<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TekBlogger, Author at Teksalah - Beyond Solutions</title>
	<atom:link href="https://teksalah.com/author/tekblogger/feed/" rel="self" type="application/rss+xml" />
	<link>https://teksalah.com/author/tekblogger/</link>
	<description>Transformation Experts</description>
	<lastBuildDate>Wed, 04 Jan 2023 12:59:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://teksalah.com/wp-content/uploads/2018/10/favicon.png</url>
	<title>TekBlogger, Author at Teksalah - Beyond Solutions</title>
	<link>https://teksalah.com/author/tekblogger/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Effective Cyber Defense Strategies for Enterprises against Social Engineering Attacks  &#8211; Part1</title>
		<link>https://teksalah.com/effective-cyber-defense-strategies-for-enterprises-against-social-engineering-attacks/</link>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Wed, 04 Jan 2023 12:17:00 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Cyber Defense Strategies]]></category>
		<category><![CDATA[Angular Phishing]]></category>
		<category><![CDATA[Baiting]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Credential Harvesting]]></category>
		<category><![CDATA[Deep fakes]]></category>
		<category><![CDATA[Desk Sniffing]]></category>
		<category><![CDATA[DSD]]></category>
		<category><![CDATA[Dumpster Diving]]></category>
		<category><![CDATA[Eavesdropping]]></category>
		<category><![CDATA[Impersonating]]></category>
		<category><![CDATA[Pharming]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Popup Windows]]></category>
		<category><![CDATA[Pretexting]]></category>
		<category><![CDATA[Quid Pro Quo]]></category>
		<category><![CDATA[Reverse Social Engg]]></category>
		<category><![CDATA[Robocalls]]></category>
		<category><![CDATA[Shoulder Surfing]]></category>
		<category><![CDATA[Smishing]]></category>
		<category><![CDATA[Spear Phishing]]></category>
		<category><![CDATA[Supply chain attacks]]></category>
		<category><![CDATA[Tailgating]]></category>
		<category><![CDATA[URL Hijacking/ TypoSqating]]></category>
		<category><![CDATA[Vishing]]></category>
		<category><![CDATA[Water Hole Attacking]]></category>
		<category><![CDATA[Weaponized QRCodeing]]></category>
		<category><![CDATA[Whaling]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=3271</guid>

					<description><![CDATA[<p>Digital transformation, digital technology usage from what it was to how it is being adopted today by enterprises, and individuals are an almost essential commodity. New applications in this mobile-first...</p>
<p>The post <a href="https://teksalah.com/effective-cyber-defense-strategies-for-enterprises-against-social-engineering-attacks/">Effective Cyber Defense Strategies for Enterprises against Social Engineering Attacks  &#8211; Part1</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Digital transformation, digital technology usage from what it was to how it is being adopted today by enterprises, and individuals are an almost essential commodity. New applications in this mobile-first cloud-first era are exposing individuals, and organizations to potential cyber security vulnerabilities that can be exploited through social engineering attacks without much of sophistication.</p>



<p>Social engineering attacks are real and are considered major threats to organizations of every size. They are of manipulation techniques that exploit human error to gain access to something sensitive. They employ deception, manipulation, intimidation, etc to exploit the human element, or users, of target information assets in the cyber context. Generally, these attacks are successful because individuals may be persuaded to take an action by strong incentives like money, sentiment, fame, or fear, as well as by simple deceit. These attacks pose a serious threat to cybersecurity because users can still be tricked into revealing their credentials or executing a malicious action for an attacker regardless of how robust the technical security infrastructure is. There have been many major incidents in the industry notably &#8211; Target, Yahoo, Zoom, RSA, Marriott, Twilio, and so on breaches where social engineering was employed to successfully exploit. Eventually leading to a major business impact.</p>



<p></p>



<p>Here are a few major techniques and types that can come under social engineering attacks &#8211; Phishing, Spear Phishing, Whaling, Vishing, Smishing, BEC, DSD, Angular Phishing, Baiting, Quid Pro Quo, Impersonating, Shoulder Surfing, Eavesdropping, Desk Sniffing, Dumpster Diving, Pharming, Tailgating, Credential Harvesting, Water Hole Attacking, URL Hijacking/ TypoSqating, Pretexting, Popup Windows, Reverse Social Engg, Weaponized QRCodeing, Robocalls, Deep fakes, Supply chain attacks.</p>



<p>Countering social engineering attacks through solely by using technology is not an adequate solution for any organization or individual. To defend, the security approach for the human factor is to improve security through awareness and practice. At the organizational level, a methodical approach to continuously identifying, train vulnerable employees can significantly reduce cybersecurity social engineering threats. This involves continuous assessment of the workforce&#8217;s security awareness, maintaining efficient means of communication &#8211; regarding the latest threats, and attack tactics in addition to routine system updates, and the underlying appropriate security infrastructure.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="936" height="358" src="https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg1.png" alt="" class="wp-image-3272" srcset="https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg1.png 936w, https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg1-300x115.png 300w, https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg1-768x294.png 768w" sizes="(max-width: 936px) 100vw, 936px" /><figcaption>Social Engineering attack defense measures 1</figcaption></figure>



<p>Organizations must adopt a continuous approach to people, processes, and technology with their Information <a href="https://teksalah.com/cyber-security-solutions-in-uae/">security</a> program. It necessitates a must training, awareness, and strict policy control programs that is made relevant in every aspect of the organization along with applicable technology controls and the infrastructure making it a PEOPLE, PROCESS, TECHNOLOGY aspect. </p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-full is-style-default"><img decoding="async" width="936" height="902" data-id="3274" src="https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg2-1.png" alt="" class="wp-image-3274" srcset="https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg2-1.png 936w, https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg2-1-300x289.png 300w, https://teksalah.com/wp-content/uploads/2023/01/TEKBLOGimg2-1-768x740.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></figure>
</figure>



<p>In simple summary &#8211;  employee &amp; user awareness, multi-factor authentication, monitoring the user &amp; entity behavior, strict identity and access controls, patching, data classification, and leak protection, and zero-trust network access(<a href="https://www.gartner.com/en/information-technology/glossary/zero-trust-network-access-ztna-#:~:text=Zero%20trust%20network%20access%20(ZTNA)%20is%20a%20product%20or%20service,a%20set%20of%20named%20entities." target="_blank" rel="noreferrer noopener nofollow">ZTNA</a>) are a few must-have essential strategies. Organizations must implement these strategies through a proactive, continuous approach for better protection against social engineering attacks.</p>
<p>The post <a href="https://teksalah.com/effective-cyber-defense-strategies-for-enterprises-against-social-engineering-attacks/">Effective Cyber Defense Strategies for Enterprises against Social Engineering Attacks  &#8211; Part1</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remote workforce security essentials for a secure work from home, anywhere approach</title>
		<link>https://teksalah.com/remote-workforce-security-essentials-for-a-secure-work-from-home-anywhere-approach/</link>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Mon, 02 Aug 2021 06:23:51 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[DMARC]]></category>
		<category><![CDATA[EMM]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[SMIME PKI]]></category>
		<category><![CDATA[ZTNA]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=2845</guid>

					<description><![CDATA[<p>The post <a href="https://teksalah.com/remote-workforce-security-essentials-for-a-secure-work-from-home-anywhere-approach/">Remote workforce security essentials for a secure work from home, anywhere approach</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69b12bfb26c3b"  data-column-margin="default" data-midnight="dark"  data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row top-level standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-t-w-inherits="default" data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>There is this joke that surfaced among tech circles- “ Who leads the digital transformation of your organization” (A) CTO (B) CEO (C) Covid 19. And the answer being marked as (C) Covid 19.</p>
<p>Whether It is a large enterprise or a small one, The COVID-19 has pushed every one of us with limited InPerson interactions, imposed lockdowns, and also has disrupted the conventional approaches of doing business. As a consequence, many businesses have rolled out work from home. The forced change, otherwise not so common has also undisputedly accelerated overall digital adaption like (1) Cloud adoption (2) Collaboration (3) Connectivity (4) Leading to sensitive data flow across personal devices and home networks, implicating new areas of security concerns and risks.</p>
<p>There have been numerous industry reports, and new predictions about the surge in attacks, ransomware, phishing, dwell time activity threat reports in the context of work from home remote working environments. All pointing to increased attack surface, vulnerabilities, lack of controls across organizations of all kinds.</p>
<p>There is no doubt that remote working is here to stay. How people connect and work is evolved, businesses must adopt ways and means to secure and defend work from home/anywhere infrastructure. Generally, organizations have enough attention and resources with reasonable information security, availability measures around their core business &amp; technology service controls (data centers – cloud-native, hybrid, on-prem)., but less on the user side remote working environments.</p>
<p>Here are our four key essential areas for a sustainable remote workforce security. Building blocks of secure work from home, work from anywhere environments.</p>
<ul class="wp-block-list">
<li>User awareness</li>
<li>Device Security</li>
<li>Email Security</li>
<li>Access &amp; Network Security</li>
</ul>
<p><strong>User Awareness</strong><br />No matter how secure your infrastructure and policies are, an unaware employee or an ignorant user falling for a phishing link or a sophisticated social engineering attack can lead to major impacts. For Organizations, It is essentials users are regularly trained and aware of do’s and don’t’s, in addition to this best practices are (1) Multi-factor authentication (2) Least privilege access (3) log everything – user activity logging on data and services across.</p>
<p><strong>Device Security</strong><br />For all endpoints including that of personal devices(BYOD), mobiles consider enforcing automated baseline security validations before allowing access to corporate data and services.<br />An organization must ensure a suitable – (1) Endpoint protection platform, (2) Disk Encryption, (3) Mandatory Critical Patching (4) Tightened device policies (EMM)/ Endpoint Management.<br />A key capability is that if the local agent could integrate with service side controls and determine the device health and security posture as factors in the access decision to facilitate allow/block access to corporate data and services.</p>
<p><strong>Email Security</strong><br />Email is used widely. It is the most consumed service across businesses and naturally the preferred threat vector for cyber-attacks.<br />While organizations have in-place email gateway protection to combat spam and email threats. it is essential to have (1) The users trained on spear phishing, spoofing threats (2) Implement email encryption and signatures – SMIME PKI (3) enhance the security by implementing <a href="https://teksalah.com/mimecast-cyber-resilience/">DMRAC</a><strong>, </strong>DKIM, SPF, MFA.</p>
<p><strong>Access &amp; Network Security<br /></strong>To defend against the high-risk aspects associated with vulnerable user side home networks, unsecured kiosks, internet access, public networks It is essential organizations consider deploying secure connectivity controls and access measures. Must consist (1) User Identity Protection (2) Multifactor Authentication to services (3) Any typical Zero Trust Network Access (<a href="https://www.fortinet.com/solutions/enterprise-midsize-business/network-access">ZTNA</a>) facilitating access security policies allowing organizations granular access control and visibility. More advanced options are the integration of Cloud Security Access brokers (<a href="https://www.checkpoint.com/cyber-hub/cloud-security/what-is-casb/">CASB</a>) and Secure Access Service Edge (<a href="https://www.citrix.com/en-gb/products/citrix-secure-internet-access/?utm_campaign=WW-1020-WKSP-SalesInquiry-SecureInternetAccessReqCall&amp;utm_medium=PaidSearch(SEM)&amp;utm_source=g-it-cws-nb-ex-em-en-sec-ssecy&amp;ctm_programid=ww-1020-wksp-salesinquiry-secureinternetaccessreqcall&amp;utm_content=pers_sase&amp;gclid=EAIaIQobChMI8JyT89WR8gIVlRoGAB39OQpkEAAYAyAAEgIygfD_BwE">SASE</a>) technologies.</p>
<p>The above approach is by no means complete and only addresses a few key areas.<br />Protecting the distributed workspace is critical for any organization and challenging. While technologies are evolving and new ones are emerging faster, a holistic risk-based approach would help organizations defend better.</p>
<p class="has-text-align-center">
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://teksalah.com/remote-workforce-security-essentials-for-a-secure-work-from-home-anywhere-approach/">Remote workforce security essentials for a secure work from home, anywhere approach</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identity and Access &#8211; Part 1 &#8211; Single Sign-On (SSO)</title>
		<link>https://teksalah.com/identity-access-management-sso-solution/</link>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Wed, 11 Nov 2020 09:17:55 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Identity & Access Management]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Identity and Access Management]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Multi factor Authentication]]></category>
		<category><![CDATA[Single sign on]]></category>
		<category><![CDATA[SSO]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=2596</guid>

					<description><![CDATA[<p>Introducing Single Sign-On (SSO) Solution in any Organization can offer greater security and improved usability. Most Organizations have multiple applications running across cloud, SaaS, and On-Premise environments, These heterogeneous environments...</p>
<p>The post <a href="https://teksalah.com/identity-access-management-sso-solution/">Identity and Access &#8211; Part 1 &#8211; Single Sign-On (SSO)</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-text-align-center">Introducing Single Sign-On (SSO) Solution in any Organization can offer greater security and improved usability.</p>



<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" width="975" height="683" class="wp-image-2598 aligncenter" src="https://teksalah.com/wp-content/uploads/2020/11/Drawing1-1.jpg" alt="" srcset="https://teksalah.com/wp-content/uploads/2020/11/Drawing1-1.jpg 975w, https://teksalah.com/wp-content/uploads/2020/11/Drawing1-1-300x210.jpg 300w, https://teksalah.com/wp-content/uploads/2020/11/Drawing1-1-768x538.jpg 768w" sizes="(max-width: 975px) 100vw, 975px" /></figure>
</div>



<p>Most Organizations have multiple applications running across cloud, SaaS, and On-Premise environments, These heterogeneous environments bring complexity, cost, and user identity Management security challenges, especially when they are not integrated into a central authentication. On the other hand, Users find it difficult to manage their multiple application passwords. No one likes remembering all these credentials. What’s worse is many use the same username and password, irrespective of the application they are using – resulting in passwords more prone to the dictionary and brute force attacks to visible passwords on sticky notes around desks. This is where the Single Sign-On technology comes into focus and works like a champ and with cloud being prevalent, it is effective for organizations to consolidate the existing <strong>identity and authentication</strong> across applications and systems.</p>



<h4 class="wp-block-heading">What is Single Sign-On?</h4>



<p><strong><a href="https://en.wikipedia.org/wiki/Single_sign-on">Single Sign-On (SSO)</a></strong> is a method of authentication that allows applications, web portals to use other trustworthy systems, applications to verify users. OR Single sign-on enables users to securely authenticate with multiple applications and web portals by logging in only once—with just one set of credentials (normally domain username and password). SSO is an essential feature of an<strong> Identity and Access Management (IAM)</strong> platform for controlling access and identity. Verification of user identity is important when it comes to knowing which all accesses and permissions a user could have.</p>



<h4 class="wp-block-heading">How It Works</h4>



<p>Single Sign-On works by having a central server(s) or as a service (SaaS options), that all the organization applications are configured to trust and integrate to. When you log in for the first time a cookie/token gets created on this central server. Then, whenever you try to access a second application at its login, you get redirected to the central server, if you already have a cookie there, you will get redirected directly to the app with a token, without login prompts, which means you’re already logged in.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="388" class="wp-image-2599 aligncenter" src="https://teksalah.com/wp-content/uploads/2020/11/sso1.png" alt="" srcset="https://teksalah.com/wp-content/uploads/2020/11/sso1.png 600w, https://teksalah.com/wp-content/uploads/2020/11/sso1-300x194.png 300w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<p>Authentication with SSO depends on trust between domains (websites/ applications). With single sign-on, this is what happens when you try to log in to an application or website connected to SSO:</p>



<ol class="wp-block-list"><li>The website first checks to see whether you’ve already logged in to the SSO solution, in which case it gives you access to the required website.</li><li>If you not logged in, it redirects you to the SSO login screen.</li><li>You enter the single username/password that you use for corporate access normally a domain username and password.</li><li>The SSO solution requests authentication from the identity provider or authentication system that your company uses like Active Directory. It verifies your identity and notifies the SSO solution.</li><li>The SSO solution passes authentication data to the website and returns you to that site.</li><li>After login, the site passes authentication verification data with you as you move through the site to verify that you are authenticated each time you go to a new page.</li></ol>



<p>For example, Google implemented a Single Sign-On (SSO) Solution in its various services. Google’s central server is <strong>https://accounts.google.com</strong>. Here, once we login to this server, we will be able to access Gmail, Youtube, and Google Docs without entering your credentials again.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="496" height="595" class="wp-image-2600 aligncenter" src="https://teksalah.com/wp-content/uploads/2020/11/sso2.png" alt="" srcset="https://teksalah.com/wp-content/uploads/2020/11/sso2.png 496w, https://teksalah.com/wp-content/uploads/2020/11/sso2-250x300.png 250w" sizes="auto, (max-width: 496px) 100vw, 496px" /></figure>



<h4 class="wp-block-heading">What Are the Benefits of Single Sign-On</h4>



<p>Single Sign-On clearly minimizes the risk of poor password habits and the increased productivity of users.</p>



<ol class="wp-block-list"><li>Seamless user experience: Customers can use a single identity to navigate multiple web and mobile domains or service applications. As customers no longer need to do repeated logins they can enjoy a modern digital experience.</li><li>Stronger password protection: Since users only need to remember one password for multiple applications, they are more likely to create a stronger (harder to guess) passphrase beyond policies, and less likely to write it down. These best practices reduce the risk of password theft. We can integrate this with <strong><a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a></strong> for additional <a href="https://teksalah.com/security/">security</a></li><li>It increases employee and IT productivity: Reduce support calls, improve user experience and Mitigate security risks</li><li>It combines with <strong>Risk-Based Authentication (RBA)</strong>: You can combine SSO with risk-based authentication (RBA). With RBA, you and your security team can monitor user habits. This powerful combination can prevent cybercriminals from stealing data, damaging your site, or draining IT resources</li><li>It reduces password fatigue: To prevent cybercrime, security professionals insist on unique passwords for every single application. This means that the average user must remember dozens of passwords for personal and office use. Unfortunately, this often leads to “password fatigue.”</li><li>It prevents Shadow IT.</li><li>Reduces User time: Users will spend less time logging into various apps to do their work. Ultimately it enhances the productivity of businesses.</li></ol>



<p><p>With more applications moving to the <strong>cloud</strong>, <strong>security</strong> and <strong>data </strong>are a prime concern, <a href="https://www.checkpoint.com/cyber-hub/cloud-security/what-is-casb/">CASB</a> Cloud Access Service Broker solution with SSO single sign-on as a framework greatly improves system and application security.</p>
<p>&nbsp;</p>
<p><strong>We would be covering the CASB Part in our next blog post in this series.</strong></p></p>
<p>The post <a href="https://teksalah.com/identity-access-management-sso-solution/">Identity and Access &#8211; Part 1 &#8211; Single Sign-On (SSO)</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Preventive Security Essentials &#8211; Monitoring and Analytics ( Part 1)</title>
		<link>https://teksalah.com/preventive-security-essentials/</link>
					<comments>https://teksalah.com/preventive-security-essentials/#respond</comments>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Wed, 10 Jun 2020 05:59:18 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[teksalah]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1968</guid>

					<description><![CDATA[<p>As part of bringing awareness and what matters the most when it comes to cybersecurity proactive prevention, we are here with yet another blog post and the required essentials. If...</p>
<p>The post <a href="https://teksalah.com/preventive-security-essentials/">Preventive Security Essentials &#8211; Monitoring and Analytics ( Part 1)</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"></h2>



<p>As part of bringing awareness and what matters the most when it comes to cybersecurity proactive prevention, we are here with yet another blog post and the required essentials.</p>



<p>If we could put it this way &#8211; With the ongoing pandemic (COVID-19) many of us have new realizations!. Cybersecurity and COVID-19 are two different challenges, but they do have key common things. Both are global &#8211; we all are vulnerable to them, they do not respect boundaries, they don’t discriminate any, and impacts everyone., Again both require basic measures in place to first prevent. That basic Hygiene is the best measure! so far.</p>



<p>Taking up with cybersecurity &#8211; Organizations across wants to ensure that their data and services are secure, up &amp; running for delivering business operations with customer confidence. Hence &#8211; Proactive prevention.</p>



<p>In order to conduct business securely, as a first step organizations need to understand their exposure, where the threats can emerge and need to know how users are accessing business-critical services. To do this IT teams must adopt a platform that continuously monitors and recognizes the users, devices, networks, and services being used. Simply you cannot protect what you can&#8217;t see.</p>



<p>Most organizations implement different security solutions like firewalls as silos that could help them protect, but hackers use modern techniques to penetrate systems which means IT also needs to adopt technologies that help them gather, correlate, alert by analyzing event data from integrating security solutions. Thus, the need for an effective cybersecurity monitoring system is seen as basic and essential. Because on a regular basis no one would have enough time to go through the number of data sets that systems present,. We need meaningful analytics and actionable information out of monitoring systems.</p>



<p>Security Information and Event Management (SIEM) is a proven approach to Identify events that matter most by consolidating, analyzing, correlating raw data and event logs that are collected across from users, devices, applications, and networks. It helps organizations detect threats and prioritize remidative actions before an actual threat occurs. These are purpose-built software systems that store logs, normalizes, aggregates and correlates that data to discover trends, detect threats, and generate alerts. The main capabilities of SIEM are log collection, security monitoring, threat detection, investigation, and response. Apart from this, some SIEM solutions have the capability of behavioral analysis, forensic &amp; incident response, threat response workflow, etc. Most importantly SIEM System provides intelligent insights that enable teams to respond quickly to reduce the impact of incidents.</p>



<p>With a well-integrated SIEM System in-place organizations can identify potential threats inside and outside networks proactively.</p>



<p><em>A few notable SIEM Solutions &#8211; for your reference-</em><br><a href="https://www.ibm.com/security/security-intelligence/qradar">IBM QRadar</a><br><a href="https://www.microfocus.com/en-us/products/siem-security-information-event-management/overview">ArcSight</a><br><a href="https://www.splunk.com/en_us/software/enterprise-security.html">Splunk</a><br><a href="https://cybersecurity.att.com/solutions">AT&amp;T Cyber Security ( Alien Vault )</a><br><a href="https://www.elastic.co/siem">Elastic SIEM</a><br><a href="https://azure.microsoft.com/en-in/services/azure-sentinel/">Azure Sentinel ( Cloud Native )</a></p>



<p><em>Know more about our security offerings </em><a href="https://teksalah.com/cyber-security-solutions-in-uae/">https://teksalah.com/cyber-security-solutions-in-uae/</a></p>
<p>The post <a href="https://teksalah.com/preventive-security-essentials/">Preventive Security Essentials &#8211; Monitoring and Analytics ( Part 1)</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://teksalah.com/preventive-security-essentials/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Teksalah Mimecast &#8211; Webinar                                  (19 May 2020 &#124; 11:00AM)</title>
		<link>https://teksalah.com/teksalah-mimecast-webinar/</link>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Tue, 19 May 2020 11:00:00 +0000</pubDate>
				<category><![CDATA[Webinar]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Mimecast]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1732</guid>

					<description><![CDATA[<p>Topic &#8211; Proven Strategies to Prevent Email Compromise</p>
<p>The post <a href="https://teksalah.com/teksalah-mimecast-webinar/">Teksalah Mimecast &#8211; Webinar                                  (19 May 2020 | 11:00AM)</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="has-text-align-center wp-block-heading"><strong>Topic &#8211; Proven Strategies to Prevent Email Compromise</strong></h3>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="https://teksalah.com/mimecast-cyber-resilience/"><img loading="lazy" decoding="async" width="1024" height="441" src="https://teksalah.com/wp-content/uploads/2020/05/image-1-1-1024x441.png" alt="" class="wp-image-1738" srcset="https://teksalah.com/wp-content/uploads/2020/05/image-1-1-1024x441.png 1024w, https://teksalah.com/wp-content/uploads/2020/05/image-1-1-300x129.png 300w, https://teksalah.com/wp-content/uploads/2020/05/image-1-1-768x331.png 768w, https://teksalah.com/wp-content/uploads/2020/05/image-1-1-1536x662.png 1536w, https://teksalah.com/wp-content/uploads/2020/05/image-1-1.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption><br><a href="https://teksalah.com/mimecast-cyber-resilience/">Mimecast</a> safeguards employee communication and reduces risk with targeted threat protection,&nbsp;data leak protection, and enforced email security controls. More than 17,000 Office 365 customers worldwide rely on <a href="https://www.mimecast.com/">Mimecast </a>. This is mainly for pervasive email security across three distinct zones: at the email perimeter, inside the network and the organization, and beyond the perimeter.</figcaption></figure></div>
<p>The post <a href="https://teksalah.com/teksalah-mimecast-webinar/">Teksalah Mimecast &#8211; Webinar                                  (19 May 2020 | 11:00AM)</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The New Normal ‘Work from home’: Security risks, challenges, and recommendations</title>
		<link>https://teksalah.com/work-from-home-security/</link>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Tue, 07 Apr 2020 12:24:47 +0000</pubDate>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[COVID 19]]></category>
		<category><![CDATA[Multi factor Authentication]]></category>
		<category><![CDATA[Security Risks]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[WFH]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1516</guid>

					<description><![CDATA[<p>As workforces are mandated to telework in an effort to contain the spread of the COVID19 virus pandemic, At these challenging lock downtimes, almost all the organizations are enabling work-from-home,...</p>
<p>The post <a href="https://teksalah.com/work-from-home-security/">The New Normal ‘Work from home’: Security risks, challenges, and recommendations</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="800" height="460" src="https://teksalah.com/wp-content/uploads/2020/04/image.jpeg" alt="Work From Home and Cyber Security Risks" class="wp-image-1519" srcset="https://teksalah.com/wp-content/uploads/2020/04/image.jpeg 800w, https://teksalah.com/wp-content/uploads/2020/04/image-300x173.jpeg 300w, https://teksalah.com/wp-content/uploads/2020/04/image-768x442.jpeg 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure></div>



<p class="has-text-align-left has-normal-font-size">As workforces are mandated to telework in an effort to contain the spread of the COVID19 virus pandemic, At these challenging lock downtimes, almost all the organizations are enabling work-from-home, if not getting ready with the required  ICT, Security Cloud infrastructure.  Most of the workforce working remotely, and for these types of remote workloads, many of the organizations are not ready and finding it difficult to cope.   </p>



<p class="has-normal-font-size">VPN Servers to App Delivery to VDI Infra, collaboration tools for all of them their security and availability, performance has now become a critical backbone for organizations.  Employees who have never worked remotely are told to work from home or WFH. For many organizations and individuals, this is unchartered territory. </p>



<p class="has-normal-font-size">With this blog post, we would like to bring to your notice &#8211; a few important cybersecurity risks that a remote workforce may present and some best practices for mitigating those risks.</p>



<p class="has-normal-font-size">Whether as part of standard work program or as a component of business continuity plans, for Organizations engaging in telework we would recommend to start with a  defined policy &#8211; ex ‘Work from home Policy, BYOD policies’- addressing the scope, roles and responsibilities, and mandatory infosec and organizational specific guidelines.</p>



<p>Our recommendations are :</p>



<ul class="wp-block-list"><li>VPN Server security and their up-to-date patching  </li><li>Enabling Multi-Factor-Authentication for VPN Accounts and user logins</li><li>Application Delivery Controllers and enforcing end-point mandatory compliance checks</li><li>SaaS applications and data, service access protecting with conditional access and logging.</li><li>Ensuring Mobile Device and Endpoint Management security practice in place for corporate and personal (BYOD) devices.</li><li>PKI And TLS Security for Document Signing, and Secure email SMIME protection.</li><li>Tightened email phishing and spam protection measures.</li><li>Must MDR/ End-point-security software for all the devices.</li><li>Configuring and limiting maximum load provision, auto-provision setting with your cloud infrastructure/ to protect against misuse.</li><li>Engaged threat detection, monitoring, protection systems in place for data and Services protection.</li><li>Ensuring compliance and regulatory standards.</li><li>Recoverable Backups and working HA systems.</li><li>And more importantly, given the social-engineering aspect of most attacks, end-user education is more critical than ever. </li></ul>



<p class="has-normal-font-size">Need of the hour for many is to enable work-from-home to their employees and to ensure business continuity during these pressing times, it is important to ensure cybersecurity recommendations are taken into consideration to avoid any superimposed security incidents that are very much prevalent these times.   </p>



<p class="has-normal-font-size">Amid the COVID-19 crisis, In order to help organizations setup required infra and protect remote employees faster,  In coordination with our product vendors we are stepping it up and offering some of our products and services free of charge for a limited time.  Including support services to help companies through the set-up and deployment processes.</p>
<p>The post <a href="https://teksalah.com/work-from-home-security/">The New Normal ‘Work from home’: Security risks, challenges, and recommendations</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SELECT PARTNER AWARD  &#8211;  RUBRIK 9th October 2019</title>
		<link>https://teksalah.com/teksalah-awarded-select-partner-by-rubrik-9-october-2019/</link>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Tue, 22 Oct 2019 06:20:46 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[Cloud Data Management]]></category>
		<category><![CDATA[RUBRIK]]></category>
		<category><![CDATA[SELECT PARTNER]]></category>
		<category><![CDATA[teksalah]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1203</guid>

					<description><![CDATA[<p>Teksalah LLC was awarded the Best Select Partner in the Region by RUBRIK. At GITEX Technology Week that happened in October 2019. Delighted to be partnered with RUBRIK.</p>
<p>The post <a href="https://teksalah.com/teksalah-awarded-select-partner-by-rubrik-9-october-2019/">SELECT PARTNER AWARD  &#8211;  RUBRIK 9th October 2019</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-1204" src="https://teksalah.com/wp-content/uploads/2019/10/Red-Diploma-Certificate-1.png" alt="Select Partner Award - RUBRIK" width="1056" height="816" srcset="https://teksalah.com/wp-content/uploads/2019/10/Red-Diploma-Certificate-1.png 1056w, https://teksalah.com/wp-content/uploads/2019/10/Red-Diploma-Certificate-1-300x232.png 300w, https://teksalah.com/wp-content/uploads/2019/10/Red-Diploma-Certificate-1-768x593.png 768w, https://teksalah.com/wp-content/uploads/2019/10/Red-Diploma-Certificate-1-1024x791.png 1024w, https://teksalah.com/wp-content/uploads/2019/10/Red-Diploma-Certificate-1-30x23.png 30w" sizes="auto, (max-width: 1056px) 100vw, 1056px" /></p>
<p>The post <a href="https://teksalah.com/teksalah-awarded-select-partner-by-rubrik-9-october-2019/">SELECT PARTNER AWARD  &#8211;  RUBRIK 9th October 2019</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting and improving email communication : DMARC, DKIM, SPF.</title>
		<link>https://teksalah.com/security/</link>
					<comments>https://teksalah.com/security/#respond</comments>
		
		<dc:creator><![CDATA[TekBlogger]]></dc:creator>
		<pubDate>Wed, 12 Jun 2019 10:56:31 +0000</pubDate>
				<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Cyber Security in Dubai]]></category>
		<category><![CDATA[DKIM]]></category>
		<category><![CDATA[DMARC]]></category>
		<category><![CDATA[SPF]]></category>
		<category><![CDATA[teksalah]]></category>
		<guid isPermaLink="false">https://teksalah.com/?p=1131</guid>

					<description><![CDATA[<p>SPF, DKIM, DMARC would help step-up the protection measures by confirming and validating the sender domain and that an email came from the domain that says it does and verifies that the email is not forged or altered.</p>
<p>The post <a href="https://teksalah.com/security/">Protecting and improving email communication : DMARC, DKIM, SPF.</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Often Organisations suffer fighting fraudulent email. Spoofing is one major concern to organizations across, and if not every report most of the cybercrime reports have listed email-based fraud as a top source. Even with advance anti-spam gateway solutions organizations are falling for spoofed emails. Spoofing campaigns have become more and more sophisticated and often bypass Spam filters.</p>
<p>Implementing DMARC “Domain-based Message Authentication Reporting and Conformance” is currently the good way around to defend from phishing and spoofing attacks. DMARC is built on two other authentication protocols – SPF, DKIM.</p>
<p>With this blog we try to simplify the SPF, DKIM, DMARC- Email Authentication Protocol measures the way they work and for your easy adoption.</p>
<p><strong><em>So what are these &#8211; SPF, DKIM, DMARC?</em></strong></p>
<p>In a nutshell &#8211; SPF, DKIM, DMARC would help step-up the protection measures by confirming and validating the sender domain and that an email came from the domain that says it does. And verifies that the email is not forged or altered.</p>
<h3><strong>SPF – Sender Policy Framework:</strong></h3>
<p>This has been there around for a long time (as a next measure to the PTR),. It is a method for authorizing mail servers of a particular domain for sending authoritatively and a way for recipient servers ( mail receiving party ) to verify if the sending server (MTA) is authorized for sending emails for that domain.</p>
<p>By Creating an SPF record in domain DNS, you can designate (kind of whitelist) which all email servers are authorized to send an email for the domain on your behalf.</p>
<ul>
<li>Sender adds a DNS record for their domain with “authorized to send email server’s ip addresses”. A typical SPF DNS TXT record looks like : (example only)</li>
</ul>
<blockquote>
<p style="text-align: center;">v=spf1 ip4:213.42.193.66/32 ip4:86.96.198.0/29include:spf.protection.outlook.com~all</p>
<p style="text-align: center;">(ref- <a href="https://en.wikipedia.org/wiki/Sender_Policy_Framework">https://en.wikipedia.org/wiki/Sender_Policy_Framework</a> )</p>
</blockquote>
<ul>
<li>Recipient server while receiving an email from senders MTA/SMTP Server, it checks against the DNS TXTrecord of that domain name – If the IP Address is listed/ authorized. (extracts domain name from the “return-path:” field of the envelope)</li>
<li>If the IP address match – the message passes the SPF</li>
<li>If the IP address not listed in SPF, or does not match in the list, it is considered – “Hard-fail”; in most cases, the email ends up rejected, or marked spam by the receiving party.</li>
<li>For not having an SPF record for a domain is considered “soft-fail” and the receiving party may very well treat this as spam too.</li>
</ul>
<h3><strong>DKIM – DomainKeys Identified Mail:</strong></h3>
<p>As it sounds, it is an email authentication protocol to protect against email spoofing (both email body, header) using public-key cryptography.</p>
<p>With DKIM configured sender’s MTA would inject a digital signature to the outgoing emails with a hash value. And the receiving MTA  uses public key made available through a TXT record by sending party to decrypt the hash value in the email header and recalculate the hash value for the email message is received. If these two hashes match, then the email is passed indicating email has not been altered and the email did originate from the listed domain.</p>
<p>With most of the email SaaS providers and outbound SMTP gateways, it is about defining the policies and configuring out-of-the-box functionality, but if you are running any on-prem servers like MS Exchange you may have to look at some 3<sup>rd</sup> party software packages which can make the DKIM insertions possible.</p>
<ul>
<li>Setup the mail server / the mail provider to support DKIM</li>
<li>Per domain, Generate a pair of DKIM Keys [ Public and Private ]</li>
<li>Make the public key available in the DNS as TXT record ( in some cases as CNAME)</li>
<li>Configure to enable DKIM signing</li>
</ul>
<p>To understand the DKIM DNS TXT record it mainly has two parts, the selector and the payload. Example below :</p>
<blockquote>
<p style="text-align: center;">TXT Mta1._domainkey v=DKIM1; k=rsa; p=[public key]
</p></blockquote>
<p>Mta1 can be anything and is identified as “selector” or “mta”,. The ‘p’ field shall be the public key ( part of the pair that originally  generated along with private key at the server/ MTA)</p>
<p>Note: (More please refer : rfc5585)</p>
<ul>
<li>DKIM by itself does not filter email</li>
<li>Does not authenticate or verify the contents of the message header or body, such as the author From field, beyond certifying data integrity between the time of signing and the time of verifying.</li>
<li>Does not offer any assertions about the behaviors of the signer.</li>
<li>Does not prescribe any specific actions for receivers to take upon successful signature verification.</li>
<li>Does not provide protection after signature verification.</li>
<li>Does not protect against re-sending (replay of) a message that already has a verified signature; therefore, a transit intermediary or a recipient can re-post the message &#8212; that is, post it as a new message &#8212; with the original signature remaining verifiable, even though the new recipient(s) might be different from those who were originally specified by the author.</li>
<li>Example DKIM Signature</li>
</ul>
<blockquote><p>DKIM-Signature a=rsa-sha1; q=dns;<br />
d=test.com;<br />
i=user@eng.test.com;<br />
s=TEK2007.eng; c=relaxed/simple;<br />
t=22276972764; x=11179856433;<br />
h=from:xxxxto:xxxxsubject:xxxxdate:xxxx;<br />
b= ADS2134321AFDSFD2134adsfdsd154<br />
DSFKNSADFKHDASNF243KNASDFN234</p></blockquote>
<ul>
<li>From Domain (RFC5322) – is the domain part of the email address.</li>
<li>Signing Domain – During DKIM Signing, the domain takes the responsibility for the message signing, it inserts its name into the header in a key-value tag.</li>
<li>It is possible to sign emails on “Per-user-DKIM keys” or “Per-email-address-DKIM”.</li>
</ul>
<h3>DMARC [Domain-based Message Authentication, Reporting, and Conformance]</h3>
<p>We can say DMARC is best of both worlds, it uses SPF, DKIM and ensures emails are properly authenticated for their legitimacy. DMARC provides directions to the receiving party (Recipient Server) on what to do if an email claiming that ‘from your domain’ is not properly authenticated.</p>
<p>An email passes DMARC if the email must pass SPF authentication and SPF alignment and/or DKIM authentication and DKIM alignment. The email will fail DMARC if the message fails both (A) SPF or SPF alignment and (B) DKIM or DKIM alignment.</p>
<p>In order for DMARC validation checks to pass, DMARC requires that there be domain alignment as follows:</p>
<ul>
<li>For SPF, the RFC5322. From domain and the Return-Path domain must be in alignment</li>
<li>For DKIM, the RFC5322. From domain and the DKIM d= domain must be in alignment</li>
</ul>
<p>DMARC requires a DNS record to be published for the domain you wish to use in your “FROM:” address.  Example:</p>
<blockquote>
<p style="text-align: center;">&#8220;v=DMARC1;p=reject;pct=100;rua=mailto:postmaster@senderdomain.com&#8221;</p>
</blockquote>
<p>The DNS TXT  record for DMARC can include several values, but required mainly two of them :</p>
<ul>
<li>(v) tells the receiving server to check DMARC</li>
<li>(p) gives instructions on what to do if authentication fails.</li>
</ul>
<p>The parameter options for p can include:</p>
<ul>
<li>p=none, which instructs the receiving server to take no specific action if authentication fails but to provide data reports.</li>
<li>p=quarantine, which instructs the receiving server to consider quarantining the message. it could mean routing the mail to spam/junk folders</li>
<li>p=reject, which instructs the receiving server to reject all non-aligned messages and send a report.</li>
</ul>
<p>It is advised to start with configuring the DMARC Policy flags from  “none” to “quarantine” to “reject”  phases and with a thorough evaluation.</p>
<h3>DMARC Overview:</h3>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1134 size-full" src="https://teksalah.com/wp-content/uploads/2019/06/DMARC-e1560337619271.jpg" alt="SPF, DKIM, DMARC" width="600" height="328" /></p>
<p><em>Image source : </em><a href="https://dmarc.org/overview/"><em>https://dmarc.org/overview/</em></a></p>
<p>Definitely, DMARC is a very good enhancement to improve organizations email communication, reputation. It greatly minimizes the risks of email spoofing and impersonation while letting you keep a track of fraudulent attempts via reports. However it is not 100% foolproof,  user education and awareness are still key.</p>
<p>&nbsp;</p>
<p>The post <a href="https://teksalah.com/security/">Protecting and improving email communication : DMARC, DKIM, SPF.</a> appeared first on <a href="https://teksalah.com">Teksalah - Beyond Solutions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://teksalah.com/security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
