Tag Archive for: Organizations

Basic Preventative Steps for Organizations


The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile* identifying steps organizations can take to prevent, respond to and recover from ransomware events**. According to the profile, its “purpose…is to help organizations identify and prioritize opportunities for improving their security and resilience against ransomware attacks.” NIST encourages organizations to use the document as a guide for profiling the state of their own readiness and to identify gaps to achieve their goal.

IN DEPTH


Modeled on NIST’s Cybersecurity Framework Version 1.1, the profile provides practical guidance to organizations to protect against the ransomware threat, including the following “basic preventative steps”:

  • Use antivirus software at all times;

  • Keep computers fully patched, including scheduled checks and installation of patches “as soon as feasible”;

  • Segment networks;

  • Continuously monitor directory services (and other primary user stores) for indicators of compromise or active attack;

  • Use products or services to block access to server names, IP addresses, or ports and protocols that are known to be malicious or suspected to be indicators of malicious system activity;

  • Allow only authorized applications—including establishing processes for reviewing, adding or removing authorized applications—on an allowlist;

  • Use standard user accounts versus accounts with administrative privileges whenever possible;

  • Restrict personally owned devices on work networks;

  • Avoid using personal apps—like email, chat and social media—from work computers;

  • Educate employees about social engineering; and

  • Assign and manage credential authorization for all enterprise assets and software, and periodically verify that each account has the appropriate access only.

The profile outlines steps that organizations “can take now” to help recover from a future ransomware event, including:

  • Develop and implement an incident recovery plan that has defined roles and strategies for…

Source…

Majority of Organizations Uncertain They Can Recover from a Ransomware Attack, Says New Dell Technologies Report | Texas News


ROUND ROCK, Texas, Sept. 9, 2021 /PRNewswire/ —

News summary

  • Study shows organizations are managing more than 10 times the amount of data than they did five years ago
  • Eighty-two percent of IT decision makers are concerned their existing data protection solutions won’t meet all future business challenges
  • Sixty-two percent fear their existing data protection measures may not be sufficient to cope with cyber threats, while 74% agree they have increased exposure to data loss with the growth of employees working from home
  • Dell EMC PowerProtect Data Manager with Transparent Snapshots uniquely offer organizations a simpler, faster way to protect VMware virtual machines at scale without compromising performance
  • Dell EMC PowerProtect appliances with Smart Scale can deliver cost savings and simplified management for large data environments
  • Dell Technologies Managed Services for Cyber Recovery Solution helps reduce risk of data loss with Dell experts operating cyber recovery vault processes and supporting data recovery efforts

Full story

The Dell Technologies (NYSE:DELL) 2021 Global Data Protection Index (GDPI) findings reveal organizations are facing several data protection challenges driven by the constant threat of ransomware and the consumption of emerging technologies such as cloud-native applications, Kubernetes containers and artificial intelligence.

According to a recent IDC survey, more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months.i To help address these rising – and seemingly inevitable – issues, Dell Technologies is introducing new software and services to accelerate virtual machine (VM) backup data availability, simplify management of large data sets, and maintain business continuity while alleviating dependencies on day-to-day cyber recovery operations.

“While ransomware attacks can be devastating for people and businesses, accepting defeat as a foregone conclusion is not the answer,” said Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies. “We understand the stakes have never been higher, and the…

Source…

Newswire & Press Release / Pradeo Acclaimed by Frost & Sullivan for Offering Leading Mobile Security to Organizations with its Pioneering AI… – Engineering / Artificial Intelligence – Frost & Sullivan














Based on its recent analysis of the mobile security market, Frost & Sullivan recognizes Pradeo with the 2021 Global Enabling Technology Leadership Award for supporting enterprise mobility with its unified, feature-rich AI services. By protecting managed and unmanaged mobile devices, its solution stack is especially valuable to organizations with bring-your-own-device (BYOD) operation models.

“A global market leader and an end-to-end service provider, Pradeo has the scale, capabilities, and technology to address a gamut of mobile security needs for organizations of all sizes,” said Vikrant Gandhi, Research Vice President for Frost & Sullivan. “Its patented AI engine is at the core of its mobile security solution and enables it to configure products quickly. Highly adaptable and applicable across business cases, Pradeo’s technology aids rapid implementation and offers long-term value across a client’s mobile security strategy.”

One of Pradeo’s leading turnkey solutions, the Secure Private Store, eliminates the possibility of third-party applications compromising individual or organizational security through the network and extending to the operating system and apps on the device. An alternative to mobile device management (MDM, EMM, UEM…) systems that are often restrictive and diminish BYOD accessibility, the Secure Private Store assists organizations and carriers with unique functions to protect their environment.

Pradeo’s solution set equips security teams with in-depth visibility into what applications do with data and controls. This solution offers flexibility to customize permissions, execute zero-touch deployments, and interoperate with major stakeholders in the mobile device management ecosystem. Pradeo recommends predefined configurations to fit small and medium businesses’ needs, so its solutions are ready-to-implement, include automation remediation, and require only light-touch administration.

“Pradeo prides itself on delivering exceptional data privacy. In addition to the app protection tools, it ensures that all of the information collected as a part of its mobile security logs is anonymized,” noted…

Source…

ASSA ABLOY Helps Organizations To Adopt Mobile Access Control


The smartphone is changing access control and security management at every scale and level, from global corporations to small companies. Making the switch to mobile access control, however, can seem daunting. Questions may arise around cost, practicality and the potential need for new door hardware. Yet going mobile is actually a lot simpler and quicker than many think, as one new guide explains.

Data from the recent Wireless Access Control Report 2021 suggests almost two-thirds of organizations have already adopted mobile access control, or plan to do so within two years. Industry analysts Omdia estimate that downloads of mobile credentials grew by 220% between 2018 and 2019 alone.

Mobile access control

The main benefits of mobile access control, the report suggests, are convenience, cost and security. All three of these advantages apply for any scale of organization. The user convenience of replacing plastic key-cards with secure ‘mobile keys’ on a smartphone is obvious. Identical benefits have already brought a mobile-first ethos to banking, travel booking, food delivery and many more sectors.

The ability to get the job done efficiently from anywhere is becoming essential

From a business perspective, too, the option for facilities managers to use their own smart device to issue, amend or revoke an employee’s mobile key brings added flexibility. It frees security staff from the desk and its dedicated admin PC. As the work patterns become fluid — IBM estimates 1.87 billion people will be mobile workers by 2022 — the ability to get the job done efficiently from anywhere is becoming essential. Access management via smartphone offers this.

Reissuing mobile credential

Secondly, mobile credentials are simpler and quicker to administer than key-cards, which brings significant cost savings. Deploying mobile keys on employee smartphones removes any need to purchase plastic cards or pay for their printing. Any missing plastic credential needs replacing; canceling and reissuing a mobile credential is essentially costless. Mobile access control also enables a business to reduce its use of non-recyclable plastics.

Third, the…

Source…