How Do You Strengthen Your Cybersecurity Posture?

Here’s the obvious answer…

Aaron Perkins

December 15, 2016 - Posted by Aaron Perkins to Security Insight

Protection

If you’ve ever wondered whether your company should spend its hard-earned money on strengthening its cybersecurity posture, the answer is a resounding YES! But why? That’s what we are going to discuss today.

Cybersecurity companies have been saying it for years: “The question is not if, but when your company will be attacked.” At an increasing rate, these attacks come in the form of phishing emails, where an unsuspecting (often untrained) employee opens what appears to be a legitimate email and subsequently clicks on a malicious link. With two clicks, your company and its associated data are now open to the world. An attacker has free rein of your entire network, thanks to the unsuspecting employee who clicked on the malicious link.

Perhaps all too often the obvious answer is to fire the employee – or is it so simple?

Truth be told, had that employee received acceptable training from the time their... read more >

Are You Prepared?

#WarStoryWednesday: Most incident response plans don’t survive first contact

David Biser

December 14, 2016 - Posted by David Biser to Security Insight

This is not technically a war story, however, it is an experience that I would like to share. I recently attended an event featuring a speaker from a large company that had experienced one of the most high profile and extensive breaches in recent history. For the sake of the company I will not name them in this blog, but I do want to stress that the company is very large and the breach was extensive, affecting millions of customers and their entire network. What was interesting is that the speaker was from the company’s legal department, and as such, is not a “technical” person. This provided a brand new perspective to incident response.

In my line of work as an incident response analyst, working in a Managed Security Services Provider company, I routinely help companies that suffer from security incidents. I have first-hand knowledge as to how devastating such an event can be to a company. This speaker stressed that their company lost well over a billion... read more >

How to Implement an ISO 27001 Information Security Management System

15 steps for a successful implementation

Derek Weakley

December 08, 2016 - Posted by Derek Weakley to Security Insight

ISO 27001

Implementing an ISO 27001, and subsequently ISO 27002 Information Security Management System (ISMS) is no small feat. It is a daunting task, disruptive to your organization and can also upset employees with necessary changes. How can your organization effectively implement a robust and successful security program?

The first step in determining whether your organization is ready for an ISMS is to ask, how will we benefit from this? Security professionals often overlook this step, but it is critical and can really encourage management's support of the program. It is not financially viable to pursue something that will not at some point increase the bottom line. Discuss whether your organization will retain or acquire customers based on the strength of the security program. Your organization may also experience a competitive market advantage or improve its reputation after implementation. Furthermore, not implementing a program could cause your organization to lose revenue,... read more >

Taking Security Back to the Basics

Working from a strong foundation is the key to a successful security program

John Moran

December 01, 2016 - Posted by John Moran to Security Insight

Cyber Attacks ahead

When a major security vulnerability is disclosed, everyone stops what they are doing and takes notice, especially when that vulnerability comes with its own logo. Now don’t get me wrong, newly disclosed vulnerabilities are important. They provide exciting opportunities for researchers and they do, if only temporarily, focus management’s attention on the often overlooked information security. 

Don’t worry, this isn’t another blog about the pros and cons of vulnerability hype. Instead, I’d like to focus on the importance of keeping one eye on the basics, while the other is scrolling through the Twitter feed for the next upcoming disclosure. Because all too often, it is not the latest security vulnerability, but a failure to properly secure and deploy systems that is the root cause of a costly network breach.

Below are several recommendations to help keep your network more secure, and your company safe from new vulnerabilities (or old... read more >

Facebook isn’t Safebook!

ImageGate allows Ransomware Infection

David Biser

November 29, 2016 - Posted by David Biser to Security News

Facebook

With so many users accessing Facebook within corporate networks, it is imperative that your security team be up to date on current threats involving social media. A well-known piece of malware, Locky Ransomware, is spreading via Facebook Messenger by pretending to be a harmless image file. Since many companies allow employees to access Facebook, this presents a potentially massive hole in security programs.

The initial reports on this piece of ransomware show a commonality among the type of infection vector and approach used by the attackers. First, the user receives an instant message containing only an image file, or what appears to be an image file. It is usually titled generically with a .svg extension. A .svg (Scalable Vector Graphics) is an XML-based vector image, which is formatted for two dimensional graphics and support for animation and interactivity. These image files can be created and edited with any text... read more >

Stay Safe this Holiday Season

You’re a Mean One, Mr. Grinch

Zach Holt

November 22, 2016 - Posted by Zach Holt to Security Insight

Holiday Scams Ahead

It’s that time of year again where the days grow shorter, the wind starts picking up, and the temperatures start dropping (and if you’re one of my neighbors, it also means swapping your Halloween decorations for Christmas lights. But I digress). The holiday season is just around the corner, and so are opportunities to ruin your holiday cheer. With a little caution, you can save yourself from a big headache. Below are my top tips on how to stay safe this holiday season:

  • Virtual credit cards – If you’re tech-savvy enough to be reading this blog, there’s a good chance you’re familiar with online shopping. Many credit cards come with an option to generate a short-term virtual credit card number associated with your main account. While we would all like to believe our information is safe with big name companies,...

read more >

Detailed DNS Logging

How to use DNS logs

Bryan Pluta

November 17, 2016 - Posted by Bryan Pluta to Security Insight

Log Analysis

Over the last several months, there has been a lot of interest about Domain Name System (DNS) logging and what can be done with DNS logs. I discussed parts of this topic in my last blog, Finding the Culprit, and will continue to expand on some of those ideas. Many people ask if ActiveGuard® supports DNS logging. While it is not supported at this moment in time, there is a larger discussion to have around the topic.

This larger discussion starts with the number of logs produced by DNS servers. Let’s say an organization of 15,000 employees decides to log all the requests and responses for DNS. This organization would produce approximately 100 logs per second, or 8.6M logs a day. On average, these logs are 750bytes in size, so we will need 6GB per day uncompressed to store these logs. This is not too bad of a number, but you have to remember how your log collection capability... read more >

<< Newer Entries | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS