Video | Agriculture | Confidence | Economy | Energy | Employment | Finance | Media | Property | RBNZ | Science | SOEs | Tax | Technology | Telecoms | Tourism | Transport | Search


Centrify suggests seven steps to slash cybercrime

News release: October 19, 2016
Centrify suggests seven steps to slash cybercrime

Centrify, the leader in securing enterprise identities against cyberthreats, warns that organisations need more than just user awareness programs to cut the risk of social engineering and cyber fraud.

The Santa Clara-based cybersecurity company, which has a strong presence in Australia and New Zealand, said cyber theft was hitting both mid-size companies and enterprises hard.

One US tech company, Ubiquiti Networks, was recently swindled out of US$47 million while another Atlanta-based company was scammed out of US$1.8 million. The FBI has reported more than 12,000 victims of executive-level fraud globally with a loss of more than $2 billion during the past two years.

Intellectual property theft is another form of cybercrime, with a 2015 Reuters report stating that hackers steal US$160 billion worth of intellectual property each year. For example, Australian metal detector manufacturer Codan had its metal detector designs stolen in 2011 after an employee laptop was hacked through a vulnerable hotel Wi-Fi connection in China.

The company discovered the problem when faulty metal detectors bearing its brand began showing up for repairs with completely different internals. The counterfeiters of the metal detectors were eventually brought to justice, but the financial impact on Codan was a fall in net profit from $45 million in 2013 to $9.2 million a year later due to heavy discounting to compete with the fake machines.

Centrify Country Manager ANZ Lachlan McKenzie said executives could combat cybercrime in an organisation and reduce IT security budgets by following seven straightforward steps. “Cyber risk is present at every level in every company from the break room to the boardroom,” he said.

“In retail, data breaches occur in companies of every size; from a one-store grocer to national organisations .Cyber awareness of social engineering attack modes is a management priority, and all employees have responsibility in preventing phishing and spear-phishing attacks from launching malware. Employee training and cyber awareness are essential in reducing risk and the cost of data breaches, in addition to a defence approach with appropriate cybersecurity tools and software.

“Yet, awareness training is only part of the answer. A company-wide security policy as well as good internal controls, including the division of duties, are required. The policy and internal controls address access controls and payments processes, restrict access to accounts by individual role, work in the approvals process and keep password hygiene.”

Mr McKenzie said senior executives could substantially improve their organisation’s security posture by implementing protections based on the following seven steps:
1. Consolidate identities: “With 60 per cent of data breaches caused by weak, stolen or default passwords, it makes sense to consolidate identities, to develop a holistic view of all users and strengthen and enforce password policy or eliminate passwords where possible.
2. Audit third party risk: “Third party IT outsourcing contractors, business partners and associates are a preferred route for hackers to access the corporate network. However, only recently has third-party risk been assessed, managed and monitored. Audits to evaluate the security and privacy practices of third parties are essential to improve security posture.
3. MFA Everywhere: “Multi-factor authentication everywhere, including third parties and the VPN that adapts to user behaviour, is widely acknowledged as one of the most effective measures in preventing threat actors from gaining access to the network and target systems.
4. Single Sign-On: “Single sign-on to enterprise and cloud apps, combined with automated cloud application provisioning and self-service password resets, cuts helpdesk time and cost and improves user efficiency.
5. Least Privilege Access: “Role-based access, least-privilege and just-in-time privilege approval approaches protect high value accounts, while reducing the likelihood of data loss from malicious insiders.
6. Log privileged user access: “Logging and monitoring of all privileged user commands makes compliance reporting a trivial matter and enables forensic investigation to conduct root cause analysis. Compliance audit reports should only take minutes to prepare, not weeks.
7. Protect inside the network: “Network segmentation, isolation of highly sensitive data and encryption of data at rest and in motion provide the best protection from malicious insiders and persistent hackers who get inside the firewall.”
Mr McKenzie said while there were no magic bullets for defeating cyberthreats, the right strategy, strong security policy and active engagement of all employees could drastically reduce the risk of cyberattack. “By following these steps, organisations can reduce cyber risk, improve corporate compliance and gain cost efficiencies,” he said.

Learn more with the latest Centrify whitepaper: A Platform Approach to Securing Enterprise Identities.

For media assistance, call John Harris on +61 8 8431 4000 or email

About Centrify
Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50 in the US.
Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries.  All other trademarks are the property of their respective owners.

© Scoop Media

Business Headlines | Sci-Tech Headlines


Auckland Transport: Successful Bridge Repair Opens Two Additional Lanes To Traffic

The opening of two additional lanes on the Auckland Harbour Bridge this morning will help relieve some motorway congestion for motorists heading home to the North Shore tonight. More>>


Statistics New Zealand: COVID-19 Sees Record 12.2 Percent Fall In New Zealand’s Economy

Gross domestic product (GDP) fell by 12.2 percent in the June 2020 quarter, the largest quarterly fall recorded since the current series began in 1987, as the COVID-19 restrictions in place through the quarter impacted economic activity, Stats NZ said ... More>>


Climate: Scientists Release ‘Blueprint’ To Save Critical Ecosystems And Stabilize The Earth’s Climate

A group of scientists and experts produced the first comprehensive global-scale analysis of terrestrial areas essential for biodiversity and climate resilience, totaling 50.4% of the Earth's land. The report was published in Science Advances ... More>>


MPI: Independent Review Launched Into Assurances For Safe Transport Of Livestock By Sea

The Ministry for Primary Industries (MPI) has launched an independent review of the assurances it receives for the safe transport of livestock by sea. MPI Director-General Ray Smith says Mike Heron QC has been appointed to lead the review, which is expected ... More>>


Computers: New Zealand PC Market Grows Nearly 40% Due To Work From Home Demand

COVID-19 had large impacts on demand for PCs as businesses prepared for lockdowns by purchasing notebooks to mobilise their workforce. In the second quarter of 2020, New Zealand's Traditional PC market experienced a 39.7% year-on-year (YoY) growth ... More>>


University Of Auckland: Whale-Watching By Satellite – Follow Their Travels Online

Scientists have successfully attached satellite tracking tags to six New Zealand southern right whales, or tohorā, and are inviting the public to follow the whales’ travels online. Part of a major research project involving the University of Auckland ... More>>

Commerce Commission: Kiwibank Admits System Failures And Agrees To Pay Customers $5.2 Million

Kiwibank has entered into a settlement agreement with the Commerce Commission after reporting that it failed to have in place robust home loan variation disclosure policies, procedures and systems. In a settlement dated 27 August 2020, Kiwibank admitted that ... More>>

Ministry of Health: Public Transport Distancing Requirements Relaxed

Physical distancing requirements on public transport have been reviewed by the Ministry of Health to determine whether they are still required at Alert Level 2 (or below). The Ministry’s assessment is that mandatory face covering and individuals tracking ... More>>


NZHIA: New Zealand Hemp Industry Set To Generate $2 Billion Per Annum And Create 20,000 Jobs

A new report says a fully enabled hemp industry could generate $2 billion in income for New Zealand by 2030, while also creating thousands of new jobs. Written by industry strategist Dr Nick Marsh, the report has prompted calls from the New Zealand Hemp ... More>>


Stats NZ: One In 14 Employed People Report High Risk Of Losing Jobs

About one in 14 workers say they expect to lose their job or business by mid-2021, Stats NZ said today. A survey of employed people in the June 2020 quarter showed 7 percent felt there was a high or almost certain chance of losing their job or business ... More>>

ASB Quarterly Economic Forecast: NZ Economy Doing Better Than Expected, But Challenges Remain

August lockdown estimated to have shaved 8% off NZ’s weekly GDP, and 0.5% off annual GDP Economy now expected to shrink 5% (year-on-year) by end of 2020 Unemployment rate now expected to peak at 7.2% The latest ASB Quarterly Economic Forecast is less ... More>>