Connect with us

Featured

Dirty secret of network traffic

Published

on

Sophos recently announced the findings of its global survey, The Dirty Secrets of Network Firewalls, which revealed that IT managers cannot identify 45 percent of their organisation’s network traffic.

In fact, nearly one-in-four cannot identify 70 percent of their network traffic. The lack of visibility creates significant security challenges for today’s businesses and impacts effective network management. The survey polled more than 2,700 IT decision makers from mid-sized businesses in 10 countries including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa.

Considering the debilitating impact cyber-attacks can have on a business, it’s unsurprising that 84 percent of respondents agree that a lack of application visibility is a serious security concern. Without the ability to identify what’s running on their network, IT managers are blind to ransomware, unknown malware, data breaches and other advanced threats, as well as potentially malicious applications and rogue users. Network firewalls with signature-based detection are unable to provide adequate visibility into application traffic due to a variety of factors such as the increasing use of encryption, browser emulation, and advanced evasion techniques.

“If you can’t see everything on your network, you can’t ever be confident that your organisation is protected from threats. IT professionals have been ‘flying blind’ for too long and cybercriminals take advantage of this,” said Dan Schiappa, senior vice president and general manager of products at Sophos. “With governments worldwide introducing stiffer penalties for data breach and loss, knowing who and what is on your network is becoming increasingly important. This dirty secret can’t be ignored any longer.”

On average, organisations spend seven working days remediating 16 infected machines per month. Smaller organisations (100-1,000 users) spend on average five working days remediating 13 machines, while larger organisations (1,001-5,000 users) spend on average 10 working days remediating 20 machines per month, according to the survey.

“A single network breach often leads to the compromise of multiple computers, so the faster you can stop the infection from spreading the more you limit the damage and time needed to clean it up,” said Schiappa. “Companies are looking for the kind of next-generation, integrated network and endpoint protection that can stop advanced threats and prevent an isolated incident from turning into a widespread outbreak. Sophisticated exploits such as MimiKatz and EternalBlue reminded everyone that network protection is critical to endpoint security and vice versa. Only direct intelligence sharing between these two can reveal the true nature of who and what is operating on your network.”

IT managers are very aware that firewalls need an upgrade in protection. In fact, the survey revealed that 79 percent of IT managers polled want better protection from their current firewall. 99 percent want firewall technology that can automatically isolate infected computers, and 97 percent want endpoint and firewall protection from the same vendor which allows for direct sharing of security status information.

Security is Not the Only Risk to Businesses

Following security risks, lost productivity was cited as a concern for 52 percent of respondents when it comes to a lack of network visibility. Business productivity can be negatively impacted if IT is unable to prioritise bandwidth for critical applications.

For industries that rely on custom software to meet specific business needs, an inability to prioritise these mission critical applications over less important traffic could be costly. 50 percent of IT professionals who had invested in custom applications admitted that their firewall could not identify the traffic and therefore were unable to maximise their return on investment. Lack of visibility also creates a blind spot for the potential transfer of illegal or inappropriate content on corporate networks, making companies vulnerable to litigation and compliance issues.

“Organisations need a firewall that protects their investment in business-critical and custom applications by allowing employees to have prioritized access to the applications they need,” said Schiappa. “Increasing network visibility requires a radically different approach. By enabling the firewall to receive information directly from the endpoint security, it can now positively identify all applications – even obscure or custom applications.”

The Dirty Secrets of Network Firewalls survey results are available in a PDF report: https://secure2.sophos.com/en-us/medialibrary/Gated-Assets/white-papers/firewall-dirty-secrets-report.pdf?la=en

The Dirty Secrets of Network Firewalls survey was conducted by Vanson Bourne, an independent specialist in market research, in October and November 2017. This survey interviewed 2,700 IT decision makers in 10 countries and across five continents, including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa. All respondents were from organisations of between 100 and 5,000 users.

Sophos can deliver higher levels of network visibility with the XG Firewall and Sophos Endpoint Protection or Intercept X. For information about Sophos XG Firewall, please visit: https://www.sophos.com/en-us/products/next-gen-firewall.aspx

Featured

Revealing the real cost of ‘free’ online services

A free service by Finnish cybersecurity provider F-Secure reveals the real cost of using “free” services by Google, Apple, Facebook, and Amazon, among others.

Published

on

What do Google, Facebook, and Amazon have in common? Privacy and identity scandals. From Cambridge Analytica to Google’s vulnerability in Google+, the amount of personal data sitting on these platforms is enormous.

Cybersecurity provider F-Secure has released a free online tool that helps expose the true cost of using some of the web’s most popular free services. And that cost is the abundance of data that has been collected about users by Google, Apple, Facebook, Amazon Alexa, Twitter, and Snapchat. The good news is that you can take back your data “gold”.

F-Secure Data Discovery Portal sends users directly to the often hard-to-locate resources provided by each of these tech giants that allow users to review their data, securely and privately.

“What you do with the data collection is entirely between you and the service,” says Erka Koivunen, F-Secure Chief Information Security Officer. “We don’t see – and don’t want to see – your settings or your data. Our only goal is to help you find out how much of your information is out there.”

More than half of adult Facebook users, 54%, adjusted how they use the site in the wake of the scandal that revealed Cambridge Analytica had collected data without users’ permission.* But the biggest social network in the world continues to grow, reporting 2.3 billion monthly users at the end of 2018.**

“You often hear, ‘if you’re not paying, you’re the product.’ But your data is an asset to any company, whether you’re paying for a product or not,” says Koivunen. “Data enables tech companies to sell billions in ads and products, building some of the biggest businesses in the history of money.”

F-Secure is offering the tool as part of the company’s growing focus on identity protection that secures consumers before, during, and after data breaches. By spreading awareness of the potential costs of these “free” services, the Data Discovery Portal aims to make users aware that securing their data and identity is more important than ever.

A recent F-Secure survey found that 54% of internet users over 25 worry about someone hacking into their social media accounts.*** Data is only as secure as the networks of the companies that collect it, and the passwords and tactics used to protect our accounts. While the settings these sites offer are useful, they cannot eliminate the collection of data.

Koivunen says: “While consumers effectively volunteer this information, they should know the privacy and security implications of building accounts that hold more potential insight about our identities than we could possibly share with our family. All of that information could be available to a hacker through a breach or an account takeover.”

However, there is no silver bullet for users when it comes to permanently locking down security or hiding it from the services they choose to use.

“Default privacy settings are typically quite loose, whether you’re using a social network, apps, browsers or any service,” says Koivunen. “Review your settings now, if you haven’t already, and periodically afterwards. And no matter what you can do, nothing stops these companies from knowing what you’re doing when you’re logged into their services.”

*Source: https://www.pewresearch.org/fact-tank/2018/09/05/americans-are-changing-their-relationship-with-facebook/
**Source: https://www.theverge.com/2019/1/30/18204186/facebook-q4-2018-earnings-user-growth-revenue-increase-privacy-scandals
***Source: F-Secure Identity Protection Consumer (B2C) Survey, May 2019, conducted in cooperation with survey partner Toluna, 9 countries (USA, UK, Germany, Switzerland, The Netherlands, Brazil, Finland, Sweden, and Japan), 400 respondents per country = 3600 respondents (+25years)

Continue Reading

Featured

WhatsApp comes to KaiOS

Published

on

By the end of September, WhatsApp will be pre-installed on all phones running the KaiOS operating system, which turns feature phones into smart phones. The announcement was made yesterday by KaiOS Technologies, maker of the KaiOS mobile operating system for smart feature phones, and Facebook. WhatsApp is also available for download in the KaiStore, on both 512MB and 256MB RAM devices.

“KaiOS has been a critical partner in helping us bring private messaging to smart feature phones around the world,” said Matt Idema, COO of WhatsApp. “Providing WhatsApp on KaiOS helps bridge the digital gap to connect friends and family in a simple, reliable and secure way.”

WhatsApp is a messaging tool used by more than 1.5 billion people worldwide who need a simple, reliable and secure way to communicate with friends and family. Users can use calling and messaging capabilities with end-to-end encryption that keeps correspondence private and secure. 

WhatsApp was first launched on the KaiOS-powered JioPhone in India in September of 2018. Now, with the broad release, the app is expected to reach millions of new users across Africa, Europe, North America, Southeast Asia, and Latin America.

“We’re thrilled to bring WhatsApp to the KaiOS platform and extend such an important means of communication to a brand new demographic,” said Sebastien Codeville, CEO of KaiOS Technologies. “We strive to make the internet and digital services accessible for everyone and offering WhatsApp on affordable smart feature phones is a giant leap towards this goal. We can’t wait to see the next billion users connect in meaningful ways with their loved ones, communities, and others across the globe.”

KaiOS-powered smart feature phones are a new category of mobile devices that combine the affordability of a feature phone with the essential features of a smartphone. They meet a growing demand for affordable devices from people living across Africa – and other emerging markets – who are not currently online. 

WhatsApp is now available for download from KaiStore, an app store specifically designed for KaiOS-powered devices and home to the world’s most popular apps, including the Google Assistant, YouTube, Facebook, Google Maps and Twitter. Apps in the KaiStore are customised to minimise data usage and maximise user experience for smart feature phone users.

In Africa, the KaiOS-powered MTN Smart and Orange Sanza are currently available in 22 countries, offering 256MB RAM and 3G connectivity.

KaiOS currently powers more than 100 million devices shipped worldwide, in over 100 countries. The platform enables a new category of devices that require limited memory, while still offering a rich user experience.

* For more details, visit: Meet The Devices That Are Powered by KaiOS

* Also read Arthur Goldstuck’s story, Smart feature phones spell KaiOS

Continue Reading

Trending

Copyright © 2019 World Wide Worx