There were 16,516 Common Vulnerabilities and Exposures (CVEs)1 published in 2018. The time needed to analyze the relative importance of these to your organization would be something like 16,516 alerts times fifteen minutes to read and assess each one, which works out to about 500 days of work. If you decide that your organization is affected by twenty percent of these, that’s 3,304 vulnerabilities times an average of about an hour to patch each one — that will take about 40 days. And how many devices do you have that need this patch deployment? 2
Remember the panicked manufacturer with a progression of computer problems that recalled the proverbial “perfect storm”? Today I’m going to sort those problems out, and recommend ways to help keep those things from happening to you. To refresh, here’s what went on with that manufacturer:
The installed version of their ERP (Enterprise Resource Planning software) was too old to receive application maintenance and support. They hadn’t wanted to interrupt their workflow, and so hadn’t upgraded the ERP in more than five years.
There are plenty of reasons to upgrade from Windows 7 before it reaches its end of life date on January 14, 2020. Chief among them, Microsoft has indicated that, on this date, they will stop releasing security updates for Windows 7. This will have major implications for anyone still running Windows 7, as it will leave them exposed to any known vulnerability indefinitely.
The nature of these vulnerabilities are such that they can have a cascading effect if exploited. For instance, a recently identified vulnerability, designated ‘CVE-2019-0708,’ makes it possible for a malicious party to execute code remotely via Remote Desktop Services. This particular security flaw exists pre-authentication, meaning that it could easily spread from system to system in a similar fashion to how WannaCry malware spread in 2017.
Microsoft has indicated an attacker could “install programs; view, change or delete data; or create new accounts with full user rights.”
Fortunately, Microsoft has released a series of fixes for this particular vulnerability. Starting January 14th, however, there is no guarantee that this will be the case and, except for in the most extreme circumstances, Windows 7 security holes will not be patched by Microsoft.
It is worth noting that Windows 10 is unaffected by this recent vulnerability, making this an excellent example of how upgrading to Microsoft’s latest operating system is the best way to ensure that your computer systems remain secure.
In short, by continuing to run Windows 7 past its end of life date, you could be undermining your entire security investment by effectively leaving the door to your network wide open.
Don’t wait until the last minute. Talk to an IT expert about upgrading to Windows 10 today. Give us a call at 978.562.6077 and selection Option 2. We would be more than happy to help you get the process started.
The 2015 Arkansas murder case that depended on smart-home devices, made the news again as the judge in the civil case upheld his ruling that James Bates is financially liable for the death of Victor Collins. The case against the accused was built on, among other forensics, records from Amazon whose Echo device was installed by the scene of Collins’ death, as well as evidence from a so-called smart meter. The smart meter reported inordinate usage of water around the time of death, which led the police to argue that a bloody patio was hosed down.
Surprised that in the last month, between two small marketing list brokers, more than a billion personal records were found to have been leaked on the internet?1
That data then gets leaked and sold to potentially hold users’ computers or reputation for ransom. Or as in a 2018 hack, of DNA tester, MyHeritage, there is the ability to sell the data to the insurance and mortgage industries, revealing DNA disease susceptibilities, thereby making the user ineligible for coverage or a loan.2
GDPR to the Rescue!
Tuesday, February 5th is Safer Internet Day. Being observed on the first Tuesday in February, what started out as a campaign to raise awareness about Internet safety is now celebrated in over 100 countries worldwide.
With Valentine’s Day just around the corner, many of us will go online for gifts such as flowers, candy, cute stuffed animals, a book, perhaps a gift card to a store or restaurant – whatever the choice may be, will you be shopping securely? Online shopping is very convenient.
You can click here and there and order whatever product you desire and have it delivered to your front door. You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day. The downfall? Wherever there is money and users to be found, there are malicious hackers roaming around.
Use familiar web sites. You need to be aware of the safer online shops, like Amazon. One tactic favored by malicious hackers is to set up their own fake shopping websites. Fake websites can either infect you the moment you arrive on them by way of malicious code. However, the most dangerous aspect you should be concerned about is the checkout process. Completing a checkout process will give cybercriminals your most important information: credit card data (including security number), name, and address. This opens you up to credit card fraud or social engineering attacks.
What are some key things to be aware of as you’re shopping? “Sticking with popular brands is as good as any advice when shopping online. Not only do you know what you’re getting by way of quality and price, but you also feel more confident that these well-established names have in place robust security measures.”1
A few things to be aware of:
- Leery URL’s such as “coach-at-awesome-price.com” or “the-bestonlineshoppingintheworld.com”
- A strange selection of brands – as an example, the website claims to be specialized in clothes but also sells car parts or construction materials
- Strange contact information. If the email for customer service is “firstname.lastname@example.org” instead of “email@example.com” then you should be suspicious that online shop is fake
- Are prices ridiculously low? An online shop that has an iPhone 7 at $75 is most likely trying to scam you
The old adage “if it seems too good to be true, it probably is,” rings true in this case, and it’s best to steer clear of these sites.
Use Secure Connections. Wi-Fi has some serious limitations in terms of security. Unsecured connections allow hackers to intercept your traffic and see everything you are doing on an online shop. This includes checkout information, passwords, emails, addresses, etc.
Before You Buy Online…
- If the connection is open and doesn’t have a password, don’t use it.
- If the router is in an exposed location, allowing people to tamper with it, it can be hacked by a cybercriminal. Stay away.
- If you are in a densely-crowded bar with dozens of devices connected to the same Wi-Fi hotspot, this can be a prime target for an enterprising cybercriminal who wants to blend in and go unnoticed. Continue to socialize, don’t shop.
Access secure shopping sites that protect your information. If you want to purchase from a website, make sure it has SSL (secure sockets layer) encryption installed. The site should start with https:// and you should notice the lock symbol is in the address bar at the top.
Update your browser, antivirus and operating system. One of the more frequent causes of malware is unpatched software. Online shoppers are most at risk due to the sensitive information involved. At a minimum, make sure you have an updated browser when you are purchasing online. This will help secure your cookies and cache, while preventing a data leakage. You’ll probably fuss over having to constantly update your software because it can be a time consuming operation, but remember the benefits.
Always be aware of your bank statement. Malicious hackers are typically looking for credit card data, and online shops are the best place for them to get their hands on such information. Often times, companies get hacked and their information falls into the hands of cybercriminals.
For this reason, it’s a good habit to review your bank account and check up on any suspicious activity.
“Don’t wait for your bill to come at the end of the month. Go online regularly and look at electronic statements for your credit card, debit card, and checking accounts. Make sure you don’t see any fraudulent charges, even originating from sites like PayPal. If you do see something wrong, pick up the phone to address the matter quickly. In the case of credit cards, pay the bill only once you know all your charges are accurate. You have 30 days to notify the bank or card issuer of problems.”2
Using a credit card vs. a debit card is safer. Credit cards have additional legal defenses built in that make them safer to purchase online compared to debit cards. With credit cards, you aren’t liable if you are a victim of a fraudulent transaction, so long as you report the fraud in a timely manner. Secondly, credit cards give you leverage when it comes to disputing transactions with a seller. If you pay with a debit card, you can’t get your money back unless the seller agrees to it. With credit cards, the money you paid for a product isn’t counted against you until due process is complete, debit card holders however can only get their money back after this step. Ultimately, banks are much more protective of credit cards since it’s their money on the line, not yours.
Additional tips for safety:
- Never let someone see your credit card number – it may seem obvious, but never keep your PIN number in the same spot as your credit card
- Destroy and delete any statements you have read
- Notify your credit card issuer of any address change. Doing so will prevent them from sending sensitive files to the previous address
- Keep confirmation numbers and emails for any online purchases you may have done
- Immediately call your credit card company and close your account if you have lost or misplaced a credit card
Use antivirus protection. The most frequent tip on how to be safe online is to use a good antivirus tool. It will keep you safe against known malware. ”Before you begin shopping, outfit your phone or tablet with mobile security software. Look for a product that scans apps for viruses and spyware, blocks shady websites, provides lost-device protection and offers automatic updates.”3
Do not purchase from spam or phishing emails. A phishing email with a fake offer for a desirable product is a hard thing to resist for many shoppers, so they make an impulsive decision and click on the “Order Product” or “Buy Now”, and that’s when the malware attack starts. A phishing email is not like a standard email. The cybercriminal simply wants your click, and nothing else. The Unsubscribe button won’t stop the email spam. The best solution in these cases is for you to simply mark the email as spam, this will remove the mail from your inbox and block the sender from sending more spam.
Keep a record of your transactions. If you are a frequent online shopper, it may be difficult to remember from which site you bought a certain product. So, write it down: what you bought, when and from what website. Compare your spending details with the banking records from your online banking account, keep track of which websites you use for shopping and buying stuff online.
Hold on to your receipts and destroy them when you no longer need them. Keep the receipt for your purchase, just in case you need to confirm it again, as well as for warranty and return issues. If you want to get rid of receipt, make sure to destroy it completely, so that any possible identity thief won’t be able to find any information about you.
Don’t give out more private information than you need to. ”In order to shop online you need to provide two types of information: payment information, such as credit card data, and shipping location, which is usually your home or work address. Be suspicious of online shops that ask for information such as: date of birth, social security number or any other similar information. They don’t need it in order to sell you things.”4
Don’t keep too much information on your smartphone. These days, everybody stores a lot of important personal information on their phone, and most of us rarely take the time to secure them. These devices are now much less about calling people, and more about photos, social media, etc. Increasingly, people shop online using their smartphone, but this carries its own risks. Fake online shops can infect your smartphone with malware, and then have access to information such as phone numbers, notes, photos, and even app contents. Be careful what information you store on your smartphone.
“Safer Internet Day is a great reminder that Internet security is something that needs constant vigilance. It’s also a great reminder that a lot of bad things can happen on the Internet if you don’t properly take precautions against them. With that in mind, be sure to have a safe and happy Safer Internet Day.”5
1 https://www.welivesecurity.com – ESET Security Forum
3 http://www.trendmicro.co.uk/home/internet-safety-for-kids/smart-mobile-tips-for-online-shopping/ – TrendMicro
In 2017 we saw cybercriminals adopt a whole new approach to generating value from malware. Rather than stealing information or encrypting a victim’s files and demanding a ransom, cybercriminals started discretely hijacking computer systems and using them to generate cryptocurrency. In 2018, cryptojacking became one of the most prevalent forms of malware on the internet. The question to ask yourself in 2019 is “can I spot such an attack and, if I can, what do I do about it?”
Technology has made it very convenient to purchase just about anything and have it delivered at our doorstep. Online buying and package delivery has really become the norm for retail shopping. However, especially during the holiday season, there’s an unfortunate piece of news – “porch pirates” – those modern day thieves who steal packages from doorsteps. In a report from Package Guard, it claims that 11 million US homeowners have had packages stolen from their front door or porch in 2017, and those numbers are due to be higher by the end of this year.
With black Friday just around the corner, many of us are starting to think about holiday shopping. We all love the convenience of being able to be at home in front of a computer vs the hassle of crowded malls and searching for parking spots. You can click here and there and order whatever product you desire and have it delivered to your front door. You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day. The downfall? Wherever there is money and users to be found, there are malicious hackers roaming around.
It’s easier than you think for organizations and their leaders to overlook cybersecurity. Unfortunately, the nature of the threat means some of the biggest worries for your organization might actually be out in plain sight. Here are five cybersecurity risks that are regularly overlooked.
- Inconsistent or Nonspecific Cybersecurity Training. In many cases, people are the weakest link. “From falling for phishing emails, and clicking on links or downloading documents that turn out to be malware, to being a victim of business email compromise scams that end up losing the company a lot of money, employees are a company’s greatest liability when it comes to cyber security.”1 More specifically, it’s how well and how consistently they’re trained on security essentials. Since you don’t want to assume any one employee is automatically better versed on digital security than another, it makes good sense to standardize the training. Everybody should be on the same page about the reality of the risks and how necessary a good human element is these days, even with all the anti-virus and anti-malware software available. The understanding of what a phishing email looks like comes in handy just as much at home as it does in the office. Even though most employees don’t like the idea of extra meetings, specific cybersecurity training helps employees feel a greater sense of ownership over the company and its processes and assets.
- Passwords. Ensure that any accounts associated with your organization are secured by a strong password, and two-factor authentication, if possible. It is always recommended that employees cannot reuse passwords from other online accounts for any of their work accounts. You can make it part of your IT policy that employees must change their passwords within a specific time limit. Communicate with your team that they should not share their passwords with anyone else.
- Patch Management. Keeping software patches up-to-date is a critical component to keep your company network safe from newly discovered vulnerabilities. The importance of keeping software updates current was underlined in a dramatic way during the WannaCry and Petya outbreaks. The primary way both of those attacks were spread was by exploiting a critical vulnerability in the Windows operating system known as Eternal Blue. Eternal Blue allowed the malware to spread within corporate networks without any user interaction, making these outbreaks particularly virulent.“The WannaCry outbreak occurred in May; the patch for the Eternal Blue vulnerability had been released by Microsoft in March. If the patch had been widely applied the impact of WannaCry, which mostly hit corporate networks, would have been greatly reduced. You would imagine that a high-profile incident like WannaCry, which underlined the importance of keeping patches up to date, would have ensured people and companies did just that. However, despite all the publicity the WannaCry outbreak received when it occurred in May, the Petya outbreak in June was still able to use the same Eternal Blue vulnerability as one of the ways it spread.”2“To be fair to the IT managers in the various companies that were hit due to the Eternal Blue vulnerability being exploited, updating software on company networks is not always entirely straightforward. IT managers can often be fearful that updating one part of the system could cause another part of it to break, and this can be a particular concern in, for example, healthcare organizations, which were heavily impacted by WannaCry.” 3 However, incidents like the above do underline the importance of protecting vulnerable systems, and patching is a key way to do that. The point is not that clicking refresh on software updates all day long will prevent every possible instance a cybercriminal could exploit a vulnerability or back door. Setting everything you can to auto-update at a convenient time, daily, does stand a chance of keeping you safer.
- Other Companies. A problem that many businesses encounter in the current business climate is that it is not just their cyber security practices that they have to worry about: they also have to worry about the cyber security protocols of other businesses they work with. Your company may have stringent cyber security practices implemented, but if a third party your company deals with is compromised then attackers could potentially gain access to your network. Network segmentation, or dedicated servers that vendors can use so that they do not connect directly into your company’s network, can help safeguard against weak links in third parties’ cyber security. If that isn’t possible, it is wise to at the very least have a conversation with potential vendors before doing business with them to ensure they take cyber security seriously, and have appropriate practices in place.
- Unsecured Personal Devices. “BYOD culture — or bring your own device — is a great thing for employees and employers alike. It lets employees perform their duties in a digital workspace they already know and feel comfortable in. On the employer side, the lack of a serious learning curve and the small bump in productivity are welcome. What’s less welcome are the cybersecurity risks that BYOD culture brings. It’s possible to permit and even encourage your teams to work on their own laptops and tablets, but this shouldn’t be done without a comprehensive and robust BYOD policy drawn up by your IT team. At a minimum, you should require that users access on-premises internet connections using VPNs and that all accounts are equipped with two-factor authentication.”4
In today’s connected workplaces, here’s no single department within an organization whose job it is to ensure cybersecurity. In fact, that’s the major message all across the digital landscape: No matter how large or small the organization, it’s vital to speak and act as one when it comes to protecting digital assets and company property. As with so many of the issues mentioned on this list, employee education is key: employees need to understand what good cybersecurity practices are, and the potential consequences for the company if they are not followed.
1-4: Symantec Security Response Team: Cybersecurity Weak Links. www.symantec.com/security-center – Bryley Systems is an SMB Specialized Symantec partner.