RANSOMWARE – HOW TO BEHAVE WHEN WE ARE ATTACKED AND HOW TO PROTECT OURSELVES TO MAINTAIN THE CONTINUITY OF BUSINESS PROCESSES

What is a ransomware attack?

 

At first it seemed to be something with the network. But then it turned out that it was not only with the network, but with everything. And not just on one computer, but on all nothing works! 

More or less like that they look symptoms of a ransomware attack. Later, a ransom demand will likely appear. These can be large amounts in hacker-safe cryptocurrencies. 

A probable attack scenario is as follows: 

  1. Infection,
  2. Reconnaissance and data theft,
  3. Encryption and ransom demand.

 

A ransomware attack is a shock to people and organizations. Panic sets in and we slowly realize what happened and what the consequences are. The question also arises, what to do next?! 

The first and most severe effect of the attack is that the company cannot operate. It is impossible to do anything (in most cases, literally nothing these days) similar to the lack of electricity in the office or on the production floor, with the difference that the power returns at some point, but the data unfortunately does not reappear, and the software does not start working as before. 

The attack also has a negative impact on employee morale and motivation, and on reputation with collaborators. In this case, managers must show that they have a plan to resolve the crisis, and that contacts with the company do not pose a threat to the business environment. 

Another consequence of a ransomware attack is the likelihood of data leakage. This is a significant threat to the company, its employees and partners. If the attacker believes that there will be buyers for the stolen information (this may be personal data, salary tables, PESEL numbers, passwords, data constituting trade secrets, company secrets and many others). 

The above description is just one scenario. An attack could also involve shutting down production processes in a steel mill, preventing rail communication from functioning, stopping the functioning of an e-commerce platform or preventing treatment in a large hospital. The goal of a ransomware attack is, as the name suggests, to obtain a ransom to restore access to data or restart processes in a company or organization. So the greater the financial or social costs, the larger the ransom attackers can demand.

 

Who can fall victim to ransomware attacks?

 

Everyone, including you, but the more severe the downtime, the greater the likelihood of an attack. Most often, however, cYbercriminals do not choose victims because they want to hit as many users as possible in order to make the most money. 

There have been reports of ransomware operating in accounting firms, law firms, consulting firms, the automotive, food and pharmaceutical industries, healthcare, logistics, transport, energy, mining, banking, and power engineering. As you can see, the range of interests of cybercriminals is wide. It should also be added that it is impossible to protect yourself from an attack and its effects in 100%. However, actions should be taken to minimize the probability of the attack's success and ensure the possibility of quickly restoring the systems' operation if the attack is successful.

According to article on the Government Security Center website, even large companies fall victim:

  • Garmin – WastedLocker malware, $10 million ransom payment confirmed,
  • Banco Estado Chile – Sodinokibi malware,
  • Canon USA – Maze malware,
  • Orange SA – Nefilim malware,
  • The Volksvagen Group – Conti malware.

 

What methods do attackers use?

 

There are many attack methods and they are constantly being improved. Among them are: 

  • Infected attachments and files – email attachments, files on USB drives or download links, 
  • Attacks on IT/OT infrastructure – exploitation bow in production line operating systems or SCADA controllers, 
  • Impersonating legitimate updates – ransomware pretends to be legitimate software or driver updates, 
  • Phishing and social engineering – malicious emails containing attachments or links leading to malicious websites, 
  • Exploitation of software vulnerabilities – exploiting known or previously undiscovered vulnerabilities of operating systems or applications, 
  • Attacks by service providers – use of cooperator or cooperating company software, 
  • Administrative credentials are captured – for example, via weak system administrator passwords or remote access sessions left logged in. 
  • Attacks on remote protocols (RDP) - exploitation of unsecured properly remote desktops, 
  • Attacks on network devices and servers, 
  • Ransomware injection via malicious ads (malvertising) 

As you can see, there are many methods of attacks and threats and there is much to watch out for. That is why it is worth using the competences of experienced external companies or using the knowledge of your own IT departments. 

How to behave after a ransomware attack and should you pay the ransom?

Unfortunately, there is no guarantee that the files will be decrypted after paying the ransom. This may be due to bugs in the decryption software or the attackers' lack of intention to allow decryption of the data. Additionally, forpaying the ransom reinforces the idea that their business is profitable or that they have achieved their goals. It can also be said that by paying the ransom, we are financing further activities of cybercriminals who improve their tools, which means more infections. 

But there is also good news, because sometimes it happens that some data can be recovered using publicly available decryption keys. There is also a chance that due to the specifics of some types of ransomware, some data can be recovered even without access to the decryption key. 

No matter what you need to act very quickly to prevent further hacker access to IT systems and, if possible, stop the data encryption process. The recommended actions are listed below: 

  • Isolation of infected systems: The first step should be to isolate infected systems from the network to prevent further spread of ransomware. 
  • Identify and remove threats: Using ransomware scanning and removal tools such as Malwarebytes to remove the active threat from your system. 
  • Attempting to decrypt files: Check available decryption tools on sites like No More Ransom to see if it is possible to recover your encrypted data. 
  • Restoring the system from a backup: If decryption is not possible, it is best to restore the system from a previous backup, if one is available. 
  • System analysis and security: Using analytical tools to understand how an attack occurred and implementing additional security measures to prevent future incidents. 

In a company or organization, there should be a ready plan of what to do and how to behave when business continuity is threatened or impossible. Such a plan is called a Business Continuity Plan (BCP) and its content and scope results from the analysis of what is most painful for business processes and what specific risks affect these processes. An example of an analysis of the impact on the business (BIA) is oprice of the impact of the unavailability of the financial system on the company's ability to make payments. In turn, risk analysis (Risk Assessment – RA) is aboutthe risk of a critical payment server failing due to a ransomware attack. 

In short, we should know in advance what we are most afraid of, when this threat may occur and how to prevent it. 

What formal actions should be taken?

The attack also imposes certain formal obligations on managers. These will be: 

  • Reporting the incident to the President of the Personal Data Protection Office (UODO) – this must be done within 72 hours of detecting the incident. 
  • Notification of those whose data has been leaked (employees and others). 
  • Reporting an incident to the NASK Computer Security Incident Response Team (CSIRT). 
  • Reporting a crime to the prosecutor's office or the police. 
  • There may also be an obligation andInforming shareholders or business partners (larger entities and listed companies). 
  • Even while removing the effects of an attack, it is worth creating rincident report (for internal purposes and for future audits) and create guidelines forupdating risk management procedures and security policies. 

In Poland, formal obligations in the event of a ransomware attack include reporting to UODO, CSIRT NASK and law enforcement agencies if it concerns personal data, critical systems or other resources subject to legal regulations. Quick action and documentation of the incident are essential to meet legal requirements and minimize the risk of sanctions (high financial penalties). 

How to prevent ransomware attacks?

There are a number of ways to significantly reduce the vulnerability of IT systems to ransomware. 

Among them are the following: 

  • Backups – preferably multiple copies on different media, 
  • Regular scanning and removal of vulnerabilities to cyberattacks – software updates and necessary reconfigurations, 
  • Network segmentation – limiting the possibility of ransomware spreading across the corporate network, 
  • Installing proven antivirus software with an option to prevent ransomware attacks (endpoint security), 
  • Periodic employee training to provide knowledge about current threats and ways to avoid them, 
  • Installing proven firewalls at the edge of the network that block cybercriminals from accessing IT systems from the outside, 
  • Securing remote access, for example by enabling multi-factor authentication (as in electronic banking systems), 
  • Monitoring and detecting threats – there are systems that allow for detecting attacks at an early stage, 
  • Proper policy for granting permissions to files and systems – granting users only those permissions that are necessary to perform their tasks, 
  • Incident response planning and testing. 

It is worth mentioning here that additional security for a company or organization can be provided by:protection against cyber and GDPR risks offered by some insurance companies. 

Summary

As described above, hacker attacks happen even in companies that pay attention to IT security issues, and there is no way to protect yourself from them in 100%. Protection against cyber threats is a continuous process, just as the methods of attackers are constantly being improved. However, we can reduce the chances of an attack succeeding and minimize its effects.

It is best not to be a victim, but even if it happens, remember that not everything is lost, and depending on whether and how many usable copies of data we have, we can restore the functioning of our systems. We also have a chance to decrypt some or all of the collected data.

We hope that our post will help you choose ways to protect yourself from ransomware attacks, and in the event of a threat, it will suggest what actions to take. In either case, please contact us.  We will help.

WHAT IS ITAM AND WHAT IS IT USED FOR?

 

What is ITAM (IT Asset Management)?

 

ITAM is management process the life cycle of IT resources – from purchase, through implementation and use, to disposal. This process includes monitoring:

  • Computer hardware (servers, laptops, network devices, printers),
  • Software (licenses and subscriptions, updates, compliance with laws and regulations e.g. NIS-2, DORA).
  • And also cloud infrastructure (virtual resources, cloud services).

 

Why is ITAM important?

 

  • Cost optimization: Tracking all IT assets allows you to identify unused or unnecessary resources, which allows you to optimize operating costs.
  • Compliance with the provisions of license and subscription agreements, as well as with laws and regulations (NIS-2, DORA): ITAM helps monitor compliance with license agreements and legal regulations, minimizing the risk of financial and reputational penalties.
  • Data security: IT asset management allows you to detect and respond to potential security threats faster, protecting sensitive corporate data.
  • Operational efficiency: Effective management of IT resources streamlines internal processes, which translates into better productivity and customer and employee satisfaction.
 

What are the key elements of effective ITAM?

 
  • Asset inventory: Create an accurate record of all IT assets, including hardware, software and licenses.
  • Asset Lifecycle Management: Monitoring assets from acquisition, through use, to decommissioning.
  • Process automation: Using tools to automate asset management tasks, which increases efficiency and reduces the risk of errors.
  • Data analysis: Regularly analyze asset data to make informed business decisions.

 

How to implement ITAM in an organization?

 

  • Defining goals: Define what you want to achieve with ITAM, e.g. reducing costs or increasing security.
  • Choosing the right tools: Invest in asset management software that meets the needs of your business.
  • Team training: Ensure employees are properly trained and understand the importance of ITAM.
  • Continuous improvement: Regularly monitor and update ITAM processes to adapt to changing business needs.

 

Summary

 

ITAM implementation is a strategic step towards increasing the efficiency and competitiveness of an organization. Through effective management of IT assets, companies and organizations can not only reduce costs, but also minimize risk and improve the quality of services provided.

Are you ready to implement ITAM?

If you would like to learn more, please contact us:

Cisco Umbrella – protection against phishing, malware and ransomware

Cisco Umbrella – secure your network!

 

Cisco Umbrella DNS Security protects users against Internet threats such as malware, phishing, viruses and other unidentified threats known as "Zero day" threats. It protects all users, both those working in the local network and those connected remotely via VPN. Cisco Umbrella is another element of corporate network security, apart from the one we described earlier Cisco DUO.

Cisco Umbrella DNS Security is a solution available from the cloud and does not require any resources on the client's side. It works by preventing threats by blocking access to Internet resources with a low and suspicious reputation. It is based on several dozen URL categories that can be blocked or made available to users or their groups using configurable policies.

Cisco Umbrella DNS Security works by redirecting DNS queries to Cisco cloud servers, which check the reputation of websites visited by users. The whole thing is based on resources created by one of the leading cybersecurity teams - Cisco Talos Intelligence Group. Thanks to this approach, Cisco Umbrella protects against known and identified threats, but also against unknown threats by blocking access to malicious domains, URLs and files.

Cisco Umbrella DNS Security perfectly fits the needs of small and medium-sized enterprises, which have recently been frequent targets of attacks due to the lack of advanced security systems. SMEs have less specialized IT teams and limited budgets, which results in the increased use of simpler Internet gateways that do not protect against most new threats coming from the Internet. Cisco Umbrella protection is additionally extended to remote and mobile users, which can be a good complement to the security system also in larger organizations.

Cisco Umbrella DNS Security is a system configured and managed via a web browser. The management system allows for quick implementation of the basic scope of protection. The solution can be extended by integration with directory services, recognizing users and groups, assigning various policies to them, identifying workstations and their configurations, as well as collecting data and analyzing user traffic and existing threats. The whole thing is monitored using ready-made panels and tools available to the administrator.

Cisco Umbrella DNS Security can work with MDM systems managing mobile devices, ensuring their protection by redirecting DNS queries, with the Cisco DUO system providing two-factor authentication. Cisco Umbrella is an integral part of the Cisco Secure Client (AnyConnect) suite necessary for VPN connections.

 

What does Cisco Umbrella DNS Security do for you?

  • redirects and analyzes the correctness of DNS queries based on the Cisco Talos database,
  • protects users working on and off the network,
  • works against threats that the local antivirus system does not protect against, such as phishing, malware or unidentified threats,
  • available from the cloud with tools and panels for administration and management,
  • licensed per user with a subscription for one year or more,
  • attractive price - monthly subscription for one user - USD 4.5 (Cisco Umbrella DNS Security Essentials).

 

More information on the dedicated page Cisco Umbrella. Please also contact us:

Penetration testing workshops at the client's premises

Do penetration testing independently !

 

Penetration testing competencies for your IT team? Periodically checking the security of your IT infrastructure on your own?

We offer you 3-day, intensive practical classes in the field of IT security, which we can also organize at your company.
The program includes practical implementation of the following topics:

  • Module 1 – Preparation of the test environment (45 min.),
  • Module 2 – Information reconnaissance (90 min.),
  • Module 3 – Scanning and enumeration of systems (90 min.),
  • Module 4 – Vulnerability search and analysis (120 min.),
  • Module 5 – Using vulnerabilities to break security (120 min.),
  • Module 7 – Social engineering and backdoors (120 min.),
  • Module 8 – Penetration testing of web applications (120 min.).

 

Additional benefits?

  • Workshops can be held at the client's premises, so they do not require delegating employees or leaving the IT environment unattended. The workshop formula allows for flexible time management and, if necessary, handling of sudden failures or incidents requiring the participation of IT staff.
  • There are no rigid and predefined deadlines, we will adapt to the client's needs.
  • All tools presented at the workshops will be made available to participants along with training materials. In our workshops, we do not use tools that require any additional costs or licenses.
  • Each participant will receive a WLAN card used for penetration testing.
    Each participant will receive training materials and databases for testing password strength on a pendrive.

 

More details in the workshop agenda -> Penetration testing – workshops for clients

 

Contact persons:

Cisco DUO – universal multi-factor authentication

Cisco DUO – security in subscription

 

Multi-factor authentication, also known as MFA (Multi Factor Authentication), is currently an essential element of securing access at the edge of the network, and in environments requiring an increased level of security, also internal access to networks and applications. As part of multi-factor authentication, in addition to standard data such as user and password, an additional factor generated by the system is introduced. Only by providing three correct elements, the user can be authenticated and granted access to network resources.

Upgreat Systemy Komputerowe Sp. z o. o. is an experienced Premier Partner of Cisco Systems. We will implement two-factor authentication with Cisco DUO and secure your network.


Below are the most important features of the Cisco DUO system:

  • Cisco DUO is a cloud solution, and its implementation does not require additional resources in the customer's infrastructure. It's quick and relatively easy.
  • Cisco DUO offers the following additional authentication factor options: confirmation from a mobile application, a short SMS text message, a phone call, and a hardware token.
  • Cisco DUO provides an API compliant with the SAML 2.0 standard, allowing for easy integration with any application. This allows you to authenticate access to many applications, such as: Office 365, Salesforce, Dropbox, Zoom and others.
  • Built-in integration with directory services: Active Directory and Azure AD.
  • Integration with a wide range of remote access termination solutions. Among others: Cisco FirePower, Fortinet, Sonicwall, Paloalto.
  • The list of ready-made integration platforms can be found at https://duo.com/docs
  • In Premier and Advantage versions, monitoring the security status of customer devices, operating systems and applications and verifying their compliance with policies.
  • The infrastructure for European entities is located in the AWS environment in Europe.
  • The list price is 3$ per user per month for Cisco DUO Essentials, 6$ for Advantage, and 9$ for Premier.
  • Subscription licensing.

 

Contact persons:

LunaNet – network services on the Moon

Despite skeptical voices about space exploration -> https://www.scientificamerican.com/article/why-well-never-live-in-space/ The Artemis program is a fact.

 

The official goals of the Artemis program are:

  • Astronaut landing on the moon,
  • Construction of a permanent lunar base, which will act as a starting point for future space missions, including those aimed at Mars,
  • Conducting scientific research and astronomical observations in conditions of reduced gravity and in the absence of an atmosphere,
  • Although you will not find such information on NASA's website, you cannot forget about military, geostrategic and raw material issues.

IN interview for Politico NASA chief Bill Nelson said: "It's a fact: we are in a space race." And about the Chinese: “And it is true that it is better to be careful that they do not reach an [important] place on the Moon under the guise of scientific research. And it is not impossible that they will say: "Stay away, we are here, this is our territory."

It is also true that a large-scale conflict on Earth will begin with the destruction of satellites in low Earth orbits (LEO) in order to limit the enemy's military capabilities, and whoever controls the Moon will have an easier time controlling the space around the Earth. The US Department of Defense declares: "Operating in space is an integral part of the way the U.S. military fights."

An important part of plans to implement geostrategic goals and the Artemis program itself is network communication, i.e. "LunaNet: A Flexible and Extensible Lunar Exploration Communication and Navigation Infrastructure". Since, as one might assume, LunaNet is also intended to have military applications, it means that a network on the Moon will be created.

 

LUNANET

 

The requirements for communication within the LunaNet network are as follows:

  • Interoperability thanks to the use of standard communication solutions,
  • Support for multiple government and private users and vendors,
  • Service delivery orientation,
  • Scalability,
  • Openness thanks to the use of widely recognized technologies,
  • Resistance to damage,
  • Security and resistance to cyber threats,
  • Possibility of using LuneNet technology on other celestial bodies.

 

LunaNet will provide communication between objects on the Moon itself and communication with Earth. The network infrastructure will be built based on nodal points that will be placed on the surface of the Moon, in lunar orbits and on or around the Earth.

  • The network layer topology will consist of store-and-forward nodes, which is to guarantee resistance to delays and interruptions in transmission.
  • Data will be exchanged in a multi-hop infrastructure.
  • Access to the network will be through connections to relays on the lunar surface, to relays in lunar orbits, or directly to relays on Earth.
  • The network bandwidth is to ensure the possibility of multiple simultaneous video and voice streams in HD quality.

 

SERVICES OFFERED BY THE LUNANET NETWORK

 

LunaNet will provide 3 basic types of services:

  • Network Services (Net) – data transfer services enabling data transfer between nodes over a single link or an end-to-end path spanning multiple nodes.
  • Positioning, Navigation and Timing (PNT) Services – position and speed determination, synchronization and time determination services. PNT also provides location services in the field of search and rescue.
  • Services for Scientific Applications (Sci) – services providing situational alerts and scientific measurements, and working for the safety and protection of people and property. Data from scientific instruments will enable further research and technology development on the Moon.

Network Services (Net)

 

Data transmission services will be able to be provided at various levels:

  • At the lowest layer, communication will take place using network services based on the DTN Bundle Protocol (Delay Tolerant Networking),
  • Communication in some parts of the LunaNet network may be routed via IP packets, provided that the IP protocol does not guarantee end-to-end delivery of data to all nodes in the larger network,
  • Some intermediate nodes may switch or forward data on the link or at a lower layer to ensure speed or interoperability.
 
Interoperability between directly adjacent nodes and with the standard network layer will enable the construction of the LunaNet architecture within many types of infrastructure elements, regardless of the frequency band, spacecraft type or service provider.
The entire LunaNet network will meet security requirements such as confidentiality, integrity and availability.
Currently, the basic requirement for Earth/Moon communication is 110Mbps. In 2035, it will be 950Mbps, thanks to complementing radio communication with optical communication from 2029.
 

Positioning and Navigation Services (PNT)

 
Service features:
  •  Navigation on the lunar surface,
  •  Location tracking, including search and rescue (SAR) operations
  • Time synchronization,
  • relative navigation,
  • Autonomy,
  • Time keeping and dissemination (GPS time tracking possible).

 

Services for scientific applications (Sci)

 

Service features:

  • The distributed infrastructure will enable the construction of an efficient network and transmission of scientific data from many sources, such as sensors and scientific instruments ("geodesy", radio astronomy),
  • Measurements of the Sun's behavior will enable early response to events that may threaten human safety. It is necessary to use soft X-ray and solar energy particle (SEP) monitoring in a heterogeneous configuration:
    • X-rays arrive from the Sun within 8 minutes of the event starting,
    • The arrival of solar energy particles (SEPs) occurs 200 minutes after the event begins.

SUMMARY

 

  • Implementation of the Artemis program and mission requires the use of high-quality communication infrastructure, which should be reliable, flexible and scalable. The LunaNet architecture is open and is being developed not only by NASA, but also other government agencies, international organizations, commercial partners and universities.
  • Users, both humans and robots (!), will be able to use network functionality similar to that available on Earth.
  • The DTN architecture allows infrastructure to be built in stages that do not require continuous end-to-end connectivity for all users. Moreover, the DTN-based network architecture will be fully suitable for use on Mars and other places where the speed of light delays to Earth is much faster than between the Moon and Earth.
  • Position, Navigation and Timing (PNT) services and scientific applications, space weather observation (SpWx), are critical to users of space and the lunar surface, as well as astronaut safety.
  • This architecture directly supports the Artemis program, which aims to ensure a presence on the Moon by 2028.
  • LunaNet's network architecture enables commercial, interagency (U.S. government) and international partnerships and capabilities seen on the terrestrial Internet.
  • Work on LunaNet is well advanced, both at the conceptual level and in detailed technical solutions.
  • There is close cooperation on the development of LunaNet standards between NASA and ESA (European Space Agency).

SOURCES

 

The study was prepared based on NASA materials:

Brocade FCS Fabric - a new generation of Data Center solutions

Brocade Communications Systems as the undisputed leader in the Fiber Channel switch market has introduced solutions from the world of mass storage to a new generation of network switches designed to support Data Centers and private clouds by implementing the VCS Ethernet Fabric technology.   

When designing the VCS technology, the needs of customers were taken into account, such as:

  • elimination of network barriers in the context of application performance,
  • guarantee of service availability in the face of network disruptions and bottlenecks, the need for flexible network scaling with traffic growth and changes in architecture,
  • the need to quickly adapt network services to the needs of applications in a private cloud environment,
  • simplicity - "is supposed to work" with minimal interference from the administrator,
  • support for cloud environments, including renting infrastructure to multiple entities, adjusting policies and automating processes in the cloud.

Compared to the classic hierarchical Ethernet structure, VCS technology provides higher performance, better link utilization, higher reliability and simplicity of architecture.
VCS technology is nothing more than clustering many physical switches to one logical one with all the consequences related to data transmission in the L2 layer inside the cluster. Clustering of switches is possible at distances of up to 200m. However, the specification also provides for clustering over long distances, up to 30km, with some limitations related to the number and type of ports and the availability of technology, in particular FCoE and iSCSI. A VCS cluster is one logical switch from a management point of view.

Brocade 1

Multiple active data paths are allowed within a cluster. All paths transmit data, and traffic balancing is done for the entire structure at the level of individual packets. This guarantees optimal use of the infrastructure, fast switching in the event of failure of any element of the cluster, and easy scaling. Just add an extra connection and it works. The FCoE protocol is also available inside the entire cluster.

Standard switches and hosts can be connected to the cluster switches by means of multiple aggregated LAG connections without the risk of data loops, without the need to use the STP protocol, with all connections being transmissively active.

Brocade 2

VCS clusters can be combined with each other treating each cluster as a single switch, obtaining a fully reliable, easy to manage, efficient architecture.

Brocade 3

The VCS Fabric solution works with the VMWare environment to offer port profiling. The port profile includes FCoE, VLAN, QoS and security parameters. When migrating a virtual machine between physical hosts, the port profile migrates automatically between cluster switches along with the virtual machine.

Brocade 4

Finally, an important point. VCS Fabric technology is available in the entire family of Brocade VDX Data Center Switches at the price of the switch, without additional licenses, and the entire cluster configures itself automatically when data links are connected.

Emphasis on security - AirTight Networks

As we wrote on our blog (Chasing EPS. Is it profitable to be innovative?) wireless networks and mobile devices are very interesting solutions for enterprises and individual customers. It is estimated that by 2019, sales of wireless devices will increase by 40% compared to now.

What are the challenges of the universality of wireless solutions? In addition to the performance and stability of operation, this is for sure security. For this reason, our company has included AirTight Networks technologies and products in its offer. The question arises, of course, what distinguishes AirTight Networks from other manufacturers. There are two reasons for our choice: these are products designed with the highest level of security in mind and the uniqueness of AirTight, consisting in the possibility of cooperation with already existing networks of other manufacturers.

 The basic features of AirTight Networks solutions are:

  • security - unique patented WIPS protocol ensuring, among others, protection against Client Mis-association attacks, Ad hoc Networks, Rogue AP (WIPS will recognize the difference between "Rogue" AP and external, e.g. neighbor), Mis-configured AP, MAC-Spoofing, unauthorized access, Honeypot / Evil Twin Attack, Denial of Service (DoS) Attack, Man in the Middle Attack.
  • monitoring of wireless networks - additional protection of existing wireless networks thanks to WIPS functionalities (1 AP AirTight for 4 existing ones).
  • openness - the possibility of network cooperation with AirTight on-premise controllers (hardware and virtual) as well as with controllers of other companies such as Cisco, Aruba, Motorola.
  • work in the cloud - the possibility of using a wireless network controller available in the cloud - functionality especially useful for distributed retail networks (shops, restaurants, pharmacies and others).
  • work in various external conditions - AirTight offers inside and Outside access points at very attractive prices.
  • data analysis - AirTight management software provides the ability to analyze incidents related to security and customer traffic. Integration with social media allows for flexible customer service by analyzing their preferences and habits (Social Engagement).
  • compliance with standards - in addition to compliance with the required regulations wireless networks AirTight Networks systems enable periodic audits and reports of compliance with electronic payment regulations PCI DSS 3.1 (Payment Card Industry Data Security Standard).

UpGreat Systemy Komputerowe Sp. z o. o. has the status of an Authorized Partner of AirTight Networks in Poland and provides exclusive customer service in western Poland (Wielkopolskie, Zachodniopomorskie, Lubuskie, Pomorskie, Opolskie and Dolnośląskie provinces).

To learn more about the AirTight product portfolio, please see leaflet. Please also contact us to organize a presentation of solutions, demonstration implementation along with a demonstration of functionalities related to data security and analysis, and possibly to organize site-survey. We also invite you to visit the company's website AirTight Networks.

AirTight Networks is an American company headquartered in Mountain View, California, specializing exclusively in the production and implementation of solutions for building secure wireless networks. Thanks to the use of the proprietary WIPS protocol, networks based on this solution are characterized by the highest level of security available on the market, as evidenced by implementations in the military and banking sectors. Secure wireless networks based on the Airtight Networks architecture are used in the world by over a thousand large companies from every sector of the economy.

KRI audits

Security audits have been included in our offer for a long time. The service is addressed to both private enterprises and public institutions. In every organization, an increasingly extensive sphere of internal activities and those related to contacts with clients takes place with the use of IT systems.

For public institutions, many services are available to provide services to citizens through electronic media. Applications, certificates, extracts from registers, tax declarations can be submitted via internet applications without visiting offices. These possibilities are a great help, but at the same time they endanger the systems available on the Internet and the data stored in them.

We would like to draw your attention to the audits of compliance with the National Interoperability Framework (KRI) performed by our company, i.e. information security management audits in public entities.

KPRM

In May 2012, the Regulation of the Council of Ministers of April 12, 2012 on the National Interoperability Framework entered into force, concerning the minimum requirements for public registers and the exchange of information in electronic form, as well as minimum requirements for ICT systems.

The Regulation in question is an implementing act to The Act of February 17, 2005 on computerization of the activities of entities performing public tasks.

It imposes requirements on public administration units as to the annual IT infrastructure security audit. It concerns in particular:

Art. 2. 1. Subject to sec. 2-4, the provisions of the Act shall apply to those performing public tasks specified by the Acts: 1) government administration bodies, state control and law protection bodies, courts, organizational units of the prosecutor's office, as well as local government units and their bodies, 2) budgetary and local government units budgetary establishments, 3) earmarked funds, 4) independent public health care establishments and companies performing medical activities within the meaning of the provisions on medical activity, 5) the Social Insurance Institution, the Agricultural Social Insurance Fund, 6) the National Health Fund, 7) state or local government persons legal entities created on the basis of separate acts in order to perform public tasks - hereinafter referred to as "public entities". 2. The provision of Art. 13 sec. 2 point 1 shall also apply to the entity to which the public entity has entrusted or commissioned the performance of a public task, if due to the © Kancelaria Sejmu s. 3/28 2015-05-12 implementation of this task there is an obligation to provide information to or from non-administrative entities governmental.

Source: Journal of Laws 2005 No.64 item. 565 ACT of February 17, 2005 on computerization of activities of entities performing public tasks.

We will now focus on the provision concerning the minimum requirements for ICT systems. It includes 13 checkpoints:

  1. Provision of updating internal regulations with regard to the changing environment;
  2. Keeping the inventory of hardware and software used for information processing up-to-date, including their type and configuration;
  3. Conducting periodic analyzes of the risk of losing the integrity, availability or confidentiality of information and taking actions to minimize this risk, according to the results of the analysis;
  4. Taking actions to ensure that people involved in the information processing process have appropriate rights and participate in this process to an extent adequate to their tasks and obligations aimed at ensuring information security;
  5. Immediate change of powers in the event of a change in the tasks of the persons referred to in point 4;
  6. Providing training for people involved in the information processing process, with particular emphasis on such issues as:
    a) information security threats,
    b) consequences of breach of information security rules, including legal liability,
    c) application of measures ensuring information security, including devices and software minimizing the risk of human error;
  7. Ensuring protection of processed information against theft, unauthorized access, damage or
    disturbances, by:
    a) monitoring access to information,
    b) activities aimed at detecting unauthorized activities related to information processing,
    c) providing measures to prevent unauthorized access at the level of operating systems, network services and applications;
  8. Establishing basic rules to guarantee safe work in mobile computing and working remotely;
  9. Securing information in a way that prevents its disclosure, modification, deletion or by an unauthorized person
    destruction;
  10. Including in service contracts signed with third parties provisions that guarantee the appropriate level
    information security;
  11. Establishing information handling rules ensuring minimization of the risk of information theft
    and information processing means, including mobile devices;
  12. Ensuring an appropriate level of security in ICT systems, consisting in particular in:
    a) care for software updates,
    b) minimizing the risk of information loss as a result of a failure,
    c) protection against errors, loss, unauthorized modification,
    d) using cryptographic mechanisms in a manner adequate to the threats or requirements of a legal provision,
    e) ensuring the security of system files,
    f) reduction of risks resulting from the use of published technical vulnerabilities of ICT systems,
    g) immediately taking actions after noticing undisclosed vulnerabilities of ICT systems to
    the possibility of a security breach,
    h) control of compliance of ICT systems with the relevant ones
    security standards and policies;
  13. Immediate reporting of information security breach incidents in a predetermined and predetermined manner, enabling quick corrective action.

Meeting the above requirements does not guarantee full safety. Remember that security is not a state, it is a process. The level of threats is constantly growing and we are not able to fully take care of every detail of our infrastructure or the carelessness of our employees. The solution is periodic security audits, preferably external, carried out by high-class specialists who are certified by industry organizations in the field of security.

Our company is a member of ISSA Polska - Association for the Security of Information Systems. Our specialists have conducted several dozen security audits also in local government units. We have a certificate Certified Ethical Hacker (CEH) awarded by the International Council of Electronic Commerce Consultants (EC-Council).

Implementation of wireless networks

WLAN networks are an indispensable element of the IT infrastructure in enterprises for which mobility and high availability of services are the basis for achieving business goals. Many years of experience in designing and implementing wireless networks has allowed us to develop a comprehensive offer for the delivery of secure solutions based on proven standards and practices used in wifi networks. The practice is also supported by knowledge and certificates - specializations Cisco Premier Partner - Cisco Wireless LANHP Preferred Partner - HP Networking Professional and for auditing purposes EC-Council Certified Ethical Hacker. We guarantee reliability and high-quality services.

1. Implementation methodology.

We make sure that our solutions provide maximum satisfaction to our clients. Therefore, the methodology of our implementations includes the following services:

  • site survey - WLAN network measurements, allowing to determine the location and number of access points that will guarantee the required speed when accessing the WLAN. Performing measurements guarantees full WiFi coverage while maintaining the highest transmission speeds for a given technology, ensures signal continuity and optimization of the number of access points.
  • design and optimization of the concept - when implementing wireless networks, we use technologies that increase efficiency, stability and guarantee full monitoring of the network's operation. Networks based on redundant controllers, a management server, tools for advanced analysis of mobile services and reporting are the most common design scenarios in enterprise environments.
  • ensuring the safety of - WLANs can be vulnerable to attacks and unethical user behavior. To secure your network, complex passwords and WPA2 encryption are no longer sufficient. The security we use is the authentication of the user in the network using domain passwords, dedicated RADIUS servers or one-time password servers. Additionally, the authentication process can be strengthened by means of digital certificates issued individually for each device. A necessary element of a safe WLAN network is a correctly made contact with the corporate network. Traffic should be passed through the fire gate and filtered down to TCP ports only for those services that are to be accessed by mobile users. An additional security of the wireless network is WLAN IPS, which, while listening to the environment in the free time from data transmission, is able to detect and neutralize attacks on the wireless network.

2. Security audits.

The final stage of implementation is the performance of a security audit, which allows you to verify the network security methods used and their susceptibility to threats. We subject existing networks to ethical attacks and penetration tests - in this way we check the operation of security systems and attack detection. In the event of any irregularities - we develop a security policy implementation plan, taking into account the current state of knowledge on the security measures applied.

3. References.

We have carried out many implementations of wireless networks in production, warehouse and office environments. The projects covered networks prepared for operation from several to several hundred access points. The applied solutions allow for full reporting of the wireless network status, security level and are able to provide users with a full range of mobile services. At the request of our clients, we are ready to present examples of implementations with appropriate references.