Skip to content
Secnic Consultancy Services
Menu
  • Home
  • Services
    • Security Assessments
      • Security Compliance for Cloud Assets
      • Internet of Things Security Assessment
      • SAP Security Assessment
      • Penetration Testing
      • Source Code Review
      • Mobile Applications Security
      • Mobile Device Security
      • Web Application Security
      • Network Performance Audit
      • Data leakage Prevention
      • Database Activity Monitoring
    • Security Consulting
      • Online Brand Protection
      • Security Intelligence
      • Integrated SOC management
    • Security Compliances
      • ISO 27000 Series Consulting
      • ISO 20000 Consulting
      • COBIT Framework Consulting
      • Data classification
      • PCIDSS Consulting
  • Solution Integration
    • Web Application Firewall
    • Advanced Persistent Threat
    • Anti DDOS
  • About Us
  • Under Attack ?
  • Blog

Tag: internet security for windows

CEO vs. CSO Data Security Mindsets, Part I

CEO vs. CSO Data Security Mindsets, Part I

If you wish to achieve real insight into the disconnect between IT and also the C-levels, then take a more in-depth investigate Secnic consultancy Report. Based on surveying over 80 company board members and IT executives, we broke down the differing information security viewpoints between CSOs and also the board (including CEOs) into six completely different areas.

The key takeaway is that it’s not simply that IT doesn’t speak a similar language because the business aspect, however additionally that the business executives and IT read and accept basic security ideas, values, and metrics otherwise. It’s vital to urge everybody on a similar page.

When Worlds Collide

Secnic consultancy Services (SCS) asked each CSOs and board subjects to rate the worth of cybersecurity to their business in 5 completely different categories: security steering, business enabler, loss dodging, information protection, and complete protections

We are a touch stunned that information protection was rated by underneath 30 minutes of CSOs, however over 80th of board members as valuable. You’d assume that might be job #1 for CSOs!

The explanation “CSOs in fact is aware of that information protection lies in their view … and then they’ve learned to position information protection as a business enabler than a value center.”

CSOs feel powerfully that they bring about real price to their business and not simply red — not simply providing a knowledge protection service. Which jibes with the very fact that 400th of CSOs say they’re business enablers. Though that belief isn’t shared equally by the board — solely two hundredth of them assume that.

The key to any or all this can be the distinction within the breakdown on the “brand protection” value: over 60 minutes of board members saw this as vital, however it barely created a blip with CSOs, at but 200th.

But let’s investigate this from a risk perspective, that is that the viewpoint of CEOs and boards. Collectively of the board-level interviewees place it within the report, their biggest concern is that the legal and business implications of a knowledge breach. They apprehend a knowledge breach or an insider attack will have serious reputational harm, resulting in lost sales and law suits, that all compute to arduous greenbacks. Complete harm is incredibly abundant a board-level issue!

Ponemon, of course, has been trailing each the direct and massive indirect prices concerned in breach incidents with its own reports over the years.

SCS has known a huge gap between what CSOs assume is very important versus the board concerning the worth of cybersecurity. This leads nicely to a different results of theirs associated with security metrics.

Let’s Talk About Risk

The metric measurements in the report are also revealing and detail more of this diverging viewpoint. Of course, CSOs are focused on various IT metrics, particularly related to security incidents, responses, governance, and more.

SCS tells us there’s approximately a balance between both sides for many of the IT metrics. However, there’s a large gap between CSOs and boards over the the importance of “risk posture” metrics. It’s mentioned by 80% of boards versus only 20% of CSOs. That’s a startling disparity.

What gives?

IT loves operational security metrics: those mentioned on top of in conjunction with millions of details regarding daily operations, involving fixing standing, malware or virus scanner stats, and more.

But that’s not what board members, who may not be as technically knowledgeable during a narrow IT sense, suppose is vital for his or her work!

These people have monumental expertise running actual businesses. CEOs and their boards, of course, have to be compelled to arrange ahead, and these savvy business professionals expect there to be uncertainty in their plans. That comes with the territory.

What they require from it’s a quantification of however unhealthy an outcome of a breach, or business executive attack, or accidental revealing will reach in dollars, and also the frequency or likelihood that these events may happen.

You can think about them as disciplined high-tech gamblers WHO apprehend all the possibilities of every outcome and place their bets consequently.

For Next Time

SCS’s key point is that business leaders are interested in both rare cybersecurity events that incur huge losses – think Equifax – and more likely events but that typically have far lower costs – spam mail, say, to get corporate credit card numbers use in the travel department. They have different ways of dealing with each of these outcomes.

STOLEN PENCIL Targets Academic Institutions

STOLEN PENCIL Targets Academic Institutions

A new campaign, probably originating from Democratic People’s Republic of Korea, has been targeting educational institutions since at least may 2018.

Dubbed “STOLEN PENCIL,” the spear phishing campaign delivers emails that send unsuspecting users to a web site displaying a document that tricks them into putting in a malicious Google Chrome extension in order that the threat actors will then scavenge for credentials.

“In keeping with tried and true ways, the operators behind the stolen PENCIL campaign used spear-phishing as their initial intrusion vector,” a target of stolen PENCIL receives a spear-phishing message containing a link to at least one of many domains controlled by the threat actor.”

Once the malicious actors gain a footing, they use Microsoft’s Remote Desktop Protocol (RDP) for remote point-and-click access. This tactic indicates that someone – instead of an overseas access Trojan (RAT) with a command-and-control website – is truly behind the keyboard interacting with a compromised system. The threat actors are then ready to use an RDP to keep up persistence.

Additionally, the attackers have confidence integral Windows administrator tools and alternative business software package to sustain the attack. Once they need exploited the victim’s system, they leverage multiple ready-made sources, like method memory, internet browsers, network sniffing and key work, to reap passwords. Researchers haven’t nevertheless seen any proof of information felony, that has left them unable to work out the motivation of the attackers; but, several of the victims were specialists in medicine engineering.

“Using a mixture of purloined passwords, backdoor accounts, and a forced-open RDP service, the threat actors area unit seemingly to retain a footing on a compromised system,” the analysis team wrote.

While the ways and procedures of the threat actors are quite basic and that they have confidence ready-made tools, they spent loads of your time doing intelligence. additionally, the operators conjointly incontestable poor OPSEC and exposed their Korean language in each viewed websites and keyboard picks.

Six Cyber Security Essentials To Protect Your Organisation

Six Cyber Security Essentials To Protect Your Organisation

“Good processes should include more transparent, structured, and fast-working cyber security systems”

As businesses and customers become a lot of connected and digital-first, the necessity to shield cyber assets and private data has become overriding.

Analysts estimate that by 2020, hour of enterprises are going to be victims of a serious cyber security breach. While 74 of those attacks are going to be thanks to careless or uneducated staff, in step with Secnic’s global data Security Survey 2017, the remaining 26th are often highly sophisticated attacks, that are troublesome to predict, determine and defend against.

SCS estimating that ransomware is growing at an annual rate of 350%, it’s important to make sure that each one business systems and processes are secure to shield against following WannaCry.

An organisation’s communication channels are usually the primary purpose of incorporate an attack, delivered via spam, phishing tries or taking advantage of noncurrent package and currently as businesses move to the cloud, this provides another avenue for attack.

So how can your business put adequate barriers in place to ensure that it is guarded against the newest cyber security threats?

Here are six pointers to bear in mind when looking to make UC security fit for purpose.

Maintaining a Strong CMDB

Keeping a robust, well-maintained, and effective Configuration database (CMDB) may be a concern for scores of corporations. Several corporations fail to take care of their CMDB and this makes implementing security controls and procedures harder and time intense, encouraging mistakes and gap the organisation to attack.

Apply clear responsibilities and possession of your CMDB and keep instrumentality up thus far. He higher managed it’s, the better threats are to forestall. Doing this is often significantly vital once upgrading infrastructure and for those in transition of modernising the geographical point.

Continual Review and Optimisation of the Information Security Management System (ISMS)

Continued maintenance and review is the key to creating a well-oiled machine that won’t fail when it needs to perform. Continually review and optimise your ISMS which includes security policies and procedures, security change management control and review of the risk register. Adjust these on a regular basis relative to current threats and vulnerabilities.

Commitment to the Top Management

Often senior managers are focused on functions apart from cyber security. They’re minded to company profits, money results, and more, however typically don’t have an honest insight into the risks that belong a weak cyber security method.

Good cyber security needs money resources to secure the infrastructure and enough workers to manage the method. These prices are frequently not seen as a necessity, particularly if they’re not highlighted once budgeting.

All risks should be given to the senior management of the corporate, along side the implications if the safety is broken, as well as a sturdy assessment of the money implications of a breach, further because the reputational harm it’ll value within the eyes of shoppers. With as several collectively in four customers stating that they’d ne’er be able to trust an organisation once more once a cyber-attack, the reputational value is probably going to be high.

Crisis and Incident Management

Security crises don’t seem to be an exception however rather a rule, and any security incident could be a potential crisis if it’s not processed properly.

Incidents is classified with completely different priorities reckoning on the protentional impact. it’s very necessary that the various priorities ar properly represented and also the workers who method them are well trained to supply a timely, correct and elaborated response.

Security management systems generate differing types of reports that we will use to analyse the cyber-security vulnerabilities within the company and to require remedial action and calculate the chance for the corporate.

All Priority one and a pair of incidents in Unify, as an example, ar given to the senior management frequently, and every Priority three or four incident is escalated to the next priority if it’s not closed at intervals a definite amount. reaction time for the various priorities has got to be calculated reckoning on the context of the organisation and its assets and capabilities, however in any case, once the incident is priority one the utmost response time is many hours.

For this method to be effective, we tend to once more communicate the CMDB theme. There are GDPR implications if these problems don’t seem to be raised within the correct timeframe and will end in fines of up to €10 million, or two of annual world turnover – whichever is higher.

When WannaCry and Meltdown hit the market the CMBD topic was highlighted, as for a few corporations the time that they required to gather all assets that has got to be upgraded was longer than the particular redress time. it’s not uncommon to seek out a specific plus while not clear possession, particularly in lager organisations, and this may gift a significant issue if specific action got to be taken at intervals hours of a cyberattack.

A crisis indicates an unstable and dangerous scenario related to an oversized a part of the corporate or the corporate as a full, doubtless damaging business to an excellent extent, and requiring the commencement of minute action. sadly, several corporations don’t have associate optimised crisis management method and workers coaching procedures.

Best observe dictates that everything has to be clearly documented, crisis management is junction rectifier by a member of the senior management team, which groups meet frequently to update on actions and activity elements.

The company may have external partners to consult throughout a crisis scenario, like a cyber security specialist, or governmental organisation with that to co-operate so as to master the crisis quicker, and this has to be factored in.

Don’t Just Stick to ISO

Most of well-known security standards or frameworks are not reactively designed and do not guarantee well-designed ISMS. ISO 27001 is a standard which main usage is informational security risk assessment, treatment and mitigating but contains many risk factors by itself.

Introducing best practices without any concrete technology, design or processes required, and describing procedures that delegate too much trust on the human factor in ISMS, ISO 27001 can leave many open questions and gaps in an organisations cyber security capabilities.

National Institute of Standards and Technology (NIST) Framework

The steps illustrated during this framework are determine, Protect, Detect, Respond and Recover. But, positioning “Identify” as the 1st step suggests that the framework approach may be classified as a reactive solely resolution. “Respond” and “Recover” conjointly contribute to the reactive nature.

Listing “Identify” at the start of the cycle suggests actions are started solely just in case of business impact. “Planning” isn’t a locality of this high-level structure and may be a vital step for proactive measures or in making an attempt to predict future problems.

Good processes ought to embrace a lot of clear, structured, and fast-working cyber security systems. coming up with is additionally crucial. sensible security officers mustn’t look ahead to a problem to boost the safety or to shut themselves inside borders of predefined standards like ISO 27001.

Instead, they have to arrange daily, be ready to answer completely different environments, and make a cyber security targeted culture across the entire business. If they are doing that properly, then the business can offer itself the most effective probability to defend itself against successive WannaCry.

Shopping Safely Online over the Holidays

Shopping Safely Online over the Holidays

The holiday season is upon us, which means wallets are burning holes in pockets around the world faster. Retail sales during this festive season could launch to a high. And that means millions of people will opt to shop for gifts online rather than having to wait in long lines, fight for parking, and dodge impatient crowds. While you’re compiling wish lists and shopping lists, this is also the time of year many cybercriminals roll out their best-dressed scams, dampening the holiday spirit for people around the world.

Here are some key tips for protecting yourself not only during the holidays, but throughout the whole year:

Fake Online Stores

Some criminals create fake websites to prey on shoppers who are out there looking for the best deal possible. They’ll replicate the look of real sites or use the names of well-known brand names. If you’re shopping for a bargain online, you may be directed to one of these fake websites, so it’s important to keep an eye out for websites that advertise prices dramatically cheaper than anywhere else or offering products that are otherwise sold out.

The products are generally so cheap because the items may be counterfeit, stolen, or even worse, you may not even receive your purchase. Here’s a few more tips to protect yourself:

  • Verify the website has legitimate contact information for sales or support-related questions. If the site looks suspicious, call and speak to a human. If you are unable to reach anyone that could be the first sign you are dealing with a fake website.
  • Look for obvious warning signs, such as deals that are too good to be true or displays poor grammar and spelling on the page.
  • Be very suspicious if a website appears to be an exact replica of a well-known website you have used in the past.  For example, if you’re used to shopping at Amazon, check to see if the domain name or the name of the store is slightly different. Amazon’s domain name is https://www.amazon.in, so be suspicious if you find a website pretending to be Amazon, such as http://store-amazonin.in.
  • Type the store name or URL directly into a search engine and read reviews people have left. Look out for terms like “fraud,” “scam,” “never again,” or “fake.” Alternatively, a lack of reviews can also be a sign indicating that the website could be new and may not be trustworthy.
  • Before purchasing any items, verify your connection to the website is encrypted. There should be a lock and/or the letters ‘HTTPS’ in green before the website’s name.

Remember, just because the site sounds familiar, doesn’t mean it’s legitimate. If you aren’t comfortable with the website, don’t use it. If it sounds too good to be true, follow your instinct. Don’t bet your personal data on a few good cyber deals.

Protect your Devices

Take the time this holiday season to also ensure your computer or mobile device is secure. Cybercriminals can try to infect your devices in an attempt to harvest your bank accounts, credit card information, and passwords. Remember these two tips to keep your devices secure:

  • If you have children in your house, consider having two devices, one for your kids and one for the adults. Kids are curious and interactive with technology; as a result, they are more likely to infect their own device. By using a separate computer or tablet just for online transactions, such as online banking and shopping, you reduce the chance of becoming infected.
  • Always install the latest updates and run up-to-date anti-virus software. This makes it much harder for a cybercriminal to infect your device.

Check Those Credit Card Statements

Even if you don’t shop online often, it is wise to regularly review your credit card statements. It will help you to identify suspicious charges, especially after you used your card to make a purchase at a new site.

If you believe you’ve fallen victim to credit card fraud, immediately contact your credit card company.

Here are more tips to help you keep your card and banking information safe:

  • Sign up to receive notifications every time a charge is made to your card. Some companies will allow you to elect text messages or emails the moment a purchase has been made.
  • Consider using a credit card just for online purchases. That way, if it is compromised, you can easily change the card without impacting any of your other payment activities.
  • Try to avoid using debit cards whenever possible. Debit cards take money directly from your bank account, so if fraud has been committed, it can be far more difficult to get your money back.
  • Seek out credit cards that generate a unique card number for every online purchase, gift cards, or well-known payment services, such as PayPal, which do not require you to disclose your credit card number to the vendor.

 

 

Ticketmaster Suffers Security Breach – Personal and Payment Data Stolen

Ticketmaster Suffers Security Breach – Personal and Payment Data Stolen

Global entertainment ticketing service Ticketmaster has admitted that the corporate has suffered a security breach, warning customers that their personal and payment info might are accessed by an unknown third-party.

The company has blame a third-party support client service chat application for the information breach that believed to have an effect on tens of thousands of its customers.

The client support chat application, created by Inbenta Technologies—a third-party AI tech supplier—used to assist major websites act with their customers.

In its statement, Ticketmaster aforementioned it discovered malicious package on the client support application hosted on its uk web site that allowed attackers to extract the personal and payment info from its customers shopping for tickets.

Ticketmaster disabled the Inbenta product across all of its websites as presently because it recognized the malicious code.

However, Inbenta Technologies turned away blame back to Ticketmaster, spoken language that the ticketing service deployed the chat application improperly on its web site.

Inbenta said by applying this Javascript to the payment page, Ticketmaster presented attackers with “a point of vulnerability that affects the capacity for web forms to upload files,” allowing attackers to locate, modify, and use the script to “extract the payment information of Ticketmaster customers processed between February and June 2018.”

Compromised info includes name, address, email address, phone number, payment details and Ticketmaster login details of its customers.

Neither Ticketmaster nor Inbenta did say the quantity of shoppers plagued by the incident, however the ticketing service did make sure that but 5-hitter of its global client base has been affected.

Inbenta is entirely assured that no other client of Inbenta has been compromised in any method, which the incident has “nothing to do with any of its industry-leading AI and machine learning products,” that serve many customers on six continents.

Ticketmaster said that it’s emailed all affected customers, and is giving 12 months of free identity watching service for people who are impacted.

Affected customers are suggested to stay a detailed eye on their checking account transactions for signs of any suspicious activity, and in real time advise their banks if found any.

Users are suggested to take care if they receive any suspicious or unrecognized call, text message, or email from anyone saying you want to pay taxes or a debt immediately—even if they supply your personal info

Posts navigation

1 2 … 25 Next

Latest Information Security News

STOLEN PENCIL Targets Academic Institutions
New Apache Struts RCE Flaw Lets Hackers Take Over Web Servers
Singapore’s Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen
Air Canada Suffers Data Breach — 20,000 Mobile App Users Affected
Researchers Observe Threat Actor Using Varied Tools and Payloads to Distribute Monero Miners
Ticketmaster Suffers Security Breach – Personal and Payment Data Stolen
Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered
Reddit Hacked – Emails, Passwords, Private Messages Stolen
T-Mobile Hacked — 2 Million Customers’ Personal Data Stolen
Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC)

Contact Us

  • Glossary
  • Case Studies
  • Security News
  • Advisories
  • White Papers
  • Annual Report
  • Newsletters
  • Incident Reports
  • Monthly Security Bulletin
  • Guidelines
  • Virus Alerts
  • Vulnerability Notes
© 2019 Secnic Consultancy Services
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok