Skip to main content
All Posts By

Varshita Muddana

Partnership News

C8 Secure enters partnership with Corrata to deliver mobile endpoint security solution, Mobile Protect

By FeaturedNo Comments

NEWS

Partnership News

C8 Secure enters partnership with Corrata to deliver mobile endpoint security solution, Mobile Protect 

18 March 2024: C8 Secure (a Continent 8 company), a provider of comprehensive, multi-layered cybersecurity solutions that focus on threat prevention, has entered into an agreement with Corrata, a mobile endpoint security solution provider that offers complete protection against any mobile threat.

Through this agreement, C8 Secure has launched its Mobile Protect solution, a C8 Secure managed service which incorporates Corrata’s unique technology with other mobile centric security capabilities. The solution protects employee devices, strengthening mobile endpoints against contemporary security threats, ensuring safe access to corporate data while respecting personal usage.

Mobile Protect provides a complete defence against mobile threats, such as detecting and disabling malware, blocking smishing attacks, protecting WiFi communications and vulnerability management.

It complements the company’s SafeBait solution which simulates social engineering and phishing campaigns, a managed service that offers customized phishing defense solutions.

Patrick Gardner, Managing Partner at C8 Secure, a Continent 8 company, comments:

Mobile devices are an essential tool for today’s modern business, making this a huge target for cyber criminals. In 2022 alone, 46% of organizations suffered a mobile-related security breach, so it is essential that businesses are securing these devices.

We are thrilled to be working with Corrata to develop our Mobile Protect solution which enables businesses to protect all iOS and Android devices from cyber attacks, safeguarding their employees from malicious actors.

Dylan Fermoyle, VP at Corrata, comments:

We are delighted to partner with C8 Secure. Their track record in providing high-touch managed security services to marquee customers aligns directly with Corrata’s mission to provide the best possible protection to the mobile workspace.

C8 Secure leverages a comprehensive, multi-layered solution focused on threat prevention versus detection. This includes SIEM/SOC capabilities, EDR and MDR protection and DDoS and WAAP solutions. Learn more here: c8secure.com.

DOWNLOAD BROCHURE

For more information, please download our solutions brochure

Let’s Get Started


Insider Threat

Best practices for protecting your business from insider threats

By Featured, UncategorizedNo Comments

BLOG

Insider Threat

Best practices for protecting your business from insider threats

An insider threat is a cybersecurity risk coming from within an organization. This risk often arises when employees, contractors, vendors, or partners with proper access misuse it to harm the organization’s networks, systems and data. Whether intentional or not, such actions threaten the confidentiality, availability and integrity of the organization’s systems and data.

In the 2023 Insider Threat Report by Gurucul, it is revealed that over 70% of organizations believe that they are moderately to highly susceptible to insider threats. Over the past year, more than half of the surveyed organizations have faced at least one insider threat, with 8% encountering over 20 incidents.

According to the 2023 Cost of Insider Risks Global Report by Ponemon Institute, the average cost to address and mitigate the fallout of an insider threat that lasts for 91 days is $18.32 million. The report also highlights that only 13% of insider threats could be mitigated within 31 days.

Types of insider threat

Insider threats within organizations can manifest in various forms. These threats include:

  1. Unintentional Threats: Caused by negligence or accidents, these threats arise from insiders who disregard security protocols or make errors, like sending sensitive information to the wrong recipient or losing data storage devices.
  2. Intentional Threats: This involves malicious insiders who deliberately harm the organization for personal gain or due to grievances. Actions can range from data leaks to sabotage.
  3. Collusive Threats: These occur when insiders collaborate with external actors, like cybercriminals, to compromise the organization. This threat often involves fraud or intellectual property theft.
  4. Third-Party Threats: Often involving contractors or vendors, these threats stem from those with some level of access, who might directly or indirectly pose a risk to the organization.

Case examples of insider threat

High-profile cases of insider threats have demonstrated their significant impact on organizations. While some cases may not have immediate monetary implications, they still harm the company’s reputation and customer trust.

For instance, Tesla faced a data leak where two former employees disclosed over 75,000 employees’ personal information. The information compromised included personal and contact details, employment records and sensitive financial data. The two perpetrators also disclosed details about customer bank accounts, Tesla’s production secrets and feedback on its Full Self-Driving features. Tesla took legal measures against the individuals responsible, but the breach left lasting implications for its data security reputation.

In May 2022, Qian Sang, a then-Yahoo research scientist, downloaded Yahoo’s AdLearn product information. Sang transferred about 570,000 pages of intellectual property to his devices. This occurred shortly after he accepted a job offer from The Trade Desk, a rival company. Weeks later, Yahoo discovered the data theft. The company then issued Sang a cease-and-desist letter. Yahoo filed three charges against Sang, including the theft of IP.

Microsoft also experienced a security lapse when employees accidentally exposed login credentials in August 2022. The company did not disclose specific details about the systems impacted by the credential exposure. However, had the breach involved the personal data of EU customers, Microsoft would have to pay a substantial €20 million fine under GDPR.

In 2022, Apple initiated legal action against the startup Rivos. The tech giant accused Rivos of systematically hiring its former employees. Apple claimed that Rivos did this to obtain confidential information. At the time, Rivos had hired over 40 of its previous staff, including engineers who allegedly took gigabytes of sensitive data related to Apple’s System-on-Chip (SoC) technology. Apple had developed this SoC technology for over a decade with substantial investment. This technology was reportedly critical to Rivos’ accelerated SoC development. Apple’s lawsuit framed this as a data theft.

Protect your business from insider threats

To combat insider threats, organizations must integrate a series of strategic actions into their security plan. This begins with a comprehensive inventory and classification of data resources throughout the IT environment. The classification includes data stored onsite and in cloud infrastructures. Classifying data allows for the efficient and secure use of information across the organization.

Next, developing a detailed data handling policy is crucial. This policy should dictate how different types of data can be accessed and used and by whom. It’s essential to incorporate a system that flags violations of this policy, which could indicate potential insider threats.

Training employees is also essential in preventing insider threats as it enhances their awareness of security risks, including unintentional ones. Through training, employees better understand company policies and their roles in data security. They learn to recognize signs of potential threats and the correct response to suspected breaches. This reduces accidental security lapses and cultivates a strong culture of security within the organization.

Monitoring systems for signs of insider threats is also key. Implementing solutions like intrusion detection systems, privileged access management systems and user behavioral analytics helps in identifying suspicious activities. Investigating any unusual activities promptly can significantly mitigate risks posed by insider threats.

At C8 Secure, we provide comprehensive services tailored to combat insider threats. Our expertise includes conducting detailed cyber security assessments, vulnerability testing and crafting incident response plans. C8 Secure’s managed Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) services play a crucial role in mitigating insider threats. These services continuously monitor endpoints and network activity for suspicious behavior, enabling rapid detection and response to potential threats. For example, if an employee attempts to exfiltrate sensitive data via an unauthorized USB device, C8 Secure’s EDR solution would detect this anomalous activity and trigger an alert for investigation.

Similarly, C8 Secure’s managed Security Operations Center (SOC) and Security Information and Event Management (SIEM) services provide 24/7 monitoring and analysis of security events across an organization’s infrastructure. By correlating data from multiple sources, such as user activity logs, network traffic, and application events, C8 Secure’s SOC team can identify potential insider threats that might otherwise go unnoticed. For instance, if a privileged user suddenly starts accessing sensitive resources outside of their normal working hours, the SOC team would be alerted to investigate this anomalous behavior.

C8 Secure’s managed Web Application and API Protection (WAAP) services are also critical in defending against insider threats. These services protect an organization’s web applications and APIs from unauthorized access and abuse, which is particularly important given the growing reliance on cloud-based services. For example, if an employee attempts to exploit a vulnerability in a web application to gain unauthorized access to sensitive data, C8 Secure’s WAAP solution would detect and block the attempt.

Beyond these technical controls, C8 Secure also emphasizes the importance of employee training and policy development in mitigating insider threats. By working with organizations to develop comprehensive security policies and providing targeted training to employees, C8 Secure helps foster a culture of security awareness. This can help prevent unintentional insider threats, such as the accidental exposure of login credentials by Microsoft employees.

Insider threats pose a significant risk to organizations of all sizes and industries. By leveraging C8 Secure’s managed security services, including EDR, MDR, SOC, SIEM, and WAAP, organizations can significantly enhance their ability to detect and respond to insider threats. Combined with robust security policies and employee training, these services provide a comprehensive defense against the growing risk of insider threats.

RECENT POSTS

The alarming surge of Phishing and how to protect your business

01 March, 2024

The threat of phishing is escalating. Statista reported that there were over 1.62 million unique phishing sites globally in Q1 2023, over 50% higher than the same period in 2022.

READ MORE

DOWNLOAD BROCHURE

For more information, please download our solutions brochure

Let’s Get Started


Chand VAPT Engineer

Meet Chand: VAPT Engineer

By FeaturedNo Comments

BLOG

Chand VAPT Engineer

Chand Chauhan joined Continent 8 Technologies in January of this year as a VAPT Engineer, responsible for identifying and analyzing security flaws across systems and software. Based in Montreal, he is a highly experienced Network, Web, and API Penetration Testing specialist. He’ll be putting this vast knowledge to good use, working with the C8 Secure team and its growing customer base.

Tell us about your role and experience.

I’ve been deeply involved in bug bounties (where individuals report bugs and vulnerabilities in websites and organizations for a financial reward) since 2016, where I’ve achieved numerous milestones. I’ve found vulnerabilities in major companies like Google, PayPal, Yandex, ProtonMail, and many more. I would say that over time, I’ve discovered more than 700 vulnerabilities, although I stopped counting after a while!

To put this into context, in 2022 the National Vulnerability Database (US Department of Homeland Security) had 206,059 entries.

What inspired you to pursue a career in Vulnerability Assessment and Penetration Testing?

I’ve developed a habit of looking at things from a security perspective first, considering the negatives before the positives. This mindset fuels my curiosity to explore matters further and try to exploit vulnerabilities.

I became interested in finding vulnerabilities because I always questioned whether I could bypass them or manipulate things on behalf of others. This curiosity ultimately drove me to pursue a career in the Penetration Testing field.

I thrive on the excitement of uncovering weaknesses in software systems, knowing that my efforts contribute to making digital spaces safer. It’s truly gratifying to see how my work helps enhance security measures across various applications.

What are the most common cybersecurity vulnerabilities you encounter in your assessments?

In my assessments, I frequently come across vulnerabilities such as Cross-site Scripting (XSS), Insecure Direct Object Reference (IDOR), and SQL Injection (SQLi). However, lately, Privilege Escalation and Business Logic issues have become more prevalent, demanding a deeper understanding and innovative approaches to mitigation.

I’ve also uncovered account takeover vulnerabilities numerous times in cryptocurrency exchanges. Additionally, I’ve found vulnerabilities where domain names belonging to other users were transferred or can be hijacked multiple times. These findings have been some of the most interesting and rewarding aspects of my career in bug bounty hunting.

How do you stay updated with the latest cybersecurity threats and trends?

I rely heavily on platforms like Twitter (X) to stay up to date with the latest cybersecurity threats and trends. Engaging with the vibrant community of security researchers allows me to exchange insights, learn about new vulnerabilities, and stay ahead of emerging threats. Additionally, I actively participate in forums, webinars, and conferences to broaden my knowledge and skills in the ever-evolving field of cybersecurity.

What are the biggest challenges you face in your role as a VAPT specialist, and how do you overcome them?

As a VAPT specialist, one of the biggest challenges is staying ahead of constantly evolving attack techniques and technologies. To overcome this, I prioritize continuous learning and experimentation. I also collaborate with peers, engage in knowledge-sharing sessions, and invest time in research and development. By staying agile and adaptive, I ensure that my skills and techniques remain effective in addressing the diverse cybersecurity challenges encountered in my role.

In fact, this was a key factor in taking the role at Continent 8, being able to collaborate with a team of likeminded individuals, passionate about the cybersecurity landscape and protecting organizations from the ever-evolving threat landscape.

Learn more about our VAPT solution here.