Connect with us

Security

Phillips Consulting’s Guide to Avoiding Security Complexities

Published

on

, SiliconNigeria

Many years ago, the firewall was everything. Defence-in depth was a concept defined as layered defence with multiple firewalls on the path. Behind the firewall was a fortress. Organisations designed networks with strong perimeters and demilitarised zones to ensure the crown jewels were well-protected. Attackers had a difficult time trying to break into the firewalls.

On the physical layer, Network Admission Control (NAC) technologies were implemented to prevent intruders from having direct access into the network by preventing them from plugging unauthorised devices into the network. Before a device was admitted, it had to meet a minimum requirement defined by the organisation.

Those years are gone and maybe gone forever. Cloud computing, Bring Your Own Device (BYOD), Artificial Intelligence, Internet of Things (IoT), VPNs and Remote Working Capabilities have dramatically changed the way businesses run. These technologies have introduced a level of innovation and disruption that were unimaginable only a few years ago.

They have resulted in the collapse of the traditional network perimeter, thereby increasing the attack surface for cyber-attacks. Enterprise networks coverage is today being extended beyond our imagination – outside the traditional datacentres to smartphones, cloud platforms, mobile computers and IoT interfaces without geographical boundaries.

 The bad guys now have a plethora of interfaces to launch their attacks on; they do not have to breach the network using traditional social engineering tactics physically. The recent changes in the work environment occasioned by the COVID-19 has further amplified the extension of network boundaries beyond the traditional datacentres.

Employees work from home with devices and connections into the enterprise networks that were not originally designed for such. Improvised connections were made to allow functionality because the pandemic came without an announcement.

The danger this poses is that some of these end devices were not originally designed with security in mind. Even if security was a consideration, not so much for enterprise data protection. These devices are most of the time not hardened, and their owners may not understand the effects on the overall organisational security posture.

 A handful of these devices are installed with default passwords, and most times, these passwords are not changed during or after installation. So it is easy to guess the password by manual methods or using advanced dictionary or brute force attack methods. Another risk posed by these endpoints is the lack of security updates and patches.

 Because they are sometimes not seen to be part of the enterprise network, they are not included in the patch management programme, and their presence introduces high-level vulnerabilities within the enterprise network. It then becomes easier to utilise malware that could tunnel through the firewall to breach the enterprise network, instead of spending months and years trying to break into the firewall or layers of firewalls.

 In recent years, large-scale attacks have been launched using malware by exploiting known vulnerabilities and security gaps on endpoints. For example, the WannaCry, Petya and another variant of Petya, the NotPetya were employed to launch attacks on enterprise networks through vulnerable endpoints. Another danger with this trend is potential data leakage because these devices are used to either temporarily or permanently store organisational data.

There is also concern about device loss. If these devices are lost, there is a risk of exposing the organisation’s data to unauthorised entities, and that could both result in financial and reputational damage. These dangers are also expanded by the impact of the COVID 19 pandemic, where organisations made ad hoc improvisions to support businesses while employees work from home.

As commerce resumes, organisations are beginning to discover some capabilities to support their businesses remotely, and they are also rethinking their business continuity strategies. For some businesses, this is not just a temporal shift, but a change which has permanently altered the operational procedures of the organisation.

Legacy cybersecurity strategies, techniques and investments will not be enough to mitigate the rising cybersecurity concerns introduced by this new way of working. Protection has gone beyond throwing in uncoordinated technical solutions and efforts.

Organisations need to rethink a new approach for the protection of their assets within the ever-growing complexity both to remain afloat and also to derive commensurate Returns On Security Investments (ROSI). A well-crafted strategy will ensure that cybersecurity efforts are coordinated within the enterprise, without duplication of efforts and resources, which will, in turn, drive down the cost of implementing cybersecurity initiatives.

To improve the security posture, organisations must do the following:

1.     Continuously monitor the devices, applications, and processes running on the network.

2.     Automate security monitoring and mitigation.

3.     Implement systems that are capable of automatic detection, isolation and containment of threats within the network.

4.     Ensure that monitoring covers event data, session data, and historical data on endpoint usages, such as past processes, network connections, and other information.

Another measure organisations should take is reducing complexities. The extension of the network boundaries has not stopped organisations from using existing network solutions to protect the enterprise network. However, in a bid to ensure the protection of the on-premise infrastructure and the ones beyond the organisational traditional network boundaries, organisations combine existing technologies with new solutions and the resultant effect is an increase in complexity. To effectively manage security, organisations should put measures in place to ensure a reduction in complexity and enhancing visibility. This can be achieved by unifying all efforts and technologies for managing both on-premise and off-premise infrastructure in a single platform. Beyond technical controls, organisations should develop procedures, standards, and policies for acceptable use of organisational resources.

Continue Reading
Advertisement Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Digital Economy

Championing An Inclusive Digital Identity Approach In Africa – At Scale

Published

on

, SiliconNigeria

As digitisation accelerates across Africa, the demand for liveness detection and online identity authentication services has become critical. The act of identifying ourselves is under rapid transformation, especially when it comes to using biometrics to access financial and governmental services. If executed correctly, this offers an opportunity for greater inclusivity than ever before.

Gur Geva, Founder and CEO of iiDENTIFii, says, “Face biometrics offers a ground-breaking solution to identity verification (IDV) on the continent in that it is secure and simple to use. Yet this solution will only truly work if the algorithm that underpins face biometrics is trained on the full scope of African faces and can be executed at scale.”

Historically, proof of identity was only available to those who could fulfil a rigid set of criteria. One of the main barriers to a person opening a bank account, for example, would be the inability for them to prove their identity without any formal identity document or proof of formal address. According to the World Bank, 57% of Africans still do not have any kind of bank account, including mobile money accounts. This translates to about 360 million adults in the region and approximately 17% of the total global unbanked population without access to formal financial services, a recent study by BPC and Fincog found.

Sustainable Development Goal 16:9 aims “to provide legal identity for all, including birth registration by the year 2030”. Digital identity plays an active role in meeting several other SDGs, including universal health and education access and financial inclusion.

Remote face authentication is a crucial step in bridging the digital divide in Africa.

Geva explains, “The digitally excluded are missing out on access to social and financial inclusion. Those who do not have access to newer technologies are disadvantaged in healthcare, education and financial support. The mere ability to confirm one’s identity digitally is a key that opens the doors to essential financial and civic services without the risk of impersonation or fraud.”

Diversity in face recognition is the key factor for success in Africa. Yet historically, a large-scale database of African faces has been lacking. Thanks to new developments in technology, this barrier is no longer in place. Geva adds, “Respecting diversity in biometric authentication is a core consideration in our business. For this reason, we have trained our algorithm on over 50 million African faces. This translates into identity for all, but specifically identity for all Africans.”

Through a triangulated authentication process, iiDENTIFii’s technology establishes that the person on the other end of the screen is real, live and transacting at that moment. This multi-faceted facial scan is further verified with key data from the person’s ID document and information from the relevant government databases. “Identity fraud has historically been difficult to detect. Our technology can authenticate and automatically onboard a person in under 30 seconds. Our algorithm vastly reduces false accept and reject rates, fully protecting consumers and businesses,” says Geva.

A focus on verifying a living person, in other words establishing ‘liveness’, ensures that correctly mapping and verifying a diverse range of faces is possible. Geva explains, “With our technology, we are able to establish 3D passive and 4D biometric liveness. Our 4D Liveness is resilient to deepfake and replay attacks. It comprises different colour lights that reflect in a certain sequence off the user’s face which helps determine true biometric liveness.”

Inclusivity in technology extends beyond diversity. It also raises the issue of accessibility. “We have created a technology platform that can be used by very low-end through to very high-end smartphones,” says Geva, “Users can also access the platform via a mobile Software Development Kit (SDK), as well as web-based/browser SDK – which allows them to just click on a link to authenticate themselves, as opposed to downloading a large SDK onto their phones.”

With a simple, fast and secure approach that takes the full scope of African faces into account, biometrics becomes a compelling catalyst for financial and social inclusion. Geva concludes, “We believe that, with the right technology, all Africans can claim their identity and use it to their safety and benefit.”

Continue Reading

Security

NCC Washes Hands Off Obi Audio Conversation With Oyedepo

Published

on

, SiliconNigeria

Nigerian Communications Commission (NCC) has refuted reports of alleged complicity of the commission in the leaked audio conversation between presidential candidate of Labour Party (LP) Mr. Peter Obi and founder of the Living Faith Church, Bishop David Oyedepo.

In the audio conversation that went viral on social media, Obi was heard telling Oyedepo that the 2023 election was a “religious war,” and urged the pastor to mobilize Christians in parts of the country to vote for him.

Although Obi in the conversation did not appear to have incited religious violence, some politicians condemned the said statement, insinuating he plotted to divide the people on religious lines, a very sensitive issue in a polarised country after the February 25 presidential election.

In a statement, the director of public affairs at NCC, Reuben Mouka, debunked the allegations that the commission got the audio via phone intercepts and leaked it to Obi’s political opponents, an accusation it strongly denied.

Part of the statement read: “The Nigerian Communications Commission (NCC) has been inundated with enquiries by the media on allegations of telephone tracking and leakage made against the commission by some individuals and groups in the social and alternative media.

“The commission wishes to make the following clarifications: The commission denies the allegations in their entirety. By the provisions of the Nigerian Communication Act (NCA) 2003 and other extant Laws of the federation, the commission does not and cannot track nor leak telephone conversations of anyone.

“The commission has reported the allegations, which we take seriously, to relevant security agencies for proper investigation and necessary action.

“The commission restates its commitment to discharge its responsibilities to the Nigerian people in accordance with the provisions of the Constitution of the Federal Republic of Nigeria; the NCA 2003; and other extant Laws of the Federation; and global best practices.

“For the avoidance of doubt, the commission denies these allegations and advises the public to disregard them.”

Continue Reading

Security

NCC Recommends 2-Factor Authentication For WhatsApp Users

Published

on

, SiliconNigeria

The Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) has recommended that users of the popular messaging app, WhatsApp, set up Two-Factor Authentication (2FA) to avoid falling victim to account takeover by hackers.

In an advisory, NCC-CSIRT noted that WhatsApp, which is a Meta-owned service, is increasingly becoming a prime target for hackers and scammers who are always looking for ways to gain unauthorized access to users’ accounts.

The CSIRT described two-factor authentication (2FA) as an identity and access management security method that requires two forms of identification to access resources and data.  

According to the advisory, “In the world of messaging apps, one of the most popular and recognizable is WhatsApp. WhatsApp is 100 per cent free to use, has a great mobile app, and supports audio and video calls. Whether you rely on WhatsApp for all your messaging needs or just use it from time to time, it is recommended to set it up with two-factor authentication (2FA). With this enabled, you will need to enter a custom PIN every time you log in to WhatsApp from a new device, adding an extra layer of security to your account.”  

The Team said, “2FA gives businesses or people the ability to monitor and help safeguard their most vulnerable information and networks. The 2FA is important because it prevents cybercriminals from stealing, destroying, or accessing your internal data records for their own use”. The advisory stated.

Continue Reading

Popular News