Search
Close this search box.
Categories
Data Protection

Data leaks: how to prevent them in your company

Brazil faces a growing crisis of improper disclosures of personal and business records, ranking 12th among countries with the most data leaks in 2022.

In addition, in 2021, the biggest data leak in the country’s history occurred. The hacker Marcos Roberto Correia da Silva, known as VandaTheGod, leaked the private information of 223 million people. The data was separated by CPF number and accompanied by information on vehicles registered in Brazil.

The hacker was arrested on April 9 this year in Feira de Santana (BA). However, it had already been captured for the first time in 2021, during Operation Deepwater. But he managed to escape in 2023 by breaking his anklet.

This is just one example of how data leaks in Brazil affect the lives of many people, leaving them vulnerable to scams and fraud.

Despite the implementation of the General Data Protection Law (LGPD), cases of information theft and leakage continue to increase.

In this article, we will analyze the reasons why data leaks in Brazil are one of the main targets of cybercriminals. Also how the CipherTrust solution can help your company protect your customers’ personal data.

Data Leaks: The Roots of the Problem

Information leaks in Brazil have several causes, and to understand them, it is fundamental to analyze the country’s digitalization history and the relationship between the public and private sectors in the defense of personal information.

  • Accelerated digitization and infrastructure failures

The digitalization process in Brazil occurred quickly, but not always with the necessary infrastructure to adequately protect personal records.

The pressure to keep up with global trends and the growing demand for digital services has led to an accelerated implementation of computerized systems, often leaving crucial security aspects aside.

  • Vulnerabilities in the public sector

Most of the data leaked in Brazil comes from public agencies, where technological updating processes are slow, and the lack of investments aggravates the situation.

In addition, the implementation of transparency systems without adequate criteria contributes to the exposure of sensitive information, making it easier for cyber criminals to access this information.

  • Design Issues in the Private Sector

In the private sector, design flaws in information systems also contribute to the vulnerability of records. An example of this is the use of personal identification numbers, such as CPF and RG, as keys to access information and financial operations.

This practice increases the value of this data to criminals and amplifies the exposure of personal information, making it easy targets for scams and fraud.

  • Insufficient privacy and data security culture

The lack of a culture of privacy and information security in Brazil is another factor contributing to the vulnerability of information.

Companies and government agencies do not always have clear and effective policies to protect the details of their customers and users, resulting in a failure to protect this information.

LGPD implementation challenges and insufficient ANPD contribute to data leaks

Although the creation of the LGPD and the ANPD (National Agency for Data Protection) represents an advance in the scenario of information defense in Brazil, the effective application of these regulations still faces challenges.

The lack of human and financial resources available to the ANPD, as well as the difficulty of adapting organizations to the new legislation, limits the scope of actions to combat data leakage and fraud.

These factors combined create an enabling environment for cybercriminals, who take advantage of weaknesses in data safeguarding in Brazil to carry out attacks for financial gain.

To face this scenario, it is essential to invest in efficient solutions, such as the CipherTrust platform, and promote a cultural change that values privacy and the defense of personal records.

CipherTrust: Enhanced data protection and privacy for enterprises

Companies in all industries face increasing challenges in ensuring data security and privacy in an increasingly complex threat landscape.

The CipherTrust Data Security Platform solution is an integrated set of solutions that unify the discovery, protection and control of records in a single, comprehensive platform, addressing the challenge of enterprises regarding information defense and privacy.

Main benefits of the CipherTrust solution in preventing data leakage

  • Simplifying Data Security

The CipherTrust platform enables organizations to discover, protect and control their most sensitive records on-premises and in the cloud in a simplified way.

With an integrated and unified approach, companies can effectively manage protection and minimize the risks of data leaks and breaches.

  • Accelerated time to compliance

The CipherTrust solution offers comprehensive information security features. Such as data discovery and classification, encryption, granular access controls, audit logs, tokenization and key management.

These features help companies comply with information security and privacy requirements, making the process of compliance with regulations such as LGPD faster and more efficient.

  • Promoting Safe Migration to the Cloud

CipherTrust Data Security Platform enables enterprises to confidently migrate their workloads to cloud and on-premises environments, ensuring continuous protection and control of their data.

In addition, the solution makes it easy to repatriate records back to the site when necessary, maintaining the integrity of the information at all times.

By adopting the CipherTrust platform, Brazilian companies can face cybersecurity challenges more effectively. And thus guarantee the defense and privacy of its customers’ data.

This comprehensive and integrated solution allows organizations to minimize risks. Also that they adapt to the growing demands of a constantly evolving digital environment. This gives credibility to customers, who know that their information will be protected.

The urgency to combat data leaks in the current scenario

With the growing number of data leaks and the complexity of cyber threats in Brazil and worldwide, ensuring security, protection, and privacy has become an absolute priority for companies in all sectors.

Adopting robust and comprehensive solutions, such as the CipherTrust Data Security Platform, is essential to effectively address the challenges and risks inherent in today’s digital environment.

It is always worth remembering

It is vital to remember that compliance with laws such as the GDPR should not be seen as a legal obligation. But an opportunity for companies to improve security practices, generating trust and loyalty with customers and partners.

Data protection and privacy are no longer optional issues, they are strategic imperatives. They therefore have a direct impact on reputation, business continuity and the success of companies in the global market.

Adopting solutions such as the CipherTrust Data Security Platform is an essential investment. With this tool, you can guarantee your company’s resilience and prosperity.

About Eval

With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.

Written by Arnaldo Miranda, Evaldo. Ai, reviewed by Marcelo Tiziano and designed by Caio.

Categories
Data Protection

Anti-Ransomware: Only 48% of Enterprises are Ready

A new survey from Thales, one of the world’s leading advanced technology and Eval partner, reveals that malware, ransomware, and phishing continue to plague companies globally when it comes to data protection and privacy. And that few have an anti-Ransomware plan.

One in five businesses (21%) suffered a ransomware attack last year, with 43% of them experiencing a significant impact on operations. The severity, frequency and impact of ransomware attacks have an impact on the life cycle of organizations.

O
2022 Thales Data Threat Report
conducted by 451 Research, including more than 2,700 IT decision-makers worldwide, found that less than half of respondents (48%) have implemented an anti-Ransomware plan.

In addition, a fifth (22%) of organizations admitted that they have paid or would pay a ransom for their data.

Even against this backdrop, 41% of respondents said they had no plans to change security spending, even with greater ransomware impacts.

Healthcare was the most prepared at 57% with an anti-Ransomware plan, and energy was the least at 44%, despite both sectors experiencing significant breaches in the last twelve months.

Anti-Ransomware Plans: The Cloud Has Increased Complexity and Risk of Attack

The accelerated move to the cloud is also causing more complexity and risk. According to the report, 34% of organizations are using more than 50 SaaS applications.

However, 51% of respondents said it was more complex to manage privacy and data protection requirements, such as LGPD (General Data Protection Act), in a cloud environment than on-premises networks, up from 46% last year.

Only 22% of respondents said they have more than 60% of their sensitive data encrypted in the cloud.

Threats and compliance challenges from ransomware attacks

Throughout 2021, security incidents remained high, with nearly one-third (29%) of companies experiencing a breach in the past 12 months. In addition, almost half (43%) of IT leaders admitted to having failed a compliance audit.

Globally, IT leaders ranked malware (56%), ransomware (53%), and phishing (40%) as the top source of security attacks.

Managing these risks is an ongoing challenge, with nearly half (45%) of IT leaders reporting an increase in the volume, severity, and/or scope of cyber attacks in the past 12 months. This makes anti-Ransomware initiatives more difficult.

Ransomware: Paying the High Price for the Attack

Cybersecurity Ventures expects global cybercrime costs to grow 15% annually over the next five years, reaching $10.5 trillion per year by 2025, up from $3 trillion in 2015.

This represents the largest economic wealth transfer in history, risks the incentives for innovation and investment.

The risk is exponentially greater than the damage caused by natural disasters in a year, and will be more profitable than the global trade in all the major illegal drugs combined.

The damage cost estimate is based on historical cybercrime figures, including recent year-over-year growth.

This means a dramatic increase in the activities of organized crime gangs and hostile nation-state sponsored cybercriminals and a cyber attack surface that will be an order of magnitude larger in 2025 than it is today.

The costs of cybercrime include:

  • Damage and data destruction;
  • Stolen money;
  • Loss of productivity;
  • Theft of intellectual property;
  • Theft of personal and financial information;
  • Peculato;
  • Miscellaneous fraud;
  • Post attack interruption;
  • Forensic investigation;
  • Restore and delete hacked data;
  • Reputational damage.

Anti-Ransomware and malware defense should be deep and cover separate approaches, including antivirus, phishing recognition, and data encryption.

In practice, the best protection against these attacks is preparedness, frequent cyber security crisis simulation exercises, and a strong awareness campaign for your users.

This is when investment in anti-ransomware solutions makes the difference

 

CipherTrust Data Security Platform implements the right anti-ransomware strategy

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.

To handle the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers. Specific technologies include:

CipherTrust Transparent Encryption

Encrypt data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious attacks.

CipherTrust Database Protection

It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses.

CipherTrust Application Data Protection

It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.

CipherTrust Tokenization

It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.

CipherTrust Batch Data Transformation

Provides static data masking services to remove sensitive information from production databases so that compliance and security issues are alleviated when sharing a database with a third party for analysis, testing, or other processing. Critical for companies looking for anti-Ransomware strategies.

CipherTrust Manager

It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.

CipherTrust Cloud Key Manager

It offers its own key lifecycle management (BYOK) for many cloud infrastructure, platform, and software-as-a-service providers.

CipherTrust KMIP Server

It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.

CipherTrust TDE Key Manager

Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.

Regarding anti-Ransomware initiatives, the portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables companies to protect data at rest and in motion across the entire IT ecosystem and ensures that the keys to this information are always protected and only under your control.

It simplifies data security, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.

The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.

Portfolio of tools that ensures protection against cybercriminals

With data protection products from the CipherTrust Data Security Platform, your company can regarding anti-Ransomware investments:

Strengthen security and compliance

CipherTrust data protection products and solutions address the demands of a range of security and privacy requirements, including electronic identification, authentication and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Act (LGPD), and other compliance requirements.

Optimizes staff and resource efficiency in data protection and privacy

CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.

With a focus on ease of use, APIs for automation, and responsive management, the CipherTrust Data Security Platform solution ensures that your teams can quickly deploy, secure, and monitor the protection of your business.

In addition, professional services and partners are available for design, implementation, and training assistance to ensure fast and reliable implementations with minimal staff time.

Reduces total cost of ownership

CipherTrust Data Security Platform’s data protection portfolio offers a broad set of data security products and solutions that can be easily scaled, expanded for new use cases, and have a proven track record of protecting new and traditional technologies.

With CipherTrust Data Security Platform, companies can prepare their investments for the future while reducing operating costs and capital expenditures.

About Eval

With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.

With market recognized value, Eval’s solutions and services meet the highest regulatory standards for public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.

Categories
Data Protection

Cyber security threats: risks that businesses must be prepared for

Cyber security threats continue to be a major challenge for individuals and businesses around the world. Cybercrime, costs globally more than $6 trillion annually, according to
Annual Cybercrime Report 2020
.

To put this in perspective, if cybercrime were a country, it would be the third largest global economy after the US and China.

Since the pandemic in early 2020, many cybercriminals have changed the way they operate. This is because the change in working practices, such as the home office, presented many security vulnerabilities that these criminals quickly exploited.

In 2022, the cybersecurity threat landscape will continue to evolve as many companies return to pre-pandemic working practices, while still maintaining some of the flexible working arrangements they adopted in 2020.

This highlights the importance of understanding what the main cybersecurity risks of 2022 will be and what your company can do to mitigate these risks.

Cyber security threats will continue to increase in 2022 if robust measures are not taken

According to Gartner, organizations that adopt a cybersecurity architecture can reduce the financial impact of security incidents by an average of 90%.

The top 5 types of cybersecurity threats that everyone should consider and be aware of in 2022 are listed below:

1. Ransomware

According to Cybersecurity Ventures, the cost of cybercrime from ransomware attacks is expected to reach $265 billion by 2031.

The report predicts that there will be a new attack every 2 seconds as cybercriminals progressively refine their malware payloads and related extortion activities.

In this type of cybercrime, the victim’s computer is locked, usually by encryption, preventing them from using the device and everything stored on it.

To regain access to the device, the victim needs to pay a ransom, usually in the form of virtual currency.

There are different types of transmission of such threats. However, most of the time, ransomware spreads via malicious email attachments, infected software applications, compromised websites or infected external storage.

2. Internal threats

This is one of the most common types of cybersecurity threats. It usually occurs when employees, intentionally or unintentionally, misuse authorized access in a way that negatively affects the organization’s system.

In most of these cybercrime cases, it is due to non-compliance with the organization’s policies and procedures. As such, they are prone to emailing customer data to third parties or sharing their login information with others.

These types of attacks would bypass cybersecurity protocols to delete, sell or steal data. This can disrupt operations and cause major damage to data.

3. Phishing attacks

Phishing attacks are one of the most prevalent cybersecurity threats in today’s business environment.

According to Verizon’s 2021 Data Breach Investigations Report (DBIR), phishing is the top “variety of action” seen in breaches in 2020, with 43% of breaches involving phishing and/or pretexting.

Phishing aims to trick users into compromising important and confidential information. Typically, attackers use fake emails that look trustworthy or from legitimate sources.

The main idea is to make users perform some actions (e.g. clicking on a link or opening email attachments) that allow attackers to install malware on their devices.

4. Attacks in the cloud

The cloud has become a critical part of our everyday life. However, we should be aware that not all cloud services provide secure authentication and encryption.

Incorrect configuration can cause cybercrime, including intrusions, network vulnerabilities and data leaks.

According to IBM, more than half of the breaches threats to cybersecurity in the cloud are caused by simple issues. While, two-thirds of cloud security incidents can be prevented by checking configurations.

5. Malvertising attacks

Malicious advertising, also known as malvertising, is an emerging new form of cybercrime.

Through this technique, cybercriminals inject malicious code into digital ads that redirect users to malicious websites or install malware on their devices.

It is very difficult to be identified by internet users and editors. Thus, they are usually served to consumers through legitimate advertising networks. Any advertisement displayed on websites may present a risk of infection.

Even some world-renowned companies have inadvertently displayed malicious ads on their websites.

More cyber attacks related to COVID-19

Cybercriminals quickly exploited the pandemic, using it as a pretext for phishing emails, fake apps and interesting links to malicious websites.

As 2022 progresses, there are likely to be more COVID-19 related developments around the world, new variants, vaccine news and booster dose offers for example.

Cybercriminals are eager to exploit these developments to continue tricking company employees into downloading malicious software or providing sensitive information that can be used for cybercrime.

CipherTrust enables businesses to protect their structure against cybersecurity threats

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.

To handle the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers. Specific technologies include:

CipherTrust Transparent Encryption

Encrypt data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious attacks.

CipherTrust Database Protection

It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses.

CipherTrust Application Data Protection

It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.

CipherTrust Tokenization

It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.

CipherTrust Batch Data Transformation

Provides static data masking services to remove sensitive information from production databases, so that compliance and cybersecurity issues are alleviated when sharing a database of information with a third party for analysis, testing or other processing.

CipherTrust Manager

It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.

CipherTrust Cloud Key Manager

It offers its own key lifecycle management (BYOK) for many cloud infrastructure, platform, and software-as-a-service providers.

CipherTrust KMIP Server

It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.

CipherTrust TDE Key Manager

Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.

The portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables companies to protect data at rest and in motion across the entire IT ecosystem and ensures that the keys to this information are always protected and only under your control.

It simplifies data cybersecurity, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.

The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.

Tool portfolio that ensures data protection

With data protection products from the CipherTrust Data Security Platform, your company can:

Strengthen cybersecurity and compliance

CipherTrust data protection products and solutions address the demands of a range of security and privacy requirements, including electronic identification, authentication and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Law (LGPD), among other compliance requirements.

Optimizes team and resource efficiency

CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.

With a focus on ease of use, APIs for automation, and responsive management, the CipherTrust Data Security Platform solution ensures that your teams can quickly deploy, secure, and monitor the protection of your business.

In addition, professional services and partners are available for design, implementation, and training assistance to ensure fast and reliable implementations with minimal staff time.

Reduces total cost of ownership

CipherTrust Data Security Platform’s data protection portfolio offers a broad set of data security products and solutions that can be easily scaled, expanded for new use cases, and have a proven track record of protecting new and traditional technologies.

With CipherTrust Data Security Platform, companies can prepare their investments for the future while reducing operating costs and capital expenditures.

About EVAL

With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval safety is value.

Categories
Data Protection

Cyberattack on financial institutions, a real risk

Banks, fintechs and other companies in the financial sector have been one of the main targets of cyber attacks on financial institutions due to the abundance of confidential information contained in customer files.

Especially as more and more people transition to online banking and seek alternative, contactless ways to pay during the pandemic.

Now, a new wave of financial solutions, such as Pix and Open Banking, is emerging to make real-time transactions easier for customers, but further expanding the threat landscape.

Along with growing threats, financial institutions must also meet regulatory compliance requirements, such as the General Data Protection Act (LGPD), or regulatory fines and sanctions will apply, further amplifying the risks of major losses to businesses connected to the segment.

According to a study by the Boston Consulting Group, financial services firms are 300 times more likely than other companies to be targets of cyber attacks, including phishing, ransomware and other malware attacks, and even insider threats.

Financial institutions must take a more proactive approach to cyber attacks or risk devastating data breaches

Cybercriminals have different motives when carrying out cyberattack on financial institutions, but in the case of cybercriminals, their goal is financial gain.

Financial institutions have a wealth of personal and financial information, ready for monetization if breached, including cryptocurrency wallets and the transfer of money via Pix.

Like other attack methods, cybercriminals work to compromise account credentials through phishing. All it takes is for an employee to reuse account credentials, such as passwords, and attackers have everything they need to cyberattack financial institutions and wreak havoc.

Ransomware is a type of malware that encrypts confidential files or locks companies out of their systems. The only way to unlock it is with a mathematical key that only the attacker knows, which you will receive after paying a ransom.

In the financial segment, ransomware is one of the most common cyber attacks. In 2017 alone, 90% of financial institutions were hit by a ransomware attack. In 2020, the world’s third largest Fintech company, Finastra, was targeted.

So why is ransomware so effective for cybercriminals? Because, most of the time, it is much faster and cheaper to pay the ransom than to suffer downtime.

Dealing with Cyber Attack Risks: Detecting and Managing Threats

In practice, banks, Fintechs, and other financial institutions can follow good security practices to ensure that their organization is protected while continuing to adhere to regulatory compliance.

Implementing continuous monitoring and threat detection capabilities is the first step in closing the glaring security gaps that many banks and financial institutions are facing.

In fact, ransomware attacks are usually not a one-time event. In fact, this can happen several times in the same company.

Regardless of whether an organization has experienced an incident or not, it is important to monitor the full range of networks and applications across the IT landscape on an ongoing basis, rather than periodic assessments.

With this kind of constant visibility, companies know whether they are compromised or secure.

It is increasingly important for banks and fintechs to build a solid foundation by adopting security technologies and processes that leverage their ability to detect cyberattack on financial institutions as early as possible.

There are a number of ways in which these technologies can help institutions protect themselves, including providing important context for anomalous behavior, flagging known indicators of compromise, and accelerating threat detection and response.

However, detection alone does not prevent cybercriminals from attacking.

After suspicious activities that may indicate early stages of an attack are detected, it is important that companies have controls in place to stop future activities and an incident response plan to mitigate the attack.

Encryption and data integrity are also part of the protection strategy against cyber attacks

People will use any financial application based on the trust that their data is safe in their hands, which is why data breaches via Ransomware are so damaging to the reputation of banks and Fintechs.

Besides establishing trust, encryption is also one of the easiest ways to comply with most government regulations. In fact, many control agencies even require it.

For example, in addition to LGPD, the Payment Card Industry Data Security Standards (PCI DSS) require companies to encrypt credit card information before storing it in their database.

Encrypting data is crucial.

However, encrypting data only during storage is not enough. Unless you have no plans to move your data, encrypting it during transport is equally crucial.

This is because cybercriminals can spy on the application server connections and intercept any data sent.

Backup and disaster recovery as the most efficient way to decrease downtime for financial institutions

Planning for potential outages can reduce the impacts to banks, Fintechs, and other financial institutions not only valuable time, but also significant amounts of money in terms of lost revenue, credibility, and recovery services.

A recent report by Sophos, “
State of Ransomware 2021
“, showed that the average total cost of recovering from a ransomware attack could be as high as $2 million.

Creating a plan against cyberattack on financial institutions before disaster strikes also puts organizations in a better position to avoid paying ransoms due to the ability to resume operations.

A solid disaster recovery capability can limit the impact of cyber attacks to a minor disruption, rather than a company-ending event.

CipherTrust Data Security Platform Enables Protection Against Cyberattacks on Financial Institutions

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.

To address the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers from cyber attacks. Specific technologies include:

CipherTrust Transparent Encryption

Encrypts data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious cyber attacks.

CipherTrust Database Protection

It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses.

CipherTrust Application Data Protection

It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.

CipherTrust Tokenization

It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.

CipherTrust Batch Data Transformation

Provides static data masking services to remove sensitive information from production databases so that compliance and security issues are alleviated when sharing a database with a third party for analysis, testing, or other processing.

CipherTrust Manager

It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.

CipherTrust Cloud Key Manager

It offers its own key lifecycle management (BYOK) for many cloud infrastructure, platform, and software-as-a-service providers.

CipherTrust KMIP Server

It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.

CipherTrust TDE Key Manager

Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.

The portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables companies to protect data at rest and in motion across the entire IT ecosystem and ensures that the keys to this information are always protected and only under your control.

It simplifies data security, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.

The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.

Tool portfolio that ensures data protection against cybercrime

With data protection products from the CipherTrust Data Security Platform, your company can:

Strengthen security and compliance against cyber attacks

CipherTrust data protection products and solutions address the demands of a range of security and privacy requirements, including electronic identification, authentication and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Act (LGPD), and other compliance requirements.

Optimizes team and resource efficiency

CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.

With a focus on ease of use, APIs for automation, and responsive management, the CipherTrust Data Security Platform solution ensures that your teams can quickly deploy, secure, and monitor the protection of your business.

In addition, professional services and partners are available for design, implementation, and training assistance to ensure fast and reliable implementations with minimal staff time.

Reduces total cost of ownership

CipherTrust Data Security Platform’s data protection portfolio offers a broad set of data security products and solutions that can be easily scaled, expanded for new use cases, and have a proven track record of protecting new and traditional technologies.

With CipherTrust Data Security Platform, companies can prepare their investments for the future while reducing operating costs and capital expenditures.

About Eval

With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.

Categories
Data Protection

5G Technology and Data Protection Challenges

The challenges of 5G technology are large-scale. To download at a speed of 10-20 Gbps, a constant frequency of up to 300 GHz is required. In addition, we have challenges related to security and privacy in 5G technology.

Powerful signal range requires an incredible infrastructure to make the most of 5G technology. In addition, data-driven services need to be protected with multi-layered security practices.

The huge expectations created around the evolution of the mobile network to its 5th generation revolve around the economy and the millions of jobs that can be created with the technology.

At the same time, it is throwing up numerous challenges related to data security, protection and privacy that need to be addressed to enable 5G technology to truly impact positively on people’s daily lives.

New challenges for data security and privacy with 5G technology

The adoption of 5G technology will fuel innovation using, for example, the Internet of Things (IoT) and Artificial Intelligence (AI), which is often built with basic security controls, creating a larger attack surface.

At the same time, trust in data means that data breaches can cause greater damage. In addition, the post-COVID-19 way of working means that we are likely to be more reliant on those technologies that allow us to work and interact remotely, albeit with less proven safety.

The thing about 5G technology is that it will not be limited to individual customers, as with 2G, 3G and 4G. It’s not just about having a faster mobile network or richer smartphone functions.

5G will also serve vertical industries, from which a wide range of new services will emerge.

As vertical industries are thriving, the Internet of Things (IoT), connected vehicles, augmented and virtual reality, to name just a few, will all require fast and ubiquitous network and data access.

In the context of vertical industries, security demands can vary greatly between services. For example, mobile IoT devices require only light security, while high-speed mobile services require highly efficient mobile security.

The network-based security approach used today to secure the path between communicating parties may not be efficient enough to build differentiated end-to-end security for various technology services.

As 5G technology gains momentum, more people will be able to remotely operate or “talk” to networked devices, for example instructing installations in smart homes

A stricter authentication method, e.g. biometrics, is therefore needed to prevent unauthorized access to devices.

The security and privacy of a system as vast and global as 5G technology cannot be properly built on top of other basic parts of the systems.

Instead, security and privacy features should be integrated into the design of IT solutions from the outset.

Security and privacy requirements are often seen as obstacles in system design, but ignoring them at the outset will not pay off in the long run. Adding resources later is less effective and usually more expensive.

Dialogue between the security, privacy communities and all other parties contributing to 5G technology can begin to solve all these challenges

Now is the time to consider the security of 5G infrastructures as new “virtual” technologies such as Software Defined Networking (SDN) and network virtualization take over.

To do this, the security design of 5G technology will have to consider questions of how to securely isolate, deploy and manage virtual network “slices”.

Another consideration for security designers is to build a security architecture suitable for different access technologies.

Mobile devices have many options in how they access networks. For example, they can connect to networks directly, or through a gateway, or in device-to-device mode.

Networks will also have to be able to detect what type of service a user is using, but detecting the type of service may involve user privacy.

Add it all up and protecting privacy in 5G will also be more challenging.

The basic issues revolving around 5G security at the moment can be summarized as follows:

  • Whether 5G security and privacy solutions will cover the service layer in addition to the access layer;
  • The role of end-to-end protection mechanisms should be extended to those of previous generations;
  • Whether for extended identity protection and location privacy against active attackers.

Whatever the answers, there will be a growing need for secure infrastructure, including rigorous identity management and data protection, as well as a vast array of system-level protections in place to defend against distributed denial of service (DDoS) and other attacks.

Security challenges ahead of 5G technology

The global rollout of the 5G network and the increasing integration with technology products in all forms of daily activities create security challenges for reliable innovation.

The absence of a security and privacy by design mindset will make the 2020s a record period for cyberattacks on connected devices, putting consumer privacy at risk.

This is especially true given the new post-COVID-19 working environment we are entering.

The increase in breaches will result in increased fines for organizations that fail to comply with privacy and security regulations at the federal level, such as the General Data Protection Act (GDPR).

High-tech providers and government organizations must join forces to develop frameworks that promote security, fighting cybercriminals, preserving personal information, data privacy and all the resources that address technology applied to business.

The CipherTrust Data Security Platform solution enables companies to protect their structure against attacks

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.

To handle the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers. Specific technologies include:

CipherTrust Transparent Encryption

Encrypts data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious attacks.

CipherTrust Database Protection

It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses. Fundamental in the data traffic that should occur with the use of 5G technology.

CipherTrust Application Data Protection

It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.

CipherTrust Tokenization

It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.

CipherTrust Batch Data Transformation

Provides static data masking services to remove sensitive information from production databases so that compliance and security issues are alleviated when sharing a database with a third party for analysis, testing, or other processing.

CipherTrust Manager

It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.

CipherTrust Cloud Key Manager

It offers Bring Your Own Key (BYOK) lifecycle management for many 5G technology infrastructure, platform and software-as-a-service cloud providers.

CipherTrust KMIP Server

It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.

CipherTrust TDE Key Manager

Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.

The portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables companies to protect data at rest and in motion across the entire IT ecosystem and ensures that the keys to this information are always protected and only under your control.

It simplifies data security, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.

The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.

Portfolio of tool that ensures data protection applied to 5G technology

With data protection products from the CipherTrust Data Security Platform, your company can:

Strengthen security and compliance with 5G technology use

CipherTrust data protection products and solutions address the demands of a range of security and privacy requirements, including electronic identification, authentication and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Act (LGPD), and other compliance requirements.

Optimizes team and resource efficiency

CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.

With a focus on ease of use, APIs for automation, and responsive management, the CipherTrust Data Security Platform solution ensures that your teams can quickly deploy, secure, and monitor the protection of your business.

In addition, professional services and partners are available for design, implementation, and training assistance to ensure fast and reliable implementations with minimal staff time.

Reduces total cost of ownership

The CipherTrust Data Security Platform data protection portfolio offers a broad set of data security products and solutions that can easily scale, expand to new use cases, and have a proven track record of protecting new and traditional technologies, including impacting the use of 5G technology.

With CipherTrust Data Security Platform, companies can prepare their investments for the future while reducing operating costs and capital expenditures.

About Eval

With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.

Categories
Data Protection

CipherTrust: Simplifying the Protection of Sensitive Data

Highly distributed workforces, evolving regulations and technologies, endless data growth and the explosive use of multi-cloud services put sensitive information at risk and make data security even more challenging. This is where the CipherTrust solution makes a difference.

According to the Thales 2020 Data Threat Report – Global Edition, organizations use 29 different cloud services on average.

Lack of visibility and operational complexity has led to organizations not knowing where all their sensitive data is stored.

This concern around complexity, identified as the number one barrier to security by nearly 40% of respondents to the Thales Data Threat Report – 2020 Global Edition, is simplified with the CipherTrust Data Security Platform.

Complexity is one of the main barriers to data security

Partly because overall data security remains quite specialized and isolated, forcing companies to manage multiple vendors and point products.

Indeed, Covid-19 has changed the way we use, store and access data. Hackers are looking for potential vulnerabilities to access this sensitive data in remote databases and big data arrays.

The CipherTrust Data Security Platform solution is a single platform dedicated to simplifying the data security compliance process that combines Thales’ Vormetric and SafeNet KeySecure technologies.

It is designed to unify data discovery, classification and risk analysis functions with encryption, access, data masking and key management to provide seamless and comprehensive breach protection.

The CipherTrust data security platform offers a full range of information-centric security capabilities, including discovery and classification, transparent encryption, application data storage and protection, masking and tokenization, access controls, enterprise key management and unified cloud key management from a single management interface.

Its unified, ubiquitous approach across all available IT environments enables multiple business-focused use cases beyond compliance, including reducing data security complexity, accelerating cloud migrations and reducing data exposure risks significantly across entire enterprises.

CipherTrust Data Security Platform: discover, protect and control sensitive data anywhere

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.

To handle the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers. Specific technologies include:

CipherTrust Transparent Encryption

Encrypts data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious attacks.

CipherTrust Database Protection

It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses.

CipherTrust Application Data Protection

It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.

CipherTrust Tokenization

It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.

CipherTrust Batch Data Transformation

Provides static data masking services to remove sensitive information from production databases so that compliance and security issues are alleviated when sharing a database with a third party for analysis, testing, or other processing.

CipherTrust Manager

It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.

CipherTrust Cloud Key Manager

It offers its own key lifecycle management (BYOK) for many cloud infrastructure, platform, and software-as-a-service providers.

CipherTrust KMIP Server

It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.

CipherTrust TDE Key Manager

Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.

The portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables organizations to protect data at rest and in motion across the IT ecosystem and ensures that the keys to that information are always secure and only under their control.

It simplifies data security, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.

The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.

CipherTrust has a portfolio of tools that ensure data protection

With data protection products from the CipherTrust Data Security Platform, your company can:

Strengthen security and compliance

CipherTrust data protection products and solutions address the demands of a range of security and privacy requirementsincluding electronic identification, authentication and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Law (GDPR), among other compliance requirements.

Optimizes team and resource efficiency

CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.

With a focus on ease of use, APIs for automation and responsive management the CipherTrust Data Security Platform solution ensures your teams can quickly implement, secure and monitor the protection of your business.

In addition, professional services and partners are available for design, implementation and training assistance to ensure fast and reliable implementations with minimal staff time.

Reduces total cost of ownership

The CipherTrust Data Security Platform data protection portfolio offers a broad set of data security products and solutions that can easily scale, expand to new use cases, and have a proven track record of protecting new and traditional technologies.

With CipherTrust Data Security Platform, you can future-proof your investments while reducing operating costs and capital expenditures.

Data protection always on the move

Work anywhere, with anyone culture is on the rise, and no matter where or how people in an organization work, there is always a need to share and synchronize files – both internally and externally.

While enabling collaboration is important, data security should always be the priority. Otherwise, the risk of non-compliance and data breaches becomes a serious and real issue for businesses.

About Eval

Eval has been developing projects in the financial, health, education, and industry segments for over 18 years. Since 2004, we have offered solutions for Authentication, Electronic and Digital Signature, and Data Protection. Currently, we are present in the main Brazilian banks, health institutions, schools and universities, and different industries.

With market recognized value, Eval’s solutions and services meet the highest regulatory standards for public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.