Skip to content

What Is a Password Manager?

With so many of our everyday activities now taking place online, the number of online accounts you have to juggle can be overwhelming. In theory, no one wants to get their online accounts hacked, especially when their personal information is at stake. In practice, however, Singaporeans are largely careless with online password security, with 50-70% of them using the same password across multiple online accounts.

Now that working from home and outside the safe confines of the office intranet is the norm, the number of passwords you need may have significantly increased. If even one of those accounts is compromised in a data breach, it doesn’t matter how strong your password is, hackers can easily use it to get into your other accounts.

The safest method to save them, however impractical it sounds, is to memorise all your passwords. But with password measures being ridiculously complex (passwords should be long, contain an uppercase letter, a number, and a special character), memorising all of them can be a tough task. The solution is to offload that chore to a password manager, which offers a safe vault for all your passwords across all your online accounts.

What is a password manager?
Despite the increase in data breaches, Singaporeans still practise poor password hygiene and are in the habit of storing their passwords on a computer, writing them down, and using the same passwords for both work and personal accounts. 

The overarching reason behind such behaviour is the difficulty of generating and remembering strong passwords. However, you can ease this burden by automating both those tasks with the help of a tool called a password manager. A password manager can provide a secure, automated, and digital way to both generate strong passwords and save them for you. It can generate a strong, new password whenever you create an online account or are trying to change a password, as well as store your passwords securely.

Password managers don’t just stop there. They also come in handy for storing other vital and sensitive information such as credit card information and bank details. All users have to do is store all this information in the password manager and secure it with one master password, similar to a master key.

Why do you need to use a password manager?
Passwords are stolen and guessed all the time. In fact, a variant of the malware Mirai unsettled Singaporeans in 2019 by targeting system vulnerabilities through brute-force attacks, a method where hackers try out various combinations of usernames and passwords in an attempt to correctly guess yours.

That’s not all. Singaporeans are also experiencing a rise in phishing scams on websites and emails where threat actors try to trick them into handing over their password. Although websites are meant to scramble your passwords whenever you enter them, not all websites use strong algorithms to do it, which makes it easier for hackers to unscramble your password.

This is where password managers can help you by generating long and complex passwords that are infuriatingly tough for hackers to unscramble. Apart from that, password managers also relieve you of the daunting task of remembering multiple different passwords for your online accounts, and protect you from harm arising from a data breach, acting as a powerful way to keep out hackers.

Password managers also provide autofill options that allow you to obscure your passwords from onlookers and prevent credential stuffing attacks, where hackers use your user login details stolen from other less secure services or sites to log into other sites in hopes of gathering sensitive or personal information that can be used in other scams or attacks.

What makes a password manager safe?
Password managers enable users to practice good security hygiene by making every password unique and sufficiently complex. However, the underlying reason is that password managers, such as the one in ESET Smart Security Premium, make use of what is known as the zero-knowledge security model. What zero-knowledge security means is that while the password manager tool knows your passwords, the organisation that made it does not.

This model comprises 3 layers, namely the encrypted data of the users, the tool’s password (which is not stored on the system), and the security key. These layers of defence all rule out any exposure to passwords and greatly reduce the risk of a password being stolen or being obtained by a cybercriminal. To learn more about password managers, click here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Bridging the Gap Between IT and OT and How the Rapid7 & SCADAfence Partnership Leads the Way

It’s been over a decade since the headline-grabbing Stuxnet virus was introduced and the concept of nation-state-sanctioned cyber attacks was presented by security professionals. The concern about different cyber threats which could exploit and potentially destroy physical assets and even human lives grabbed the attention of different industrial organizations. Cyber attackers’ pursuit of the different vulnerabilities in these organizations’ assets could lead to exploitation in operational technology networks.  

Despite the early warnings in 2010, only in the past five years has there been an increase of nation-state attackers becoming more prevalent as seen in the recent Solarwinds attack, which was credited to nation-state actors with alleged Russian ties. Cybercriminals are deploying ransomware attacks as their method of choice when attacking different industrial organizations. Over the past 12 months, there have been different successful ransomware attacks on different industrial industries which include the Colonial Pipeline attack and  SNAKE / EKANS attack.


Figure 1: The rising growth of ransomware attacks

These attacks have put a focus once again on the vital importance for all industrial organizations to secure their Operational Technology (OT) environments. OT networks and devices are the heart of automation for industrial assets and unlike newer technology, they are less segmented by virtue of the older industrial infrastructures connecting to the internet and integrating new services in their equipment.

Industrial organizations have been forced with new obstacles, such as remote access and third-party services, which has created a larger attack surface for cybercriminals to exploit OT networks and organizational physical assets (such as the attack on the city of Oldsmar, Florida.) This increasing attack sector has created a newer approach concerning how to secure OT networks and devices while ensuring the more modern IT security methods don’t create new doors for cybercriminals to exploit. Traditionally OT security teams were not in charge of advanced threats and IT security, and thus the need to converge OT and IT networks and systems are becoming more popular by the day with industrial organizations.  

When organizations begin to converge their IT and OT systems, they must align their OT network with the same concrete security controls which are deployed on their IT network. By enforcing the same level of IT security controls on the OT network, it provides industrial organizations the ability to detect and mitigate different cyberattacks with an additional layer of defense. Implementing an effective OT security strategy demands a complete audit trail of security incidents while providing full visibility of any lateral movement in the OT network. 

OT Systems Create More Challenges For Security Teams 

Nothing in life is a simple task and this is especially true when it comes to securing OT systems and networks. With the increasing usage of IP-based communications with OT devices, there is a bigger challenge between OT & IT teams in understanding who is in charge of securing OT systems. Additionally, securing this space is not an easy task. Many traditional networks that were once disconnected, for example, power plants and water systems, are now connected with cloud-based smart management tools. This has created more security risks as OT technologies are updating with the modern Internet. 

As more Industrial Control Systems (ICS) are moving to be digitalized, the result is an increased attack surface which has allowed these systems to become a favorite target for mischievous cyber attacks. Over the past decade, IT environments have quickly evolved to adopt and implement security as a key element of managing IT environments. However, OT hasn’t evolved to the quick pace of the attacks and only now are implementing the right amount of security for OT systems and networks. On top of being late bloomers to adopting and implementing security, OT industrial engineers did not think about security when creating the industrial protocols which have been in place for years. 

Moving forward to the present day, the industrial industry has adopted a plethora of protocols that cover productivity and security in the newly adopted smart production environments. These industry protocols have created a massive challenge for asset owners as they are hindered to strive with security due to not having complete visibility of their OT networks and devices, lack of monitoring and not having effective security solutions to detect and respond to security attacks. 

On top of not being able to completely secure and monitor OT systems, it’s a challenge for OT teams to have a better understanding of their OT equipment as they are sensitive to network scanning. When an OT system is sent unexpected data or more data than it can handle, it can result in a failing activity log which creates the idea of making monitoring a bit more challenging. Additionally, ICS networks use more PC servers and remote workstations which is a recipe for a more twisted attack surface that is a combination of enterprise services and cyber physical systems. To solve these complex security challenges, the approach that industrial organizations need to take is to adopt security for both fronts and get a better understanding of which systems are more perceptive to OT active monitoring.

How Rapid7 & SCADAfence Help Improve Visibility in OT / ICS Environments

With these different security challenges in place, industrial organizations can surmount the challenges by adopting a security system that provides complete monitoring of OT systems and networks. The security system should provide an assessment of different vulnerabilities in both the IT and OT environments. Security teams need to have a clearer understanding of what is occurring with OT systems and networks and how cybercriminals are designing their attacks to exploit the OT systems through the IT environment. Additionally, industrial operators need a better understanding of all their assets and devices in their production environment, especially in their IT and OT equipment. 

To help industrial organizations improve their IT and OT visibility we have partnered with Rapid7. Now, customers can integrate SCADAfence with Rapid7’s leading vulnerability risk management solution to leverage visibility into their OT assets and devices. Additionally, customers gain in-depth information around OT networks and identification of cross-site communications and connections between devices with potentially exploitable vulnerabilities. 

By integrating SCADAfence and Rapid7 all under one roof, organizations can detect, assess and mitigate across the IT and OT infrastructures while improving the visibility of all their assets. By automating OT and IT security with SCADAfence and Rapid7, customers are achieving full coverage of their IT and OT systems. This is the right step to accurately defend against cybercriminals and nation-state cyberattacks on operational technology systems.  

To learn more about our partnership with Rapid7, please visit: https://l.scadafence.com/rapid7-scadafence-joint-partnership

On top of our joint technical partnership and integration, SCADAfence’s research team is continually working with Rapid7’s on their annual vulnerabilities report. Read the Rapid7 2020 Vulnerability Intelligence Report to learn more about our researchers work in securing physical systems in a digital world and the OT threat landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

Scale Computing Delivers Highly Available, Efficient, Scalable IT Infrastructure to Educational Institutions

INDIANAPOLIS – MAY 25, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced ongoing momentum with customers in education, as its HC3 platform enables educational institutions of all sizes to optimize operations with self-healing, automated infrastructure for all applications in the classroom, the campus, and beyond.

“Educational institutions require powerful systems that can run workloads with efficiency and speed. HC3 allows you to manage any workload of any size, while leaving more resources available for learning,” said Jeff Ready, CEO and co-founder of Scale Computing. “With the new American Rescue Plan Act of 2021 and Coronavirus Response and Relief Supplemental Appropriations Act, education leaders at every level will have federal funding available to invest heavily in new technologies in preparation for greater online learning, summer programming, and the 2021-22 school year. Scale Computing’s HC3 platform combines servers, storage, and virtualization into a single solution to make IT infrastructure easier for schools and universities of every size.”

Educational institutions continue to face tremendous challenges from the past year with the growing demands and pressures of remote learning. Scale Computing’s award-winning HC3 uses self-healing and automation to simplify management, maximize application uptime and performance, and protect data. Scale Computing also celebrates three recent wins in the education sector with new partnerships with Hood College, Virginia Tech, and Community High School District 218.

Auburn University earns its reputation as a premier public institution in part for how it embraces information technology. Like most institutions of higher education, each college within Auburn University functions autonomously from one another with the respective dean deciding how best to appropriate their respective budgets and staff various departments in the interest of its students and programs. Scale Computing’s HC3 platform brings storage, servers, virtualization and management together in a single, comprehensive system. With no virtualization software to license and no external storage to buy, HC3 products lower out-of-pocket costs and radically simplify the infrastructure needed to keep applications running. HC3 products make the deployment and management of a highly available and scalable infrastructure as easy to manage as a single server.

Joel Beckum, IT Coordinator, Auburn University noted, “Scale’s HC3 solution does everything that I need it to. It simplifies my network infrastructure so that I can be an expert. I was a desktop support guy who’s now a system admin. Scale Computing makes me look like a pro. As far as my users know, I’m a genius.”

The New Albany-Floyd County Consolidated School Corporation is a public school district and has operated as a separate governmental unit since 1956, enrolling approximately 12,000 students in pre-kindergarten through high school programs, and employing more than 1200 full-time personnel. When the school district needed to support immediate work from home solutions in response to COVID-19, they turned to Scale Computing. Leveraging virtual desktop infrastructure (VDI) technology, Scale Computing packaged two virtual machine images customers can download for free, and put together a how-to video and trained technical support staff to assist them in deploying the remote work technology solution. The VDI Connection Broker, Gateway, and Agent provide easy, intuitive configuration and management for the Scale Computing HC3 environment, whether using remote access, only on-premise access, or a combination of both. No additional devices or services are needed to get organizations up and running quickly.

As Chris Bowers, IT Manager at The New Albany-Floyd County Consolidated School Corporation, said, “When the work from home order was delivered the administrative offices needed connectivity and access, but many of the staff did not have a computer at home. Purchasing laptops was not going to happen in such a short time frame, and we did not want the security risk of opening up VPN connectivity to devices we do not manage.”

Bowers continued, “Luckily, we did have Chromebooks on hand and we issued those to people who needed them, but critical applications were a mix of web-based and internally-hosted applications. Scale Computing had emailed their customers with details for a fast solution, and it met our needs. The message claimed deployment would be in an hour or less, and honestly we didn’t really believe it. But it was true – we timed it and we were able to finish deployment in just under an hour. We had the school staff up and running, working from home, and we haven’t received a single support call since. It all just works.”

Willard Public Schools, an award-winning public school system in Willard, Missouri, has been relying on HC3 since 2011 for its long-term, future-proofed IT infrastructure to power its educational institutions. After its 2011 implementation, Willard Public Schools decided to replace all of its remaining legacy infrastructure with Scale Computing, creating an all-in-one hyperconverged solution with reliability, maximum availability, and ease of use. With HC3 as its IT foundation, Willard Public Schools has a future-proofed, efficient, high-performing IT infrastructure. Simplifying its entire IT infrastructure allows Willard’s IT team to focus on more strategic projects.

Willard Public Schools’ technology director Scott Wooldridge noted, “With nine schools spread out across the district, we needed an IT infrastructure that didn’t require us to devote additional time or resources to manage the technology. With HC3, we found a solution that checked all the boxes and allowed our IT team to focus on more strategic projects. Not only is it self-healing and reliable, but it actually does what it says it will.”

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

ESET comes to RSA Conference 2021 with research on Android stalkerware and XP exploits

BRATISLAVA – ESET will highlight its latest and as yet unpublished research during the RSA Conference 2021 taking place virtually during May 17-20. ESET researchers Jean-Ian Boutin, Zuzana Hromcová and Lukáš Štefanko will provide a deep dive into Windows XP exploits and Android stalkerware.

Both presentations will take place on the opening day of the conference on May 17. ESET researcher Lukáš Štefanko will address “Security: The Hidden Cost of Android Stalkerware” from 11:20 to 12:00 PDT (20:20 to 21:00 CEST). Stalkerware is used to spy on users by gathering, transmitting, and storing their personally identifiable information. ESET Research has discovered serious vulnerabilities in Android stalkerware apps, and their monitoring servers, that could result in serious user impact if exploited.

“Mobile stalkerware is a popular threat sold legally on various websites,” explains Štefanko. “Based on ESET telemetry, the number of detections of stalkerware in 2020 rose by 48% compared to 2019. I will cover more than 80 different families of Android stalkerware and focus on security issues and privacy flaws in their code.”

Immediately following Štefanko, Head of Threat Research at ESET Jean-Ian Boutin and ESET researcher Zuzana Hromcová will take the virtual stage with “Beyond Living-Off-the-Land: Why XP Exploits Still Matter” from 12:05 to 12:45 PDT (21:00 to 21:40 CEST). Living-Off-the-Land refers to a technique where attackers use legitimate, preinstalled tools to carry out their malicious operations.

“This presentation will introduce evolution of this technique and explain how vulnerable binaries can be leveraged to replace the well-known and well-mapped living-off-the-land binaries”, says Hromcová.

“A vulnerable Windows XP DLL can quickly turn incident response into a nightmare, even on non-XP machines. Learn from ESET’s experience and leverage our guidance to fortify your defenses against this emerging trend,” adds Boutin.

To watch the presentations live, register at the RSA Conference 2021 website. Check the full agenda to find out which pass is the most accommodating to your interest.

However, if you cannot join the event live, ESET will release a white paper during the RSA Conference on Android stalkerware by Lukáš Štefanko. Check out WeLiveSecurity where the piece will be published. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×