Nestec partner portal

Sve važne informacije na dohvat ruke. Pristupite partner portalu ili se registrirajte ako nemate otvoren račun.

Ponude, računi i licence

Svi važni dokumenti na jednom mjestu. Svoje ponude, račune i licence možete preuzeti u bilo kojem trenutku.

Online narudžbe

Sve Vaše licence možete naručiti izravno kroz nestec web-SHOP.

NESTEC PARTNER - Prijava

Ostani prijavljen
Blog Post Selected Article

Prevent cyberattacks with Zero Trust Policy

In the first few months of 2022, mobile malware cyberattacks on Android devices 1 have increased by 500%, making them a popular target for attackers. With the growing importance of mobile phones, they have become an easier target since it is more difficult to spot spoofs.

The X-Force Threat Intelligence Index 2022 2 revealed that this year, at least 62% of organizations worldwide were subjected to a supply chain attack. In this type of attack, cybercriminals enter enterprise networks through vulnerabilities or compromised devices present in the network of a third-party or partner who is part of the value chain or supply chain.

As per Cybersecurity Ventures, ransomware is projected to exceed $265 billion annually by 2031 3, additionally, ransomware has entered cloud environments. Organizations must watch for the following: ransomcloud attacks, IoT threats (especially IoMT threats), supply chain attacks, attacks against operational technology (OT), attacks against mobile devices.

Adopting security measures

Companies can adopt proactive security measures such as the adoption of Zero Trust network architecture and security solutions with SOAR capabilities to safeguard their security environment in the future.

Zero Trust is a security approach based on the principle of "never trust, always verify. It requires that each user and device be verified and authenticated before they are granted access to any resource, regardless of whether they are inside or outside the organization's perimeter.

To achieve this, Zero Trust uses a combination of tools and technologies.

Senhasegura is a privileged access management (PAM) solution that can help organizations implement a zero trust policy by providing several features to enforce a zero trust security model, including:

Just-In-Time Access: With Senhasegura, privileged users are granted access to systems and applications on a "just-in-time" basis. This means that access is granted only for the specific amount of time needed to perform a specific task, and is revoked immediately afterwards.

Least Privilege: Senhasegura allows organizations to enforce the principle of least privilege by limiting user access to only the systems and resources that are necessary to perform their job functions.

Multi-factor Authentication: Senhasegura provides multi-factor authentication (MFA) for privileged accounts, which adds an additional layer of security beyond simple username and password authentication.

Session Monitoring: Senhasegura provides real-time monitoring of privileged user sessions, allowing organizations to detect and respond to anomalous behavior in real-time.


Summary

The cybersecurity demands of an organization keep increasing every year, with an endless list of compliance requirements to follow and increasing piles of enterprise data being generated. It is essential to keep up with the latest trends in the cyber space to ensure an organization is up-to-date on its defense strategy.

By implementing a PAM (Privilege Access Management) solution like Senhasegura, organizations can improve their security posture and enforce a zero trust policy by limiting privileged access, monitoring sessions, and requiring strong authentication.


Sources:

1 https://www.proofpoint.com/us/blog/email-and-cloud-threats/mobile-malware-surging-europe-look-biggest-threats

2 https://www.securityhq.com/reports/ibm-x-force-threat-intelligence-index-2022/

3 https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/

About autor

Jurica Parsic IT Support Specialist

A seasoned professional in data backup & disaster recovery, virtualization and cybersecurity with more than 5 years of experience in this field. Working closely with global vendors, IT resellers and IT service providers to develop a deep understanding of the technologies, processes and best practices involved in ensuring security and business continuity for a wide range of organizations, from small businesses to large corporations.