACET Compliance Standards for Cybersecurity

As the NCUA’s cybersecurity standards tighten, Portnox’s network access control solutions are enabling credit unions to remain compliant & operational

NEW YORK, NY – March 3, 2021 – Portnox, a leading provider of network access control (NAC) and network security solutions, today announced that it has begun working with a number of U.S.-based credit unions to enhance their cybersecurity programs and meet stricter controls standards laid out within the National Credit Union Administration’s (NCUA) new Automated Cybersecurity Examination Tool (ACET) framework.

According to the NCUA, the ACET mirrors the FFIEC’s Cybersecurity Assessment Tool developed for voluntary use by banks and credit unions. Just like the FFIEC’s Tool, the ACET consists of two parts: The Inherent Risk Profile and the Cybersecurity Maturity level. The Control Maturity portion measures a credit union’s level of cybersecurity controls. The levels range from “baseline” to “innovative,” with the 123 baseline statements representing the minimum regulatory expectations.

“In light of recent network hacks, and as the NCUA audits continue to expand, many credit unions struggle with finding an effective solution to meet Domain 3 controls within the ACET framework,” said Ofer Amitai, CEO at Portnox. “Fortunately, Portnox can provide the network access control, endpoint awareness, risk and real-time remediation capabilities that either directly meet or highly contribute to many of the most difficult ACET Domain 3 audit areas and requirements.”

Portnox CLEAR, the first and only cloud-delivered network access control solution on the market, is a natural fit for credit unions. With no on-site networking hardware required to operate, no patching or on-going maintenance, and low overall total cost of ownership, Portnox CLEAR caters to financial institutions with minimal in-house IT resources needing to meet regulatory and compliance standards.

“We spent years looking for a NAC solution for our clients that was affordable, and more importantly, something that wasn’t extremely difficult to install. We found that with Portnox CLEAR, and now our clients are benefiting from enhanced security and compliance by using CLEAR,” said Lee Bird, President at Btech, a managed security services provider and Portnox partner based in Pasadena, California that specializes in cybersecurity for credit unions.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

How will FinTech help shape the Covidian world?

To say that the events of 2020 shifted business priorities would be a huge understatement. Organizations across the world had to entirely change their way of working, some adapting to an unprecedented situation at a moment’s notice. Digitalization has been accelerated, commerce has moved online, and millions of employees have had to leave the office and work from home. But what does all this mean for 2021 and, beyond that, the post-Covid world?

Technology has clearly played a significant role in allowing organizations to adapt to Covid-19 regulations. Many businesses have been more reliant on technology than ever before; processing transactions exclusively online, engaging with employees remotely, and communicating with clients virtually. Unsurprisingly, this has cast a spotlight on financial technology – or FinTech – as organizations manage their finances from home. Unfortunately, all of these changes bring greater cybersecurity risks than ever before – with 81% of business leaders agreeing that Covid-19 has increased the need for improved security of finances.

This need – although intensified by lockdowns across the globe – will continue even as the world aims to recover from the economic impacts of Covid-19 measures. For many businesses, FinTech can help to bolster profitability as they navigate the undoubtedly perilous journey to a post-Covid world. While it is difficult to predict what the world will look like in the future, there are some signs of what may be to come.

Working from home, for hundreds of organizations, is here to stay – either as the sole mode of work or as part of a hybrid model – so we will continue to see increased use of technology. Digitalization is unlikely to backslide in any major way, with business leaders continuing to drive progress through new innovations.

In this emerging situation, organizations are looking more to FinTech solutions to manage, streamline, and consolidate their finances. ESET’s global FinTech survey found that 68% of business leaders expect their company’s investment to increase by some extent – and over a quarter (27%) expect this investment to increase greatly. This will likely increase use of FinTech solutions that are already popular, such as online payment processors and online accounting, alongside an uptake in solutions that are less widely adopted. With Covid-19 potentially leaving a legacy of ongoing restrictions, online cross-border payments may become far more popular, as well as branchless banks and online cashflow management. Adopting some of these solutions will allow organizations to manage their finances remotely, rather than being tethered to a set location.

Unfortunately, as businesses’ priorities shift, so too will the threats they face. CISOs have also chimed in; following the first Covid-19 lockdowns more business processes moved online, especially financial processes, and with them came a wider range of ways for threat actors to attack an organization. It may be easier to adopt FinTech applications rather than managing finances in person, but keeping these systems secure brings new challenges.

One of these challenges is data security, as 10% of managers surveyed think that FinTech solutions such as branchless banks and online lending make company data less secure. This may be a particular risk moving forward, as business leaders adapt quickly and implement new financial processes that they may not fully understand. FinTech applications should be designed with security in mind, but if decision makers do not appreciate the value of security, they may be putting their organizations at risk.

Whether or not they increase the use of FinTech, businesses will need to prioritize cybersecurity in order to safeguard post-Covid recovery. Many look set to embrace innovation with a range of FinTech solutions, from branchless banks to online cashflow management, as part of their roadmap for the future. With the right FinTech tools, properly secured against hacks, organizations will be better positioned to adapt and transform for an uncertain future.

We’ll reveal additional findings from ESET’s FinTech study throughout early 2021. For more information on ESET, and how security software can help to protect you and your business, visit www.eset.com.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Sex in the digital era – ESET reveals new research into security of smart sex toys

BRATISLAVA – Vulnerabilities in smart sex toys could leave users at risk of data breaches and attacks, both cyber and physical, according to a new white paper from global cybersecurity experts at ESET. The Sex in the Digital Era – How secure are smart sex toys? report explores the potential security and safety flaws of connected sex toys and includes an in-depth analysis of two popular devices. Amidst ongoing social restrictions due to the pandemic, sales of sex toys has risen rapidly, and associated cybersecurity concerns mustn’t be overlooked. As newer, technologically advanced models of sex toys enter the marketplace, incorporating mobile apps, messaging, video chat, and web-based interconnectivity, devices become more appealing and exploitable to cybercriminals. The consequences of data breaches in this sphere can be particularly disastrous when the information leaked concerns sexual orientation, sexual behaviors, and intimate photos. ESET researchers found vulnerabilities in the apps controlling both of the smart sex toys investigated. These vulnerabilities could allow for malware to be installed on the connected phone, firmware to be changed in the toys, or even a device being deliberately modified to cause physical harm to the user. To address these dangers and investigate how secure smart toys are, ESET researchers analyzed two of the best-selling adult toys on the market: the We-Vibe ‘Jive’ and Lovense ‘Max’. Analysts downloaded the vendor apps available on the Google Play Store for controlling the devices (We-Connect and Lovense Remote) and used vulnerability analysis frameworks as well as direct analysis techniques to identify flaws in their implementations. We-Vibe As a wearable device, the We-Vibe Jive is prone to usage in insecure environments. The device was found to continually announce its presence in order to facilitate a connection – meaning that anyone with a Bluetooth scanner could find the device in their vicinity, up to eight meters away. Potential attackers could then identify the device and use signal strength to guide them to the wearer. The manufacturer’s official app would not be required to gain control, as most browsers offer features to facilitate this. The Jive utilizes the least secure of the BLE pairing methods, whereby the temporary key code used by the devices during pairing is set to zero, and as such, any device can connect using zero as the key. The Vibe is highly vulnerable to man-in-the-middle (MitM) attacks, as an unpaired Jive could bond automatically with any mobile phone, tablet, or computer that requests it to do so, without carrying out verification or authentication. Although multimedia files shared between users during chat sessions are saved in the app’s private storage folders, the files’ metadata remains on the shared file. This means that every time users send a photo to a remote phone, they may also be sending information about their devices and their exact geolocation. Lovense Max has the ability to synchronize with a remote counterpart, which means an attacker could take control of both devices by compromising just one of them. However, multimedia files do not include metadata when received from the remote device, and the app offers the option to configure a four-digit unlock code via a grid of buttons, making brute-force attacks more difficult. Some elements of the app’s design may threaten user privacy, such as the option to forward images to third parties without the knowledge of the owner and deleted or blocked users continue to have access to the chat history and all previously shared multimedia files. Lovense Max does not use authentication for BLE connections either, so a MitM attack can be used to intercept the connection and send commands to control the device’s motors. Additionally, the app’s use of email addresses in user IDs presents some privacy concerns, with addresses shared in plain text among all the phones involved in each chat. ESET researchers Denise Giusto and Cecilia Pastorino warn: “There are precautions that need to be taken to ensure that smart sex toys are designed with cybersecurity in mind, especially due to the severity of potential dangers. Although security seems not to be a priority for most adult devices at the moment, there are steps individuals can take to protect themselves, such as avoiding using devices in public places or areas with people passing through, such as hotels. Users should keep any smart toy connected to its mobile app while in use, as this will prevent the toy from advertising its presence to potential threat actors. As the sex toy market advances, manufacturers must keep cybersecurity top of mind, as everyone has a right to use safe and secure technology.” Both developers were sent a detailed report of the vulnerabilities and suggestions of how to fix them, and, at the time of publication, all vulnerabilities have been addressed. To read more about ESET’s full analysis of the security of these smart sex toys, Sex in the Digital Era can be read here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Scale Computing HE150 Named to SearchStorage’s 2020 Storage Products of the Year, Best Enterprise Storage Systems and Products of 2020

INDIANAPOLIS – February 24, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced its HE150 won silver in TechTarget’s Storage Magazine and SearchStorage.com’s annual Products of the Year Awards for 2020 in the Hyperconverged & Composable Infrastructures category. Scale Computing’s HE150 appliance is the industry’s smallest and most powerful edge computing appliance, and is part of the “best enterprise storage systems and products.”

In its announcement, SearchStorage noted that: “Scale Computing’s HE150 appliance earned silver for being, among other things, one of the first fully functional hyperconverged systems to use Intel’s small form factor, four-by-four inch Next Unit of Computing (NUC) mini-computer. About the size of an Apple TV set-top box, the HE150 doesn’t skimp on features even at such an edge-friendly size. Additional features include remote and fleet management capabilities, as well as machine learning to detect infrastructure issues.”

“We’re thrilled to be recognized in the Hyperconverged & Composable Infrastructures category. It’s a testament not only to the functionality HE150 brings to market, but to the innovation focus of our team,” said Jeff Ready, CEO and co-founder of Scale Computing. “The Scale Computing HE150 appliance consolidates storage, compute, and virtualization into a single unit that can literally be held in the palm of your hand. By eliminating the need for multiple dedicated servers, customers can eliminate complexity from their infrastructure, mitigate issues faster and more efficiently, and reduce their cost structure.”

The HE150 appliance combines Scale Computing’s self-healing platform for autonomously running applications at the edge with a small, all-flash NVMe storage-based compute appliance that delivers all of the simplicity, efficiency, and enterprise-ready virtualization associated with Scale Computing’s HC3 platform.

This win comes on the heels of other recent industry recognition, including:

  • Gartner Magic Quadrant for Hyperconverged Infrastructure (December 2020), which recognized Scale Computing for the fourth consecutive year.
  • TrustRadius Customer Satisfaction Awards, which awarded Scale Computing first place for 2021 Best Feature Set, Best Usability, and Best Customer Support.
  • GigaOm Radar Report for Hyperconverged Infrastructure: Small-to-Medium Enterprises and Edge that named Scale Computing a “Leader” and “Outperformer.”
  • 2020 CRN® Product of the Year, which selected Scale Computing HE150 as the Internet of Things category winner.
  • CRN’s 2020 Tech Innovator Award that awarded HE150 first place for Edge Infrastructure.
  • Cloud Computing Outlook, which recognized Scale Computing as a Top Edge Computing Solution Provider.

The 2020 Storage Products of the Year awards were judged by the Storage magazine and SearchStorage editorial staff, in conjunction with industry experts, analysts, and consultants. Judges selected the winners according to the following criteria: innovation, performance, ease of integration into existing environments, ease of use and manageability, functionality, and value. This is the 19th annual Storage magazine and SearchStorage Products of the Year awards. Winners were announced in the February 2021 issue of Storage magazine and online at SearchStorage.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

X-FORT FAC 資料夾防護,協助防止勒索

近年來大家印象比較深刻的資安事件應該是中油兩度遭到勒索病毒攻擊導致營運受到影響,除了中油之外其他尚有多家上市櫃公司都有被勒索病毒攻擊的資安事件,這些是有被媒體報導出來的,實際上被攻擊的企業數量上會比媒體報導的還要多很多倍,防範勒索病毒第一個想到的或許是防毒軟體,但是在勒索病毒變種速度越來越快的情況之下,如何保護企業內部文件不被勒索是一門重要的課題,對此X-FORT的FAC(Folder Access Control)資料夾防護可以提供一個『文件保護策略』協助防止被勒索。

限定可存取資料夾的 AP

FAC(Folder Access Control)資料夾防護採用的是將電腦特定名稱資料夾設定為保護資料夾,由系統管理員制定哪些應用程式可存取此資料夾,除了這些被制定可允許『存取』FAC資料夾內的應用程式之外,其他程式是無權對此FAC資料夾進行『讀、寫』的,例如:如果沒有設定檔案總管(Explorer.exe)可存取FAC資料夾,使用者直接雙擊該資料夾是無法進入FAC資料夾的,因此當電腦被勒索病毒攻擊,勒索病毒是無法對此資料夾裡面的檔案加密的。

搭配備份更有效

X-FORT的解決方案是<FAC+備份>

誠如前面所述勒索病毒一直在變種當中,FAC(Folder Access Control)資料夾防護搭配定期『自動備份』會是有效防範勒索病毒的方法,把使用者電腦裡面指定的檔案定期備份到FAC資料夾裡,第一次備份會是完整備份,第二次後就會進行差異備份,有異動的檔案才會備份。

例如:每日兩次差異備份,中午12點一次,下午4點一次,萬一兩個備份中間時間發生勒索病毒攻擊,資訊人員可協助把FAC料夾裡面的檔案利用X-FORT的外接式儲存裝置控管功能搭配X-Wizard寫到外接碟,或者把硬碟串到第二台電腦把檔案救出。

如何判斷備份時不會備份到被病毒加密的檔案

X-FORT的備份方式採用指定副檔名的方式進行備份,如果設定*.docx、*.xlsx、*.PDF,只會備份上述的三種副檔名檔案,不會備份到被加密的檔案。

X-FORT FAC(Folder Access Control)資料夾防護雖然無法完全阻擋勒索病毒攻擊,但是透過備份機制與資料夾的保護,卻可以大大降低勒索病毒造成的損失。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×