One of the biggest challenges facing IT professionals right now in any organisation is the complexity that resulted from the use of disconnected, problem-specific tools from multiple vendors, almost none of which work together.
Simplify and secure your network availability with eSentinel, a 'Plug & Play' Cloud-based security platform.
Website: https://www.netpluz.asia
4. TOO SMALL TO BE ATTACKED?
56% of small businesses experienced
a cyber-attack in 2018.
63% believed they are less
vulnerable than big companies.
Source: Survey conducted by Chubb of 300 SME.
Sept 2018
Almost 40% of cyberattacks in Singapore targets
SMEs Source: CSA Singapore
3 in 5 Singapore SMEs faced a cyber threat in
2018. Source: The Straits Times 17 Jan 19
5. Remember SingHealth?
“Even as we do our best to secure our systems, it is a matter of when, not
if, our systems are breached. The cyber-attack on SingHealth is a reminder
for us to do better in our cybersecurity efforts, together as a nation.”
- Mr David Koh, Commissioner of Cybersecurity and Chief Executive CSA,
emphasising the need for collective cybersecurity
Source: CSA Singapore Cyber Landscape 2018
6. SMEs believe that they are less vulnerable towards cyber risks and
that they are able to overcome cyber breaches quickly and easily.
Source: Chubb Survey 2019
BUT CLEARLY
56%
Experienced a
CYBER ERROR or
ATTACK
In the past 12
months
9. Traditional Cyber Protection Tools
DDoS
Mitigation
Firewall Network
Monitoring
Skilled
Professionals
ASAV
Malware
Ransomware
Vendor
A
Vendor
B
Vendor
C
Vendor
D
Vendor
E
16. Managed Services Overview
DATA
CYBER
SECURITY VOICE
VIDEO ANALYTICS MOBILITY
• MobileRoam Voice
• MobileRoam Data
• IP-PBX (Cloud & On-Prem)
• SIP Trunking
• IDD 1551
• Global Virtual Number
• DDoS Mitigation
• Firewall
• VAPT
• Security Operations Centre
• Endpoint & Server Protection
• Wi-Fi Analytics
• Video Analytics
• Facial Recognition
• Video Conferencing
• CCTV Surveillance
• Secure Internet Access
• True Diverse Connectivity
• SD-WAN
• Wireless LAN
• Link/Load Balancing
• Server Colocation
• IT Monitoring & Management
• Private Cloud (MTCS)
• IaaS, BaaS, DRaaS
17. www.netpluz.asia
Do join us at
To find out more about eSentinel
and SDWAN live demo
Booth G95
Good Communications Simplified
Notes de l'éditeur
Netpluz is a one-stop managed communications services partner for businesses. We deliver reliable, high-performance communications services for your business’s data, voice, video, cybersecurity, mobility and analytics needs.
Our young brand was incorporated in 2015, but our team has been around for over 20 years as we pioneered network communications technologies in Singapore – making waves leading some of the industry’s biggest names in the Information and Communications Technology space during this time.
Leveraging our own experience, we have an intimate understanding of the needs of businesses across the Asia Pacific region. We understand that you are focused on running your business, satisfying customers and improving profits – not resolving technical issues with your network, cybersecurity or regional connectivity. That’s our job, and it’s a responsibility we’re proud to take on.
Netpluz makes networking simple by managing your communications services for you, around-the-clock. Now you can be confident that your network connectivity, virtualised servers, guest Wi-Fi and all other communications-related services remain up and running – even after office hours, on weekends and public holidays.
We are a modern, highly-experienced and rapidly-growing brand in the ICT industry. Today, Netpluz provides managed data, voice, video, cybersecurity, mobility and analytics solutions to over 2,000 clients who trust us for our integrity, reliability and uncompromising service standards.
One of the BIGGEST FEAR FACTORS for IT Manager!
While the internet offers enormous advantages and opportunities, it also presents various security risks.
It’s where we access our critical and sensitive corporate data files, such as contracts, financial records, HR employee data.
With more businesses adopting the cloud model, it is time to take steps to protect information stored, transmitted and processed for continuing business operations.
But with all the good things the internet offer us, it also opens the door to serious, potentially devastating threats
Believe it or not, your network might have already been compromised.
Nature of the threat
Complex, global and constantly evolving
Perpetrated remotely
Difficult to trace
Significant impact
Many companies do not see the relevance in having cyber protection as they are not a global company, non-tech companies, not government agencies etc
eg F&B, retailers, may not see why a cyber attack would happen to them.
So are businesses exposed to Cyber risk?
As headline goes, Singapore is deem to be a hotspot for cyber attacks.
For small and medium-sized businesses, one of the biggest challenges is maintaining a secure IT network even while they expand and explore innovations. While it is the larger enterprises security breaches that hit the headlines, the reality is that smaller-scale attacks are targeting on smaller businesses.
Small businesses are the lifeblood of the global economy. They provide all manner of essential services – to individuals, to government, to larger organizations and to each other. For small businesses, when it comes to cybercrime the risks are great. The statistics show that 40% of cybercrime targets small businesses, according to the Cyber Security Agency of Singapore (CSA).
In recent years, many corporations, impacted by internet threats and in order to comply with strict security measures required by the government and other regulations, have significantly bolstered their network security. As a result, criminals are increasingly turning their attentions toward easier hacker targets--small medium businesses.
These figures may appear surprising, largely due to the fact that most media coverage of cyberattacks focuses on large businesses, which impact high numbers of customers. What many people don’t know, however, is that small businesses are often the easy way into larger enterprises. Attackers will, for example, gain access to the credentials of a small business in the supply chain of a large enterprise as a pathway into the larger company, and the breach will often go unnoticed until after the attack has been carried out.
In fact, smaller companies have a relatively larger exposure, as they face the same threats as larger businesses but do not have the means to implement comprehensive protection, leaving significant risk uncovered.”
Today’s business realm has no boundaries. Attack vectors and attack surfaces have changed. For cyber-attackers, it’s constantly about finding the weakest link and that could be man, machine or method. When it comes to IT security, SMEs are in a tight spot. Potential attacks on SMEs are on the rise, as they do not have the wherewithal to proactively combat the unknown.
SMEs believe they are too small to be targeted by cyber criminals as they don’t have anything worth stealing. Moreover, the misconception that cybersecurity is an issue for the IT department remains. Due to the lack of budget, expertise and technical capability to implement effective measures, many SMEs in Singapore continue to be ill-equipped in defending themselves from cyberattacks.
In 2018, SingHealth’s network was the target of a deliberate and well-planned cyber-attack. The scale of this cyber-attack was unprecedented. The personal particulars of 1.5 million patients and the outpatient dispensed medication records of 160,000 of them were illegally accessed and copied. Prime Minister Lee Hsien Loong’s records were specifically and repeatedly targeted.
In this age, it is now known to all, that cyber incident WILL happen. It is only a matter of WHEN and not IF the incident will happen to your business.
Undoubtedly one of the greatest cyber security risks for businesses is not keeping their IT networks completely updated. Indeed it was this failure that led to the WannaCry ransomware attack of May 2018, which affected organisations such as the NHS. Ignoring updates essentially leaves cracks in your defence system that can be exploited by hackers.
At one point just a buzzword, ransomware is now an all-too-real threat to businesses, governments, and individuals worldwide. The problem with ransomware is twofold.
First, ransomware is designed to completely encrypt a victim’s file system, potentially causing an irreversible loss of data. Second, an increasing number of cybercriminals are utilizing ransomware to extract money out of victims. Some surveys have shown that ransomware losses for businesses can average $2,500 for each incident, with businesses willing to shell out upwards of close to a million dollars to decrypt their data in some instances.
The threat is only growing, as some reports find. The Beazley Group, for example, found that small-to-midsized businesses were at the largest risk. The highest ransom the company paid out for its clients in 2018 was over $930,000.
All of this is proof positive that ransomware continues to be an extremely lucrative venture for cybercriminals, with attackers against all sources (businesses, governments, and individuals) now demanding around $13,000 per attack.
Many hackers now have software tools that constantly search the internet for unprotected networks and computers. Once discovered, unprotected computers can be accessed and controlled by a hacker, who can use them to launch attacks on other computers or networks.
Small businesses often lack the financial resources that large companies have to bounce back from security attacks. Suppose you're an online retailer and a hacker launches a denial-of-service attack against your website. Do you have the necessary insurance or funds to recover from the subsequent loss of revenue--not to mention the damage to your business's reputation?
What would the next few years portend for
cybersecurity? The combination of technological
advancements and our transition into ever higher levels
of connectivity means that cyber threats will become
even more targeted, sophisticated and deceptive. These
are six trends CSA Signapore foresee happening in the near future:
But where to start? There is a huge amount of advice available about what to do, but it is often confusing and sometimes contradictory. The vast majority of small businesses lack the technical knowledge needed to prevent cyberattacks and do not have the financial resources to invest in enterprise-level security. Small business owners may wonder, “Why would anyone want to attack me?” or they may prefer to focus on generating revenue. But the truth is, not only do small businesses hold valuable information themselves but they can also act as a stepping stone into larger organizations that the hackers may ultimately be targeting.
Using the right cyber protection tools are the key to ensure that multiple vulnerabilities can be protected. However, these tools are usually individually implemented to target a specific area of vulnerability and often do not work together with other tools. In this age of advanced threats, tools will need to be synchronised to work across the network to increase critical response to mitigate and resolve any incident. As majority of SMEs do have limited resources in terms of IT budget and skilled workforce to handle the network availability and security, managing multiple vendors and locating the root cause oftens requires a longer time. To make matter worst, SMEs often do not have the experience and knowledge to handle a cyber incident.
In this age, it is common for SMEs to have at least a firewall installed. With ever-evolving cyber threat landscape, larger enterprises have implemented another firewall of different brand as an added later of security should a single brand of firewall be compromised. It is a nice feature to have but will take a toll for the limited resources a SME have.
eSentinel is a simplified all-in-one (360°) cyber security protection platform for business, an additional cyber defense layer at the ISP level.
External Defense Layer
DDoS Mitigation – With Netpluz local scrubbing centre, DDoS attacks can be auto mitigated. It consists of protection of WAF, Clean Pipe and DNS protection. In Q2 2019, Netpluz successfully mitigated a total of 1.8Gbps DDoS attack over 2 hours, with the single largest DDoS attack of 506Mbps mitigated.
Honeypots - Like mice to cheese-baited mousetraps, cybercriminals are attracted to honeypots — not because they’re honeypots. The bad guys think the honeypot is a legitimate target, something worthy of their time. That’s because the bait includes applications and data that simulate a real computer system. eSentinel consist of honeypots to lure/distract cybercriminals and in turn, understand where the attacks are coming from, how they operate and what they want. With the professionals at Netpluz SNOC monitoring, the policies at eSentinel layers are constantly been updated to further enhance the defense layer.
Internal Defense Layer
Intelligent NG-Firewall - High-Availability firewall solution. Business subscribed to eSentinel will benefit from a data centre grade dual firewall implementation (different brand), that traditionally only larger enterprise can afford to better secure their network.
IPS/IDS - A typical business network has several access points to other networks, both public and private. The challenge is maintaining the security of these networks while keeping them open to their customers. Currently, attacks are so sophisticated that they can fool the best security systems, especially those that still operate under the assumption that networks can be secured by encryption or firewalls. Unfortunately, those technologies alone are not sufficient to counter today’s attacks. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) constantly watch your network, identifying possible incidents and logging information about them, stopping the incidents, and reporting them to security administrators.
24/7 SNOC Monitoring with alerts & notification – eSentinel comes with a proactive security monitoring that are manned by certified professionals. In the event of an incident detected, the team will contact the customer and immediate respond and resolution can be set in place.
Customisable Network-layer policies – traditionally, customers are not able to customise policies on a public cloud security platform. The security platform are usually a standard package for all customers. However, we understand the need for customisation as all business network requirements are unique. The value of eSentinel is that it is fully customisable according to the needs of businesses.
Quarterly Vulnerability Assessment – Network vulnerabilities are constantly a problem for in-house IT managers or even business owners. As businesses are transforming digitally, moveing to the cloud and subscribing to SaaS services, network ports are constantly utilised and might not be monitored/updated. This complimentary feature serves as a scoreward to businesses looking to improve their network policies over time as they focus on their business growth.
The beauty of eSentinel
The above features are traditionally only accessible to bigger enterprises due to their need of secured network to protect their business financials and reputation. It is time that SMEs enjoy the same protection in this ever evolving cyber threat landscape. With eSentinel consists of total cyber security protection, businesses can now enjoy improved security at a lower cost and risk!
Single pane of Glass – Every IT loves a single pane of glass. That is true to a certain extent. Every vendor has a single pane of glass reporting but to the end user such as yourself, managing several pane of glass is no longer effective. As eSentinel is developed to offer a complete protection, the dashboard offers information from DDoS mitigation, firewall to monitoring. This is the real meaning of Single Pane of Glass.
One platform gives you the insight, agility, and control to better coordinate nearly every aspect of complex cyber protection tools from virtually any location.
To create a culture of cybersecurity, you must make cybersecurity a part of the DNA of your organization. Companies need to understand that cyber security is a shared responsibility and everyone plays a part in the whole effort.
Prepare for the future. - A secure network provides businesses with benefits beyond protection from internet threats. Inherently, a secure network is a robust network. And a robust network is an excellent foundation that can support new technologies, such as VoIP, that can greatly increase productivity and reduce operating costs.
Ultimately, when your business is secure, it's stronger and more agile--and definitely more competitive.