Thursday, March 28, 2019

In Other News:

In Other News:
How American companies can benefit from a global perspective
There’s a reason why we cover breaches from countries around the globe. Over the last few years, cybercrime has exploded into an international phenomenon, leaving no continent unturned. By examining how the cybersecurity measures of other countries, the US can borrow pages from their playbooks and predict the future. Here are a few thought starters inspired by China, India, Brazil, and the UK:

1. Improve authentication
Internal control measures are becoming a topic of discussion, given the climate of employee-related data scandals in recent years. By building in reporting systems that have fail-safes and multi-factor authentication, companies can stop fraud in its tracks.
2. ID proofing
Establishing added trust in a credential such as a mobile ID can go a long way in protecting consumers from identity theft. By authenticating devices and users and understanding common fraud patterns, companies can take their security to the next level.
3. Validation certificates
Image-based phishing is growing increasingly sophisticated and effective against consumers, and it’s up to businesses to help them navigate safely. By implementing secure browser certificates, users can feel reassured that they are logging into a trusted source while distinguishing your brand from the fraudsters.

Darkweb Trends

This week, a Dutch academic publisher is exposed, US sleep companies snooze on payment fraud, UK police face ransomware attack and Uber might be spying on us (again)…
Dark Web ID Trends:Top Source Hits: ID Theft Forums (99%) 
Top Compromise Type: Domain (99%)
Top Industry: Construction & Engineering
Top Employee Count: 11 - 50 Employees 

Tuesday, March 26, 2019

March Newsletter: Bit by Bit Earns Top-Tier Award for Exceptional IT Managed Services





Monday, March 25, 2019

What is one free, but impactful change companies can make today to skyrocket their security posture?


Eighty percent of Internet traffic is secure (HTTPS) which means your company’s firewall cannot inspect it (since it’s encrypted).  This means that 80% of the traffic coming through your firewall into your organization is not getting inspected for malware!  It’s simply dubious security to have a firewall and not have it configured to decrypt, inspect, and re-encrypt HTTPS web traffic.  All business-grade firewalls have an option labeled something like SSL Decryption or SSL Inspection.  Work with your IT person or provider to get this turned on so you’re able to inspect the malware that is coming in under your nose.

Friday, March 22, 2019

What are some common mistakes made by business owners when implementing cybersecurity measures?


The largest root-cause for poor cybersecurity in an organization is a lack of upfront leadership buy-in and identified roles for cybersecurity.  Without top-down buy-in, cybersecurity simply cannot be effective. Another erroneous mindset is that “I’m in the cloud, so I have nothing to secure”.  This couldn’t be farther from the truth!  While most cloud applications and environments come with security options, it’s every individual organization’s responsibility to actually configure these options.  Additionally, it’s quite easy for hackers to take over online accounts with phishing and brute force attempts.  So, every online workflow should be protected by multi-factor authentication.

Wednesday, March 20, 2019

How does a company get started with cybersecurity when they’ve never addressed it seriously?

To get started with cybersecurity, companies must understand what data they have, what regulations apply to them, and the overall leadership attitude towards risk, cybersecurity, and protecting information assets.  From here, the company needs to pick a cybersecurity framework such as HIPAA, PCI, NIST, or ISO that most closely aligns with their goals.  Once a framework is selected, a gap analysis should be performed.  Then the company can proceed with implementing controls to address the unique weaknesses and vulnerabilities that face it.

2019's New Frontier of Cybersecurity Threats and Trends

Remaining vigilant and proactive are key strategies for cybersecurity experts in 2019. Hackers find new ways to exploit vulnerabilities on public and private computer networks. Information technology (IT) industry leaders appeal to everyone from consumers to corporate technical architects to adopt protocols that make technology safer and more reliable to use. Here are some cybersecurity threats and trends to watch in 2019. 

Viruses as Weapons of Mass Destruction 

When diplomacy doesn't work, leaders of national governments have been known to resort to unconventional warfare tactics to effect change. Instead of directly declaring war and dropping bombs, these governments have been known to stage cyber-attacks on other countries' public and private networks.

In December 2018, the U.S. Department of Justice put out a statement about the criminal charges that it levied against two Chinese hackers who breached a network to steal intellectual property. The hackers worked for China's Ministry of State Security. Was pressure to fix trade imbalances between the United States and China the motive for the attack?

More recently, Venezuelan leaders accused the United States and its allies of sabotaging Venezuela's power grid and causing a country-wide blackout. Some have hinted that attackers used the computer virus Stuxnet to bring the power grid down; the worm is not detected by most antivirus software. The two countries have been at odds about the use of Venezuela's gold and oil assets as they relate to U.S. business interests. 

Hijacked Hardware for Crypto Mining 

Many national currencies are in a state of decline or instability as financial experts look for solutions that'll bring permanent economic health and prosperity to their respective countries. These leaders are giving digital currencies a serious look. Meanwhile, cybercriminals attempt to grow their cryptocurrency wealth by any means necessary. They often hijack the computer systems of individuals and businesses for crypto mining activities.

Biometric Authentication 

Stealing authentication credentials and cracking passwords are common skills for today's cybercriminals. These thieves continue to steal credentials because it works, and their first acts aren't usually thwarted by sophisticated antivirus software. Biometric-based authentication systems such as fingerprint readers and iris scanners eliminate network breaches that are caused by stolen credentials.

Labor Shortage of Cybersecurity Talent 

People who are worried about global competition for IT jobs need to check out the field of cybersecurity. According to industry analysts, there is a growing shortage of trained, cybersecurity talent. Someone who wants to break into a computer security job needs training and credentials. Four-year degree seekers take programs such as Drexel's BS in Computing and Security Technology. Those who already have a bachelor's degree often earn certificates through specialized training programs such as the EC Council's Certified Ethical Hacker course.

Conclusion 

In 2019, IT security specialists will continue to use their knowledge of network protocols and advanced antivirus tools to prevent, contain, and clean up cyberspace's most costly digital messes. Hackers will use old viruses in new ways to exploit vulnerable computer networks everywhere. Their attacks have a surprising bright side, however, for people who are willing to get the proper education and training.



Bit by Bit can help with your network security assessment you can help up at Contact us