Skip to content

How are businesses of different sizes using FinTech solutions?

For the purposes of this blog, we have categorized small businesses as comprised of 2-49 people, medium as comprised of 50-499 and large as comprised of 500+.

Small and medium-sized enterprises (SMEs) have long been underserved by traditional financial providers. Yet, over the past few years, we have seen new FinTech offerings come to the marketplace designed specifically for small-scale operations. FinTech is no longer a choice restricted to the big corporations. We have seen innovative ways to make payments, manage money and get financing for businesses of all sizes.

Indeed, FinTech companies are broadening their offerings by designing solutions for small businesses. In return, small businesses are actively investing in new technologies, with 42%, in a recent ESET survey, aiming for better security of their finances. While this may not be quite as high as medium (80%) and large enterprises (81%), it seems that COVID-19 has acted as a catalyst, with the survey also finding that 62% of small businesses believe the pandemic has increased the need for improved security of finances.

The benefits for businesses investing in FinTech include reduction of costs, ease of use and lower barriers to entry. However, as the size of an organization naturally correlates with the budget available to spend on new technologies, here, we take a look at how different-sized enterprises have chosen to prioritize their use of FinTech solutions.

Online payments and accounting take the lead
It is perhaps no surprise that accounting functions like online payments and invoices showed the highest adoption rate for businesses of all sizes. From a list of various FinTech solutions, online payments was the most widely adopted by small (46%), medium (58%) and large (59%) businesses alike. This was closely followed by online accounting (small 41%, medium 57% and large 53%), online invoice financing and discounting (small 31%, medium 49% and large 47%), and online cashflow management (small 28%, medium 48% and large 45%).

Clearly, digital accounting has become a significant tool for small businesses, due to the benefits of streamlined systems, increased speed and productivity, and improved data security. Contrary to the notion that it is unnecessary for SMEs to digitalize due to their small scale, SMEs stand to benefit massively from adopting digital technologies to increase productivity, as well as to secure data and financial processes during recovery from the pandemic.

Big fish go for forward-thinking technologies
Where we see the medium and larger organizations storming ahead with their focus and investment is in the more forward-thinking FinTech solutions. So, while small businesses are dipping their toes in digitizing their accounting functions, medium and large businesses are further ahead in their use of branchless banks, online lending, InsurTech and RegTech.

Of these four forward-thinking technologies, InsurTech was the most adopted by medium (40%) and large (36%) businesses. According to a report by Deloitte, the pandemic shifted priorities toward increased investment in InsurTech because of the technology’s promise of “bolstering virtual customer engagement and operational efficiency.” The report states that “the amount of money invested in InsurTechs during the first half of 2020 remained remarkably robust, at nearly $2.2 billion.”

The COVID-19 pandemic has shifted the focus of all businesses, with many prioritizing plans to reduce costs, increase productivity and secure finances. FinTech solutions can offer a helping hand; it’s reassuring to see that some small businesses are benefiting as well.

For more information on how ESET can help businesses, head to our business solutions page

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Security or uninterrupted work? With Safetica 9.9 you get both.

A healthy balance between tight security and a pleasant user experience has always been Safetica’s priority. With the latest version, DLP blocking policies do not necessarily interrupt users’ work, since the admin can allow trusted users to override DLP policies and perform their desired actions without asking for help. 

Such events are recorded and can easily be audited. Thanks to users’ comments, the admin will be able to understand the context of the events much more clearly. 

User override can be configured for each policy, enabling you to control which situations and users should be allowed this flexibility. 

Control when file content scan is needed and when it is not

When your users repeatedly work with sensitive data and you know they do so in a secure way, there’s no reason why DLP should slow down their work. 

With the new Safetica version, simply create a top priority “allow” policy which describes safe operations, places, and users. Safetica will stop file scanning for such events and will allow users to work at full speed. Simple as that. 

Control data upload to non-company Git repositories

Whether you use Git for managing source code or as a document versioning system, Safetica can now help your users work with Git securely. Work with company repositories remains 100% uninterrupted, but you can easily prevent users from pushing changes and data to non-company repositories. 

Performance and security improvements

As usual, the new version comes with dozens of optimizations and bug fixes, this time focused on backend performance and faster work with records in both Safetica Management Console and WebSafetica.

Safetica Mobile users will surely welcome the increased security of our new iOS certificates. 

Announcing public beta of Safetica 9.10 with OCR!

For the first time ever, we are announcing the availability of a public beta for an upcoming version of Safetica 9.10. It will include Optical Character Recognition (OCR) and brand new content inspection technology.

OCR allows you to inspect scanned PDF documents and image files and protect them the same way as other documents. With the new content inspection technology, you also get better control over what files should be inspected and an extended list of supported file types. 

We have already tested the beta version thoroughly but want to validate its real-life performance on more variable environments. Once we are 100% certain that everything works flawlessly, we will make Safetica 9.10 available to all our customers.

Author Ján Lakatoš

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Violence and Redemption: SNMP Protocol History

You know what it is, but do you know SNMP protocol history?

There was a dark time, more than dark, sepia or beige, in short, that tone in which we find the photos of our grandparents inside the drawer of the oldest and worst decorated closet in our house. A time that is hardly talked about anymore, but that points us as a weapon so that we continue to keep it in our memories. Those were the times of bank robbers and speakers, old rolls, borsalino hats and cameras with lightbulbs, they smoked more, the police were still called “coppers” and toothpaste brands had not yet produced any flavored toothpaste, not even menthol. We go back that far to get to know more about SNMP protocol history.

In this house, Pandora FMS blog, we had already talked before about the relation of the SNMP protocol with the noir part of life. It was hard, few reported that case, but we got to the media, and they, from Newcastle Tribuna to the smallest local newspaper, have endlessly asked us to come back and delve into the subject. That is why we want to make a little review of SNMP protocol history, a story full of caramel nuances and fish bones, swimming pools on the outskirts and tombs in the desert, long and slender legs and hard knuckles like the piles of prelates or pontiffs.

Naaah, in fact, if we want to find out SNMP protocol history and its evolution throughout the years, we just have to go back a couple of decades, no more. In 1988, we started having some news for the first time about this famous protocol. The 80s, pal, a very hard time too, we don’t want to take away any of its prominence. Leg heaters, carded hair and Mustangs ruled. It was around this time that what we know as the first data networks began their journey. More and more “cooler” and more and more widespread around the world.

At that time, with an administrator it was enough for an “analog” or manual way to understand a whole network infrastructure of a company. You can guess the kind of network infrastructure that could exist in a company at that time… It was made up of scarce resources or equipment because the immeasurable variety of services that are provided today did not exist, nor users, nor anything similar.

It was not until more or less the arrival of the 2000s, time of Nokias with poly tones, the return of the bell bottoms and the consolidation of Britney Spears at the highest levels of the music scene charts, that computers, Big Daddy (Internet) and the rest of the technology reached the necessary parameters to accommodate things as far ahead of their time as the SNMP protocol.

The range of services and possibilities was that expanded thanks to convergent networks that we were finally able to handle all kinds of information and data, including voice and video. Infrastructures were expanded by force, and users began to flock like flies to honey. A failure in the system could no longer be accepted. The stakes were high.

That was the time for the proliferation of monitoring systems, yes, like Pandora FMS, owner and master of this blog and my skin. They were shown as essential gadgets for the tasks of technology departments of any company that wanted to stay safe from possible incidents and even anticipate them by detecting them in advance. Monitoring systems, servers, applications, networks, events and a long list of devices. Collecting information, just what we wanted to monitor, all to collect it and represent it visually, in order to carry out the necessary actions that our systems might require. What a monitoring progress!

Like coffee, a morning shower and the geek figures in the office, it is impossible to remove monitoring systems from the daily lives of network administrators, and most of these systems are based on the Simple Network Management Protocol, also known on the streets as the SNMP Protocol, which makes the exchange of management information between network devices easier and fills our lives with hope and management data.

And this is the thick and outrageous SNMP Protocol history. in fact, it has stayed with us for many years. From that first version to SNMPv3, so focused on security and administration… And for many years more old friend! I personally hope you see my grandchildren grow old and I see you get implemented in a crass, ineluctable and ad infinitum way!

Some of the sources used for this article:

https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

https://coreun.com/2020/07/08/la-monitorizacion-protocolo-snmp-y-su-evolucio

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Find out which virtual attacks are most common in companies and how to avoid them

We know that the protection and security of business activities and processes are of paramount importance for a company. This is because, in addition to cyber invasions being vastly frequent in the virtual space, they also offer several problems for a company, especially in the case of data leaks – whose action is intolerable by LGPD rules, for example.

For this reason, we understand that virtual attacks are actions provoked by cybercriminals, who seek to steal business and customer data in order to use them for illicit purposes. Therefore, it is important to know how to prevent cyberattacks and how to better protect our systems from cybercriminals.

Do you want to learn more about it? So, keep reading our post and get all your questions answered.

What are the consequences of cyberattacks for companies?

As we all know, the importance of knowing how to prevent virtual attacks in a company is crucial, as we are not only dealing with sensitive internal data, but also with our customers’ data.

Thus, we can predict some negative consequences for an organization as a result of the virtual attacks. Take a look at them:

  1. Unstable systems

In general, one of the issues that we need to take into account as a consequence of virtual attacks is the instability in the entire infrastructure of the company. In other words, this can mean weaker and slower systems, causing processes and activities to be interrupted so that the repair actions themselves can be initiated.

This process complicates the routine of work activities, disfavoring the quality and deadline for products and services to its end customers.

  1. Reduction of customers

As a result of a completely inefficient system, we ended up noticing the loss of customers in the medium term. Customers dissatisfied with products and services offered by a company tend to cancel contracts immediately, generating even more losses for the organization.

That’s because employee and customer data can be exposed, which tarnishes the brand’s reputation and makes it less competitive.

  1. Increasing costs

If computational and technological issues turn out to be frequent, repair and maintenance costs will also be higher.

This is because criminal attacks – when carried out efficiently – generate continuous losses, leading to the contracting of outsourced personnel for performing preventive maintenance and monitoring, in addition to the purchase of new equipment, software, and other items to stabilize internal systems.

The 4 most common virtual attacks on companies

Now that you know the concept and consequences of cyberattacks, check out the ones that occur most often in the business environment:

  1. Phishing

In general, phishing is extremely well-known for being basically a strategy to clone pages, websites, messages, among others. The criminal who uses this practice seeks to win customers by having them send personal data, thinking that they are getting involved with reliable companies.

A practical example of this type of virtual attack is when we regularly see some internet pages – be it from banks, streaming services, e-mail providers – asking for personal data in exchange for benefits and advantages.

  1. Ransomware

When dealing with virtual attacks, one of the most feared is, certainly, ransomware. In case you do not know, this type of attack is nothing more than an intelligent way to hijack sensitive data and information, asking for their release.

In practical terms, it can all start with malicious advertising, a social media trigger, or even a fake message.

After a certain employee of the company downloads a file with ransomware, the malware already begins to work on the computer system.

As soon as it is installed, the ransomware encrypts data and allows criminals to enter the company’s virtual systems and start browsing folders and documents, looking for personal information, data and bank accounts, strategies, among others.

When this occurs, the related processes for preventing virtual attacks become much more difficult.

  1. Spear Phishing

Spear Phishing is nothing more than another type of Phishing, however, it is focused on specific companies and employees who work in the virtual environment.

Thus, we consider that it is an invasion segmented by the criminals themselves, having techniques, devices, and tools of social engineering to elaborate deceptive schemes and share them as a completely harmless email, website, process, or even a downloadable file.

  1. DDoS

Currently, DDoS is considered one of the most powerful virtual attacks. This is because it is simply a “mix of actions” that are directed exclusively to the companies’ servers. In practice, it is totally controlled through a master computer, which in this case, would be the criminal behind the action.

With this, it works as if it were a type of system completely secure for the victims, and from there, it offers space for hackers and cybercriminals to exploit vulnerabilities to invade the virtual environment of companies.

Thus, one of the symptoms that the system itself can show is its poor performance.

How to avoid virtual attacks?

After understanding the seriousness of virtual invasions, we can now think of efficient ways to protect ourselves from these possible attacks:

  1. Using strong passwords

One of the first tips is to have the responsibility and awareness to create increasingly strong passwords, and preferably they should be different between each account. This makes access by cybercriminals much more difficult, since complex passwords end up not being deductible.

The greater the importance of a given systemic process, the more complex the password must be. Examples: bigger passwords for banking processes and applications, less complex passwords for internet login, among others.

  1. Using a good antivirus

There are several efficient antiviruses on the virtual market. So, search for the one that best fits your needs, taking advantage of all its benefits and ensuring that it understands all the fields of protection your business needs.

  1. Relying on specialized security companies

If your company does not know where to start or does not have a more complete idea of the security processes its working activities must have, it can be crucial to have the support of a company specialized in this subject. Therefore, look for a trustworthy brand, which has experience in the subject and an excellent reputation in the market.

In addition to your virtual information being under the care of highly trained specialists, you will have even more time to focus on more important business activities.

Conclusion

As we have seen, virtual attacks are extremely frequent and must be a factor to be taken into account by companies that wish to obtain excellence and quality in the market.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Understanding Microsoft Exchange Server vulnerabilities

Anyone who works with technology has certainly heard of or uses Microsoft Exchange, Microsoft’s server solution for email and calendar. Exchange is used worldwide by companies of all sizes, being preferred for its versatility and ease of use, and billions of electronic messages pass through it daily. However, even with all these advantages, Exchange is not free of flaws.

At the beginning of March this year, the giant creator of Windows released emergency patches for zero-day vulnerabilities that were discovered and were being exploited by malicious attackers to install malicious software through Exchange. Also called ProxyLogon, these vulnerabilities allowed improper access to e-mail accounts and data extraction, in addition to lateral movement in the infrastructure, affecting other critical devices.

The four Exchange Server vulnerabilities discovered were as follows:

  • CVE-2021-26855: CVSS 9.1: it is an SSRF (Server-side Request Spoofing) vulnerability, which results in HTTP requests being created by unauthenticated attackers. For this flaw to be exploited, servers must be able to accept untrusted connections over port 443.
  • CVE-2021-26857: CVSS 7.8: a failure in the Exchange’s Unified Messaging Service, allowing arbitrary codes to be implemented in the server’s SYSTEM. Nevertheless, this vulnerability must be combined with others or the attacker must have stolen credentials.
  • CVE-2021-26858: CVSS 7.8 and CVE-2021-27065: CVSS 7.8: Post-authentication arbitrary file write vulnerabilities in file paths.

These vulnerabilities are being exploited by a group called HAFNIUM, which operated in China and was supported by the Beijing government, and is primarily targeting organizations located in the United States. However, it is estimated that at least 10 other hacking groups are exploiting these same Exchange’s vulnerabilities in the form of ransomware or cryptoware. It is not yet known how the groups discovered the vulnerability and how the information reached the other hacker groups.

Also, automated attack scripts used in proof-of-concept have been found, which makes it possible for unknowing attackers to exploit vulnerabilities and further compromise servers around the world.

The malware developed by these groups allows the creation of a pre-authentication Remote Code Execution (RCE), which allows attackers to take full control of the servers without access to any Exchange credentials. One of the main malware created to exploit these flaws is the DoejoCrypt or DearCry ransomware.

DearCry uses a combination of AES-256 and RSA-2048 encryptions, renaming files with the .CRYPT extension, and includes a readme.txt file with instructions on how the victim can recover their original files.

If the victim has a backup of the files, one action would be to ignore the ransom requests and recover the environment. There are already records of ransom requests accounting for tens of thousands of dollars. However, even if there is no ransom payment and the files are recovered, there is a possibility that copies of the infected files are made by the ransomware, which can result in data leaks by malicious attackers.

At least 30,000 organizations of all types and sizes in the United States alone are believed to have fallen victim to campaigns orchestrated by HAFNIUM and other hacker groups based on flaws discovered by Microsoft. The total number of companies affected can reach hundreds of thousands worldwide though, as many of them are unaware that they may have been impacted by the vulnerabilities.

To try to protect Exchange users, Microsoft has launched an automated vulnerability remediation tool in March. The tool, developed mainly for customers who do not have specific security teams, allowed for a reduction in the risks associated with the exploitation of vulnerabilities while the patches were not properly applied. Microsoft has estimated that 92% of organizations applied security fixes related to the ProxyLogon vulnerabilities by the end of March/2021.

This type of attack further reinforces the need for companies to invest in specific cybersecurity teams, such as red teams, to test security controls, look for flaws and vulnerabilities, and correct them accordingly, causing the least possible impact. By structuring these teams, it is possible to ensure the proper management of assets, including e-mail servers, in addition to their respective owners. Thus, it is possible to guarantee that updates and fixes are installed as soon as they are released by the providers. The result is a reduction in the attack surface and a lower risk of cyberattacks, which can avoid millionaire sanctions provided for by data protection laws, such as LGPD and GDPR, in addition to permanent data loss, which can affect business continuity directly.

If your security team has not installed security patches yet, they must do so as soon as possible. Remember that installing updates may not ensure that your Exchange servers will not be affected by the exploitation of other zero-day vulnerabilities. Therefore, a scan of the infrastructure is recommended to find out if the environment has been affected by the exploitation of other flaws not yet discovered by the manufacturers; and if discovered, security teams should use efforts to identify and respond to any detected security incidents. This can make the difference between a minimum correction effort without major losses and loss of revenue and trust of customers, partners, and employees.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×