ZTNA (and how the Vendor Marketplace can help).
Dry January participants are rejoicing worldwide — it’s almost over. Other than the lack of hangovers, there’s an added bonus to staying away from alcohol for a month: lower risk of…credit card fraud?
The Liquor Control Board of Ontario (LCBO) — Canada’s largest alcohol retailer — discovered that a credit-card stealing script (disguised as a Google Analytics tag) was active on their website for at least five days. In that time, personal information may have been compromised during the check-out process. LCBO is in the process of notifying impacted customers directly.
So, in collaboration with mocktails, the Corvus team will continue to combat cyber risk.
Noteworthy trends in cybersecurity from Chief Information Security Officer Jason Rebholz
Back in 2020, VPN technologies played an integral role to support the rise of remote working. They provided employees at home with (somewhat) secure access to internal resources over an encrypted channel. But rapid adoption introduced a slew of new security risks.
⚠️ You might assume any VPN is better than no VPN. But we found organizations using VPNs with a history of critical vulnerabilities are actually 3x more likely to experience an incident than those with no VPN at all.
As always, keeping up with cybercriminals requires us to constantly improve our defensive strategy — enter Zero Trust Network Access (ZTNA). ZTNA is a category of security technologies that provides secure remote access to applications and services.
All the benefits of a VPN, but with security baked in at every turn. The perks?
- Access is established after a user is authenticated to the ZTNA service, which acts as a gatekeeper until the user validates their identity through secure authentication. The ZTNA service then provides access to permitted applications on the user’s behalf through a secure, encrypted tunnel.
- Users only have access and permissions to systems, applications, and data required to fulfill their role (known as the principle of least privilege).
- ZTNA introduces a smaller external attack surface, better visibility, and continuous assessment of connected devices.
Risk + Response Tips
Security tips and service updates from SVP of Risk + Response Lauren Winchester
A month into the new year, we hope you’ve found some momentum in accomplishing your resolutions. If strengthening your organization’s security controls is high on the list — right behind “make more lunches at home” — we’re here to help you put your best foot forward.
The Vendor Marketplace is your gateway to some of the best cybersecurity vendors the industry has to offer, at a discounted price for all of our policyholders. If you’re inspired to make the switch from your VPN solution to something more secure (ZTNA!), we can help.
- Head to the Vendor Marketplace on your Policyholder Dashboard.
- Choose the category you need, or scroll through the tiles below. If you’d like a consult with a Corvus-vetted ZTNA vendor (Perimeter 81 or Twingate), just select “Zero Trust Network Access” and click either tile.
- Once selected, you’ll be presented with an email address or landing page to start the process.
Regardless of which security solutions your organization needs, exploring the Vendor Marketplace can be a not-so-stressful first step. Start now.
What to watch for this month.
The Corvus Scan is a powerful asset that enables us to identify which policyholders may be at greater risk for vulnerabilities. In response, we send tailored notifications with insights and guidance for remediation. We’ve gathered a monthly round-up of our alerts and threat intel updates below:
Control Web Panel Vulnerability
A critical security flaw has been discovered in CentOS Control Web Panel 7 (CWP), a common interface for web hosting. The security flaw (CVE-2022-44877) allows a remote, unauthenticated attacker to perform arbitrary code execution. Attackers are actively exploiting this vulnerability. Read our guidance.
Zoho ManageEngine Vulnerability
A critical security flaw has been discovered in numerous Zoho ManageEngine products, often used in IT management and IT security. The flaw (CVE-2022-47966) allows a remote, unauthenticated attacker to perform arbitrary code execution on systems running the vulnerable software. Find out more.
On January 17, 2023, security researchers in collaboration with GitLab announced the discovery of critical security flaws. Git is an open-source tool often used by software developers and engineers for version control as they collaborate on code changes. Learn more about the impacted products.
ICYMI — Our January Threat Intel Updates