December 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

Minute Read: 6 minutes

December 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

EU to fine 2% of revenue for breaching cybersecurity rules

Large energy, transport and financial companies as well as digital providers and makers of medical and computer devices could be fined up to 2 percent of their global turnover for breaching EU cybersecurity rules under a European Commission proposal. 

With two in five EU employees working from home due to the COVID-19 pandemic and one in eight businesses hit by cyber-attacks, the EU executive says its proposal is meant to bolster Europe’s collective resilience against cyber threats. 

Read More>>

SECUDE’s Takeaway:

It is imperative that all companies must realize that as a result of the ever-increasing complexity of IT environments, it is a great challenge for them to track what data is stored in which systems and through which channels it could potentially be shared. ERP systems such as SAP contain and process copious amounts of personal data.

Within this controlled IT environment, the specifications of the new data protection guidelines can be implemented as part of the standard process if the applications are equipped with authorization structures and audit logs. However, when data leaves the SAP environment, the SAP authorization no longer apply. If important data security mechanisms are lacking, any data misuse by hackers or insiders becomes a potential GDPR violation evoking strong repercussion. 

To secure SAP data in unstructured documents, the de facto standard from Microsoft is leveraged for SECUDE’s HALOCORE. With Microsoft AIP/RMS, all types of documents can be encrypted, allowing granular access control and processing rights. This protects personal information and reduces the critical share of the risk of fines for GDPR violations.  

To know how SECUDE can protect your vital information, be it financial, IP, operations, customer or even about your employees, contact us at 

Ransomware Attacks Surge in Q3 as Cyber-Criminals Shift Tactics 

A record growth in ransomware attacks took place in Q3 of 2020 compared to Q2, from 39% to 51% of all malware attempts, according to Positive Technologies’ Cybersecurity Threatscape: Q3 2020 report. 

Healthcare organizations were heavily targeted in this period, including pharmaceutical sites where COVID-19 vaccine research was being conducted. Half of all attacks against this sector involved ransomware, which resulted in serious consequences, such as the crippling of hospital functions. 

Read More>>

SECUDE’s Takeaway:

Data is the essence of all business operations and ERP platforms enable various departments to talk to each other and exchange data between each other and authorized outsiders to drive operations. Therefore, there is a need to keep data secure all the time and in all hands.  

SECUDE’s HALOCORE is extremely efficient in automatically classifying, blocking or protecting sensitive data extracted from SAP applications, while enabling enterprise-wide solutions to make better decisions over sensitive data handling. Email attachments represent another risky exit point for SAP clients as they often contain sensitive data that many enterprises lose control over once an email is sent.  

HALOCORE will be able to log SAP data exports from SAP’s native email functionality, capturing email metadata and attachments. With HALOCORE, companies will now be able to log and monitor email attachments, reducing the risk of unwanted information exposure and ransomware attacks. 

40% of small business employees worried they’ll be blamed for data breaches at work 

Avast found that almost 40% of small business employees think that a staff member who unknowingly clicks a malicious link would be held personally responsible for a data breach, which could be encouraging employees to keep quiet rather than flagging a potential threat. 

Read More>>

SECUDE’s Takeaway:

There are threats both inside and outside the organization and the company’s data may not be as safe as you think. It would be in the company’s best interest to review the safety measures they take to ensure that their data and therefore their business, is in safe hands.   

Now, if you are a large company with sensitive business, operations of client data residing in your enterprise resource planning platform, such as SAP, should you be worried about its integrity?   

SECUDE has interacted with many SAP users, from government entities to large and medium corporations who have voiced concern about data security – especially data that leave the boundaries of their IT landscape.

Employees are 85% more likely today to leak files than they were pre-COVID  

Code42 released its latest Data Exposure Report on Insider Risk. The study, conducted by Ponemon Institute, found that both business and security leaders are allowing massive Insider Risk problems to fester in the aftermath of the significant shift to remote work in the past year. 

Read More>>

SECUDE’s Takeaway:  

Due to the COVID-19 Pandemic, more and more organizations are shifting to the remote mode of operations. While this has ensured continuity of work, it has also given rise to cybersecurity risks and data breaches. 

Organizations that do give ‘due importance’ to data security unfortunately assume, often incorrectly, that traditional IT security practices of firewall, anti-virus along with password-protection practices would suffice. Nothing could be farther from the truth. 

The greatest threat to your data is not from hackers and malware, but by trusted ‘insiders’ who may be at any level in the corporate from employees to the leadership. This makes it the most difficult to detect. 

What is required, is a solution with enhanced logging and auditing features to give you critical visibility into sensitive data distribution, allowing internal and external audit teams to identify risky areas, users, or transactions. 

COVID-19 has not slowed global zero trust implementations  

Enterprise Management Associates and Pulse Secure report that 60% of organizations have accelerated their zero trust projects during the pandemic, while only 15% have slowed down. 

However, the survey found that collaboration is not without complications. Eighty-five percent of respondents in zero trust task forces and partnerships found themselves struggling with cross-team skills gaps (33%), a lack of tools and processes that might facilitate collaboration (31%), and budget conflicts (31%). 

Read More>>

SECUDE’s Takeaway:

Implementing a Zero Trust strategy is not a quick-fix solution. It requires careful planning, granular rules, and strategy. Enterprises must understand that it involves the entire digital estate and end-to-end coverage.  

Enterprises can take a phased approach beginning with specific target areas, consider each investment and align them with the business needs.   

Leading the market of Zero Trust Solutions is Microsoft 365 and Azure Information Protection. SECUDE, with more than two decades of experience in providing data-centric solutions and products, is a trusted partner of Microsoft and SAP to provide Zero Trust for data extracted from SAP systems.  

SECUDE’s HALOCORE protects data with automated classification, blocks unauthorized reports, and provides detailed access policies.  

SECUDE’s HALOCAD supplies the add-in software to the major CAD vendor’s products to be compliant with Zero Trust Methodology.  

To learn more about SECUDE’s products and how you leverage our expertise for your data-centric Zero Trust framework get in touch with  

New McAfee Report Estimates Global Cybercrime Losses to Exceed $1 Trillion 

McAfee released a new global report titled “The Hidden Costs of Cybercrime,” which focuses on the significant financial and unseen impacts that cybercrime has worldwide.  

The report, conducted in partnership with the Center for Strategic and International Studies (CSIS), concludes that cybercrime costs the world economy more than $1 trillion, or just more than one percent of global GDP, which is up more than 50 percent from a 2018 study that put global losses at close to $600 billion.  

Read More>>

SECUDE’s Takeaway:

With data breaches and data leakages becoming a norm in today’s world, companies are forced to step up to the plate and face the heat. However, companies fail to understand is the fact that there are no exceptions when it comes to malicious attacks and insider threats. 

It would be in the company’s best interest to review the safety measures they take to ensure that their data and therefore their business, is in safe hands. 

Now, if you are a large company with sensitive business, operations of client data residing in your enterprise resource planning platform, such as SAP, should you be worried about its integrity? 

HALOCORE® is a unique solution for the protection of intellectual property and sensitive and personal data that is exported from SAP. 

Supply Chain Cybersecurity – The New Foundation for Growth 

Supply chains can often be an overlooked part of a company’s security posture, leaving them targets for cybercriminals, who may attack organizations opportunistically or as part of a planned and targeted attack.  

Even the most security-conscious business may have hundreds or even thousands of suppliers, and never really know which of those suppliers may lack awareness of cybersecurity measures needed or fail to protect their organizations appropriately. 

Read More>>

SECUDE’s Takeaway:

The internet has widened the business opportunities as customers and businesses interact in a “faceless society”. The faceless nature of these transactions has paved the way for greater vulnerabilities. The popularity and continued adoption of the Internet of Things (IoT) devices and cloud computing presents new challenges and security risks.   

In today’s collaborative world, data is constantly on the move, traveling outside firewalls and organizational boundaries. This dynamic nature of information access compels organizations to adopt new technologies to protect their sensitive data assets. 

In addition to whatever perimeter security, an organization has, to secure its data it needs the additional protection that only data security experts can provide. Therefore, all these teams have to work collaboratively to provide the most secure environment that can be least penetrated by hackers. Only a collaborative approach and intelligence will help combat the risk of the high cost of being too open with your sensitive data.  

SECUDE, a trusted partner of SAP and Microsoft provides data security with intelligent classification, strong encryption, and fine-grained access policies.  

This innovative approach allows organizations to maintain a high level of control and security over sensitive documents extracted from SAP. To learn more how we can help provide data security to mitigate your security risks get in touch with  

Leave A Comment