08.03.2021 Views

CS Mar-Apr 2021

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computing<br />

Security<br />

Secure systems, secure data, secure people, secure business<br />

Long-distance winners<br />

Excellence shines through from afar<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Where to now?<br />

Inside this issue: expert<br />

insights into what the<br />

industry can expect<br />

in the months ahead<br />

Webcam perils<br />

Be careful who may be spying on you!<br />

Attacks hit record high<br />

Deep concerns as cyber security<br />

incidents exceed all previous levels<br />

Computing Security <strong>Mar</strong>ch <strong>2021</strong>


FULLSTACK VULNERABILITY MANAGEMENT<br />

CONTINUOUS VULNERABILITY<br />

INTELLIGENCE<br />

Accurately identifies vulnerabilities<br />

and exposures across the full stack.<br />

All threats are verified by<br />

cybersecurity experts, providing<br />

exploitable risk and remediation<br />

guidance.<br />

“The expertise and<br />

delivery of this service<br />

has been outstanding...”<br />

SECURITY AND RISK MANAGEMENT,<br />

MEDIA INDUSTRY, 30B+ US<br />

2020


comment<br />

APPRENTICESHIPS: VITAL ROUTE INTO CYBERSECURITY<br />

EDITOR: Brian Wall<br />

(brian.wall@btc.co.uk)<br />

LAYOUT/DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk)<br />

SALES:<br />

Edward O’Connor<br />

(edward.oconnor@btc.co.uk)<br />

+ 44 (0)1689 616 000<br />

Abby Penn<br />

(abby.penn@btc.co.uk)<br />

+ 44 (0)1689 616 000<br />

Apprenticeships are the solution to attracting more young people into cybersecurity,<br />

according to 42.5% of respondents to a new Twitter poll run by Infosecurity Europe,<br />

Europe's information security event. The poll set out to explore current issues around the<br />

skills shortage within the sector, particularly within the context of the pandemic.<br />

Responses also highlight the importance of proper support for remote workers - with more<br />

than a third (37.2%) believing that sustaining motivation and well-being is the greatest skillsrelated<br />

challenge faced by cybersecurity professionals right now. The information security sector<br />

continues to suffer from a shortage of skilled professionals, with more than four million unfilled<br />

roles worldwide, according to the Enterprise Strategy Group (ESG) and the Information Systems<br />

Security Association (ISSA). Despite this, 35.9% of the respondents to Infosecurity Europe's poll<br />

say their organisation currently has a hiring freeze on cybersecurity roles.<br />

"We can definitely do more to open up apprenticeships or internships that encourage people<br />

to see if information security is for them," suggests Steve Wright, CISO of Privacy Culture and<br />

Former Interim DPO Bank of England, "but, as a permanent measure, we've got to look at what's<br />

going to attract people at the right age. I think more could be done to make it part of the school<br />

curriculum."<br />

Behind apprenticeships in the poll was the need for a formal career path (27.1%), more role<br />

models/mentors (17.1%) and greater diversity (13.4%). Troy Hunt, Microsoft regional director<br />

and founder of 'Have I Been Pwned', indicates the need for greater inclusiveness: "Technology in<br />

general is very male-dominated and there's a lot of women in particular feel excluded by that.<br />

There's also much more introverted behaviour, and - in my experience at least - obnoxious<br />

behaviour! We need to create an environment that people of all backgrounds want to be in;<br />

that removes the barriers making them reticent about joining the industry."<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexions Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK: £35/year, £60/two years,<br />

£80/three years;<br />

Europe: £48/year, £85/two years,<br />

£127/three years<br />

R.O.W:£62/year, £115/two years,<br />

£168/three years<br />

Single copies can be bought for<br />

£8.50 (includes postage & packaging).<br />

Published 6 times a year.<br />

© <strong>2021</strong> Barrow & Thompkins<br />

Connexions Ltd. All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent,<br />

in writing, from the publisher.<br />

Brian Wall<br />

Editor<br />

Computing Security<br />

brian.wall@btc.co.uk<br />

www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />

@<strong>CS</strong>MagAndAwards<br />

3


Secure systems, secure data, secure people, secure business<br />

Computing Security <strong>Mar</strong>ch <strong>2021</strong><br />

contents<br />

CONTENTS<br />

Computing<br />

Security<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Long-distance winners Where to now?<br />

Excellence shines through from afar<br />

Inside this issue: expert<br />

insights into what the<br />

industry can expect<br />

in the months ahead<br />

Webcam perils<br />

Be careful who may be spying on you!<br />

COMMENT 3<br />

Apprenticeships’ route into cybersecurity<br />

Attacks hit record high<br />

Deep concerns as cyber security<br />

incidents exceed all previous levels<br />

ARTICLES<br />

EDITOR’S FOCUS 6<br />

How well are organisations and the<br />

workforce surviving the WFH challenge?<br />

DIGITAL ACCESS FOR ALL 7<br />

Steve Mellings, founder of ADISA, looks<br />

at the wider impact of COVID-19 - and<br />

the digital divide this has triggered<br />

DATA PROTECTION LAW AND<br />

WORKING FROM HOME 8<br />

Samad Miah, Xcina Consulting, looks at<br />

the data security and privacy compliance<br />

challenges remote working can bring<br />

WINNERS, TAKE A BOW! 32<br />

It wasn’t possible to celebrate the 2020<br />

Computing Security Awards face to face, but<br />

even the virus couldn't prevent them from<br />

going ahead. Master of ceremonies Chris<br />

Cowdrey and editor Brian Wall revealed the<br />

winners by video link - and what an occasion<br />

it still proved to be<br />

SEIZING BACK CONTROL 18<br />

THROUGH A GLASS DARKLY 10<br />

How can organisations stop their data<br />

We asked several industry commentators<br />

falling into the wrong hands? Terry Greer-<br />

for their views on where they believe <strong>2021</strong><br />

King, SonicWall, offers his insights<br />

will lead us, as we continue to grapple<br />

with COVD-19 and a whole multitude of<br />

ATTACKS HIT RECORD HIGH 22<br />

The National Cyber Security Centre (N<strong>CS</strong>C)<br />

other security challenges. Here's what they<br />

handled a record total of incidents over<br />

had to say<br />

the last 12-month period accounted for -<br />

with 200-plus related to the coronavirus<br />

THE PATIENT APPROACH PAYS OFF 24<br />

NHS Management has been adopting<br />

a security-first mindset, with a helping<br />

hand from AT&T Cybersecurity<br />

BE CAREFUL WHO’S WATCHING! 16<br />

<strong>Mar</strong>k Zuckerberg (yes, Facebook raises its<br />

YOU'VE GOT EMAIL... BREACHES 26<br />

controversial head again!) posted a now<br />

Misdirected emails have been identified as<br />

infamous photo of his desk setup, showing<br />

the UK's top cause of reported security<br />

his laptop with a covered webcam and<br />

incidents, leading to 44% more incidents<br />

than phishing attacks<br />

blocked mic. If even the creator of<br />

Facebook does this, shouldn’t everyone?<br />

CHANGE IS ON THE CARDS 28<br />

Ever wondered if workplace security, no<br />

matter where you are, might be possible?<br />

Biometrics could offer a way forward<br />

A GLIMPSE INTO THE ABYSS 20<br />

CYBER STRATEGY’S CRITICAL POINT 30<br />

Cyber security has never been more relevant<br />

When your data leaks, it might well end up<br />

and will no doubt continue in that vein for<br />

for sale on the dark web, making you an<br />

organisations throughout the year ahead<br />

easy target for advanced attacks. As one<br />

industry expert observes, “the market for<br />

PRODUCT REVIEW 19<br />

stolen data on the dark web has become<br />

Wandera Private Access<br />

a truly lucrative trade”.<br />

computing security Jan/Feb <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />

4


My peace of<br />

mind starts<br />

with Neustar<br />

Security.<br />

Cloud Security Solutions that are<br />

Always-on, Ultra Secure.<br />

security.neustar


editor's focus<br />

WORKING FROM HOME - ONE YEAR ON!<br />

COVID-19 HAS BEEN WITH US NOW FOR ALMOST A YEAR - AT LEAST 'OFFICIALLY'. HOW ARE<br />

ORGANISATIONS AND REMOTE WORKERS SURVIVING THE CHALLENGES?<br />

One year on, it's clear that the<br />

pandemic changed the way many<br />

organisations operate, due to<br />

huge numbers of staff being forced to<br />

work from home. That reality is<br />

something that resonates deeply with<br />

Oliver Cronk, chief IT architect, EMEA at<br />

Tanium. "This has caused digital<br />

transformation to accelerate rapidly and<br />

many organisations have put stop-gap IT<br />

solutions in place to keep up," he states.<br />

"This approach, which we believe is<br />

especially prevalent in sectors hit hardest<br />

by the pandemic, often creates<br />

cybersecurity weaknesses."<br />

Another key issue he highlights is that<br />

many organisations are struggling with<br />

reduced revenue or funding right now<br />

and having to make cutbacks, yet<br />

cybersecurity is not an area they can<br />

afford to neglect, he warns. "As lockdown<br />

continues and some teams are being<br />

asked to do more with less resources, they<br />

remain increasingly vulnerable to cyber<br />

threats, due to distraction or fatigue,<br />

which can cause employees to drop their<br />

guard when it comes to clicking on<br />

malicious links in emails."<br />

OUT OF TOUCH<br />

In addition, states Cronk, "IT audit<br />

continues to fail many organisations, with<br />

some of the recent security issues we've<br />

seen being a direct result of IT audit and<br />

governance processes being used, which<br />

are out of touch with what is really going<br />

on in modern organisations".<br />

Businesses need to ensure they are<br />

planning for the long-term by setting up a<br />

security foundation which is flexible, datadriven<br />

and efficient, he advises, while<br />

equipping IT teams to respond to threats<br />

immediately from wherever they are based.<br />

"Whilst the pandemic has created<br />

challenges for IT teams, this period should<br />

also be seen as an opportunity to optimise<br />

IT security and operations.<br />

"Teams should consider embracing<br />

technologies such as distributed cloud<br />

architecture and endpoint management,<br />

which will give businesses the visibility and<br />

control they need to minimise the<br />

likelihood of a damaging cyber-attack in<br />

the age of lockdowns and mass remote<br />

working."<br />

06<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


industry insights<br />

DIGITAL ACCESS FOR ALL - HELPING<br />

TO BRIDGE THE TECHNOLOGY DIVIDE<br />

STEVE MELLINGS, FOUNDER OF ADISA, LOOKS AT HOW COVID-19 HAS HELPED TO<br />

ILLUMINATE A GAP IN SOCIETY WHERE TECHNOLOGY FOR MANY ISN'T A GIVEN<br />

is essential for all children to achieve their<br />

learning objectives not just in the COVID<br />

world, but in the normal learning<br />

environment. The partnership we have<br />

formed with ADISA allows us access to the<br />

leading IT asset disposal companies in the<br />

UK, which means the programme is not only<br />

professional, secure and compliant, but<br />

sustainable."<br />

In these challenging COVID days, many of<br />

us are struggling to juggle homeworking<br />

and our newfound role as home<br />

educators. Those households that are lucky<br />

enough to have access to technology and<br />

connectivity are able to benefit from online<br />

learning, but imagine trying to educate your<br />

children with no technology?<br />

This is a predicament affecting more than<br />

1 million households in the UK and, far from<br />

being a COVID creation, this digital divide is<br />

ever present in society and reflects how a<br />

disadvantaged group that needs support<br />

has been overlooked.<br />

The 'Digital Access for All' programme<br />

(DAFA), run by the Learning Foundation<br />

Charity, has been focusing on this area<br />

for many years, but the COVID-driven<br />

requirement for home learning has drawn<br />

widespread focus (and angst) in how<br />

developed nations can still have families<br />

without access to technology at home.<br />

DAFA is a programme that is NOT just for<br />

today, but is tasked with helping to solve<br />

this ongoing problem and, in 2020, they<br />

partnered with ADISA to create a sustainable<br />

programme for businesses to donate<br />

redundant technology that can be<br />

refurbished and donated to schools or resold<br />

to help generate funds to purchase the type<br />

of technology those without access need.<br />

The programme has been designed by<br />

ADISA to present a route where ANY retired<br />

working technology can be processed to<br />

leading industry standards, including a service<br />

option for data sanitisation and compliance<br />

to overcome security concerns. From that<br />

point, any infrastructure that is not fit for<br />

reuse is recycled appropriately and the rest<br />

prepared for reuse.<br />

With businesses having to provide devices<br />

for homeworkers, the number of laptops<br />

available for donation is very low, which<br />

is why this programme accepts ANY<br />

infrastructure, with the aim being to generate<br />

much-needed funds to give the Learning<br />

Foundation the ability to help schools either<br />

by sourcing refurbished laptops or tablets,<br />

OR to help with connectivity issues.<br />

As Paul Finnis, chief executive of the<br />

Learning Foundation, says: "Far from being<br />

a luxury item, technology in the home really<br />

POSITIVE EXPERIENCE<br />

The programme has controls in place as<br />

to which type of devices can be supplied<br />

to schools to ensure the user experience<br />

is a positive one and, in conjunction with<br />

Microsoft, is able to ensure there is access<br />

to correctly licensed software.<br />

Since a soft launch in January, we have<br />

had offers of over 100,000 assets from<br />

organisations keen to help and we hope to<br />

be able to turn that into direct help for over<br />

25,000 children, BUT we cannot do it alone.<br />

This is a real email received by us last<br />

week…..<br />

"I'm not sure if you can help but I have 2 daughters<br />

who are home schooling and the laptop we have<br />

has just failed. We can't afford to get it fixed and<br />

the school says it can't help. Can you help us as I'm<br />

so worried that my girls are going to fall behind."<br />

Want to help?<br />

If you are a business that has any redundant<br />

equipment, you should consider donating it<br />

to the 'Digital Access for All' programme<br />

administered by ADISA.<br />

To find out more, visit:<br />

https://adisa.global/dafa<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

07


masterclass<br />

DATA PROTECTION LAW AND WORKING FROM HOME<br />

AS MORE PEOPLE WORK REMOTELY, THE DATA SECURITY AND PRIVACY COMPLIANCE CHALLENGES THIS CAN<br />

BRING MUST NOT BE OVERLOOKED, SAYS SAMAD MIAH, DATA PROTECTION CONSULTANT, XCINA CONSULTING<br />

confidentiality by keeping them locked<br />

in a filing cabinet when not in use and<br />

disposing of them securely when no<br />

longer required. You may also wish to<br />

return the papers to the office if you are<br />

unable to securely store or dispose of<br />

them at home. Lastly, try to maintain a<br />

written log of records and files that you<br />

have taken to ensure information is not<br />

accidentally misplaced and that others<br />

know its exact whereabouts.<br />

Data protection law requires<br />

companies to put in place<br />

appropriate technical and<br />

organisational measures to ensure the<br />

security of processing, whether it be in<br />

the office or in the comfort of your living<br />

room. We understand that keeping in<br />

touch and communicating with your<br />

team is crucial and have therefore listed<br />

our top five tips to ensure data<br />

protection does not become a barrier<br />

to productivity:<br />

1. Only use technology that is approved<br />

by your employer<br />

Work-provided hardware or software will<br />

have likely gone through some sort of<br />

vetting process and is therefore a much<br />

safer alternative then the use of personal<br />

devices. Privacy settings and system<br />

updates can also be applied at the<br />

administrator level on a work device and<br />

can therefore guarantee an optimal level<br />

of data security. Unless specifically<br />

authorised, avoid storing information<br />

on your personal device. Also, where<br />

possible, only use your employer's<br />

trusted networks and cloud services<br />

and ensure that data is backed up if<br />

stored locally.<br />

2. Use secure forms of communication<br />

There are several video conferencing<br />

software tools available on the market.<br />

Ensure that the solution you use offers<br />

end-to-end encryption on video calls, is<br />

not sending data to third parties without<br />

your approval and offers enhanced<br />

security and privacy features as standard<br />

(such as the use of a lobby or password<br />

access to a meeting). For emails, make<br />

sure you are sending it to the correct<br />

recipient and that all attachments are<br />

encrypted/password protected.<br />

3. Be careful with paper records<br />

It is important to note that data<br />

protection law also applies to personal<br />

information in manual form if it is<br />

intended to be a part of a filing system.<br />

If you are working remotely with<br />

paper records, consider security and<br />

4. Follow your organisation's policies<br />

and procedures<br />

If staff ignore procedures and policies,<br />

then they risk breaching key data<br />

protection principles. Your organisation<br />

will have developed an approach to<br />

ensure remote working is safe and<br />

secure and policies act as a way to<br />

communicate what is allowed and what<br />

is not. Do not be tempted to circumvent<br />

what is permitted by your employer<br />

(eg, sending emails through a personal<br />

account) simply because it is more<br />

convenient.<br />

5. Consider confidentiality and<br />

unauthorised exposure<br />

When working from home, try to ensure<br />

personal data is not seen by family<br />

members or those who you live with.<br />

This can prove challenging if you are<br />

sharing your home working space.<br />

However, try to hold confidential<br />

conversations somewhere where others<br />

are less likely to overhear you and<br />

position screens and papers, so they are<br />

not visible to others. Data protection law<br />

would consider family members to be<br />

third parties and information must not<br />

be shared with them as a result.<br />

08<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


into the future<br />

THROUGH A GLASS DARKLY<br />

WE ASKED SEVERAL INDUSTRY COMMENTATORS FOR THEIR<br />

VIEWS ON WHERE <strong>2021</strong> WILL LEAD US, AS WE GRAPPLE<br />

WITH COVID-19 AND A MULTITUDE OF OTHER CHALLENGES.<br />

HERE'S WHAT THEY HAD TO SAY<br />

According to Verizon's Data Breach<br />

Investigations Report for 2020, social<br />

engineering has become a top attack<br />

vector for hackers. DigiCert, for its part,<br />

expects threat actors to leverage current<br />

events to unprecedented levels in the current<br />

year. Dean Coclin, DigiCert's senior director of<br />

business development, points to various<br />

influencing factors. "With unemployment<br />

fraud at an all-time high, we will see an even<br />

larger increase in <strong>2021</strong>, as pandemicfocused<br />

unemployment programmes from<br />

governments have lowered the barriers to<br />

collecting benefits and security methods<br />

have not been able to keep up. Should we<br />

see additional stimulus funding from<br />

governments to provide relief for the effects<br />

of the pandemic, this will only make this<br />

a richer channel for fraudsters."<br />

Coclin, along with Avesta Hojjati, head of<br />

R&D, and Mike Nelson, VP of IoT security<br />

at DigiCert, have come up with some joint<br />

predictions for <strong>2021</strong>, as life starts to return<br />

to a semblance of how it was pre-COVID-19.<br />

"We predict that individuals and businesses<br />

alike will adjust to a new normal sometime<br />

in <strong>2021</strong>. As workers return to the office,<br />

there will be a steady crescendo of<br />

applications offered by threat actors, with<br />

the promise of increased productivity tools to<br />

ease the transition. Tools such as apps that<br />

provide ambient sounds will be leveraged in<br />

these attacks," they state.<br />

They warn of new attack vectors emerging<br />

not only for social engineering, but also<br />

attacks targeting common home devices,<br />

used at home for workers splitting time<br />

working at home and the office that can be<br />

used to compromise an individual and allow<br />

for lateral movement into a business.<br />

"Workers splitting time between the home<br />

and the office will only exasperate this<br />

transition period, causing confusion and an<br />

increase in security risk for business."<br />

Hojjati also sees <strong>2021</strong> bringing increased<br />

focus on automation and efficiency solutions<br />

in the security market. "As organisations<br />

work to keep the lights on and scrutinise the<br />

bottom line, there will be a resulting push<br />

for efficiency in security technologies. <strong>2021</strong><br />

will bring an emphasis on technologies that<br />

allow organisations to do more with less and<br />

automation will play a significant role, in<br />

terms of security innovation in the New Year."<br />

Worryingly, according to a 2020 SANS<br />

Automation and Integration Survey, 12% of<br />

respondents had no security automation in<br />

2019. In 2020, that dropped to 5%. "We<br />

predict the level of automation in <strong>2021</strong> will<br />

increase exponentially," he advises.<br />

Meanwhile, as security investments focus<br />

on immediate value, quantum computing<br />

will continue to move forward. "We will<br />

see the effect of Moore's law on quantum<br />

computing," says Tim Hollebeek, industry<br />

and standards technical strategist at<br />

DigiCert. "As quantum computing allows for<br />

10<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


into the future<br />

tasks to be more efficient, organisations will<br />

prioritise its continued development.<br />

Improvements and efficiency are recession<br />

resistant."<br />

Coclin has views, too, on the challenge of<br />

staying safe online, stating that identity and<br />

consumer accountability of an organisation's<br />

permissions and controls over its data<br />

will lead to a new interest in how to stay<br />

safe online and with connected devices.<br />

"Concerns over contact tracing and other<br />

government invasions of personal privacy<br />

will lead to a new desire by the public for<br />

ways to identify organisations with which<br />

they connect online," he states, "and for<br />

better assurances of the security of the<br />

connected devices in their everyday lives,<br />

including connected cars, homes, buildings,<br />

websites and emails."<br />

WORKING REALITY<br />

With the disruptions and restrictions the<br />

pandemic brought to our lives in 2020,<br />

it seems like <strong>2021</strong> will look similar with<br />

regards to our new working reality, cautions<br />

Robert Allen, director of marketing &<br />

technical services at Kingston Technology<br />

Europe. "This will bring new data security<br />

challenges for IT managers, as cybersecurity<br />

threats have increased massively during the<br />

Covid-19 lockdown . Artificial Intelligence<br />

will have a positive impact on security,<br />

while businesses will be more reliant on<br />

AI processes to implement cybersecurity<br />

and data privacy measures.<br />

"Working from home or a hybrid working<br />

environment will continue to stay and, even<br />

though the pandemic might gradually step<br />

out of our lives, employees will be looking to<br />

continue with the flexibility they now have."<br />

A better work-life balance for employees<br />

and savings on costs for businesses will be<br />

the main motivators for this, but it will come<br />

with additional challenges," he adds, "an<br />

important one being how to improve<br />

employees' equipment to increase efficiency.<br />

This may be a memory or storage<br />

improvement that will help all systems<br />

operate better, or being able to make the<br />

many video calls that are now part of our<br />

lives".<br />

Equally important is the need to improve<br />

data security in this new working<br />

environment. "IT managers might well<br />

consider upgrading employees' laptops<br />

by using encrypted drives to mitigate<br />

cybersecurity attacks," adds Allen. "The use<br />

of encrypted USBs would also add a layer<br />

of security to mobile corporate data, as we<br />

anticipate the shift from home working to<br />

more mobile working. "<br />

As the number of employees and<br />

businesses that are operating remotely<br />

has increased significantly, the need for<br />

companies to provide specific training and<br />

cybersecurity awareness programmes to<br />

employees will be paramount. "AI will<br />

play an important role in <strong>2021</strong>, in order to<br />

support the implementation of further data<br />

security measures," he states. "With teams<br />

physically spread out and with a need to<br />

access corporate networks, businesses will<br />

rely more on automation and machine<br />

learning to prevent cyber-attacks. Businesses<br />

are still adapting to this paradigm shift. The<br />

impact caused by Covid-19 has completely<br />

changed the landscape in organisations<br />

worldwide and the tools that need to be<br />

used will also need to continue to adapt to<br />

this. Whatever happens in <strong>2021</strong> and<br />

beyond, we will continue supporting<br />

businesses as their needs evolve."<br />

RE-INFECTING MACHINES<br />

Kelvin Murray, senior threat research analyst<br />

at Webroot, sees cyber-attackers increasingly<br />

targeting home routers, insecure IoS devices<br />

and VPN systems to infect corporate<br />

machines connected to that network. "The<br />

goal of this tactic is to take advantage of low<br />

security home set-ups, so admins and users<br />

need to factor these risks into account when<br />

securing the growing number of work-fromhome<br />

environments.<br />

Avesta Hojjati, Digicert: increased focus<br />

on automation and efficiency solutions in<br />

the security market.<br />

Dean Coclin, Digicert: even greater interest<br />

will be shown in how to stay safe online and<br />

with connected devices.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

11


into the future<br />

Lisa Ventura, UK Cyber Security<br />

Association: cloud computing and<br />

security will be central to the postpandemic<br />

world.<br />

Jon Fielding, <strong>Apr</strong>icorn: rise in endpoint<br />

controls will enable employees to use their<br />

own devices safely.<br />

"MSPs and channel partners need to adapt<br />

their businesses to respond to the evolving<br />

threats that remote work presents. Some<br />

MSPs, particularly those who were more<br />

sophisticated before the pandemic, will be<br />

better equipped to protect against these<br />

types of threats. However, others will have to<br />

adapt and change their services very rapidly<br />

to keep up with these ongoing challenges,"<br />

he adds.<br />

"The amount of disruption and cost to<br />

businesses and important services like<br />

healthcare by ransomware groups has<br />

grown too big to escape addressing by<br />

world leaders," Murray concludes. "Expect<br />

some major discussion and statements<br />

about the threat by politicians in <strong>2021</strong>."<br />

GAPS IN SECURITY TRAINING<br />

For his part, Matt Aldridge, Webroot's<br />

principal solutions architect, believes there<br />

is still not enough security training being<br />

implemented across businesses, specifically<br />

to address the increasingly remote<br />

workforce. "In <strong>2021</strong>, organisations need to<br />

prioritise training schemes that are tailored<br />

to remote workers, including how to spot<br />

phishing scams and other types of social<br />

engineering cyberattacks. With an increase<br />

of distractions at home and fatigue around<br />

email and virtual meetings, it's never been<br />

more critical that training be engaging,<br />

consistent and prioritised by business leaders<br />

to ensure it's embedded into company<br />

culture."<br />

A key consideration for businesses this year<br />

should be to monitor challenges around<br />

employee's mental health and the security<br />

issues that they can pose, he adds. "Many<br />

workers are mentally exhausted and more<br />

prone to making dangerous mistakes<br />

that can lead to security issues. Without<br />

a controlled network and onsite IT support<br />

offered by a physical office, businesses need<br />

to focus on implementing training that<br />

specifically supports workers in the home<br />

environment and that accounts for the<br />

stressors caused by the semi-permanent shift<br />

to WFH."<br />

Aldridge also points out that any training<br />

programme needs to have a feedback loop<br />

"and phishing simulations can help to form<br />

an important component of this, allowing<br />

organisations to track improvement in clickthrough<br />

rates from timely, realistic simulated<br />

phishing emails as the training programme<br />

progresses. Lessons can then be learned<br />

from this, helping organisations to provide<br />

just the right amount of regular training,<br />

without overburdening their users and<br />

without leaving it too long between sessions<br />

to allow bad behaviours to slip back in".<br />

The company's Nick Emanuel, senior<br />

director of product, also warns of new forms<br />

of exploitation, as we seek to emerge from<br />

the ravages of COVID-19. "As <strong>2021</strong> brings<br />

the first vaccines to fight Covid-19, cyber<br />

criminals will exploit the lack of trusted<br />

information and the widespread use of<br />

phone-based medical appointments<br />

[telemedicine] to target businesses and<br />

consumers in phishing attacks and BEC<br />

[Business Email Compromise] scams."<br />

DEVASTATING ATTACKS<br />

Lisa Ventura, CEO & founder, UK Cyber<br />

Security Association (UK<strong>CS</strong>A), has been<br />

highlighting some other areas she believes<br />

will continue to be a challenge in <strong>2021</strong>.<br />

"Ransomware attacks can be devastating.<br />

Demands can run into millions of pounds.<br />

The number of such attacks has jumped<br />

by 350% since 2018, as well as the average<br />

ransom payment increasing by more than<br />

100% in 2020. Downtime has also increased<br />

to up to 200% and the average cost per<br />

incident is rising exponentially.<br />

Cloud computing and security will be<br />

central to the post-pandemic world, she<br />

adds. "Organisations that have migrated to<br />

the cloud will need to focus on their cloud<br />

security and understand the relationships<br />

they have with their providers. Cloud services<br />

12<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


into the future<br />

were essential in 2020 for keeping the<br />

economy and our lives from griding to<br />

a total halt and, in <strong>2021</strong> and beyond,<br />

there will be much more of a reliance on<br />

clouds, along with smart sensors, remote<br />

collaboration and streaming, even after we<br />

emerge from the pandemic."<br />

There will also be a greater reliance on<br />

automation, artificial intelligence and<br />

machine learning," Ventura states. "This<br />

reliance may drive a trend of hyper<br />

automation. This is a process in which<br />

organisations automate as many business<br />

and IT processes as possible, using AI,<br />

machine learning and robotic process<br />

automation. With the sheer number of<br />

potential threats and security alerts rising<br />

daily, it is often too much for humans to<br />

handle alone."<br />

ATTACKER SURFACE<br />

As the pandemic hit, many companies were,<br />

as we all now recall, forced to react really<br />

quickly to keep themselves going and meet<br />

customer needs. This move to digital opened<br />

up a gateway for hackers, who have since<br />

been seeking to take advantage of a great<br />

attacker surface. "<strong>2021</strong> will start to see<br />

the trend towards efficiency over resilience<br />

reversed, as companies realise the damage<br />

that can be done, if these key services<br />

go down," says Dr Alex Tarter, chief cyber<br />

consultant and CTO at Thales UK. "This could<br />

result in the security budget overtaking the<br />

R&D budget next year."<br />

The business-hacker relationship has largely<br />

always been one way, with cyber criminals<br />

attempting to break in and businesses<br />

reacting to this. "However, <strong>2021</strong> will see that<br />

relationship change, as businesses go on<br />

the offensive and attempt to throw hackers<br />

off their game. Companies will start using<br />

deceptive techniques, such as deploying fake<br />

high-attraction systems to divert attackers or<br />

leave fake credentials [breadcrumbs] that<br />

lead to a fake high-value target," he adds.<br />

If 2020 is to be defined by the Coronavirus,<br />

then <strong>2021</strong> will, hopefully, be the year of<br />

the vaccine. "Scientists and the medical<br />

professionals have been working against the<br />

clock to produce a vaccine that will mitigate<br />

the virus, but within that unfortunately are<br />

threat actors looking to upset the process<br />

and steal data. With medical and logistical<br />

information at such a premium, the UK still<br />

faces a cybersecurity talent shortage that<br />

could leave its health industry exposed. In<br />

<strong>2021</strong>, expect to see a greater effort from the<br />

healthcare industry to access cybersecurity<br />

expertise," concludes Tarter, "both from a<br />

recruitment perspective and a partnership<br />

viewpoint, in order to protect their systems<br />

and against misinformation about the<br />

vaccine process."<br />

MAKE OR BREAK<br />

It's security culture that will 'make or break'<br />

hybrid working - not the technology, argues<br />

Jon Fielding, <strong>Apr</strong>icorn's managing director<br />

EMEA. "Combined home and office working<br />

will set in as a long-term model and doing<br />

this safely will demand a major culture shift.<br />

Lack of employee education was singled out<br />

as the biggest cybersecurity weakness during<br />

the first lockdown in a recent <strong>Apr</strong>icorn poll.<br />

Companies must make urgent changes to<br />

improve awareness of the different security<br />

risks associated with hybrid working and the<br />

knowledge of how to control them."<br />

Training employees in the 'practical stuff'<br />

won't be sufficient, he adds. "Everyone is<br />

accountable for protecting data in the new<br />

working environment, which requires a<br />

culture of information security best practice<br />

across the entire dispersed workforce.<br />

This isn't something that can be enforced;<br />

employees need to buy in to it. This will<br />

require IT teams to build deeper engagement<br />

with staff and devolve greater responsibility<br />

for security onto the individual. Education<br />

programmes must therefore explain the<br />

'why', as well as the 'what' and 'how': the<br />

reasons data protection is important, and<br />

the specific risks and consequences to their<br />

company of a breach."<br />

"Ultimately, businesses will want complete<br />

confidence that employees are working<br />

safely when they're out of the office," adds<br />

Fielding. "Secure, encrypted storage devices<br />

can be used to protect company data offline<br />

or quickly deploy a secure desktop<br />

environment to an entire workforce by preloading<br />

them with the with the standard<br />

corporate apps and security settings.<br />

Employees can then boot this up on<br />

whatever device they're using."<br />

He also sees organisations moving beyond<br />

the mindset of 'complete security', to focus<br />

on strengthening their cyber resilience.<br />

"Cyber resilience is an organisation's ability to<br />

prepare for, respond to and recover quickly<br />

from any digital disruption. We anticipate a<br />

marked rise in criminal attacks in <strong>2021</strong>, as<br />

hackers take advantage of people continuing<br />

to work remotely - in particular, ransomware,<br />

malware and phishing. Recognising that no<br />

business is immune, IT teams will shift focus<br />

to ensuring they have all their ducks in a<br />

row, in the event of a breach. They'll also<br />

prioritise planning to mitigate the impact of<br />

any future crisis that drives the workforce out<br />

of the office!"<br />

<strong>Apr</strong>icorn also expects to see an increase<br />

in encryption, to protect data as it's moved<br />

from office to home - mitigating risks,<br />

such as targeting in the cloud - and keep<br />

information secure whatever's happening<br />

around it. "There will also be a rise in<br />

endpoint controls that enable employees to<br />

use their own devices safely. These measures<br />

give organisations the ability to demonstrate<br />

transparency and due diligence, should a<br />

breach occur. The use of secure, encrypted<br />

storage devices as a straightforward way of<br />

backing up data locally is likely to increase,<br />

supporting the ability to get up and running<br />

again fast."<br />

STRAINING AT THE LEASH<br />

According to Mike Campfield, VP, GM<br />

International and Global Security Programs<br />

at ExtraHop, this year will see new strains of<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

13


into the future<br />

Mike Campfield, ExtraHop: new<br />

ransomware gangs will enter the picture<br />

and continue development of attack<br />

tactics.<br />

Maxine Holt, Omdia: COVID-19 accelerated<br />

cloud journeys and security was at best an<br />

afterthought.<br />

ransomware as attackers continue to profit.<br />

"We will also find new gangs entering the<br />

picture and continued development of<br />

attack tactics. Following the trend of recent<br />

years, ransomware will set its sights on<br />

ever higher value targets in healthcare,<br />

institutions of education and financial<br />

services. The more things change, the more<br />

they stay the same - the essential threat of<br />

ransomware is no different. Enterprises will<br />

develop workarounds to resist paying the<br />

ransom; ransomware continues to be the<br />

greatest threat to enterprises. We expect<br />

<strong>2021</strong> to produce new victories in the long<br />

ransom war," he states.<br />

As for remote work, he believes that more<br />

and more employees are going to demand<br />

it from their employers. "In <strong>2021</strong>, remote<br />

work will cement its place as a standard<br />

part of working life and create a new raft of<br />

considerations for enterprise security. How<br />

will an enterprise protect its network, if<br />

endpoints are employee-owned constantly<br />

on and off the corporate network, either<br />

from home or in the office? How are<br />

enterprises going to protect themselves,<br />

without the benefit of enterprise security<br />

controls? In <strong>2021</strong>, the fact of long-term<br />

remote work is going to force us to rethink<br />

how we secure enterprise data and<br />

infrastructure," he adds.<br />

STRAINING AT THE LEASH<br />

<strong>2021</strong> will be a year for organisations to<br />

reset and to fortify their cybersecurity<br />

resilience, according to Infosecurity Europe's<br />

community of security leaders. Europe's<br />

leading information security event asked its<br />

network of CISOs and analysts to comment<br />

on the major trends and changes they<br />

foresee shaping the next 12 months.<br />

Overall, they expect companies to focus on<br />

consolidating and reinforcing their security<br />

posture, as the full consequences of last<br />

year's rapid changes become apparent. This<br />

is a world that Maxine Holt, senior research<br />

director at Omdia, calls "the reset normal".<br />

She says: "From a security perspective, it's<br />

been difficult to maintain pace with the<br />

speed of change. COVID-19 accelerated<br />

cloud journeys, for instance,<br />

and security was at best an afterthought.<br />

Security functions applied temporary<br />

measures, and they will now peel back the<br />

sticking plaster and build more sustainable<br />

security for new ways of working. This<br />

should include upskilling staff in cloud<br />

security expertise, and looking at technology<br />

that can prevent, detect and respond to<br />

security incidents in these evolved<br />

environments."<br />

The threat landscape will continue to<br />

evolve at a speed that outpaces the<br />

cybersecurity industry, according to Becky<br />

Pinkard, CISO of Aldemore Bank. "I'd like<br />

to see companies buckle down on the<br />

'foundations of security', moving into an<br />

era of never-before-seen strength on the<br />

frontline fight against cyber threats," she<br />

comments. "However, I predict we'll see<br />

more of the same when it comes to security<br />

awareness, patching and risk prioritisation.<br />

The industry is maturing, but at a glacial<br />

pace. Until we pick up that pace, the<br />

current overall defensive posture will<br />

persist."<br />

When it comes to the threats that will<br />

come to the fore in <strong>2021</strong>, Heidi Shey,<br />

principal analyst serving security and risk<br />

professionals with Forrester Research,<br />

believes insider incidents will be an area<br />

of increased concern. "Pandemic-related<br />

uncertainty and remote work environments<br />

have collided to create the ideal conditions,"<br />

she explains. "We expect one-third of<br />

security breaches will be caused by insider<br />

threats in the coming year, up from 25%<br />

today. These may be due to accidental or<br />

inadvertent data misuse, or malicious intent.<br />

As part of their defence, firms should add<br />

capabilities for detecting insider threats<br />

and improve the employee experience."<br />

Part 2 of our predictions for cybersecurity in <strong>2021</strong><br />

will appear in the next issue.<br />

14<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


Computing<br />

Security<br />

Secure systems, secure data, secure people, secure business<br />

e-newsletter<br />

Are you receiving the Computing Security<br />

monthly e-newsletter?<br />

Computing Security always aims to help its readers as much as possible to do<br />

their increasingly demanding jobs. With this in mind, we've now launched a<br />

Computing Security e-newsletter which is produced every month and is available<br />

free of charge. This will enable us to provide you with more content, more<br />

frequently than ever before.<br />

If you are not already receiving this please send your request to<br />

christina.willis@btc.co.uk and advise her of the best email address for the<br />

newsletter to be sent to.


webcam perils<br />

BE CAREFUL WHO'S WATCHING YOU!<br />

JUST HOW SAFE ARE WEBCAMS - AND WHO'S MOST VULNERABLE<br />

TO HACKERS?<br />

As many parts of the world continue<br />

with strict lockdown restrictions, Zoom<br />

calls will remain the norm for some<br />

time. All to the good in such challenging<br />

times, but there are clear downsides, too.<br />

The tech and webcam specialists over at<br />

Reincubate have been analysing the real risks<br />

of webcams and detailed what we should be<br />

doing to protect ourselves as we let the world<br />

into our home via our webcam. Here is the<br />

company's take on where the greatest<br />

dangers lie:<br />

The rapid growth of remote and home<br />

working has led to a lot of users getting<br />

webcams or setting up Zoom equipment in<br />

their own homes. <strong>Mar</strong>k Zuckerberg<br />

inadvertently brought attention to the risks of<br />

users being covertly monitored through their<br />

computer's webcams or mics when he posted<br />

a now infamous photo of his desk setup,<br />

showing his laptop with a covered webcam<br />

and blocked mic. If even the creator of<br />

Facebook blocks his, who else does?<br />

Generally speaking, there are few video apps<br />

where the host can remotely enable video if<br />

the participant has turned it off after the start<br />

of the call, and Zoom is safe in this regard. It<br />

does, however, have a feature whereby the<br />

host can remotely unmute a participant's<br />

microphone. If you're in the habit of stepping<br />

away from your computer on long calls to get<br />

a cup of coffee whilst muted, beware that you<br />

might be unmuted without knowing about it.<br />

Similarly, if you're joining the call from a<br />

room with other people around, their<br />

unexpected presence in your background may<br />

cause them embarrassment if they're not<br />

expecting to be broadcast. These inadvertent<br />

risks can be handled with a few simple<br />

precautions: covering or physically<br />

disconnecting a webcam makes things more<br />

obvious and having a mic with a physical<br />

mute button helps.<br />

SECURING YOUR CAMERA AND MIC ON<br />

AN IPHONE<br />

iPhone and iPad users have the least to worry<br />

about. So long as the device has not been<br />

jailbroken, it is extremely unlikely that hackers<br />

can remotely monitor the device's camera or<br />

mic. Apple's release of iOS 14 has done even<br />

more to safeguard users with its new orange<br />

and green dots.<br />

Of course, it's still possible for apps to access<br />

an iOS device's camera and mic, but in order<br />

for this to happen, users must first install an<br />

app and grant it permission to record video<br />

and audio. It's possible for apps to record<br />

audio - but not video - whilst backgrounded,<br />

but again, permissions must first be given by<br />

the user. Broadly speaking, your iPhone and<br />

iPad should be perfectly safe, so long as you<br />

don't let them out of your sight and only<br />

install apps that you trust.<br />

SECURING YOUR WEBCAM AND MIC ON<br />

A MAC<br />

A Mac or a MacBook Pro is second only to an<br />

iPhone in its security. Recent Macs include<br />

something called a T2 chip, which includes a<br />

number of hardware-based security features.<br />

Most relevant of all, it uses hardware to<br />

physically disable a Mac laptop's microphone<br />

when the laptop is closed or suspended.<br />

From a practical perspective, it's impossible<br />

for Mac's webcam to be in use without the<br />

16<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


webcam perils<br />

accompanying green light being turned on. In<br />

the past, there have been workarounds, but<br />

the known exploits have been fixed on Macs.<br />

However, the software on the Mac does not<br />

trigger any sort of system-level security<br />

prompt when accessing a webcam or mic, so<br />

users must be careful to only use apps they<br />

trust. Security-conscious Mac users may wish<br />

to try OverSight (free) or Micro Snitch (paid),<br />

popular security tools that run in the<br />

background and alert users to any apps<br />

accessing their camera or mic.<br />

STAYING SECURE ON WINDOWS OR<br />

ANDROID<br />

Unfortunately, Windows and Android users<br />

will have the hardest time of all staying<br />

secure. Often the software and hardware for<br />

these devices are made by different<br />

companies, meaning there's plenty of room<br />

for loopholes between the two. Google's Play<br />

Store is infamous for including malware apps<br />

on a regular basis, and many Android phones<br />

suffer from not getting access to the latest<br />

security patches or Android updates.<br />

Theoretically, modern Android devices with<br />

the latest security patches will be close to an<br />

iPhone's security - at least, each app must<br />

prompt for webcam or mic access, but a<br />

status light won't be shown.<br />

But the problem is it's hard to tell by looking<br />

at an Android device if it's secure or up to<br />

date; simply because your phone says it has<br />

all of the latest security patches, doesn't mean<br />

that the manufacturer of your Android phone<br />

has made all of the security patches available.<br />

From this perspective, Google Android devices<br />

(such as the Pixel) are more trustworthy, as<br />

Google makes both the software and<br />

hardware together, and are ultimately<br />

responsible for issuing the most important<br />

security updates.<br />

Staying secure on these platforms is hard.<br />

The problem on Windows is so endemic that<br />

both Lenovo and HP have started building<br />

physical switches and covers into their<br />

webcams to give users some peace of mind.<br />

Without hardware control of the mic, it's<br />

impossible to tell if a Windows laptop could<br />

be recording in the background when open<br />

or closed!<br />

Blocking microphones isn't easy: you can't<br />

cover them with a piece of tape like you can a<br />

camera or at least, if you do, it won't be at all<br />

effective.<br />

Reincubate's advice, if running Android,<br />

would be to only use Google devices such as<br />

the Pixel and to avoid installing third-party<br />

apps from the Google Play Store. The risk of<br />

malware or app impersonation is not small.<br />

Seriously, if you want apps, use an iPhone.<br />

WHAT ABOUT ALEXA OR THE<br />

HOMEPOD?<br />

Plenty of users have an Alexa or HomePod<br />

device in their home or other forms of smart<br />

devices, like thermostats or security cameras.<br />

These are all capable of broadcasting video or<br />

audio captured within the home. It's very hard<br />

to keep tabs on these and ultimately one<br />

must either trust the company making them<br />

or not.<br />

"There are real risks to not covering a<br />

webcam, but, for users with Macs and<br />

iPhones, the greatest risk is most likely<br />

accidentally broadcasting themselves or<br />

unknowingly being unmuted by a meeting<br />

host, rather than being surveilled by a hacker,"<br />

says Aidan Fitzpatrick, Reincubate. "Webcam<br />

covers and physical mute buttons on<br />

microphones act as fail-safes and helpful<br />

reminders to think about security, and a piece<br />

of tape really is the best solution for use with<br />

a MacBook. I recommend users keep devices<br />

closed or powered off when not on use.<br />

"It's worth thinking about using an external<br />

webcam or, for better quality, a smartphone<br />

webcam, as it can be physically unplugged<br />

between calls. Being able to unplug one's<br />

camera is the best way to stay secure."<br />

<strong>Mar</strong>k Zuckerberg, Facebook: in a recent<br />

post, his laptop had a covered webcam<br />

and blocked mic.<br />

Aidan Fitzpatrick, Reincubate:<br />

unplugging your camera is the best way<br />

to stay secure.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

17


inside view<br />

HOW CAN ORGANISATIONS STOP THEIR DATA FALLING INTO<br />

THE WRONG HANDS? TERRY GREER-KING, VP EMEA, SONICWALL,<br />

OFFERS HIS INSIGHTS<br />

In an era where cybercriminals are<br />

more sophisticated than ever, and<br />

attacks are becoming more<br />

commonplace by the day, the market<br />

for stolen data on the dark web has<br />

become a truly lucrative trade. Recent<br />

years have seen the spoils of many<br />

cyberattacks end up for sale on<br />

underground marketplaces.<br />

For instance, the recent attack on the<br />

European Medicines Agency (EMA) saw<br />

confidential information on the Pfizer<br />

COVID-19 vaccine was leaked across<br />

several hacking forums. The fact that<br />

billions of private records are changing<br />

hands poses a threat to businesses<br />

everywhere.<br />

The dark web is the term used for<br />

web content that exists on darknets:<br />

networks that require specific software<br />

or authorisation to access. Through<br />

the dark web, users can communicate<br />

anonymously without divulging<br />

identifying information. While not all<br />

activity on the dark web is illegal, it is<br />

often the preferred forum for criminals.<br />

Ultimately, the variety of threats that<br />

businesses could face from the dark web<br />

is endless. Essentially, criminals are after<br />

anything that can be traded for profit -<br />

usernames, passwords, credit card<br />

details, intellectual property, bank<br />

details, or employee information. The<br />

criminals will then leverage this data<br />

for financial gain. While it's hard to give<br />

concrete figures on the price data will<br />

fetch on the dark web, recent examples<br />

include the aftermath of 2018's British<br />

Airways hack, where stolen logins sold<br />

for as little as £7.<br />

When factoring this is in with the fact<br />

that it takes on average nine months to<br />

discover a breach, the risks become even<br />

clearer. Unfortunately, once the data is<br />

out there, there's not a great deal to be<br />

done to get it back. Therefore, the main<br />

mode of defence for any organisation is<br />

to prevent these breaches happening in<br />

the first place. Businesses need to zero<br />

in on ensuring they have a layered<br />

cybersecurity posture. The idea behind<br />

this is simple: The more barriers are<br />

placed in front of criminals, the better<br />

the chances to prevent them stealing<br />

data. By looking at cybersecurity in this<br />

way, companies can build an extremely<br />

robust line of defence.<br />

This will not only require a blend of<br />

the best technology available, such as<br />

strong identification and authorisation,<br />

sandboxing, SSL encryption, and cloud<br />

application security, but indeed also<br />

a consistent emphasis on employee<br />

education. Even with the finest<br />

technology in the world, if workers<br />

are not wise to the nature of threats,<br />

a simple phishing attack could expose<br />

all your data.<br />

Ultimately, combining this approach<br />

with a top-down focus on ensuring that<br />

best practices are being adhered to is<br />

the best way to prevent sensitive data<br />

falling into the wrong hands.<br />

18<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


product review<br />

WANDERA PRIVATE ACCESS<br />

The COVID-19 crisis will continue to<br />

have a lasting impact on the way<br />

businesses around the globe<br />

collaborate and communicate, with<br />

repeated lockdowns forcing them to<br />

embrace remote working. In the rush to<br />

provide secure access to remote workers,<br />

enterprises are finding legacy VPNs (virtual<br />

private networks) are not fit for purpose,<br />

as their flawed trust models leave them<br />

open to all kinds of attacks.<br />

Zero Trust Network Access (ZTNA) is the<br />

new normal for securely accessing today's<br />

cloud and hybrid infrastructures and<br />

Wandera's Private Access (WPA) cloud<br />

service has a simple philosophy - trust no<br />

one. It ensures only authorised users can<br />

access business applications, and allows<br />

organisations to create software-defined<br />

network perimeters that surround and<br />

protect all corporate resources on<br />

premises, in data centres and the cloud.<br />

Wandera takes a mobile-first approach;<br />

but, along with support for iOS and<br />

Android, WPA has Windows 10 and<br />

macOS devices on its guest list. A key<br />

differentiator with legacy VPNs is WPA<br />

provides secure access to applications and<br />

not the network, thus blocking infiltration<br />

and lateral movement by hackers.<br />

WPA creates connections up to four<br />

times faster than legacy VPNs by<br />

employing a non-IPsec protocol, which<br />

uses single-packet authorisation in the<br />

cloud. This fast micro-tunnel activation<br />

provides seamless transitions between<br />

mobile and wireless networks for remote<br />

users on the move.<br />

WPA integrates tightly with existing<br />

identity providers (IdPs) and has Microsoft<br />

Azure AD at the top of the list. It also<br />

works with many others, including Okta,<br />

OneLogin, IBM, Centrify and Ping Identity.<br />

Deployment is a cinch as, from the<br />

Private Access administrative console, we<br />

defined Microsoft Azure as our IdP. After<br />

providing our Microsoft 365 credentials,<br />

WPA grabbed our Tenant ID and we were<br />

ready to go - it's that simple.<br />

Client deployment is equally easy, as<br />

users installed the iOS app on their<br />

mobiles, signed in with their Microsoft<br />

365 credentials and a secure tunnel was<br />

created in seconds. Likewise with our<br />

Windows 10 clients as, after installing the<br />

agent, they logged in using their Microsoft<br />

accounts and were ready to go.<br />

Wandera's admin console presents a<br />

wealth of information on users, global<br />

data usage, overall security ratings, the<br />

top countries devices connect from and<br />

much more. It provides quick access for<br />

sending enrolment links to users and<br />

creating activation profiles, which can<br />

integrate with existing UEM (unified<br />

endpoint management) solutions.<br />

WPA provisions policy-based access<br />

controls to SaaS apps in the public cloud<br />

and enterprise apps hosted privately.<br />

Policies are easy to create, as we selected<br />

Microsoft 365, Box, Dropbox and GSuite<br />

from the predefined list and requested<br />

that all access to these services should be<br />

encrypted and routed through the nearest<br />

Wandera data centre.<br />

From our user's perspective, there is<br />

nothing to see, because the process is<br />

completely transparent. They continued to<br />

access their business apps as normal, with<br />

the client handling tunnel creation and<br />

encryption in the background.<br />

Along with blocking users from accessing<br />

specific web site categories and applying<br />

data usage limits, you can assign riskaware<br />

security policies. Wandera's<br />

MI:RIAM (Mobile Intelligence: Real Time<br />

Insights and Analyst Machine) engine<br />

comes into play here, as it uses the data<br />

gathered by advanced machine learning<br />

techniques to determine if users are at risk<br />

from compromised apps, web content or<br />

devices and automatically blocks access.<br />

Provisioning safe remote access in these<br />

challenging times needn't be a headache<br />

for enterprises, as Wandera's Private<br />

Access provides an elegantly simple, yet<br />

highly secure, ZTNA solution. We found it<br />

remarkably easy to deploy, as it doesn't<br />

require new certificates, accounts or IT<br />

workflows to be created and its light<br />

touch on end user devices ensures they<br />

get the best possible experience.<br />

Product: Private Access<br />

Supplier: Wandera<br />

Web site: www.wandera.com<br />

Tel: +44 (0) 203 301 2660<br />

Sales: sales@wandera.com<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>ch <strong>2021</strong> computing security<br />

19


dark web<br />

WHEN DARKNESS FALLS<br />

SHOULD YOUR DATA LEAK, IT MIGHT WELL END UP FOR SALE ON THE DARK WEB,<br />

MAKING YOU VULNERABLE AND AN EASY TARGET FOR ADVANCED ATTACKS<br />

As the ever-vigilant SpyCloud has been<br />

pointing out, there's been an awful<br />

lot of buzz resulting from the recent<br />

so-called 'superbreach', referred to in the<br />

round as 'Collection #1'. "Containing over<br />

772,904,991 unique email addresses and<br />

more than 21 million passwords, this incident<br />

already stands out in terms of its sheer<br />

magnitude of exposure," it states. "It certainly<br />

doesn't help that the data was reportedly<br />

posted to a publicly accessible online forum."<br />

SpyCloud is not so sure the frenzy that<br />

seized the media when this breach erupted<br />

is an accurate reflection of what actually<br />

transpired in this instance. "The proliferation<br />

of stolen or leaked databases has given rise to<br />

credential stuffing, a fairly simple technique<br />

in which criminals load lists of previously<br />

breached credentials (from Linkedin,<br />

MyFitnessPal, MySpace, etc.), called combo<br />

lists, into automated brute-forcing tools to<br />

test credentials en masse. These tools test<br />

stolen passwords against thousands of<br />

targeted websites and applications until there<br />

is a match."<br />

The reality is that, armed with your<br />

credentials, online criminals can take over<br />

your online accounts and start ordering<br />

goods with your credit card. This might<br />

happen before the news of the breach even<br />

goes public. What are the likely consequences<br />

for organisations that have been hit in this<br />

way? What is the worst-case scenario likely<br />

to be? And how can they fight back?<br />

WIDENING AN ATTACK<br />

"As an information security testing company,<br />

we often get asked to assess the possibility<br />

of a threat actor gaining access to an<br />

organisation's critical information or control<br />

of internal networks," says Paul Harris,<br />

managing director, Pentest. "Leaked<br />

credentials, whether they be from the dark<br />

web or public forums, offer a potential entry<br />

point for these engagements and, over the<br />

years, have provided one of the most reliable<br />

routes in."<br />

However, using leaked credentials to gain<br />

access to company accounts isn't necessarily<br />

dangerous on its own, he points out - after<br />

all, the account may have low-level privileges.<br />

"You may get lucky and obtain access to an<br />

account with entry to sensitive data straight<br />

off the bat. It's more likely, though, that<br />

the compromised account is just a starting<br />

point for a wider attack. "Take a red team<br />

engagement we conducted for a large<br />

multinational tech company. They wanted to<br />

know if we could gain domain admin on a<br />

critical network. Our first step: check if leaked<br />

credentials worked. Due to password reuse,<br />

we were able to obtain access to the<br />

company's VPN and gain a presence on their<br />

internal network. From there, we were able<br />

to escalate our privilege level, through further<br />

vulnerabilities, until we had admin access on<br />

a server. Once access to the server had been<br />

obtained, we monitored traffic and, when a<br />

domain admin logged in, we were able to<br />

pull their credentials out of the server<br />

memory, going from leaked user credentials<br />

to complete control of the company's<br />

Microsoft Windows Domain."<br />

But how can you protect yourself against a<br />

scenario such as the one above? "Sadly,<br />

there's no silver bullet, but the more effective<br />

security measures you have in place, the<br />

harder it becomes for a threat actor," states<br />

Harris. "Our broad advice?<br />

Encourage employees to use long, unique,<br />

but easy-to-remember passwords, such as<br />

phrases, and enforce tight password policies.<br />

Introduce 2FA [two-factor authentication]<br />

around key access points, such as VPN, Email,<br />

Office365 etc, and consider tighter user<br />

privilege levels. People should only have<br />

20<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


dark web<br />

access to the information/networks they<br />

truly need to do their job, no more." Finally,<br />

he advises challenge your security posture as<br />

often and as thoroughly as you can. "It's<br />

always better to have an internal team, or<br />

testing provider, find a vulnerability than a<br />

malicious threat take advantage of it."<br />

LUCRATIVE TRADE<br />

As Terry Greer-King, VP EMEA, SonicWall,<br />

points out, the market for stolen data on<br />

the dark web has become a truly lucrative<br />

trade. "Recent years have seen the spoils of<br />

many cyberattacks end up for sale on<br />

underground marketplaces."<br />

He cites the December attack on the<br />

European Medicines Agency (EMA),<br />

confidential information on the Pfizer<br />

COVID vaccine as one notable example of<br />

date being leaked across several hacking<br />

forums. "Needless to say, the fact that<br />

billions of private records are changing<br />

hands poses a threat to businesses<br />

everywhere."<br />

Ultimately, the variety of threats that<br />

businesses could face from the dark web<br />

is endless. "Essentially, criminals are after<br />

anything that can be traded for profit -<br />

usernames, passwords, credit card details,<br />

intellectual property, bank details, or<br />

employee information," adds Greer-King.<br />

"The criminals will then leverage this data<br />

for financial gain. While it's hard to give<br />

concrete figures on the price data will fetch<br />

on the Dark Web, examples include the<br />

aftermath of 2018's British Airways hack,<br />

where stolen logins sold for as little as £7."<br />

It takes on average nine months to<br />

discover a breach, so the risks involved<br />

become even clearer. "Unfortunately, once<br />

the data is out there, there's not a great deal<br />

to be done to get it back. Therefore, the<br />

main mode of defence for any organisation<br />

is to prevent these breaches happening in<br />

the first place. Businesses need to zero in on<br />

ensuring they have a layered cybersecurity<br />

posture. The idea behind this is simple:<br />

the more barriers are placed in front of<br />

criminals, the better the chances are to<br />

prevent them stealing data. By looking at<br />

cybersecurity in this way, companies can<br />

build an extremely robust line of defence."<br />

This will not only require a blend of the<br />

best technology available, he adds, such<br />

as strong identification and authorisation,<br />

sandboxing, SSL encryption, and cloud<br />

application security, but also a consistent<br />

emphasis on employee education. "Even<br />

with the finest technology in the world,<br />

if workers are not wise to the nature of<br />

threats, a simple phishing attack could<br />

expose all your data. Ultimately, combining<br />

this approach with a top-down focus on<br />

ensuring that best practices are being<br />

adhered to is the best way to prevent<br />

sensitive data falling into the wrong hands."<br />

Terry Greer-King, SonicWall: billions of<br />

private records changing hands poses a<br />

threat to businesses everywhere.<br />

Paul Harris, managing director, Pentest:<br />

challenge your security posture as often<br />

and as thoroughly as you can.<br />

UNLOCKING THE COMBINATIONS<br />

Combo (combination) lists - see main text - are usually not that interesting, from<br />

a security standpoint, because they are full of duplicate records, says SpyCloud<br />

(www.spycloud.com). In many cases, duplicates of duplicates of duplicates.<br />

SpyCloud analysts has published content on this subject, in light of the epidemic of<br />

password reuse. "As increasingly more websites and applications require account<br />

creation, people simply can't recall the many unique passwords they use between<br />

accounts," it says. "To make things easier, they reuse passwords amongst multiple<br />

sites, recycle old passwords and/or make only slight modifications to existing<br />

passwords. For criminals, this makes account takeover easier than ever - especially<br />

with the help of massive combo lists such as the one recently disclosed."<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

21


cyber incidents<br />

ATTACKS HIT RECORD HIGH<br />

CYBER SECURITY INCIDENTS ARE NOW OUTSTRIPPING ANYTHING THAT THE<br />

UK'S NATIONAL CYBER SECURITY CENTRE HAS HAD TO DEAL WITH IN THE PAST<br />

The UK's National Cyber Security Centre<br />

(N<strong>CS</strong>C) handled a record number of<br />

cyber security incidents over the last 12-<br />

month period accounted for. The agency dealt<br />

with 723 serious incidents between<br />

September 2019 and the end of August<br />

2020, a 20% increase on the 602 it handled<br />

the year before. More than 200 of these<br />

incidents were related to the coronavirus,<br />

according to the N<strong>CS</strong>C's latest annual review.<br />

The N<strong>CS</strong>C has been taking a series of decisive<br />

actions against malicious actors in the UK and<br />

abroad to combat this threat. We ask those in<br />

the security industry what preventive<br />

measures organisations can carry out, for their<br />

part, to keep them from being victims of such<br />

attacks in <strong>2021</strong>.<br />

"Cybercriminals keep a close eye on events<br />

that are happening around the globe," says<br />

Jelle Wieringa, technical evangelist, KnowBe4.<br />

"To them, big events that attract a lot of media<br />

attention are an opportunity around which to<br />

build their attacks. COVID-19 is, unfortunately,<br />

a perfect example of cybercriminals taking<br />

advantage of world events."<br />

Those scams started with information about<br />

COVID-19 infection rates back in <strong>Mar</strong>ch last<br />

year and escalated to contact tracing over the<br />

summer. "With vaccines beginning to be<br />

administered to front line personnel and<br />

healthcare workers, cybercriminals are taking<br />

advantage of this by creating new phishing<br />

emails targeting users to click a malicious link<br />

or open an attachment. And with the world<br />

moving faster and faster, big things seemingly<br />

happen every day. So, there is no shortage of<br />

new events for cybercriminals to choose from.<br />

"For organisations to be able to defend<br />

themselves, they need to know where threats<br />

are coming from and what to defend against.<br />

Gathering security intelligence, whether it is<br />

through open source, paid or otherwise<br />

collected channels, is a great way for<br />

organisations to have visibility into what is<br />

happening, which allows cybercriminals to<br />

predict and prepare." Unfortunately, not<br />

everything can be clearly foreseen. "Therefore,<br />

an organisation needs to be prepared to fend<br />

off attacks, whether they are anticipated or<br />

not," he advises. "And with the pandemic still<br />

holding the world in its grasp, most<br />

employees will be forced to work from home<br />

for at least the foreseeable future. Even after<br />

employees are allowed to return to the office,<br />

it will be a while before everything goes back<br />

to a state of somewhat normal. This leaves<br />

employees particularly vulnerable to social<br />

engineering attacks - something<br />

cybercriminals are well aware of."<br />

Wieringa also points to how social<br />

engineering is a form of deception that is<br />

22<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


cyber incidents<br />

used to manipulate individuals into divulging<br />

confidential or personal information that may<br />

be used for fraudulent and malicious<br />

purposes. "It is a popular tactic for today's<br />

cybercriminals to target humans, which is<br />

why it's so important to build up an<br />

organisation's human firewall and to help<br />

employees make smarter security decisions<br />

every day. This means organisations need to<br />

pay extra attention to the human side of<br />

cybersecurity. Training employees, promoting<br />

and rewarding secure behaviour, and<br />

cultivating a positive security culture<br />

throughout the organisation will be key to<br />

help combat social engineering attacks now<br />

and in the future."<br />

RELENTLESS ATTACKS<br />

Keith Driver, chief technical officer, Titania,<br />

says the figures released by the National Cyber<br />

Security Centre (N<strong>CS</strong>C) in its 2020 Annual<br />

Review demonstrate the relentless increase in<br />

cases whereby a cybersecurity attack has<br />

resulted in an incident requiring the UK<br />

national response team's attention -with, on<br />

average, almost two serious incidents<br />

occurring every day across the year.<br />

"On a national scale, the N<strong>CS</strong>C Active Cyber<br />

Defence programme has had incredible<br />

results," he points out. "It continues to roll out<br />

effective capabilities, like the Suspicious Email<br />

Reporting Service [SERS - where you can<br />

forward your suspicious email to<br />

'report@phishing.gov.uk for investigation],<br />

which received 2.3million emails in 2020,<br />

Protected DNS and Exercise in a Box, as well<br />

as a plethora of clear and concise advice<br />

notes."<br />

While these initiatives operate nationally on<br />

behalf of the British public, the protection of<br />

individuals and commercial enterprises<br />

requires us all to take action, he adds. "After<br />

all, as highlighted in the report, 'Cybersecurity<br />

is a team sport' , the N<strong>CS</strong>C has consistently<br />

promoted that the most effective cyber<br />

defence starts with basic cyber hygiene. The<br />

'10 Steps to cybersecurity' and 'Cyber<br />

Essentials' initiatives have been instrumental in<br />

helping to make the UK a safer place by<br />

providing easy-to-understand and practical<br />

advice on cyber policy and specific technical<br />

protections."<br />

When followed, the advice for endpoints,<br />

the networks they attach to and the people<br />

who use them provides a robust defence to<br />

the most common attacks, eliminating<br />

perhaps 99% of the threat, states Driver.<br />

"Basic cyber hygiene is vital to protect against<br />

the majority of attacks and it's something that<br />

Titania has discussed in depth. That's because<br />

it makes it so much harder for an attacker to<br />

gain a foothold. Everything from password<br />

strength and management, to device and<br />

network node configuration [firewalls, for<br />

example], is integral to operating a resilient<br />

and robust network, and should be<br />

considered."<br />

However, this does not need to be a lengthy<br />

process, he adds. "Much of basic cyber<br />

hygiene assurance can be automated,<br />

meaning it doesn't require human<br />

intervention to check that device<br />

configurations are secure or that policies have<br />

not been breached. I believe that this is where<br />

the value of technical solutions shines. By<br />

providing certainty in understanding that your<br />

policies and required configurations are being<br />

adhered to, the chances of an attacker being<br />

successful are much reduced and resources<br />

can be focused elsewhere, preferably on value<br />

creation."<br />

DEFENDING THE UK<br />

Since its inception in 2016, the N<strong>CS</strong>C has<br />

done incredible work and continues to defend<br />

the UK in an ever-changing threat landscape,<br />

he continues. "However, organisations and<br />

individuals now need to make the<br />

organisation's job as easy as possible by taking<br />

responsibility for our networks, devices and<br />

actions. This means ensuring that we make it<br />

as hard as possible for those that would do us<br />

harm and be continually vigilant, checking<br />

that this continues to be the case."<br />

Jelle Wieringa, KnowBe4: COVID-19 is a<br />

perfect example of cybercriminals taking<br />

advantage of world events.<br />

Keith Driver, Titania: the N<strong>CS</strong>C Active<br />

Cyber Defence programme has had<br />

incredible results.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

23


industry insights<br />

THE PATIENT APPROACH PAYS OFF<br />

NHS MANAGEMENT ADOPTS A SECURITY-FIRST MINDSET, WITH HELP FROM AT&T CYBERSECURITY<br />

NHS Management provides<br />

administrative and consulting services<br />

the US southeast region. Naturally,<br />

quality of care is the number one priority, as<br />

is protecting patient data in such a highly<br />

regulated environment. Stephen Locke, CIO<br />

for NHS Management, explains: "There are a<br />

lot of unique challenges in healthcare when<br />

it comes to cybersecurity, particularly with<br />

the increase of regulations over the past ten<br />

years, as well as the complexities that<br />

come with managing inpatient records, and<br />

securing communications between vendors<br />

and third parties."<br />

Around three years ago, during a long<br />

holiday weekend, NHS Management found<br />

itself at the mercy of cyber-attackers, who<br />

hit the company with ransomware at a time<br />

when they knew most people would be<br />

out of the office. Though no data was<br />

compromised, it took about a week to get<br />

the desktops back up and running again after<br />

NHS Management paid the ransom. It was at<br />

this time that Locke had been looking for a<br />

security solution that would give his teams<br />

the visibility into the network they needed to<br />

detect and respond more quickly to security<br />

incidents, such as ransomware.<br />

The company had been using several point<br />

security solutions, but, without a central<br />

point of management combined with lack<br />

of human resources, the logs piled up and<br />

going through them all was a difficult task.<br />

Locke chose to use AT&T Cybersecurity's<br />

Managed Threat Detection and Response<br />

service, instead of building out a dedicated<br />

in-house security operations centre (SOC);<br />

and so the company began its security-first<br />

journey.<br />

BUSINESS SUPPORT IS KEY<br />

Cole Two Bears, systems architect at NHS<br />

Management, expands further, noting that<br />

"business support of what is transpiring<br />

across the network is key, because you can<br />

only secure what you can see, so there has<br />

to be a strong focus on security from within<br />

the organisation". The deployment also had<br />

to be done in a way that didn't disrupt users'<br />

workloads - something that is very important<br />

in a healthcare setting.<br />

And while Locke is not a fan of outsourcing<br />

for outsourcing's sake, he also states: "In our<br />

case, with limited personnel resources, it<br />

made sense from a business perspective,<br />

but also financially, as the AT&T Managed<br />

Detection and Response service is less costly<br />

than having to hire several new skilled<br />

security team members."<br />

The pandemic has brought about many<br />

other challenges, as users have the strong<br />

expectation that they will have access to the<br />

data they need, regardless of their physical<br />

location. And they fully expect to be able to<br />

access it securely. "With more and more<br />

people working outside of your perimeter<br />

walls, you need to provide that line of<br />

communication is highly secure, and people<br />

can get to it all the time and make sure<br />

you're able to submit all the information that<br />

you need to the state government, national<br />

government and the like," says Locke.<br />

"With AT&T Managed Threat Detection and<br />

Response, I'm confident the ransomware<br />

issue we experienced previously wouldn't<br />

have happened," Two Bears concludes.<br />

"We've been delighted and impressed with<br />

the service, which allows our small security<br />

team the time to deliver on other important<br />

projects. Not having enough human capital<br />

is a problem many organisations face,<br />

making a managed security service an ideal<br />

option."<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

24


Computing<br />

Security<br />

Secure systems, secure data, secure people, secure business<br />

Product Review Service<br />

VENDORS – HAS YOUR SOLUTION BEEN<br />

REVIEWED BY COMPUTING SECURITY YET?<br />

The Computing Security review service has been praised by vendors and<br />

readers alike. Each solution is tested by an independent expert whose findings<br />

are published in the magazine along with a photo or screenshot.<br />

Hardware, software and services can all be reviewed.<br />

Many vendors organise a review to coincide with a new launch. However,<br />

please don’t feel that the service is reserved exclusively for new solutions.<br />

A review can also be a good way of introducing an established solution to<br />

a new audience. Are the readers of Computing Security as familiar with<br />

your solution(s) as you would like them to be?<br />

Contact Edward O’Connor on 01689 616000 or email<br />

edward.oconnor@btc.co.uk to make it happen.


email perils<br />

YOU'VE GOT EMAIL... BREACHES<br />

MISDIRECTED EMAILS HAVE BEEN IDENTIFIED AS THE UK'S TOP CAUSE OF REPORTED SECURITY INCIDENTS,<br />

LEADING TO 44% MORE INCIDENTS THAN PHISHING ATTACKS. BRIAN WALL REPORTS<br />

Steve Mulhearn, Fortinet: CISOs must<br />

educate their employees about common<br />

attacks.<br />

During the pandemic, email volumes<br />

have surged, with one-in-two IT<br />

leaders seeing an increase of over<br />

50%. Coupled with the finding that 70%<br />

of IT leaders surveyed reported that they<br />

felt sensitive data is at greater risk when<br />

employees are working from home, the<br />

pandemic has created a perfect storm for<br />

email data breaches.<br />

Will things be any better in <strong>2021</strong>, even as<br />

and when emerging vaccines enable us to<br />

get to grips with COVID-19? Has the virus<br />

actually served as a catalyst to ramp up<br />

attacks and will this simply continue, should<br />

the virus be brought under firm control?<br />

Ultimately, can we only ever expect a 'least<br />

worst case' with email and accept that we all<br />

must suffer some level of collateral damage?<br />

CORNERSTONE<br />

As <strong>Mar</strong>k Forrest, CEO, Cryptshare, comments,<br />

email is likely to remain the cornerstone of<br />

our communications for some time to come,<br />

for the simple reason that it is universal,<br />

effective and cheap. "There are a plethora of<br />

point solutions for encrypting, scanning,<br />

blocking, authenticating and protecting<br />

against email-born threats. But, in the end,<br />

we need to solve the puzzle of having all of<br />

these things at a price that our very much<br />

under-pressure budgets demand,” he states.<br />

"Breadth and cost effectiveness have come<br />

into sharp focus during the pandemic where<br />

the promises of the biggest enterprise<br />

software vendors are being found wanting.<br />

This is not a time to drop your defences,"<br />

he cautions, "but there are cost-effective<br />

choices."<br />

With the trend towards a remote<br />

workforce continuing this year, the need to<br />

keep the remote workforce secure will<br />

continue, says Dean Coclin, senior director of<br />

business development at DigiCert. "With<br />

regard to emails, providing tools to warn<br />

users of emails originating outside the<br />

organisation, capabilities to encrypt email<br />

and keeping email safe on mobile devices will<br />

continue to be essential. VPN use will expand<br />

as organisations see the security benefit."<br />

With information about the pandemic<br />

constantly being sought, hackers look to<br />

entice people to click on email links<br />

associated with COVID cures, virus testing<br />

sites and similar topics. "These links can lead<br />

to malicious sites, defective equipment (ie,<br />

PPE) and phishing sites to get login/password<br />

information," he adds. "Cybercriminals will<br />

use whatever hot topic, be it the virus or<br />

something else, to steal credentials from<br />

unsuspecting users."<br />

That said, organisations have become more<br />

adept at increasing their email security, Coclin<br />

points out. "Technologies such as DMARC,<br />

which prevent unauthorised individuals from<br />

sending emails using the company domain,<br />

are becoming more popular. Also, digital<br />

certificates to sign and encrypt email are<br />

being increasingly rolled out at companies,<br />

large and small. The CA/Browser Forum is<br />

currently working on new standards for<br />

email certificates, which are expected to be<br />

released this year. All of these improvements<br />

will help minimise 'collateral damage' and<br />

improve email security for all."<br />

MISDIRECTED MISSIVES<br />

Misdirected emails cause the most incidents<br />

and are, according to Egress CEO Tony<br />

Pepper, "a revolving door" for data breaches,<br />

especially with many organisations moving<br />

26<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


email perils<br />

to long-term remote working and email<br />

becoming an even more vital tool for sharing<br />

business information, particularly sensitive<br />

data. "In fact, our recent Outbound Email<br />

Security Report revealed that 94% of<br />

organisations have seen increased volumes<br />

in outbound email and one-in-two saw<br />

growth of over 50%. With this surge in<br />

email volumes came an increase in the<br />

surface area for risk."<br />

It means people are also more likely to<br />

make errors. "Remote working has created<br />

a challenging environment for many<br />

employees, with a myriad of distractions<br />

present - from providing childcare to<br />

answering the door for deliveries. These<br />

distractions easily lead to employees making<br />

mistakes, such as sending an email to the<br />

wrong person. It's no surprise, then, that<br />

80% of organisations reported data being<br />

put at risk for a reason as simple as the<br />

wrong recipient being added to an email."<br />

STRESS LEVELS SOAR<br />

Employees are also experiencing higher levels<br />

of stress, with the line between work and<br />

home life more blurred than before,"<br />

continues Pepper. "Our research found<br />

that almost 40% serious email data breach<br />

incidents were caused by tired and stressed<br />

employees."<br />

With some 70% of IT leaders believing<br />

that sensitive data is at greater risk when<br />

employees are working remotely, heightened<br />

insider risk will be an issue for organisations<br />

in the long term, he comments. "If 2020<br />

has taught us anything, it's the importance<br />

of securing the individuals within our<br />

organisation's human layer, so they can work<br />

effectively and productively - particularly<br />

when using email.<br />

“With a combination of the intelligent<br />

technology and robust security training,<br />

organisations can keep their data safe, even<br />

in this period of heightened insider risk,"<br />

Pepper concludes.<br />

One of the biggest vulnerabilities that has<br />

presented itself since the increase in remote<br />

working patterns is the advancement of<br />

social engineering tactics," comments<br />

Steve Mulhearn, director of enhanced<br />

technologies, Fortinet. "Unscrupulous actors<br />

are leveraging important contextual<br />

information about users, including daily<br />

routines, habits, or financial information and<br />

the chaos of email is the easiest place to slip<br />

by unnoticed."<br />

The most common security breach<br />

experienced by UK businesses in 2020<br />

according to GOV UK , were phishing<br />

attacks, with 86% of businesses falling<br />

foul of fraudulent emails and redirects to<br />

fraudulent websites, he adds. "To combat<br />

this risk, CISOs must educate their employees<br />

about common attacks that could appear<br />

in the form of phishing, spear phishing,<br />

smishing or various other tech support<br />

scams." The simple tap of the shoulder in<br />

offices of old has drifted away, and now<br />

employees are left to the confinement of the<br />

four walls of their home office and inbox,<br />

rues Mulhearn. "However, the home office<br />

should remain purely an extension of the<br />

corporate security policy, and employee and<br />

company cyber behaviour should stay the<br />

same. One way of implementing this is<br />

through a Zero Trust Network Access (ZTNA)<br />

model and ensuring flexibility is increased<br />

without the increase in risk. If malware is<br />

installed, then isolation and data access<br />

restriction to remediate is critical, and<br />

Endpoint Detection and Response (EDR)<br />

systems play a crucial part in this process."<br />

He emphasises that, through cyber<br />

awareness training and instilling the correct<br />

habits, such as email best practice, you can<br />

create a culture of security, relieving pressure<br />

on the security team and allowing a 'human<br />

firewall' to be built around the business. "If<br />

the awareness of threats is combined with<br />

habit, every individual within the business will<br />

be able to take greater care of their own<br />

cyber brick within the wall."<br />

Tony Pepper, Egress CEO: Misdirected<br />

emails are a revolving door for data<br />

breaches.<br />

Dean Coclin, DigiCert: VPN use will<br />

expand as organisations see the security<br />

benefit.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

27


iometrics<br />

CHANGE IS ON THE CARDS<br />

EVER WONDERED WHETHER WORKPLACE SECURITY, NO MATTER WHERE YOU ARE,<br />

MIGHT BE POSSIBLE? PERHAPS BIOMETRI<strong>CS</strong> COULD OFFER A WAY FORWARD<br />

regulated and more susceptible to attack."<br />

To minimise crime and financial losses,<br />

enterprises need more control over who can<br />

access their buildings, or offices - wherever<br />

they might be - and access to their servers<br />

and digital data, she advises.<br />

"With biometrics gathering momentum<br />

beyond smartphones, it can offer more<br />

secure and convenient authentication across<br />

the workplace that could be at the office, at<br />

home or even at a café."<br />

WHY BIOMETRI<strong>CS</strong>?<br />

Biometric access cards can be thought of<br />

as a modern-day key that combines access<br />

with a multiuse, such as an ID badge.<br />

Each access card is linked to one specific<br />

cardholder, who registers their fingerprint<br />

on the card. When entering a building or<br />

office, or logging into any system, the card's<br />

biometrics must match the person using<br />

the card, ensuring that only authorised<br />

employees gain access.<br />

Traditional security measures no longer<br />

align with modern needs. Passwords,<br />

for example, are easily hacked and<br />

carry the risk of serious data breaches.<br />

Moreover, employees have to remember<br />

an array of different codes across devices<br />

and accounts, leading not only to reuse<br />

and frustration, but costing enterprise IT<br />

department millions a month in resetting<br />

forgotten passwords.<br />

Unsurprisingly, then, the demand for more<br />

secure and seamless access methods has<br />

been rising. One 2019 Gartner study<br />

predicted that 60% of large and global<br />

enterprises, along with 90% of mid-size<br />

enterprises, will implement passwordless<br />

authentication methods in over half of use<br />

cases by 2022.<br />

"This year has put even more pressure on<br />

the need for increased workplace security,<br />

as well as convenience for the employees,"<br />

says <strong>Mar</strong>ia Pihlström at Fingerprints.<br />

"Although flexible working was already<br />

a growing trend, it has accelerated<br />

significantly in the light of the pandemic<br />

and remote working mandates, increasing<br />

the average cost of a workplace data breach<br />

by $137,000*. In addition, employees<br />

have started working more flexible hours<br />

on-premises, making building access less<br />

"Since unique biological traits are<br />

extremely difficult to steal and spoof,<br />

biometric access cards are more secure<br />

than traditional access cards and fobs<br />

that require PINs, or no additional<br />

authentication," states Pihlström.<br />

"Compared to existing solutions, the<br />

technology is also more convenient.<br />

You can't forget your fingerprint, after all,<br />

not to mention there's the possibility to<br />

streamline authentication across the<br />

workplace. And if it gets lost or stolen,<br />

no one else can use it. There's no need to<br />

tap or touch a shared PIN pad or reader<br />

either, as the card is contactless.<br />

"These benefits are often far simpler to<br />

28<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


iometrics<br />

realise than many enterprises imagine.<br />

Biometric cards can be integrated into<br />

existing infrastructure across offices,<br />

enabling improved workplace security that<br />

is convenient for both employers and their<br />

employees. And because the biometric data<br />

is stored and processed on the card, privacy<br />

is guaranteed for employees, while<br />

organisations don't have the cost,<br />

complexity and compliance headaches<br />

associated with managing biometric<br />

databases," she points out.<br />

ADDING SECURITY AND CONVENIENCE<br />

Use cases for biometric access cards are<br />

numerous. "Besides unlocking doors, the<br />

cards can also be used for any other new or<br />

existing authentication access point across<br />

the workplace, such as logging into work<br />

computers or digital files, accessing time<br />

and attendance systems, and resetting<br />

alarm systems. The benefits of increased<br />

and more convenient security reach far<br />

beyond keeping burglars out." From<br />

preventing industry espionage to managing<br />

personnel in vital industries, she offers three<br />

examples where biometric access cards can<br />

add security where it matters.<br />

"In healthcare, whether for certain<br />

wards, drugs cabinets or operation rooms,<br />

protected access is crucial. Moreover, with<br />

two-factor authentication already in place<br />

for many access points or to review patient<br />

data, traditional methods can add time<br />

pressure to often busy workdays.<br />

Combining security and convenience,<br />

biometric cards can strengthen access<br />

control systems, while removing a point of<br />

friction for many healthcare professionals.<br />

The UK's NHS is just one example that's<br />

recently announced it's investing £40 million<br />

in implementing biometrics to remedy staff<br />

stress and frustration with the legacy IT<br />

system access process.**<br />

In a pharmacy setting, biometric access<br />

cards can also ensure that only qualified<br />

employees have access to certain<br />

medications. "Similarly, it can conveniently<br />

unlock the issuance of medicine in digital<br />

systems for permitted staff and allow them<br />

- and only them - to review and update<br />

the personal health information of their<br />

patients," she adds.<br />

KEEPING CORPORATE SECRETS<br />

Corporations and enterprises hold many<br />

highly sensitive files that, if stolen or<br />

otherwise compromised, could damage<br />

the company or individuals. From legal<br />

offices to accountancy firms, biometric<br />

access cards could not only keep offices<br />

highly secure, but also lock devices and<br />

certain files on a company's system. "By<br />

locking digital files with biometrics, only<br />

employees working on a particular project<br />

would have access to the information,<br />

ensuring that confidential information is<br />

no longer at the mercy of easily hacked<br />

passwords. And when files do disappear<br />

or fall into the wrong hands, a meticulous<br />

record showing who last had access to the<br />

office or information can facilitate a<br />

smoother investigation of the data<br />

breach."<br />

Labs and R&D departments are often<br />

subject to industry espionage. In this type<br />

of workplace, biometric access cards can<br />

ensure sensitive information stays under<br />

lock and (digital) key. "But ideas are not the<br />

only thing kept safe by the cards. Because<br />

labs can contain dangerous materials,<br />

substances and machinery, controlled<br />

access is even more important. Biometrics<br />

can enable more controlled and secure<br />

access, ensuring hazardous premises are<br />

only accessible to trained and authorised<br />

personnel. Research departments are<br />

also often sensitive and sterile test<br />

environments, and require meticulous<br />

logs of who has entered an area or<br />

operated a machine. Biometric security<br />

systems can reduce errors in attendance<br />

logging, creating more predictable test<br />

environments and, ultimately, facilitating<br />

more accurate test results."<br />

<strong>Mar</strong>ia Pihlström, Fingerprints: remote<br />

working has made building access less<br />

regulated and more susceptible to attack.<br />

Hacked and forgotten passwords cost IT<br />

departments millions a year, while lost keys<br />

and forgotten passwords are a number one<br />

frustration for many employees. Biometric<br />

access cards can provide a more convenient<br />

and secure authentication solution for both<br />

physical and logical access control, offering<br />

a solution to security breaches and the need<br />

to remember multiple strong passwords.<br />

"But the technology can go beyond just<br />

cost savings for IT teams and reducing daily<br />

annoyances," Pihlström points out. "By<br />

offering improved security in high-stake<br />

industries, biometrics can ensure that<br />

medication is authorised by the right<br />

person, compromising information is kept<br />

confidential, and inventors keep control<br />

of their intellectual property. In this way,<br />

biometric access cards bring a whole new<br />

dimension to worriless workdays, unlocking<br />

a modern workplace security system that<br />

adds convenient security where it truly<br />

matters," she concludes.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

29


cyber refocus<br />

CYBER STRATEGY HITS CRITICAL POINT<br />

CYBER SECURITY HAS NEVER HAD MORE RELEVANCE, WHEN SET AGAINST A BURGEONING BACKDROP<br />

OF CHALLENGES THAT WILL UNDOUBTEDLY CONTINUE TO VEX ORGANISATIONS IN THE YEAR AHEAD<br />

Daisy McCartney, PwC: security teams<br />

need a mix of soft and technical skills,<br />

coupled with business knowledge.<br />

The increasing sophistication of cyber<br />

criminals, coupled with the rapid shift<br />

to digital technologies brought about<br />

by the coronavirus (COVID-19) pandemic,<br />

has emphasised cyber security's importance<br />

for both individual organisations and<br />

wider society. Amidst this backdrop, the<br />

professional services network firm PwC has<br />

launched its latest insights into what's<br />

changing and what's next in cyber security.<br />

The findings are based on a survey of 3,249<br />

business and technology executives from<br />

around the world, including 265 in the UK.<br />

An overwhelming 96% of UK respondents<br />

said that they will shift their cyber security<br />

strategy, due to COVID-19, with half now<br />

saying they are more likely to consider<br />

cyber security in every business decision. In<br />

addition, a third of UK respondents (34%)<br />

plan to accelerate their digitalisation plans,<br />

on account of COVID-19.<br />

When asked what they saw as being the<br />

most likely cyber events to impact their<br />

industry over the next 12 months, 58% of<br />

UK respondents cited an attack on cloud<br />

services, followed by a disruptionware<br />

attack on critical business services (52%)<br />

and a ransomware attack (50%).<br />

At a global level, PwC's research showed<br />

that the strategic focus on cyber security<br />

will lead to a more prominent role for the<br />

chief information security officer (CISO).<br />

Two-fifths (43%) of global respondents<br />

agree that there will be more frequent<br />

interactions between the CISO and CEO<br />

or board, but this falls to 34% in the UK.<br />

This shows that more needs to be done to<br />

elevate cyber security conversations to UK<br />

boardrooms, says PwC, and this could be<br />

achieved by better aligning cyber risk to<br />

business strategy.<br />

LOW CONFIDENCE<br />

The research found that a majority of<br />

organisations lack confidence in their cyber<br />

spend. Just 38% of UK respondents are very<br />

confident their cyber budget is allocated to<br />

the most significant cyber risks, compared<br />

to 44% globally. Similarly, only 36% of UK<br />

respondents are very confident that they<br />

are getting the best return on their cyber<br />

spend versus 42% globally. Despite this lack<br />

of confidence, 56% of UK respondents are<br />

planning to increase their cyber budgets in<br />

<strong>2021</strong>.<br />

Richard Horne, cyber security chair, PwC,<br />

comments: "It's surprising that so many<br />

organisations lack confidence in their cyber<br />

security spend. It shows businesses need<br />

to improve their understanding of cyber<br />

threats and the vulnerabilities they exploit,<br />

while changing the way they think about<br />

cyber risk, so it becomes an intrinsic part of<br />

every business decision."<br />

When asked whether they would be<br />

expanding their cyber security teams in<br />

2020, 42% of UK respondents said they<br />

plan to increase their headcount, compared<br />

to 51% globally. However, the research also<br />

found that more than a fifth (22%) of UK<br />

organisations are planning to decrease the<br />

size of their cyber security team, compared<br />

to 16% globally.<br />

New hires in the UK are expected to<br />

possess more than just technical<br />

knowledge. When asked which cyber<br />

30<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


cyber refocus<br />

security skills were most in demand, UK<br />

respondents cited security intelligence<br />

(46%) and the ability to work with cloud<br />

solutions (40%) as the most important<br />

skills for new employees, closely followed<br />

by communication (38%), project<br />

management (38%) and analytical skills<br />

(37%). This reflects the evolution of the<br />

industry, states PwC, with cyber teams now<br />

required to work collaboratively with the<br />

rest of the business to develop a strategic,<br />

analytical approach to cyber security.<br />

Daisy McCartney, cyber security culture<br />

and behaviour lead at PwC, argues that, as<br />

cyber security becomes a strategic priority,<br />

organisations should be hiring talent from<br />

more diverse backgrounds. "Security teams<br />

need a mix of soft and technical skills,<br />

coupled with business knowledge - this<br />

helps improve collaboration with senior<br />

leaders and ensures that cyber security<br />

decisions support the organisation's<br />

strategic goals."<br />

SPOTTED AND BLOCKED<br />

Meanwhile, cyber attacks may soon be<br />

spotted and blocked before they even have<br />

a chance to wreak havoc in organisations'<br />

operations, according to cyber security firm<br />

BlackDice, which is developing the machine<br />

learning and predictive analytics designed<br />

to forecast and protect against cyber<br />

attacks, following a £100,000 grant from<br />

Innovate UK, the UK's innovation agency's<br />

Sustainable Innovation Fund. The objective<br />

is to help all UK sectors rebuild after the<br />

effects of COVID-19. BlackDice applied for<br />

the grant on 1 September 2020 and will<br />

use the funding to develop machine<br />

learning in predictive analytics, allowing the<br />

technology to forecast cyber-attacks before<br />

they happen. Telecom operators will have<br />

the ability to watch attack scenarios to<br />

help them understand external activity,<br />

which is a key indicator of the internet and<br />

behaviour data from BlackDice's device<br />

network.<br />

Innovate UK will be investing up to £191<br />

million to fund single and collaborative<br />

research and development projects through<br />

its Sustainable Innovation Fund over the<br />

next two years. The programme will fund<br />

1,103 projects, 1,189 businesses, with a<br />

total of more than £130 million in support<br />

for the UK.<br />

"These funds feed directly into BlackDice's<br />

<strong>2021</strong> plans for software development," says<br />

Paul Hague, CEO of BlackDice. "The funds<br />

will help to provide state-of-the-art<br />

preventive vaccine technology, which<br />

helps to protect devices and networks<br />

from the rising threat of cyber-attacks.<br />

2020 has been a challenging year for<br />

telecommunication operators, and this<br />

grant shows the importance of cyber<br />

security solutions and how they can keep<br />

customers' data safe from harm."<br />

Richard Horne, PwC: surprising so many<br />

organisations lack confidence in their<br />

cyber security spend.<br />

Paul Hague, BlackDice: aim is to protect<br />

devices and networks from rising threat<br />

of cyber-attacks.<br />

COVID-19 DRIVES NEW THINKING<br />

In a wide-ranging PwC survey of UK executives, 96% say they have shifted their<br />

cyber security strategy, due to COVID-19:<br />

34% state that they are accelerating digitisation<br />

Only 38% are very confident their cyber budget is allocated to the most<br />

significant cyber risks<br />

42% plan to increase cyber team headcount.<br />

However, the UK responses lag somewhere behind global findings in a number of<br />

key areas, states PwC, such as the importance of the CISO role, return on cyber<br />

spend and headcount.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards<br />

<strong>Mar</strong>ch <strong>2021</strong> computing security<br />

31


2020 <strong>CS</strong> Awards<br />

Computing Security Awards 2020<br />

EXCELLENCE SHINES THROUGH<br />

It may not have been possible to gather together in the usual way to celebrate the 2020 Computing Security Awards, but even the virus<br />

couldn't prevent them from going ahead.<br />

Remote they might have been, with master of ceremonies Chris Cowdrey and editor Brian Wall (both dressed in full regalia!) revealing<br />

the winners by video link, but the tingle of excitement as the top performers were announced across the various categories was still<br />

unmistakable.<br />

And although it wasn't possible on this occasion to actually see the bottles of champagne being opened as the celebrations began, you<br />

could still almost hear the corks being popped, as victorious company upon company, individual after individual, showed exactly why our<br />

industry is right at the top of its game.<br />

To see who won what - and to soak up the atmosphere of what was, despite everything, still a truly gala occasion - check out all of the<br />

victors and runners-up on the following pages. And to see the awards ceremony itself in full, go to: https://youtu.be/bLmvHafBiLg<br />

32<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


2020 <strong>CS</strong> Awards<br />

Email Security Solution of the Year<br />

WINNER: Libraesva - Email Security Gateway<br />

RUNNER-UP: VIPRE Security - VIPRE Email Security ATP<br />

"We would like to thank not only our staff who have dedicated their time to making Libraesva the best solution on the market, but also<br />

our partners and customers across the globe who continue to work closely alongside us and voted for Libraesva in the awards! We have<br />

ambitious plans for <strong>2021</strong> and we cannot wait to share these with you throughout the year." - Paolo Frizzi, CEO Libraesva.<br />

Anti-Malware Solution of the Year<br />

WINNER: VIPRE Security - VIPRE Endpoint Security<br />

RUNNER-UP: Malwarebytes - Malwarebytes<br />

"We believe very strongly in our Endpoint Security Cloud service and the powerful protection it provides against modern-day threats. But<br />

to be voted Anti-Malware Solution of the year means that our customers and partners love it as much as we do. It is such fantastic<br />

feedback and proof of the quality of the product – thank you so much to everyone who voted!" - Yvonne Conway, <strong>Mar</strong>keting Manager<br />

UK and Ireland<br />

Incident Response & Investigation Security Service Provider of the Year<br />

WINNER: AT&T Cybersecurity<br />

RUNNER-UP: Cyjax<br />

“With every second counting after a cyberattack, quick action to investigate and remediate an incident is critical for minimising impact.<br />

In these stressful situations, organisations need a trusted advisor to help guide them to successful containment and recovery. We are<br />

honoured to be receiving recognition from Computing Security Magazine for our Incident Response and Forensics Service.” - Bindu<br />

Sundaresan, Director, AT&T Cybersecurity<br />

Network Security Solution of the Year<br />

WINNER: Neustar - UltraThreat Feeds<br />

RUNNER-UP: Endace - Endace Probe<br />

We are very proud to have won three separate awards at these prestigious Computing Security Awards. Demonstrating the depth and<br />

value of our security offerings, Neustar was recognised with awards in three different categories:<br />

Network Security Solution of the Year: Neustar UltraThreat Feeds Web Application Firewall of the Year: Neustar UltraWAF<br />

One to Watch Security Product: Neustar UltraGeoPoint<br />

We are honoured to have earned these three awards from such a respected and important publication.<br />

For more information, contact security@team.neustar, or call us at 1-855-898-0036 in the US and +44 1784 448444 in the UK.<br />

www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />

@<strong>CS</strong>MagAndAwards<br />

33


2020 <strong>CS</strong> Awards<br />

Encryption Solution of the Year<br />

WINNER: Cryptshare AG - Cryptshare<br />

RUNNER-UP: Egress - Egress Intelligent Email Security<br />

"Competitions such as this are important, as they help to blow the smoke of often false vendor claims away and expose the deeper<br />

reality of the value of a few well-engineered products above a mass of ‘me too’ products. We were delighted to win this award and can<br />

I thank the many customers who voted for us. We spend huge efforts to understand the issues in the market, and design and build the<br />

best software to solve those problems. We are growing fast by direct customer references and, in the end, anybody can try our software,<br />

prove the value for themselves and, in due course, gain the confidence of great security at a fair cost. Don't be shy, try Cryptshare soon<br />

and make it part of your recovery plans!" - Cryptshare CEO <strong>Mar</strong>k Forrest<br />

Advanced Persistent Threat (APT) Solution of the Year<br />

WINNER: Heimdal Security - Thor Foresight RUNNER-UP: SonicWall - RTDMI (Real Time Deep Memory Inspection)<br />

Through its traffic filtering capability, Heimdal stops ransomware attacks at all stages: before, during and after the attack. Heimdal<br />

combines automatic software updates with powerful Traffic Scanning for effective security against exploits kits. Using its unique<br />

intelligence, Heimdal blocks malicious connections that try to harvest and steal your confidential financial information.<br />

DLP Solution of the Year<br />

WINNER: Kingston Technology Group Co LLP - DTVP30<br />

RUNNER-UP: CoSoSys - Endpoint Protector<br />

"We are honoured to be awarded with the DLP Solution of the Year. Our DT Vault Privacy 3.0 provides an affordable business-grade<br />

security USB drive with 256-bit AES hardware-based encryption that protects data and enforces complex password protection to prevent<br />

unauthorised access. The drive locks down and reformats after 10 intrusion attempts, so it is an ideal solution in this new working-fromhome<br />

environment to prevent data loss wherever you are working from."<br />

Compliance Award - Security<br />

WINNER: Metacompliance<br />

RUNNER-UP: ADISA<br />

"We were thrilled to win the Compliance Security Award at the Network Computing Security Awards 2020. It's testament to the strength<br />

of our innovative products and our unique ability to offer Cyber Security and privacy solutions from a unified platform. Thank you so<br />

much to everyone that took the time to vote for us." - Robert O'Brien, CEO MetaCompliance.<br />

AI and Machine learning-based Security Solution of the Year<br />

WINNER: SonicWall - RTDMI (Real Time Deep Memory Inspection)<br />

RUNNER-UP: VIPRE - Email Security Attachment Threat Protection<br />

"SonicWall was honoured to be named the winner in the ‘AI and Machine Learning-based Security Solution of the Year’ Award at the<br />

Computing Security Awards for its patent-pending Real-Time Deep Memory Inspection (RTDMI). RTDMI technology enables SonicWall<br />

Capture Advanced Threat Protection (ATP) to catch more malware faster than behaviour-based sandboxing methods, with a lower false<br />

positive rate." - Will Benton, Regional Sales Director North EMEA, SonicWall<br />

Identity and Access Management Solution of the Year<br />

WINNER: SecurEnvoy - SecurEnvoy SecureIdentity IAM<br />

RUNNER-UP: My1Login - My1Login Enterprise IAM<br />

"SecurEnvoy is delighted to have won Identity and Access Management Solution of the Year. For almost 20 years, we have been a leader<br />

in designing innovative security solutions and to be recognised for this by our customers shows we have continued to be a point of trust<br />

and expertise. A huge thank you to all who voted, and to the incredible SecurEnvoy team. - Adam Bruce, Chief Revenue Officer/CRO<br />

34<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


2020 <strong>CS</strong> Awards<br />

Anti Phishing Solution of the Year<br />

WINNER: Libraesva - Email Security Gateway<br />

RUNNER-UP: Metacompliance - MetaPhish<br />

"We would like to thank not only our staff who have dedicated their time to making Libraesva the best solution on the market, but also<br />

our partners and customers across the globe who continue to work closely alongside us and voted for Libraesva in the awards! We have<br />

ambitious plans for <strong>2021</strong> and we cannot wait to share these with you throughout the year." - Paolo Frizzi, CEO Libraesva.<br />

Secure Data & Asset Disposal Company of the Year<br />

WINNER: Computer Disposals Limited<br />

RUNNER-UP: Sims Lifecycle Services<br />

“Winning this award for ‘Secure Data & Asset Disposal Company of the Year’ is a fantastic accolade for CDL. It’s been a tough year for all<br />

businesses across the UK, but to be recognised as the industry leaders in this field is a real compliment to the dedication the staff have<br />

shown in getting us where we are today. “ - Ben Griffin, Sales and <strong>Mar</strong>keting Director, Computer Disposals Ltd<br />

Cloud-Delivered Security Solution of the Year<br />

WINNER: Edgescan - Edgescan<br />

RUNNER-UP: SonicWall - NSv Series<br />

"We are delighted to have been awarded ‘Cloud-Delivered Security Solution of the Year’ 2020, our first time winning this award. This<br />

award stands to the hard work our team has put into creating and delivering an award-winning vulnerability management platform that<br />

is delivered on the cloud. - Eoin Keary CEO<br />

New Cloud-Delivered Security Solution of the Year<br />

WINNER: Check Point - CloudGuard<br />

RUNNER-UP: Redsift - OnDMARC<br />

"It's particularly gratifying to receive the Computing Security award, as it is voted for by partners and end users in the IT and cybersecurity<br />

communities. Cloud security is challenging and the biggest challenge is unifying security across multiple clouds, as analysts agree<br />

that over 80% of organisations use two or more cloud providers. Check Point CloudGuard solves this problem, giving organisations the<br />

most advanced and agile cloud-native security, together with holistic visibility and automated management, and enforcement of security<br />

policies across their cloud estates." - Andy Wright, regional director for Northern Europe at Check Point Software Technologies<br />

Mobile Security Solution of the Year<br />

WINNER: Wandera - Wandera Security Suite<br />

RUNNER-UP: Lookout - Lookout<br />

"Now, more than ever, it's clear that secure remote access is imperative for organisations across industries. Being recognised in the<br />

Computing Security Awards is a testament to the work we have done in modernising secure remote access, so our customers have the<br />

technology they need to seamlessly and securely keep their employees connected, no matter where they are and what device they are<br />

using. We're looking forward to meeting the challenges of <strong>2021</strong> head on, as we work to make a secure and productive borderless<br />

enterprise easily attainable." - Eldar Tuvey, CEO and Founder of Wandera<br />

Penetration Testing Solution of the Year<br />

WINNER: Edgescan - Edgescan<br />

RUNNER-UP: Redscan - Redscan Penetration Testing<br />

"We are delighted to have been awarded Pen Testing Solutions of the year 2020 for a second year in a row. It highlights the amount of<br />

work and time we put into our pen test solutions and to our team that delivers the results." - Rahim Jina COO<br />

www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />

@<strong>CS</strong>MagAndAwards<br />

35


2020 <strong>CS</strong> Awards<br />

Remote Monitoring Security Solution of the Year<br />

WINNER: Wallix - Wallix Bastion<br />

RUNNER-UP: Redscan - ThreatDetect<br />

"With the win of the ‘Remote Monitoring Security Solution of the Year’ award for the WALLIX Bastion by Computing Security Magazine,<br />

WALLIX confirmed another market recognition as European specialist in Identity and Access Security Solutions. WALLIX's unified<br />

solutions portfolio enables companies to detect and be resilient to cyberattacks. They also ensure compliance with regulatory<br />

requirements regarding access to IT infrastructures and critical data. More than 1,200 organisations from the public and private sectors<br />

have chosen WALLIX to secure their digital transformation. To find out how WALLIX can help you regain control of your data anytime,<br />

anywhere, visit www.wallix.com."<br />

New Security Software Solution of the Year<br />

WINNER: Rohde & Schwarz Cybersecurity - R&S Trusted VPN Client<br />

RUNNER-UP: SecurEnvoy - SecurEnvoy Data Discovery Essentials<br />

R&S®Trusted VPN Client wins category "New Security Software Solution of the Year"<br />

R&S®Trusted VPN Client is a software-based VPN client enabling users to work in a secure and encrypted mobile environment while complying<br />

with the high security requirements of federal authorities. The solution protects the network communication of a client platform (Windows laptop<br />

or tablet) with a government or corporate network over an untrusted network such as the internet. The Federal Office for Information Security has<br />

granted approval up to classification level VS-NfD (RESTRICTED), NATO RESTRICTED and EU RESTRICTED for the new, software-only R&S®Trusted<br />

VPN Client. - Daniel Heck, Vice President <strong>Mar</strong>keting, Rohde & Schwarz Cybersecurity<br />

Security Education and Training Provider of the Year<br />

WINNER: KnowBe4<br />

RUNNER-UP: Metacompliance<br />

"Winning several industry-recognised awards in the UK is a great honor for our organisation. One of our main goals is to provide<br />

always fresh security awareness training content and simulated phishing templates to keep up with the evolving cybersecurity threat<br />

landscape. Being recognised in this awards programmes in the UK as training provider of the year speaks volumes to the quality of<br />

our training.” - Malik, security awareness advocate - KnowBe4<br />

Web Application Firewall of the Year<br />

WINNER: Neustar - Neustar Ultra WAF<br />

RUNNER-UP: F5 Networks - Silverline WAF<br />

"We are very proud to have won three separate awards at the prestigious Computing Security Awards. Demonstrating the depth and<br />

value of our security offerings, Neustar was recognised with awards in three different categories:<br />

Network Security Solution of the Year: Neustar UltraThreat Feeds Web Application Firewall of the Year: Neustar UltraWAF<br />

One to Watch Security Product: Neustar UltraGeoPoint<br />

We are honoured to have earned these three awards from such a respected and important publication."<br />

For more information, contact security@team.neustar, or call us at 1-855-898-0036 in the US and +44 1784 448444 in the UK.<br />

Threat Intelligence Award<br />

WINNER: Cyjax<br />

RUNNER-UP: Webroot<br />

"Cyjax is delighted to receive this award. In 2020, we had to innovate to reach our existing users and potential customers. We made much of<br />

our high-quality research available to the public and not-for-profit organisations focused on protecting our digital economy. We appreciate the<br />

votes of support from the information security community and our customers in the Finance, Pharmaceuticals and Public Services sectors who<br />

believe threat intelligence is a key component in protecting against the ravages of cybercrime. We would like to thank you once again for this<br />

award and wish all your readers a prosperous <strong>2021</strong>." - Kevin McMahon, Cyjax CEO and Founder<br />

Security Reseller of the Year<br />

WINNER: Brookcourt Solutions<br />

RUNNER-UP: NGS<br />

"We are absolutely thrilled to have been recognised as ‘Security Reseller of the Year’. We strive to deliver innovative and effective cyber<br />

security solutions to our customers, and to have won this prestigious award shows that we implement the right partnerships and<br />

approach to meet customer needs, even during challenging times."<br />

36<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


2020 <strong>CS</strong> Awards<br />

Security Distributor of the Year<br />

WINNER: Nuvias<br />

RUNNER-UP: Brigantia Partners<br />

The Nuvias Group is the fast-growing European next-generation distributor, with a broad range of innovative services and solutions<br />

designed to secure customer success, and accelerate partner and vendor growth. In collaboration with leading technology suppliers, we<br />

specialise in providing security, agility and manageability for clients, networks and cloud technology solutions through an ecosystem of<br />

highly skilled channel partners.<br />

Enterprise Security Solution of the Year<br />

WINNER: Rohde & Schwarz Cybersecurity - R&S Trusted Gate<br />

RUNNER-UP: F5 Networks - Silverline WAF<br />

R&S®Trusted Gate wins category ‘Enterprise Security Solution of the Year’.<br />

"R&S®Trusted Gate is a Cloud Data Protection Gateway which uses a data-centric approach to let you keep full control of your data on<br />

any kind of infrastructure. It can be deployed on-premises, in the cloud or in hybrid mode. As a server-based solution, there is no need<br />

for additional software on the client side." - Daniel Heck, Vice President <strong>Mar</strong>keting, Rohde & Schwarz Cybersecurity<br />

SME Security Solution of the Year<br />

WINNER: Redscan - ThreatDetect<br />

RUNNER-UP: Titania - PAWS<br />

"It’s always pleasing to receive industry recognition, but it’s particularly satisfying when it is the votes of our customers and partners that<br />

helped us secure an award. To win an award for a fifth successive year is a proud moment for the team, especially in such a challenging<br />

year. We’re committed to maintaining our high standards and protecting organisations through these difficult times by improving our<br />

services year-on-year." - Simon Monahan, Redscan Director of Product <strong>Mar</strong>keting.<br />

Contribution to CyberSecurity Award - Person<br />

WINNER: David Calder of Adarma<br />

RUNNER-UP: Stu Sjouwerman of KnowBe4<br />

"I’m very proud, thankful and humbled to have received the Computing Security ‘Contribution to CyberSecurity - Person’ Award. I’ve<br />

been lucky enough to work in the security industry since the late nineties and I still love it today.<br />

We formed Adarma to make the world a safer place for our customers - and, in turn, safer for their customers. We wanted to help<br />

create the next generation of security leaders, and to build a sustainable and ethical business. This gives me energy every day.<br />

I’m incredibly touched to win the award for doing what I love. Thank you to everyone. - David Calder, Chief Product Officer<br />

Customer Service Award - Security<br />

WINNER: Titania Ltd<br />

RUNNER-UP: Brookcourt Solutions<br />

"We were thrilled to be crowned the winner of the Customer Service Award. In a year where concerns around Cyber Security have come<br />

to the forefront, due to remote working becoming the norm, increased online spending and threats to the healthcare sector, we<br />

appreciate how vital our software is to organisations worldwide. Our team has proactively continued to support our customers during<br />

this challenging time, helping them to accurately identify vulnerabilities to their organisation and improve cyber hygiene to ensure<br />

essential business operations can continue." - Kirsty Fisher, Chief Financial Officer, Titania.<br />

Security Service Provider of the Year<br />

WINNER: Brookcourt Solutions<br />

RUNNER-UP: AT&T Cybersecurity<br />

"We truly believe in giving a consistently excellent service to our customers and it is crucial to our company values. Winning this<br />

significant award that links to service is an achievement we are extremely proud of. Thank you to all our customers that voted for us."<br />

www.computingsecurity.co.uk <strong>Mar</strong>ch <strong>2021</strong> computing security<br />

@<strong>CS</strong>MagAndAwards<br />

37


2020 <strong>CS</strong> Awards<br />

Security Project of the Year - Public Sector<br />

WINNER: Egress and Haringey Council<br />

"We're delighted to win this award with our customer, London Borough of Haringey. At Egress, we pride ourselves on delivering<br />

maximum value for all our customers - particularly when helping them to drive business efficiency while keeping highly sensitive data<br />

safe. It is brilliant to see the industry recognising the fantastic work carried out between the London Borough of Haringey and Egress to<br />

support digital communication and an entirely new way of operating during the COVID-19 pandemic." - <strong>Mar</strong>k Lendon, SVP of Sales<br />

at Egress<br />

Security Project of the Year - Private Sector<br />

WINNER: KnowBe4 and SIG PLC<br />

"Winning several industry-recognised awards in the UK is a great honor for our organisation. One of our main goals is to provide<br />

always fresh security awareness training content and simulated phishing templates to keep up with the evolving cybersecurity threat<br />

landscape. Being recognised in this awards programmes in the UK as training provider of the year speaks volumes to the quality of<br />

our training." - Malik, security awareness advocate - KnowBe4<br />

Editor's Choice<br />

WINNER: Hornet Security - 365 Total Protection<br />

"Hornetsecurity is honoured and delighted to receive the Computing Security Award for our 365 Total Protection service. It confirms<br />

to us once again that our service addresses the needs of Microsoft 365 users for additional security in the best possible way. We would<br />

like to thank the Computing Security team for the transparent and uncomplicated review process!" - Yvonne Bernard – Head of Product<br />

Management<br />

One to Watch Security - Company<br />

WINNER: ADISA<br />

RUNNER-UP: Orange Cyber Defense<br />

"ADISA is delighted to have been awarded the ‘One to WatchSecurity - Company’ Computer Security Magazine award. Despite being 10<br />

years’ old, we have been extremely busy in the last 18 months and look forward to announcing some exciting news about work being<br />

concluded with the UK Information Commissioner’s Office and the MoD. Check out our You Tube channel called ADISA Media Centre to<br />

be kept up to date on this news." - Stve Mellings CEO ADISA<br />

One to Watch Security - Product<br />

WINNER: Neustar - UltraGeoPoint<br />

RUNNER-UP: GeoLang - Data Discovery and DLP<br />

"We are very proud to have won three separate awards at the prestigious Computing Security Awards. Demonstrating the depth and<br />

value of our security offerings, Neustar was recognised with awards in three different categories:<br />

Network Security Solution of the Year: Neustar UltraThreat Feeds Web Application Firewall of the Year: Neustar UltraWAF<br />

One to Watch Security Product: Neustar UltraGeoPoint<br />

We are honoured to have earned these three awards from such a respected and important publication."<br />

For more information, contact security@team.neustar, or call us at 1-855-898-0036 in the US and +44 1784 448444 in the UK.<br />

Security Company of the Year<br />

WINNER: Brookcourt Solutions<br />

RUNNER-UP: KnowBe4<br />

"It's a huge honour to have won this prestigious award for the second year running. As a company, we are committed to being a trusted<br />

and reliable partner for our customers, so to be recognised for this award is a huge achievement for us. Thank you to all who took the<br />

time to vote."<br />

38<br />

computing security <strong>Mar</strong>ch <strong>2021</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


Pragmatic and experienced<br />

risk management professionals<br />

Xcina Consulting provides high quality business and technology risk assurance and<br />

advisory services, which only comes from years of experience in our clients’ shoes.<br />

We help to ensure an organisation’s key risks are appropriately managed; its processes<br />

and controls are robust and fit for purpose; it remains compliant with legislation<br />

and regulation and wherever feasible it leverages industry standards as part of<br />

good practice.<br />

Accredited by the Payment Card Industry’s Security Standards Council as a Qualified<br />

Security Assessor (QSA) company and a British Standards Institution (BSI) platinum<br />

member for the provision of services related to ISO27001 (Information Security) and<br />

ISO22301 (Business Continuity).<br />

All our consultants have 10+ years minimum experience and have held senior level<br />

positions.<br />

Our services can be customised to your needs.<br />

• Business Continuity and Crisis Management<br />

• Data Protection<br />

• Financial Processes & Procedures<br />

• Information Security / Cyber Security<br />

• IT & OT Security<br />

• Payment Card Industry<br />

• Project & Change<br />

• Risk Management<br />

• Control Assurance (ISAE3402 / SSAE18)<br />

• Due Diligence<br />

• Governance<br />

• Internal Audit<br />

• Operational Processes & Procedures<br />

• Process Management<br />

• Regulatory Compliance (finance services)<br />

• Third Party Management<br />

020 3985 8467<br />

www.xcinaconsulting.com<br />

info@xcinaconsulting.com


There’s a difference between<br />

feeling secure & knowing<br />

you're secure.<br />

Information Security Advice<br />

Penetration Testing<br />

Adversary Simulation<br />

www.pentest.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!