{"id":4527,"date":"2016-02-23T11:23:14","date_gmt":"2016-02-23T17:23:14","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4527"},"modified":"2016-02-09T16:34:56","modified_gmt":"2016-02-09T22:34:56","slug":"your-cyber-threat-assessment-for-2016","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/your-cyber-threat-assessment-for-2016\/","title":{"rendered":"Your Cyber-Threat Assessment for 2016"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva,sans-serif;\">The year just past saw several high-profile cyber-attacks hit the news, and brought the whole issue of cyber-security firmly into the spotlight. With the lessons still being learned from 2015 in mind, let\u2019s look ahead to what you should be wary of in the months to come.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Home is Where the Hurt Is?<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0\u201cSmart\u201d domestic devices and the growing Internet of Things (IoT) will contribute to making the average home a source of potential cyber-security risk.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Off-the-rack components and their supporting platform of unregulated cloud services may mean that the multitude of webcams, smart TV sets, garage and front-door locking mechanisms, lighting systems and alarms leave the production floor with inherent security vulnerabilities built in.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Even basic protections like password access or encryption may be absent \u2013 and those devices that do have security features on-board may be difficult to update, as there are so many of them, in such diverse locations.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The threat is relevant, as many of these devices are continuously collecting personal information about us, which could be of value to hackers. Gaining access to a smart device is also a route into the home, where for example a baby monitor could be turned into a spycam.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">To say nothing of the issue of control. Last year, hackers were able to remotely gain control of vehicles made by Jeep, taking over the steering, and even decommissioning the braking system. And a smart rifle with Wi-Fi capability was discovered to have a targeting mechanism which could be remotely hacked. <\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">A Case of Stagefright<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0Handheld devices aren\u2019t immune to the threat, either. Security researchers have revealed a massive flaw in the Android operating system which has the potential to affect tens of millions of smartphones, tablets, and other devices.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_stagefright.png\" rel=\"attachment wp-att-4530\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4530 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_stagefright.png\" alt=\"cyberthreatassessment_stagefright\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_stagefright.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_stagefright-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_stagefright-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Dubbed \u201cStagefright\u201d, the vulnerability exists in the code which manages Android\u2019s handling of image display and processing. Stagefright could potentially be set off via a booby-trapped text message, sent to unwitting recipients.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Google has responded by issuing a patch \u2013 but with many Android users still unaware of the threat (or in locations where easy access to the Play Store is a luxury), there could still be millions of vulnerable devices still out there.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Unsolved Equation<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0I<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">ndependent contractors like <a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/12\/5-types-major-hacks-year-2015-review\" target=\"_blank\" rel=\"nofollow\">Hacking Team <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>(an alleged source of espionage gear for rogue states and other oppressive regimes) have been one supplier of spying tools for governments and state-sponsored organisations. But several nations are actively pursuing this technology on their own.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">One such system is the Equation Group, a hard drive intrusion mechanism which operates at the firmware level, with the ability to reinstall itself from a hidden sector on the disk \u2013 even if the operating system is completely refreshed.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Due to its level of sophistication, researchers think it probable that the Equation Group was developed through direct state sponsorship, with the Reuters news agency quoting anonymous sources formerly associated with America\u2019s NSA (National Security Agency) who confirm its origins within that organisation.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_equation.png\" rel=\"attachment wp-att-4529\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4529 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_equation.png\" alt=\"cyberthreatassessment_equation\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_equation.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_equation-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_equation-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Spying has been a part of international relations since nation-states first emerged, so this isn\u2019t a problem that\u2019s going to go away. And it\u2019s not just other governments that are targeted; high-profile organisations and specific enterprises within a country are vulnerable, too.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">The Walking, Talking Threat Element<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Nuix \u2013 a company specialising in information management technologies and global security intelligence \u2013 has just released its survey of chief information security officers and directors from Fortune 1000 and Fortune 500 companies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"http:\/\/www.informationsecuritybuzz.com\/study\/survey\/human-behaviour-as-the-biggest-threat-to-company-security\/\" target=\"_blank\" rel=\"nofollow\">The report suggests <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>that over 70% of respondents now have a policy or programme in place to deal with threats from inside their enterprise, with some 14% of those surveyed dedicating over 40% of their budgets to this particular security issue.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Simply stated, people are seen as the biggest threat or weakness, as far as securing information is concerned.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Malicious intent is one problem, but the persistent risk comes from ignorance and sloppy practices: taking shortcuts to gain system access or use of resources, unsafe conduct with email and text messaging, lack of discretion when speaking over open channels, etc.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Thankfully, people can be educated, and best practices can be put in place.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Some Best Practices:<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Know the Risks: <\/b>Each organisation is different, with its own unique information set and network infrastructure. It\u2019s important to assess the value of the data you have, and the level of vulnerability of your operations and assets.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Use Layers: <\/b>Firewalls alone aren\u2019t enough. Access protection should be complemented by monitoring software within the system, to continuously scan for vulnerabilities and unauthorised activity.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Use Analytics: <\/b>Make sure that analytics software is part of your security suite, so that abnormal events and unusual patterns of activity can be identified over time.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Use Encryption: <\/b>The 2015 <a href=\"http:\/\/www.informationsecuritybuzz.com\/articles\/3-cyber-security-lessons-to-learn-from-2015\/\" target=\"_blank\" rel=\"nofollow\">attack on BlueCross BlueShield <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>was made much less severe through the simple password encryption of the hacked Carefirst data; though birth-dates, names, and emails of over 1 million users were compromised, their password-protected medical records and Social Security data remained intact.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Use Two-Stage Authentication: <\/b>Simple protocols like having to answer a security question after a password login or entering a code sent via SMS can reduce unauthorised access damage significantly.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_risk.png\" rel=\"attachment wp-att-4532\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4532 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_risk.png\" alt=\"cyberthreatassessment_risk\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_risk.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_risk-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/cyberthreatassessment_risk-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Keep Track of Changes: <\/b>Audit trails should be used to monitor each instance when someone opens, signs, or sends a document. And use tamper-proofing technology to reduce fraud, by alerting anyone whose e-signature is on a document of any changes made to it, subsequently.<b><\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Train and Test Your People: <\/b>Educate your staff in the security protocols and practices you have in place \u2013 and conduct periodic drills to simulate a cyber-attack, to gauge their preparedness and response.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s no longer a question of \u201cif\u201d your organisation will come under attack, but \u201cwhen\u201d. Your best defence is to plan for that event.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The year just past saw several high-profile cyber-attacks hit the news, and brought the whole issue of cyber-security firmly into the spotlight. With the lessons still being learned from 2015 in mind, let\u2019s look ahead to what you should be wary of in the months to come. Home is Where the Hurt Is? \u00a0\u201cSmart\u201d domestic [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4532,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13],"tags":[],"class_list":["post-4527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4527"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4527\/revisions"}],"predecessor-version":[{"id":4539,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4527\/revisions\/4539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4532"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}