Skip to content

Zettasecure: coupling a password manager with XDR for extra client security

Meet Zettasecure

Zettasecure GmbH is a cybersecurity consulting firm based in Vienna, Austria. It specializes in cybersecurity services for small and midsize businesses.

Founded in 2020, Zettasecure was driven by Philipp Mandl’s experience in a large enterprise security operations center (SOC). After successfully building and managing a SOC, he saw an opportunity to create a similar service offering comprehensive security solutions with the expertise he had gained.

The company also provides a managed SOC for continuous monitoring and tailored cybersecurity support, mitigating threats affordably and without relying on high-cost solutions. Currently, they cater mainly to German-speaking countries, such as Switzerland, Germany, and Austria.

Password managers matter as much as antivirus systems

From his experience as an MSSP, Philipp Mandl finds that companies often believe that if they already have antivirus software, for example, they are cybersecure. However, sound password management is a necessity equivalent to an antivirus or firewall system—without it, the company won’t be as secure. After all, password managers are a best practice to comply with NIS2 requirements.

One of Zettasecure’s first clients in need of a password manager came to them with a unique challenge: they wanted not only a centralized and intuitive password management tool but also one that would allow them to get notified in real time when data loss occurred. In other words, they wanted to know if a malicious IP had logged into the password manager and was now trying to copy all the passwords as fast as possible, or to share them with multiple sources that shouldn’t be shared per company rules.

As their MSSP, Zettasecure was happy to offer a solution: NordPass, a password manager that has a centralized and smooth user onboarding and offboarding that the IT team manages through the NordPass Admin Panel.

 

“We came to NordPass for a solution because we knew it had an Activity Log API that we are now utilizing for this specific use case. We use the Activity Log data from our customers and us, push it to the XDR platform from our customers and our side, and then analyze it.“

Philipp Mandl,

CEO of Zettasecure

Additionally, NordPass provides an Activity Log API that became a holy grail for this client’s use case. The Activity Log API is a NordPass Enterprise feature that helps companies manage employee access and monitor the organization’s activities. Zettasecure coupled this feature with XDR (extended detection and response) by pushing the data collected via the Activity Log API to SIEM so they could:

  • Get an alert or set an automation rule on a third-party tool

  • Get notified about user activity outside of working hours

  • Automate emails/messages to a user who hasn’t used NordPass in X days.

This works similarly if a threat actor is within the company and tries to search for specific passwords or copy them from NordPass as quickly as possible. Zettasecure noted that if a user is excessively viewing or copying passwords from NordPass, they mark it as malicious via the XDR platform, so that the company can automatically tackle this threat actor by locking down their computer and investigating what’s happening.

The CEO of Zettasecure believes that NordPass and the XDR solution have become a perfect fit that he can now offer to his customers and happily uses at his own company.

Sharing passwords in a secure way

The other Zettasecure client faced yet another challenge. This company is in the transportation business and was looking for a way to share passwords safely among their teams. Namely, they have several departments, like legal and finance, that use certain shared accounts.

NordPass came through as a tool that was just right for their needs. With Shared Folders, employees can now easily share passwords in bulk and have all the necessary access at hand by simply autofilling credentials when needed. This eased the company’s stress on handling access quickly and securely among the teams.

In addition, NordPass provided the company with other great benefits that further improved its security and convenience. For instance, it allows the client to see who has access to what accounts in the company via the Admin Panel, helping to streamline compliance. Additionally, when an employee is offboarding, the company can quickly transfer data to their colleague, so no access is ever lost.

A password manager helps to save companies’ money

Sometimes, convincing people that they need an additional app to manage only their company’s passwords can be hard. After all, they already use a built-in browser password manager, and it’s already there.

However, Philipp Mandl believes this line of thought is a big issue: a built-in browser password manager doesn’t help a company see possible cyber threats coming their way, which can have devastating consequences. For example, such password managers are particularly vulnerable to malware attacks: when malware appears on the device, it simply copies browser cookies and their stored passwords.

 

“I think the problem is that most people are using an in-built browser password manager, and that’s a big issue that can have devastating consequences. For example, such browser password managers are particularly vulnerable to malware attacks. So when malware appears on the device, it simply copies browser cookies, and then cybercriminals can sell that copied information on the darknet market. This valuable info can later be used for hacking the said company with credential spoofing.”

Philipp Mandl,

CEO of Zettasecure

And there’s always a human error: most data breaches occur when someone accidentally enters their credentials on a phishing website, which is then leaked on the darknet. That’s why it’s crucial to invest in a dedicated password manager.

So, it’s no surprise that the most used NordPass feature among Zettasecure clients is the Data Breach Scanner. It allows companies to catch whether any of their email domains or passwords have ever appeared in a data breach. If such data is ever found in a data breach, the company gets timely alerts so they can act quickly to mitigate the cyber threats. NordPass includes the Data Breach Scanner in all of its Business plans without any additional cost.

inner asset zettasecure msp case study

Philipp says that it allows their customers to save thousands of euros if they notice that their data appeared in a breach so they can act proactively to prevent their credentials from ending up on the dark web. MSSPs, as Zettasecure, can also monitor the security health of their end-users through the MSP Admin Panel and alter their clients if needed.

A password manager fit for an MSSP

When choosing which password manager to partner with, there were a few decisions why Zettasecure chose NordPass:

  • Zero-knowledge architecture: NordPass’ end-to-end encryption and zero-knowledge architecture ensure the finest privacy and security standards for MSPs and their clients.

  • Activity Log API helps manage client employee access and monitor company activities. For extra security, MSPs can effortlessly import data collected through the Activity Log API into SIEM and then use XDR, a technology that collects and automatically correlates data across multiple layers of security. This enables alerts and immediate response in case of a cyber threat.

  • Data Breach Scanner scans the dark web for data breaches involving the client company’s email domains or passwords. If such data is ever found, the client receives a timely alert. This tool is included in all Business plans.

  • No hidden costs: NordPass has transparent pricing across all Business tiers for MSPs and their clients.

    So, if you are looking for a way to improve your clients’ security, please reach out to our experts today to learn more about NordPass for MSPs.

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Our team’s hot takes on cybersecurity in 2025

2025 is here—what should we expect?

As the new year kicks off, it’s only natural to start thinking about what’s ahead and make predictions. And so, we reached out to a few top experts on the NordPass team to find out what they think is coming in cybersecurity in 2025. The answers we got were not only varied and engaging but also unexpected and, at times, controversial. Here’s what they had to say:

Prediction #1—Jonas Karklys, CEO of NordPass

“Cybersecurity tools like password managers will help people reduce digital anxiety.”

“With AI adoption booming, fake news spreading like wildfire, and cyber threats becoming more sophisticated by the day, it’s no surprise that people feel overwhelmed and vulnerable online. The good news? Cybersecurity tools, like NordPass, are already providing significant support, making it much easier to manage accounts, protect sensitive data, and stay in control of who has access to their information.

As these solutions continue to evolve to tackle the latest challenges head-on, like AI-powered phishing or 5G network vulnerabilities, they’ll empower people to face the digital world with more confidence and truly take charge of their online lives. The digital world should be a place where everyone can be themselves and realize their potential—not a place where they’re constantly worried about what’s around every corner. Let’s make that happen.”

Prediction #2—Marvin Petzolt, Lead Security Architect at NordPass

“AI will make scams much more realistic.”

“In recent years, chatbots have become more and more lifelike, and now, the new models are even adding emotions to their responses. Because of this, I predict that, in 2025, we’ll see a rise in AI-powered phishing and scam attacks. AI makes it incredibly easy to pull information from social media that criminals can use to create super convincing scams on a much larger scale.

Picture this: you get a phone call, and the voice on the other end sounds just like someone you know—maybe a relative or an old friend. They say they urgently need help: emergency funds, rent money, or money for medical bills. These kinds of scams will start happening more often, and without the right security measures, some people could easily be fooled on a level we’ve never seen before.

That’s why it’s going to be more important than ever to be cautious about what we share online—keeping it private and to a minimum.”

Prediction #3—Karolis Arbaciauskas, Head of Product & Business Development at NordPass

“Passwords will endure and grow in volume.”

“While passwordless authentication methods, like passkeys, are starting to gain momentum, it’ll take some time for them to catch on across consumer and shadow IT sectors. So, my prediction for 2025 is that passwords will still play a major role in authentication.

Before the COVID-19 pandemic, most people had around 70 passwords. But with remote work becoming the norm and more people using collaboration and streaming services, that number went up to about 170 by 2024. Looking ahead to 2025, with more AI-driven tools requiring authentication, we’re likely to hit an average of 190 passwords per user. Unfortunately, it also means that weak, reused, or stolen passwords will still make up around 70–80% of cyberattacks—but even that could rise in 2025. The fact remains that this growing number of passwords highlights the need for better password management for all of us.”

Prediction #4—Jolanta Balciene, Head of Product Marketing at NordPass

“Cybersecurity will be seen even more as a business differentiator.”

“No matter which cybersecurity market report you look at—whether it’s from Gartner, IBM, or McKinsey—you’ll see that this sector is growing at a very high speed. Due to the increasing number of cyber threats, more companies are now investing in cybersecurity products and services to protect their IT infrastructures and their customers’ data. And so, I believe that in 2025, cybersecurity will stand out even more as a key business asset.

What I mean by that is that organizations all around the world will not only invest more in cybersecurity tools to defend themselves against threats like AI-powered phishing, ransomware, and malware, but they will also position cybersecurity itself as a key value proposition. As a result, customers will more actively seek out companies that have known certifications and cybersecurity measures in place—simply to make sure they are interacting with brands that prioritize their security.”

Prediction #5—Ieva Soblickaite, CPO at NordPass

“Political tensions may impact how cybersecurity is managed.”

“The relationship between cybersecurity and the global political climate has definitely gotten more complicated over the last few years. Many governments are struggling to match the pace of technological growth, often falling behind when it comes to implementing laws that protect digital infrastructure—which can leave critical systems exposed.

At the same time, the rise of controversial political powers is raising concerns about things like digital surveillance, censorship, and information manipulation. There’s a fear they might try to control internet access, limit free speech, and use cyber tools to go after their opposition.

On top of that, rising geopolitical tensions and military conflicts are making things worse, with some governments using cyberattacks as part of their military strategy. As a result, we’re now seeing more sophisticated attacks aimed at critical infrastructures and democratic organizations, which shows that cybersecurity isn’t just a technical challenge anymore, but a major issue in global diplomacy.

So, in 2025, I’m afraid we’ll likely see these problems grow. We’ll face more risks to critical systems, more manipulation of information, and more cyberattacks targeting democratic institutions. And while we do have some data privacy regulations in place right now, those could change at any time. Therefore, it’s in each of us to take steps to protect our data and minimize the risk of it being used against us.”

Prediction #6—Ignas Valancius, Head of Engineering at NordPass

“The time to crack passwords will be even shorter.”

“I’m sure AI has come up in a lot of predictions, and mine won’t be any different, so here goes: in 2025, the time it takes to guess, social engineer, or brute force passwords is going to drop dramatically, due to AI tools in the hands of cybercriminals.

Based on our own “Top 200 Most Common Passwords” research, we know that simple passwords like “123456” or “qwerty” can be cracked in under a second. The more complex the password, the longer it takes, but with the increasing computing power behind AI, hackers will be able to try many more combinations in less time. So even more complex passwords will be cracked faster. I’m not saying that super long, random 18-character passwords are at immediate risk, but shorter ones? They could be in danger.

And let’s not forget that the more people use AI, the more it learns about them. This is to say that many people already share sensitive data with “free” AI tools to get things done, but here’s the catch—nothing’s really “free.” That data gets used for training, tracking, and, even worse, creating detailed profiles for more targeted attacks. So, as we move forward, it’s crucial to keep our passwords long and strong, and tread carefully as we interact with AI tools.”

Prediction #7—Jonas Karklys, CEO of NordPass

“Passkeys will get more recognition.”

“In 2024, we saw passkeys get massive support from major players like Google, Amazon, PayPal, and Facebook, who backed them as the next step beyond traditional passwords. Looking at the adoption rate, I believe that in 2025, even more companies will jump on the passwordless bandwagon, making it easier for their users to adopt passkeys across their online accounts.

The reasons are simple: passkeys offer better security, helping to prevent many common incidents, and they’re much easier to use than typing out long, complex passwords. Today, it’s all about security and convenience, and if there’s a solution that provides both, it’s a winner. One thing’s for certain—NordPass will be there not only to continue supporting passkeys but also to help other organizations adopt passwordless technology through our services like Authopia.”

Summary

The NordPass team’s predictions for 2025 highlight both the challenges and opportunities of cybersecurity, showing just how crucial it will be for both individuals and businesses. While we’d all love to see the threats disappear, it’s certain they’ll only become more complex. That means it’s up to us to step up our game and protect our digital valuables.

If you’re looking for a way to do that, we encourage you to try NordPass and see how it can level up your cybersecurity and overall online experience. With the free 14-day trial, you can get a good sense of how it’ll keep your data safe in 2025 and beyond. The choice is yours!

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What can someone do with your IP address?

 

Summary: IP-related cyber risks can’t be ignored. Learn how to secure your business with a VPN, firewalls, and IP allowlisting.

Your company’s Internet Protocol (IP) address might seem harmless. After all, it’s just a string of numbers, right? Not quite. In the wrong hands, it can become a tool to cause serious harm. Cybercriminals can track your location, scan your network for weaknesses, and disrupt your systems with cyber-attacks. The risks related to an IP address are real, from DDoS attacks to phishing schemes and impersonation.

So, what can someone do with your public IP address? How could they find it? And most importantly, how can you protect your company from these risks? Let’s explore.

Key takeaways

  • An Internet Protocol address is a unique numeric identifier for your business’s internet connection, revealing its exact location. Without a VPN, your IP address is public and vulnerable to cybercriminals.
  • How can someone find your IP address? It can be accessed legally through emails, website clicks, and social media, or illegally through unauthorized device access or social engineering attacks.
  • If your public IP address is exposed, attackers could launch phishing schemes, DDoS attacks, or ransomware attacks. They could also exploit your internet connection to carry out malicious activities, damage your reputation, or steal sensitive data.
  • Protecting your IP address is key. Using a Virtual Private Network (VPN), IP allowlisting, and updating network security can limit access to your network connection.
  • A dedicated IP address can help protect your business’s identity online.
  • Businesses must protect IP addresses to comply with legal regulations like GDPR and CCPA, which keep customer data safe.

 

How someone can find your business’s IP address

Your business’s Internet Protocol address is more than just a technical detail—it’s a crucial identifier. While it’s necessary to connect to the internet, it can also reveal sensitive information about your company, like its exact location. You can easily look up your IP address, which often shows your region, state, or even city.

While this data is typically used for non-malicious purposes, it still reveals valuable information about your business. Cybercriminals, competitors, or even disgruntled former employees can track your IP address and use it to gather insights, launch attacks, or damage your reputation.

What an IP address reveals about your business

There are many ways someone can access your business’s IP address. While most of these methods are legal, they can be used maliciously, potentially harming your company. Understanding how your IP address might be exposed can help you take action to protect your company. Here is how your business’s IP address could be accessed.

Legal methods to find your business’s IP address

  • Through email: Some email platforms include your IP address in the heading. A recipient could copy it and use it to track you or shield their own IP address.
  • By clicking on an image in an email: Embedded images can track your IP address when you open them, which could lead to phishing or other attacks on your business.
  • Through public social media comments: If an employee comments on social media, your IP address could be traced, revealing your location and making your company more vulnerable to cyber threats.
  • Court orders: Law enforcement or lawyers involved in a criminal or civil case may obtain a court order to access your business’s IP address and related data.

 

Illegal ways to find your company’s IP address

  • By physically accessing your business devices: If someone gains physical access to your device without your knowledge, they can obtain your business’s IP address within seconds.
  • By using social engineering attacks: Cybercriminals can get your company’s IP address by impersonating someone your employees trust, like a colleague or vendor, and convincing them to share the address.
  • By connecting to your company’s network: Anyone connected to your business network can easily find your IP address, as the same IP is shared across devices. If unauthorized access occurs, your business’s IP could be exposed and exploited, risking your data and security.

Protecting your IP address is key for businesses to safeguard privacy and security. Steps like using a VPN, updating network security protocols regularly, and educating employees about safe internet practices can help keep your business safe from cyber threats.

Top risks to your business IP address

Your business’s Internet Protocol address is a tasty target for cybercriminals. From phishing scams to DDoS attacks, here are the biggest threats to watch out for.

What threat actors can do with your IP address

Cyber-attacks

An IP address alone doesn’t allow cybercriminals to control your computer or impersonate you online. It’s simply a numeric identifier for your device that reveals general information about your geolocation.

However, if threat actors gain access to your company device(s) through a cyber-attack, they can use your company’s IP address to carry out malicious activities in your name. Here are some examples of how this can affect your business:

  • Phishing emails: Cybercriminals can send phishing emails from your company’s IP, tricking others into sharing sensitive data or installing malware.
  • Distributed Denial of Service (DDoS) attacks: Attackers can launch a DDoS attack using your company’s IP address, flooding a target website or server with traffic and causing it to crash.
  • Exploiting services: If your company uses public-facing services, attackers can exploit vulnerabilities to launch attacks on other businesses, using your IP address to mask their location
  • Spamming: Threat actors can send out bulk spam emails from your company’s IP, harming your reputation and getting your address blacklisted by email providers.
  • Botnet activities: Attackers can add your company’s device to a botnet, using your IP address to conduct illegal activities like cryptocurrency mining or distributing malware.
  • Ransomware attacks: Using your business’s IP address, bad actors can infiltrate your systems, encrypt critical data, and demand a ransom for its release while appearing to act from within your network.
  • Man-in-the-Middle (MITM) attacks: Hackers spoof an IP address to intercept and alter communication between two computers. This lets them steal data, redirect users to fake sites, and gather valuable information to sell or exploit.
  • Dark web threats: Your IP address and other sensitive data can be sold on the dark web. On its own, an IP address isn’t worth much, but it can be bundled with personal details like usernames or login credentials.

 

Competitor scraping

Competitor scraping involves using automated tools to collect sensitive data, such as pricing, product details, or proprietary content, from competitors’ websites. These scraping tools often rely on IP addresses to access and extract information.

Malicious actors may use rotating IPs or proxies to bypass IP-based restrictions, making it harder to detect and block their activities. This practice threatens intellectual property by allowing competitors to unfairly undercut pricing or steal content, which can harm a business’s reputation and search engine rankings. To protect your business IP, you need strong security measures, including bot detection, API monitoring, and IP blocking, to prevent unauthorized access and data theft.

Reputation damage

Reputation damage is a significant concern when it comes to IP address abuse, especially in the context of intellectual property theft. When a company’s IP is stolen or misused, it can severely damage its reputation, even if the theft isn’t immediately discovered or publicly disclosed.

Since many companies only report cyber-attacks when sensitive customer information—such as medical or financial data—is compromised, the theft of intangible assets like designs or trade secrets often goes unnoticed by the public. As a result, competitors or malicious actors may exploit stolen IP to gain an unfair advantage, further eroding trust and brand credibility. Over time, this reputation damage can lead to a loss of customer confidence, decreased business growth, and a weakened competitive edge.

 

What can IP address leaks lead to?

IP address leaks can lead to significant cyber risks, including IP spoofing. In IP spoofing, attackers alter IP packet headers to disguise their identity and impersonate trusted sources. This method is often used to bypass authentication, launch DDoS attacks, or gain unauthorized network access. While there haven’t been many high-profile incidents, the threat remains substantial.

#1 GitHub DDoS attack

  • What happened: In February 2018, GitHub, a widely used code hosting platform, faced one of the most significant DDoS attacks ever recorded. Bad actors spoofed GitHub’s IP address in a coordinated attack that caused the platform to experience nearly 20 minutes of downtime.
  • Who was affected: GitHub and its users.
  • Key learning: Measures like traffic rerouting and data filtering are crucial for mitigating DDoS attacks.

#2 Europol Man-in-the-Middle attack

  • What happened: In 2015, Europol uncovered a large-scale attack where hackers used IP spoofing to intercept and change payment requests between businesses and customers, sending funds to fake accounts.
  • Who was affected: Many businesses and customers were involved in fraudulent transactions, as well as the organizations’ reputation and security.
  • Key learning: Secure your communication channels and email systems to prevent unauthorized access.

#3 Zephyr OS vulnerability

  • What happened: In October 2024, a vulnerability in Zephyr OS was found that allowed attackers to exploit IP spoofing to launch DDoS attacks. This flaw could result in system instability or crashes.
  • Who was affected: Organizations using Zephyr OS in their systems and services were at risk of disruption.
  • Key learning: Regularly update your systems to fix vulnerabilities before attackers find them.

Additionally, IP spoofing poses challenges in cloud environments, especially in systems using reverse proxies. Attackers can manipulate IP addresses to bypass security measures, making robust protection essential for organizations.

Comparing shared and dedicated IP: which offers better security?

A shared IP address is used simultaneously by multiple users, with all data routed through the same server. This setup is common in web hosting, where many websites share the same server and IP address. It is also used in email marketing, where senders share an IP for email delivery. Sharing resources reduces costs but can create challenges, such as reputational risks.

A dedicated IP address, however, is assigned to just one organization. This makes it ideal for secure web hosting, Virtual Private Networks (VPNs), and services that need a reliable, consistent connection. In email marketing, dedicated IPs give you full control over the sender’s reputation and deliverability.

An IP address can also be dynamic or static. Dynamic IPs change periodically and are often used for general browsing and temporary connections. A static IP remains fixed and is better for hosting websites, running servers, or secure remote access.

The pros & cons of a shared IP address

What are the benefits of a shared IP address?

  • Affordability: Shared IPs are more cost-effective, making them an attractive option for small businesses’ websites hosted on shared servers.
  • Ease of use: Shared IPs are simple to set up for web hosting, email services, or VPNs. They typically require minimal technical expertise.
  • Reputation pooling: In shared web hosting or email environments, the pooled reputation of users can be a benefit. For example, in email marketing, new senders may benefit from the positive reputation of others using the same IP, potentially improving their deliverability.

However, a shared IP address comes with risks, such as:

  • Potential reputational damage: Activities by other users, such as spamming, hosting malicious websites, or engaging in phishing, can harm the shared IP’s reputation.
  • Limited control: Sharing an IP reduces control over performance and security, which can be critical for businesses managing sensitive data or hosting high-traffic websites.

When to use a shared IP

Shared IP addresses work well for businesses with smaller needs, such as hosting websites, sending low volumes of email, or using VPNs for general browsing. They’re cost-effective and convenient for starting out or operating on a budget.

If your business needs more security and control, a dedicated IP address is a better option. While it costs more and takes extra effort to manage, it offers better reliability, security, and control, making it ideal for larger or high-demand needs.

6 steps to protect your business’s IP address

Your IP address is like a neon sign for cybercriminals—if they spot it, you’re on their radar. But don’t panic. With a few simple steps, you can throw up the barriers and keep your business safe from attacks.

6 steps to protect your IP address

Step #1: Invest in DDoS protection

Cloud firewalls are particularly useful in defending against DDoS attacks, as they filter out malicious traffic and block certain attack types.

However, additional DDoS protection measures are often necessary for a complete defense that combines firewalls with threat prevention solutions.

Step #2: Use a VPN for encrypted traffic

Another good way to protect your IP address is to use a VPN. A VPN encrypts your internet traffic and routes through a VPN server. It gives you an anonymous IP address, which helps keep your identity safe. It’s a great tool for remote work, using public Wi-Fi, or traveling internationally.

The best VPNs offer both privacy and speed, so you can stay secure without slowing down your internet.

How a VPN hides your company’s IP address

Step #3: Utilize a proxy server

While proxies don’t encrypt data, they mask IP addresses by assigning new ones for the traffic passing through. This can shield your network from external threats and provide faster speeds, making proxies ideal for accessing streaming services or quick internet browsing.

Step #4: Switch to a dedicated IP for added control

A dedicated IP is an IP address assigned just to your business, typically through a Virtual Private Gateway. This gateway helps control network access, including assigning a unique IP address. It also lets you set user access permissions and segment your network to keep critical resources safe.

With a dedicated IP, your team can access your data securely from anywhere, ensuring that only authorized users can connect to your network. It’s a simple yet effective way to manage access and protect sensitive information.

Step #5: Enable IP allowlisting for secure access

To better control who can access your network, you can use IP allowlisting. This means creating a list of trusted IP addresses that are allowed to connect to your system. It helps limit your network’s exposure to possible attacks. IP allowlisting works best with static (dedicated) IPs, ensuring only authorized users can access your network.

Step #6: Train employees to spot cyber threats

Training helps employees spot suspicious activity, avoid phishing attacks, and make sure they don’t accidentally share sensitive data. It also teaches them how to use security tools like VPNs, create strong passwords, and avoid unsafe networks.

Protecting your IP addresses is not just good practice – it’s also a legal requirement. Regulations like the GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act) emphasize the need to protect personal data and privacy. Your IP address can reveal much about an individual or a business, making it a critical piece of information.

Using compliance solutions can help businesses meet these requirements more effectively. These solutions ensure IP address protection, align with legal standards and simplify the process of protecting personal data.

This way, businesses can avoid legal issues and potential penalties. Compliance also helps build customer trust by showing a commitment to security and data protection.

Why choose Nordlayer for business IP protection

Your business’s IP address is a key part of your online identity, but it’s also a target for cybercriminals. What can someone do with your IP address? They can track your online activity, break into your network, or launch malicious attacks. Knowing how easy it is to find your business’s IP address, it’s important to take steps to protect it.

Here’s how NordLayer can help safeguard your business operations:

  • DDoS Protection: NordLayer’s Cloud Firewall offers strong protection against these attacks, keeping your business up and running.
  • Business VPN: NordLayer offers a Business VPN that encrypts your internet traffic, hides your IP address, and ensures secure communication. Whether you work remotely, use public Wi-Fi, or travel internationally, the VPN server protects your business from unwanted surveillance.
  • IP allowlisting: With NordLayer, allowlisting your Dedicated IP gives you full control over who accesses sensitive resources. You can segment network permissions, ensuring only authorized employees can access specific servers and network resources.

Take action to strengthen your IP protection and ensure your business is fully protected. Contact our sales team to learn how NordLayer can strengthen your business’s IP security and safeguard your operations.


Senior Copywriter


Share this post

 

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cybersecurity for small business: how to stay safe against digital threats

Phishing

According to Verizon’s 2024 Data Breach Investigations Report (DBIR), 68% of company data breaches involved non-malicious human elements, like social engineering. The FBI reported that, in 2023, phishing accounted for 34% of complaints, making it the most reported type of cybercrime.

A phishing attack is a form of social engineering in which the attacker mimics a legitimate contact to trick an unsuspecting user into clicking on a malicious link, luring out their sensitive data, or infecting their device with malware. Over the years, phishing scams have become increasingly sophisticated, making it harder to identify them.

There are a few things you can do to secure your business from a phishing attack. First, you need to get the entire staff on the same page. Educate them about the intricacies of phishing and provide avenues to report any suspicious events. You should also enable anti-phishing filters within your company’s email and consider installing additional security software optimized to detect fraudulent emails.

Ransomware

Ransomware hits SMBs at an incredible rate. Datto’s Global State of the Channel Ransomware Report notes that 85% of managed service providers (MSPs) reported ransomware attacks targeting their clients. In the first quarter of 2024, companies with up to 1,000 employees accounted for nearly 75% of all ransomware attacks. In most cases, phishing emails are behind ransomware threats.

During a ransomware attack, data on the affected computer is almost instantly encrypted, making it unusable in any context unless it is decrypted. Once the files are encrypted, the attackers demand a ransom—hence the name—in return for the decryption procedure.

One of the best ways to defend your company’s data from a ransomware attack is by making regular software updates and data backups. Software updates, including OSs, ensure that no security gaps can be exploited by bad actors. At the same time, data backups allow you to be safe even if any of your data is compromised. Another step is deploying company-wide antimalware and antivirus software that can detect any malware before it does any harm to your company’s network.

 

Viruses

Viruses are perhaps some of the most common cybersecurity threats affecting businesses and individuals alike. They’re pieces of software that, when installed upon a device and activated, start executing various malicious commands.

Viruses can be transmitted to a device via hardware and software. Connecting a suspicious USB flash drive containing a virus to a device is a common strategy for spreading malware. Phishing is also frequently combined with viruses—if a user downloads a suspicious attachment or opens a scam website, their device can be infected.

The damage that a virus causes depends on its programmed purpose. Some viruses might slow down a device and use its resources to mine cryptocurrencies in a process known as cryptojacking. Others lurk in the system, granting access to all inner files without the victim noticing. Keyloggers are a type of virus that can read the user’s keyboard input, allowing them to steal credentials and similar sensitive information.

Businesses are often targeted using viruses that can take over the whole internal network of computers, leading to ransom demands. Trojans, in particular, are dangerous, as they can destroy the entire system from within.

For small businesses, viruses can cause irreparable damage, starting from compromised and lost data to hardware damage and replacement demands. As viruses become increasingly sophisticated, they require more expensive measures than regular antivirus software. They might also exploit out-of-date software with security vulnerabilities.

Preventing an organization’s devices from acquiring viruses calls for similar measures and phishing or ransomware protection. Companies must ensure all devices are up-to-date to avoid zero-day exploits or similar security gaps. All devices should be regularly monitored by antivirus software, and IT teams should be informed if suspicious programs or files appear on the device or if a user has opened a phishing email or website. Companies can also use anti-phishing and anti-malware plug-ins for their email services to prevent employees from accidentally downloading viruses.

Weak passwords

As far as market research is concerned, weak passwords are the biggest threat to cybersecurity for small businesses. Here’s just a handful of studies and reports that reveal password vulnerabilities in practice:

  • Verizon’s 2024 Data Breach Investigations Report (DBIR) notes that 77% of hacking-related breaches are linked to stolen credentials.

  • NordPass’ study of the 200 most common passwords in 2024 revealed that a whopping 79% of the world’s most popular passwords could be cracked in under a second.

  • A study into the password habits of Fortune 500 companies highlighted that even the biggest players out there struggle with password security, with 20% of the passwords being the exact name of the company or some variation.

Ensuring password security in a business environment is not that complicated. A password management solution should be on the company’s must-have list, no matter its size or market. A password manager such as NordPass allows businesses not only to securely store valuable login information but also share it within the confines of the organization. Additionally, it increases employee productivity and helps you meet compliance requirements.

Cloud computing

Cloud computing products are a huge part of today’s business. Nearly all SMBs use cloud-based applications in one way or another, whether for productivity or security benefits. In many instances, cloud computing solutions are highly scalable. However, as helpful as cloud computing solutions are for business IT security, organizations must understand that such products have their risks.

When it comes to cloud-based applications, it is essential to evaluate their security posture. For instance, zero-knowledge architecture is one thing to look for in applications, as it ensures the privacy and security of any data that the application handles. To reap all of the cloud’s benefits, such as scalability, flexibility, and reduced IT costs, SMBs must develop a cloud security plan to clearly define security policies and procedures for using cloud-based applications.

Cybersecurity tips for small businesses

Establishing the right cybersecurity practices in an SMB does not have to be a costly affair. A large chunk of what makes small business IT security function like a well-oiled machine is down to employee awareness and correct credential management practices. Here are some cost-efficient ways you can employ safe practices in your organization:

  • Ensure employee education. As you can tell, password mismanagement is a massive problem for company data security. This misuse often stems from a lack of employee awareness. Provide your team with regular training on cybersecurity practices, digital threats, and how to keep themselves protected from bad actors.

  • Perform routine security checks. Zero-day exploits are beloved by hackers as an easy way in to systems. The best way to protect your company devices from unwanted visitors is to lock the backdoors by keeping all systems and software up-to-date and running regular checks for vulnerabilities.

  • Install a strong antivirus. If you or another employee find a suspicious .exe file on your desktop, the first course of action is to quarantine it. This can be easily done by installing antivirus software on every company-run computer. SMB and enterprise antivirus solutions simplify this process by keeping all computers in the same network protected.

  • Add spam filters to company email. Scammers who use social engineering are efficient at producing realistic emails that can trick even professionals. To avoid incidents of opening fishy attachments or logging in to a spoof portal, add a spam filter to your organization’s email inboxes that lets employees easily flag and report suspicious emails.

  • Use a password manager. Contrary to popular belief, password managers aren’t just useful for generating complex, unique passwords. Business password managers like NordPass also offer centralized controls, such as setting up password policies, observing all organizational activity, or managing shared access between all employees.

  • Enforce multi-factor authentication (MFA). In the 2020s, a password is no longer enough to protect your organization’s sensitive information. To improve their security measures, many companies enforce multi-factor authentication use for all work-related accounts. NordPass Authenticator even lets you store your MFA codes with your login credentials and autofill everything at once.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to Implement a Password Policy That Works

Though this information might be news to you, it’s not to cybercriminals. Weak and reused passwords are a reliable gateway to businesses’ sensitive data. Depending on the type of cyberattack, up to 80% of successful data breaches can be attributed to weak or stolen credentials.

You might consider implementing a password policy to encourage your team to use stronger passwords. But how can you create a policy that works, and what should you include? Today, we’re talking about best practices for password policies.

What is a password policy?

A password policy informs your team about how to make decisions around creating and managing passwords.

A password policy aims to improve cybersecurity by preventing cyberattacks that rely on weak and reused passwords. That usually means establishing conventions around passwords that make them difficult to hack.

Password policies can also refer to rules and guidelines around setting passwords internally. This gives businesses administrative control over which password criteria an internally developed system can accept.

Because these policies can be enforced automatically by software, the advice below focuses on external-facing password policies. In other words, it will offer advice for establishing the guidelines employees should follow when creating passwords for external accounts or software for corporate use, such as Outlook, Google Workspace, or Zoom.

Why do you need a password policy?

To understand the need for a password policy, let’s consider the alternative — looking at the default behaviors around password management in a corporate setting.

Weak passwords are the (unfortunate) standard

Without guidance, users reliably choose weak passwords.

Weak passwords can be easily guessed or hacked with minimal effort. “Password,” for instance, is as weak as they come. And yet our research reveals that this is the most common password in 2022. This password has been used millions of times around the world.

If you suspect that internet users adopt more secure behavior when creating corporate credentials, a study of breached Fortune 500 companies has shown this is not so.

Predictable passwords such as “123456” topped the list of most common passwords, with others like “abc123” and “sunshine” making their way to the top 10 by industry. As mentioned, the company’s name is also a common choice.

Overall, the percentage of unique passwords was only 31% for all industries – to say nothing of the unique passwords’ strength.

A different study of management, owners, and C-suite executives’ credentials demonstrated that even leadership team members are no better at using strong, secure passwords.

Suffice it to say: People use weak passwords at work.

Weak passwords represent a massive cyber vulnerability

Weak passwords, like those mentioned above, can be hacked in less than one second. So it’s no surprise that according to Verizon’s most recent Data Breach Investigation Report, credentials are involved in nearly 50% of all breaches — more than twice as often as phishing attacks.

To make matters worse, using weak passwords is often combined with poor password hygiene. The most common password hygiene sins are storing passwords in insecure locations and reusing the same passwords for multiple accounts.

Passwords stored on sticky notes on your desktop or in Excel spreadsheets are two particularly egregious examples of improper password storage. A password written in plain sight is all too convenient for an intruder in your workspace.

On your virtual desktop, a list of passwords is low-hanging fruit to cybercriminals who have secretly gained access to your device.

As you can tell, poor password hygiene can defeat even the strongest, longest password. That’s why a good password policy must address both.

Password policies and cybersecurity compliance

That password authentication is so standard, yet often, such a weak security barrier is a widespread and well-known issue known a the “password problem.” For that reason, all cybersecurity standards either directly or indirectly offer guidance on passwords.

CIS Password Policy Guide

The Center for Internet Security (CIS) is a non-profit organization with a mission to safeguard organizations against cyber threats. It publishes recommendations that, if followed, will improve businesses’ cybersecurity posture.

The CIS Password Policy Guide offers two tiers of password recommendations: one when passwords are the only authentication method and another when passwords are just one of multiple authentication methods.

ElementsPassword-only authenticationMulti-factor authentication
Length14+ characters8+ characters
StrengthRequire at least one non-alphabetic characterNo requirement
HygieneChange frequency: only when an event occurs, such as staff turnover or a data breach.Change frequency: only when an event occurs, such as staff turnover or a data breach.

The logic is that passwords should be stronger when passwords are the only measure between a cybercriminal and your accounts.

The HIPAA Security Rule

The HIPAA Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) establishes a standard for protecting electronic protected health information (ePHI).

The Security Rule states that healthcare organizations should follow basic information security principles. In other words, the “confidentiality, integrity, and availability of all e-PHI” should be upheld for all protected health data created, stored, or shared by the organization.

Upholding these tenets involves protection against anticipated threats or breaches. While the Security Rule does not define specific password protocols, proper password policies and hygiene are implicit in many requirements — under administrative and technical safeguards.

In principle, the Security Rule can be met by following the agreed-upon best practices for cybersecurity and information security which, inevitably, involve a strong password policy.

The PCI-DSS password guidelines

The Payment Card Industry Data Security Standard (PCI DSS) is a global security standard that applies to all entities that process, store, or transmit personal and payment information. It consists of 12 requirements. Like HIPAA’s Security Rule and the CIS Controls, it mirrors the best cybersecurity practices that mitigate cyber risk and safeguard data.

Requirement two of the Standard stipulates that businesses should change all default system passwords. Not doing so, the document states, is the equivalent of “leaving your store unlocked when you go home for the night.”

Requirement eight is to “identify and authenticate access.” Strong passwords and multi-factor authentication are encouraged as essential measures to protect cardholder data.

The NIST Password Policy

The National Institute of Standards and Technology (NIST) is a U.S. federal agency that has become a significant authority on password guidelines. The NIST password policy provides several recommendations for creating secure passwords and managing them safely. Unlike traditional advice, NIST focuses on user-friendly policies while maintaining strong security.

For instance, NIST recommends allowing longer passwords (up to 64 characters), supporting a diverse character set (including spaces and emojis), and eliminating periodic password changes unless there is evidence of compromise.

In essence, NIST encourages the creation of unique, easy-to-remember phrases instead of complex, hard-to-recall alphanumeric combinations. Their guidelines further emphasize the need for multi-factor authentication (MFA) as an additional security layer and discouraging the practice of password hinting and knowledge-based authentication questions (like your first pet’s name) which can be easily exploited.

NIST’s comprehensive approach to password security underscores its commitment to balancing user experience with robust data protection. This is why its standards are widely adopted across industries globally.

ISO/IEC 27001

The International Organization for Standardization/International Electrotechnical Commission 27001 (ISO/IEC 27001) is a voluntary certification on information security, cybersecurity, and privacy protection.

Annex A is among the best-known annexes of the ISO standard. It includes recommendations that strengthen data security. More specifically, section A.9 pertains to access control, where you’ll find guidelines for password management.

To protect the confidentiality of sensitive data, the ISO guidelines recommend “strong passwords” and a “password management system” in addition to multi-factor authentication.

Password policy recommendations

All well-known cybersecurity standards recommend using strong passwords and good password management or hygiene. But what exactly does that mean?

Strong passwords

Strong passwords make a hacker’s job difficult. They are complex, long, and difficult to guess. The following guidelines can help to create passwords that meet these criteria.

SHOULD includeSHOULD NOT include
 

At least 20 characters

 

Dictionary words

 

A variety of alphanumeric characters

 

The most common passwords

 

Symbols

 

Personal or company information

 

Multiple letter cases

 
 

Random character combinations

 

Keep in mind your password policy should be calibrated by standard password criteria. Otherwise, you’ll end up with a policy that’s impossible to follow. For example, cybersecurity experts say the strongest passwords should allow spaces. However, it’s common for spaces to be prohibited.

Tip: Use a password generator to get super strong passwords instantly without testing your creativity.

Good password hygiene

Good password hygiene also aims to keep your passwords out of intruders’ reach — making it difficult or impossible to steal them and mitigating the damage if they are.

SHOULD involveSHOULD NOT involve
 

Using unique passwords for each account

 

Storing passwords in plain text

 

Changing passwords regularly or after a breach or staff turnover

 

Repeating passwords

 

Secure, end-to-end encrypted storage

 

Sharing passwords over instant messaging or email

 
 

Keeping any default-issued passwords

 
 

Writing passwords down where they can be accessed

Use a data breach scanner to determine whether your credentials have been compromised. If so, change them immediately.

Why password policies (alone) are doomed to fail

There’s a reason it is so common to use weak passwords and practice poor password hygiene. And it’s not a lack of awareness. By now, few among us can claim not to know that passwords like “password” and “123456” represent a security threat.

The truth is that the average user is in a tough spot. You know that you should use strong passwords, especially at work. But the same features that make passwords “good” also make them impossible to remember.

And if you can’t remember them, you have to store them somewhere handy. But unfortunately, this “handy spot” often becomes equally convenient for cybercriminals.

That’s why it isn’t reasonable to expect that penning a policy is all it takes to bolster your business’ password health. Your team members are likely already aware of basic security principles but lack the tools to apply them. On top of everything else, they are likely to prioritize speed over security to get work done.

The Active Directory Password Policy

Active Directory (AD) is a Microsoft product that manages users and computers within a network. The Active Directory Password Policy is a set of rules defined by system administrators to govern password creation and maintenance in an organization.

The password policy generally includes directives such as minimum password length, password complexity requirements (including uppercase, lowercase, numeric, or non-alphanumeric characters), and password history settings to prevent users from reusing old passwords.

The policy also sets a password’s maximum age, forcing users to create new passwords after a defined period. Other considerations might include account lockout policies that disable a user account after a certain number of failed login attempts.

AD provides two types of password policies: the default domain policy and fine-grained password policies. The latter allows different policies for different user groups within the same domain, providing flexibility for different security requirements.

How to set up a password policy that works

With NordPass Business, you can set a password policy at the administrative level that you can implement automatically — offering your team all the support it needs to maintain excellent password hygiene without slowing down the workflow.

business password policy
In the NordPass Business Admin Panel, you set the criteria for strong passwords that the Password Generator follows.

With just one click, users can generate strong passwords with the built-in Password Generator and save them just as quickly. When needed, the passwords pop up automatically into form fields thanks to autofill powered by machine learning.

That means you can unburden your team from the mental load of trying to create and remember complex passwords. And from a storage standpoint, your team’s passwords stay safe in an ultra-secure, end-to-end encrypted vault. All in all, credentials are easy to access for your team but entirely out of reach to intruders.

Members can conveniently and securely share multiple passwords and other sensitive data stored in their vaults with various members at once using the Groups and Shared Folders features.

Meanwhile, you can monitor your team’s password progress with a bird’s-eye view of your company’s Password Health metrics, with a rundown of all vulnerable (weak or reused) passwords that can compromise your cybersecurity.

Avoid choosing between security and convenience. Instead, implement a password policy that works with NordPass Business.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×