Posts Tagged ‘security’

Trend Micro CloudSec 2012 in Singapore

Wednesday, August 15th, 2012

This year’s theme is “Have a safe journey” and features thought leaders such as Jim Reavis from CSA and Tim Grance from NIST, in a full day’s programme bringing CXO attendees through security issues surrounding Cloud Computing.

CloudSec 2012 was held at Raffles City Convention Centre in Singapore on 15 August.

CloudSec 2012 was held at Raffles City Convention Centre in Singapore on 15 August.

I sat through a panel discussion over lunch that shed some light on the thoughts that Reavis, Grance and Nicholas Tan (VMware) had on cloud security.

Jim Reavis, Co-founder & Executive Director Cloud Security Alliance (CSA)

Jim Reavis, Co-founder & Executive Director Cloud Security Alliance (CSA)

One opinion that may come as a surprise to many people is Reaves’ belief that the choice of whether a company should adopt a private, public or hybrid cloud should not be driven by security alone, which is what most people would use as the immediate and main consideration, if not the sole determinant for their decision.

He felt that security could be a red herring in deciding between the different types of cloud implementation.

Instead, the decision should be based on compliance (regulations on cloud use and location of data centres), performance (whether on-premise servers are needed to reduce latency) and legacy support (transition from existing IT architecture).

Timothy Grance, Senior Computer Scientist, National Institute of Standards and Technology (NIST)

Timothy Grance, Senior Computer Scientist, National Institute of Standards and Technology (NIST)

Grance added that all the models are viable and the choice also involved the need for scale, which has to be balanced with the risk appetite of the organisation making the choice.

All the panelists were unanimous that, in reality, the considerations for security for cloud is no different from traditional systems, although the specific technology employed may be different.

Whether your systems are on a cloud or not, you would be facing threats, you still need to be vigilant, you still need to be rigorous about security, and you’d still need quality people to design and operate the system.

Last year’s CloudSec 2011 at The Sheraton Towers saw more than 300 participants examining the theme of “Have a vision not clouded by fear”.

This year, Trend Micro made the event bigger with more than 500 showing up at the Raffles City Convention Centre on 15 August.

(more…)

Executive briefing: IBM X-Force on emerging threats in 2012

Tuesday, July 24th, 2012

CIO Asia magazine organised the half-day event at the Raffles Hotel in Singapore. Due to the overwhelming response, the invitation-only briefing was extended from a 10-pax roundtable to a five-table seminar.

IBM X-Force Executive Briefing on Evolving Threat.

IBM X-Force Executive Briefing on Evolving Threat.

IBM promised that attendees would leave the briefing better prepared to protect their organisations against evolving threats in the security landscape.

Organised by CIO Asia magazine at the Raffles Hotel in Singapore.Key personnel from the new Security Systems unit in IBM updated CIOs and key IT managers on the numerous reports of data leaks, Denial-of-Service attacks, and social Hacktivisim in 2011.

The pace of such attack have continued into 2012.

Traditionally, IBM as well as other large companies have already incorporated security considerations in individual solution domains.

However, IBM has taken the additional step to adopt a holistic approach towards ensuring security for all of their solutions.

Its acquisition of Q1 Labs has provided the tools that integrated the security needs and considerations across the hitherto siloed domains.

This security layer straddles the various siloed domains and serves as the bedrock upon which the domain solutions are built.

(more…)

Key findings from RSA Archer GRC Executive Forum

Friday, July 20th, 2012

RSA, The Security Division of EMC, recently released key findings from the RSA Archer GRC Executive Forum held in June, during which governance, risk and compliance (GRC) leaders from 34 leading corporations discussed enterprise risk management strategies and best practices.

Key Findings of the RSA Archer GRC Executive Forum

Key Findings of the RSA Archer GRC Executive Forum

Top executives say GRC Programs must better align to strategic priorities to meet board needs. The results affirm the earlier Carnegie Mellon CyLab 2012 Governance Report.

Some key findings

  • Mounting and multiplied business risks due to growing regulatory requirements and greater business complexity.
  • The need to align GRC to business priorities to get organizational leaders on board.
  • Moving away from a siloed GRC program to one which is unified to make enterprise-wide risk assessment.

It was noted that the shift towards increased regulatory and compliance requirements is being observed across Asia Pacific and Japan as well, with organizations looking to better calibrate their risk assessment frameworks and set guidelines for assessing organisation risks.

The need for business continuity management programs is also gaining traction, with the occurrence of natural disasters in Japan and Thailand prompting organizations to reassess their risk environment.

Read the press release below for more details.

(more…)

Norton Mobile Survey 2012: Greater awareness of mobile security needed

Friday, July 13th, 2012

The ownership and use of mobile phones to access the internet and stay connected is fast catching up with the use of computers.

Yet, the awareness of mobile security remains wanting compared to the relative maturity in security awareness for general computer usage.

David Freer, Vice President, Consumer, Asia Pacific and Japan, Symantec

David Freer, Vice President, Consumer, Asia Pacific and Japan, Symantec. Photo taken on a mobile phone.

I was briefed on the results of the Norton Mobile Survey this morning at their offices at Suntec Singapore. A summary of the detailed numbers can be found at the end of this post. Here’s how the survey was conducted.

Ownership and use of mobile phones fast catching up with computers.

Mobile phone Computer
Ownership 91% 92%
Access Internet 88% 69%

This was the same survey which found that “76% of Internet users in Singapore would rather forgo US$1million than give strangers unlimited access to their computers”.

What stood out from the numbers was the disparity between the greater dependence and use of our mobile phones on one hand (see sideboxes), and on the other hand the lagging level of mobile security in their usage.

So we’re doing an awful lot of things on our mobile phones – pretty much the same sort of things we do on our computers – in terms of accessing the Internet and staying connected. (And snapping the cover photo for this article.)

Need for greater awareness of mobile security

Yet almost half of the mobile users in Singapore do not take the simple step of using passwords to protect their phones, even though 61% of Singaporeans acknowledge that mobile threats are real.

What do people actually do on their mobile phones?

Social networking 57%
Read the news 55%
Online messaging 39%
Mobile banking/payments 27%
Location-based tasks, including navigation 25%
Online shopping 19%

In addition, some 30% are not aware that they can remotely track their phone using GPS navigation software.

Is it because we’re still trapped in the age when mobile phones were less capable and we were less dependent on them – and therefore had little to lose if a mobile phone was lost or stolen.

You know, when we had feature phones, the most painful thing about losing the phone was the loss of the contacts on them, and the hassle of having to replace them.

Viruses and malware for feature phones were almost unheard of.

US$1million for complete access to your computer?

US$1million for complete access to your computer?

Now, your smartphone can store a substantial trove of precious PERSONAL photos and videos, work-related documents and apps that access your stockmarket transactions.

The survey found that for the one in three Singaporeans who have had their mobile phone stolen/lost, most of them (78%) mentioned that losing their contact information was the worst part of the experience, with 52% feeling their privacy had been invaded.

To resolve their lost/stolen phone situation, two in three Singaporeans had paid an average of S$424.

The survey found that three in five Singaporeans would rather pay a ransom S$273 to get your phone back.averaging S$273 in order to resolve their lost/stolen phone problem – assuming they were offered the chance.

This is almost double the S$148 “ransom” that half of those surveyed in LAST YEAR’s study were willing to pay.

Dark cloud arising

“Singapore is a very tech savvy nation that is hugely mobile and connected,” said David Freer, Vice President of Norton for Asia Pacific & Japan.

Personally, I believe the concern with lost contact information will diminish rapidly with the convenience of syncing contact and calendar information with cloud-based services, such as iCloud and Google.

These cloud services allow you to reinstate contact lists and calendars in a new smartphone in a matter of minutes.

On the other hand, the tight coupling between the smartphones with cloud services bring with it a much greater problem.

“With greater connectivity to the Internet through mobile devices, cybercriminals are increasingly targeting this platform.

With so much valuable and personal information residing on our mobile devices, mobile users need to have the right security measures in place – both a reliable mobile security solution and personal diligence to back up important information,” added Freer.

By serving as gateways to access huge repositories of information on the cloud, people who lose their mobile phones stand to lose much more than just what’s physically stored on the phone itself.

It’s akin to losing a wallet full of cash viz-a-viz losing a wallet full of cash and a couple of credit cards.

So, if you haven’t enabled remote locking or wiping, anyone losing their phone would also need to change the passwords of all the online services the phone and its apps has been authorised to access.

Emails accounts, Facebook/Twitter accounts, Dropbox are but a few that immediately pop into mind. How many of these can you recall off the top of your head, and in the heat and stress of having realised you’ve just lost your phone?

Norton Mobile Security

Norton Mobile Security for Android devices addresses some of today’s most common mobile issues, including device loss and data protection.

Norton Mobile Survey 2012Norton Mobile Security has anti-theft, anti-malware, locate and remote wipe features.

Norton Mobile Security Lite is available for free in English on the Google Play Store.

For users seeking additional protection, there is the option to upgrade to the full featured Norton Mobile Security for an annual subscription of S$19.90.

Versions for iOS and Windows Phone will be released later this year.

Below is a summary of the main findings of the Norton Mobile Survey 2012.

(more…)

BlackBerry OS vs iOS vs Windows Phone vs Android

Monday, April 16th, 2012

Trend Micro has released the results of its study on the four main mobile operating systems in a report titled “Enterprise Readiness of Consumer Mobile Platforms”.

The security firm found the BlackBerry 7 OS the most secure mobile operating system, followed by iOS 5, Windows Phone 7.5, and Android 2.3.

Summary chart from “Enterprise Readiness of Consumer Mobile Platforms” White Paper by Trend Micro.

Summary chart from “Enterprise Readiness of Consumer Mobile Platforms” White Paper by Trend Micro.

Android 2.3 was used in the study because it was the dominant installed/supplied version of Google’s mobile OS at the time of the research.

Below is an excerpt from the White Paper summarising the findings about the four mobile platforms.

(more…)

US$1million for complete access to your computer?

Thursday, April 5th, 2012

Norton has unveiled the findings of its latest survey which provides insights into Singaporeans’ Internet dependence, the importance of their personal information and their level of understanding when it comes to Internet security.

Say it with numbers - from Norton's survey of Internet Security.

Say it with numbers – from Norton’s survey of Internet Security.

Last year, Norton did an interesting survey that revealed that phone owners in Singapore were willing to pay an average of S$148 to get their lost/stolen phones back, in order to alleviate the stress and inconvenience losing their mobile phones.

This year, Norton found that 76 percent of Internet users in Singapore would rather forgo US$1million than give strangers unlimited access to their computers.

The key findings are highlighted in the info-graphic above, while the details are at the end of this post.

Protection

So what does Symantec have to protect the multitude of PCs, Macs, smartphones and tablets in the modern household?

Norton will be offering Norton 360 Everywhere in the first half of 2012 (Pricing and systems requirements to be announced at launch).

Norton 360 Everywhere promises to be an easy-to-manage, all-in-one security solution that delivers a multi-platform solution for PCs, Macs, Android-based phones and tablets.

Users can customise their security to meet their specific needs, be it against online threats, data loss, and device loss or theft.

The details of the survey is excerpted below.

(more…)

Norton Mobile Security protection for Samsung GALAXY smartphones

Monday, March 12th, 2012

Samsung Galaxy users worldwide will get a full-featured Norton Mobile Security free for 90 days. Usually, a one-year license costs S$19.90.

Complimentary 90-day subscription of Norton Mobile Security for Samsung GALAXY smartphones.

Complimentary 90-day subscription of Norton Mobile Security for Samsung GALAXY smartphones.

Norton Mobile Security, an application for Android OS, is available in multiple languages.

“With smartphone sales now outpacing PC sales, cybercriminals are devising new threats everyday to steal from mobile users. Consumers need to be protected more than ever,” said Janice Chaffin, group president, Consumer Business Unit, Symantec.Samsung Galaxy users will be able to download it from Samsung Apps.

Norton Mobile Security can be downloaded from the ‘Utility’ category in Samsung Apps or by entering ‘Norton Mobile Security’ into the search query at the Samsung Apps.

Norton Mobile Security supports all Samsung Galaxy Android smartphones, including Galaxy S2.

Norton Mobile Security combines anti-theft features with powerful anti-malware to protect user’s important data from loss, theft, viruses and other threats.

The following are the main features.

  • Remote Locate — Shows you the location of your smartphone so you can find if it’s lost or stolen.
  • Remote Lock — Lets you remotely lock your lost or stolen phone via the Internet or SMS to keep critical data safe and block unauthorized access.
  • Remote Wipe — Lets you remotely erase the data on your phone via SMS, blocking access to your private information. In addition, your phone is instantly locked if its SIM card is removed or replaced, so it can’t be used with another SIM card.
  • Anti-malware — Scans all files and application updates downloaded to your mobile phone and automatically detects and removes threats without slowing you down.
  • SD Card Scanning — Gives you the option of automatically scanning SD (Secure Digital) memory cards for threats when you plug them into mobile phone.
  • Automatic LiveUpdate — Automatically downloads and installs security updates keeping you a step ahead of cybercriminals.

IT Show 2012 promotions: Norton

Saturday, March 10th, 2012

Norton’s suite of security products will be available at the IT Show 2012 in Suntec Singapore at Level 6. Purchases come with free 4GB thumbdrives, Norton Utilities 1.5 or Canon Ip 2770 printers.

Check out security software from Norton by Symantec at IT Show 2012.

Check out security software from Norton by Symantec at IT Show 2012.

Check out Norton’s latest Norton 360 Version 6, or Norton Internet Security and Norton AntiVirus.

You can find them at the Challenger and Courts (Booth 6251), Newstead (Booth 6101) and Cybermind (Booth 6859), all of which are on Level 6 of Suntec Singapore.

The Norton flyer can be viewed below.

(more…)

How Singapore IT practitioners perceive mobility risks

Thursday, March 1st, 2012

Singapore was one of 12 countries surveyed in a new “Global Study on Mobility Risks” conducted by Ponemon Institute. Out of the overall 4,640 IT and IT security practitioners surveyed, 259 respondents were from Singapore.

Perception of mobile phone use as a threat and presence of security controls to mitigate the risks.

Perception of mobile phone use as a threat and presence of security controls to mitigate the risks.

The study was sponsored by content security provider Websense Inc, and is designed to help IT security professionals plan for an increasingly mobile workforce.

“We asked thousands of IT security professionals and found mobile devices were overwhelmingly important to business objectives,” said Dr Larry Ponemon, chairman and founder of the Ponemon Institute.Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies.

In Singapore, 45 percent of respondents say that their organizations experienced a data breach due to insecure mobile devices, and 22 percent are unsure.

“However, mobile devices put organizations at risk — risks that they do not have the necessary security controls and enforceable policies to address. It’s also clear that employees are deliberately disabling security controls, which is a serious concern,” Dr Ponemon addedThis is slightly less than the overall proportion of 51 percent for all 12 countries.

Fifty-five percent say that their employees circumvent or disengage security features such as passwords and key locks – versus the overall 59 percent.

Below is the Executive Summary for the survey of IT & IT Security Practitioners in Singapore, which was extracted from the “Global Study on Mobility Risks”.

(more…)

BYOD causing security breaches

Thursday, March 1st, 2012

51 percent of organizations lose data through mobile devices, while 59 percent of employees dodge security controls, according to a new  “Global Study on Mobility Risks” unveiled at the RSA Conference in San Francisco, USA.

The “Global Study on Mobility Risks” by Ponemon Institute.

The “Global Study on Mobility Risks” by Ponemon Institute.

Mobile devices help business, but security is needed to prevent costly data loss.

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies. This survey defines mobile devices as laptops, USB drives, smartphones, and tablets.

“IT has spent years working on desktop security and trying to prevent data loss over web and email channels—but mobile devices are radically changing the game,” said Tom Clare, senior director of Product Marketing Management.Seventy-seven percent of more than 4,600 respondents in 12 countries (Australia, Brazil, Canada, France, Germany, Hong Kong, India, Italy, Mexico, Singapore, United Kingdom, and the United States) surveyed agree that the use of mobile devices in the workplace is important to achieving business objectives.

But 76 percent also believe that these devices put their organizations at risk—and only 39 percent have the necessary security controls to address the risk.

The study was conducted by the Ponemon Institute and sponsored by content security provider Websense Inc, and is designed to help IT security professionals plan for an increasingly mobile workforce.

“Tablets and iOS devices are replacing corporate laptops as employees bring-their-own-devices to work and access corporate information. These devices open the door to unprecedented loss of sensitive data. IT needs to be concerned about the data that mobile devices access and not the device itself,” Clare added.The research shows that organizations often don’t know how and what data is leaving their networks through non-secure mobile devices.

Traditional static security solutions such as antivirus (AV), firewalls, and passwords are not effective at stopping advanced malware and data theft threats from malicious or negligent insiders.

To safely permit corporate use of mobile devices, Websense has released its new Websense TRITON Mobile Security solution.

Sixty-five percent of respondents are most concerned with employees taking photos or videos in the workplace—probably due to fears about the theft or exposure of confidential information.

Other unacceptable uses include downloading and using internet apps (44 percent) and using personal email accounts (43 percent).