Dec 02

Data Disaster Backup Comes Ahead of Data Encryption

Data disaster recovery data is an important premise as well as an important part of the enterprise information leakage protection. The so-called data disaster recovery, in simple terms is to backup and store the same information in different places. If companies centrally store all the data in the one place, once the crisis occurs, the damage and loss will be immeasurable.

When the data has been destroyed, then there is no need to protect it. The so-called data disaster recovery, in simple terms is to copy the data and store them in different places, so that even if data in one place is accidently damaged, the data stored in other places can also be used, which will not affect the normal business operations. But if companies centrally store all the data in the same place, once the crisis occurs, the damage will be immeasurable.

In fact, many companies have risks of data loss or data damage in many places, which can be divided in following four types:

The first type is that some companies have low awareness of information security, paying less attention to data classification and archiving of documents, randomly storing documentation in any place, when you want to use, you cannot find them in anywhere.

The second is the false -style loss. In the office process, employees will randomly delete those data that they think it’s temporarily useless, while later on they need these data, but can’t retrieve them.

The third one is misconduct lost. We may take wrong operations owing to various factors at work; we may inadvertently delete important documents.

The last one is malicious destruction. If the members in companies want to vent discontent, commercial espionage deliberately implement to combat competitors, all those will cause data and information malicious destruction. If there is no perfect disaster recovery mechanism, these issues are likely to become a nightmare of enterprise.

How to build an effective data backup mechanism to deal with unexpected accidents?

First, the enterprise should track and backup the important documents in internal network, including document printing, IM transfer documents, files attached in send e-mail, a copy of the document in removable storage devices, etc. It’s able to not only prevent document being loss, but also completely control document to prevent illegal leaks.

Second, enterprise should audit and backup some operations of important documents, such as modify, delete, etc., to prevent accidental deletion or malicious deletion.

Third, enterprise should backup the document server, if the company adopts the information leakage protection system, the supplier should provide server backup solution, so even if a server fails, it will not interfere with the system running.

Fourth, the enterprise should also make plaintext backup if the company uses the file encryption system. Because no matter how stable the encryption system is, the event of earthquakes, fires, power outages and other accidents may have effect on the integrity of the document.

Only with a sound data disaster recovery mechanism, the enterprise information leakage protection system is considered complete.

Nov 25

Information Leakage Protection Also Needs Service Awareness

Enterprises always make a common mistake when constructing information leakage protection, namely: IT managers simply implement the superiors’ control strategy, but in spite of the majority of users. As everyone knows, the latter is the most important part of information leakage protection.

Many enterprises’ IT managers often complain during the process of building information leakage protection that other departments do not work with them. In fact, in this age where issues of information disclosure frequently happen, the enterprise takes some anti-phishing measures in order to protect their information assets, which is understandable.

However, the problem is that many companies do not spend enough time and effort to understand the demands of themselves and the changes of status caused by protection. And they seldom provide reasonable protection measures to decrease the impacts. If just anxiously deploying strategy, to take coercive measures and adopting coercive measures that cause inconvenience to some routine work, users absolutely can’t provide understanding and supports, so that the protection strategy won’t be formed and effective.

It’s not that Information leakage protection constructing itself is hard, but the companies’ attitudes to information leakage protection obstruct the effects. I believes that security matters requires all members to participate in, that the information leakage protection can achieve good results. If IT management staffs and application strategy staffs form a opposite relationship, the information leakage protection will become a internal friction battle.

How to ensure security and don’t affect efficiency at the same time? In the face of severe information security situation, companies should recognize that information leakage protection is a protracted war, which needs to establish a comprehensive anti-phishing front inside the enterprise, especially needs the main part, namely the non-IY departments to take part in the action. Enterprises must start from real working process, completely account of use experience to provide intimate “service” and find a balance between security and convenience, so as to win everyone’s understanding and cooperation. Only by this way, can information leakage protection be sustained effectively.

Enterprise should try best to ensure everyone in the company takes part in the information leakage protection action when establishing information protection team, so that all departments’ needs can be effectively conveyed.

Second, when deploying information leakage protection, enterprises must take different secure level on different departments, such as deploy the basic foundation of audit and control to the low level of classified departments; as for core departments, expect the detailed audit and control, enterprises may consider the file encryption to protect deeply the secrets of company..

Once again, every department should designate an authority management staff, letting him/her to be in charge of the department information security. If it’s possible, enterprise can provide direct feedback channel for average user to executives, in order to prevent the abuse of authority management staff.

Of course, such united front of information leakage protection can’t be established in a short time, or it can be said that it can’t be done only by the enterprises themselves; it also requires security vendors and national relevant departments to assist. However, after all, the enterprise is the leader of this action, the information leakage protection can be effective only when enterprise has a deep understanding of own security needs, and take active defense and the flexibility adjustment in this action.

Nov 19

Master Data Leak Proof Initiative with Encryption Software

Security has always been a relative concept, data security is the same. Even though it is a relative concept, it doesn’t mean that it is not important. Data security is absolutely safe, but the secure level user can select is relative.

“Users should be free to choose secure level they need. Some users may need more Internet information exchanges, their required safety level might be a little lower, a number of special populations such as children, and they need higher secure level.

But some people who are used to use network security, data security programs for free make themselves be tied up with many software ads packages when they enjoy the free service. Such kind of security program is free, while it will grasp user’s mind and decide users secure level when they choose this free program. This is equal to give the autonomy of data secure to others, or it’s just the reason why data leakage happens so frequently.  

Currently, people are paying more and more attention to information security and personal privacy. People are gradually willing to grasp the autonomy of data leak proof, but don’t want to be controlled by others.

How can we get back our autonomy of data leak proof? Where shall we begin? The answer is the data itself, as long as you control the data itself, which is as the main body of information security, once the data has been controlled, and then the information security initiative naturally will be returned to your hands.

So what if you control data itself or ensure the security of the data itself? That is file encryption software. Choose trustworthy encryption software, use its technology to automatically choose data protection method, once you do so, you get the data defense initiative for your own data, even though you want to use other programs to further enhance the security, as long as you control the data, the data leak proof initiative is still in your hands.

Multi-mode encryption is a kind of transparent data encryption technology that can offer a variety of usage scenarios and adopt a variety of encryption strategies. In multi-mode encryption mode, the user creating secret files ways include both active and passive methods, which contains at least the following modes: specific format encryption mode, specific directory encryption mode, specific format unencryption mode, specific user unencryption mode(able to modify and check other’s secret files), particular user unencrypted mode (able to view but can’t modify other’s files), USB flash drives and other external hard drive encryption mode , Network Neighborhood network encryption mode, manual encryption, full disk encryption, etc.; these encryption modes can be assigned to different users or user groups .

This flexible encryption technology that can be selected according to the user’s own requirements just meets people’s desire for the right of choice, so that people can master data security and information security initiative.

Nov 11

Information Security Attacks are coming

In information age, two kinds of power of data and network have become a strong force to push the big wave of the times. We may say that information age is a symbol that little strength forms great strength.

But the biggest threat to the information age, data, and information security is an action that transforms small threat to big threat-DDOS. Confront the overwhelming DDOS attacks, comprehensive defense is apparently “time-consuming”, the effect is not ideal. What we can do is only focusing on breakthroughs.

What is DDOS?

DDoS is tributed Denial of Service means that utilize client/server technology to collect multiple computers as a attack platform to launch DoS attacks on one or more targets, thus exponentially increase the attack power of service denial. Typically, the attacker uses a stolen account to install DDoS master program on a computer, the master program will communicate with a large number of agents at a set time. Agents will launch attacks when receiving instruction. Using client / server technology, the master program can activate hundreds of times of agents operations.

Although nowadays, the bandwidth and the kernel are more and more powerful, it seems that resisting large flow of attacks is no longer a problem. But we must also know that for the hackers , the applicable network resources are more and more abundant, while the cost is getting lower and lower. If we say that the a conventional attack only aims at large site, or come from malicious competitions, now we can say that an attacker may randomly choose target, and  every site will be the attack object.

Currently, to resolve DDOS of DNS, such as flows attacks, the query type of attack, we can only rely on high anti -type DNS. Now defensive DNS don’t defense relying on checking attack source, but directly dependent on the strong machine room to accept this kind of attack traffic so as to ensure normal access to site.

Although DDoS seems to be overwhelming, as long as we understand its true purpose, we can take an effective defense or even counterattack. The targets of DDOS attacks are just the data and information that are increasingly improving their own value. So long as we can find a flexible defense method to prevent the origin of attacks, we can achieve the goal of defense and even counterattack. And now the security technology that can be capable of performing the daunting task is none other than non-multi -mode encryption technology.

Multi-mode encryption uses symmetric algorithms combining asymmetric algorithms technology, using a strong algorithm to ensure the protection quality of data origin, so as to greatly improve data’s resistance ability to attacks. And because of the flexibility of multi-mode encryption, users can choose encryption mode, this flexible feature is just the power of individual, enterprise or even nation to respond to DDOS.

Although the development of information technology and the Internet promotes the development of the times, the dark side of them also makes individuals, companies and even countries suffer from a variety of information security threats, DDOS is one of them. But as long as we can find a secure technology that have powerful defensive affects on origin of information and data.

For more information and solution about data security and file encryption, please visit www.kakasoft.com.

Nov 06

Privacy Leakage Bursts, Self-protection is in Need

Recently, many issues about information leakage have burst on the Internet, such as Paypal password hacking and the Prism. In these incidents, the consumer’s personal information was intentionally or unintentionally leaked and led to great loss to consumers, such as privacy theft, unauthorized use of funds. Due to network services still has many security risks, consumers must be aware of the importance of personal information in network service process and shall use privacy protection function in information security products to ensure personal information secure.

Privacy disclosure event arises one after another in recent years, in January 2012, e-commerce site Zappos was hacked, 24 million users’ e-mail, password and other information have been stolen. In July 2012, accumulated over 8,000,000 users’ information of Jingdong, Yahoo and many other sites have been leaked. With more and more people’s personal information was transferred to the Internet, the risk of information leakage is still expanding.

Because a lot of network services connected to each other, a single information leakage may produce ‘ chain reaction ‘, which leads to other more important information can be leaked. For example, in Paypal funds theft incident, the criminals will be able to get Paypal password by stealing customers’ phone. And criminals can also obtain access permissions to relevant network system by stealing the victims’ identity information, which allows the criminals to cause worse damage.

Even though consumers can not directly improve the level of safety and security of the network service provider, but you can take more prudent measures to prevent personal information from being disclosed, which includes:

  1.  Lower the relevance between various network services account, try not to set the same password for several account, or do not set one single verification method for many accounts. When your relevant information is leaked, you must move quickly to change passwords and other remedial measures to prevent harm to further expand. 
  2. When you use network services, consumers need to pay more attention to security of personal information, in particular, try your best to minimize the spread scale of identity information to prevent criminals’ targeted attacks. 
  3. Use file or folder encryption program to enhance the security of personal information stored in PC or cell phone. You can never ensure your PC will not be invaded by unauthorized access, or your portable storage flash drives won’t lose. Once you conduct mistakes as above, you will also confront great loss, including data loss and financial loss. In order to prevent the data and information stored in your PC or other flash drives falling into wrong hands, you had better lock the files in it with password, so that others who have no correct password can’t access to your data.access to your data.
Oct 28

HP: Cyber Crime Attacks Lead to Rising Costs and Increasing Defense Time

Hewlett-Packard Company recently released results of a global survey conducted by the Ponemon Institute; it shows that the costs frequency and defense time incurred by cyber attacks have been upward for four consecutive years.

Actual costs incurred for network attacks

The cyber crime that cause highest costs includes denial of service, malicious insiders and internal network attacks, which account for more than 55% of the total cost generated from cybercrime of average annual per enterprise.

Information theft is still the highest external costs, followed by business interruption. In 2013, information loss accounts for 43% of total external costs that is less than that of 2012 by 2%. Business interruption or loss of production capacity accounted for 36% of external costs, compared with 2012 increased by 18%.

Recovery and detection are the most costly internal activities. Last year, the costs of recovery and detection of internal activities account for 49% of total costs, most of which is in cash and labor expenses.

Cybercrime generated costs are different due to company size, but per capital cost in small companies per capita is much higher than that of large companies.

The costs caused by cybercrime in financial services, defense, energy and utilities companies are much higher than the costs incurred in the retail, hospitality and consumer products industry enterprises.

Security intelligence solutions and governance practices are essential

Using secure intelligence technology will be more effective in the detection and containment of network attacks, the average annual cost savings is of nearly $ 4 million, rate of return on investment is higher than that of other types of technical by 21%.

Adoption of enterprise security governance practices can reduce cybercrime incurred costs, including investment of appropriate resources, the appointment of executives and hiring security staff and certified experts, which can help companies to save nearly average $ 1.5 million every year.

“Information is a powerful weapon for enterprise to ensure network security.” the chairman and founder of Ponemon Institute, Dr. Larry Ponemon said: “Through practical experience and in-depth interview to more than 1,000 worldwide security professionals, the survey of cybercrime incurred costs provides us with valuable information about the causes and costs of network attacks. This survey is designed to help companies make low-cost, high-yield decisions to minimize the company’s risk as far as possible. ”

For individual and groups that want to defend against cybercrimes, password protection for files and folders is an extra security solution for data security. Comprehensive protection for confidential data and information is necessary for individuals and groups to decrease the cybercrime incurred costs.

Oct 21

Establish Email Communication Network to Enhance Information Security

For the countries, the impacts caused by the issue of prism finally gradually emerged, and as a former world power, Germany finally plans to take actions on the information security aspect.

“Close the door on the U.S. National Security Agency!” German “Focus” magazine said on the 14th, the Germany’s largest telecommunications operator Deutsche Telekom Group appealed to set up a domestic email communication network to prevent foreign spies and hackers monitoring Germany local e-mail.

There’s report that since the United States the “prism” scandal disclosed, transnational Internet information and communication security has been questioned by various sectors. So far, the contents of emails transferred between Germany local users have to be sent to the destination by passing the server set in the United States or the UK. Therefore, Deutsche Telekom expressed the hope that in conjunction with other network operators to establish domestic mail communications network.

The director of Deutsche Telekom data confidentiality affairs-Mel Klein said that by this, e-mail communications between users in Germany has no need to pass the international focal point, but to restrict the data in the territory, which ensures that Germany data will not be monitored by the third party.

Deutsche Telekom has taken a step for the establishment of domestic e-mail communications network. The group has come to an agreement about providing a more secure email services framework with the German mail carrier Wed.de and GMX.de. Three companies employ more secure e-mail technology “Email – Made in Germany” to ensure that e-mail message sent by the user will be transferred with encryption technology. Moreover, all data of three carriers will only be stored on a server in Germany.

Allegedly, Deutsche Telekom has set an ambitious goal. In addition to the immediate objectives of establishment of the e-mail communications network in Germany outside, Deutsche Telekom is also proposed to extend the network to the European Schengen countries. Of course, this does not include the United Kingdom, one reason is that the UK is not a Schengen country, and the other reason is that there’s a complex relationship between the United Kingdom and the United States. Mel Klein said now all aspects have been matured, what we need is the consent of the German government and support of the network operator. But Deutsche Telekom’s competitor broadband network operators QSC said it’s impossible to determine that data is transferred through domestic or international routes.

Since there had been a history of monitoring people during the period of East Germany and Hitler’s Nazi, acts of government surveillance is a very sensitive topic in Germany. If establish a domestic e-mail communications network, the German intelligence agency may still monitor domestic data and telephone communication ​​under existing laws. Currently, the German government is authenticating on this proposal, many people expressed support.

Since the expansion of the prism’s impacts, countries are bound to introduce their own information security measures to deal with the problem, and as us, using file encryption software for data security protection is a must.

Sep 10

Google data center will fully encrypt data

Because of the data monitoring scandal of the U.S. National Security Agency (hereinafter referred to as “NSA”), Google has started a project that it will encrypt data transmitted between every data center.

 

“Washington Post” reported that Google has made this plan last year. But under the influence of “prism” incident of the NSA, Google is now ready to accelerate the implementation of the plan, in order to defend the company’s reputation for data protection. The vice president of Information Security Engineering of Google, Eric Grosse said: “This is an arms race, we see that the government sector is the most powerful race participants.”

 

On last Thursday, a report said that the U.S. government is seeking encryption keys to crack various forms of encryption solutions. Privacy protection and information security researcher, Ashkan Soltani said that government departments have a set of incredible keys, but they may be not applicable to this plan of Google.

 

Google’s plan does not have any influence on the legal requirements that this company need to meet. According to the Government’s request, Google still need to provide data for NSA or other departments. But Google has accelerated the deployment of this program, ensuring the program would begin in the coming months.

 

At present, the email transmitted from a Gmail account to another account email has been encrypted by “Transport Layer Security” encryption technology during the transmission. According to the plan, in the future the other data Google data center sends to others, such as the contents in Google Drive cloud storage service will be encrypted.

 

Google has not disclosed more information of the plan, such as how much it will cost Google, how many center centers it may refer to, and what encryption method it will use. Google said that this project will use end-to end encryption technology, which means that the data stored in the server and data in the transmission will be encrypted. It’s just like the folder protection on LAN which is used in our daily life, all the data will be conveyed to others via the Internet will be encrypted, which is a complete protection for the data. As the data leakage and data breach, we can’t pay too much attention to data security. As for us, individuals who are living in the real life and the network at the same time, we should take measures to password protect folder in the case of data being stolen.

Sep 02

The U.S. Launched Network Attacks to Several Countries in 2011

Top-secret documents “Washington Post” recently received shows that in 2011, U.S. intelligence agencies had implemented 231 network attacks to other countries which include Iran, Russia, China and North Korea and other countries.

This news is from funding budget documents provided by the former employee Edward Snowden of the U.S. National Security Agency (hereinafter referred to as “NSA”), which is also the evidence that the Obama government infiltrate and sabotage the foreign computer networks through cyber attacks.

 

Furthermore, according to another code-named “GENIE” secret plan, the U.S. computer experts also invade foreign computer network, placing it under the secret control of the U.S. Documents show that the project of $ 652 million budget inserts a large number of malware into tens of thousands of computer equipment every year, and plans to expand to several million units.

According to budget documents provided by Snowden, and the news disclosed by the former U.S. officials in an interview, the scope and scale of the computer intrusion implemented by the Obama administration are far more than outsiders imagine. Obama administration takes all network attacks as confidential action, and never publicly acknowledged.

The scope and scale of network attacks show that the United States has undergone tremendous changes, in the past the U.S. government sought to maintain international standards and against the intrusion actions via cyberspace, because at that time the U.S. economic and military force are very dependent on computer networks.

 

U.S. Deputy Defense Secretary William J. Lynn III Lynn said: “The guidance of policy debate has produced a change, attacking options now increasingly prevail, I think, more and more cases show that cyber attacks have been an important part for the United States to curb some of the enemy’s action.”

 

The budget documents disclosed by Snowden show that the U.S. government among the 231 network attacks implemented be the U.S. government since 2011, nearly three-quarters of which aimed at the highest priority targets, according to the former U.S. government officials, these targets includ Iran, Russia, China and North Korea, etc.. But budget documents provided little detailed information about these operations.

In 2009 and 2010, the United States and Israel allegedly jointly developed Stuxnet worm, which has destroyed Iran’s uranium enrichment facility’s computer system in the network attack. This event is often considered as a vivid case that the United States uses weapons to attack enemy networks.

According to presidential directive the U.S. government announced in October 2012, U.S. intelligence agencies define network attacks as “an activity of manipulate, destruct, destroy the information stored in your computer or computer network.” Therefore, folder encryption and file protection solution to network attacks now are widely used for data security. Most networks attacks will produce a direct impact on enemy computer system’s data or normal use of computer, such as network connection speed down and so on.

Aug 26

the Guardian, Cooperate with the New York Times Reports “Prism”

The British “Guardian” announced on Friday that it has agreed to let the “New York Times” see partial disclosure of confidential files that Edward Snowden disclosed in “prism” issue.

 

Before two sides reached a cooperation, the British government has threatened that unless the “Guardian” abandon or destroy the relevant documents about country’s Government Communications Department (hereinafter referred to as “GCHQ”), or it would commence legal action.

 

Informed sources said that the cooperate agreement has been reached as early as a few weeks ago, editor Jill Abramson of “New York Times” have been involved in negotiations.

 

According to the U.S. news website Buzzfeed reports, Scott Shane who is responsible for national security and intelligence news report, “New York Times” is now writing a series of reports which are expected to be released next month.

 

“The Guardian” said, the cooperation with “New York Times” makes it possible to continue to expose massive surveillance program of GCHQ besides its government duties in Snowden documents. ”

 

Allegedly, Snowden has gained temporary asylum from Russia and he has been informed of this cooperation agreement.

 

“The Guardian” editor, Alan Rusbridger disclosed earlier this week, under the supervision of GCHQ agents, “The Guardian” employees destroyed the computer devices contained Snowden’s documents earlier this month. Before that, the British government officials also threatened that they are likely to take legal action to “The Guardian”.

 

Luz Bridge said he had warned the British government officials, although those original materials have been destroyed but a copy was sent to the outside of British government jurisdictions.

 

British officials said they detained David Miranda briefly and had a questioning in London Heathrow Airport; and there will be a criminal investigate on this week. Miranda is the native British partner of Glenn Greenwald who is a reporter of “Guardian” in Brazil, Greenwald is the person who is in charge of the file disclosed by Snowden, what’s more, he also could directly contact Snowden.

 

British government officials said the disclosed information from Snowden has seriously undermined the UK’s national security, if there is more confidential disclosure, which can lead to a lot of people’s lives at risk.

 

For the issue of “Prism”, now more and more people are focusing on the data security, especially some enterprise and groups. Both individuals and groups are searching for a effective method to protect their files contained important and confidential data, of course, comprehensive protection for data will decrease many concerns and potential losses for us.