Category Archives: Internet Security
For the Kremlin, the Internet is a Western Plot – Center for European Policy Analysis
In 2017, Russia vowed to make its Internet sustainable and self-sufficient. In reality, the Kremlin undertook its first systematic effort to control its cyberspace.
As Russia sends tanks and soldiers to take over Ukraine, it is also dispatching censors and regulators to strangle the Internet. In this special series by the Center for European Policy Analysis, The New Iron Curtain, Senior Fellows Andrei Soldatov and Irina Borogan argue that both invasions are linked and represent the culmination of a more than a decade-long trend to throttle the free and open flow of information in Russia.
For years, former KGB generals watched the growth of the Internet with suspicion, believing it was a threat to Russias national security. They vowed to disable it.
Their leader was Vladislav Sherstyuk, a career KGB officer. In 1998, he became director of FAPSI, the division of the intelligence service in charge of spying on foreign communications and the protection of the governments most sensitive networks. The next year, President Putin promoted Sherstyuk to the powerful Security Council, where he supervised the information security department. In 2000, his team composed the Information Security Doctrine of the Russian Federation, a plan for the future of the Russian internet.
Its doctrine reflects the KGB mindset: the free flow of information, coming from the West, poses a threat to Russias national security. Threats ranged from a devaluation of spiritual values to a reduction of the spiritual, moral and creative potential of the Russian population, as well as the manipulation of information (disinformation, concealment or misrepresentation). Putin signed the document, and the Security Council became the ideological center of operations to curb Russian Internet freedom and the force behind the nascent Sovereign Internet.
In November 2017, the Security Council instructed the Ministry of Communications to submit proposals for the creation and implementation of a state information system to ensure the integrity, stability, and security of the Russian segment of the Internet, as well as replacement root servers for national top-level domain names." The Security Council warned: A serious threat to the security of the Russian Federation is the increased capabilities of Western countries to conduct offensive operations in the information space and readiness to use them.
Officially, the Security Council aimed to make the Russian Internet sustainable end self-sufficient. In fact, the Kremlin wanted to build an effective system of control. The Kremlin identified six challenges to overcome:
During the Cold War, the Kremlin saw the most dangerous content coming from Western media. This content could be found on the Internet, but Russians preferred and trusted domestic content.
Opposition leader Alexei Navalnys documentaries about Kremlin corruption attracted record YouTube audiences. In 2017, Navalnys YouTube video about Russian Prime Minister Dmitri Medvedevs alleged corruption was viewed more than 22 million times. Since then, Navalnys organization has produced anti-corruption videos on YouTube on an industrial scale. These videos are more popular than content created by Radio Free Europe, Voice of America, or the BBC.
The Kremlin began to pressure both local and Western technology companies to take down opposition content critical to authorities.
When ordinary people witness a natural disaster, a technical catastrophe, or police brutality and share the evidence through video or photos -- the posts go viral. The information spreads too quickly for the censorship system to address.
The Kremlin began to set up a Moscow control center, giving it the ability to oversee access to the entire Russian Internet.
Censors understand that activists use apps such as Signal or software such as Tor to obscure their communications, but ordinary Russians depend on mainstream consumer apps such as WhatsApp, Viber (a communications app owned by the Japanese company Rakuten), Telegram, and TikTok.
The Kremlin aimed to change reliance on Western apps to local ones that the security services could control and suppress.
YouTube and TikToks explosive growth took Russian authorities by surprise. In 2017, Navalny's documentary about Medvedevs corruption encouraged Russian YouTubers to spread videos showing police brutality used to crack down on protests. Russian schoolchildren filmed their teachers raging about enemies of the state and posted the videos.
The Kremlin concentrated its censorship efforts on video posts, filing numerous complaints to YouTube about the Navalny videos, and arresting the editor of Navalny Live.
In August 2018, tensions rose in the majority Muslim region of Ingushetia over a Kremlin-supported border-swap agreement with neighboring Chechnya. On the day of the agreements signing, about a hundred people gathered to protest in the Ingush capital, Magas.
Ingushetia's Internet was cut. Authorities suppressed live streaming. In the following weeks, the Ingush kept going to the streets to protest, and the FSB secret service enforced web shutdowns.
Despite the efforts, information about protests kept leaking. The Kremlins new system, controlled through a single center in Moscow, was built to shut down the Internet to entire regions, allowing it to act without relying on regional enforcers.
Starting in the 1990s, Russian telecom companies were required to buy and update equipment for online surveillance. Starting in 2018, Russians were obliged to store the complete data of all users for six months, and their metadata for three years.
Telecom companies protested. Sometimes, their resistance became public company officials expressed their concerns at conferences and to journalists. In most cases, the resistance stayed private. Companies attempted to find a way around the legislation, for instance, by renting surveillance equipment from large operators. This resistance undermined the effectiveness of the Russian nationwide surveillance and filtering.
Kremlin censors realized that they needed to pay companies to install censorship and surveillance tools. They began providing Internet service providers with special equipment which gave the government the means to suppress and redirect the traffic to the control center in Moscow.
The Sovereign Internet was born. It would be built out over the next few years, in advance of the decision to invade Ukraine.
Andrei Soldatov is a nonresident senior fellow with the Center for European Policy Analysis. Andrei is a Russian investigative journalist, co-founder, and editor of Agentura.ru, a watchdog of the Russian secret services activities. He has been covering security services and terrorism issues since 1999.
Irina Borogan is a nonresident senior fellow with the Center for European Policy Analysis. Irina is a Russian investigative journalist, co-founder, and deputy editor of Agentura.ru, a watchdog of the Russian secret services activities.
Visit link:
For the Kremlin, the Internet is a Western Plot - Center for European Policy Analysis
Underneath the Ice: Undersea Cables, the Arctic Circle, and International Security – The Arctic Institute
Iceberg in Greenlandic waters in June 2016. Photo: United States Department of State Bureau of Oceans and International Environmental and Scientific Affairs
Undersea cables have grown in popularity and usage in recent years, with some 380 underwater cables in operation around the world, spanning a length of over 1.2 million kilometers (745,645 miles).1)Griffiths J. (2019). The global internet is powered by vast undersea cables. But theyre vulnerable. CNN, 26 July, https://www.cnn.com/2019/07/25/asia/internet-undersea-cables-intl-hnk/index.html, accessed 17 January 2022
These cables are heavily important to the Wests national and international defense and security initiatives given the amount of business conducted through them and the services they can provide to many industries. This is illuminated by the fact that Alphabet (the parent company of Google), Microsoft, Amazon, and Meta (formerly Facebook) have all become involved in undersea cable development and are on track to become primary financiers and owners of the web of undersea internet cables connecting the richest and most bandwidth-hungry countries, according to analysts and undersea cable engineers. Yet most of these cables rest along the shores of the Atlantic and Pacific Oceans, connecting North America, Europe, Asia, and Africa.2)Mims C. (2022) Google, Amazon, Meta and Microsoft Weave a Fiber-Optic Web of Power. The Wall Street Journal, 15 October, https://www.wsj.com/articles/google-amazon-meta-and-microsoft-weave-a-fiber-optic-web-of-power-11642222824, accessed 17 January 2022
Many undersea cables are starting to advance farther north, entering the region of the Arctic circle. This past December, the US-based telecommunications company Far North Digital joined with the Finnish company Cinia to develop a 16,500 kilometer submarine internet cable [under the sea]connecting the Atlantic and Pacific Ocean through the perilous Arctic Archipelago.3)Khalili J. (2021) New submarine cable will blast data between Japan and Europe through Arctic waters. TechRadar, 22 December, https://www.techradar.com/news/new-submarine-cable-will-blast-data-between-japan-and-europe-through-arctic-waters, accessed 17 January 2022 In August, Reuters reported that the Russian state-owned telecommunications company Morsviasputnik had begun laying its first undersea fibre optic communications cable over Russias long northern coast from the village of Teriberka, on the Barents Sea, to the far eastern port of Vladivostok to supply stable internet in Arctic port towns as well as the Kamchatka peninsula and Sakhalin.4)Stolyarov G. (2021) Russia starts operation to lay undersea fibre optic cable through Arctic. Reuters, 26 August, https://www.reuters.com/technology/russia-starts-operation-lay-undersea-fibre-optic-cable-through-arctic-2021-08-06/, accessed 17 January 2022 China has also been expanding into the Arctic Circle, developing their cyber, trade, and economic capacities.5)Khorrami N. (2020) Data Hunting in Subzero Temperatures: The Arctic as a New Frontier in Beijings Push for Digitial Connectivity. The Arctic Institute, 04 August, https://www.thearcticinstitute.org/data-hunting-subzero-temperatures-arctic-new-frontier-beijing-push-digital-connectivity/, accessed 18 January
There is an increased measure of data usage coming through undersea cables, which includes sensitive and important data, and utilizes poor security measures to secure these lines from foreign actors. With this large national security threat, the U.S. and international organizations need to take action.
It is clear that many in the public see the Arctic Circle as a frozen, icy tundra when, in actuality, the region is quite imperative to international security and business. According to Scientific American climate change and an accelerating loss of Arctic sea ice during summer months have opened the possibility of northern cable routes while many nations would favor less U.S.-centric cable routes and additional backup lines to avoid U.S. surveillance and disruptions in service.6)Hsu J. (2016) An Internet Cable Will Soon Cross the Arctic Circle. Scientific American, 01 June, https://www.scientificamerican.com/article/an-internet-cable-will-soon-cross-the-arctic-circle/, accessed 17 January From an economic and political perspective, there is clearly a desire from non-Western nations to circumvent the United States and acquire their own methods of telecommunications contact.
The Center for Strategic & International Studies (CSIS) has found that threats from foreign powers (like Russia) can come in the form of cutting off military or government communications in the early stages of a conflict, eliminating internet access for a targeted population, sabotaging an economic competitor, or causing economic disruption for geopolitical purposes alongside tapping [these cables] to record, copy, and steal data, which would be later collected and analyzed for espionage. CSIS commentary also found that Russia could be able to stage cyberattacks against these data pipelines which could disrupt or divert data traffic, or even execute a kill click deleting the wavelengths used to transmit data.7)Morcos P. & Colin Wall (2021) Invisible and Vital: Undersea Cables and Transatlantic Security. CSIS, 11 June, https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security, accessed 19 January
Already, Russia has been heavily involved in developing their abilities to tap undersea cables and have also been accused of playing a role in the outage of the furthest north undersea fiberoptic cable located between mainland Norway and the Svalbard archipelago in the Arctic Ocean.8)Newdick T. (2022) Undersea Cable Connecting Norway With Arctic Station Has Been Mysteriously Severed. The Drive, 10 January, https://www.thedrive.com/the-war-zone/43828/undersea-cable-connecting-norway-with-arctic-satellite-station-has-been-mysteriously-severed, accessed 17 January 2022
Publicly, it is unknown exactly how effective foreign powers are at tapping Western undersea cables, the amount of damage this can inflict upon a nation necessitates the United States take steps to protect themselves from these problems. A recent 2021 report by the Atlantic Council highlighted this issue, stating, authoritarian governments, especially in Beijing, are reshaping the Internets physical layout through companies that control Internet infrastructure, to route data more favorably, to route data more favorably, gain better control of internet chokepoints, and potentially gain espionage advantage while also describing how private companies and industry as a whole are becoming more aware of these network security risks.9)Sherman J. (2021) Cyber defense across ocean floor: The geopolitics of submarine cable security. Atlantic Council, 13 September, https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/#introduction, accessed 17 January 2022
These efforts at defense may come in the form of international law and policy, and joint efforts at stopping intrusions.
Simply put, the U.S. government needs to take immediate and intense action. Writing for DefenseNews, Nadia Schadlow, a senior fellow at the Hudson Institute and former Deputy National Security Advisor for strategy, and Brayden Helwig, an intern with DefenseNews, are that, First, the U.S. government should take more responsibility for repairing undersea infrastructureClassifying cable repairs as matters of national security and developing a public-private operational plan that includes a division of resources to repair them is one step toward reducing the response time to a disruption or an attack in addition to creating tax incentives for private industry to secure cable landing stations, while investing in technologies that detect and deny undersea espionage.10)Schadlow N & Brayden Helwig (2020) Protecting undersea cables must be made a national security priority. DefenseNews, 01 July, https://www.defensenews.com/opinion/commentary/2020/07/01/protecting-undersea-cables-must-be-made-a-national-security-priority/, accessed 17 January 2022
Tactics like what has been described by Schadlow and Helwig would assist in better protecting the United States from cyberattacks and undersea threats by foreign actors, while also helping the international community by assisting the private sector, which controls most of these cables.
From an international perspective, there is a great need for more legal statutes governing undersea cables and the threats posed to these systems, as their jurisdiction in somewhat of a gray area. Garrett Hinck, a PhD student at Columbia University, wrote about this in 2017 for the Lawfare blog. Hinck finds that with regards to underwater cable law, despite the existence of both the 1884 Convention on the Protection of Submarine Cables and the 1982 U.N. Convention on the Law of the Sea there is very little that governs the usage of undersea cables in wartime or when damaged. He writes that, relatively little attentionhas focused on the legal frameworks that govern the networks of glass and steel that form the literal backbone of our internetIn practice, the lack of legal disputes involving attacks on cables leaves their legality uncertain.11)Hinck G. (2017) Cutting the Cord: The Legal Regime Protecting Undersea Cables. Lawfare, 21 November, https://www.lawfareblog.com/cutting-cord-legal-regime-protecting-undersea-cables, accessed 19 January 2021
Establishing a clear and official set of international guidelines for how undersea cables operate within wartime or in regards to international threats by both state and non-state actors is imperative to better securing them from threats, not only those of national security importance, but also those of human security importance.
In terms of joint cooperation, this can come across primarily in the form of government-private sector collaboration and interstate cooperation. CSIS, in their brief of undersea cable security, advocated for the U.S. government to conduct bilateral confidential dialogues with its main European partners, in particular, the United Kingdom and France, to exchange information on their threat perspective and analysis, their respective cable projects, and the national measures implemented to protect them while NATO should work on a collective assessment of both the potential vulnerabilities to undersea cables in the Euro-Atlantic region and the implications of disruptions for allied operations.12)Morcos P. & Colin Wall (2021) Invisible and Vital: Undersea Cables and Transatlantic Security. CSIS, 11 June, https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security, accessed 19 January
From a private sector-government standpoint, Schadlow and Helwig in their article for DefenseNews also argue for private industry tax incentives to secure cable landing stations, while investing in technologies that detect and deny undersea espionage.13)Schadlow N & Brayden Helwig (2020) Protecting undersea cables must be made a national security priority. DefenseNews, 01 July, https://www.defensenews.com/opinion/commentary/2020/07/01/protecting-undersea-cables-must-be-made-a-national-security-priority/, accessed 17 January 2022 Pierre Morcos and Colin Wall, writing a commentary for the Center for Strategic and International Studies, note, national governments should also ensure that operating companies implement the highest standards. As a first step, allies should encourage operators to adhere to voluntary guidelines, most notably those provided by the International Cable Protection Committee (ICPC), an industry forum for cable owners and some governments that develops standard procedures If voluntary standards fail to incentivize companies to invest adequately in cybersecurity, allies should consider defining mandatory requirements, as recently decided in the United States for oil and gas pipelines following the ransomware attack against Colonial Pipeline.14)Morcos P. & Colin Wall (2021) Invisible and Vital: Undersea Cables and Transatlantic Security. CSIS, 11 June, https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security, accessed 19 January
These forms of defense against state actors would greatly bolster the overall national security framework of the West. They would allow companies, global powers, and international organizations to deter hostile state actors like Russia and China while improving global security. Furthermore, they would allow for clarity going forward in terms of the open sea, the Arctic Circle, and international law while also preserving the Arctic Circle for purely business and scientific development as opposed to military action.
The Arctic Circle is a key resource for wealth, having an abundance of oil and gas in addition to being valuable territory for fishing and scientific exploration. With undersea cables, they provide economically beneficial routes for faster data accumulation while allowing for an increased ability to share information, conduct business deals, and communication between governments and the private sector. Undersea cables require protection from hostile state actors and non-state actors who see these cables as a way to advance their own geopolitical goals. By strengthening international law, having governments join with the private sector and other friendly governments, and making a stronger cybersecurity program, the Arctic Circles undersea cables will be more effectively protected from harm and allow for a peaceful sharing of information.
Alan Cunningham is a graduate of Norwich University and the University of Texas at Austin, attaining an MA in International Relations, a BA in History and a BS in Radio-Television-Film respectively. He plans to join the U.S. Navy as an Officer in 2022 and has worked in both the fields of finance and journalism, focusing on international/national security, military affairs, and foreign policy. He has been published in the Jurist, Security Magazine, ModernDiplomacy, and The Diplomat among others.
See more here:
Underneath the Ice: Undersea Cables, the Arctic Circle, and International Security - The Arctic Institute
Here’s how to keep your laptop secure with the best antivirus software – Interesting Engineering
The majority of us keep our crucial data stored on our laptops: our financial records, future goals, an entire photo album, and a video library, sales statistics for the firm that we work for, and so on. What you don't want is for someone else to obtain unauthorized access to it, or, more crucially, to all of the data contained within it. For that, there are a few simple steps to take and the finest software out there to keep your data secure in the background. To help you achieve the ultimate security for your digital data, we listed the best software, and a few steps to take to keep your data safe.
Firstly, lets see what you can do without additional software help.
1. Require a password when logging inJust to make sure to keep people away from easily accessing your important data, you should set a password that is hard to guess. Even hard to remember,if possible.
2. Use a password-protected screen saverYou also need to make sure that when you leave your computer on and alone, your screen saver that requires a password is there to protect you.
3. Encrypt your hard driveTo prevent any thief, remove your hard drive and read the files directly; andmake sure to encrypt your hard drivein order to protect your data from any sort of physical attacks.
4. Backup your dataFrom any type of cyber attack or getting your laptop stolen, you need to back up your files to protect what you hold dear. You can prefer a local backup or cloud backup for that.
5. Keep your system and software up to date
Another great thing to do is to keep your laptop malware-free is to not download random files from not-so-trusted websites and to keep your software up to date.
6. Add webcam cover
A webcam cover can protect your privacy as hackers might turn on your camera to spy on you and violate your privacy.
7. Use a virtual private network
VPNs are no news for us but there is still a majority that is not using these services. The VPN can encrypt the traffic between you and the VPN server making it impossible for people on the same network to track what you are doing.
After you are done with these steps, the only thing left to do is to protect your laptop from harmful software and any type of viruses that can mess up all the data and systems you have.
And for that, here are the best antivirus software for you.
McAfee simplifies internet security so you can safely bank, shop, browse, and connect. From any device, you may use powerful tools like Dark Web Monitoring and an automatic Secure VPN, and you'll get a consistent experience that meets you anywhere. McAfee Secure VPN is now fully automated and incorporated into McAfee Online Protection, eliminating the need to download a separate app and making it easier than ever to safeguard your personal information while traveling. You may protect your credit card and personal information from prying eyes by encrypting your internet traffic. Secure VPN protects your privacy when you make payments, manage investments, or simply browse the web.
Bitdefender Antivirus Plus shields Windows PCs from a wide range of online threats. Bitdefender Antivirus Plus delivers you the most advanced technologies to forecast, prevent, detect, and remediate the latest cyber threats with automatic updates and upgrades.
Antivirus Plus provides network-based security, prevents the exploitation of system vulnerabilities, and detects and blocks assaults on your devices, all while keeping your sensitive data safe. It protects PCs in real-time against all types of viruses and ransomware, as well as phishing and online fraud while buying and browsing. It also includes a Secure VPN for total online security.
Avast Business Antivirus Pro provides all of the features of Avast Antivirus, as well as additional data security features. Avast antivirus integrates four real-time shields to provide comprehensive protection against today's threats: File Shield, Web Shield, Email Shield, and Behavioral Shield. SecureLine VPN ensures a secure connection on any network, whether it's your home network or public Wi-Fi. It encrypts all data, anonymizes browsing, secures uploads and downloads, and hides emails, logins, messages, and credit card information. You can keep your computer working smoothly while keeping your data secure. Avast checks your browsers for negatively rated addons, extensions, search engines, and toolbars, allowing you to swiftly disable or delete them.
Avast Business Antivirus is the world's fastest antivirus, with the world's largest threat detection network at its core. Threats change all the time, and due to Avast's machine learning and the world's largest threat detection network, our security keeps up with them, swiftly detecting new threats and keeping you secure. It can effortlessly safeguard your device from the latest risks by closely monitoring the behavior of all running apps and stepping in to stop a program immediately. With real-time updates given by the world's largest sensor network, its anti-spam service is always running to keep your inbox clean. It accelerates the scanning process by integrating scans for malware, software updates, network issues, new features, and performance concerns, and it displays the results along with tools and suggestions for resolving them.
Webroot Internet Security is a cloud-based security solution that protects your computer against the newest viruses, phishing scams, and cyber attacks without slowing it down or interfering with other apps or software.
It constantly evaluates and classifies billions of programs, files, webpages, and other items so you can safely bank, shop, and surf the web. Webroot takes seconds to install, and its rollback technology restores infected devices to their original state. Webroot searches the internet in real-time to protect you from phishing, ransomware, and other malicious attempts to steal your money and personal information. You may also take advantage of automatic updates to the most recent product versions, which means you won't have to bother about installing upgrades.
Norton 360 Deluxe includes 50GB of safe PC cloud backup and Secure VPN for your devices, as well as complete virus protection for up to 5 PCs, Macs, Android, or iOS devices. Password Manager, Parental Controls, SafeCam, which alerts you and prohibits illegal access to your PC's webcam, and Dark Web Monitoring, which monitors and notifies you if it detects your personal information on the dark web, are among the extra features. Norton 360 includes bank-grade encryption to help keep your information such as passwords and bank data secure and private while browsing anonymously and securely over public Wi-Fi.
AVG Ultimate is a comprehensive collection of AVG's antivirus, tuneup, anti-tracking, and VPN software. You may either enhance one device or secure and optimize up to ten with Ultimate's multi-device solution. It guards against ransomware, spyware, and other malware, as well as hackers, with powerful real-time security. To improve the speed and performance of your device, AVG Ultimate can help you free up disk space, identify and remove hidden duplicate files, and eliminate low-quality photos. You may also disguise your online activities from hackers, spies, your ISP, advertising, and even the government by using the quick and simple VPN and automated anti-track features.
Interesting Engineering is a participant of the Amazon Services LLC Associates Program and various other affiliate programs, and as such there might be affiliate links to the products in this article. By clicking the links and shopping at partner sites, you do not only get the materials you need but also are supporting our website.
The rest is here:
Here's how to keep your laptop secure with the best antivirus software - Interesting Engineering
GTT Forges Partnership With Arc Solutions for Enhanced Connectivity in the Middle East – GlobeNewswire
MCLEAN, Va., March 29, 2022 (GLOBE NEWSWIRE) -- GTT Communications, Inc., a leading global cloud networking provider to multinational clients, has announced its partnership with Arc Solutions, a provider of integrated network solutions in the Middle East, to consolidate and expand GTTs service reach across the Middle East. Underpinning the partnership is a network-to-network interconnect (NNI) between GTTs global Tier 1 network and Arc Solutions Middle East network at the Datamena facility in Dubai.
The new partnership creates better economies of scale for GTTs enterprise service offering in the Middle East, which includes internet services and managed SD-WAN, leveraging Arc Solutions point-of-presence locations in UAE, Bahrain, Oman, Saudi Arabia, Israel and Pakistan. With this enhanced service footprint, GTTs enterprise customers can lower their total cost of ownership with service requirements in the region, gain improved network visibility and realize more consistent performance.
We are continuously seeking opportunities to expand the reach of our global IP network to meet demand while we also focus on ways to operate it more efficiently to benefit our customers, stated Don MacNeil, GTT COO. Our network and data center provider partners are an important element of our value proposition, and we are pleased to partner with Arc Solutions to strengthen our service offering in the Middle East region, which includes secure internet and software-defined wide area networking solutions.
We are excited to partner with GTT, combining our expanding Middle East footprint with one of the worlds largest Tier 1 IP networks, stated Mahesh Jaishankar, CEO at Arc Solutions. The positive synergy of our global ISP partnerships brings substantial value to customers that are seeking a service provider with strong coverage in the Middle East as well as the rest of the world.
According to industry research firm TeleGeography, international internet traffic to the Middle East has tripled between 2017 and 2021.1
About GTT
GTT provides secure global connectivity, improving network performance and agility for your people, places, applications and clouds. We operate a global Tier 1 internet network and provide a comprehensive suite of cloud networking and managed solutions that utilize advanced software-defined networking and security technologies. We serve thousands of businesses with a portfolio that includes SD-WAN and other WAN services, internet, security and voice services. Our customers benefit from a customer-first service experience underpinned by our commitment to operational excellence. For more information on GTT, please visit http://www.gtt.net.
About Arc
Arc is a provider of integrated network solutions that simplify connectivity to networks, data centers, cloud and interconnect platforms across the Middle East. We put customers and partners in control of their connectivity and enable them to seamlessly and rapidly deploy connectivity solutions to serve their end customers. Our purpose-built regional network and our interconnections to a large and expanding portfolio of partners and suppliers are designed so that we can quickly build the right solution for our customers. As an independent provider with backing from two of the most trusted telcos in the region, Batelco and EITC (du), Arc is led by a team of experts with a track record of success in serving regional and global businesses in the Middle East. Our vision is a highly interconnected Middle Eastern market that accelerates how network-centric businesses optimize, grow and innovate in connectivity and digital services. For more information, visit http://www.arcsolutions.me.
GTT Media Inquiries:Ed Stevenson, LEWIS+44-207-802-2626gttuk@teamlewis.com
GTT Investor Relations:Charlie Lucas, GTTVP of Financeinvestorrelations@gtt.net
1 Based on peak traffic. Global Internet Geography Report. TeleGeography. 2021.
Read more here:
GTT Forges Partnership With Arc Solutions for Enhanced Connectivity in the Middle East - GlobeNewswire
The folly of an atmanirbhar internet – The Indian Express
Flabbergasted. There is no other word for how I felt reading a recent interview with the Minister of State for Electronics and Information Technology, Rajeev Chandrasekhar. The honourable minister objected to the silencing of Russian state media by Big Tech, bemoaning the weaponisation of digital platforms. Apparently, he has no objections to the weaponisation taking place in the form of thermobaric rockets raining down on innocent Ukrainians, while the Russian state media rains down lies upon its people. It is bad enough that India must equivocate and look away from Vladimir Putins murderous assault on Ukraine; we have all heard the reasons arms supplies, hydrocarbons and Raj Kapoor that bind Russia and India. Surely, this isnt the most appropriate of times to point to the economic and digital sanctions on Russia and use this global crisis to tout a pet project of atmanirbhar or sovereign internet for India, as Chandrashekhar is doing.
The minister may want to do his homework on the content peddled on Russias version of the sovereign internet to appreciate the farce that it can rapidly become. Putin has used his propaganda engine to create a fantasy about what is going on next door. The Kremlin-controlled media have orchestrated a narrative about genocide against the Russian-speaking population in Ukraine and reports of Russian soldiers being welcomed as liberators by grateful Ukrainians. No images of the ruins of Mariupol or of millions of refugees are shared with Russian viewers. Terms such as war or invasion, are criminalised. Independent media have been taken off the air along with Facebook, Instagram and Twitter.
How far does the minister propose India ought to go to stand up for its sovereign internet? Will it be just about establishing regulations governing data localisation, building cyber security defences along with data protection and governance or does he have plans to orchestrate a parallel internet along the lines of China, North Korea and, now, Russia and other digital outcasts? He is reported to have also expressed great confidence in Indias ability to carry on if it were ever cut off from other key networks such as the SWIFT service used to execute international banking transactions if, as he says, India ever found itself in a position similar to Russia. There seems to be something profoundly wrong in making contingency plans in case todays India becomes tomorrows Russia.
Already, there are too many worrying parallels between Russias and Indias attempts to shake free of the US Big Techs hegemony. This is ironic given that the granddaddy of hegemons, Google, was co-founded by a Moscow-born and is presently led by a Madurai-born. In February of this year, as the invasion of Ukraine commenced, Russian authorities issued warnings to Google and other major platforms to comply with a so-called landing law requiring each to set up legal entities in Russia with employees in-country. These employees would be subject to fines and arrest if they did not comply with the governments orders to take down any content the government deemed unworthy of public consumption.
Now, where might we have seen this landing law playbook used before? India, of course, where a similar mandate had been put in place in February 2021, requiring the major platforms to have several officials in India to address the governments complaints: A chief compliance officer, a nodal contact person and a resident grievance officer, along with an office with an Indian address. Platforms were given three months to comply and the chief compliance officer would be criminally liable for content on the platform.
Besides the shared fondness for enforcing local office addresses, Russia and India also seem to have in common a predilection for singling out one of the major platforms for special treatment: Twitter. Even before it along with several other platforms was banned altogether this month, the Russian government had started slowing access to Twitter about a year before. The excuse? The Russian regulator, Roskomnadzor, had accused Twitter of failing to remove content relating to illegal drug use, child pornography and encouraging teen suicide.
Likewise, in India, Twitter felt the heat of the states attention last year. In May 2021, its offices in New Delhi were raided by a police squad normally focused on investigating terrorism and organised crime. No doubt, posts about the farmers protests had something to do with the visit by the police. The government had demanded the blocking of 500 accounts, including those of journalists, activists, opposition leaders and of JazzyB, a rapper. Twitter did so, and then eventually reversed course only to be slapped with a non-compliance notice.
My guess is that Twitter makes for an ideal target in both countries. It is not that widely used, so blocking it or slowing it down does not necessarily provoke public outrage. It is used by the elite, precisely the kind of annoying people the government would prefer to silence. It is a prominent platform, so any action taken on Twitter sends a signal to the other digital platforms to fall in line or else.
It is time for Indias path to diverge from that of Russias. As things stand, India must walk a tightrope: Not condemning Russia while not condoning its atrocities; acknowledging the agony of Ukraine, while averting its eyes from the unfolding disaster; remaining a bystander to history or risking being trapped as White House spokesperson Jen Psaki put it on the wrong side of history. It is inspiring to see if ones version of the internet permits it ordinary Ukrainians picking up arms for the first time in their lives to defend their cities, to protect what is left of their lives and livelihoods and to keep an open internet running in their country.
This is one chance that Chandrashekhar and other senior government officials in India have to be unequivocal about three principles:
First, democracies must stand by the idea that media that spreads disinformation in order to keep an unjustified war going must be curbed.
Second, Atmanirbhar Internet is an oxymoron; the internet, by definition, is a globally connected digital common. Knowledge relies on the freedom of expression and the freedom to draw upon others.
Third, if India must really push for self-reliance, it might be better off making plans to break free of its disproportionate reliance on Russian weapons and hydrocarbons. It might also help India freely express what it feels for Ukraine and its people, and equivocate less about how it feels about Russia.
This column first appeared in the print edition on March 30, 2022 under the title Atmanirbhar internet. The writer is Dean of Global Business at The Fletcher School at Tufts University
Go here to see the original:
The folly of an atmanirbhar internet - The Indian Express
How pulling out of Russia’s internet could further isolate its citizens – Big Think
Since the beginning of Russias full-scale invasion of Ukraine on February 24, the nations internet has become increasingly detached from the rest of the world. This shift is being driven by both western tech firms ending their services in Russia and by the Kremlin itself, which has been tightening its grip over the information its citizens can access.
Recently, NATO has increasingly accused Russia of cyberattacks and misinformation campaigns, with threats of retaliation if they continue. As a result, the Kremlin has perceived an increasing urgency to guard its internet against servers outside of its control.An isolated Russian internet may sound like a drastic and damaging step, but it is one that the country has been anticipating for some time.
As early as 2010, Russia launched its own operating system in an effort to reduce its dependence on Microsoft products. In 2017, the nation announced plans to create its own Domain Name System (DNS), which acts as a phonebook for cataloguing internet domain names. DNS root servers are currently overseen by 12 different organizations, but none are based in Russia. Even further, the Kremlin had begun to force tech companies like Facebook and Google to store data on Russian citizens inside Russia, for easy access by state officials.
Subscribe for counterintuitive, surprising, and impactful stories delivered to your inbox every Thursday
In 2019, President Vladimir Putin signed into law a plan to create an independent Russian internet space called RuNet. Under this plan, internet providers would be forced to reroute traffic to state-approved exchange points, which are managed by telecom watchdog Roskomnadzor. This would allow the Russian internet to continue operating even if their servers were cut off from the rest of the world.
The plan didnt come to fruition immediately, and was further delayed by the Covid-19 pandemic in 2020. But between June and July 2021, Russia conducted a test of a fully isolated RuNet, involving all major telecoms firms in the country. From the outside, it wasnt immediately clear how long this disconnection lasted, or if it had any significant impact on internet traffic. Still, the Kremlin deemed the experiment a success.
Under the legislation signed by Putin, Roskomnadzor was given sweeping controls over how Russias citizens can use the internet. Immediately, critics became concerned that a completely isolated RuNet would allow the Kremlin to massively ramp up its efforts in surveillance and censorship.
At the time, it wasnt clear whether Russia was actually planning to isolate its internet in the near future. But since the beginning of Russias full-scale invasion of Ukraine, that may have now changed. Over the past few weeks, the Kremlin has blocked access to Facebook, Twitter, and international news sites, on which Russian internet users could read and share information not approved by the Kremlin.
While this has generated a surge in demand for VPN apps, Roskomnadzor has ordered Google to remove tens of thousands of VPN-related search results, making it far more difficult for internet users to circumvent these barriers.
The dismantling of Russians access to information hasnt been triggered entirely by Russia itself. As western nations move to place the harshest possible sanctions on Russia, its citizens are seeing a steady decline in online services such as Facebook, Twitter, global news sites, and streaming services like Netflix and Amazon Prime Video. Some western internet providers, including the US-based Cogent, are even cutting off their Russian customers entirely.
In contrast, some organizations, including the digital security company Cloudfare, maintain the view that ending services for Russian customers will only make it harder for them to access outside information. This may only accelerate the ability of Russias government to isolate and control its internet further.
Ultimately, the situation places western tech firms in an extremely difficult position, with no clear solution for now. On one side, pulling out of Russias internet could diminish its ability to unleash cyberattacks and misinformation campaigns. On the other, the move could accelerate the isolation of RuNet, and strengthen the Kremlins control. For Russias citizens, this can only make it far more difficult to access the resources they need to oppose their governments actions.
Here is the original post:
How pulling out of Russia's internet could further isolate its citizens - Big Think
Internet Security Market Size, Share, Trend Projected to Deliver Greater Revenues during the Forecast Period 2021-2030 Business Merseyside – Business…
Internet threats have evolved as a global problem and have spread across various geographies. The main objective of Internet security solutions is to protect the systems and networks against cyber-attacks. Increasing number of advanced network threats, such as virus, spam, malware, and others, have led the Internet security solution providers to develop advanced products.
Increasing usage of Internet across every sector has increased the vulnerability of virus attacks, spams and others, which could severely impact system functionality and business operations. Several sectors, such as finance, infrastructure, transportation, telecommunication, and defense and research institutes, have become the prime targets of the cyber-attacks. Internet security solutions protect computing systems to ensure flawless execution of operations and prevent damage and loss that might arise from any kind of cyber-attack.
Request To Download Sample of This Strategic Report:-https://reportocean.com/industry-verticals/sample-request?report_id=30974
Market Statistics:
The file offers market sizing and forecast throughout 5 primary currencies USD, EUR GBP, JPY, and AUD. It helps corporation leaders make higher choices when foreign money change records are available with ease. In this report, the years 2020 and 2021 are regarded as historic years, 2020 as the base year, 2021 as the estimated year, and years from 2022 to 2030 are viewed as the forecast period.
This report presents a detailed view on the world Internet security market. The market growth is driven by several factors, such as cloud-based business operations, increase in the number of online financial transactions, and growing use of Internet due to wireless availability and enhanced connectivity. The presence of pirated software and lack of awareness about utilizing Internet security features among the consumers, act as the key restraining factors.
However, the market is expected to witness constant growth with increasing number of Internet applications, such as e-commerce and e-governance and growing awareness and for efficient security solutions. Additionally, increasing adoption of managed security solutions offered by various companies would foster the growth of Internet security market. The major companies operating in this market include IBM, Intel, Symantec, and HP among others. These top players have primarily adopted product launch, product enhancement, and acquisition strategies in order to enhance their market share in world Internet security market.
Get a Request Sample Report with Table of Contents:https://reportocean.com/industry-verticals/sample-request?report_id=30974
The world Internet security market is segmented into product & services, technology, application, and geography. Based upon product & services, the market is further segmented into hardware, software, and services. The application segment highlights the importance and usage of Internet security solutions in BFSI, retail, telecom & IT, manufacturing, and education, among others. Furthermore, Internet security market is segmented on the basis of technology, which includes authentication, access control, content filtering, and cryptography. In addition, the report segments the world Internet security market based on different regions, which include North America, Europe, Asia-Pacific and LAMEA.
KEY BENEFITS
The report provides an overview of the international markets, with special reference to market trends, market structure, driving factors, scope, opportunities and the challenges in the Internet security marketPorters Five Forces model is used to analyze the potency of buyers and suppliers and the competitive structure of the marketThe segmental study of the global market provides a comprehensive overview of various security technologies along with their applications across different geographiesThe report identifies major drivers, opportunities, and restraints, which boost the market and provides an impact analysis for the forecast periodValue chain analysis provides a systematic study of the key intermediaries involved, which could assist the stakeholders in formulating appropriate strategies
According to Statista, as of 2021 data, the United States held over ~36% of the global market share for information and communication technology (ICT). With a market share of 16%, the EU ranked second, followed by 12%, China ranked third. In addition, according to forecasts, the ICT market will reach more than US$ 6 trillion in 2021 and almost US$ 7 trillion by 2027. In todays society, continuous growth is another reminder of how ubiquitous and crucial technology has become. Over the next few years, traditional tech spending will be driven mainly by big data and analytics, mobile, social, and cloud computing.
Get a Request Sample Report:https://reportocean.com/industry-verticals/sample-request?report_id=30974
This report analyses the global primary production, consumption, and fastest-growing countries in the Information and Communications Technology (ICT) market. Also included in the report are prominent and prominent players in the global Information and Communications Technology Market (ICT).
INTERNET SECURITY MARKET KEY SEGMENTS
The world Internet security market is segmented into product & services, technology, application, and geography.
Market by Product & Service
HardwareSoftwareServices
Market by Technology
Authentication technologyAccess control technologyContent filteringCryptography
Market by Application
BFSIRetailTelecom & ITGovernmentManufacturingEducationAerospace, defense, & intelligenceOthers
Request full Report-https://reportocean.com/industry-verticals/sample-request?report_id=30974
Market by Geography
North AmericaEuropeAsia-PacificLAMEA (Latin America, Middle East and Africa)
Key Players
International Business Machine (IBM) CorporationHewlett Packard (HP) CompanyMicrosoft CorporationCISCO Systems, Inc.Google IncorporationIntel Corporation (McAfee, Inc.)Symantec CorporationTrend MicroKaspersky LabDell (SonicWall, Inc.)
What is the goal of the report?
The market report presents the estimated size of the ICT market at the end of the forecast period. The report also examines historical and current market sizes.
During the forecast period, the report analyses the growth rate, market size, and market valuation.
The report presents current trends in the industry and the future potential of the North America, Asia Pacific, Europe, Latin America, and the Middle East and Africa markets.
The report offers a comprehensive view of the market based on geographic scope, market segmentation, and key player financial performance.
Inquire or Share Your Questions If Any Before the Purchasing This Report https://reportocean.com/industry-verticals/sample-request?report_id=30974
Focuses Covered in the Report:
The focuses examined in the report are the significant market players who are associated with the market like market players, unrefined substance providers, gear providers, end clients, brokers, merchants, etc.
The full profile of the organizations is cited. Furthermore, the limit, creation, cost, income, cost, gross and gross edge, deals volume, deals income, utilization, development rate, import, send out, offer, future systems and innovative improvements they are completing are additionally remembered for the report. This report investigated 8-year information history and figures.
The development variables of the market are talked about exhaustively where the different end clients of the market are clarified exhaustively.
Data and data by market player, by district, by type, by application, etc, and altered searches can be added in view of explicit necessities.
The report contains the SWOT investigation of the market. At long last, the report contains the finishing up part which incorporates the assessments of the modern specialists.
Targets of Market Report:
Characterize, depict and conjecture 2030, by type, application, end client and district.
Give venture outside climate examination and PESTEL investigation.
Give systems to organization to manage the effect of COVID-19.
Give market dynamic investigation, including market driving variables, market advancement requirements.
Give market passage technique examination to new players or players who are prepared to enter the market, including market section definition, client investigation, circulation model, item informing and situating, and cost system investigation.
Stay aware of global market drifts and give examination of the effect of the COVID-19 plague on significant districts of the world.
Examine the market chances of partners and give market pioneers subtleties of the serious scene.
The report conveys an exhaustive investigation of the relative multitude of portions and offers data with respect to the main districts on the lookout. This report additionally states import/send out utilization, organic market Figures, cost, industry share, strategy, value, income, and gross edges.
Access full Report Description, TOC, Table of Figure, Chart, etc. @https://reportocean.com/industry-verticals/sample-request?report_id=30974
About Report Ocean:We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.
Get in Touch with Us:Report Ocean:Email:sales@reportocean.comAddress: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATESTel:+1 888 212 3539 (US TOLL FREE)Website:https://www.reportocean.com
See the original post here:
Internet Security Market Size, Share, Trend Projected to Deliver Greater Revenues during the Forecast Period 2021-2030 Business Merseyside - Business...
5 types of cybersecurity tools every admin should know – TechRepublic
Image: Adobe Stock
Security of networks and systems is something every business and administrator should take very seriously. After all, without solid security policies, plans and tactics in place, it wont be long before youre recovering from a disaster that could leave your data exposed to neer-do-wells (or worse).
Anyone in this industry fully understands that its only a matter of time before a company has to deal with a security breach. But anything and everything you can do to mitigate such a situation should be considered a must. To that end, what tools should your admins know about to keep your company, systems, users and data safe?
SEE: Google Chrome: Security and UI tips you need to know (TechRepublic Premium)
I have a shortlist of five types of tools your admins must know (and use) to keep tabs on your desktops, servers and networks. With this list, you should be able to piece together a toolkit thats perfectly suited to help fill out a solid foundation of security for your company.
With that said, lets get on with the list.
Pentesting tools (a.k.a. penetration testing tools) are an absolute must for gauging the security of your systems. These tools mimic various types of attacks on your devices to see if they can break through the defenses youve set up. These tests will reveal vulnerabilities you otherwise might not have ever known about. If your company doesnt already employ a pentester (otherwise known as an ethical hacker) this is a position you should definitely consider bringing in. Why? Because admins might not have time to learn the ins and outs of pentesting, nor might they have the time to run these types of tasks regularly.
There are quite a large number of pentesting tools (such as Metasploit, John the Ripper, Hashcat, Hydra, Burp Suite, Zed Attack Proxy, sqlmap and aircrack-ng), however, your best bet might be to use a full-blown operating system geared specifically for penetration testing (such as Kali Linux), which will include most of the pentesting tools youll need for successful vulnerability tests.
Although a good pentesting distribution will include most of what you need to do vulnerability assessment, you might not have someone on staff with the knowledge or skills to use those tools. In that case, you could turn to a security auditor/vulnerability assessment tool. Where pentesting allows your admins to run very specific tests against your systems, these tools are more general and will run wide, sweeping tests against your operating systems and installed applications for vulnerabilities.
One of the benefits of auditor/assessment tools is that many of them will report back to you with ways you can resolve the issues at hand. Some auditor/vulnerability tools will even display what CVE vulnerabilities it has found (which will allow you to do further research into how the issue(s) can be resolved. A shortlist of security auditor/vulnerability assessment tools include Nikto2, Netsparker, OpenVAS, W3AF, OpenSCAP, SolarWinds Network Vulnerability Detection, Tripwire IP360, Nessus Professional, Microsoft Baseline Security Analyzer, Acunetix, ManageEngine Vulnerability Manager Plus and Intruder.
For those whove never scanned a network, youd be absolutely shocked to see how much traffic is coming and going on your network. Most of that traffic is probably legit but not all of it. How do you tell which is which? One way is by using a network scanner. These tools make it possible for you to not only view all of your network traffic but also track specific packets, watch only certain machines, or source/destination IP addresses.
A network scanner is an absolute must for any security administrator looking to keep their network as secure as possible. Although these tools wont suggest fixes or reveal software vulnerabilities, they do a great job of helping security pros track down systems that have been targeted by hackers and (sometimes) can help lead you to the source of the hacking. Some of the best network scanners include Wireshark, nmap, Site24x7 Network Monitor, PRTG Network Monitor, Angry IP Scanner, IP Scanner by Spiceworks.
SEE: Best Encryption Software 2022 (TechRepublic)
A firewall should be considered an absolute must. With a firewall on your network, you can block specific traffic (coming or going), blacklist certain IP addresses or domains and generally prevent unwanted traffic/packets from entering your systems. Of course, most operating systems include their own firewalls but some of those are either too complicated or not powerful enough to meet the growing needs of your company. Should you find that to be the case, you might consider deploying a firewall device, built specifically to protect your network.
Although these devices can be costly, the results they deliver are often worth the spend. For enterprise businesses, a firewall becomes even more important (especially with sensitive company/client data housed within your network). The best firewall devices on the market include Cisco ASA, Fortinet FortiGate, Palo Alto Networks Next-Generation PA Series, Cisco Meraki MX and Zscaler Internet Access.
Intrusion detection is exactly what it sounds likea tool to alert admins when an intruder has been detected within a network or system. Many of these types of tools go beyond simple alerts and will automatically lock out suspect IP addresses (for instance, after X number of failed login attempts).
Intrusion detection systems monitor network traffic for suspicious activity and act according to how theyve been configured. These automatic systems are a great first line of defense against hackers, but shouldnt be considered the be-all-end-all for your security. Deploy an IDS and let it do its thing, but understand that every piece of software is fallible (ergo, youll want to employ other forms of security). However, having a good intrusion detection system working for you is an absolute must as the first line of defense. Some of the best IDSs include CrowdStrike Falcon, Snort, Fail2Ban, AIDE, OpenWIPS-NG, Samhain and Security Onion.
Read the original post:
5 types of cybersecurity tools every admin should know - TechRepublic
Trend Micro Internet Security – Wikipedia
Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program developed by Trend Micro for the consumer market. According to NSS Lab comparative analysis of software products for this market in 2014, Trend Micro Internet Security was fastest in responding to new internet threats.[1]
In addition to anti-malware and web threat protection, the premium version of this software includes compatibility for PCs, Macs, Android or iOS mobile devices; parental controls; identity theft prevention; a privacy scanner for major social networking sites; and 25 GB of cloud storage.[2]
Features in Trend Micro Internet Security 2015 include:[2][3]
The software also includes:
Trend Micro Premium Security includes additional features, including:
AV-Comparatives awarded Trend Micro a three-star Advanced + ratingthe highest ranking given by the organizationin AV-Comparatives Whole Product Dynamic Real-World Protection Test for 2014.[4]
AV-TEST in October 2014 gave Trend Micro Internet Security 2015 a score of 17 out of a possible 18 points.[5]
Trend Micro Maximum Security scored the highest success rate in blocking malware downloads in NSS Labs 2014 Consumer Endpoint Protection test focused on Socially Engineered Malware. The results were based on continuous series of tests to determine the participants effectiveness against socially engineered malware. NSS Labs is an independent network testing facility, security and consultancy organization. NSS Labs also found that Trend Micro had the quickest time in adding protection against unknown threats - less than 15 minutes.[1]
In January 2016 it was discovered that the consumer version of Trend Micro AV allowed any website visited by its users to execute arbitrary code or read all browser passwords on the Windows PC it purportedly protected. A patch was later issued to close the issue.[6]
In June 2014, AV-Test published results for its mobile security endurance tests, which assessed more than 30 apps over a six-month period. Trend Micros mobile security tied for the highest overall score of 13 out of 13 points.[7]
Previous versions include:
As of January 2015, Trend Micro supported Trend Micro Internet Security versions 19/2011 and higher.[8]
PC-cillin 2000 and earlier versions were virus scanners without any additional features. PC-cillin 2002 and 2003 were stand-alone virus scanners which also included a firewall component and improved on the softwares scanning and virus detection engine. Newer versions of Trend Micro Internet Security offer additional features such as spyware protection, antispam and an integrated firewall along with an improved scanning and virus detection engine and enhanced heuristics. PC-cillin 2003 was the last stand-alone antivirus product offered by Trend Micro until 2007, when the company released a standalone anti-malware product that offered protection from malicious software including viruses, spyware, and adware.
Read moreTrend Micro HomePage
The rest is here:
Trend Micro Internet Security - Wikipedia
Cyber security expands at IC with Duo authentication – Ithaca College The Ithacan
Ithaca College staff, students and faculty can expect to find an extra step when logging into Zoom and Formstack Forms. Duo Multi-Factor Authentication (MFA) will now be required to prevent accounts from being compromised.
The changes were announced over Intercom, with Zoom requiring Duo MFA on March 17. Formstacks Duo MFA implementation was originally scheduled for March 16, but was pushed back to March 21. When logging in, students will now be expected to answer a phone call or go into the Duo app in order to log into Zoom. Ithaca College is one of more than 300 educational institutions that uses Duo MFA for its programs.
MFA is an electronic authentication method that is gaining popularity with companies including Bank of America, Facebook and Microsoft. For security purposes, it requires users to use two or more identity verification factors in order to gain access to a website or application. This multi-step verification process helps to reinforce security, while usernames and passwords remain vulnerable to cyber-attacks and being stolen by third parties.
While Zoom was highly utilized during the COVID-19 pandemic, it also experiences a form of cyber-attack known as Zoombombing, a practice in which internet trolls hijack calls inserting lewd, obscene, racist, misogynistic, homophobic, Islamophobic or antisemitic material. Zoombombings have occured during classes at the college in the past. Proven methods to prevent this include not sharing Personal Meeting IDs when hosting public events, asking users to provide their email address when registering for an event and MFA.
At IC, we will continue to add Duo protection to systems wherever login is required, while also continuing enhancements to our single sign-on systems to reduce how often individuals are prompted to authenticate, Jason Youngers, information security officer for Information Security and Access Management said via email.
While there have been no immediate threats to security in these programs, David Weil, chief information officer for Information Technology, said the changes were made because of MFAs ability to deter hacking and to better protect all student, staff and faculty accounts.
It really has been shown to be a very strong deterrent to having an account be compromised, Weil said. And industry best practices is really recommending that wherever possible, you should put MFA in front of all logins it really is another layer of protection.
Duos move to Zoom and Formstack was news to some students. Senior Nicholas Isaacs said he was surprised to find out that he would be required to use Duo to log into Zoom. For Isaacs, the change is not entirely welcome.
I just think its too many extra steps, Isaacs said. I think that both platforms have enough security but I can see why the college is doing it. But from a practical standpoint, its really not the best.
For some students, the process of logging in with MFA is tedious. Whenever sophomore Devan Adegbile was without her phone, she said logging into websites became more difficult.
Sometimes I just quickly want to look something up [on Degree Works] on my computer and I need to get my phone, but its all the way in a different room, so its a little inconvenient for me, Adgebile said.
Isaacs similarly said the process of moving between computer and phone to login has created problems for him in the past. In one instance, Isaacs said he was unable to login because his phone had died and he was not able to access Duo Mobile.
Theres been cases where my phones been off and [I] havent been able to get in, Isaacs said. I have to charge my phone before I can get in and I just couldnt get into the account, so that was a big inconvenience. But other than that, if you have your phone on, then maybe [logging in is] 30 seconds more at most.
Duo offers a way to speed up the login process by allowing users to remain logged in for 90 days. Whenever a user is asked to use Duo, Weil said it was to ensure the person using the device is who they say they actually are.
On my computer that Im using right now, I have not been asked to use Duo at all today, Weil said. If I were to use a different machine, its going to be Oh, I dont know who you really are, let me challenge it. I know it can be a little frustrating, but its using intelligence behind the scenes its not just arbitrarily asking.
For sophomore Jesus Burgos, using Duo is just another part of his login process which is why he said he did not mind the addition of Duo to Zoom and Formstack. Instead, he saw it as an opportunity to further prevent Zoombombings.
If you get hacked or if someone knows your password, that doesnt mean theyre going to be able to get into your account, Burgos said. I hope that people here are more mature and that [Zoombombings] wouldnt happen in Zoom meetings and at Ithaca College.
More:
Cyber security expands at IC with Duo authentication - Ithaca College The Ithacan