You are viewing 'Preventing Cyber Crime'
Here’s the obvious answer…
If you’ve ever wondered whether your company should spend its hard-earned money on strengthening its cybersecurity posture, the answer is a resounding YES! But why? That’s what we are going to discuss today.
Cybersecurity companies have been saying it for years: “The question is not if, but when your company will be attacked.” At an increasing rate, these attacks come in the form of phishing emails, where an unsuspecting (often untrained) employee opens what appears to be a legitimate email and subsequently clicks on a malicious link. With two clicks, your company and its associated data are now open to the world. An attacker has free rein of your entire network, thanks to the unsuspecting employee who clicked on the malicious link.
Perhaps all too often the obvious answer is to fire the employee – or is it so simple?
Truth be told, had that employee received acceptable training from the time their... read more >
#WarStoryWednesday: Most incident response plans don’t survive first contact
This is not technically a war story, however, it is an experience that I would like to share. I recently attended an event featuring a speaker from a large company that had experienced one of the most high profile and extensive breaches in recent history. For the sake of the company I will not name them in this blog, but I do want to stress that the company is very large and the breach was extensive, affecting millions of customers and their entire network. What was interesting is that the speaker was from the company’s legal department, and as such, is not a “technical” person. This provided a brand new perspective to incident response.
In my line of work as an incident response analyst, working in a Managed Security Services Provider company, I routinely help companies that suffer from security incidents. I have first-hand knowledge as to how devastating such an event can be to a company. This speaker stressed that their company lost well over a billion... read more >
Working from a strong foundation is the key to a successful security program
When a major security vulnerability is disclosed, everyone stops what they are doing and takes notice, especially when that vulnerability comes with its own logo. Now don’t get me wrong, newly disclosed vulnerabilities are important. They provide exciting opportunities for researchers and they do, if only temporarily, focus management’s attention on the often overlooked information security.
Don’t worry, this isn’t another blog about the pros and cons of vulnerability hype. Instead, I’d like to focus on the importance of keeping one eye on the basics, while the other is scrolling through the Twitter feed for the next upcoming disclosure. Because all too often, it is not the latest security vulnerability, but a failure to properly secure and deploy systems that is the root cause of a costly network breach.
Below are several recommendations to help keep your network more secure, and your company safe from new vulnerabilities (or old... read more >
Why It May Be More Than You Think
When your phone prompts for an update, you postpone it. When your operating system calls for an update, you ignore it. When your application requires a password update, you begrudgingly change it – all the while thinking “I don’t need a password or PIN. I’m just an average person. I don’t have anything that anyone could possibly want. Are all these layers of security really necessary? Could I really be a target?”
In a word, yes. There are many reasons you are a target, and I don’t mean of the heavy conspiracy type either.
Understanding the motives of potential attackers has long been a problem for many people. Most cannot fathom why hackers would want to attack them. In risk management we define this understanding as attack attribution. While there are infinite possible motives, I believe it’s most important to understand that no matter the situation, there is always something that another wants, an agenda that someone... read more >
Hint: Hollywood gets it wrong
If there is one thing you should know about cybercriminals, it is that they can be extraordinarily patient.
Much like an anaconda that can wait for its chosen prey for six months or more, cybercriminals are in no rush to launch into a cyberattack unprepared.
With the potential for virtually endless profits, cybercriminals organize their efforts more precisely than an air traffic controller manages takeoffs and landings.
Hollywood, though, tends to embellish what actually happens within a cybercriminal’s operations since, truth be told, hacking is boring – or at least boring to watch.
I’ve met quite a number of hackers in my lifetime, and never once did their stories contain, “And then I hacked into the bank’s servers, and ACCESS GRANTED flashed across the screen in bright green letters!”
With the way hacking and cybercrime are portrayed in movies and TV... read more >