Archive for the ‘Security’ Category

Norton Mobile Security protection for Samsung GALAXY smartphones

Monday, March 12th, 2012

Samsung Galaxy users worldwide will get a full-featured Norton Mobile Security free for 90 days. Usually, a one-year license costs S$19.90.

Complimentary 90-day subscription of Norton Mobile Security for Samsung GALAXY smartphones.

Complimentary 90-day subscription of Norton Mobile Security for Samsung GALAXY smartphones.

Norton Mobile Security, an application for Android OS, is available in multiple languages.

“With smartphone sales now outpacing PC sales, cybercriminals are devising new threats everyday to steal from mobile users. Consumers need to be protected more than ever,” said Janice Chaffin, group president, Consumer Business Unit, Symantec.Samsung Galaxy users will be able to download it from Samsung Apps.

Norton Mobile Security can be downloaded from the ‘Utility’ category in Samsung Apps or by entering ‘Norton Mobile Security’ into the search query at the Samsung Apps.

Norton Mobile Security supports all Samsung Galaxy Android smartphones, including Galaxy S2.

Norton Mobile Security combines anti-theft features with powerful anti-malware to protect user’s important data from loss, theft, viruses and other threats.

The following are the main features.

  • Remote Locate — Shows you the location of your smartphone so you can find if it’s lost or stolen.
  • Remote Lock — Lets you remotely lock your lost or stolen phone via the Internet or SMS to keep critical data safe and block unauthorized access.
  • Remote Wipe — Lets you remotely erase the data on your phone via SMS, blocking access to your private information. In addition, your phone is instantly locked if its SIM card is removed or replaced, so it can’t be used with another SIM card.
  • Anti-malware — Scans all files and application updates downloaded to your mobile phone and automatically detects and removes threats without slowing you down.
  • SD Card Scanning — Gives you the option of automatically scanning SD (Secure Digital) memory cards for threats when you plug them into mobile phone.
  • Automatic LiveUpdate — Automatically downloads and installs security updates keeping you a step ahead of cybercriminals.

IT Show 2012 promotions: Norton

Saturday, March 10th, 2012

Norton’s suite of security products will be available at the IT Show 2012 in Suntec Singapore at Level 6. Purchases come with free 4GB thumbdrives, Norton Utilities 1.5 or Canon Ip 2770 printers.

Check out security software from Norton by Symantec at IT Show 2012.

Check out security software from Norton by Symantec at IT Show 2012.

Check out Norton’s latest Norton 360 Version 6, or Norton Internet Security and Norton AntiVirus.

You can find them at the Challenger and Courts (Booth 6251), Newstead (Booth 6101) and Cybermind (Booth 6859), all of which are on Level 6 of Suntec Singapore.

The Norton flyer can be viewed below.

(more…)

How Singapore IT practitioners perceive mobility risks

Thursday, March 1st, 2012

Singapore was one of 12 countries surveyed in a new “Global Study on Mobility Risks” conducted by Ponemon Institute. Out of the overall 4,640 IT and IT security practitioners surveyed, 259 respondents were from Singapore.

Perception of mobile phone use as a threat and presence of security controls to mitigate the risks.

Perception of mobile phone use as a threat and presence of security controls to mitigate the risks.

The study was sponsored by content security provider Websense Inc, and is designed to help IT security professionals plan for an increasingly mobile workforce.

“We asked thousands of IT security professionals and found mobile devices were overwhelmingly important to business objectives,” said Dr Larry Ponemon, chairman and founder of the Ponemon Institute.Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies.

In Singapore, 45 percent of respondents say that their organizations experienced a data breach due to insecure mobile devices, and 22 percent are unsure.

“However, mobile devices put organizations at risk — risks that they do not have the necessary security controls and enforceable policies to address. It’s also clear that employees are deliberately disabling security controls, which is a serious concern,” Dr Ponemon addedThis is slightly less than the overall proportion of 51 percent for all 12 countries.

Fifty-five percent say that their employees circumvent or disengage security features such as passwords and key locks – versus the overall 59 percent.

Below is the Executive Summary for the survey of IT & IT Security Practitioners in Singapore, which was extracted from the “Global Study on Mobility Risks”.

(more…)

BYOD causing security breaches

Thursday, March 1st, 2012

51 percent of organizations lose data through mobile devices, while 59 percent of employees dodge security controls, according to a new  “Global Study on Mobility Risks” unveiled at the RSA Conference in San Francisco, USA.

The “Global Study on Mobility Risks” by Ponemon Institute.

The “Global Study on Mobility Risks” by Ponemon Institute.

Mobile devices help business, but security is needed to prevent costly data loss.

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies. This survey defines mobile devices as laptops, USB drives, smartphones, and tablets.

“IT has spent years working on desktop security and trying to prevent data loss over web and email channels—but mobile devices are radically changing the game,” said Tom Clare, senior director of Product Marketing Management.Seventy-seven percent of more than 4,600 respondents in 12 countries (Australia, Brazil, Canada, France, Germany, Hong Kong, India, Italy, Mexico, Singapore, United Kingdom, and the United States) surveyed agree that the use of mobile devices in the workplace is important to achieving business objectives.

But 76 percent also believe that these devices put their organizations at risk—and only 39 percent have the necessary security controls to address the risk.

The study was conducted by the Ponemon Institute and sponsored by content security provider Websense Inc, and is designed to help IT security professionals plan for an increasingly mobile workforce.

“Tablets and iOS devices are replacing corporate laptops as employees bring-their-own-devices to work and access corporate information. These devices open the door to unprecedented loss of sensitive data. IT needs to be concerned about the data that mobile devices access and not the device itself,” Clare added.The research shows that organizations often don’t know how and what data is leaving their networks through non-secure mobile devices.

Traditional static security solutions such as antivirus (AV), firewalls, and passwords are not effective at stopping advanced malware and data theft threats from malicious or negligent insiders.

To safely permit corporate use of mobile devices, Websense has released its new Websense TRITON Mobile Security solution.

Sixty-five percent of respondents are most concerned with employees taking photos or videos in the workplace—probably due to fears about the theft or exposure of confidential information.

Other unacceptable uses include downloading and using internet apps (44 percent) and using personal email accounts (43 percent).

Kelihos spam engine lives on

Wednesday, February 22nd, 2012

The Websense Security Labs Spam Trap system has detected a variant of Kelihos that is apparently still active.

Google Maps showing geographically how widespread the Kelihos command and control and peers infrastructure is, and therefore how well protected the botnet is.

Google Maps showing geographically how widespread the Kelihos command and control and peers infrastructure is, and therefore how well protected the botnet is.

“Kelihos is yet another example of how botnets shut down and reappear. Malware authors have a motive to get them up and running again. Websense Labs detected this new variant of Kelihos as we are constantly monitoring web and email exploits. More importantly, we are able to join the dots between these different attack vectors and protect against cybercriminals achieving their ultimate goal – stealing data,” said Carl Leonard, Senior Security Research Manager (EMEA), Websense Security Labs.Over the last half a year, the spam engine Kelihos has attracted the attention of many people, including security company researchers and analysts.

Microsoft had partnered with Kyrus Tech Inc. and Kaspersky Lab to take down the Kelihos botnet in September 2011.

However, Microsoft has recently confirmed, on its official blog, a new generation of Kelihos variants derived from the original Kelihos botnet.

Websense Security Labs has written up a detailed account of their investigations into this resilient nuisance.

CA Technologies leads in User Authentication

Thursday, February 9th, 2012

Gartner has positioned CA Technologies in the Leaders Quadrant of the Magic Quadrant for User Authentication.

CA Technologies has a range of User Authentication security solutions.

CA Technologies has a range of User Authentication security solutions.

Gartner estimates the overall growth in the market by customers to be approximately 30 percent year-over-year.

“By 2017, more than 50 percent of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementations, up from less than 10 percent today,” writes Ant Allan, Gartner Research Vice President.Because of the shift toward lower-cost authentication solutions, the overall growth by revenue is estimated to be approximately only 20 percent.

Considering Gartner’s user authentication market growth estimate, and the forecast that half of the implementations will be cloud services, CA Technologies is confident it is in a solid position for success in this sector.

“With more than 14,000 organizations leveraging our authentication solutions and more than 85 million identities protected by our cloud-based authentication services we should be on the short-list for anyone considering a cloud authentication solution,” said Vic Mankotia, Vice President of Security, Asia Pacific, CA Technologies.

Get a complimentary copy of the report here.

CA Technologies was also positioned by Gartner in the Leaders Quadrant of two Gartner reports: Magic Quadrant for Identity and Access Governance (IAG), and Magic Quadrant for User Administration/Provisioning.

CA Technologies positioned in Leaders Quadrant of two of Gartner’s Magic Quadrants

Wednesday, January 25th, 2012

The two Magic Quadrants are: User Administration/Provisioning and Identity and Access Governance.

Source: Gartner (December 2011)

Source: Gartner (December 2011)

CA Technologies has been positioned by Gartner in the Leaders Quadrant of two Gartner reports: Magic Quadrant for Identity and Access Governance (IAG), and Magic Quadrant for User Administration/Provisioning.

Magic Quadrant for Identity and Access Governance

“As data moves to the cloud, identity and access management grows in importance within organizations. Our team is working to ensure we deliver the functionality, ease of use, and multiple choices of delivery – on premise or cloud – that simplify IAM adoption for our customers,” said Vic Mankotia, VP, Security, Asia Pacific at CA Technologies.According to the report, Magic Quadrant for Identity and Access Governance, “The IAG market addresses customer requirements that are beyond identity administration. IAG tools seek to deliver IAM directly to the business or end user, rather than the operational IT administrator.”

Gartner analysts anticipate, “The growing need for identity and access management governance will cause identity and access governance solutions to become the lead focus of two out of three IAM projects by 2013, up from one in three today.”

CA Role & Compliance Manager was evaluated for this report. Get a complimentary copy of the report here.

Magic Quadrant for User Administration/Provisioning

“We consider our positioning in two IAM-related Leaders quadrants confirmation that we are delivering on our mission to take our rich and broad portfolio of security technologies and deliver unique and transformative IAM capabilities for our customers,” added Mankotia.“User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs,” analysts wrote in the Magic Quadrant for User Administration / Provisioning.

“By 2016, user administration solutions will expand functionally to include a subset of identity and access governance (IAG) functionality as well as multiple means of delivery (that is, cloud computing).”

Gartner analysts evaluated the following CA IAM solutions for this report: CA Identity Manager, CA Role & Compliance Manager and CA User Activity Reporting Module for this report.

Get a complimentary copy of the report here.

Ernst & Young finds security lagging behind business needs in survey

Thursday, November 17th, 2011

In its 14th annual Global Information Security Survey, Ernst & Young found that companies rushing to digitise their businesses with new technologies are increasingly leaving their ability to tackle new and complex security threats behind.

“Information security needs to be more visible in the board room with a clearly defined strategy that will support the business,” said Gerry Chng, IT Risk and Assurance Partner, Ernst & Young Advisory Pte. Ltd.The global survey involved 1,700 organisations in 52 countries and was conducted between June and August 2011.

Although companies are moving into the increasingly borderless world of cloud computing and social media, information security is still not a boardroom priority for most companies and is not a visible agenda for them.

“Security must be carefully planned and take into consideration the practicality of the controls that considers the IT operations. There needs to be buy-in from the business functions, and support needs to come from the top,” Chng added.Only 51% of the survey stated that they have a documented information security strategy. 12% of the respondents present information security topics at each board meeting and fewer than half (49%) of respondents believe that their information security function is meeting the needs of the organization.

With the consumerisation of enterprise IT, organisations have had to allow employees to use personal tablets to access corporate information.

“There are existing solutions in the market that support the secure access of information on personal smartphones and tablets. Organizations should evaluate whether these solutions meet their needs, rather than using traditional channels such as web interfaces and opening up email access via the web as an option.”It was therefore natural that more than half the survey respondents ranked this adoption the second-highest on the list of technology challenges.

Policy adjustments and awareness programs are the top two measures used to address risks posed by this new mobile technology.

The adoption of security techniques and software, however, is still low. For instance, encryption techniques are used by fewer than half (47%) of the global organisations.

The massive popularity and growth of social media has also threatened the IT risk landscape. Social media risks include the introduction of malicious software lurking within social networks, hacked accounts that are used to solicit information, and the release of confidential or negative company information or personal data.

“The traditional paradigm of security within a perimeter is no longer valid.”To address potential risks posed by social media, organizations seem to be adopting a hard-line response. A majority (53%) of the global organizations respond by blocking access to sites rather than embracing the change and adopting enterprise-wide measures.

“With the increased collaboration with upstream and downstream partners, data resides not just within the confines of the organization.”Despite all the hype about cloud computing, many organisations are still unclear of the implications of cloud computing. From the survey, 48% of the global respondents said that the implementation of cloud computing is a difficult challenge, and more than half of them (52%) have not implemented any controls to mitigate the risks associated with cloud adoption.

The most frequently taken measure is stronger oversight on the contract management process with cloud providers, but even this is done by only 22% of respondents.

“Confronted with diminishing borders, cloud services, and increasing support of personal tablets for information mobility, companies are asking themselves how to respond to new and emerging risks and whether their strategy needs to be revisited. The focus must move from short-term fixes to a more holistic approach integrated with long-range strategic corporate goals.”The good thing is that companies are aware of the widening gap between business needs and information security – and are willing to address the situation.

72% of the respondents in the survey see a rising level of risk due to increased external threats.

At the same time, more than half (59%) of them plan to increase their information security budgets in the coming 12 months, focusing on areas including business continuity capabilities (47%), data leakage and data loss prevention (28%), compliance monitoring (21%), and identity and access management (21%).

Gerry Chng observes that “there is generally a slow uptake of public cloud services for larger enterprises due to risk concerns. Such services may make sense for a small company as the utility model of the cloud means that these companies do not need to have the capital and operational expenses to maintain their own infrastructure and applications.”

“For larger organizations, the risks of compromising the integrity of sensitive data far outweighs the benefits they may reap from cloud computing. The concept of cloud computing is centered around easy access to data, without the need for knowledge on where the data is stored and how the cloud works,” Chng added

“This lack of specific details makes it difficult for organizations to assess the risks to their data residing in the cloud. In the absence of clear guidance, many organizations seem to be making ill-informed decisions, either moving to the cloud prematurely and without appropriately considering the associated risks, or avoiding it altogether,” concluded Chng.

Delete does not mean deleted

Tuesday, November 1st, 2011

More than 300GB of potentially sensitive data was discovered on five second hand storage devices that were advertised as having been wiped of previously stored information.

“Our findings underline that data erasure is critical before any hardware devices are disposed of – personal computers, servers, hard disk drives, USBs and even MP3 players,” said CK Lee, country manager, Kroll Ontrack Singapore.Kroll Ontrack – a leading provider of data recovery and information management products and services, is warning companies to be extra vigilant when disposing of computer equipment in light of recent tests carried out in its labs

It recently conducted a little experiment in Singapore. Specialists from the company purchased five storage devices from a popular international online auction site to see if there was any sensitive data that could be recovered from the supposedly “wiped” devices.

The specialists found more than 300GB of data including personal and corporate proprietary information including Microsoft Office documents, applications, databases, e-mails and photos.

“Simply pressing the ‘delete’ button or using other basic overwriting techniques only removes the pathways to the data and not the data itself and it is essential to remember this when preparing equipment for sale or disposal,” Lee added.The five devices were from different parts of Singapore and included two hard disk drives from a server in RAID configuration, a server, a desktop HDD (Hard Disk Drive) and a laptop HDD.

Recoverable data poses risk of security breaches if it falls into the wrong hands. It is crucial for individuals and businesses to ensure that data is destroyed before disposal. Without the correct data erasure procedures, proprietary information becomes vulnerable.

Kroll Ontrack provides several options for data erasure such as Ontrack Eraser Software and Ontrack Eraser Degausser. Both solutions set out to destroy data in a fast, secure and user-friendly way.

Access Microsoft Office 365 from a BlackBerry smartphone

Saturday, October 29th, 2011

Research In Motion (RIM) and Microsoft have announced BlackBerry Business Cloud Services for Microsoft Office 365. An open beta for the service has been launched in more than 30 countries.

“BlackBerry Business Cloud Services is an easy and cost-effective way for businesses and government agencies to extend Microsoft Office 365 to BlackBerry smartphones and manage the deployment in the cloud,” said Alan Panezic, Vice President at Research In Motion.The new RIM-hosted online service is targeted at midsized businesses and enterprises – extending Microsoft Exchange Online to BlackBerry smartphones, and allowing organizations to self-manage their BlackBerry deployments in the cloud.

The service mobilizes Microsoft Office 365 Exchange Online via RIM-hosted BlackBerry Management Service. It features advanced Web-based IT and employee self-service smartphone management and security functions

Key features include:

  • Access to Microsoft Exchange Online email, calendar and organizer data from a BlackBerry smartphone.
  • BlackBerry Balance technology, which presents a unified view of work and personal content on a BlackBerry smartphone while keeping the content separate and secure.
  • A web-based console for IT administrators to provision, manage and secure BlackBerry smartphones from anywhere.
  • Online access to employee self-service smartphone security functions, allowing users to reset a device password or remotely lock or wipe a device in the event of loss or theft.

Managed service providers, systems integrators, carriers, resellers and other partners can also use the cloud service to manage BlackBerry deployments on behalf of their customers.

BlackBerry Business Cloud Services for Microsoft Office 365

BlackBerry Business Cloud Services for Microsoft Office 365

A number of Fortune 500 customers and several government agencies in the US participated in an early access program and are among the many organizations that already plan to use the service.

Microsoft Office 365 customers can sign up for the BlackBerry Business Cloud Services beta here. The cloud-based service is available for no additional charge to Microsoft Office 365 Midsized Businesses and Enterprises plan subscribers and works with BlackBerry smartphones on business or consumer data plans.