- End-to-end encryption to protect sensitive data
- Multi-factor authentication (MFA) to prevent unauthorized access
- IP and geo-restriction policies to regulate login location
The FBI has warned the public, private sector, and the world about the “victimization of US-based businesses”, as cyberattacks involving remote IT workers from North Korea are on the rise. It has noticed North Korean IT workers gaining illegal access to systems to steal confidential data and launch other cyber-crime operations.
In an FBI announcement reported by Forbes, it was disclosed that “victims have seen proprietary data and code held to ransom,” and “the copying of corporate code repositories to attacker user profiles and personal cloud accounts.” Additionally, the attackers have also “attempted harvesting of company credentials and session cookies for further compromise opportunities.”
Law enforcement and intelligence agencies like the FBI and NSA (National Security Agency) have advised the principle of least privilege, to “only allow designated administrator accounts to be used for administrative purposes.” The aim is to limit the administrative rights available to Mac and Windows users to ensure security.
The principle of least privilege gives admin account access to only selected people, and nobody else. The method ensures company employees only have access to particular resources needed to get the job done, not admin rights. For instance, the user account completes day-to-day needs, whereas for something critical, like software installation, the systems will ask for admin credentials.
Wikipedia is one great example of using this technique, it has user accounts for making backups that don’t need to install software and only have rights for running backups and related applications.
The FBI suggests businesses disable local administrator accounts and restrict privileges for installing remote desktop apps, keeping an eye out for any unusual network traffic. It has warned organizations to remember that “North Korean IT workers often have multiple logins into one account in a short period of time,” coming from various IP addresses linked with different countries.
The agency has also advised HRs, development teams, and hiring managers to focus “on changes in address or payment platforms during the onboarding process.”
Today's changing cyber threat landscape presents a tremendous challenge to enterprises worldwide. With the rise of malevolent AI-powered threats and state-sponsored enterprises, the security sector is at a crossroads.
Threat complexity increases, creating ubiquitous and multifaceted dangers, including sophisticated cyberattacks and internal weaknesses. This environment necessitates novel solutions, encouraging a move from old security paradigms to a more integrated, data-driven approach.
Cyber threats are no longer limited to lone hackers in dark basements. Sophisticated state-sponsored attacks, ransomware gangs, and organized cybercrime syndicates pose substantial risks. The evolving threat landscape demands agility and adaptability from cybersecurity professionals.
The Covid-19 pandemic accelerated the adoption of remote work. While it offers flexibility, it also introduces security challenges. Securing remote endpoints, ensuring secure access, and protecting sensitive data outside the corporate network are top priorities.
Ransomware attacks have surged, with costs doubling in 2021. These attacks not only encrypt critical data but also threaten to leak it publicly. Cybersecurity teams must focus on prevention, detection, and incident response to combat this menace.
Organizations operate across multiple locations, including remote branches. Each branch introduces potential vulnerabilities. Additionally, the proliferation of Internet of Things (IoT) devices adds complexity. Cybersecurity operations must extend their reach to secure these distributed environments effectively.
Traditional security paradigms are shifting. Siloed approaches are giving way to integrated solutions that leverage data analytics, machine learning, and threat intelligence. Security operations centers (SOCs) now rely on real-time data to detect anomalies and respond swiftly.
Cybersecurity is no longer just about firewalls and antivirus software. A holistic approach involves risk assessment, vulnerability management, identity and access management, and continuous monitoring. Collaboration across IT, development, and business units is essential.
Innovations like artificial intelligence (AI) and quantum computing are game-changers. AI enhances threat detection, automates routine tasks, and augments human decision-making. Quantum computing promises to revolutionize encryption and decryption methods.
The COVID-19 pandemic has caused a seismic shift in the way we work, with remote work becoming the norm for many organizations. While this has brought numerous benefits, it has also presented new security challenges. In response, companies have turned to remote browser isolation as a solution.
According to the "Innovation Insight for Remote Browser Isolation" report by Menlo Security, remote browser isolation is a rapidly evolving technology that is gaining popularity due to its ability to provide a secure browsing experience. In this blog, we will explore some of the key findings of this report and examine the growing importance of remote browser isolation in today's business landscape.
Amit Jain, who holds the position of Senior Director of Product Management at Zscaler, a cloud-based security company, suggests that due to the increasing number of remote employees utilizing cloud services, browser isolation has become essential in safeguarding both corporate cloud services and the employee's device.
He says, "For modern enterprises, the Internet is now the corporate network. This shift has enabled workers to work from anywhere while being able to access the information they need for their jobs through cloud-based apps and private apps via the Web, while this has provided maximum flexibility to workers, it has also significantly expanded the attack surface and has the potential to expose data."
Mr. Jain from Zscaler said "The technology should be fully integrated into the zero trust platform providing threat protection for all Web activity and preventing data loss from sanctioned SaaS and corporate private apps. Moreover, HTML smuggling [and other] attacks can be better thwarted by an architecture which involves a tighter combination of browser isolation and sandbox technologies."
As cloud usage has increased, browser isolation has become even more important. Cloud services are often accessed through web browsers, and if a user's device is compromised, the sensitive data stored in the cloud is also at risk. However, using browser isolation significantly reduces the risk of a data breach.
Mark Guntrip, senior director at Menlo Security, said "It's not the fact of what we do — it's the fact that we do it without interfering with that digital experience of the end user." So they can interact with whatever they want. They can click on whatever they want, but we hold anything that's active away from them"
Remote and hybrid work models are the common trend in the current industry. The sudden shift to this new model of working also has some threats and security risks associated with it.
With the start of 2023 and fears of recession dawning over enterprise planning, security companies should find new ways to secure sensitive data and resources without increasing expenses.
However, they also have to keep supporting work from home and Bring Your Own Device (BYOD) policy, these two are main drivers for business agility, accessibility, and flexibility to a wider range of human talent.
1. Replacing virtual desktops
Virtual Desktops (VD) are virtual PCs in the cloud that allow remote access to on-premises physical devices. Once VD software is installed on the remote endpoint device, users can link to their in-office workstations. This solution was made for legacy architectures and was a go-to option if a user needed to leverage his on-premise computer to access on-premises company resources and keep working.
2. Implement a zero-trust approach
Cloud architectures pushed security organizations to bring new ways of permission provisioning. With global users, the old castle-and-moat approach doesn't work anymore. Hence, identity became the new standard, pushing security firms to control access in a new manner.
The best identity-based security approach for distributed architecture is "zero-trust," it consists of ongoing user verification and authorization, instead of trusting them on the basis of network origin or IP. As per the recent IBM Cost of a Data Breach Report 2022, the zero-trust method saved companies an average of $1 million in breach damage.
Any security response should provide a "zero-trust" approach as a part of its solution to stop the attack window from getting access and restrict lateral movements, and also cut down data breach costs. Purchasing any other solution can increase unnecessary costs for your business.
3. Control access via granular conditions
User verification and access management are laid out from a clear set of policies. These policies decide which actors can access what resources, and the actions they can perform. But keeping high-level policies will offer users extra privileges and can result in a costly data breach.
Authorization policies should be granular to make sure not too many access privileges are given to users, they should be consistent throughout all SaaS and local applications and implemented on both unmanaged and managed devices. This will help ensure high ROIs (return on investment), and increase security, and productivity.
4. Provide security awareness training to employees
As per Verizon's 2022 DBIR report, "82% of breaches involved the human element. Whether it is the use of stolen credentials, phishing, misuse, or simply an error, people continue to play a very large role in incidents and breaches alike." Remote work has further increased the use of sophisticated phishing attacks, around 62% of security experts said that phishing campaigns were a major threat during Covid-19, suggests The New Future of Work Report from Microsoft.
A cybersecurity solution will only work when employees are aware and know how to deal with potential threats like malware, phishing emails, and sites, etc.
5. Use modern alternatives as a replacement for costly network solutions
Network security solutions such as VPNs, SWGs, Endpoint Detection and Response (EDR), and CASBs are costly and need IT management and maintenance, which increases cost. These are difficult to deploy, affecting user experience, and do not always provide instant solutions to businesses.
Modern alternatives offer conditional access to resources, and they have the potential to ensure a higher level of security while keeping operational costs low and also managing network traffic.
It does not matter if the recession is nearing or not, security teams have to provide security while keeping the operational costs under control. Traditionally, it has been difficult for security teams to work as per the given budget, hence, they will have to modify the approach and planning in dealing with threats. Low-cost and effective security measures will be the key for security solutions firms as we step into the year 2023.