Data Protection Day 2020: De-Risking in the Era of Transparency

By: Daniel Fried, General Manager (GM) and Senior Vice President (SVP), EMEA and Worldwide Channels, Veeam

The issue of data protection and privacy was, until recently, a conversation confined to a specific group of people within an organisation. Unless you were an IT consultant or a corporate lawyer, privacy compliance was something somebody else took care of. So, how have we reached the point where many organizations are bound by law to employ a Data Protection Officer (DPO)? Why are CEOs now so interested in their company’s data protection and privacy policies?

You could be easily fooled into thinking data privacy as a field has only existed since 2018, but nothing could be further from the truth. From an anthropological perspective, human beings have longed for privacy for over 3,000 years. The use of internal walls within buildings which started to become commonplace in 1500 AD proves this. The concept of the ‘right to privacy’ as we know it is indeed younger – eventually being formalised as an international human right in 1948. Sweden became the first country to enact a national data protection law in 1973. Even this, the first tangible effort to regulate data privacy, happened in response to public concern over the increasing use of computers to process and store personal information. 

While our understanding of the current data privacy conversation must operate within this context, there is no denying that 2018 was a watershed moment. The General Data Protection Regulation (GDPR) may be less than two years’ old, but its impact has been significant. As well as its very specific nature which makes the regulation enforceable, GDPR regulators have not been frightened to flex their muscles. To date, it has collected almost €429 million in fines – serving as a constant reminder to any business processing the data of European citizens that there are penalties for not adhering to data privacy requirements.

The privacy skills gap

As well as providing a clearer framework for appropriate data handling practices, GDPR has made data protection and privacy more about people. Rather than talking in terms of technical standards and software requirements, it is based on fundamental citizens’ rights and how people within an organization can uphold them. One of the most specific lines of the GDPR is Article 37, which states that certain companies must appoint a Data Protection Officer to be compliant. More specifically, any public authority, a company whose core activities require large-scale monitoring of individuals or consist of large-scale processing of criminal data. 

Wherever appointing a DPO is not required under GDPR, it is advised as best practice for companies who need to ensure they have the right data processes in place. Given that the latest Veeam Cloud Data Management reportshows that organizations across multiple industries will spend an average of $41 milliondeploying technologies to boost business intelligence, experienced DPOs have become hot property. In 2018, when GDPR was passed, as many as 75,000 vacancies for DPOs needed to be filled – with Europe and the USA accounting for around 28,000 of these roles. 

Especially during this period of transition, organizations across the board must foster a culture of transparency in terms of how data is used. Not every person in the business can be a data protection expert, but all employees must appreciate and understand the basic principles. Furthermore, while the ownership of GDPR compliance lies with the DPO, the buck ultimately stops with the CEO. Data protection is a business conversation as well as a technology one. With that said, businesses must have an IT strategy in place which enables solid data protection practices. 

Minds over matter

Veeam research shows that three-quarters of IT decision makers globally are looking to Cloud Data Management as a means of creating a more intelligent business. Cloud Data Management brings together disciplines such as backup, replication and disaster recovery across an organizations’ entire cloud and data management provision. It ensures that data is always available, recoverable and protected at all times. But like data privacy, IT is a people industry too. In a world where businesses need to protect their data more than ever before, CEOs, CIOs and DPOs alike are looking for trusted partners to help de-risk their data management. This support may take the form of configuring data management systems, providing technical training for administrators, or basic data privacy training for end-users. 

Data Protection Dayis an appropriate time for us to reflect on how we use and view data. 

Moreover, as we begin a new decade, it’s an apt moment to acknowledge that we are still in the midst of transformation. The impact of GDPR will continue to be profound as businesses adapt to its demands and its enforcers become less patient with those who fail to comply. More fines and reputational damage will only add to the demand for DPOs – people with the expertise and appetite to take on the data privacy challenges of an organization. While investing in technologies like Cloud Data Management will be fundamental to the DPO’s strategy, privacy is now a people business. Therefore, the shrewdest investments will be in trusted partners who can guide people at every level of the organization through the rigours of remaining compliant and help create an authentic culture of data transparency.

Using AI to Level the Cyber Playing Field

By Derek Manky, Chief Security Insights & Global Threat Alliances, Fortinet 

Imagine what you would have done differently in your network if you could have just seen a few years into the future. Would you have been quicker to embrace the cloud? What about the time and money spent on technologies that you now don’t really use? Every wiring closet has a number of expensive boat anchors sitting on a shelf somewhere gathering dust. Of course, if your organization has ever been the victim of a serious breach, it’s easy to guess how you may have prepared differently for that.

Predicting the Future

The truth is, that last one isn’t really just wishful thinking. Cybersecurity professionals, myself included, have been warning organizations about the threats just around the corner for years. Some require years of experience to understand threat actor trends and malware trajectories. But others just stare you in the face. For example, much of the recent success of the cybercriminal community has been due to their ability to successfully exploit the expanding attack surface and the resulting security gaps resulting from digital transformation that are not being properly closed. This shouldn’t be news to anyone.

While predicting what cybercriminals are going to do next can be tricky, the reverse isn’t true. When it comes to the cyber arms race, the criminal community has always had a distinct advantage in knowing what’s coming next. Organizations are constantly looking for new ways to squeeze more value out of their networks, or gain that sliver of competitive edge through the use of new technologies. And cybercriminals can predict with a high degree of certainty where many of those organizations will also neglect to apply proper security to those efforts.

According to one report, cybercriminals cost the global economy a total of $1.5 trillion last year. And the rate of growth for cybercrime looks likely to continue for some time unless organizations make a significant paradigm shift as to how they think about and deploy security.

Gaining the Upper Hand

To get out ahead of the traditional cycle of buying new cybersecurity solutions in response to the latest threat trends, organizations need to begin using the same sorts of technologies and strategies to defend their networks that criminals are using to compromise them. That means adopting an intelligently integrated approach that leverages the power and resources of today’s enterprise.

Much of this is detailed in a Fortinet’s Security Predictions report for 2020. In addition to my usual predictions around the tactics and technologies that cybercriminals are likely to develop and adopt over the next few years, this year’s report focuses extensively on ways organizations can successfully gain the upper hand when it comes to their cyber adversaries. And that strategy relies heavily on two things: the development and deployment of solutions built around machine learning and artificial intelligence, and shifting to a security-driven networking strategy that takes the principle of “look before you leap” to a new level.

The Evolution and Future of AI

One of the objectives for a security-focused AI strategy is to develop an adaptive immune system for the network similar to the one in the human body. In the body, white blood cells come to the rescue when a problem is detected, acting autonomously to fight infection. In the network, Artificial Intelligence can potentially perform much the same task by identifying threats and initiating and coordinating a response. A quick review of its history can help us predict its trajectory.

The first generation of AI is already in place in some sectors. Leveraging artificial neural networks and massive databases, systems using machine learning can rapidly sift through mountains of data to provide analysis and determine a proper course of action, all at network speeds.

The next generation of AI, currently running in labs and some production environments, is able better able to detect patterns by distributing learning nodes across an environment. This enhances its impact on things like access control. Some AI systems are now able to identify individuals using complex bio-footprints such as typing patterns or heartbeat rhythms, and detect even the most subtle deviations in normal network traffic to identify malicious actors and malware. Implementing this in today’s networks will require deploying regional AI-enhanced learning nodes that can collect and process local data for quick responses to events, and also share that data back to a central AI brain to deeper correlation to not only better detect suspicious patterns of behavior, but also immediately respond in a decisive manner before an attack can even be fully formed.

The third generation of AI, however, is where things begin to get really interesting. AI will still require a central brain, but rather than a hub and spoke model, it will instead exist as an interconnected web of even more intelligent regional learner nodes, much like an organic neural network. Direct information sharing between nodes will not only play a pivotal role in identifying threats in true real time, but also ensure that central protections and controls match local requirements and variations.

Getting from Here to There

Of course, none of this will matter if security isn’t deployed where cybercriminals strike. Today, different segments of the networks can’t see or talk to each other and collected threat intelligence often exists in isolation. The result is a fragmented security implementation that cybercriminals are all too eager to exploit. And this challenge is being compounded as more and more organizations rush headlong into adopting new technologies – today it’s the cloud and tomorrow it will be 5G and edge computing – without first properly considering all of the security ramifications. And that has to include prioritizing how the security to be deployed in new areas of the network will interoperate with existing systems.

Getting from where most organizations are today, to the sort of integrated and distributed security that the future will require, underscores the need to take a new approach. To start, organizations need to focus on interconnectivity and deep integration between their security devices. For machine learning systems to be successful, they not only need access to critical security information, but that data will need to be seamlessly and instantly shared across the network so can be adapted to each networked environment’s unique configuration. This will also require taking a security-first approach to new network expansions to ensure that all network and security systems and devices are visible and consistently controllable from anywhere in the network.

The ability for machine learning and AI systems to take over many of the menial and detail-oriented tasks previously assigned to human resources will take a significant bite out of the growing cybersecurity skills gap. By shifting responsibilities to autonomous self-learning processes that function similarly to human autoimmune systems – hunting for, detecting, and responding to security events autonomously and in true real time – valuable cybersecurity professionals will be able to focus their unique skillsets on higher-order planning and strategy. This transition will be critical as organizations move to adopt the advanced security-driven network strategies that will help their businesses succeed in the digital marketplace of tomorrow.

Digital Health Middle East Conference sets the stage for the new decade and future health care delivery

Digital Health Middle East 2020, held at the Armani Hotel, Burj Khalifa on the 24th of February will be engaging key stakeholders across the healthcare ecosystem. Held for the past five years in Scandinavia, this is the first time the conference gathers in Dubai to present intelligent design, pioneering technologies, advance clinical services and personalised care to improve outcomes, reduce costs and prioritise on prevention.

 

“This conference will address studies, hands-on cases and latest technology utilisation for future healthcare delivery, defining digital strategies, service improvement, ethical flows of data and secure, personalised care. Digital Health in itself will provide more accurate health outcomes and better patient experiences” – Johan Ehrstrom, CEO of Digital Health Middle East 2020.

 

Meet 250+ peers from across the ecosystem, and 20+ global speakers for a dialogue, vital insights and networking as this C-level hub facilitates knowledge exchange and game-changing strategies. Digital Health Middle East brings C-level attendees including executives and CXO’s, governmental department heads, hospital leaders, nurse leaders, regulators, technologists, futurists and entrepreneurs.

 

In the new decade, Digital Health will reform the industry with preventive information and new care solutions. Exponential technologies will increase access and improve how care will be delivered with the highest levels of safety, quality and patient experience, at the lowest cost.

 

Attendees will discover the powers of AI, machine learning and robotics among pioneering technologies affecting healthcare delivery, get hands-on case studies, objective insights, real-world scenarios and accurate foresight on the future of digital health.

 

Private sector participants can register on www.digital-health.me for USD 795 including materials, case examples, food & beverage and valet. Public sector attendees can register for USD 495.

 

Infoblox to Host Cybersecurity Roadshow 2020 across Middle East and Africa

Infoblox Inc., the leader in Secure Cloud-Managed Network Services, announced thatitis hostinga5-citycybersecurity tourthroughoutMiddleEast &Africa (MEA) under the theme ‘Take Network Security to the Next Level’. The roadshow will kick off on February 24th, 2020 inAmman, Jordan and will conclude in Kuwait City on the 11thof March.  

Ashraf Sheet, Regional Director MEA at Infoblox says, “Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Remote branches are directly connecting to the internet, losing the protection of the full security stack deployed in the data centre.”

“Securing these evolving IT architectures adds to the burden on short-staffed security teams who are already dealing with an overwhelming number of alerts and rigid siloed security tools. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation.”

At the 2020 road tour, Infoblox and its strategic partners will help regional organizations understandhow to unleash the full power of their security stack, improve incident response times through extensive integrations and extend protection to support their digital transformations.

Infoblox experts will discuss how organizations are addressing core networking challenges in security and next-gen data centres and eliminating weaknesses within the core infrastructure. Event attendees will get an opportunity to participate in interactive sessions, see live demos and be inspired by industry leaders and real-world stories from organizations who will share how they are driving growth, innovation and digital transformation with Infoblox solutions. The interactive sessions will cover how to:

  • Use foundational network services to easily and cost-effectively secure evolving IT architectures
  • Provide visibility into and secure multi cloud platforms
  • Understand security risk when internal DNS is bypassed due to the use of DoH (DNS over Https)
  • Lower incident response times using automatic data sharing and ecosystem integrations
  • Optimize your security costs

The full schedule of the road show, with dates andcitiesforthetouracross Middle East & Africa areasfollows:

24 February 2020       Amman, Jordan                       Register

26 February 2020       Doha, Qatar                             Register           

02 March 2020            Riyadh, Saudi Arabia               Register

04 March 2020            Johannesburg, South Africa   Register

10 March 2020            Kuwait City, Kuwait                 Register

Aruba Advances Digital Retail Experiences with SD-Branch Innovations

SD-Branch Pioneer Extends Zero Trust Security and New Cloud-native Management Capabilities to Enable Non-stop Retail Operations at Scale

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today announced the next milestone for its SD-Branch solution that enables more secure, streamlined and simplified deployment and management of large distributed retail networks.

A critical component of the company’s Edge-to-Cloud strategy, Aruba’s SD-Branch solutionintegrates Aruba Branch Gateways with the Aruba Centralcloud management platform to provide a single point of control and management for SD-WAN, wired and wireless networking to enable secure, simplified branch connectivity at scale. The innovations include: 

  • An expansion of Aruba’s unified branch defense capabilities to provide unique, identity-based attack detection and intrusion prevention to deliver zero trust in-store network security; 
  • New enhancements to the SD-WAN Orchestrator in Aruba Central to deliver unified edge-to-cloud management and secure connectivity to cloud workloads; 
  • New branch gateways that provide non-stop connectivity via built-in cellular, including LTE. 

Retail IT teams are under tremendous pressure to drive digital transformation within brick-and-mortar locations and “place the store at the center of their customer experience”[1]in order to compete with online merchants and marketplaces. To achieve this, they are leveraging next generation technologies to enable personalized, immersive experiences within the stores, but are consistently challenged by the lack of on-site technical staff at branch locations. As such, IT staff responsible for connecting, securing and managing retail locations must rethink the way they architect their branch networks. A unified edge-to-cloud architecture that automates and secures LAN, WAN and cloud connectivity is paramount to driving operational efficiency and addressing the lack of IT staff.  

“As we continue to grow our retail stores internationally, we are laser-focused on using technology to deliver our customers a truly unique shopping experience,” said Stewart Ebrat, CIO at Vera Wang. “With Aruba’s SD-Branch solution as the solid foundation for a secure, easy-to-deploy and centrally managed infrastructure, we will also be able to better engage with our customers by identifying them via their mobile phones so that store associates can help personalize and transform their in-store shopping experience.” 

Delivering Zero Trust Security to the Retail Branch

While retailers are embracing digital technologies – such as mobility and IoT – to enhance the shopper experience, they are also facing new security threats and an increased attack surface. Traditional security techniques were simply not designed to handle these new and evolving threats; as a result, many IT teams are adopting a Zero Trust Security framework, an architecture that dictates that no one within or outside the network is trusted. Key elements of a Zero Trust Security framework include a policy engine/trust broker, the ability to dynamically segment traffic on the basis of identity and role, and continuous monitoring for changes in security status with the corresponding real time adjustment of access policies. In addition, IT teams gain enhanced security by employing a Secure Access Service Edge (SASE) approach, which combinesnetwork security functions with WAN capabilities to support the dynamic secure access needs of organizations.[2]

Aruba has long supported the principles of a Zero Trust Security framework with its market-leading role-based access technology and Dynamic Segmentationwhich provides unified, software-defined micro-segmentation across the network, in branch and campus environments, to isolate users, devices and applications from one another based on role, not the type or location of the network connection. Aruba is advancing its unified branch defense capabilities with new IDS/IPS functionality that integrates with Aruba’s ClearPass Policy Managerand Policy Enforcement Firewall. By leveraging role-based access, Aruba adds a new identity-based detection dimension to traditional intrusion detection and prevention, enabling security teams to focus on alerts that matter. 

Aruba’s unified branch defense also includes:

  • One-click integration with cloud-based security solutions;
  • Threat visibility and trend analysis;
  • Correlation of security events with sites, clients, applications and network infrastructure;
  • Out-of-box policies for enforcement and incident response;
  • Security event streaming to third-party Security Information and Event Management (SIEM) solutions;
  • ClearPass Policy Manager for global access policy development and propagation.

Aruba’s unified branch defense capabilities deliver a complete solution for security and connectivity at retail locations, defending against a myriad of threats, including phishing, denial of service (DoS) and increasingly widespread ransomware attacks. 

Seamless Zero Trust from Edge-to-Cloud 

As adoption of software-as-a-service (SaaS) applications and virtual private clouds (VPCs) continue to rise, so has the complexity of maintaining security and control over the data, traffic and users accessing the cloud. Aruba is extending its Zero Trust Security model to the cloud with the enhanced SD-WAN Orchestrator in Aruba Central,making it easier for branch network operators to deploy flexible and secure overlay topologies in a large-scale edge infrastructure, securely connecting thousands of remote locations to applications in data centers and the cloud. 

Aruba Virtual Gateways, available for AWS and Azure, combined with orchestration, cost-effectively extend network and security policies to workloads running in the public cloud while the new SaaS Express prioritization feature continuously probes hosting locations for SaaS applications to ensure application performance.

Ensuring Non-Stop Operations at Every Retail Location

To help ensure a seamless shopping experience, retailers need a highly reliable network infrastructure as the foundation for digital transformation. Built-in cellular access in the Aruba 9004 Series Gateways gives customers the option to use the connection as a primary or secondary uplink or in a load shared active-active mode with other broadband links.Further, for cost control purposes, retailers can selectively use the cellular uplink for certain applications in any of these modes. 

Embedded cellular provides retailers with reliable, high performance backup connectivity with seamless failover that can be centrally managed. IT staff are able tune and optimize connectivity by defining SLA policies across a combination of MPLS, Internet and cellular links enforced with dynamic path steering in real-time with the ability to select the preferred cellular link. The cellular link can also be used for remote locations or to accelerate the deployment of a new store until the dedicated MPLS or Internet links are installed.

“Aruba pioneered the SD-Branch solution, creating a new category beyond pure-play SD-WAN offerings that gives retail IT the ability to face the higher-level challenges of remote branch connectivity, such as reducing device footprint, unified management across WAN and LAN, and security,” said Kishore Seshadri, vice president and general manager of SD-WAN Solutions at Aruba, a Hewlett Packard Enterprise company. “Today’s advancements extend Aruba’s SD-Branch solution to further support retail network operators with new, integrated in-store security capabilities, public cloud workload orchestration, and resiliency that retailers need for non-stop operations.”


[1]Forrester Research, US Retailers: Adapt Your Stores to Compete with Marketplaces, December 2019

[2]Gartner, Say Hello to SASE (Secure Access Service Edge),December 29, 2019

NetApp 2020 Predictions

By: Atish Gude – Senior Vice President and Chief Strategy Officer (CSO) NetApp

2019 was a year of rapid innovation—and disruption—for both the IT industry and the broader business community. With the widespread adoption of hybrid multicloud as the de facto architecture for enterprise customers, organizations everywhere are under tremendous pressure to modernize their infrastructure and to deliver tangible business value around data-intensive applications and workloads.

As a result, organizations are shifting from on-premises environments to using public cloud services, building private clouds, and moving from disk to flash in data centers—sometimes concurrently. These transformations open the door to enormous potential, but they also introduce the unintended consequence of increased IT complexity. 

We predict that a demand for simplicity and customizability will be the number one factor that drives IT purchasing decisions in 2020. Vendors will need to offer modern, flexible technologies with the choice of how to use and to consume those technologies so that customers can keep pace with their evolving business models. As IT departments strive to deemphasize maintenance and hardware, to reduce overhead, and to adopt pay-as-you-go models, simplicity and choice will be crucial. 

Achieving this simplicity will serve as the foundation for companies as they navigate the exciting technological trends that we identify in the following sections.

 

1. As the advent of 5G makes AI-driven Internet of Things (IoT) a reality, edge computing environments are primed to become even more disruptive than cloud was.

In preparation for the widespread emergence of 5G, lower-cost sensors and maturing AI applications will be used to build compute-intensive edge environments. This effort will lay the groundwork for high-bandwidth, low-latency AI-driven IoT environments with the potential for huge innovation—and disruption.

The advent of 5G is what AI-driven IoT has been waiting for. It will take a few more years for 5G data technology to spread across the Middle East. However, 2020 will see many players in the technology industry and business community invest in building edge computing environments to support the reality of AI-driven IoT. These environments will make possible new use cases that rely on intelligent, instantaneous, and autonomous decision-making, with low-latency, high-bandwidth capabilities. This evolution will bring us to a world where the internet will work on our behalf—without even having to ask. 

This AI-driven IoT innovation, however, will depend on a massive prioritization of edge computing, further disrupting IT infrastructures and data management priorities. As edge devices move beyond home devices (such as connected thermostats and speakers) and become more far-reaching (such as connected solar farms), more data centers will be placed at the edge. Also, platforms such as artificial intelligence for IT operations (AIOps) will be necessary to help monitor complex environments across the edge, the core, and the cloud. 

 

2. The impact of blockchain will be undeniable as indelible ledgers rapidly enable game-changing use cases outside of cryptocurrency. 

The world is quickly moving beyond Bitcoin to adopt enterprise-distributed indelible ledgers, setting the stage for a transformation that’s exponentially bigger than the impact that cryptocurrency has had on blockchain in finance. 

While the crypto frenzy continues to steal the limelight when it comes to blockchain, most players in the industry understand the bigger picture of the technology and its potential. Going into 2020, we will see a tipping point for larger implementations as enterprises go a step further to adopt indelible ledgers based on Hyperledger, which represents the maturation of blockchain for wider use cases. Indeed, we will start to see blockchain go “mainstream” as it enables industries such as healthcare to create universal patient records, to improve chain-of-custody pharmaceutical processes, and more. 

With such use cases validating blockchain and indelible ledgers, additional widespread adoption of the technology will drive transformation across society on a larger scale. This widespread adoption will build on the disruption that cryptocurrency has brought to finance to touch nearly every industry. As a result, new data management and compute capabilities will encourage companies to invest in indelible ledgers to build differentiated applications and to collaborate on critical, sensitive datasets.

 

3. Hardware-based composable architecture will have less short-term potential against commodity hardware and software-based infrastructure virtualization.

Continued improvements in commodity hardware performance, software-based virtualization, and microservice software architectures will eliminate much of the performance advantage of proprietary hardware-based composable architectures, relegating them to niche data center roles soon. 

Hardware-based composable architecture is being hyped as the next evolution of hyperconverged infrastructure (HCI). This architecture enables CPUs, networking cards, workload accelerators, and storage resources to be distributed across a rack-scale architecture and to be connected with low-latency PCIe-based switching. And although composable architecture does have potential, standardization has been slow, and adoption has been even slower. Meanwhile, software-based virtualization of storage, combined with software-based (but hardware-accelerated) compute and networking virtualization solutions, offers much of the flexibility of hardware-based composable architectures today with lower cost and consistently increasing performance.

Next year, attempts to build a true hardware-based rack-scale computing model will no doubt continue, and the space will continue to evolve quickly. However, most organizations that must transform within 2020 will be best served by a combination of modern HCI architectures (including disaggregated HCI) and software-based virtualization and containerization. 

Winter Holiday Travel Tips: Staying Protected from Cybercrime

By: Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox

As 2019 draws to a close and expatriates pack their bags and book their tickets to return to their home countries for the winter holiday season, nothing could possibly go wrong—except for a potential cybersecurity attack! Here are eight tips on how to stay protected while you are away on holiday:

Avoid travel booking scams

Quite a few people get scammed while booking travel plans online. Unfortunately, there are many fraudulent websites that lure customers in by using fake domain names similar to those of well-known travel-booking agencies. To keep yourself protected, do your research on different travel booking websites and make sure you are using real and trustworthy websites. A quick check to see if there is a “lock” icon in front of the URL and the website domain doesn’t have any unusual letters is a great place to start.

Protect your log-in credentials

Whether checking into a flight, confirming reservations for hotels, or making new reservations with websites you have accounts with, your information can be vulnerable. Sophisticated “forgeries” of popular booking sites are far too common and fool people into surrendering their usernames and passwords, which attackers will exploit. A simple technique to avoid falling victim is to use a username and password you know is wrong. If the site accepts it, pretending to log you in, you will know that it is a fake site, and your credentials are still protected.

Be cautious of using public Wi-Fi networks

Many airports and local cafes offer free and public Wi-Fi networks for users. These are often tempting to use, especially as a traveller who wants to stay connected online and get some work done. However, these networks are not secure—even if they are paid. Paying to use restricted networks does not necessarily make them safe. Infiltrators have complete and easy access to these open networks, and they are ready to attack at any given moment. For example, be aware of evil twins: attackers can establish rogue Wi-Fi networks with names such as “Free Wi-Fi.” Be sure to confirm the name of the hotspot before connecting. To stay protected, use a VPN or a private mobile hotspot when browsing the web on vacation to keep your data secure.

Avoid using public computers

When opting to use a public computer, it is best to refrain from accessing sensitive information, including logging into bank accounts and making online transactions. Assume that all activity on public computers can be seen and recreated by others. Attackers can install keyloggers on public computers, allowing them to recreate any data including log-in credentials and more. Rather than purchasing items online, it is highly recommended to pay for items upfront at the vacation destination. However, if you absolutely need to use the internet during travel, use your mobile device, which is much safer than a shared computer system. You can also get VPN apps for most mobile devices, so if you need public WiFi as well, your connection will be protected.

Disable Bluetooth access

Bluetooth connections are generally secure, as they typically require confirmation from the person who is pairing the devices together. However, there is a real risk of Bluetooth settings not being configured properly, resulting in cybersecurity dangers. Occasionally, personal devices are set to automatic pairing, giving cybercriminals easy access to devices. This allows them to easily steal data and to infiltrate systems with malware. Before leaving on vacation, check to make sure all Bluetooth connectivity settings are secure. However, the safest option would be turning off Bluetooth networking altogether.

Update and backup devices

Keeping technology software and applications up-to-date is crucial. Outdated software leaves users vulnerable to security breaches because hackers are often able to find security holes. The easiest way to do this is to turn on automatic updates on all your devices. To prepare for the worst, it is suggested to back up all of your information before the trip in the event that files and data go missing.

Pack a portable charger

Bring a portable charger or a personal charging cube along. Avoid using public charging stations as much as possible to keep from falling victim to “juicejacking.” This crime occurs when hackers trick travellers into charging their devices, while the charger cord actually connects to a hidden computer. The computer then downloads all the information off of the personal device, including important data such as usernames and account numbers. Therefore, it is much safer to bring a personal power source.

Install a privacy screen

Privacy screens “black out” the sides of devices, ensuring that the only person who can read the screen is the person who is actually using the device. They are inexpensive and provide a very easy solution for prying eyes. They are also much more effective than simply dimming the brightness of the screen. Anyone could be lurking nearby at the airport or at the hotel lobby, so play it safe and get a privacy screen today.

Conclusion

There are many simple and cheap precautions that travellers can take to keep safe while traveling. Don’t let attackers ruin vacation or cause worry about cybersecurity issues.

New Fortinet Survey Provides Insight into the role of Cybersecurity in OT

The Importance of Cybersecurity to Enable Safety and Reliability is Recognized but Obstacles Remain

Fortinet,a global leader in broad, integrated and automated cybersecurity solutions, today announced that a commissioned study conducted by Forrester Consulting found that industrial firms, due to increased digitalization, are more exposed to cyber threats than ever before. In addition, the lack of collaboration between Information Technology (IT) and Operational Technology (OT) teams represents another cybersecurity barrier for organizations that want to take full advantage of IT/OT convergence to increase their business benefits.

Industrial firms are committed to further digitalizing their factory floor to find new efficiencies and improve their ability to gather data that can provide business insight into production processes. 66% of respondents said their factories run through IP-connected networks and use real-time data to inform business decisions. However, these IP-connected networks bring up new cybersecurity risks with 73% of respondents in agreement that the attack surface has expanded. Meanwhile, only half of respondents agreed that their factory machinery is well prepared to fight off cybersecurity threats, leaving the other half unprepared and 55% of respondents either have no plans to implement or plan to implement cybersecurity technologies in the next 12 months. 

Another key finding showing Industrial Control Systems (ICS) are at risk due to lack of collaboration between the IT and OT environments with 51% of respondents claiming they operate in silos, meaning the OT team manages critical industrial equipment and any OT cybersecurity whereas the IT team is responsible for management of IT cybersecurity. A quarter to over a third of respondents did not know who had primary responsibility for cybersecurity solutions such as process, control and automation systems, and even business planning and logistics. However, 91% stated that security of factory machinery should be a shared IT and OT responsibility, as well as having clear and regular communication on the IT/OT convergence vision (58%) in order to ensure a successful IT/OT convergence. 

Organizations have much to gain from convergence and close collaboration between OT and IT teams, with the biggest being access to real-time data insights from manufacturing operations (66%) then being able to monetize and create new business opportunities via increased insight into production data (59%). Numerous efficiency gains are to be obtained as well, with 43% of respondents citing reduced duplication of processes and workflows between plants, as well as enhanced visibility to mitigate cybersecurity threats.

Joe Sarno, VP International Emerging & Operational Technology & Critical Infrastructure EMEA at Fortinet: “Industrial firms need to change at the operational level in order to bridge the divide between IT and OT environments and build trust between these teams, to ensure a successful convergence. As the attack surface expands, IT and OT teams must collaborate to improve visibility and defend against cyber threats. That’s why at Fortinet we are investing a lot of time and resources into R&D for ICS cybersecurity solutions.”

Fortinet commissioned Forrester Consulting to conduct an online survey in India, Turkey, the UK, Spain, Poland, Germany, Slovakia, Italy, France, the Czech Republic, and the Netherlands to evaluate the techniques industrial firms use to manage security, security roles and responsibilities between IT and OT, and the challenges and opportunities of IT/OT convergence.The survey included 459 IT and OT decision makers responsible for ICS at industrial enterprises with 1,000 employees or more (automotive, transportation, manufacturing, maritime, and aviation engineering) in Europe and India.

Kodak Alaris Claims Prestigious 2020 Scanner Line of the Year Award from the Analysts at Keypoint Intelligence – Buyers Lab

Buyers Laboratory (BLI), the world’s leading independent evaluator of document imaging hardware, software, and services, today announced that Kodak Alaris has won BLI’s coveted 2020 Scanner Line of the Year award for the fourth time in five years. Given once a year, this award recognizes the vendor whose product line is deemed best overall based on its rigorous laboratory evaluations.

Scanners from Kodak Alaris enable businesses of all shapes and sizes to extend business process automation to the point of capture. Across the entire line, customers can expect highly integrated onramps for entering all paper-based information to the systems that drive their business. Each device is characterized by its exceptional media handling, top-notch image enhancement and OCR capabilities, flawless reliability, and a simple user experience.” said Lee Davis, Keypoint Intelligence’s Senior Editor, Scanner Analysis and Software Evaluation. “Whether it’s a small desktop unit or a production scanner—and everything in between—scanners from Kodak Alaris are class leaders that can add tremendous value to any business, earning the company its fourth Line of the Year award in five years, and its fifth overall.”

To determine the Scanner Line of the Year award recipient, BLI analysts consider current scanners in the OEM’s line that have been submitted to BLI’s lab for testing. To judge the overall quality of the line, the analysts look at the overall rating a scanner received after testing, as well as the ratings in key categories such as Reliability, Productivity, Media Handling, Image Quality, Ease of Setup, Drivers/Utilities, OCR Performance, and Value.

“Kodak Alaris is by far the most-awarded scanner manufacturer in BLI’s 62-year history, with 30 Pick and Outstanding Achievement awards along with the five Line of the Year honors,” said Don Lofstrom, President and General Manager, Alaris, a Kodak Alaris business. “As we kick off a new decade with this prestigious award, we look forward to innovating, delighting customers and growing with our partners for many years to come.”

OmniClouds Signs Strategic Partnership with Infonas Telecom Bahrain

Enterprises to benefit from SD-WAN security and speed to drive business-first model

OmniClouds, a native cloud service provider and cloud migration enabler in the EMEA region has signed a strategic partnership with Infonas Telecom, the Bahrain-based global telecom carrier and ICT provider. Through this partnership, Infonas willprovide SD-WAN services to enterprises in Bahrain using virtualizedservice platform provided by OmniClouds.

“As more and more enterprises adopt a cloud or multi-cloud approach, SD-WAN becomes the natural choice for providers to leverage cloud and IOT driven applications securely and fast ,” said Amr A Eid, Chief Executive Officer and Board Member, OmniClouds, “We are the trusted platform for enterprise customers in the Middle East and Africa region to enable their cloud migration and adoption journey. The OmniClouds hybrid platform with our native partners and the MSP model plays a critical role in seamlessly enterprises with their move to the cloud by simplifying the operations and providing security and assurance they need for such a critical part of their business. We firmly believe expansion through partners as a key success to cloud adoption in this shared economy era, creating value for all the ecosystem. Our partnership with Infonas will empower enterprises to reap the benefits of their cloud investments and drive a business-first model.”

The improved connectivity will allow enterprises to seamlessly transform their global network into an automated, programmable SD-WAN using the Nuage technology. Software-defined WAN (SD-WAN) technology is the next-generation network technology that offers carriers flexibility, end-to-end control and uninterrupted connectivity to services. It is emerging as a networking approach that delivers multiple performance and cost benefits, including end-to-end network visibility and feedback to improve transmission efficiencies on the fly.

“Infonas and OmniCouds together are committed to helping enterprises in their digital transformation journey,” said Hamad Al- Amer, Board Member and Managing Director at Infonas WLL. “Our partnership with OmniClouds will enable enterprises in Bahrain to connect efficiently to multiple cloud providers such as Amazon, Microsoft, IBM Softlayer, Google Cloud Platform, as well as benefit from Zero-touch Provisioning, Managed Security, and guaranteed SLA. This is the right time for end users to think beyond the legacy methods of doing things.”