It security – Tele Trust http://teletrust.info/ Wed, 23 Nov 2022 08:06:40 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://teletrust.info/wp-content/uploads/2022/02/icon-2022-02-02T204231.652-150x150.jpg It security – Tele Trust http://teletrust.info/ 32 32 The cable cutter for business isn’t just for streaming anymore https://teletrust.info/the-cable-cutter-for-business-isnt-just-for-streaming-anymore/ Tue, 22 Nov 2022 16:07:22 +0000 https://teletrust.info/the-cable-cutter-for-business-isnt-just-for-streaming-anymore/ Tired of your broadband internet service provider? Enterprises looking for greater flexibility and reliability – and faster deployment – move from fixed cable or fiber broadband to fixed wireless access, share Ken Mills, CEO of EPIC iO Technologies. Internet connectivity is vital for businesses large and small, especially at a time of rampant inflation and […]]]>

Tired of your broadband internet service provider? Enterprises looking for greater flexibility and reliability – and faster deployment – move from fixed cable or fiber broadband to fixed wireless access, share Ken Mills, CEO of EPIC iO Technologies.

Internet connectivity is vital for businesses large and small, especially at a time of rampant inflation and looming recession. Companies must do everything possible to maximize their efficiency. As 4G and 5G wireless have permeated the landscape, many businesses have embraced digital transformation strategies, and high-speed connectivity is an essential prerequisite. For redundancy, many companies use wireless connectivity as a fallback to traditional wired services, but as 5G wireless becomes mainstream, companies are rethinking their broadband connectivity priorities.

While wired cable connectivity has been a go-to option for decades, businesses have been disappointed with its cost, reliability, and lack of options. At the same time, wireless broadband became available in most parts of the country. In fact, it’s becoming increasingly popular to use cellular wireless (or fixed wireless access) as your primary business Internet option. Broadband fixed wireless access offers greater choice and reliability with lower service costs, and is particularly attractive for businesses with mobile/remote workers, multi-site operations, or rapidly expanding.

Learn more: A Reality Check on Mobile Private Networks and Private Wireless

5G and fixed wireless access

Many people think of Fixed Wireless Access (FWA) as a technology that distributes a broadband signal to neighborhoods via millimeter wave (mmWave) frequencies operating in spectrum bands between 24 and 40 GHz. Every home or business connected by FWA has a small external antenna/gateway that picks up the signal from a local tower on which the mmWave distribution antenna is mounted. Typically, download speeds in this band can range from 10 to 100 times faster than 4G cellular service. However, as high-speed 5G becomes more widespread, overall bandwidth and performance increases, making it a more credible FWA option. 5G can deliver 1 Gbps or more to a subscriber.

The largest proportion of primary FWA connections will become 5G as carriers deploy it. 5G signals carry much farther than mmWave signals so operators can cover an area with fewer distribution antennas. By 2027, mobile infrastructure provider Ericsson predicts that 5G will reach 75% of the world’s population.

Why 5G FWA?

There are many reasons why 5G FWA is becoming popular for business.

Availablity: It’s easier to get a 5G signal than to get wired broadband. According to Strategy&, the consulting arm of PwC, 5G signals are expected to reach 80% of the US population by the end of 2021. In contrast, fiber goes through about 43% of US homes, and cable goes through just over 50. % Household.

Reliability: Wireless connections are not susceptible to interruptions from construction accidents, squirrels, ice storms, and other factors that regularly interrupt wired connections. When companies set up wireless as a backup communication channel in case the wired connection fails, the connection often remains wireless even after the wired network is restored because the wireless signal is better.

Performance: Not only is wireless connectivity more reliable, but it generally has lower latency, which is an important factor in an age of growing reliance on video conferencing apps like Google Hangouts, Teams, or Zoom. Better latency translates to clearer video and fewer dropouts or buffering. If you rely on your employees to access from home when working remotely, they may have problems getting adequate bandwidth when their children and spouse are also online at the same time – many homes have four devices or more competing for bandwidth availability. FWA bandwidth dedicated to the worker provides better performance.

Deployment Speed: It can take weeks or months to get a wired connection, while subscribers can have a working wireless connection within days.

Flexibility: For multi-site businesses or those with mobile or remote workers, FWA offers unparalleled flexibility and convenience. Rather than having to negotiate and manage multiple connectivity contracts in multiple locations, businesses opting for 5G wireless can partner with solution providers who will manage connectivity for them, so they only receive one invoice. Additionally, some wireless connectivity solution providers offer data pooling between carriers, other locations can leverage unused data from a single location.

Security: Wireless connections are more secure. Some providers can provide a connection from the teleworker to corporate headquarters with full signal encryption. Wired broadband routers are not as secure.

5G FWA Use Cases

Here are some of the commercial use cases of 5G FWA.

Mobile workers: Mobile wireless is the only way to connect for sales and field service personnel, and 5G ensures they will have the bandwidth to use any custom or general productivity apps they might need.

Points of sale: 5G FWA provides greater reliability and security for retail point-of-sale systems and other applications.

Branches: Connections to branch offices can be established much faster with 5G FWA than with cable or other wired services, and 5G FWA offers better reliability.

IoT networks: 5G FWA makes it much easier to connect sensors, cameras, and control systems to data storage and processing centers.

Learn more: Connectivity: what to expect as we head into the future

Purchase Considerations

Availability is the first thing to consider when purchasing a 5G FWA for a business. You’ll naturally want to make sure the service is provided in your area, but beyond that you’ll want to make sure it can deliver the bandwidth you need. Service providers should offer a no-hassle return policy so you can cancel service and return equipment if you don’t get the bandwidth you expect.

Security is another factor. The service provider or a connectivity solution provider should be able to guarantee that you have end-to-end encryption of your traffic.

Convenience is also important. You want to minimize the number of deals you need to make. Ideally, you’ll enter into an agreement with a connectivity solution provider and let them handle the details of signing up and managing relationships with multiple carriers.

Finally, make sure you can aggregate data from multiple contracts and vendors. Not everyone on the network will have the same appetite for uploads and downloads, and you want to be able to collect all contracted bandwidth into a bucket and then deliver it to each location as needed.

Cut the rope

5G wireless has been deployed faster than any other broadband technology. With improved reliability, security and flexibility, we will see more and more companies cut the cord with their wireline service providers and move to 5G FWA.

What are your purchasing considerations for the right FWA solution? Tell us about Facebook, Twitterand LinkedIn.

Image source: Shutterstock

LEARN MORE ABOUT 5G

]]>
How to Run a Great Post-Mortem Incident https://teletrust.info/how-to-run-a-great-post-mortem-incident/ Tue, 22 Nov 2022 15:41:45 +0000 https://teletrust.info/how-to-run-a-great-post-mortem-incident/ Post-mortem meetings are a way to analyze failures and prevent them from happening again. In this article, T.oni Farin, co-founder and CTO of Coralogix, discusses what needs to be addressed in post-mortem meetings to make them the most effective. Software failures happen in production and every business must avoid failures completely. Finding ways to prevent […]]]>

Post-mortem meetings are a way to analyze failures and prevent them from happening again. In this article, T.oni Farin, co-founder and CTO of Coralogix, discusses what needs to be addressed in post-mortem meetings to make them the most effective.

Software failures happen in production and every business must avoid failures completely. Finding ways to prevent failures from happening again and, ideally, limiting the number and duration of failures will separate successful businesses from the rest.

What is a post-mortem incident?

A post-mortem incident is an encounter that occurs after a software failure. A small group of people directly involved meets to describe the failure and its impacts. During the meeting, the team should discuss process changes to reduce the risk of repeat failure. The post-mortem meeting should identify changes that can be implemented and then measured for their effectiveness.

The outcome of a post-mortem meeting should be:

    • A template-based detailed incident report
    • All contributing root causes are fully understood
    • What preventive actions can be used in the future to reduce the likelihood of recurrence

Learn more: 3 key takeaways from the first-ever ECD Summit

How to do an effective autopsy

When to perform the autopsy

The post-mortem meeting must take place as soon as the incident is over. If too much time passes, team members can forget the details needed to dissect the failure. The meeting must take place within 48 hours of the resolution of the failure, although it must still take place even if this delay is not possible.

Who should attend the autopsy

Limit the meeting to a small group of team members for post-mortem discussions. Although each stakeholder should review the documentation, larger groups can hamper the productivity of the discussion. Those attending the autopsy should be those who responded to the incident and the critical stakeholders impacted by the outage.

Thoroughly document events

Documentation taken at a post-mortem meeting should be as detailed as possible. The intent is to review meeting and incident notes so team members can look back and properly take suggested actions, having understood the context of the failure. Next to a model can help keep the meeting on track and ensure that the discussion of the various stages of failure and recovery is not overlooked.

Keep it flawless

Post-mortem analysis Why an incident has occurred to change the policy and prevent it from happening again. A blameless post-mortem will do this without blaming any individual or team. This requires assuming that all parties acted with good intentions. The circumstances that led to the failure are what need to be changed to improve overall performance.

A irreproachable post-mortem removes fear of reprimand or insult from all team members. By doing this, communication can continue with honesty and objectivity; incidents are less likely to be ignored entirely out of fear; a healthier work culture is encouraged and teams are free to do their best.

Discussion points during the meeting

Since this meeting takes place after the issue has been resolved, those present at the meeting should together be able to give a full account of the failure and analyze why it happened. The post-mortem meeting should consolidate this information and communicate it to other stakeholders.

Describe the incident and its resolution

The first section of the post-mortem should include various discussions that dissect the failure. First, the incident should be summarized in a few sentences, including what happened and why, its severity and duration.

The meeting part should break the incident down into separate sections, each focusing on a different aspect of the failure. Each of these sections should be included in the post-mortem template used so that they are always included.

1. Preamble

Define the events that led to the failure. Has there been a new feature rollout? Did an external supplier have an outage? Was there a previously undetected bug?

2. Default

Describe how what was implemented was supposed to work, then compare it to how it worked in reality.

3. Impact

Describe how internal and external users were affected by the failure. If support tickets were created during the incident, they can be referenced here.

4. Detection

When and how did the team detect the incident? Were they alerted by an external observability tool, or were the customers the first to alert the team of the outage? Teams could discuss ways to improve detection if there was a significant delay between the failure and when the team was notified.

5. Response

Who answered the failure? How long after detection was there a response and were there any barriers to response? What was the response action taken?

6. Recovery

Describe how the failure was corrected and how the incident was resolved. How did stakeholders know what steps to take to resolve the issue?

7. Timeline

Detail the timeline of the events described above, including the time of any preparatory events, when the problem was first detected versus the known start of the failure, and when the incident was considered over.

Learn more: How to Use Phased Deployment to Solve Development Team Burnout

Define the root cause of the incident

Defining the root cause of the failure is key to improving business processes or systems to prevent it from happening again. Unfortunately, sometimes there can be multiple contributing causes for a failure. To get to the root cause, it helps to ask why the decisions were made, again assuming they were made in good faith.

Root cause analysis can be complex when the failure is deep in the software architecture or due to an edge case in user action. To ensure that the root cause of a software failure can be found, observability tools should be in place to help teams quickly identify failures.

Discuss corrective actions to prevent the problem from recurring

After determining the processes causing the error, a corrective action can be established. It could be a new training program, a change in testing processes, or a change to automate a process so that human error is less likely. The corrective action must be directly related to the root cause of the incident to prevent it from happening again in the future.

Prevention of future failures

A successful post-mortem meeting will identify processes and policies to prevent failures from recurring and will not assign blame to an individual’s actions. Identify the root cause(s) of failure from observability data and understand customer issues. Take corrective action by updating processes to prevent similar failures from occurring.

What are your key steps for an effective incident post-mortem? Share with us on Facebook, Twitterand LinkedIn.

Image source: Shutterstock

LEARN MORE ABOUT DEVOPS

]]>
Microsoft Email Security bypasses Instagram credential phishing attacks https://teletrust.info/microsoft-email-security-bypasses-instagram-credential-phishing-attacks/ Mon, 21 Nov 2022 12:07:04 +0000 https://teletrust.info/microsoft-email-security-bypasses-instagram-credential-phishing-attacks/ A credential phishing attack has been reported to have targeted 22,000 students at educational institutions nationwide through a campaign where hackers impersonated Instagram. The advisory was highlighted by Armorblox security experts in a notice posted on November 17, 2022. The notice reads: “The subject of this email encouraged victims to open the message… The purpose […]]]>

A credential phishing attack has been reported to have targeted 22,000 students at educational institutions nationwide through a campaign where hackers impersonated Instagram.

The advisory was highlighted by Armorblox security experts in a notice posted on November 17, 2022.

The notice reads: “The subject of this email encouraged victims to open the message… The purpose of this subject was to induce a sense of urgency in victims, by giving the impression that a action had to be taken to prevent future damage.”

Apparently the email appeared to be from Instagram support. The sender’s name appeared as Instagram and the email address matched the social media site’s real credentials.

“This targeted email attack was socially engineered, containing recipient-specific information – such as their Instagram user ID – in order to build a level of confidence that this email was a legitimate email communication from ‘Instagram.’

Once users clicked on a link in the email, they were redirected to a fake landing page. There was a “It wasn’t me” option which, when clicked, directed users to a second fake landing page specifically designed to obtain user credentials, including sensitive information.

The Armorblox advisory added, “The email attack used language as the primary attack vector and bypassed native Microsoft email security controls. It passed SPF and DMARC email authentication checks,” Armorblox explained.

Sami Elhini, biometrics specialist at Cerberus Sentinel, explained: “In this case, an email from instagramsupport.net should be considered suspicious because Instagram’s domain is instagram.com. When a service provides support, it may be advisable to contact support directly if you are unsure of what action to take.

He also added that verifying the origin of an email is a good start, but further investigation is needed regarding the domain of the email’s origin.

Erich Kron, Security Awareness Advocate at KnowBe4added that being comfortable with user interfaces and being able to navigate technology does not mean that individuals fully understand the risks.

“In our modern digital world, it’s very important to stay informed about how to spot these types of social engineering attacks.”

It comes after warnings of an increase in web phishing attacks.

]]>
Four investments for success in a struggling economy https://teletrust.info/four-investments-for-success-in-a-struggling-economy/ Tue, 15 Nov 2022 10:30:05 +0000 https://teletrust.info/four-investments-for-success-in-a-struggling-economy/ Most companies prioritize cost reduction during economic downturns, eliminating anything that is not essential to the core business. But that mindset makes it easy to forget why your business exists in the first place: to sell the best product or service on the market. In this uncertain economy, here are the four investments every business […]]]>

Most companies prioritize cost reduction during economic downturns, eliminating anything that is not essential to the core business. But that mindset makes it easy to forget why your business exists in the first place: to sell the best product or service on the market. In this uncertain economy, here are the four investments every business needs to weather the storm, stocks Bhavin Shah, CEO of Moveworks.

The S&P 500 has been on a roller coaster since 2018: up 41%, down 33%, up 111% and now finally, down 23%. It is this last plunge that has raised fears of a real recession. Even if stock prices remain stable for the rest of the year, 2022 would be the seventh worst performing year checked in.

Business leaders need to make a subtle but important shift in focus – away from just cutting costs and towards maximizing efficiency.

To do this, you must actually invest After into the systems and processes you already have in place: your knowledge, approvals, software licenses, and employee issues.

Your knowledge

How many of your employees actually use the FAQs, knowledge articles, and troubleshooting guides you created to help them? I’ve analyzed data from thousands of these knowledge bases at some of the largest companies in the world. The reality is that 75% of them are never even read once.

Most of the time, employees will ask questions that you have already answered on page 47 of the VPN troubleshooting guide. And even if they find the guide, they probably won’t find the one paragraph that can help them. This erodes productivity in two ways: employees spend their time searching for deep-rooted knowledge in your organization, and managers spend their time answering the same questions over and over again.

To combat this, you need to understand how employees seek knowledge for help today. Where do they look for information? Are they in the wrong system? Is your search giving bad results? Or do they find the right knowledge article and still not discover the answer? You need to figure out which parts of the process are broken and deal with each part.

Learn more: How Blockchain Payments Bring Economic Relief to Emerging Economies

Your approvals

Do you know the average employee wait time for IT, HR, and financial approvals? Working with companies around the world, I’ve found that something as simple as approving a new laptop takes an average of 10 hours.

In large organizations, the approval process is a complex web that involves dozens of different systems and people. A simple request like buying a new laptop shouldn’t take 10 hours. But that adds up quickly if you’re waiting for multiple people to get the nod. Consider this: you submit a request for a new laptop through the IT portal, the request sits in a colossal ticket queue until IT can access it, IT contacts your boss for approval, and your boss finally confirms.

While 10 hours may not seem like a long time, more than an entire working day is wasted while the employee waits. Multiply that by 500 approvals per month – depending on the size of the business – and the amount of potential lost productivity per month is staggering.

I’ve seen some of the biggest companies in the world reduce their approval time from 10 hours to just 9 minutes by automating this process. To do this, business leaders need a way for managers to approve employee requests where they already work, whether that’s Slack, Microsoft Teams, or another platform. form of cooperation. All the approver has to do is click “yes” or “no”, and the process can move forward in minutes rather than hours.

Your software licenses

How many of your employees actually use the software they have access to? 37% of software licenses never get used to it at all. For American companies alone, this represents a combined waste of $30 billion a year.

Knowing this, IT teams often designate a team member to retrieve unused licenses. But a simple task like this can take an IT analyst anywhere from two hours to an entire day to determine who has used a specific tool in the last 90 days. The same person then spends more time crafting personalized messages for each employee who needs a revoked license to maintain trust.

Instead, you need to figure out exactly which parts of this process require IT specialist or employee involvement and which are good candidates for automation. For example, IT professionals can focus on more impactful work when they aren’t spending their time checking software licenses and sending emails asking if those licenses can be revoked. But the employee must ultimately choose whether or not he wants to keep his license or give it up. It also allows IT teams to focus on their highest priority: enabling employees to be productive.

Your employee issues

So how do you know which knowledge items need improvement? And how do you know if approval delays are having a negative impact on your employees’ productivity? Or how do you quantify the amount of money you lose after a year due to unused software licenses? A recent report found that 50% of IT and HR managers do not have access to data on their most pressing issues.

The reason for this is that CIOs and IT managers have historically focused on tickets to understand where they need to improve. Most could tell you the size of their backlog, the number of SLA breaches they’ve had, or the volume of issues they’ve had each quarter. But very few could tell you how long their sales team has been waiting for software approval or how many people on the engineering team have access to software they never use. But these latest issues tell a much larger story about where the business is losing efficiency on a daily basis.

Instead, business leaders need data that provides a holistic view of the employee experience. They need to understand exactly what issues are holding each team back and what changes they need to make before those issues have a meaningful impact on the bottom line. If you work backwards from this real, tangible information, increasing efficiency becomes an informed decision as opposed to a knee-jerk reaction.

What do you think of these investment strategies? Share with us on Facebook, Twitterand LinkedIn.

LEARN MORE ABOUT IT STRATEGY

]]>
How to Avoid MSSP Exhaustion https://teletrust.info/how-to-avoid-mssp-exhaustion/ Tue, 08 Nov 2022 09:57:08 +0000 https://teletrust.info/how-to-avoid-mssp-exhaustion/ Our industry faces a shortage of qualified and experienced professionals, which puts a strain on companies seeking and retaining skilled and reliable security personnel. The rise of specialized cybersecurity consultants and managed cybersecurity service providers (MSSPs) is supported by organizations that appreciate the low cost of investment and greater experience these companies can offer. Outsourcing […]]]>

Our industry faces a shortage of qualified and experienced professionals, which puts a strain on companies seeking and retaining skilled and reliable security personnel.

The rise of specialized cybersecurity consultants and managed cybersecurity service providers (MSSPs) is supported by organizations that appreciate the low cost of investment and greater experience these companies can offer. Outsourcing eliminates the problems associated with inexperienced talent; Yet MSSPs also struggle with staff retention, analyst burnout, and ever-increasing employment costs.

Today, many organizations are at risk of finding themselves in toxic work environments, characterized by long, often unsociable working hours and excessive workloads. To combat this, we need to work towards better business models that ensure sustainable service delivery.

To succeed, it is essential that service providers find a way to attract top talent and avoid the growing trend of analyst disillusionment and burnout. To help, here are seven key principles for MSSPs that aim to help address today’s challenges faced by buyers and providers of cybersecurity services.

1: Augment people with technology

Human-centric and product-centric offerings have significant limitations, which contribute to lower service standards and unsustainable operating practices.

Today’s most efficient models retain intelligent human operators at their core. Failing to take advantage of technology, traditional offshoring providers will continue to lag behind. Using intelligent automation and advanced technology is key to streamlining “mandraulic” effort and focusing time and resources on the areas that matter most. However, this approach is only possible if you…

2: Be pragmatic and detect what matters

The industry has an unhealthy obsession with “100% detection,” a symptom of a failure to understand what effective cyber defense looks like.

It is impossible to achieve 100% prevention or detection. Overstretching resources by expecting analysts to process the excessive number of alerts needed for the illusion of 100% detection only makes them less effective, encouraging bad behavior.

Instead, organizations should focus on building a solid foundation of defensive controls, with a suite of detections appropriate to the environment. This should include detections relevant to commonly used TTPs and more contextual detections tailored to the specific ways attackers are likely to traverse the environment.

3: Respond on the front foot

Detection is meaningless without the ability to remediate it, but response remains a glaring capability gap for many organizations and service providers.

Our experience in managing and responding to real-world cyberattacks has provided first-hand knowledge of how unprepared organizations fail to effectively deal with security incidents. Whether it’s poor decision-making under pressure, ineffective communication channels, or untested backup, recovery, and redundancy procedures, most organizations aren’t set up to respond effectively.

This problem is exacerbated because most typical MSSPs prioritize detection over response. Threat containment and eradication are not always included in the service offering. Often this is handed over to the client or a third party. Where response is included, it is often slow, hampered by the lack of joint operating procedures and poorly clarified roles and responsibilities (as well as the broader problem of underfunding). A third party cannot adequately fill this gap, and there is no substitute for a solid playbook and a well-trained in-house team to respond to an incident.

4: Avoid addiction and allow progress

One of the biggest cybersecurity misconceptions is that if you outsource to the right vendor or buy the right “quick fix” product, the problem goes away.

An MSSP is only as effective as the security base of the organizations it works with. The second principle (be pragmatic and detect what matters) emphasizes the importance of a pragmatic and realistic approach to detecting threats. This becomes much more difficult, if not impossible, if the customer has a porous network riddled with vulnerabilities and misconfiguration. An MSSP willing to accept the risk of defending an inherently insecure organization – while maintaining standard SLAs – is not acting in the best interests of its customers or employees.

We need to help customers improve and leave them in a safer position than when we started working with them, by raising awareness and appreciating the importance of effective cybersecurity across the organization. Without this, it is difficult for any MSSP to succeed.

5: Be visible and transparent

When responding to customer incidents, we frequently encounter situations where the customer has noticed signs of malicious activity before being notified by their MSSP. Sometimes the MSSP finds no evidence of malice (despite, in some cases, clear indicators of a ransomware attack in progress).

The underlying problem here is that the communication and visibility offered by many MSSPs is poor. This can lead to a false sense of security and the idea that “no news is good news”, which can lead to missing gaps in detection until a compromise occurs.

It’s important that customers have confidence and proof that your solution is as effective as we say it is. This means continually testing and validating that defenses remain effective, taking into account both emerging attacker TTPs and network changes that may interfere with the configuration of detections.

A mixture of specialist offensive and defensive consultants is useful. This symbiotic relationship allows defenses to be continually updated to reflect the latest attacker TTPs. While offenses can be continuously upgraded to bypass these checks, allowing defenses to be upgraded before an attacker can bypass them in the wild.

6: Be flexible and adaptive

Most organizations have already invested in security tools, products, and services. Similarly, no two organizations will have the same digital infrastructure and operations. Despite this, most MSSPs seek to use a standard deployment approach and technology stack, even when investments already made by the customer can deliver the same benefits if used correctly.

It is important not to be tied to a specific technology stack and always consider what already exists in the customer network before making deployment decisions. Most organizations fail to extract maximum value from their products and services. Leveraging them as part of the service will ensure they are used to their full potential, avoiding the need to duplicate historical investments.

7: Integrate continuous improvement

In addition to encouraging development and progress for customers, we want to achieve the same for ourselves. The ISACA 2022 report cited limited growth opportunities and a lack of support as key factors for analyst dissatisfaction. We believe that the best way to provide development opportunities is to continuously innovate – finding more efficient ways to perform essential tasks. It means spending more time working on more progressive initiatives.

By committing to permanently “making ourselves obsolete”, MSSP can open up more exciting opportunities to work alongside its customers. This means looking for incremental improvements, no matter how small, without waiting for major transformations or upgrades – as the increments add up.

In short, MSSPs need to work smarter and treat current industry professionals better by creating more sustainable systems to maximize their performance and put an end to analyst burnout.

]]>
IT security specialist still awaiting visa decision after 30 months https://teletrust.info/it-security-specialist-still-awaiting-visa-decision-after-30-months/ Mon, 07 Nov 2022 02:10:00 +0000 https://teletrust.info/it-security-specialist-still-awaiting-visa-decision-after-30-months/ Amid promises by the Albanian government to carry out a “bold” review of Australia’s immigration system and its huge visa backlogs, Mr Salamanca’s story is far from unique. He arrived in Australia in 2015 to improve his English and find longer term employment opportunities. In Colombia, he worked as a director of an IT company […]]]>

Amid promises by the Albanian government to carry out a “bold” review of Australia’s immigration system and its huge visa backlogs, Mr Salamanca’s story is far from unique.

He arrived in Australia in 2015 to improve his English and find longer term employment opportunities. In Colombia, he worked as a director of an IT company where he implemented a security system in accordance with the internationally recognized ISO 27001 lead auditor standard.

Mr Salamanca “fell in love” with Australia after moving to Perth.

Although work restrictions on his student visa prevented him from securing steady employment in his IT field, Mr Salamanca said he “fell in love” with Australia after moving to Perth. He landed a part-time job as a cleaner, laborer, barista, food delivery driver, and computer repairman.

“It’s a beautiful country,” he said, noting that he could earn more as a barista in Australia than as an IT professional in Colombia. “I was able to buy my things and live well and peacefully, even with these odd jobs.”

With a view to permanent residency and a career in IT, Mr Salamanca applied for a higher education visa, but was turned down after his case manager ruled that the degrees he had obtained in Australia were not relevant to his specified profession.

The rejection meant he could not apply for another long-distance visa while remaining in the country, and so he left Australia in early 2020, leaving his belongings at the shared house he rented in the suburbs of Perth to Bayswater.

In May 2020, he applied for a 491 skilled work visa after being nominated and invited to apply for the visa by the Government of Western Australia. In August 2018, the Australian Computer Society had assessed his skills as suitable for migration under 262112 (ICT Security Specialist) of the Australian and New Zealand code of standard classification of occupations.

Mr Salamanca believed he would return to Australia on a bridging visa shortly after applying for the 491 visa from overseas. But Australia’s prolonged border restrictions prevented him from returning to the country before his bridging visa expired.

And now he can only return if and when his 491 visa is granted – despite receiving several messages from recruiters trying to fill Perth-based IT positions.

Home Secretary Clare O’Neil has promised a “bold” review of Australia’s immigration system. Alex Ellinghausen

His migration officer, Reza Aein, of Perth-based Home Migration Services, said Mr Salamanca had provided up-to-date health records and police clearances after receiving requests for further information from Home Affairs, but the department had still not made a decision.

“You find so many good people in Australia trying to help you. But the main obstacle is the visa,” Salamanca said.

“You become like a slave to your own project. If you don’t get the job, you won’t have a life.

A Home Affairs spokesperson said the department did not comment on individual cases for confidentiality reasons, but noted that nearly 2.8 million temporary and permanent visas had been processed since June 1, ” reducing Australia’s visa backlog as the volume of new applications continues to rise.”

“More than 2.5 million of these applications were for applicants who were outside of Australia,” the spokesperson said.

“The focus is on finalizing temporary and migration applications made outside Australia, particularly visas for temporary work, study and visits to Australia. This will allow more people to enter Australia more quickly, contribute to the economy and address skill shortages.

On its website, the department states that 90% of 491 skilled work visa applications are finalized within 12 months if the applicant is nominated by a state or territory government.

]]>
Bridging the gap between agile innovation and data security, IT Security News, ET CISO https://teletrust.info/bridging-the-gap-between-agile-innovation-and-data-security-it-security-news-et-ciso/ Wed, 02 Nov 2022 08:54:00 +0000 https://teletrust.info/bridging-the-gap-between-agile-innovation-and-data-security-it-security-news-et-ciso/ Viswanath Ramaswamy, Vice President – Technology, IBM India and South Asia What do Nokia, Kodak, Xerox, BlackBerry and the GMC Hummer have in common? These were brands that were considered unrivaled market leaders at one point, but lost momentum and fell behind as they failed to innovate quickly – some even falling into oblivion. Businesses […]]]>

Viswanath Ramaswamy, Vice President – Technology, IBM India and South Asia

What do Nokia, Kodak, Xerox, BlackBerry and the GMC Hummer have in common?

These were brands that were considered unrivaled market leaders at one point, but lost momentum and fell behind as they failed to innovate quickly – some even falling into oblivion.

Businesses today face an even greater challenge: they must not only innovate quickly, but do so with robust cybersecurity measures in place, especially smaller players. According to the National Cyber ​​Security Alliance, 60% of small and medium-sized businesses that have experienced a cyberattack go bankrupt within six months.

In an exclusive interview with Viswanath Ramaswamy, Vice President of Technology at IBM India and South Asia, we discuss how Indian companies can keep pace with innovation without compromising data security.

Ramaswamy also highlights some of the most pressing concerns reported by security officials in the country – from how best to use threat intelligence, to deploying SOAR and UEBA, and what CISOs need to keep in mind. mind when implementing identity and access management solutions. .

Veteran IBMer goes on to share ways CISOs can limit the blast radius in the event of a cyberattack.

Edited excerpts:

ETCISO: A common topic of discussion in the industry is Agile vs DevOps. However, organizations today demand fast yet secure software and applications (Agile DevOps). What is IBM’s strategy to meet these requirements?

Ramaswamy: In today’s fast-paced, digitally-driven world, organizations are under pressure to deliver differentiated, high-quality products and services in a timely manner. Using Agile and DevOps delivery frameworks helps accelerate the delivery of business value across the organization. Agile and DevOps should go hand in hand, a good balance brings increased agility faster.

IBM’s strategy is to combine DevOps and security professionals into a common DevSecOps team and to integrate automation, in the area of ​​quality assurance, into the security toolset to reduce risk. DevSecOps automatically integrates security into every phase of the software development lifecycle, enabling secure software development at the speed of Agile and DevOps.

Currently, security attacks are increasingly sophisticated and target a wider range of system components. This makes their prevention and recovery more difficult, especially when security knowledge and responsibilities are siled within an organization.

It is increasingly important to ensure that everyone in an organization has a stake in security and that business experts integrate more deeply with other teams. To truly make security a fundamental pillar, it needs to be embedded deeper into the organization’s engineering teams and software development lifecycles (SDLCs).

How can CISOs get the most out of threat intelligence? What are some of the common pitfalls or mistakes that organizations make when acquiring relevant threat information and acting on it?

The threat landscape remains challenging, despite increased investments in cybersecurity, as digital transformations, hybrid workforces and interconnected digital supply chains increase attack surfaces. Each threat actor has different motivations, capabilities, and intent, and threat intelligence can use this information to improve an organization’s response to an incident.

The vast amount of contextual information about new and emerging threat actors and the assets/organizations they are targeting can be analyzed by CISOs using threat intelligence. In fact, threat intelligence systems can use a variety of advanced, AI-enabled tools, such as SIEM, SOAR, UEBA, Breach and Attack Simulation (BAS), etc., to take quick and effective action. proactive to permanently block detected threats.

CISOs can bolster their defenses and reduce the possibility of compromise with the right structure and contextual awareness, while staying one step ahead of cybercriminals.

When acquiring relevant threat intelligence and acting on it, organizations often make the mistake of not understanding threat intelligence requirements. In order to understand which risks you should mitigate and which you probably shouldn’t, CISOs need to understand that threat intelligence won’t help you if you don’t have a good risk analysis model in place.

    Viswanath Ramaswamy, IBM
Viswanath Ramaswamy, IBM

Additionally, mature security practices lag behind high-movement threats, such as attacks on APIs and cyber-physical systems (CPS), and organizations continue to focus on “if we are we attacked? rather than “when are we attacked?”. Rather than relying heavily on alert-based incident response, organizations need to use modern threat visibility and intelligence solutions that answer who, what, when, how, and why threats are happening.

It becomes increasingly difficult to identify the most serious security threats as they continue to grow in volume and sophistication.

IBM Security X-Force Threat Intelligence combines IBM security operations telemetry, research, incident response investigations, business data and open sources to help customers understand emerging threats and make fast security decisions enlightened.

We see many instances of compromised credentials being used as an initial attack vector – how far can UEBA go to help minimize these instances?

The need for UEBA has become increasingly evident as workplaces have become increasingly digital and distributed. As more people work remotely and SaaS, cloud and mobile applications are widely adopted, identifying potential security threats has become more difficult.

Data breach costs in India have risen to 176 million in 2022, up almost 25% over the past two years. It is clear that data protection is essential. Thus, identifying insider threats, such as medical records or intellectual property, is crucial to ensuring the security of sensitive data.

UEBA technology helps IT departments detect anomalies in the way users interact with our digital workspace, allowing them to more easily detect potential threats within the system.

Unlike perimeter security technology, UEBA solutions establish criteria for user behavior. By using machine learning technology, IT can identify and remediate security threats faster and more efficiently by detecting any user behavior that deviates from the norm.

What are your takeaways for CISOs on improving IAM?

Identity and Access Management (IAM) models, originally designed to manage digital identities and user access for unique organizations, are now redesigned to provide the right level of resiliency, along with advanced features. critical authentication tools that can be applied to federated, private, public and multi-cloud computing environments. Here are some takeaways for CISOs on improving IAM.

  • To improve the IAM program, CISOs need to look beyond standard use cases such as user lifecycle management, governance, single sign-on, MFA, and more. They should have built-in solutions that covertly analyze the context behind each session to help achieve zero-trust design principles.
  • Identity has become the new perimeter, hence the zero-trust principle of “never trust, always verify” is key to controlling the risk surface and ensuring that the right user under the right conditions has the right access to good data.
  • IAM programs or solutions should maximize risk identification by leveraging trust that provides visibility into the areas mentioned below and balances user experience and security for consumers and workforce work :
  • Holistic Risk Context
  • AI and machine learning on device, network and user behavior
  • Anomaly detection, fraudulent patterns and consortium data
  • Keep protections up to date in the face of evolving threats

Bridging the gap between agile innovation and data security

Much attention is paid to the first stage of a cyberattack. What important information do you want to highlight during the 2nd and 3rd stages of cyberattacks? How can CISOs limit lateral movement?

Several critical events occur during the life cycle of a security breach. The first event is when there is a violation. In the second stage, the data has been stolen or destroyed. This is the third step when the breach is discovered (either externally or internally).

As attackers move into the third phase of the attack, they continually focus on understanding the local system and domain they have access to, as well as acquiring additional credentials to allow lateral movement.

The first recommendation is that CISOs rethink their network infrastructure so that digital assets are segmented according to risk.

Segmented networks make it much more difficult for an attacker to compromise one system and jump to another. Second, Zero Trust Network Access (ZTNA) provides secure access to applications and services after user authentication through a secure and encrypted tunnel. With this method of protection, lateral movements of attackers are prevented, a vulnerability that cybercriminals exploit to analyze and switch to other services.

Having a properly prepared and trained incident response team can help organizations detect and stop potential attacks, limit access to the organization’s environment, prevent reputational damage, and bring back critical technology quickly.

With IBM Security Command Center, security professionals and C-suite executives experience simulated cyberattack scenarios to learn how to respond, manage, contain, gather threat intelligence, and remediate a cyber incident. Through this process, organizations can develop the skills needed to anticipate and defend against current and future threats.

]]>
The IT security workforce gap is widening – Security Boulevard https://teletrust.info/the-it-security-workforce-gap-is-widening-security-boulevard/ Mon, 31 Oct 2022 13:24:53 +0000 https://teletrust.info/the-it-security-workforce-gap-is-widening-security-boulevard/ Continuing information security skills shortage, with an estimated shortage of 3.4 million cybersecurity workers worldwide, is putting greater pressure than ever before, according to a study by (ICS)2 on security professionals and organisations. The investigation out of 11,779 global practitioners and decision-makers revealed that 70% felt their organization did not have enough cybersecurity staff to […]]]>

Continuing information security skills shortage, with an estimated shortage of 3.4 million cybersecurity workers worldwide, is putting greater pressure than ever before, according to a study by (ICS)2 on security professionals and organisations.

The investigation out of 11,779 global practitioners and decision-makers revealed that 70% felt their organization did not have enough cybersecurity staff to be effective.

More than half of employees in organizations with workforce shortages said they believe staffing shortages put their organization at “moderate” or “extreme” risk of a cyberattack.

Due to understaffing, IT security professionals have encountered problems including a lack of time for process assessment and monitoring and slow patching of critical systems.

The study also indicated that it was not necessarily difficult to find qualified talent, but rather that insufficient training and promotion opportunities were the most important factor fueling staff shortages.

Dave Gerry, COO at outsourced cybersecurity specialist Bugcrowd, explained that attracting good candidates has always been at the heart of any business.

“Finding senior talent, whether in cybersecurity or another function, requires a combination of attractive compensation, career growth, flexibility to work anywhere, and a mission that employees want to support” , did he declare. By creating opportunities for career growth and rallying around a mission to help customers and the wider digital community defend against cyberattacks, employees feel empowered to improve and do advance the community at large.

“Bugcrowd has always taken the approach of finding talent from non-traditional and diverse backgrounds, providing them with the necessary training and empowerment, compensating them well with additional equity incentives and giving them the means to do what needs to be done,” said Gerry. “It has allowed us to continue to build a world-class team in a highly competitive market.”

He added that for years the industry was led to believe there was a significant gap between the number of jobs open and the qualified candidates to fill those jobs.

“Although this is partially true, it does not give an accurate view of the current state of the market,” he explained.

From his perspective, employers need to take a more active approach to recruiting from non-traditional settings, which, in turn, greatly expands the pool of candidates, from just formal graduates to individuals who, with the right training, have incredibly high potential. .

“Furthermore, it provides the opportunity for people from diverse backgrounds who otherwise could not receive formal training to break into the cybersecurity industry, providing opportunities for income, career and wealth creation. they might not otherwise have access to,” says Gerry.

Darren Guccione, CEO and co-founder of Keeper Security, a provider of zero-trust, zero-knowledge cybersecurity software, said business leaders face the challenge of finding the cybersecurity talent needed to ensure the security of their organizations as they balance distributed remote workforces and a growing number of endpoints with a threat landscape that continues to expand.

“This imbalance between the need to protect public and private sector organizations and trained cybersecurity professionals presents a bold opportunity for students to pursue a career in a massive industry,” he said.

Guccione explained that beyond compensation, Keeper Security is looking for people who are passionate about the profession and the desired skills.

“We are committed to developing global talent with the goal of helping our team members become the best versions of themselves and thrive in their profession,” he said. “Cybercriminals aren’t waiting for industry to fill the cybersecurity workforce gap.”

Therefore, he said, colleges, universities and technical organizations should develop, invest in and implement state-of-the-art cybersecurity programs.

John Bambenek, principal threat hunter at Netenrich, a SaaS security and operations analytics company, pointed out that ultimately threat research does not scale with technology.

“You just need more humans to do more,” he said. “It also inspires me to focus on developing young researchers, which benefits the industry and the landscape as a whole anyway.”

He said he always preferred to do what he called “hiring Rolodex” when he could because hiring is one of the most miserable jobs for managers.

“Once I have people on the doorstep, I try to encourage professional development as much as possible and I continue to try to steer the work towards their current interests,” he says. “Basic engagement with staff at the human level also helps beyond just shoveling JIRA tickets.”

Bambenek also noted that many organizations rely on automation or machine learning to try to fill the talent gap.

For example, SOAR, in addition to solving the security problem, allows organizations to do much of the incident response work automatically instead of relying on humans to do it.

“We’re seeing automation that doesn’t work and new security issues that automation isn’t quite ready to solve yet, but there’s a lot of promise for new tools and technologies to make humans more productive than they are. are today,” he said.

]]>
The most hireable digital adoption professional skills on the market https://teletrust.info/the-most-hireable-digital-adoption-professional-skills-on-the-market/ Mon, 17 Oct 2022 10:34:51 +0000 https://teletrust.info/the-most-hireable-digital-adoption-professional-skills-on-the-market/ The skills required by IT professionals constantly evolve along with the technologies they use. Terri Crymes, Lead Instructor of the WalkMe Digital Adoption Institute, shares the latest on the evolving role of the digital adoption professional and the most hireable skills that are rapidly emerging and will be needed for the future. According to the […]]]>

The skills required by IT professionals constantly evolve along with the technologies they use. Terri Crymes, Lead Instructor of the WalkMe Digital Adoption Institute, shares the latest on the evolving role of the digital adoption professional and the most hireable skills that are rapidly emerging and will be needed for the future.

According to the World Economic Forum, 85% of the jobs of 2030 do not exist today. Certainly, the skills and experiences that make up these careers are already taking shape. One such path is that of a Digital Adoption Professional (DAP) who advances the use of digital technologies within their organizations by improving the user experience and ultimately generating a return on technology investments.

Specifically, the DAP Architect supports the behind-the-scenes adoption of new and ever-changing digital technologies in an organization. They integrate a digital adoption platform into the company’s technology stack, configure it to comply with privacy and security requirements, and manage data integrations between systems. DAP Architects are technical IT professionals who possess a deep understanding of how the end-user experience across a company’s software and applications affects the success of critical digital transformations. The role is inextricably linked to the success of digital transformations and the bottom line of the business by maximizing the value of digital investments.

The promising career path of DAP Architect is a chance for IT professionals to link their value as individuals to their business’ return on investment through technology. The role relates to employee experience, growth, retention and productivity strategies as DAP Architects use technology to improve the experience and productivity of interacting with digital products. The responsibilities of this function extend to all departments of a company. It’s exciting, in demand, and here’s how to add it to your resume.

Learn more: Are technical degrees becoming obsolete compared to technical skills?

The high cost of low digital adoption

A recent WalkMe study of nearly 1,500 business leaders found that the inability to fully utilize technology tools cost the average business nearly $100 million in 2021. This figure factors in the cost of not realizing the full value software investments, digital transformation projects that have not achieved their objectives. goals because end users have not used the technology as intended, support and training to compensate for employees’ lack of digital dexterity, and replacement of employees who left due to technology frustration. According to the same study, companies intend to spend an average of $30 million to address their digital adoption challenges over the next three years. In order to close the costly digital adoption gap that most businesses are currently experiencing, organizations need to have the necessary talent focused on digital adoption. A critical role is the DAP architect.

The lack of digital adoption is also weighing on employees. Time spent trying to understand workplace technology and processes has exploded alongside the rapid digitization seen in recent years as organizations seek new ways to work remotely during the pandemic. A recent Harvard Business Review study found that employees switch between apps about 1,200 times a day, which accounts for about 9% of their annual work time. Technology overload ties employees up, wastes their time, and prevents them from achieving their goals at work efficiently and easily. Everyone wants to increase the adoption of useful technologies in the workplace, and as technology is constantly changing, digital adoption strategies will be a necessary investment in the future.

Essential Skills for Success as a DAP

DAPs use digital adoption platforms (DAPs) as a digital canvas to create engaging experiences such as walkthroughs, intelligent guidance, and automation that benefit end users while delivering tremendous value to their organizations. They create a consistent user experience across enterprise technology stacks to guide users through the digital jungle that is the daily screen of most knowledge workers today. DAPs can be used to guide any user in any industry. Fast food workers can benefit from on-screen guidance to efficiently place and fulfill orders without lengthy training sessions. The same technology can help a senior sales professional at a SaaS company close a million dollar deal on their CRM.

The evolving role of the DAP has many facets. Some focus primarily on end-user experience, taking responsibility for using aggregated data obtained from a DAP across applications to constantly improve user experience and process efficiency, while other DAPs, like DAP Architect, focus on the technical infrastructure and compatibility of a digital adoption platform.

The beauty of DAP is that everyone has the opportunity to enter on the ground floor because it’s such a new profession. There are many certification opportunities to prepare for this line of work with its own particular skill set. And while no formal training is required, more technical DAP roles such as DAP Architect would be better suited to someone who already has IT expertise.

The most valuable digital adoption skills

Not always top of mind when thinking of an IT professional, communication and collaboration skills offer huge benefits at work as a DAP. This new capability is truly organization-wide, affecting every individual who uses software to do their job. Understanding the nuances of effective communication is critical in digital adoption infrastructure and interactive content.

Implementing a DAP across the multiple platforms that make up an enterprise technology stack is no small feat. Project management skills are essential to successfully manage multiple integrations, moving parts, and deadlines while working with stakeholders across the organization.

Finally, business acumen is a not-so-secret superpower for a DAP architect and a prerequisite for any DAP. They will all need to understand their specific business needs and how their digital adoption strategy and platform can be used to drive business results. Ultimately, DAPs are highly accountable leaders who directly impact a company’s bottom line by using technology to achieve business goals. Business acumen is therefore an essential skill.

Not all DAP architects will grace the official title or even have it as a full-time job, but adding DAP architect capabilities to your professional wheelhouse is a worthwhile investment in your IT career. There is a serious need to improve digital adoption in organizations across all industries. While there are amazing technology solutions out there, there is a necessary talent component that shouldn’t be overlooked. Arm yourself with the possibility of being part of the solution by adding DAP Architect to your resume.

How are you preparing for more effective digital adoption? Tell us about Facebook, Twitterand LinkedIn. We love it when you share!

LEARN MORE ABOUT IT SKILLS AND CAREERS

]]>
IT Security Analyst – Gauteng Selby https://teletrust.info/it-security-analyst-gauteng-selby/ Mon, 17 Oct 2022 07:00:00 +0000 https://teletrust.info/it-security-analyst-gauteng-selby/ Our Johannesburg-based client is looking for a Senior Cyber ​​Security Analyst to join their team. Terms: 5 years of experience in cybersecurity, engineering or fixing security vulnerabilities In-depth knowledge of MS Azure security platform (MS Intune / DRM / O365 Security) In-depth knowledge of firewalls and malicious code defense, including APT; Knowledge of cybersecurity technical […]]]>

Our Johannesburg-based client is looking for a Senior Cyber ​​Security Analyst to join their team.

Terms:

  • 5 years of experience in cybersecurity, engineering or fixing security vulnerabilities
  • In-depth knowledge of MS Azure security platform (MS Intune / DRM / O365 Security)
  • In-depth knowledge of firewalls and malicious code defense, including APT;
  • Knowledge of cybersecurity technical assessments, standards, tools and processes
  • In-depth knowledge of cybersecurity tools, processes and methodologies

Education:

  • Bachelor’s degree in information security or similar;
  • Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; Council CE: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE are preferred

Desired skills:

  • cyber security
  • cisped
  • ms azure
  • O365
  • Information security

About the employer:

Drive vulnerability testing, risk analysis and security assessments providing the results to the Head of Department.
Monitor, analyze and detect cyber events and incidents within information systems and networks.
Consult on integrated and dynamic cyber defense and leverage cyber security solutions

Find out more/Apply to this position

]]>