Q&A with founder of digital security firm Lockself

The article is an interview with a cyber security firm LockSelf's founder about the state of internet security and breach of privacy. Read the Q&A to learn more.

Nayana, a South-Korean web hosting company paid $1.01 million in ransom after it was attacked by hackers using Erebus Ransomware.  This is not an isolated incident of hackers using ransomware to infiltrate a network and demanding money. The incidents have increased in number and intensity over the past few months. According to a recent report by IC3, “cybercrime losses in the US went up to $4.63 billion during the past four years (2012-2016)“. We reached out to the founder of Lockself, a French company focused on securing the online presence of its clients by providing security solution.  founder

What’s the inspiration behind Lockself?

The inspiration came from observing the evolution of hacker attack techniques. The first aim is to secure employees of the company. They retain both a pool of information but also gives access to the rest of the company’s information.

How did you get started with founding the company and what were you engaged in before Lockself?

In the beginning, the Lockself tools were meant for personal use between me and my colleagues. Due to the news and the many cyber attacks targeting companies we decided to upgrade the tools for a business use. Before LockSelf, I worked as a system and network administrator.

What are some of the major challenges you solve for the customers?

The main challenge was to provide non-technical users with very powerful security tools without losing security.

What’s more, we are constantly challenged to propose tools that can be fully integrated into user’s environment and easy to use for their daily tasks. Of course, the intuitive interface of our products is a priority in which we must pay special attention in order to address this challenge.

How do you see businesses responding to an increased threat of cyber-attacks?

We notice that hackers attacks techniques and tools are constantly improving when companies have difficulty securing themselves, mainly because of the lack of tools that actually secure their data.

Anti-viruses are outdated to face new threats and most companies are reluctant to choose their software and often turn to the most expensive to reassure their managers, without the chosen solution being really effective.

How do you help your customers in security strategy, data privacy, and protecting their digital assets?

When a company wants to secure its data with LockSelf, we support the company in applying good security practices in parallel with the use of LockSelf tools.
Employees who are trained in the risks they face and associated with good data management with LockSelf allow the company to control the risk of piracy and minimize it.

What is the single most important step that companies and individuals can take to ensure they’re protected against the ever-increasing web of malware?

The most important thing is to be aware of the risks and threats weighing on everyone. Every user of a company should know the value of the information and access that it holds.
The news has shown us that the major risk lies in the infected attachments, which is why LockSelf proposes LockSandbox in order to be able to open its attachments in a secure environment.

Tell us something about The BugBounty program?

The bug bounty program allows us to validate that we stay ahead of the curve. We need to be aware of the latest attack vectors and we incentivize crowd to identify potential vulnerabilities in our systems. This program assures LockSelf users that the best hackers have tried to hack LockSelf without success.

Does the use of antivirus and VPN software help ensure the digital privacy of end-users?

I can only recommend the use of anti-virus, anti-malware, and a VPN. Unfortunately these tools are not the ultimate solution and do not close all doors used by hackers to steal your access and data. Again, vigilance, risk awareness and the use of specialized data protection tools are recommended.


Please enter your comment!
Please enter your name here