fbpx

Security

Category: Security

Why An Insurance Company Secretly Paid $40 Million In Ransom

News of cyber attacks and large ransoms are not new. With the spread of technology, such attacks are often followed by panic, increased cybersecurity measures, and exposed vulnerabilities. One such incident took place in late March 2021.

The victim, in this case, was CNA Financials, one of the US’s largest insurance companies. After hackers blocked access to the network and stole data, CNA Financials reportedly paid $40 million to the hackers to regain control. This could be one of the largest ransomware payments to date. Coming just a few weeks after the Colonial pipeline attack, it shows the increasing cost of ransomware attacks.

Digging Deeper into the CNA Financials Ransomware Attack

CNA Financials announced the hack in March. It called the ransomware attack a “sophisticated cybersecurity attack” and confirmed that it had compromised several CNA systems. While the company called for help from outside experts and law enforcement, they ultimately negotiated with the hackers.

The demand placed by the hackers was $60 million reportedly. However, CNA engaged in negotiations, and the hackers settled for $40 million.

The company claimed that record systems, claims, and underwriting systems were not affected by the attack. A spokesperson for the group refused to comment on the ransomware payment. However, the group behind the attack was supposedly “Phoenix.” They used the Phoenix Locker software that is a “Hades” spinoff.

While the spokesperson maintained that systems that hold most of the policyholder data were unaffected, the hefty ransom is certainly causing concern. The FBI warns against paying ransom in case of such attacks. They maintain that such ransom payments will give attackers and cybercrime groups more incentive to carry out further episodes of the same fashion.

Implications of the Ransom Payment

$40 million paid by CNA Financials is one of the largest ransoms for a cyberattack. This is undoubtedly an incentive for hackers. It gives them the confidence required to carry out such attacks.

In general, it has been observed that the average cost of these attacks has risen rapidly over the past years. The number of organizations choosing to pay ransom has increased from 26% in 2020 to 32% in 2021. However, only 8% of these organizations get their data back. While it is easy to warn against paying a ransom, it is hard to practice when data is at risk.

This also implies that companies have to spend more resources securing data and mitigating risks before an attack occurs. This might be the only way to prevent or at least reduce such attacks. In this age where data is the ultimate driving force for most companies, such large ransoms are sure to attract more attackers to try their luck.

The only sure way to stay protected is by staying one step ahead and keeping track of and managing vulnerabilities. The rising attacks and steep increase in ransom demands signify that companies and governments need to implement policies that protect data.

Why are Zero-Day Vulnerabilities Becoming More Common?

Cybersecurity and ethical hacking have come a long way in the past decade. However, the gap between security solutions and hackers is still very transparent. Even with the best security practices and modern analysis tools, we’re seeing many zero-day vulnerabilities being discovered every day. Zero-day vulnerabilities are those that weren’t previously known to the manufacturer or the client.

There are several reasons for which zero-day vulnerabilities are becoming more and more common every day. This article will explore why these vulnerabilities still exist and what we can do to reduce them.

Primary Reasons for Seeing an Increase in the Zero-Day Vulnerabilities

1. Availability of Resources

As cybersecurity is gaining more and more heat in the IT space, the number of resources available in the field is also increasing. The issue with the increasing resources is that most cybersecurity resources are not entirely focused on defense. Ethical hacking is a part of cybersecurity. However, since there is no way to monitor these resources, hackers gain access to these resources and improve their skills.

Even though the abundant availability of resources is a major issue, we cannot take down any of them because they’re not illegal. It just depends on how the learner chooses to implement them.

2. Skill Gap in the Cybersecurity Industry

Currently, there is a significant skill gap in the cybersecurity industry. IBM estimated that there would be more than 6 million unfilled security jobs by the end of 2022. Since most of the Zero Day vulnerabilities are found in modern tools and software, it may not be possible to counter the zero-day vulnerabilities without closing the skill gap.

The dynamic nature of the security field is not helping freshers much in the field. Most companies require the applicants to have some sort of security certification which may not be easy for early professionals.

3. Secure Designs

Secure designs, or rather the lack of them, is another primary reason for the increasing number of zero-day vulnerabilities. New apps and software programs are being released every day all over the world. However, not a lot of these apps are securely designed to prevent any exploits. The lack of a secure design is leading to a lot of undiscovered vulnerabilities in thousands of applications.

What Can We do to Counter Zero-Day Vulnerabilities?

The one thing that we can do to mitigate zero-day vulnerabilities is to follow safe design practices. Wrong implementations are one of the major causes of the discovery of zero-day vulnerabilities. If we manage to cover that gap, we can reduce a lot of zero-day vulnerabilities.

We can do a few more things to prevent zero-day vulnerabilities, like promoting cyber defense instead of offense, starting bug bounty programs, etc.

However, we may continue to see more zero-day vulnerabilities unless the skill gap in the industry is closed.

Why 70% of Business Leaders Feel Their Cyber Risks Are Increasing?

A few years ago, only one in every four companies did business on the internet. Today, 100% of companies rely on the internet for their business operations. Unfortunately, with this increased digital adoption comes the risk of cyberattacks.

Around 70% of business leaders accept that they are now more vulnerable to cyber attacks, as they increase by 10% every year, resulting in a significant revenue loss.

To put things into perspective, cyberattacks and data theft are amongst the top five risks faced by CEOs, according to the World Economic Forum report on global risks.

This post will discuss why organizations are shifting to more robust digital infrastructure and the effects of this adoption.

Why Is Cybersecurity Awareness Increasing Among Business Leaders?

1.     More Sophisticated Cyber Attacks

Cyberattacks are growing at an average rate of over 10% every year.

On top of this, hackers are constantly adapting to new ways to bypass the security systems. For example, cybercriminals are now launching attacks on industrial control systems rather than just focusing on data theft. Further, data is not only being copied or sold by malicious attackers. Instead, data is being destroyed and altered, causing distrust among every stakeholder. As for techniques, hackers heavily launch people-based attacks such as insider attacks, phishing, social engineering attacks, etc.

2.     Media Coverage Resulting In Loss of Trust

Customer trust is at the center of every business.

A cyberattack makes the company a headline. There will be media reports everywhere citing the amount of user data leaked. Honestly, no customer will do business with such a company if they cannot promise data integrity.

On the other hand, if a business succeeds in inducing more trust among their customers as compared to their competitors, the business will enjoy a wider customer base. It is no wonder why higher security standards are becoming a marketing tool.

3.     Increasing Losses

Globally, it is estimated that around $5.2 trillion is at risk due to cybercrimes.

The average cost of a malware attack for an organization is around $2.1 million per annum. On the other hand, malicious insider attacks cost organizations $1.6 million every year.

If we consider each type of cyber attack, the annual cost of a cyber attack for an organization stands at $13 million.

4.     Regulatory Fines

Regulations like General Data Protection Regulation (GDPR) and  California Consumer Privacy Act (CCPA) hold organizations accountable for not using customer data responsibly. In case of consumer data leaks, companies are heavily fined. GDPR has fines up to $23 million or four percent of annual global revenues. On the other hand, CCPA imposes small fines of up to $7,500.

There is no denying that such economic disincentive inspires more accountability. However, it also increases the financial burden of companies in case of cyberattacks.

All these factors push organizations to invest more in their cybersecurity infrastructure. Companies are investing in technologies like blockchain, cloud services, AI, ML, as well as security intelligence threat sharing applications like SIEM, DLP, NGFW, and IPS to name a few.

These investments save significant costs for companies. For instance, security intelligence and threat sharing save around $2.26 million, whereas AI and automation save around $2.09 million.

A More Secure Digital World

The increasing cybersecurity adoption will slowly create a more secure place for digital interactions.

One of the major benefits of strengthening cybersecurity infrastructure is data integrity. Data is the lifeblood of this rapidly digitizing world. Cyber attacks not only harm business, instead, everyone is at risk. When hospitals are targeted, millions of patients are at risk. Cyber attacks on the country’s defense system compromise national security. When cybercriminals attack large industrial systems, they put a dent in the entire economy. Considering all this, strengthening digital security will play a major role in the nation’s economy, and security.

Improving cybersecurity infrastructure will also promote responsible digital behavior. Let’s be honest, people are the weakest link in cyber attacks. Insider hacks, phishing, and social engineering attacks are amongst the most popular ways to intrude an organization’s security firewall. Companies are thus providing extensive training to their employees against such risks to build a digitally robust workforce. Further, they are also helping customers to adopt more robust security measures.

Conclusion

Cyberattacks are indeed the biggest challenge for digitization. However, organizations are attempting to improve their cybersecurity infrastructure to provide their customers a secure digital environment.

How Using The Same Passwords For Work & Personal Can Be Disastrous

So you’re signing up for a brand new account, and the dreaded ‘Password’ text box pops up. Since you don’t want to risk picking a standard password, or worse, a password that you won’t remember, you do the next best thing and enter your personal account’s password. This may seem like a great idea because you’re choosing a secure password that only you know. However, the reality might be a bit more alarming than you imagined.

Every new online account requires a fresh password that can be quite frustrating to come up with, and it’s clear that many people agree with this. Microsoft estimates that around 73% of people use duplicate passwords for their accounts. If you consider the sheer number of people who go online, this number becomes extremely large, making it a significant problem.

Why is Reusing your Passwords an Issue?

All of our online accounts are connected in one way or another. For example, when we sign up for an account, we usually attach an email address to that account. Our social media apps all require an email address to confirm a person’s identity. Even professional platforms like LinkedIn have a list of all our details right on the profile page. Although this connection is highly convenient for online users, reusing passwords can put your accounts at risk.

If even one of your accounts were to get compromised, this could lead to the other one getting breached, too. All the hacker has to do is look for an account with relatively weak security and work their way up from there. This is especially true if you’re a person who has a ton of different accounts with overused passwords. Cyber breaches happen all the time, and once your personal mail gets broken into, it can be very tricky to get it back. Your information can get stolen in a matter of minutes before you even notice that anything has gone wrong.

One of the most common causes of data breaches is poor passwords, and it’s easy to see why. We’ve seen many companies put measures in place to stop this issue from occurring, but a majority of people still reuse passwords. The bottom line is, when a single password is all that stands between a cyberattack and your account, you need to make sure that the password is as complex as possible.

So What Can You Do To Solve this Problem?

The reason why people tend to keep reusing passwords is that they forget them. No one can properly remember around ten different unique passwords for their accounts. It’s simply not very plausible, unless you have a little assistance with it. Using a password manager can help you save several complex passwords on your devices without having to remember them. This makes it an easy and quick solution.

Another useful tool is two-factor authentication. Many companies use this tool to strengthen their online user accounts, and some places like Google have even set up multi-factor authentication tools. This helps strengthen the security of your account immensely. Doing a regular reset of your account passwords can also be a great way to avoid compromising your data, but this task can be quite challenging to follow through with. In case you’re looking for a quick fix, you could add a few characters to an already existing password to strengthen it.

There are many options out there, so pick the ones that are best for you. Whichever way you choose, just remember that having a solid password will help secure all your accounts and keep your online presence much more protected.

Smishing Attacks Increased by 328% in 2020!

The COVID-19 pandemic forced everyone inside their homes, pausing all physical activities for a few months. As a result, all activities shifted to online mode, and cyberspace saw more users than ever. While digital communication and economy made it easier for people to navigate through the lockdowns, it also exposed users to cybersecurity risks.

The pandemic saw an exponential increase in cybercrimes such as phishing, hacking, ransomware, cyberstalking, harassment, etc.

According to Proofpoint’s report, smishing attacks increased by 328% in 2020 alone. These attackers have been exploiting people’s fear associated with COVID-19 to send malicious messages via email, SMS, or web pages.

What is Smishing?

Smishing or SMS phishing means sending fraudulent text messages to coax victims into revealing private information or installing malware. Cybercriminals send these messages to steal credit card details or other sensitive information such as usernames or passwords to private accounts.

Attackers typically disguise themselves as reputable organizations sending these text messages to deceive the victims. Instances of smishing have particularly increased multifold due to internet and smartphones reaching even the world’s remotest corners.

Smishing attackers use social engineering techniques to deceive message recipients into revealing private and financial information. For example, during the holiday season, you could receive a text message from a seemingly well-known retailer asking you to verify your billing information to get your gift package delivered. The information you provide could then be used for identity theft or potential fraud.

SMS phishers could also distribute spyware or malware through these fraudulent text messages. These messages typically create a sense of urgency for the recipient to click on the link attached to the message. This link then leads to unsafe or bogus websites that can install malware on your device.

Some of the common smishing attacks you need to watch out for are:

  • Urgent messages about your financial information, including credit card or bank account details
  • Notifications about winning prizes or lotteries
  • Fraudulent survey links
  • Phony messages pretending to be from trusted brands

Was the Spike in Smishing Circumstantial due to COVID-19?

Yes and no.

COVID-19, much like any other newsworthy event, gave cyber criminals an opportunity to hoodwink people across the globe. The widespread infection and death rate caused by coronavirus instilled fear in people, and they quickly fell prey to fraudulent messages about COVID-19.

Text (SMS) messages are a more direct and trusted method to contact people. According to Symantec, 1 in 20 COVID-19 related messages contained phishing attempts.

Attackers use URL shortening services to hide the domain names and URL destinations from the malicious links they add in SMS. Unsuspecting, vulnerable people in the coronavirus-struck world didn’t think twice before clicking on such links. Symantec also notes a spike in phishing attacks using COVID-19 related SMS messages after it was declared a global emergency by WHO in March 2020.

However, cybercrimes like SMS phishing do not appear or increase only during times of emergency crisis like the COVID-19 outbreak. With technological advancements and people becoming increasingly dependent on their smartphones and other devices, cybercrimes have been on the rise. Whether it’s a period of recession, war-like state, holidays, cybercriminals leave no stone unturned in deceiving digital users.

It seems like cybercriminals are always two steps ahead. Even with cybersecurity updates and robust software to detect and report cybersecurity risks, cybercrimes have not subsided.

Now, with vaccines out in the market, criminals have found new vaccine-themed deception tactics. As always, technology is a double-edged sword. With the life-altering benefits come the security risks. One can only stay smart and alert to avoid these risks from causing damages.

How to Protect Yourself from Smishing?

Smishing attackers target unwitting victims who will be easy targets. You can easily avoid being a victim by being aware. Look for poor grammar or spelling mistakes in these messages. Also, malicious links included in SMS messages are often slightly altered to make them look legitimate. For example, amazon.com could be written as ama.zon.com. Having software like anti-spyware or anti-virus on your device is also a good idea.

Ways To Avoid Backfires From Your Employee Monitoring Program

Every effective team leader, manager, and business owner has a set of practices in place to monitor employees. This could be to monitor performance, workplace behaviour, or even progress. Whatever the reason, employee monitoring can help you identify the best way to utilise time and resources.

A 2018 Gartner report stated that 50% of organisations, among a list of 239, monitor employee emails and social media, while a 2019 Accenture survey brought to light that 62% organisations used new tools in order to collect employee data. This number has undoubtedly gone up in recent times. The key here, however, is to successfully monitor employees without creating any friction.

Why Employee Monitoring can Backfire

There are a number of reasons why employee monitoring can backfire. Some of the most common among them are listed below.

  • A feeling of continuously being monitored could cause increased stress and anxiety among employees. This may lead to them finding “blind spots” that are not monitored, which would be detrimental to the overall productivity.
  • If employees are constantly monitored, you may feel obsessed to pick out the minor details, which would lead to resentment and a feeling of being micromanaged. This would also affect the overall productivity of the workplace.
  • A feeling of lack of privacy, or mistrust might cause employees to look for another organisation, which would significantly affect your retention rate.

While these are all difficult to spot, it could affect the overall nature and environment of your workplace. It could cause both the workplace productivity and employee health to take a hit. That is why it is important to find a healthy boundary, and establish steps to use the monitoring programs without these side effects.

Image by mohamed Hassan from Pixabay

How Can You Avoid These Backfires With Your Employee Monitoring Program

Here are some ways to utilise your employee monitoring program without having to deal with unsatisfied, stressed, and disgruntled employees.

Be Transparent With Your Employees

The first step to good monitoring is to let employees know that they are being monitored. Also ensure that they know why you are monitoring and be open to feedback. You can even explain your concerns, disclose what data will be monitored and how it will be used. Transparency is the best way to make employees comfortable with the fact that work is being monitored, while avoiding any feelings of mistrust.

Monitoring, not Surveillance

The ability to monitor might be quite addictive, as you get a sense of control. It is important that you do not micromanage, and get rid of unnecessary monitoring. You need to understand that the idea is to improve overall productivity, not pick out flaws. It is unnatural to always expect employees to be on their most productive.

Also ensure that you are able to guide employees as to where they are lagging, what they are doing right, and so on. If possible, hold regular sessions to discuss progress and take their opinions into consideration.

Have Policies in Place

Make sure you have made a copy of your monitoring policies available to employees. Check that it is legal and compliant, and let employees know the details so that they can adapt to it.

Use Dedicated Tools

Use tools and software that you know are secure. You would not put your client’s details at risk, and you should be equally careful about your employees and their privacy. Make sure your tools use all the major metrics required, without disturbing the work of employees.

 

These steps should make sure that your monitoring actions do not backfire in the office!

How Worms & Other Malware Spread Laterally Across A Network

Cybersecurity is an important part of anyone’s online presence. Unwarranted attacks can make most individuals and organisations prone to many negative repercussions, which is why there are a number of initiatives taken to actively educate people about malicious software and their effects.

While these measures often help individuals identify potential threats and take a few necessary precautions, most people still wonder how a malware attack on their system could compromise the entire network. Understanding this would help users pay close attention and prevent such attacks from happening, thereby reducing the number of security breaches.

What is Malware?

Malware is generally used to describe any software that is distributed with malicious intent. This could damage your systems, steal data and cause a general environment of chaos. Some types of malware include viruses, Trojans, spyware, worms and so on.

What are Worms?

Photo by JJ Ying on Unsplash

Worms are a form of malware that take advantage of existing security vulnerabilities in your system. Thus, they act almost like their real-world counterparts and make your system vulnerable to further attacks. They try to reach as many hosts as possible. Their aim is not to inflict serious damage; the most they will do is slow down your system or the network. This is usually done by using up hardware resources or bandwidth.

Worms nowadays also carry a payload, which is malicious code. These can directly attack your system and create vulnerabilities for other attacks. For example, in 2004, a Mydoom worm contained a payload that let hackers gain remote access to systems. This was then used to perform a DDOS attack on the website of SCO Group.

How Do They Spread?

Many malware types like viruses require you to click on a link or download an infected software or attachment before they do any harm. But there are certain types of malware that can spread laterally across a network. An example of this kind of malware is worms.

There is a huge variation in the makeup of worms and other malware, but there are similarities in how these spread. Keeping this in mind, let us take a look at how these malware spread laterally between networks.

Once malware like a worm attacks a system, it uses this machine’s network connection and seeks out machines connected to the same network. It might mask as network packets or can even spread through P2P or network-based filesharing or network servers.

It then uses network-based vulnerabilities on the machine to spread from one system to the next. This is quite possible, especially with old and unattended machines. It is also true for machines that are not updated or secured using anti-malware software. They create something generally referred to as “internet background noise”. This is because such malware is constantly scoping out other machines connected to the vulnerable networks and spreading to them using network vulnerabilities.

How Can You Prevent This Lateral Spread of Malware?

You can protect your system and the entire network through your router. A router is a firewall that helps stop these attacks. This means that machines cannot connect inwards to your system. If the only kind of connection is an outbound one from your system, it is improbable that such an attack occurs.

You can be protected from local machines by simply using the Windows Firewall, which helps reject unsolicited requests from other machines, even if you are on the same local network.

You can also prevent this by using multiple routers and a separate guest access router that minimise your risk. It also pays to be careful about the files you share and attachments you download.

Spoofing Professional Identities Has Never Been Easier Due To LinkedIn

LinkedIn — one of the world’s most influential platforms for business professionals — has progressed over the past few years. However, with its rapid growth, LinkedIn has experienced a budding problem with fraudulent profiles.

In the majority of the cases, these fake profiles have attempted to collect information from other legitimate profiles, along with a good-looking photo, to make the request look valid. But connecting with a fraudulent account can provide scammers access to vital information about you, including the details about your company, addresses, and professional contacts.

Scammers can use this powerful information to craft detailed and convincing phishing and other scams. Because of these risks, it’s best to know how to spot fraudulent LinkedIn accounts, and to ensure you do not connect with them. However, before we proceed onto the steps to avoid falling prey to phishing attacks, let’s understand what phishing is.

Image by Tumisu from Pixabay

Phishing Attacks

Phishing is a fraudulent attempt to collect confidential information online, including professional contacts, usernames and passwords, company information, and bank and credit card details. Most phishing attacks are conducted with the scammers impersonating themselves as a trustworthy individual in digital communication.

LinkedIn now has over 760 million users, with more than 260 million monthly active users. It is one of the largest professional and trustworthy platforms used by businesses and people for career progression. But it also consists of people who carry out criminal activities.

LinkedIn Phishing Attack Methods

Put simply, LinkedIn is one of the most popular sites for criminals to obtain user information and other sensitive information with phishing attacks.

Lately, there has been a rise in LinkedIn phishing attacks. Given below are some of the most common methods for conducting LinkedIn phishing attacks that you need to look out for. Scammers might use some or all of these tricks.

Connections with Fake LinkedIn Accounts

On LinkedIn, users are motivated to develop connections and engage with them on a professional level. However, not everyone has good intentions. Social media platforms are filled with fake profiles, and this form of scam is popular on LinkedIn because of the professional nature of the platform.

What’s wrong with fake LinkedIn members? Phishing attacks. These scammers are known to develop a rapport with their targets via posts/emails/comments/messages. As LinkedIn is a professional platform, it’s easier to trust all the profiles in the platform.

Pretending to be an Authentic Profile on LinkedIn and Obtaining Information

If you are active on LinkedIn, you might be familiar with getting tons of emails. Scammers and attackers have used this to their advantage by forwarding messages pretending to be LinkedIn. This type of scam will usually be in the form of a fake email sent from a profile impersonating a business professional. This email may comprise a hyperlink that is requesting more personal data. Once visited, you could be directed to a website that looks exactly like LinkedIn. This page will ask you for your personal credentials, and after entering it, your credentials will be forwarded to the scammer.

LinkedIn In Mail Scam

This scam is sent in the form of a direct message via the inbuilt messaging system and typically contains a link to a malicious website, which the hacker could use to collect personal information or to try and get you to download virus-infected software onto your laptop.

Final Thoughts

Given below are some of the few tips to help you protect against phishing attacks:

  • Avoid responding to emails asking you to install any suspicious software.
  • Avoid emails or direct messages containing poor grammar or writing.
  • Check the email address of any emails appearing to be forwarded from LinkedIn. Avoid the ones that are being from a profile other than LinkedIn.
  • Even if you click a link on a message or email, check the certificate of a website.
  • Check the validity of the email by logging into your LinkedIn profile; the notification should be present in there, too.

Dark Web Marketplaces Are Selling Your RDP Credentials

Remote Desktop Protocol or more popularly known as “RDP” attacks have been the primary focus for attackers and hackers during the COVID-19 crisis because of the increased work from home (WFH) scenarios. RDP is a proprietary protocol, or a technical standard, developed by Microsoft that gives people remote access to a desktop computer by connecting to another machine or virtual apps through a network connection.

RDP credentials are being sold on dark web marketplaces for as low as $3. The credentials allow hackers and criminals to spy on companies without resorting to malware. The sale of RDP credentials is allowing attackers to retrieve data from firms in government, healthcare, retail, education, and other sectors.

Here’s everything you need to know to protect your confidential data.

Why Are Attackers Interested In It?

Hackers and attackers are aware of the fact that employees are spending their time working from home via remote access. This means that most organizations — both big and small — trust their confidential data to pass via RDP. While the proprietary protocol is reliable and effective, many IT companies fail to make security their priority.

When employees use easy passwords without multi-factor encryption and additional authentication layers, it becomes easier for attackers to use RDP to gain access to sensitive data. Besides, this opens the door for data breaches, espionage, and more. In forums on the dark web where RDP access credentials are being sold, merchants offer access to thousands of computers for as less as $3 for Windows XP to $9 for a Windows 10 system.

Attackers can gain access to a remote network with the correct password. Moreover, ransomware teams use this protocol to execute their attack, thereby promoting their status to admin, disabling the security software, and encrypting company networks.

A team of researchers at Flashpoint have been examining authentic criminal marketplaces that sell RDP data and have gained access to global networks up for sale.

One of the most popular underground forums selling access to such networks is ‘Ultimate Anonymity Services’. It offers over 35,000 RDP credentials for sale in different countries for a range of Windows Operating Systems (OS).

The group behind the store posts ads in Russian and English, and similar to most Eastern European-based operations, UAS doesn’t sell credentials of Russian accounts. The researchers found thousands of credentials in India, China, and Brazil for sale in the store. It mostly offered credentials for targets across the U.S., particularly around California, Virginia, and Ohio.

How Can You Make RDP More Secure?

The best way to protect your systems against this vulnerability is by using a blend of brute-force attack monitoring and dark web monitoring techniques. The former alerts the admin of failed login attempts, while the latter determines the employee login data that has already been sold online. However, to avoid vulnerabilities found in previous versions, it is crucial to ensure that the latest version of the protocol is being used.

Organizations can shift to Windows Virtual Desktop. Its robust management, inbuilt security, multi-session Windows 10 capability, and optimizations for Microsoft 365 apps makes it the perfect solution. On the other hand, OneDrive can also be installed to access files securely or for file-sharing purposes.

Other alternatives include a virtual private network (VPN) using MS Terminal Services Client. However, at the 2019 DEF CON hacking conference, the majority of security flaws in the most popular VPNs were revealed.

The Bottom Line

If your company is using RDP, you need to be in touch with cybersecurity professionals to ensure that your network has the highest level of security. Azure has some excellent inbuilt security options for Windows Virtual Desktop and is increasingly becoming the best choice for businesses to replace outdated and less secure RDPs. Secure remote network setups are available for businesses of all sizes — only if you know where to look.

Biometrics As-A-Service Allows For New Innovations, But At What Cost?

Biometrics as a Service: Innovation at a Cost

Modern technology and the internet have allowed businesses to provide virtually anything as a service. Everything-as-a-service is convenient for the customers and profits the enterprises, making it a trendy, feasible business model.

Biometrics is no exception. The application of analytics on biological data, biometrics is a trending vertex between technology and biology capable of identifying and verifying people. Biometric technologies such as fingerprint, retina, and facial scanners are already becoming a significant part of technology. From our phones to secure door locks, we see biometric technologies all around us.

However, companies today are selling biometric data to buyers, allowing businesses to track virtually any human they wish.

Biometrics as a Service is becoming a popular stream that’s home to countless innovations in the field of AI. But there are certain risks associated with BaaS that are a threat to your privacy.

In this post, we’re going to explore Biometrics as a Service, its advantages, its dangers, and the future of BaaS. Let’s begin!

What is Biometrics as a Service?

Biometric data such as fingerprint and retina scan are helping countless industries become more secure with reliable verification. As biometrics becomes alluring to an increasing number of businesses, Biometrics as a Service has become an alluring alternative to purchasing biometric technologies.

In a nutshell, Biometrics as a Service is a company that keeps records of everyone’s biometric data and maintain servers that run biometric software. This company leases the data and/or biometric software to other enterprises.

Taking advantage of cloud computing, companies can identify people using their biometrics without ever having to maintain their own biometric database and technologies!

The Benefits of BaaS

The main advantage of biometrics as a service is that businesses can quickly add and adapt to biometric data, software, and infrastructure with little investment of time and money.

A prevalent use case for BaaS is companies don’t have to keep any biometric database while they can easily verify the identity of employees and/or customers. They don’t require any software or infrastructure, and thereby no special biometric IT staff.

A more serious use case for BaaS is for the government and law enforcement agencies. Police can tie up with biometric service providers, using which they can simply upload a photo of the victim or a blood sample, and the biometric software can provide all the crucial details of the criminal.

The Dangers

While BaaS makes biometric data faster and easier to access, record, and maintain, there are serious privacy issues concerned with the same.

To begin with, promoting BaaS is also promoting the centralization of data. This means a single company has essential data of a lot of people in the world. In a world where data is empowering entire businesses, this can be dangerous.

Moreover, as an individual, you might not want to have your biometric data in the hands of a private organization. However, as BaaS becomes more prevalent and biometric companies gain access to your images on social media, your privacy becomes endangered.

Ultimately, BaaS without regulations will make you less valuable than your data. Any organization can get your biometric and other data and use it to manipulate your behaviour and influence your choices.

The Future of Biometrics as a Service

The market has grown by over 17% in 2020 and is predicted to grow more in the years to come. Given its important benefits and grave dangers, what does the future hold for BaaS?

At present, biometrics is almost entirely focused on market products such as phones and laptops that have fingerprint and facial recognition. However, law enforcement agencies such as American detective units in sex crimes are typing up with private companies such as Clearview AI to identify targets.

In the future, law enforcement will become much faster and easier thanks to biometric software and infrastructure made available as a service.

Nevertheless, it’s crucial that the governments worldwide set limitations to what a BaaS company can do with the sensitive data of its citizens.

BaaS must be limited to law enforcement and a select group of organizations; it needs to be kept away from private companies and malicious parties. As long as biometric data is kept away from unregulated third parties, BaaS can prove extremely useful for identity verification and tracing down convicts, amongst other applications.

But with the data in the wrong hands, BaaS will become an auction system where your sensitive data will be sold to companies that bid the most, making you less valuable than the data you produce.

1 2