securitylinkindia

NIST Updates Cybersecurity Guidance for Supply Chain Risk Management

A vulnerable spot in global commerce is the supply chain: It enables technology developers and vendors to create and deliver innovative products but can leave businesses, their finished wares, and ultimately their consumers open to cyberattacks. A new update to the National Institute of Standards and Technology’s (NIST’s) foundational cybersecurity supply chain risk management (C-SCRM) guidance aims to help organizations protect themselves as they acquire and use technology products and services. The revised publication, formally titled Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (NIST Special Publication 800-161 Revision 1), provides guidance on identifying, assessing and responding to cybersecurity risks throughout the supply chain at all levels of an organization. It forms part of NIST’s response to Executive Order 14028: Improving the Nation’s Cybersecurity, specifically Sections 4 (c) and (d), which concern enhancing the security of the software supply chain. Released today after a multiyear development process that included two draft versions, the publication now offers key practices for organizations to adopt as they develop their capability to manage cybersecurity risks within and across their supply chains. It encourages organizations to consider the vulnerabilities not only of a finished product they are considering using, but also of its components – which may have been developed elsewhere – and the journey those components took to reach their destination. “Managing the cybersecurity of the supply chain is a need that is here to stay,” said NIST’s Jon Boyens, one of the Publication’s Authors, “If your agency or organization hasn’t started on it, this is a comprehensive tool that can take you from crawl to walk to run, and it can help you do so immediately.” Modern products and services depend on their supply chains, which connect a worldwide network of manufacturers, software developers and other service providers. Though they enable the global economy, supply chains also place companies and consumers at risk because of the many sources of components and software that often compose a finished product. A device may have been designed in one country and built in another using multiple components from various parts of the world that have themselves been assembled of parts from disparate manufacturers. Not only might the resulting product contain malicious software or be susceptible to cyberattack, but the vulnerability of the supply chain itself can affect a company’s bottom line. “A manufacturer might experience a supply disruption for critical manufacturing components due to a ransomware attack at one of its suppliers, or a retail chain might experience a data breach because the company that maintains its air conditioning systems has access to the store’s data sharing portal,” Boyens said. The primary audience for the revised publication is acquirers and end users of products, software and services. The guidance helps organizations build cybersecurity supply chain risk considerations and requirements into their acquisition processes and highlights the importance of monitoring for risks. Because cybersecurity risks can arise at any point in the life cycle or any link in the supply chain, the guidance now considers potential vulnerabilities such as the sources of code within a product, for example, or retailers that carry it. “If your agency or organization hasn’t started on (C-SCRM), this is a comprehensive tool that can take you from crawl to walk to run, and it can help you do so immediately,” said NIST’s Jon Boyens “It has to do with trust and confidence,” said NIST’s Angela Smith, an Information Security Specialist and one of the Publication’s Authors, “Organizations need to have greater assurance that what they are purchasing and using is trustworthy. This new guidance can help you understand what risks to look for and what actions to consider taking in response.” Before providing specific guidance – called cybersecurity controls – the publication offers help to the varied groups in its intended audience, which ranges from cybersecurity specialists and risk managers to systems engineers and procurement officials. Each group is offered a ‘user profile’ in Section 1.4, which advises what parts of the publication are most relevant to the group. The publication’s Sections 1.6 and 1.7 specify how it integrates guidance promoted within other NIST publications and tailors that guidance for C-SCRM. These other publications include NIST’s Cybersecurity Framework and Risk Management Framework, as well as Security and Privacy Controls for Information Systems and Organizations, or SP 800-53 Rev. 5, its flagship catalog of information system safeguards. Organizations that are already using SP 800-53 Rev. 5’s safeguards may find useful perspective in Appendix B, which details how SP 800-161 Rev. 1’s cybersecurity controls map onto them. Organizations seeking to implement C-SCRM in accordance with Executive Order 14028 should visit NIST’s dedicated web-based portal, as Appendix F now indicates. This information has been moved online, in part to reflect evolving guidance without directly affecting the published version of SP 800-161 Rev. 1. In part because of the complexity of the subject, the authors are planning a quick-start guide to help readers who may be just beginning their organization’s C-SCRM effort. Boyens said they also plan to offer the main publication as a user-friendly webpage. “We plan to augment the document’s current PDF format with a clickable web version,” he said, “Depending on what group of users you fall into, it will allow you to click on a link and find the sections you need.”  

Read More

Gallagher Announces ISO 27001 Certification

Global security company, Gallagher has recently announced they have achieved ISO 27001 accreditation, the leading international standard focused on information security. The ISO 27001 standard ensures organizations protect their information in a systematic and efficient way, through the adaptation of a robust and comprehensive Information Security Management System (ISMS). “Achieving this certification further demonstrates to our Channel Partners and customers around the world that we are committed to ensuring the delivery of robust and industry-leading security solutions which protect and safeguard the data of each and every one of them,” said Greg Barclay, Chief Operating Officer at Gallagher. The certification verifies Gallagher’s outstanding safeguards in three critical areas, including confidentiality, integrity, and authorized availability of all key data and information. Achieving the standard is a detailed and comprehensive process that requires a dedicated approach to all aspects of an organization’s processes in and around their ISMS. The ISO 27001 certification is the latest in a long list of key accreditations Gallagher has achieved in recent years. As Greg goes on to note, “We are proud to deliver solutions that meet government and industry compliance standards and certifications around the world. This is an essential part of our customer offering and commitment to protect what matters most.”  

Read More

121 Arrests in Operation Against Migrant Smuggling and Human Trafficking – INTERPOL

An INTERPOL-coordinated operation targeting migrant smuggling and human trafficking has triggered 121 arrests across 25 countries, prompting 193 new investigations. Operation Storm Makers (21-25 March 2022) saw authorities carry out enforcement actions against organized crime groups believed to be facilitating the travel of Asian men, women and children across borders for exploitation and/ or profit. In total, authorities rescued 80 human trafficking victims and identified some 3,400 irregular migrants. Operational coordination units were set up in Hanoi (Vietnam) and Abu Dhabi (United Arab Emirates), helping assess intelligence and facilitating enforcement actions between participating countries. Smart electronic gates, connected to INTERPOL’s databases, were activated at airports across the United Arab Emirates (UAE) to boost passport checks and help detect forged documents. Globally, some 15 million checks were carried out against INTERPOL’s databases at air, land and sea borders, generating ‘hits’ or alerts for fraudulent travel documents, as well as INTERPOL Notices against individuals wanted on various charges, including murder and fraud. Organ trafficking, forced labour, sexual exploitation uncovered In Turkey, police arrested four people, dismantling a suspected international organ trafficking ring. The criminal network, originating in India, is accused of targeting vulnerable Indonesian nationals and facilitating kidney transplants in Turkey. The suspects went as far as staging wedding photos and falsifying documents in order to establish fake family relationships between recipients and donors. With each kidney fetching USD37,000 on the black market, the organ donor would receive USD15,000, with the remainder split among members of the network. Police in Malaysia and Cambodia worked closely on a case involving 15 men and one woman lured to Cambodia on the promise of a lucrative salary to work in a call centre. On arrival, however, they were locked up and forced to work 14-hour days as scammers. Authorities in both countries believe there are more victims of the criminal group and the ongoing investigation is being supported by INTERPOL’s Human Trafficking and Smuggling of Migrants unit. Additional operational highlights The Philippines rescued 32 victims of human trafficking and arrested eight suspects on charges of trafficking, child exploitation and child abuse. Authorities in Greece intercepted a car carrying five irregular migrants from Afghanistan and Syria, who had each paid EUR 4,000 to a smuggler in Turkey for transport to Thessaloniki. Vietnamese migrants were intercepted on the Hungary-Romania border, on their way to Germany. Their smugglers, also of Vietnamese origin, had coordinated all aspects of their illegal journey via social media platforms. In the UAE, a 17-year old girl was rescued from sexual exploitation. Brought to the UAE from Pakistan when she was just 13, the girl had been forced into prostitution by a family member. In the Maldives, intelligence led authorities to a possible brothel operating as a salon and spa, where they believe trafficked Thai women had been forced into prostitution. Authorities liaised with the women to ensure their safe return to Thailand and are working via the INTERPOL National Central Bureau in Bangkok to investigate the organized crime group behind their recruitment and exploitation. INTERPOL’s Secretary General, Jürgen Stock, said, “In just one week, this operation generated nearly 200 new investigations, revealing the sheer scale of these crimes. It is a huge responsibility for law enforcement, particularly when you know that the victims are in abusive or life-threatening situations. INTERPOL will continue to help authorities close the gaps and ensure the offenders behind these appalling activities are brought to justice.” Working together Participating countries received support from INTERPOL’s Specialized Operational Network against migrant smuggling, as well as its Human Trafficking Experts Group. AIRCOP, Homeland Security Investigations, the International Organization Migration and the Regional Support Office for The Bali Process delivered pre operational training. EUROPOL actively supported the operational phase by cross-checking information against its databases. Participating countries Australia, Bangladesh, Brunei, Cambodia, China, France, Germany, Greece, India, Indonesia, Laos, Malaysia, Maldives, Myanmar, Pakistan, Philippines, Portugal, Qatar, Romania, Singapore, Spain, Turkey, UAE, UK, Vietnam. Operation Storm makers was funded by the INTERPOL Foundation for a safer world.  

Read More

Missouri DOT Selects Rekor Systems’ Advanced AI-Driven Solutions to Improve Highway Congestion and Reduce Traffic Fatalities

Rekor Systems, Inc., a global AI technology company with a mission to provide data-driven insights that build safer, smarter and more efficient cities around the world through intelligent infrastructure, recently announced that Rekor has been selected for the launch of a multi-year program with the Missouri Department of Transportation (MoDOT) to not only make roads less congested and safer, but to help rid the state of severe traffic crashes – all key objectives of Missouri’s Show-Me Zero Strategic Highway Safety Plan 2021-2025. The program is a result of a $719,000 grant from MoDOT’s Advanced Transportation and Congestion Management Technologies Deployment Program (ATCMTD). CV data has become a crucial component of traffic management across the globe, making its accuracy all the more important. As part of the program, Rekor expects to deploy over 100 of its edge-based processing systems and new optical roadside sensors along the roadway and integrate the real-time data from those sensors with a combination of CV data, telematics, dashcam video analytics, and real-time weather. Rekor can then leverage AI & machine learning algorithms running on top of this data to find traffic incidents faster than traditional means of incident detection and identify areas of high crash risk with the mission of improving safety on MoDOT roadways. The roadway of focus for the program is I-270 North, which has a higher severe crash rate than comparable roads in the region, with the eastbound span showing an average crash rate that is 30% higher than the statewide average. Rekor’s AI-driven solution will capture nearly 100% of all traffic on critical segments of I-270 in north St. Louis County and, with its data partner network, will deliver more than two billion additional monthly data points to the State’s existing data resources to drive improvements. “This project is unprecedented in scope and scale and provides a definitive ‘ground truth’ view of the data being captured on roadways by connected vehicles and other sensors,” said Rekor President, David Desharnais, “Rekor’s Transportation Management platform is uniquely capable to manage this level of real-time data capture while providing insight to help MoDOT address roadway safety and congestion in an entirely new way.”  

Read More

Securiton Fire Protection for the Suez Tunnel

Egypt has made great efforts in terms of infrastructure expansion in recent years. Several new tunnels under the Suez Canal connect the Sinai Peninsula with the African mainland. A number of fire detection systems from Securiton provide reliable, effective protection in the new Ahmed-Hamdi Road Tunnel II and associated infrastructure. September 2021 saw Egyptian President Abdel Fattah Al-Sisi inaugurate the Ahmed Hamdi Tunnel II, a road tunnel running under the Suez Canal. The Ahmed-Hamdi Tunnel II represents yet another link between Africa and Asia: the 4.25km long two-lane tunnel, which runs parallel to the Ahmed Hamdi Tunnel I, which has been in existence since the 1980s, connects the Sinai Peninsula with the city of Suez. This latest canal underpass is the sixth link between the eastern and western Suez Canal region, five of which have only been completed in the last two years. Before that, the Ahmed Hamdi Tunnel I was the only way of getting from one side of the canal to the other underground without taking a ferry – ferries have linked the Sinai and the African mainland since the opening of the Suez Canal in 1869. In addition, a high road bridge over the canal was inaugurated in 2001. Top-class fire protection The Ahmed-Hamdi Tunnel II was commissioned by the Armed Forces Engineering Authority, which underlines the importance of the construction project. The road tunnel, service tunnel and associated service buildings are protected by high-quality fire protection supplied by Securiton. Ten-plus kilometres of SecuriHeat LIST sensor cable provide highly sensitive tunnel fire detection. The Egyptian authorities place their trust in the tried-and-tested linetype heat detection system for tunnels and industrial facilities. Deployed around the world, it was developed by Listec GmbH, which is part of the Swiss Securitas Group. The installation was implemented in partnership with local Securiton partner Deutschland Technology. In addition to tunnel fire detection, Securiton has equipped facilities around the Ahmed-Hamdi Tunnel II with other equally effective fire detection solutions – the service buildings, pump facilities, firefighting systems and emergency shafts located east and west of the Suez Canal are monitored by a range of Securiton fire protection systems, including 12 redundant, modular SecuriFire 3000 fire detection systems, 230 SecuriStar MCD 573X combined smoke and heat detectors and four SecuriSmoke ASD 535 aspirating smoke detectors.  

Read More

Security Against Fuel Theft

Founded in 2002, Portugalenses Transportes, Lda became one of the leading transport companies in Europe. A fleet of over a hundred trucks operates all over Portugal and makes daily deliveries to Italy, the South of France, and Spain. The company aims at rapid growth, like expanding its fleet to 150 vehicles by the end of 2022, so the management focused on cost efficiency by addressing security issues. Challenge Protect vehicles against fuel theft and monitor the refuelling process The transportation market is highly competitive. The control of costs and resources is essential not to weigh down the financial results of a logistics company. Due to increased fuel thefts, Portugalenses Transportes contracted with professionals to find a security solution to improve control and cost efficiency. The Oliveira&Canha installation company has developed a pioneering customised solution based on an Ajax security system. Protect millions of litres of fuel One truck’s fuel tank is 1,400 litres on average. With 100 vehicles, and fuel price fluctuating around 2 euro, regular fuel thefts (up to 10 per month) cost Portugalenses Transportes up to 150,000 euro per year. Protecting fuel tanks in rest, parking areas, and gas stations and monitoring the refuelling process could save this money. Solution A customised fuel tank cap with in-built magnetic opening detector To find a solution, Portugalenses Transportes contracted with the Oliveira&Canha, a security services and installation company. The installer developed and patented a fuel tank cap customised to prevent losses. Featuring a built-in magnetic opening detector – Ajax DoorProtect – this cap can activate Ajax StreetSiren and instantly notify the driver and the company control centre about opening the tank. The new device has successfully passed all the quality tests, considering several issues such as preventing fuel losses or the electronic circuit isolation. “Oliveira&Canha, Lda has developed a solution adapted to our needs and implemented it with the greatest efficiency and professionalism, becoming a reliable and essential partner in our company day-to-day” Luís Sousa Fleet Manager, Portugalenses Transportes, Lda How it works Every protected truck has an Ajax Hub 2 (2G) control panel connected to the vehicle battery via Ajax 12V PSU. The hub uses 2G networks to communicate with the company control centre.. In case of alarm, the control panel activates the siren, sends notifications to the Ajax app on the driver’s smartphone and the Ajax PRO Desktop monitoring app at Portugalenses Transportes control centre. To open the fuel tank at a gas station, the driver needs to disarm the system with the Ajax SpaceControl keyfob or via the app, and arm it back when refuelling is done. Thus, every refuelling process is logged. Notifications on the hub security state are transmitted instantly in real time. With a vehicle ID assigned to every hub, operators can collect data for analytics. The vehicle security system includes the Ajax StreetSiren outdoor sounder. Experience shows that a loud Ajax StreetSiren alert works perfectly to deter thieves in rest and parking areas. Why Ajax Wireless devices with reliable communication. Free mobile and desktop apps. Instant notifications and event log. Quality technical support. Client-oriented development. Actual outcomes Portugalenses Transportes has installed Ajax security systems in 60 trucks and now incorporates this solution in its growing fleet. So far, the company has observed such outcomes: Increased security. Cost savings. More control and efficiency. “Ajax has been our choice for its reliability, price/quality ratio and ease of use. Since the beginning of our relationship with Ajax, we have seen continuous product development with constant improvements and updates, increasing our confidence in the Ajax brand. Thanks to its versatility, it has allowed us to develop solutions for our clients” Miguel Oliveira CEO, Oliveira&Canha, Lda An Ajax security system protects vehicles and drivers against theft and danger. Instant notifications, a loud siren, a panic button on the keyfob, and mobile and desktop apps work perfectly to deliver comprehensive security. Monitoring and security reduced 90% of fuel thefts, saving money enough to buy one brand new truck per year. The implemented solution helps the company to carry out analytics, which provides management with the ground to make relevant decisions for the business.  

Read More

Using Thermal Technology to Monitor Traffic in Neuilly-Sur-Seine

The city of Neuilly-Sur-Seine is home to Avenue Charles-de-Gaulle (RN13), an urban expressway which is frequented by c.130,000 vehicles per day – from small cars to large buses and trucks. The avenue serves as a connection from Paris to the business district of La Defense and is one of the busiest motorways in France. To get this avenue keep on thriving, the municipality started in 2019 a major modernization project called ‘Les Allées de Neuilly.’ CHALLENGE: Traffic management for a busy urban expressway Neuilly-Sur-Seine began a project in 2019 with the view of turning this urban expressway into an accessible, calm and welcoming boulevard lined with trees and walkways and pavilions to encourage soft mobility and local business development. Since the city is home to the headquarters of many businesses, the civil works of the project must be achieved without compromising on the road’s capacity for traffic flow in and through the city. Expected to finish in 2024, the project will result in a nice boulevard that guarantees transit capacity between Paris and La Defense for all types of mobility – vehicles, cyclists and pedestrians. The project requires rearranging the 10 hectares that Avenue Charles-de-Gaulle occupies. Reconstructing such an infrastructure is no easy feat, and getting it right is key to the everyday functioning of the city in the future. It is also important that whilst the project is underway, the routes and traffic aren’t entirely disrupted. To adequately plan for traffic diversions and the potential impact this could have on daily commuters, the potential adverse effects to motorists and their safety need to be measured, and for this you need reliable traffic data. This is where Wintics came in. Wintics is a Hikvision Technology Partner that uses artificial intelligence (AI) to turn video stream into insightful data with the vision “to make mobility a safer, more reliable and more sustainable experience.” SOLUTION Hikvision’s thermal cameras integrated with traffic analysis software Wintics Cityvision software installed at Neuilly analyses video stream from 5 Hikvision thermal cameras. Cityvision uses AI to measure, analyze and visualize traffic data from the boulevard to assist in measuring the state and type of traffic as well as how and when people use the 10 traffic lanes. Once the project is complete, the installation will also assist the city in monitoring traffic to measure its positive impact and changes in travel methods. To ensure the maximum reliability of its software, Wintics needs correct cameras to connect to Cityvision. This is where Hikvision cameras contributed to the solution. In May 2020, Wintics chose Hikvision thermal cameras (DS2TD2136) to integrate with its own software to film the traffic lanes, which then feeds into the Wintics system, which can differentiate between cars, motorbikes, buses, and other vehicles, producing real-time data with more than 90% accuracy. Wintics used Hikvision cameras for several reasons. Firstly, Hikvision had the perfect balance between competitiveness and quality on the market as Hikvision offers reliable and consistent products. In fact, Wintics usually defers to Hikvision cameras for its installations. Secondly, the company opted for thermal rather than optical cameras for this case because thermal cameras solve an inevitable problem for optical cameras capturing traffic images – glare! Optical cameras may capture the glare from oncoming headlights, and strong sunshine, resulting in an obscured image, which in turn can obscure the data and analysis. Thermal cameras on the other hand don’t capture light at all, only heat – ruling out the possibility of glare obstructing the camera’s function. Thermal cameras also have an edge for potential GDPR issues. Since only the vehicle is recorded, the faces of drivers and their license plates are indecipherable. Where privacy is concerned, erring on the side of caution is made easier by using thermal cameras. Another plus to using thermal cameras is that they generally require less bandwidth to operate than optical cameras, making them an ideal solution if bandwidth is a potential constraint to effective operation. RESULT: Accurate vehicle counting and classification Quentin Barenne, co-founder of Wintics said, “We’ve audited the whole system, and it resulted in over 90% accuracy – not only for counting the vehicles, but also in classifying them into different categories. By integrating Hikvision’s thermal cameras with our own AI application, I can now confidently discuss next steps for improving the safety of the road.” This installation is just one example of how Hikvision products can be easily and effectively integrated for various needs, creating intelligent, flexible solutions for many challenges – getting the most out of technology.  

Read More

Securing the New Age Workforce in Post-Pandemic Era

“What Identity and Access Management (IAM) means for businesses in today’s complex digital world “ Matthew Lewis Director of Product Marketing & Identity and Access Management, HID Global In today’s competitive and dynamic markets, organizations face numerous difficulties, such as adjusting to regulatory requirements, securing organizational needs, and implementing stronger security models. The expansive role of digitisation and rise of remote work has further pushed the need to adopt a holistic approach to securing identities while accessing data, infrastructure, and applications. This can range from zero-day threats bypassing conventional security models to the expansive role of digitization and rise of remote work. Propelled by COVID-19, the global workforce had to relook at how remote work models function, thereby normalising distant work and adding a new dimension to professional engagement. According to a Frost & Sullivan analysis, organizations will not return to pre-pandemic operating models and will continue to adjust the remote and hybrid work model over time. Organizations are facing an increased requirement to implement new rules for securing work resources and secure data access points as this technology proves to be a game changer. Several enterprises have seen a significant change in how they conduct business as a result of the global pandemic. In particular, technological implementations that were originally planned to take three to five years to complete are now commonly being adopted almost overnight. The cloud is one of the major factors responsible behind the developments, with businesses increasingly recognising its importance in its technology infrastructure. However, as more businesses move to the cloud, the danger of malware assaults and data leaks increases, as well as new difficulties in achieving compliance. The traditional security model has lost relevance over the past two year. Now, an organization’s security fence extends beyond on-premises networks with SaaS applications being leveraged for business, IoT devices being installed everywhere, and employees accessing corporate resources from various locations and networks. So, what does it take for a corporation to migrate to the cloud while maintaining a secure foundation? Perhaps the most serious threat to organizational security is related to identity, necessitating the establishment of policies governing user authentication and validation. This helps in cases where users with higher privileges or dormant accounts become easy targets for infiltrating or launching a malicious attack into an organization. Identity and Access Management (IAM), a critical component of a Zero Trust strategy, is designed to assist organizations in authenticating devices, technologies, and network infrastructure. This framework is based on features such as Multi-Factor Authentication (MFA), Single Sign-on (SSO), and granular permissions, which establishes data access privileges, secures access for cloud services, and protects critical login/entry points. One of the most significant challenges in establishing Zero Trust is putting it into practice. This is because legacy security models often impede the transition to supporting remote work, making it difficult to retain legacy IT security tools and architecture. To implement Zero Trust, organizations must assess workflows and business processes, as well as identify patterns in how users interact with those flows. This should lead to the implementation of appropriate controls in accordance with the identified risks to help secure the organization. As a result, it is critical to consider the user experience throughout the planning and implementation process. In today’s world, users expect quick, easy access to applications, whether on their mobile devices or work systems. Another important point to remember is that a mismatch between an employee and a company’s critical systems can result in compromised security due to neglect, wrongful behaviour, or violations. To determine implementation sequences and tools in line with the company’s risk profile, Zero Trust must be established based on organizational requirements and its industry. In 2022, cybersecurity will play a significant and growing role in boardroom agendas, with a focus on identity and authorization. Establishing identity-centric and minimal privilege access control, for example, may be preferable to micro-segmenting networks or enforcing Zero Trust network access across managed and unmanaged devices. Faced with the complexity of managing identities in globally distributed companies, Zero Trust remains a lofty goal. Creating a planned roadmap that takes into account the risks posed to your organization is a great first step. Partnership with vendors, whether for affiliating current technology with future goals or addressing multiple requirements at once, can also greatly simplify your journey. According to a Gartner report, 30% of large organizations will have publicly shared their environmental, social, and governance (ESG) goals with a focus on cybersecurity by 2026, up from less than 2 percent in 2021. The goal is to improve security, but ultimately, companies want to deliver better business results, and Identity and Access Management (IAM) planning and governance is a big step along the way.  

Read More

How to Put on a Vacation. Safety Regulations: CEO’s Security Check-List

Alexey Parfentiev, Senior Business Analyst, SearchInform Once we’ve conducted a research, which aimed to obtain, if employees in various companies are acknowledged with information security rules. Among others, there was the following question – “would you share your login/ password with colleagues while you are on a vacation?” Only 6% of respondents answered in the affirmative. This number seems encouraging, but it’s important to understand, that usually people tend to give ‘correct’ answers in the test in order to seem a bit ‘better,’ than they are in the real life. So, what’s the situation like in real life? In fact, people often are not only ready to share their passwords, but they sometimes make notes, in which they write down all the information on a paper beforehand and leave these notes in places, where these papers will be definitely found. The reason for that is very simple and understandable: people just want to be left alone during a vacation. isky. On the contrary, this is believed to be a responsible approach – employee has thought about partners and clients in advance. But in fact, it’s only self-deception. There are lots of cases in our clients’ practice, when such kind of ‘generosity’ has lead to disclosure of information. What’s more, less frequently, but still not so rare, access to other peoples’ accounts is used for real ‘setups.’ In order to avoid such situations some information security specialists prefer to react in a radical manner. With the help of special software they block all processes on employee’s computer during the vacation time, in case the person, who logs into the account, isn’t the account owner. This method in modern business-circumstances is too strict, that’s why it’s better to control, than to block. The question arises, what is required to do, before employee may start a vacation? Case study Information security specialists detected suspicious activity on the computer of employee, who was on a vacation at that moment. It was found out that before the vacation, the employee gave access to his account to his colleague ‘just in case.’ According to company’s internal regulations such ‘password transmission’ was strictly prohibited. Some confidential data was stored on the employee’s computer, and in case of leakage, there was a high probability, that company would have experienced serious financial and reputational losses. Luckily, data leak incident didn’t occur, and the careless employee had to face a serious conversation. Make sure, that access system is configured appropriately ‘ Appropriately’ means, that some particular employee can obtain info only in his/ her part of information disk, CRM base and tasks, line manager – his/ her own and department employees,’ CEO – all employees.’ In this situation employee simply doesn’t have to share account info with colleagues. All employees, who may need this particular employee’s documents, and who, at the same time, have enough powers to work with them, have access to the documents. This piece of advice may seem obvious, but in fact, access hierarchy is not set up appropriately in many companies. This results into arise of emergency calls with the request to ‘urgently send login/ password.’ Make sure, that employee hasn’t ‘shared’ information in advance In order to be able to work remotely, many workaholics try to provide themselves with all necessary information and accesses. The tricky moment is that public cloud and free private email, as well as flash drives, which are the most popular storages of transferred information, don’t provide secure way of data retention. ‘Timely’ storages are usually forgotten quickly, and confidential data may be stored in the clouds for ages without real necessity and without appropriate level of security esurance. What’s more, users often even forget to block public access to them, don’t care about data encryption. This situation was depicted with the incident with massive leak from Google.docs, which took place last summer. Internal instructions, documents, containing passwords and reports (including ones of very well-known brands) were published on the Internet. So, any form of corporate posture in public services should be prohibited in the company, and info, addressing this forbiddance, should be explained to the staff. Facts of deliberate leaks are easily detected by well-developed DLP-systems. Ensure security, if employee has to work with corporate info using unverified Wi-Fi hotspots Some employees have to take a corporate laptop with them during a vacation. It’s crucial to ensure, that the employee won’t have to worry about internet-connection security. In order to deal with this task, use VPN. IT-service staff should be ready to set up VPN, thus, employee will have the opportunity to work outside the office without risk of exposing data to danger. Make sure, that no one logs into employee’s account This may be implemented in different ways. First of all, IT-specialists may block employee’s account during the vacation time in active directory. This way has one drawback – even legal access will be banned too. Some say, there are companies, which organize vacation for the whole team during the period of summer decrease in business activities. However, this is a really exotic situation. Most companies can hardly stand pause in business-processes for such a long term. Another option, which is more efficient, is to set two-factor authentication, when apart from usual ‘login + password’ system requires something else, for example, code from SMS. Nowadays, two-factor authentication function may be added to practically all modern services, including CRM. This measure helps to be more sure, that the account owner is the one who logins in the account. In case this employee has a temporary deputy (we mean that deputy is in charge during his chief’s vacation), deputy’s phone number may be added to the CRM-system. In case something suspicious or illegal happens, it will be possible to identify the violator by monitoring of ‘logs in.’ Still, it’s not a 100% guarantee, because employee may be very creative. In this relation, more advanced software product – DLP-system may help. This system may be configured the way it takes photoshoots…

Read More

Everbridge Selected by State of Maharashtra, India’s 2nd Most Populous State, to Provide Emergency Preparedness and Response Solution

Representing the seventh statewide deployment of Everbridge in India, the Maharashtra win underscores the company’s global leadership in Public Safety and Crisis Preparedness with countrywide contracts in APAC, EMEA, and the Americas Everbridge, Inc., the global company in critical event management (CEM) and national public safety software solutions, recently announced that the Indian State of Maharashtra selected the company’s Incident Response Solutions to help governments plan for, respond to, and recover from any disaster. Home to a combined 150 million residents and annual tourists, Maharashtra is the second-most populous state in India, and its capital Mumbai is the most populous city in the country. The Government of Maharashtra chose Everbridge’s Previstar Continual Preparedness System (CPS) solution to help the State’s Relief and Rehabilitation Department to create dynamic plans, manage disasters, and provide decision support along with situational awareness throughout a critical incident’s life-cycle. In doing so, Maharashtra becomes the seventh state in India to adopt Everbridge’s Public Safety solutions, along with Andhra Pradesh, Kerala, Odisha, Uttarakhand, Gujarat, and West Bengal. Following crises such as massive floods in 2021, Maharashtra undertook an initiative to implement an Incident Planning and Response System that would bring together stakeholders and support agencies including Police, Fire, Public Works, and Health under one platform, and to provide one common operating picture, to respond to any disaster in a unified manner. The State partnered with Everbridge to leverage its Previstar CPS to create a comprehensive incident management platform that puts their plans into action, tracks activities, mobilizes resources, and enables decision support. Speaking during the recent Maharashtra Day, Governor Bhagat Singh Koshyari mentioned the State’s vision to achieve Zero Death by operationalizing a statewide Incident Response System (IRS). “We are honored to support Maharashtra on the evolution of its statewide emergency preparedness and capacity building as the government institutionalizes an Incident Response System,” said Valerie Risk, Vice President of Public Safety Solutions at Everbridge. Himadri Banerjee, Global Director of Everbridge’s Previstar said, “As we have demonstrated in India and in countries around the world, our public safety platform promotes effective disaster management and greater safety for the millions of people living in the region.” The deployment of Maharashtra’s emergency/ disaster management system expands on Everbridge’s position as the global leader in population-wide Public Warning and Public Safety Solutions. More local, state, and national governments across the globe deploy the Everbridge Public Safety solutions than any other provider, offering government agencies with the ability to save time and save lives. The Everbridge platform reaches residents and travelers in more than 200 countries and territories in case of natural disasters: such as floods, severe storms, volcanic eruptions, earthquakes, and wildfires; manmade threats: such as geo-political, terrorist attacks, and industrial accidents; and digital threats: such as ransomware, cyberattacks, and IT disruptions.  

Read More