Skip to content

How to Implement the Principle of Least Privilege in your Corporation

According to a report recently published by Kaspersky, the number of users who have experienced some type of cyberattack in the first half of 2020 increased by 20,000%.

Also, the company BBOViz points out that Brazil is the second country that suffers the most threats from ransomware in the world, just behind India.

Alarming statistics show that protecting a corporation’s confidential data goes beyond mandatory legislation, as data leaks can generate financial and reputational losses as great as penalties for breaching data protection laws.

There are several reports from large companies that have been affected by some type of malware, significantly impacting their business goals. Braskem, for example, was affected by ransomware that had a major impact on its financial health, reducing its revenue by about 45%.

Another recent case occurred in a Chilean public bank, which suffered a ransomware attack that forced them to keep all their branches closed for a day and part of the branches for two days, strongly impacting their reputation – both in terms of image and finances.

Even though there are many reports of cyberattacks around the world, there have never been so many solutions to protect a corporation from them, such as the implementation of the principle of least privilege.

What is the principle of least privilege?

The principle of least privilege is one of the bases for information security. Its main goal is to grant users access to environments that are required for them to perform their tasks. In other words, with the principle of least privilege, users do not access environments they do not require, avoiding internal threats, data leaks, and hacker infiltration in critical environments of a company.

Risks of not using the principle of least privilege

By allowing users to have privileged access to environments that are not required, several security holes are opened in a company, such as the release of Windows administrator privileges for employees, which allows them to install any malicious software, with or without malicious intent, or for a hacker to break into a machine and install this malicious software, increasing business risks and the attack surface.

In addition, allowing users to have excessive privilege in cloud environments also leaves the company’s data vulnerable to attacks and internal threats.

How to implement the principle of least privilege 

Through the senhasegura solution, you have several security locks that ensure users access only the environments required by them. Besides monitoring the way the user is performing privileged access, the senhasegura solution registers, records, and notifies those responsible for information security about any malicious activity within the privileged session.

Through this simple practice, they significantly minimize the chances of a cybercriminal accessing sensitive company data and extracting information.

Request a free demo of the senhasegura solution and learn how the principle of least privilege will change your company’s cybersecurity situation.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

ESET named a Top Player in Radicati’s ‘Endpoint Security’ Market Quadrant for third year running as Endpoint Security Market continues to boom

BRATISLAVA – ESET, a global cyber security leader, has been recognized as a ‘Top Player’ for the third year in a row in Radicati’s 2020 Endpoint Security Market Quadrant. The report examines 17 leading endpoint security vendors in the market, assessing their functionality and strategic vision, within which ESET was placed in the top quadrant for the third year in a row.

The Radicati Market Quadrant is a metric used to paint a picture of a specific technology market, with this edition covering Endpoint Security – comprising of appliances, software, cloud services, and hybrid solutions that help to secure and manage endpoints for business organizations of all sizes. As pointed out in the report, organizations no longer view endpoint security as an isolated discipline affecting only the endpoint, but as an integral part of organization-wide defense. Endpoint security shares threat intelligence feeds and policy controls with all other major security components, including firewalls, secure web gateways, secure email gateways, data loss prevention (DLP), and more.

This Quadrant continues to grow in importance with the endpoint security market experiencing growth at an exponential rate, as organizations of all sizes deploy increasingly sophisticated and feature-rich solutions to help protect against threats and malicious attacks. In fact, the Endpoint Security market is expected to surpass $8.2 billion in 2020 and grow to over $15.6 billion by 2024.

Radicati positions vendors in a quadrant according to two criteria: functionality and strategic vision. Radicati also evaluates according to key capabilities including malware detection, web and email security, encryption, mobile device protection, data loss prevention and Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR).

In Radicati’s 2020 Endpoint Security Market Quadrant, ‘Top Players’ are described as the current market leaders with products that offer both breadth and depth of functionality, as well as possessing a solid vision for the future. ‘Top Players’ shape the market with their technology and strategic vision. ESET’s positioning as a ‘Top Player’ for the third year in a row demonstrates the company’s pioneering and innovative nature as the Radicati report states that once a company reaches this stage, they must fight complacency and continue to innovate.

ESET’s Endpoint Security solutions were highlighted as offering high performance and high detection rates, low footprint with low system resource usage and for their ease of deployment and use. They were also commended for their suitability to offer protection for companies with heterogeneous environments.

Juraj Malcho, ESET’s Chief Technology Officer, said “We are incredibly proud to be ranked as a Top Player in Radicati’s 2020 Endpoint Security Market Quadrant. Being acknowledged as a Top Player for the third year in a row is demonstrative of ESET’s ability to stay innovative and provide the best possible technology solutions for our customers. As the endpoint security market continues to grow, we are committed to developing reliable and easily deployable security for organizations of all shapes and sizes.”

To read more about the 2020 Radicati Market Quadrant: Endpoint Security, please click here, and to read more about ESET’s Endpoint Security solutions, please click here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Mobile Security recognized with top score in AV-TEST ‘best antivirus for Android’

BRATISLAVA – ESET, a global leader in cybersecurity, has again been commended with the highest score in the latest AV-TEST for best antivirus software for Android. After launching version 6.0 of ESET Mobile Security (EMS) in September with the new Payment Protection feature, ESET earned top scores for the second time in a row with a total of 18 points.

AV-TEST, a leading independent testing organization, uses one of the largest collections of digital malware samples in the world to create a real-world environment for highly accurate in-house testing.

After achieving the top score in the July 2020 AV-TEST, ESET was evaluated alongside 14 other mobile security products, using their default settings and the most current version of all products. The testing focused on malware detection and usability, including performance and false positives. ESET Mobile Security achieved the highest score of 99.8% in “Protection against the latest Android malware attacks in real time” and a perfect 100% in “Detection of widespread Android malware discovered in the last 4 weeks.” The ESET Mobile Security app for Android was also highlighted for not impacting battery life or slowing down the device.

Version 6.0 of the premium Mobile Security solution introduces a new layer of security for EMS users. The Payment Protection feature safeguards users while utilizing financially related applications, for example, for banking or trading. This feature automatically categorizes all installed applications from the Google Play store that fall into the Finance category and scans them for potential threats. The user is also able to add other installed apps to the list that may fall outside of the Finance category.

Commenting on the results, Branislav Orlík, product manager at ESET, said, “We are extremely proud of ESET’s consistent recognition from AV-TEST for our mobile security product offering. Our dedication to providing customers with the very best in IT security solutions is reflected in these scores, as it is vital that users’ personal and professional data is protected to the highest standard. We are thrilled to have achieved the highest score once again and are committed to always innovating and updating our product offerings.”

Click here to find out more information about ESET Mobile Security.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The 5 Key Values of Portnox CLEAR

The problem with most traditional on-premise network access control solutions is their complexity across many fronts, including initial setup, configuration, scalability, and on-going maintenance and upgrades. As a truly cloud-delivered NAC service, Portnox CLEAR delivers SIMPLICITY across all of these critical areas.

VALUE 1: Setup Simplicity

Unlike traditional on-premise solutions that require hardware appliances, software, and other on-premise elements, with Portnox CLEAR, you simply create your dedicated instance in Microsoft Azure using your company email or via SSO (such as Azure AD or GSuite) in a matter of just minutes!

With your dedicated instance of CLEAR created, you simply check the appropriate box(s) to create your RADIUS instance. Dedicated F5 load balancers are spun up as well as auto-scale, so you never have to be concerned with service performance or scalability – it will automatically expand as needed to meet demand.

Portnox CLEAR’s simplicity extends with out-of-box integration and one-click set-up for several common directory services, including:

  • On-premise AD
  • Azure AD
  • G-Suite
  • Okta Universal Directory

SIEM integration is as simple as providing the IP/port, protocol type (TCP, UDP, HTTPS), and data format (JSON/CEF).

VALUE 2: Configuration Simplicity

The complexity of traditional on-premise NAC does not stop at the initial set-up of the local appliance(s), load balancing, RADIUS, and other on-premise components. As shown in the sample policy screenshots below, the complexity of traditional NAC extends to policy configuration that is often layered with multiple and nested interdependencies.

From inception, the focus with CLEAR has been to simplify policy configuration, allowing CLEAR to be fully deployed and operational in a measure of hours/days vs. traditional NAC, which typically can take weeks, or in many cases, months to roll out. Intuitive, easy-to-configure access control, risk, and remediation policies are at the foundation of Portnox CLEAR as reflected in the sample screenshots below.

Risk Policies

Easily configure risk-based access controls for all devices or different groups of devices (i.e. accounting, engineering, etc.), by simply assigning a risk value to each group’s relevant compliance checks.

A simple slide bar easily turns risk values into action (allow, alert, block). It’s that SIMPLE! Unlike traditional NAC that monitors a device risk ONLY when it is on or connected to the network, Portnox CLEAR will monitor risk all the time regardless of if the device is on or off-network.

Remediation Policies

While it is important to continuously be aware of the current risk posture of a device and to be able to use that awareness as part of access control. The ability to proactively take action on the endpoint to help assure a minimum level of compliance is always maintained can be equally important. As with all other policy configurations, setting group-specific remediation policies in CLEAR is as simple as a few clicks.

Unlike traditional NAC that will take remediation actions ONLY if the device is on the network, Portnox CLEAR proactively enforces remediation actions all the time regardless if the device is on or off-network.

VALUE 3: On-Demand Auto-Scale

Delivered as a cloud service, Portnox CLEAR eliminates the need for the capacity planning of on-premise software or appliances. Eliminates the need to expand capacity or upgrade appliances to meet future growth needs. Portnox CLEAR services will automatically expand on-demand to meet any demand spikes and future growth.

Our Azure services are scaling up (and down) automatically based on usage and load. We can automatically control the VM size and the scale-up / down rules.

For the RADIUS component, we use Azure Kubernetes to manage the instances and allow scaling based on demand. We use F5 load balancer to channel the traffic to the right instances and make sure the scaling is transparent to the end-user.

VALUE 4: Ease of Integration

Portnox CLEAR continues to expand native integrations and simplified out-of-band integration through and included restAPI.

Current integrations include:

  • Active Directory
  • Azure AD
  • GSuite
  • MS Intune
  • OKTA
  • Palo Alto
  • SIEM (any/all leading vendors)

Portnox CLEAR also integrates with all leading anti-virus providers to validate and remediate (update) as part of CLEAR compliance and remediation capabilities. Portnox CLEAR also includes a REST-full API over HTTPS that can be used in any programming language that supports REST calls or invoked directly through any HTTPS client such as cURL.

VALUE 5: Zero-Touch Maintenance

As a true SaaS solution, Portnox CLEAR is truly zero-touch!

  • No on-going software updates/patching
  • No management of scheduled downtime
  • No hardware or software end-of-life issues

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Lazarus misuses legitimate security software in a supply-chain attack in South Korea, ESET Research discovers

BRATISLAVA – ESET researchers recently discovered attempts to deploy Lazarus malware via a supply-chain attack (on less secure parts of the supply network) in South Korea. In order to deliver its malware, the attackers used an unusual supply-chain mechanism, abusing legitimate South Korean security software and digital certificates stolen from two different companies. The attack was made easier for Lazarus since South Korean internet users are often asked to install additional security software when visiting government or internet banking websites.

“To understand this novel supply-chain attack, you should be aware that WIZVERA VeraPort, referred to as an integration installation program, is a South Korean application that helps manage such additional security software. When WIZVERA VeraPort is installed, users receive and install all necessary software required by a specific website. Minimal user interaction is required to start such software installation,” explains Anton Cherepanov, ESET researcher who led the investigation into the attack. “Usually this software is used by government and banking websites in South Korea. For some of these websites it’s mandatory to have WIZVERA VeraPort installed,” adds Cherepanov.

Additionally, the attackers used illegally obtained code-signing certificates in order to sign the malware samples. Interestingly, one of these certificates was issued to the U.S. branch of a South Korean security company. “The attackers camouflaged the Lazarus malware samples as legitimate software. These samples have similar file names, icons and resources as legitimate South Korean software,” says Peter Kálnai, ESET researcher who analyzed the Lazarus attack with Cherepanov. “It’s the combination of compromised websites with WIZVERA VeraPort support and specific VeraPort configuration options that allows attackers to perform this attack,” adds Kálnai.

ESET Research has strong indications to attribute the attack to Lazarus, as it is a continuation of what KrCERT has called Operation BookCodes, attributed to Lazarus by some in the cybersecurity research community. The other reasons are typical toolset characteristics; detection (many tools are already flagged as NukeSped by ESET); the fact that the attack took place in South Korea, where Lazarus is known to operate; the unusual and custom nature of the intrusion and encryption methods used; and the setup of network infrastructure.

It must be noted that the Lazarus toolset is extremely broad, and ESET believes there are numerous subgroups. Unlike toolsets used by some other cybercriminal groups, none of the source code of any Lazarus tools has ever been disclosed in a public leak.

For more technical details about the latest Lazarus supply-chain attack, read the blogpost “Lazarus supply-chain attack in South Korea” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×