Connect with us

GRTech

Protecting Assets in a Remote-first (and potentially Hostile) World

With both persistent attacks and post-pandemic remote work here to stay, modern security solutions must assume the endpoint device or phone operates in a dangerous environment at all times, writes Chester Wizniewski

Published

on

Protecting assets in remote work environment

I live in a city center and the lunch hour certainly isn’t like it once was. While some people have returned to working in an office, it seems that the majority have not. Looking back, the pandemic will have been a turning point for many things around the world, and the rhythms of office-centered worklife will be something that will never return to the old ways.

With this increased flexibility employees are not just working from home behind consumer-grade Wi-Fi routers; they are also spending part of the day at the park or coffee shop, or perhaps even having a “working holiday.” Those in charge of protecting enterprise assets have to assume these endpoints are always in hostile territory.

Even before the pandemic, organizations working toward improving their security maturity were often trying to “push left.”  What is pushing left? At its most basic level it means moving things closer to the start. It originates from software development where the stages of the development process are conceptualized from left to right, left being the beginning. In applied security we also use the term “pushing left,” but rather than referring to the software development process we are referring to the attack chain, which moves from reconnaissance on the left through action (exfiltration or other attacker goal) on the right.

For many years, the most comprehensive security strategies have involved defense in depth. The idea is that not all technologies are suitable for detecting a given threat type, so it is best to deploy them in layers. These layers often directly correspond to how far “left” something is in the attack chain. If you can detect something at the network border through your firewall, email, or web filters, you have contained the threat before it has any negative impact on operations.

Ideally you want to detect and block an attacker as far left as possible, i.e., as early as possible. Pushing detections left also alerts security analysts that an intrusion may be underway, initiating more focused threat hunting to anticipate gaps in defenses your attacker may be attempting to exploit.

For employees at the office, you can centralize control of these defenses and provide optimum protection. The question is, are you able to provide the same protection for remote workers regardless of their location? Can you monitor and respond to threats being detected on those assets when they are out of the office? As many have observed, this did not work as well as we would have liked when we all went into lockdown, many of us without a plan.

While there are still many benefits to monitoring the network when you have control of it, including reduced endpoint overhead and the ability to keep threats at a distance from sensitive assets, we need to ensure we can take as much of this protection as possible with us when we are out and about.

We must ensure not only that protection is optimized, but also that we don’t lose our ability to monitor, detect, and respond to attacks targeting these remote assets. Most organizations have moved to utilizing EDR/XDR solutions (or plan to in the very near future) , which is a great start, but not all solutions are comprehensive.

In the remote-work era, insufficiently protected remote users can encounter plenty of issues – malicious URLs and downloads, and networks attacks, to name only the most mundane – that in the Before Times would have been handled by machines guarding the corporate “fort.” The biggest missing components when users are “outside the fort” are HTTPS filtering and web content inspection of the sort that is typically implemented within next-generation firewalls. When you add these technologies to pre-execution protection, behavioral detection, machine learning models, client firewalls, DLP, application control, and XDR, you are starting to look at a comprehensive stack of defenses for attackers to overcome – even if the endpoints themselves are now free-range.

For initiatives like zero trust network access (ZTNA) to be effective, we must not only wrap the applications we interact with, but we must also wrap the endpoints that connect to them. Simple checks like whether the OS up-to-date and whether it has security software installed may be a good start, but not all protection is created equal.

With most devices being connected to the internet whenever they’re in use, we can leverage the power of the cloud to help provide ubiquitous protection and monitoring. Modern security solutions must assume the endpoint device or phone is in a hostile environment at all times. The old idea of inside and outside is not only outdated, it’s downright dangerous.

The writer Chester Wizniewski is a Field CTO Applied Research at Sophos

GrassRoots.ng is on a critical mission; to objectively and honestly represent the voice of ‘grassrooters’ in International, Federal, State and Local Government fora; heralding the achievements of political and other leaders and investors alike, without discrimination. This daily, digital news publication platform serves as the leading source of up-to-date information on how people and events reflect on the global community. The pragmatic articles reflect on the life of the community people, covering news/current affairs, business, technology, culture and fashion, entertainment, sports, State, National and International issues that directly impact the locals.

Continue Reading

Startups

Scaleup with STEP: How STEP Empowering Startups & Talent in Africa

Published

on

Scaleup with STEP

Africa is rapidly becoming a hotbed for innovation, entrepreneurship, and technological advancements.

Yet, for many startups and talented individuals, the journey from concept to market traction and revenue is often fraught with challenges.

Enter the Startup and Talent Enhancement Program (STEP), a pioneering initiative by IDEA Africa, with support from the UK-Nigeria Tech Hub. STEP is not just a program; it’s a transformative force empowering startups and talent across Africa to scale up and achieve sustainable growth.

The vision of STEP is simple yet profound: to bridge the gap between potential and success for startups that have moved beyond the post-revenue stage but are struggling with technical debt, growth hacking, marketing, and other critical areas. How? By giving them access to a large pool of professionally trained talent, strategic market advice from industry experts with years of experience, and a community with like-minded people and fellow founders. By providing targeted intervention and strategic resources, STEP ensures that these startups are not just surviving but thriving.

STEP’s approach is holistic, providing support in multiple areas crucial for startup success. From offering technical assistance, helping startups overcome technical debt and improve their product offerings to providing growth hacking strategies and tools to drive rapid growth and scale operations, to offering marketing insights and resources to effectively market products and reach the right audience and also assisting startups in developing robust business strategies that ensure long-term success.

STEP is committed to empowering individual talent and helping mentors attain fulfilment. By connecting skilled professionals and experienced mentors with high-potential startups, STEP not only helps these individuals find meaningful work and fulfilment but also fosters a culture of innovation and collaboration. This creates a dynamic ecosystem where both startups, talent and mentors can thrive.

To maintain the quality and impact of the program, STEP employs a rigorous selection process. Startups are evaluated based on their growth potential, market fit, and alignment with STEP’s objectives. This ensures that only the most promising startups, ready to embrace transformative changes, are chosen. The result is a cohort of high-potential startups primed for success.

Why STEP?

We are not just another initiative, but an organisation committed to transforming lives and businesses. We believe in the power of local startups to drive economic growth and create jobs. With tailored support and resources, we help you overcome challenges and reach new heights. Also, we provide comprehensive talent and mentor support, connecting you with skilled professionals who can help take your business to the next level. At STEP, we are dedicated to the professional growth of individuals. Through our program, selected talent will receive upskilling opportunities and access to job placements that match their skills, ensuring a bright future for all.

Application Details:

Key Dates:

  • Application Period: July 22nd – August 31st, 2024

How to Apply for Startups, Talent and Mentors:

  1. Click www.steptech.ng
  2. Select your track
  3. Create an account with us
  4. Verify your email
  5. Log in to start your application

How to Apply for Hubs:

Join STEP in Transforming the Startup Ecosystem

We invite all innovators, from startups to mentors, talent, and hubs, to join us in this exciting journey. STEP is your opportunity to make a significant impact, drive innovation, and contribute to the growth of the startup ecosystem in Enugu, Rivers, and Ekiti states.

“Scaleup with STEP” is not just a call to action; it is a testament to the potential and resilience of African startups and talent. By providing targeted support, fostering connections, and driving innovation, STEP is paving the way for a brighter future in Africa’s tech landscape. Join STEP today and be a part of this incredible transformation.

Join the Community

Stay connected with us on LinkedIn, Twitter, Instagram, and Facebook for updates, success stories, and live Q&A sessions. One of the most vital parts of STEP is the community that we are creating. By joining STEP, you join a community of like-minded innovators, tech enthusiasts, and industry experts. This community is a place to collaborate, share experiences, and form long-term connections that can help your startup grow.

Follow STEP’s innovative and exciting journey on social media platforms @steptechnigeria on Instagram, Facebook, LinkedIn, and X.

For more information, visit the website or contact the team at [email protected].

About IDEA Africa:

IDEA Africa is a leading organization dedicated to fostering innovation and entrepreneurship across Africa.

Through various initiatives and partnerships, IDEA Africa supports the growth of startups and the professional development of talent, driving economic growth and technological advancement in the region.

Continue Reading

GRTech

Sophos Named Customers’ Choice for Endpoint Protection Platforms (EPP) by Gartner

Sophos Achieved a 4.8/5.0 Rating for Both Categories and Rated as a Customers’ Choice for all Available Segments Within the Reports

Published

on

Sophos Intercept X

Sophos, a global leader of innovative security solutions for defeating cyberattacks, today announced it has been named Customers’ Choice in the Gartner Peer Insights Voice of the Customer for Endpoint Protection Platforms (EPP) and Network Firewalls reports.

This achievement includes 4.8/5.0 scoring ratings in both categories. Sophos is also rated a Customers’ Choice for all available segments within the two reports.

“Winning one Gartner Customers’ Choice is a great achievement, but winning two in crucial interrelated categories is incredible and a strong reflection of our relentless focus to deliver optimal security outcomes for our customers,” said Rob Harrison, senior vice president, Product Management – SecOps and Endpoint Security. “Endpoint protection that works seamlessly with network security is a winning formula to defend against today’s innovative and persistent adversaries who are consistently devising new techniques to carry out ransomware and other potentially business-ending cyberattacks. This synergy enhances threat detection, reduces response times, and simplifies management, ultimately fortifying organizations against complex cyber threats that require proactive prevention and automated interventions at multiple points on the attack chain.”

Sophos Intercept X customer quotes from the endpoint protection platforms report include:

  • “Sophos endpoint provides the most robust anti ransomware protection in the industry,” IT manager in the manufacturing industry.
     
  • “Sophos endpoint protection combines multiple prevention techniques to reduce the attack,” IT manager in the education industry.

  • “Intercept X provides us protection against various cyber threats using its combination of signature-based, behavioral and machine learning methods enduring protection against malware, ransomware and other malicious activities,” network and security engineer in the manufacturing industry.

  • “It’s a great experience to work with Sophos Intercept X due to its robustness and unparalleled capability against any exploits and ransomware. It is truly amazing that this product works seamlessly while handling any threats at the system end,” manager in the media industry.

Sophos Firewall customer quotes from the network firewall report include:

A complimentary copy of the Gartner Peer Insights Voice of the Customer: Endpoint Protection Platforms report is available here.

A complimentary copy of the Gartner Peer Insights Voice of the Customer: Network Firewalls report is available here.

Continue Reading

GRTech

Ransomware Recovery Costs for Energy and Water Sectors Rise to $3m in 1 Year, Sophos Survey Finds

49% of Ransomware Attacks Against These 2 Critical Infrastructure Sectors Started with an Exploited Vulnerability

Published

on

Sophos’ Annual State of Ransomware

Sophos, a global leader of innovative security solutions for defeating cyberattacks, today released a sector survey report, “The State of Ransomware in Critical Infrastructure 2024,” which revealed that the median recovery costs for two critical infrastructure sectors, Energy and Water, quadrupled to $3 million over the past year.

This is four times higher than the global cross-sector median. In addition, 49% of ransomware attacks against these two critical infrastructure sectors started with an exploited vulnerability.

Data for the State of Ransomware in Critical Infrastructure 2024 report comes from 275 respondents at energy, oil and gas, and utilities organizations, which fall under the Energy and Water sectors of CISA’s 16 defined critical infrastructure sectors.

The results for this sector survey report are part of a broader, vendor-agnostic survey of 5,000 cybersecurity/IT leaders conducted between January and February 2024 across 14 countries and 15 industry sectors.

“Criminals focus where they can cause the most pain and disruption so the public will demand quick resolutions, and they hope, ransom payments to restore services more quickly. This makes utilities prime targets for ransomware attacks. Because of the essential functions they provide, modern society demands they recover quickly and with minimal disruption,” said Chester Wisniewski, global Field CTO.

“Unfortunately, public utilities are not only attractive targets but vulnerable to attacks on many fronts, including the requirement for high availability and safety, as well as an engineering mindset focused on physical security. There’s a preponderance of older technologies configured to enable remote management without modern security controls like encryption and multifactor authentication. Like hospitals and schools these utilities are frequently operating with minimal staffing and without the IT staffing required to stay on top of patching, the latest security vulnerabilities and the monitoring required for early detection and response.”

On top of growing recovery costs, the median ransom payment for organizations in these two sectors jumped to more than $2.5 million in 2024—$500,0000 higher than the global cross-sector median.

The Energy and Water sectors also reported the second highest rate of ransomware attacks. Overall, 67% of the organizations in these sectors reported being hit by ransomware in 2024, in comparison to the global, cross-sector average of 59%.

Other findings from the report include:

  • The energy and water sectors reported increasingly longer recovery times. Only 20% of organizations hit by ransomware were able to recover within a week or less in 2024, compared to 41% in 2023 and 50% in 2022. Fifty-five percent took more than a month to recover, up from 36% in 2023. In comparison, across all sectors, only 35% of companies took more than a month to recover
  • These two critical infrastructure sectors reported the highest rate of backup compromise (79%) and the third highest rate of successful encryption (80%) when compared to the other industries surveyed

“This once again shows that paying ransom payments almost always works against our best interests. An increasing number (61%) paid the ransom as part of their recovery, yet the amount time it took to recover was extended. Not only do these high rates and amounts of ransoms encourage more attacks on the sector, but they are not achieving the claimed goal of shorter recovery times,” said Wisniewski.

“These utilities must recognize they are being targeted and take proactive action to monitor their exposure of remote access and network devices for vulnerabilities and ensure they have 24/7 monitoring and response capabilities to minimize outages and shorten recovery times. Incident response plans should be planned in advance, the same as for fires, floods, hurricanes and earthquakes, and be rehearsed on a regular schedule.”
Read the full State of Ransomware in Critical Infrastructure on Sophos.com.

Continue Reading

Trending