ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Security: Counter measures to protect your customers

Mon 29 Sep 2014
FYI, this story is more than a year old

Media attention has focused business attention on security. Dick Bussiere, Tenable Network Security principal architect, offers some tips on helping your customers with counter measures.

Cyber threats and advanced persistent threats (APTs) are good fodder for news. Reports of breaches sound alarming, even though the technicalities of an attack may be poorly understood by most people.

Stories about newly-identified threats that are so stealthy a company may not even know its systems have been compromised are guaranteed to grab attention and cause at least a modicum of discomfort for C-level executives.

The positive from all this media attention is a heightened awareness among business people of the need to secure the network and IT infrastructure.

Responding to threats

Assuming you get the budget and go-ahead to do something, resellers can plan their customer counter measures across the three essential areas of prevention, detection and response/recovery.

At the most basic level, IPS (intrusion prevention systems) and IDS (intrusion detection systems) are 'must have' security tools. Web reputation services and URL filtering solutions can help users to avoid malicious web sites.

One of the mainstays of security, a suite of antivirus tools, may still be helpful for some security concerns but it's worth realising they typically detect less than half of the threats faced by businesses today.

Continuous monitoring and the ability to take a wider view, to analyse and correlate security events across all network devices are essential, especially when dealing with an APT where you are effectively facing the unknown and can't afford to rely on signature-based technology.

Speaking of the unknown, it pays to be prudent when setting security policies. A good strategy for dealing with untested, untrusted or guest programs is to 'sandbox' them, by placing restrictions that partially isolate them from the rest of your environment. At least this way, until you know more, you limit the potential for damage.

Thinking ahead

Given the rapid rise and evolution of cyber threats, it makes sense that the most appropriate security tools resellers can offer will be those that offer wide coverage rather best-of-breed tools which rigidly address specific issues. For the same reason, expect big data and correlation to play leading roles in the detection and prevention stages.

Whether now or five years hence, the first consideration by any reseller of any security strategy should be to take the data out of play. Encrypt it and isolate it. Make it as difficult as possible for someone to access it. Then, work on the premise that your customer’s organisation has already been compromised.

A simple phishing attack with an uneducated member of staff may already have delivered all the information and access an outsider needs to compromise your network. Therefore, look for the gaps in your customer’s security strategy that may have allowed this to occur.

Find ways to improve and always think about the diversity of devices coming onto your network. Monitor constantly and analyse the data for trends. Above all, if you want to offer a security solution, get predictive.

Related stories
Top stories
Story image
Sustainability
NZ's Catalyst Cloud attains Toitū net carbonzero certification
The Toitū net carbonzero certification involved working with Toitū Envirocare to measure carbon emissions, setting mitigation and reduction targets.
Story image
Awards
OHI Data Navigator recognised by IDC for APAC contribution
IDC has chosen OHI Data Navigator as the best Asia Pacific Smart City project under its 2022 Smart City Asia/Pacific Awards (SCAPA) category under the Public Health and Social Services category.
Story image
Omnichannel
UNIQLO operator chooses Adyen for multiple market payments
The operator of UNIQLO, Fast Retailing, has selected Adyen to power payments for its in-store and online checkout in multiple markets.
Story image
ABI Research
75% of 5G networks to advance to 5G-Advanced by 2030
5G-advanced is set to launch in 2025, and 75% of 5G networks will upgrade by 2030, according to ABI Research. 
Story image
Cloud
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Mergers and Acquisitions
SAS acquires Kamakura to propel risk technology innovation
Underscoring SAS growth in the domain-specific solutions space, the acquisition will enable SAS to greatly enhance the breadth of its risk solutions portfolio. 
Story image
Microsoft
ASI Solutions named finalist of Microsoft Surface Partner of the Year
"ASI Solutions has a strong Microsoft focus, building value by helping customers maximise investment in modern workplace solutions."
Story image
Cybersecurity
Online bullying, harassment skyrockets since COVID outbreak
Harmful content reports have risen by over 25% since the outbreak of the COVID pandemic, according to Netsafe.
Story image
Southern Cross Cable
Southern Cross Cable launches the SX NEXT cable to connect NZ to the world
The new Southern Cross NEXT fibre cable (SX NEXT) is set to connect Australasia to the US and further enhance connectivity between New Zealand, Australia, and the US.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
Dicker Data
EXCLUSIVE: Why women in IT makes good business sense - Dicker Data
The Federal government wants to bolster female participation in the tech industry to at least 40% by 2030. Here's how one homegrown Australian company has already reached that goal.
Story image
Infrastructure
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Story image
Review
Hands-on review – CleanMyMac X utility for macOS
We get hands-on with a useful utility that macOS users never thought they needed but probably do.
Story image
Electrical
Up to $2.4 million shortfall in the collapse of IndeServe
We delve into the liquidators first report on long-standing networking service provider IndeServes collapse.
Story image
Supply chain
Supply chains continue to be disrupted, enterprises embrace circular economy
“Businesses urgently need to find a solution that can help them to manage this disruption, and transition to a circular economy."
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
Story image
Cloudian
Cloudian, Vertica to deliver on-premise data warehouse platform
"We’re enabling our customers to capitalise on a leading object storage platform and maximise the value of their digital assets.”
Story image
Review
Hands-on review: GoDice
In a world where we’re more connected than ever to our smart devices, startup company Particula believes that its innovative product GoDice is the answer to getting everyone reconnected with one another - by turning that smart device into an interactive board game.
Story image
Aspire
NEC expands Open RAN ecosystem with Aspire Tech acquisition
With its agreement to acquire Aspire Technology, NEC Corporation has further increased its capacity to deliver End-to-End Open RAN ecosystems.
Story image
Cybersecurity
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
MSP
Video: 10 Minute IT Jams - An update from CyberArk
Olly Stimpson joins us today to discuss the importance of MSP programmes and how MSP partners are experiencing success with CyberArk.
Story image
Internet of Things
Large enterprises propel 5G industrial IoT market
Large enterprises are propelling the 5G industrial Internet of Things market, according to a recently published report from Future Market Insights.
Story image
Cybersecurity
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
Digital Transformation
Retailers must invest in new tech to keep up with online shopping demand
There's a higher demand for more purchasing opportunities at our fingertips, as well as greater expectations when it comes to the online customer experience."
Story image
Internet of Things
ManageEngine wins big in IDC MarketScape assessment
ManageEngine's Endpoint Central service has been recognised as a leader by IDC MarketScape in several categories including Internet of Things device deployments and UEM software for SMEs.
Story image
Web Development
Whitecliffe fosters careers for the future of tech
Do you want a career in Information Technology, Networking, Web Development, Software Development, or are you looking to upskill?
Story image
Samsung
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Cyber Criminal
Identity and access: the fight is on
Blue team defenders are used to protecting our data, applications, and users with access controls and other security mechanisms, which is why attacks like this are especially challenging when they target identity and access control systems.
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
Data Protection
How secure is accounting software data in Aotearoa?
A recent Xero study found ICT spending for NZ businesses has increased 25% compared to pre-pandemic levels, so how safe is accounting software?
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Robotics
Evonik relies on Getac F110 tablet to control autonomous robot
The aim of the project is to evaluate the practicality of an automated robotic maintenance and inspection solution in the chemical industry.
Story image
Ransomware
Businesses unprepared to defend against ransomware attacks
Ransomware attacks continue to impact organisations worldwide with high costs, but businesses are still largely unprepared.
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
Telecommunications
WiFi as a Service market to reach $26 billion through 2032
As a result of the easy management of wireless infrastructure over cloud services, WaaS is experiencing rapid growth.
Story image
Microsoft
Azure-based technology asBuilt signals better BIM outcomes in NZ
The Microsoft Azure-based asBuilt intelligence hub is helping Kiwi businesses accelerate their building information management potential.
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Microsoft
SAS wins Microsoft ISV 2022 Partner of the Year award
"We formed the SAS and Microsoft strategic partnership with a shared goal of making it easier for customers to drive better decisions in the cloud."
Story image
Ransomware
Examining the future of ransomware threats with Vectra’s CTO
As customers' valuable data move to the cloud, so will ransomware. What is the current landscape and what do we need to know?
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
WatchGuard Technologies
Ransomware volume doubled 2021 total by end of Q1 2022
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to a new report. 
Story image
Financial results
Margins & revenues up at New Zealand arm of Acer Computer
We look at the local financial statements of Taiwanese manufacturer Acer Computer Inc.
Story image
Dark web
Cybercrime in Aotearoa: How does New Zealand law define it?
‘Cybercrime’ is a term we hear all the time, but what exactly is it, and how does New Zealand define it in legal terms?