Skip to content

High Availability and Contingency and Risk Management in Information Security

Risk management quantifies and qualitatively describes the risk of Information Security, allowing companies to prioritize risks according to their severity and thus ensure business continuity. 

Risk management determines the value of an information asset, identifies the applicable threats and vulnerabilities that exist (or could exist), identifies the existing controls and their effects on the identified risks, determines the potential consequences, and finally prioritizes them.

After this definition, how is it possible to develop a strategy for risk management within a company? What are the main risks associated with Information Security? Also, find out what High Availability and Contingency has to do with risk management and what are their main differences in keeping your system secure.

Keep reading this article and learn how risk management in information security can contribute to your business continuity.

How does Information Security Risk Management work?

Risk management in information security is the process associated with the use of information technology. It involves identifying, assessing, and addressing risks to the confidentiality, integrity, and availability of a company’s assets.

The ultimate goal of this process is to address risks according to a company’s risk tolerance. Companies should not expect to eliminate all risks. Instead, they should seek to identify and achieve an acceptable level of risk for business continuity.

How to develop an Information Security Risk Management strategy?

Managing risks is an ongoing task, and your success will depend on how they are assessed, plans are communicated, and functions are maintained. Identifying the people, processes, and technologies required to help you deal with the steps below will develop a solid foundation for a risk management strategy and program in your company, which can be developed over time.

Identification

This stage is the process of identifying your digital assets that can include a wide variety of information: confidential company information, such as product development and trade secrets; Personal data that can expose employees to cybersecurity risks, such as identity theft regulations. Another example is those companies that handle credit card transactions and need PCI-DSS compliance.

Assessment

This is the process of combining the information you have gathered about assets, vulnerabilities, and controls to define risks. There are many structures and approaches to this.

Treatment

Once a risk has been assessed and analyzed, the company will need to select the risk treatment options. In this scenario, companies can accept the risk or prevent it.

Communication

Regardless of how risk is handled, the decision needs to be communicated within the company. Stakeholders need to understand the costs of whether or not to address risk and the reason behind such a decision. Responsibility and accountability need to be clearly defined and associated with individuals and teams in the company to ensure that the right people are engaged at the right times in the process.

Main risks associated with Information Security

Security risks are inevitable, so the ability to understand and manage risks for systems and data is essential to a company’s success. 

If you are able to address the risks below and respond effectively to security incidents, you can find out how to better resist cyber threats and reduce potential risks in the future.

Privilege Abuse

In most technology environments, the principle of least privilege is not valid. There are many reasons why privileges greater than necessary have been granted to a user.

Granting excessive permissions is problematic for two reasons: approximately 80% of attacks on corporate data are actually performed by active or dismissed employees. Privileges excessively granted or not revoked at the right time make it simple for someone to perform malicious actions.

Third-party Access

A number of third parties, including suppliers, contractors, consultants, and service providers have access to network resources, which allows them to modify, replace, or impact your company’s operational service. This access is considered privileged and needs to be even more protected than the access by an employee.

Companies apply efforts to protect their networks, but forget about third-party access security controls. These controls can protect third-party access to privileged credentials, as well as strengthen security aspects that are normally exploited by attackers to gain access to the corporate network.

Insider Threats

When it comes to data breaches, employees themselves can be one of the biggest risks to an organization. These threats can be: accidental, when personnel is only poorly trained; negligent, when employees try to bypass implemented policies; or malicious (the most dangerous), when an employee is motivated by financial gains, espionage, or revenge.

HA (High Availability) and DR (Disaster Recovery / Contingency) as metrics for Risk Management

Any good system these days must be built to expect the unexpected. No system is perfect and, at some point, something will happen that will cause a system to malfunction (a fire, a hurricane, an earthquake, human error – the list goes on). Since systems can fail in different ways, they need to be designed with the expectation that a failure will occur.

Thus, there are two related, but generally confusing, topics that work on the system architecture that mitigate failures: high availability (HA) and disaster recovery (DR).

High availability simply eliminates single points of failure, and disaster recovery is the process of putting a system back into an operational state when it goes down. In essence, disaster recovery is triggered when high availability fails.

Fundamentally, high availability and disaster recovery have the same goal: to keep systems up and running in an operational state. The main difference is that high availability is designed to deal with problems when a system is running, while disaster recovery must deal with problems after a system failure.

Regardless of a system’s high availability, any system in production, no matter how trivial, needs to have some kind of disaster recovery plan in place. And this should be included in your information security risk management strategy.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura 
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

DNSpooq bugs expose millions of devices to DNS cache poisoning

Security flaws in a widely used DNS software package could allow attackers to send users to malicious websites or to remotely hijack their devices

Millions of devices could be vulnerable to Domain Name System (DNS) cache poisoning and remote code execution attacks due to seven security flaws in dnsmasq, DNS forwarding and caching software commonly found in smartphones, desktops, servers, routers and other Internet of Things devices, according to Israel-based security company JSOF, which discovered the security holes.

Collectively dubbed DNSpooq, the vulnerabilities in the open-source utility affect a variety of devices and firmware, including those made by some of the world’s leading tech companies.

“Some of the DNSpooq vulnerabilities allow for DNS cache poisoning and one of the DNSpooq vulnerabilities could permit a potential Remote Code execution that could allow a takeover of many brands of home routers and other networking equipment, with millions of devices affected, and over a million instances directly exposed to the Internet,” warned JSOF. According to Shodan, there are almost 1.2 million dnsmasq servers exposed to the internet, with yet more vulnerable devices confined to internal networks but also at risk.

RELATED READING: DNS attacks: How they try to direct you to fake pages

Researchers identified no fewer than 40 vendors that use dnsmasq in a wide range of products and in various pieces of firmware and software. The list includes big names such as Cisco, Asus AT&T, Comcast, Siemens, Dell, Linksys, Qualcomm, Motorola, and IBM, just to mention but a few. Whether and to what extent devices are affected depends on how they use dnsmasq

DNSpooq consists of seven vulnerabilities divided into two groups – three that could allow DNS cache poisoning attacks and four buffer overflow vulnerabilities, one of which could lead to remote code execution and device takeover.


An overview of the DNSpooq vulnerabilities (source: JSOF)

“The impact of DNS cache poisoning of the routing equipment DNS forwarding server can potentially lead to different kinds of fraud if users believe they are browsing to one website but are actually routed to another,” the researchers said. They went on to add that each device susceptible to DNS cache poisoning might also be taken over by an attacker.

While on their own the security bugs present a limited risk, once chained and combined they could also be used to conduct Distributed Denial-of-Service (DDoS) attacks as well as wormable attacks that could spread malware between devices and networks.

Researchers disclosed the vulnerabilities in August 2020 and went public with their discovery after the embargo ended this month. While highlighting a number of workarounds in its technical whitepaper to DNSpooq, JSOF advised everybody to apply the best “antidote” – update to dnsmasq version 2.83. In the meantime, multiple vendors have released their respective advisories, mitigations, workarounds and patches, which are now neatly listed on the website of the CERT Coordination Center at Carnegie Mellon University. The Cybersecurity and Infrastructure Security Agency (CISA) also had some advice to share for organizations that use vulnerable products.

In June 2020, JSOF discovered and disclosed 19 security vulnerabilities that were collectively dubbed Ripple20 and were found to affect a popular TCP/IP software library used by millions of connected devices.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Scale Computing Named a Finalist in Storage Magazine, SearchStorage 2020 Products of the Year Awards

INDIANAPOLIS – January 26, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that it has been selected as a finalist in TechTarget’s Storage Magazine and SearchStorage.com’s annual Products of the Year Awards for 2020. TechTarget named Scale Computing’s HE150, the industry’s smallest and most powerful edge computing appliance. as a finalist in the Hyper-converged & Composable Infrastructures category.

In its announcement, SearchStorage noted that: “Scale Computing’s HE150 appliance brings the HCI paradigm to incredibly low-end power-efficient devices, enabling the Scale Computing hyperconvergence offering to run on devices as small as Intel’s four-by-four inch Next Unit of Computing mini-computer. Hyperconvergence is a natural model for edge computing, and the efficiency of Scale Computing’s HE150 enables IT architects to deploy the HCI model into spaces where the vendor’s competitors simply can’t go for IoT and remote manufacturing or logistics locations.”

“Technology is everywhere, and it’s increasingly important that edge computing be able to support an application-driven world,” said Jeff Ready, CEO and co-founder of Scale Computing. “Because limited IT resources are available at the edge, supporting those apps requires a tricky combination of enterprise-grade application reliability, autonomous management, and self-healing. The award-winning Scale Computing HE150 delivers on all fronts.”

The HE150 appliance combines Scale Computing’s self-healing platform for autonomously running applications at the edge with a small, all-flash NVMe storage-based compute appliance that delivers all of the simplicity, efficiency, and enterprise-ready virtualization associated with Scale Computing’s HC3 platform.

This announcement comes on the heels of other recent industry recognition, including:

The Storage Magazine 2020 Products of the Year Awards recognizes winners in five categories: Backup and DR Hardware/Software/Services, Cloud Storage, Disk and Disk Subsystems, Hyper-converged and Composable Infrastructures, and Storage System and Application Software. All enterprise storage products were judged based on technological innovation, performance, ease of integration, ease of use and manageability, functionality and value. Winners will be announced in February on SearchStorage.com and will also be published in the February issue of Storage Magazine.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

訊連科技U會議推出6.5版更新 支援200位與會者同時參與大型線上會議與遠距教學

【2020年12月25日,台北訊】多媒體創作軟體及AI人工智慧領導廠商訊連科技(5203.TW)推出「U會議」之6.5版更新。即日起,U會議版用戶可透過選購方式,提升同時與會者人數至200人。企業用戶可舉辦大型線上視訊會議,教育單位則可舉辦大型的遠距教學課程。同時,U會議也強化會議管控和操作功能,提供更安全便利之溝通工具。

訊連科技U會議推出6.5版更新 支援200位與會者同時參與大型線上會議與遠距教學

新冠肺炎(COVID-19)於全球造成重大影響,台灣也於近期啟動秋冬防疫專案,其中教育學習機關及洽公機關皆屬於高感染傳播風險場域。新冠肺炎疫情爆發以來,教育機構已大量採用遠距教學方式避免群聚,而各公、民營機構除控管訪客人數外,亦大量採用視訊會議取代傳統面對面會議、實體行銷活動(如:研討會)。U會議企業版可支援高達200位與會者之線上會議,便於舉辦企業行銷活動、大型跨國會議,或是應用於學校遠距教學等需求。

「本月『U會議』視訊軟體版本更新,可支援企業版高達200位與會者參與之線上會議,提供企業大型會議或行銷活動所需,學校教育單位也可做為遠距教學之溝通工具。」訊連科技黃肇雄執行長表示:「後疫情時代來臨,訊連科技持續優化『U會議』之管理操作功能,提供企業用戶安全易用之視訊會議和線上教學解決方案。」

此外,U會議6.5版亦進一步強化管控和操作功能,會議主持人可管控會議是否開放錄影,保障會議安全。會議進行時,可使用快捷鍵操作主要功能,如開關視訊或者靜音,強化使用便利性。

用戶可於即日起至U官方網站下載最新「U會議」6.5版,或透過程式內建的升級功能取得6.5版更新,體驗最新功能。

U會議6.5版新增功能

  • 企業版支援最高200位與會者同時參與線上會議。(可透過U會議官網選購Pro 200方案,請與訊連業務專員聯繫,進行購買及功能開通)
  • 會議主持人管控是否開放會議錄影,保障會議安全。
  • 會議主要功能(如:開關視訊、靜音等)皆可使用快捷鍵操作。

U會議產品資訊
訊連科技「U會議」,即日起可於U官方網站下載,並內建繁體中文、簡體中文、英文、法文、德文、義大利文、西班牙文、日文及韓文等九國語系。
您可根據與會人數及直播時間需求,選擇不同的U會議訂閱方案。

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

ESET commended with AV-Test Top Product awards for best Windows antivirus software

BRATISLAVA – ESET, a global leader in cybersecurity, has been commended with Top Product awards in the latest AV-TEST Product Review and Certification reports in both the business and home consumer categories. ESET Endpoint Security 7.3 and ESET Internet Security 13.2 – ESET  security products for Windows in the business and consumer lineups, respectively – achieved Top Product awards with perfect Protection and Usability scores in the August and October 2020 tests.

AV-TEST, a leading independent testing organization, uses one of the largest collections of malware samples in the world to create a real-world environment for highly accurate in-house testing and realistic test scenarios.

The tests evaluated the best Windows antivirus software for both home and business users, with all vendors being assessed across three main categories: Protection, Performance and Usability. In both the consumer and business evaluations, ESET’s solutions scored a perfect 6 in the Protection category, which measures the protection against malware such as viruses, worms and Trojan horses, and a perfect 6 in the Usability category, which measures the impact of the security software on the usability of the computer. Both solutions also scored near-perfect scores of 5.5 in the Performance category, which measures the impact of the product on computer speed in daily usage.

In addition to the excellent results, this past summer ESET received its 100th AV-Test certificate – this milestone marks ten years since ESET achieved its first certificate from AV-Test in June 2010.

Roman Kováč, Chief Research Officer at ESET, commented, “It is extremely encouraging not only to continue to receive commendations for our home and business security solutions, but also to be recognized for ten years of consistent and outstanding results in third-party testing. At ESET, we are extremely proud of our work in making technology safer. This recognition from AV-Test reaffirms that our solutions are proven to work in real-world scenarios. Businesses and home users can be confident that they are in safe hands with ESET. After a year like no other, it has never been more important for your sensitive information and data to be protected with advanced security software both at work and at home.”

Learn more about ESET’s home and business solutions for Windows here.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×