Skip to content

23.12.2 ‘Voyager’ released

Changes compared to 23.12.1

Notice: The deb and rpm installers for Comet Server now require glibc 2.25 or later. There are no changes to the system requirements for the tar package version of Comet Server.

Enhancements

  • Changed “Job History” on the Comet Server web interface and Comet Backup desktop app to “Job Logs”. The Job Logs page contains logs for both running and finished jobs

Bug Fixes

  • Fixed an issue with symlinks failing to restore correctly from Disk Image backups, causing the restore job to fail
  • Fixed an issue with relative symlinks being restored as links into the Comet Backup desktop app’s installation directory
  • Fixed an issue with VMware backup attempting to back up PSF files. PSF files for vSphere Replication will now be ignored
  • Fixed an issue with VMware backup where quiesce snapshots creates two files instead of one
  • Fixed an issue with VMware backup when a virtual machine directory is located more than a level deep from the datastore root
  • Fixed an issue with an incorrect check of allocated areas during VMware vSphere backup

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

What is RMM software?

In this article, we will thoroughly address RMM Software (Remote Monitoring and Management Software) and its essential role for Managed Service Providers (MSPs). We will explain the core functions of RMM, from remote monitoring to efficient management of client devices, highlighting its key advantages such as reducing labor costs and improving productivity. We will analyze the strategic integration of RMM and PSA (Professional Services Automation) to empower MSP workflows and offer a vision of the future, supported by promising statistics. We conclude by highlighting the continued importance of RMM in the technology landscape and encouraging MSPs to consider its implementation to optimize efficiency and success in the delivery of managed services.

Content:

What is RMM software?

In the past, all businesses, regardless of size, used on-premise IT infrastructures. When a problem arose, they contacted their service provider and a technical team went to the offices to solve it. However, the landscape changed completely with the development of Cloud technology. The possibility of accessing data and computing resources from anywhere was gradually reducing the dependence on centralized IT infrastructures. The definitive leap occurred with the arrival of remote work and hybrid work. Organizations that go for a flexible working framework have their systems distributed in widely diverse locations, often outside the traditional corporate network.

On the other hand, each department within the company has specific technological needs that are quickly adapting to market changes. Managing all these applications manually would be very complex, expensive and could lead to human errors that put security at risk.

It is clear that to address these challenges new tools had to emerge such as the RMM (Remote Monitoring and Management) software that allows companies to maintain effective control of all their IT assets, even in distributed environments.

How does RMM software contribute to the digital transformation of companies?

As we just mentioned, RMM software has become a key piece to ensure the transition to decentralized and dynamic infrastructure environments, without neglecting the essential aspects.

Thanks to this technology, IT professionals can remotely monitor and manage a company’s entire infrastructure monitor the performance of IoT devices connected to the network in real time, identify possible threats or anomalous activities and apply corrective measures.

Although remote management tools emerged in the 1990s, they initially had limited features and were difficult to implement.

The first RMMs offered basic supervision and were installed on each computer individually. The central system then analyzed the data and created reports or alerts on critical events.

Instead, today’s RMM software takes a more holistic approach and enables unified and comprehensive management of the company’s technology infrastructure by retrieving information from the whole IT environment rather than from each device in isolation. In addition, it supports on-premise and cloud installations.

Finally, another key contribution of RMM tools for digitization is to switch from a reactive maintenance model to a preventive maintenance model. Remote access solutions allow technical teams to proactively monitor software processes, operating systems, and network threads, and address potential issues before they become critical situations.

A key tool for MSPs

A Managed Service Provider (MSP) is a company that provides management and technology support services to other companies, from server administration, to network configuration, to cloud asset management.

As organizations grow, they store more data, and cyber threats are also on the rise. Many SMEs decide to hire the services of an MSP provider to take charge of their infrastructures, especially if they do not have an internal IT department that optimizes the security and performance of their systems.

MSPs use different technologies to distribute their services and one of the most important is RMM software, which allows them to proactively monitor their customers’ networks and equipment and solve any issues remotely without having to go to the offices in person.

According to data from the Transparency Market Research portal, the market for this type of software has not stopped growing in recent years and this growth is expected to remain constant at least until 2030, driven by the demand for MSPs.

How do RMM tools for remote monitoring work?

RMM tools work thanks to an agent that is installed on the company’s workstations, servers and devices. Once installed, it runs in the background and gathers information about the performance and security of systems.

The RMM agent continuously monitors network activity (CPU usage, memory, disk space, etc.) and if it detects any anomalies, it automatically generates a ticket with detailed information about the problem and sends it to the MSP provider. Tickets are organized in a panel according to their priority and their status can be changed once they have been solved or escalated to a higher level in the most complex cases.

In addition, RMM tools create periodic reports on the overall health of systems. These reports can be analyzed by technical teams to reinforce network stability.

How does RMM software help improve the operational efficiency of MSPs?

RMM software has a number of practical utilities that MSPs can leverage to raise the quality of their services:

  • Remote monitoring and management

    It monitors equipment performance in real time and allows to solve problems remotely without having to go physically to the place where the incident took place. This saves time and costs associated with transportation.

    Another advantage of implementing RMM tools is the possibility of hiring the best professionals regardless of their location and covering different time zones offering 24/7 support.

  • Full visibility of IT infrastructure

    Thanks to RMM software, technical teams can keep track of all their customers’ IT assets from a single dashboard. For example, they can make an inventory of all devices and cloud services that are active, or check in a single dashboard view the tickets that are open and those that are pending resolution.

  • Automating repetitive tasks

    RMM tools create automated workflows for routine tasks such as: installing/ uninstalling software, transferring files, running scripts, managing patches and updates, or backing up. This reduces the workload of IT teams and minimizes the risk of human error.

  • Increased security

    RMM agents send alerts in real time if a critical event takes place. That way, network administrators can very quickly identify security threats or problems that affect computer performance.

    Proactive monitoring is critical for MSP providers to ensure a stable and secure IT environment for their customers. In addition, it reduces the costs associated with equipment repair and data recovery.

  • Reduce downtime

    The installation of new programs, updates and corrective measures runs in the background without interfering with user activity. This makes compliance with Service Level Agreements (SLAs) easier by solving problems as soon as possible without any prolonged service interruptions.

What aspects should MSPs consider when choosing RMM software?

It is important to choose a stable, safe and easily scalable solution that meets customer needs. In addition, the chosen RMM software is ideally integrated easily with other tools for more efficient and complete management.

Let’s look at some basic requirements!

  • Easy implementation

    RMM tools should be intuitive to reduce commissioning time and costs.

  • Flexibility

    As companies grow, so does their IT infrastructure. For MSPs, a higher volume of customers means increased monitoring capacity. That’s why it’s important to choose a tool that’s flexible and scalable. That way, it will be possible to add new devices and users without technical limitations.

  • Stability

    It verifies that RMM software is stable. Some solutions provide remote access through third-party software and this can affect connection performance as each tool has its own features and data transfer speed. Therefore, it is best to select a platform that offers integrated remote access to optimize responsiveness and avoid interruptions.

  • Device compatibility

    The tool should be prepared to monitor the activity of a wide variety of devices and computer systems that support SNMP protocols. This includes, but is not limited to, servers, routers, switches, printers, IP cameras, etc.

  • Seamless integration with PSA tools

    The integration of RMM and PSA improves the workflow of MSPs.

    PSA tools automate and manage tasks related to the provision of professional services such as invoicing, ticket management, time registration, etc.

    For example, issues detected during remote monitoring can automatically generate tickets in the PSA system for technicians to review the device’s incident history and keep track.

    Time spent applying corrective action can also be automatically recorded by PSAs, allowing for more accurate billing.

  • Security

    Make sure that the RMM software you plan to purchase is properly licensed and meets security standards. It should provide features such as data encryption, multi-factor authentication, system access via VPN, or blocking inactive accounts.

  • Support

    Finally, before deciding on an RMM solution, check that the vendor offers good post-implementation support. Check the references and opinions of other customers to know the quality of the service and make sure that you are making a good investment.

Conclusion

SMBs are increasingly digitized and rely on a wide variety of software to run their day-to-day operations. As enterprises migrate their infrastructures to the cloud, MSP providers need remote access solutions to end-to-end management of their customers’ assets.

There are different RMM tools that allow you to monitor the performance of your systems in real time and perform support and maintenance actions. One of the most complete ones is Pandora FMS Command Center, a specific version of the Pandora FMS platform for monitoring MSP and which has been designed to work in IT environments with a high volume of devices. It is a secure and scalable solution that helps managed service providers reduce workload and expand their customer base.

In addition, it has a specific training plan for IT teams to get the most out of all the advanced features of the software.

Many companies that work with Pandora FMS Command Center have already managed to reduce their operating costs between 40% and 70% thanks to task automation and reduced incidents.

It’s time to increase your business productivity and offer your customers exceptional service. Contact our sales team to request a quote or answer your questions about our tool.

I studied Philology, but life circumstances led me to work in the Marketing sector as a content writer. I am passionate about the world of blogging and the opportunity to learn that comes with each new project. I invite you to follow my posts on the Pandora FMS blog to discover the technological trends that are transforming the business world.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Keepit Partner Network: Growing partnerships to the next level

Leading the way with vendor-independent data protection

When I started in Keepit in July 2023, I knew that I was joining a very special company. Not only does the company have a great product, but it also has a great partner ecosystem and the two are key to having an impact on the market.

At the heart of data protection specialist Keepit’s success lies indeed a resilient and purpose-built cloud infrastructure — and also many long-lasting partner relationships.

The company’s platform, exclusively owned and operated independently from other cloud vendors, signifies a revolutionary shift in data protection strategies. Serving as the ultimate safeguard against potential data loss resulting from security incidents or unforeseen events, Keepit ensures that its partners empower clients to maintain control over their critical SaaS data.

And it’s not just a few workloads that we cover: Keepit’s unique easy-to-use platform ensures business-critical SaaS data from multiple SaaS applications, like Microsoft 365, Entra ID (Azure AD), Salesforce (and others) is kept immutable, accessible, and compliant with even the strictest of requirements. Learn more about Keepit’s security and compliance.

Keepit’s impressive scaling secures $40 million from HSBC Innovation Banking

On Jan. 9, 2024, Keepit announced that HSBC Innovation Banking has provided Keepit with a $40 million refinancing package together with The Export and Investment Fund of Denmark (IEFO). The fresh capital is earmarked to sustain the impressive growth trajectory and substantial expansion strategy of Keepit.

Keepit CEO and co-founder, Morten Felsvang, shares that the funding “is an infusion of confidence in our capabilities on all levels. And it means that we can continue our growth strategy at full throttle.”

Partners prove invaluable to Keepit’s growth and success

The Keepit Partner Network (KPN) highlights the company’s dedication to its channel ecosystem. Tailored for resellers, managed service providers, and distributors, this program elevates partner engagement with its tiered structure, ensuring customized support for diverse partner needs.

KPN is designed to propel partners toward unparalleled success within data protection together with Keepit. The recognition of Keepit with its addition as a scaler in the Canalys “Global Managed Backup and Disaster Recovery Leadership Matrix 2023” report underscores the program’s rapid growth and our outstanding performance. 

 

And in support of that commitment to growth, we’re setting our sights on crossing over into the coveted Canalys “Champions” category on our impressive journey by adopting a partner-only model. 

 

Keepit’s Partner Network emerges not just as a program but as a strategic cooperation for the future. Partners get the chance to be a hero for customers by offering them award-winning, next-level SaaS data protection that’s transparent in cost and incredibly easy to set up, onboard, and use. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Meet The Team – Finding your tribe through mentorship and remote work with Senior Software Engineer, Peter Ashford

We sat down for a chat with Peter Ashford, one of our Senior Software Engineers and remote team members, who has been with the company since July 2022. This piece has been lightly edited for length and clarity.

How did your passion for tech start?

When I was a kid, computers seemed like these really serious business things. It always tickled my imagination that people would subvert computers to make trivial things like games. That really appealed to me. One of my childhood goals was to create games, and I did eventually work in the gaming industry for a few years; I worked with some truly excellent people and I had a lot of fun but I also came to realise that it’s a difficult industry to have a long career in.

What attracted you to work here at Comet?

I told the recruiter I was working with that I was looking to find my tribe – people who were interested in technology and motivated and excited about software engineering.

I have definitely found the right place. I couldn’t be happier with the kind of people that I’m working with, not just the software developers, but the whole company exceeded my expectations for working together collaboratively.

What is your favorite thing about working at Comet?

The people are the greatest thing about working at Comet. I genuinely like everybody that I work with. And there’s nobody here I don’t feel comfortable talking to and asking a question.

That’s a big deal because we’re working on a complex product. So having an environment where everybody feels comfortable and free to ask questions is a big deal. Comet is an extremely collegial kind of place to work. Everyone is genuinely interested in helping everybody else out.

You are one of the full time remote team members, how do you keep connected with the team?

I live in Dunedin, so I’m one of a handful of remote team members at Comet. I knew that being remote full time was going to be a different kind of challenge. But Comet has been really proactive with that right from the outset.

We have events like CometCon, our company-wide conference, where twice a year everyone is flown in for a week to ensure we get some face to face time as an entire team.

The other thing that Comet does, which is really cool, is that we have a virtual coffee break over Slack where we just get together and chat on a video call. All of our team meetings happen over Slack as well, so our normal way of working effectively works for people who work remotely.

Inevitably there’s always going to be the occasional discussions you miss out on because you’re not in the office, but there’s lots of opportunities to catch up with people outside of physically having to be in the office. So it works out pretty well.

Tell us more about CometCon and what you enjoy about it.

CometCon is a fantastic initiative. They’re awesome and I hugely value them for two reasons:

One, sitting down and getting a chance to hash through issues or hear talks about how things work on the technical side is really valuable. Comet is a big and complex piece of software, so it’s always great to learn more about how things work and have cross functional training in different areas of the product to disseminate knowledge throughout the team.

But also for me, because I’m working remotely, that chance to catch up with everybody and just have a bit of fun and focus on those sort of human relationships. I can’t overstate how much I value that in terms of having time to catch up and chat to people in other departments.

What do you think of Christchurch?

I’m super enthusiastic about the Riverside Market, it’s a fantastic jewel in the crown for the city. There are a lot of eateries with different options, I’ve made a habit of eating there every time I travel to Christchurch for CometCon. I also love seeing the Southern Alps in the distance on a clear day, it gives you an emotional boost to see the mountains from the office windows.

What keeps you passionate about moving forward in the field and what keeps you inspired within the industry?

I really like the fact that I can learn new skills. I really value that. It’s important for people who want to stay in the industry to keep learning. That’s been great for me because I’ve picked up Golang programming, which I didn’t know at all before working at Comet. I really like coding and making stuff and learning new ways to make stuff, that’s where it gets to be fun. That’s the joy of software engineering.

You’ve also had the opportunity to mentor one of the junior developers, what has that experience entailed?

During my interview process, we discussed various ways I could contribute to the team and the idea of mentorship came up. I absolutely love working with people and talking about code, so mentoring a junior dev is an awesome fit for me.

Each person approaches problem solving differently. It’s cool to see what someone else comes up with. I love the whole process of imparting knowledge and discussing various ways to solve a problem.

When Rhane (Junior Developer) came on board last year, I was paired up to mentor her. At Comet we have a pathway for junior developers to join our Support Team. They work on dev tickets between support tickets. With guidance from other team members, they graduate into a full developer after a year. It’s been a fantastic initiative.

What are some of your other hobbies?

I’m very much a family man. I’ve got a bunch of kids. We are currently doing tons of work in our garden. Because I’m working at home, I’m quite careful about making sure that I take breaks. So it’s really nice to have a space in my backyard to wander around my garden and see what’s growing and how it changes over the years. It has become quite a nice little zen environment to spend some time sitting in the sun, listening to birds.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Creating a perfect storm using social engineering: a talk with Christopher Hadnagy

In the rapidly evolving landscape of cybersecurity, understanding the intricacies of social engineering is crucial.

Christopher Hadnagy, a renowned expert in the field, sheds light on the complexities and nuances of social engineering in an enlightening interview. His insights dive deep into the psychological roots of cyber-attacks, offering a unique perspective on how cybercriminals exploit emotions and trust.

This article breaks down key insights from the interview, giving valuable knowledge to professionals and the general public. It serves as a guide to comprehend the current state of cyber threats and prepares us for the emerging challenges in the digital world.

The interview’s highlights

  • Expert vulnerability to attacks. No one is immune, as Hadnagy’s personal encounter with a phishing scam proves the universal vulnerability to cyber-attacks.

  • Social engineering tactics. Primary social engineering methods evolve with the advent of new technologies and methods like QR code phishing and online chat scams.

  • Emotional exploitation in decision-making. ‘Amygdala hijacking,’ where intense emotions can overshadow logical thought, is a technique to elicit quick, emotion-driven decisions from victims.

  • Manipulating trust through oxytocin. It’s difficult to protect against the manipulation of trust, as oxytocin, a natural facilitator of human bonding, can be exploited by malicious actors.

  • Nonverbal cues and deception detection. To dispel nonverbal cues of deception, focus on the mismatch between words and body language and trust one’s intuition.

  • Industry-specific vulnerabilities. Heightened susceptibility of certain sectors like healthcare, banking, and utilities to social engineering, with specific challenges faced in effectively training staff in these areas.

  • Future trends and AI in cyber-attacks. AI in cyber-attacks will get more sophisticated, making it necessary for advanced defensive strategies.

Key insight #1: social engineering is getting at you at the right time and context, not an intelligence issue.

NordLayer: How can even experts in social engineering become victims of cyber-attacks?

Christopher Hadnagy: Despite being an expert, the story of falling victim to a phishing attack stresses the human element in cybersecurity.

Social engineering targets our emotional responses, not our intelligence or lack of it. If an attacker aligns their approach with something personal and emotionally significant—and times it perfectly—anyone can fall victim.

Quote 1My experience with the Amazon phishing attack is a classic example. I’ve placed an order on Amazon and was about to rush through the door for the airport with luggage in my hands. This was the time when the phishing email dropped into my inbox, saying something went wrong with the payment card.

The combination of being rushed, emotionally charged, and the contextually relevant pretext made me susceptible at that moment.

Key insight #2: phishing attacks are the most common reason behind breaches, and they evolve constantly.

NordLayer: What are the most common social engineering tricks used to gain access?

Christopher Hadnagy: The landscape of social engineering is diverse and continually evolving.

The primary categories include phishing emails. Everyone’s heard about them, but they are still the number one threat when it comes to breaches.

Then there’s voice phishing (vishing) and SMS phishing (smishing). Smishing became prolific after major telecommunications providers in the U.S. were breached, and all phone numbers were out there. Hence, I receive 10-12 weird text messages every day.

Impersonation is becoming a growing problem as there are two different attack types. One can be someone coming into your business as your employee or colleague. Another one is social media impersonation, also known as catphishing. We see many people making fake LinkedIn accounts and believing there’s someone they’re not.

Technological advancements have emerged in new methods like QR code phishing (wishing) and online chat phishing, especially prominent in the support chats category.

These attacks exploit the increasing amount of personal information available due to data breaches, creating more opportunities for targeted and convincing scams.

Key insight #3: a blackout of logical thinking for one minute can result in thousands of dollars lost.

NordLayer: Could you explain how threat actors use the science behind emotions like fear or urgency?

Christopher Hadnagy: Dr. Daniel Goldman coined the concept of ‘amygdala hijacking,’ where intense emotional responses overshadow our logical thinking, which is a critical tool in a social engineer’s arsenal.

Research subjects were shown something scary or sad and then asked to do math problems. They saw that the frontal cortex went completely dark, and the amygdala in the center of the limbic system was all lit up.

This neurological response diverts all processing power from the frontal cortex to the amygdala during high-stress situations, hindering critical thinking.

NordLayer: How do we make decisions that we normally wouldn’t make when these emotions are involved?

Christopher Hadnagy: Attackers exploit this by creating scenarios that evoke strong emotions like fear, anger, or urgency, leading to hasty decisions made without logical reasoning.

It only takes 30 to 60 seconds, and our brains return to normal once we’re done with the emotion. This is why scam emails never say, ‘click this link tomorrow’ because, between now and tomorrow, we will have time to think and be in the right state of emotion.

Instead, they create urgency. Giving you no time to think critically creates a perfect storm for a social engineering attack.

Key insight #4: as humans, we are trustful by nature, and safe words can save us from scams and paranoia.

NordLayer: Your TED talk mentioned oxytocin and its role in trust. How do social engineers exploit this aspect of human biology, and what can we do to protect against such manipulation?

Christopher Hadnagy: Oxytocin, known as the ‘moral molecule’, plays a vital role in building trust, a mechanism frequently exploited by social engineers. Without it, we would die off as a human race because this love hormone is a part of how we are as humans and not just a bunch of paranoid hermits.

It’s about striking a balance between being cautious and maintaining the natural human tendency to trust.

While it’s challenging to safeguard against this manipulation without becoming overly distrustful, awareness and simple protective measures like establishing a family password can be effective. Then they—your child or grandparents—don’t have to know anything about neuroscience or cybersecurity, but remember one code name and use it once necessary.

Key insight #5: a combination of nonverbal signs or simply trusting your gut can help you avoid becoming a cyber-attack victim.

NordLayer: In your book, ‘Unmasking the Social Engineer,’ you emphasize the importance of nonverbal communication in detecting social engineering attempts. What are some key indicators that someone might be attempting to manipulate or deceive us?

Christopher Hadnagy: Deception detection through nonverbal cues is complex.

There’s no definitive set of nonverbal indicators of deception Instead, we look for inconsistency between someone’s words and body language.

Your body and your brain are constantly looking for nonverbal signs. We do it all the time, unwillingly looking for little things like a head tilt or a nod—nonverbal signs to evaluate our trust in that person. Virtually via email or a phone call, it’s much harder to put someone to a nonverbal test, so look for the smallest signs and inconsistencies in speech.

Quote 5

Understanding nonverbal communication can alert us to discrepancies in a person’s intent versus their verbal communication. Moreover, trusting our intuition or ‘gut feeling’ when something feels off can be a reliable guide, especially in situations that make us feel uneasy or unsafe.

Key insight #6: the intense nature of some industries requires a full attention span to do their jobs well instead of being concerned about breaches.

NordLayer: From your experience, which industries are currently most vulnerable to social engineering attacks, and why are they particularly targeted?

Christopher Hadnagy: The medical field, banking, and utilities are particularly susceptible to social engineering attacks. The healthcare industry, for instance, struggles with cybersecurity training, often choosing inappropriate times or methods, leaving staff unprepared for social engineering tactics.

Quote 6

The integral nature of these industries, involving high-stress environments and sensitive information, makes them prime targets.

The medical field is probably one of the biggest threats out there. Doctors and nurses are doing a hard job attending to saving our lives or dealing with sicknesses—there’s no time to do cybersecurity training while a bunch of documentation and patients take all your attention.

Key insight #7: AI is to create sophisticated attacks and to be used to prevent them.

NordLayer: Looking ahead to 2024, what major trends do you foresee in the evolution of social engineering tactics, and how should organizations prepare?

Christopher Hadnagy: The future of social engineering is increasingly intertwined with advanced technologies like AI.

The use of AI in attacks is becoming more sophisticated, making them harder to detect and counteract. AI will likely be used in phishing emails, voice cloning for scams, and deepfakes.

The increasing brazenness and callousness of attackers, targeting even the most vulnerable, is a disturbing trend.

However, there’s hope for increased education on social engineering and the development of AI-based defensive tools. It’s crucial for organizations to invest in both technology and training to stay ahead in this evolving threat landscape.

Thank you.

Christopher Hadnagy, CEO & the founder and CEO of Social-Engineer. Chris has over 16 years of experience as a practitioner and researcher in the security field. His education and awareness efforts have helped expose social engineering as a top threat to security today. 

Chris established the world’s first social engineering penetration testing framework and the first hands-on social engineering training course and certification, Advanced Practical Social Engineering, attended by law enforcement, military, and private sector professionals.

Chris is also the best-selling author of three books: Social Engineering: The Art of Human Hacking, Unmasking the Social Engineer: The Human Element of Security, and Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails.

How NordLayer can help

Awareness is the first step in preventing cyber-attacks. Training, education, and constant reminders significantly help organizations minimize the risks. However, being human is in our nature. Additional tools like NordLayer as a threat prevention measure can help automate some processes to save time, maintain our focus, and create additional barriers for malicious attackers to stumble upon.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×