COVID-19 has unleashed a great acceleration in digital transformation across all sectors, and, with so much to gain and so much at stake, the speed of transformation among C&E firms over the past few months has been nothing short of breathtaking.
MOUNTAIN VIEW, Calif. (PRWEB) February 11, 2021
Egnyte, the leader in cloud content collaboration and governance, today announced the release of Egnyte for Construction and Engineering, a new platform to help construction and engineering (C&E) firms increase project efficiencies while also enabling a variety of cloud-first processes and experiences for clients, partners and employees.
“C&E companies have historically ranked among some of the least digitized businesses, representing a more than $500B opportunity for productivity improvement in the US alone,” said Ronen Vengosh, VP of Construction and Engineering at Egnyte. “However, COVID-19 has unleashed a great acceleration in digital transformation across all sectors, and, with so much to gain and so much at stake, the speed of transformation among C&E firms over the past few months has been nothing short of breathtaking.”
Egnyte for Construction and Engineering enables C&E companies to:
- Minimize costly delays on the jobsite, using file caching to maintain connectivity to critical digital documents even in low (or no) bandwidth environments;
- Provide secure, remote access to large files (e.g., Revit, AutoCAD, VR/AR) for distributed employees, clients, subtrades, and partners;
- Enable a seamless experience on mobile clients (phones and tablets) for easy, front-line access to drawings, punch lists, quality, safety, and other critical documentation;
- Mitigate risk by securing and monitoring valuable and sensitive content in real-time, and ensuring relevant document retention and deletion obligations are met, across projects, regions, and cloud apps.
In addition, Egnyte for Construction and Engineering provides teams with one unified document library across an expansive group of the industry’s leading digital applications, including Procore, Bluebeam, and Smartvid.io, as well as horizontal productivity tools like Microsoft 365, Google Workspace and Slack.
According to David Pratt, Director of Corporate & Operational Technology at Robins & Morton, one of the country’s leading specialist builders of new hospitals and healthcare facilities, Egnyte’s integrations with their existing application stack is critical to the success of their projects.
“Robins & Morton has reduced the challenges we had in the field with accessing and creating large files, as well as storing and archiving project documentation by integrating our existing apps with Egnyte,” said Pratt. “This supports our team’s ability to efficiently plan and execute projects.”
One of the critical software integrations leveraged by Robins & Morton is between Egnyte and Procore, a leading provider of construction management software. According to Pratt, Egnyte’s seamless integration with Procore means Robins & Morton has been able to tie its cloud storage and project management platforms together to make everyone’s life easier.
“The partnership between Procore and Egnyte allows our mutual customers to easily access project files regardless of location and file size, eliminate double entry, and leverage extended functionality in Egnyte,” said Kris Lengieza, Senior Director of Global Partnerships and Alliances at Procore. “The real-time sync between Egnyte and Procore is also a significant step forward when it comes to connecting everyone in construction.”
Egnyte’s integration with Bluebeam, a leading developer of solutions and services for architecture, engineering and construction professionals worldwide, allows for customers to securely communicate and markup documents and drawings in real-time from anywhere in the world.
“By leveraging the power of connected systems and open standards, teams can stay on the same page, and keep projects moving forward,” Bluebeam Director of Technical Account Management Andrew Gaer said. “Integrations like the one shared between Bluebeam Revu and Egnyte are more than just simple connections, they allow for the systems to complement each other, drive efficiencies, reduce risk and improve outcomes, no matter where you work or what project phase you’re in.”
Egnyte for Construction and Engineering is Egnyte’s second industry-tailored solution, following the release of Egnyte for Life Sciences in November 2020.
Egnyte provides one unified platform to govern and gain insight into business content on any app, any device, anywhere. More than 16,000 businesses trust Egnyte to empower distributed teams, protect business-critical data and reduce file-sharing cost and complexity. Investors include Google Ventures, Kleiner Perkins, Caufield & Byers, and Goldman Sachs. For more information, visit http://www.egnyte.com.
Share article on social media or email:
Fintechs are ransomware targets. Here are 9 ways to prevent it.
Cybercriminals are clever, and they often target fintechs for two reasons. They know fintechs handle a lot of sensitive and financial information on a daily basis, and that they probably have the means to meet hackers’ demands and get back to business as usual.
Ransomware attacks are one of the most common fintech cybersecurity risks, and falling victim to one can be devastating — or disruptive at the very least. So, we asked the experts at ESET to explain how to prevent ransomware, and secure your business from the inside out.
Firstly, what is ransomware and how does it work?
With a ransomware attack, a cybercriminal hacks into their victim’s systems and essentially holds their data “hostage” until they pay a ransom. Since hackers know how valuable data is to a business, they tend to set ransoms in the thousands or even millions of dollars.
There are two types of attacks: crypto ransomware encrypts all the files, folders and hard drives on the infected computer, while locker ransomware locks users out of their devices. For cybercriminals, the goal is to get you to pay up so you can retrieve your files and mitigate any damage to your business.
What to do after a ransomware attack
Unfortunately, you don’t have too many options if you fall victim to a ransomware attack. You’ll need to decide to pay the ransom or not, and that involves weighing up how much your data is worth. Just keep in mind that giving in to a cybercriminal’s demands may encourage them to attack you again — and there’s no guarantee that your data will be restored.
Either way, it’s important to go into disaster recovery mode right away. Follow these steps for what to do if you get ransomware:
1. Alert your IT department. If your company has IT professionals or a Chief Information Security Officer, notify them about the attack. Hopefully, they’ll have a plan of actions for situations like these and be able to guide your team through these steps.
2. Trace the source of the attack. Most ransomware attacks have a countdown clock before all your files are deleted forever, so the sooner you find the source, the faster you can act. Typically, ransomware sneaks its way into your system through a malicious link or email attachment. The best-case scenario is the ransomware only attacks that one device, and the worst-case is it infects your entire system. Once you’ve found the culprit, ask the user if they’ve opened other suspicious emails or noticed anything weird about their computer.
3. Remove that device from your network. To stop the ransomware from spreading through your network, you’ll need to unplug the infected device.
4. Let your employees and clients know about the breach. While it’s important not to cause panic, you do need to be transparent. The truth is, most cyber breaches are the result of human error, so your employees need to know what happened and what’s expected of them. As for your clients or customers, contact them if you have proof their data has been compromised. In other words, avoid putting out a statement until you have all the information.
5. Invest in better security systems. When you’ve gotten through the aftermath, look into more sophisticated cybersecurity in fintech practices.
9 ways to prevent ransomware attacks
Ransomware is incredibly common, and as you now know, there are limited ways to deal with an attack. You need to be proactive and prepared, and implement measures to prevent an attack.
As you might have guessed, fintech cybersecurity should be a priority. These are our tips for how to protect against ransomware:
Set up sophisticated email filters. The majority of ransomware is delivered by spam or phishing emails. To stop ransomware before it has a chance to infect your systems, employ email filters that scan all email content for spam, viruses and other forms of malware.
Run regular security audits. It’s worth assessing your security systems to identify any gaps or weaknesses. If you can, consider outsourcing your cybersecurity, reallocating resources or hiring in-house professionals to give your fintech peace of mind.
Use an up-to-date antivirus and anti-ransomware software. To protect your company devices from ransomware, malware, identity theft and more, install a third-party antivirus software designed for businesses. ESET Digital Security for Business offers the best ransomware protection and defence against a range of advanced cyber threats, and can be tailored to the size and scope of your fintech. Along with blocking persistent threats, it secures your devices with endpoint protection, which is especially handy if you have employees who work remotely.
Accept all software updates. Cybersecurity companies often release new patches to fix bugs and address vulnerabilities, which is why it’s essential to stay on top of any updates. In other words, you could have the most sophisticated antivirus ransomware software in the world, but that won’t do you any good if you ignore every notification that pops up! Updates usually take a few minutes to download and require you to restart your computer, but they make your company much less vulnerable to ransomware.
Implement multi-factor authentication. Two-factor authentication is good, but multi-factor authentication is better. This means employees will need to enter their username, password and one more piece of additional information — usually a code sent to their phone or email — before they can log into the system. It also makes it harder for hackers to break in.
Create a whitelisting program. This is effective in preventing ransomware, and it involves restricting the applications that can run within your company’s system. Think of it as the opposite of blacklisting — only applications that have passed the approval process will work.
Encrypt your company files. Ideally, all of your data should be end-to-end encrypted, and access limited to the people who need that information to do their jobs. The good news is, most computers and phones have built-in operating systems that encrypt stored data and prevent unauthorised users.
Tighten your cloud security. Speaking of the cloud, some cloud services don’t offer secure encryption and can’t distinguish between authorised users and other people trying to access the cloud. ESET Cloud Office Security will configure your cloud security so hackers can’t bypass your company’s policies and tap into sensitive information.
Routinely back up your data and systems. By backing up your data regularly, you’ll be able to recover any lost or corrupted data if your server crashes or if you fall victim to a ransomware attack. We recommend always having two encrypted backups: one on the cloud, and one an external hard drive.
Get in touch with ESET today!
What are Insecure Direct Object References (IDOR)?
HackerOne empowers the world to build a safer internet.
Insecure Direct Object References (or IDOR) is a simple bug that packs a punch. When exploited, it can provide attackers with access to sensitive data or passwords or give them the ability to modify information. On HackerOne, over 200 are found and safely reported to customers every month.
What is an IDOR?
There are several types of IDOR attacks, including:
- Body Manipulation, in which attackers modify the value of a checkbox, radio buttons, APIs, and form fields to access information from other users with ease.
- URL Tampering, in which the URL is modified at the client’s end by tweaking the parameters in the HTTP request.
- HTTP Requests in which IDOR vulnerabilities are typically found in GET, POST, PUT, and DELETE verbs.
- Mass Assignment, where a record pattern can be abused to modify data that the user should not be able to access. While not always a result of IDOR vulnerabilities, there are many powerful examples of this being the result of it.
In its simplest and most common form, an IDOR vulnerability arises when the only input required to access or replace content is from the user. This vulnerability submitted to Shopify by California-based hacker Rojan Rijal (a.k.a. @rijalrojan) in 2018 is the perfect example.
By observing how file attachments were labeled when sending a query to Shopify’s Exchange Marketplace application, Rojan was able to replace documents by leveraging the same file name from different accounts.
Figure 1: IDOR vulnerability reported by @rijalrojan to Shopify on the HackerOne platform.
For retail and ecommerce companies, IDOR vulnerabilities represent 15% of what organizations pay bounties for and represent the top vulnerability for programs across government (18%), medical technology (36%), and professional services (31%) industries.
If they’re so simple, why are they so common?
In short, IDORs can not be detected by tools alone.
IDORs require creativity and manual security testing to identify them. They require you to understand the business context of the target application. While some scanners might detect activity, it takes a human eye to analyze, evaluate, and interpret. Understanding the deeper context is an innately human skill that machines cannot replicate. In traditional pentests, unless a pentester tests every possible parameter in every request endpoint, these vulnerabilities can go undetected.
What are the implications of an IDOR vulnerability?
Perhaps the most infamous IDOR vulnerability as of late is that found in alt-tech social media platform Parler. The company ordered their posts by number in the URL, a telltale sign of IDOR. If you add a sequential digit to a Parler post URL, you could access the next post on the platform indefinitely. Without authentication or access limits, an attacker could easily build a program to download every post, photo, video, and data from the entire site. While this was just public posts (not necessarily IDs used to verify accounts), geolocation data from posts was also downloaded, which could reveal GPS coordinates of users’ homes.
How can you prevent IDORs from cropping up?
“Avoiding IDOR is only possible by building a robust access control mechanism, choosing the best fit methodology for your scenario, log all access and if possible do an audit with a post authorization check,” said HackerOne hacker Manoel Abreu Netto, better known online as @manoelt.
“However, if you want to reduce the impact of an IDOR, avoid using a simple pattern to reference objects in the backend, thus not using a sequential integer value but something like uuid or even a MAC (hashed ID) with a salt per user session.
This does not eliminate the IDOR, but reduces the overall impact and the ability to enumerate objects.”
To remediate IDOR vulnerabilities, below are a few best practices.
- Developers should avoid displaying private object references such as keys or file names.
- Validation of parameters should be properly implemented.
- Verification of all the referenced objects should be checked.
- Tokens should be generated in such a way that it can only be mapped to the user and is not public.
- Ensure that queries are scoped to the owner of the resource.
- Avoid things like using UUIDs (Universally unique identifier) over Sequential IDs as UUIDs often let IDOR vulnerabilities go undetected.
For more information about reducing risk and getting started with hacker-powered security, check out our CISOs Guide to Deriving Value from Hacker-Powered Security.
Create your free account to unlock your custom reading experience.
80% of Global Enterprises Report Firmware Cyberattacks
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack
Shadowlands patch 9.1 not out until May, here’s what to expect
Heroic defeat Gambit Esports in ESL Pro League 13 grand final
chessbae removed as moderator from Chess.com amid drama
Ludwig has announced when he’ll end his subathon Twitch stream
MAD Lions wins first LEC title after reverse sweeping Rogue
MAD Lions claim LEC throne, reverse sweep Rogue 3-2
LoL: MAD Lions vs Rogue LEC Spring Split 2021 Grand Final Recap
Armao to start for Team Liquid in MSS Grand Finals as Santorin Recovers
Die 5 wichtigsten Ereignisse im DeFi-Sektor
CS:GO Navi Chooses “b1t” For Their Five-man Lineup At RMR Tournaments
Twitch bans Adin Ross after ZIAS uses Homophobic slurs during his stream
CoD: Players Call For Warzone HUD Update In Season 3
Top World of Warcraft teams clash in the AWC Shadowlands Circuit
DarkZero Esports strikes RESPAWN partnership
LoL: LEC Reveals The Community All-Pro Team For Spring 2021
Asmongold will not stop saying the R-word
Galaxy Racer signs new star-studded PUBG Mobile roster
Dota 2: Ana’s Comeback Completes OG’s Roster
Hearthstone Grandmasters 2021: Week 1 Day 2 regional recap
Cloud9 CEO Dismisses TenZ Buyout Rumors as High as $5 Million
XSET reverse sweep Envy to move onto VCT Grand Final
Team Liquid Topple TSM in 3-1 Series, Will Meet Cloud9 in Finals
Knut Svanholm im Interview: „Bitcoin verwischt die Grenze zwischen Besitz und Wissen“
Dota 2: ChYuan Replaces Masaros On Fnatic’s Offlane
ana reunites with OG ahead of DreamLeague Season 15
Ana is back! Again
OWL 2021 Power Rankings – #16 Houston Outlaws
Dota 2: EHOME Signs Sylar, Ahjit Moves To Bench
Code S RO16 Preview: Rogue, Zoun, INnoVation, Dark
The best way to play Hecarim in League of Legends season 11
Blockchain1 week ago
Bitcoin Cash Price Prediction: BCH/USD Price Turns Bearish; Can the $540 Support Hold?
Blockchain1 week ago
How Chainlink will help secure Polkadot’s environment
Blockchain1 week ago
Blockchain-based renewable energy marketplaces gain traction in 2021
Esports1 week ago
GeneRaL is replaced by RAMZES666 on Na’Vi
Cleantech1 week ago
Volkswagen’s European Factories Up To 95% Powered By Renewables
Aviation1 week ago
World2Fly gears up for July launch with roll-out of Airbus A350-900
Blockchain1 week ago
Mark Cuban Thinks Dogecoin ($DOGE) Could Get to $1, but Could It Get to $10?
Esports1 week ago
Amouranth becomes Twitch’s top female streamer, beats Pokimane
Coinpedia1 week ago
BitTorrent Token Price Analysis – BTT Poised to Hit $1 In April?
PR Newswire1 week ago
Stärkung von Frauen in einer aufstrebenden Branche
Blockchain1 week ago
Hardware Hacker Modifies Old School Game Boy To Mine Bitcoin
Blockchain1 week ago
‘Silent crash’ as price floors collapse across NFT space