Skip to main content

“Parameters and Realities of Cybersecurity: Beyond Passwords”

In an increasingly complex digital landscape, data protection is at the heart of concerns. A recent article highlights the effectiveness of password managers in countering AI attacks on passwords. However, this solution seems to obscure certain realities of cybersecurity.

Data security often starts with strong passwords. These codes, usually considered the first line of defense, require complexity and uniqueness. However, password managers, although praised for their creation and management, raise questions about managing their own access.

While these tools make it easy to create strong, unique passwords for each site, they also present a major vulnerability: centralization. Indeed, the compromise of a single password can open the door to AI to access all accounts, thus concentrating the risks.

Especially since, if as the cited article suggests, the use of the password manager is justified by the need to protect oneself from an AI attack on one's passwords, access to the manager is itself even protected by… a password!

Cybersecurity Parameters

First of all, you must understand that cybersecurity is not an end in itself but is only a means of protecting your data, your computer equipment and, in general, your assets.

Data security involves, in addition to the strength of passwords and the way in which they are used, a holistic consideration of several other parameters, including the degree of security of the websites, applications or systems visited, the environment in which passwords are entered as well as the protection of the private network and the way in which the data and its access within the protected network are managed.

The sites visited may have technical vulnerabilities, store passwords inadequately or even be affected by security flaws that can be exploited by cybercriminals to access user data. A healthy approach to cybersecurity therefore requires applying the principle of ZERO TRUST to any website or external application, considering them all as insecure and focusing on the strength of the password that allows access to them as well as on the environment in which it is entered and on the way in which the data is managed.


Thus, whether the visited site is secure or not, the consequences will be as follows depending on whether the password is:

- Low and common to all sites:

. High risk of compromise for data protected by this password,

. Very high risk of compromise for all accounts.

- Strong and common to all sites:

. Reduced risk of compromise for data protected by this password,

. Relatively low risk of compromise for other data.

- Strong and unique per site visited:

. Reduced risk of compromise for data protected by this password,

. Significantly reduced risk of compromise for other accounts because each password is specific to a site or service.


And depending on the security level of the environment in which the password is entered:

- If it is unsecured such as public Wi-Fi networks:

. Without using a VPN, entering passwords should be avoided because no protection is given to them and both the passwords and the data they are supposed to protect and all other user data will be vulnerable to any attack.

. Using VPN (Virtual Private Network) can help secure the connection by encrypting transmitted data, reducing the risk of interception.

- If the environment is secure:

. The risk to data protected by the password used to connect to a site containing security vulnerabilities is real but will vary depending on the strength of the password being protected.

. On the other hand, it is very unlikely that other data stored in the secure environment will be affected.


Finally, regardless of any attack on passwords to access the victim's data, hackers use, among other things, phishing or social engineering.

At this stage, it is no longer on the password that we must rely to protect our data but on the way in which the internal network is structured.

The design of the network structured in micro-segmentation will thus avoid any lateral contamination of a malware which will only affect the data which has been put in direct contact with the contamination agent.

The main cybersecurity parameters are therefore to be sought in terms of password strength, security of the environment in which they are entered, the principle of ZERO TRUST, security of the environment in which the data is stored and the way this environment is structured.

The environment in which passwords are introduced plays a crucial role. Risks differ between a secure network and a public network.

The ZERO TRUST approach, advocating distrust of all access, and micro-segmentation are becoming essential.

Finally a protected environment, such as a secure home network and/or virtual private network (VPN), provides an additional layer of security.

So while the strength of a password is crucial to securing an individual account, the location from which that password is entered can play a crucial role in protecting other data stored in your digital environment. A combination of good security practices that include segmentation of your network and a secure environment contribute to better protection against online threats.

It is this secure environment created according to the principles of ZERO TRUST and which organizes within the protected entity a MICRO-SEGMENTATION likely to limit any risk of contagion as much as possible, that PT SYDECO created with ARCHANGEL 2.0, Firewall of New Generation.

ARCHANGEL 2.0, Firewall of New Generation (NGFW) protects any entity, large or small, and individuals with VPN PICCOLO.

ARCHANGEL 2.0 NGFW with VPN server protecting up to 15.000 devices with 15.000 tunnels


Access to websites is secure, whether the password is entered within the protected unit or even outside thanks to the VPN server included in ARCHANGEL 2.0. NGFW

VPN PICCOLO from PT SYDECO


At home, the environment is secure thanks to VPN PICCOLO which also allows you to enter passwords securely even when you are on the move thanks to the VPN server it contains.

Sources

https://www.globalsecuritymag.fr/L-IA-peut-dechiffrer-vos-mots-de-passe.html

https://www.mailinblack.com/ressources/blog/comment-fonctionne-un-gestionnaire-de-mots-de-passe/

#VPN #motdepasse #password # cybersecurity #Firewall #FWNG # malware # Archangel #PICCOLO # data #passwordmanager #zerotrust #segmentation #PTSYDECO #Wifi #AI 

Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which