Connect with us

Tech & Innovation

Next generation businesses require security-driven network

As Big Data, hyperscale architectures, SD-WAN, 5G, Edge networking, and smart systems (such as cars, cities, and infrastructures) become mainstream, these networks will be forced to change even further. The current generation of security solutions now in place simply can’t keep up.

Published

on

Photo by Steve Halama from Unsplash.com

Today’s networks are distributed across so many devices and environments, many of them temporary and all of them in a constant state of flux, that the notion of a perimeter has been almost completely abandoned. This transition has largely been the result of an application-based business model. Users—both employees and consumers—require immediate and reliable access to critical applications and streaming services at any time, from any location, on any device. 

To achieve this, most organizations have transformed their networks to a collection of edges. In addition to the LAN edge, there is the new WAN edge, the multi-cloud edge, the distributed datacenter edge, the mobile edge, and most recently due to the rapid shift to work-from-home, a huge surge in the home office edge. And multi-edge computing (MEC)—a distributed, open IT architecture that features decentralized processing power and a virtualized network platform—is right around the corner. Powered by 5G-enabled devices and infrastructure, MEC leverages mobile computing and Internet of Things (IoT) technologies to process data locally rather than being transmitted to a datacenter. 

This level of innovation has transformed networks so thoroughly and so rapidly that traditional security tools are no longer able provide the consistent security that networks require. Traditional security solutions, often deployed after a network was in place, were designed to secure fixed perimeters and monitor predictable levels of traffic and workflows moving between static network servers and devices. 

Those days are gone. Today’s collection of edge environments are in a constant state of flux. They are not only continually adding and dropping physical and virtual devices, they also create temporary networks and are constantly fine-tuning connections. And as Big Data, hyperscale architectures, SD-WAN5G, Edge networking, and smart systems (such as cars, cities, and infrastructures) become mainstream, these networks will be forced to change even further. The current generation of security solutions now in place simply can’t keep up. 

Security-driven Networks are Designed for Today’s Digital Business 

Fortunately, there is a new generation of security designed for today’s complex, distributed, and dynamic environments. It starts with Security-driven Networking, an approach that tightly integrates an organization’s network infrastructure and security architecture into a single solution. Weaving security deep into the network in this way is essential for effectively defending today’s highly dynamic environments. And by deploying Security-driven Networking solutions across all of their edge environments, organizations can ensure consistent policy orchestration and enforcement across today’s highly flexible perimeters. This enables the network to reroute traffic, replace connections, move resources from one domain to another, and dynamically scale up and out without ever compromising the ability of security systems to track workflows, transactions, users, data, or devices. 

Achieving this requires implementing a security solution strategy designed to encompass the entire network development and deployment life cycle, allowing security to function as the central consideration for all business-driven infrastructure decisions. With security at the core, networks can evolve, expand, and adapt without concerns that an expanded attack surface or security gap could compromise the organization. 

Three Critical Steps for Implementing a Security-driven Network: 

Secure PDIO: A Security-driven Networking strategy must be part of the entire network Planning, Design, Implementation, and Optimization lifecycle. But it starts in the planning stages, before everyone agrees on what new infrastructures and applications and devices are needed. And that requires everyone to agree that all development must support a central security fabric strategy—an approach for ensuring consistent visibility, orchestration, response, and enforcement across the entire network. 

Want a new cloud infrastructure? It doesn’t just need to include security. It needs to use a security platform that can function as part of the central security fabric. Building and deploying a new application? The security fabric not only needs to be able to see and inspect the application and its traffic, but it should also be built using the exact same security tools used to protect the rest of the network. And when virtual devices need to spin up or out, or when connections between a branch office and business applications in the cloud need to roll over, the Security Fabric needs to literally be part of that process, ensuring that security is always watching, always sharing, and always ready to respond. 

Access Control and Segmentation: When new devices are added to the network, the integrated security system needs to automatically identify them and apply rules before granting access to network resources. That includes automatically assigning devices to secured network segments that have been enhanced with authentication for increased control and flexibility. These network segments are then monitored by the security fabric to prevent unauthorized behaviors, inspect applications, and secure workflows, driving access security deep into the distributed network. And because security and networking are tied together, any changes to the network infrastructure automatically include changes to security. 

Consistent Protection Everywhere: Data never stays in one place. It gets shared, cross-referenced, mined, and processed. Security-driven Networking protects data, applications, and workflows along their entire data path through the implementation of a single, integrated Security Fabric, ensuring that the secure handoff of data and workflows between network domains is seamless. Achieving this requires integrated security platforms deployed across the network to consistently secure that traffic even as it passes across and between different network segments, dynamic multi-cloud environments, data centers, and devices.  

This requires a solution designed to function natively in all public and private cloud environments and comes in form factors ranging from powerful datacenter edge devices, to small desktop footprints, to virtual solutions running in cloud environments, to cloud-based solutions designed to secure devices and data off-network, to software running on endpoint devices, to versions designed to run in a container or be added to an application to secure data and transactions. All of these must function as a powerful security solution within their own sphere, track and adapt as the environment changes, and work as a single, integrated system that spans all environments to add a level of visibility, control, and response previously unavailable. 

Digital Innovation Demands Security-driven Networking 

Security-driven Networking is an essential next step for securing today’s dynamic and evolving digital infrastructures. Security platforms integrated into a unified security fabric and woven into the network infrastructure enable organizations to embrace digital innovation and expand their digital footprint without exposing critical resources to new risks compounded by the loss of visibility and control—often due to the complexity of trying to secure an evolving network using traditionally isolated products. Security-driven Networking is designed to expand and adapt in sync with the network, providing the flexible protections and controls that today’s digital businesses require. 

Tech & Innovation

Why website security is important for business continuity

Beyond establishing a digital presence and e-commerce store, entrepreneurs should also take steps to ensure their websites are protected from cyber threats.

Published

on

The past year saw businesses of all sizes shift to the online marketplace. And with the continued need to shelter in place due to the pandemic, digital-based transactions are expected to continue to rise in the future. 

As more entrepreneurs expand their online operations, the more they need to take website security seriously. According to the Department of Trade and Industry, with the rise of digitalization, cybersecurity and data privacy remain a challenge especially for small businesses. 

“As more Filipinos shop online, businesses of all sizes need to ensure their websites are protected to help maintain customer trust and credibility for online transactions. In addition, addressing security protection for your online presence can help to ensure that your business website is not impacted and available for your customers to make their purchases,” said Norman Barrientos, Director of Marketing for Southeast Asia of GoDaddy, the company that empowers everyday entrepreneurs worldwide. 


Securing your business website is crucial in maintaining operational continuity and customer loyalty. GoDaddy shares the following ways to help secure your website. 

Install an SSL Certificate

The basic protection your website can have is an SSL Certificate–which automatically creates a secure, encrypted connection with the browser of those who visit your site. What this means is that personal information passing to and from your website is further protected from data hacking.

Aside from security protections, having an SSL Certificate installed on your website can affect the discoverability of the website in search results.  Search engines like Google rank websites with SSL Certificates higher in search results listings. Web browsers also flag websites without an SSL Certificate as “not secure.” Business credibility can immediately come into question with potential customers who log on to your website, with the intent to do business with your company. GoDaddy offers a variety of SSL certificate plans.

Consider More Protection as Your Website Grows

Aside from installing an SSL Certificate on a website, additional protections such as a web application firewall (WAF) that intercepts incoming malicious code for security threats, and a malware scanner that alerts you if there is any bad content or code on your website and helps to start to address the issue, are crucial additional website protections to consider. Having these security protections in place can also help your website load faster. 

GoDaddy, offers Website Security services which includes a bundle of tools that helps to protect your website, as well as includes continuous website monitoring and a back-up function that allows you to restore your entire website in a single click. 

Conduct regular website Back- Ups 

As you continually edit and update your website, it’s important that your files, including photos, and the overall layout of your website are safely backed up. This allows you to restore your website should any problems occur. 

Today, tools that help keep website files more protected, like GoDaddy Website Backup, automatically take stock of changes in your website and secure them in the cloud. This helps protect your website against cyberthreats, with easy restoration which can help to limit downtime for your business. 

From domains to creating your own business website, GoDaddy is the one-stop shop for everything you need to create a strong online presence. Find out more about GoDaddy’s website security tools by logging on to www.GoDaddy.com.

Continue Reading

Strategies

5 Practical ways to keep your finances safer online

Kaspersky’s fresh data for Q2 2021 showed a 60% increase in mobile banking Trojan attacks blocked in the region versus same period last year.

Published

on

Photo by Blake Wisz from Unsplash.com

Kaspersky reveals its Q2 2021 mobile threat report for Southeast Asia (SEA) where it has monitored a 60% uptick in the number of attacks using malicious mobile bankers detected and blocked in the region. 

Mobile banking Trojans – or bankers – are used by cybercriminals to steal funds directly from mobile bank accounts. These malicious programs typically look like legitimate financial apps, but when a victim enters their security credentials to try to access their bank account, the attackers gain access to that private information.

Overall, since the beginning of 2021, Kaspersky products have foiled 708 incidents across six countries in SEA. This is already 50% of the total number of mobile bankers blocked in 2020 which was 1,408.

Indonesia and Vietnam logged the most number of incidents during the first half of the year. However, globally, the two countries are not among the top 10 countries affected by this threat. Vietnam is only 27th and Indonesia is 31st as of June this year.

The five countries with the most number of mobile banking Trojan detections in Q2 2021 are Russia, Japan, Turkey, Germany, and France.

*Mobile banking Trojans attacks detected from users of Kaspersky mobile security solutions in the country

While the number of mobile banking Trojan attacks in SEA remains low, 367 incidents from April to June 2021 versus 230 detections during the same period last year, the continuing pandemic continues to force users to start using mobile payment systems.

“We are almost at the second year of the pandemic which has fast tracked the mobile payment adoption in the region at a breakneck speed. During the beginning of this health crisis, our survey already showed that the majority of internet users here have shifted finance-related activities online, like shopping (64%) and banking (47%),” comments Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky.

The same survey revealed that seven in 10 (69%) are worried about conducting financial transactions online and 42% of the respondents admitted to being afraid about someone accessing their financial details through their devices.

In addition, another Kaspersky report titled “Making Sense of Our Place in the Digital Reputation Economy” discovered that the majority (76%) of 861 respondents from SEA confirmed their intent to keep their money-related data away from the internet. The sentiment is highest among Baby Boomers (85%), followed by Gen X (81%), and Millennials (75%).

“Clearly, there is an awareness about the threats present when we do banking and payment transactions through our mobile phones. But there is still a gap between knowing and acting on it. So to help users from SEA embrace the power of their smartphone and also keep their finances safe, we suggest some practical tips but also encourage everyone to please look into using security solutions as a safety net in case they accidentally clicked a malicious link or downloaded a rogue mobile banking application,” adds Yeo.

Here are some practical tips from Kaspersky which you can do to beef up your money’s safety online:

1. Get a temporary credit card

Cyber criminals have developed incredibly sophisticated techniques and malware that can sometimes thwart your best efforts for safe online shopping. As another level of security for safe online shopping, you can use a temporary credit card to make online purchases, in lieu of your regular credit card. Ask your credit card company if you can be issued a temporary credit card number.

Just remember to avoid using these types of credit cards for any purchases that require auto-renewal or regular payments.

If a temporary credit card is not possible, an alternative is to use a credit card with a low credit limit.

2. Dedicate a computer to online banking and shopping

If you have more than one computer, it may be wise to dedicate one for online banking and shopping only. By avoiding using the computer for any other Internet browsing, downloading, checking email, social networking, and other online activities, you effectively create a ‘clean’ computer that is totally free of computer viruses and any other infections. For added security for safe online shopping, install Google Chrome, with forced HTTPS. This ensures you are visiting only secure websites.

3. Use a dedicated email address

Create an email address that you will use only for online shopping. This will severely limit the amount of spam messages you receive and significantly reduce the risk of opening potentially malicious emails that are disguised as sales promotions or other notifications.

4. Manage and protect your online passwords

Using strong passwords and using a different password for each online account is one of the most important things you can do for safe online shopping. We know it can be difficult to remember so many different passwords, especially when they are composed of numerous letters, numbers, and special characters. But you can use a password manager to aid you in keeping strong passwords for multiple accounts.

5. Use a VPN

If you absolutely must shop online while using public Wi-Fi, first install a VPN (virtual private network). A VPN will encrypt all data that is transferred between your computer or mobile device and the VPN server, preventing hackers from hijacking and viewing any sensitive data you input.

In the Philippines, Kaspersky endpoint solutions like Kaspersky Total Security (KTS) that have a password manager and  VPN features is currently included in its 9.9 promos in Shopee and Lazada.  Filipino customers can enjoy up to 50% discount.

Continue Reading

Tech & Innovation

3 Things Canon introduced to improve your digital life

Whether for work or play, everyone can now enjoy a wide range of options from Canon, each one designed to fit today’s demanding digital needs. From cameras and projectors that will elevate your next digital project to innovative software that will simplify your ways of working, Canon has a solution for you. 

Published

on

“At Canon, we take pride in being an all-in-one solution provider, catering to the different needs of our customers. We are driven to continuously create and innovate, and at times like this, we pivot to adjust when customer needs change. It is our commitment to innovation that allows us to continuously delight people with products and services that fit their business or lifestyle,” said Kazuhiro Ozawa, Canon Marketing (Philippines), Inc., President & CEO. 

Expanding Creativity and Staying Connected with High Quality Video  

In this digital normal, livestreaming, virtual meetings, classes, and even social occasions like e-weddings, have become essential in everyday life. With the entire world streaming, it is important to have high quality videos that allow for people to stay connected and creative. That is why Canon has developed the EOS Webcam Utility, a free and easy-to-use feature on Canon cameras that turns your camera into a webcam. Take beautifully crisp, in-focus videos while on calls, or opt to defocus a distracting background with a natural and bandwidth-friendly bokeh. 

You can use the EOS Webcam Utility with the full-frame Canon EOS RP. The EOS R system, Canon’s celebrated range of mirrorless cameras, is built for creators who demand the power and performance of a full-frame sensor with the ergonomics of a mirrorless camera. With Canon EOS RP, get a better broadcast experience for your virtual audiences with 4K 30p video resolution, a fun, vari-angle screen, and the reliable EV-5 focus feature that keeps the subject crisp without the need for external light.

Aside from EOS RP, Canon’s PowerShot G7X Mark III is a favorite among many vloggers. The top-of-the-line compact camera captures 4K video without crop, at an improved ISO sensitivity range of 125 – 12,800 and can continuously shoot up to 30 frames per second during RAW Burst Mode.Designed for today’s digital nomads, the camera supports a direct, wireless, and for a mobile-first experience for your audience, vertical content sharing to popular social media sites like Instagram, Tiktok, and Faceboook, as well as livestreaming to YouTube.  

An optimized Business Solution for the new normal 

Beyond consumer products, Canon advocates for making business as simple as possible. With Therefore, business owners and their employees don’t need to manually rummage through physical files because the solution serves as an organized, centralized data bank with highly customizable security access options. Companies large and small can now smartly store any kind of file, such as income statements, receipts, employee files, or even photos, in Therefore™ and conveniently find it in a few clicks from anywhere in the world, even their own living room. Click here for more information. 

Lifestyle Solution for Fun, Entertainment, and Work 

Movies and presentations can now be viewed with utmost flexibility with Canon’s pocket projector.  The compact and lightweight MP250 lasts up to 2 hours of operation, projects up to 93″ wide at up to 250 lumens brightness. 

The MP250 is ready to work with any laptop thanks to its embedded media and document viewer and HDMI and USB ports. For those who can’t be bothered with a laptop, the mini projector can also support wireless content sharing from Android OS devices or direct playback from a USB flash drive. 

Whether for work or play, everyone can now enjoy a wide range of options from Canon, each one designed to fit today’s demanding digital needs. From cameras and projectors that will elevate your next digital project to innovative software that will simplify your ways of working, Canon has a solution for you. 

Follow Canon Philippines (@canonphils) on Facebook and Instagram for all the latest news and updates. 

Continue Reading
Advertisement
Advertisement

Like us on Facebook

Trending