Skip to content

Find out which virtual attacks are most common in companies and how to avoid them

We know that the protection and security of business activities and processes are of paramount importance for a company. This is because, in addition to cyber invasions being vastly frequent in the virtual space, they also offer several problems for a company, especially in the case of data leaks – whose action is intolerable by LGPD rules, for example.

For this reason, we understand that virtual attacks are actions provoked by cybercriminals, who seek to steal business and customer data in order to use them for illicit purposes. Therefore, it is important to know how to prevent cyberattacks and how to better protect our systems from cybercriminals.

Do you want to learn more about it? So, keep reading our post and get all your questions answered.

What are the consequences of cyberattacks for companies?

As we all know, the importance of knowing how to prevent virtual attacks in a company is crucial, as we are not only dealing with sensitive internal data, but also with our customers’ data.

Thus, we can predict some negative consequences for an organization as a result of the virtual attacks. Take a look at them:

  1. Unstable systems

In general, one of the issues that we need to take into account as a consequence of virtual attacks is the instability in the entire infrastructure of the company. In other words, this can mean weaker and slower systems, causing processes and activities to be interrupted so that the repair actions themselves can be initiated.

This process complicates the routine of work activities, disfavoring the quality and deadline for products and services to its end customers.

  1. Reduction of customers

As a result of a completely inefficient system, we ended up noticing the loss of customers in the medium term. Customers dissatisfied with products and services offered by a company tend to cancel contracts immediately, generating even more losses for the organization.

That’s because employee and customer data can be exposed, which tarnishes the brand’s reputation and makes it less competitive.

  1. Increasing costs

If computational and technological issues turn out to be frequent, repair and maintenance costs will also be higher.

This is because criminal attacks – when carried out efficiently – generate continuous losses, leading to the contracting of outsourced personnel for performing preventive maintenance and monitoring, in addition to the purchase of new equipment, software, and other items to stabilize internal systems.

The 4 most common virtual attacks on companies

Now that you know the concept and consequences of cyberattacks, check out the ones that occur most often in the business environment:

  1. Phishing

In general, phishing is extremely well-known for being basically a strategy to clone pages, websites, messages, among others. The criminal who uses this practice seeks to win customers by having them send personal data, thinking that they are getting involved with reliable companies.

A practical example of this type of virtual attack is when we regularly see some internet pages – be it from banks, streaming services, e-mail providers – asking for personal data in exchange for benefits and advantages.

  1. Ransomware

When dealing with virtual attacks, one of the most feared is, certainly, ransomware. In case you do not know, this type of attack is nothing more than an intelligent way to hijack sensitive data and information, asking for their release.

In practical terms, it can all start with malicious advertising, a social media trigger, or even a fake message.

After a certain employee of the company downloads a file with ransomware, the malware already begins to work on the computer system.

As soon as it is installed, the ransomware encrypts data and allows criminals to enter the company’s virtual systems and start browsing folders and documents, looking for personal information, data and bank accounts, strategies, among others.

When this occurs, the related processes for preventing virtual attacks become much more difficult.

  1. Spear Phishing

Spear Phishing is nothing more than another type of Phishing, however, it is focused on specific companies and employees who work in the virtual environment.

Thus, we consider that it is an invasion segmented by the criminals themselves, having techniques, devices, and tools of social engineering to elaborate deceptive schemes and share them as a completely harmless email, website, process, or even a downloadable file.

  1. DDoS

Currently, DDoS is considered one of the most powerful virtual attacks. This is because it is simply a “mix of actions” that are directed exclusively to the companies’ servers. In practice, it is totally controlled through a master computer, which in this case, would be the criminal behind the action.

With this, it works as if it were a type of system completely secure for the victims, and from there, it offers space for hackers and cybercriminals to exploit vulnerabilities to invade the virtual environment of companies.

Thus, one of the symptoms that the system itself can show is its poor performance.

How to avoid virtual attacks?

After understanding the seriousness of virtual invasions, we can now think of efficient ways to protect ourselves from these possible attacks:

  1. Using strong passwords

One of the first tips is to have the responsibility and awareness to create increasingly strong passwords, and preferably they should be different between each account. This makes access by cybercriminals much more difficult, since complex passwords end up not being deductible.

The greater the importance of a given systemic process, the more complex the password must be. Examples: bigger passwords for banking processes and applications, less complex passwords for internet login, among others.

  1. Using a good antivirus

There are several efficient antiviruses on the virtual market. So, search for the one that best fits your needs, taking advantage of all its benefits and ensuring that it understands all the fields of protection your business needs.

  1. Relying on specialized security companies

If your company does not know where to start or does not have a more complete idea of the security processes its working activities must have, it can be crucial to have the support of a company specialized in this subject. Therefore, look for a trustworthy brand, which has experience in the subject and an excellent reputation in the market.

In addition to your virtual information being under the care of highly trained specialists, you will have even more time to focus on more important business activities.

Conclusion

As we have seen, virtual attacks are extremely frequent and must be a factor to be taken into account by companies that wish to obtain excellence and quality in the market.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Understanding Microsoft Exchange Server vulnerabilities

Anyone who works with technology has certainly heard of or uses Microsoft Exchange, Microsoft’s server solution for email and calendar. Exchange is used worldwide by companies of all sizes, being preferred for its versatility and ease of use, and billions of electronic messages pass through it daily. However, even with all these advantages, Exchange is not free of flaws.

At the beginning of March this year, the giant creator of Windows released emergency patches for zero-day vulnerabilities that were discovered and were being exploited by malicious attackers to install malicious software through Exchange. Also called ProxyLogon, these vulnerabilities allowed improper access to e-mail accounts and data extraction, in addition to lateral movement in the infrastructure, affecting other critical devices.

The four Exchange Server vulnerabilities discovered were as follows:

  • CVE-2021-26855: CVSS 9.1: it is an SSRF (Server-side Request Spoofing) vulnerability, which results in HTTP requests being created by unauthenticated attackers. For this flaw to be exploited, servers must be able to accept untrusted connections over port 443.
  • CVE-2021-26857: CVSS 7.8: a failure in the Exchange’s Unified Messaging Service, allowing arbitrary codes to be implemented in the server’s SYSTEM. Nevertheless, this vulnerability must be combined with others or the attacker must have stolen credentials.
  • CVE-2021-26858: CVSS 7.8 and CVE-2021-27065: CVSS 7.8: Post-authentication arbitrary file write vulnerabilities in file paths.

These vulnerabilities are being exploited by a group called HAFNIUM, which operated in China and was supported by the Beijing government, and is primarily targeting organizations located in the United States. However, it is estimated that at least 10 other hacking groups are exploiting these same Exchange’s vulnerabilities in the form of ransomware or cryptoware. It is not yet known how the groups discovered the vulnerability and how the information reached the other hacker groups.

Also, automated attack scripts used in proof-of-concept have been found, which makes it possible for unknowing attackers to exploit vulnerabilities and further compromise servers around the world.

The malware developed by these groups allows the creation of a pre-authentication Remote Code Execution (RCE), which allows attackers to take full control of the servers without access to any Exchange credentials. One of the main malware created to exploit these flaws is the DoejoCrypt or DearCry ransomware.

DearCry uses a combination of AES-256 and RSA-2048 encryptions, renaming files with the .CRYPT extension, and includes a readme.txt file with instructions on how the victim can recover their original files.

If the victim has a backup of the files, one action would be to ignore the ransom requests and recover the environment. There are already records of ransom requests accounting for tens of thousands of dollars. However, even if there is no ransom payment and the files are recovered, there is a possibility that copies of the infected files are made by the ransomware, which can result in data leaks by malicious attackers.

At least 30,000 organizations of all types and sizes in the United States alone are believed to have fallen victim to campaigns orchestrated by HAFNIUM and other hacker groups based on flaws discovered by Microsoft. The total number of companies affected can reach hundreds of thousands worldwide though, as many of them are unaware that they may have been impacted by the vulnerabilities.

To try to protect Exchange users, Microsoft has launched an automated vulnerability remediation tool in March. The tool, developed mainly for customers who do not have specific security teams, allowed for a reduction in the risks associated with the exploitation of vulnerabilities while the patches were not properly applied. Microsoft has estimated that 92% of organizations applied security fixes related to the ProxyLogon vulnerabilities by the end of March/2021.

This type of attack further reinforces the need for companies to invest in specific cybersecurity teams, such as red teams, to test security controls, look for flaws and vulnerabilities, and correct them accordingly, causing the least possible impact. By structuring these teams, it is possible to ensure the proper management of assets, including e-mail servers, in addition to their respective owners. Thus, it is possible to guarantee that updates and fixes are installed as soon as they are released by the providers. The result is a reduction in the attack surface and a lower risk of cyberattacks, which can avoid millionaire sanctions provided for by data protection laws, such as LGPD and GDPR, in addition to permanent data loss, which can affect business continuity directly.

If your security team has not installed security patches yet, they must do so as soon as possible. Remember that installing updates may not ensure that your Exchange servers will not be affected by the exploitation of other zero-day vulnerabilities. Therefore, a scan of the infrastructure is recommended to find out if the environment has been affected by the exploitation of other flaws not yet discovered by the manufacturers; and if discovered, security teams should use efforts to identify and respond to any detected security incidents. This can make the difference between a minimum correction effort without major losses and loss of revenue and trust of customers, partners, and employees.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

What are the main cybersecurity vulnerabilities in Industry 4.0

The digital transformation process brought an increase in the number of connected devices, including industrial devices, in what we call Industry 4.0. Ensuring cybersecurity is essential to keeping any business system up and running. With that in mind, we have brought here the main vulnerabilities of cybersecurity in industry 4.0, which corresponds to the period of technological breakthroughs we are experiencing.

It is no surprise that everyone is connected and so are businesses. However, just as regular users are at risk, business data is also in vulnerable, even dangerous, situations.

 

Industry 4.0 and cybersecurity

 

With the high volume of data circulating on several servers, malicious attackers and cybercriminals obviously arise. As such, they develop techniques for stealing data that often have financial value involved.

Considering that many companies operate through electronic and automated systems, the risk is high. Even with all the existing security, there are still no 100% secure systems against hackers.

With the increasing number of cyberattacks, it is crucial to guarantee protection against intrusions. In this scenario, cybersecurity arises in order to prevent and protect important data from these attacks.

Mainly marked by the large volume of data, Industry 4.0 simply lacks protection against virtual threats. Therefore, it is important to understand the main vulnerabilities that all technological developments have.

 

The dangers of interconnecting systems

 

Despite making the automation processes much easier for companies, services such as Cloud need to have increased security. If information was previously separated and organized in different locations, this technology has changed that.

With the interconnection of systems and with increasingly centralized storage, attackers have access to all information at once. If, on the one hand, the system becomes more and more intelligent, on the other hand, the risk becomes increasingly greater.

And that is why several companies invest in security. The hackers behind these attacks are constantly looking for loopholes in these systems. If a company does not keep up to date, it becomes a potential victim.

 

The biggest vulnerability in industry 4.0 is the inability to stop

 

The technological dependence of industry 4.0 is one of the most striking characteristics of the current period. Having information interrupted or leaked can mean immense monetary losses.

According to data from ITU (International Telecommunication Union), about R$ 80 billion have already been lost in cyberattacks in Brazil. And this figure refers to the period of 2017 and 2018 alone.

Therefore, In 2020 it could not be different. The jump was immense, and according to a report by McAfee, the impact on the economy for these crimes reaches US $ 1 trillion.

In this way, malicious criminals already have greater knowledge about the importance of data. Ransoms for data recovery are increasing and the attempts are becoming increasingly sophisticated.

 

The main vulnerabilities in cybersecurity and attacks today

 

With the ever-greater connection between data, it becomes much easier for an attacker to gain access to all of them. This is because of malicious software, which can access all centralized information.

The most common attacks, therefore, are:

  • Through malware: here, apparently harmless software is installed on the computer with the user’s permission. With the virus inserted in the program, the attacker receives access to various data. Also, through this program, the criminal can limit the functions of the machine itself. The data can become inaccessible and be stolen by the attacker.
  • Through ransomware: this type of attack is much more common in companies. This involves data hijacking, where the attacker can leave the data inaccessible and release it to the user through ransom payments.
  • Phishing: it is a very recurring attack. In it, hackers can simulate a page identical to that of a bank, for example. Thus, the user is prompted to enter important data such as individual taxpayer ID, account, and others.
  • ZeroDay: this type of attack is a little more common and occurs in newly launched applications. The criminal seeks, in several ways, to find flaws in applications before they are corrected.

Cloud storage and Artificial Intelligence are pillars of industry 4.0. What happens is that a lot of stolen information can easily allow access to much more valuable data.

The interconnection of systems, therefore, generates a lot of concern among cybersecurity experts. On the other hand, information will always be essential to prevent these attacks from being successful.

 

How to manage cybersecurity in industry 4.0

 

We can consider that many attacks occur by prior permission from users (as is the case with Trojan horses and Phishing). Although it is not the only factor that guarantees security, restricting users can minimize threats.

By limiting the number of people within the company that can access valuable data, the risk of losing them is much less. This is because, in cases of invasion of any of the machines, the main information will be, for the most part, protected.

It is very important that, for the maintenance of cybersecurity, a company pays attention to the following measures:

  • Greater access controls;
  • Data encryption; and
  • Blocking of certain accesses (mainly from anonymous users);
  • Keep the system updated, always exploring and correcting security flaws;
  • Scanning for viruses and using an antivirus;
  • Frequent updating of passwords and privileged users;
  • Monitoring of security services.

The cybersecurity vulnerabilities are directly associated with the lack of maintenance in an organization’s security systems. Keeping systems up to date can be a chore, but it is always a must.

Considering the increasingly sophisticated and intelligent cyberattacks that we come across, we need to update ourselves too.

Otherwise, loopholes are exploited by hackers. The result? Even before a company learns about them, they have already been used for the invasion. A reliable security service is therefore essential in industry 4.0.

senhasegura has the shortest deployment time on the market – just 7 minutes – and offers much faster protection. Contact us and learn more about how we can help your company against security flaws!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Learn All About Passwordless Authentication

Passwordless authentication has been a recommended option for IT teams. This is due to the fragility of passwords, which justifies the frequent news about hackers and data leaks.

Also, the recommendation to periodically change passwords can encourage inappropriate behavior by the users. After all, most people choose passwords that are easy to remember and, consequently, to be identified by malicious agents.

What’s more, IT support considers spending on password usage, support, and maintenance to be a high investment, which is no longer cost-effective.

By reading this article, you will understand everything you need to know about passwordless authentication. This text contains the following information:


  • What is Passwordless Authentication, and Why is It Important?
  • How Does Passwordless Authentication Work?
  • Passwordless Authentication and Multi-factor Authentication
  • Four Tips for Implementing Passwordless Authentication
  • Is the Password a Security Feature that Can Disappear?
  • Microsoft Accounts Can Be Accessed Without Password
  • About senhasegura
  • Conclusion

Enjoy the read!

What is Passwordless Authentication, and Why is It Important?

As its name suggests, passwordless authentication is an alternative to using passwords to authenticate users through advanced technologies such as:

  • Biometrics: This feature provides data security, as it allows authentication based on a person’s characteristics, which consist of unique data such as fingerprint or facial recognition verification.
  • Public/Private Key Encryption: Encryption systems rely on the concept of keys. While the private key system uses a single key for the sender and receiver, the public key system works through a pair of keys. In this case, it is not possible to encrypt and decrypt a message using the same key. 

Passwordless authentication is also enabled by open standards such as W3C WebAuthn and Fast IDentity Online 2 (FIDO2) CTAP2.

Its importance is because passwords lately have not been secure enough to prevent threats such as hacker attacks. Furthermore, the risks often outweigh the benefits.

How Does Passwordless Authentication Work?

It is possible to perform user authentication by replacing passwords with more secure means. In password authentication, the password provided by the user is compared by the system to the information present in the database.

In the case of biometrics, the process is very similar. The difference is that, instead of passwords, the comparison takes into account people’s characteristics. As, for example, in facial recognition: after capturing users’ faces, their features are translated into numerical data, which can be compared to data stored in the system.

On the other hand, some comparisons work differently. This is the case with SMSs sent with codes that must be entered in the login box. In practice, the system compares the data entered with the code it sent to the user. 

Passwordless authentication is also possible via an encryption key pair with a private and a public key. In practice, the public key works like a padlock, which can be opened using the private key.

This is stored on a local device and can only be accessed with an authentication factor, which can be an ownership factor, such as a hardware token, biometrics, or magic links.

In the case of magic links, they work as follows: you must enter your email address, then you receive a message with a link to click on and gain access to the system.

Passwordless Authentication and Multi-factor Authentication

Passwordless authentication relates to multi-factor authentication, as passwords are replaced by one or more identification factors used by MFA

In addition, even those who still prefer to bet on protecting their accounts through passwords should consider adding more identification factors to ensure the security of credentials. These resources are divided into:

  • Knowledge Factors: Such as an SMS code or even a password;
  • Ownership Factors: Tokens, which we mentioned in this article, are a good example; and
  • Inheritance Factors: Such as fingerprint and facial recognition.

Multi-factor authentication can be confused with two-factor authentication, which is also known as 2FA. The difference is that the first uses different factors, combining, for example, a knowledge factor and an inheritance factor. The second can use a password and an SMS, two knowledge factors.

Four Tips for Implementing Passwordless Authentication

Do you want to implement passwordless authentication? Check out these four tips to do it efficiently:

  1. Choose the authentication mode that is right for you. The options include: fingerprints, facial recognition, OTPs received via SMS, hardware tokens, and magic links.
  2. Regardless of whether you use a password or not, we recommend the adoption of more than one authentication factor to ensure more security for your data.
  3. You may have to purchase hardware if you choose to authenticate through biometrics, for example. However, some means such as magic links only require the use of software.
  4. For passwordless authentication to be functional, you will have to add the data of people who will access the systems. That is, if you have a company and choose the facial recognition system, you will need to register the faces of your employees.

    Is the Password a Security Feature that Can Disappear?

Despite being an increasingly vulnerable security approach, passwords continue to be used by people and companies. And the reason is its low cost of deployment and ease of use. Also, many legacy devices may not support passwordless authentication methods.

However, we believe this situation will soon change, since companies, according to the information we brought in this article, are already feeling the damage caused by intrusions, and are increasingly investing in authentication resources, such as biometrics.

Moreover, the legislation that currently regulates data security, such as the LGPD, is quite strict in the event of data breaches, which creates one more concern and one more reason to invest in passwordless authentication

 Microsoft Accounts Can Be Accessed Without Password

As of September 2021, Microsoft users can log in using passwordless authentication, employing identification mechanisms to replace them. This means you can verify your identity through the following features:

  • Physical Security Key;
  • SMS;
  • Email;
  • Windows Hello; and
  • Microsoft Authenticator.

This innovation is justified by the need to reduce cases of intrusion, since most people access their Microsoft accounts with passwords that are easy to discover. In addition to Microsoft, Apple and Google have also embraced passwordless login alternatives, although they have not completely abandoned the username/password paradigm. 

About senhasegura

We provide digital sovereignty to organizations about actions and privileged information, as we work to prevent information theft and trace the actions of administrators on networks, servers, databases, and a multitude of devices. 

We also bring companies into compliance with audit requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA. 

Conclusion

In this article, we explained why passwords are no longer considered by many IT professionals to be an effective means for ensuring cybersecurity. We also covered the importance of passwordless authentication and how this feature can and should be implemented.

 If you liked our article, please share this content with anyone else who might be interested in passwordless authentication.

 

 ALSO READ IN SENHASEGURA’S BLOG

What Are the Main Cybersecurity Vulnerabilities in Industry 4.0

Windows Print Spooler Failure: Why Should I Upgrade Immediately?

Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

How to Protect Remote Access with PAM

The Covid-19 pandemic has caused massive adoption of remote working models in organizations of all sizes. Besides, security leaders have also accelerated the migration of their infrastructure to cloud environments. According to a study conducted in partnership by Forrester and CloudFare, 52% of the organizations surveyed indicated that the pandemic has caused a shift to cloud-based working models.

In these models, both employees and third parties need to have access to critical systems through privileged credentials, so that they can perform their daily tasks. And with the increase in the number of third parties, there was also an increase in the number of data leaks attributed to them. According to a study by Trustwave, 63% of these security incidents were caused by third parties, which makes this type of access an important attack vector in organizations. The associated costs are also higher. According to the Cost of a Data Breach 2020 report, the average cost of a data leak reaches USD 3.86 million. And leaks caused by third parties were one of the factors associated with even greater losses.

Considering this infrastructure that is distributed outside the security perimeter, many people responsible for Information Security have made their cybersecurity policies less restrictive, allowing access through insecure devices and networks (including BYOD or Bring Your Own Device), even VPNs without the proper security controls in place. And we already know that it is impossible to track what is not managed.

All of these aspects introduced new business risks and concerns for cybersecurity teams. In a study published by PDM Insights, 73% of IT decision-makers who responded to the survey recognize these new challenges. The related risks include opening phishing emails (for 38% of respondents) and inappropriate administrative access (37%), which required CISOs to seek the implementation of Zero Trust-based approaches.

In Zero Trust models, there is no concept of trust within the perimeters of the organizations’ infrastructure, and all actions taken by users must be continuously verified. Forrester reports that the percentage of IT leaders who have accelerated their investments in Zero Trust-based technologies reaches 76%. In addition, the same percentage also identified Identity and Access Management (IAM) as the biggest challenge for their Security teams. An example of Zero Trust-based IAM technology is just-in-time access.

In just-in-time accesses, access to applications or systems is allowed only at predetermined periods and on-demand. Therefore, through just-in-time it is possible to grant the required privileges for the performance of certain administrative tasks through the provisioning and de-provisioning of access in time of use, thus reducing the attack surface and the associated cybersecurity risks. As organizations adapt to a new working model, which includes the consolidation of remote work and the increase of third parties in the infrastructure, the use of PAM tools is imperative for security leaders to ensure compliance with policies and security regulations, such as PCI-DSS, HIPAA, and SOx. Also, it is possible to meet the requirements of data protection laws, such as LGPD and GDPR, mitigating security risks and preventing data leaks that can cost millions in fines, in addition to the loss of revenue, customers, and corporate reputation.

To solve the problems involved in the remote work of employees and third parties, senhasegura has launched Domum, which offers users secure access based on Zero Trust to devices of the corporate infrastructure wherever they are, without the need for VPN, installation of agents, and additional licensing or configurations. Access is granted instantly, easily, and securely, without exposing device passwords and without the user needing access credentials to the PAM security platform.

It works as follows: whenever it is necessary for an employee or third party to perform remote access to any device managed by the PAM platform in the infrastructure, senhasegura Domum will perform the provisioning of access using a just-in-time approach, sending an approved access link to the user, allowing immediate access only to authorized devices.

senhasegura Domum allows configuring access workflows at multiple levels to allow access, in addition to the high granularity offered by the PAM security platform, already recognized by the market. In this way, it is possible to have maximum adherence to the organization’s access policies, allowing the reduction of implementation and customization costs. After the predetermined time of authorization, access is revoked and the link is no longer valid, preventing the employee or third party from proceeding with malicious privileged actions on devices in the infrastructure, which allows for a smaller attack surface and security risks associated with the exploitation of privileged credentials. Besides, by automating the process of granting and revoking privileged access on devices used by third parties, senhasegura ensures the reduction of operational expenses with access management.

Domum also offers all the features offered by the senhasegura PAM platform, such as real-time monitoring of the actions performed. Through LiveStream, an auditor can check the actions taken by a user, allowing the blocking or closing of the remote session in case of non-compliance or if a malicious action is detected. Other features of senhasegura also offered by Domum include session recording, analysis of threats user behavior. Thus, one can reduce the time to detect and respond to malicious actions before the malicious attacker is able to take them. As a result, there is maximum visibility of privileged actions performed in the environment and compliance with regulatory standards.

Ensuring the protection of remote access for a lot of users working remotely is more than an optional security requirement, it is a business must. Therefore, by using the senhasegura PAM platform and senhasegura Domum to manage privileged access, you can reduce the attack surface and the associated security risks, avoiding data leaks and ensuring business continuity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×