Thursday, January 17, 2019

Singapore- SingHealth

Exploit: Initial malware infection coupled with a multi-pronged attack.SingHealth: Singapore’s largest group of healthcare institutions.
extreme gaugeRisk to Small Business: 1.444 = ExtremeBesides for the relentless onslaught of articles and news detailing SingHealth’s negligence and lack of “security hygiene”, high-profile members of management were terminated, demoted, and fined. As you can imagine, the long-term implications for employee morale are less than desirable, along with crippling blows to culture, brand, and customer trust.

correct severe gauge                                                   Individual Risk: 2 = Severe: Although the theft initially occurred between a short period of time (June 27, 2018 to July 4, 2018), data stolen included names, NRIC numbers, addresses, gender, race, and dates of birth. Even worse, around 160,000 also had their outpatient prescriptions taken. It is believed that Prime Minister Lee Hsien Loong was a primary target for the hack, but you can expect the data collected to be sold to the highest bidder.
Customers Impacted: 1.5M individuals.How it Could Affect Your Customers’ Business: Aside from the laundry list of penalties for incurring such a breach, an affected organization must continue business as-is while restoring operations. In this case, SingHealth has imposed a “temporary Internet surfing separation” on 28,000 staff’s work computers. With an entirely new set of security processes to manage while avoiding disruptions caused by the breach, customers should begin to see the value in proactively implementing IT protocols and monitoring for stolen credentials.ID Agent to the Rescue: SpotLight ID allows MSPs, Resellers and Channel Partners to deliver comprehensive personal identity protection for clients’ employees and customers, ultimately safeguarding corporate systems. Get started here: https://www.idagent.com/identity-monitoring-programs.
Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

India- Amazon

India- Amazonhttps://threatpost.com/data-exposed-oxo-amazon-mongodb/140802/Exploit: Internal technical glitch.Amazon India: Online shopping site in India.
correct severe gaugeRisk to Small Business: 2.111 = Severe When a company the size of Amazon is involved, issues regarding the erosion of customer loyalty and loss of brand equity can be measured in six-figure range digits. Although the breach exposed the tax data of 400,000 sellers on Amazon, only 0.2% of the seller base, and was rectified immediately, it remains to be seen what the long-term effects for enterprise customers are.
correct severe gauge                                                   Individual Risk: 2.428 = Severe: Tax data can reveal significant information on Amazon sellers, but the breach was contained and it is likely that no data was maliciously harvested. At the same time, the glitch allowed users to view details of other sellers, which could potentially place sensitive business details in jeopardy.
Customers Impacted: 400,000 sellers.How it Could Affect Your Customers’ Business: No business owner wants their tax information in the hands of the wrong person. Even a small business glitch has the potential to expose proprietary information such as intellectual property, competitive advantages, or earnings, which means that a sustained glitch in seller data could be much more impactful than it appears. Brainstorm how you can work with your security providers to protect and obscure such information.ID Agent to the Rescue: DarkWeb ID can help you proactively monitor if customer data is being leaked on the Dark Web, helping reduce the impact of such a breach. See how you can benefit here:  https://www.idagent.com/dark-web/.
Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

United States- DiscountMugs.com

Exploit: Injection of card skimming code into website.DiscountMugs.com: E-commerce website for custom mugs and apparel.
correct severe gaugeRisk to Small Business: 1.666 = Severe: When hackers can extract credit card numbers from your customers for four months long undetected, the aftermath is never good. Although the company identified that orders between August 5 and November 16 of 2018 had been compromised, the number of shoppers affected has not been determined. Customers will think twice before purchasing from the website and will likely consider competitors with better online security.
correct severe gauge                                                   Individual Risk: 2.428 = Severe: Given that the cyber attack occurred just before a busy holiday shopping season, you must wonder if the cyber criminals planned their timing strategically. They stole everything from credit card numbers, security codes, and expiration dates, to names, addresses, phone numbers, email addresses and ZIP codes. With this information in hand, anyone is capable of orchestrating payment fraud.
Customers Impacted: To be determined.How it Could Affect Your Customers’ Business: Payment breaches are frightening for businesses and their customers. As American consumers begin to experience how cyber attacks affect them first-hand, they will put their digital dollars towards websites that can protect their financial information.ID Agent to the Rescue: Dark Web ID monitors the Dark Web and can help discover this form of breach before it hits the news cycle. We work with MSSPs to strengthen their security suite by offering industry-leading detection. Find out more here: https://www.idagent.com/dark-web/.
Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

In Other News:


Facebook, What Are You Doing? Facebook continues to let down its users this week… this time by providing user data to a wide variety of large companies for commercial purposes. Some of the companies that took advantage of Facebook’s fast and loose outlook on its customers’ data include Apple, Amazon, Microsoft, Spotify, and Netflix. The information even included private messages between users. When Amazon was asked about how it used the user data Facebook provided them, their official statement stated they used the data “appropriately,” which is not very comforting.

Monday, January 14, 2019

How Work-From-Home Can Open Your Business Up to Breach

How Work-From-Home Can Open Your Business Up to Breach
As the historical debate surrounding work-from-home (WFH) policies continues to reach news headlines, an additional consideration has surfaced: IT security. Home networks in WFH environments can expose your company to security risks, as devices are connected to the internet and can serve as an entry point for hacks.
With the advent of remote working arrangements and rising adoption of smart devices, employees are accessing enterprise software such as cloud-based apps, video conferencing software, and file sharing regularly, resulting in vulnerabilities that black hats can tap into with little to no difficulty.
Of course, this doesn’t necessarily mean you should discontinue your WFH policy. Instead, consider how you can arm your employees with best practices for securing their devices and networks to avoid breach possibilities.
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/predictions/2019 

Top 3 Benefits of Using IT Support in the Workplace

Technology continues to play a vital role in today's workplace and choosing to partner with an IT support company is an excellent investment that can take your business to even greater levels of success. Whether you have a new startup business or have been around for many years, an IT support company can significantly improve efficiency and enable employees to become much more productive. If you are still undecided, here are just three ways an IT support company can benefit your organization in today's work environment.

#1 Around the Clock IT Services
One of the greatest benefits of using a managed service provider is that it gives your company access to around the clock IT services. Instead of trying to resolve technical issues on your own, you can contact an IT provider to receive immediate assistance. Ultimately, this will significantly reduce downtime for your company and allow your employees to be much more productive. An IT provider is always available at any time to answer questions and can also provide additional training for employees on a wide range of topics, such as cybersecurity or understanding how to operate new technology.

#2 Minimize Expenses
Another advantage of using an IT support company in the workplace is that it is a fantastic way to keep costs to a minimum and improve the bottom line for your business. For example, instead of hiring your own IT department, a managed service provider is a much more affordable option that will give your business access to professional IT services at an affordable rate. On the other hand, hiring your own IT employees is much more expensive, and many companies are unable to afford the additional costs.

#3 Increase Cybersecurity
New cybersecurity threats continue to emerge all of the time in the workplace, and it is important to partner with a managed service provider that focuses on offering the ultimate cybersecurity protection. Of course, these cyber threats are constantly evolving, whether it is ransomware, malware, viruses, phishing scams, or even social engineering attacks.

However, an IT provider can keep your company well-protected with around the clock monitoring services and access to the latest security updates. An IT provider also specializes in data backup and recovery services to ensure that your data is always protected and that you will never have to give in to the demands of a ransomware attack.

Technology will only continue to grow in the business world, and the use of a managed service provider offers a wide variety of benefits for companies of any size. An IT support company is one of the best investments for any business and can give you a competitive advantage over other companies by reducing expenses, increasing cybersecurity, and giving your employees access to around the clock support. Technology is continually changing, but an IT provider will ensure that your business remains on the cutting-edge of technology and can help your company reach its full potential in today's work environment. 

Robert Blake 
877.860.5831

Dark Web ID Trends:

Dark Web ID Trends:Top Source Hits: ID Theft Forums (55%)Top Compromise Type: DomainsTop Industry: High- Tech & ITTop Employee Count: 11-50 employees (32%)