Issue - September/October 2021
Cybersecurity: Bliss' Shield Against Web Crime
The digitalization of society has inevitably touched the world of moving, as the pandemic has definitively channeled daily life into Cyberspace. Cyberspace is defined as “the complex ecosystem resulting from the interaction of people, software and services on the Internet by means of related technologies, devices and networks.” Simply put, every time you make a video call, a virtual inspection, or an action on the website—even for a basic quote request—a multitude of connections are triggered on the various accounts that, if not managed properly, can pose serious risks to the security of personal and computer data.
In this virtual space, web criminals find fertile ground to carry out their evil plans and steal documents, information, sensitive data and much more. In order to prevent these risks for an organization, it is important to invest in Cybersecurity, which includes allocating part of your budget to defending computers, servers, mobile devices, electronic systems, networks and data from malicious and dangerous external attacks.
To fight this invisible war, Bliss has carefully studied its own cyberspace and, thanks to the expertise of specialized technicians, produced a detailed analysis. We then elaborated an analysis on the risks to which we were exposed and established what actions to put in place in order to improve security.
All these aspects have been elaborated and processed within the Business Continuity Plan and referred to in a procedure of the Quality Management System called “Privacy and Data Security Management.” This procedure is constantly monitored (and implemented) by Giulio Argirò, directing the Legal, Privacy and ICT Offices.
Regarding new, potential digital threats that his area will have to face, Argirò explains: "Defending the online path of our workers, customers and all professionals involved with Bliss is very important to us. Every day, we monitor and enhance all of our security systems. Thanks to the creation of a dedicated Information Communication Technology (ICT) office closely linked to the Privacy Office and the Bliss Legal Department, and thanks to the use of external professionals, Bliss carries out periodic tests to verify the validity of the system and the structure installed at headquarters, assessing its vulnerability and reaction to possible cyber attacks. In addition, Bliss can boast a remarkable Endpoint Security system.”
Endpoints are nothing more than devices that share the ability to connect to the network. They can be laptops, smartphones, devices such as security cameras, and other digital sensors. These endpoints are the most vulnerable because they have become the permanent center of gravity of communications, sensitive data and money transfer. The endpoints are gateways to the heart of the endless remote connections activated with great speed to give continuity to relationships, business, and enterprises. Cybercrime moves into the endpoints because here the user's attention threshold often becomes “light” and hackers can easily steal data and information (such as, for example, passwords) to use or resell them.
"In Bliss,” continues Argirò, “our Endpoint Security system has become a priority and consists of several steps. First of all, the device must itself be protected by antivirus, dedicated software and firewalls. For this reason, it is essential to keep the operating system constantly updated, in order to limit possible vulnerabilities. At the same time, endpoints must be protected from the installation and use of applications not previously tested and authorized by the ICT department, which often hide real intrusion attempts.
“In order to effectively defend the endpoints, we control the network at a central level with a domain controller that manages the authentication requests for security (login, control of the permissions for access to the clients' files, etc.) and organizes the structure of the domain in terms of users, groups and network resources, thus providing a directory service. In addition to the controller, applications within the endpoints must also be covered through a two-factor authentication system. We mainly manage everything through the cloud, which enables the continuous monitoring and collection of data from any part of the world, as well as the performance of remote maintenance actions, both for the endpoints physically present inside the company network and for those outside the office, especially in this historical moment where the staff often works in Smart Working mode from home."
Our cybersecurity strategy, in addition to being central to the security and continuity of Bliss’ business, offers a guarantee of reliability to all our customers and international agents, and is essential to the operation and security of our exclusive Bliss World Gateway—our dedicated portal made available to customers that permits them the possibility to monitor every step of their move, download documents with instructions for their compilation, access exclusive multimedia content, make payments online, open a constant dialogue with the dedicated International Moving Consultant, and control all phases of the move in real time.