Skip to content

2022 年擺脫十大網絡安全壞習慣

2021 年依舊是網絡犯罪頻繁的一年,僅僅在上半年,就有近 190 億筆訊息被曝露,盤點十大網絡安全壞習慣,ESET 資安專家提醒保持警惕,積極主動去改善,相信您就可以擁有安全無虞的2022 年。

1. 沒有定期更新
電腦及設備上的操作系統、瀏覽器和其他軟件中的漏洞是網絡犯罪可以進行攻擊的主要方式之一,在 2020 年發現了超過 18,100 個,而這相當於每天有 50 多個新的軟件漏洞,而您只要一個動作打開自動更新功能並在出現提示時點擊更新,就可以如常您的生活及工作。

2. 不安全的密碼
對多個帳戶使用相同的密碼和易於猜測的憑證,為黑客提供了極大的便利,他們擁有破解弱加密的軟件,利用殭屍網絡(botnet)以自動化方式不斷使用偷來的登入憑證試圖登入網絡服務,稱為憑據填充(Credential Stuffing)。您可以使用密碼管理器來記住具強度的密碼並在提供它的任何帳戶上使用雙重身份驗證 (2FA)。

3. 使用公共 Wi-Fi
黑客可以利用相同的網絡了解您的互聯網使用情況、登錄您的帳戶並竊取您的身份。為了安全起見,請儘量避開這些公共熱點,若您使用時,也避免在連接時登錄任何重要帳戶。

4. 隨意點擊來路不明之連結
網絡釣魚是目前最大的網絡威脅之一,阻止這些攻擊的首要規則是在點擊之前三思而後行,與發送電子郵件的個人或公司仔細核對以確保其合法,不要被迫採取過於倉促的行為。

5. 未在所有設備上使用資安產品
在網絡威脅多變的時代,應該確認所有的電腦設備都有安裝專業且具知名度的資安產品,另外也請確認您的流動裝置(如平板…)是否也有這麼做?

6. 點擊不安全的網站
http:// 是網頁伺服器與您的電腦瀏覽器,以一般(非安全)模式在進行互動交談,所以內容有可能遭攔截竊聽;換句話說,在此類網頁上填寫傳送的資料有可能被有心人士看到。而 https:// 多了一個字母 S 的差別代表 ”安全(secure)”,基本上意謂著,您的電腦與伺服器間的資料傳遞是以加密的方式進行進行互動交談。

7. 工作的電子郵件被用於個人的日常
試想使用工作的電子郵件和密碼在消費性購物網站和其他網站上註冊,如果這些網站遭到破壞怎麼辦?黑客就有可能能夠劫持您的公司帳戶,另外使用未受保護的個人電腦設備進行工作其實也會增加額外的風險。

8. 通過電話提供詳細訊息
語音網絡釣魚(也稱為 vishing)是一種越來越流行的從受害者那裡獲取個人和財務資訊的方式,詐騙者經常偽裝他們的真實號碼以增加攻擊的合法性,所以請儘量避免透過電話發送任何敏感或重要訊息。

9. 沒有定期備份
勒索軟件每年給企業造成數億美元的損失,試想如果突然無法開啟您的電腦,裡頭所有的資料,都可能永遠丟失,其中包括家庭照片和重要的工作文件等等;根據 3-2-1 最佳備份原則,定期備份可在最壞的情況發生時,讓您高枕無憂。

10. 智能設備沒有被保護
近三分之一的歐洲家庭配備了智能設備,如語音助理、智能電視和監視器;但它們也同時連結網絡,也因此成為犯罪分子的目標,進而被劫持並變成殭屍網絡,對其他人發起攻擊,或者變成通往您其他設備和資料的管道。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

Privileged Access Management

Implementing privileged access management in a company is critical to ensuring that there are no information theft and other security issues.

The so-called cyberattacks are responsible, for example, for the theft and hijacking of information in exchange for money, causing several damages to the continuity of an organization’s business. They have become very common and their actions can cause not only financial losses but also image and reputation losses.

Unfortunately, the trend is that over the years, these cyberattacks will become more and more severe and that their number of occurrences will grow.

With this scenario, the importance of privileged access management also grows. Cyberattacks happen through classic malware and phishing methods or the exploitation of zero-day software vulnerabilities, in addition to advanced social engineering techniques.

With all that, privileged access management comes to help ensure that organizations function. Thus, it covers the need to protect data, networks, and devices from malicious actions.

Gartner, in its document Gartner Top 10 Security Projects, named Privileged Access Management (PAM) as the number one priority in security projects. So, what does Privileged Access Management mean and why is it considered so important? That is what we are going to talk about today.

What is Privileged Access?

Before explaining what Privileged Access Management is, we need to understand what privileged access or credential is.

All the time, malicious people appear looking for flaws within the companies’ systems to gain access to confidential data. This threat can be both external and internal. Therefore, organizations are increasingly looking for solutions that are truly capable of protecting this information.

Privileged accounts are created to control access to this data. This access is usually restricted only to people who hold leadership positions (high-level management) and administrators in the IT area. Other employees can obtain this information with the authorization of the company.

Through privileged credentials, significant changes can be made to devices and applications installed on an infrastructure, which in many cases can affect business continuity. The impact of using them maliciously can cause serious damage, from violations of compliance items, which can lead to heavy penalties, to security incidents – which result in reduced trust by the interested parties and lost revenue.

Although it is extremely important, proper control often ends up being flawed. Hence the need to have a tool really capable of directing, tracking, and filtering these accesses. Among the most efficient, we have PAM solutions.

What is a Privileged Access Management (PAM) solution?

Privileged Access Management, also called Privileged Identity Management, enables organizations to protect their privileged credentials. In addition, PAM also ensures the effectiveness of least privilege policies by reducing attack vectors and possible data leaks.

Gartner believes that a PAM solution helps organizations securely provide privileged access to critical assets and meet compliance requirements by managing and monitoring privileged access and accounts.

Basically, a PAM solution works as a secure credential repository for devices installed in the environment. Based on the management of user privileges, one can allow users to access only the data required for them to perform their activities. Thus, the information security team can configure user access profiles, avoiding improper access to systems and data.

What is the Principle of Least Privilege?

The principle of least privilege is one of the bases for information security. Its main goal is to grant users access to environments that are required for them to perform their tasks. In other words, with the principle of least privilege, users do not access environments they do not require, avoiding internal threats, data leaks, and hacker infiltration in critical environments of a company.

Through the senhasegura solution, you have several security locks that ensure users access only the environments required by them. Besides monitoring the way the user is performing privileged access, the senhasegura solution registers, records, and notifies those responsible for information security about any malicious activity within the privileged session.

Through this simple practice, they significantly minimize the chances of a cybercriminal accessing sensitive company data and extracting information.

How is Privileged Access Done?

Privileged access to devices can be performed in two ways: manually (least recommended); and through specific Privileged Access Management (PAM) solutions. In this second case, PAM controls administrative access to a company’s critical systems to help it achieve its cybersecurity goals.

Controlling privileged actions allows one to protect a company’s IT systems against any attempt to carry out malicious actions, such as improper changes in the environment and theft of information. These blocked actions can take place both inside and outside the company.

In this context, using privileged access management technology is essential to optimize the deployment of a cybersecurity infrastructure in companies.

Moreover, the need for effective use of privileged access management techniques has never been greater, as traditional defense mechanisms such as antivirus, VPNs, and firewalls are subject to many failures today.

Thus, a PAM solution should be able to:

  • Allow a company to set several flexible parameters for privileged access control, such as window access, access restrictions for specific users or systems, or access limitation to resources required to perform a task;
  • Be a single repository of administrative credentials across all systems and environments within an organization, resulting in reduced audit time and incident investigations;
  • Link role-based user control to critical systems, applications, and services, thus allowing the connection between a privileged user and an individual, which improves granularity of control and visibility;
  • Provide a scalable, searchable, and comprehensive audit and reporting solution for user activities on critical systems, with the ability to view commands and sessions on those systems.
  • Centralize privilege visibility and control across a single management, policy, and reporting platform for all devices and users, resulting in increased efficiency and unification of the management approach across the environment.
  • Integrate auditing activities for user tasks such as Syslog with other monitoring and reporting technologies such as SIEM (Security Information and Event Management).
  • Strengthen the policies of least privilege for granular control of administrative rights, while facilitating elevation of privileges without the need to assign administrator or root access.
  • Escalate management of all credentials across a range of operating systems and platforms.

Through an architecture that requires no agent installation, senhasegura offers a centralized access point for critical systems. Its features allow strengthening the access control, limiting the user access only to what was previously authorized, respecting the principle of least privilege.

Thus, senhasegura offers full visibility of who has access to these systems and what actions have been taken with the privileged credentials.

Some features of senhasegura include:

Credential Management

Allows secure password storage and centralized access management. From the definition of Access Groups for segregation of roles, one can configure pre-approved or emergency access, or start from workflows with single or multiple approvals, without the user having access to the credential password.

Session Recording

Allows tracking of any action taken during a privileged session to meet any audit or data privacy authority’s demand. In addition, the livestream feature allows real-time monitoring of ongoing sessions and the possibility of remotely ending a session;

Application Identity

senhasegura uses its own template for changing the password of application credentials and stores the new encrypted password in its database. The credential can be viewed directly by the solution’s connection API or inserted directly into the application server connection pool.

When used to manage privileged access on organizational systems and platforms that store or protect the integrity of sensitive data, senhasegura provides a centralized access point for critical systems. Its features allow strengthening the access control, limiting the user access only to what was previously authorized, respecting the principle of least privilege.

Thus, senhasegura offers full visibility of who has access to these systems and what actions have been taken with the privileged credentials. Finally, control and visibility on privileged actions are key factors for an organization to comply with a range of regulatory requirements for system protection. This ensures compliance and business continuity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

What is SOC 2 Compliance?

Major ransomware attacks and serious data breaches still dominate the news headlines. Companies must show dedication to cybersecurity if they want to protect data and gain the trust of potential and existing consumers.

For any business wishing to offer the highest level of commitment to partners and clients, SOC 2 is a well-known audit and a reliable validator. SOC2 Certification is a good idea for companies that have their own product and want to ensure product security, confidentiality, and availability to their current or new customers and partners. Businesses that outsource some of their data operations prefer to work with secure contractors who can provide evidence of putting optimal security policies into place and thoroughly protecting sensitive data. Vendors who have earned SOC 2 Certification are the ones who have implemented policies with the necessary levels of security throughout their organization to safeguard data.

This article will clarify the SOC 2 audit process along with the functions of SOC 2 auditors.

What does SOC 2 Compliance Mean?

SOC 2 (Service Organization Controls 2) is both an audit procedure and criteria that specify how an organization should manage internal controls.SOC 2 is a set of security and privacy standards and compliance requirements designated by the American Institute of Certified Public Accountants (AICPA). It was geared toward technology-based companies that use cloud-based storage of customer data or a cybersecurity compliance framework The primary purpose of SOC 2 is to ensure that third-party service providers store and process client data in a secure manner.

What Is The Difference Between SOC 2 Type 1 and Type 2

There are two types of SOC 2 reports Type I and Type II

SOC 2 Type I report

  • evaluates a company’s controls and attests an organization’s use of compliant systems and processes at a specific point in time
  • describes the controls in use by an organization and confirms that the controls are properly designed and enforced and they fulfill the required Trust Services Criteria

SOC 2 Type II report

  • includes everything that is part of a Type 1 report, along with the attestation that the controls are operationally effective and function as intended
  • assesses how the controls function over a period of time, generally 3-12 months.

When deciding between the two, take into account your objectives, budget, and time constraints.

You can start with the SOC 2 Type I report, however you will probably require a Type II report at some point because many clients are rejecting Type I reports.

Why SOC 2 Compliance Is So Important and Which Benefits it Gives to Business

Even though SOC 2 compliance is not mandatory, clients frequently demand it from the companies they do business with, particularly for cloud-based services, to guarantee the security and privacy of their data. Service providers or SaaS businesses that handle, store in the cloud, or transport consumer data are strongly urged to implement SOC 2. Being SOC 2 compliant, which is determined by an independent technical audit, guarantees that you have the protocols, infrastructure, and technologies in place to safeguard your clients’ and customers’ information from illegal access from both inside and outside the company.

SOC 2 compliance entails the following:

  • Your business is aware of what typical operations involve, and you constantly monitor any suspicious or unusual activity, document system configuration changes, and keep an eye on user access privileges
  • You have the required tools in place to identify threats, notify the appropriate parties, and take action to protect data and systems from unauthorized access or use
  • You will be provided with the required information about any security incidents so that you can assess the severity of the issue, make the necessary system or process alterations, and restore the integrity of the data and processes

Benefits of SOC 2 Certification:

  1. Reputation and Trustworthiness
    The SOC 2 Certification shows that the company has taken all necessary precautions to prevent a data breach, which fosters strong credibility and trust with clients and business associates and protects and improves the company’s reputation. SOC 2 demonstrates to your clients that you are actually trustworthy with their data.
  2. Competitive Edge
    With SOC2 Certification you have an advantage over your competitors in terms of both operational market and sales potential since businesses only want to work with secure vendors that have put in place the necessary precautions to prevent data breaches. A SOC 2 Certificate differentiates your business from other businesses that do not have it and have not invested any effort or money into SOC2 compliance.
  3. Better Quality Services
    A SOC 2 audit can help you enhance your security mechanisms and operational efficiency. Processes and controls can be optimized based on your organization’s awareness of the cyber security risks that your clients encounter. This will enhance your services in general. SOC2 Certification assures your customers of implemented security measures for preventing breaches and securing their data and ensures that the system is protected against unauthorized access (both physical and logical).
  4. A “must-have” for IT organizations and commitment to IT security
    SOC2 Audit & Certification proves your company’s unwavering dedication to general IT security as the cloud steadily overtakes on-premises storage. Customers receive reassurance that their data is secure and that internal policies, processes, and procedures have been matched to industry best practices. SOC 2 involves more than just certification or adhering to the five trust principles. It`s setting up a safe and secure system within your company which is very important.
  5.  Compliance
    Companies and corporations can show their dedication to data security and privacy by adhering to SOC 2 standards. The standards of SOC 2 are consistent with those of other frameworks, such as HIPAA and ISO 27001 certification. As a result, after you have obtained SOC2 Certification, it will be simpler for you to comply with additional regulatory criteria. It might speed up your company’s overall compliance efforts.

    Your company risk and security posture, vendor management, internal controls, governance, regulatory supervision, and much more are all covered in a SOC 2 report. Achieving compliance may also prevent your company from fines and other legal repercussions.

Who Can Perform a SOC 2 Audit?

A SOC 2 audit can only be performed by independent CPAs (Certified Public Accountants), specifically those specializing in information security.

The AICPA’s set of professional standards governs SOC 2 auditors’ work. The preparation, execution, and oversight of the audit must also adhere to a number of rules. Additionally, a peer review is required for all AICPA audits.

In order to prepare for SOC audits, CPA companies are permitted to employ non-CPA individuals with relevant information technology (IT) and security expertise; however, CPAs are still required to deliver and disclose final reports.

The service organization may put the AICPA logo on its website if the CPA’s SOC audit is successful.

A verified SOC 2 report is valid for a year from the date it was issued. A licensed CPA firm’s external auditor must also complete all future annual audits.

What are SOC 2 Trust Services Criteria (TSC)?

When it comes to data security, the SOC 2 Trust Services Criteria (TSC) is one of the most critical standards. These standards cover everything from physical security to data encryption. Once an organization decides to undergo SOC 2, one of the first steps is identifying which of the five Trust Service Principles to include in the report:

  • Security
  • Availability
  • Processing Integrity
  • Confidentiality
  • Privacy

An organization can choose to address one or more of these principles, while Security is mandatory. Not all the principles are required to be addressed, but, it is preferable that the principles applying to the organization and the services it provides to its customers, should be included.

Security

This principle requires that information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity’s ability to achieve its objectives. Organizations can achieve this by using elements and strategies such as firewalls and two-factor authentication. These components make it harder for unauthorized people to access your data.

Availability

The availability principle requires that system operations and services are available for authorized use as specified by the customer or business partner. To meet these criteria, organizations must have a written policy that includes measures to prevent, detect, and correct interruptions to service availability. In addition, the policy should address system maintenance, capacity planning, incident response, and business continuity.

Processing integrity

This principle states that all business systems and controls must protect the confidentiality, privacy, and security of information processing. It refers to the completeness, validity, accuracy, timeliness, and authorization of system processing.  Processing integrity addresses whether systems achieve the aim or purpose for which they exist and whether they perform their intended functions in an unimpaired manner, free from error, delay, omission, and unauthorized or accidental manipulation. To meet this principle, organizations must have security controls to protect data from unauthorized access and ensure that companies process data consistently and accurately.

Confidentiality

This principle requires organizations to design and implement controls to safeguard the confidentiality of sensitive information. It is crucial for SOC 2 compliance as it helps to ensure that only authorized users have access to sensitive data. Confidentiality requirements may be contained in laws, regulations, contracts, or agreements that contain commitments made to customers or others. The need for information to be confidential may arise for many different reasons. For example, the information may be proprietary and intended only for entity personnel. Confidential information may include personal information and other information, such as trade secrets and intellectual property.

Companies must carefully control physical and logical access to their systems to meet these criteria. They must also implement mechanisms to prevent, detect, and respond to attempts to compromise the confidentiality of data.

Privacy

While confidentiality applies to various types of sensitive information, privacy applies only to personal information. In addition, the privacy objective addresses requirements regarding the collection, use, retention, disclosure, and disposal of personal information. To comply with the privacy principle, organizations must implement physical, technical, and administrative safeguards to protect data from unauthorized access. They must also provide customers with clear and concise detail about their privacy rights and how the company will use their data.

The process of achieving SOC 2 compliance

A SOC 2 audit is a multi-step procedure, which can initially seem complex given the fact that some suppliers offer compliance software and other vendors are also certified SOC 2 auditors.

Below you can find a checklist of practices that will be reviewed while evaluating a company`s management process readiness:

  • 20+ policies and procedures to describe all established processes required by SOC 2
  • Organized asset management
  • Security monitoring and incident response establishment
  • Risk assessment and mitigation
  • User access review
  • Internal audit report
  • SOC report review
  • Security Awareness Training
  • Meeting minutes
  • Internal target SLA
  • HR compliance

Basic Steps in Achieving SOC 2

  1. Selecting a SOC 2 reliable partner for preparation and advice
    This step will be very beneficial for startups, first-timers, and businesses without a compliance specialist. In order to compare a company’s present security, availability, confidentiality, processing integrity, and privacy status with the SOC 2 framework, best practices, and the specific scope needed for the report, professional counsel is required.
  2. Defining the scope
    Choosing which of the five Trust Service Principles to include in the audit is an important component of SOC 2. The TSPs that are included will determine the controls that will be monitored. The best approach is not to use a set list of controls under each criterion but one that is customized for your organization because every organization is unique. Therefore, the controls should address certain risks and factors that are relevant to a given company. The selected SOC 2 partner will assist in identifying which controls are necessary for each organization. Making decisions about the audit’s timelines is another aspect of scoping. If the organization is undergoing a SOC 2 Type II, this will also entail choosing the reporting period, which should be based on readiness and business objectives.
  3. Selecting an auditor
    A SOC 2 audit can only be carried out by a certified, independent CPA company with expertise in information security or IT audits. The company must be affiliated with the AICPA and adhere to all rules and updates made available by the AICPA. It is crucial to choose an auditor who is knowledgeable about the needs of the organization as well as the industry in which the company operates. Selecting a firm whose auditors have substantial expertise and understanding of SOC 2 audits and have dealt with businesses of similar size is a significant factor to take into account. When choosing an auditor, keep in mind that audit charges and deadlines will vary as well.
  4. Readiness evaluation
    This stage in SOC 2 preparation is crucial since it not only determines whether a company is prepared for its formal audit but also identifies any areas that still need improvement. A gap analysis will determine whether the control environment satisfies the pertinent SOC 2 criteria, and any remediation that is required will be carried out. Additionally, it is crucial to make sure that all appropriate documentation is obtained, including policies and procedures, and that all agreed-upon controls are put into practice. The selected SOC 2 partner will assess how well the organization’s controls are mapped to the pertinent criteria and points of focus.
  5. The audit
    If a company is performing SOC 2 Type II, the formal audit will take place after the observation period. The controls in place will be evaluated by the auditor, primarily to determine if they are performing as claimed and in accordance with the standards outlined in the SOC 2 handbook. The SOC 2 Type I or SOC 2 Type II report for the company will be issued by the service auditor and include information on the test findings.
  6. Report results
    The fact that SOC 2 is an attestation rather than a certification should not be overlooked. A SOC 2 report is an examination. The attestation report expresses the auditor’s judgment regarding the existence and compliance with the Trust Service Principles of an organization’s internal controls. Because of this, SOC 2 does not result in a pass or fail, it`s the auditor`s professional opinion.
  7. Repeat annually
    It is critical to update a SOC 2 report after one year has passed in order to stay competitive and uphold the level of clients` expectations. It is extremely likely that some clients may switch to business competitors that are totally dependable and consistent with infosec compliance if a company does not pass an annual SOC 2 examination. According to the requirements, a  SOC 2 audit should be scheduled every 12 months. Companies should regularly check their pertinent controls throughout the year to make sure compliance is ongoing and goals are being fulfilled. Making sure policies and procedures are updated is part of this. It is not the best compliance practice to wait until a month before the scheduled audit to make sure everything is in order. Continuous audit management guarantees a company is SOC 2 ready before the audit.

Get Ready for Successful SOC 2 Compliance with UnderDefense

SOC 2 is the industry standard for infosec certifications, and while it is undoubtedly challenging, with the proper planning, direction, and tools, it is a process that is doable and rewarding. There are ways to make the processes simpler, function more efficiently, and demonstrate to the outside world that your company upholds the greatest standards of information security.

Because we are aware of how time-consuming achieving SOC 2 compliance may be, our platform includes SOC 2 controls, policies, tasks, and planning tools. You may quickly start crossing things off of your SOC 2 to-do list if you have a specially created security program based on your particular business processes and the SOC 2 architecture.

Talk with us about our mission to make SOC 2 readiness as painless as possible. It`s one easy thing you can do to get started now.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About UnderDefense
UnderDefense, a globally top-ranked firm by Gartner and Clutch, provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats. We empower clients to predict, prevent, detect, and respond to threats.

What is actually a hacker?

What is a hacker? More like Mr. Robot rather than Operation Swordfish

If we lived in a fair and more appealing world, children would not want to be Cristiano Ronaldo or PewDiePie (popular Swedish youtuber that if you have a certain age, or dignity, you won’t know about). Children would like to be someone with values, like Immanuel Kant, She-Ra or, of course, a high-level hacker who, from the sewers of a suburban pavilion, controls the world with his killer laptop and his hoodie.

We get the idea of Immanuel or She-Ra, but why do we keep that idea in our head that hackers are so cool? What is a hacker seen through the eyes of someone who knows what this world is all about? It is not that we have brought to the fore a real hacker to solve it -authorities stay calm-, but we have brought Kevin Rojas, a project consultant at Pandora FMS and a renowned technologist and nerd of these things.

What is actually a hacker?

A hacker is a person who knows a lot about computing (security, networks, programming) and uses his knowledge to detect security flaws in the computer systems of companies or organizations.

What exactly do they do?

There are different types of hackers depending on what they do and how they do it, although it could be simplified into “good hackers” and “bad hackers”. The “good guys” (ethical hackers or “white hats”) are usually hired by companies to help them improve the system security by plugging holes and fixing bugs, and the “bad guys” (“black hats”) take advantage of those holes and mistakes for personal profit. Then there are all sorts of intermediate points, such as “gray hats”, who look for faults in business systems… to attempt to be hired to help them solve them.

Why do you think they are so romanticized by movies?

I guess because of the growing importance of computing and how “appealing” it sounds to be able to break into any kind of security. In the end, a hacker is someone who gets away with anything by being “more resourceful.” Who doesn’t like big hit movies?

In addition, a hacker does not obey to any physical pattern: it does not matter whether a person is tall or short, fat or skinny, it does not matter if that person is extroverted or what his economic level is. Anyone with enough wit (and knowledge) could be a hacker… and it’s no small feat.

What things do they usually do?

A real hacker could spend a lot of time studying (really, a lot). They have to know how things work, how elements interact, what known errors different technologies have, what the most effective security policies are and what the most common errors that users make are (which, by the way, are usually the chain’s weakest link: Have you seen those people who write down the password of their user in a post-it stuck to the screen?).

What they also usually do is a lot of programming. They create malware that takes advantage of system vulnerabilities, or that captures the keystrokes and mouse keys of careless users who install programs from suspicious web pages.

They do a lot of things, but there’s one I guarantee they don’t usually do: program “detailed 3D graphical interfaces with countdowns that light up the screen red while a submarine alarm beeps when the system recognizes a security breach and activates the countermeasures”. They don’t do that, even though you may have seen it in movies like Skyfall.

What do you think are the biggest differences between a real hacker and a cliché movie hacker?

Movie hackers often hacking into systems “just like that”. “Give me any computer with Internet access and in 10 minutes I’ll be connected to the Ministry of Defense network.” Well no, it is way more complex than that and it takes much more work behind. It’s more like Mr. Robot rather than Operation Swordfish. Not that much glamour and a lot of black screen with Linux terminals.

Could you name a real hacker who has gone down in computer history for his misdeeds? What did he do?

We do not have to go that far: Swedish Julian Assange, for example, went down in history in 2010 (and on the lists of most wanted people in the United States) for leaking documents from the American intelligence service regarding several incidents that took place in the war against Afghanistan.

Also the group Anonymous is currently quite a hot topic, which is not a single person but a large group of hackers, who have been leaking information since 2003 and from which the aforementioned series, Mr. Robot was inspired.

But not all famous hackers are bad guys: there are also famous ethical hackers like Chema Alonso, Telefónica’s current CDCO, one of the heads involved in managing of the 2017 Wannacry crisis, which, in case you don’t remember, was caused by a program that encrypted the code and data of infected computers, and asked for money to recover them. We need hackers to deal with hackers…

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

5 Edge Computing Predictions for 2022

It’s that time of year again where we look into our crystal ball and issue our prognostications for the year ahead for what we think the future of the edge computing marketplace might have in store. To compile this list, we canvassed our in-house experts and consulted with customers and partners about the trends they see shaping the edge marketplace in 2022.

1. Edge computing will unite IT and OT to drive industrial transformation

Industries like manufacturing rely upon a variety of operational technologies (OT) systems to monitor and control devices and workflows in their environment — everything from simple temperature sensors to advanced industrial control systems. As these old school industries begin to fully embrace IIoT devices, they must figure out how to leverage all of the data that these systems generate without burdening their existing networks. As Rob High of IBM noted in our recent Spiceworks video meetup, “most IoT equipment these days now includes some kind of general purpose compute embedded in the device itself – we’re seeing this with everything from cameras to industrial robots.” Edge computing enables data to be collected and processed closer to where it’s being generated so it can be immediately put to use. Scale Customers like Harrison Steel are using edge-based systems today on the factory floor, collecting data thousands of times per second to keep their precision machinery properly calibrated. We have no doubt that the coming year will see this trend accelerate further as other industries embrace edge systems so they can bridge the IT/OT gap.

2. New applications and use cases will fuel adoption of edge computing

Practically overnight, the global pandemic shifted how we work and businesses had to quickly adapt to connect their remote workforce to the applications they rely on to stay productive. If we learned anything from this experience, it’s that where applications are hosted matters a lot. In response, we’ve seen an influx of new hybrid-based computing models such as metro-based data centers that have been built in close proximity to where businesses and users live. As a result, forward-thinking IT leaders are taking a more thoughtful approach to their application portfolio by considering the trade-offs of latency, network throughput, resiliency and privacy issues. As new use cases and applications emerge, we anticipate that new hybrid edge models will evolve alongside of them that promise greater flexibility and resilience.

3. Orchestrated edge systems will become a viable public cloud alternative

Public cloud services such as AWS, Azure and GCP have completely transformed how IT services are managed and delivered. As Scale Computing’s founder Jeff Ready is fond of saying, “the cloud just means someone else’s data center” and while the cloud certainly has its advantages, it’s not without its shortcomings. Which is why we are poised to see new paradigms emerge by which businesses can essentially build their own systems with similar capabilities of public cloud infrastructure, but intended to be run at the edge of the network. By clustering together fleets of autonomously managed edge computing platforms and distributing them close to where users live, organizations will be able to benefit from cloud-like convenience without having to compromise on performance.

4. Edge innovations such as zero touch provisioning will ease the IT staffing crisis

According to a recent Gartner report, businesses think that talent shortage is the biggest barrier to the adoption of 64% of new technologies, compared to just 4% in 2020. This means that in many cases, IT leaders hoping to deploy a new technology solution might choose to instead delay an important initiative until they have the requisite skilled IT resources in place. But what if you didn’t need to have dedicated IT staff at every remote or branch office location to keep the IT ship upright? Zero touch provisioning, which enables a centralized IT staff to remotely deploy and manage their edge-based systems from a single console, promises to be a game changer in enabling resource-strapped organizations to remotely administer their systems without having to hire additional specialized IT workers.

5. Edge-enabled computer vision will create new opportunities beyond surveillance

Digital video surveillance systems are another aspect of operational technology that live primarily at the network edge. These systems generate massive amounts of data that typically require localized infrastructure due to bandwidth constraints. While most of these systems are used primarily for surveillance and loss prevention today, we expect to see a number of industries — most notably in the retail and manufacturing sectors — begin to layer AI-based computer vision technologies on top of these systems to deliver new capabilities that will improve their operational efficiency and responsiveness. From applying computer vision to track inventory in real-time to using video analytics to generate visual heatmaps to enhance the in-store shopping experience, these types of innovations will require a fast and flexible edge-based infrastructure to realize their full potential.

While no one can say with any certainty what the future will bring, the one thing that we can count on is that for businesses to thrive, they will need to embrace technologies that will enable them to quickly adapt to changing market conditions. To see how edge computing can help you better prepare for an uncertain future, learn more about how Scale Computing is enabling the next generation of edge computing by downloading this informative Gorilla Guide.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×