CYBERSECURITY: THEORY AND PRACTICE OF RELIABLE PROTECTION

CYBERSECURITY: THEORY AND PRACTICE OF RELIABLE PROTECTION

Mon, 05/31/2021 - 12:36

Kaloyan Vasilev, manager, on the working solutions that provide safety on the Internet

Kaloyan Vasilev, manager of CyberSecurity
Kaloyan Vasilev, manager of CyberSecurity

The security of your personal and corporate data on the Internet is possible – when you know how to do it and have the needed support. You will find it at CyberSecurity. The Bulgarian company offers complete solutions created with clients' real needs in mind: a full range of cybersecurity services, subscription programmes, virtual resources such as secure VPN and Proxy servers, educational resources and trainings, security analysis by the so-called Blue Team and Red Team.

Kaloyan Vasilev, manager of CyberSecurity, tells more.

Which were the most significant changes in the field of cybersecurity in the past year?

The freeing of office volumes and their replacement with mobile ones. The change started as early as 2019, when some companies, mainly IT ones, realised that it was cheaper to have employees working from home. Many employees left the offices for significant periods of time which created the need to provide all of them with company devices. This happened en masse in 2020. The migration of employees created additional problems to the companies' IT divisions: providing secure connection to office resources, controlling a large number of unsafe home networks, protecting devices from external attacks, protecting data.

2020 was the year of migration from personal to company devices and upgrading of new work conditions. Threats also changed. Employees are not in a single network and location anymore, which decreases the benefits of attacking office networks. The increased use of cloud services and VPN connectivity improved the security of transferred data and forced hackers to use more and more complex phishing attacks to acquire access to services and devices. As a result we observed some very successful attacks that compromised thousands of users each day.

Which are the biggest mistakes companies continue to make?

The lack of employee training and education remains cybersecurity's main problem. It does not matter what protection software you use. It will not help you if users are not aware of the threats on the Internet and do not know how to react.

Currently, problems have been multiplying. Before they concerned the office only, and now they concern each employee, their home network and devices, the household's accounts.

Another common problem is user configuration. Small companies still register users as administrators in systems with access to key corporate services. The bigger problem is the lack of understanding about the nature of the problem. It is not about whether the owner trusts the employee, but what the hacker would have access to once they hack the employee.

How can CyberSecurity help?

Our analytic reports objectively describe the identified problems. If you follow our recommendations you will have a very high level of protection. An employee training is a wonderful addition. If the analysis seems too complicated and you do not know how to implement its recommendations, we can do it for you. When you need the highest level of protection we have services such as VPN connectivity, a private Proxy, sensitive data encryption, traffic filtering and others. We can always add something new to your systems and data security.

What is the first thing that CyberSecurity does when starting a partnership with a new client?

CyberSecurity offers a rich range of services such as penetration testing, device analysis for unauthorised access, system security auditing, system and device configuration etc. The approach is different in each service.

In penetration testing we take the role of hackers attacking the systems. During device analysis we create an anamnesis of the client, as if we are medical doctors – how is the device used, was some strange behaviour observed, etc. On the basis of this anamnesis we seek signs for compromised security.

In conscription programmes we analyse the work method and used tools. Offering customised solutions is important for the clients and depends on the analysis of their work processes. We propose future solutions on the basis of this analysis. We configure the systems in accordance to the requirements, we train the employees and then we retire in the shadows. We are still present, if we are needed, but clients do not have to notice us to know that we are protecting them. If there is a problem, we will react as fast as possible.

Should we own the last generation of technology to be protected?

No. Newer devices somewhat guarantee better protection, but this might be misleading – if the used systems are old or badly configured the protection will remain low. Imagine this situation. Two drivers are driving in the country, facing the sun. The first drives a new car and is speeding up. The other is in an old car and drives slowly. The low sun blinds them both. The new car driver is shading his eyes with his palm. The one in the old car is wearing sunglasses. Who is in a riskier situation?

It is the same with devices. Old technology is slower, the battery dies more easily. But this does not mean that it is riskier. When correctly configured and equipped with new systems an old device can be much more protected and reliable than a new one. Of course, old hardware has its drawbacks, but when we take them into consideration things can be safe.

What is the difference between your Red Team and Blue Team?

The two teams are in a constant competition. The Red Team constantly tries to breach the protection, and the Blue Team constantly tries to improve it. Their approaches are radically different.

The Red Team relies on analysis from a hacker's point of view. They do not know what systems are used, how they are configured, who and how uses them. On the basis of collected data they initiate different attacks to overcome the defence, often using reverse and social engineering. For the Red Team it is important to breach the defence and to show there are weaknesses in it.

The Blue Team relies on systems' analysis. They know very well how they are configured and used, and seek weaknesses and ways to isolate them. They rely on reverse engineering to solve problems that have not been foreseen by the manufacturer. The Blue Team is also responsible for damage control during an eventual breach.

www.киберсигурност.бг

Web Exclusive

Commenting on www.vagabond.bg

Vagabond Media Ltd requires you to submit a valid email to comment on www.vagabond.bg to secure that you are not a bot or a spammer. Learn more on how the company manages your personal information on our Privacy Policy. By filling the comment form you declare that you will not use www.vagabond.bg for the purpose of violating the laws of the Republic of Bulgaria. When commenting on www.vagabond.bg please observe some simple rules. You must avoid sexually explicit language and racist, vulgar, religiously intolerant or obscene comments aiming to insult Vagabond Media Ltd, other companies, countries, nationalities, confessions or authors of postings and/or other comments. Do not post spam. Write in English. Unsolicited commercial messages, obscene postings and personal attacks will be removed without notice. The comments will be moderated and may take some time to appear on www.vagabond.bg.

0 comments

Add new comment

The content of this field is kept private and will not be shown publicly.

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.

Discover More

atlantis-burgas
INTRODUCING ATLANTIS / SQUARE
The project combines the benefits of living in a closed residential community with the advantages of having a social space where you can meet new people and spend time with friends and neighbors.

Daniel Nikolov Ludiars
LUDIARS: WHEN PERSONAL FINANCE IS ABSOLUTELY PERSONAL
The LudiArs team believes that an effective wealth increase can only be achieved when people self-manage their money and investments. With the help of experts like those at their company, of course.

Silviu Gugui eMag
SILVIU GUGUI: I PROMOTE A CULTURE THAT MAKES PEOPLE FEEL APPRECIATED
Every online shopper in Bulgaria knows about eMAG and has certainly ordered at least one item through the platform, which offers anything one can think of. The company was founded in Romania and has subsidiaries in Hungary and Bulgaria.

Deni Andonova
MISSION: THRIVE WITH DENI ANDONOVA
Deni Andonova is a certified instructor in Neurographica, a Kinesiologist, Certified K-Power Instructor, Positive Psychologist, Bush flower essences Therapist, Eating Disorders Consultant, author of the books Cellular Nutrition with Deni.

Wellky
WELLKY: THE LIFE-SAVING REMOTE CARE
We all want our elderly relatives and loved ones to be healthy and feeling well. But sometimes we are too far away or too busy to take care of them in person.

Sinisha Djukic
SINISHA DJUKIC: THE TALENT TO BUILD TRUSTFUL RELATIONSHIPS
At Bosch.IO people bring the IoT to life. With decades of expertise in building connected solutions, Bosch.IO is the go-to destination of the Bosch Group for innovation – from the automotive sector to industrial, building and energy, and consumer products.

Metrica Milena Ramcheva
METRICA: CREATING A SEAMLESS CONNECTION WITH YOUR CUSTOMERS
Business growth is the thing each company aims at, but selling more goes hand in hand with enlarging storage capacity, enhancing logistics, hiring more people, and implementing new processes.

georgievi architecture studio sturgel
ARCHITECT KRASIMIR GEORGIEV JR.: TO UPGRADE TRADITION WITH A VISION OF SUSTAINABLE FUTURE
Climate change and the need to reduce the harmful impact of human activities on nature will undoubtedly transform our current lifestyle. This also relates to the spaces we inhabit.

DLSolutions Dimitar Dinchev
THE HOME YOU DREAM ABOUT: DESIGN, REPAIR AND FURNISHING IN ONE STEP WITH DL SOLUTIONS
Everyone who has organised the repair or furnishing of their home knows that what initially seems an easy and even fun endeavour often becomes a protracted suffering, and the result in the end is usually a compromise.

jeluxe cosmetics
JELUXE GOLD SERIES: COSMETICS FOR YOUNG AND BRILLIANT SKIN
Created with lots of love and attention to quality and refined to perfection details, the products provide an outstanding balance of the bouquet of oils and active ingredients, which takes them to a world-class level.

kristina sungarska
KRISTINA SUNGARSKA: WHEN MIND AND SOUL WORK AS A TEAM
In search of answers to existential questions, Kristina Sungarska left her successful career as a lawyer and became a psychologist.

TOBIAS KERZEL
TOBIAS KERZEL: FREEDOM AND FLEXIBILITY AS THE CORE OF MOTIVATION
The fourth industrial revolution is rapidly changing the business environment. Technological progress – especially in the IT sector – is driven by human beings, rather than machines.