Monday, August 3, 2020

What is a Network Security Audit and Why Do I Need One?


As a business owner, you know that data security is one of your most vital concerns. You know that a single data breach could erode the trust of your customers, and that repeated breaches could subject you to fines or even put you out of business.

As a result, you have taken steps to lock down your network, from requiring strong and unique passwords and frequent password changes to installing firewalls and security software to keep the bad guys at bay. And while those are all crucial steps on the road to cyber security, they may not be enough to safeguard your network infrastructure and the massive amounts of proprietary and customer data it contains.

You may think that your network is as secure as it can be, but without a formal audit you can never know for sure. A network security audit is an important next step for every business owner, and the sooner you conduct one the better off you and your business will be.

What is a Network Security Audit?
A network security audit, also known as a network security assessment, is a formalized process during which the entire data infrastructure is carefully evaluated. During the process, previously unknown vulnerabilities or weak spots may be uncovered, and each one of those will be addressed once the formal assessment has been completed.

Once the network security audit is over, a formal list of recommendations will be made. These points will then be followed up on, either by the internal IT staff at the company, by the organization that conducted the audit or by an outside managed IT service provider. After these deficiencies have been addressed, a follow up audit may be conducted to ensure that all vulnerabilities have been adequately addressed.

The Many Benefits of a Network Security Audit
Subjecting your network infrastructure to a formal security assessment may seem like a cumbersome process, but the many benefits of the audit make it more than worthwhile. If you are running your business and simply hoping for the best, it is only a matter of time until a ransomware demand, hacker attack or security breach comes your way. These threats are not going away; if anything they are getting worse, and you cannot afford to fly blind in such a dangerous environment.

If you have not yet conducted a formal network security audit of your network, now is the time to get started. Here are some of the benefits of having your network infrastructure professionally evaluated.

   Regulatory compliance - Some types of businesses, including those operating in the governmental or healthcare space, may be required to undergo regular network security assessments and intrusion detection testing.

   Finding hidden vulnerabilities - Even if you have secured your network against all known threats, there may be other dangers hidden in plain sight. A network security audit can uncover those previously unknown vulnerabilities and address them.

   Enhancing the security of cloud storage accounts - If your business has moved to the cloud, conducting a formal network security assessment can enhance the value and safety of those stored files.

   Strike a balance between top security and easy access for employees - Finding the right balance between network security and usability is no easy task, but a professional network assessment can help a lot.

   Take advantage of specific expertise - You are an expert at running your business, but you are probably not a tech guru. When you schedule a network security assessment, you gain access to the specific expertise needed to keep you and your data safe.

   Employee education - The members of your staff should be the first line of defense in your cyber security strategy, not the weakest links in the chain. Investing in a formal network security assessment is a great way to educate workers on the value of data protection and their vital role in the process.

No matter where your business operates or what its niche, you have a vested interest in the protection of your network and the data it contains. With data breaches almost a daily event, it has never been more important to protect the information with which your business has been entrusted.

By conducting a formal data security assessment, you can decrease the odds of a data breach, educate your workers on the growing dangers and shore up your cyber defenses. If you have not yet conducted such an audit, now is the time to get started.

by
Robert Blake


For More information contact Bit by Bit 877.860.5831 x190




Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Wednesday, July 29, 2020

BBB Newsletter: Avoid Trouble, Update Your Passwords!

Saturday, July 25, 2020

Wednesday, July 22, 2020

Week in Cybersecurity News:

In cybersecurity news this week: Even tech giants have basic cybersecurity woes, third-party data breaches put every business at risk, and a webinar featuring 5 steps to success.  

Cybersecurity News: Dark Web ID’s Top Threats 


  • Top Source Hits: ID Theft Forum
  • Top Compromise Type: Domain
  • Top Industry: Finance & Insurance
  • Top Employee Count: 251-500

Cybersecurity News: United States 


United States – Twitter 

Exploit: Account Compromise 
Twitter: Social Media Platform 
cybersecurity news gauge indicating extreme risk
Risk to Small Business: 1.216 = Extreme
The hack heard ‘round the world this week is a huge embarrassment for social media powerhouse Twitter, after dozens of high-profile accounts were accessed illegally and used to transmit messages inviting their followers to “invest” in a bitcoin scam. Some of the affected accounts included Bill Gates, Barack Obama, Elon Musk, and Jeff Bezos. The hack was quickly discovered, and those accounts were frozen briefly while Twitter assessed and fixed the security flaw. Twitter is now reporting that the hackers targeted 130 accounts, were able to take control of 45, and 8 accounts had data downloaded. While early reports speculated on the threat actors as a sophisticated hacking group, The New York Times uncovered that the attack was actually carried out by a few unorganized hackers using a Discord server who obtained access through a “social engineering attack”. The attack is under investigation by numerous authorities including the FBI. 
cybersecurity news represented by a gauge indicating moderate risk
Individual Risk: 2.890 = Moderate 
The hackers were able to obtain some personal information and change passwords for some of the celebrity accounts, but did not gain access to any financial information, past password records, or other sensitive data in all but 8 cases. Those 8 cases are still being investigated, but it’s unlikely that any sensitive data was compromised. 
Customers Impacted: 130
How it Could Affect Your Customers’ Business: A “social engineering attack” is often just a fancy way of saying “phishing attack”. Failing to protect sensitive communications and data channels for your clients because of failing to undertake basic training in phishing resistance will not only cause an expensive recovery when an attack lands, it can also be embarrassing. Plus, the potential regulatory scrutiny is bound to be a headache and give ammunition to those who are looking to add more regulation to social media platforms through future legislation. 
ID Agent to the Rescue: Phishing resistance training is a must for any organization. Bolster your clients’ defense against phishing with BullPhish ID, featuring constantly updated training with video content for today’s biggest threats including COVID-19 threats. LEARN MORE>> 

United States – BlackBaud

Exploit: Ransomware
BlackBaud: Cloud Services & Financial Technology 
cybersecurity & breach news represented by a gauge showing severe risk
Risk to Small Business: 2.177 = Severe 
BlackBaud admitted that its’ success in preventing a recent ransomware attack in May 2020 wasn’t quite as straightforward as it seemed. It turns out that they did pay a ransom to the hackers, but not to decrypt files. The ransom was paid to prevent the release of the stolen data in an increasingly popular double-extortion ransomware scheme. The cloud provider, which primarily works with non-profits, foundations, educational charities, and healthcare organizations, said the incident only impacted the data of only a small subset of its customers, which they have now notified. 
cybersecurity news represented by a gauge indicating moderate risk
Individual Risk: 2.797 = Moderate 
According to BlackBaud’s statement about the incident,  no credit card information, bank account information, or Social Security numbers were stolen.  
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business Ransomware is the bane of every company in today’s threat environment. Improved security awareness training, especially around phishing threats, is the best way for companies to quickly boost their defenses against ransomware.
ID Agent to the Rescue: ID Agent’s digital risk protection platform packs three essential components of an effective, dynamic defense of data and systems. Add in our sales and marketing support, and you’ll see why over 3,000 MSPs in 30 countries chose ID Agent.  Put the power of ID Agent to work for your clients by Partnering with us today. LEARN MORE>> 

United States – MyCastingFile.com 

Exploit: Unsecured Database 
MyCastingFile.com: Entertainment Staffing Platform 
cybersecurity & breach news represented by a gauge showing severe risk
Risk to Small Business: 1.643 = Severe
Researchers discovered an unsecured Elasticsearch database owned by MyCastingFile.com and filled with information about clients of the casting agency, including current and aspiring actors. It’s estimated that the breach started on May 31 and wasn’t addressed until mid-June. The New Orleans based company acted quickly after they were informed of the problem, but still suffered a breach estimated to be 1GB in size, with over 260,000 user profiles leaked of clients, actors, and members of staff, including minors. 
cybersecurity news represented by agauge showing severe risk
Individual Risk: 2.349 = Severe 
The leak included names, physical addresses, email addresses, phone numbers, work histories, dates of birth, height and weight, ethnicity, and physical descriptions. Anyone with a profile at the platform should be alert for potential identity theft and spear phishing attempts.  
Customers Impacted: 260,000 
How it Could Affect Your Customers’ Business:  Failure to secure a database is a rookie move, and no company’s clients are going to look at that kindly – especially when that failure involved children. Customers today are concerned about data privacy, and more aware of Dark Web danger than they used to be – and they will not want to continue doing business with companies that can’t keep their information safe.
ID Agent to the Rescue:  Dark Web activity has never been higher, and in the wake of the global pandemic, the Dark Web has changed just as much as the rest of the world. Get an overview of what’s happening on the Dark Web now and how that can affect your clients’ security in our eBook “State of the Dark Web 2020”. DOWNLOAD IT>> 

United States – LiveAuctioneers 

Exploit: Unauthorized Database Access 
LiveAuctioneers: Online Antiques Auction House 
cybersecurity news represented by agauge showing severe risk
Risk to Small Business: 2.172 = Severe 
LiveAuctioneers has reported a major data breach courtesy of one of its third-party data processing partners. The company first noted the incident on July 10, 2020, after monitors spotted Dark Web posts advertising the sale of the company’s records company records of 3.4 million LiveAuctioneers users, as well as three million cracked username and password combinations. 
cybersecurity news represented by agauge showing severe risk
Individual Risk: 2.172 = Severe 
While no financial data has been reported as compromised, the investigation is still ongoing. Those affected have been notified via email. Every user should reset their account password and be alert to potential identity theft.  
Customers Impacted: 3.4 million 
How it Could Affect Your Customers’ Business:  Third party risk is a growing menace that’s hard for businesses to overcome. By maintaining a constant watch on Dark Web markets, businesses can get notified when credentials, including those used in accounts at third party partners, suffer a breach, lowering their risk of compromise from the stolen information.
ID Agent to the Rescue: Dark Web ID monitors the Dark Web 24/7/365 using Channel-leading human and machine analysis to find compromised business credentials and report it to your clients fast, to keep cybersecurity incidents from becoming cybersecurity disasters. SEE A DEMO>> 

Cybersecurity News: United Kingdom


United Kingdom – Tesco

Exploit: Phishing/Impersonation
Tesco: Grocery Retailer
cybersecurity news represented by a gauge indicating moderate risk
Risk to Small Business: 2.877 = Moderate
Retail giant Tesco was recently used as a front for an elaborate phishing operation that used a fake Facebook page as well as SMS and email communication to trick consumers into handing over their details and steal confidential and payment data as part of a fake giveaway for a  new HD TV. Facebook users who shared the post helped it spread. Victims received an email offering them the chance to “register to claim their prize. A button in the message then linked victims to a landing page to enter their name, home address, telephone number, and bank account details. 
cybersecurity news represented by a gauge indicating moderate risk
Individual Risk: 2.667 = Moderate 
The Facebook portion of the scam was shut down quickly, but some consumers did fall for the email, providing bad actors with personal and financial data, and the scam may still be circulating via email. 
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: In a booming Dark Web economy, everything is for sale. Your client’s brand is just as valuable as their data. Digital risk protection can’t stop impersonation schemes, but it can prevent bad actors from masquerading as your client in Dark Web forums or on social media if your client is alerted to the problem quickly enough.
ID Agent to the Rescue: Convincing clients that they need to extend or upgrade their digital risk protection can be difficult at the best of times, and this economy adds an extra challenge. We’re here to help. With Goal Assist, our sales team acts as your backup on tough sales calls to provide the extra support that scores the win. LEARN MORE>> 

Cybersecurity News – European Union


France – Orange 

Exploit: Ransomware  
Orange: Telecom Provider 
cybersecurity news represented by agauge showing severe risk
Risk to Small Business: 2.323 = Severe 
French telecommunications giant Orange has confirmed that they suffered a data breach affecting customers in their Orange Business Services Division. The Nefilim ransomware group added Orange to its data leak site on July 15, 2020. Orange noted that it was quickly able to mitigate the attack and stop the leak, but some business clients had their data captured by the hackers. No mention of a ransom or payment was released by Orange.   
Individual Risk: No individual personal or financial data has been reported as compromised, but no details have been released about the contents of those 20 compromised enterprise accounts.  
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Ransomware is everywhere these days, and cybercriminals are often choosing to make more targeted attacks than in the past to lower their chances of quick detection. Every company needs to make defending against ransomware a top security training priority.
ID Agent to the Rescue: The most common vehicle of delivery for ransomware is through email. Keep those attacks from landing with phishing resistance training using a dynamic solution like BullPhish ID – with training available in 8 languages. LEARN MORE>> 

Belgium – Argenta Bank

Exploit: Malware 
Argenta Bank: Banking and Financial Services 
cybersecurity news represented by agauge showing severe risk
Risk to Small Business: 1.778 = Severe 
Argenta Bank is the latest victim of an increasingly popular malware attack, jackpotting. In these schemes, cybercriminals infect operating systems for ATM machines, turning them into free money fountains. These very precise attacks require specific knowledge and technical skills, and the machines affected were manufactured by Diebold Nixdorf. The bank was forced to turn off 143 machines at various times over two days. 
Individual Risk: No consumer personal or financial data was reported as stolen in this breach. 
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Sophisticated attacks that require specialized information are becoming more common as attackers seek maximum profit from minimum work and malicious insiders offering cybercrime services like access credentials“as a service” become more common. Guarding against insider threats helps reduce the chance of this kind of crime. 
ID Agent to the Rescue: Insider threats are a constant worry for businesses, while most insider threats are caused by accidental actors, malicious insiders are also a danger that has to be guarded against. Learn how to spot and stop insider threats in our “Stop Insider Threats” resource package. DOWNLOAD IT>> 

Cybersecurity News – Australia & New Zealand


Australia – Western Australia Department of Health 

Exploit: Unauthorized Database Access 
Western Australia Department of Health: Government Agency 
cybersecurity news represented by agauge showing severe risk
Risk to Small Business: 2.227 = Severe 
Confidential data from the state’s Department of Health was made publicly available on a website after it was distributed over a third-party paging service. Security researchers discovered that a website was recently set up which provided confidential information about Western Australian patients and doctors, including those with suspected COVID-19 infections. The State Government and Western Australia Police are working to have the site taken down, but it was still up as of a recent check.  
cybersecurity news represented by a gauge indicating moderate risk
Individual Risk: 2.623 = Moderate 
No financial information was reported stolen, but sensitive health data may have been compromised. Affected users should be alert for potential spear phishing attempts or blackmail using this data. 
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Health data is extremely valuable right now, especially COVID-19 related data. Both private companies and international threat actors are paying top dollar for research and treatment data as healthcare organizations race to find a lucrative vaccine or treatment that works against COVID-19. This incident combines a third-party data breach with a reliance on outdated technology to create trouble.  
ID Agent to the Rescue: As password fraud is often a gateway to other cybercrime, it pays to put an additional layer of protection between data thieves and critical information and systems with Passly. The powerful combination of multifactor authentication, single sign on, and easy remote management makes it simple to make sure that access is safely controlled fast. LEARN MORE>

Cybersecurity News: South America


Argentina – Telecom Argentina 

Exploit: Ransomware 
Telecom Argentina: Telecom and Internet Service Provider
cybersecurity news represented by agauge showing severe risk
Risk to Small Business: 2.870 = Severe 
REvil gang attackers made a bold foray into Telecom Argentina last week, culminating in successfully gaining entry to an internal Domain Administration account, giving them free access to deploy their ransomware payload to more than 18,000 workstations. The company moved quickly to combat the incident, and alerted workers to the danger of potentially corporate network, not to connect to its internal VPN network, and not open emails containing archive files. 
Individual Risk: No individual personal or financial data is reported as affected at this time. 
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Administrator accounts are often compromised through whaling, a type of phishing – and an expressway for cybercriminals to race into the heart of a business. Combat that risk by putting extra protections in place like multifactor authentication that help keep administrator accounts safe. 
ID Agent to the Rescue: As password fraud is often a gateway to other cybercrime, it pays to put an additional layer of protection between data thieves and critical information and systems with Passly. The powerful combination of multifactor authentication, single sign on, and easy remote management makes it simple to make sure that access is safely controlled fast. LEARN MORE>

Cybersecurity News – Asia


Hong Kong – UFO VPN 

Exploit: Unsecured Database 
UFO VPN: Virtual Private Network Host/ Provider 
cybersecurity news gauge indicating extreme risk
Risk to Small Business: 1.086 = Extreme 
Users who were relying on VPN provider UFO for a safe, anonymous way to secure their communications and data got a nasty surprise this week. Researchers uncovered more than 20 million user logs from the company available on the Dark Web. It’s a double reputation blow for a VPN provider that claims to retain no login or usage information. The 894 GB database was reportedly hosted on an Elasticsearch cluster that was not even password protected.  The data allegedly included plaintext passwords, IP addresses, timestamps of user connections, session tokens, device information, and user operating system types, along with geographical information in the form of tags. 
cybersecurity news represented by agauge showing severe risk
Individual Risk: 1.910 = Severe 
Anyone who has used the service for a VPN should be concerned about compromise, spear phishing, identity theft, blackmail, or fraud connected to this event.  
How it Could Affect Your Customers’ Business: Securing a remote workforce can be complex, especially as communications tools become more easily compromised, like messaging and SMS text. One common security measure that companies take when setting up for remote work is encouraging staffers to connect through a VPN. Failing to adequately investigate the safety record of that VPN provider could create additional risk instead of decreasing it.
ID Agent to the Rescue: As password fraud is often a gateway to other cybercrime, it pays to put an additional layer of protection between data thieves and critical information and systems with Passly. The powerful combination of multifactor authentication, single sign on, and easy remote management makes it simple to make sure that access is safely controlled fast. LEARN MORE>

The Week in Breach Risk Levels


1 – 1.5 = Extreme Risk
1.51 – 2.49 = Severe Risk
2.5 – 3 = Moderate Risk
Risk scores for The Week in Breach are calculated using a formula that considers a wide range of factors related to the assessed breach.

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863