Tag Archives: Cybersecurity

Safeguard your Smartphone and Become a Cybersecurity Wiz

The question of ‘hackability’ and the overall security of our smartphones is one of those issues that seems to pop up in the news. After all, we use our smartphones for just about anything – sharing photos, ordering food, shopping online, sending emails and messages, banking and financial services, etc. – without realising all of the ways we could be putting our device and ourselves at risk, allowing cyber-criminals to get access to our sensitive data.

While many of us are better informed today about the potential dangers of being connected on our smartphones, hackers and cyber-criminals are also changing their methods of attack. As the global pandemic have left many of us stuck at home and more reliant than ever on our mobile devices, cyber-criminals have also adapted new ways to target users. Over the Movement Control Order (MCO), cybersecurity cases spiked by 82.5% compared to the same time last year, with 18% attributed to attacks against local companies and the remaining linked to home users and others[1].

Recognising Cyberattacks and the Need for Cyber-resilience

Among the new waves of attacks brought on by the pandemic are COVID-19 themed phishing lures, high-risk fake domains, and scams[2]. These new methods employed by cyber-criminals are aimed at taking advantage of the public fear of the virus, combined with heightened stress levels from unfamiliar ways of working. The most common attacks in Malaysia can be attributed to phishing attempts, the spread of malicious code via untrustworthy websites, and passwords, as below:

  • Phishing Emails – Reports have found that 91% of all attacks begin with a phishing email to an unsuspecting victim, with 32% of all successful breaches involve the use of phishing techniques[3]. While many of us have been educated on recognising phishing emails, these attacks are still effective, and can fool even tech-savvy individuals.
  • Malicious Websites – Compromised websites is a main avenue for spreading malware infections on mobile devices. Limiting your browsing activity to reputable websites can reduce the possibility of infection.
  • Password Security – A survey revealed that 59% of respondents use the same password for multiple accounts, citing convenience and a fear of forgetting their password as the reason for this practice[4]. However, this allows cyber-criminals to access all your accounts easily through one single credential. Therefore, it is advisable to use different passwords across accounts.

Cyberattacks continue to grow day-by-day, and it is crucial that we learn to minimise risk, with good cyber habits being a pivotal and essential first step in combatting threats.

Defending your Smartphone, the Moment it is Turned On

As such, while it is important to take steps and measures to protect yourself online, it is also crucial to have a strong security platform on your smartphone, helping you encrypt and secure confidential data. Most smartphone breaches happen because they may not be equipped with advanced security measures, have outdated systems that may not be able to withstand current attacks. Similarly, smartphone owners may also not consider the importance of securing their phones or performing regular security check-ups. However, there are certain devices that come with a safe and secure in-built mobile interface to keep your personal data protected.

For example, Samsung Knox sets a foundation of security to users at both the hardware and software level as a security platform that’s integrated within Samsung smartphones, tablets, and wearables to protect it against malicious threats. Whether it is protection against phishing attacks or potential malware infections, the Samsung Knox platform has security integrated into its DNA, providing multi-layered security with data encryption and run-time protection within Samsung devices to keep sensitive information safe from online threats. Users can safeguard passwords, save private files under a secured folder, and even secure mobile transactions with Samsung Knox. Getting to know your security platforms is just as important when considering the range of services that is available to ensure that it is updated to meet global information and technology security requirements. This helps its users stay ahead of the modern-day threats with its game-changing security features.

Photo by Zana Latif from Pexels

Given that smartphone usage has only grown exponentially over the past few years, it is important that we have more security platforms allowing us the freedom and peace-of-mind in staying connected. Similar to how Samsung Knox have.

On top of having a top-tier security platform for your data, having that protection extended to all the essentials in a mobile device is equally important. While many of us are familiar with installing apps on our phones, we may be unfamiliar with the authenticity of the sources producing these apps. Learning to identify unverified and suspicious sources can help users identify potentially harmful apps.

Similar to how Samsung devices come built-in with Google Mobile Services (GMS) to help ensure that your vital applications have the latest updates and patches from verified sources, using trusted sources from well-known app stores like Google Play can help protect you from downloading and installing apps that can harm your devices.

Staying Secure, Safe, and Savvy about Security

Cyberattacks are nothing new, the challenge is in identifying and combatting the updated approach that many cybercriminals are using when it comes to their targets and the frequency of their attacks. Whether it is a hacking attempt by a third-party app or a fraud email redirecting you to a malicious website, most cybercriminals have one common goal: exploit your personal data and use that data to make profit. As such, it is critical that we keep our sensitive information protected at all costs, with the help of a smartphone built with highly advanced security features to always keep you safe from unwanted threats.


[1] https://www.thestar.com.my/news/focus/2020/04/12/cybersecurity-cases-rise-by-825

[2] https://home.kpmg/my/en/home/media/press-releases/2020/04/cybercrime-and-scams-have-been-successful.html

[3] https://www2.deloitte.com/my/en/pages/risk/articles/91-percent-of-all-cyber-attacks-begin-with-a-phishing-email-to-an-unexpected-victim.html

[4] https://www.computerweekly.com/news/252440316/Password-practices-still-poor-despite-increased-threats

Can cybersecurity keep up with flexible work arrangements?

2020 will be remembered as the year the world experienced its largest ever work-from-home experiment as the global pandemic forced businesses to move operations online and adapt to a new distributed workforce.

As some markets around the globe gradually ease some restrictions and allow employees to go back to the office, the situation remains in a delicate balance and work as we know it has been redefined for many. Increasingly, organisations are embracing the new work model and the many benefits that come with it including increased employee well-being and better work-life balance. In fact, some organisations are now establishing permanent work-from-home policies with 60 percent of the largest companies integrating flexible virtual-physical collaborative environments by 2021, according to Bain & Company. This is supported by Lenovo’s Work From Home survey which found that nearly half (46 percent) of employees are as productive when working from home as they are in the office, with 15 percent saying that productivity increases at home.

woman writing on her notebook
Photo by Retha Ferguson on Pexels.com

The survey also found that 87 percent of workers feel somewhat ready to adapt to a distributed, work-from-anywhere environment if required. So too are cybercriminals. The looming uncertainty among employees of the delicate, everchanging global circumstances, combined with their unfamiliarity with the new work arrangement, has created a wealth of opportunities for cyber-attacks. Cyber criminals are taking advantage of the situation to launch COVID-themed attacks, phishing attempts and spread fake news. In Malaysia, cybersecurity cases have seen a surge of more than 90% during the Movement Control Order (MCO) so far compared to the same period last year, CyberSecurity Malaysia revealed.

Watch for your blind spots

With employees accessing confidential data from various devices, locations, and unsecured networks, it opens more endpoints and vulnerabilities for cyberattacks. In our hyper-digital and mobile world, hardware security is becoming ever more critical, as across the globe, each person is expected to own 6.58 network connected devices in 2020. In fact, according to cybersecurity solutions provider Sepio Systems, there has been a 300 percent increase in the number of new connected devices from unknown vendors attached to the enterprise network.

blur bright business codes
Photo by Pixabay on Pexels.com

While a majority of employees are working primarily from home, it is only a matter of time before they begin heading back to shared workspaces, coffee shops and planes and once again enjoy the flexibility of working from anywhere. This means that an organisation’s network, database and confidential files may be accessed from unsecured VPNs, unknown networks, and rogue access points. Without proper security standards put in place, hackers can easily gain access to an organisation’s network via vulnerable devices and execute attacks remotely. Organisations must take this into consideration and be on the offensive to mitigate potential attacks before malicious entities infiltrate company systems and confidential data.

Adopt a Zero Trust mindset

The nature of a distributed workforce removes the luxury of face-to-face identification and validation. Tech Wire Asia reported that cyber scams based on COVID-19 becomes prevalent in recent months, as hackers look to capitalize on the virus-driven uncertainty affecting individuals, enterprises, and governments. This means that organisations must double down on their efforts in credential and access management and continue to educate employees to identify and weed out impersonation scams and phishing attempts. As hackers grow in sophistication, organisations and employees must take a Zero Trust. In order to protect business and employee data, organisations must implement a system to ensure that the right people have access to the right data at the right time, on a ‘need-to-know’ basis.

Empowering a distributed workforce with cybersecurity

To reap the full benefits of a distributed workforce in the long run, organisations must provide employees with secure devices and create a safe digital environment to operate in, allowing them to focus on the job at hand. This shift to a decentralised work environment means that IT teams must have extended visibility over digital platforms and the organisations digital ecosystems in order to identify and mitigate potential threats in a timely manner.

However, with the shortage of cyber talent and growing digital footprint, this can take a toll on IT teams. IT teams must be supported to enhance their capabilities with solutions that provide both hardware and software security. For example, Lenovo’s ThinkShield solution helps secure devices from development through disposal, giving IT admins more visibility into end points and providing easier and more secure authentication. Lenovo has also partnered with SentinelOne to leverage its behavioral AI technology to predict tomorrow’s attacks today and allow ThinkShield devices to predict cyberattacks and enable devices to self-heal from any attack instantaneously, adding another critical layer to our ThinkShield offering.

As employees have quickly adapted to new work structures in these unique times, organisations must also embrace the risk that comes with it and put in place the right measures and solutions to create a secure and robust environment for employees to operate in. One way Lenovo helps organisations empower employees is by offering services that supports remote workers. For employees who do not have access to IT helpdesks, Lenovo’s Premier Support allows for direct, 24/7 access to elite Lenovo engineers who provide unscripted troubleshooting and comprehensive support for hardware and software. This results in less downtime for end users when things go wrong, freeing IT staff up to focus on strategic efforts.

Only then will organisations and employees be able to reap the full benefits of a distributed workforce and build a stronger digital foundation to effectively navigate and succeed in the new world of work.

Pandemic Outcome for Small Businesses: Why It’s Time to Change Attitudes Towards Technology

Small businesses are some of the most represented in many countries, employing millions of workers and making a huge contribution to the global economy. In fact, they represent around 90% of the business population and more than 50% of employment worldwide. In recognition of the sector, the General Assembly of United Nations declared June 27 a Micro-, Small and Medium-sized Enterprises Day to “raise public awareness of their contribution to sustainable development”. Such initiatives become even more relevant today, when many small companies face challenging times due to the pandemic. With small businesses looking to get going again, now is the time to take on board lessons learned and improvements that can help organizations move forward.

Technology as one of the key factors for survival

To adapt to the new reality, businesses have been strongly advised to adopt and embrace new technologies so they can continue to operating effectively during the COVID-19 lockdown. That meant introducing new digital tools for collaborative working or specific ones for online sales for example, to enable effective remote working while maximizing productivity. Indeed, according to a survey from the Connected Commerce Council, 76% of small enterprises in the US said they rely more on digital tools than before the pandemic and that without their use, a third would have had to close part or all of their business.

Photo by ThisIsEngineering from Pexels

However, the attitude towards technology implementation is not uniform: some companies do not feel ready to adopt digital services and are reluctant to accept changes, even when operating under normal circumstances. Any halt to normality, or a crisis, can highlight the value of deploying new technology. I don’t mean dramatic innovations like the implementation of artificial intelligence or the Internet of Things. I’m talking about using technologies that facilitate operations, such as cloud-based or more convenient software.

Expectation of cloud adoption versus reality

Although cloud and SaaS are still buzzwords and their adoption rates considered high, many small businesses of up to 250 employees still use on-premise solutions. According to a survey from Analysys Mason, cloud-based applications are the top priority for these businesses, and 60% of them are planning to increase spending on cloud services. However, the survey also revealed that on-premise solutions still dominate in all types of services – including productivity, procurement, and business management software, among others.

The COVID-19 lockdown revealed the extent to which companies are ready to move the entire office to work remotely. Those that only have on-premises infrastructure may have struggled, as their IT administrators would not have had the tools or knowledge to manage employees’ desktops remotely.

Photo by panumas nikhomkhai from Pexels

Uncertainty, risks and compliance issues, and a lack of resources are all common reasons to resist making the move to cloud solutions. Lack of resources in particular is cited time and again, with IT managers of small and medium companies often having to maintain their infrastructures on a very limited budget or without any at all. With many businesses currently more focused on meeting immediate demands, it is understandable for strategic visions to be put on hold. But, as soon as the crisis is over, it will be important to bring back priorities and make adjustments to IT operations according to lessons learned.

Resistance to change

Sometimes, even small changes – such as software improvements that are designed to simplify usage – are met with mistrust.

Let me give you an example from our experience at Kaspersky. We regularly update our product features and functionality to enhance the user experience, such as, turning processes from manual to automatic to simplify security management. However, customers get used to manual actions and our support team often receives feedback asking for features to return to the previous way of working.

Photo by bongkarn thanyakij from Pexels

For example, in older versions of our endpoint security product for Windows, there was an option to manually manage a security application update, run and stop it. In later versions, a seamless upgrade was introduced to reduce the number of manual operations for IT administrators, meaning there was no ‘update’ button any more. The updates rolled out automatically when it was necessary, even when no one was working on a device.

Our product support team received dozens of requests from customers about this update, as they believed the product worked incorrectly. Most of the requests included questions like where to find the manual function, how to use it in the new version, why it has disappeared, and how to bring it back. As well as a reluctance to change, this reaction also highlights a key lesson for us as a vendor: all improvements should be explained to customers very carefully so they understand and buy into the benefits.

Change is scary but inevitable

COVID-19 has brought huge challenges for many small businesses. But if there is one positive to take from the situation is has to be the readiness for changes. All of the examples highlighted above are not only about taking a conscious decision to move to the cloud or a new way of working. It is about making a change to your overall mindset. Businesses should be open to new ways of doing things, especially if it simplifies their work. Changes don’t need to be wholesale, but small ones that make daily routines that little bit easier. During challenging times – like the one we are experiencing – when businesses have to transform on the fly in order to survive, this mindset will serve them well. I personally hope that the current crisis will never be repeated, but it’s always better to be prepared for anything that might come your way.

6 Simple Ways To Make WhatsApp More Secure

WhatsApp has become one of the world’s largest messaging platforms. In fact, it’s the largest platform in Malaysia! The app is used by billions of people the world over and continues to grow even today.

Thus, it has become even more imperative that we take steps to make the platform more secure for ourselves. Here are a few simple measures you can take to make the platform that much more safe for you.

1. Take Control of Your Privacy

Did you know that you can control who is able to access and view your information? Everything from your profile picture to read receipts can be controlled from the app’s privacy settings. So, it’s pretty important that you review your settings on a regular basis to make sure everything is in order and up to date.

To access your settings, just launch your WhatsApp. Click on the hamburger menu (the three dots) on the top right; go to settings and head to account. In the account menu, you will see a menu for privacy. Here you can choose who can view your last seen, your profile picture, your status and even your about. Yes, WhatsApp has an about section. You even have the options to limit who can add you to groups. You’ll be able to choose from “Everyone”, “My Contacts” and “Nobody”.

2. Block Unwanted People

Ever since WhatsApp became a global phenomenon, we’ve had random people whom we don’t know adding us and sending us messages. Sometimes these messages can even be explicit pictures which no one asked for. While it’s impossible to not get messages from random people, you can block them if things get out of hand. Simply tap on the contact or long press the chat and you’ll get a few options, select block contact. You’ll also be provided with an option to report and block the contact.

3. Turn on Two Step Verification

Just like any other online account, WhatsApp has a two factor authentication option. For WhatsApp, this option allows you to keep prying eyes out of your account by requesting a one time pin when you log in.

Simply got to your account settings again, and head to the two step verification option and enable it.

4. Keep Track of your Account by requesting your account information

Did you know that you could request for your WhatsApp account information? Now, you do. It takes about 3 days from the day you submit your request. This option allows you to export a detailed report of your account information and settings. This includes your profile photo, group names and more.

All you have to do is head into you Account settings and click on the Request Account Info option and tap request report. In 3 days time, the information you requested will be sent to the email you have provided.

5. Turn off Read Receipts

Turning off those blue ticks will help you prevent people from tracking whether you’ve read their messages. This also allows you to dodge that person that’s been hounding you the past few weeks.

All you have to do is head into the Account settings and disable Read Receipts.

6. Delete and Report Spam

Many a time, the random messages we receive are usually people selling stuff or some Nigerian Prince with a fortune to giveaway. These unwanted spam and phishing messages pose a serious threat to your security. Once you realise that a chat is spam or a phishing message, make sure you delete and report the user to WhatsApp.

You can do this by tapping on the chat or group name, scroll all the way to the bottom and click on the Report option in red. You can also access this option when you click the three dots on the top right hand corner of your WhatsApp when your in the chat or by simply long pressing.

Once reported, WhatsApp receives the most recent messages sent to you by a reported user or group, as well as information on your recent interactions with the reported user.

While taking these steps are important, it is still best to remain vigilant and alert when you’re online. Even more so when you get random messages from unknowns. That said, don’t use privacy and security as an excuse to not keep in touch with your friends and family!

Nintendo’s Security Breach Could be Worse than Initially Reported

Earlier in April, Nintendo announced that it had experienced a security breach when it came to user Nintendo Accounts. The breach was initially pinpointed to those who had used their legacy Nintendo Network ID (NNID) to sign in to their Nintendo Switch. In their initial announcement, the company noted that there were about 160,000 accounts that were affected, but, now, weeks later, the number of accounts has nearly doubled to 300,000 accounts. Nintendo attributes this increase to the investigation that it has undertaken in light of the initial detection.

The issue came to light when an increasing number of users on the switch reported that their accounts were being used to make purchases that owners were not aware of. If you have a credit card or Paypal account linked to your Nintendo account, it would be prudent to check the transactions that have been done on the account in the past weeks. Users who have been compromised are also getting sign-in notifications from unknown devices via email.

Nintendo of America tweeted for users to activate their two factor authentication (2FA) for logins out of the blue prior to the initial announcement. However, with the increase in the number of accounts being compromised, it is increasingly more evident that if you have a Nintendo Account, you’d best reset your password and activate 2FA. Otherwise, you’re risking unauthorised purchases via your linked credit card or Paypal account. In addition to unauthorised purchases, sensitive data such as date of birth and more can be viewed by bad actors.

Nintendo’s latest console, the Nintendo Switch, has put the company on the map again as a serious contender in the gaming console market with over 5 million consoles sold to date. The company is sticking to its guns saying that less than 1% of its users are affected. However, with investigations ongoing, users are advised to take precautions.

Acronis Launches Cyber Protect to Empower Remote Work

Working remotely or working from home has become a constant reality for businesses amid the current COVID-19 pandemic. However, with work from home, service providers and businesses are facing greater cybersecurity risk than ever before. To that end, Acronis has introduced a new product, Acronis Cyber Protect, to help service providers and businesses fortify their defenses and empower their workforce to continue being productive remotely.

Acronis Cyber Protect is a solution made for managed service providers to ensure that they have all their bases covered when it comes to keeping data and work infrastructure intact and secure. The new offering from Acronis allows managed service providers to cover all their bases and provide a complete service when it comes to securing their clients and enabling them to allowing the mobile workforce effectively.

RDP Remote Connection to Corporate Network | Acronis Cyber Protect | Acronis Cyber Cloud Demo Series

The new offering can be boiled down to three main components: Anti-malware, Backup and Recovery, and Security and Management. Using the anti-malware services offered by Acronis, service providers are able to dynamically detect and prevent malware infections of devices. This includes data within up to date backups created with the Backup and Recovery services provided by the new offering. These backups are done automatically with next generation continuous data protection technology from Acronis. Providers are also able to provide remote support via the remote desktop service as well. Service providers are also provided a simple, unified console to manage all the relevant services.

The new Acronis Cyber Protect has been tested by German security institute, AV-Test. During the test, the new offering was subject to a set of rigourous tests to ensure that the offering was able to handle what it claimed to. Cyber Protect scored an impressive 100% detection rate with a 0% false positive.

Acronis Cyber Protect is available now via their official website. Interested parties are able to request a fully functional trial. The new product will be available at the same cost of Acronis Cyber Backup Cloud until July 31, 2020.

Acronis Cyber Protect Demo for Zoom Protection

Is Privacy Our Sole Concern With Contact Tracing Technology?

This week the Guardian reported an alleged ‘standoff’ between the NHSX (the digital innovation arm of the NHS) and tech giants Google and Apple regarding the deployment of contact tracing technology aimed at curbing the spread of the Covid-19 virus. The debate is on two predominant issues; first, the base technology to be used and second, how the data will be stored.

Sidestepping the first issue which sees Google and Apple aiming to implement their feature directly on a device’s operating system while the NHSX version requires a downloadable dedicated application, this article will focus on the issue of privacy arising from the second issue.

In essence, Apple and Google have insisted that if there is to be any collaboration between the NHSX and them for the purposes of contact tracing the storage of all data will have to be decentralised. The NHSX, on the other hand, is pushing for centralised storage of data.

What’s the difference?

Before deciding on one system or another, it’s best to understand the basics of the distinction between these systems.

A centralised system has a single storage point and controller of the data collected. The central controller of the data may grant access to other users but remains ultimately responsible for the system as a whole. A centralized system is relatively easy to set up and can be developed quickly. Such a system is very useful where continuous modifications to the parameters of the system are expected or where the use of the data needs to be adapted for different purposes.

In contrast, a decentralised system has multiple controllers of data all of whom collect and store copies of the data on their respective systems. This system allows for quicker access to data and less risk of downtime as a fault with one controller will not necessarily affect the others.

The third form known as a distributed system in which there is no single central owner at all and instead gives collective ownership and control to each user on the network is unlikely to be used by either party.

Each system has its advantages and disadvantages and to make a decision between a centralised and a decentralised system the NHS and the tech giants will need to take into consideration a range of issues including:-

  1. The overall effectiveness of the technology;
  2. The adaptability of the system to the shifting demands of research;
  3. The cost of deployment and maintenance;
  4. Whether or not the system is a security risk for the user;
  5. Whether there are compliance concerns.

Why is a decentralised system so important?

Google and Apple have been clear that the reason for a proposed decentralised system is to avoid the risk of mass government surveillance presently or in the future. This is a genuine concern as the data being collected will be directly related to a user’s location and medical history. Although not absent from criticism, this position is the preferred option and has been supported by academics and numerous civil rights groups including the Electronic Frontier Foundation and the American Civil Liberties Union. 

Still, the European position is split with the seven governments supporting the project known as the Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT) which proposes a centralised repository of data and a growing following for the Decentralised Privacy-Preserving Proximity Tracing (DP-3T) advocating a decentralised system.

The NHS itself may not be intent on surveillance however being publicly funded draws immediate speculation to its government links. In addition, both the NHS and the UK government have had a poor record of handling large scale IT projects such as the failed £11bn National Programme for IT, scrapped in 2011 and the plans for a paperless NHS by 2018 which could not even take off.

What about the NHS position?

Unfortunately, the focus on privacy risks coupled with the NHS’s bad track record in the field of technology projects have detracted from the core issue at hand – What does the NHS need right now to curb the spread of the Covid-19 virus?

Ross Anderson, an advisor to the NHS on its contact tracing application highlighted the problem with a decentralised system:-

…on the systems front, decentralised systems are all very nice in theory but are a complete pain in practice as they’re too hard to update. We’re still using Internet infrastructure from 30 years ago (BGP, DNS, SMTP…) because it’s just too hard to change… Relying on cryptography tends to make things even more complex, fragile and hard to change. In the pandemic, the public health folks may have to tweak all sorts of parameters weekly or even daily. You can’t do that with apps on 169 different types of phone and with peer-to-peer communications.

(https://www.lightbluetouchpaper.org/2020/04/12/contact-tracing-in-the-real-world/)

The Covid-19 virus took approximately 2 months to infect 100,000 UK residents and the spread has shown few signs of a slowing infection rate. Time is critical in this situation and correspondingly, flexibility in adapting to the constantly changing nature of the infection is a necessity. Decentralised systems do not allow for rapid evolution.

In addition, we should consider that unlike centralised systems, decentralised systems are often unencrypted. While trying to prevent a government from carrying out surveillance, the Google and Apple system may inadvertently open itself up to more security problems than expected. In fact, they have themselves admitted this risk stating that nothing is “unhackable”.     

As a second consideration, the API that Google and Apple will release will likely have strict limitations on the type of data that may be collected. For example, the NHS would not be able to gather a list of every person a user has been in contact with based on user proximity. Instead, it will utilise a more manual version of contact tracing involving sending every phone in the system a list of other phones that have been reported as contagious, and asking the user whether they have “seen this user” Such a system relies heavily on user verification which is often incorrect or simply disregarded.

Key location data which may be used for developing population flow maps and anticipating the further spread of the virus will likely not be made available under Google and Apple’s current proposal. It is also important to note that data from contact tracing could be used beyond the scope of curbing the spread of the virus i.e. for decisions on directing the flow of emergency aid, development of temporary healthcare facilities, deployment of healthcare equipment and personnel.   

What has been going on elsewhere?

Contrasting the UK’s situation, the Asian experience, having less stringent data protection regulations, have taken remarkably different approaches to Europe in general.

Hong Kong, for example, introduced the mandatory use of an electronic wristband connected to a smartphone application to enforce quarantine for arrivals from overseas. Users refusing to adopt this requirement are refused entry into the country.

South Korea won praise for both tracking and publishing data relating to affected person’s travel routes and affected areas, the data being collected through the government’s application as well as numerous independent applications. Residents also receive numerous location-based emergency messages and are not allowed to opt-out of this function.

China’s measures, which have come under considerable question, see a private entity collaboration through the Alipay Health Code. Citizens are given a ‘traffic light’ status that determines the restrictions that will be imposed on them. Although the exact basis for determining a person’s status is not known the status has widespread application including restriction of access to certain public facilities and payment systems.

Privacy concerns of these measures aside, all these countries have seen a considerable reduction in the spread of the Covid-19 virus. While it would be premature to suggest that this is solely attributable to the contact tracing measures implemented there is no doubt that the quick and extensive deployment of the technology has contributed to the battle against the virus’ spread which begs the question:

Is privacy getting in the way?

In 1890, Brandais and Wallace, pioneers of modern day privacy wrote:-

…To determine in advance of experience the exact line at which the dignity and convenience of the individual must yield to the demands of the public welfare or of private justice would be a difficult task…

The UK and indeed Europe are at this juncture and need to decide on the cost of the compromise as the death toll and infection rate continue to increase. History reminds us that the greatest privacy and surveillance violations occurred when the world was focused on a raging war and in fact it is times like this that we must be most vigilant about rights.    

COVID-19 isn’t Just a Biological Pandemic, It’s A Cyber Security Pandemic

The COVID-19 pandemic is one of the most unprecedented events to have occurred in the past decade. In fact, the last time a major pandemic hit was in the 1910s. Since then, there have been milder pandemics which have occurred more recently in 2009 (Influenza A H1N1). The world has changed drastically since these pandemics. That said, the fact that the world is so interconnected and digitally dependent, makes the COVID-19 pandemic even more unique.

It wouldn’t be too far-fetched to say that with the COVID-19 pandemic, we’ve learnt that pandemics aren’t just about being biologically compromised anymore. In fact, Flavo Aggio, the Chief Information Security Officer at the World Health Organisation (WHO) attributes more than 15,000 deaths worldwide in this pandemic alone to the cyber attacks that healthcare agencies such as WHO face on daily basis. What’s more apparent is the number of cyber attacks related to COVID-19 have increased substantially since the pandemic began. Great Horn, a cloud-based security platform, reports that currently about 2% of email traffic related to COVID-19 comes from malicious players looking to get access to pertinent, personal information. Other security companies have reported that the number of cyber attacks linked to the COVID-19 pandemic have more than doubled since its emergence.

Proof is in the Pudding – Increased Cyber Attacks are putting Patients& People at risk

In the most recent attack against the WHO, a malicious hacker group known as DarkHotel setup a site to mimic WHO’s internal email page in an effort to get login information of WHO employees to access sensitive information. The group’s activities were first detected by Alexander Urbleis, a cyber security expert and attorney at Blackstone Law Group in New York. Urbelis mentions that he detected the site’s activation on 13 March.

Image by Gerd Altmann from Pixabay

This attack comes from the group after it vowed not to attack healthcare agencies and research centers during the pandemic. That said, the WHO was able to fend off the attack without getting compromised.

However, this hasn’t been the only COVID-19 based attack. During the same time, Brno University Hospital was forced to shutdown their technological services. This was due to a breach in cybersecurity which forced the hospital to take preventative measures. The attack compromised the health of all of the patients who required advanced testing. It forced doctors and nurses to chart manually which caused delays in care.

Perhaps more alarming is how hacker groups have also been targeting research centers and pharmaceuticals. Hammersmith Medicines Research (HMR), one of the companies involved in developing a vaccine for SARS-CoV-2, the virus causing COVID-19, reported that it was part of a ransomware attack. This attack compromised the information of about 2,300 patients involved in trials. The group behind the attack demanded money after gaining access to the files. These patient files have since found their way to the dark web, making them vulnerable to further compromise.

Image by S. Hermann & F. Richter from Pixabay

It’s becoming increasingly obvious that while malefactors are targeting healthcare institutions and companies, the ones who truly pay the price are the patients. With their data at risk and treatments being delayed or interrupted, we are seeing a larger, more worrying pool of victims.

Compromised Cyber Security Could have Lasting Effects

That is only the tip of the iceberg. With pertinent patient information in the wild, these patients have been exposed to a larger cyber threat; one that could be even more devastating to them after the pandemic. Information such as their addresses, social security and passport details are now available online – if you know where to find it. Another question remains: “Were these patients informed of such a data breach?”.

With the compromised information, malicious players will be able to gain access to a number of things including bank accounts and other important accounts. In fact, hackers will able to social engineer this information to gain access to emails, social media and more by simply connecting the dots. The fact of the matter is, most passwords and logins are linked to a person’s social history or items like their social security numbers.

Image by 1388843 from Pixabay

These breaches have potential psychological and physical repercussions that not many are aware of. Being the subject of a data breach or having an email or bank account compromised as a result will result in lost time and psychological stress. Keep in mind, that some of these attacks hold your vital information ransom and demand for money. This would definitely lead to increased anxiety.

Personal Hygiene Must Include Your Digital Footprint

It can’t be any more obvious that we are in an age where our digital lives are increasing intertwined with our daily lives. Even in an epidemic, we are seeing the effects of cyber attacks on our daily lives Hence, with attacks on the rise, users like you and me must also take precautions to protect our digital footprint. It is as essential as washing our hands and avoiding touching our face in this pandemic.

Source: Kaspersky

We can start with one simple step – pay attention to the details. Kaspersky has reported that there has been an uptick in look-a-like domains since the onset of the COVID-19. In particular, when it comes to authoritative domains. In particular, they’ve highlighted an email supposedly from the CDC (Center for Disease Control) in America. The official domain for the CDC is cdc.gov; however, emails have been sent from an email from cdc-gov.org. The small difference when it comes to this domain could be the difference between getting compromised or getting official information.

The next step you can take is, like washing hands, spend a little time refreshing your passwords. Good password hygiene is essential to keeping your information secured. Look at changing your passwords on a bi-monthly, if not monthly basis. If you’re working in an industry that requires heightened security and privacy, you know that they have policies that require you to change your password every 3 months, at the very least. So, why are you worth any less?

One of the most basic things you can do for increased security is to activate two factor authentication (2FA). When you activate 2FA, you will be prompted to give an additional item for authentication. This will help verify your identity. That said, activating 2FA is no excuse not to change your password on a regular basis.

With these steps as a starting point, you’ll have better security on the internet. That said, it’s just a start. Don’t get too comfortable with yourself when it comes to internet security. With more and more attacks focused on taking advantage of lapses of judgement, we need to be more alert. Even when we’re searching for information, it’s important we pay attention to the details, check website addresses and keep vigilant on the links in your email. While things may seem bleak, it’s no excuse to stay away from the internet. Just be more alert and vigilant and enjoy one of the best inventions since sliced bread.

Coronavirus Puts Remote Work Security to the Test

*This article is contributed by Kevin Reed, CISO, Acronis*

As authorities worldwide work to contain the deadly coronavirus and try to keep it from spreading, the travel restrictions put in place are causing many organizations to rethink their operations. Rather than traveling to a region where their return flight might be at risk of being quarantined, many are turning to videoconferencing, file sync and share, and other remote work solutions to keep their businesses going. In China, where the disease started and where remote work policies are historically uncommon, the remote collaboration tool Zoom saw a single-day increase in downloads of 15%.

Source: Acronis

Remote work can certainly benefit a company, encouraging more collaboration and knowledge sharing. That’s why its adoption has grown significantly in the last several years. In fact, the global enterprise file synchronization and sharing (EFSS) market is expected to reach $24.4 billion by 2027, up from $3.4 billion in 2018.

Yet the wrong solution can put organizations at risk if they don’t address data security and privacy. To combat this predicament, businesses need to implement secure file sync and share technologies so that employees can work from home while also being able to access and transfer data in a manner that is both secure and safe.

What is file sync and share?

File sync and share technology is designed with the modern professional landscape in mind; a landscape where workforces rely on multiple devices and location flexibility in order to maximize productivity. File sync and share gives organizations the power to share files across multiple devices and with multiple people using file synchronization – allowing files to be stored in any approved data repository and accessed remotely by employees from any of their IT provisioned devices.

Security risks associated with remote work

Historically, remote work policies have been a sensitive topic for organizations. While some employers might fear that remote work creates a dip in employee performance, the larger concern is actually securing the proprietary and business-critical data modern companies rely on.

On a corporate network, IT teams can easily secure employee devices, but this becomes much more difficult to do once an employee accesses the system from outside the network.

Outside of the corporate network, devices are easily susceptible to attacks from third parties and cybercriminals. Attacking these unsecured endpoints can reveal the employee’s login credentials to cybercriminals so they can access the company’s system, or even use ransomware to lock company data – which happened to the NextCloud service last fall.

Benefits of secure file sync and share

Solutions that are built to deliver secure file sync and share give organizations the flexibility to enable employee collaboration and productivity while giving the IT department control over the protection of company data. Here are some of the ways that secure file sync and share technology protects and empowers businesses:

  • Secure File Sharing – It’s well known that when a file sync and share solution isn’t provided, employees will often resort to using their own personal devices and tools. Because these tools and devices exist outside of the control of IT departments, they’re inherently not secure and put sensitive company data at risk. With secure file sync and share, employees can easily share and access company files while IT maintains the privacy and security of the data.
  • Easy Anywhere, Anytime Access ­– Organizations are beginning to see the workday less as a clock-in/clock-out office environment, and have adopted an environment that supports the various schedules and lifestyles of their employees. With secure file-sync and share, employees are no longer constrained to a single corporate-owned device to be productive.
  • Data Loss Prevention and Disaster Recovery – When corporate data is centrally stored, it’s better protected against data leakage. This includes data lost to a cyberattack, employee error, or a lost or stolen device. With an enterprise-grade file sync and share solution, sensitive corporate data is kept secure and protected.
  • Easy Collaboration – File sync and share services are adapting to not only protect company data but to aid in remote workplace collaboration. Some file sync and share tools now provide users with tools to preview and edit files in-browser, search and find specific company documents and versions, and keep all employees on the same version of a document.

Final Thought

While global emergencies such as the coronavirus outbreak may highlight the benefits of having a secure remote work policy in place, the use of secure collaborative tools should be understood as part of a larger cultural shift. As more organizations adopt remote work policies, the IT teams, and MSPs that service these companies should adopt secure file sync and share solutions.

To help organizations introduce remote work policies in a way that is safe and secure, MSPs can offer their business customers Acronis Cyber Files Cloud, a secure enterprise file sync and share solution that features end-to-end encryption, user controls, and an audit trail.

Similarly, organizations that do not rely on an MSP can choose Acronis Cyber Files Advanced, an easy, complete, and secure enterprise file sharing solution that makes users more productive and gives IT complete control over business content to ensure security, maintain compliance, and enable BYOD.

[Cisco 2019 CISO Report] A Good Year For Malaysia

CISO stands for Chief Information Security Officer. From that description alone, we believe you would know what this report is about then. If you still do not; Cisco did a study for the cyber security field for 2019 by interviewing about 2,000 Chief Information Security Officers (CISO) or security professionals all over Asia Pacific. You would be glad to know also that about 10% of the participants in the study are Malaysian. While that does not change the nature of the study, the sample size should mean that there is some accuracy in the general scheme of things.

Source: Cisco

The Big Numbers

The big numbers for Malaysia are 44% of threat alerts are investigated, 46% of the recognised threats are neutralised, and 27% have faced downtime of longer than 24 hours due to a cyber security breach or threat. There are some good things about these numbers, and some bad things too. So it is not all roses and rainbows for Malaysia’s cyber security industry in 2019.

The first of the numbers are the investigated threats. This does not mean alerts. Receiving cyber threat alerts and investigating them are two different things. You can have threat alerts of more than 10,000 and still not investigate any of them for a number of reasons. Still, investigated threats are escalated from reported threats.

Source: Pixabay by VIN JD

According to the Malaysian numbers, 44% of threats reported in Malaysia are investigated in 2019. That is 4% more than 2018, Malaysian CISOs are busier by 4% last year 2019 than in 2018 then. That could be due to the raised number of serious threats. It could also mean that awareness to cyber threats have increased in Malaysia. So while it does sound like Malaysia is being attacked more, it also means that Malaysians are now better prepared for cyber threats or breaches.

Out of all the verified threats, nearly half of them were remediated at 46%. That number is higher than plenty of Malaysia’s neighbours and the average in Asia Pacific at 43%. The other half? Maybe those cases could be a little tougher. Still, that also means that Malaysians are capable of handling cyber security issues. This number is also an increase from 2018.

The next big number is 27% of companies declared a downtime of more than 24 hours when they get attacked. This is a large increase from 2018’s 9%. While this may not seem like a good thing, there is a bigger story that than. For one, this also means that Malaysia is plenty more digital in 2019 than 2018. This increase could also be because of the increased threat detection in 2019. The result was also a higher resolution to each identified threat.

More Vendors, More Problems?

It seems only yesterday that having multiple layers of security is a good thing. Like plenty of things, throwing money at something should solve a problem. Those were the days.

There used to be a time when organisations like banks would recommend having about 10 security vendors to layer security in all parts of their organisation. In some sense, it works; but it is very expensive, and very inconvenient for users. That is not yet considering the fact that having multiple vendors and that many layers of security increases complexity in controlling and managing the solutions.

The new way to think about cyber security then is to keep the number of vendors down to as little as required. This reduces not just complexity of workflow and simplifies management, but also increases the efficiency of managing cyber threats.

From the Malaysian numbers though, this seems to be a slightly new concept with more than 35% of the responding organisations having more than 10 vendors. While this is slightly lower than 2018’s 39%, there is still a need to reduce that number even lower. Malaysians realise that too, with 90% of respondents finding it hard to manage that many vendors at the same time. Some experts suggests that having five to six vendors at a time is enough for a holistic cybersecurity system to be in place for any organisation.

The Problem With Cybersecurity Malaysia

There are still looming problems for a country that is going through a major digital transformation though. While the progress toward a digital Malaysia and Industry 4.0 has been a steady one in the region, there are still fundamental problems that might hinder progress or create holes in the cyber armours that the CISOs have put up or tried to put up. One of these enemies to cyber security is budget.

There are times where companies might have a large constraint over budget. For most SMEs and startups, it is quite understandable. They would probably need to pool their money in things that they might find more useful to them in the shorter run. That is not saying that it is not a problem for them or the general cyber security state in Malaysia. It is still a problem, but an inevitable one.

There are cases with large organisations that has restricted their budgets to cyber security because they do not yet see the value in cybersecurity. This becomes a major issue for CISOs. Despite the consensus that more money may not mean more protection, cyber security still needs a pool of money to work with. If not enough money is being poured into the department, not much can be done. With less protection, larger organisations are more vulnerable and thus, might lose even more money.

The biggest problem with cyber security, not just in Malaysia but most of the world, is always personnel; both the lack of skilled workers and awareness of the main issue. Thing is though, CISOs all over Malaysia are also making efforts to reduce this number down with plenty of awareness and skill training of personnel all over the company. The number of skilled personnel in terms of cyber security in Malaysia is also growing continuously, which also means that it is a problem that can be solved in time.

So What do We do in 2020?

2020 is meant to be the year of progress, of near complete digital revolution. It is the year of 5G and WiFi 6, the year where data is meant to be all covering and seamless. That potentially means more cyber security risks with bigger data bandwidth and less latency. It gives software less time to react. Which means that a DDoS attack could be a big thing in 2020.

Source: Pixabay by Stefan Coders

Still, awareness is key to combating cyber attacks. With the availability of data in today’s world, having a VPN no longer cuts it. The only benefit of VPN these days is to ensure that whatever that you have accessed is not tracked by your data or service provider. You are still at risk of a cyber attack even via VPN.

The fact that you have multiple devices that are connected to the internet and each other is already a threat on their own. At every point and turn, you really have to be aware of what you are accessing on the internet and what you are vulnerable to. That allows you to be more alert on things like phishing attacks, malicious links, email scams and what not. That should be enough as the first layer of defense against common cyber attacks, maybe even big ones like ransomware and what not.

If you are planning on getting an Anti-Virus software protection on your PC, consider spending a little more than what you would pay for a generic Anti-Virus program. You might want to look into find an Anti-Virus program that covers the whole lot from spyware, adware, to even malware. That way, you are ensured of a holistic protection, at least on your own end.