About Us

Talon Launched First Corporate Secure Browser for the Hybrid Work Environment

Talon Cyber Security has developed a new secure browser solution designed to address the new threats that the workforce faces. It is designed considering employee experiences. Talon Work is a browser based endpoint security solution for distributed workforce. Talon also announced an investment from top cyber security global leaders.

“Today’s work from anywhere world demands a flexible and secure working environment, and as a result, modern security must be frictionless by design. Talon’s browser-based security solution takes a fresh approach, putting the user experience front and center while extending the security of the enterprise,” said George Kurtz, co-founder and CEO of CrowdStrike.

In order to protect its growing global hybrid workforce, Talon works with some of the leading employers in the United States via its unique technology. The corporate browser of Talon can be installed in less than an hour across the entire organisation, allowing security officials to make the browser their first line of defence with minimal complexity, cost, and no extra hardware. Talon enables organisations with dangerous operation to better secure and control access to sensitive data and resources, to accelerate onboarding in multiple working scenarios and to quickly and efficiently recover disasters.

“With the shift towards a hybrid workforce, more known and unknown devices are accessing the organization’s most sensitive data on premise and in the cloud. Therefore, we must ensure frictionless and secure access to the data, no matter the device or the employee location. Talon provides exactly that,” said John Thompson, recent former Microsoft Chairman.

“It is equally important that the next generation of cyber solutions are designed for ease of use, and optimized for a remote work environment. In this regard, Talon’s solution is spot on,” said Mark Anderson, former President of Palo Alto Networks.

The revolution of the workforce and in the pandemic the growing trust  of SaaS services turned the browser into the main entrance to the organisation in general. The browser is also the most vulnerable application and the businesses have witnessed information stealers extracting browser credentials, malicious extensions stolen zero-days in the wild. The multi-layered approach of Talon ensures enterprise level security regardless of the endpoint: device malware resilience, browser hardening, zero day exploits and browser-integrated data leakage prevention mechanisms.

“To enable this instant shift to distributed workforce, many organizations were forced to quickly patch security gaps using their current IT stack. Talon offers a new and first to market approach and a strategic alternative that is practical and more sustainable. We are honored to have the leaders who shaped the face of cybersecurity on board with us, sharing our vision and mission,” said Ofer Ben Noon, Talon’s Co-founder and CEO.

Managing Insider Threat in the era of Work From Home Policy

The COVID-19 pandemic forced organization to work remotely. By allowing employees to work remotely, they put themselves at greater risk of being exposed to insider threats. Staff could be distracted by personal online activities and mix them with work-related ones due to today’s global state of affairs. Because of this, tailored phishing campaigns and other cybercrime attacks are more effective. While working away from the office, employees are more likely to neglect cybersecurity protocols, exposing remote devices to cyber attacks. Working remotely increases the risk of being a target for cyber criminals because of the additional technical vulnerabilities it introduces, such as insecure network connections. However, security professionals must encounter threats or attacks from the insiders. Dissatisfied or angry staff members are exploiting the fact that many companies do not provide secure access to off-site networks. They are also taking advantage of their co-workers who may unknowingly cause damage.

New methods of prioritizing and reducing cyber risk are needed because of the insider threat phenomenon. A process improvement plan is needed for security teams to resolve deliberate or accidental misuse of resources. They should be equipped with better and specific solutions like insider threats to deal with threats and gain insight into attacks.

Malicious insider activity poses the following risks to firms:

Data loss or corruption — Insider activities can include making changes to or deleting confidential information. Trying to recover deleted or corrupted files can be time consuming and frustrating.

Financial loss — This includes costs for cleaning up after an attack like system upgrade and making restitution to those who were harmed like clients and vendors. The more damage an attack causes, the more money a company has to spend to fix the damage it causes.

Brand Image loss — Customers’ confidence in a firm will be disturbed if it fails to protect their data, and that trust is difficult to restore.

Employee Monitoring

As part of an insider threat risk mitigation program, companies should limit and control user access. Organisations should restrict and minimize access by only authorizing employees the level of privilege required for them to do their tasks. Likewise, businesses should reassess staff members’ access rights on a regular basis and remove access that are not required for staff to fulfil their work roles. 

Employee Access Restrictions and Control

It is important for companies to incorporate controls for restricting staff access and managing insider threat risks into their overall risk mitigation strategies. Businesses should restrict and minimize access by only authorizing staff members the access required for them to do their functions and carry out responsibilities. The implementation of the Zero-Trust model can benefit the organisation. Likewise, organisations should reassess staff members’ access rights on a frequent basis and remove any access that are not required for staff members to fulfil their work tasks.

Teleworking Policy

Businesses should begin by creating a proper teleworking policy that outlines network and data security issues. Developing a strong teleworking policy is an effective way to prevent insider threats, especially those that arise from negligence. It is essential for teleworking policies to include several key elements. Teleworking policy must tackle the problem of remote access. Employees working from home should be able to connect to business networks using company-owned systems as long as they follow remote access rules that define permitted BYOD practices like the use of multi-factor authentication (MFA) passwords.

Employee education and training

Staff members must be extensively trained and educated about using, organisational resources securely as part of their work. Staff members must also be equipped with knowledge of the latest cyberattack techniques, like phishing and social engineering. They should be taught the best practices to avoid cyberattacks.

To detect insider threats effectively, companies must have centralised security visibility and management to monitor their remote and distributed staff.  The crux of detecting an insider threat lies in the ability to clearly define “normal” in the new scenario of work from home policy. User behaviour analysis can help a company better mitigate insider threats and protect its key resources when used with zero-trust access.

NexusTek Announces New Cybersecurity Service Plans to Fight Cyberattacks

NexusTek provider of managed IT services and full IT outsourcing solutions to organizations across the United States, announced the launch of new managed cybersecurity plans to address the requirements of hybrid and remote workforces. The three plans, which provide managed cyber threat prevention, detection, and response, offer different degrees of security that are customized for each firm.

As a result of the COVID-19 pandemic, the global shift to a remote workforce has raised cyber security problems, such as unpatched devices, uncatalogued endpoints, and insecure networks. As a result of cyber criminals preying on such shifting schedules and vulnerable staff, social engineering cyberattacks have increased.

NexusTek has over 25 years of experience offering cybersecurity solutions, and these latest managed cybersecurity plans demonstrate NexusTek’s commitment to clients by improving their security posture and cyber resilience in the phase of growing cyber threats. The pre-packaged plans incorporate the most up-to-date security requirements that every organisation requires, making it simple for businesses of all sizes to choose the strategy that best serves their needs and objectives.

“NexusTek is excited to release these newly packaged cybersecurity solutions. Cybersecurity strategies must include solutions that can quickly adapt to combat changing tactics from cybercriminals. The pace at which tactics change makes it very challenging for businesses to keep up and quickly implement comprehensive solutions. Now, we have arranged a comprehensive set of cybersecurity solutions from our best technology vendors into pre-designed plans to make it easy for companies to protect their business and reduce risk. Our Cybersecurity Solutions focus on helping businesses protect their highest at-risk assets: their employees and their data. Our plans are also designed to be extensible and can be easily customized, as needed,” said Randy Nieves, Chief Technology Officer, NexusTek.

“The release of our new cybersecurity plans is timely and much needed. With the steep increase in ransomware attacks over the last 15 months since much of the U.S. started working from home, our new packages make it simple for every business to select the right plan and protect their employees, revenue, brand reputation, and ultimately, national security,” said Bill Wosilius, CEO, NexusTek.

Oasis boosts Protection of Remote Work through Collaboration with SecureReview

SecureReview has collaborated with Oasis, a private cloud and eDiscovery solutions provider, to provide specific protection for distributed enterprises managing sensitive data.

SessionGuardian, a modern endpoint protection product from SecureReview, has been merged into the Oasis platform, allowing enterprises to make use of cutting-edge cybersecurity technologies:

“SecureReview is the world’s first endpoint breach defense that prevents sophisticated attacks on distributed workforces from both insider and outsider threats. Our security solution prevents unauthorized VDI access, with second-by-second biometric authentication that blocks screen sharing, screenshots, and even blurs the user’s screen instantly if a phone camera is pointed at the screen. SecureReview allows IT to easily deploy and centralize endpoint security – providing complete protection from log on to log off ,” said Jordan Ellington, founder of SecureReview.

Oasis is no stranger to cybersecurity; the firm has years of expertise delivering IaaS, SaaS, and PaaS solutions based on virtual and physical security standards such as ISO 27001, 27017, 27018, and SOC 2, among others. Its association with SecureReview gives a specific layer of security to any company working with sensitive data, not just legal firms.

Oasis COO, Sal Dababneh said, “While having a globally distributed workforce is not new to Oasis, it is still quite new to most other businesses. We sought to provide our clients with an even greater level of protection to help them strengthen remote security and better protect their business data. Our partnership with SecureReview was the necessary next step in doing so.”

SecureReview has partnered with Oasis to provide clients with the highest level of remote security. Various levels of protection are now accessible, depending on the needs of the user.

Insider Threat Management – An Overview

An insider threat occurs when employees, vendors, or business associates who have access to an organization’s information, network, or premises use that access intentionally or unintentionally to compromise the security and perform malicious activities like theft, fraud and damaging systems.

Types of Insider Threats are –

  • Malicious Insider – A malicious insider is an employee who intentionally steals information for monetary or personal gain. Since they are very well acquainted with the company’s security policies and procedures, they have an advantage over other attackers.
  • Negligent Insider – Insiders do not want to put the company at risk, but they do so unintentionally by acting recklessly. An employee who does not adhere to IT security policies or make mistakes due to poor judgement. e.g., an administrator who does not install a security patch.
  • Compromised Insider – An employee whose computer is infected with malware is a typical example of a compromised insider. This usually occurs as a result of phishing scams or clicking on links that lead to malware downloads.

Some Key Features of Insider Threat Management Solutions are –

  • Privileged Access Management (PAM) – ITM solution determines who has access to systems and applications at any given time. PAM apps can do this by creating and deleting user identities. It employs password vaulting, encryption techniques and access control for mission-critical technologies and applications. For password and data sharing PAM uses encryption which is a secure way of communication and it prevents attackers from reading data. A compromised credential is at the heart of the majority of security breaches. As a result, Privileged Access Management (PAM) is an essential component of ITM (Insider Threat Management) solution.
  • User Activity Monitoring with Big Data Analysis – Security threats have increased and become more complex as work-from-home and remote-work activities have expanded. As a result of remote work, security priorities have shifted, and security protocols have been changed. Insider security management tools create models of user behaviour and assign risk scores. Creating behavioural baselines based on various factors like timing of activity, data accessed and actively learning what is acceptable behaviour is the most effective way to detect insider threats without producing a large number of false-positive warnings. To detect privilege misuse, sophisticated machine learning models and data science is used to track and analyse vast quantities of data from a variety of sources. This helps in the detection of multiple attacks spanning multiple alarms, allowing for rapid detection and response.
  • Investigation and Threat Mitigation – In case an intruder breaches the perimeter and gains access to the organization’s network, security teams can search for multiple compromised credentials or abuse indicators to confirm the threat. ITM’s machine learning is used by security teams to generate security-relevant signals. These techniques will help in visibility and detailed forensic analysis.

A successful Insider Threat Management solution requires an understanding of what organization values and what could potentially harm or threaten those assets. A complete understanding of an organization’s assets allows for proper coordination and risk management. A tried-and-true ITM solution starts with figuring out where an organization’s properties are kept and who has access to them. This allows for a more comprehensive classification of each asset’s risk and the implementation of risk-based mitigation strategies.