CS Mar-Apr 2021
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Computing<br />
Security<br />
Secure systems, secure data, secure people, secure business<br />
Long-distance winners<br />
Excellence shines through from afar<br />
NEWS<br />
OPINION<br />
INDUSTRY<br />
COMMENT<br />
CASE STUDIES<br />
PRODUCT REVIEWS<br />
Where to now?<br />
Inside this issue: expert<br />
insights into what the<br />
industry can expect<br />
in the months ahead<br />
Webcam perils<br />
Be careful who may be spying on you!<br />
Attacks hit record high<br />
Deep concerns as cyber security<br />
incidents exceed all previous levels<br />
Computing Security <strong>Mar</strong>ch <strong>2021</strong>
FULLSTACK VULNERABILITY MANAGEMENT<br />
CONTINUOUS VULNERABILITY<br />
INTELLIGENCE<br />
Accurately identifies vulnerabilities<br />
and exposures across the full stack.<br />
All threats are verified by<br />
cybersecurity experts, providing<br />
exploitable risk and remediation<br />
guidance.<br />
“The expertise and<br />
delivery of this service<br />
has been outstanding...”<br />
SECURITY AND RISK MANAGEMENT,<br />
MEDIA INDUSTRY, 30B+ US<br />
2020
comment<br />
APPRENTICESHIPS: VITAL ROUTE INTO CYBERSECURITY<br />
EDITOR: Brian Wall<br />
(brian.wall@btc.co.uk)<br />
LAYOUT/DESIGN: Ian Collis<br />
(ian.collis@btc.co.uk)<br />
SALES:<br />
Edward O’Connor<br />
(edward.oconnor@btc.co.uk)<br />
+ 44 (0)1689 616 000<br />
Abby Penn<br />
(abby.penn@btc.co.uk)<br />
+ 44 (0)1689 616 000<br />
Apprenticeships are the solution to attracting more young people into cybersecurity,<br />
according to 42.5% of respondents to a new Twitter poll run by Infosecurity Europe,<br />
Europe's information security event. The poll set out to explore current issues around the<br />
skills shortage within the sector, particularly within the context of the pandemic.<br />
Responses also highlight the importance of proper support for remote workers - with more<br />
than a third (37.2%) believing that sustaining motivation and well-being is the greatest skillsrelated<br />
challenge faced by cybersecurity professionals right now. The information security sector<br />
continues to suffer from a shortage of skilled professionals, with more than four million unfilled<br />
roles worldwide, according to the Enterprise Strategy Group (ESG) and the Information Systems<br />
Security Association (ISSA). Despite this, 35.9% of the respondents to Infosecurity Europe's poll<br />
say their organisation currently has a hiring freeze on cybersecurity roles.<br />
"We can definitely do more to open up apprenticeships or internships that encourage people<br />
to see if information security is for them," suggests Steve Wright, CISO of Privacy Culture and<br />
Former Interim DPO Bank of England, "but, as a permanent measure, we've got to look at what's<br />
going to attract people at the right age. I think more could be done to make it part of the school<br />
curriculum."<br />
Behind apprenticeships in the poll was the need for a formal career path (27.1%), more role<br />
models/mentors (17.1%) and greater diversity (13.4%). Troy Hunt, Microsoft regional director<br />
and founder of 'Have I Been Pwned', indicates the need for greater inclusiveness: "Technology in<br />
general is very male-dominated and there's a lot of women in particular feel excluded by that.<br />
There's also much more introverted behaviour, and - in my experience at least - obnoxious<br />
behaviour! We need to create an environment that people of all backgrounds want to be in;<br />
that removes the barriers making them reticent about joining the industry."<br />
PUBLISHER: John Jageurs<br />
(john.jageurs@btc.co.uk)<br />
Published by Barrow & Thompkins<br />
Connexions Ltd (BTC)<br />
35 Station Square,<br />
Petts Wood, Kent, BR5 1LZ<br />
Tel: +44 (0)1689 616 000<br />
Fax: +44 (0)1689 82 66 22<br />
SUBSCRIPTIONS:<br />
UK: £35/year, £60/two years,<br />
£80/three years;<br />
Europe: £48/year, £85/two years,<br />
£127/three years<br />
R.O.W:£62/year, £115/two years,<br />
£168/three years<br />
Single copies can be bought for<br />
£8.50 (includes postage & packaging).<br />
Published 6 times a year.<br />
© <strong>2021</strong> Barrow & Thompkins<br />
Connexions Ltd. All rights reserved.<br />
No part of the magazine may be<br />
reproduced without prior consent,<br />
in writing, from the publisher.<br />
Brian Wall<br />
Editor<br />
Computing Security<br />
brian.wall@btc.co.uk<br />
www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />
@<strong>CS</strong>MagAndAwards<br />
3
Secure systems, secure data, secure people, secure business<br />
Computing Security <strong>Mar</strong>ch <strong>2021</strong><br />
contents<br />
CONTENTS<br />
Computing<br />
Security<br />
NEWS<br />
OPINION<br />
INDUSTRY<br />
COMMENT<br />
CASE STUDIES<br />
PRODUCT REVIEWS<br />
Long-distance winners Where to now?<br />
Excellence shines through from afar<br />
Inside this issue: expert<br />
insights into what the<br />
industry can expect<br />
in the months ahead<br />
Webcam perils<br />
Be careful who may be spying on you!<br />
COMMENT 3<br />
Apprenticeships’ route into cybersecurity<br />
Attacks hit record high<br />
Deep concerns as cyber security<br />
incidents exceed all previous levels<br />
ARTICLES<br />
EDITOR’S FOCUS 6<br />
How well are organisations and the<br />
workforce surviving the WFH challenge?<br />
DIGITAL ACCESS FOR ALL 7<br />
Steve Mellings, founder of ADISA, looks<br />
at the wider impact of COVID-19 - and<br />
the digital divide this has triggered<br />
DATA PROTECTION LAW AND<br />
WORKING FROM HOME 8<br />
Samad Miah, Xcina Consulting, looks at<br />
the data security and privacy compliance<br />
challenges remote working can bring<br />
WINNERS, TAKE A BOW! 32<br />
It wasn’t possible to celebrate the 2020<br />
Computing Security Awards face to face, but<br />
even the virus couldn't prevent them from<br />
going ahead. Master of ceremonies Chris<br />
Cowdrey and editor Brian Wall revealed the<br />
winners by video link - and what an occasion<br />
it still proved to be<br />
SEIZING BACK CONTROL 18<br />
THROUGH A GLASS DARKLY 10<br />
How can organisations stop their data<br />
We asked several industry commentators<br />
falling into the wrong hands? Terry Greer-<br />
for their views on where they believe <strong>2021</strong><br />
King, SonicWall, offers his insights<br />
will lead us, as we continue to grapple<br />
with COVD-19 and a whole multitude of<br />
ATTACKS HIT RECORD HIGH 22<br />
The National Cyber Security Centre (N<strong>CS</strong>C)<br />
other security challenges. Here's what they<br />
handled a record total of incidents over<br />
had to say<br />
the last 12-month period accounted for -<br />
with 200-plus related to the coronavirus<br />
THE PATIENT APPROACH PAYS OFF 24<br />
NHS Management has been adopting<br />
a security-first mindset, with a helping<br />
hand from AT&T Cybersecurity<br />
BE CAREFUL WHO’S WATCHING! 16<br />
<strong>Mar</strong>k Zuckerberg (yes, Facebook raises its<br />
YOU'VE GOT EMAIL... BREACHES 26<br />
controversial head again!) posted a now<br />
Misdirected emails have been identified as<br />
infamous photo of his desk setup, showing<br />
the UK's top cause of reported security<br />
his laptop with a covered webcam and<br />
incidents, leading to 44% more incidents<br />
than phishing attacks<br />
blocked mic. If even the creator of<br />
Facebook does this, shouldn’t everyone?<br />
CHANGE IS ON THE CARDS 28<br />
Ever wondered if workplace security, no<br />
matter where you are, might be possible?<br />
Biometrics could offer a way forward<br />
A GLIMPSE INTO THE ABYSS 20<br />
CYBER STRATEGY’S CRITICAL POINT 30<br />
Cyber security has never been more relevant<br />
When your data leaks, it might well end up<br />
and will no doubt continue in that vein for<br />
for sale on the dark web, making you an<br />
organisations throughout the year ahead<br />
easy target for advanced attacks. As one<br />
industry expert observes, “the market for<br />
PRODUCT REVIEW 19<br />
stolen data on the dark web has become<br />
Wandera Private Access<br />
a truly lucrative trade”.<br />
computing security Jan/Feb <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />
4
My peace of<br />
mind starts<br />
with Neustar<br />
Security.<br />
Cloud Security Solutions that are<br />
Always-on, Ultra Secure.<br />
security.neustar
editor's focus<br />
WORKING FROM HOME - ONE YEAR ON!<br />
COVID-19 HAS BEEN WITH US NOW FOR ALMOST A YEAR - AT LEAST 'OFFICIALLY'. HOW ARE<br />
ORGANISATIONS AND REMOTE WORKERS SURVIVING THE CHALLENGES?<br />
One year on, it's clear that the<br />
pandemic changed the way many<br />
organisations operate, due to<br />
huge numbers of staff being forced to<br />
work from home. That reality is<br />
something that resonates deeply with<br />
Oliver Cronk, chief IT architect, EMEA at<br />
Tanium. "This has caused digital<br />
transformation to accelerate rapidly and<br />
many organisations have put stop-gap IT<br />
solutions in place to keep up," he states.<br />
"This approach, which we believe is<br />
especially prevalent in sectors hit hardest<br />
by the pandemic, often creates<br />
cybersecurity weaknesses."<br />
Another key issue he highlights is that<br />
many organisations are struggling with<br />
reduced revenue or funding right now<br />
and having to make cutbacks, yet<br />
cybersecurity is not an area they can<br />
afford to neglect, he warns. "As lockdown<br />
continues and some teams are being<br />
asked to do more with less resources, they<br />
remain increasingly vulnerable to cyber<br />
threats, due to distraction or fatigue,<br />
which can cause employees to drop their<br />
guard when it comes to clicking on<br />
malicious links in emails."<br />
OUT OF TOUCH<br />
In addition, states Cronk, "IT audit<br />
continues to fail many organisations, with<br />
some of the recent security issues we've<br />
seen being a direct result of IT audit and<br />
governance processes being used, which<br />
are out of touch with what is really going<br />
on in modern organisations".<br />
Businesses need to ensure they are<br />
planning for the long-term by setting up a<br />
security foundation which is flexible, datadriven<br />
and efficient, he advises, while<br />
equipping IT teams to respond to threats<br />
immediately from wherever they are based.<br />
"Whilst the pandemic has created<br />
challenges for IT teams, this period should<br />
also be seen as an opportunity to optimise<br />
IT security and operations.<br />
"Teams should consider embracing<br />
technologies such as distributed cloud<br />
architecture and endpoint management,<br />
which will give businesses the visibility and<br />
control they need to minimise the<br />
likelihood of a damaging cyber-attack in<br />
the age of lockdowns and mass remote<br />
working."<br />
06<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
industry insights<br />
DIGITAL ACCESS FOR ALL - HELPING<br />
TO BRIDGE THE TECHNOLOGY DIVIDE<br />
STEVE MELLINGS, FOUNDER OF ADISA, LOOKS AT HOW COVID-19 HAS HELPED TO<br />
ILLUMINATE A GAP IN SOCIETY WHERE TECHNOLOGY FOR MANY ISN'T A GIVEN<br />
is essential for all children to achieve their<br />
learning objectives not just in the COVID<br />
world, but in the normal learning<br />
environment. The partnership we have<br />
formed with ADISA allows us access to the<br />
leading IT asset disposal companies in the<br />
UK, which means the programme is not only<br />
professional, secure and compliant, but<br />
sustainable."<br />
In these challenging COVID days, many of<br />
us are struggling to juggle homeworking<br />
and our newfound role as home<br />
educators. Those households that are lucky<br />
enough to have access to technology and<br />
connectivity are able to benefit from online<br />
learning, but imagine trying to educate your<br />
children with no technology?<br />
This is a predicament affecting more than<br />
1 million households in the UK and, far from<br />
being a COVID creation, this digital divide is<br />
ever present in society and reflects how a<br />
disadvantaged group that needs support<br />
has been overlooked.<br />
The 'Digital Access for All' programme<br />
(DAFA), run by the Learning Foundation<br />
Charity, has been focusing on this area<br />
for many years, but the COVID-driven<br />
requirement for home learning has drawn<br />
widespread focus (and angst) in how<br />
developed nations can still have families<br />
without access to technology at home.<br />
DAFA is a programme that is NOT just for<br />
today, but is tasked with helping to solve<br />
this ongoing problem and, in 2020, they<br />
partnered with ADISA to create a sustainable<br />
programme for businesses to donate<br />
redundant technology that can be<br />
refurbished and donated to schools or resold<br />
to help generate funds to purchase the type<br />
of technology those without access need.<br />
The programme has been designed by<br />
ADISA to present a route where ANY retired<br />
working technology can be processed to<br />
leading industry standards, including a service<br />
option for data sanitisation and compliance<br />
to overcome security concerns. From that<br />
point, any infrastructure that is not fit for<br />
reuse is recycled appropriately and the rest<br />
prepared for reuse.<br />
With businesses having to provide devices<br />
for homeworkers, the number of laptops<br />
available for donation is very low, which<br />
is why this programme accepts ANY<br />
infrastructure, with the aim being to generate<br />
much-needed funds to give the Learning<br />
Foundation the ability to help schools either<br />
by sourcing refurbished laptops or tablets,<br />
OR to help with connectivity issues.<br />
As Paul Finnis, chief executive of the<br />
Learning Foundation, says: "Far from being<br />
a luxury item, technology in the home really<br />
POSITIVE EXPERIENCE<br />
The programme has controls in place as<br />
to which type of devices can be supplied<br />
to schools to ensure the user experience<br />
is a positive one and, in conjunction with<br />
Microsoft, is able to ensure there is access<br />
to correctly licensed software.<br />
Since a soft launch in January, we have<br />
had offers of over 100,000 assets from<br />
organisations keen to help and we hope to<br />
be able to turn that into direct help for over<br />
25,000 children, BUT we cannot do it alone.<br />
This is a real email received by us last<br />
week…..<br />
"I'm not sure if you can help but I have 2 daughters<br />
who are home schooling and the laptop we have<br />
has just failed. We can't afford to get it fixed and<br />
the school says it can't help. Can you help us as I'm<br />
so worried that my girls are going to fall behind."<br />
Want to help?<br />
If you are a business that has any redundant<br />
equipment, you should consider donating it<br />
to the 'Digital Access for All' programme<br />
administered by ADISA.<br />
To find out more, visit:<br />
https://adisa.global/dafa<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
07
masterclass<br />
DATA PROTECTION LAW AND WORKING FROM HOME<br />
AS MORE PEOPLE WORK REMOTELY, THE DATA SECURITY AND PRIVACY COMPLIANCE CHALLENGES THIS CAN<br />
BRING MUST NOT BE OVERLOOKED, SAYS SAMAD MIAH, DATA PROTECTION CONSULTANT, XCINA CONSULTING<br />
confidentiality by keeping them locked<br />
in a filing cabinet when not in use and<br />
disposing of them securely when no<br />
longer required. You may also wish to<br />
return the papers to the office if you are<br />
unable to securely store or dispose of<br />
them at home. Lastly, try to maintain a<br />
written log of records and files that you<br />
have taken to ensure information is not<br />
accidentally misplaced and that others<br />
know its exact whereabouts.<br />
Data protection law requires<br />
companies to put in place<br />
appropriate technical and<br />
organisational measures to ensure the<br />
security of processing, whether it be in<br />
the office or in the comfort of your living<br />
room. We understand that keeping in<br />
touch and communicating with your<br />
team is crucial and have therefore listed<br />
our top five tips to ensure data<br />
protection does not become a barrier<br />
to productivity:<br />
1. Only use technology that is approved<br />
by your employer<br />
Work-provided hardware or software will<br />
have likely gone through some sort of<br />
vetting process and is therefore a much<br />
safer alternative then the use of personal<br />
devices. Privacy settings and system<br />
updates can also be applied at the<br />
administrator level on a work device and<br />
can therefore guarantee an optimal level<br />
of data security. Unless specifically<br />
authorised, avoid storing information<br />
on your personal device. Also, where<br />
possible, only use your employer's<br />
trusted networks and cloud services<br />
and ensure that data is backed up if<br />
stored locally.<br />
2. Use secure forms of communication<br />
There are several video conferencing<br />
software tools available on the market.<br />
Ensure that the solution you use offers<br />
end-to-end encryption on video calls, is<br />
not sending data to third parties without<br />
your approval and offers enhanced<br />
security and privacy features as standard<br />
(such as the use of a lobby or password<br />
access to a meeting). For emails, make<br />
sure you are sending it to the correct<br />
recipient and that all attachments are<br />
encrypted/password protected.<br />
3. Be careful with paper records<br />
It is important to note that data<br />
protection law also applies to personal<br />
information in manual form if it is<br />
intended to be a part of a filing system.<br />
If you are working remotely with<br />
paper records, consider security and<br />
4. Follow your organisation's policies<br />
and procedures<br />
If staff ignore procedures and policies,<br />
then they risk breaching key data<br />
protection principles. Your organisation<br />
will have developed an approach to<br />
ensure remote working is safe and<br />
secure and policies act as a way to<br />
communicate what is allowed and what<br />
is not. Do not be tempted to circumvent<br />
what is permitted by your employer<br />
(eg, sending emails through a personal<br />
account) simply because it is more<br />
convenient.<br />
5. Consider confidentiality and<br />
unauthorised exposure<br />
When working from home, try to ensure<br />
personal data is not seen by family<br />
members or those who you live with.<br />
This can prove challenging if you are<br />
sharing your home working space.<br />
However, try to hold confidential<br />
conversations somewhere where others<br />
are less likely to overhear you and<br />
position screens and papers, so they are<br />
not visible to others. Data protection law<br />
would consider family members to be<br />
third parties and information must not<br />
be shared with them as a result.<br />
08<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
into the future<br />
THROUGH A GLASS DARKLY<br />
WE ASKED SEVERAL INDUSTRY COMMENTATORS FOR THEIR<br />
VIEWS ON WHERE <strong>2021</strong> WILL LEAD US, AS WE GRAPPLE<br />
WITH COVID-19 AND A MULTITUDE OF OTHER CHALLENGES.<br />
HERE'S WHAT THEY HAD TO SAY<br />
According to Verizon's Data Breach<br />
Investigations Report for 2020, social<br />
engineering has become a top attack<br />
vector for hackers. DigiCert, for its part,<br />
expects threat actors to leverage current<br />
events to unprecedented levels in the current<br />
year. Dean Coclin, DigiCert's senior director of<br />
business development, points to various<br />
influencing factors. "With unemployment<br />
fraud at an all-time high, we will see an even<br />
larger increase in <strong>2021</strong>, as pandemicfocused<br />
unemployment programmes from<br />
governments have lowered the barriers to<br />
collecting benefits and security methods<br />
have not been able to keep up. Should we<br />
see additional stimulus funding from<br />
governments to provide relief for the effects<br />
of the pandemic, this will only make this<br />
a richer channel for fraudsters."<br />
Coclin, along with Avesta Hojjati, head of<br />
R&D, and Mike Nelson, VP of IoT security<br />
at DigiCert, have come up with some joint<br />
predictions for <strong>2021</strong>, as life starts to return<br />
to a semblance of how it was pre-COVID-19.<br />
"We predict that individuals and businesses<br />
alike will adjust to a new normal sometime<br />
in <strong>2021</strong>. As workers return to the office,<br />
there will be a steady crescendo of<br />
applications offered by threat actors, with<br />
the promise of increased productivity tools to<br />
ease the transition. Tools such as apps that<br />
provide ambient sounds will be leveraged in<br />
these attacks," they state.<br />
They warn of new attack vectors emerging<br />
not only for social engineering, but also<br />
attacks targeting common home devices,<br />
used at home for workers splitting time<br />
working at home and the office that can be<br />
used to compromise an individual and allow<br />
for lateral movement into a business.<br />
"Workers splitting time between the home<br />
and the office will only exasperate this<br />
transition period, causing confusion and an<br />
increase in security risk for business."<br />
Hojjati also sees <strong>2021</strong> bringing increased<br />
focus on automation and efficiency solutions<br />
in the security market. "As organisations<br />
work to keep the lights on and scrutinise the<br />
bottom line, there will be a resulting push<br />
for efficiency in security technologies. <strong>2021</strong><br />
will bring an emphasis on technologies that<br />
allow organisations to do more with less and<br />
automation will play a significant role, in<br />
terms of security innovation in the New Year."<br />
Worryingly, according to a 2020 SANS<br />
Automation and Integration Survey, 12% of<br />
respondents had no security automation in<br />
2019. In 2020, that dropped to 5%. "We<br />
predict the level of automation in <strong>2021</strong> will<br />
increase exponentially," he advises.<br />
Meanwhile, as security investments focus<br />
on immediate value, quantum computing<br />
will continue to move forward. "We will<br />
see the effect of Moore's law on quantum<br />
computing," says Tim Hollebeek, industry<br />
and standards technical strategist at<br />
DigiCert. "As quantum computing allows for<br />
10<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
into the future<br />
tasks to be more efficient, organisations will<br />
prioritise its continued development.<br />
Improvements and efficiency are recession<br />
resistant."<br />
Coclin has views, too, on the challenge of<br />
staying safe online, stating that identity and<br />
consumer accountability of an organisation's<br />
permissions and controls over its data<br />
will lead to a new interest in how to stay<br />
safe online and with connected devices.<br />
"Concerns over contact tracing and other<br />
government invasions of personal privacy<br />
will lead to a new desire by the public for<br />
ways to identify organisations with which<br />
they connect online," he states, "and for<br />
better assurances of the security of the<br />
connected devices in their everyday lives,<br />
including connected cars, homes, buildings,<br />
websites and emails."<br />
WORKING REALITY<br />
With the disruptions and restrictions the<br />
pandemic brought to our lives in 2020,<br />
it seems like <strong>2021</strong> will look similar with<br />
regards to our new working reality, cautions<br />
Robert Allen, director of marketing &<br />
technical services at Kingston Technology<br />
Europe. "This will bring new data security<br />
challenges for IT managers, as cybersecurity<br />
threats have increased massively during the<br />
Covid-19 lockdown . Artificial Intelligence<br />
will have a positive impact on security,<br />
while businesses will be more reliant on<br />
AI processes to implement cybersecurity<br />
and data privacy measures.<br />
"Working from home or a hybrid working<br />
environment will continue to stay and, even<br />
though the pandemic might gradually step<br />
out of our lives, employees will be looking to<br />
continue with the flexibility they now have."<br />
A better work-life balance for employees<br />
and savings on costs for businesses will be<br />
the main motivators for this, but it will come<br />
with additional challenges," he adds, "an<br />
important one being how to improve<br />
employees' equipment to increase efficiency.<br />
This may be a memory or storage<br />
improvement that will help all systems<br />
operate better, or being able to make the<br />
many video calls that are now part of our<br />
lives".<br />
Equally important is the need to improve<br />
data security in this new working<br />
environment. "IT managers might well<br />
consider upgrading employees' laptops<br />
by using encrypted drives to mitigate<br />
cybersecurity attacks," adds Allen. "The use<br />
of encrypted USBs would also add a layer<br />
of security to mobile corporate data, as we<br />
anticipate the shift from home working to<br />
more mobile working. "<br />
As the number of employees and<br />
businesses that are operating remotely<br />
has increased significantly, the need for<br />
companies to provide specific training and<br />
cybersecurity awareness programmes to<br />
employees will be paramount. "AI will<br />
play an important role in <strong>2021</strong>, in order to<br />
support the implementation of further data<br />
security measures," he states. "With teams<br />
physically spread out and with a need to<br />
access corporate networks, businesses will<br />
rely more on automation and machine<br />
learning to prevent cyber-attacks. Businesses<br />
are still adapting to this paradigm shift. The<br />
impact caused by Covid-19 has completely<br />
changed the landscape in organisations<br />
worldwide and the tools that need to be<br />
used will also need to continue to adapt to<br />
this. Whatever happens in <strong>2021</strong> and<br />
beyond, we will continue supporting<br />
businesses as their needs evolve."<br />
RE-INFECTING MACHINES<br />
Kelvin Murray, senior threat research analyst<br />
at Webroot, sees cyber-attackers increasingly<br />
targeting home routers, insecure IoS devices<br />
and VPN systems to infect corporate<br />
machines connected to that network. "The<br />
goal of this tactic is to take advantage of low<br />
security home set-ups, so admins and users<br />
need to factor these risks into account when<br />
securing the growing number of work-fromhome<br />
environments.<br />
Avesta Hojjati, Digicert: increased focus<br />
on automation and efficiency solutions in<br />
the security market.<br />
Dean Coclin, Digicert: even greater interest<br />
will be shown in how to stay safe online and<br />
with connected devices.<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
11
into the future<br />
Lisa Ventura, UK Cyber Security<br />
Association: cloud computing and<br />
security will be central to the postpandemic<br />
world.<br />
Jon Fielding, <strong>Apr</strong>icorn: rise in endpoint<br />
controls will enable employees to use their<br />
own devices safely.<br />
"MSPs and channel partners need to adapt<br />
their businesses to respond to the evolving<br />
threats that remote work presents. Some<br />
MSPs, particularly those who were more<br />
sophisticated before the pandemic, will be<br />
better equipped to protect against these<br />
types of threats. However, others will have to<br />
adapt and change their services very rapidly<br />
to keep up with these ongoing challenges,"<br />
he adds.<br />
"The amount of disruption and cost to<br />
businesses and important services like<br />
healthcare by ransomware groups has<br />
grown too big to escape addressing by<br />
world leaders," Murray concludes. "Expect<br />
some major discussion and statements<br />
about the threat by politicians in <strong>2021</strong>."<br />
GAPS IN SECURITY TRAINING<br />
For his part, Matt Aldridge, Webroot's<br />
principal solutions architect, believes there<br />
is still not enough security training being<br />
implemented across businesses, specifically<br />
to address the increasingly remote<br />
workforce. "In <strong>2021</strong>, organisations need to<br />
prioritise training schemes that are tailored<br />
to remote workers, including how to spot<br />
phishing scams and other types of social<br />
engineering cyberattacks. With an increase<br />
of distractions at home and fatigue around<br />
email and virtual meetings, it's never been<br />
more critical that training be engaging,<br />
consistent and prioritised by business leaders<br />
to ensure it's embedded into company<br />
culture."<br />
A key consideration for businesses this year<br />
should be to monitor challenges around<br />
employee's mental health and the security<br />
issues that they can pose, he adds. "Many<br />
workers are mentally exhausted and more<br />
prone to making dangerous mistakes<br />
that can lead to security issues. Without<br />
a controlled network and onsite IT support<br />
offered by a physical office, businesses need<br />
to focus on implementing training that<br />
specifically supports workers in the home<br />
environment and that accounts for the<br />
stressors caused by the semi-permanent shift<br />
to WFH."<br />
Aldridge also points out that any training<br />
programme needs to have a feedback loop<br />
"and phishing simulations can help to form<br />
an important component of this, allowing<br />
organisations to track improvement in clickthrough<br />
rates from timely, realistic simulated<br />
phishing emails as the training programme<br />
progresses. Lessons can then be learned<br />
from this, helping organisations to provide<br />
just the right amount of regular training,<br />
without overburdening their users and<br />
without leaving it too long between sessions<br />
to allow bad behaviours to slip back in".<br />
The company's Nick Emanuel, senior<br />
director of product, also warns of new forms<br />
of exploitation, as we seek to emerge from<br />
the ravages of COVID-19. "As <strong>2021</strong> brings<br />
the first vaccines to fight Covid-19, cyber<br />
criminals will exploit the lack of trusted<br />
information and the widespread use of<br />
phone-based medical appointments<br />
[telemedicine] to target businesses and<br />
consumers in phishing attacks and BEC<br />
[Business Email Compromise] scams."<br />
DEVASTATING ATTACKS<br />
Lisa Ventura, CEO & founder, UK Cyber<br />
Security Association (UK<strong>CS</strong>A), has been<br />
highlighting some other areas she believes<br />
will continue to be a challenge in <strong>2021</strong>.<br />
"Ransomware attacks can be devastating.<br />
Demands can run into millions of pounds.<br />
The number of such attacks has jumped<br />
by 350% since 2018, as well as the average<br />
ransom payment increasing by more than<br />
100% in 2020. Downtime has also increased<br />
to up to 200% and the average cost per<br />
incident is rising exponentially.<br />
Cloud computing and security will be<br />
central to the post-pandemic world, she<br />
adds. "Organisations that have migrated to<br />
the cloud will need to focus on their cloud<br />
security and understand the relationships<br />
they have with their providers. Cloud services<br />
12<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
into the future<br />
were essential in 2020 for keeping the<br />
economy and our lives from griding to<br />
a total halt and, in <strong>2021</strong> and beyond,<br />
there will be much more of a reliance on<br />
clouds, along with smart sensors, remote<br />
collaboration and streaming, even after we<br />
emerge from the pandemic."<br />
There will also be a greater reliance on<br />
automation, artificial intelligence and<br />
machine learning," Ventura states. "This<br />
reliance may drive a trend of hyper<br />
automation. This is a process in which<br />
organisations automate as many business<br />
and IT processes as possible, using AI,<br />
machine learning and robotic process<br />
automation. With the sheer number of<br />
potential threats and security alerts rising<br />
daily, it is often too much for humans to<br />
handle alone."<br />
ATTACKER SURFACE<br />
As the pandemic hit, many companies were,<br />
as we all now recall, forced to react really<br />
quickly to keep themselves going and meet<br />
customer needs. This move to digital opened<br />
up a gateway for hackers, who have since<br />
been seeking to take advantage of a great<br />
attacker surface. "<strong>2021</strong> will start to see<br />
the trend towards efficiency over resilience<br />
reversed, as companies realise the damage<br />
that can be done, if these key services<br />
go down," says Dr Alex Tarter, chief cyber<br />
consultant and CTO at Thales UK. "This could<br />
result in the security budget overtaking the<br />
R&D budget next year."<br />
The business-hacker relationship has largely<br />
always been one way, with cyber criminals<br />
attempting to break in and businesses<br />
reacting to this. "However, <strong>2021</strong> will see that<br />
relationship change, as businesses go on<br />
the offensive and attempt to throw hackers<br />
off their game. Companies will start using<br />
deceptive techniques, such as deploying fake<br />
high-attraction systems to divert attackers or<br />
leave fake credentials [breadcrumbs] that<br />
lead to a fake high-value target," he adds.<br />
If 2020 is to be defined by the Coronavirus,<br />
then <strong>2021</strong> will, hopefully, be the year of<br />
the vaccine. "Scientists and the medical<br />
professionals have been working against the<br />
clock to produce a vaccine that will mitigate<br />
the virus, but within that unfortunately are<br />
threat actors looking to upset the process<br />
and steal data. With medical and logistical<br />
information at such a premium, the UK still<br />
faces a cybersecurity talent shortage that<br />
could leave its health industry exposed. In<br />
<strong>2021</strong>, expect to see a greater effort from the<br />
healthcare industry to access cybersecurity<br />
expertise," concludes Tarter, "both from a<br />
recruitment perspective and a partnership<br />
viewpoint, in order to protect their systems<br />
and against misinformation about the<br />
vaccine process."<br />
MAKE OR BREAK<br />
It's security culture that will 'make or break'<br />
hybrid working - not the technology, argues<br />
Jon Fielding, <strong>Apr</strong>icorn's managing director<br />
EMEA. "Combined home and office working<br />
will set in as a long-term model and doing<br />
this safely will demand a major culture shift.<br />
Lack of employee education was singled out<br />
as the biggest cybersecurity weakness during<br />
the first lockdown in a recent <strong>Apr</strong>icorn poll.<br />
Companies must make urgent changes to<br />
improve awareness of the different security<br />
risks associated with hybrid working and the<br />
knowledge of how to control them."<br />
Training employees in the 'practical stuff'<br />
won't be sufficient, he adds. "Everyone is<br />
accountable for protecting data in the new<br />
working environment, which requires a<br />
culture of information security best practice<br />
across the entire dispersed workforce.<br />
This isn't something that can be enforced;<br />
employees need to buy in to it. This will<br />
require IT teams to build deeper engagement<br />
with staff and devolve greater responsibility<br />
for security onto the individual. Education<br />
programmes must therefore explain the<br />
'why', as well as the 'what' and 'how': the<br />
reasons data protection is important, and<br />
the specific risks and consequences to their<br />
company of a breach."<br />
"Ultimately, businesses will want complete<br />
confidence that employees are working<br />
safely when they're out of the office," adds<br />
Fielding. "Secure, encrypted storage devices<br />
can be used to protect company data offline<br />
or quickly deploy a secure desktop<br />
environment to an entire workforce by preloading<br />
them with the with the standard<br />
corporate apps and security settings.<br />
Employees can then boot this up on<br />
whatever device they're using."<br />
He also sees organisations moving beyond<br />
the mindset of 'complete security', to focus<br />
on strengthening their cyber resilience.<br />
"Cyber resilience is an organisation's ability to<br />
prepare for, respond to and recover quickly<br />
from any digital disruption. We anticipate a<br />
marked rise in criminal attacks in <strong>2021</strong>, as<br />
hackers take advantage of people continuing<br />
to work remotely - in particular, ransomware,<br />
malware and phishing. Recognising that no<br />
business is immune, IT teams will shift focus<br />
to ensuring they have all their ducks in a<br />
row, in the event of a breach. They'll also<br />
prioritise planning to mitigate the impact of<br />
any future crisis that drives the workforce out<br />
of the office!"<br />
<strong>Apr</strong>icorn also expects to see an increase<br />
in encryption, to protect data as it's moved<br />
from office to home - mitigating risks,<br />
such as targeting in the cloud - and keep<br />
information secure whatever's happening<br />
around it. "There will also be a rise in<br />
endpoint controls that enable employees to<br />
use their own devices safely. These measures<br />
give organisations the ability to demonstrate<br />
transparency and due diligence, should a<br />
breach occur. The use of secure, encrypted<br />
storage devices as a straightforward way of<br />
backing up data locally is likely to increase,<br />
supporting the ability to get up and running<br />
again fast."<br />
STRAINING AT THE LEASH<br />
According to Mike Campfield, VP, GM<br />
International and Global Security Programs<br />
at ExtraHop, this year will see new strains of<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
13
into the future<br />
Mike Campfield, ExtraHop: new<br />
ransomware gangs will enter the picture<br />
and continue development of attack<br />
tactics.<br />
Maxine Holt, Omdia: COVID-19 accelerated<br />
cloud journeys and security was at best an<br />
afterthought.<br />
ransomware as attackers continue to profit.<br />
"We will also find new gangs entering the<br />
picture and continued development of<br />
attack tactics. Following the trend of recent<br />
years, ransomware will set its sights on<br />
ever higher value targets in healthcare,<br />
institutions of education and financial<br />
services. The more things change, the more<br />
they stay the same - the essential threat of<br />
ransomware is no different. Enterprises will<br />
develop workarounds to resist paying the<br />
ransom; ransomware continues to be the<br />
greatest threat to enterprises. We expect<br />
<strong>2021</strong> to produce new victories in the long<br />
ransom war," he states.<br />
As for remote work, he believes that more<br />
and more employees are going to demand<br />
it from their employers. "In <strong>2021</strong>, remote<br />
work will cement its place as a standard<br />
part of working life and create a new raft of<br />
considerations for enterprise security. How<br />
will an enterprise protect its network, if<br />
endpoints are employee-owned constantly<br />
on and off the corporate network, either<br />
from home or in the office? How are<br />
enterprises going to protect themselves,<br />
without the benefit of enterprise security<br />
controls? In <strong>2021</strong>, the fact of long-term<br />
remote work is going to force us to rethink<br />
how we secure enterprise data and<br />
infrastructure," he adds.<br />
STRAINING AT THE LEASH<br />
<strong>2021</strong> will be a year for organisations to<br />
reset and to fortify their cybersecurity<br />
resilience, according to Infosecurity Europe's<br />
community of security leaders. Europe's<br />
leading information security event asked its<br />
network of CISOs and analysts to comment<br />
on the major trends and changes they<br />
foresee shaping the next 12 months.<br />
Overall, they expect companies to focus on<br />
consolidating and reinforcing their security<br />
posture, as the full consequences of last<br />
year's rapid changes become apparent. This<br />
is a world that Maxine Holt, senior research<br />
director at Omdia, calls "the reset normal".<br />
She says: "From a security perspective, it's<br />
been difficult to maintain pace with the<br />
speed of change. COVID-19 accelerated<br />
cloud journeys, for instance,<br />
and security was at best an afterthought.<br />
Security functions applied temporary<br />
measures, and they will now peel back the<br />
sticking plaster and build more sustainable<br />
security for new ways of working. This<br />
should include upskilling staff in cloud<br />
security expertise, and looking at technology<br />
that can prevent, detect and respond to<br />
security incidents in these evolved<br />
environments."<br />
The threat landscape will continue to<br />
evolve at a speed that outpaces the<br />
cybersecurity industry, according to Becky<br />
Pinkard, CISO of Aldemore Bank. "I'd like<br />
to see companies buckle down on the<br />
'foundations of security', moving into an<br />
era of never-before-seen strength on the<br />
frontline fight against cyber threats," she<br />
comments. "However, I predict we'll see<br />
more of the same when it comes to security<br />
awareness, patching and risk prioritisation.<br />
The industry is maturing, but at a glacial<br />
pace. Until we pick up that pace, the<br />
current overall defensive posture will<br />
persist."<br />
When it comes to the threats that will<br />
come to the fore in <strong>2021</strong>, Heidi Shey,<br />
principal analyst serving security and risk<br />
professionals with Forrester Research,<br />
believes insider incidents will be an area<br />
of increased concern. "Pandemic-related<br />
uncertainty and remote work environments<br />
have collided to create the ideal conditions,"<br />
she explains. "We expect one-third of<br />
security breaches will be caused by insider<br />
threats in the coming year, up from 25%<br />
today. These may be due to accidental or<br />
inadvertent data misuse, or malicious intent.<br />
As part of their defence, firms should add<br />
capabilities for detecting insider threats<br />
and improve the employee experience."<br />
Part 2 of our predictions for cybersecurity in <strong>2021</strong><br />
will appear in the next issue.<br />
14<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
Computing<br />
Security<br />
Secure systems, secure data, secure people, secure business<br />
e-newsletter<br />
Are you receiving the Computing Security<br />
monthly e-newsletter?<br />
Computing Security always aims to help its readers as much as possible to do<br />
their increasingly demanding jobs. With this in mind, we've now launched a<br />
Computing Security e-newsletter which is produced every month and is available<br />
free of charge. This will enable us to provide you with more content, more<br />
frequently than ever before.<br />
If you are not already receiving this please send your request to<br />
christina.willis@btc.co.uk and advise her of the best email address for the<br />
newsletter to be sent to.
webcam perils<br />
BE CAREFUL WHO'S WATCHING YOU!<br />
JUST HOW SAFE ARE WEBCAMS - AND WHO'S MOST VULNERABLE<br />
TO HACKERS?<br />
As many parts of the world continue<br />
with strict lockdown restrictions, Zoom<br />
calls will remain the norm for some<br />
time. All to the good in such challenging<br />
times, but there are clear downsides, too.<br />
The tech and webcam specialists over at<br />
Reincubate have been analysing the real risks<br />
of webcams and detailed what we should be<br />
doing to protect ourselves as we let the world<br />
into our home via our webcam. Here is the<br />
company's take on where the greatest<br />
dangers lie:<br />
The rapid growth of remote and home<br />
working has led to a lot of users getting<br />
webcams or setting up Zoom equipment in<br />
their own homes. <strong>Mar</strong>k Zuckerberg<br />
inadvertently brought attention to the risks of<br />
users being covertly monitored through their<br />
computer's webcams or mics when he posted<br />
a now infamous photo of his desk setup,<br />
showing his laptop with a covered webcam<br />
and blocked mic. If even the creator of<br />
Facebook blocks his, who else does?<br />
Generally speaking, there are few video apps<br />
where the host can remotely enable video if<br />
the participant has turned it off after the start<br />
of the call, and Zoom is safe in this regard. It<br />
does, however, have a feature whereby the<br />
host can remotely unmute a participant's<br />
microphone. If you're in the habit of stepping<br />
away from your computer on long calls to get<br />
a cup of coffee whilst muted, beware that you<br />
might be unmuted without knowing about it.<br />
Similarly, if you're joining the call from a<br />
room with other people around, their<br />
unexpected presence in your background may<br />
cause them embarrassment if they're not<br />
expecting to be broadcast. These inadvertent<br />
risks can be handled with a few simple<br />
precautions: covering or physically<br />
disconnecting a webcam makes things more<br />
obvious and having a mic with a physical<br />
mute button helps.<br />
SECURING YOUR CAMERA AND MIC ON<br />
AN IPHONE<br />
iPhone and iPad users have the least to worry<br />
about. So long as the device has not been<br />
jailbroken, it is extremely unlikely that hackers<br />
can remotely monitor the device's camera or<br />
mic. Apple's release of iOS 14 has done even<br />
more to safeguard users with its new orange<br />
and green dots.<br />
Of course, it's still possible for apps to access<br />
an iOS device's camera and mic, but in order<br />
for this to happen, users must first install an<br />
app and grant it permission to record video<br />
and audio. It's possible for apps to record<br />
audio - but not video - whilst backgrounded,<br />
but again, permissions must first be given by<br />
the user. Broadly speaking, your iPhone and<br />
iPad should be perfectly safe, so long as you<br />
don't let them out of your sight and only<br />
install apps that you trust.<br />
SECURING YOUR WEBCAM AND MIC ON<br />
A MAC<br />
A Mac or a MacBook Pro is second only to an<br />
iPhone in its security. Recent Macs include<br />
something called a T2 chip, which includes a<br />
number of hardware-based security features.<br />
Most relevant of all, it uses hardware to<br />
physically disable a Mac laptop's microphone<br />
when the laptop is closed or suspended.<br />
From a practical perspective, it's impossible<br />
for Mac's webcam to be in use without the<br />
16<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
webcam perils<br />
accompanying green light being turned on. In<br />
the past, there have been workarounds, but<br />
the known exploits have been fixed on Macs.<br />
However, the software on the Mac does not<br />
trigger any sort of system-level security<br />
prompt when accessing a webcam or mic, so<br />
users must be careful to only use apps they<br />
trust. Security-conscious Mac users may wish<br />
to try OverSight (free) or Micro Snitch (paid),<br />
popular security tools that run in the<br />
background and alert users to any apps<br />
accessing their camera or mic.<br />
STAYING SECURE ON WINDOWS OR<br />
ANDROID<br />
Unfortunately, Windows and Android users<br />
will have the hardest time of all staying<br />
secure. Often the software and hardware for<br />
these devices are made by different<br />
companies, meaning there's plenty of room<br />
for loopholes between the two. Google's Play<br />
Store is infamous for including malware apps<br />
on a regular basis, and many Android phones<br />
suffer from not getting access to the latest<br />
security patches or Android updates.<br />
Theoretically, modern Android devices with<br />
the latest security patches will be close to an<br />
iPhone's security - at least, each app must<br />
prompt for webcam or mic access, but a<br />
status light won't be shown.<br />
But the problem is it's hard to tell by looking<br />
at an Android device if it's secure or up to<br />
date; simply because your phone says it has<br />
all of the latest security patches, doesn't mean<br />
that the manufacturer of your Android phone<br />
has made all of the security patches available.<br />
From this perspective, Google Android devices<br />
(such as the Pixel) are more trustworthy, as<br />
Google makes both the software and<br />
hardware together, and are ultimately<br />
responsible for issuing the most important<br />
security updates.<br />
Staying secure on these platforms is hard.<br />
The problem on Windows is so endemic that<br />
both Lenovo and HP have started building<br />
physical switches and covers into their<br />
webcams to give users some peace of mind.<br />
Without hardware control of the mic, it's<br />
impossible to tell if a Windows laptop could<br />
be recording in the background when open<br />
or closed!<br />
Blocking microphones isn't easy: you can't<br />
cover them with a piece of tape like you can a<br />
camera or at least, if you do, it won't be at all<br />
effective.<br />
Reincubate's advice, if running Android,<br />
would be to only use Google devices such as<br />
the Pixel and to avoid installing third-party<br />
apps from the Google Play Store. The risk of<br />
malware or app impersonation is not small.<br />
Seriously, if you want apps, use an iPhone.<br />
WHAT ABOUT ALEXA OR THE<br />
HOMEPOD?<br />
Plenty of users have an Alexa or HomePod<br />
device in their home or other forms of smart<br />
devices, like thermostats or security cameras.<br />
These are all capable of broadcasting video or<br />
audio captured within the home. It's very hard<br />
to keep tabs on these and ultimately one<br />
must either trust the company making them<br />
or not.<br />
"There are real risks to not covering a<br />
webcam, but, for users with Macs and<br />
iPhones, the greatest risk is most likely<br />
accidentally broadcasting themselves or<br />
unknowingly being unmuted by a meeting<br />
host, rather than being surveilled by a hacker,"<br />
says Aidan Fitzpatrick, Reincubate. "Webcam<br />
covers and physical mute buttons on<br />
microphones act as fail-safes and helpful<br />
reminders to think about security, and a piece<br />
of tape really is the best solution for use with<br />
a MacBook. I recommend users keep devices<br />
closed or powered off when not on use.<br />
"It's worth thinking about using an external<br />
webcam or, for better quality, a smartphone<br />
webcam, as it can be physically unplugged<br />
between calls. Being able to unplug one's<br />
camera is the best way to stay secure."<br />
<strong>Mar</strong>k Zuckerberg, Facebook: in a recent<br />
post, his laptop had a covered webcam<br />
and blocked mic.<br />
Aidan Fitzpatrick, Reincubate:<br />
unplugging your camera is the best way<br />
to stay secure.<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
17
inside view<br />
HOW CAN ORGANISATIONS STOP THEIR DATA FALLING INTO<br />
THE WRONG HANDS? TERRY GREER-KING, VP EMEA, SONICWALL,<br />
OFFERS HIS INSIGHTS<br />
In an era where cybercriminals are<br />
more sophisticated than ever, and<br />
attacks are becoming more<br />
commonplace by the day, the market<br />
for stolen data on the dark web has<br />
become a truly lucrative trade. Recent<br />
years have seen the spoils of many<br />
cyberattacks end up for sale on<br />
underground marketplaces.<br />
For instance, the recent attack on the<br />
European Medicines Agency (EMA) saw<br />
confidential information on the Pfizer<br />
COVID-19 vaccine was leaked across<br />
several hacking forums. The fact that<br />
billions of private records are changing<br />
hands poses a threat to businesses<br />
everywhere.<br />
The dark web is the term used for<br />
web content that exists on darknets:<br />
networks that require specific software<br />
or authorisation to access. Through<br />
the dark web, users can communicate<br />
anonymously without divulging<br />
identifying information. While not all<br />
activity on the dark web is illegal, it is<br />
often the preferred forum for criminals.<br />
Ultimately, the variety of threats that<br />
businesses could face from the dark web<br />
is endless. Essentially, criminals are after<br />
anything that can be traded for profit -<br />
usernames, passwords, credit card<br />
details, intellectual property, bank<br />
details, or employee information. The<br />
criminals will then leverage this data<br />
for financial gain. While it's hard to give<br />
concrete figures on the price data will<br />
fetch on the dark web, recent examples<br />
include the aftermath of 2018's British<br />
Airways hack, where stolen logins sold<br />
for as little as £7.<br />
When factoring this is in with the fact<br />
that it takes on average nine months to<br />
discover a breach, the risks become even<br />
clearer. Unfortunately, once the data is<br />
out there, there's not a great deal to be<br />
done to get it back. Therefore, the main<br />
mode of defence for any organisation is<br />
to prevent these breaches happening in<br />
the first place. Businesses need to zero<br />
in on ensuring they have a layered<br />
cybersecurity posture. The idea behind<br />
this is simple: The more barriers are<br />
placed in front of criminals, the better<br />
the chances to prevent them stealing<br />
data. By looking at cybersecurity in this<br />
way, companies can build an extremely<br />
robust line of defence.<br />
This will not only require a blend of<br />
the best technology available, such as<br />
strong identification and authorisation,<br />
sandboxing, SSL encryption, and cloud<br />
application security, but indeed also<br />
a consistent emphasis on employee<br />
education. Even with the finest<br />
technology in the world, if workers<br />
are not wise to the nature of threats,<br />
a simple phishing attack could expose<br />
all your data.<br />
Ultimately, combining this approach<br />
with a top-down focus on ensuring that<br />
best practices are being adhered to is<br />
the best way to prevent sensitive data<br />
falling into the wrong hands.<br />
18<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
product review<br />
WANDERA PRIVATE ACCESS<br />
The COVID-19 crisis will continue to<br />
have a lasting impact on the way<br />
businesses around the globe<br />
collaborate and communicate, with<br />
repeated lockdowns forcing them to<br />
embrace remote working. In the rush to<br />
provide secure access to remote workers,<br />
enterprises are finding legacy VPNs (virtual<br />
private networks) are not fit for purpose,<br />
as their flawed trust models leave them<br />
open to all kinds of attacks.<br />
Zero Trust Network Access (ZTNA) is the<br />
new normal for securely accessing today's<br />
cloud and hybrid infrastructures and<br />
Wandera's Private Access (WPA) cloud<br />
service has a simple philosophy - trust no<br />
one. It ensures only authorised users can<br />
access business applications, and allows<br />
organisations to create software-defined<br />
network perimeters that surround and<br />
protect all corporate resources on<br />
premises, in data centres and the cloud.<br />
Wandera takes a mobile-first approach;<br />
but, along with support for iOS and<br />
Android, WPA has Windows 10 and<br />
macOS devices on its guest list. A key<br />
differentiator with legacy VPNs is WPA<br />
provides secure access to applications and<br />
not the network, thus blocking infiltration<br />
and lateral movement by hackers.<br />
WPA creates connections up to four<br />
times faster than legacy VPNs by<br />
employing a non-IPsec protocol, which<br />
uses single-packet authorisation in the<br />
cloud. This fast micro-tunnel activation<br />
provides seamless transitions between<br />
mobile and wireless networks for remote<br />
users on the move.<br />
WPA integrates tightly with existing<br />
identity providers (IdPs) and has Microsoft<br />
Azure AD at the top of the list. It also<br />
works with many others, including Okta,<br />
OneLogin, IBM, Centrify and Ping Identity.<br />
Deployment is a cinch as, from the<br />
Private Access administrative console, we<br />
defined Microsoft Azure as our IdP. After<br />
providing our Microsoft 365 credentials,<br />
WPA grabbed our Tenant ID and we were<br />
ready to go - it's that simple.<br />
Client deployment is equally easy, as<br />
users installed the iOS app on their<br />
mobiles, signed in with their Microsoft<br />
365 credentials and a secure tunnel was<br />
created in seconds. Likewise with our<br />
Windows 10 clients as, after installing the<br />
agent, they logged in using their Microsoft<br />
accounts and were ready to go.<br />
Wandera's admin console presents a<br />
wealth of information on users, global<br />
data usage, overall security ratings, the<br />
top countries devices connect from and<br />
much more. It provides quick access for<br />
sending enrolment links to users and<br />
creating activation profiles, which can<br />
integrate with existing UEM (unified<br />
endpoint management) solutions.<br />
WPA provisions policy-based access<br />
controls to SaaS apps in the public cloud<br />
and enterprise apps hosted privately.<br />
Policies are easy to create, as we selected<br />
Microsoft 365, Box, Dropbox and GSuite<br />
from the predefined list and requested<br />
that all access to these services should be<br />
encrypted and routed through the nearest<br />
Wandera data centre.<br />
From our user's perspective, there is<br />
nothing to see, because the process is<br />
completely transparent. They continued to<br />
access their business apps as normal, with<br />
the client handling tunnel creation and<br />
encryption in the background.<br />
Along with blocking users from accessing<br />
specific web site categories and applying<br />
data usage limits, you can assign riskaware<br />
security policies. Wandera's<br />
MI:RIAM (Mobile Intelligence: Real Time<br />
Insights and Analyst Machine) engine<br />
comes into play here, as it uses the data<br />
gathered by advanced machine learning<br />
techniques to determine if users are at risk<br />
from compromised apps, web content or<br />
devices and automatically blocks access.<br />
Provisioning safe remote access in these<br />
challenging times needn't be a headache<br />
for enterprises, as Wandera's Private<br />
Access provides an elegantly simple, yet<br />
highly secure, ZTNA solution. We found it<br />
remarkably easy to deploy, as it doesn't<br />
require new certificates, accounts or IT<br />
workflows to be created and its light<br />
touch on end user devices ensures they<br />
get the best possible experience.<br />
Product: Private Access<br />
Supplier: Wandera<br />
Web site: www.wandera.com<br />
Tel: +44 (0) 203 301 2660<br />
Sales: sales@wandera.com<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>ch <strong>2021</strong> computing security<br />
19
dark web<br />
WHEN DARKNESS FALLS<br />
SHOULD YOUR DATA LEAK, IT MIGHT WELL END UP FOR SALE ON THE DARK WEB,<br />
MAKING YOU VULNERABLE AND AN EASY TARGET FOR ADVANCED ATTACKS<br />
As the ever-vigilant SpyCloud has been<br />
pointing out, there's been an awful<br />
lot of buzz resulting from the recent<br />
so-called 'superbreach', referred to in the<br />
round as 'Collection #1'. "Containing over<br />
772,904,991 unique email addresses and<br />
more than 21 million passwords, this incident<br />
already stands out in terms of its sheer<br />
magnitude of exposure," it states. "It certainly<br />
doesn't help that the data was reportedly<br />
posted to a publicly accessible online forum."<br />
SpyCloud is not so sure the frenzy that<br />
seized the media when this breach erupted<br />
is an accurate reflection of what actually<br />
transpired in this instance. "The proliferation<br />
of stolen or leaked databases has given rise to<br />
credential stuffing, a fairly simple technique<br />
in which criminals load lists of previously<br />
breached credentials (from Linkedin,<br />
MyFitnessPal, MySpace, etc.), called combo<br />
lists, into automated brute-forcing tools to<br />
test credentials en masse. These tools test<br />
stolen passwords against thousands of<br />
targeted websites and applications until there<br />
is a match."<br />
The reality is that, armed with your<br />
credentials, online criminals can take over<br />
your online accounts and start ordering<br />
goods with your credit card. This might<br />
happen before the news of the breach even<br />
goes public. What are the likely consequences<br />
for organisations that have been hit in this<br />
way? What is the worst-case scenario likely<br />
to be? And how can they fight back?<br />
WIDENING AN ATTACK<br />
"As an information security testing company,<br />
we often get asked to assess the possibility<br />
of a threat actor gaining access to an<br />
organisation's critical information or control<br />
of internal networks," says Paul Harris,<br />
managing director, Pentest. "Leaked<br />
credentials, whether they be from the dark<br />
web or public forums, offer a potential entry<br />
point for these engagements and, over the<br />
years, have provided one of the most reliable<br />
routes in."<br />
However, using leaked credentials to gain<br />
access to company accounts isn't necessarily<br />
dangerous on its own, he points out - after<br />
all, the account may have low-level privileges.<br />
"You may get lucky and obtain access to an<br />
account with entry to sensitive data straight<br />
off the bat. It's more likely, though, that<br />
the compromised account is just a starting<br />
point for a wider attack. "Take a red team<br />
engagement we conducted for a large<br />
multinational tech company. They wanted to<br />
know if we could gain domain admin on a<br />
critical network. Our first step: check if leaked<br />
credentials worked. Due to password reuse,<br />
we were able to obtain access to the<br />
company's VPN and gain a presence on their<br />
internal network. From there, we were able<br />
to escalate our privilege level, through further<br />
vulnerabilities, until we had admin access on<br />
a server. Once access to the server had been<br />
obtained, we monitored traffic and, when a<br />
domain admin logged in, we were able to<br />
pull their credentials out of the server<br />
memory, going from leaked user credentials<br />
to complete control of the company's<br />
Microsoft Windows Domain."<br />
But how can you protect yourself against a<br />
scenario such as the one above? "Sadly,<br />
there's no silver bullet, but the more effective<br />
security measures you have in place, the<br />
harder it becomes for a threat actor," states<br />
Harris. "Our broad advice?<br />
Encourage employees to use long, unique,<br />
but easy-to-remember passwords, such as<br />
phrases, and enforce tight password policies.<br />
Introduce 2FA [two-factor authentication]<br />
around key access points, such as VPN, Email,<br />
Office365 etc, and consider tighter user<br />
privilege levels. People should only have<br />
20<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
dark web<br />
access to the information/networks they<br />
truly need to do their job, no more." Finally,<br />
he advises challenge your security posture as<br />
often and as thoroughly as you can. "It's<br />
always better to have an internal team, or<br />
testing provider, find a vulnerability than a<br />
malicious threat take advantage of it."<br />
LUCRATIVE TRADE<br />
As Terry Greer-King, VP EMEA, SonicWall,<br />
points out, the market for stolen data on<br />
the dark web has become a truly lucrative<br />
trade. "Recent years have seen the spoils of<br />
many cyberattacks end up for sale on<br />
underground marketplaces."<br />
He cites the December attack on the<br />
European Medicines Agency (EMA),<br />
confidential information on the Pfizer<br />
COVID vaccine as one notable example of<br />
date being leaked across several hacking<br />
forums. "Needless to say, the fact that<br />
billions of private records are changing<br />
hands poses a threat to businesses<br />
everywhere."<br />
Ultimately, the variety of threats that<br />
businesses could face from the dark web<br />
is endless. "Essentially, criminals are after<br />
anything that can be traded for profit -<br />
usernames, passwords, credit card details,<br />
intellectual property, bank details, or<br />
employee information," adds Greer-King.<br />
"The criminals will then leverage this data<br />
for financial gain. While it's hard to give<br />
concrete figures on the price data will fetch<br />
on the Dark Web, examples include the<br />
aftermath of 2018's British Airways hack,<br />
where stolen logins sold for as little as £7."<br />
It takes on average nine months to<br />
discover a breach, so the risks involved<br />
become even clearer. "Unfortunately, once<br />
the data is out there, there's not a great deal<br />
to be done to get it back. Therefore, the<br />
main mode of defence for any organisation<br />
is to prevent these breaches happening in<br />
the first place. Businesses need to zero in on<br />
ensuring they have a layered cybersecurity<br />
posture. The idea behind this is simple:<br />
the more barriers are placed in front of<br />
criminals, the better the chances are to<br />
prevent them stealing data. By looking at<br />
cybersecurity in this way, companies can<br />
build an extremely robust line of defence."<br />
This will not only require a blend of the<br />
best technology available, he adds, such<br />
as strong identification and authorisation,<br />
sandboxing, SSL encryption, and cloud<br />
application security, but also a consistent<br />
emphasis on employee education. "Even<br />
with the finest technology in the world,<br />
if workers are not wise to the nature of<br />
threats, a simple phishing attack could<br />
expose all your data. Ultimately, combining<br />
this approach with a top-down focus on<br />
ensuring that best practices are being<br />
adhered to is the best way to prevent<br />
sensitive data falling into the wrong hands."<br />
Terry Greer-King, SonicWall: billions of<br />
private records changing hands poses a<br />
threat to businesses everywhere.<br />
Paul Harris, managing director, Pentest:<br />
challenge your security posture as often<br />
and as thoroughly as you can.<br />
UNLOCKING THE COMBINATIONS<br />
Combo (combination) lists - see main text - are usually not that interesting, from<br />
a security standpoint, because they are full of duplicate records, says SpyCloud<br />
(www.spycloud.com). In many cases, duplicates of duplicates of duplicates.<br />
SpyCloud analysts has published content on this subject, in light of the epidemic of<br />
password reuse. "As increasingly more websites and applications require account<br />
creation, people simply can't recall the many unique passwords they use between<br />
accounts," it says. "To make things easier, they reuse passwords amongst multiple<br />
sites, recycle old passwords and/or make only slight modifications to existing<br />
passwords. For criminals, this makes account takeover easier than ever - especially<br />
with the help of massive combo lists such as the one recently disclosed."<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
21
cyber incidents<br />
ATTACKS HIT RECORD HIGH<br />
CYBER SECURITY INCIDENTS ARE NOW OUTSTRIPPING ANYTHING THAT THE<br />
UK'S NATIONAL CYBER SECURITY CENTRE HAS HAD TO DEAL WITH IN THE PAST<br />
The UK's National Cyber Security Centre<br />
(N<strong>CS</strong>C) handled a record number of<br />
cyber security incidents over the last 12-<br />
month period accounted for. The agency dealt<br />
with 723 serious incidents between<br />
September 2019 and the end of August<br />
2020, a 20% increase on the 602 it handled<br />
the year before. More than 200 of these<br />
incidents were related to the coronavirus,<br />
according to the N<strong>CS</strong>C's latest annual review.<br />
The N<strong>CS</strong>C has been taking a series of decisive<br />
actions against malicious actors in the UK and<br />
abroad to combat this threat. We ask those in<br />
the security industry what preventive<br />
measures organisations can carry out, for their<br />
part, to keep them from being victims of such<br />
attacks in <strong>2021</strong>.<br />
"Cybercriminals keep a close eye on events<br />
that are happening around the globe," says<br />
Jelle Wieringa, technical evangelist, KnowBe4.<br />
"To them, big events that attract a lot of media<br />
attention are an opportunity around which to<br />
build their attacks. COVID-19 is, unfortunately,<br />
a perfect example of cybercriminals taking<br />
advantage of world events."<br />
Those scams started with information about<br />
COVID-19 infection rates back in <strong>Mar</strong>ch last<br />
year and escalated to contact tracing over the<br />
summer. "With vaccines beginning to be<br />
administered to front line personnel and<br />
healthcare workers, cybercriminals are taking<br />
advantage of this by creating new phishing<br />
emails targeting users to click a malicious link<br />
or open an attachment. And with the world<br />
moving faster and faster, big things seemingly<br />
happen every day. So, there is no shortage of<br />
new events for cybercriminals to choose from.<br />
"For organisations to be able to defend<br />
themselves, they need to know where threats<br />
are coming from and what to defend against.<br />
Gathering security intelligence, whether it is<br />
through open source, paid or otherwise<br />
collected channels, is a great way for<br />
organisations to have visibility into what is<br />
happening, which allows cybercriminals to<br />
predict and prepare." Unfortunately, not<br />
everything can be clearly foreseen. "Therefore,<br />
an organisation needs to be prepared to fend<br />
off attacks, whether they are anticipated or<br />
not," he advises. "And with the pandemic still<br />
holding the world in its grasp, most<br />
employees will be forced to work from home<br />
for at least the foreseeable future. Even after<br />
employees are allowed to return to the office,<br />
it will be a while before everything goes back<br />
to a state of somewhat normal. This leaves<br />
employees particularly vulnerable to social<br />
engineering attacks - something<br />
cybercriminals are well aware of."<br />
Wieringa also points to how social<br />
engineering is a form of deception that is<br />
22<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
cyber incidents<br />
used to manipulate individuals into divulging<br />
confidential or personal information that may<br />
be used for fraudulent and malicious<br />
purposes. "It is a popular tactic for today's<br />
cybercriminals to target humans, which is<br />
why it's so important to build up an<br />
organisation's human firewall and to help<br />
employees make smarter security decisions<br />
every day. This means organisations need to<br />
pay extra attention to the human side of<br />
cybersecurity. Training employees, promoting<br />
and rewarding secure behaviour, and<br />
cultivating a positive security culture<br />
throughout the organisation will be key to<br />
help combat social engineering attacks now<br />
and in the future."<br />
RELENTLESS ATTACKS<br />
Keith Driver, chief technical officer, Titania,<br />
says the figures released by the National Cyber<br />
Security Centre (N<strong>CS</strong>C) in its 2020 Annual<br />
Review demonstrate the relentless increase in<br />
cases whereby a cybersecurity attack has<br />
resulted in an incident requiring the UK<br />
national response team's attention -with, on<br />
average, almost two serious incidents<br />
occurring every day across the year.<br />
"On a national scale, the N<strong>CS</strong>C Active Cyber<br />
Defence programme has had incredible<br />
results," he points out. "It continues to roll out<br />
effective capabilities, like the Suspicious Email<br />
Reporting Service [SERS - where you can<br />
forward your suspicious email to<br />
'report@phishing.gov.uk for investigation],<br />
which received 2.3million emails in 2020,<br />
Protected DNS and Exercise in a Box, as well<br />
as a plethora of clear and concise advice<br />
notes."<br />
While these initiatives operate nationally on<br />
behalf of the British public, the protection of<br />
individuals and commercial enterprises<br />
requires us all to take action, he adds. "After<br />
all, as highlighted in the report, 'Cybersecurity<br />
is a team sport' , the N<strong>CS</strong>C has consistently<br />
promoted that the most effective cyber<br />
defence starts with basic cyber hygiene. The<br />
'10 Steps to cybersecurity' and 'Cyber<br />
Essentials' initiatives have been instrumental in<br />
helping to make the UK a safer place by<br />
providing easy-to-understand and practical<br />
advice on cyber policy and specific technical<br />
protections."<br />
When followed, the advice for endpoints,<br />
the networks they attach to and the people<br />
who use them provides a robust defence to<br />
the most common attacks, eliminating<br />
perhaps 99% of the threat, states Driver.<br />
"Basic cyber hygiene is vital to protect against<br />
the majority of attacks and it's something that<br />
Titania has discussed in depth. That's because<br />
it makes it so much harder for an attacker to<br />
gain a foothold. Everything from password<br />
strength and management, to device and<br />
network node configuration [firewalls, for<br />
example], is integral to operating a resilient<br />
and robust network, and should be<br />
considered."<br />
However, this does not need to be a lengthy<br />
process, he adds. "Much of basic cyber<br />
hygiene assurance can be automated,<br />
meaning it doesn't require human<br />
intervention to check that device<br />
configurations are secure or that policies have<br />
not been breached. I believe that this is where<br />
the value of technical solutions shines. By<br />
providing certainty in understanding that your<br />
policies and required configurations are being<br />
adhered to, the chances of an attacker being<br />
successful are much reduced and resources<br />
can be focused elsewhere, preferably on value<br />
creation."<br />
DEFENDING THE UK<br />
Since its inception in 2016, the N<strong>CS</strong>C has<br />
done incredible work and continues to defend<br />
the UK in an ever-changing threat landscape,<br />
he continues. "However, organisations and<br />
individuals now need to make the<br />
organisation's job as easy as possible by taking<br />
responsibility for our networks, devices and<br />
actions. This means ensuring that we make it<br />
as hard as possible for those that would do us<br />
harm and be continually vigilant, checking<br />
that this continues to be the case."<br />
Jelle Wieringa, KnowBe4: COVID-19 is a<br />
perfect example of cybercriminals taking<br />
advantage of world events.<br />
Keith Driver, Titania: the N<strong>CS</strong>C Active<br />
Cyber Defence programme has had<br />
incredible results.<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
23
industry insights<br />
THE PATIENT APPROACH PAYS OFF<br />
NHS MANAGEMENT ADOPTS A SECURITY-FIRST MINDSET, WITH HELP FROM AT&T CYBERSECURITY<br />
NHS Management provides<br />
administrative and consulting services<br />
the US southeast region. Naturally,<br />
quality of care is the number one priority, as<br />
is protecting patient data in such a highly<br />
regulated environment. Stephen Locke, CIO<br />
for NHS Management, explains: "There are a<br />
lot of unique challenges in healthcare when<br />
it comes to cybersecurity, particularly with<br />
the increase of regulations over the past ten<br />
years, as well as the complexities that<br />
come with managing inpatient records, and<br />
securing communications between vendors<br />
and third parties."<br />
Around three years ago, during a long<br />
holiday weekend, NHS Management found<br />
itself at the mercy of cyber-attackers, who<br />
hit the company with ransomware at a time<br />
when they knew most people would be<br />
out of the office. Though no data was<br />
compromised, it took about a week to get<br />
the desktops back up and running again after<br />
NHS Management paid the ransom. It was at<br />
this time that Locke had been looking for a<br />
security solution that would give his teams<br />
the visibility into the network they needed to<br />
detect and respond more quickly to security<br />
incidents, such as ransomware.<br />
The company had been using several point<br />
security solutions, but, without a central<br />
point of management combined with lack<br />
of human resources, the logs piled up and<br />
going through them all was a difficult task.<br />
Locke chose to use AT&T Cybersecurity's<br />
Managed Threat Detection and Response<br />
service, instead of building out a dedicated<br />
in-house security operations centre (SOC);<br />
and so the company began its security-first<br />
journey.<br />
BUSINESS SUPPORT IS KEY<br />
Cole Two Bears, systems architect at NHS<br />
Management, expands further, noting that<br />
"business support of what is transpiring<br />
across the network is key, because you can<br />
only secure what you can see, so there has<br />
to be a strong focus on security from within<br />
the organisation". The deployment also had<br />
to be done in a way that didn't disrupt users'<br />
workloads - something that is very important<br />
in a healthcare setting.<br />
And while Locke is not a fan of outsourcing<br />
for outsourcing's sake, he also states: "In our<br />
case, with limited personnel resources, it<br />
made sense from a business perspective,<br />
but also financially, as the AT&T Managed<br />
Detection and Response service is less costly<br />
than having to hire several new skilled<br />
security team members."<br />
The pandemic has brought about many<br />
other challenges, as users have the strong<br />
expectation that they will have access to the<br />
data they need, regardless of their physical<br />
location. And they fully expect to be able to<br />
access it securely. "With more and more<br />
people working outside of your perimeter<br />
walls, you need to provide that line of<br />
communication is highly secure, and people<br />
can get to it all the time and make sure<br />
you're able to submit all the information that<br />
you need to the state government, national<br />
government and the like," says Locke.<br />
"With AT&T Managed Threat Detection and<br />
Response, I'm confident the ransomware<br />
issue we experienced previously wouldn't<br />
have happened," Two Bears concludes.<br />
"We've been delighted and impressed with<br />
the service, which allows our small security<br />
team the time to deliver on other important<br />
projects. Not having enough human capital<br />
is a problem many organisations face,<br />
making a managed security service an ideal<br />
option."<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
24
Computing<br />
Security<br />
Secure systems, secure data, secure people, secure business<br />
Product Review Service<br />
VENDORS – HAS YOUR SOLUTION BEEN<br />
REVIEWED BY COMPUTING SECURITY YET?<br />
The Computing Security review service has been praised by vendors and<br />
readers alike. Each solution is tested by an independent expert whose findings<br />
are published in the magazine along with a photo or screenshot.<br />
Hardware, software and services can all be reviewed.<br />
Many vendors organise a review to coincide with a new launch. However,<br />
please don’t feel that the service is reserved exclusively for new solutions.<br />
A review can also be a good way of introducing an established solution to<br />
a new audience. Are the readers of Computing Security as familiar with<br />
your solution(s) as you would like them to be?<br />
Contact Edward O’Connor on 01689 616000 or email<br />
edward.oconnor@btc.co.uk to make it happen.
email perils<br />
YOU'VE GOT EMAIL... BREACHES<br />
MISDIRECTED EMAILS HAVE BEEN IDENTIFIED AS THE UK'S TOP CAUSE OF REPORTED SECURITY INCIDENTS,<br />
LEADING TO 44% MORE INCIDENTS THAN PHISHING ATTACKS. BRIAN WALL REPORTS<br />
Steve Mulhearn, Fortinet: CISOs must<br />
educate their employees about common<br />
attacks.<br />
During the pandemic, email volumes<br />
have surged, with one-in-two IT<br />
leaders seeing an increase of over<br />
50%. Coupled with the finding that 70%<br />
of IT leaders surveyed reported that they<br />
felt sensitive data is at greater risk when<br />
employees are working from home, the<br />
pandemic has created a perfect storm for<br />
email data breaches.<br />
Will things be any better in <strong>2021</strong>, even as<br />
and when emerging vaccines enable us to<br />
get to grips with COVID-19? Has the virus<br />
actually served as a catalyst to ramp up<br />
attacks and will this simply continue, should<br />
the virus be brought under firm control?<br />
Ultimately, can we only ever expect a 'least<br />
worst case' with email and accept that we all<br />
must suffer some level of collateral damage?<br />
CORNERSTONE<br />
As <strong>Mar</strong>k Forrest, CEO, Cryptshare, comments,<br />
email is likely to remain the cornerstone of<br />
our communications for some time to come,<br />
for the simple reason that it is universal,<br />
effective and cheap. "There are a plethora of<br />
point solutions for encrypting, scanning,<br />
blocking, authenticating and protecting<br />
against email-born threats. But, in the end,<br />
we need to solve the puzzle of having all of<br />
these things at a price that our very much<br />
under-pressure budgets demand,” he states.<br />
"Breadth and cost effectiveness have come<br />
into sharp focus during the pandemic where<br />
the promises of the biggest enterprise<br />
software vendors are being found wanting.<br />
This is not a time to drop your defences,"<br />
he cautions, "but there are cost-effective<br />
choices."<br />
With the trend towards a remote<br />
workforce continuing this year, the need to<br />
keep the remote workforce secure will<br />
continue, says Dean Coclin, senior director of<br />
business development at DigiCert. "With<br />
regard to emails, providing tools to warn<br />
users of emails originating outside the<br />
organisation, capabilities to encrypt email<br />
and keeping email safe on mobile devices will<br />
continue to be essential. VPN use will expand<br />
as organisations see the security benefit."<br />
With information about the pandemic<br />
constantly being sought, hackers look to<br />
entice people to click on email links<br />
associated with COVID cures, virus testing<br />
sites and similar topics. "These links can lead<br />
to malicious sites, defective equipment (ie,<br />
PPE) and phishing sites to get login/password<br />
information," he adds. "Cybercriminals will<br />
use whatever hot topic, be it the virus or<br />
something else, to steal credentials from<br />
unsuspecting users."<br />
That said, organisations have become more<br />
adept at increasing their email security, Coclin<br />
points out. "Technologies such as DMARC,<br />
which prevent unauthorised individuals from<br />
sending emails using the company domain,<br />
are becoming more popular. Also, digital<br />
certificates to sign and encrypt email are<br />
being increasingly rolled out at companies,<br />
large and small. The CA/Browser Forum is<br />
currently working on new standards for<br />
email certificates, which are expected to be<br />
released this year. All of these improvements<br />
will help minimise 'collateral damage' and<br />
improve email security for all."<br />
MISDIRECTED MISSIVES<br />
Misdirected emails cause the most incidents<br />
and are, according to Egress CEO Tony<br />
Pepper, "a revolving door" for data breaches,<br />
especially with many organisations moving<br />
26<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
email perils<br />
to long-term remote working and email<br />
becoming an even more vital tool for sharing<br />
business information, particularly sensitive<br />
data. "In fact, our recent Outbound Email<br />
Security Report revealed that 94% of<br />
organisations have seen increased volumes<br />
in outbound email and one-in-two saw<br />
growth of over 50%. With this surge in<br />
email volumes came an increase in the<br />
surface area for risk."<br />
It means people are also more likely to<br />
make errors. "Remote working has created<br />
a challenging environment for many<br />
employees, with a myriad of distractions<br />
present - from providing childcare to<br />
answering the door for deliveries. These<br />
distractions easily lead to employees making<br />
mistakes, such as sending an email to the<br />
wrong person. It's no surprise, then, that<br />
80% of organisations reported data being<br />
put at risk for a reason as simple as the<br />
wrong recipient being added to an email."<br />
STRESS LEVELS SOAR<br />
Employees are also experiencing higher levels<br />
of stress, with the line between work and<br />
home life more blurred than before,"<br />
continues Pepper. "Our research found<br />
that almost 40% serious email data breach<br />
incidents were caused by tired and stressed<br />
employees."<br />
With some 70% of IT leaders believing<br />
that sensitive data is at greater risk when<br />
employees are working remotely, heightened<br />
insider risk will be an issue for organisations<br />
in the long term, he comments. "If 2020<br />
has taught us anything, it's the importance<br />
of securing the individuals within our<br />
organisation's human layer, so they can work<br />
effectively and productively - particularly<br />
when using email.<br />
“With a combination of the intelligent<br />
technology and robust security training,<br />
organisations can keep their data safe, even<br />
in this period of heightened insider risk,"<br />
Pepper concludes.<br />
One of the biggest vulnerabilities that has<br />
presented itself since the increase in remote<br />
working patterns is the advancement of<br />
social engineering tactics," comments<br />
Steve Mulhearn, director of enhanced<br />
technologies, Fortinet. "Unscrupulous actors<br />
are leveraging important contextual<br />
information about users, including daily<br />
routines, habits, or financial information and<br />
the chaos of email is the easiest place to slip<br />
by unnoticed."<br />
The most common security breach<br />
experienced by UK businesses in 2020<br />
according to GOV UK , were phishing<br />
attacks, with 86% of businesses falling<br />
foul of fraudulent emails and redirects to<br />
fraudulent websites, he adds. "To combat<br />
this risk, CISOs must educate their employees<br />
about common attacks that could appear<br />
in the form of phishing, spear phishing,<br />
smishing or various other tech support<br />
scams." The simple tap of the shoulder in<br />
offices of old has drifted away, and now<br />
employees are left to the confinement of the<br />
four walls of their home office and inbox,<br />
rues Mulhearn. "However, the home office<br />
should remain purely an extension of the<br />
corporate security policy, and employee and<br />
company cyber behaviour should stay the<br />
same. One way of implementing this is<br />
through a Zero Trust Network Access (ZTNA)<br />
model and ensuring flexibility is increased<br />
without the increase in risk. If malware is<br />
installed, then isolation and data access<br />
restriction to remediate is critical, and<br />
Endpoint Detection and Response (EDR)<br />
systems play a crucial part in this process."<br />
He emphasises that, through cyber<br />
awareness training and instilling the correct<br />
habits, such as email best practice, you can<br />
create a culture of security, relieving pressure<br />
on the security team and allowing a 'human<br />
firewall' to be built around the business. "If<br />
the awareness of threats is combined with<br />
habit, every individual within the business will<br />
be able to take greater care of their own<br />
cyber brick within the wall."<br />
Tony Pepper, Egress CEO: Misdirected<br />
emails are a revolving door for data<br />
breaches.<br />
Dean Coclin, DigiCert: VPN use will<br />
expand as organisations see the security<br />
benefit.<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
27
iometrics<br />
CHANGE IS ON THE CARDS<br />
EVER WONDERED WHETHER WORKPLACE SECURITY, NO MATTER WHERE YOU ARE,<br />
MIGHT BE POSSIBLE? PERHAPS BIOMETRI<strong>CS</strong> COULD OFFER A WAY FORWARD<br />
regulated and more susceptible to attack."<br />
To minimise crime and financial losses,<br />
enterprises need more control over who can<br />
access their buildings, or offices - wherever<br />
they might be - and access to their servers<br />
and digital data, she advises.<br />
"With biometrics gathering momentum<br />
beyond smartphones, it can offer more<br />
secure and convenient authentication across<br />
the workplace that could be at the office, at<br />
home or even at a café."<br />
WHY BIOMETRI<strong>CS</strong>?<br />
Biometric access cards can be thought of<br />
as a modern-day key that combines access<br />
with a multiuse, such as an ID badge.<br />
Each access card is linked to one specific<br />
cardholder, who registers their fingerprint<br />
on the card. When entering a building or<br />
office, or logging into any system, the card's<br />
biometrics must match the person using<br />
the card, ensuring that only authorised<br />
employees gain access.<br />
Traditional security measures no longer<br />
align with modern needs. Passwords,<br />
for example, are easily hacked and<br />
carry the risk of serious data breaches.<br />
Moreover, employees have to remember<br />
an array of different codes across devices<br />
and accounts, leading not only to reuse<br />
and frustration, but costing enterprise IT<br />
department millions a month in resetting<br />
forgotten passwords.<br />
Unsurprisingly, then, the demand for more<br />
secure and seamless access methods has<br />
been rising. One 2019 Gartner study<br />
predicted that 60% of large and global<br />
enterprises, along with 90% of mid-size<br />
enterprises, will implement passwordless<br />
authentication methods in over half of use<br />
cases by 2022.<br />
"This year has put even more pressure on<br />
the need for increased workplace security,<br />
as well as convenience for the employees,"<br />
says <strong>Mar</strong>ia Pihlström at Fingerprints.<br />
"Although flexible working was already<br />
a growing trend, it has accelerated<br />
significantly in the light of the pandemic<br />
and remote working mandates, increasing<br />
the average cost of a workplace data breach<br />
by $137,000*. In addition, employees<br />
have started working more flexible hours<br />
on-premises, making building access less<br />
"Since unique biological traits are<br />
extremely difficult to steal and spoof,<br />
biometric access cards are more secure<br />
than traditional access cards and fobs<br />
that require PINs, or no additional<br />
authentication," states Pihlström.<br />
"Compared to existing solutions, the<br />
technology is also more convenient.<br />
You can't forget your fingerprint, after all,<br />
not to mention there's the possibility to<br />
streamline authentication across the<br />
workplace. And if it gets lost or stolen,<br />
no one else can use it. There's no need to<br />
tap or touch a shared PIN pad or reader<br />
either, as the card is contactless.<br />
"These benefits are often far simpler to<br />
28<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
iometrics<br />
realise than many enterprises imagine.<br />
Biometric cards can be integrated into<br />
existing infrastructure across offices,<br />
enabling improved workplace security that<br />
is convenient for both employers and their<br />
employees. And because the biometric data<br />
is stored and processed on the card, privacy<br />
is guaranteed for employees, while<br />
organisations don't have the cost,<br />
complexity and compliance headaches<br />
associated with managing biometric<br />
databases," she points out.<br />
ADDING SECURITY AND CONVENIENCE<br />
Use cases for biometric access cards are<br />
numerous. "Besides unlocking doors, the<br />
cards can also be used for any other new or<br />
existing authentication access point across<br />
the workplace, such as logging into work<br />
computers or digital files, accessing time<br />
and attendance systems, and resetting<br />
alarm systems. The benefits of increased<br />
and more convenient security reach far<br />
beyond keeping burglars out." From<br />
preventing industry espionage to managing<br />
personnel in vital industries, she offers three<br />
examples where biometric access cards can<br />
add security where it matters.<br />
"In healthcare, whether for certain<br />
wards, drugs cabinets or operation rooms,<br />
protected access is crucial. Moreover, with<br />
two-factor authentication already in place<br />
for many access points or to review patient<br />
data, traditional methods can add time<br />
pressure to often busy workdays.<br />
Combining security and convenience,<br />
biometric cards can strengthen access<br />
control systems, while removing a point of<br />
friction for many healthcare professionals.<br />
The UK's NHS is just one example that's<br />
recently announced it's investing £40 million<br />
in implementing biometrics to remedy staff<br />
stress and frustration with the legacy IT<br />
system access process.**<br />
In a pharmacy setting, biometric access<br />
cards can also ensure that only qualified<br />
employees have access to certain<br />
medications. "Similarly, it can conveniently<br />
unlock the issuance of medicine in digital<br />
systems for permitted staff and allow them<br />
- and only them - to review and update<br />
the personal health information of their<br />
patients," she adds.<br />
KEEPING CORPORATE SECRETS<br />
Corporations and enterprises hold many<br />
highly sensitive files that, if stolen or<br />
otherwise compromised, could damage<br />
the company or individuals. From legal<br />
offices to accountancy firms, biometric<br />
access cards could not only keep offices<br />
highly secure, but also lock devices and<br />
certain files on a company's system. "By<br />
locking digital files with biometrics, only<br />
employees working on a particular project<br />
would have access to the information,<br />
ensuring that confidential information is<br />
no longer at the mercy of easily hacked<br />
passwords. And when files do disappear<br />
or fall into the wrong hands, a meticulous<br />
record showing who last had access to the<br />
office or information can facilitate a<br />
smoother investigation of the data<br />
breach."<br />
Labs and R&D departments are often<br />
subject to industry espionage. In this type<br />
of workplace, biometric access cards can<br />
ensure sensitive information stays under<br />
lock and (digital) key. "But ideas are not the<br />
only thing kept safe by the cards. Because<br />
labs can contain dangerous materials,<br />
substances and machinery, controlled<br />
access is even more important. Biometrics<br />
can enable more controlled and secure<br />
access, ensuring hazardous premises are<br />
only accessible to trained and authorised<br />
personnel. Research departments are<br />
also often sensitive and sterile test<br />
environments, and require meticulous<br />
logs of who has entered an area or<br />
operated a machine. Biometric security<br />
systems can reduce errors in attendance<br />
logging, creating more predictable test<br />
environments and, ultimately, facilitating<br />
more accurate test results."<br />
<strong>Mar</strong>ia Pihlström, Fingerprints: remote<br />
working has made building access less<br />
regulated and more susceptible to attack.<br />
Hacked and forgotten passwords cost IT<br />
departments millions a year, while lost keys<br />
and forgotten passwords are a number one<br />
frustration for many employees. Biometric<br />
access cards can provide a more convenient<br />
and secure authentication solution for both<br />
physical and logical access control, offering<br />
a solution to security breaches and the need<br />
to remember multiple strong passwords.<br />
"But the technology can go beyond just<br />
cost savings for IT teams and reducing daily<br />
annoyances," Pihlström points out. "By<br />
offering improved security in high-stake<br />
industries, biometrics can ensure that<br />
medication is authorised by the right<br />
person, compromising information is kept<br />
confidential, and inventors keep control<br />
of their intellectual property. In this way,<br />
biometric access cards bring a whole new<br />
dimension to worriless workdays, unlocking<br />
a modern workplace security system that<br />
adds convenient security where it truly<br />
matters," she concludes.<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
29
cyber refocus<br />
CYBER STRATEGY HITS CRITICAL POINT<br />
CYBER SECURITY HAS NEVER HAD MORE RELEVANCE, WHEN SET AGAINST A BURGEONING BACKDROP<br />
OF CHALLENGES THAT WILL UNDOUBTEDLY CONTINUE TO VEX ORGANISATIONS IN THE YEAR AHEAD<br />
Daisy McCartney, PwC: security teams<br />
need a mix of soft and technical skills,<br />
coupled with business knowledge.<br />
The increasing sophistication of cyber<br />
criminals, coupled with the rapid shift<br />
to digital technologies brought about<br />
by the coronavirus (COVID-19) pandemic,<br />
has emphasised cyber security's importance<br />
for both individual organisations and<br />
wider society. Amidst this backdrop, the<br />
professional services network firm PwC has<br />
launched its latest insights into what's<br />
changing and what's next in cyber security.<br />
The findings are based on a survey of 3,249<br />
business and technology executives from<br />
around the world, including 265 in the UK.<br />
An overwhelming 96% of UK respondents<br />
said that they will shift their cyber security<br />
strategy, due to COVID-19, with half now<br />
saying they are more likely to consider<br />
cyber security in every business decision. In<br />
addition, a third of UK respondents (34%)<br />
plan to accelerate their digitalisation plans,<br />
on account of COVID-19.<br />
When asked what they saw as being the<br />
most likely cyber events to impact their<br />
industry over the next 12 months, 58% of<br />
UK respondents cited an attack on cloud<br />
services, followed by a disruptionware<br />
attack on critical business services (52%)<br />
and a ransomware attack (50%).<br />
At a global level, PwC's research showed<br />
that the strategic focus on cyber security<br />
will lead to a more prominent role for the<br />
chief information security officer (CISO).<br />
Two-fifths (43%) of global respondents<br />
agree that there will be more frequent<br />
interactions between the CISO and CEO<br />
or board, but this falls to 34% in the UK.<br />
This shows that more needs to be done to<br />
elevate cyber security conversations to UK<br />
boardrooms, says PwC, and this could be<br />
achieved by better aligning cyber risk to<br />
business strategy.<br />
LOW CONFIDENCE<br />
The research found that a majority of<br />
organisations lack confidence in their cyber<br />
spend. Just 38% of UK respondents are very<br />
confident their cyber budget is allocated to<br />
the most significant cyber risks, compared<br />
to 44% globally. Similarly, only 36% of UK<br />
respondents are very confident that they<br />
are getting the best return on their cyber<br />
spend versus 42% globally. Despite this lack<br />
of confidence, 56% of UK respondents are<br />
planning to increase their cyber budgets in<br />
<strong>2021</strong>.<br />
Richard Horne, cyber security chair, PwC,<br />
comments: "It's surprising that so many<br />
organisations lack confidence in their cyber<br />
security spend. It shows businesses need<br />
to improve their understanding of cyber<br />
threats and the vulnerabilities they exploit,<br />
while changing the way they think about<br />
cyber risk, so it becomes an intrinsic part of<br />
every business decision."<br />
When asked whether they would be<br />
expanding their cyber security teams in<br />
2020, 42% of UK respondents said they<br />
plan to increase their headcount, compared<br />
to 51% globally. However, the research also<br />
found that more than a fifth (22%) of UK<br />
organisations are planning to decrease the<br />
size of their cyber security team, compared<br />
to 16% globally.<br />
New hires in the UK are expected to<br />
possess more than just technical<br />
knowledge. When asked which cyber<br />
30<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
cyber refocus<br />
security skills were most in demand, UK<br />
respondents cited security intelligence<br />
(46%) and the ability to work with cloud<br />
solutions (40%) as the most important<br />
skills for new employees, closely followed<br />
by communication (38%), project<br />
management (38%) and analytical skills<br />
(37%). This reflects the evolution of the<br />
industry, states PwC, with cyber teams now<br />
required to work collaboratively with the<br />
rest of the business to develop a strategic,<br />
analytical approach to cyber security.<br />
Daisy McCartney, cyber security culture<br />
and behaviour lead at PwC, argues that, as<br />
cyber security becomes a strategic priority,<br />
organisations should be hiring talent from<br />
more diverse backgrounds. "Security teams<br />
need a mix of soft and technical skills,<br />
coupled with business knowledge - this<br />
helps improve collaboration with senior<br />
leaders and ensures that cyber security<br />
decisions support the organisation's<br />
strategic goals."<br />
SPOTTED AND BLOCKED<br />
Meanwhile, cyber attacks may soon be<br />
spotted and blocked before they even have<br />
a chance to wreak havoc in organisations'<br />
operations, according to cyber security firm<br />
BlackDice, which is developing the machine<br />
learning and predictive analytics designed<br />
to forecast and protect against cyber<br />
attacks, following a £100,000 grant from<br />
Innovate UK, the UK's innovation agency's<br />
Sustainable Innovation Fund. The objective<br />
is to help all UK sectors rebuild after the<br />
effects of COVID-19. BlackDice applied for<br />
the grant on 1 September 2020 and will<br />
use the funding to develop machine<br />
learning in predictive analytics, allowing the<br />
technology to forecast cyber-attacks before<br />
they happen. Telecom operators will have<br />
the ability to watch attack scenarios to<br />
help them understand external activity,<br />
which is a key indicator of the internet and<br />
behaviour data from BlackDice's device<br />
network.<br />
Innovate UK will be investing up to £191<br />
million to fund single and collaborative<br />
research and development projects through<br />
its Sustainable Innovation Fund over the<br />
next two years. The programme will fund<br />
1,103 projects, 1,189 businesses, with a<br />
total of more than £130 million in support<br />
for the UK.<br />
"These funds feed directly into BlackDice's<br />
<strong>2021</strong> plans for software development," says<br />
Paul Hague, CEO of BlackDice. "The funds<br />
will help to provide state-of-the-art<br />
preventive vaccine technology, which<br />
helps to protect devices and networks<br />
from the rising threat of cyber-attacks.<br />
2020 has been a challenging year for<br />
telecommunication operators, and this<br />
grant shows the importance of cyber<br />
security solutions and how they can keep<br />
customers' data safe from harm."<br />
Richard Horne, PwC: surprising so many<br />
organisations lack confidence in their<br />
cyber security spend.<br />
Paul Hague, BlackDice: aim is to protect<br />
devices and networks from rising threat<br />
of cyber-attacks.<br />
COVID-19 DRIVES NEW THINKING<br />
In a wide-ranging PwC survey of UK executives, 96% say they have shifted their<br />
cyber security strategy, due to COVID-19:<br />
34% state that they are accelerating digitisation<br />
Only 38% are very confident their cyber budget is allocated to the most<br />
significant cyber risks<br />
42% plan to increase cyber team headcount.<br />
However, the UK responses lag somewhere behind global findings in a number of<br />
key areas, states PwC, such as the importance of the CISO role, return on cyber<br />
spend and headcount.<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />
<strong>Mar</strong>ch <strong>2021</strong> computing security<br />
31
2020 <strong>CS</strong> Awards<br />
Computing Security Awards 2020<br />
EXCELLENCE SHINES THROUGH<br />
It may not have been possible to gather together in the usual way to celebrate the 2020 Computing Security Awards, but even the virus<br />
couldn't prevent them from going ahead.<br />
Remote they might have been, with master of ceremonies Chris Cowdrey and editor Brian Wall (both dressed in full regalia!) revealing<br />
the winners by video link, but the tingle of excitement as the top performers were announced across the various categories was still<br />
unmistakable.<br />
And although it wasn't possible on this occasion to actually see the bottles of champagne being opened as the celebrations began, you<br />
could still almost hear the corks being popped, as victorious company upon company, individual after individual, showed exactly why our<br />
industry is right at the top of its game.<br />
To see who won what - and to soak up the atmosphere of what was, despite everything, still a truly gala occasion - check out all of the<br />
victors and runners-up on the following pages. And to see the awards ceremony itself in full, go to: https://youtu.be/bLmvHafBiLg<br />
32<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
2020 <strong>CS</strong> Awards<br />
Email Security Solution of the Year<br />
WINNER: Libraesva - Email Security Gateway<br />
RUNNER-UP: VIPRE Security - VIPRE Email Security ATP<br />
"We would like to thank not only our staff who have dedicated their time to making Libraesva the best solution on the market, but also<br />
our partners and customers across the globe who continue to work closely alongside us and voted for Libraesva in the awards! We have<br />
ambitious plans for <strong>2021</strong> and we cannot wait to share these with you throughout the year." - Paolo Frizzi, CEO Libraesva.<br />
Anti-Malware Solution of the Year<br />
WINNER: VIPRE Security - VIPRE Endpoint Security<br />
RUNNER-UP: Malwarebytes - Malwarebytes<br />
"We believe very strongly in our Endpoint Security Cloud service and the powerful protection it provides against modern-day threats. But<br />
to be voted Anti-Malware Solution of the year means that our customers and partners love it as much as we do. It is such fantastic<br />
feedback and proof of the quality of the product – thank you so much to everyone who voted!" - Yvonne Conway, <strong>Mar</strong>keting Manager<br />
UK and Ireland<br />
Incident Response & Investigation Security Service Provider of the Year<br />
WINNER: AT&T Cybersecurity<br />
RUNNER-UP: Cyjax<br />
“With every second counting after a cyberattack, quick action to investigate and remediate an incident is critical for minimising impact.<br />
In these stressful situations, organisations need a trusted advisor to help guide them to successful containment and recovery. We are<br />
honoured to be receiving recognition from Computing Security Magazine for our Incident Response and Forensics Service.” - Bindu<br />
Sundaresan, Director, AT&T Cybersecurity<br />
Network Security Solution of the Year<br />
WINNER: Neustar - UltraThreat Feeds<br />
RUNNER-UP: Endace - Endace Probe<br />
We are very proud to have won three separate awards at these prestigious Computing Security Awards. Demonstrating the depth and<br />
value of our security offerings, Neustar was recognised with awards in three different categories:<br />
Network Security Solution of the Year: Neustar UltraThreat Feeds Web Application Firewall of the Year: Neustar UltraWAF<br />
One to Watch Security Product: Neustar UltraGeoPoint<br />
We are honoured to have earned these three awards from such a respected and important publication.<br />
For more information, contact security@team.neustar, or call us at 1-855-898-0036 in the US and +44 1784 448444 in the UK.<br />
www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />
@<strong>CS</strong>MagAndAwards<br />
33
2020 <strong>CS</strong> Awards<br />
Encryption Solution of the Year<br />
WINNER: Cryptshare AG - Cryptshare<br />
RUNNER-UP: Egress - Egress Intelligent Email Security<br />
"Competitions such as this are important, as they help to blow the smoke of often false vendor claims away and expose the deeper<br />
reality of the value of a few well-engineered products above a mass of ‘me too’ products. We were delighted to win this award and can<br />
I thank the many customers who voted for us. We spend huge efforts to understand the issues in the market, and design and build the<br />
best software to solve those problems. We are growing fast by direct customer references and, in the end, anybody can try our software,<br />
prove the value for themselves and, in due course, gain the confidence of great security at a fair cost. Don't be shy, try Cryptshare soon<br />
and make it part of your recovery plans!" - Cryptshare CEO <strong>Mar</strong>k Forrest<br />
Advanced Persistent Threat (APT) Solution of the Year<br />
WINNER: Heimdal Security - Thor Foresight RUNNER-UP: SonicWall - RTDMI (Real Time Deep Memory Inspection)<br />
Through its traffic filtering capability, Heimdal stops ransomware attacks at all stages: before, during and after the attack. Heimdal<br />
combines automatic software updates with powerful Traffic Scanning for effective security against exploits kits. Using its unique<br />
intelligence, Heimdal blocks malicious connections that try to harvest and steal your confidential financial information.<br />
DLP Solution of the Year<br />
WINNER: Kingston Technology Group Co LLP - DTVP30<br />
RUNNER-UP: CoSoSys - Endpoint Protector<br />
"We are honoured to be awarded with the DLP Solution of the Year. Our DT Vault Privacy 3.0 provides an affordable business-grade<br />
security USB drive with 256-bit AES hardware-based encryption that protects data and enforces complex password protection to prevent<br />
unauthorised access. The drive locks down and reformats after 10 intrusion attempts, so it is an ideal solution in this new working-fromhome<br />
environment to prevent data loss wherever you are working from."<br />
Compliance Award - Security<br />
WINNER: Metacompliance<br />
RUNNER-UP: ADISA<br />
"We were thrilled to win the Compliance Security Award at the Network Computing Security Awards 2020. It's testament to the strength<br />
of our innovative products and our unique ability to offer Cyber Security and privacy solutions from a unified platform. Thank you so<br />
much to everyone that took the time to vote for us." - Robert O'Brien, CEO MetaCompliance.<br />
AI and Machine learning-based Security Solution of the Year<br />
WINNER: SonicWall - RTDMI (Real Time Deep Memory Inspection)<br />
RUNNER-UP: VIPRE - Email Security Attachment Threat Protection<br />
"SonicWall was honoured to be named the winner in the ‘AI and Machine Learning-based Security Solution of the Year’ Award at the<br />
Computing Security Awards for its patent-pending Real-Time Deep Memory Inspection (RTDMI). RTDMI technology enables SonicWall<br />
Capture Advanced Threat Protection (ATP) to catch more malware faster than behaviour-based sandboxing methods, with a lower false<br />
positive rate." - Will Benton, Regional Sales Director North EMEA, SonicWall<br />
Identity and Access Management Solution of the Year<br />
WINNER: SecurEnvoy - SecurEnvoy SecureIdentity IAM<br />
RUNNER-UP: My1Login - My1Login Enterprise IAM<br />
"SecurEnvoy is delighted to have won Identity and Access Management Solution of the Year. For almost 20 years, we have been a leader<br />
in designing innovative security solutions and to be recognised for this by our customers shows we have continued to be a point of trust<br />
and expertise. A huge thank you to all who voted, and to the incredible SecurEnvoy team. - Adam Bruce, Chief Revenue Officer/CRO<br />
34<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
2020 <strong>CS</strong> Awards<br />
Anti Phishing Solution of the Year<br />
WINNER: Libraesva - Email Security Gateway<br />
RUNNER-UP: Metacompliance - MetaPhish<br />
"We would like to thank not only our staff who have dedicated their time to making Libraesva the best solution on the market, but also<br />
our partners and customers across the globe who continue to work closely alongside us and voted for Libraesva in the awards! We have<br />
ambitious plans for <strong>2021</strong> and we cannot wait to share these with you throughout the year." - Paolo Frizzi, CEO Libraesva.<br />
Secure Data & Asset Disposal Company of the Year<br />
WINNER: Computer Disposals Limited<br />
RUNNER-UP: Sims Lifecycle Services<br />
“Winning this award for ‘Secure Data & Asset Disposal Company of the Year’ is a fantastic accolade for CDL. It’s been a tough year for all<br />
businesses across the UK, but to be recognised as the industry leaders in this field is a real compliment to the dedication the staff have<br />
shown in getting us where we are today. “ - Ben Griffin, Sales and <strong>Mar</strong>keting Director, Computer Disposals Ltd<br />
Cloud-Delivered Security Solution of the Year<br />
WINNER: Edgescan - Edgescan<br />
RUNNER-UP: SonicWall - NSv Series<br />
"We are delighted to have been awarded ‘Cloud-Delivered Security Solution of the Year’ 2020, our first time winning this award. This<br />
award stands to the hard work our team has put into creating and delivering an award-winning vulnerability management platform that<br />
is delivered on the cloud. - Eoin Keary CEO<br />
New Cloud-Delivered Security Solution of the Year<br />
WINNER: Check Point - CloudGuard<br />
RUNNER-UP: Redsift - OnDMARC<br />
"It's particularly gratifying to receive the Computing Security award, as it is voted for by partners and end users in the IT and cybersecurity<br />
communities. Cloud security is challenging and the biggest challenge is unifying security across multiple clouds, as analysts agree<br />
that over 80% of organisations use two or more cloud providers. Check Point CloudGuard solves this problem, giving organisations the<br />
most advanced and agile cloud-native security, together with holistic visibility and automated management, and enforcement of security<br />
policies across their cloud estates." - Andy Wright, regional director for Northern Europe at Check Point Software Technologies<br />
Mobile Security Solution of the Year<br />
WINNER: Wandera - Wandera Security Suite<br />
RUNNER-UP: Lookout - Lookout<br />
"Now, more than ever, it's clear that secure remote access is imperative for organisations across industries. Being recognised in the<br />
Computing Security Awards is a testament to the work we have done in modernising secure remote access, so our customers have the<br />
technology they need to seamlessly and securely keep their employees connected, no matter where they are and what device they are<br />
using. We're looking forward to meeting the challenges of <strong>2021</strong> head on, as we work to make a secure and productive borderless<br />
enterprise easily attainable." - Eldar Tuvey, CEO and Founder of Wandera<br />
Penetration Testing Solution of the Year<br />
WINNER: Edgescan - Edgescan<br />
RUNNER-UP: Redscan - Redscan Penetration Testing<br />
"We are delighted to have been awarded Pen Testing Solutions of the year 2020 for a second year in a row. It highlights the amount of<br />
work and time we put into our pen test solutions and to our team that delivers the results." - Rahim Jina COO<br />
www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />
@<strong>CS</strong>MagAndAwards<br />
35
2020 <strong>CS</strong> Awards<br />
Remote Monitoring Security Solution of the Year<br />
WINNER: Wallix - Wallix Bastion<br />
RUNNER-UP: Redscan - ThreatDetect<br />
"With the win of the ‘Remote Monitoring Security Solution of the Year’ award for the WALLIX Bastion by Computing Security Magazine,<br />
WALLIX confirmed another market recognition as European specialist in Identity and Access Security Solutions. WALLIX's unified<br />
solutions portfolio enables companies to detect and be resilient to cyberattacks. They also ensure compliance with regulatory<br />
requirements regarding access to IT infrastructures and critical data. More than 1,200 organisations from the public and private sectors<br />
have chosen WALLIX to secure their digital transformation. To find out how WALLIX can help you regain control of your data anytime,<br />
anywhere, visit www.wallix.com."<br />
New Security Software Solution of the Year<br />
WINNER: Rohde & Schwarz Cybersecurity - R&S Trusted VPN Client<br />
RUNNER-UP: SecurEnvoy - SecurEnvoy Data Discovery Essentials<br />
R&S®Trusted VPN Client wins category "New Security Software Solution of the Year"<br />
R&S®Trusted VPN Client is a software-based VPN client enabling users to work in a secure and encrypted mobile environment while complying<br />
with the high security requirements of federal authorities. The solution protects the network communication of a client platform (Windows laptop<br />
or tablet) with a government or corporate network over an untrusted network such as the internet. The Federal Office for Information Security has<br />
granted approval up to classification level VS-NfD (RESTRICTED), NATO RESTRICTED and EU RESTRICTED for the new, software-only R&S®Trusted<br />
VPN Client. - Daniel Heck, Vice President <strong>Mar</strong>keting, Rohde & Schwarz Cybersecurity<br />
Security Education and Training Provider of the Year<br />
WINNER: KnowBe4<br />
RUNNER-UP: Metacompliance<br />
"Winning several industry-recognised awards in the UK is a great honor for our organisation. One of our main goals is to provide<br />
always fresh security awareness training content and simulated phishing templates to keep up with the evolving cybersecurity threat<br />
landscape. Being recognised in this awards programmes in the UK as training provider of the year speaks volumes to the quality of<br />
our training.” - Malik, security awareness advocate - KnowBe4<br />
Web Application Firewall of the Year<br />
WINNER: Neustar - Neustar Ultra WAF<br />
RUNNER-UP: F5 Networks - Silverline WAF<br />
"We are very proud to have won three separate awards at the prestigious Computing Security Awards. Demonstrating the depth and<br />
value of our security offerings, Neustar was recognised with awards in three different categories:<br />
Network Security Solution of the Year: Neustar UltraThreat Feeds Web Application Firewall of the Year: Neustar UltraWAF<br />
One to Watch Security Product: Neustar UltraGeoPoint<br />
We are honoured to have earned these three awards from such a respected and important publication."<br />
For more information, contact security@team.neustar, or call us at 1-855-898-0036 in the US and +44 1784 448444 in the UK.<br />
Threat Intelligence Award<br />
WINNER: Cyjax<br />
RUNNER-UP: Webroot<br />
"Cyjax is delighted to receive this award. In 2020, we had to innovate to reach our existing users and potential customers. We made much of<br />
our high-quality research available to the public and not-for-profit organisations focused on protecting our digital economy. We appreciate the<br />
votes of support from the information security community and our customers in the Finance, Pharmaceuticals and Public Services sectors who<br />
believe threat intelligence is a key component in protecting against the ravages of cybercrime. We would like to thank you once again for this<br />
award and wish all your readers a prosperous <strong>2021</strong>." - Kevin McMahon, Cyjax CEO and Founder<br />
Security Reseller of the Year<br />
WINNER: Brookcourt Solutions<br />
RUNNER-UP: NGS<br />
"We are absolutely thrilled to have been recognised as ‘Security Reseller of the Year’. We strive to deliver innovative and effective cyber<br />
security solutions to our customers, and to have won this prestigious award shows that we implement the right partnerships and<br />
approach to meet customer needs, even during challenging times."<br />
36<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
2020 <strong>CS</strong> Awards<br />
Security Distributor of the Year<br />
WINNER: Nuvias<br />
RUNNER-UP: Brigantia Partners<br />
The Nuvias Group is the fast-growing European next-generation distributor, with a broad range of innovative services and solutions<br />
designed to secure customer success, and accelerate partner and vendor growth. In collaboration with leading technology suppliers, we<br />
specialise in providing security, agility and manageability for clients, networks and cloud technology solutions through an ecosystem of<br />
highly skilled channel partners.<br />
Enterprise Security Solution of the Year<br />
WINNER: Rohde & Schwarz Cybersecurity - R&S Trusted Gate<br />
RUNNER-UP: F5 Networks - Silverline WAF<br />
R&S®Trusted Gate wins category ‘Enterprise Security Solution of the Year’.<br />
"R&S®Trusted Gate is a Cloud Data Protection Gateway which uses a data-centric approach to let you keep full control of your data on<br />
any kind of infrastructure. It can be deployed on-premises, in the cloud or in hybrid mode. As a server-based solution, there is no need<br />
for additional software on the client side." - Daniel Heck, Vice President <strong>Mar</strong>keting, Rohde & Schwarz Cybersecurity<br />
SME Security Solution of the Year<br />
WINNER: Redscan - ThreatDetect<br />
RUNNER-UP: Titania - PAWS<br />
"It’s always pleasing to receive industry recognition, but it’s particularly satisfying when it is the votes of our customers and partners that<br />
helped us secure an award. To win an award for a fifth successive year is a proud moment for the team, especially in such a challenging<br />
year. We’re committed to maintaining our high standards and protecting organisations through these difficult times by improving our<br />
services year-on-year." - Simon Monahan, Redscan Director of Product <strong>Mar</strong>keting.<br />
Contribution to CyberSecurity Award - Person<br />
WINNER: David Calder of Adarma<br />
RUNNER-UP: Stu Sjouwerman of KnowBe4<br />
"I’m very proud, thankful and humbled to have received the Computing Security ‘Contribution to CyberSecurity - Person’ Award. I’ve<br />
been lucky enough to work in the security industry since the late nineties and I still love it today.<br />
We formed Adarma to make the world a safer place for our customers - and, in turn, safer for their customers. We wanted to help<br />
create the next generation of security leaders, and to build a sustainable and ethical business. This gives me energy every day.<br />
I’m incredibly touched to win the award for doing what I love. Thank you to everyone. - David Calder, Chief Product Officer<br />
Customer Service Award - Security<br />
WINNER: Titania Ltd<br />
RUNNER-UP: Brookcourt Solutions<br />
"We were thrilled to be crowned the winner of the Customer Service Award. In a year where concerns around Cyber Security have come<br />
to the forefront, due to remote working becoming the norm, increased online spending and threats to the healthcare sector, we<br />
appreciate how vital our software is to organisations worldwide. Our team has proactively continued to support our customers during<br />
this challenging time, helping them to accurately identify vulnerabilities to their organisation and improve cyber hygiene to ensure<br />
essential business operations can continue." - Kirsty Fisher, Chief Financial Officer, Titania.<br />
Security Service Provider of the Year<br />
WINNER: Brookcourt Solutions<br />
RUNNER-UP: AT&T Cybersecurity<br />
"We truly believe in giving a consistently excellent service to our customers and it is crucial to our company values. Winning this<br />
significant award that links to service is an achievement we are extremely proud of. Thank you to all our customers that voted for us."<br />
www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />
@<strong>CS</strong>MagAndAwards<br />
37
2020 <strong>CS</strong> Awards<br />
Security Project of the Year - Public Sector<br />
WINNER: Egress and Haringey Council<br />
"We're delighted to win this award with our customer, London Borough of Haringey. At Egress, we pride ourselves on delivering<br />
maximum value for all our customers - particularly when helping them to drive business efficiency while keeping highly sensitive data<br />
safe. It is brilliant to see the industry recognising the fantastic work carried out between the London Borough of Haringey and Egress to<br />
support digital communication and an entirely new way of operating during the COVID-19 pandemic." - <strong>Mar</strong>k Lendon, SVP of Sales<br />
at Egress<br />
Security Project of the Year - Private Sector<br />
WINNER: KnowBe4 and SIG PLC<br />
"Winning several industry-recognised awards in the UK is a great honor for our organisation. One of our main goals is to provide<br />
always fresh security awareness training content and simulated phishing templates to keep up with the evolving cybersecurity threat<br />
landscape. Being recognised in this awards programmes in the UK as training provider of the year speaks volumes to the quality of<br />
our training." - Malik, security awareness advocate - KnowBe4<br />
Editor's Choice<br />
WINNER: Hornet Security - 365 Total Protection<br />
"Hornetsecurity is honoured and delighted to receive the Computing Security Award for our 365 Total Protection service. It confirms<br />
to us once again that our service addresses the needs of Microsoft 365 users for additional security in the best possible way. We would<br />
like to thank the Computing Security team for the transparent and uncomplicated review process!" - Yvonne Bernard – Head of Product<br />
Management<br />
One to Watch Security - Company<br />
WINNER: ADISA<br />
RUNNER-UP: Orange Cyber Defense<br />
"ADISA is delighted to have been awarded the ‘One to WatchSecurity - Company’ Computer Security Magazine award. Despite being 10<br />
years’ old, we have been extremely busy in the last 18 months and look forward to announcing some exciting news about work being<br />
concluded with the UK Information Commissioner’s Office and the MoD. Check out our You Tube channel called ADISA Media Centre to<br />
be kept up to date on this news." - Stve Mellings CEO ADISA<br />
One to Watch Security - Product<br />
WINNER: Neustar - UltraGeoPoint<br />
RUNNER-UP: GeoLang - Data Discovery and DLP<br />
"We are very proud to have won three separate awards at the prestigious Computing Security Awards. Demonstrating the depth and<br />
value of our security offerings, Neustar was recognised with awards in three different categories:<br />
Network Security Solution of the Year: Neustar UltraThreat Feeds Web Application Firewall of the Year: Neustar UltraWAF<br />
One to Watch Security Product: Neustar UltraGeoPoint<br />
We are honoured to have earned these three awards from such a respected and important publication."<br />
For more information, contact security@team.neustar, or call us at 1-855-898-0036 in the US and +44 1784 448444 in the UK.<br />
Security Company of the Year<br />
WINNER: Brookcourt Solutions<br />
RUNNER-UP: KnowBe4<br />
"It's a huge honour to have won this prestigious award for the second year running. As a company, we are committed to being a trusted<br />
and reliable partner for our customers, so to be recognised for this award is a huge achievement for us. Thank you to all who took the<br />
time to vote."<br />
38<br />
computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk
Pragmatic and experienced<br />
risk management professionals<br />
Xcina Consulting provides high quality business and technology risk assurance and<br />
advisory services, which only comes from years of experience in our clients’ shoes.<br />
We help to ensure an organisation’s key risks are appropriately managed; its processes<br />
and controls are robust and fit for purpose; it remains compliant with legislation<br />
and regulation and wherever feasible it leverages industry standards as part of<br />
good practice.<br />
Accredited by the Payment Card Industry’s Security Standards Council as a Qualified<br />
Security Assessor (QSA) company and a British Standards Institution (BSI) platinum<br />
member for the provision of services related to ISO27001 (Information Security) and<br />
ISO22301 (Business Continuity).<br />
All our consultants have 10+ years minimum experience and have held senior level<br />
positions.<br />
Our services can be customised to your needs.<br />
• Business Continuity and Crisis Management<br />
• Data Protection<br />
• Financial Processes & Procedures<br />
• Information Security / Cyber Security<br />
• IT & OT Security<br />
• Payment Card Industry<br />
• Project & Change<br />
• Risk Management<br />
• Control Assurance (ISAE3402 / SSAE18)<br />
• Due Diligence<br />
• Governance<br />
• Internal Audit<br />
• Operational Processes & Procedures<br />
• Process Management<br />
• Regulatory Compliance (finance services)<br />
• Third Party Management<br />
020 3985 8467<br />
www.xcinaconsulting.com<br />
info@xcinaconsulting.com
There’s a difference between<br />
feeling secure & knowing<br />
you're secure.<br />
Information Security Advice<br />
Penetration Testing<br />
Adversary Simulation<br />
www.pentest.co.uk