Our business solutions are carefully designed to deliver high levels of assurance of data security and provenance, in a manner that is acceptable to the users and affordable for the business.
In order to create acceptable solutions at an affordable price, we adopt a very specific approach to the solutions design and implementation process, which acknowledges the potential for sophisticated attacks by adversaries with substantial resources and advanced capabilities, and implements a range of cost-effective security mitigations that provide the holistic solution.
Many of the security mitigations are entirely transparent to the users, and are selected based on their effectiveness and cost, whereas other security mitigations affect the user experience to a greater or lesser extent, so require a more holistic review of the costs & benefits, which may ultimately involve compromises that prioritise user experience over both cost and security.
Our secure business solutions use Encrypted Blockchains, which are distributed across multiple cloud service providers, and supported with End-to-End Encryption, Threshold Encryption, Security Hardened Devices, Data Provenance Assurance, and Data Leak Prevention to deliver the holistic security objectives.
The use of our Encrypted Blockchain Technology to distribute data across multiple cloud service providers offers substantial security benefits without any adverse impact on the user experience and minimal impact on operational costs. The result is that all business data is captured at source and stored across multiple clouds in a manner that precludes subsequent modification or deletion, except in accordance with documented security policy and management instructions.
This mitigation specifically addresses the risk that Ransomware attacks may encrypt business data so that it becomes unavailable to the business, and also addresses the risk that Ransomware may attempt to locate and destroy backup copies of the data, and the risk that Ransomware may target data within cloud services in order to steal copies of the data.
The use of our End-to-End Encryption & Threshold Encryption Technologies is largely transparent to the users, and eliminates the possibility that cloud service providers or internet service providers could be exploited to provide unauthorised access to business data, and also allows users and managers to specify sophisticated granular access controls, which may include requirements for escalated authorisation or multiple authorisations under specified circumstances.
This mitigation specifically addresses the risk that Ransomware attacks might potentially gain access to large volumes of business data through the exploitation of compromised user credentials or devices or cloud services infrastructure, but requires engagement by users and management in order to minimise the damage caused by successful cyber attacks.
The use of our Security Hardened Device Technology has greater impact on the user experience, but this can be minimised by careful design of the Business Applications and Processes, without any security or cost implications. This is achieved by isolating business applications from each other, so users can validate data through alternative applications, and operating systems and application software is regularly re-installed from “golden images”, so any compromise of individual systems is automatically repaired before attackers can extend the compromise.
This mitigation specifically addresses the risk that Ransomware attacks may target the end-user and their devices, which would allow attackers to copy all business data that was accessed by the legitimate user, and could potentially allow them to copy all business data that can be accessed by the user, or issue fake documents and instructions on behalf of the user.
The use of our Data Provenance Assurance Technology is central to our holistic security approach, and aims to ensure that users can always trust the data that they are required to use within the business, and can review the evidence that supports its provenance at any time.
This mitigation specifically addresses the risk that Ransomware attacks may attempt to introduce fake data into the secure business solution, which causes legitimate users to take actions that are not in the best interest of the business.
The use of our Data Leak Prevention Technology is also central to our holistic security approach, and aims to ensure that users can be confident that business data will remain confidential, subject to the controls specified by users and managers, who are encouraged to specify additional controls that aim to minimise the damage caused by successful cyber attacks or insider threats to the business.
This mitigation specifically addresses the risk that Ransomware attacks may attempt to steal data from the secure business solution, which could potentially be used for blackmail and extortion of the business, users and customers.