Skip to main content

"Be the Sole Master at Home - An Imperative in Cybersecurity"

Archangel 2.0 NGFW from PT SYDECO

Cybersecurity, defined by the objective it pursues, aims to protect natural and legal persons against any digital attack so that they keep intact what belongs to them, whether material or immaterial goods, so that they are available to them at any time, unchanged and under their exclusive control and to avoid direct and indirect damage inherent in any infringement of their exclusive right of ownership or enjoyment of their assets. It is by fully understanding the issues and implications of cybersecurity that we will be able to apply effective measures.

  • Who should be protected?

The natural person or entity that owns an IT system is the first potential victim in the event of an attack.

  • What should we protect?

Assets, whether tangible or intangible, encompass much more than a simple IT system. Reputation, competitiveness, production, services, and even the economy of damages are an integral part of the assets to be preserved.

  • What purpose?

So that these assets remain available, unaltered, confidential and under exclusive control at all times.

  • How to protect?

Of course, and everyone knows it, there is a range of tools available on the market, which range from peripheral protection (firewall) to close protection (Deep Packet Inspection is sometimes included in the next generation firewall like this is the case of ARCHANGEL© 2.0), to antivirus through learning responsible behavior, education, training and monitoring of good practices or even compliance with security policies issued in large entities.

By following security advice and using the latest cutting-edge tools, you can be sure to offer your assets the best possible protection, provided you are the only one with absolute control over everything that touches them.

However, you must be careful not to let the worm enter the apple.

You must therefore be careful about external services. Indeed, we lose this absolute control when we use the services of third parties, whether to secure our communications, our financial transactions or our work from home (VPN), or to have access to our data or to share it (Cloud Storage ) or by using Cloud computing services (Saas, Paas, Iaas, Faas) of which we do not know and cannot know the degree of security of their servers nor the way in which access to these services is managed and even less if their operating systems are not tainted with vulnerabilities.

  • Cloud Risks

Cloud computing, although offering undeniable advantages, also exposes it to major risks. Security incidents at giants like SolarWinds, Kaseya, Okta and recent breaches like Log4j highlight the vulnerability of the systems.

This vulnerability is very understandable when we know that three parties are generally involved in Cloud computing, the end customer or user of the service (you, individual or organization); the data owner - company that provides a service or products to the customer; and the data holder - a third party cloud service provider who provides hosting (storage, application, hardware) to the data owner with the obvious consequence of multiplying the attack surface for malicious actors (1).

Apple's recent study, published on December 7, 2023, highlights the intensification of the threat. With over 80% of breaches involving data stored in the cloud and a staggering 2.6 billion records compromised over the past two years, the data security risks in the cloud are alarming (2) .

And the future outlook is not rosy, with all professionals in the security sector agreeing that attacks will only increase, especially since hackers have gotten their hands on AI. .

Statistics from Check Point Research show a 48% increase in cloud network attacks in 2022 compared to 2021, with the largest increase in Asia at 60%. This observation is corroborated by Kaspersky's for whom “Cloud technology will become a preferred attack vector, because digitalization increases cybersecurity risks” (3).

  • File Transfer and VPN

Online file transfer services and VPNs are not immune from attacks. Recent cases, with the latest, MOVEit, have exposed millions of sensitive data, highlighting the need for constant vigilance (4) and critical vulnerabilities have been exploited by hackers in Pulse Connect Secure (PCS) VPNs, VPN-SSL, Palo Alton Networks VPN “Global Protect” (5).

  • The Solution: Be the sole master of your tools

Mastering all the tools with which your assets come into contact, whether for communications security or for remote access, is essential and this can only be done if the servers that enable them are located at home.

And this is where PT SYDECO comes in with its latest cybersecurity product.

The Integrated Protection System offers a complete solution including:

-         A Next Generation Firewall (ARCHANGEL© 2.0), at the cutting edge of progress which protects the network and what it contains,

-         A VPN Server protected by ARCHANGEL 2.0 which guarantees the total security of communications, financial transactions, at home or on the way, as well as

-         An Online File Sharing System (SydeCloud©), which allows you to have access to your data wherever you are in the world with any device you use (all the advantages of the Cloud without its disadvantages and dangers) and share them with whoever you want.

Thus, by having these tools at home, you become the sole master of your servers and you ensure the total security of your assets.

  • Financial Arguments

Beyond security, repatriating your servers can represent significant savings, as demonstrated by the experience of the company Basecamp (6).

In conclusion, cybersecurity requires a proactive approach and total mastery of the tools used. PT SYDECO offers an integrated solution, placing everyone as the sole master of their home, thus guaranteeing the protection and security of assets.

1. https://www.cyber-cover.fr/cyber-documentation/assurance/cloud-computing-et-cyber-attaques-ou-sont-les-responsabilites

2. https://www.apple.com/chfr/newsroom/2023/12/report-2-point-6-billion-records-compromised-by-data-breaches-in-past-two-years/

3. https://www.globalsecuritymag.fr/Check-Point-Research-fait-etat-d-une-augmentation-de-48-des-attaques-de-reseaux.html

4. https://www.01net.com/actualites/plus-importants-hack-2023-plus-grave-prevu.html

5. https://www.zdnet.fr/actualites/des-hackers-ont-pirate-des-serveurs-vpn-pour-installer-des-portes-derobees-dans-des-entreprises-du-monde-entier-39899171.html; https://www.lemagit.fr/actualites/252528257/VPN-SSL-nouvelle-vulnerabilite-critique-inedite-chez-Fortinet; https://www.lemondeinformatique.fr/actualites/lire-les-vpn-de-palo-alto-fortinet-et-pulse-vulnerables-75997.html

6.      Bill Fassinou, 23 ferier 2023, https://Cloud-computing.developpez.com/actu/341839/Le-directeur-technique-de-Basecamp-affirme-que-l-entreprise-economisera-7-millions-de-dollars-sur-5-ans-en-abandonnant-le-Cloud-au-profit-de-sa-propre-infrastructure/

#VPN #filetransfer #Cloud #cybersecurity #Archangel #Sydecloud #Sydeco

Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which