Skip to main content
Tag

cyber security

RedOrange AI Makes It Easier To Manage Data Protection And Compliance

RedOrange AI Makes It Easier To Manage Data Protection And Compliance

By New Frontiers blog

RedOrange AI Makes It Easier To Manage Data Protection And Compliance

Amit Dash, the founder of RedOrange AI, has been taking part in the 2024 New Frontiers Accelerate programme. This is a brand new residential programme offering support to founders that are unable to take part in our full-time six-month Phase 2. We spoke to Amit about his journey so far growing a new startup.

Amit is a seasoned leader in the tech and cloud security landscape, bringing over 14 years of expertise to his latest venture. Known for his work in DevOps, DevSecOps, and cloud security and engineering, Amit has built a career solving security challenges for some of the most sensitive sectors, including finance, shipping, and SaaS.

Amit has been taking part in the 2024 New Frontiers Accelerate programme. Before RedOrange AI, he founded CaretCloud, a consulting firm dedicated to cloud security, where he helped clients navigate complex cybersecurity landscapes, creating solutions that kept sensitive data safe in an increasingly digital world.

Amit Dash founder of RedOrange AIWith RedOrange AI, Amit applies his philosophy of intelligent automation to compliance management. He believes compliance should be a streamlined, proactive process that leverages technology to reduce human error and help businesses navigate regulation without disruption. So, how will RedOrange AI help businesses keep up with the pace and complexity of today’s regulatory environment?

Protecting sensitive data across business types

Data protection and compliance have gone from back-office details to mission-critical operations for businesses of every size. For SMEs, protecting data could involve securing employee tax IDs, bank details, client contracts, and other essential records. These aren’t just numbers on a spreadsheet – they represent livelihoods, reputations, and customer trust. For larger corporations, the complexity increases. Massive databases filled with employee records, client account details, and sensitive consumer information such as health records or addresses are subject to stringent regulations.

Without a robust system, handling these types of sensitive information can be an operational nightmare, especially as businesses scale. RedOrange AI automates the gathering and securing of this data so that companies, regardless of size, can ensure it is protected and meets all compliance requirements. This isn’t just about data management; it’s about giving businesses the confidence that their operations and relationships are secure.

The complex world of compliance made manageable

When people hear the word “compliance,” they might be unclear what this entails beyond a general notion of rules and regulations. The business reality of compliance involves strict adherence to laws that govern data capture, use, handling, and storage. This is especially true in Europe, where General Data Protection Regulation (GDPR) sets some high standards in how companies collect and protect people’s personal data, requiring businesses to keep meticulous records and secure customer consent for data use.

Failing to comply isn’t just a legal risk but a financial one, with heavy penalties, potential shutdowns, and reputational damage at stake. RedOrange AI takes the guesswork out of this process by creating tools like its AI-Powered Compliance Wizard, which guides businesses in meeting requirements like GDPR as well as frameworks such as NIS 2, DORA, and SOC2. For the companies subject to such regulations, this means peace of mind and a much simpler, automated path to compliance.

Moving away from labour-intensive compliance processes

For too many organisations, compliance is a hands-on, resource-draining task. Teams often rely on spreadsheets, pieced-together records, and siloed systems to keep up with audits. With information spread across departments, tracking down evidence of compliance can take days, even weeks, of sifting through paper trails, emails, and isolated data.

In a healthcare setting, for example, staff might manually track each patient record’s compliance to ensure it meets HIPAA requirements – a time-consuming process prone to error. Finance departments face similar challenges, spending hours matching transactions to complex audit standards. A platform that centralises these tasks, automating evidence collection and compliance checks, will help businesses to prepare for audits in a fraction of the time, free from the manual errors that spreadsheets are known for and avoiding endless documentation hunting.

A solution based on real-world experience

The idea for RedOrange AI emerged from a data breach that Amit witnessed at the accounting firm that supported his company. The incident exposed major vulnerabilities, leading to fines, reputational damage, and months spent regaining client trust. As Amit and his team researched the root cause of the breach, evidencenced through scattered records, it became clear that traditional, manual compliance methods couldn’t keep up with growing regulatory demands.

This experience became the foundation for RedOrange AI. Amit saw an opportunity to develop a smarter, automated solution to simplify and strengthen compliance across different industries. The cloud-native tool will keep businesses secure, compliant, and prepared for any regulatory challenge without the headaches that come with manual compliance management.

Support from the Irish startup ecosystem

Amit’s startup journey has included support from the country’s vibrant startup ecosystem. As a highly technical founder with limited experience in scaling a startup, the tools and supports available to him have been more than welcome. In addition, the local tech community in Dublin has proved an invaluable resource for collaboration and networking opportunities.

Amit feels that Ireland is an ideal location for starting a business. Having previously worked with startups in the Bay Area, he finds that Ireland offers a similar environment for founders, making it an attractive place for innovation and growth. This supportive landscape has been instrumental for Amit. As he builds his team in Dublin, he remains committed to leveraging this supportive landscape to drive RedOrange AI’s growth and innovation.

What’s next for Amit and his startup?

The startup is currently looking for €600,000 in investment from angels or pre-seed venture capital firms. RedOrange AI will be partnering with Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs), as they specialise in understanding the compliance and security needs of their clients. By integrating a compliance platform into their offerings, these providers can enhance their service value, making compliance management more accessible to their clients. With the MVP live, Amit is currently onboarding the first clients. He will be actively growing the Dublin team, supporting and scaling the platform with sales and marketing professionals as well as adding to the engineering team.

On the product side, the team is enhancing the platform’s AI capabilities and developing powerful integrations to make compliance even more seamless. The ultimate goal is to create a self-learning compliance engine that adapts to evolving regulations, keeping clients ahead of the curve. By continuously refining the product, RedOrange AI is setting itself up to be a long-term partner for businesses, enabling them to confidently navigate an increasingly complex regulatory landscape.

To learn more about the company, visit redorange.ai.

About the author

scarlet-merrillScarlet Bierman

Scarlet Bierman is a content consultant, commissioned by Enterprise Ireland to fulfil the role of Editor of the New Frontiers website. She is an expert in designing and executing ethical marketing strategies and passionate about helping businesses to develop a quality online presence.

Cyber Security for mid-large size business and organizations New Frontiers

Cyber security for medium/large businesses and organisations

By New Frontiers blog

Cyber Security for mid-large size business and organizations New Frontiers

Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months. Firms holding personal data and processing money are top targets. With an average cost to the business of £3,000 for medium business and £19,000 for larger ones, the most common attacks were fraudulent emails, followed by viruses and malware.

Cybersecurity: challenge your assumptions

The survey also revealed that nearly seven in ten large businesses identified a breach or attack, with the average cost to large businesses of all breaches over the period being £20,000 and in some cases reaching millions.

Medium and large companies tend to be better prepared to deal with cyber security (although is not always the case) than smaller enterprises, however there are still areas of confusion and complacency.

The area I want to focus on in this post is cloud security, as many modern businesses no longer manage their own physical server infrastructure, instead opting for cloud services.

Who is responsible for security?

Many assume that their cloud provider – such as Amazon Web Services (AWS), Microsoft Azure or Google Cloud – are responsible for their security. This assumption is wrong. They are simply facilitators in terms of IT infrastructure. One has to distinguish between managed and unmanaged services.

Yes, AWS are responsible for the global security of the entire cloud infrastructure, but they make it very clear that their clients are still individually responsible for securing their own data. So what does this mean?

Often, IT teams incorrectly assume that because they have a trusted third party in charge of their infrastructure, that vendor will also manage security. Like the small businesses who assume that their web developer is on top of security, large business often assume that the public cloud is secure and that this is managed by their vendor.

Of the cloud and in the cloud

In general, the cloud as an overarching entity is very secure. However – AWS clearly states that it will address “security OF the cloud” – compute, storage, database, networking, and global infrastructure. Amazon is responsible for the physical security and the hosts servers, so called hypervisors, but they are not responsible for your network or your own server instance.

However it is the customer who is 100% responsible for “security IN the cloud” instance – data, apps, identity management, OS, network and firewall configuration, network traffic, server-side encryption, and client-side data.

This is an important distinction – think of it as a property management company being responsible for the common areas of an apartment development, but the individual owners being responsible for locking their own doors and windows and to whom they give keys or access to their houses.

Spotting vulnerabilities

We recently did an assessment of the digital assets of an international law firm. At first pass the firm appeared to have a clean bill of health – they used AWS, their servers were in the US, and the website was secure.

On further analysis, we discovered a major vulnerability. Their site was hosted on a shared server operated by their their web designer and the hosted server could have been compromised even though the hosted site was fairly safe. This could have led to the website being maliciously hacked by attacking the host’s server rather than the site itself, and thereby taken down. The situation arose because of some incorrect assumptions about whose responsibility it was to secure the site.

Some concrete suggestions on cyber security for larger organisations

  1. Make you know who is responsible for your security, in the cloud. 
    Challenge your assumptions and don’t be hesitant to ask seemingly stupid questions!
  2. During system/server provisioning and setup, apply at least the basics of hardening in your environment.
    Keep your system patched and up to date.
  3. As Bruce Schneier, security expert, notesthe security mindset involves thinking about how things can be made to fail. It involves thinking like an attacker, an adversary or a criminal. You don’t have to exploit the vulnerabilities you find, but if you don’t see the world that way, you’ll never notice most security problems.”
  4. Remove unused services from your server and restrict access to those services where there is no need for a public interface (anything outside of http(s) basically)
  5. Always grant the minimum required privileges for your users/employees.
    Know what your ‘Data Crown Jewels’ are – any access to sensitive data should be tightly controlled.
    This sensitive data should only be accessible to employees that absolutely need it as a part of their job, in the moment they need it.
  6. Install, maintain and update antivirus, anti-malware and firewall software for desktop and mobile

This may be too much for your own IT team to handle, so consider booking a security health check with a reputable provider. There are great resources put together by the UK National Cyber Security Centre and the Cyber Essentials Programme.

About the author

Donal Kerr New FrontiersDonal Kerr

New Frontiers participant, Donal Kerr, is the co-founder and COO of 4Securitas – an automated cybersecurity intelligent defence system. The startup will will enable organisations to protect themselves against hacking, malware, fraud and cybercrime. It will enable staff without an IT or security background to handle some of most critical and sophisticated security tasks, manage risk and reduce costs.

Cyber security an important issue for small businesses

Cyber security: an important issue for small businesses

By New Frontiers blog

Cyber security an important issue for small businesses

New Frontiers participant, Donal Kerr, examines why companies are continuing to fall victim to cyber attacks despite increased awareness of such threats, and gives us some proactive steps companies can take to avoid such security breaches.

Why informed companies continue to get hacked

Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months. Firms holding personal data and processing money are top targets. With an average cost to a business being £1,380, the most common attacks were fraudulent emails, followed by viruses and malware. So, why do companies continue to get hacked, despite massive media coverage and widespread usage of commercial security products?

Some reasons would be:

  • Small businesses are less likely to have sought any expert guidance on the topic compared to medium/large firms, and they cannot afford qualified/skilled security experts
  • Poor advice received from non-technical advisors or software salespeople
  • Poorly configured software and systems
  • Inadequate staff training and qualified staff
  • Lack of scenario planning around incident management

On the other hand, it has never been easier to engage in malicious hacking for profit or simply for malevolence. A plethora of tools are available freely and as digital life becomes more complex, with more and more devices connected to the internet without a thought for security, systems become more vulnerable. You might have heard of affiliate marketing – in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate’s own marketing efforts. But have you heard of Malware Affiliate marketing? Malware authors, having seen what works elsewhere, have developed their own affiliate program.

In the security assessments that we have performed for small businesses in Ireland, we regularly encounter the following:

  • Weak cipher/encryption (whereby committed hackers could easily break into password controlled logins and take control of a site/server)
  • All service ports are open to public interfaces i.e. database, ssh, rdp. In these instances, there was absolutely no need to leave these open to the world.
  • Lack of redundancy or backup: one e-commerce retailer (just to pick one) has its entire site (IT asset, front-end, backend, etc.) on just one server with single storage, not to mention the configuration/setup. Despite the security risks, this is just bad practice as servers are known to fail for purely technical reasons.
  • Nicely designed sites delivered by competent front end developers, which have security flaws due to poor configuration. By this we mean the web server on which the website lives could easily be compromised. Developers often do not change standard admin configurations, leading to easily exploitable vulnerabilities. They often just are not aware of the security implications of what they are doing.

What companies can do for themselves

Imagine going to a car garage for a service. Would you assume that the mechanics would adjust your child’s seat for maximum safety or update your sat nav software? Don’t assume that your otherwise excellent IT people are looking after security. You may be surprised to hear it, but many IT graduates have never studied anything security related. Security is a very specialized discipline, at the pinnacle of IT and requiring a combination of skills in networking, system administration, development engineering, software engineering and infrastructure engineering with a solid background covering all areas. For small businesses, especially those holding data or processing payments, security is not something that should be compromised on.

Take a moment to consider these questions :

  • Do your IT team or 3rd party developers know how to secure your digital assets?
  • Who do you depend on if you suffer a data breach?
  • What would you do if your customer database was hacked, your website defaced or taken down, or you couldn’t access your email or business files?

Ciaran Martin, CEO of the UK’s National Cyber Security Centre advises:

“The majority of successful cyber attacks are not that sophisticated, but can cause serious commercial damage. By getting the basic defences right, businesses of every size can protect their reputation, finances and operating capabilities.”

Steps you can take to significantly improve your cyber security:

  • Install, maintain and update antivirus, anti-malware and firewall software for desktop and mobile.
  • During system/server provisioning and setup, apply at least the basics of hardening in your environment. Remember to keep your system patched and up to date.
  • Consider Open Source products which can be more cost effective than commercial solutions.
  • Remove unused services from your server and restrict access to those services where there is no need for a public interface (anything outside of http(s) basically).
  • Always grant the minimum required privileges for your users/employees.
  • Set up a proper user access policy in your environment and keep it up to date (for new entries and leavers).

It is possible that this may be too much for your own IT team to handle, so consider booking a security health check with a reputable provider. There are great resources put together by the UK National Cyber Security Centre and the Cyber Essentials Programme.

Why this is important

All businesses holding customers’ personal data will need to ensure that they comply with the EU’s General Data Protection Regulation (GDPR) legislation from May 2018. This will strengthen the right to data protection, which is a fundamental right, and allow individuals to have trust when they give their personal data. Security is constantly evolving so make sure to carry out regular health checks. This could mean vulnerability and penetration testing, where security experts (with express permission) put on a ‘white hat’ and attempt to penetrate your system, yielding valuable data that can be used to strengthen your defenses.

Part 2: coming soon!

About the author

Donal Kerr New Frontiers
Donal Kerr

New Frontiers participant, Donal Kerr, is the co-founder and COO of 4Securitas – an automated cybersecurity intelligent defence system. The startup will will enable organisations to protect themselves against hacking, malware, fraud and cybercrime. It will enable staff without an IT or security background to handle some of most critical and sophisticated security tasks, manage risk and reduce costs.