The post Internet of Things spending in APAC to reach US$437B in 2025 appeared first on CIO Tech Asia.
]]>
Asia Pacific spending on Internet of Things (IoT) will expand by 9.6% in 2021, accelerating from 1.5% in 2020. The latest release of IDC’s Worldwide Semiannual Internet of Things Spending Guide indicates a gradual growth of IoT market in the region across the forecasted years (2021-2025) and is expected to reach $437 Billion by 2025 with a CAGR of 12.1%. This growth is driven by increased adoption of location tracking, facial recognition, remote working, cold chain logistics & tracking of vaccines, video-centric application, and deployment of 5G in the region.
“IoT in the Asia Pacific excluding Japan (APEJ) markets continues to grow steadily across multiple industries including transportation, retail, manufacturing, resources, and utilities driven by the increased capacity and reliability of fiber and cellular network infrastructure,” says Bill Rojas, Adjunct Research Director at IDC Asia/Pacific. “In many Phase I projects enterprises focused on a single use case and on acquiring the data streams from single sources but as the organizations gain a deeper data-driven understanding of their operations, they can start to use other data sources (such as geolocation, machine maintenance data, weather, transactions activity, vehicular telemetric traffic data, and so on) to improve their analytics and expand beyond the original use case,” Rojas adds.
Discrete and Process manufacturing will be the largest source of IoT spending in APEJ, with one-third of the shares in 2021, followed by consumer and government, respectively. Businesses continue to open, and economic activities get back to normal, which has increased the confidence of the organizations. Accelerating technology investments, especially in manufacturing, retail, transportation, construction, and consumer sectors are on focus. Industries that will experience the fastest growth in 2021 are Construction and Retail, with a growth of 13.1 % and 13%, respectively.
Use cases that are driving IoT spending growth in 2021 are Manufacturing Operations, Production Asset Management, Omni-Channel Operations, Smart Grid (Electricity), Smart Homes, and Freight Monitoring which follows a similar pattern – with spending growth as host industries. The use-cases related to healthcare such as bedside telemetry, remote healthcare monitoring will continue to be one of the fastest-growing use-cases in 2021, along with Omni-Channel Operations, Environmental Monitoring Detection, and Connected Vehicles. Governments and organizations are focusing on use-cases that emphasize public safety and reduce human interactions and environmental impact.
“Enterprises no longer think IoT value is only limited to achieve operational efficacy and improved productivity. They see IoT as an enabler in the evolution of enterprises’ requirements and challenges in an ever-changing business environment. Many organizations are willing to invest in digital technologies such as IoT, AI to fully leverage the new expansive role of data in emerging digital business models,” adds Sharad Kotagi, Market Analyst at IDC Asia/Pacific.
The services market for IoT will be the largest technology group in 2021 and through the end of the forecast. IoT services spending is dominated by Industrial Implementation and Other Ongoing Services. Together, these two categories account for roughly a third of all IoT spending. Hardware spending is dominated by module/sensor purchases and will be nearly as large as IoT services. Software will be the fastest growing technology category with a five-year CAGR of 15.1% with a focus on application and analytics software purchases.
From a geographical perspective, China, Korea, and India will account for more than three-fourths of overall IoT spending in APEJ throughout the forecast, followed by Australia and Indonesia. Increased focus on building smart infrastructures such as wider connectivity coverage, 5G deployment, public wi-fi zones, smart grid, and initiatives like smart cities, Industry 4.0, and special economic zones are the main driving factors for the IoT growth in the countries across Asia Pacific region. Countries that will see the fastest IoT spending are Hong Kong, Singapore, and Malaysia.
The Worldwide Internet of Things Spending Guide forecasts IoT spending for 9 regions and 53 countries at 19 technology categories and 81 named use cases across 20 industries. Starting with this release of IDC Worldwide IoT Spending Guide, the IoT services forecast will be split into Industrial Implementation, Ongoing IT Services (IT Outsourcing & Support), Other Ongoing Services, Project Oriented and Strategy and System Design at the maximum level of detail, across regions, industries, and use cases. This provides tech buyers and providers with an effective new tool to understand how the plethora of IoT use cases call for multiple connectivity types, driven by different expectations in terms of latency, bandwidth, and data frequency.
The post Internet of Things spending in APAC to reach US$437B in 2025 appeared first on CIO Tech Asia.
]]>The post Securing identities core tenant of Indian organisations appeared first on CIO Tech Asia.
]]>Building digital trust across the ecosystem has become a defining indicator of a successful digital transformation journey. Enterprises are accelerating their investments in cybersecurity solutions on back of the increased threats during the pandemic. A significant number of breaches involve stolen credentials and passwords act as a key point of vulnerability.
According to the COVID-19 Impact on IT Spending Survey, conducted by International Data Corporation (IDC), close to 67 per cent of the organisations prioritised their focus on IT/cybersecurity to build digital trust for customers, employees, and partners. Digital trust programs have been identified as a major technology investment area by more than 70 per cent of the organisations, over the next two years to ensure long-term resilience and success of the business.
“Securing identities has become a core tenet of security, as identities can create walled gardens in the face of fading organisational perimeters and increasing workforce mobility. So, securing identities helps in establishing a digital trust with your employees, your customers, partners, and vendors,” says Gurpal Singh associate research manager IDC Asia/Pacific. “Identity and Digital trust (IDT) solutions offering pre-built integrations with on-prem, cloud and mobile applications, scalability, and extensible, are sought out for,” adds Singh.
Financial services, manufacturing, public sector, and healthcare sectors have a higher propensity for spending on identity access management and privacy management solutions. Multi-factor authentication has traditionally been the top investment area for enterprises. Seamless authentication became the norm as individuals are working from home. The COVID-19 pandemic accelerated the adoption of single sign-on (SSO), advance authentication, and B2C solutions. Analytics, artificial intelligence (AI), and machine learning (ML) are being leveraged to identify deviations in user behaviour in real-time.
India Identity and Digital Trust (IDT) Software market is expected to grow at a CAGR of 15.3 per cent and touch US$200 million by 2025. Securing and managing user identity and access has become a prerequisite for organisations intending to embrace remote work models or digital platforms in the new normal. As hybrid and multi-cloud adoption become the norm, IDT deployment on cloud is pegged to grow at a CAGR of 28.8 per cent over the next five years. In 2020 RSA, IBM, and eMudhra were identified as the top three vendors in India IDT market.
“Digital transformation initiatives have resulted in a paradigm shift in the security architecture requirements. Enterprises are increasingly evaluating identity-as-a-service (IDAAS)/ cloud-based models to provide secure access and offer platforms that integrate best-in-class solutions for a seamless experience. Password-less authentication is yet another trend which is expected to gather steam in the future as it helps reduce complete reliance on passwords, improves security posture, and enhances user experience,” said Shweta Baidya senior research manager, Software and IT Services at IDC India.
Tags: biometricsIDCIndia
The post Securing identities core tenant of Indian organisations appeared first on CIO Tech Asia.
]]>The post HCL Roundtable: Emerging AppSec Trends in 2021 and Beyond appeared first on CIO Tech Asia.
]]>In an era where data is more valuable than gold, cyberattacks in its multiple manifestations have dominated global headlines with account hijacking and injection attacks. Be it credential theft, brute force attacks, social engineering thefts or access control misconfiguration, the sophistication and damages are rising by the day. While the type of attackers may vary between ‘spray and pray’ opportunistic ones looking for easy pickings or high-profile targeted government espionagers, the business impact by these breaches is rummaging through to trillion of dollars.
The shift to a remote workforce in 2020 has highlighted the need for an approach to app development that has security built-in from inception. In the current digital landscape, security is essential to achieving business resiliency and maintaining quality while developing at the speed of DevOps. Prioritising speed without security in app development can lead to an uptick in critical vulnerabilities with disastrous results. To avoid this, organisations must address security earlier in the software development life cycle.
Cybersecurity Ventures1 media notes several eye-opening statistics which puts into perspective the importance of security in the new normal. Cybercrime damage costs are predicted to hit $6 trillion annually by 2021 and ransomware attacks on healthcare organisations — often called the No. 1 cyber-attacked industry — expected to quadruple. Cybersecurity Ventures expects that a business will fall victim to a ransomware attack every 11 seconds in 2021, up from every 14 seconds in 2019. This makes ransomware the fastest growing type of cybercrime. The recent attacks by SolarWinds and FireEye underscores that no organisation is immune to threats and attacks. Attackers are looking for ways to evade IT attention, bypass defences, and exploit emerging weaknesses. The fallout from this attack will likely capture a large proportion of attention of governments and Fortune 500 cybersecurity teams in 2021 and will result in rollout of more stringent cybersecurity policies especially targeting supply chain vulnerabilities.
A few hundred years ago, the Greeks, Romans and other mighty empires prided themselves on building impenetrable fortresses around their kingdom to protect themselves from outside invaders. There seems to be a similar theme when corporations in the 21st century invest heavily in perimeter security to insulate their ‘business data’ empire from outside threats. To some extend this does protect attackers from infiltering, however with the advent of a new era of Apps and IoTs and now with an accelerated change to ways of working during a global pandemic, the concept of only having a best-in-class perimeter security has received a timely wake-up call.
“Application security is really a partnership. In the past years, security has often been seen as a silo. And what we’ve learned along the way is that we need to have better alignment between software development and the security that we’re trying to put into it. And we have to be able to build that in throughout versus trying to bolt it on at the end.”, notes Robert Cuddy, Global AppScan Evangelist, HCL Software. He says “We need to understand and identify risk earlier when it’s easier to mitigate it and it certainly costs less to do that earlier in the process. That encompasses a whole gamut of things around visibility, reducing false positives – which we spend an awful lot of time doing, providing information for targeted remediation etc.” Cuddy observes that while we go with defence in depth and put in firewalls, network security and identity access management among a host of other things, organisations have to think both ‘outside-in’ and ‘inside-out’ which is where the application security piece comes into effect.
In his insightful blog2 Cuddy, rightfully observes that Security needs to be a business enabler, not just a gatekeeper. That means the Security professional needs to have alignment to the business. He goes on to explain that when great security practices are well-integrated throughout the software development lifecycle (SDLC), and meaningful, actionable feedback is provided to teams at all stages then risk is better monitored, managed, minimised and mitigated.
Security is a fundamentally foundational need that everyone involved in developing software has to embrace. This starts with developers and QA who have to provide data on whether a software or app can be made secure before committing to a release. The DevSecOps team must actively identify and manage risk through proactive planning, developing agile methods for continuous testing and making security a part of the overall product strategy. How to achieve Agile AppSec requires a focus on usability and accessibility to ensure the end user experience is functional, intuitive, and secure. The DevSecOps team must enable continuous testing and incorporate security as part of the process from design, development, through testing, and into the DevOps cycle.
Thinking like a hacker is probably the best way to do threat modelling to create mitigation strategies and security controls. Some of the usual threats to applications are broken authentication and session management, cross-site scripting (XSS), security misconfiguration, injection, cross-site request forgery (CSRF) etc. Being compliant, contrary to popular beliefs, does not make the environment ‘secure’. In fact, there is sometimes a false sense of security when compliance is not achieved with the right context of risk and threat mitigation.
The levels of sophistication and pace of attacks by malicious actors are increasing rapidly and security teams are doing their best to respond and recover from these attacks. The problem that analysts are facing are high volumes of alerts and noises which might more often than not be a false positive. A whitepaper3 by Netsparker finds that eventually developers and testers lose faith in vulnerability scanners that generate false alarms, and they begin to ignore a whole class of problems over which the scanner triggers false alarms. A vulnerability report means additional work, say 2-3 problems are reported as false alarms by certain tools, and human nature dictates that everyone starts ticking boxes and making mistakes, going so far as to consider a single false alarm as a huge problem of magnitude. Worse, if one of the remaining problems is a critical vulnerability that goes unnoticed, it will send a flood of false alarms into production without being caught and repaired, at high cost for later manual testing.
However, when dealing with a false positive, a lot more testing can be necessary until the developer decides that it’s a false alarm. Crucially, someone has to take personal responsibility for ruling against the scanner and signing off code where potentially serious issues have been flagged as false alarms.
In an agile development environment, automation is king – and manual security processes are not a feasible option at scale. DevOps and CI/CD teams rely on their automated tools to do the legwork so they can focus on tasks that require the creativity and problem-solving skills of highly qualified specialists. False positives in vulnerability testing can force testers and developers to put their streamlined automated processes on hold and laboriously review each false alarm just like a real vulnerability.
False positives can also be detrimental to team dynamics. Every time the security team reports a vulnerability, the developers have extra work investigating and fixing the issue, so reliability and mutual trust are crucial to maintaining good relations. This makes false alarms particularly aggravating, and if the vulnerability scan results burden the developers with unnecessary workloads, the working relationship may quickly turn sour. The dev team may start treating the security people as irritating timewasters, leading to an “us vs. them” mentality – with disastrous consequences for collaboration and the entire software development lifecycle.
The National Institute of Standards & Technology (NIST) conducted a series of studies on the effectiveness of Static Application Security Testing (SAST) tools. The study4 revealed that on average, AppSec tools have a false positive rate of an astonishing 30% of which another 36% was insignificant. False positives have been identified as one of the leading obstacles to implementing tools, with 90% of developers willing to accept false positives at a rate of 5%. The false positive issue creates an obstacle to the introduction of AppSec tools for developers.
Some guidelines to best practices in AppSec5 noted by CBTnuggets are shared below and these can be evolved to best suit the needs of your organisation in the ever changing fast and furious world of Information Technology:
When it comes to advancing DevOps practices and patterns for enterprises, human transformation is the most critical success factor. According to Jayne Groll, CEO of the DevOps Institute and author of the 2020 Upskilling Report6, “With the rise of hybrid (remote/in-office) product teams, upskilling and online training initiatives will expand. As the pressure continues to rise to sell products and services through e-commerce sites, apps, or SaaS solutions, the lines between product and engineering teams will rapidly blur, giving rise to cross-functional, multidisciplinary teams that must learn and grow together. Each member will need to develop a wider combination of process skills, soft skills, automation skills, functional knowledge, and business knowledge, while maintaining deep competency in their focus areas. Product and engineering teams will be measured on customer value delivered, rather than just features or products created “. He continues to explain that traditional upskilling and talent development approaches won’t be enough for enterprises to remain competitive because the increasing demand for IT professionals with core human skills is escalating to a point that business leaders have not yet seen in their lifetime. This beckons an update for our humans through new skill sets as often, and with the same focus, as our technology.
References
Tags: AppSecCyberattackDevOpsHCL SoftwareRansomware
The post HCL Roundtable: Emerging AppSec Trends in 2021 and Beyond appeared first on CIO Tech Asia.
]]>The post Ampol creates central Cloud-based repository appeared first on CIO Tech Asia.
]]>Ampol has now completely transformed the experience for all its users by creating a central cloud-based SharePoint repository of all the information that every employee might need.
It’s searchable and applies context according to who is searching for information and their current role. This has helped deliver “significant productivity improvements”, and “ensures compliance with ISO standards” – almost as though someone had waved a giant magnet over the haystack to pull out exactly what was needed when it was needed.
Previously branded as Caltex Australia, Ampol Ampol manages Australia’s largest petrol and convenience network and the organisation is now returning to its roots with the iconic Australian Ampol brand that harks back to 1936.
Besides overseeing the chain of fuel and retail outlets (which will all be rebranded to Ampol by 2022), Ampol refines, imports and markets fuels and lubricants, serving more than 80,000 enterprise customers in markets such as defence, mining and aviation and 3 million retail customers each week.
It operates 17 terminals, five major pipelines, 57 depots, approximately 730 company-controlled retail sites, 1,930 branded retail sites and a refinery in Queensland. More than 8,200 people work across the network.
Ampol operates in a complex, hazardous industry and so requires strong process management to ensure safety, regulatory compliance, and efficiency.
The range of tasks that those people perform is diverse – from maintaining heavy equipment in the refinery, opening a fuel valve on the service station forecourt, to heating a pie in one of the convenience outlets.
All of those tasks need to be done safely, efficiently and in accordance with an array of different standards and regulations, said Helen Lau head of Digital at Ampol.
Rather than simply lifting and shifting the once on-premise document management online, which delivered only limited benefits, Ampol went back to the drawing board and worked with a user experience designer and developer to map out how people actually used the system.
“SharePoint is almost like a Lego block – everyone can set up a SharePoint site in a matter of seconds,” she said. “But how do we address our user journey?” Taking a top-to-bottom review allowed Ampol to totally transform its document management system and ensure it was designed to respond rapidly to user needs and expectations, while ensuring the all-important compliance for the company.
Ampol used SharePoint’s search capability to help users find the document that they need. By applying metadata to each document, and speed the search, Ampol has been able to reduce the time taken to find a document from about one minute and a half to almost instantaneous access. Multiply that by the many hundreds of searches each day – typically 800 or more – and there can be significant productivity gains.
Importantly for Ampol there is also peace of mind that the user is accessing the right information, pertinent to their position and that it’s up to date and accurate, which is critical for compliance.
The smarts that the company has built into the system also apply context around who is searching. For example, if someone searched on a safety procedure for operating a valve, the system would know from the identity of the person accessing the system whether that was a valve in an oil terminal or a refinery which each require different instructions and follow different codes.
Ampol leveraged Microsoft’s Common Data Service to ensure all the workflow history was bought together in a single location with document metadata to enable contextual search and workflow automation.
For compliance purposes it needs to ensure that personnel follow the right procedure or work instruction associated with their job. The publishing workflow and the search configuration ensure only the latest and relevant document will be served.
Previously users would have to fill out a workflow form that contains 20-30 metadata fields to initiative a workflow and that process takes around 3-4 minutes per document workflow. With a smarter workflow engine and the system auto populating the majority of the fields, users now only need to review and click the submit button. Each workflow now takes less than 30 seconds to be triggered. The automation of field values also removed issues around workflow failures.
“We have had zero fail incidents on workflow since we launched and now it’s been probably six months, whereas previously we have about 15 per cent of our workflow bounce or error out,” said Lau.
Ampol developed the new document management system in-house, which Lau says has built up the skills and experience of the team.
“The big lessons learned from us is actually taking this from an end user perspective rather than us telling them what the system should be,” she said.
This was driven by Ampol’s UX/UI designer and developer actually spending the time observing and analysing what the user wants to see or what and how they access the information.
“It’s just a website, if you think about it, but how you lay out that website makes it simple for them to use,” noted Lau. “If you go to our document system now, it almost looks like a Google search – just a massive search bar in the middle and then some headings on the top saying ‘my items’ as in ‘my workflows’ or ‘my document’.”
The transformation of the document management system has streamlined access for users, and injected confidence across Ampol that tasks are being performed correctly, compliant with any codes or regulations, and efficiently.
While Ampol successfully completed the Cloud-based repository, according to its 2020 Preliminary Final Report and 2020 Financial Report – released in February 2021, the company noted that “other specific asset impairment due to review of company priorities across projects and future investment was undertaken to ensure a clearer focus on the organisational priorities post the COVID-19 impact resulted in ceasing IT projects.”
However cyber and information security was a high-ranking priority. The company stated “as a leading transport fuels provider and convenience retailer, Ampol faces an ever-evolving cyber security threat. Ampol must be able to detect, prevent and respond to these threats by maintaining a high standard of information and cyber security controls.”
In order to achieve this Ampol’s information technology (IT) and systems were subject to regular review and maintenance, and business continuity plans are in place.
“Ampol actively monitors and responds to potential local and global IT security threats. The Ampol Risk Management Framework (ARMF) has been developed to proactively and systematically identify, assess and address events that could impact business objectives.”
Tags: AmpolCaltexCloudCybersecuritySharepoint
The post Ampol creates central Cloud-based repository appeared first on CIO Tech Asia.
]]>The post Airport Authority HK works with LA International on digital health passes appeared first on CIO Tech Asia.
]]>Recently the Airport Authority Hong Kong (AA) together with its business partners and Los Angeles International Airport conducted a trial of digital health pass at Hong Kong International Airport (HKIA).
Aimed to provide a simple and efficient means of health document check and verification process on both ends of a passenger journey, the trial was conducted with Los Angeles International Airport, Cathay Pacific, The Commons Project, one of the major digital health pass developers for international travel, and Prenetics — a COVID-19 test provider.
In the trial, air crew members of Cathay Pacific role-played as passengers and took the COVID-19 test at HKIA’s testing centre. Test results were sent to these passengers through the mobile application in the form of digital health pass which were presented to the airline staff for check-in. Upon arrival at Los Angeles International Airport, the role-playing passengers presented their digital health pass to local staff for validation and entered Los Angeles successfully.
Vivian Cheung executive director Airport Operations of the AA said the COVID-19 tests and vaccinations are poised to become new essentials for air travellers in the future, a digital solution is required to effectively integrate this new requirement into the existing digitalised travel process, from laboratory to check-in and to landing.
HKIA has been collaborating with major hub airports in the world to facilitate the adoption of digital solutions to tackle challenges such as trustworthiness of paper reports, diversified and dynamic entry requirements across countries and regions, long queues for passengers for document check, and labour-intensive checking duties for airline staff.
“Resumption of air travel in a safe way is our top priority,” she said. “Traffic recovery is hard to be sustainable with manual handling of the paper records without error to match the requirements of each country, which could also be changed from time to time.”
Tags: Airport Authority Hong KongCathay PacificHong Kong International AirportLos Angeles International Airport
The post Airport Authority HK works with LA International on digital health passes appeared first on CIO Tech Asia.
]]>The post Hong Kong Airlines to trial digital health passports appeared first on CIO Tech Asia.
]]>Hong Kong Airlines will trial a digital health passport as part of the carrier’s ongoing contributions towards the safe reopening of borders and international travel.
Developed by the International Air Transport Association (IATA), Travel Pass will provide travellers with easy access to COVID-19 entry requirements for their destination and accredited testing centres at their point of departure. The app also enables passengers to link their COVID-19 test results to a digital version of their passport created through the app.
Under this trial, Hong Kong Airlines will work closely with IATA to test its Lab App, a key module in Travel Pass. Passengers on a selected route will be invited to participate by first downloading the app and creating a digital profile before selecting a participating medical service provider for testing. A secure, encrypted channel will then enable the registered laboratory to verify the passenger’s identity and directly send the outcome of the COVID-19 test, or proof of vaccination to the traveller’s mobile device.
This will then be checked against IATA’s global registry of COVID-19 health requirements, a system used by the majority of airlines and airports globally, to ensure regulatory requirements are complied, before the passenger receives an “OK to Travel”, said Chris Birt director of service delivery at Hong Kong Airlines.
“Hong Kong Airlines has been working hard to make travel safe for our customers. We welcome the opportunity to contribute our inputs into the development of Travel Pass and will continue to support IATA’s efforts in leading the recovery of international travel,” he said.
Recently Hong Kong Airlines used a new e-Boarding Gate facility to clear passengers for boarding on a flight between Hong Kong and Taipei using a facial recognition procedure at the gate, without the need for documents.
Birt said these self-service facilities not only minimises contact with surfaces and interaction with people, it also offers a seamless kerb to gate experience and shortens boarding time.
Tags: e-Boarding GateHong Kong AirlinesInternational Air Transport Association
The post Hong Kong Airlines to trial digital health passports appeared first on CIO Tech Asia.
]]>The post COVID-19 has no impact on A/NZ’s managed security services spending appeared first on CIO Tech Asia.
]]>
Tags: Australian Cyber Security CentreCybersecurity
The post COVID-19 has no impact on A/NZ’s managed security services spending appeared first on CIO Tech Asia.
]]>The post BeyondTrust Roundtable: Tackling Critical Microsoft Vulnerabilities appeared first on CIO Tech Asia.
]]>With the disruptions in operations caused by the COVID-19 global pandemic, most organisations in the APAC region have been prioritising keeping the lights on. “They’ve been focused on keeping operational resilience and access to resources for employees who are obviously working from home”, noted Andrew Milroy principal adviser at Ecosystem Research during a recent virtual roundtable hosted by Focus Network and Beyond Trust.
Milroy pointed out that every day, the AV-TEST Institute registers over 350,000 new malware and potentially unwanted applications (PUA) and fighting against this giant enemy with traditional, reactive cybersecurity measures is challenging.
Early this month, Morey Haber CISO and CTO at BeyondTrust, and author of three books on the matter, offered his “unique perspective” at the virtual roundtable to about 20 leading CISOs and heads of IT security from Singapore, Thailand, and Indonesia. According to Haber, CIOs and CISOs are faced with their weakest links being their “users”. About 99 per cent of compromises are due to end users interacting with systems, primarily phishing attacks — they’re clicking on unknown links.
In 2020, more than 850 vulnerabilities were found in Microsoft products. The OS is full of vulnerabilities, that includes the latest Windows 10, which is used on 70.98 per cent of Windows computers as of March 2020.
The end-user is running programs they shouldn’t; and they’re basically being socially engineered to give up information or do something that could be detrimental to the environment.
Haber gave an interesting example of where an employee might get an email from human resources, requesting an update to their information — just in case there’s a COVID crisis. The employee clicks on the link thinking they are entering a standard response to update their HR information; however, they’ve clicked on a website that’s stealing their credentials.
That’s why users are a common challenge for the cybersecurity community today and considered even by Verizon’s data breach report – to be the number one attack vector.
During the virtual roundtable, the discussion centred around changes to the work environment and how a CISO must tackle cyber security beyond the office building and the desktop. Which brings a whole set of challenges for privileged access security, application control, and the threats that have evolved.
According to Haber, COVID-19 and other environmental factors have people working from home posing a potentially greater risk for unsecure networks and unsecure wireless networks.
Haber noted these workers might have to be given admin rights while working from home so they can add their home printer or conduct other business-related tasks with their own machines. However, CISOs and CIOs won’t necessarily have visibility into the hardware. Other users might also be operating on a BYOD device or other types of problems that might have verifying compliance.
Kok Fong Lee SVP risk and control from Singapore DBS, noted the organisation didn’t have an issue with BYOD because it doesn’t allow outside hardware. “Remote workers anywhere or contractors use our company laptops,” he said. “We’ve been mobilising staff for many years as part of our transformation journey.”
For those who haven’t mobilised staff like Singapore DBS, many of the employees working from home and uses privileges with admin rights to do administration in the cloud, or on-premise, said Haber.
“Privileged users are at home, but they still need to log in as an administrator, or even as a database owner to perform their tasks,” he said. “Those are all attack vectors that are ripe for threat actors and represent new and evolving challenges to cyber security that we have to consider.”
BeyondTrust’s Microsoft Vulnerability Report 2020 brings key findings that shed some light in this matter.
“Microsoft announced 192 critical vulnerabilities in 2019 across every major Microsoft product, from Internet Explorer, Edge, Office, Server to workstation,” Haber stated. “[These] could have been prevented just by removing admin rights. Think about it for a minute — if I remove admin rights from end users — whether on the server, or on desktop/laptop, that I’ve issued while they’re working remotely, I can mitigate the vulnerability exploit combination for 77 per cent of these vulnerabilities.”
Haber recommends that least privilege tactics of removing admin rights from endpoints is an effective mitigation strategy, but people aren’t doing it more often because of the mistaken perception that doing so is complex and troublesome. This is also why users get secondary local admin accounts or put into admin group. “By deploying least privilege techniques people can get things done and it doesn’t become a burden on the help desk,” he said. “If I can reduce all users them to standard users, I can buy myself some time for patching and potentially mitigate those risks; especially for attacks using phishing that are using a vulnerability exploit combination.”
According to Haber the IT team are dealing with admin rights everywhere. Everything from the workstations; to automation; Cloud to remote workers; to mobile devices; and next gen technology, the placement of Microsoft technology is almost everywhere.
“When we remove admin rights as part of a mitigation strategy, we break it down by product realised that for Internet Explorer — 33 critical vulnerabilities were present; for Microsoft Edge 86; for Windows itself – 170,” he said. “There’s about 177 critical ones in Microsoft Office; and 171 across the server product line.”
Mohamed Zubair, VP cyber security intelligence from GIC Pro Limited, told the virtual roundtable the organisation typically runs applications admin, and users will need admin credentials to log in and do the installation.
Organisations need to consider any Windows Seven or 2008 servers, or older systems, within the environment. The placement of the technology and the mitigation that can be gained by removing it from servers; by removing it from remote workers; by pulling it out from critical infrastructure; by not including admin rights in automation, he said.
“When you do that you find that 100 per cent of Internet Explorer vulnerabilities could be mitigated just by removing admin rights,” said Haber.
He believes there’s three main reasons why everyone isn’t doing it. The first is the perceived negative impact on end user productivity.
“People actually feel punished if you take away their admin rights, when in fact you’re trying to improve end user security,” he said. “There are tools and techniques of privileged access management that actually increase productivity.”
For example, if the end user is given two accounts; their standard login account as a standard user; and their secondary account as an ex-admin. According to Haber, they get multiple UAC pop ups during the day that requests admin credential to do their job, they spend five to 10 seconds every single time that comes up.
“The perception of negative impact on end user productivity is false. You can increase productivity by not having them type in their secondary credential and improve security by not even giving it to them in the first place,” he said.
The second reason is it’s quicker and easier to give everyone admin rights. If you throw everyone in the admin group, everybody works, everything is happy. “But you also have incredible amounts of risk, and your risk surface is massive”, said Haber.
“When you consider on-premise/off-premise Cloud, next gen technology, IoT and everything, giving everyone admin rights completely unacceptable,” Haber said. “We must find a model that works for the business where we’re only giving the administrative rights that are necessary when they need it, for only as long as they need it”.
“They continue to be productive and we don’t have this problem of making it quick and easy,” Haber said. “Just giving everyone admin rights as part of their identity governance – don’t do that. Let’s find a better way to truly manage them.”
Common problems that people think about when they remove admin rights, is the potential for endless calls to the helpdesk.
Haber noted that shifting from a reactive to a proactive approach to mitigating critical Microsoft vulnerabilities means adopting least privilege and just-in-time privileged access management models that help you remove admin rights, while making it easier for people to do their job.
“I’m going to mitigate the risks from those critical Microsoft vulnerabilities to buy myself time for patching, to make sure I’m not a part of the next zero-day exploit and actually be safe from all the different types of malware threats that are out there,” he said.
The virtual roundtable took an interesting turn when Haber pointed out how adopting a proactive approach to cyber security allowed employees to be more functional and productive, but also reduced their rights at the same time. He noted that there was no downside to removing admin rights.
The adoption of new technologies has resulted in an explosion of privileged accounts. According to Haber, 20 years ago organisations only had privileged accounts in the data centre, and no-one cared if they had the password because they had to be within the building and within that network to use those credentials.
“Today we have cloud, we have hypervisors and we have IoT and we’re also embarking on DevOps processes,” he said. “We have privileged accounts everywhere and it’s an explosion that is affecting our entire universe.
From cameras to alarm systems and anything that’s network device connected – everything has a privileged account that can be leveraged for a botnet surveillance or compromise the organisation.”
According to Haber those privileged accounts need to be removed when possible. When dealing with them on endpoints — the critical vulnerabilities on Microsoft operating systems — many of them can be mitigated just by removing the end user’s interaction.
“We do this with BeyondTrust Endpoint Privilege Management solution,” he said. “It is the removal of admin rights on Windows, Mac OS, Unix, Linux, and even network devices, as side solutions. We also do password management to check-in, check-out passwords; automatic rotation; and remote access technology..”
According to Haber this is great for people that are working remotely – for contractors; employees; vendors; and those operating remotely who need to get into the organisation to interoperate with internal resources without the need for VPN.
Tags: admin rightsBeyondTrustdata breachMicrosoft
The post BeyondTrust Roundtable: Tackling Critical Microsoft Vulnerabilities appeared first on CIO Tech Asia.
]]>The post Facial recognition firm Clearview AI probed by Australia, UK for privacy issues appeared first on CIO Tech Asia.
]]>(Reuters) – Britain’s data watchdog and its Australian counterpart said they launched a joint investigation into the personal information handling practices of facial recognition technology company Clearview AI.
The investigation will be conducted by UK’s Information Commissioner’s Office (ICO) and the Office of the Australian Information Commissioner (OAIC), focussing on the New York-based company’s use of “scraped” data and biometrics of individuals.
Clearview did not immediately respond to Reuters’ request for comment.
The company is also under investigation in Canada, where Clearview said it would no longer offer its facial recognition services.
Clearview AI bills itself as a tool for law enforcement, scraping the internet for publicly available photos and using facial recognition to identify potential suspects.
Critics in some countries have raised concerns about the lack of consent of those searched, and the potential for misuse of the service.
(Reporting by Muvija M in Bengaluru; Editing by Anil D’Silva)
Tags: ClearviewCybersecurityfacial recognition
The post Facial recognition firm Clearview AI probed by Australia, UK for privacy issues appeared first on CIO Tech Asia.
]]>