<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/author/jordan/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog by Jordan</title><description>GTconsult - Blog by Jordan</description><link>https://www.gtconsult.com/blogs/author/jordan</link><lastBuildDate>Thu, 23 Apr 2026 09:20:36 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Strategy eats culture for breakfast]]></title><link>https://www.gtconsult.com/blogs/post/strategy-eats-culture</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/imported-files/food-coffee-breakfast-103124 -1-.jpg"/>We have spoken extensively about the effective approach towards cyber security and that there needs to be an effective culture that is built and devel ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XhvivmGMShyznyaZDXH3gA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hC5oRanqTeCpBl0IftYKtA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_I-1wK44QRj-BZdb8TV1bXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_I-1wK44QRj-BZdb8TV1bXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_FocJsprPSw-LLp6ogw8RnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FocJsprPSw-LLp6ogw8RnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p>We have spoken extensively about the effective approach towards cyber security and that there needs to be an effective culture that is built and developed so that employees know what standard operating procedures (SOPs) are needed in specific situations.</p><p><br></p><p>The problem with developing a culture is that it takes a long time and the cyber threat is immediate. When facing a clear and present danger, nothing beats strategy. After all, Strategy eats culture for breakfast.</p><p><br></p><p>I recently read a <a href="https://www.forbes.com/sites/forbestechcouncil/2020/05/12/15-effective-cybersecurity-strategies-for-your-remote-workforce/#5984d6d50db8">Forbes article</a> which pointed out how this can be done effectively. Especially when it comes to remote working, which is something that will gain in prominence in the future.</p><h3><br></h3><h3>Encourage cyber ‘social distancing.’</h3><p>The article points out that companies need to encourage employees to adopt the same strategy for cyber viruses they use in the real world. Cyber “social distancing” is about recognizing risk and keeping your distance.</p><p><br></p><p>The article adds that helpful technology solutions should include a secure email gateway to detect phishing attacks and spam, a VPN solution to secure remote connections or a secure access solution to ensure that only authenticated devices access the network.</p><p><br></p><h3>Use a cyber-intelligence approach.</h3><p>The article points out that, to truly strengthen an organization’s cybersecurity posture, look for external signals of impending attacks.</p><p><br></p><p>The article adds that the ability to predict an attack and prioritize remediations accordingly is key. Go to the hackers’ trenches (e.g., deep/dark Web, hackers’ communities, and closed communities), decode threats that are relevant to the organization and understand the context of the attack.</p><p><br></p><h3>Employ cloud-based solutions.</h3><p>The article points out that cloud-based cybersecurity solutions that protect the device, cloud, and identity of the user—that is the ticket for secure remote working.</p><p><br></p><p>The article adds that the new generation of cybersecurity solutions, optimized for secure remote work, are deployable in seconds, cloud-managed, silent to the user and invasive to the attacker.</p><p><br></p><h3>Secure the perimeter.</h3><p>The article points out that businesses need to secure the corporate perimeter when moving to a remote workforce. This means tying VPN to Active Directory and enabling multifactor authentication to make sure the right people are accessing networks, apps, and data.</p><p><br></p><p>The article adds that businesses should mandate VPN use on public Wi-Fi and remind employees to avoid opening emails and clicking on URLs from unknown senders and to keep passwords safe.</p><p><br></p><h3>Consider virtual desktop environments over VPNs.</h3><p>The article points out that companies must ensure employees can securely access everything they need to do their jobs effectively from home.</p><p><br></p><p>The article adds that using VPNs has been the traditional method, but it limits access to a small number of internal company applications and cannot secure many of the online apps employees need. Companies should consider testing and bolstering a virtual desktop environment to provide a great user experience.</p><p><br></p><h3>Trust, but verify.</h3><p>The article points out that when working remotely, it is easier to be misled by fake requests from people you know (spearphishing).</p><p><br></p><p>The article adds that companies should teach their team how to spot the signs, as well as how to verify any requests. The easiest way is to always use another channel, like calling them or jumping on a video call.</p><p><br></p><h3>Carry security protocols over to home offices.</h3><p>The article points out that it is not just about the security platform that the CISO has put in place but how employees continue that business continuity into the home office.</p><p><br></p><p>The article adds that it’s critical that as users move to remote working the security team has a plan in place to carry all of the security protocols and policies over to ensure that home users are just as secure as if they were in the corporate office.</p><p><br></p><h3>Deploy mobile security software.</h3><p>The article points out that the most effective cybersecurity measure is the implementation of an agile mobile security platform that can be installed on any device accessible by the employee—regardless of the operating system or manufacturer—and that is built around a model of data-centric security.</p><p><br></p><p>The article adds that without those key elements, companies risk slower deployment times, lost company data and extensive overhead costs.</p><p><br></p><h3>Remind employees to guard their home routers.</h3><p>The article points out that we have seen with smart cities and enterprises that remote contractors and staff may have the greatest VPN, but their home router may be the weakest link.</p><p><br></p><p>The article adds that many people buy home routers and never change the default password. Botnets are out seeking these open doors—once they gain access, they infect the worker’s PC and enter the organization through the VPN. This is an area not managed by IT.</p><p><br></p><h3>Know your access points.</h3><p>The article points out that the rush to work from home is a situation in which the prepared do better. It is critical to keep an up-to-date network map to handle whatever comes along. For example, show where your VPN access points are and whether they have the correct access.</p><p><br></p><p>The article adds that most organizations struggle to maintain a reliable map of their changing world, but it can be automated.</p><p><br></p><h3>Remember that temporary pain will bring long-term advantages.</h3><p>The article points out that the COVID-19 crisis is accelerating many developments that will improve the cybersecurity posture of organizations. Security teams are looking for SaaS security applications that can be deployed with ease and with no disruption to productivity.</p><p><br></p><p>The article adds that many organizations are still far away from this, using only on-premises solutions, and the crisis is forcing them to change their approach.</p><p><br></p><h3>Create a specific action plan for critical functions.</h3><p>The article points out that, like any new service, secure remote working needs organizations to define and implement security policies, procedures, and controls. However, in most companies, the challenge is that a few critical functions are not designed to work offsite.</p><p><br></p><p>The article adds that those need a quick process redesign and risk assessment to come up with a short-term action plan followed up with a sustainable long-term control framework.</p><p><br></p><h3>Do not wash your hands of cyber hygiene.</h3><p>The article points out that the most significant threat to cybersecurity is still employee negligence. Anticipate a substantial increase in malicious cyber-targeting of remote workers.</p><p><br></p><p>That article adds that, no matter the location, you must establish a culture of security, protect mobile devices, maintain computer cyber-hygiene, properly deploy and maintain firewalls, have current antivirus software, and, most importantly, plan for the unexpected.</p><p><br></p><h3>Focus on endpoint security and VPN use.</h3><p>The article points out that companies need to ensure robust endpoint security and VPN use on all devices, including personal devices that may now be accessing company systems and data.</p><p><br></p><p>Using a cloud-managed solution enables streamlined centralized control, visibility, and policy enforcement.</p><p><br></p><h3>Assess your company’s threat model work.</h3><p>The article points out that a good rule of thumb that easily translates to remote work, VPN use, etc. is to view all traffic and actors as nefarious until proven otherwise.</p><p><br></p><p>The article adds that, in the end, cybersecurity measures ultimately come down to a company’s threat model work, which is the primary key to driving their cybersecurity risk assessment and countermeasures.</p><p><br></p><h3>A whole new role.</h3><p>The focus on cyber security peaked in 2017 as the world realised that any defence against this growing threat needs to be formalised and not piece-meal. Roles such as Chief Information Officers were established in companies and they started to hold board positions and are now involved in some of the most intricate planning within companies.</p><p><br></p><p>These departments grew as strategy required feet on the ground. I recently read on article on Security Boulevard which pointed out that as a Chief Information Security Officer (CISO), your cyber security strategy plan drives data protection for the organization across every aspect of business processes including new hires and onboarding.</p><p><br></p><p>The article points out that it is not uncommon for an organization to have an HR step where the hiring manager requests network account credentials and permissions for a new employee. Without the right procedures in place, hiring managers could ask for extensive permissions and violate the principle of least privilege. High-privilege accounts should be given with caution including virtual and physical access. With the right strategy plan in place, a CISO can maintain hardened cyber security compliance and still offer managers a smooth onboarding transition.</p><p><br></p><h3>Phishing User Credentials is Big Business for Hackers.</h3><p>The article pointed out that, in last year’s Verizon Data Breach Investigations Report, a survey found that the second most common type of attack resulting in data disclosure was phishing. In this same report, 33% of attacks were from social engineering and 28% involved malware. These numbers are alarmingly high especially when more and more organizations store several data points on customers including financials, contact information and passwords. For many attacks, the goals are financial for an attacker, so they use phishing to gain access to accounts that provide permissions to sensitive data. High-privileged accounts are an attacker’s main target as these accounts can be leveraged for massive exfiltration of valuable data.</p><p><br></p><p>The article added that, to avoid unnecessary privileges and thwart potential phishing attacks, a CISO’s cyber security strategy plan should include an onboarding checklist that ensures tightened protocols for a new hire’s network access. The following is not an exhaustive list, but this checklist has several questions that could be useful when determining an onboard permission process:</p><ul><li>What department will the employee be working for?</li><li>What network resources does the employee need to access to perform their job functions?</li><li>Who is the employee’s direct manager?</li><li>Are extended privileges needed and for what job function?</li><li>Is physical access to any resource necessary? And</li><li>If the hire is a transfer, what resources from the old position are no longer needed?</li></ul><p>The article pointed out that the last question involves onboarding an already existing employee transferring to a new position. Privilege accumulation is another real issue for organizations. If your cyber security strategy does not include revoking privileges when an employee transfers, the accumulated permissions can be used by attackers to make lateral moves across the network. Some CISOs perform regular reviews of user permissions to identify any unnecessary privileges that must be revoked to ensure this issue does not happen.</p><p><br></p><p>Another challenge for CISOs is how frequent users should change their passwords. It is widely considered an unnecessary and a dying concept to require mandatory password changes. Keyloggers can be used to capture password changes and identify user behaviour patterns to figure out passwords even after they have been changed. Password expiration rules will also need to be determined during onboarding strategy planning.</p><p><br></p><h3>Guidelines and Security Frameworks for New CISOs.</h3><p>The article added that a new CISO might be great at risk assessment7 but knowing the right guidelines and frameworks can be more of a challenge for someone who is unfamiliar with guiding businesses at the CISO level. To get started, the CIO and CISO Councils created a CISO Handbook that lays out the best standards and approach towards cyber regulations. The CISO handbook covers one of the most important frameworks for CISOs – NIST (National Institute of Standards and Technology) from the US Department of Commerce.</p><p><br></p><p>The NIST framework covers a roadmap for CISOs to get started with cybersecurity development and collaboration. Following the NIST framework will keep organizations aligned with PCI-DSS, HIPAA, and FISMA (to name a few of the most prominent). These regulatory guidelines control the way businesses protect data especially within a specific industry, but the NIST framework covers general guidelines that will protect the business as a whole.</p><p>The article pointed out that some other frameworks that a CISO should be familiar with include:</p><ul><li>ISO/IEC 27000 family – an international framework for managing security systems;</li><li>SOC 2 – security standards that oversee data stored in the cloud;</li><li>CIS v7 – general guidelines and standards for development of baseline security standards;</li><li>COBIT – a framework for production performance that works well with cybersecurity;</li><li>FedRAMP – standards specifically for government agencies; and</li><li>Bringing an Organization into Current-Year Cyber Security Strategies</li><li><br></li></ul><h3>Not always easy.</h3><p>The article pointed that it is not always easy changing cyber security protocols within an existing organization. A new CISO could have work cut out for him. One goal that should be communicated to the organization is that short-term convenience will be replaced with long-term cyber security protection that reduces risk of a massive data breach.</p><p><br></p><p>In addition to cyber security strategies, the CISO can launch training programs to empower users so that they can identify phishing and social engineering warning signs. User train has shown to reduce click-through rates from phishing email links from 25% in 2012 to 3% in 2018, so it can be a critical component of a strong onboarding strategy.</p><p><br></p><p>The article added that user onboard protocols, password policies and training should all be a part of a CISO’s cyber security strategy plan. CISOs should be tightly engrained in every user access request by standardizing an organization’s user account creation, management, and deactivation procedures. In addition, user training familiarizes users with the pitfalls of phishing and social engineering and helps them recognize an attack. As challenging as it can be to get an organization on board with these protocols, a good CISO can explain the need for these steps to increase data protection and reduce risks that can cost millions in damages.</p><p><br></p><h3>The game changer.</h3><p>Artificial Intelligence (AI) has always promised much when it comes to the fight against cyber crime. I recently read an article on Security Magazine which pointed out that there are important things to consider when incorporating AI:</p><ul><li><strong>Establish the Foundation.</strong> AI offers powerful potential for augmenting existing cybersecurity tools beyond traditional signature-based approaches and offers a mechanism for the rapid validation and prioritization of threats. However, understanding the basics of the network are essential for success, specifically in the areas of visibility, governance, storage, and processing and workflows;</li><li><strong>Visibility.</strong> First, all assets on the network must be accounted for through an established IT Asset Management Program. Studies more than a decade old show that most organizations cannot account for nearly 30 percent of their assets – a troubling statistic that our experience continues to prove true today. Understanding what is on the network is key to recognizing and responding to cybersecurity incidents, in addition to ensuring AI models are using the right data. Crowdstrike’s 2019 Global Threat Report suggests threats actor’s ability to spread across the network takes between 18 minutes to nine hours. Attempting to track down assets after detection can significantly increase the Mean Time to Remediation;</li><li><strong>Governance.</strong> Next, the best operationalized AI use cases require multiple data feeds, which represent a unique perspective on what is happening on an organization’s network and infrastructure. As with any human operations, AI performs best when many perspectives can be fused together into one comprehensive picture. However, this is often challenging, as each model may be expecting data in a unique structure and format. For this reason, it is critical that organizations stand up a common data model (e.g. the Splunk Common Information Model (CIM) or the Elastic Common Schema (ECS)). This model can be used to link multiple data feeds together into a single source of data truth and ensures each algorithm in an organization’s model suite is built on the same data foundation;</li><li><strong>Storage and Processing. </strong>Once the data is standardized, the use of a data broker (e.g., Kafka, RabbitMQ) can help move data outside of existing security platforms to where advanced analytic capabilities can take place. By decoupling the storage and compute layers, resource intensive AI models can run more freely without bogging down the real-time identification of threats. This will also prohibit vendor lock-in should organizations change products at a later time. These separate systems also support the storage of tagged flat files more suitable for AI use cases where currently deployed tools do not support a similar extensible storage method;</li><li><strong>Workflows.</strong> Last, organizations must establish clearly defined and organized workflows and processes that extend beyond the security team. In a 2019 Ponemon Institute study, only 23 percent of organizations out of 3,665 said their company had an incident response plan applied consistently across the entire enterprise. Alternatively, in the same study, 24 percent of organizations admitted to not having an incident response plan in place at all. As new threats are detected, organizations need a solid grasp on their incident response processes to effectively address threats. If the number of alerts begins to rise after new detection methods, analysts can become quickly overwhelmed, which in turn poses issues to the success of an organization’s AI deployment.</li></ul><div><br></div><p>Through a similar approach, organizations will be more effectively prepared to validate, prioritize, and analyse potential threats. With the basics covered, launching AI across your organization is just a few more steps away.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 11 Jun 2020 23:11:00 +0000</pubDate></item><item><title><![CDATA[Becoming better prepared.]]></title><link>https://www.gtconsult.com/blogs/post/becoming-better-prepared</link><description><![CDATA[When we look at the technology industry, and the rise of the increased need for cyber security, companies learned a lot (through trial and error) abou ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ized5rssRGWgyy4cv-39GA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LV7c8ldzRMakHE19Vq1gdw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LOcLgKyjQTOwcKXTSyEaog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_E5qZiWKcTRmUNniDM5AyIg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E5qZiWKcTRmUNniDM5AyIg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p>When we look at the technology industry, and the rise of the increased need for cyber security, companies learned a lot (through trial and error) about how to effectively deal with the cyber threat. Then COVID-19 came along and changed the way business was done.</p><p><br></p><p>This introduced a whole new level of risk into the market and changed the game when it comes to cyber security. It was as if we had to hit the reset button and relearn everything that we knew within the frame of a new risk landscape.</p><p><br></p><p>Again, we have learned a lot about cyber security during the COVID-19 lockdown period.</p><p><br></p><h3>Valuable lessons</h3><p>A report by the World Economic Forum pointed out that Most of the world is currently experiencing highly atypical living conditions as a result of COVID-19. At the height of the pandemic, more than 2 billion people were under some form of lockdown, and 91% of the world’s population, or 7.1 billion people, live in countries with border controls or travel restrictions due to the virus.</p><p><br></p><p>It would be comforting to think this is merely a “blip” interrupting an essentially stable state of affairs, and that the world will return to “normal” once medicine and science have tamed the virus.</p><p><br></p><h3>Comforting – and wrong.</h3><p>The report added that COVID-19 is not the only risk with the ability to quickly and exponentially disrupt the way we live. The crisis shows that the world is far more prone to disturbance by pandemics, cyberattacks or environmental tipping points than history indicates.</p><p><br></p><p>Our &quot;new normal&quot; isn’t COVID-19 itself – it's COVID-like incidents.</p><p><br></p><p>And a cyber pandemic is probably as inevitable as a future disease pandemic. The time to start thinking about the response is – as always – yesterday.</p><p><br></p><p>To start that process, it’s important to examine the lessons of the COVID-19 pandemic ­– and use them to prepare for a future global cyberattack.</p><p><br></p><h3>Lesson #1: A cyberattack with characteristics similar to the coronavirus would spread faster and further than any biological virus.</h3><p>The report pointed out that the reproductive rate – or R0 – of COVID-19 is somewhere between two and three without any social distancing, which means every infected person passes the virus to a couple of other people. This number affects how fast a virus can spread; the number of infected people in New York state was doubling every three days before lockdown.</p><p><br></p><p>By contrast, estimates of R0 of cyberattacks are 27 and above. One of the fastest worms in history, the 2003 Slammer/Sapphire worm, doubled in size approximately every 8.5 seconds, spreading to over 75,000 infected devices in 10 minutes and 10.8 million devices in 24 hours. The 2017 WannaCry attack exploited a vulnerability in older Windows systems to cripple more than 200,000 computers in 150 countries; it was halted by emergency patches and the accidental discovery of a “kill switch”.</p><p><br></p><p>The report adds that the cyber equivalent of COVID-19 would be a self-propagating attack using one or more “zero-day” exploits, techniques for which patches and specific antivirus software signatures are not yet available. Most likely, it would attack all devices running a single, common operating system or application.</p><p><br></p><p>The report points out that since zero-day attacks are rarely discovered right away – Stuxnet used four separate zero-day exploits and hid in systems for 18 months before attacking – it would take a while to identify the virus and even longer to stop it from spreading. If the vector were a popular social networking application with, say, 2 billion users, a virus with a reproductive rate of 20 may take five days to infect over 1 billion devices.</p><p><br></p><h3>The economic impact of a widespread digital shutdown would be of the same magnitude – or greater – than what we’re currently seeing.</h3><p>If cyber-COVID mirrored the pathology of the novel coronavirus, 30% of infected systems would be asymptomatic and spread the virus, while half would continue functioning with performance severely degraded – the digital equivalent of being in bed for a week. Meanwhile 15% would be “wiped” with total data loss, requiring a complete system reinstall. Finally, 5% would be “bricked” – rendering the device itself inoperable.</p><p><br></p><p>The end result: millions of devices would be taken offline in a matter of days.</p><p><br></p><p>The report adds that the only way to stop the exponential propagation of cyber-COVID would be to fully disconnect all vulnerable devices from one another and the internet to avoid infection. The whole world could experience cyber lockdown until a digital vaccine was developed. All business communication and data transfers would be blocked. Social contact would be reduced to people contactable by in-person visits, copper landline, snail-mail or short-wave radio.</p><p>A single day without the internet would cost the world more than $50 billion. A 21-day global cyber lockdown could cost over $1 trillion.</p><p>The report points out that cyber lockdown would also introduce novel challenges for digitally dependent economies. During the 2020 Australian bushfires, power outages and damage to mobile phone infrastructure gave citizens a newfound appreciation for battery-operated FM radios. But if cyber-COVID ravaged a country, which radio stations would still operate without digital recording and transmission systems? Would states like Norway, which has completed its transition to digital radio, be able to roll back?</p><h3>Lesson #3: Recovery from the widespread destruction of digital systems would be extremely challenging.</h3><p>The report adds that replacing 5% of the world’s connected devices would require around 71 million new devices. It would be impossible for manufacturers to rapidly scale up production to meet demand, particularly if manufacturing and logistics systems were affected. For systems that survive, there would be a significant bottleneck in patching and reinstallation.</p><p>The geographic concentration of electronics manufacturing would create other challenges. In 2018, China produced 90% of mobile phones, 90% of computers and 70% televisions. Finger-pointing about the source and motive of the cyberattack, as well as competition to be first in line for supplies, would inevitably lead to geopolitical tensions.</p><h3>Repurpose.</h3><p>Another report by the WEF points out that we need to rethink and repurpose cyber security to fit the modern construct.</p><p>The report points out that for businesses all over the world, adjusting to the new realities created by COVID-19 has been an incredible challenge. From a technology perspective, the crisis has forced companies to make massive changes - from meeting the needs served by suddenly shuttered workspaces, to scaling the tools required to connect entire workforces now isolated at home.</p><p>For IT teams that are already stretched thin, just getting the tactical tools and techniques needed for business continuity up and running has been a massive undertaking complicated by intense time pressures. But all of that was just the beginning. To protect and strengthen those efforts, we must now go beyond initial tactical approaches to adjust underlying security strategies and workplace philosophies as well.</p><p>The report adds that, for many companies, the biggest obstacle will not be the technology; it will be the ability to recognize that these short-term disruptions are here for the long-term, if not actually permanent. It is also critical that we begin now to seize the opportunity presented by these cultural and technological shifts to embrace a more strategic approach to security. Just as it has been very difficult for some companies to embrace the principles and practices of working remotely, some organizations may still attempt to cling to a network model that doesn’t really reflect the form or function of how their cloud and networks must now operate.</p><h3>Adapt and scale.</h3><p>The report points out that, the fact is, the primary organizing concept in many organizations’ network strategy — that there is a centre, and then there is everything else — is gone. To adjust, the principles and practices we use to secure what we once called the edge must now be adapted to and scaled across the entire network.</p><p>For many of us, this is not a new necessity. For years, security professionals have advised companies to adjust their security strategy to secure the remote edge, not just the traditional core network perimeter, and to employ security-driven networking. Even so, nobody could have predicted just how quickly and fundamentally those changes would be forced on us in the wake of COVID-19. We may never entirely go back to what we knew as normal. And perhaps the most dangerous thing we could do now is to leave our expanded edge strategy out on the edge.</p><p>The report adds that, moving forward, edge security, cloud security and network security must be synonymous. A security-driven networking strategy that blends the entire distributed network into a single, coherent solution is no longer optional – it will be an imperative. Fusing networking, the cloud and security must be the foundational structure of not only what is done now, but also of any innovations to come.</p><h3>Seeing designed solutions.</h3><p>The report points out that we have already begun to see solutions designed to define and secure networks with software, enabling organizations to approach security, the cloud and networking with a single, unified strategy for all edge computing. Many companies that had already invested in integrating their software-defined networking in a wide area network (SD-WAN), next-generation firewall (NGFW) technology and multi-cloud deployments into a unified system were in a much better position to pivot to the demands of a totally restructured workplace. But now that remote networks have taken a primary position, organizations must extend that strategic edge approach throughout the network and out to the cloud to make sure it is consistent, integrated and secure.</p><p>These changes may seem painfully sudden and sweeping. But the truth is we were already rapidly running out of runway. It was inevitable that security would have to follow data, and data has been moving to the edge and being distributed across an expanding network for some time now. Even without a global lockdown separating us physically, the proliferation of IoT — which includes billions of highly vulnerable access points with code not developed with security-first in mind — was always going to blow a gaping hole in networks eventually. Suddenly, eventually is now.</p><p>The report adds that there is no choice now but to move forward. Though challenging, we are being given an opportunity to create the type of connectivity and security we have long known we would need, but have been avoiding. That may be one bright outcome from this terrible crisis, but only if organizations can focus quickly and execute this strategy thoroughly.</p><p>Thankfully, the technology to achieve these solutions is available. Security-driven networking that utilizes AI to drive efficient, integrated solutions that span remote access and across dynamically distributed networking and cloud environments allows companies to maintain the pace of business. But it will also enable IT teams to focus on higher priority challenges, such as segmentation and authentication, to protect organizations as well as prepare for the opportunities of 5G, ultra-rich media and smart solutions, including smart vehicles, buildings and cities.</p><p>The report points out that we know that we must rely on digital connections more than ever, it is critical that we ensure that those connections are safe, fast, scalable, and strong throughout our networks. Whether we like it or not, whether we are ready or not, we have been pushed to the edge. The only question now is how quickly organizations can extend their networking strategy so they can remain safe there.</p><h3>Proper alignment.</h3><p>One of the problems with the existing approach to cyber security is that it was done on a piecemeal basis and that each country had their own approach. Perhaps there needs to be a set of best business principles set out that will govern how any country approaches this issue.</p><p>This is what the Cybersecurity and Infrastructure Security Agency (CISA) hopes to achieve through their cybersecurity toolkit.</p><p>The report on securitymagazine.com points out that, as a follow-up to the November 2019 release of Cyber Essentials, the Cybersecurity and Infrastructure Security Agency (CISA) released the first in a series of six Cyber Essentials Toolkits. This is a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks. CISA’s toolkits will provide greater detail, insight and resources on each of the Cyber Essentials’ six “Essential Elements” of a Culture of Cyber Readiness.</p><p>The report adds that The newest list highlights the first “Essential Element: Yourself, The Leader” and will be followed each month by a new toolkit to correspond with each of the six “Essential Elements.” Toolkit 1 focuses on the role of leadership in forging a culture of cyber readiness in their organization with an emphasis on strategy and investment.</p><p>“We thank all of our partners in government and the private sector who played an essential role in the development of CISA’s Cyber Essentials Toolkit,” CISA Director Christopher Krebs told Security Magazine. “We hope this toolkit, and the ones we are developing, fills gaps and provides executives the tools they need to raise the cybersecurity baseline of their teams and the organizations they lead.”</p><h3>Collaborative effort.</h3><p>The report points out that, developed in collaboration with small businesses and state and local governments, Cyber Essentials aims to equip smaller organizations that historically have not been a part of the national dialogue on cybersecurity with basic steps and resources to improve their cybersecurity. Cyber Essentials includes two parts – guiding principles for leaders to develop a culture of security, and specific actions for leaders and their IT professionals to put that culture into action.</p><p>The report adds that each of the six Cyber Essentials includes a list of actionable items anyone can take to reduce cyber risks. These are:</p><ul><li>Drive cybersecurity strategy, investment, and culture;</li><li>Develop heightened level of security awareness and vigilance;</li><li>Protect critical assets and applications;</li><li>Ensure only those who belong on your digital workplace have access;</li><li>Make backups and avoid loss of info critical to operations; and</li><li>Limit damage and restore normal operations quickly.</li></ul><h3>How can we prepare for cyber-COVID?</h3><p>We need to remember that COVID-19 has made a lasting impression on the way people work. Remote access will be commonplace in the future.</p><p>So, how do we prepare for this construct? The WEF report points out that the COVID-19 pandemic provides insight into how leaders can prepare for such a “fat tail” risk:</p><ul><li>Widespread, systemic cyberattacks are not just possible or plausible; they should be anticipated. As we have seen with COVID-19, even a short delay in the response can cause exponential damage.</li><li>New Zealand’s success in fighting the pandemic proves that early, decisive actions and clear, consistent communication increase resilience. It’s impossible to prepare for every potential risk, but both the public and private sectors should invest in scenario exercises to reduce reaction time and appreciate the range of strategic options in the event an attack occurs.</li><li>COVID-19 has revealed the importance of international, cross-stakeholder coordination. Cooperation between public and private sector leaders is also critical, particularly when it comes to mitigation. The Centre for Cybersecurity at the World Economic Forum is just one example of an organization addressing systemic cybersecurity challenges and improving digital trust across institutions, businesses and individuals.</li><li>Just as COVID-19 has pushed individuals and organizations to look to digital substitutes for physical interactions, government and business leaders should think about the inverse. “Digital roll back” and continuity plans are essential to ensuring organizations can continue to operate in the event of a sudden loss of digital tools and networks, as Maersk learned during the NotPetya cyberattack in 2017, which took out 49,000 laptops and printers and wiped all contacts from their Outlook-synced phones. A necessary part of the digital transformation is having sensitive and important information stored and accessible in physical, printed form.</li></ul><p>But perhaps the most important lesson: COVID-19 was a known and anticipated risk. So, too, is the digital equivalent.</p><p>Let’s be better prepared for that one.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 05 Jun 2020 01:10:00 +0000</pubDate></item><item><title><![CDATA[Inside the mind of cybersecurity]]></title><link>https://www.gtconsult.com/blogs/post/inside-the-mind-of-cybersecurity</link><description><![CDATA[When the FBI caught Jeffrey Dahmer and the CIA caught Timothy McVeigh, they got keen insight into the minds of some of the most notorious criminals of ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aiDZXUzjQduvyMS9Vt7H8Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c5kubvHGS3KJaXRT76jXrQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_hN6X06T1QkCIvxbYISDLcA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Xu8YqVhISPuxkjgaOME9Lw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>When the FBI caught Jeffrey Dahmer and the CIA caught Timothy McVeigh, they got keen insight into the minds of some of the most notorious criminals of our time. This influenced criminal profiling in the hope of making modern law enforcement a lot easier.</p><p>This was not the case with the infamous Jack the Ripper. This may be the case with modern cyber criminals as they are very hard to catch.</p><h3>Driven by money.</h3><p>It is no surprise that <a href="https://eandt.theiet.org/content/articles/2020/05/majority-of-cyber-crime-found-to-be-financially-motivated/">the majority of cyber criminals are driven by money</a>.</p><p>The article pointed out that financial gain remains the key driver for cybercrime with nearly nine in 10 breaches motivated by money, Verizon has found.</p><p>The article adds that, in its 2020 Data Breach Investigations Report (DBIR), the American telco found that the vast majority of breaches continue to be caused by external parties (70%), with organised crime accounting for 55 per cent of these.</p><p>Credential theft and social attacks such as phishing and business email compromises cause most breaches (over 67%). Of this, 37% of attacks were made through credential theft breaches using stolen or weak credentials, 25% involved phishing, and human error accounted for 22%.</p><h3>Multiple methods.</h3><p>The article points out that phishing attacks are typically carried out by email spoofing or instant messaging and often involve directing users to enter personal information on a fake website, which matches the look and feel of a legitimate site.</p><p>The 2020 DBIR also highlighted a year-over-year doubling in web application breaches, to 43 per cent, and stolen credentials were used in over 80 per cent of these cases, something Verizon said was worrying as businesses increasingly shift their workflows over to the cloud.</p><p>Ransomware also saw a slight increase, found in 27% of malware incidents compared to 24% in 2019.</p><p>“As remote-working surges in the face of the global pandemic, end-to-end security from the cloud to employee laptop becomes paramount,” Tami Erwin, CEO of Verizon Business told eandt.theiet.org. “In addition to protecting their systems from attack, we urge all businesses to continue employee education as phishing schemes become increasingly sophisticated and malicious.”</p><h3>Double trouble.</h3><p>The article points out that the report comes as hacking activity against corporations in the US and other countries has more than doubled since the start of the lockdown as cyber criminals exploit security weaknesses in hastily drawn-up work-from-home policies.</p><p>The growing number of small and medium-sized businesses using cloud- and web-based applications and tools has made them prime targets for cyber attackers, Verizon said.</p><p>The motivation behind cyber-attacks also differed depending on the region.</p><p>The article adds that, while financially motivated breaches accounted for 91 per cent of cases in the US, it’s just 70 per cent in Europe, Middle East and Africa, and 63 per cent in Asia Pacific.</p><p>The report’s lead author Alex Pinto said: “Security headlines often talk about spying, or grudge attacks, as a key driver for cyber-crime – our data shows that is not the case.</p><p>“Financial gain continues to drive organised crime to exploit system vulnerabilities or human error. The good news is that there is a lot that organisations can do to protect themselves, including the ability to track common patterns within cyber-attack journeys – a security game-changer – that puts control back into the hands of organisations around the globe.”</p><h3>Shocking reality.</h3><p><a href="https://www.globenewswire.com/news-release/2020/05/19/2035340/0/en/Money-still-makes-the-cyber-crime-world-go-round-Verizon-Business-2020-Data-Breach-Investigations-Report-is-live.html">Globalnewswire.com points out</a> that the impact of the Verizon report is a shock to the system.</p><p>The report indicates that smaller businesses are not immune. The growing number of small and medium-sized businesses using cloud- and web-based applications and tools has made them prime targets for cyber-attackers. 2020 DBIR findings show that:</p><p>Phishing is the biggest threat for small organizations, accounting for over 30 percent of breaches. This is followed by the use of stolen credentials (27 percent) and password dumpers (16 percent).</p><p>Attackers targeted credentials, personal data and other internal business-related data such as medical records, internal secrets or payment information.</p><p>Over 20 percent of attacks were against web applications, and involved the use of stolen credentials.</p><h3>Industries under the cyber-spotlight</h3><p>The report adds that the 2020 DBIR now includes detailed analysis of 16 industries, and shows that, while security remains a challenge across the board, there are significant differences across verticals. For example, in Manufacturing, 23 percent of malware incidents involved ransomware, compared to 61 percent in the Public Sector and 80 percent in educational services. Errors accounted for 33 percent of Public Sector breaches - but only 12 percent of Manufacturing. Further highlights include:</p><ul><li><strong>Manufacturing</strong>. &nbsp;External actors leveraging malware, such as password dumpers, app data capturers and downloaders to obtain proprietary data for financial gain, account for 29 percent of Manufacturing breaches;</li><li><strong>Retail</strong>. Ninety nine percent of incidents were financially-motivated, with payment data and personal credentials continuing to be prized. Web applications, rather than Point of Sale (POS) devices, are now the main cause of Retail breaches;</li><li><strong>Financial and Insurance</strong>. Thirty percent of breaches here were caused by web application attacks, primarily driven by external actors using stolen credentials to get access to sensitive data stored in the cloud. The move to online services is a key factor;</li><li><strong>Educational Services</strong>. Ransomware attacks doubled this year, accounting for approximately 80% of malware attacks vs. last year’s 45%, and social engineering accounted for 27% of incidents;</li><li><strong>Healthcare</strong>. Basic human error accounted for 31% of Healthcare breaches, with external breaches at 51% (up from 42% in the 2019 DBIR), slightly more common than insiders at 48% (59% last year). This vertical remains the industry with the highest number of internal bad actors, due to greater access to credentials; and</li><li><strong>Public Sector</strong>. Ransomware accounted for 61% of malware-based incidents. Thirty three percent of breaches are accidents caused by insiders. However, organizations have got much better at identifying breaches: only 6%t lay undiscovered for a year compared with 47% previously, linked to legislative reporting requirements.</li></ul><h3>Soft targets.</h3><p>An article by <a href="https://securityboulevard.com/2020/05/cyber-crime-against-children-spikes-amid-stay-at-home-orders/">Security Boulevard points out</a> that the sudden shift to remote work has forced millions of individuals and families to set aside their daily routines and quickly adapt to self-isolating measures to stay safe amid the pandemic</p><p>While social distancing helped us flatten the curve, the unprecedented spike in online consumption has opened new doors of exploitation for adults and children alike.</p><p>The article added that adults are not the only ones susceptible to the dangers of online exposure. During the stay-at-home orders, millions of children have stored away their backpacks and school gear, participating in online courses along with their teachers and classmates.</p><p>While the virtual environment helps teachers and parents struggling to maintain a balanced day-to-day schedule for children, it also serves as a malicious vector for the cyber exploitation of children.</p><h3>Increased targets.</h3><p>The article points out that in the first two months of spring, the Minnesota Bureau of Criminal Apprehension observed a 30% increase in cyber-crimes against children. On top of more than 1,000 complaints received by the agency, The National Center of Missing and Exploited Children (NCMEC) recorded more than 6 million tips during the same period.</p><p>While the sudden spike in numbers can be attributed to the increased screen time for minors, John Shehan, the vice-president of NCMEC, says that online predators are discussing their intentions to exploit the lockdown orders on the dark web.</p><p>The article added that law enforcement agencies also warn of the dangers of online chatrooms, where an adult may pose as a teenager and manipulate the recipient into sending indecent photos, ultimately blackmailing the child by threatening to expose his actions to his parents or teachers.</p><p>“Parents are stretched so thin and asked to do so much right now,” said Minnesota U.S. Attorney Erica MacDonald. “It just leads to a very target-rich environment for kids to be preyed upon.”</p><p>Parents and caretakers should be the first to start an honest conversation with their children and warn them about the risks they face in the online world, she said.</p><p>The article pointed out that parents are advised to keep an eye on their children’s online profiles and monitor their posting patterns. It’s also a good idea to set privacy settings for social media accounts and online gaming platforms. If your little one is more of a night owl, it’s best to try and limit online consumption during late hours or, at least, supervise their interactions.</p><h3>A failing system.</h3><p>While there is increased legislation to protect the public against cyber crime, cyber criminals are hard to catch, and justice systems are under increased pressure to perform. And most of them are <a href="https://www.computerweekly.com/news/252482718/Criminal-justice-system-is-failing-cyber-crime-victims">unfortunately failing</a>.</p><p>The article points out that the UK criminal justice system needs further, urgent reform to better serve the needs of victims of cyber crime, who face barriers to reporting offences, receive inadequate support, and rarely achieve any form of justice, according to a study commissioned by the Home Office and HM Inspectorate of Constabulary, Fire and Rescue Services (HMICFRS).</p><p>The research, conducted at the University of Portsmouth, set out to assess the nature and impact of crime related to misuse of computers – including most forms of cyber crimes, such as hacking, malware and ransomware infections, and distributed denial of service (DDoS) attacks. It is the first major UK study into the impact felt by victims.</p><p>It concluded that the police lack the proper resources to effectively fight cyber crime and protect and support its victims, and made several recommendations for system-wide changes that the wider cyber security sector could take into account to work more effectively in this regard.</p><p>Mark Button, director of the Centre for Counter Fraud Studies at the University of Portsmouth’s Institute of Criminal Justice Studies, told computerweekly.com: “There has been a perception that cyber crimes don’t have as bad an impact as some physical crimes, but this report shows that computer misuse crime has a similar, and in some cases a worse, impact than comparable traditional crimes, such as burglary.</p><p>“We found victims who compared cyber attacks to physical assaults, some rape and some contemplating suicide as a consequence. We also found some victims struggling to report these crimes. For example, one woman whose laptop camera had been hacked by criminals was dismissed by the police, and another lady whose estranged husband hacked her computer to secure advantage in divorce negotiations was told it was not a crime.”</p><h3>Poorly classified.</h3><p>The article points out that Button and his team, who conducted 52 in-depth interviews with victims, along with a wider survey of 252 people, said computer misuse crime was poorly classified by the authorities, and recommended at the most fundamental level a new reporting system be developed, to be regularly monitored and evaluated by Action Fraud and the National Fraud Intelligence Bureau.</p><p>Button also found that the Action Fraud brand name represented a barrier to the reporting of some crimes, and recommended it be renamed the National Fraud and Cybercrime Reporting Centre to better account for cyber crime.</p><p>The article pointed out that the report went on to recommend a high-level review of all police force websites about what advice is given on such crimes, to ensure more consistency in reporting across the UK. This should go hand-in-hand with improved training for frontline officers and other police staff to understand exactly what constitutes a computer misuse offence, it said.</p><h3>Explicit task.</h3><p>The article pointed out that the report also suggested that the National Cyber Security Centre (NCSC) be given the explicit task of working with organisations that regularly receive complaints about cyber crime – such as banks or social media platforms – to encourage people to report through centralised web links.</p><p>Finally, Button’s report highlighted the need to increase the resources made available to tackle computer misuse. Many of the interviewees questioned by the research team said they received neither a police investigation nor support, and in only four cases was the perpetrator brought to justice. Resources for dealing with cyber crime are often built too much on short-term funding models, the report said.</p><p>“Despite nearly a million computer misuse crimes being reported in the 2018 England and Wales crime survey, just 23,683 were recorded by Action Fraud,” Button told computerweekly.com. “This illustrates significant under-reporting and highlights a subsequent lack of support for those who have often been left deeply affected by the crimes.”</p><h3>O Flower of Scotland.</h3><p>Scotland is part of the UK but has fiercely been trying to be as independent from the Crown at every turn.</p><p>An <a href="https://futurescot.com/scotlandis-and-the-scottish-government-call-on-scots-tech-firms-to-help-build-digital-nation/">article points</a> out that ScotlandIS and The Scottish Government are today calling on Scottish-based tech firms of all sizes to help increase the pace of Scotland’s digital progress and develop the critical national digital and data infrastructure the country needs.</p><p>The ScotlandIS Challenge will see resulting projects taken forward as part of The Scottish Government’s CivTech process, which has an established track record of bringing the public and private sectors together to deliver innovative solutions and create new commercial opportunities.</p><p>The article adds that ScotlandIS and The Scottish Government are looking for ground-breaking ideas and potential solutions to challenges that display technical expertise and results-based thinking.</p><h3>Key priorities</h3><p>The ScotlandIS Challenge is open and inclusive, and encourages firms to consider the following:</p><ul><li>What are the key components of a new digital and data infrastructure and why they are a priority?</li><li>How can the national digital and data assets of Scotland be protected?</li><li>What are the technical solutions to build these components and how can they be applied?</li><li>How could more essential public services be delivered online – be that healthcare, education, or the way we carry out financial transactions? And</li><li>How could The Scottish Government work more closely with the private sector to speed delivery, innovate and maximise benefits and investment to the Scottish economy?</li></ul><p>Jane Morrison-Ross, chief executive of ScotlandIS, told futurescot.com &nbsp;“Through this challenge, Scotland has the opportunity to become a Digital Nation, a true digital democracy. Digital underpins everything and is critical to our economy. The rapid digital transformation of business and society would not have been possible without the infrastructure, products and services created by our digital ecosystem.</p><p>“But we can do more. And we can do it better. We want to harness technology and innovation to evolve current business models, drive efficiencies and productivity gains across the economy. &nbsp;To create a country known for innovation, for an ethical approach to data and an integrated approach to public services. &nbsp;By building the right transformational infrastructure and working collaboratively, we can create a Digital Scotland that is good for the people, the economy, the environment and the government.”</p><p>Once ideas have been submitted, an expert multi-disciplinary team formed from Scottish Government and ScotlandIS will review the results, identify common themes, make the results available across Government, agree the priority actions to take and communicate back the findings and recommendations to the sector.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 21 May 2020 21:30:19 +0000</pubDate></item><item><title><![CDATA[What will life post COVID-19 look like?]]></title><link>https://www.gtconsult.com/blogs/post/life-post-covid19</link><description><![CDATA[It feels like we have been in lockdown forever. Well…we have. It is now time to look at life post COVID-19. I have already pointed out in previous post ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mnYQ5-s2Tq6p0nZ_RuwMZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MjGtnSuRStCjE1p9prxlrA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_KkRnA1fKTxWwYd01fnNv9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cCucLJ8-TxuHVw_Ci_bL0w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>It feels like we have been in lockdown forever. Well…we have.</p><p>It is now time to look at life post COVID-19. I have already pointed out in previous posts that the status quo will be changed forever and that remote business will increase in the coming months.</p><p>What can we look forward to in a post COVID-19 world?</p><h3>Zero impact cyber security.</h3><p>I recently <a href="https://www.businesslive.co.za/bd/companies/telecoms-and-technology/2020-04-20-native-zero-impact-cybersecurity-are-you-prepared-for-the-post-covid-19-landscape/">read an article</a> that points out that, as countries around the world struggle to contain the spread of COVID-19, cybercriminals are wasting no time trying to exploit potential vulnerabilities resulting from the lockdown that has confined most people to working remotely, with relatively less secure devices.</p><p>Cybersecurity company Kaspersky Lab reported a huge spike in network attacks in SA between March 15 and 21, with hackers attacking up to 310,000 devices during that one-week period — an alarming increase over the normal weekly average of between 20,000 and 30,000.</p><p>The article adds that, in a digital world, with billions of people and even more devices connected to the internet via private, public and corporate networks, cybersecurity has become a priority. T-Systems estimates that the world will see 50-billion connected internet of things (IoT) devices by this year.</p><p>In addition, to flatten the pandemic curve, governments globally continue to implement lockdown and social distancing, forcing larger percentages of the workforce to connect remotely. Lockdown will leave a lasting impact on how we work, and requires a complete revision of how corporations view and address cyber risks.</p><h3>Transformative phase</h3><p>The article points out that, before the outbreak, SA was on the brink of a huge transformative phase in cybersecurity. The imminent introduction of the Protection of Personal Information Act (Popia) and cybercrime legislation, as well as a continued digitisation drive from business and the availability of cognitive technologies, are paving the way for corporations to emerge victorious from the chrysalis. There will be greater focus on effective detection and response, while maintaining sophisticated protection in their cybersecurity DNA.</p><p>However, the outbreak greatly accelerated the digital workplace and the lockdown forced companies to enable employees to work remotely. The risk is that many organisations may be left behind in a caterpillar-like approach, while others may remain in the pupal state, overwhelmed by the complexity of this challenge.</p><p>The article adds that those who emerge from the chrysalis and are able to adapt and leverage next-generation technology underpinning advanced cyber defences, will be better prepared to grow sustainably in a digital post-pandemic world.</p><p>Keep in mind that technology and the security controls it enables do not inherently offer protection; cyber resilience requires a holistic and proactive approach, owned at the highest levels of an organisation.</p><p>With data classified and risks assessed relative to the specific business, T-Systems can advise on the appropriate controls and supporting technology to be deployed.</p><h3>Lead from the top</h3><p>The article points out that:</p><ul><li>for security to be effective, the leadership team must support and sponsor all initiatives, demonstrating to the organisation the importance of strong cybersecurity practices;</li><li>a board member should be accountable for ensuring the security of the organisation — this could be a chief information risk officer or chief information security officer; and</li><li>employee cyber education is imperative, and should be entrenched in standard operating policies and training throughout the year.</li></ul><h3>Understand the risks</h3><p>The article adds that, fundamentally, we need to know what we are trying to protect — our corporate IP (for example, for an oil company this would be geological data, refinement processes, etc).</p><p>Thereafter, the risk to this IP can be determined, whether from external attack or insider threat, in all its guises. This helps to determine a defensive value, or the consequence of a loss of this IP — and the size of the security budget can be determined.</p><h3>Assess the present defences</h3><p>The article points out that we need to ask:</p><ul><li>what is the maturity of our current cybersecurity defence? Do the pieces interact without issue, or do we have a number of different vendor solutions operating in isolation?;</li><li>what is the perceived effectiveness of current defences: unless you regularly test the defences, this is probably an unknown. If you are operating discrete vendor solutions, chances are the effectiveness is low; and</li><li>this analysis shows a clear picture of the current security defence landscape, and where the gaps are.</li></ul><h3>Devise a holistic strategy</h3><p>The article points out that, with the current landscape understood, a risk assessment can be built to determine where investment is needed. This allows the construction of a holistic and cohesive security strategy with all elements interacting to provide true threat intelligence and response. This all starts with a simple journey to understand whether the current organisational defences are effective.</p><p>Cyber resilience is much more than a defensive strategy and requires earlier detection and rapid response in the event of a breach. In a data-driven digital economy, with cyberthreats increasing both in frequency and sophistication, SA is no exception and definitely not immune.</p><p>The article adds that the lockdown resulted in more employees working remotely using less secure devices and networks, worsening the already significant threat. This is likely to become the new normal and while the initial focus was on access and productivity, we now have to address long-term sustainability and security aspects.</p><p>Next-generation technology such as security orchestration automation and response, artificial intelligence (AI) and advanced threat-hunting can greatly assist, but less than 15% of corporations in SA has this deployed.</p><p>The article points out that the centre forms part of its managed cyber defence services that consists of:</p><ul><li>SOC/SIEM, testing and vulnerability scanning services;</li><li>network security;</li><li>application and cloud security;</li><li>endpoint security, identity and access management; and</li><li>IoT and industrial control systems security.</li></ul><p>As businesses continue to grapple with and progress through the challenges presented by the COVID-19 crisis, it is not too early to focus beyond the horizon on what the privacy and cybersecurity landscape might look like when the crisis finally passes. Crowell &amp; Moring’s Privacy and Cybersecurity Group seeks to identify likely issues and new norms arising from this crisis in a series of client alerts. We begin by attempting to level-set and understand what the crisis has already wrought in this space and identify issues that will need to be addressed as we slowly inch towards a new reality.</p><h3>Adjust your security stance for an emphasis on endpoints</h3><p><a href="https://www.lexology.com/library/detail.aspx?g=0da7cdf9-1a98-4e7c-8aa7-0a3668e4a1a2">Privacy is also going to be a major watchpoint</a> in the recovery from COVID-19.</p><p>The article points out that security practices for most companies and industries focus first on protecting the company’s perimeter (e.g., with firewalls) and closely monitoring systems within that perimeter for unauthorized access (e.g., network traffic analysis, ingesting log data into SIEM tools, etc.), with endpoint protection a secondary focus because of the security offered by network-level protections, especially with respect to employees who rarely or never work outside of company facilities.</p><p>Increased teleworking, however, has meant that employees – and their laptops, mobile devices and other endpoints – are now connected outside of those secured company systems and networks. Accordingly, companies need to reevaluate and adjust their current posture to account for endpoint security needs in light of the changed use cases for their employees now and going forward.</p><h3>Manage your regulatory environment</h3><p>The article adds that many regulators initially took relatively lenient enforcement stances regarding security and compliance issues related to telework during the early days of COVID-19 response when companies were scrambling to deal with the sudden need for telework.</p><p>The article points out that companies should not assume that regulators will remain lenient; regulators will expect mature security programs to adapt to new circumstances and to revise controls and practices that were implemented during COVID-19 leniency and necessity in order to comply post-COVID-19.</p><p>Companies will need to meet their compliance requirements for any new systems or tools that were adopted in response to COVID-19 circumstances, especially those in heavily regulated industries such as banking, healthcare and defense.</p><h3>Adjust to the new threat environment</h3><p>The article points out that threat actors have been quick to adapt and take advantage of changing habits in response to the COVID-19 pandemic. Tailored spear phishing campaigns that incorporate COVID-19 information are being aggressively conducted, but attackers are also pursuing other vectors. For example, social media scams are targeting employees operating outside of company networks as well as targeting those who may be searching for other employment (e.g., by masking malicious URLs as links to job applications).</p><p>The article adds that ransomware attacks seek to take advantage of changed operations (e.g., less attention to network monitoring as skeleton IT staffs are stretched thin; dispersed staffs leading to slower detection and reaction to malware spread). There are many other examples, with more certain to arise. Companies need to remain diligent in their security practices, but also be prepared to adapt to a rapidly evolving threat environment. Companies should be prepared to implement their Incident Response Plans in a variety of adverse circumstances.</p><h3>Plan around new infrastructure</h3><p>The article points out that, in response to the sudden operational changes during the COVID-19 crisis, many companies rapidly adopted new infrastructure, such as remote access technology, SaaS tools, collaboration and messaging platforms, new video teleconferencing providers, and greater numbers of laptops and mobile devices issued to employees.</p><p>The article adds that when operations inevitably begin transitioning back toward prior norms, companies will need to plan for this new infrastructure and for any changes in information governance and records management practices that the new infrastructure might require. Some of the new infrastructure will be incorporated into standard operations, while elsewhere the interim use of COVID-19- specific infrastructure and adaptations will need to be discontinued.</p><h3>Plan for a return to the office</h3><p>The article points out that, while timelines are still uncertain, at some point employees will return to the office, and companies need to start planning for that now.</p><p>For example, if employees have been using personal devices or third party platforms, how will they be transitioned back to using company systems (and returning to standard operating norms)? How will the company ensure that all company information returns to systems that it controls (and does data need to be deleted from external systems, including mobile devices, printers, and cloud-based collaborative tools)? Can the company ensure that all systems and data that are re-integrated with company systems are free from malware or other malicious elements? Does the company have plans to document and track compliance around these needs?</p><p>In addition, data collected during the crisis may impact who returns to the work environment and when. For example, data concerning an employee’s health vulnerabilities or potential contact with other infected individuals may influence the employer’s decisions regarding that employee’s return to the physical work environment.</p><h3>Plan for the future of COVID-19 data</h3><p>The article adds that most companies have at least some sensitive data related to COVID-19 (e.g., employee diagnoses), and some have gathered more advanced data through steps taken in response to the pandemic, through administrative processes and use of technology.</p><p>For example, employers may be collecting data related to employee health (e.g., temperature scans) or employee behavior (e.g., location tracking, tracing employee interactions, and information about the health of family members) both on-site and outside of company facilities.</p><p>The article points out that, while such activities have understandably occurred in rapid response to companies’ evolving needs in the midst of a crisis, there should be a practical plan in place regarding these data and practices once the crisis passes. Issues for consideration include aligning collection with (and limiting to) specific needs, determining where this COVID-19-specific data is stored (level of security; geographic location), determining who should have current and future access, and data retention plans (alignment with needs; whether different from standard policies; and whether personal data being retained can be aggregated or anonymized to reduce privacy-related risks).</p><p>The article adds that companies will additionally need to ensure that they are complying with applicable federal and state law in their collection, use and retention of this information. At some point, collection will become more limited or end completely, and companies will also need to have a plan in place to wind down their programs.</p><h3>Begin planning for the “unknown new”</h3><p>The article points out that most companies plan for the enhancement, growth, and overall evolution of their IT, data protection and security environments on multi-year cycles – for both technical and people/process needs.</p><p>The article adds that this means that now is the time for companies to look beyond the current crisis and start incorporating the lessons learned from their COVID-19 experiences in terms of planning for newly identified needs, reviewing and updating existing plans, and making informed projections about what is coming over the horizon, including areas such as increased telework, increased focus on endpoint security, changes in the collection of personal information like employee health information, and the increased need for resiliency as business continuity and disaster recovery plans are expanded to include future scenarios with stressors similar to COVID-19.</p><h3>Many questions</h3><p>There will be many questions that need answering post COVID-19. I recently read an amazing interview on silicon.co.uk with Gaidar Magdanurov, Chief Cyber Officer &amp; Chief Operating Officer at Acronis on what to expect in the coming months. <a href="https://www.silicon.co.uk/security/cybersecurity-in-a-post-covid-19-world-338889">Below is an extract of two questions and responses.</a></p><h3>Will cybersecurity, in general, have to change post-COVID-19?</h3><p>The cybersecurity world is adapting to the new situation – multiple remote devices, employees working from remote locations not trained in cybersecurity, work, and entertainment devices in the same network. Thus, we can expect more corporate IT and managed service providers to deploy more cyber protection tools for workers, and design future corporate infrastructure with remote work and protection for remote workers’ devices, in mind.</p><p>With the widespread usage of corporate networks, the “forever day” vulnerabilities concept grows in relevance. Commonly used “zero-day vulnerability” is a vulnerability in the software that was recently discovered and can be used to attack a system or application because there is no patch protecting against that vulnerability is available.</p><p>But with multiple smart devices at home, there is a growing number of “forever day vulnerabilities” – vulnerabilities that will not be fixed by the vendor. There may be older devices, not supported anymore, or vendors not paying attention to the security of simple, smart home devices, while those devices are still can be used to get unauthorized access to the home network.</p><p>Now, with remote workers surrounded by devices that may run vulnerable software, for IT professionals setting up remote workspaces, the concept of “zero trust” network becomes crucial. Instead of trying to protect the network and trusting all devices on the network, “zero trust” requires strict authorization rules for all devices and users. Home networks will have to upgrade from a convenient mode of trust to less comfortable for users “zero trust” mode to protect remotely accessed business data and corporate systems.</p><h3>Has the threat landscape changed because of COVID-19?</h3><p>Based on the Acronis Cyber Protection Operations Center reports, there are two primary trends for the threat landscape related to the COVID-19 outbreak:</p><p>The first trend shows an increase in the overall frequency of attacks targeting users to open malicious links or install malicious software, using Coronavirus and COVID-19 related keywords. Attackers send emails on behalf of government agencies or healthcare providers, using the interest to the subject and forcing an emotional response from users to deploy malware known for a long time.</p><p>Attackers build websites using keywords related to the pandemic; they build fake dashboards with information about the infection statistics –to force users to download and install malicious software. For instance, we see attackers distributing well-known malware like Agent Tesla password-stealing tool, NetWare remote access trojan, or LokiBot trojan.</p><p>The second trend presents a growing number of attacks targeting remote workplaces and home network infrastructure. Starting from the attacks on unprotected and unpatched devices, exploiting existing vulnerabilities to install malicious software on users’ systems, to network traffic intercepts to steal users’ passwords and other sensitive information, and attacks on network domain name servers to redirect users’ requests to the legitimate website to phishing mirrors.</p><p>It is worth highlighting that attackers also go after tools for remote work gaining popularity. For instance, recently, there were lots of security issues reported in the popular videoconferencing software Zoom, as the userbase of the software grows. Users usually don’t expect that the tool they use for video calls may bring danger to their system. Still, those types of tools open a wide variety of attack opportunities –message injections, remote control hijacking, hijacking of conference sessions, intercepts of text chats and video streams, redirect of users to malicious web addresses.</p><p>It is also important to remember that getting access to a work device from the home network may be possible by attacking other devices and other users. Therefore, family members, and especially children, are getting into crosshair of the attackers, using social engineering to deliver malicious software to their home network.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 18 May 2020 18:01:00 +0000</pubDate></item><item><title><![CDATA[Cyber-security during COVID-19 and beyond is a scary landscape]]></title><link>https://www.gtconsult.com/blogs/post/cyber-security-during-covid</link><description><![CDATA[Even before COVID-19, cyber-security was a major global issue. The reaction to the cyber threat was mixed. Some companies saw the urgency of the situat ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_e1SH3BKdTuSwvXiC6M25EQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xGBAbP2VQnOwUepqtpfy2Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_hIM3iNuEQNqWMXd4v8gClw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_e24VswsgQO2sNzZ_sXSUhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>Even before COVID-19, cyber-security was a major global issue.</p><p>The reaction to the cyber threat was mixed. Some companies saw the urgency of the situation and bit the bullet spending significant capital on cyber resilience, other companies questioned the urgency of the situation adopting a wait-and-see approach as to whether the threat will impact them, some companies ignored the treat altogether hoping that it will eventually disappear.</p><p>The companies that were not fully invested in the severity of the threat eventually came around and addressed their cyber security weak points. Then COVID-19 came around and introduced a whole new threat landscape which is causing major issues in the industry.</p><h3>A new enemy</h3><p>I recently read an <a href="https://www.ft.com/content/cae7905e-ced7-4562-b093-1ab58a557ff4">article on forbes.com</a> which pointed out that there is a new enemy that companies need to go to battle against.</p><p>The article points out that as cyber criminals and hackers ramp up their attacks on businesses amid coronavirus-related disruption, companies are also facing another equally grave security threat: their own employees.</p><p>Firms are increasingly turning to Big Brother-style surveillance tools to stop staff from leaking or stealing sensitive data, as millions work away from the watchful eyes of their bosses and waves of job cuts leave some workers disgruntled.</p><p>A brisk market has sprung up for cyber security groups that wield machine learning and analytics to crunch data on employees’ activity and proactively flag worrying behaviours.</p><p>“We’re seeing people say, ‘I need better visibility into what my employees are doing with all of our data at home’,” Joe Payne, Chief Executive of cloud security group Code42, told Forbes. Code42 examines factors including when an employee typically works, what files they access and how much data they download.</p><p>“Employers can ask, if we have 10,000 employees, can you tell us who the most high-risk people are?” Payne told Forbes, adding that his company was handling a rise in cases of data theft among clients.</p><h3>Insider threats</h3><p>The Forbes article points out that, according to Mordor Intelligence, the $1.2bn data loss prevention market is set to balloon to $3.8bn by 2025 as many businesses migrate their data to the cloud.</p><p>So-called insider threats encompass employees unintentionally sharing private data outside of workplace networks, but also the deliberate stealing of data, typically motivated by financial opportunity or a grudge against an employer. Rarer, but a growing issue, is intellectual property theft and espionage on behalf of foreign governments.</p><p>The article adds that already more than a third of all data breaches involve internal actors, according to a 2019 Verizon analysis of more than 40,000 incidents. At an exclusive meeting of top corporate cyber security heads at RSA, one of the largest cyber security conferences earlier this year, delegates labelled insider threats as their number one concern, according to one person in attendance — above nation state activity and threats from cyber criminals.</p><p>Traditionally, groups such as McAfee have offered tools that detect and block the exfiltration of sensitive data automatically. But there are also newer groups that seek to proactively alert employers to anomalous activity through behavioural analysis of data — which can involve screenshots and keystroke logging — and then place the onus on those employers to act in a way they see fit.</p><p>Falling under this category, Code42, Teramind, Behavox and InterGuard all told the Financial Times that they were seeing a rise in interest from potential clients under lockdown.</p><p>“There is an increase in people trying to steal intellectual property — reports or valuable HR data, client lists,” Erkin Adylov, Chief Executive of artificial intelligence group Behavox told Forbes.</p><p>Its software analyses 150 data types to produce insights about employees’ behaviour, including using natural language processing of email and workplace chats to assess “employee sentiment”, he said. “Maybe there is uncertainty about the people are going to their job,” Adylov added.</p><p>“The market is moving very fast. I would say it is probably growing at a clip of 100 per cent a year. The demand is outstripping supply,” he said.</p><h3>State adversaries</h3><p>The article points out that the risk of nation states opportunistically grooming employees for cyber espionage purposes is also a growing threat, several experts said. The issue was thrust into the spotlight recently when US officials last year charged two Twitter employees with mining data from the company’s internal systems to send to Saudi Arabia.</p><p>“If I were a nation state actor . . . certainly, this is an opportunity to exploit some realities that exist. This is a heightened environment,” Homayun Yaqub, a Senior Security Strategist at cyber group Forcepoint told Forbes.</p><p>The article adds that executives at Strider Technologies, which wields proprietary data sets and human intelligence to help companies combat economic espionage, said it was seeing more recruitment of foreign spies, particularly by China, take place online under lockdown, rather than at events and conferences. “We’re providing with the capability to respond to that adversary tactic,” said chief executive Greg Levesque.</p><p>Nevertheless, critics argue that the technology is still nascent and further investment is needed to develop a more accurate understanding of what risky patterns of behaviour look like.</p><p>The article points out that, while employers have long been able to legally monitor emails and web activity for signs of external cyber security threats, for some there is a discomfort about the privacy and trust implications of using such tools on staff.</p><p>“It’s intrusive, it’s not very culturally palatable,” former US Army Intelligence Sergeant and former Palantir Executive Greg Barbaccia told Forbes. “To me, the insider threat is a cultural human problem. If someone wants to be malicious. . . you need to solve the human problem.”</p><p>Omer Tene, vice-president of the International Association of Privacy Professionals, said: “Data breaches have been a huge issue. It is understandable why businesses would want to protect against that. I would not be alarmist.</p><p>“But you need to be aware as a business and a technology of the creepy line,” he added. “Are you doing anything. . . unexpected that will trigger backlash?”</p><h3>The first 100 days</h3><p>It seems as if we have lived through a lifetime of risk since the beginning of COVID-19. A <a href="https://www.forbes.com/sites/emmawoollacott/2020/05/05/exclusive-cybersecurity-and-covid-19the-first-100-days/#5d40d5bf39d5">well written Forbes article </a>pointed out what happened during the first 100 days of the crisis.</p><p>The article points out that, with cybercrime accelerating as COVID-19 spreads, manufacturing and retail organisations are seeing the most attacks.</p><p>In a report to be released today that was exclusively provided to the author, security firm Mimecast examines the first 100 days of the crisis and the pattern of scams that has unfolded.</p><h3>Opportunistic detections</h3><p>The article adds that between January and March, says the firm, spam and opportunistic detections increased by 26.3%, while impersonation was up 30.3%, malware by 35.16% and the blocking of URL clicks by 55.8%. Overall, detections were up by a third.</p><p>Criminals have been matching their scams to the news, with detections rocketing, for example, during the week that saw the first reports of COVID-19 infections in the UK, Italy, and Spain.</p><p>The article points out that, in the week from 24 March, when the UK and Australia locked down, a spoofed WHO 'Safety COVID-19 Awareness' email did the rounds, appearing far more professional, says the team, than previous efforts.</p><h3>Impersonation on the increase</h3><p>The article pints out that impersonation has been steadily increasing for some time, says Mimecast, and has accelerated since the outbreak.</p><p>&quot;Some of the increase undoubtedly reflects the increased opportunity presented by current circumstances, with isolated employees and the potential lack of suitably robust verification processes, which threat actors will hope to heavily exploit under the present lockdown measures in many countries,&quot; Carl Wearn, Head of e-crime at Mimecast told Forbes.</p><p>&quot;Some will reflect that additional move of more traditional crime to be partly or wholly carried out online, adding additional volume.&quot;</p><p>In terms of targets, worryingly, prominent charities related to the current crisis have been subject to domain/website spoofing in recent weeks. However, there has also been significant activity targeting certain industries.</p><p>&quot;By volume, it’s primarily the retail and manufacturing sectors that are being hit most, almost certainly as they are the key verticals still in full swing or even taking on more employees at this time, and of course key to every nation’s response and subsequent recovery at present,&quot; says Wearn.</p><p>&quot;Other sectors of the economy have significantly reduced their workforces or furloughed employees, reducing the available attack surface for threat actors to exploit across other verticals.&quot;</p><h3>Homework</h3><p>The article points out that much of the activity mirrors the waves of people starting to work from home.</p><p>&quot;Many companies had to rush to implement a work from home process with staff that had never had any cyber security awareness training, which obviously had a negative impact,&quot; says Wearn.</p><p>&quot;Later increases are more concerning, as they may well indicate that awareness and adherence to good cyber-hygiene practices wanes over time, if not delivered regularly and maintained.&quot;</p><p>Over the coming weeks, warns Mimecast, targets are likely to change again, as the economic landscape changes.</p><p>&quot;It is important to be vigilant when communicating with third parties and suppliers, as there may well be an increase in the range of businesses folding in the coming months, and criminals may seek to exploit a company’s previous clients or customers,&quot; says Wearn.</p><p>&quot;It is therefore all the more important that organisations train their employees in the best possible way and make them aware of the dangers of phishing.&quot;</p><h3>Focus areas</h3><p>While the threat is very real, there are <a href="https://www.bizcommunity.com/Article/196/661/203678.html">a few actions</a> that companies can take to decrease their risk of dealing with a major cyber issue.</p><ul><li>Ensure that the organisation’s incident response protocols reflect the altered operating conditions and are tested early. Given that most of the security and risk team is now operating in completely different environments and mindsets, incident response plans and protocols might become obsolete or need to be adjusted. Even incidents that would normally be well-managed risks can become bigger issues if the team cannot respond effectively. Begin by reviewing the response team. Ensure that primary, secondary, and alternate roles are filled and that everyone has access to the equipment they need to be effective. This is also a good time to reach out to suppliers to see what hardware they have and whether you can get it to the right people if needed. Review all documentation and conduct a walk-through with a careful watch for any problem areas. If the organisation does not already have a cybersecurity incident response capability, consider using the services of a managed security service provider instead of trying to stand up a new system;</li><li>Ensure that all remote access capabilities are tested and secure and endpoints used by workers are patched. Given how quickly most organisations found themselves moving to remote work, it makes sense that security teams would not have had time to perform basic endpoint hygiene and connectivity performance checks on corporate machines. Further complicating the matter are employees who are working on personal devices. Ensure that corporate laptops have the minimum viable endpoint protection configurations for off-LAN activity. Security and risk teams should also be cautious with access to corporate applications that store mission-critical or personal information from personally owned devices. Where possible, they should confirm whether personal devices have adequate anti-malware capabilities installed and enabled. If not, they should work with the employee and their corporate endpoint protection platform vendor to ensure the device is protected as soon as possible. Other mechanisms such as software-token based multi-factor authentication will also be useful to ensure only authorised personnel have access to corporate applications and information remotely. On a strategic level, make sure someone from the security team is part of the crisis management working group to provide guidance on security concerns and business-risk-appropriate advice; and</li><li>Reinforce the need for remote workers to remain vigilant to socially engineered attacks. The reality is that employees will have more distractions than usual, whether it is having kids at home, worrying about family or concerns about their own health. They are also operating in a different environment and might not be as vigilant about security during a time where cybercriminals will exploit the chaos. Make sure you reach out to senior leaders with examples of target phishing attacks, and alert employees to the escalating cyberthreat environment. Remind them that they must remain focused and hyper-vigilant to suspicious activities. If appropriate, send out reminders every two weeks and remind them of the location of pertinent documents such as remote and mobile working policies, as well as where they can access security awareness training material if they want a refresher. Further, clearly communicate who to contact and what to do if employees suspect a cyberattack.</li></ul><h3>What happens after COVID-19?</h3><p>We have written a few articles on this. To be honest, there is no blueprint that maps out how companies can effectively deal with the cyber threat after COVID-19 is gone, and it will go away.</p><p>Because there is no blueprint, I am always interested in articles that try and provide insights into this growing issues. A<a href="https://www.forbes.com/sites/bobzukis/2020/05/11/flattening-the-curve-on-cybersecurity-risk-after-covid-19/#397d18906532"> recent article of interest</a> was written by Bob Zukis who was writing for forbes.com. He spoke to Kelly Bissell, Global Senior Managing Director at Accenture Security, to get his insights on what he is seeing when it comes to this issue. Below is an extract from that interview.</p><h3>What is the most important cybersecurity lesson corporate leaders are learning through COVID-19?</h3><p>It is really brought into focus how critical it is for organizations to have real-time capability and adaptability of their cybersecurity defences.</p><p>Hackers looked for ways to take advantage of the COVID-19 situation immediately, as organizations had to implement work-from-home mandates in short order at a scale and scope not experienced before. CIOs and CISOs have been on the frontlines of keeping businesses safely functioning during these times.</p><p>It is highlighted both the importance of the real-time nature of effective cybersecurity, how difficult it truly is, and the strengths as well as the weaknesses of many organization’s cybersecurity practices for senior leadership.</p><h3>Has there been a particular insight that sticks out that you have had or seen from a CEO or corporate board during these times?</h3><p>There is a big one that is emerging. It is the connection between what is occurring with the pandemic and how leaders view cybersecurity and their entire digital business system.</p><p>Business leaders are getting a daily lesson in large scale systemic failure during the COVID-19 crisis. They see and read daily how COVID-19 quickly spread around the world and how it is impacting economic, social, political, and their business systems.</p><p>It’s a wake-up call in the complexity that exists throughout the world and a realization that CEOs and directors need to have a deeper understanding of how these complex systems work, including the digital business and the cybersecurity health of the entire organization. &nbsp;</p><h3>Is this helping with their cybersecurity efforts?</h3><p>It is helping significantly in a few ways, but there is one big issue looming.</p><p>It has been an enormous help in getting CEOs, corporate directors, and the entire C-suite a lot more engaged, focused, and informed about what is happening with cybersecurity and their digital business system. As everyone moved to work-from-home models, these issues were at the forefront. Phishing attacks using COVID and threat actors targeting remote work vulnerabilities are widespread.</p><p>I think it is also really helped business leaders understand the enormity of the job that their CIOs and CISOs face and the importance that these functions have on their business. For many organizations, their business runs off their digital capabilities — if the digital capabilities are not available, business cannot operate. These functions have never been more vital or more appreciated by leadership.</p><h3>What is the big issue that is looming?</h3><p>CEO’s and boards need to start to think beyond the pandemic, and some are.</p><p>But that is the issue. Business leaders are seeing how many of their systems failed and beginning to see that they need major structural reform. They do not think going back to what they had makes much sense; they see an opportunity for massive levels of change and improvement. And many are realizing this will not be their choice, it will be dictated by changes in consumer and public behaviour, regulation, competitive shifts, you name it. The external forces of change will force a massive wave of disruption. &nbsp;</p><p>This is an opportunity but also a big risk for them. Many of them know their digital business system is vital to helping them navigate this change.</p><p>But periods of disruption, whether driven by good or bad circumstances, present opportunities for hackers. So that cybersecurity risk gap I talked about earlier between threats and defensibility is not going to close naturally; that curve is not flattening. New cybersecurity risks are going to continue to emerge, and defensive capabilities must continue to try to stay ahead.</p><p>A common question that a lot of board members ask, is “Are we spending the right amount on cybersecurity?” That is the wrong question. The right question is, “What do we need to protect, what’s the value of what we are trying to protect, and how secure is it for what we’re spending?”</p><p>That is their challenge heading into what could be massive waves of systemic change. The business value that their digital business systems drive is only increasing, and the threats to that value are only going to go up. It is a tough curve to flatten in this situation.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 14 May 2020 19:09:31 +0000</pubDate></item><item><title><![CDATA[Soft targets that need assistance]]></title><link>https://www.gtconsult.com/blogs/post/soft-targets-that-need-assistance</link><description><![CDATA[While cyber security has always been an important element of the technology industry, it is becoming ever more pertinent because of the risk landscape ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_T-fhblRhTnCDJV3vxocapA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NO7XKKFsRTy_53ts2r8CZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_x9ft3s5DTrCBWrjyvlartw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_FuumlES3SAC-MfRkBzuORA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>While cyber security has always been an important element of the technology industry, it is becoming ever more pertinent because of the risk landscape that COVID-19 has introduced into the workplace. Unsecured networks and unencrypted devices create a perfect storm in a rather large teacup that cyber criminals look to take advantage of.</p><p>The risk landscape is massive and is often something that employees are not aware of. This means that there is a significant amount of responsibility that rests on the shoulder of IT departments and Chief Information Officers as they try to mitigate what has become a Wild West Scenario in some companies.</p><h3>Soft target</h3><p>In the midst of all of the risk in the industry, Zoom has taken quite a beating and has become the centre of many cyber-attacks.</p><p>An <a href="https://www.zdnet.com/article/cyber-criminals-are-trying-to-exploit-zooms-popularity-to-promote-their-phishing-scams/">article by zdnet.com</a> points out that hackers have targeted remote workers with fake Zoom downloaders. Cyber attackers have bundled a version of the popular video-conferencing software alongside a backdoor - but you can avoid it by being careful about where you download from.</p><p>The article points out that the coronavirus pandemic and resulting lockdowns have led to a rise in remote working, meaning more people are using video-conferencing tools such as Zoom to communicate with colleagues, as well as socialise with friends.</p><h3>Taking advantage</h3><p>The article adds that the need to work from home is something cyber criminals are attempting to take advantage of and now researchers at cybersecurity company TrendMicro have uncovered a new cyber-criminal campaign attempting to exploit the current circumstances to trick remote workers into installing RevCode WebMonitor RAT.</p><p>The researchers stress that the compromised software doesn't come from Zoom's own download centre or any official app stores – rather the downloads come from malicious third-party websites. It's likely that victims are drawn towards the infected downloads by malicious links sent in phishing emails and other messages.</p><p>Once the file is downloaded, it runs an installer that delivers the video-conferencing software, as well as executing the WebMonitor remote access tool.</p><h3>Malicious tool</h3><p>The article points out that the installation of the malicious tool on comprised Windows systems gives attackers a backdoor that allows remote observation of almost any activity that takes place on the machine. That includes keylogging, recording web cam streams and taking screenshots, all things that can be used to steal sensitive personal information.</p><p>However, WebMonitor will terminate itself if executed in a virtual environment – a method of defence in an effort to prevent discovery and examination by security researchers. The RAT has been available on underground forums since mid-2017, but the commodity tool is still proving to be successful.</p><p>The article points out that, in this case, the way in which it's bundled with a version of Zoom is a means of avoiding suspicions from the user – if they installed the software and it didn't work, they might suspect something was wrong.</p><p>But there's still a tell-tale sign that there could be something suspect about the download – the malicious sites push Zoom version 4.6, but now the official Zoom software is running version 5.0, so the version used in the attack is now out of date.</p><p>The article adds that packaging malware inside a downloader for legitimate software is a regular tactic for cyber criminals and Zoom is far from the only application that has been used – but attackers are increasingly turning to it because of how popular it has become in recent months.</p><p>The best way users can avoid falling victim to this kind of attack is by only downloading installers from official sources – and if you are sent a link to download an app, it's best to visit the official website and download it yourself.</p><h3>Rising popularity</h3><p>We need to come to terms with the fact that, at the end of the day, people are lazy and will naturally gravitate towards an easy to use online tool more than they will gravitate towards using an application like Skype or Microsoft Teams despite the fact that the latter applications have better security features. &nbsp;This, and the fact that employees still have to attend meetings – virtual or not – has contributed towards the rising popularity of Zoom.</p><p><a href="https://www.zdnet.com/article/cyber-criminals-are-trying-to-exploit-zooms-popularity-to-promote-their-phishing-scams/">Cyber criminals are trying to trick Zoom users</a> as the video-conferencing platform surges in popularity as a result of the coronavirus pandemic forcing people to work – and socialise – remotely.</p><p>March saw the number of daily Zoom meeting participants reach over 200 million, compared to 10 million in December, as people turn to the platform as a means of helping to adjust to life during the COVID-19 outbreak. In many cases, it's being used by people who are working remotely for the first time.</p><p>But Zoom's sudden growth in popularity hasn't gone unnoticed and cyber criminals are increasingly targeting users of the platform.</p><h3>Increased domains</h3><p>The article points out that, according to data from cybersecurity company BrandShield, the number of domains containing the world 'Zoom' hugely increased during March, with hundreds appearing every day by the end of the month. As many as 2,200 new 'Zoom' domains were registered in March alone, taking the total to over 3 300.</p><p>Researchers note that almost a third of these new websites are attached to an email server, which points towards the possibility that they're being used in phishing attacks to harvest login credentials from unwary users.</p><p>With remote workers expecting to be sent invites to Zoom conference calls, it's providing opportunities for attackers to send phishing emails containing links to phoney login pages that aim to steal the usernames and passwords entered – something that attackers could exploit to gain access to corporate accounts and to conduct further attacks.</p><p>&quot;With global businesses big and small becoming increasingly reliant on video-conferencing facilities like Zoom, sadly, cybercriminals are trying to capitalise,&quot; Yoav Kren, CEO of BrandShield told ZDNET.</p><p>&quot;Businesses need to educate their employees quickly about the risks they might face, and what to look out for. The cost of successful phishing attacks is bad for a company's balance sheet in the best of times, but at the moment it could be fatal.&quot;</p><h3>Common usage</h3><p>The article points out that COVID-19 has become a key lure used in cyberattacks; not only are attackers using fake domains, but the subject has become highly common in phishing attacks. Messages claiming to be from healthcare professionals, logistics providers and others are being used in efforts to steal financial information, install malware and to commit other cyberattacks.</p><p>The article adds that the UK's National Cyber Security Centre (NCSC) has previously warned that, as the coronavirus outbreak intensifies, the volume of attacks looking to exploit it will increase and has offered advice on how to spot and deal with suspicious emails.</p><h3>Fighting back</h3><p>UK authorities are not just standing by and letting cyber criminals run rampant. <a href="https://www.zdnet.com/article/2000-coronavirus-scammers-taken-offline-in-major-phishing-crackdown/">An article by ZDNET</a> points out that 2 000 coronavirus scammers taken offline in major phishing crackdown.</p><p>As the number of cyber criminals targeting remote workers grows, the National Cyber Security Centre (NCSC) has kicked off a new effort to encourage people to report suspicious emails in an attempt to crack down on fraudsters and phishing scams.</p><p>The article added that this has led to record numbers of organisations requiring people to work from home – and in many cases, those employees haven't had any previous experience of working remotely and could be unaware of some of the potential security risks.</p><p>Cyber criminals have been quick to pick up on this, with a string of attacks designed to exploit confusion around the sudden shift to home working to help steal passwords and login details or steal sensitive corporate information.</p><h3>Reporting service</h3><p>The article points out that now the NCSC, along with the Home Office, the Cabinet Office, the Department for Digital, Culture, Media and Sport (DCMS) and the City of London Police, has launched a 'Suspicious email reporting service' for members of the public to alert the authorities to potential cyberattacks – whether they're coronavirus-themed scams or something else.</p><p>If the message does contain suspicious links or addresses, then the NCSC says it will be taken down. The data will also be analysed to try to identify patterns and more quickly takedown new scam websites.</p><p>The article adds that this new initiative aims to build on the existing takedown services, which have already removed more than 2,000 online scams related to coronavirus in the last month, including 471 fake online shops selling fraudulent coronavirus-related items, 555 malware distribution sites, 200 phishing sites and 832 advance-fee frauds, where a large sum of money is promised in return for a set-up payment.</p><p>&quot;Technology is helping us cope with the coronavirus crisis and will play a role helping us out of it – but that means cybersecurity is more important than ever,&quot; NCSC Chief Executive Officer Ciaran Martin told ZDNET.</p><p>&quot;That's why we have created a new national reporting service for suspicious emails – and if they link to malicious content, it will be taken down or blocked. By forwarding messages to us, you will be protecting the UK from email scams and cybercrime.&quot;</p><p>&quot;As we all stay indoors and spend more time online there is more opportunity for criminals to try and trick people into parting with their money,&quot; said Commander Karen Baxter of City of London Police.</p><p>&quot;Law enforcement are working closely with government to ensure the public, and businesses, are as well-equipped as possible to fight online harms.&quot;</p><h3>Stay cyber aware</h3><p>The article points out that the email-reporting service has been launched in conjunction with a campaign that encourages people to stay cyber aware and make it as difficult as possible for criminals to steal and use personal or corporate information from home workers. The six tips – detailed in full on the NCSC website – are:</p><ul><li>turn on two-factor authentication for important accounts;</li><li>protect important accounts using a password of three random words,</li><li>create a separate password that you only use for your main email account;</li><li>update the software and apps on your devices regularly (ideally set to 'automatically update');</li><li>save your passwords in your browser; and</li><li>to protect yourself from being held to ransom, back up important data.</li></ul><h3>Personal security is important too</h3><p>One thing that COVID-19 has not changed is the debate between lawmakers and techies around end-to-end encryption.</p><p>The <a href="https://www.forbes.com/sites/zakdoffman/2020/05/02/whatsapp-suddenly-gets-two-powerful-security-surprises-heres-why-this-matters/#5d4c426640b6">article points out</a> that has not deferred the emotive debate between lawmakers and the technology industry over the future of end-to-end encryption. Governments led by the U.S., U.K. and Australia are battling the industry to open up “warrant-proof” encryption to law enforcement agencies. The industry argues this will weaken security for all users around the world.</p><p>The article adds that WhatsApp has proven the most willing, alongside parent Facebook, to fight for encryption in the courts. And so the platform will be massively buoyed by two surprise boosts this week. And that is equally important for the 2 billion users who rely on the platform to secure their messaging. On the assumption you’re among that number, this should really matter to you.</p><h3>EARN-IT bill</h3><p>The article points out that while this debate has been raging for a year, the current “EARN-IT’ bill working its way through the U.S. legislative process is the biggest test yet for the survival of end-to-end encryption in its current form. In short, this would enforce best practices on the industry to “prevent, reduce and respond to” illicit material. There is no way they can do that without breaking their own encryption.</p><p>Once the platforms introduce backdoors, those arguing against such a move say, bad guys will inevitably steal the keys. Lawmakers have been clever. No mention of backdoors at all in the proposed legislation or the need to break encryption. If you transmit illegal or dangerous content, they argue, you will be held responsible. You decide how to do that. Clearly there are no options to some form of backdoor.</p><p>The article adds that EFF describes this as “a major threat,” warning that “the privacy and security of all users will suffer if U.S. law enforcement achieves its dream of breaking encryption.” And while all major tech platforms deploying end-to-end encryption argue against weakening their security, Facebook has become the champion-in-chief fighting against government moves, supported by Apple and others.</p><p>Most Facebook content is not actually end-to-end encrypted, but it owns WhatsApp which is and has been for many years. WhatsApp popularized this level of security, and now carries more end-to-end encrypted messages than anyone else. The platform confirmed this week that it will continue to fight government attempts to change its security in the courts, ensuring that user security is protected.</p><p>The article adds that this confirmation came as parent, Facebook, took to the courts in its fight against Israel’s NSO, which it alleges hacked its users, planting spyware on the devices of select targets through WhatsApp. The irony here, of course, is that the security of those users was breached despite end-to-end encryption being in place. WhatsApp has patched several security vulnerabilities in recent months. This was one.</p><h3>Nasty surprise</h3><p>The article points out that the first surprise for WhatsApp came during the release of documents as part of those court proceedings. It transpires that FBI Director, Christopher Wray, once argued in favour of WhatsApp’s security when, as a partner with the firm King &amp; Spalding, he “was hired to ‘analyze and protect’ WhatsApp’s software from a Justice Department effort to weaken its encryption in order to conduct wiretap.” The case was unrelated to this current one, but Wray’s name came up when Facebook was arguing for a conflict as regards King &amp; Spalding’s involvement.</p><p>The article adds that the FBI has pointed out that as a lawyer, Wray was hired to advocate for his clients, not to proffer his own opinions. But, even so, the optics are awkward, given that Wray is now a strong advocate of mandated government backdoors. And in that same vein, there has been another surprising twist in favour of end-to-end encryption in the last few days from an unlikely source.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 11 May 2020 22:28:47 +0000</pubDate></item><item><title><![CDATA[The global state of cybersecurity health.]]></title><link>https://www.gtconsult.com/blogs/post/global-state-cybersecurity-health</link><description><![CDATA[There is a lot of news in the industry about how cyber security is running rampant during the different quarantine scenarios that the world is current ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_MJQQLGxSQbKJw6qKuWUegQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wTZIifwbRV6X_lGGXQxYPQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__TO5P-56QWO2ZNof0U440g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tEEvDBbTQ5i-baDu1IPR6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>There is a lot of news in the industry about how cyber security is running rampant during the different quarantine scenarios that the world is currently facing.</p><p>Its quite scary if you think of it. As if worrying about the health of your family, and your ability to provide for them if you are unable to do your job, is not enough, there is the additional worry about having to be on the lookout for cyber criminals at every turn who are looking to take advantage of vulnerable situations.</p><h3>COVID-19 Impact</h3><p>The <a href="https://www.itweb.co.za/content/mYZRXv9aN69vOgA8">ITWeb article</a> points out that a recent study by Check Point has revealed that 71% of security professionals reported an increase in security threats or attacks since the beginning of the coronavirus outbreak.</p><p>The study, conducted for Check Point by Dimensional Research, surveyed 411 IT and security professions, all from organisations with more than 500 employees, and was aimed at examining the severity of impact coronavirus has had on enterprise security.</p><p>The article adds that phishing attempts were cited as the leading threats by 55% of respondents, followed by malicious Web sites claiming to offer information or advice about the pandemic (32%).</p><p>Increases in malware came in at 28% and ransomware at 19%.</p><p>The ITWeb article points out that, according to Check Point, the findings highlight that the rapid changes to enterprise working practices, and broader concerns about the pandemic, are being taken advantage of by bad actors as they ramp up their efforts, creating a slew of new challenges for security practitioners.</p><h3>Managing remote work</h3><p>The article points out that, according to the study, 95% of respondents said they are facing added IT security issues due to the spread of COVID-19. The top three challenges were revealed as the provision of secure remote access for employees (56%), the need for remote access scalable solutions (55%), and that employees working from home were using shadow IT (47%).</p><p>In addition, 61% of respondents were concerned about the security risks of having to make rapid changes to enable remote working. Another 55% felt that remote access security needed improving, and 49% are concerned about the need to scale-up endpoint security.</p><h3>Dodgy domains</h3><p>The article adds that the survey results also showed that Coronavirus-related domains are 50% more likely to be malicious than other domains registered since January this year, and the average number of new domains registered in the three weeks from the end of February was nearly 10 times more than the average number found in previous weeks.</p><p>The security giant also said it detected approximately 2 600 coronavirus-related cyber attacks each day, on average, with a peak of 5 000 on 28 March. More than 30 103 new coronavirus-related domains have been registered in last two weeks alone, 131 of which are malicious, and 2 777 considered suspicious. “Over 51 000 coronavirus-related domains have been registered since the start of the coronavirus pandemic.”</p><p>Similarly, Check Point’s researchers have discovered several ‘coronavirus specials’ advertised by hackers through the dark Web, with ‘COVID-19’ or ‘coronavirus’ being used as discount codes for out-of-the-box malware.</p><h3>Capitalising on trends</h3><p>Check Point’s regional director for Africa, Pankaj Bhula, told ITWeb that malefactors will always try and capitalise on the latest trends to increase their chances of a successful attack, and the COVID-19 pandemic has caused a ‘perfect storm’ of global catastrophe, combined with significant changes due to working from home, and the technologies needed to do so.</p><p>“This has meant a significant increase in the attack surface of many organisations, which is compromising their security postures. To ensure security and business continuity in this rapidly evolving situation, organisations need to protect themselves with a holistic, end-to-end security architecture. This means ensuring accessible and reliable connections between corporate networks and remote devices 24/7, promoting collaboration and productivity between teams, networks and offices, and deploying robust protection against advanced threats and cyber crime techniques at all points on the enterprise network fabric.”</p><h3>Zoom problems</h3><p>Remote working tool Zoom has also come under the spotlight, as many organisations rely on it to facilitate their workforce working from home.</p><p>The ITWeb article points out that Check Point has noted a spike in the number of “Zoom” domains registered and has uncovered malicious “Zoom” files targeting remote workers. The company documented 1 700 new “Zoom” domains registered since the advent of the pandemic, 25% of which were registered over the last week, and has deemed 70 domains as suspicious.</p><p>Compounding the problem, in January this year, the company published a report showing that Zoom contains a security bug. The research illustrated how a hacker could eavesdrop into Zoom calls by generating and guessing random numbers allocated to Zoom conference URLs. Zoom was subsequently forced to fix the security breach and change some of its security features, including mandating scheduled meetings to automatically be protected by a password.</p><h3>Staying safe</h3><p>The article adds that, according to Check Point, there are several steps businesses can do to stay safe.</p><p>Firstly, it advises taking a practical approach to securing remote workers by installing VPN software and endpoint threat prevention.</p><p>Next, it says to educate employees about the risks of spam and phishing e-mails.</p><p>Finally, the company advises learning to identify fake Web sites and better understanding how fake Web sites are used to trick users into sharing their private information.</p><h3>Major watchpoint</h3><p>The US is a country that is currently under the spotlight a lot.</p><p>Not only was the country delayed in its response to the COVID-19 response, the country is also in an election year. This is big news for cyber criminals as a lot of campaigning and voting gets done electronically.</p><p>An <a href="https://securityboulevard.com/2020/04/how-cyber-secure-is-your-state/">article by Security Boulevard</a> points out that even the most cyber secure states didn’t score above a C average, which means there’s more work to be done</p><p>The article points out that security and IT managers all over the globe have had to scramble during the last month to rearrange workforces into largely remote office setups amid the COVID-19 pandemic. But even with the best tools in place, end users still face severe cyber risks as hackers have upped their game to take advantage of pandemic chaos. And a new study finds user awareness continues to be severely lacking, cautioning security managers to be on guard more than ever before.</p><h3>User trends</h3><p>The article points out that Webroot’s fourth annual ranking of U.S. states based on consumer security behaviour looks at 2020’s most and least cyber-secure states and the results call out some concerning user trends.</p><p>“The findings of this report are very timely, especially since the COVID-19 pandemic is not stopping hackers,” Webroot Security Analyst Tyler Moffitt told Security Boulevard. “Overall, cybercriminals are likely to view this time as an opportunity to gain a higher return and we will only see an increase in attacks. Webroot recently saw that 2% of the 20,000 websites created with ‘COVID’ or ‘Coronavirus’ as part of the name in the past two months were malicious.</p><p>“The need for employees to incorporate best practices and become more aware has never been more important, especially as they work remotely and are not under strict IT supervision,” he added.</p><p>Webroot worked with Wakefield Research to field an online survey to 10,000 U.S. consumers to gauge secure behaviors and habits.</p><p>The least cyber-secure states are:</p><p>- New York;</p><p>- California;</p><p>- Texas;</p><p>- Alabama; and</p><p>- Arkansas.</p><p>The most cyber-secure states are:</p><p>- Nebraska;</p><p>- New Hampshire;</p><p>- Wyoming;</p><p>- Oregon; and</p><p>- New Jersey.</p><p>However, Moffit noted, the cybersecurity in each state was lackluster and no one state scored a particularly impressive grade. There was a mere 15-point difference between the riskiest state (New York, 52%) and least risky state (Nebraska, 67%), he said. No state scored a “C” grade or higher.</p><p>“There is very little difference between the most secure and least secure states, which brings to light the larger need for better cyber hygiene practices and education across the United States.”</p><h3>Thinking and Doing: Two Different Things</h3><p>The Security Boulevard article points out that the report also found that while nearly all (89%) Americans say they’re taking appropriate steps to protect themselves online, there is a general lack of understanding when it comes to cybersecurity. Few Americans met what Webroot determined to be key protection benchmarks, including using anti-virus software, backing up data and keeping social media profiles private. The average American scored a 58% on the Webroot index, which was an “F” grade. Only 11% scored 90%.</p><p>The article adds that poor hygiene and a lack of understanding about risks also were prevalent in the findings. Almost half (49%) of Americans use the same password across multiple accounts and only 37% keep their social medial accounts private. And while 83% of Americans said they use anti-virus software and regularly back up their data (80%), only half know if their backup is in an encrypted format and only 18% back up their data online and offline. A majority of Americans say they are familiar with malware (78%) and phishing scams (68%), but only about a third feel confident they can explain the concept of malware or phishing.</p><p>“A large component of the high levels of consumer cybersecurity misunderstanding is related to a lack of education but also Americans having unwarranted overconfidence when it comes to the steps they are taking to protect themselves,” said Moffit.</p><h3>Mixing Work Devices With Personal Use</h3><p>The article points out that Americans are also using work-issued devices for personal use, which typically rubs up against policy. More than half (55%) of Americans said they routinely use their employer-provided work device for personal use.</p><p>Over one-third (38%) consider an employer-provided work device to be their “primary” device for use at home. Almost half (48%) have never looked into the security of their work devices, and only a third have taken any steps to improve its security.</p><h3>Education, Extra Support More Critical Than Ever</h3><p>The article adds that, regardless of which state your employees are located in, now is not the time to scale back on education and awareness amid a difficult a stressful and unusual time for American workers. Moffit said instead, companies need to take more steps to better prepare their employees and provide cybersecurity education.</p><p>“By providing information and training on best practices, employees are less likely to fall for a cybersecurity threat and are likely to carry these practices over into their personal lives as well,” he said. “It is important for CISOs and security managers to remember that not all employees are versed in security practices and by providing tools to employees to protect themselves and their companies they are better prepared should a cybersecurity threat arise.”</p><h3>Common purpose</h3><p>What the COVID-19 crisis has achieved is that it has unified the world in its response to cybercrime. There seems to be a common purpose when it comes to approaching the problem.</p><p>The article points out that the global pandemic caused by COVID-19 has generated a new kind of demand for intelligence, which Canada must confront. Security and intelligence agencies around the world are being thrust onto the front lines of the COVID-19 battle. Their mission is two-fold: monitoring the global tidal wave of COVID-19, and combating misinformation, fraud and even deliberate foreign interference that circulates domestically. This is a tall order for any intelligence system, made even taller for Canada by the fact that our security and intelligence agencies have never seen health emergency reporting as part of their core mandate, despite a plan laid down in the National Security Policy announced after SARS that unfortunately went nowhere.</p><p>The article adds that the idea of a “health intelligence” mission may seem novel and strange in a Canadian context, but it has been on the minds of allied intelligence agencies for many years. Britain published, starting in 2010, a national risk registry based on classified intelligence assessments, which listed global pandemics as the number one risk to civil society. In response to the Ebola outbreak in West Africa between 2014 and 2016, US intelligence devoted significant resources to tracking the spread of the virus, fearing that it would leap beyond the region. The most recent US “World-Wide Threat Assessment,” a coordinated product of the US intelligence community presented on an annual basis to Congress, had this to say:</p><h3>US vulnerability</h3><p>The article points out that &nbsp;the United States and the world will remain vulnerable to the next flu pandemic or large-scale outbreak of a contagious disease that could lead to massive rates of death and disability, severely affect the world economy, strain international resources, and increase calls on the United States for support. Although the international community has made tenuous improvements to global health security, these gains may be inadequate to address the challenge of what we anticipate will be more frequent outbreaks of infectious diseases because of rapid unplanned urbanization, prolonged humanitarian crises, human incursion into previously unsettled land, expansion of international travel and trade, and regional climate change.</p><p>Prescience and readiness are two different things, as COVID-19 has demonstrated globally.</p><p>The article points out that the intelligence mission to globally monitor COVID-19 can utilize a variety of collection tools. These include communications intercepts, satellite imagery, diplomatic reporting, open source information and even traditional spying (HUMINT). Intelligence agencies have also for many years been utilizing big data sets (metadata) for leads in counter-terrorism investigations. That capability can be turned to global health intelligence reporting.</p><h3>Intelligence sharing with allies</h3><p>The article points out that not every country possesses all of these tools. Canada certainly does not. But it possesses many and has valuable access to intelligence from allies, thanks to our involvement in the “Five Eyes” intelligence system, which links Canada, the US, Britain, Australia and New Zealand. Canada has a specialized intelligence agency, the Communications Security Establishment, that could monitor message traffic in pandemic hot spots for clues as to decision-making involving COVID-19. It has a capable diplomatic reporting system in many countries of the world, which has been improved in the post 9/11 period by the creation of the Global Security Reporting Program (GSRP), involving officers attached to embassies and missions whose sole job it is to do open source analysis and reporting on security issues. The GSRP could be repositioned to include health intelligence.</p><p>As part of the diplomatic reporting system we also have defence attachés, whose job it is to liaise with host country military establishments. They could also be a valuable part of a health intelligence network, as could our trade commissioner service, and migration control officers posted overseas. The Canadian Security Intelligence Service maintains an expanded roster of liaison officers abroad, also attached to Canadian embassies and missions. They are contact points with host country security services. The Department of National Defence has a small medical intelligence unit, normally utilized to assist in determining health risk in overseas military deployments, but whose expertise could be pressed into service on COVID-19.</p><p>The article adds that Canada doesn’t have a fleet of spy satellites. We also don’t have a real secret intelligence service operating abroad as a counterpart to the CIA or MI6. Even though Canada has expanded its intelligence system significantly since the 9/11 attacks, we don’t have an “all-source” intelligence capacity or anything like full coverage of the globe, but this is where intelligence cooperation and sharing with allies can play a big part.</p><p>More health intelligence collection on its own will not serve a purpose unless it is subjected to analysis and made part of a regular stream of reporting to key decision-makers, who must be prepared to pay attention to it. Canada has a substantial, if de-centralized, intelligence assessment capacity with units at the Canadian Security Intelligence Service (CSIS), the Privy Council Office, the Department of National Defence, Global Affairs Canada and elsewhere, and has built stronger intelligence coordination and reporting channels, including for senior decision-makers up to the Prime Minister. All this machinery could be used to deal with a flow of health intelligence. But, like the collection system, it would have to be repurposed in a nimble way and would need to be able to access scientific and health expertise, not currently in its repertoire.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 16 Apr 2020 21:18:56 +0000</pubDate></item><item><title><![CDATA[The GTconsult Easter Egg Hunt.]]></title><link>https://www.gtconsult.com/blogs/post/gtconsult-easter-egg</link><description><![CDATA[So its that time of year, that magical time, when a little bunny hops around the world dropping off eggs for children in their back yard, or this year ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_h2FaOlYkQGu32KXylob2JA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0-oAgkuSQXWIo4xWVGZGLA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PwpsfpT6QGeVaniqSWJEGQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_oRQMxyELRw-6IP2_hoPd8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oRQMxyELRw-6IP2_hoPd8w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p>So its that time of year, that magical time, when a little bunny hops around the world dropping off eggs for children in their back yard, or this year being quite inventive, somewhere inside the house (Assuming you remembered to get eggs before lock down).</p><p>But being in lock down means that all your workers are working from home, some will be new to technology like Teams and SharePoint and what a better way to get them acquainted than an easter egg hunt through your SharePoint site. &nbsp;But how – how do we add something that people have to look for and is interactive with a bit of fun. &nbsp;So what I have done is given you two examples of how you can engage with your staff for learning either by making them search for something throughout your SharePoint site or in the second scenario creating a clue for them to figure out and spell out a word to show the surprise easter egg.</p><h3>Option 1) Hiding an easter egg</h3><p>We start off with choosing a page to hide an easter egg on, now we sometimes do this on Intranets just as a calling card, but you can do it for your staff. &nbsp;It works great on the modern experience of O365 but can be done with the classic experience too.</p><ul><li>1) Step on is adding some code – for this we use a Modern Script Editor Webpart – if you don’t have this on your site you will need to install it – the code is<a href="https://github.com/SharePoint/sp-dev-fx-webparts/tree/master/samples/react-script-editor"><strong> here</strong></a> and if you need some help on how to use this Khoa Quach has a great blog to follow <a href="https://medium.com/niftit-sharepoint-blog/add-the-script-editor-webpart-back-to-sharepoint-modern-experience-688a7b7208e4."><strong>here</strong></a><strong>. </strong>As mentioned you can do this in the classic site using the Script Editor webpart that is part and parcel of SharePoint</li><li>2) The next step is adding in your code – we start with our Style – we create a style for an element called easteregg – what is important here is the position being Absolute meaning it can float over other items in the site, you can choose to make this an image, make it a div, make it invisible (we normally do this for fun) – but make sure when you mouse over the element the cursor changes to a Pointer (i.e. a hand showing a link). &nbsp;In our example we made this a small red block of 10px by 10px to make it quite visible for the demo. Very NB here is a z-index – this tells you what layer your div should be at – if your div is positioned lower in the page, then other items will be placed on top of it, so make sure you choose a high z-index number, I choose 10000000.</li><li>3) We now put in the code. &nbsp;Now here you can get as creative as you want, you can show an image or a message or provide a voucher – whatever it is that you want to drive. &nbsp;What is important is we have a DIV named “easteregg” and a function that is called when its clicked. &nbsp;The function does all the work – in our case a simple alert message!</li><li>4) Publish the page – You select publish and your easter egg should now be hidden in your page</li><li>5) Test the easter egg – Yes always test first – click on the easter egg and make sure it produces what you expect – in out case the alert below</li><li>6) We are now ready to market – so create an email about the easter egg hunt and be specific about what people are looking for – whether it’s a red dot, a picture of an egg etc and then let them loose on the site.</li></ul><p><img src="/imported-files/Picture-1-2.png"><img src="/imported-files/Picture-2-1.png"><img src="/imported-files/Picture-3.png"><img src="/imported-files/Picture-4.png"><img src="/imported-files/Picture-5.png"></p><h3>Option 2) An easter egg clue hunt</h3><p>In this scenario it requires a bit more admin. &nbsp;Here you want people to go to a page, get instructions and then go and find the clues to spell out a work. &nbsp;So come up with a term like “teams” – create a list of clues that people need to answer and then use the first letter to create the word… or somehow lead them to the answer.</p><p>Now we will implement it – in this case we going to use a great plugin called Egg.js - <a href="http://thatmikeflynn.com/egg.js/">http://thatmikeflynn.com/egg.js/</a></p><ul><li>1) We start again with a Script Editor webpart and include a reference to the JQuery, egg.js library and the code we need that includes a Style and a function called egg- see below.</li><li>2) The information you put into a div called eggif is where all the magic happens – this appears when you write “teams”</li><li>3) Test again!</li></ul><p><img src="/imported-files/Picture-6.png"></p><p>4) We Publish the page and voila we have our easter egg</p><p>5) If you type in “teams” – the message / easter egg pops up</p><p>So there you have it, a quick and easy way to create a virtual Easter Egg hunt. &nbsp;This is just some of the fun stuff we get up to here at GTconsult.</p><p>We also have an eBook out there to specifically help individuals work from home. You can get it <a href="https://www.gtconsult.com/working-from-home-ebook">here</a>!</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 09 Apr 2020 20:25:56 +0000</pubDate></item><item><title><![CDATA[Don’t be a victim of invoicing fraud.]]></title><link>https://www.gtconsult.com/blogs/post/invoicing-fraud</link><description><![CDATA[Invoicing fraud is growing at an alarming rate. It occurs when a customer is fraudulently led to believe that a payment needs to be made for goods or ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_M5mcMLsDQYiKUlqXfiSwQg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LiHKhm1PRai-t0U3RXOOWw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_76Qc0WlGRZ2kIveT9cFLdg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_sswoujJVTUGhZjEfzRzSMg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sswoujJVTUGhZjEfzRzSMg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Invoicing fraud is growing at an alarming rate. It occurs when a customer is fraudulently led to believe that a payment needs to be made for goods or a service into the wrong account.</p><p style="text-align:left;">This is done by duping the customer (victim) to change bank details on their system. This can be done telephonically or by email. The latter is the most popular method. The customer believes that they have settled their invoice when in fact they have paid funds into the fraudster’s account.</p><p style="text-align:left;">This type of fraud usually goes unnoticed until the supplier contacts the customer following up on payment of the invoice. The customer duly provides proof of payment only for the supplier to confirm that they have not received the payment.</p><p style="text-align:left;">Despite being innocently duped into doing this, the fact of the matter is that the business is still liable for the invoice by not having adequate systems in place which would have prevented this from happening.</p><p style="text-align:left;">Interpol describes this type of fraud as criminals hacking into email systems or using social engineering tactics to gain information about corporate payment systems. They then deceive company employees into transferring money into their bank account.</p><p style="text-align:left;"><br></p><h3>Real examples.</h3><div><br></div><p style="text-align:left;">A large timber supplier in Pietermaritzburg were victims of invoicing fraud in 2016.</p><p style="text-align:left;">The victim was emailed by a trusted supplier requesting an urgent payment of their invoice and advising the victim of a change of banking details. The victim acknowledged the change of banking details and advised that payment would be made as soon as possible. The victim was sent an invoice amounting to R1.6 million and payment was urgently needed by the supplier.</p><p style="text-align:left;">Several days later, the victim requested the new banking details as payment was due to be made and the supplier sent through the documentation. The victim further emailed the supplier to confirm that banking details and the supplier verified the details.</p><p style="text-align:left;">Several days later the actual supplier contacted the victim querying why there has been a delay in payment. The victim responded saying that the payment was made into the new bank account as requested. The actual supplier then called the victim to explain his email account was hacked weeks earlier and there has not been any change in their banking details.</p><p style="text-align:left;">Upon the realization that the victim has become a victim of invoicing fraud, the victim contacted their bank and requested that the bank stop the funds from being released. Luckily, the bank informed the victim that they are able to stop the funds from being released. The victim sent through new payment instructions and were awaiting a copy swift and they are requesting debit authority from the fraudulent party.</p><p style="text-align:left;">This was an ongoing battle for the victim but thankfully, they were able to recover most of the money from the fraudulent party.</p><p style="text-align:left;"><br></p><h3>How does it happen?</h3><div><br></div><p style="text-align:left;">Fraudsters are using phishing emails to steal usernames and passwords. This allows them to hack your personal or business email accounts. Phishing attacks are getting more difficult to detect as hackers, fraudsters or malicious users are becoming smarter in the way they execute these attacks.</p><p style="text-align:left;">They usually troll and monitor your email account for months or even years until an opportunity to intercept an invoice is presented to them. Once they can see that a large transaction is about to take place, they will spring into action.</p><p style="text-align:left;">The scammers intercept an email, change the bank details on the invoice and send it on for payment. In many cases, they use spoofing to make the email address seem credible and trustworthy. Spoofing changes a letter or domain in the email address to make it appear legitimate. This is often overlooked as users are not made aware to look out for any fraudulent activities.</p><p style="text-align:left;">The recipient pays the invoice thinking it comes from a legitimate source, when in fact the money is paid into the scammer’s account. This often occurs without the recipient even noticing anything out of the ordinary.</p><h3>What are the consequences?</h3><div><br></div><p style="text-align:left;">This is a very tricky situation as no party will want to take responsibility for the fraud. The customer will state the he or she received an invoice with the details originating from the service provider and will be reluctant to want to claim responsibility. The service provider will argue that they will not take responsibility as they did not send the new invoice and have not received the funds.</p><p style="text-align:left;">Troy Chiocchetti of Quattro Finance Group states that the consumer has the responsibility to keep his/her banking details and passwords safe. Banks have an obligation to protect the information of their consumers , provide secure mechanisms for banking and where a fraud has been committed, to mitigate your loss and act swiftly.</p><p style="text-align:left;">Should it fail to do so, it could be responsible to refund the entire amount stolen.</p><p style="text-align:left;">Banks cannot reverse the transaction without the consent of the account holder. Should the beneficiary fail to repay the monies, an action for unjustified enrichment may be brought in civil court for the recovery of the value thereof.</p><h3><br></h3><h3>I have paid the money…</h3><div><br></div><p style="text-align:left;">If you have become a victim of this type of fraud, Interpol recommends you do the following:</p><ul><li style="text-align:left;">Gather all documentation regarding the transaction and emails/invoices received and it is vital to report the incident as soon as possible to local authorities;</li><li style="text-align:left;">You must immediately alert your bank to the fraudulent transaction. The bank should immediately try to re-call the funds; and</li><li style="text-align:left;">Victims must consider consulting a civil lawyer in the country where the money was deposited (country that houses the new beneficiary’s bank account). This might be of help to address the bank in trying to recover the money and/or launch a civil complaint regarding the account holder.</li></ul><h3><br></h3><h3>Mitigate your risks</h3><div><br></div><p style="text-align:left;">We are all aware that prevention is better than a cure. If you can prevent this from happening, you should be doing everything in your power to make sure this never happens to you.</p><p style="text-align:left;">Interpol recommends doing the following:</p><ul><ul><li style="text-align:left;">Protect your corporate systems from hacking attempts.</li><li style="text-align:left;">Use anti-virus software, firewalls and other tools and scan computers and devices regularly to prevent malware infections.</li><li style="text-align:left;">Keep your personal and business computers up to date. Pay attention to security alerts, update security patches, conduct periodic systems checks.</li><li style="text-align:left;">Make sure that your email accounts are well protected and don’t share passwords.</li><li style="text-align:left;">Do not click on attachments or links you are not expecting, even if they have innocuous sounding names (invoice, for example). They often contain malware giving access to monitor your email/computer activities.</li><li style="text-align:left;">Enable spam filters and block all access to suspicious or blacklisted websites.</li><li style="text-align:left;">Be vigilant of suspicious or unexpected ‘urgent’ payment requests or changes</li><li style="text-align:left;">Look carefully at the sender’s email address. Criminals often create an account with a very similar email address to your business partners so keep your eyes peeled!</li><li style="text-align:left;">Spread the word so any colleagues dealing with bank accounts are aware of the scam.</li><li style="text-align:left;">If you receive an email concerning a change of payment method or bank account, contact the payment recipient through another channel (phone) to verify this claim. Do not reply directly to the email.</li><li style="text-align:left;">Verify the authenticity of websites before providing any personal or sensitive information.</li></ul></ul><p style="text-align:left;"><span style="font-weight:600;">&nbsp;&nbsp;&nbsp;&nbsp;GTconsult recommends the following action:</span></p><ul><ul><li style="text-align:left;">Enable multi factor authentication.&nbsp;</li><li style="text-align:left;">Have your banking information verification pack ready and available for all customers;</li><li style="text-align:left;">Make sure you have enabled phone verification;</li><li style="text-align:left;">Setup impossible travel alerts and rules in Office 365 security centre;</li><li style="text-align:left;">Configure alerts and rules for auto forwarders on mailboxes;</li><li style="text-align:left;">Setup SPF, DKIM and DMARC to improve email authenticity.&nbsp;</li></ul></ul><h3><br></h3><h3>Seek professional advice.</h3><p style="text-align:left;">Many companies now offer cyber insurance. Cyber insurance offerings may differ between companies; however, they are mainly focused on covering your computer systems, software and data, and protect you against liability arising from cyberattacks on these asset.</p><p style="text-align:left;">In addition to the attacks listed above, electronic payment transactional fraud is covered by certain insurance providers.</p><p style="text-align:left;">It is worth looking into as this type of fraud and realising that it is on the rise and will only get more sophisticated in the near future.</p><p style="text-align:left;">In addition to having cyber insurance, having a lawyer on hand to assist when you have a breach or if you are facing a fine or civil action is highly recommended.</p><h3><br></h3><h3>Proactive approach</h3><p style="text-align:left;">We recommend that you take a proactive approach and run phishing campaigns. Further, you should educate your staff and be vigilant to prevent this happening to you.</p><p style="text-align:left;">If you educate your staff on what to look for, and how to spot a suspicious email or invoice, you will drastically reduce your vulnerability. We also recommend following Microsoft’s best practices to increase your Office 365 security. We have a guide here on how to can increase your <a href="https://www.gtconsult.com/the-ultimate-guide-to-office-365-security">Office 365 Security here</a>.</p><p style="text-align:left;">Running regular phishing campaigns across your organisation will also show you if your staff are aware of the dangers and where they may need to be further educated.</p><h3><br></h3><h3>References:</h3><p><a href="https://www.interpol.int/en/Crimes/Financial-crime/Financial-crime-don-t-become-a-victim">https://www.interpol.int/en/Crimes/Financial-crime/Financial-crime-don-t-become-a-victim</a></p><p><a href="https://www.interpol.int/en/Crimes/Financial-crime/Business-Email-Compromise-Fraud">https://www.interpol.int/en/Crimes/Financial-crime/Business-Email-Compromise-Fraud</a></p><p><a href="https://www.investec.com/en_gb/focus/fraud/latest-fraud-scam.html">https://www.investec.com/en_gb/focus/fraud/latest-fraud-scam.html</a></p><p><a href="https://www.legalmatch.com/law-library/article/invoice-fraud-attorneys.html">https://www.legalmatch.com/law-library/article/invoice-fraud-attorneys.html</a></p><figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-criminal-defense-lawyer-seth-kretzer"><div class="wp-block-embed__wrapper"> https://kretzerfirm.com/double-invoicing-invoice-fraud-who-is-liable/ </div>
</figure><p><a href="https://www.barclayscorporate.com/insights/fraud-protection/invoice-fraud/">https://www.barclayscorporate.com/insights/fraud-protection/invoice-fraud/</a></p><figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-cpa-the-credit-protection-association"><div class="wp-block-embed__wrapper"> https://cpa.co.uk/15-steps-to-avoid-invoice-fraud/ </div>
</figure><p><a href="https://www.thehartford.com/business-insurance/what-does-business-insurance-cover">https://www.thehartford.com/business-insurance/what-does-business-insurance-cover</a></p><p><a href="https://www.axiscapital.com/insurance/cyber-technology-e-o/cyber">https://www.axiscapital.com/insurance/cyber-technology-e-o/cyber</a></p><p><a href="https://www.kingprice.co.za/cyber-insurance">https://www.kingprice.co.za/cyber-insurance</a></p><p><a href="https://www.thehartford.com/cyber-insurance">https://www.thehartford.com/cyber-insurance</a></p><figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-de-rebus"><div class="wp-block-embed__wrapper"> http://www.derebus.org.za/cyber-liability-insurance/ </div>
</figure><figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-dingley-marshall-inc"><div class="wp-block-embed__wrapper"> https://www.dingleymarshall.co.za/cyber-crime-and-cyber-insurance/ </div>
</figure></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Apr 2020 20:12:54 +0000</pubDate></item><item><title><![CDATA[The 5 Golden Security Rules For Working From Home.]]></title><link>https://www.gtconsult.com/blogs/post/the-5-golden-security-rules</link><description><![CDATA[With the current situation of everyone working from home, it is more important than ever before that we all understand the possibility and danger of b ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_B-1yMObTSE2ykwZmyXZVZg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Tp9IeSIcTwCij-htCe1OIw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YR-9WHquQCS-7f-e1NuK0A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_NwZ3g_KDRqm1KEAdSuVWmA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>With the current situation of everyone working from home, it is more important than ever before that we all understand the possibility and danger of being scammed and phished.</p><p>While in isolation, we are all vulnerable to under-communicating with each other and this leaves room for attackers to start targeting users in various organizations for phishing attacks where they will try to convince you to either provide sensitive information over email, click on a link or open an attachment.</p><p>Even a well-educated user can be convinced to give up sensitive information to the wrong hands if they do not check with their support team to ensure the mail is legitimate.</p><p>The dangers of doing so can lead to Identity theft, loss of personal or corporate data and being blackmailed into paying ransoms starting at <strong>R10,000 on the low end</strong>.</p><p>So with all this in mind, we want you to have the best chances of identifying these kinds of attacks, so we have put together a list of 5 anti-phishing rules to live by.</p><h2>Asking for passwords in an email.</h2><h3>Never send your password in an email</h3><p><strong>THE TRAP:</strong> You receive an urgent email that appears to be from Microsoft asking you to reply with your password because your account is &quot;compromised&quot; or &quot;over quota&quot; or &quot;suspended due to inactivity&quot;.</p><p><strong>YOUR DEFENSE</strong>: Organizations that care about the protection of your information should never ask you to send bank account numbers, ID Numbers, driver's license numbers, health information, or health insurance information via email. Please turn down requests to send this information in an email.</p><h2>Be wary of unexpected emails.</h2><h3>Don't click unexpected links</h3><p><strong>THE TRAP:</strong> You receive an unexpected email that claims to be from the &quot;Help Desk&quot;, “Support Team” or someone you know. It says it's urgent. You must click a link to prevent problems with your account.</p><p><strong>YOUR DEFENSE</strong>: Be skeptical of any email that you aren't expecting. Password thieves may insist that immediate action is necessary and may pretend to be your friend or some other trusted entity. Don't let these tactics trick you into letting down your guard. It is very likely a scam.</p><h2>Be aware of links.</h2><h3>Look out for deceptive links.</h3><p><strong>THE TRAP: </strong>You receive an email telling you to &quot;click here&quot; to verify your account.</p><p><strong>YOUR DEFENSE</strong>: Hover over the link (don't click!), or for a touchscreen, press and hold the link (don't tap!) to reveal the actual URL. (Look in the bottom left corner of the browser window or the hover Tooltip box in Outlook.) Don't click on a link unless it goes to a URL you trust.</p><h2>Always look at the actual URL of a page.</h2><h3>Verify &quot;https://login.microsoftonline.com/&quot; before entering your work Credentials</h3><p><strong>THE TRAP:</strong> You are asked to enter your Microsoft or business password on what looks like the standard Microsoft or business authentication page.</p><p><strong>YOUR DEFENSE:</strong> Always check the actual URL to make sure it starts with &quot;https://login.microsoftonline.com/&quot;. Trusted UCB authentication pages will never have anything phishy BEFORE the first single slash. Fraudulent login screens designed to steal your credentials may LOOK authentic if you're not paying attention to the URL.</p><p><em>Good Link Example:</em> &nbsp;https://login.microsoftonline.com/</p><p><em>Bad Link Example:</em> &nbsp;https://login.microsoftonline.webs.com/</p><p>Also, check for the Extended Validation Certificate in the address bar. &nbsp;Look for a long green bar with a padlock.</p><h2>Something's phishy.</h2><h3>Contact Support</h3><p><strong>THE TRAP:</strong> You receive an email that looks like it's an official company or Microsoft email. You are not sure if this is a phishing attempt.</p><p><strong>YOUR DEFENSE</strong>: Forward the message to your support team. The email can be blocked from your system to prevent others from falling victim to the phishing attack.</p><p>We hope these security rules will help you as you work from home.</p><p>We've put together an awesome eBook to help you work from home. <a href="https://www.gtconsult.com/working-from-home-ebook"><strong>Get it here.</strong></a></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 01 Apr 2020 17:33:08 +0000</pubDate></item></channel></rss>