Skip to content

ESET extends its portfolio with VPN and Identity Protection* in a brand-new, all-in-one offering

In the new offering ESET introduces all-in-one subscription-based protection for individuals and their households.

As digitalization penetrates even deeper into lives across the globe, so does the everyday reality of cyber threats. Email accounts, data on laptops, mobile apps, and even your personal identity have become targets for bad actors. While this problematic situation needs a complex solution, it must be a solution that remains simple enough for everyone, not just those with educations in IT, to manage on their own.

For that reason, ESET has decided to introduce security subscriptions covering the complex needs of individuals and their households.

Protecting digital lives from one platform

The importance of digital life protection can be illustrated by data shared in the latest 2022 report conducted by the FBI’s Internet Crime Complaint Center (IC3).

Between 2018 and 2022, the total number of cyber-crime complaints received from individuals and companies around the world rose from almost 352,000 to slightly fewer than 801,000. Total reported financial losses increased from $2.7 billion to $10.3 billion.

Attacks such as fake tech support, personal data breaches, and phishing made it to the top five reported crime types for 2018 to 2022 globally.

The brand-new product, ESET HOME Security, aims to protect from almost all of these cyber threats targeting households, small companies, and self-employed persons.

Moreover, managing digital life protection has never been easier, with the improved ESET HOME platform and subscription-based cybersecurity. 

What are ESET HOME and ESET HOME Security?

ESET HOME is the complete security management platform–a web portal and mobile app for Android and iOS. It serves as a notification hub presenting connected devices as an ecosystem, with their security as a household-level issue.

It offers users a convenient single place for managing their ESET products, devices, licenses, and services while making it all accessible anywhere they go, whenever they need it. Users can activate and renew their subscriptions, add new devices, and download or upgrade security solutions on one platform.

For example, now, when users want to protect their Android devices, they can use the ESET HOME portal on their laptop to manage the installation of the ESET Mobile Security (EMS) app on an Android device, where it is automatically activated and connected to the users’ ESET HOME accounts. Then, if the users want to connect to their ESET HOME accounts from their Android devices, all they have to do is open the ESET Mobile Security app in their devices and connect to ESET HOME in the side-bar menu section. Users no longer have to copy the license key into the app.

The ESET HOME platform also enables users to share subscriptions with friends and family, and to monitor their security status.

ESET HOME Security is a brand new offering, with three subscription tiers for this new ecosystem: ESET HOME Security Essential, ESET HOME Security Premium, and ESET HOME Security Ultimate.

This customer-focused, subscription-based offering also introduces new features to ESET HOME, such as Identity Protection*, VPN, and a newly developed extension of the Browser Privacy & Security feature.

How can you benefit from VPN, Identity Protection* and Browser Security?

Due to both our evolving digital lives and today’s cyber threats, the demand for personal online privacy and data protection is rising. According to the 2022 Consumer Digital Life Protection Survey conducted in the UK, US, and France, more than 25% of participants want to adopt VPN and Identity Protection technology in 2023.

Virtual Private Network (VPN) is a functionality that establishes a private network connection making internet users anonymous. After connecting to the VPN application, the user’s device gets a new IP address, and online traffic is secured and encrypted.

This way, ESET VPN prevents cyber criminals from stealing user data while using public Wi-Fi and makes it more difficult for third parties to track user activity online, while ESET does not keep logs

Benefits & features of ESET VPN

  • Encrypts users’ online activities,
  • Prevents hackers from stealing user data while using public Wi-Fi,
  • ESET has a no logs, no tracking policy
  • Unlimited bandwidth, that allows you to browse, stream or play games without restrictions.
  • Enables geo-restricted content,
  • Users can securely access their home country’s TV shows and movies while traveling abroad,
  • Users can enjoy their favorite streaming services from different parts of the world. Even more features are available on the VPN service while running on desktop, such as DNS leak protection, MAC spoofing, proxy gateway for other devices, and firewall. The split tunneling feature is also available on Android.

Identity Protection* (IP) is a service providing dark web monitoring that searches for leaked sensitive information previously entered by users.  

For example, if a user is a victim of a mass data breach, they will be notified if the data they previously entered are found somewhere online.

For US customers, the IP feature also includes Credit & Social Security Number Monitoring, Social Media Monitoring, insurance up to $1 mil., and on-call identity restoration service. Users will also be notified concerning changes made to credit reports so that they can act against potential misuse of their personal information.

With the new products, ESET also improves the performance of its Browser Security & Privacy features for Windows with the latest browser extensions.

How browsing is protected:

  • Secure Search checks Google results links for phishing,
  • Browser Cleanup cleans cookies, history, and much more from the browser, when either scheduled or on-demand,
  • Metadata Cleanup removes metadata from uploaded pictures to the browsers on Windows,
  • Website Settings Review allows users to easily review and change permissions granted to websites.

What can you find on the ESET HOME platform?

These aforementioned features, tools, and improvements complement the whole ESET security ecosystem for individuals and their households, while all major features are merged into a single space on the ESET HOME portal.

Visual and user experience improvements, such as overall security status, make the portal easy to monitor and manage despite its underlying complexity.

ESET HOME portal features:

  • VPN user access management
  • Identity Protection1
  • Overall Security Status
  • List of connected devices with their security status, and their management
  • List of licenses, their management and sharing with family and friends
  • Downloadable ESET software to protect devices
  • The ability to buy or renew licenses
  • Security, license, and account notifications
  • The ability to login with Google and Apple account
  • Remote connection to suggested devices
  • Anti-Theft
  • Parental Control
  • Password Management and user access management
  • Two Factor authentication

Aiming for an all-in-one, reliable, and convenient solution

The innovative and simplified ESET consumer offering provides enhanced security with attractive feature sets brought by the Ultimate line that go hand in hand with a new modern subscription model.

This illustrates ESET´s commitment, not only to innovating its security solutions, thus keeping pace with malicious actors, but also to meeting customers´ needs for convenience.

*Currently available in US market only, with global roll out planned in H1/2024

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

A quick dive into identity- and attribute-based encryption

Securing data and communications with genuine encryption is not a simple process, as anyone who has ever dealt with S/MIME or PGP can attest. The biggest problem is the trusted public key exchange. You can download a random public key from a server, but how can you trust that this key is also the right one for your intended recipient? That’s where identity-based and attribute-based encryption comes into play.

 

Identity-based encryption

Wouldn’t it be great if we could just encrypt emails directly with a key derived from the email of the recipient? This question was first formalized by Adi Shamir, the co-inventor of the Rivest-Shamir-Adleman algorithm, or RSA, in 1984. The resulting cryptographic concept was called “identity-based encryption.” It took another 17 years until this concept was proven to be secure by Dan Boneh and Matt Franklin using the Weil Pairing.

Identity-based encryption (IBE) solves the problem of trusted public key distribution by letting users calculate the public key of recipients based on their identifier. An identifier can be any kind of string — the email address of the recipient, for example. The concept introduces a central authority whose job it is to generate respective private keys for identifiers.

Simplified overview of Identity-Based Encryption

Simplified overview of Identity-Based Encryption

Since the sender (let’s call her Alice) can calculate the recipient’s (Bob’s) public key offline based on his email address, Bob doesn’t even have to exist in the system yet. When Bob registers in the system, he just requests his private key from the central identity authority and then decrypts the data.

This design also solves the problem of key expiration — a complicated procedure in classic trusted web applications usually requiring expiring certificates. By making the identifier user+currentYear()@example.com, Alice forces Bob to request a new private key from the central authority every year.

Bob could also act as his own central authority, allowing Alice to send emails that could only be decrypted by certain departments. Imagine a scenario in which Bob is a company administrator and he needs to be able to view all company emails. However, he also wants to make sure that no department can decrypt emails from any other departments. The solution? Bob can set up a central authority and Alice can send emails to security@company.com, press@company.com, and info@company.com (all hypothetical email addresses invented for this example), each encrypted under their own identity public key. Best of all, these emails could all go to the same inbox without compromising confidentiality.

So why is identity-based encryption not used widely for email encryption? The biggest hurdle to this system is setting up the central identity authority to manage the generation of private keys. That might be practical in a company where it’s not unusual for administrators to have a master key to access employee data, but what about other non-corporate contexts?

Imagine that you have an image that you would like to show to your doctor — an X-ray from a previous appointment, for example. Maybe the doctor needs to consult another specialist, like a radiographer. You would like to encrypt your X-ray image in such a way that it could be shared among doctors and specialists.

Identity-based encryption wouldn’t allow the first recipient (your doctor) to safely share the data with someone else. For that, we would need something more flexible that would allow us to embed access policies within a message’s ciphertext. We need attribute-based encryption.

Attribute-based encryption

Attribute-based encryption (ABE) is the next generation of identity-based encryption. Instead of binding public keys to identity strings, they are instead bound to attributes.

Relying on attributes allows the sender to craft a ciphertext over a chosen access policy, combining different attributes with “and”/“or” gates to formalize access conditions. This approach is called ciphertext-policy attribute-based encryption (CP-ABE).

You can also do it the other way around — associate the user’s key with an access policy. Doing so is known as key-policy attribute-based encryption (KP-ABE). Similar to identity-based encryption, an attribute authority is responsible for managing attributes and their private and public key pairs. The owner of the attribute authority has global decryption power over all its attributes.

It is simple to make and own an attribute-based encryption scheme. Let’s introduce a central attribute authority, which stores a map of attribute identifiers to (normal, RSA) public keys. For example, imagine the following mappings:

Map of attribute identifiers to RSA public keys

If Alice would like to craft a ciphertext that can only be decrypted by general doctors who have her as a client, she would encrypt her secret text like this:

Cipher_client-alice = enc(text, PB_client-alice)
Cipher_client-alice&general-doctor = enc(Cipher_client-alice, PB_general-doctor)

Note that Alice herself doesn’t need to have access to the attributes. Only people who have access to both private keys of the attribute “has Alice as a client” and “general doctor” can decrypt the ciphertext. First Bob removes the outer layer of encryption by providing the “has Alice as a client” private key and then additionally applying the “general doctor” private key to retrieve the plain text.

Additionally, Alice would like to give all radiographers (Charlie) access to her photo scan. She creates the following ciphertext:

Cipher_x-ray-specialist = enc(text, PB_x-ray-specialist)

She can now combine both ciphertexts into one message and send it to her doctor:

Cipher_x-ray-specialist || (client-alice&general-doctor) =
Cipher_x-ray-specialist || Cipher_client-alice&general-doctor

As we can see, the ciphertext can be decrypted by radiographers (who will decrypt the first part of the ciphertext) or by any general doctor who has Alice as a client (decrypting the second part of the ciphertext).

Overview of an insecure Attribute-Based Encryption system which is vulnerable to collusion

As with most simple cryptography schemes, this system has some issues. In this case, our simple ABE schema is not collusion resistant. That means that if Eve is a general doctor and Dave is a psychologist who has Alice as a client, nothing stops Dave from just providing Eve with the private key for the attribute “has Alice as a client,” allowing Eve to escalate access.

Attribute-based encryption schemas must be collusion resistant. In practice, collusion resistant means that even if users exchange private attribute keys, they cannot gain additional knowledge about plaintexts beyond their access level.

This could be done, for example, by creating an individual user-bound attribute private key for each attribute, essentially combining the identity element from identity-based encryption with attributes. Additionally, ciphertext should not grow in size the more policies are added to them. Contradictorily, in our self-made schema, a ciphertext would grow larger and larger if we had multiple “or” conditions in our access policy.

Nevertheless, one problem remains. The central attribute authority can globally decrypt ciphertexts, allowing it to impersonate any user and issue any attribute to itself. Having this trusted central authority in the medical context is a bad idea, since medical information is highly sensitive and should only be decryptable and accessible by authorized parties. For the corporate context, attribute-based encryption makes more sense because an administrator could issue attributes to users and is allowed to decrypt and access any file in the company. But what if we have multiple companies, each with its own attribute authority?

Multi-authority attribute-based encryption

Multi-authority attribute-based encryption (MA-ABE) is an attribute-based encryption variation where multiple attribute authorities are responsible for managing distinct attributes. Why don’t we set up multiple individual attribute authorities? Well, we still want to be able to combine attributes from other companies with attributes from our own company to enable cross-company sharing.

Overview of an Multi-Authority Attribute-Based Encryption system for different companies

Overview of an Multi-Authority Attribute-Based Encryption system for different companies

In such a system, it becomes a problem to establish globally known parameters for each attribute authority. MA-ABE introduces a new central server that is responsible for setting up new attribute authorities and bootstrapping the system overall.

Early MA-ABE schemes required this central server to have global decryption power over all attribute authorities. On the other hand, modern MA-ABE schemes such as DAC-MACS (effective data access control for multi-authority cloud storage systems) are close to what we need to implement for MA-ABE in real-world scenarios because they don’t require the central server to have global decryption power.

MA-ABE offers some useful new approaches to data encryption:

  1. ABE schemes are group centric, meaning that a single group can be described with a single attribute. This makes encrypting and decrypting for groups easier. On the other hand, encrypting information for single individuals becomes more computationally intensive compared to traditional encryption schemes because these individuals usually don’t share common attributes.

  2. When an attribute gets revoked from a user, the attribute key and all ciphertexts using this attribute need to be rotated and re-keyed. This can be done by the attribute authority or a proxy-reencryption service.

  3. Proxy-decryption is a technique where a server helps the user during decryption. It does so by using the user’s private attribute keys. As the ciphertext is additionally protected with the user’s identifier (IBE), confidentiality is not compromised. Proxy-decryption can be used to help mobile clients with the computationally intensive decryption process.

Is MA-ABE ready to be deployed in modern secure cloud storage solutions such as NordLocker Business or NordPass Business? Personally, I would say no.

Even though the modern MA-ABE schemes fulfill most of the security requirements for end-to-end encrypted cloud storage systems, their system implementation is complex, and the underlying cryptographic principles like pairings are not yet widely adopted in cryptographic libraries. In addition, pairing operations are computationally intensive and not suitable for mobile devices, which require low power consumption for a good user experience.

With the world shifting increasingly further to the mobile side, proxy-decryption might help to decrease the computational overhead on the mobile device, but it requires the user to be always online to access their encrypted files. Finally, MA-ABE can only be cryptographically beneficial if users change their attitudes around encrypting files — away from sharing data with individuals, and towards attributing access policies over their data. It is yet to be seen if users and companies are willing to adopt this mindset change.

The existence and proven security of attribute-based and identity-based encryption schemes show that we are just scratching the surface of what is cryptographically possible with elliptic curves. However, the practical applicability of schemes in real-world scenarios is yet to be seen.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to create a resilient human firewall: a talk with Mark T. Hofman

Is the modern cybercriminal a solitary figure acting as a lone wolf? Or are they more often part of a sophisticated, white-collar pack? We discuss this with Mark T. Hofman, a well-known crime and intelligence analyst. Together, we explore the mechanics and motivations behind cybercrime. Spoiler alert: it’s not just about money. 

In our talk, we examine the tactics of cybercriminals. How they exploit human behavior, not just system vulnerabilities, to target victims. We shed light on why people click on suspicious links.  We also reveal organizations’ weakest links. Finally, we discuss what it means that cyber-attacks fail at the coffee machine.

Dive into the interview and learn how to build a strong human firewall in your business.

The interview’s highlights

  • Cybercriminals don’t fit the stereotypes shown in movies. They operate within structured, business-like entities that use advanced tactics like ransomware-as-a-service.

  • Cyber attackers often seek thrills, not just money. The excitement of outsmarting the system often motivates them more than financial gains.

  • Cybercrime targets human error more than system flaws. It often exploits moments of inattention or bad luck. And has nothing to do with a victim’s intelligence.

  • Cyber awareness across all levels of staff is key for organizational security. Anyone, even IT admins, can become the weakest link in a cyber-attack.

  • Fostering a company culture of cybersecurity is key for digital safety. Just like looking both ways before crossing the street, taking precautions is a must.

Key insight #1: cybercriminals are smart individuals operating in company-like structures.

NordLayer: You often say in your keynote speeches that the idea of a lone cybercriminal is inaccurate. What is the reality?

Mark T. Hofman: Cybercriminals are often presented as 15-year-old teenagers with black hoodies sitting in a dark room. That’s a Hollywood myth.

The number one threat for many companies is ransomware and crime-as-a-service operations. The individuals behind these are not just kids. They’re sophisticated and work within organized, business-like setups on the economy’s dark side. These criminal organizations function like companies. They have customer support, quality management, recruitment, and specialists who negotiate ransoms.

For example, look at DarkSide, a group that attacked the Colonial Pipeline networks. Like many other cyber gangs, it is set up like a business with affiliates. They even issued a press release discussing their “ethics” and preferred targets.

NordLayer: Can you tell us more about how these ransomware-as-a-service structures work?

Mark T. Hofman: Everything starts with a ransomware creator, like DarkSide. They make ransomware that locks and encrypts data once it gets into a victim’s computer.

What’s interesting is that DarkSide doesn’t interact with the victims. Instead, they operate through a network of affiliates responsible for infiltrating computer systems. These affiliates use DarkSide’s ransomware and subscribe to their malicious software.

The fees for using this service vary based on how much ransom is taken from the victim. This shows the sophistication and organization level within modern cybercrime enterprises.

Key insight #2: cybercriminals love the challenge of beating the system more than money

NordLayer: You’ve talked to quite a few cybercriminals. What really drives them?

Mark T. Hofman: When I talk with threat actors on the darknet, X, 4chan, various forums, and Telegram groups, I try to figure out as much as possible about their psychology and methods. In my keynote talks, I share this knowledge to help companies and government agencies understand how to protect themselves.

Here’s the scoop: many people believe they are only after money. Sure, that’s part of it. But for many, it’s not just about money. It’s more about the psychological trait of thrill-seeking or the challenge to beat the system. Many cybersecurity experts might disagree with this argument. But, if you already have millions of dollars in Bitcoin in your wallet and you still commit crimes, then your motive is not money but greed.

For example, cybercriminals often target government institutions, not because of financial gains but simply because they can. It’s a game of cat and mouse. Or a game of chess that always gives you a challenge.

Another thing is that most cybercriminals start young, around 10 to 15 years old. They play with technology, take things apart, and try to find bugs or hacks in computer games. Here, it’s a mix of boredom and thrill-seeking behavior. For many, school is boring, and there are more interesting hacks to learn on platforms like Reddit. YouTube is usually their entry point before going into the dark net. For many 11-year-olds, cybercrime is a way to gain recognition and respect.

In contrast, young soccer talents get support at school and the opportunity to join a soccer team. What support is there for coding talents? Mostly nothing. If we want to prevent cybercrime in the long term, we should give 11-year-olds a chance to use their skills for good purposes. Otherwise, they may learn the wrong things on the darknet and end up on the wrong side of the law.

Key insight #3: cybercrime exploits human psychology rather than system vulnerabilities.

NordLayer: In one of your YouTube videos, you said that cybercrime is not about technology but psychology. Why is that?

Mark T. Hofman: Over 90% of cyberattacks happen because of simple mistakes people make. And it’s clearly a psychological problem, not a technical one.

Quote 2 1400x500

It’s people clicking on suspicious links, opening email attachments, plugging in USB flash drives they found in the parking lot, connecting to public Wi-Fi networks, having loud phone calls about sensitive topics at airport lounges, revealing their OTP (one-time password) on the phone, and falling for deception like honeytraps or well-made deep fakes. In short, cybercrime often uses human error—this is where psychology comes into play. And yet, this psychological aspect of cybercrime is often underestimated.

NordLayer: “I’m smart, I will never click on a suspicious link,” many people say. Yet, they do click and get attacked. How does that happen?

Mark T. Hofman: It has nothing to do with their IQ. It’s more about whether you’re paying attention at that moment or just having a run of bad luck.

For instance, if you get a phishing email about a recent Amazon purchase you didn’t make, you might say, “Who would be so stupid to click on this?” But, if you did make an Amazon purchase 20 minutes ago and now you get an email claiming there’s a problem with your order, you’re much more likely to click, and it has nothing to do with your intelligence. Everyone can fall victim to a cyber-attack. 

NordLayer: How do cybercriminals analyze our weakest points?

Mark T. Hofman: Most of the time, they don’t. For example, in many cases, phishing emails are not specifically targeted. They are sent out to thousands of users, hoping that someone will click on a suspicious link and take the bait.

I get phishing attempts from banks where I don’t even have an account. It just shows cybercriminals shoot in the dark. But when they target someone, like in spear phishing, open-source intelligence (OSINT), and on social media, they smartly use the information about you that’s available online.

Say an IT admin lists an XY software skill on their LinkedIn profile. They get an email saying, “Critical security update for software XY,” and even a tech-savvy IT guy might click. It shows everyone can fall victim to this type of attack.

NordLayer: How do you conduct cyber profiling? Is it similar to offline crimes?

Mark T. Hofman: Yes and no. In everything we do, we show something about who we are. Our behavior leaves personality traces. The same principle applies to cyberspace, where there are no physical traces but digital ones.

Cybercriminals decide when and how to attack, who to target, and what language to use in their threatening emails, ransom chats, or phone calls. They also leave a trail of their personality. And disclose their intentions or identity, which can be analyzed to learn more about them.

For example, the FBI uses a checklist to judge how serious a threatening letter is. Today, these letters aren’t letters anymore. They are social media posts, tweets, or emails, but their content can be analyzed in a similar way. So, some profiling methods used in the real world can also be applied in cyberspace.

Key insight #4: to create a robust human firewall, everybody in an organization must be aware of security.

NordLayer: Who is more at risk for online scams and cyber-attacks? IT professionals, who know the ropes or remote workers?

Mark T. Hofman: It’s a common misconception that IT professionals are immune to cyber threats because of their expertise. In fact, the risk isn’t about knowledge alone—it’s about context.

Many cyberattacks fail at the coffee machine. What do I mean by that? For example, identity theft scams like CEO fraud exploit a lack of face-to-face talk. If I meet my boss at the coffee machine and ask them about a bank transfer, and they respond with, “What bank transfer? I didn’t send you any email,” the attack fails.

Working from home increases the risk of cyber threats, as people might fall for online scams that prey on individual mistakes and the absence of a ‘coffee machine’ moment of verification.

NordLayer: What are the most successful social engineering techniques that attackers use?

Mark T. Hofman: Attackers often combine three elements, which I call the dark triad of cybercrime: time pressure, emotion, and an exception. Be cautious if someone calls you, triggers emotions, creates time pressure, and asks you to do something unusual.

Deepfake technology has advanced to the point where someone can replicate your voice with just a half-minute of audio. I could clone your voice and make you say anything in any language. Imagine your partner calls you and says, “Honey, I’m in trouble, you need to send me money.” It’s a combination of time pressure, emotion, and an unusual request, all classic signs of a scam. So, be careful when you get an urgent request for money, even if it appears to come from someone you trust.

NordLayer: Now, let’s discuss a cyber attack’s “butterfly effect.” How do small steps in an attack, such as a minor vulnerability, cause major problems across a system?

Mark T. Hofman: We need both technical security and a human firewall. Do you have a well-trained CISO or IT department? What do your interns or executive assistants know about cybersecurity? How security-aware are your C-level executives or your receptionist? Every chain is as strong as its weakest link, so we must reach out to everyone. My motto is “Make cybersecurity great again.” It’s because the main target group is people who are not interested in cybersecurity. They represent the weakest link. We must also make them security-aware.

Quote 5 400x560

Key insight #5: staying safe online is like looking both ways before you cross the street.

NordLayer: What can we do to become the human firewall?

Mark T. Hofman: I would be happy if people paid attention to the basics of cybersecurity. This includes using long and different passwords and enabling multi-factor authentication. Equally important are protective measures like firewalls, antivirus software, and VPNs at work and home.

We need physical and psychological awareness. This means being wary of third-party USB sticks, suspicious links, or email attachments and always keeping your software updated. Also, never leave your laptop or cell phone unlocked. Avoid buying USB sticks from online shops. And stay alert when emotions are triggered or something seems out of place.

When every employee understands that cybersecurity is a personal responsibility, not just the job of the IT, that’s what I call the human firewall.

NordLayer: Can education reduce human errors in the future? And how can AI help us make fewer mistakes?

Mark T. Hofman: Discussions on cybercriminals’ forums focus on AI’s risks and benefits. They see its opportunities but also worry that their crimes might get harder if businesses and law enforcement agencies understand the full potential of AI. I think the threat actors’ concern is good news for us.

Of course, cybercriminals also exploit AI technologies, such as deep fakes, and specialized versions of Chat GPT tailored for attacks, such as  WormGPT. I discuss the dark side of AI a lot in my talks. And AI also offers opportunities for defense and cyber profiling.

Basically, AI is like a knife. You can use it to make a salad or kill your wife. It’s a tool that can be used to create good and bad outcomes and will be used on both sides.

NordLayer: How can we engage and educate those not very knowledgeable about cybersecurity, including C-level executives?

Mark T. Hofman: At many cybersecurity conferences worldwide, I meet cybersecurity experts discussing cybersecurity topics with other cybersecurity experts. That’s great. But in the end, it’s interns, regular employees, or C-level executives who often open email attachments or click on suspicious links.

Cybersecurity must be entertaining and relatable to make people aware of threats. I always say, „Make it about people, not just about business.“. If you include “Three ways child predators can exploit your child in World of Warcraft” in your cyber-awareness training, guess what? Suddenly, mothers will care more about cybersecurity.

I also address private life and the so-called “grandchild trick.” Brief seniors in your family to be cautious when they get a WhatsApp message telling them, „Hi mom, I have a new number. “ Make cybersecurity matter to everyone.

Thank you.

Mark T. Hofmann, a crime and intelligence analyst and business psychologist, specializes in behavioral and cyber profiling. Featured on CNN, CBS, and 60 Minutes Australia and publications such as Forbes, Mark T. Hofman is also a popular keynote speaker, discussing the psychology of cybercrime and the dark side of AI.

How NordLayer can help

No matter if your team is in-office, hybrid, or fully remote, it’s vital to enhance your security and make your employees aware of it. Contact the NordLayer team for a customized solution for secure network access for your organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Your Apple devices are not as secure as you think. Learn how to raise their protection

Cyber criminals can use much simpler methods to bypass Apple security than malware.

Despite several notable cyber incidents, some iPhone and macOS users may still hold on to the myth that their devices are secure simply because of the way these operating systems are built. The simple answer to these claims is “they are not”; but let’s dive deeper.

Applications (Apps) on iPhone or iPad devices run in their own separate virtual spaces and can communicate with each other to a very limited extent. This also means that malicious applications can neither obtain information from other legitimate applications, nor can they usually spread like they would in the Android OS. This means devices running on iOS are less attractive for a majority of cyber criminals. On the other hand, it also means that an external antivirus app for iOS would only be able to scan itself, and thus, not work properly.

Much like iOS, macOS is also often considered to be more secure in comparison with other operating systems. Built-in protection measures mean lower potential for the creation of security loopholes because Apple created the iOS and macOS ecosystems and has full control over both the OS and app environments. As such, Apple has been seen as being less attractive for cybercriminals because of their lower share of the market.

Armed with that information, you may get a false sense of security about macOS’ and iOS’ security because of their designs, but that is not the end of the story. When attempting to attack devices, attackers have far more options than just using malware. There are other ways they can steal sensitive data, and that is why your iOS or macOS devices’ built-in protections are not enough, and why they can benefit from additional layers of security.

Responding to Apple customers’ needs, ESET brings forward new solutions on a consistent basis. This year’s offering is a huge step forward. Being a digital life protection vendor, ESET introduces two brand-new functionalities for iOS Virtual Private Network (VPN) and Identity Protection  (IP), to already present Password Manager. All these functionalities can be easily managed in updated ESET HOME, the complete security management platform.

MacOS users can have these new features, together with Modern Endpoint Security available in the new subscription-based premium tier product for customers, ESET HOME Security Ultimate.

 

What security threats are targeting iPhones and Macs?

Spreading malware across iPhone apps may be a tough nut to crack, but cyber-criminals can use much simpler methods to bypass Apple security.

For example, they may opt for social engineering techniques such as phishing websites or messages that try to impersonate legitimate companies or institutions to lure sensitive data from potential victims. In fact, Apple was the third-most-impersonated brand in phishing scams in Q2 2023.

Another scam is a false tech support call, wherein a user receives a call impersonating Apple’s support service and requiring personal details in order to deal with an impending problem. To make the call more believable, an attacker will use a spoofed ID, so the caller’s number looks like it is originating from a legitimate Apple support center.

Results of successful phishing attacks depend on how much data can be stolen from the victim in question. The extent of the damage varies from a hijacked e-mail account used for spreading spam to more serious incidents, such as identity theft or money withdrawn from an account.

Your iPhone can be also targeted while using unprotected public Wi-Fi. Connecting to an airport’s Wi-Fi during your travels may be convenient, but also may result in a loss of your sensitive data such as credit card details or passwords. Most public Wi-Fi networks don’t encrypt communications between your device and the router, making your data susceptible to interception.

Lastly, there’s old-school pickpocketing. In February 2023, The Wall Street Journal reported on iPhone thieves across the US who were locking people out of their Apple accounts and draining their bank accounts. First, the thieves watched their victims closely to learn their passcodes, then (physically) stole the devices. Armed with the passcodes, they invaded their victims’ personal and financial lives, while also effectively preventing the iPhones’ owners from locating their phones.

Macs face similar problems when connected to public Wi-Fi, as their users can face phishing threats via emails, private messages, and phony websites, among other threat vectors. Lastly, there are numerous pieces of malware specifically targeting macOS, such as CloudMensis, which was recently discovered by ESET researchers.

How can ESET VPN help?

In general, using public Wi-Fi is not recommended because it is often unsecure. But if you still want to stay connected while in a hotel room or at the airport, connect with a VPN, which establishes a private network connection, making internet users anonymous. After connecting to the ESET VPN application, a user’s device receives a new dynamic IP address, and online traffic is secured and encrypted.

This way, ESET VPN prevents cyber criminals from stealing user data while using public Wi-Fi, and makes it more difficult for third parties to track a user’s activity online, while ESET does not keep logs.

Moreover, using a VPN service can also bring other advantages. For example, users can enjoy access to their favorite streaming services from different parts of the world without geo-blocking.

Introducing Identity Protection* service

Since Apple customers can also fall victim to identity theft, ESET introduces its new Identity Protection* (IP) service for iOS and macOS. It monitors the dark web, searching for leaked sensitive information previously entered by a user such as name, phone number, and account credentials.

If a user is the victim of a data breach, they will be notified if the data they previously entered is found somewhere else online.

For US customers, the IP feature also includes Credit Report Monitoring, Smart SSN (Social Security number) Tracker, Social Media Identity Monitoring, Identity Theft Insurance up to $1 mil., and an on-call identity restoration service. Users will also be notified about leaked credit/debit cards and changes made to credit reports so that they can act against potential misuse of their personal information.

Why having a password manager and 2FA might be useful

Apple has its own password manager iCloud Keychain that stores and protects your passwords, but there are some known vulnerabilities. For example, iPhone thieves described by the Wall Street Journal can also bypass Keychain using stolen passcodes. Having a separate password manager from a different vendor gives you an extra layer of protection in such situations.

ESET Password Manager not only protects and stores your passwords and personal data, but the built-in password generator also prompts you to create strong, unpredictable passwords that you don’t have to remember.

Login credentials are stored automatically as new accounts are created. ESET Password Manager also includes a form completion feature that saves you time by completing web forms automatically and accurately.

To improve account protection even further, experts suggest setting up two-factorial authentication (2FA). This creates an additional authentication layer in case your password has been breached or stolen.

Easily manage your security on the ESET HOME platform

Operating a VPN, Identity Protection*, Password Manager, and 2FA might all sound too complex and time-consuming for a regular iPhone user. But in fact, you can easily manage all these features and more from one, easy-to-use platform, ESET HOME.

This complete security management platform and its companion mobile app for Android and iOS offer users a convenient and informative management dashboard with information about their ESET products, devices, licenses, and services, while also making it all accessible anywhere they go, whenever they need it.

ESET HOME also serves as a notification hub that presents connected devices as an ecosystem, where users can always easily check the security status of their connected devices.

Cyber incidents like leaked private photos of celebrities, iPhone passcode scams, and numerous malwares targeting Macs are proof that even iOS and macOS are not impenetrable, and that there is a need for extra layers of protection. Therefore, having features such as VPN and Identity Protection* can be quite handy, especially if they are easy to manage.

*Currently available in US market only, with global roll out planned in H1/2024

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Is Gmail Becoming a Security Threat?

First Cisco, Now Okta

In May 2022, Cisco was hit with a data breach that resulted in almost 3GB of data being stolen. You can read about what happened in more detail here, but the critical point is how the breach started – with an employee’s compromised Gmail account.

If you use Google Chrome and you sign into Gmail, it helpfully asks you if you would like to sign in to your Google account and sync across devices. This is of course extremely convenient, as most of us have multiple devices we use on a daily basis. This way, you have all of your stuff wherever you go – work laptop, home laptop, phone, tablet. Chrome will also offer to save passwords, so you don’t have to keep typing them in constantly. In some ways, this helps security – if you don’t have to worry about remembering a password, you’re less likely to choose a simple one or re-use a familiar one. Unfortunately, this means that those passwords are there, on any device you use, and if you slip up once, that opens you up not just to personal compromise but professional as well.

The same thing happened to Okta in 2023; the attackers targeted Okta’s customers by gaining access to their support logs, which included HAR files that had session tokens, and thus opened them up to session hijacking. The source of the hack was, again, an employee’s compromised Gmail account.

To be clear, this isn’t entirely Google’s fault – they take measures to protect Gmail accounts from compromise, arguably more than most other e-mail providers do. Users get prompted to review security settings regularly, they have a very robust spam filter, and they offer 2-factor authentication, which is a much better option than just using a password alone.

But humans are still the weakest link in the security chain, and the numbers don’t lie – over 80% of all data breaches involve the human element. And if you think that will get better, well, according to Forrester, in the future, that number will only increase to 90%. Not even Google can compete with the persistence of threats like phishing, credential stuffing, brute forcing, and the generally terrible password hygiene habits we all practice.

To Lock Down, or Not to Lock Down

When the internet first became widespread, many people only had access to it at work. Having a personal computer or laptop was not quite as common, and it was years before smartphones were introduced. This led to it being treated somewhat like the telephone – for the most part, some limited personal use should be considered acceptable. However, in light of the ever-expanding threat surfaces, it makes sense to have stricter policies regarding personal activity on work devices.

You could prevent users from signing in their personal Gmail/Google accounts at work (which is easy to do for both Gmail and Chrome. You can, in fact, turn off the ability to sign in via Chrome altogether if you don’t use Google as your identity provider.) This is definitely not going to win your IT Team any popularity contests, and it’s a bit of a draconian measure. Most people don’t consider it unreasonable to quickly check their personal e-mail at work; it could even negatively impact productivity if someone is constantly having to check their phone for an e-mail from their child’s school, for example.

A much better strategy is to implement passwordless authentication. This way, devices authenticate using a digital certificate instead of depending on a user to enter their username and password. It removes the risk of stored passwords because there simply aren’t any – which actually closes several avenues for potential breaches. Over 80% of all data breaches are related to credentials – weak, reused, easily guessed, or stolen, they remain the weakest link in your cybersecurity armor.

A huge challenge for security is balancing user experience with best practices – make things too locked down, and users will find ways around it. It’s incredibly rare to find a solution that is both more secure and better for the user, but passwordless authentication offers both! Logging into things is seamless and handled completely by the device exchanging the certificate with the identity provider – from the user’s perspective, they just open their laptop and boom, connected.

Another thing you may not realize is that passwords are costing you both time and money – an estimated $5.2 million per year, in fact, and 11 hours per employee. That adds up! And that’s not factoring in all the time spent training people not to click on phishing links with fake e-mails and endless training. Some estimates say that 3.4 billion phishing e-mails are sent every day! Given the prevalence of compromised passwords and the dire impacts a breach can have, it makes sense to get the best possible security measures available. Implementing passwordless authentication can save you time, frustration, money, and keep you safer – what’s not to love?

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×