SecurityRI.com Cyber Security

THE SEVEN PITFALLS OF CYBER SECURITY

Based directly on IBM / Ponemon research, the following represent the top seven cyber security pitfalls that are opening US businesses up to massive financial liabilities, with the potential for something as serious as an extinction event.

  1. INCONSISTENCY

IN ENFORCING SECURITY POLICIES

A security policy is clearly worthless unless it is correctly enforced, and its suitability is regularly checked. However, only 32% of respondents could claim their security policies are reliably applied and regularly audited. On top of this, less than half or 43% enforce them only occasionally, 17% fail to audit their suitability, and 7% have no policies in place.

  1. NEGLIGENCE

IN THE APPROACH TO USER SECURITY AWARENESS TRAINING

Despite all the commentary about its importance, only 16% of respondents considered user security awareness training a priority. A massive 71% pay lip service to it by either including security awareness as a one-off event at employee on-boarding or reinforcing it once a year. The remainder, 13%, admitted they do nothing.

  1. SHORTSIGHTEDNESS

    IN THE APPLICATION OF CYBER SECURITY TECHNOLOGIES

    Six of the nine most typical cyber security technologies had been deployed by only a minority of respondents. Web protection, email scanning, and anti-malware had each been rolled out by 50-61%, but the remaining six (including SIEM, firewall rules, and patch management) had been deployed by only 33% at the most (SIEM), or 25% at the lowest (intrusion systems).

  1. COMPLACENCY

 AROUND VULNERABILITY REPORTING

Only 29% of respondents could call their vulnerability reporting robust, with the majority, 51%, optimistically classifying it as adequate. Surprisingly, as many as 19% have no reporting, and 11% even said they categorically had no plans to investigate its deployment or usefulness.

  1. INFLEXIBILITY

 IN ADAPTING PROCESSES AND APPROACH AFTER A BREACH

Following a breach (experienced by 71% of respondents), only 44% implemented new technology, and only 41% changed their processes. Meanwhile, 42% started considering new technology, while 14% purposefully did nothing.

  1. STAGNATION

 IN APPLICATION OF KEY PREVENTION TECHNIQUES

Only a minority of respondents had implemented all of them. The most prevalent technique was full disk encryption on mobile and portable endpoints, but even this was only performed by 43%. Application white listing was implemented by only 38%, and logging of authenticated users’ activity was used by only 41%.

  1. LETHARGY

 AROUND DETECTION AND RESPONSE

Over the past 12 months, detection times had risen for 40% of respondents; response times were up for 44%; and resolution times had increased for 46%. In contrast, of the 2016 report, detection times had risen for only 28% of respondents; response times were up for 28%; and resolution times had increased for 27%. This shows that the rate of decay (and complacency) is growing

The survey shows that:

  • Detection times have grown for 40%
  • Response times have grown for 44%
  • Resolution times have grown for 46%

So, in hard commercial terms, what does this vulnerability cost a typical SMB or enterprise? Beyond the readily identifiable impacts of a lost customer or downtime leading to lost opportunity, what are the wider implications? In the “2016 Cost of Data Breach Study: Global Analysis,” 1 IBM and Ponemon calculated a standard cost per lost or stolen record of USD $158. This calculation included direct expenses (e.g. engaging forensic experts, outsourcing hotline support, and customer relationship remedial costs such as discounts on products and services) and indirect costs (in-house investigations and internal communications). It also extrapolated typical values of lost customers and the impact of brand damage on future customer acquisition.

  SMB Enterprise
Average number of records held 482 5,946
Average cost per lost / stolen records (IBM/Ponemon statistics) $158 $939,444
Average number of breaches suffered in 12 months 0.32 1.05
Typical yearly cost of data breaches to a generic SMB/Enterprise $24,465 $983,139
 

In closing, cyber security should not be taken lightly. Companies should invest in their IT infrastructure, while setting strict cyber security test dates. Also, user training can go a long way – seeing how “human error” causes majority of cyber breaches. If you have any questions, please feel free to contact us 24/7/365.

0
Read More
SecurityRI.com Internet Toy Risks

FBI Warns Parents: Your Kid’s Internet Smart Toys Could Be a Security Risk

While we continue to grow as a technology driven society, so doesn’t our children’s toys. Many smart toys in 2017 connect to the internet, and even though they’re extremely popular, they may introduce security risks to your children / family. As a cyber security company we encourage our community to follow the FBI’s instructions which is the following:

Consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments. Smart toys and entertainment devices for children are increasingly incorporating technologies that learn and tailor their behaviors based on user interactions. These toys typically contain sensors, microphones, cameras, data storage components, and other multimedia capabilities – including speech recognition and GPS options. These features could put the privacy and safety of children at risk due to the large amount of personal information that may be unwittingly disclosed. – FBI

Why Does This Matter To My Family?

The features and functions of different toys vary widely. In some cases, toys with microphones could record and collect conversations within earshot of the device. Information such as the child’s name, school, likes and dislikes, and activities may be disclosed through normal conversation with the toy or in the surrounding environment. The collection of a child’s personal information combined with a toy’s ability to connect to the Internet or other devices raises concerns for privacy and physical safety. Personal information (e.g., name, date of birth, pictures, address) is typically provided when creating user accounts. In addition, companies collect large amounts of additional data, such as voice messages, conversation recordings, past and real-time physical locations, Internet use history, and Internet addresses/IPs. The exposure of such information could create opportunities for child identity fraud. Additionally, the potential misuse of sensitive data such as GPS location information, visual identifiers from pictures or videos, and known interests to garner trust from a child could present exploitation risks.

Consumers should examine toy company user agreement disclosures and privacy practices, and should know where their family’s personal data is sent and stored, including if it’s sent to third-party services. Security safeguards for these toys can be overlooked in the rush to market them and to make them easy to use. Consumers should perform online research of these products for any known issues that have been identified by security researchers or in consumer reports.

What Makes Internet-Connected Toys Vulnerable?

Data collected from interactions or conversations between children and toys are typically sent and stored by the manufacturer or developer via server or cloud service. In some cases, it is also collected by third-party companies who manage the voice recognition software used in the toys. Voice recordings, toy Web application (parent app) passwords, home addresses, Wi-Fi information, or sensitive personal data could be exposed if the security of the data is not sufficiently protected with the proper use of digital certificates and encryption when it is being transmitted or stored.

Smart toys generally connect to the Internet either:

  • Directly, through Wi-Fi to an Internet-connected wireless access point; or
  • Indirectly, via Bluetooth to an Android or iOS device that is connected to the Internet.

This information can be breached / hacked which may fall in the hands of the unwanted.

WHAT SHOULD I DO?

The FBI encourages consumers to consider the following recommendations, at a minimum, prior to using Internet-connected toys.

  • Research for any known reported security issues online to include, but not limited to:
  • Only connect and use toys in environments with trusted and secured Wi-Fi Internet access
  • Research the toy’s Internet and device connection security measures
    • Use authentication when pairing the device with Bluetooth (via PIN code or password)
    • Use encryption when transmitting data from the toy to the Wi-Fi access point and to the server or cloud
  • Research if your toys can receive firmware and/or software updates and security patches
    • If they can, ensure your toys are running on the most updated versions and any available patches are implemented
  • Research where user data is stored – with the company, third party services, or both – and whether any publicly available reporting exists on their reputation and posture for cyber security
  • Carefully read disclosures and privacy policies (from company and any third parties) and consider the following:
    • If the company is victimized by a cyber-attack and your data may have been exposed, will the company notify you?
    • If vulnerabilities to the toy are discovered, will the company notify you?
    • Where is your data being stored?
    • Who has access to your data?
    • If changes are made to the disclosure and privacy policies, will the company notify you?
    • Is the company contact information openly available in case you have questions or concerns?
  • Closely monitor children’s activity with the toys (such as conversations and voice recordings) through the toy’s partner parent application, if such features are available
  • Ensure the toy is turned off, particularly those with microphones and cameras, when not in use
  • Use strong and unique login passwords when creating user accounts (e.g., lower and upper case letters, numbers, and special characters)
  • Provide only what is minimally required when inputting information for user accounts (e.g., some services offer additional features if birthdays or information on a child’s preferences are provided) – FBI’s Website
0
Read More
Secure Managed IT Services

Managed IT Services with SecurityRI.com

Is your Managed IT Services Secure?

Not only does SecurityRI.com offer leading Managed IT Services, we also incorporate our 35+ years of security with it. We believe managed IT services should start with security and finish with technology.

What is Managed IT Services / Security?

A managed security services provider (MSSP) is an extension of your IT department / security operation that closes the loop of people, processes and technology. SecurityRI.com operates 24/7/365 to ensure your business has zero downtime. Businesses turn to us to alleviate the pressures they face daily related to information security such as targeted malware, customer data theft, skills shortages and resource constraints. Managed security services (MSS) are also considered the systematic approach to managing an organization’s security needs. The services may be conducted in-house or outsourced to a service provider that oversees other companies’ network and information system security. Functions of a managed security service include round-the-clock monitoring and management of intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and responding to emergencies. There are products available from a number of vendors to help organize and guide the procedures involved. This diverts the burden of performing the chores manually, which can be considerable, away from administrators.

SecurityRI.com’s Best-In-Class Secure Management

Through our management of IT Security we provide centralized patching, updating, security protocols and maintenance across your entire network. We include database administration and network support to ensure ‘always on’ desktop access for your users. What’s more, you have full visibility into the health of your environments through automated reporting and quantifiable metrics.

Also, Don’t Forget to Contact Us Regarding Our Managed Desktop Services! Get rid of the headache of managing end user devices and performing endless hardware refreshes with SecurityRI.com’s productivity solution. Our zero-maintenance, Office 365-based solution provides a full end user computing experience including the Microsoft applications your users love and know, such as Outlook, Word, Excel, PowerPoint, Skype instant messaging and video conferencing, and more. Plus the security you demand, regardless of the device.

 

0
Read More
Office 365

Email Safety Tips Using Office 365

Office 365 is Creating a Safer Email Process

Microsoft has created a platform to help protect you and your business. The new Office 365 works well against spam, phishing and malware prevention. Today it has become difficult to determine if an email is an attack or legitimate source. This is why businesses must invest in a secure solution.

Below you will find some great security features. Also, understand that Office 365 is much more than a safer solution, it can eliminate unnecessary tasks, increase workflow and organize your entire email system.

The top safety tip Office 365 has invested in, is the color coded safety tip message feature. Office 365 will WARN you about potentially harmful messages. Most messages in your inbox won’t have a safety tip. You’ll only see them when EOP and Office 365 has information you need to help prevent spam, phishing, and malware attacks. If safety tips do show up on in your inbox, you can use the following examples to learn more about each type of safety tip. – Microsoft 

We will provide additional information regarding Office 365, and appropriate email safety in our future blog postings. In closing, note that it’s unlikely for outside sources to harm Office 365. It’s more likely breaches will occur due to improper configurations or human error.

As always, be safe and aware at all times!

SecurityRI

 

0
Read More