Connect with us

Expert Speak

SearchInform’s Service Against Data Leaks, Fraud and Employees’ Idleness

Published

on

Lev Matveev, founder and chairman of SearchInform, reveals the main “pain points” in the information security protection of small and medium-sized businesses, explains, how to eliminate them and shares illustrative cases of information security (IS) incidents.

Today, the amount of digital data is growing steadily. At the same time, the information is often more valuable than physical assets and therefore becomes a subject of interest for intruders. To protect your company, it seems like you don’t need much: an onboard IS specialist, advanced protective software and the hardware required. But, if it’s so simple, why is the number of data breaches and cases of corporate fraud increasing year after year? I see several reasons for this:

  1. For small and medium-sized businesses it’s often too expensive to purchase the protective software and equipment required. Even large companies do not always allocate sufficient budgets for information security issues, and for SMBs, the situation is much more complicated. Paying a one-time fee of several hundred thousand dirhams for software, and equipment and hiring a specialist on staff is an impossible task for SMEs.
  2. There is a shortage of information security specialists on the market. According to SearchInform statistics, 1/3 of companies’ executives admitted this problem.
  3. Information security is much more skewed towards protection against external threats – viruses, hackers, and DDOS attacks. Internal risks are underestimated, although there are convincing statistics, revealing, that in 2022, more than 72% of companies in the UAE experienced information security incidents due to their employees’ actions.

How to ensure protection against data leaks without having an in-house Information Security Department?
To make information security more accessible to all organizations, regardless of size or revenue, we at SearchInform launched the internal threat protection outsourcing service in 2019. We take on all the tasks – from software installation and configuration to providing a professional IS analyst who monitors the situation in the client company, provides reports and prevents IS incidents.

Our service enables to:

  • Ensure protection against data leaks;
  • Detect cases of fraud, document forgery, etc.;
  • Monitor employees’ activities;
  • Detect cases of third-party employment and work for market competitors;
  • Comply with regulatory requirements;

and much more.

I’ll focus on the most common incidents that our outsourcing analytical experts detect in customers’ companies, often during the first month of service usage.

Data leaks
More than 90% of companies face data leaks, one of the most dangerous types of data-related incidents. The most frequently leaked types of data are customer databases, technical information (e.g. drawings) or know-how, followed by accounting and financial documents. Clients’ and customers’ personal data is one of the most sensitive types of data leaked.

Case: the information security analyst detected an attempt to send a passport scan to an external email account. He prevented the operation of document sending and investigated the incident. It turned out that the hotel employee had an acquaintance who bought passport scans and IDs to confirm identity on online casino resources, carsharing services, etc. The employee intended to send passport scans in order to receive a monetary reward.

Inefficient use of working time and idleness
It’s easy to calculate how much a company loses if its employees spend 60% of their paid working hours on social media. Are you ready for such expenditures? In addition, the idleness of individual employees affects the entire team’s morale.

Job search
Employees have the right to search for jobs, but if they do so, the employer should be aware of it to either retain the employee by offering him/her new terms and conditions or to prepare for the employee’s replacement. If dismissal is unavoidable, the employee’s access rights to confidential data should be reconfigured to prevent information leaks.

Document forgery, corporate fraud and theft
Overall, in 86% of companies, fraud attempts were detected. Kickbacks, bribery and document forgery are also widely spread. Our analysts identify not only cases of data falsification in documents (e.g., suppliers’ quotations), but also cases of executives’ signatures forgery. Unfortunately, it is not very difficult to forge documents today – most intruders use Photoshop for this purpose. As a result, companies suffer financial losses and, in some cases, experience reputational damage.

Case: A manufacturing enterprise was losing $97,000 to $120,000 per month as a result of pipe theft. The company executives requested an investigation. Our outsourcing IS analyst revealed the fraud scheme by obtaining duplicate waybills: one for 3, and the other for 4 pipes. 4 pipes were transported through the VCC, one was unloaded along the road, and only 3 pipes were delivered to the client.

Violations of access rights distribution
Such incidents are detected in most companies. Improper data storage and misconfiguration of access rights are among the most serious incidents. If employees outside of the financial department have access to financial documents, sooner or later, the data leak will occur.

Side companies and third-party employment
Employees moonlight during paid working hours; they often use insider data to work for market competitors or to start their own businesses to compete with their employers.

As a result, on average 70% of clients continue to work with us after a free trial month.

When communicating with potential customers, I make a simple argument: information security is an investment that pays back many times over. In most companies, the cost of InfoSec outsourcing will not just be recouped, the customer will get a benefit, due to the identification and elimination of fraudulent schemes, business pain points such as employees’ side companies, work for market competitors, third-party employment and staff idleness.

Request more information and get a one-month free trial of the SearchInform service: https://ae.searchinform.com or write to us at uae@searchinform.com

– Partner Content

Cyber Security

Skills Gap Exposes Organisations to Risks

Published

on

Written by Rob Rashotte, Vice President, Global Training & Technical Field Enablement at Fortinet (more…)

Continue Reading

Expert Speak

Telegram’s Privacy Paradox: The Challenges of Balancing Security and Responsibility

Published

on

Written by Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East

In the complex and ever-evolving world of digital communication, Telegram has emerged as a platform that uniquely exemplifies the tension between privacy, security, and the responsibilities of tech companies in the 21st century. From its inception, Telegram has distinguished itself from other social networks and messaging apps by offering features designed to enhance user privacy and facilitate large-scale communication. These include end-to-end encryption (in secret chats), anonymous accounts, and the ability to create groups with up to 200,000 members, making it a popular choice for users worldwide. However, this popularity brings significant challenges, particularly in the realm of cyber security.

One of Telegram’s most distinctive aspects is its strong emphasis on privacy. Unlike many other platforms, Telegram allows users to join groups and communicate without revealing their phone numbers, offering a level of anonymity highly valued in an age where digital footprints are increasingly scrutinized. This focus on privacy extends to its encryption practices, with end-to-end encryption available in secret chats, ensuring that messages are accessible only to intended recipients. Additionally, Telegram’s use of its MTProto protocol for standard chats balances speed and security, making it a preferred choice for users prioritizing both performance and privacy.

However, the same features that make Telegram attractive to privacy-conscious users also create vulnerabilities that can be exploited by malicious actors. The platform’s capacity for anonymous communication and its less aggressive approach to content moderation have made it a haven for those engaging in illegal activities. From the sale of illegal goods to the coordination of cyberattacks, Telegram’s infrastructure has, at times, facilitated activities outside the bounds of the law. This has led to growing concerns among governments and cybersecurity experts about the potential for misuse.

The recent arrest of Telegram’s CEO under allegations related to the platform’s use by illegal groups has brought these issues to the forefront. This event highlights the ongoing struggle to balance the protection of user privacy with the need to prevent and mitigate illegal activities online. It also raises important questions about the responsibilities of platform providers in policing content and communications on their networks. In a world where digital privacy is increasingly valued, how can platforms like Telegram ensure they are not inadvertently enabling criminal behaviour? What role should governments and cyber security firms play in monitoring and regulating these platforms?

From a cyber security perspective, Telegram’s challenges are significant. The platform’s distributed infrastructure, spread across multiple jurisdictions, makes it difficult to block or take down, even in countries where it is officially banned. This resilience against censorship is one of Telegram’s key strengths, allowing it to remain operational in regions with restrictive governments. However, it also means that law enforcement agencies face significant hurdles in monitoring and shutting down illegal activities on the platform. The built-in proxy support that allows users to bypass government restrictions further complicates efforts to control the flow of information and activity on Telegram.

Another key issue is the scale at which Telegram operates. With the ability to create groups of up to 200,000 members, Telegram facilitates the rapid dissemination of information, which can be both a blessing and a curse. While this capability allows for the formation of large, engaged communities, it also makes it easier for bad actors to spread harmful content or coordinate large-scale illegal activities. The sheer size of these groups makes moderation a daunting task, and Telegram’s relatively lenient approach to content takedowns has been a point of contention for critics who argue that the platform does not do enough to curb illegal behaviour.

Despite these challenges, Telegram’s rise to popularity is understandable. The platform offers a level of privacy and functionality that is unmatched by many of its competitors. For users who value their anonymity and want to engage in large-scale communication without the fear of being tracked or monitored, Telegram is an ideal choice. The platform’s features are particularly appealing in regions where government surveillance is prevalent, providing users with a means of communication that is resistant to censorship and government interference.

However, as the arrest of Telegram’s CEO demonstrates, the platform’s success comes with significant risks. The fine line between protecting user privacy and enabling illegal activities is one that Telegram, like many other tech companies, must navigate carefully. The challenge lies in finding a way to uphold the principles of privacy and freedom of speech while also taking proactive measures to prevent the platform from being used for nefarious purposes.

For cyber security firms, the situation with Telegram underscores the importance of developing advanced solutions that can address these complex issues. As the digital landscape continues to evolve, tech companies, governments, and cyber security experts need to work together to create an environment where users can communicate freely without fear of their privacy being compromised, while also ensuring that these platforms are not used to facilitate illegal activities. The arrest of Telegram’s CEO is a reminder of the ongoing challenges in this space and the need for continued innovation and collaboration to protect both individual freedoms and global security.

In conclusion, while Telegram offers unique advantages in terms of privacy and scalability, these same features also pose significant challenges from a cybersecurity standpoint. The platform’s resilience, anonymity, and large group capabilities make it both a powerful tool for legitimate communication and a potential hotspot for illegal activities. As we move forward, it will be crucial to find a balance that allows for the protection of user privacy while also addressing the security concerns that come with such a powerful platform.

Cyber security Tips for Telegram Users:

  1. Enable Two-Factor Authentication (2FA): Adding an extra layer of security to your Telegram account helps protect against unauthorized access.
  2. Be Cautious with Public Groups and Channels: Always verify the authenticity and purpose of public groups or channels before engaging to avoid potential scams or malicious content.
  3. Regularly Update Your Telegram App: Ensure you have the latest security patches and features by keeping your Telegram app updated.
  4. Use Secret Chats for Sensitive Conversations: Secret Chats offer end-to-end encryption, providing an additional layer of privacy for sensitive communications.
  5. Monitor App Permissions: Regularly check and manage the permissions Telegram has on your device to prevent unnecessary access to your data.
Continue Reading

Cyber Security

Is Artificial Intelligence a Boon or Bane for Cybersecurity?

Published

on

Written by Sergey Belov, Head of Internal Security at Acronis (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.