Friday 24 February 2017

Weekly News Roundup



Too busy working all week to keep up with the most interesting stories coming out of the technology and security industries? Below are our recommendations for a roundup of the top stories happening now that you need to know.

1. Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster
Another major data leak – this time hitting some major brands. A Cloudflare bug has led to a lot of data being leaked including passwords, personal information, cookies and more. Read more…

2. Hackers behind bank attack campaign use Russian as decoy
A new twist has come out in the recent hacking attacks on financial institutions around the globe. New analysis on the malware samples show that Russian words and commands were inserted into the malware to throw investigators off. Read more…

3. Google Chrome users targeted with ‘missing font’ malware scam
A security researcher is warning Google Chrome users about a scam to install a fake “missing font” as a way to infect them with malware. Read more…

4. New macOS ransomware spotted in the wild
A new file-encrypting ransomware program for macOS is being distributed through BitTorrent websites, and users who fall victim to it won’t be able to recover their files, even if they pay. Read more…

Thursday 23 February 2017

Cybersecurity Trends to Watch for in 2017






Everyone made their top predictions for what’s to come in 2017 in the security industry, and only a couple of months in, it has already been an eventful year.

With cybersecurity protection becoming a top line item for enterprises, it is critical to stay on top of the biggest trends emerging. Below are several trends that have been hot topics so far in the beginning of 2017 and deserve a close eye of attention as we navigate throughout the rest of the year.
  1. Ransomware: Already early in the year, we have heard numerous stories of companies in all sectors being hit with ransomware attacks. This trend is expected to continue rising. Market estimates that the ransomware protection market is expected to grow from USD 8.16 Billion in 2016 to USD 17.36 Billion by 2021. Ransomware has gained popularity among many cybercriminals since they know most organizations would rather pay the ransom fee to get their data back rather than admit there had been a breach or stop operations while they are being exploited.

  2. Mobile security: Despite the popularity and norm of mobile devices and BYOD strategies accepted as standard in today’s enterprise model, there is still huge concern around security. A Ponemon Institute study found that 84% of respondents are very concerned about malware threats to their mobile applications. In fact, 60%, or six out of 10 of the respondents, say their organization had been breached as the result of an insecure mobile application over the past 12 months. Hackers are taking advantage of the way users rely on 24x7 access to their personal information via their mobile devices, such as accessing their bank accounts and credit cards, and using malware to that steal information and redirect users to malicious sites.
  3. Security of Internet of Things devices: There is constant talk about the impact the Internet of Things and how the connected world can improve both our personal and professional lives, but these devices also bring a host of security issues, as these devices serve as an easy entry point for cybercriminals to enter our networks. Gartner predicts that by 2020, addressing compromises in IoT security will have increased security costs to 20% of annual security budgets, from less than 1% in 2015. We have already seen the major impact attacks can have on IoT devices with the Dyn attack. This trend will continue as the number of connected devices we are using increases.

  4. Challenges in the cybersecurity workforce: Just a few months in to 2017, and there are many conversations swirling around the trend of a global shortage of cybersecurity professionals. According to a report from ISACA, 55% of organizations reported that it takes at least three months to fill open cybersecurity positions, while 32% said they take six months or more. There seems to be a disconnect between what employers are looking for and what skills candidates are bringing in terms of in terms of cybersecurity skills. With new technologies impacting the way we approach security, this will be an interesting trend we continue to monitor.


Friday 17 February 2017

Weekly News Roundup


Too busy working all week to keep up with the most interesting stories coming out of the technology and security industries? Below are our recommendations for a roundup of the top stories happening now that you need to know.
This week, Yahoo warned users about malicious hacks related to a third data breach that the company disclosed in December 2016. Read more…
This week, the state of New York announced the final regulations requiring banks and insurers to meet minimum cybersecurity standards and report breaches to regulators. These regulations are part of an effort to combat a surge in cybercrime and limit damages to consumers. Read more…
Ukraine accused Russian hackers on Wednesday of targeting its power grid, financial system and other infrastructure with a new type of virus that attacks industrial processes. Read more…
There is a new “app-in-the-middle” attack discovered that threatens the security of business data stored in Android for Work. The app was designed to keep business and personal accounts separate, but this new attack could put corporate data at risk. Read more…

Thursday 16 February 2017

The Do’s & Don’ts of Creating a More Secure Password



There is not always a lot of control users have when it comes to data breaches, but one small line of defense you can take is the beloved, or more often than not dreaded, password. We all know we need them and we should be taking a creative, complex approach to them, but the truth is most people don’t spend too much time thinking about what passwords they are assigning to their accounts, they simply press “save,” and then they practically forget about them until the next time they need them. In fact, for the sixth year in a row, “password” joins “123456” as the two most commonly used passwords according to an annual study by SplashData.
Despite today’s increase in daily cyberattacks and data breaches, we as users are still taking a lazy, reckless approach to password security. Below are some helpful do’s and don’ts tips to help you master the art of creating unique and stronger passwords.
Do:
  • Change your passwords every couple of months
  • Include letters, numbers, special characters, and symbols in your passwords
  • Make your passwords at least eight characters long – the more the better
  • Always enable two-step authentication when it is available
  • Create different passwords and usernames for every account
  • Use a mix of uppercase and lowercase characters
  • Create a password code such as
    • A phrase/song line: “Take me out to the ballgame” and use the first letter of each word (TmottB)
    • Substitute certain letters for numbers. For example, make a-1, e-2, i-3, o-4, u-5
    • Add the first and last letter of the name of the website you are using to the beginning and end of the password you created
Don’t:
  • Use the same password for all your accounts. It is important you create separate passwords for each account in case an account is breached. Then only one of your accounts is exposed to risk.
  • Never click “remember me” when logging into your account. By doing so, it gives the site or application a cookie that is easily open to misappropriation.
  • Never use sensitive information such as your credit card number, personal ID number, or social security number
  • Never use information that you post on social media or that can be found easily publicly such as your birthday, house address, telephone number, pet’s name, spouse’s name, etc.
  • Don’t store a list of your passwords on your computer, phone or even on a paper list that can be seen in plain sight
  • Never create a password that is all numbers or letters – mix it up
  • Don’t share your password with anyone
  • Never use a number, alphabet or keyboard sequence
  • Don’t use sample or temporary passwords given to you by a site – always create a personal one

Friday 10 February 2017

Weekly News Roundup


Too busy working all week to keep up with the most interesting stories coming out of the technology and security industries? Below are our recommendations for a roundup of the top stories happening now that you need to know.
  1. Intercontinental Hotels Confirms Breach
    InterContinental Hotels Group confirmed that 12 of its hotels were infected with malware in point-of-sale devices. It is reported that payment card data for up to four months was stolen. Read more…
  2. Say Hello to the Super Stealthy Malware That’s Going MainstreamThere’s an increasingly popular type of attack that is stymieing the defenses of dozens of banks around the world. The malware is invisible so there is no file to find on the system to detect. Read more…
  3. WordPress blogs defaced in hack attacksAn estimated 1.5 million blog pages have been defaced due to a security flaw found in the WordPress blogging software. Read more…
  4. IRS-related phishing scams seen running rampantAccording to PhishLabs’ annual phishing report, people should be on high alert of phishers’ attempts to trick taxpayers, employers and tax preparers into giving up information that will allow attackers to file bogus tax returns and collect IRS refunds. Also, Google, Dropbox, Adobe and DocuSign are being targeted by phishers the report notes. Read more…

Tuesday 7 February 2017

Security Takeover: When Internal Sources Turn on You



As cybersecurity continues to be at the top of mind for organizations, most of the conversation has surrounded keeping information safe from external threats and hackers, with little attention given to internal security threats. What about the unhappy employee, the ex-employee who was recently sacked, an employee who has an axe to grind, or even an employee who simply stumbled upon sensitive information and decided to capitalize on it? All of these internal sources have approved access to data, passcodes, keys and so on that can pose as security vulnerabilities to your organization.
In fact, according to the 2016/17 Kroll Annual Global Fraud and Risk Report1, 60% of respondents who worked for companies that suffered from fraud identified a combination of perpetrators that included current employees, former employees, and third parties. Furthermore, an overall 44% of respondents reported that insiders were the primary perpetrators of a cyber incident, with former employees the most frequent source of risk (20%), 14% citing freelance or temporary employees, and 10% citing permanent employees.
Threats that come from within are difficult to defend against, because a one-size-fits-all solution and traditional security products like firewalls, VPNs and SSL do not work in this case. With access to the company network and the ability to fly under the radar, the disgruntled employee can use inside knowledge to share a virus, share or sell documents with rivals, or misuse company and personnel data for other benefits. While internal threats are difficult to defend against, there are several actions you can take to try be as protected as possible. Below are several tips on practicing safe internal security.
  • Implement File Level Encryption: Add an extra level of security to your sensitive data. As with web apps, all of your files should be encrypted in addition to any current security and encryption that you deploy. Full data encryption solutions encrypt the entire hard drive from the operating system to all applications and data stored on it. As information is read from the disk, it is decrypted and any information written to the disk is encrypted in turn. Without the encryption key, the data stored on the disk remains inaccessible.
  • Disable Key Stores: Encryption should be dynamic. In other words, your Key Store should be dismantled and the encryption keys, IVs and Salts, should be created by the application based on different criteria at that moment in time. This means that each piece of data, each network message, or each file is encrypted to a unique key, so it doesn’t leave your data exposed on your key store and accessible to unauthorized employees.
  • Define Levels of Access: Each employee in the company is important, but some have more need to access sensitive data than others. One security measure that could add protection to sensitive data is for IT to define the level of access that employee has and to assure that access levels are maintained whether employees are working behind or beyond the corporate firewall depending on their role.
  • Remove Access Rights: When a member of your staff moves, whether it is externally all together from the company or even just a different department from within, the first measure that must be taken is changing the access rights of that employee. IT should be immediately notified to revoke all computer, network, and data access the employee who is moving on has and should be documented for legal purposes.
  • Less is more: When you are dealing with sensitive information, it is a good rule of thumb to limit the amount of people who have access to it. Having fewer people with access to your most sensitive documents helps protect it from being misused.

Friday 3 February 2017

Weekly News Roundup


Too busy working all week to keep up with the most interesting stories coming out of the technology and security industries? Below are our recommendations for a roundup of the top stories happening now that you need to know.
  1. Five Men In International ATM Hacking Gang Arrested
Authorities in Asia and Europe have apprehended five members of an international hacking ring. The gang is accused of carrying out attacks on bank ATMs that cost the financial institutions hit about €3 million. Read more…
It came out this week that two former cyber-security experts at Russia’s FSB intelligence agency and another at a software firm have been charged with treason. Read more…
Authorities have made arrests for two people who are believed to be tied to the attack that came through ransomware and targeted DC’s surveillance camera system between Jan. 12 and Jan. 15. Read more…
This week, the U.S. Treasury Department announced it eased economic sanctions on Russia. This means it will allow some cyber-security transactions with the Russian Federal Security Service accused of meddling in the U.S. electoral process. Read more…