Network scam tatics to be cautions about

Cyber world trending VSEC - BLOG

In the final months of the year, consumers in Vietnam and around the world tend to shop more when the commodity market shows signs of stabilization and when Christmas and the Lunar New Year are approaching. This is a golden time for shopping, as well as the month of December in which hackers and scammers can increase their online fraudulent activity.

According to the Ministry of Industry and Trade, the total retail sales of consumer goods and services in the third quarter of 2022 were estimated at VND 1,450.4 trillion, up 3.8% from the previous quarter and 41.7% from the same period the previous year. In the first nine months of 2022, total retail sales of consumer goods and services are projected to increase by 21% over the same period last year, with the first quarter showing a 5% increase, the second quarter showing a 20.1% increase, and the third quarter showing a 41.7% increase.

Crime increase in the last months of the year

E-commerce or shopping applications are believed to be an essential factor in promoting year-end consumption, particularly when consumers prefer online shopping following the Covid-19 epidemic’s fluctuations. This is also the time of year when consumers and sellers are most at risk of hacker attacks if they are not vigilant while shopping online. Here are a few types of attacks that consumers should pay special attention to.

  1. Impersonating employees of companies/brands giving gifts

Scammers obtain shopper contact information by impersonating post office workers or customer service agents of some companies, who provide warranty upgrade information, promotions, or gift announcements. The gullible consumer will supply information or pay a fee or tax in order to acquire the freebie.

In addition, numerous subjects impersonated bank employees and money-lending companies in order to obtain personal information from users, such as social security numbers, certificate of land use rights, etc. 

  1. Stealing personal information on social networking sites

Numerous subjects commit cyber fraud by stealing personal information from social networking sites and chat applications in order to borrow money, preying on the credulity of victims. Experts recommend that consumers “slow down” in order to verify the veracity of the information exchanged and contact their acquaintances through alternative communication channels.

  1. Creating fake social media accounts

As the platform for chat applications, social networks make it simple to establish accounts; many con artists take advantage of this to create fake social media accounts. Targets are online merchants on e-commerce websites. In order to steal information and hack the seller’s bank account, the subject will request a bank account number with internet banking, account holder name, phone number, etc. when ordering products online.

To receive money, the scammer will send a message stating that the account has been credited and requesting that the recipient access a link and update all login information and the OTP code. 

  1. Impersonating a banker/police agency/procuracy, etc.

The scammer will pretend to be a bank employee or a police officer and inform you that your bank account is having problems, errors, cases, etc. When a recipient is concerned, they may be tempted to supply a pin code, card information, a phone number, and a link to access the login and account information. 

  1. Creating fake sales and investment information pages

Sophisticated fraud occurs when scammers create fake sales websites. Fake websites or names of reputable sales units, inexpensive sales pages, and inducements for customers to log in to their shopping accounts in order to steal credit card information, or establish websites for financial investments, virtual money with extremely high interest rates. After customers have participated in the investment for a period of time, the objects will actively destroy the fake website in order to steal the customers’ investment funds.

Experts advise consumers to be wary of any information related to requests for personal information or bank account information. In addition to us, users may also create additional multi-factor authentication.

Source: Synthesis

65% of business leaders will increase security budgets for 2023

Cyber world trending VSEC - BLOG

In most cases, the expense of fixing a data breach can exceed the company’s actual financial expenses, etc.

Most businesses are worried about cybercrime (65%), mobile fraud (41%), email (40%), cloud data leakage (38%) and other similar threats. (Illustration).

PwC’s latest 2022 Global Digital Confidence Survey polled over 3,500 CEOs from 65 different countries. Accordingly, 27% of businesses around the world have lost $1 million to $20 million or more due to a data breach in the last three years.

Despite having sustained millions of dollars in losses from cyberattacks, less than 40% of executives surveyed reported having fully mitigated cybersecurity risks in several areas, including: telecommuting and flexibility (38%); accelerating cloud adoption (35%); increasing use of the Internet of Things (IoT) (34%); increasing digitization of supply chain (32%); and office administrative activities (31%).

Moreover, senior executives voiced concern that their companies lacked the resources necessary to effectively counteract the growing threats. Cybercrime (65%), mobile fraud (41%), email (40%), cloud data leak (38%), hacking/account hijacking of business email (33%), and ransomware (32%) are on top list of risks in the cyber environment in 2023. Security in the supply chain becomes a major issue for operational executives.

Though transparency regarding cyber incidents is desired, only 56% of CEOs believe that their company can give information about a critical incident within a predetermined time frame. 70% of CEOs in businesses worry that increased openness and transparency may cause them to lose their competitive edge. 

INCREASE NETWORK SECURITY BUDGET

Sixty-nine percent (69%) of the business owners polled indicated their companies are allocating more money to security this year, and another 65 percent said they wish to invest more in 2023.

“Companies should establish a clear and consistent reporting system; have a contingency plan to respond quickly to ensure the system’s continuity; and prioritize building a network security risk management strategy.” Mrs. Nguyen Phi Lan, Deputy General Director of PwC Vietnam.

The majority of CEOs (52%), said they will take greater action to address cybersecurity in the future years and will push for substantial initiatives to strengthen cybersecurity. 

Some CFOs are also planning to prioritize cybersecurity, which includes investing in technological solutions (39%), prioritizing strategy and coordinating it with engineering/operation (37%), and working to enhance their cybersecurity expertise and hire qualified staff (36%).

According to the marketing leaders surveyed, the true cost of data leaks much exceeds the hard numbers. Loss of clients (27%), loss of customer data (25%), and reputation/brand damage (23%) are just some of the ways in which businesses have been harmed by data leaks or personal data incidents over the previous three years. 

The Deputy General Director and Head of Risk Management at PwC Vietnam, Mrs. Nguyen Phi Lan, advises businesses to develop a strategy for managing network security risks, prepare for potential disruptions to the system and implement clear and consistent reporting procedures.

Source: Vneconomy

MSI becomes victim of ransomware attack following ACER

Cyber world trending VSEC - BLOG

Taiwanese PC company MSI (short for Micro-Star International) has officially verified that their system is under a cyber attack.

After detecting “network anomalies”, the company implemented “immediately” initiated measures to handle the problem and also notified law enforcement agencies. However, MSI did not disclose specifics when the attack occurred or whether exclusive information, such as source codes leaked out.

“Currently, the affected systems are progressively returning to normal process, with no significant impact on financial operations”, according to a brief statement from the company.

According to a regulatory filing with the Stock Exchange of Taiwan, enhanced controls over the network and infrastructure have been implemented to ensure data security. MSI encourages users to only download firmware/BIOS updates from their official website, rather than from any other sources.

Money Message, a new ransomware group, has recently added the company into their victim list. Late last month, the threat was brought to Zscaler’s attention.

In the analysis published by Cyble, the experts noted: “This group applies a double blackmail technique to attack the victims, involving filtering before encrypting the victim’s data”. “Unless ransom is paid, they will upload data to their breach website.”

The development occurs one month after Acer disclosed their own mistakes leading to 160GB of secret information theft. Such data was advertised on March 6th 2023, for sale on BreachForums and is now defunct.

According to The Hacker News.

Security assessment is necessary for which types of businesses?

For pentester VSEC - BLOG

Enter the digital era, the top concern of businesses is information security. It could be said that security assessment is the top priority that every business that wants to undergo digital transformation needs to do, especially in industries with high-value industries, with exceptional growth rates and a large volume of customer data. Typically businesses in the following 4 areas:

1. Finance – Banking sector

In 2020, up to 23% of attacks  around the world targeted organizations in the Finance and Banking sector (up 6% compared to NTT’s statistics in 2018). These organizations tend to grow rapidly. However, the investment to ensure the safety of the system as well as the IT applications has not been commensurate with this growth rate. Particularly the Fintech sector, which is experiencing exceptional growth, possesses a large amount of customer data. Being hacked will seriously affect the image and brand of organizations and businesses, an important factor in financial business.

2. Energy – Manufacture

Nearly 50% of attacks in 2020 involved seizing control of industrial operational technology (OT) systems in the energy and industrial manufacturing sectors. Ensuring energy security is always a key requirement of any national regime. Attacks on these units’ IT systems could lead to national security instability due to interruptions in the country’s energy supply.

3. State organization sector

This sector has a high rate of technology updates and owns a variety of equipment and diverse application functions. Moreover, the volume of customer data stored and circulated in this sector is significant. It’s the target that most hackers aim for, exploiting data for dissemination, business purposes, affecting the economy and the business’s brand image.

4. Trade – Service sector

With the robust demand for digital transformation in Vietnam, government agencies are gradually shifting to the digital government model – e-government. This is the target of attackers seeking to exploit sensitive information, modify or post malicious content, paralyze public services, cause economic damage, and affect national political and security concerns.

VSEC offers information security assessment services including technology, environment, and human assessments. With the participation of leading IT experts, VSEC will assist businesses in detecting even the most minor security errors, providing advice and directly implementing measures to improve the business’ security system.

Improper permission management leads to privilege escalation in Chamilo LMS

Security for Newbie VSEC - BLOG

Introduction:

On April 22, 2020, I wanted to find a CVE for myself and after some searching, I chose Chamilo LMS. This is the second vulnerability I found in Chamilo LMS 1.11.10. I had high hopes for this vulnerability to be given a high score, but the outcome was that Chamilo didn’t know how to assign a CVE to me, so sad :3

I typically write my blogs with a cheerful and playful style, but today I’ll attempt to write like a thoughtful young man. It’s enough to ramble like a madman, let’s exploit.

 

Environment:

Version tested: Chamilo LMS 1.11.10 for PHP 7.3.

Web server: Apache webserver-Apache/2.4.41 (Debian).

Issue: Allow users with Sessions administrator privileges the ability to create new users with administrator rights.

 

PoC:

Step 1: Log in with the ‘abcd’ account, endowed with Sessions administrator rights.

Step 2: Create a new user named ‘654’.

Step 3: Click on button to edit ‘654’.

Step 4: Launch Burp Suite and click “Save.” Then, proceed to modify the request body as follows:

Step 5: Log in to the ‘654’ account. BOOM!! Now, ‘654’ is an administrator.

Okay, done!

At the end of the blog, I want to express my gratitude to my new friend, Hoang Kien. He has helped me a lot during the exploitation of this vulnerability.

The main reasons causing security risks

Security for Newbie VSEC - BLOG

On a summer day at the end of April 2017, Mr. Truong Duc Luong, Director of VSEC, had a talk on the current hot topic of information security risks at a small conference organized by VSEC in Hanoi, Vietnam. The conference covered many aspects that information security risks could be caused on servers as well as clients. 

Link to the Workshop event “Security Risks & Information Security” of VSEC: https://www.youtube.com/watch?v=yuekJt9C1fU

Server risks

Server-related security risks can be caused by a variety of causes, such as Poor Authorization and Authentication, Insecure Direct Object Reference, Missing Function Level Access Control and Using Components with Known Vulnerabilities.

Poor Authorization and Authentication occurs mainly due to lack or no control over authentication. Some applications in Vietnam often use constant values such as IMEI, UUID as the only authentication method. At the conference, the speaker gave some examples of an application using UUID as an authentication method, and a few examples of an application dividing APIs into classes according to different levels of security (Low Security, Medium Security, High Security). 

Insecure Direct Object Reference occurs when the programmer exposes references to objects in the system (files, directories, keys in database) without controlling access. Attackers can gain access to unauthorized data. This is one of the topics which most of guests pay attention to due to its serious danger. The speaker provided images of some bank mobile banking apps that encountered this error. The prevention method is to use Access Reference Map and Access Modal Diagram. A guest shared that he used to apply Access Reference Map, but he messed up IDs on clients, so it was not safe. Another guest shared that he did not use Access Reference Map, but its ID field was very complex, so it was difficult for an attacker to guess.

Missing Function Level Access Control occurs when the server does not control whether the user with this function has the right to execute or not. This results in the attacker being able to use unauthorized permissions. The speaker gave some pictures of the case where anyone could use administrator function and get information from Mail server system.

Using Components with Known Vulnerabilities occurs when the server uses components (operating systems, frameworks, libraries, etc.) with published vulnerabilities. Some vulnerabilities have been found and exploited automatically by a certain amount of tools, but this increases the risk of the system being attacked. The best measure to prevent this risk is to regularly update the system to the latest versions, cutting down unnecessary functions. VSEC also shared with everyone a situation when deploying a service to a partner, the partner knows that the framework is old with many vulnerabilities but it cannot be updated to a new version because this affects their system suite. 

WannaCry, ransomware virus is dominating in 150 countries today

(Source: theverge.com)

Client risks

Some causes of information security risks from the client include: Insecure Data Storage, Unintended Data Leakage, Insufficient Transport Layer Protection, Broken Cryptography, and Lack of Binary Protections 

Insecure Data Storage occurs when the programmer saves important information to the device but does not encrypt or protect it. When there were some cases of saving Tokens in cleartext, the guests also shared about some solutions and prevention in case of encountering such cases.

Unintended Data Leakage: This error belongs to the operating system and framework, this error is beyond the programmer’s wishes. Some points are vulnerable to information such as copy/paste buffers, system logs, and analysis data sent to third parties. The guests also shared about how to install apps to prevent screenshots on Recent App, prevent copying, etc.

Insufficient Transport Layer Protection: This error occurs when applications do not use encryption protocols, or use older versions, or only encrypt a part of transmission line. The speaker gave some statistics about the number of applications that do not check the server’s certificate, ignoring certificate errors. The speaker introduced additional prevention methods that some Vietnamese applications often use, such as encrypting packets sent, creating signatures for packets. However, the speaker also suggested that the entire packet should be encrypted, and gave an example of an exploit by changing the information returned from server.

Broken Cryptography: This error affects the confidentiality of the data to be encrypted. The speaker showed a number of applications that hardcode passwords in files, use insecure base64 encoding and more.

Lack of Binary Protections: The speaker explained process of compiling from java code to apk file, and explained why apk file was easily decompiled. In case of being decompiled, sensitive information is exposed such as: API, encryption and decryption methods, operating structure of the program. The speaker also offered some messing tools such as DexGuard, ProGuard for Android and a number of techniques

Conclusion

As mentioned in the conference by Mr. Luong, Director of VSEC, it was only the main causes of information security risks. There are also many other risks. However, if these risks are well overcome, the enterprise’s IT system could avoid 91% of the risks. Currently, the world is increasingly connected, which not only facilitates favorable conditions for our works but also better supports hackers. It’s time for us to seriously pay attention to information security!

Moving to the Cloud, businesses need a new approach to security

Security on Cloud VSEC - BLOG

According to experts, the Cloud environment changes rapidly every day and it is difficult for businesses and organizations to keep up, thus requiring units to have a completely new approach to information security.

In order to achieve high efficiency in work as well as achieve development goals and bring products to the market as quickly as possible, recently, organizations and businesses in the world as well as in Vietnam have joined Continue to move your unit’s workload to the cloud environment at a rapid pace.

Research by CyberSecurity Insider and Fortinet shows that up to 39% of organizations surveyed said they have moved more than half of their workloads to the Cloud, while 58% of organizations are planning to do so in the future. Next 12-18 months.

VSEC CEO Tran Thanh Long shared at the information security session of Smart Banking 2022.

Talking to a VietNamNet reporter on the sidelines of the Smart Banking 2022 event, Mr. Tran Thanh Long, CEO of The Vietnamese Security Network – VSEC also affirmed that moving to the Cloud environment is no longer a trend. has become a mandatory requirement for organizations and businesses, especially banks and financial institutions.

The outstanding advantages of Cloud give organizations and businesses a huge competitive advantage in terms of business, helping organizations focus on the main business area, greatly reducing the time to put services in. activities, especially financial institutions and banks.

According to a study, in 3 years from 2018 to 2020, up to 99.8% of CIOs and strategic planners participating in the survey want to move to the Cloud environment. Worldwide, Amazon Web Services currently leads the cloud services market with 45% market share, followed by Azure 18% and Google Cloud Platform at 5%.

In Vietnam, recently, many organizations and businesses have also moved part of their work to the Cloud. Vietnam’s orientation in the coming time is that by 2025, 100% of government agencies will use cloud computing, 70% of Vietnamese businesses will use cloud computing services provided by domestic enterprises. .

“Moving to the cloud environment has become a mandatory requirement for agencies, organizations and businesses,” emphasized the VSEC representative.

However, in the trend of moving to the Cloud environment, experts also pointed out that businesses and organizations face great challenges in ensuring network information security, including information protection. , data.

Talking about this issue, expert Nguyen Gia Duc, Country Director, Fortinet Vietnam said, maintaining the traditional “on-premise” system and pushing a part of the workload to the Cloud environment, as well as the cloud environment. The choice of multi-cloud, will give businesses flexibility in deploying applications, but at the same time, there are potential threats when data and applications are not centrally managed, but distributed.

Sharing the same opinion, VSEC CEO Tran Thanh Long analyzed, the risks and challenges of network information security when moving to the Cloud environment come from the operating way of the Cloud environment which is completely different from the environment. traditional.

“Not only that, the Cloud environment also changes rapidly on a daily basis and it is difficult for businesses to keep up, which requires a whole new approach to information security. Finally, there is a serious shortage of personnel in the field of information security in general and information security for the cloud system in particular,” said Mr. Nguyen Thanh Long.

As for units in the financial and banking sectors, from actually providing services to banks, CEO of VSEC said: “Banks and financial institutions are required to move to the Cloud environment. to increase competitiveness in business. And what is most lacking for banks is highly qualified personnel in the Cloud, especially in the field of network information security.

Choosing to cooperate or outsource with professional information security service providers is a solution that businesses and organizations can consider when moving to the Cloud. (Illustration)

Making recommendations to businesses and organizations, VSEC experts said that there are a number of approaches that can help units consider, that is, using consulting units on the strategy of moving to the Cloud. as well as consulting, designing professional Cloud architecture. This will greatly reduce the risk from the start.

Regarding network information security, choosing to cooperate or outsource with professional security service providers (MSSPs) to support system operation can help banks and financial institutions focus on the main commercial aspect. Because, MSSPs are units that focus on deep expertise, have full forces as well as processes and technology that are completely compliant with international standards.

According to Mr. Nguyen Gia Duc, participating in the Cloud environment, Vietnamese agencies, organizations and businesses should always pay attention to the model of sharing responsibility between Cloud providers and businesses to proactively protect for applications and data of your unit when moving to the Cloud.

“Delivering a comprehensive security strategy, capable of monitoring and protecting applications, data moving between multi-cloud platforms as well as a mixture of Cloud and “on-premise” environments is the way for businesses to Enterprises best ensure their information assets and data on this advanced storage platform,” suggested Fortinet Vietnam expert.

Source: https://ictnews.vietnamnet.vn/chuyen-dich-len-cloud-doanh-nghiep-can-co-cach-tiep-can-an-toan-bao-mat-moi-5003577.html

“SOC is the solution” on Cloud environment

Security on Cloud VSEC - BLOG

On November 25, 2022, The Vietnamese Security Network (VSEC) attended the Workshop “Data safety and security in the Cloud environment” organized by VNG Cloud in Hanoi.

The conference took place in  two main parts: Part 1 was the topic “The security level of data on Cloud infrastructure” shared by speaker Bui Trung Thanh – Security Solution Consultant of VSEC. Part 2 is the topic “Building a safe security architecture in the Cloud environment” shared by speaker Nguyen Hong Chuong – Cloud solution consultant from VNG Cloud.

Speaker Bui Trung Thanh – Head of Solution consultant VSEC

“In recent years, the global cloud computing market has grown by about 40% each year. The domestic cloud market is currently still occupied by international providers. This causes us to encounter many difficulties and challenges in ensuring information security and safety” – Mr. Thanh shared at the conference. In addition, the VSEC representative also gave a perspective from a unit providing information security services, how to ensure information when deployed on the cloud system. He hopes VSEC’s information security monitoring service solutions will help business organizations build strategies to migrate to cloud computing platforms in the safest way.

SOC IS THE SOLUTION!

Also according to Mr. Thanh: “When an information security incident occurs, all business activities of that enterprise will collapse. When building systems on the cloud, enterprise engineers missed security configurations and did not follow the supplier’s instructions on security configurations. This has created vulnerabilities for hackers to attack easily, creating information security violations on the cloud.”

SOC is a solution to help businesses minimize damage caused by hackers

To solve the above problem, VSEC representatives have proposed an important and urgent solution in the current situation. That is the Information Security Monitoring (SOC) solution –  helping businesses detect hackers’ attack activities as soon as possible and minimize the damage caused by hackers. This system helps continuously monitor and improve the organization’s security situation, allowing effective incident detection, analysis and response. In 2021 alone, VSEC’s SOC Center monitors and warns of millions of information security events, supporting many businesses to successfully prevent attacks on the system. The SOC system provided by VSEC has the ability to be customized according to the field of operation, scale and unique needs of each organization. This helps organizations feel secure about performance and operating costs effectively.

BUILDING SECURITY ARCHITECTURE

In part 2 of the seminar, speaker Nguyen Hong Chuong shared knowledge about security models that allow organizations to properly operate resources. Besides, he will present existing security solutions and optimal security architecture. “Cloud was born as a service, solving the problem of moving quickly but still safely and at a reasonable cost for businesses.”

Speaker Nguyen Hong Chuong – Cloud solution consultant of VNG Cloud

Also during the conference, the speakers also answered all questions for all attending guests. Evaluating after the seminar, the guests were very satisfied because the knowledge that the events brought was extremely valuable.

The Hero Inside

Uncategorized
Having been with VSEC since he was a confused intern, gradually becoming a Security Assessment Specialist and then Head of the Expert Services Team, Mr. Be Khanh Duy has spent nearly 6 years working and is also a the time when he changed himself and became the “Hero of Transformation” in 2022 of VSEC.
Mr. Duy shared a quote: “People are defined by two things: the beliefs they change and the people they fight for.” For him, the beliefs and people that he “fights” for have never changed, they are still beliefs in the company’s goals and vision, they are still brothers and sisters of the VSEC family. However, 6 years is a long enough time for him to be more clear and certain of that belief.
From a purely technical person who was afraid to speak and do whatever he was assigned, Mr. Duy transformed himself without realizing it, to become an open-minded person who shares and is ready to accept responsibility. Accompanying VSEC since he was a trainee, witnessing the transition between generations of VSEC, inheriting unique values from here, Mr. Duy gradually transformed himself, becoming a more complete version. , strives to retain, convey and attract everyone, and gradually becomes the brother who takes care of the trainees the same way he was received from them in the early days.
To continue on the path to change and improve himself better and better, Mr. Duy made a bold decision – to move South, to Ho Chi Minh City with a new mission and many responsibilities. than. However, he finds himself cheerful and happy with his current transformation. New position, new environment, but with the values at VSEC, learned and cultivated day by day, he has increasingly proven himself as the Expert Services Team Leader in Ho Chi Minh. This position is an affirmation of Mr. Duy’s efforts and personal transformation during his association with VSEC and G-Group.

IBM Announces a New Strategic Security Partner at “IBM Security QRadar Suite” Event

Outstanding

Hanoi, August 25, 2023 – IBM, the world’s leading technology corporation, has officially announced a new strategic partner in the field of security at the highly anticipated event “IBM Security QRadar Suite – Predict, prevent and respond to Information and Communications Security threats” which took place in Vietnam today.

The important event “IBM Security QRadar Suite – Predict, prevent and respond to Information and Communications Security threats” organized by IBM in collaboration with VSEC and the distributor Tech Data has attracted the attentions from security experts, risk managers and business leaders in the field of Finance and large corporations in Vietnam. In the increasingly complex and diverse context of information and communications security threats, strategic partnership cooperation in the field of security has become more urgent than ever. IBM has chosen a reputable and experienced partner to cooperate in developing a comprehensive, high-quality security solution to effectively deal with increasingly sophisticated and complex information security threats in the digital environment.

Security Operations Center (SOC) is an effective solution in predicting, preventing and responding to current information security threats in businesses and organizations. According to statistics, 63% of organizations look for the ways to improve SOC’s ability to detect and prevent. Thanks to providing a unified platform, full of necessary technology solutions to SOC, IBM Security QRadar Suite helps businesses and organizations solve the problem of technological complexity, supporting the engineers to focuses mainly on surveillance activities to deal with modern threats. Safety and network security operation monitoring services on IBM Security Qradar Suite platform (also known as Managed Qradar) is the key provided by VSEC to solve the problem of People and Processes – a very big challenge in organizations and businesses today

Ms. Ung Thi Dieu Uyen – Partner Director of IBM Vietnam, shared that: “IBM is always looking for partners who can give “end to end” services on information security, especially in the field of SOC with the world class to customers. VSEC is a longtime unit in such MSSP field. You can completely trust 100% in the cooperation of VSEC and IBM in the coming time, which will bring quality services to ensure information security for the businesses to further develop.”

Mrs Ung Thi Dieu Uyen- Partner Director of IBM Vietnam (left) and Mrs. Phan Thi Hai Anh – TechData (right)

At the announcement ceremony, Mr. Le Duc Hop – Sales Director for the North of THE VIETNAMESE SECURITY NETWORK JOINT STOCK COMPANY expressed that: “During its development, VSEC is constantly looking for partners who can resonate with VSEC to give the best and most effective service values to customers. Becoming a strategic partner of IBM will further affirm VSEC’s position not only in the Vietnamese market but also in the international market.”

It can be said that the “IBM Security QRadar Suite” event not only introduces advanced solutions, but is also a place where experts and businesses have the opportunity to discuss, exchange and update knowledge about current and future security situation.

 

About IBM:

IBM is a global technology corporation shaping the future of business through connecting information, analyzing information and applying artificial intelligence in order to solve complex world challenges. With more than 100 years of experience, IBM has been driving innovation in many sectors, including industry, transportation control, pharmaceuticals and energy. IBM is present in more than 170 countries worldwide.

 

About VSEC:

VSEC is the first information security management service provider in Vietnam to achieve both important certifications: CREST for Security Operations Center and Pentest Information Security Assessment service. Thanks to 20 years of experience in the field of cybersecurity, it has provided information security services to more than 1,000 domestic and international organizations and businesses, of which more than 50% of banks in Vietnam have chosen to use security services.

Why you should hire a CREST Penetration Testing Provider?

Outstanding VSEC - BLOG

Cyber threats evolve at a rapid pace, and one of the most effective ways to assess and improve the security posture and resilience of a company’s systems against such threats is penetration testing. By performing controlled and simulated cyber attacks against an organization, pentesting aims to identify vulnerabilities that could be exploited by malicious hackers.

However, the effectiveness of security testing services hinges greatly on the expertise of the provider, and this is where the value of hiring a CREST penetration testing provider becomes clear. In this post, we will delve into why businesses should consider partnering with a CREST-accredited firm for their penetration testing needs.

CREST serves as an internationally recognized accreditation body, endorsing the capabilities, technical expertise and quality of service for cybersecurity firms and individuals professionally involved in the field.

But what exactly is CREST, and why is it so crucial in the cybersecurity sector? Let’s delve into it in the next section.

What is CREST and its significance in the cybersecurity industry

CREST, originally known as the Council of Registered Ethical Security Testers, is a not-for-profit accreditation body that represents the technical information security industry. As a global certification body, it provides a framework of accredited professional services in cybersecurity, particularly in penetration testing. CREST serves as a benchmark for cybersecurity service providers, ensuring they meet the highest standards of skill, knowledge, and competence in the industry.

The body has two different types of accreditation, both for companies and individuals, who deliver services. Disciplines that CREST accredits for include penetration testing, incident response, threat intelligence, vulnerability assessment, intelligence-led penetration testing and Security Operations Centre (SOC).

CREST has been setting a new gold standard in the cybersecurity industry. It’s devised a framework for proficiency and ethical conduct that all accredited members are obliged to follow. To achieve CREST certification, companies must successfully pass a stringent assessment process. This includes a thorough evaluation of their business procedures and personnel, consulting practices and service delivery standards, as well as the security measures of the prospective CREST member company.

By providing a trusted benchmark for organizations seeking cybersecurity services, it assures customers that a CREST-accredited cybersecurity provider has undergone rigorous validation of their service delivery standards, procedures and methodologies. This increases the reliability, consistency and effectiveness of the services your organization contracted.

Advantages of hiring a CREST-accredited penetration testing firm

Choosing a CREST-accredited penetration testing firm brings a multitude of advantages, key among which are the assured quality of service, world-class technical expertise, and enhanced compliance and trust.

Assured quality of penetration testing services

By choosing an accredited company for CREST penetration testing, businesses guarantee themselves a superior quality penetration test.

The rigorous accreditation process that CREST imposes on firms and penetration testers ensures that they uphold the highest standards in their methodologies and service delivery. CREST’s strict criteria entail meticulous security testing processes that delve into the very core of a system’s vulnerabilities, leaving no stone unturned. The result is a comprehensive and effective approach to penetration testing, which allows for in-depth analysis and targeted fortification of weak points.

This assured quality extends to all areas of a CREST firm’s operations, providing not just technical excellence but also superior customer service, professional communication, and well-documented reporting.

REQUEST A PENTEST

World-class technical expertise

One of the critical components that differentiate a CREST-accredited firm is the high level of technical expertise they possess. CREST member companies must demonstrate that their security experts are not just knowledgeable but are at the top of the game in terms of technical skills and industry acumen.

According to CREST’s examination page, the body offers professional exams at three different levels:

  • CREST Practitioner level exams. These are the basic exams for professionals, and they’re meant for individuals who have been working in the field regularly for about 2,500 hours, or roughly two years.
  • CREST Registered exams. Passing this level shows that you’re dedicated to your work in information security testing. As a guideline, professionals taking this exam should have at least 6,000 hours of regular experience, which is around three years or more.
  • CREST Certified level exams. These exams are the ultimate goal for many professionals in the industry, and they’re intended for individuals with about 10,000 hours, or five to six years, of regular work experience in cybersecurity.

This means that when you hire a CREST penetration testing firm, you’re gaining access to a team of experts with a deep understanding of the cybersecurity landscape. These professionals use their expertise to conduct rigorous penetration tests, identify potential vulnerabilities, discover IT risks in your organization and recommend effective, tailored solutions to bolster the security of your systems.

Increased trust and confidence

Working with a CREST provider for your cybersecurity needs brings an inherent level of trust and confidence. Their accredited status signifies a commitment to ethical practices and high standards of service delivery, which can provide peace of mind as you navigate the complex landscape of cybersecurity.

Compliance assistance

Many industries have strict cybersecurity regulations that companies must comply with. A CREST member company will not only be aware of these requirements but also be able to help your company meet them, thanks to their extensive knowledge and experience.

 

Conclusion

As the threat landscape continues to evolve, businesses must be proactive in strengthening their defenses. Engaging in penetration testing is a crucial aspect of any comprehensive cybersecurity strategy, and choosing a CREST-accredited provider for this task ensures a superior level of service delivered by highly skilled professionals.

CREST accreditation represents a commitment to excellence in cybersecurity. By choosing a CREST member company for cybersecurity services, businesses are assured of rigorous, comprehensive testing that leaves no stone unturned. Furthermore, the credibility and trust associated with CREST certification enhance the business’s reputation and help foster confidence among its stakeholders.

If your organization is considering the advantages of a CREST penetration testing provider, don’t hesitate to reach out to our team of experts. We’re here to provide guidance and answer any questions you might have. Let’s work together to ensure your cybersecurity measures are robust and effective.

Teamlead of Solution – (HN)

Tech Job EN
  1. Job description:
  • As the head of VSEC’s solution team, you shall be responsible for the work and management of team members.
  • Collaborate with business professionals to communicate and work regularly with customers from C-level to security specialists to identify problems and needs of customers.
  • Consulting, building technical and commercial proposals in accordance with the needs of customers.
  • Finalize technical documents for bid requests or bidding documents.
  • Work closely with service deployment teams, act as a bridge to convey customer requirements and technical proposals to the service deployment team.
  • Non-stop research & update the latest global security knowledge, standards, systems, tools and technologies.
  • Recruit, manage, guide and train Solution team members.
  • Perform other tasks as assigned by the Sales Manager

 

  1. Job requirements:
  • Graduated from University with major in IT, Electronics and Telecommunications, etc.; Preference will be given to candidates with knowledge of Information Security.
  • Over 3 years of experience in consulting/selling computer and information security solutions, including experience with Internet technology and Information Security issues.
  • Extensive knowledge of engineering and technology
  • Ability to listen to customers.
  • Ability to write technical proposals and come up with suitable solutions.
  • Able to listen, speak, write and read English documents well
  • Strong communication and negotiation skills
  • Ability to write and present technical documents clearly and coherently
  • Good planning and teamwork skills.
  • Good health, available for business trip at any time.

 

  1. Benefits:
  • Probationary with 100% salary. Attractive negotiable income according to capacity.
  • Salary review: twice per year. Flexible working hours
  • Received training to improve professional skills required to be fulfilled. To be entitled to financial support to participate in training courses on professional skills and soft skills necessary for the job.
  • Quarterly bonus, year-end bonus according to the Company’s business results. Other special bonuses according to the nature of work. Bonus on all holidays and New Year; bonus for introducing internal candidates, seniority bonus; etc.
  • ESOP bonus for excellent employees and managers of the year.
  • 12 days annual leave + 1 day off on birthday. For each year of seniority. the annual leave shall be increased by 1.
  • Fully enjoy insurance policy and holidays in accordance with the company’s regulations and current laws.
  • Enjoy welfare policy and collective cultural activities: Team Building, Year-end Gala, birthdays, holidays, etc.;
  • Working in a friendly, dynamic and professional environment

 

  1. Contact:
  • Human Resources Department – hr@vsec.com.vn
  • Address: M Floor, N01A Golden Land Building, 275 Nguyen Trai, Thanh Xuan Trung Ward, Thanh Xuan District, Hanoi City.