Dealing with Cyber Security Challenges in a Post-COVID World

June 25, 2020

By

Vikas Bhonsle

CEO

Crayon India

With Covid-19 hitting the headlines, it has forced most organizations to adopt to new practices and norms such as Social Distancing, Sanitization and Remote Working. While the world is combating this epidemic, we also have cybercriminals who are indeed capitalizing on this crisis.

The Coronavirus epidemic has created a fresh and unlikely cybersecurity challenge for most organizations around the world. Pre-COVID19, employees were accessing their corporate network through secured office laptops and devices. With the rise in employees working from home, enterprises have been forced to migrate to cloud services almost overnight. In this rapid rush, many security best practices have been overlooked. Cloud services like enterprise chat rooms, online office suites and drives are seeing widespread use nowadays for file sharing and communication. This creates novel problems, since there are more unsecured devices being used by workers that are lacking the latest security updates and patches. Therefore, with work from home becoming the new normal, Cyber Security strategies need to get sharper, stronger and more relevant.

Let’s face it, we all know that security bugs and privacy hacking practices are not new. The traditional approach to security has been to look for outsiders who may try to break in and steal confidential data. That dynamic has now changed with the risks coming from within so to speak. Employees who lack training in security best practices may end up causing the leak of sensitive organizational data. Cybersecurity leaders must be willing to look at the bad actors or employees with malicious intent as well. This emerging threat is a serious factor to consider since a sudden influx of unsecured devices being used worldwide is a major risk. To successfully prepare for this changing landscape, we need a new paradigm of security thinking and to use tools designed for use in such scenarios. Organizations should be proactive in advising Employees and Business Partners to be more cautious and alert when interacting with external parties be it as simple as opening links, emails or documents related to the subject COVID-19. One can never know what they are stepping into. It is better to stay safe than being sorry.

Organisations that will have to consider the new threat landscape are those who are dealing in large amounts of confidential or proprietary data. This sensitive information that was earlier kept secure will require new ways of safekeeping. Cybercriminals will be eager to take advantage of this new occurrence. We are sure to see sophisticated attacks that take advantage of this widespread change in working habits. We will be seeing new hacking tools and ransomware and phishing attacks being employed. Organizations should evaluate and explore new security defense tools and methods for areas where they foresee a huge risk.

All organizations have business continuity plans, but no one would have anticipated or baked in a plan on how to manage Covid-19. It will be a good thought to revisit the Organization’s BCP plan. A risk assessment should be conducted across all processes of the Organization.

Tackling Insider Threats

A rogue employee can cause severe damage by connecting compromised devices to the company network and stealing proprietary information. To thwart such attacks, organisations must use security tools equipped with advanced analytics that track user behavior. Cybersecurity providers must factor in the human element as well while conducting threat assessments.

The tool must be reliant on multiple data sources to eliminate false positives. A typical employee uses multiple channels including SharePoint, Slack, Salesforce, and others to access and interact with company data. A mature cybersecurity solution should be able to access and analyze their user behavior from all these data sources. An advanced solution should also be able to differentiate malicious intent from normal usage.

These tools require the ability to track and record evidence of unlawful actions performed on company data. To deter insider attacks, one also requires video evidence and detailed logs to indicate malicious intent beyond a doubt. Any solution that seeks to implement this must have strong control measures to ensure that legitimate users are not affected.

Organizations should also make it a process to sensitize their employees around information security and should make use of GDPR to ensure that confidential information remain secure in case of theft or damage.

Conclusion Covid is here and is changing our lives. It has given rise to new lifestyles, new policies, approaches and new security threats. To protect intellectual property, organisations will have to transition from traditional security policies and doctrines to ones suited to a world where remote working will become increasingly common. A shift in thinking is required at a fundamental level to tackle these emerging threats. Be Smart and Stay Safe.


The COVID-19 Pandemic: Making the case for Remote Infrastructure Management Tools

June 25, 2020

BENGALURU, India – June 25, 2020 –The COVID-19 pandemic has impacted the way we live, conduct business, travel and socialize across the world. It has impacted all forms of interaction especially at workplaces and has ushered in the era of remote working or what is colloquially know as work from home. Such a disaster has not been witnessed on a global scale except for the Spanish flu of 1918. The way we live and conduct business is going to change for a long time to come. Yet, technology has once again proven to be a savior when it comes to business continuity.

 

With most enterprises keeping skeleton crews onsite and reduced employee rosters, it becomes crucial to ensure that business continuity is maintained above par. Remote Infrastructure Management (RIM) comes to the rescue during such times. It keeps crucial IT Infrastructure up and running ensures business continuity and keeps the engine of the economy running smoothly. Using these tools administrators don’t have to let social distancing norms impact their operational capabilities. They gain the capabilities to remotely manage, monitor and remedy any issues that arise or threaten to reach critical mass. The advantage of implementing RIM in an organization is to centralize the monitoring and maintenance of your IT setup. Remote Infrastructure Management covers data centres, workstations, servers, network devices, storage devices, IT security devices and the entire array of assets that form an enterprises IT Infrastructure. The outcome of implementing RIM is that it accelerates efficiency, productivity, improves customer satisfaction, mitigates risk and improves on traditional infrastructure delivery.

 

“The current pandemic has placed immense pressure on an enterprise’s, IT infrastructure and efficiencies. RIM toolsets and products have greatly contributed to easing these pressures by offering companies the capability to rapidly enable remedial actions while keeping their business backbones up and running with a high level of continuity.” said Satish Kumar V, CEO at EverestIMS Technologies

 

Remote Infrastructure Management – not an option, but an essential

  1. Customized & Modular Services: RIM offers customized and enterprise specific services based on an organization’s business needs and requirements.
  2. Access to Latest Technology: Cloud based services on offer today are updated, best-of-breed and don’t need any location based intervention. Companies get access to the latest and greatest versions of the toolsets that they need, exactly when they need it. The outcomes is an organization that enjoys efficient and effective services.
  3. 24*7 Support: IT infrastructure tends to fail when you need it the most. Enterprises need a solution that is available 24X7. RIM provides an efficient solution by ensuring 24*7*365 day support.

 

Satish further added “RIM solutions allows enterprises to concentrate on their core businesses without inflating their IT budgets. At EverestIMS Technologies, our products support the systems that keep Communication, Services, IT, backbones and enterprises running in these inclement times. We possess a highly effective Remote Access Tool that allows a stakeholder to control a network remotely. Things like authorizing which user has permissions to access specific devices and what commands can be fired through them are just a few of the RIM specific features that it possesses. We look toward making RIM easy and stress free for enterprises of all sizes.”

 

# # #

 

About EverestIMS

EverestIMS Technologies Pvt. Ltd. (EverestIMS), is an Indian software product company with a rich market experience in the I&O and Digital Transformation space, while being rooted to the Make in India ethos. EverestIMS specializes in providing integrated IT products and solutions empowering organizations to deliver enhanced services to their end-users while addressing core business needs. EverestIMS currently offers a host of products and solutions that target Large Enterprises, Telecoms, Government, BFSI, SMBs, E Commerce and a host of others. www.everestims.com


Anomali Appoints iValue InfoSolutions as a Value-Added Distributor (VAD) in India

June 25, 2020

BENGALURU, India – June 25, 2020

Anomali, a provider of intelligence-driven cybersecurity solutions, and iValue InfoSolutions, India’s Premium Technology Aggregator, today announced that the companies have entered into a distribution agreement, giving iValue InfoSolutions the ability to deploy and support Anomali threat intelligence management solutions across India.

Organizations recognize that without a high level of visibility over cyber threats, there is no way to detect and respond to the constant attacks hitting their organizations. We are excited to partner with and to see iValue InfoSolutions investing in skills to help customers gain access to integrated Cyber Threat Intelligence (CTI) solutions that will help them to improve security and reduce risk,” said Geoff Noble, Sr. VP & GM APAC at Anomali.

Anomali brings a unique approach to connect external data with internal knowledge to operationalize a unified intelligence picture for organizations to reduce risk across their environments,” said Manoj Taskar, Country Manager – India & SAARC at Anomali.

The compelling need in ever-growing cyber threats is to extract ‘Smart and Enriched Data’ out of ‘BIG DATA’ to enable faster and precise action by the IR teams. Our partnership with Anomali is one big step to empower and assist customers in building effective cyber threat intelligence program and threat sharing community to bolster defenses exponentially,” said Harsh Marwah, Chief Growth Officer at iValue InfoSolutions.

More than 1,500 global organizations, many of the Global 2000 and Fortune 500, and large government and defense organizations around the world, use Anomali to gain unlimited visibility, speed time to detection, and constantly improve security operations. Anomali platform solutions include:

Anomali Lens – This first-of-its-kind technology allows anyone to automatically and immediately know if their organizations are being attacked, who their adversaries are, and if the attacks have been successful. With one click, Anomali Lens scans web-based content, detects and highlights all threats identified within, provides easy-to-understand details about the threats and tells users if any threats are already present in their networks. Structured and unstructured web content Anomali Lens scans include news, blogs, research, bulletins, SIEM logs, other security logs, IR reports, Twitter and other social networks.

Anomali Match – Anomali Match integrates cyber threat intelligence, MISP data, OSINT, SIEM logs, vulnerability assessment tools, and other big data sources to match billions of IOCs and threats against any that are present in customers’ networks. By providing automated, retrospective analysis for extended periods, users detect threats and compromises that have been present for short and long durations.

Anomali ThreatStream – This leading threat intelligence platform (TIP) integrates data from the widest range of feeds to create actionable threat intelligence. The integrated Anomali APP Store provides users with one-click integration of the widest and most varied range of proprietary and open-source threat feeds available. The same platform would power the trusted collaboration on secure threat sharing for Information Sharing and Analysis Centers (ISAC) and Information Sharing and Analysis Organizations (ISAO).

# # #

About iValue InfoSolutions

A premium technology enabler, iValue InfoSolutions drives “Go to Market” for Niche, Compelling and Complimentary offerings, Digital Assets” Protection, Optimization & Transformation area, leveraging Customer Life Cycle and Product Life Cycle Adoption frameworks.

iValue mission is to optimize, protect & transform “Digital Assets” of Organizations, with leading edge & proven offerings, in collaboration with trusted partners. iValue offerings are aligned, customized & optimized for organizations, across vertical & size, through its OEM, consultant & global, national, regional and local system integrators partnership.

iValue has direct partnership with 35+ “Best of Breed” OEM’s with 7000+ Customers through 700+ partners. iValue has a direct presence across 13+ locations in multiple continents, with channel, solution, vertical & horizontal focused teams, addressing pre-sales, sales & post sales needs of Customer, Consultants & Partner, for Private, Public and Hybrid cloud needs. Apart from India, iValue overseas presence include Nairobi, Kenya office for Africa foray.

The team at iValue leverage Analytics for its structured and targeted business development at Customers along with AI driven CRM solution for ensuring profitable growth for its partners and OEM. For more information, visit iValue and Twitter and follow us on LinkedIn


%d bloggers like this: