search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Remote/Hybrid Workforce


What ways are cybercriminals targeting endpoint devices like printers and what are the threats? Cybercriminals’ tactics for targeting endpoint devices will follow a similar path to any other attack. First, they will conduct reconnaissance to establish how many printers (or other target devices) are available in the company. Second, they will search for the IP addresses of the devices and see if there are any open ports that use a search engine. Tis allows the attacker to establish all the devices on the network, including printers, and gain access through just one unsecured device. Once this is done, the cybercriminal can gain access to the whole network in order to achieve their objective; be that to lock data down (like in a ransomware scenario) or exfiltration of data. We have recently seen a rise in hybrid attacks, where


threat actors first use automated means to scan a network as part of their reconnaissance, and then will let their teams take over for the initial exploitation of devices. From there cybercriminals establish persistence, seeking to find a way to command & control devices, before escalating privileges to encrypt or exfiltrate data.


How can businesses look to safeguard themselves, especially in a remote/hybrid workforce setting? To safeguard themselves, enforcement of strong policies, staff awareness and regular but meaningful cyber security awareness training are key. However, these are not enough on their own. A 24x7 security monitoring system needs to be in place for security teams to identify unusual behaviour from seemingly legitimate users. Tis isn’t about solely relying on technology, but rather leveraging technology to enable human expertise to identify and distinguish between abnormal malicious activity and an employee behaving strangely and breaking policy. To do this, a security team or provider must first baseline the environment to establish what is normal. But it doesn’t stop there or aſter 30 days. It must be a continuous and evolving baseline to rule out the norm so that the abnormal stands out like a torch in a dark room.


How does the partnership with Bitdefender enable Sharp to further extend its security capabilities? With more hardware endpoints being targeted by threat actors, it is imperative for businesses to secure them. Tis partnership will help strengthen Sharp’s A3 MFPs with Bitdefender’s advanced antimalware technology, scanning all data and processes. Tis integration will allow organisations to detect malicious activity and threats at an early stage before the business is impacted.


How is the threat landscape evolving? Te threat landscape could be compared to a constant game of cat and mouse. Each time security teams come up with a defence or preventive countermeasure, the attackers will find ways to circumnavigate it. One thing we have recently seen and are developing is a business case for URL hijacking and brandjacking detection, also known as typsquatting, which takes advantage of the mistakes a user makes when entering an incorrect website address.


www.pcr-online.biz


Tis will redirect unsuspecting users to an alternative website owned by a cybersquatter. Because of this constant change and new threats popping up


regularly, it is important for businesses to remain proactive in detecting attackers based on abnormal behaviour and suspicious activity. Tey cannot rely on technology alone. Security teams need to always assume compromise but be prepared to detect and respond rapidly.


How does Bitdefender advanced antimalware technology offer end point protection? Bitdefender prides itself on innovation in technology to detect and block ransomware and zero-day threats in real-time using advanced heuristic-based methodology. Tis is superior to traditional malware detection by complimenting the use of a known database of signatures. Combined with Managed Detection and Response (MDR), this provides a holistic view of monitoring and responding to abnormal behaviours that wouldn’t usually be associated with an environment or an end user. Our MDR service wraps human expertise around advanced technology including comprehensive and proactive monitoring and detection processes. Importantly, this is underpinned by remote response and first line remediation through pre-approved actions. We don’t need to wake anyone up or seek approval at 3am, we can just take action and contain the problem, denying the attacker their greatest commodity; time. Detect rapidly, respond immediately, contain and minimise business impact.


What Sharp products will Bitdefender’s technology be integrated into and what protection will it offer? Bitdefender’s technology will be integrated into Sharp’s Future Workplace A3 line of MFPs. Sharp’s newest A3 MFP Series extends its eco-system of smart office tools to help businesses adapt to meet the demands of hybrid working. Te Bitdefender antimalware engine performs real-time scanning of all input and output data from the devices, alerting users, IT or security teams when threats are detected.


December/January 2023 | 21


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52