X-PHY® AI Cybersecurity Laptops: Use Case Scenarios
Combining the X-PHY® AI Embedded Cyber Secure SSD into world-class laptop solutions for a stand-alone, holistic, real-time defense against evolving cyber-attacks.
Using X-PHY® Laptop
Sam has been issued a new X-PHY Laptop by his company and he has enabled all X-PHY protection features through the X-PHY tools.Scenario 1:
Public WiFi Vulnerability Attack
Due to the pandemic, Sam has switched to Working From Home (WFH). He went to a nearby Cafe to work. For connectivity, he unknowingly connected to an unsecured WiFi that was set up by a threat actor which he presumed to be the cafe’s public WiFi.
As soon as he is connected, the device control was jolted to the threat actor immediately as he attempts a cloning attack to steal all of his data within the X-PHY® laptop.
Fortunately, X-PHY is empowered with Clone Protector which can provide up to 100% protection against cloning attack regardless partition or entire disk cloning. It proceeds to shutdown the laptop to lockdown the drive and notified Sam via email of this attempt of “Cloning Attack”.
Scenario 2:
Insider Threat (Drive Theft)
A colleague of Sam, Jeremy, who is working in the same finance department knows of Sam’s habit to store a copy of the financial data of the company within his laptop.
Grudging that he will be part of the retrenchment cycle that was announced last month, he decided to attempt to steal the financial data stored within Sam’s laptop to expose to the public.
As soon as Sam had left his laptop unattended, Jeremy immediately conducted a few unsuccessful attempts to crack his laptop’s password to gain access. Realizing that this was futile, Jeremy then proceeded to physically remove the SSD from Sam’s laptop and connect it externally to his laptop but realized that it was inaccessible as it was an X-PHY SSD.
With the self-encryption feature of X-PHY and its integrated hardware sensors to detect changes in environment and detachment of drive. The X-PHY AI was able to lockdown the drive and protect Sam’s data.
Scenario 3:
Zero-Day Exploit (Data Breach)
Suspected to be hired by a business competitor of Sam’s company, a ransomware gang started to target the company’s data. They attempt to breach all of Sam’s company’s endpoint devices via a zero-day exploit based ransomware attack that could bypass all existing software defenses in place such as firewall and antiviruses.
However, Sam’s laptop remains unaffected, as his laptop has the X-PHY installed that is based on the zero trust framework which trusts no one and detects threats only by analyzing read and write access patterns instead of relying on signatory or behavioral databases and thus, the ability to detect known and unknown threats.
With this, Sam’s data remains safe from falling into the wrong hands, as it was able to lock down the drive itself to prevent the ransomware from encrypting the data stored within.
At the same time, Sam received a notification of the attack via email and highlighted this immediately to his IT admin which quickly was able to respond to this attack to prevent it from spreading further. Thus, greatly reducing the response time and cost of the attack.
Scenario 4:
Clicking on a Phishing Link
A recent email posing as the company’s admin has been circulating around the company’s employees inbox. The email is not genuine and utilized a combination of spear and clone phishing techniques to make it look as genuine as possible.
Given the nature of Sam’s company business, it is only natural for them to be a target of such attacks. As they hold crucial data of clients and partners. This is especially so for Sam, who is working in the financial department of the company. Unknowingly, Sam received an incoming email with attachments from his “IT Admin” prompting him to download the attachments to “update” his company’s device softwares. Believing it to be crucial, as it will affect his work, Sam downloaded the malicious attachment which as a result installed a malware that aims to clone the data of Sam’s laptop back to the attacker.
Fortunately, X-PHY® that is installed in Sam’s laptop was able to detect the abnormal data read/write patterns and immediately stopped it and notified Sam via email. Which he promptly shared with his real IT admin to quickly respond and announce to the rest of the company to be aware of this impending phishing attack and thus, prevented a potential data breach.
Scenario 5:
Tech Refresh Cycle (Rapid Purge)
Sam’s company practices a technology refresh cycle in every 3 years to keep their employee’s devices up to date.
Understanding that he has the company’s confidential data and a responsibility to uphold and that a general reformatting of the device won’t suffice. Sam, utilized the Rapid Purge feature of X-PHY® to securely erase his data effectively from the physical block level of the drive, leaving no traces of data left within a matter of a few seconds.