BlakFXCrypto SecurityCybersecurityHackingNSASecurity AuditUncategorizedWork

Asia Pacific Firms Have The Greatest Concerns Over Cyber Security

The majority of global businesses believe supply chain attacks can become a major threat within the next three years, with 45% experiencing at least one such attack in the last 12 months. This figure is higher, at 48%, in the Asia-Pacific region, where organisations also are reporting more ransomware attacks and paying out higher ransoms than their global counterparts.

Amidst the rise in frequency of security incidents, a new report noted that 63% of respondents were “losing trust” in legacy software vendors including previously trusted providers such as Microsoft. In Asia-Pacific, this figure clocked at 66%.

Helix22 protects all your data while in your supply chain and in the cloud.

The majority of global businesses believe supply chain attacks can become a major threat within the next three years, with 45% experiencing at least one such attack in the last 12 months. This figure is higher, at 48%, in the Asia-Pacific region, where organisations also are reporting more ransomware attacks and paying out higher ransoms than their global counterparts.

Worldwide, 84% of enterprises expressed concerns third-party attacks could become a major cyber threat over the next three years. However, just 36% had vetted all their software suppliers for security purposes in the past year, including 40% in Asia-Pacific.

Conducted by market researcher Vanson Bourne, the study surveyed 2,200 senior IT security executives and decision makers across 12 global markets between September and November this year. These included four in Asia-Pacific, where 300 respondents were from India, 200 each from Japan and Australia, and 100 from Singapore.

At 87%, more in Asia-Pacific than the global average expressed concerns supply chain attacks were becoming a major cyber threat, the study revealed.

Amongst the 48% in the region that reported at least one such attack in the past year, 36% were from Singapore where 57% could not ascertain that they had vetted all their software suppliers for security purposes.

Some 69% in Asia-Pacific also encountered at least one ransomware attack in the past 12 months, higher than the global average of 66%. This figure was 64% in Singapore.

Asia-Pacific also clocked the highest average ransomware payment of $2.35 million per attack, compared to $1.55 million in the US and $1.34 million in EMEA. The global average ransomware payout climbed 63% this year to $1.79 million, up from $1.1 million last year, according to the report, which noted that attackers demanded an average $6 million in ransom payment.

Worldwide, 96% of respondents that paid the initial ransom had to pay additional extortion fees of $792,493 on average. The report noted that 57% of companies that suffered a ransomware attack acknowledged they did not had a defence strategy in place to coordinate a response. This figure was 53% in Asia-Pacific.

Singapore respondents that chose to fork out a ransom demand paid the lowest average at $1.46 million in the region, compared to India at $2.92 million, Japan at $2.25 million, and Australia $1.53 million.

Some 93% of Singapore organisations that paid a ransom forked out additional extortion fees averaging $619,231 per attack, which again was the lowest in the region where their Indian counterparts paid an average of about $1.15 million in additional extortion fees per attack, while those in Japan paid $950,000, and Australia clocked at $785,345 per attack.

Singapore took 119 hours to detect a cybersecurity incident, quicker than the average 205 hours in Asia-Pacific, but required a longer 15 hours to investigate and triage, compared to the regional average of 14 hours.

Organisations in Singapore also took an average 30 hours to contain and remediate security incidents, almost double the Asia-Pacific average of 19 hours. Some 60% in the city-state cited remote work as the source of an intrusion, while 75% in Asia-Pacific and 69% worldwide said likewise.

Globally, organisations took an average 146 hours to detect a cybersecurity incident, up from 117 hours last year, and needed 11 hours to triage and understand an incident. They required 16 hours on average to contain and remediate a security incident.

Amidst the rise in frequency of security incidents, the report noted that 63% were “losing trust” in legacy software vendors including previously trusted providers such as Microsoft. In Asia-Pacific, this figure clocked at 66%.

Lulled into complacency, businesses face risks of supply chain attacks even after they have done their due diligence in assessing their third-party suppliers’ security posture before establishing a partnership.
Helix22 SDK was purpose built to protect data in the cloud and with 3rd party vendors.
The continued growth of cloud computing will inevitably leave humungous security gaps in your supply pipeline. On the cloud, your firm is quite simply at the mercy of the Cloud Service Providers (CSP) security system. Further, E2E encryption is limited in it’s capabilities and only protects data during transfer. If you are running AI experiments on the cloud, then none of the data is protected as E2E encryption does not protect data in use or at rest. E2E encryption will be obsolete in the quantum computing era.

Currently, the only way for organizations to retain full control when transitioning to the Cloud is through Anonymization of data or rendering enough sensitive data fields inaccessible when in the Cloud and only accessible again when coming back on-premise or back within their span of control.  This is where the Hold Your Own Key (HYOK) concept becomes essential.  Encrypting data prior to sending to it the Cloud and only decrypting once back on-premise is the only way to satisfy any more conservative trust models.

Cloud Service provider encryption solutions, however, cannot strike the required balance.  Disk, file, tablespace or even Column level encryption solutions still mean the Cloud Provider controls the keys!  This protects against an intruder walking out of the data center with a disk drive but not any normal access channels to the data.  Cloud Services provided solutions including Bring Your Own Key (BYOK) designs, are not acceptable to organizations in any highly regulated industries or processing particularly sensitive data.

Another major problem is encrypting all the data. If data is 100% encrypted, then fields and columns cannot be accessed and are therefore are inadequate for use as a data set. It becomes impractical then from a business standpoint, to encrypt all data fields or offer access only on a “need-to-know” basis. The result is that most data is shared on the CSP without encryption at all. Your data is then 100% reliant on the CSP not being breached.

Enter BLAKFX. The Helix22 offers 100% data security on your firms data while it is at rest, in use or in transit. It also works on every CSP and on any device or in any programming language.

Here is how HELIX22 works

BLAKFX provides Device-2-Device (D2D) Encryption with multi-patented DNA BindingTM cryptography that embeds with the data itself. The key exchange originates on an encrypted device (not in software or an app) and is augmented with a genuine “zero-knowledge” universal key server. The recipients device must have Helix22 installed in order to exfiltrate the data. Therefore, we offer perfect data security with 100% compliance, in your control, at all times. This of course is the optimal scenario. Your firm controls full control over access to your data sets at all time.

Helix22 is Quantum Immune – Start Your Integration on our Git

With Helix22, this means that data is protected on your infrastructure, on a CSP and is 100% compliant. Also, it means that no other service provider or 3rd party will be able to access data or have it breached. Compliance is controlled also 100%  by your frim as all the keys are in your possession and/or generated by the BLAKFX key serer, which is 100% zero-knowledge.

What we understand better than anyone else is the new era of data security is one that requires new solutions. At BLAKFX, we understand that protection of your data requires that it be protected wherever it is. Whether on the cloud, in transit on a foreign network or on a trusted suppliers system. Data security cannot just be about protecting your own systems. Therefore, we know that the era of perimeter defenses is over as it is proving impossible to keep hackers from breaching the perimeter and accessing data. Also, E2E encryption based on old models of RSA cryptography will be obsolete when quantum computing becomes more widespread.

Helix22 delivers perfect security assurance due to our genius engineering team that has invented a new model for data security that required an innovative look at the problem. The approach we took was to protect the data itself. Almost all other data security products attempt to build a perimeter or being fanatic on user credentials. However, once the product is breached or a password is stolen, even if it is 2FA or encrypted, your firms data is in the clear.

You see, the Helix22 cryptography is embedded with the data itself through our inventive and multi-patented process of DNA BindingTM. Therefore, even if credentials are stolen the data cannot be exfiltrated. This means that all data is 100% protected regardless of the type of attack.

Another substantial advantage of Helix22, is that it protects all data whether at rest, in use or in transit. All communication apps for example, only encrypt data while in transit. Therefore, that encryption become useless for internal IT security or Artificial Intelligence or Machine Learning experimentation. All data generated during these massive computing exercises is equally protected in real time. Plus, the latency period for the Helix22 is exponentially less than any other security product, so it actually contributes to faster processing times.

The Helix22 is easy to install and runs on all platforms, programming languages, networks and devices.

              Our Motto

      “In Math We Trust”

In this protocol, we are truly a “zero-knowledge” server so your private communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user-to-user encryption (U2U) world, there is no opportunity ever for any data leak.

The Helix22 data security SDK accomplishes the following:

  • Protects all your firms data at rest, in use and in transit
  • Renders ransomware threats obsolete
  • Eliminates human error
  • Eliminates all malicious or interior attacks
  • Verifies original content i.e. minimizes the threat of impersonation attacks and deep fakes
  • Reduces latency and optimizes 5G networks
  • Installs with 5 lines of code
  • Runs on any platform, network, device and in any programming language
  • Provides perfect future/forward secrecy
  • Delivers “zero-knowledge” encryption
  • Compatible with all cloud, 3rd party and vendor services
  • Enables Internet of Things data security by providing protection at the Edge and has ultra low latency
  • Ensures privacy and security for blockchain and all cryptocurrency transactions
  • Is quantum ready – so there’s no need to upgrade when the time comes
  • Requires no employee training
  • Exceeds all gov’t and banking security standards
  • Meets all international compliance regulations

D2D encryption

We can make this claim as the tech engineers at BLAKFX invented and patented a genuine device2device (D2D) encryption. We manage data security transmission through the truly brilliant and also patented universal Helix22 key service. The Helix22 encryption originates on your network or device, not just when the app is opened. This means, that when data arrives to our key server, it is already encrypted so all it needs to do is issue another key. Signal and Telegram cannot claim this level of security. This key will then only work with the intended device, which generates a matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server so your communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique device-to-device (D2D) world, there is no opportunity at all for any data leak.

This same protocol just described, can be the same with all your 3rd party vendors and suppliers. It does not matter in the least what platform they are running or what device they are using or even the type of data, it is all 100% protected. We do however, strongly advise that all firms involved be utilizing Helix22 due to the nature of the data content. Helix22 can ensure that whatever data they are generating is protected as well.

Let’s take it a step further. Even if your organization were a victim of an internal attack or a victim of malicious open source downloads, there is no reason for concern. Any data that has been forwarded, downloaded, copied or saved cannot be exfiltrated. Period.  We have the technology industries foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already proven the ability to withstand penetration testing from MI5 and quantum computing attacks.

One final practical genius of DNA BindingTM is in that it is immediately compatible with whichever system or software you are utilizing. Therefore, any organization can forward information to another and then discuss it and there is immediate privacy.

BLAKFX is Based on Success

Our founders, Robert Statica PhD and Kara Coppa, also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. The Helix22 data security SDK is several generations enhanced since then. Dr. Statica also delivered the encryption for the world’s most secure phone, Katim.

                                                                                         

Founder – Robert Statica PhD            Founder – Kara Coppa                   Founder – Alex Maslov MS, MBA                    

 

                               

Co-Founders of Wickr                    KatimTM Ultra Secure Smartphone

 

Finally, the Helix22 encryption is quantum computing ready so no need to redo all your data security methodologies in a couple of years when everything else becomes obsolete.

We like to refer to Helix22 as “22nd Century Data Security.”

The wrold's foremost B2B and B2G data security product.

Helix22 – Zero Risk