Data Breach Archives - ARCON https://arconnet.com/category/data-breach/ ARCON - Award-winning Risk Management Solutions Fri, 09 Feb 2024 05:34:28 +0000 en-US hourly 1 https://arconnet.com/wp-content/uploads/2019/12/Arcnnet-Favicon.png Data Breach Archives - ARCON https://arconnet.com/category/data-breach/ 32 32 Data Breaches: Reasons & Remedies https://arconnet.com/blog/data-breaches-reasons-remedies/ Mon, 14 Mar 2022 07:09:41 +0000 https://arconnet.com/?p=6468 In the next couple of years, organizations have one in four chances of data breach that could cost around $2.21 million. An apparently small IT security vulnerability might result in a significant data breach incident if not addressed on time.

Large, small and mid-size enterprises may face serious consequences if sensitive information is made public. Apart from the financial consequences and legal wrangles due to noncompliance with regulations, business operations might be crippled due to breaches. The first step in preventing a data leak is to understand the root cause. There are several causes of data breach incidents. A few among them are discussed here:

 

5 common causes of data breaches:

It is not always that data breaches stem from organized cyber criminal groups.

  • Unpatched Security Vulnerabilities 

If IT security patches are not updated or addressed for extended periods, it might open the door for hackers to get easy access to your company’s confidential data assets. Not only that, it might stay unnoticed for a longer period and the extent of damage could be on the higher side.

  • Manual Error 

This is one of the common reasons for data theft in an organization. The nature of the error may vary, but some of them are: creating weak and predictable passwords, sending sensitive information to the wrong people, sharing password/ account information in an open excel sheet, falling for phishing and more. Most of these human errors can be prevented by ensuring that employees are well-versed in basic data security protocols along with stringent IT security policies.

  • Malware 

Malware may not be a huge concern for employees’ PCs but can be a growing threat aimed directly at the infrastructure of your company. While many of these “malware incidents” are insignificant, the sheer volume can be concerning.

The primary reason would be that the hackers can make slight changes to existing malware programs to render them unidentifiable to antivirus software while still achieving the hacker’s desired impact. 

  • Insider Threats 

Insiders are one of the biggest reasons behind data breaches in organizations. If the authorized user in the IT infrastructure misuses the elevated entitlements then the enterprise data could be accessed with malicious intent. The most dangerous fact of a malicious insider is that it remains unnoticed and undetected for long as the ‘trust’ is misused.

  • Physical Theft 

Theft of any official device such as pen drive, external hard drive or even laptop with critical information about the organization is the last item on our list, though it is not the least harmful. The data saved on the devices are misused after being stolen.

How to Prevent a Data Breach?

As discussed, data breach incidents can happen due to multiple reasons; similarly, there are multiple areas of IT security that can ensure prevention of data thefts. While ensuring timely patching helps to address system vulnerabilities, for today’s organizations it is also critical to have unified endpoint management platforms, which includes, Data Loss Prevention (DLP) and end-users behavior analytics measures along with robust Identity and Access Management practices. Robust (IAM) practices enforce Identity Governance and help to manage the life-cycle of identities, whether interacting with cloud resources or legacy applications. 

In addition, every end-user in an IT ecosystem should have active involvement in protecting critical data. Apart from following the IT security policies, every end-user activity needs to be monitored seamlessly at a granular level. The simple reason is every user in the IT environment could be a potential threat.

Lastly, privileged environments are the most vulnerable environments in terms of data breaches. Privileged accounts are the gateways to most of the confidential business information, and thus it is targeted by malicious third-parties, organized hacker groups and even corporate insiders. A robust and comprehensive Privileged Access Management (PAM) solution addresses the risks of unmonitored and unauthorized access to the target systems. It ensures that trusted entitlements are never compromised by enforcing authorization, authentication and audits for every privileged session. 

Conclusion

In the current IT context, where IT resources are scattered across hybrid environments and end-users access systems from anywhere, it is critical to ensure robust security policies and procedures. Organizations can significantly bring down the chances of data breach incidents if IT vulnerabilities are addressed on time by adopting endpoint protection and Identity and Access Management solutions.

]]>
Prevent Disruption arising from Cyber Threats https://arconnet.com/blog/prevent-disruption-arising-from-cyber-threats/ Mon, 31 Jan 2022 10:40:51 +0000 https://arconnet.com/?p=5664 What is Cyber Defense?

“The best defense is a good offense” – ever came across this adage? Situations arise very often when protecting oneself becomes the best and only way to stay safe. 

In cybersecurity, the termcyber defense’ refers to the ability or capability to protect critical systems from cyber attacks. It also involves taking actions to predict risky IT actions and identifying vulnerable areas to counter intrusions. A typical cyber defense strategy is built upon three components: predict, protect, and prevent cyber threats.

 

Why is it Important? 

If organizations take proactive steps to ensure adequate cybersecurity in place, they will be able to avoid cyber attacks and prevent data thefts at the right time. With the best possible cyber defense strategies, organizations can ensure uninterrupted business processes round the clock. It builds the ‘trust’ between the organization and its stakeholders because in case of any cyber incident, the brand image of the organization is tarnished. Not only that, there are legal consequences that lead to huge financial losses.

Hence, a cyber defense strategy is a must to build  robust cyber defense: It mitigates the probability of:

  • Cyber attacks
  • Data breach incidents
  • Interruption in business process and business continuity
  • Financial losses
  • Reputation loss
  • Increase in legal expenses
  • Non-Compliance penalties
  • Breach of ‘trust’ among stakeholders

 

How is it possible? 

A best-in-class solution with adequate access control security features powered with AI and ML capabilities can ensure robust cyber defense in an organization. A Privileged Access Management (PAM) solution is the best bet in the modern cyber age to stay safe and secure from cyber threats. Let us see why PAM is becoming indispensable in organizations everyday.

Avoid Insider Threats: Knowing from where the attack is coming is the best way to secure data assets from any compromise. Most data breach incidents stem from compromised end-users. Due to the abrupt transformation in the IT environment, privileged identities are becoming very vulnerable. Since those identities are large in number for typical organizations and a gateway to confidential information, securing those identities proactively makes the overall IT infrastructure stronger.

In order to identify suspicious insiders, features like just-in-time privilege, seamless monitoring of the users, multi-factor authentication and frequent rotation and randomization of passwords help organizations a long way in mitigating looming IT attacks. Likewise, a PAM empowered with AI capabilities can help to understand the risky and anomalous identities that pose a serious threat to confidential information.

Ensure Best Security Policy: In the era of a complex and distributed IT environment, the major challenge that organizations face, lies with whether the users are doing what they have been assigned to do. Any deviation from their roles and responsibilities generally means that they are not doing what they are supposed to do. Herein lies the challenge and a PAM solution like ARCON | PAM identifies the suspicious user and notifies the IT administrator immediately.

We need to note here that organizations, even if they deploy PAM, adhering to the IT security policy is a must. The IT administrators, IT users and organizations need to follow the policy to ensure end-to-end security in the environment. If the policy is poor or ambiguous, it creates a gap between the three and overall IT security is affected. Moreover, a robust IT security policy shows the cyber readiness of an organization that builds the foundation of cyber defense.

 

Conclusion

A variety of individuals from different levels are involved to ensure cyber defense initiatives in an organization. Starting from the management who prepares the policies, the IT security team who ensures that the policies are in place and the IT users who follow the rules and regulations strengthen overall cyber defense. Nevertheless, regular audits help organizations to examine cyber security measures and offer recommendations regarding reset of priorities and implementation of new tools.

]]>
Essential IT security tools for the ‘New Normal’ https://arconnet.com/blogs/essential-it-security-tools-for-the-new-normal/ Mon, 08 Feb 2021 06:06:32 +0000 https://arconnet.com/?p=4147 In the previous blog, we discussed how the on-going pandemic situation has changed the global cybersecurity landscape. We will continue the discussion with how ARCON is helping organizations to stay secure in this ‘new normal’.

A] ARCON | Privileged Access Management (PAM)

Almost two-thirds of global data breach incidents happen due to compromise of privileged accounts. The typical challenges that organizations face while managing privileged accounts in both on-prem and remote work conditions are inadequate monitoring of privileged sessions, no rotation or randomization of passwords, no password vaulting, no multi-factor authentication (MFA) of users, and no report on logs for IT audits.

 ARCON | Privileged Access Management (PAM) is a comprehensive solution that seamlessly manages, monitors and controls the activities of privileged users in an enterprise network. If we consider the general use cases of PAM today, especially in remote work conditions, most of the organizations are prioritizing password-less access on the target devices where the users can seamlessly connect with the VPNs (extensiveness of RDPs). But VPN-led approach is risky. It is prone to hacking, does not provide granular access control and Multi-factor authentication. On the other hand, ARCON | PAM has a complete set of Identity Governance tools that includes MFA, Session monitoring, command restrictions (granular control) capabilities, password vaulting including an application streaming server that streams only required data to end-user machines from target devices in an encrypted manner.

Moreover, organizations are getting extra-cautious over time management and manpower management. No organization would like to spend an army of employees to manage PAM solutions. ARCON | PAM, in this context, is user-friendly and safeguards enterprise OS, security devices, routing devices, telecom equipment, business applications, cloud applications, IT operational technologies, robotics, and IoT. It secures and automates password rotation policies of the privileged accounts of critical systems by offering a strong password vault and managing the overall PAM lifecycle with minimum manpower.

B] ARCON | User Behaviour Analytics (UBA)

The preamble of modern IT security has changed a lot in the last few months after remote work culture became the ‘new normal’. The global IT community now believes in ‘predicting risks’ rather than ‘preventing risks’. ARCON | User Behaviour Analytics (UBA) has transformed the way Information Security is analyzed today. It is a highly effective risk predictive & user behaviour analytics tool built for daily enterprise use cases in WFH conditions. The AI-ML component of ARCON | UBA understands the behavior pattern of the end-users round the clock and in case of any deviation from the baseline activities, flags to the administrator about a probable anomaly. For instance, if a user downloads approx. 10MB of data files every day but suddenly downloads gigabytes of files, UBA tool would consider it as an anomaly and alert the admin immediately.

Demand of ARCON | UBA solutions from SMEs are soaring every day and will keep on rising. Not just helping to implement secured access control, this tool ensures that the IT security team can monitor remote users in WFH conditions where chances of data misuse are high.

C] Secure Remote Access

IT security in remote work conditions has been a huge challenge altogether. Organizations from every industry worldwide are striving hard to ensure every remote access is seamlessly monitored in WFH conditions to ensure security. It necessitates the organizations’ IT security team to stay alert and aware of how the confidential information is handled by the users while working remotely. Otherwise, cybercriminals might exploit the situational (pandemic) vulnerabilities to cause data breach, data exfiltration, unauthorized access, password abuse etc.

 ARCON | Secure Remote Access provides Single-sign-on (SSO) to securely access applications and data from remote work conditions. It supports several Identity protocols. SSO ensures that all important privileged credentials are not shared and compromised. Moreover, the tool offers privilege session management that monitors and records all the activities. Just-in-time privileges approach ensures that users are granted access strictly on a ‘need-to-know’ and ‘need-to-do’ basis.

D] Zero Trust Network Access (ZTNA)

“To be or not to be” – the age-old soliloquy from William Shakespeare’s Hamlet comes in our mind while discussing ‘Trust’ of IT users. This is a never-ending dilemma and its seriousness has increased too much in the post pandemic times. Global organizations are shifting their focus from typical perimeter-centric security towards advanced IDS (Intrusion Detection System) models. Hence Zero Trust Network Access (ZTNA) security model has been so discussed, desired and accepted as the whole world has cocooned itself at home.

ARCON | PAM solution helps organizations to build the foundation of ZTNA. Since assessment of trust is a continuous process and it is going to be never-ending in the WFH circumstances, ARCON sticks to the credo “we trust you, but we will continuously assess the trust”. As the ZTNA security model suggests, it is mandatory to have a unified data security policy for all applications and databases that are accessed by privileged accounts. ARCON | PAM solution seamlessly inspects all the tasks happening around privileged identities and ensures trustworthiness. Moreover, ARCON Zero Trust architecture ensures continuous adaptive risk assessment (establishing trust over IP address, devices, facial recognition, bio-metrics, geo-location, etc), secure segmentation of identities, and robust detection and incident response. All these components enable the IT security team to have a comprehensive visibility over segmented and dispersed Identities.

E] Endpoint Security

Compromise of the endpoint privileges has been proved to be one of the biggest sources of data theft worldwide. Almost 60% of the organizations fail to monitor their endpoints. Poor endpoint management not only leads to data theft but also creates ambiguity over access to business-critical applications. The situation in remote working conditions has turned worse.

In WFH scenarios, it is hardly feasible for the administrators to track whether the users are using unauthorized and unrecognized endpoints in the enterprise network. ARCON | Endpoint Privilege Management (EPM) bridges the security gap between unmanaged endpoints and IT administrators in an enterprise network. It grants endpoint access to the privileged users by segmenting them strictly on their roles, responsibilities and duration (granular  control). The access right is revoked immediately after the task is accomplished and thus helps organizations to avoid unnecessary standing privileges. It is highly recommended in WFH conditions, especially during flexible working hours.

Conclusion

In a genre where inadequate cybersecurity measures have become a burning topic among the IT community, the recent ‘new normal’ conditions have accelerated the necessity for secure remote access. ARCON offers a stack of robust technologies to overcome these challenges.

]]>
The Changing Landscape of Privileged Accounts Security https://arconnet.com/the-changing-landscape-of-privileged-accounts-security/ https://arconnet.com/the-changing-landscape-of-privileged-accounts-security/#respond Fri, 06 Nov 2020 13:56:54 +0000 https://arconnet.com/?p=3210 Paul Fisher and Anil Bhandari decode the role of PAM in modern IT environments
ARCON and KuppingerCole met once again for an exclusive webinar! Held on 3rd November 2020, this webinar was presented by the two stalwarts of modern IT security: Paul Fisher, Lead Analyst, KuppingerCole Analysts AG and Anil Bhandari, a Thought leader and Chief Mentor, ARCON. In this hour-long session, the essence of a robust Privileged Access Management (PAM) solution was discussed in detail. Unmonitored privileged accounts are the major source of data breaches and malicious actors always try to exploit the security vulnerabilities in and around privileged identities.

During the first half of the webinar, Paul Fisher from KuppingerCole highlighted the traditional IT threats associated with privileged accounts in the modern organizations. He also highlighted the IT trends, technologies and future of this solution. Below are the key takeaways from the first half of the session:

  • The traditional IT threats associated with privileged accounts are due to unmonitored and unrestricted access, lack of user authorization and user authentication, uncontrolled access to the database servers, weak privileged credentials, poor privileged lifecycle management, and lack of accountability. He also added that global security compliances like EU GDPR, California Privacy Act, SWIFT CSCF and their implementation prevent losses of digital assets, money and reputation.
  • Adoption of several business processes are demanding more robustness of PAM solutions. Due to the drastic transformation of the work environment, organizations are counting too much on remote access, unlimited vendor access, uninterrupted customer access, data governance etc. However, security of the admin accounts and the privileged accounts remains at stake if the access control mechanisms are unable to detect and identify anomalous behaviour.
  • To beef up IT security in the enterprise network of Privileged Access Management (PAM), organizations are emphasizing more on seamless monitoring of the privileged sessions, multi-factor authentication of the users, single sign-on and incorporating Zero Trust Privileged Access Security framework. Assessment of risk is given more crucial to reinforce end-to-end security in the overall IT ecosystem.
  • Incident response management, forensics, endpoint protection, secure remote access and IT risk management are the security processes that organizations are following today to keep emerging IT threats at bay.
  • Today privileged accounts are no more accessed only by the administrators but also by IT users in different levels of IT operations. The expansion of network, geography and the number of privileged accounts are forcing IT security teams for better management of passwords. To ensure ease of operations, the organizations keep on piling up privileged rights without keeping a track of the passwords which leads to disaster.
  • The proliferation of high value data and services suggest more number of privilege accounts in modern organizations. Assessment of risk and continuous analysis of the importance of the accounts is most important to ensure secure IT infrastructure. Systematic allocation of roles and responsibilities can help organizations to track who is accessing which account at what time for what purpose. This enhances the agility and effectiveness of PAM solutions.
  • The high value privilege accounts require immediate shift towards Just-In-Time privilege so that excessive standing privileges can be removed from the enterprise network. The administrators can keep a track of the privileged rights easily since the permit is temporary and requirement-based.

In the later half of the webinar Anil Bhandari from ARCON discussed the advanced use cases of Privileged Access Management (PAM) and how ARCON can help to meet the requirements to eventually move towards a successful PAM implementation. Here are the highlights of the discussion:

  • Considering the general use cases of PAM today, the first and foremost point that most of the organizations prefer is to implement password-less access with all the target devices where the users can seamlessly connect with the VPNs, RDPs etc. Secondly, organizations look forward to implementing command filtering features which are necessary in scenarios where commands are given to wrong targets. PAM helps to filter the relevant firing of commands with a strong control over the access mechanism.
  • Session monitoring is not only important from a security perspective but also it helps the admin team to rectify any mistakes in any of the sessions done by any user by finding out the time and location of the task. For example, if any third party vendor who is supposed to shoot a command to the production team, by mistake shoots it to the procurement team, session monitoring can help to identify the wrong command and terminate it immediately.
  • In spite of having all the above mechanisms in place, organizations still struggle with a Password rotation policy especially in the mid-size and large organizations. The prevalent reasons behind it are a large number of IT assets, huge investments in new technologies without assessing the IT environment, inability to meet the needs of authorizing and authenticating users, understanding highly complex IT infrastructure, explosion of privileged IDs without any least privilege principle and so on. ARCON | PAM necessitates all the requirements under one roof.
  • Since a decade, ARCON understands and emphasizes the requirement of a strong vault that can be far from attack and no data asset is lost. In addition, hundreds and thousands of passwords can be rotated in minutes with ARCON | PAM’s password vault. It has the technology of Multi-vault processors that can be aligned to the IT infrastructure on the basis of devices, user groups or lines of businesses.
  • The technologies that PAM platform safeguards are enterprise OS, security devices, routing devices, telecom equipment, business applications, cloud applications, operational technologies, robotics, and IoT. ARCON | PAM helps organizations with an overall time management because no organization would like to spend an army of employees to manage PAM solutions, instead, it should be user-friendly and a self-learning experience.
  • ARCON plays the role of an identity provider in an enterprise by managing the PAM lifecycle and offering a strong vault. It protects the data assets with a smart session monitoring, command filtering, and offers analytical reports on screen from which the risk assessment team can capture any kind of suspicious activity. It even directs the administrator to the right video at the right time which saves lots of time while checking all the user activity videos hours after hours.
  • ARCON with its highly skilled professional services team can help organizations achieve the advanced use cases without any disruptions. Large enterprises have embarked on the journey to address the emerging threats across the globe and ARCON solutions are there to safeguard the organizations from those threats.
  • ARCON is even ready for some advanced use cases. In the next 2 years, BOTs are likely to come up with a huge space. Our personal tasks could be even automated and credentials would start being hard-coded. PAM again here could play a big role to secure and automate password rotation policies.
  • Lastly, Zero Trust Security model is going to be mainstream now where users can access the technologies from anywhere in the world. It requires uninterrupted assessment of the tasks done by the IT users. ARCON | Privileged Access Management (PAM) is always a step ahead with the robustness of risk-predictive mechanisms compared to the risk-preventive ones. The Predict | Protect | Prevent model of ARCON enables us to build a Zero Trust framework around privileged identities.

ARCON in this cutting-edge technology domain is always ahead in the competition as the R&D team always remains at par with the demands and trends. ARCON | Privileged Access Management (PAM) in this era of remote work conditions addresses humongous access control risks arising from daily use cases. ARCON sincerely looks forward to be a part of more webinars with KuppingerCole Analysts and explore more avenues of privileged security that can be reinforced in the new-age technologies of the next decade.

ARCON is a leading enterprise risk control solutions provider, specializing in risk-predictive technologies. ARCON | User Behaviour Analytics enables to monitor end-user activities in real time. ARCON | Privileged Access Management reinforces access control and mitigates data breach threats. ARCON | Secure Compliance Management is a vulnerability assessment tool.

]]>
https://arconnet.com/the-changing-landscape-of-privileged-accounts-security/feed/ 0
Importance of Information Security in CSR https://arconnet.com/importance-of-information-security-in-csr/ https://arconnet.com/importance-of-information-security-in-csr/#respond Wed, 16 Oct 2019 17:38:11 +0000 https://arconnet.com/?p=899 What is CSR?
The concept of Corporate Social Responsibility (CSR) was first discussed in the 1950s though it was widely acknowledged much later during the late 1990s. The core idea of CSR is to integrate business with responsibilities towards our society and environment. CSR, in this way, is considered as the most convincing way to achieve a balance between economic, environmental and social imperatives while at the same time addressing the expectations of shareholders and stakeholders. Organizations try to enhance the reputation of a company with active CSR, although the concept of CSR goes beyond that.

How IT security is relevant to achieve CSR objectives?
With an estimated population of more than 8 billion in the world today, our earth is bearing the pressure of scarcity of natural resources. Today, extensive deforestation, too much usage of motor vehicles, emission of toxic gases from factories, vehicles, ACs etc. have made human life unbelievably miserable. Pollution of air, water and land (due to too much of waste) is bringing new health hazards too. Organizations that consider CSR as one of its core principles, invariably blossom because investors and regulators are among various stakeholders who look at these entities favorably. But in the time of increasing digitization, building digital trust should also be given utmost importance.

Worldwide digitization drive has boosted IT efficiency and brought convenience to both organization and customers. However, technological advancements in organizations has resulted in new IT complexities. The nature of IT threats are getting sophisticated. Digital records are constantly under threat from organized cyber criminals. They could target patients’ record, employees personal details or other types of personal information. Therein lies an organization’s added responsibility to protect the integrity of data which it stores and processes. Secondly, malefactors within organizations could seriously harm an organization in today’s data-centric world. Quite often, we do notice that disgruntled/ malicious insiders try to malign the reputation of an organization by stealing data.

In this backdrop, several regulations such as General Data Protection Regulation (GDPR) has mandated stringent cyber-security policies to safeguard the privacy and integrity of personal information. Failure to implement these cyber-security/ regulatory mandates not only inflicts heavy financial damage but also damages the brand reputation — the sole reason why corporates spend so much resources on CSR. Thus in the times to come, an enterprise will not be judged solely on its CSR initiatives. The market, investors, and people in general will look at the digital footprint and cyber-security track record to judge a company.

The Bottom-line:

Harnessing digital trust should be one of the crucial steps towards attaining a robust CSR framework.

ARCON is a leading enterprise risk control solutions provider, specializing in risk-predictive technologies. ARCON | User Behaviour Analytics enables to monitor end-user activities in real-time. ARCON | Privileged Access Management reinforces access control and mitigates data breach threats. ARCON | Secure Compliance Management is a vulnerability assessment tool.

]]>
https://arconnet.com/importance-of-information-security-in-csr/feed/ 0
Disruptive Technologies Have Changed the World but Also Increased Risks https://arconnet.com/disruptive-technologies-have-changed-the-world-but-also-increased-risks/ https://arconnet.com/disruptive-technologies-have-changed-the-world-but-also-increased-risks/#respond Fri, 12 Aug 2016 09:10:59 +0000 https://arconnet.com/?p=975 Disruptive technologies such as Internet of Things (IOTs) and cloud computing have created enormous opportunities for global organizations. They have changed the way global corporations conduct business. According to the Australian government, disruptive technologies could generate up to $625 billion through economic activities every year by 2030 in the Asia-Pacific (APAC) region alone.

While disruptive technologies create new opportunities they also make IT assets vulnerable. Indeed, with tons of data stored in cloud, organizations risk data breach from malicious outsiders.

Massive data breach incident involving the professional networking giant, LinkedIn is a good example, where hackers took advantage of security gaps of the company by attacking servers deployed on cloud. According to lawsuits, hackers were able to steal LinkedIn users’ personal information by using “botnet”, a highly coordinated computerized network. Hackers manipulated six of the company’s IT security systems deployed for preventing breach of personal data. However, malefactors also took advantage of the data stored in cloud, lawsuits showed. A cloud-service company contracted by LinkedIn to deploy personal data of users got attacked as the user interaction with LinkedIn existed in a less secured environment, allowing cyber-frauds to send requests to LinkedIn servers to pilfer the data.

Technological innovation ushered by IOTs promises amazing possibilities that could make our day-to-day lives more exciting, and efficient. But the technology also comes with risks. As IOTs store plenty of personal information, vulnerability to cyberattacks such as denial-of-service (DOS) kind of assaults remains a big concern. A Washington-based family recently went through a horrible experience. A baby monitor got hacked by a stranger, who sent petrifying messages to a kid, also heard by her mother.

Likewise, your company’s highly classified information is always under threat from identity thefts. Data breach could bring an organization to a standstill and lead to billions of dollars in losses. As highly classified information becomes a key asset in the age of “Big Data” analytics, threats always lurk from malicious insiders, and cyber-frauds. Organizations’ success, in this backdrop, will not just depend upon collecting sizable amount of crucial database but also safeguarding it.

ARCON provides state-of-the-art technology aimed at mitigating information systems related risks thereby enabling organizations to comply with Governance, Risk Management and Compliance (GRC) requirements. The company, in particular, is known for its unique Privileged Identity Management / Privileged Access Management solution, which helps deter the misuse of ‘privileged identities’.

Learn more about us at www.arconnet.com

]]>
https://arconnet.com/disruptive-technologies-have-changed-the-world-but-also-increased-risks/feed/ 0
Data like water https://arconnet.com/data-like-water/ https://arconnet.com/data-like-water/#respond Tue, 08 Sep 2015 10:37:04 +0000 https://arconnet.com/?p=1006 is data like water?
Data like water is an interesting analogy, It was only during one of my vacations that along a beach, i realized how the two are really similar and especially in the world of technology how data flow is akin to water flow. This paper tries to establish similarities, one’s ability to capture and track source. Further how identities are critical and how data can be tagged to various users. Also it is critical to examine the storage and linkages to the identities under which data is stored.

how important is data
data shape is fluid
Data, the most important element in the 21st century is generated in different forms and formats within various organizations. The size and shape of data is very similar to “Water”, it is constantly changing size and shape as it moves from one desk to another and one corporation to another.

While the analogy may be slightly out of context in the real world, but this analogy finds a perfect fit when it comes to securing Data. The question one needs to ask, is it even possible to capture, understand, track the source of a constantly evolving matter such as DATA.

like human bodies are made of water, organizations are made of data
It is said that 99% of human body is made of water. The importance of water can never be debated. If one were to take this analogy and extend it to Data, it cannot be debated that data is the single most important element for any organization such that its survival is dependent on this single element. Let us take a deep dive and understand what are the types of data in any organization?

The following can be a brief description of types of data within an organization Viz: Financial, Sales Lead, Payroll, Employee, Customer Information, projects, contract bids etc this list could continue. If one reviews any organization closely it would not be surprise that every piece of information captured, processed and output stored or distributed would be critical data. Any breach of such data intentionally or unintentionally could lead to disaster including lock down of business. One is surprised how this is currently treated in any organization.

data deserves the due attention!
Data i guess is critical, established beyond doubt. However in this complex business environment as well as the multiple interfaces makes it absolutely difficult to track, monitor and protect the source, data at rest or data in motion.

It is also important to note that Data is generally perceived to be information generated by electronic systems, but that is not true, all information generated including on hard copies i.e paper is Data.

Organizations spend millions protecting devices and technology, however in the coming years security will be DATA centric.

protecting data
identities are important
There are several solutions which now protect databases viz; database firewall, data access management solutions etc. There are several approaches one can follow, however one of the most important approach is to ensure that identities are mapped to all that is generated or stored and these identities are adequately tracked and monitored.

It is important to establish the source where data is generated, modified or is used. Identities play a very important role as they are the identifiers or touch points in any organization. To protect data, it is imperative to create an arc over the identities such that they are identified, controlled and monitored. It is at this stage imperative to map every identity and the biggest hole in identity management is the how privilege identities are managed. Privilege identities are ones that have the unfettered access to all data and could cause the most damage if compromised.

Privilege Identity Management is an area which is still underinvested by corporations across the world and FAITH is still the best control.

]]>
https://arconnet.com/data-like-water/feed/ 0
A Billion Dollar Hack: – How hackers exploited Unprotected Privileged Accounts https://arconnet.com/a-billion-dollar-hack-how-hackers-exploited-unprotected-privileged-accounts/ https://arconnet.com/a-billion-dollar-hack-how-hackers-exploited-unprotected-privileged-accounts/#respond Wed, 15 Jul 2015 11:16:34 +0000 https://arconnet.com/?p=1020 Summary: How the Carbanak hacker’s group stole a billion dollars without getting caught and what we

learn from it.

The financial world and the security industry have been rocked by the recent report from Kaspersky about the cyber-criminals that have stolen more than $1 Billion from global banks through cyber-attacks. The initial reports link the attacks to a multinational criminal group, and highlight the use of sophisticated malware, dubbed Carbanak.

Questions were raised in late 2013 when an ATM in Kiev, Ukraine, began dispensing money at random times, when no one had put in a card or touched a button. Security cameras show that money would be picked up by customers who appeared to be in the right place at the right time. But when Kaspersky Lab was called in to investigate, it was revealed that the ATM was part of a much-larger banking breach.

The attackers used simple techniques like phishing to trick employees into infecting their endpoints with malware. Once installed, the attackers went after the administrators in order to gain access to the machines on which financial administrators operated. After gaining access to bank’s computers through phishing schemes and other methods, they lurk for months to learn the bank’s systems, taking screen shots and even video of employees using their computers. This unusual method of hacking which rather than targeting customers for money, targeted the banks as a whole, has caused a massive stir in the banking industry.

The hackers have been active since at least the end of 2013 and infiltrated more than 100 banks in 30 countries, according to Russian security company Kaspersky Lab. The recent revelations of hundreds of millions of dollars in cybercrime targeting the financial industry, shows that criminal enterprises are alive and well, and continue to cultivate new cyber capabilities.

Protecting one’s organization from such attacks requires us to understand what the insider threat really is and how to protect one’s organization from it. From Carbanak and Anunak attacks, we believe that unprotected privileged accounts are one of the main concerns of all modern day IT security experts. One in 3 cyber breaches are caused because of unprotected and unrestricted access. We at Arcon believe that by implementing the necessary tools and infrastructure, we can manage, continuously monitor and track privileged account activities. Along with the analytics and intelligence to identify anomalous activity, organizations can protect themselves and enable a quick detection and response, making it possible to mitigate potential damage early in the attack cycle.

About ARCON
ARCON is a leading technology company specializing in risk control solutions. ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms. ARCON in the last one decade has been at the forefront of innovations in risk control solutions, with its roots strongly entranced in identifying business risk across industries it is in a unique position to react with innovative solutions/products.

Learn more about us at arconnet.com

]]>
https://arconnet.com/a-billion-dollar-hack-how-hackers-exploited-unprotected-privileged-accounts/feed/ 0