STE WILLIAMS

Ring Flaw Underscores Impact of IoT Vulnerabilities

A vulnerability in Amazon’s Ring doorbell cameras would have allowed a local attacker to gain access to a target’s entire wireless network.

A vulnerability in Amazon’s Ring Video Doorbell Pro IoT device could have allowed a nearby attacker to imitate a disconnected device and then sniff the credentials of the wireless networks when the owner reconfigured the device, according to a report issued by security firm Bitdefender.

The issue, which was fixed by Amazon in September, underscores the impact of a single insecure Internet-of-Things device on the organization in which it is deployed. While the vulnerability may only occur in a single network device, the result of the flaw could be leaked information — the wireless network password, for example — which  would have far more serious repercussions.

“IoT is a security disaster, any way you look at it,” says Alexandru Balan, Bitdefender’s chief security researcher. “Security is not the strong suit of IoT vendors — only rarely, do we see vendors who take security seriously.”

The discovery of a serious vulnerability in a popular IoT product comes as businesses and consumers increasingly worry about the impact that such devices may have on their own security. Only about half of security teams have a response plan in place to deal with attacks on connected devices, according to recent report from Neustar. Even critical-infrastructure firms, such as utilities that have to deal with connected operational technology, a widespread class of Internet-of-Things devices, are ill-prepared to deal with vulnerabilities and attacks, the report says.

Vulnerabilities in IoT devices can have serious repercussions. In July, a team of researchers found widespread flaws in the networking software deployed in as many as 200 million embedded devices and found millions more that could be impacted by a variant of the issue in other real-time operating systems.

The issue with Amazon Ring is not as serious but it is a reminder that vulnerabilities can still be easily found in the devices by attackers paying attention, says Balan“We tend to look at the popular devices, and those tend to have better security than the less popular devices,” 

The rest of the Ring device’s communications are encrypted and secure, according to Bitdefender. The mobile application only communicates with the device through the cloud, even if the app and device are already on the same network, the company’s analysis stated. Cloud communications are conducted over encrypted connections to API services using Transport Layer Security (TLS) and certificated pinning. 

The device’s initial connection with the local network is the only time that it sends data without encryption, Balan says. “This is a proximity based attack, so its not that big of a threat on a global scale. You need to be with a hundred meters or so to issue the deauthentication packets and force the user to reset the password.”

The existence of the vulnerability is not an indicator of the commitment of Ring’s security team, Balan adds, noting that within a few days Amazon responded and two months later closed out the report. By September, the company issued a patch — within three months after the initial communication, according to Bitdefender’s disclosure timeline. As of November, all affected devices had been patched, which Balan says is a better outcome then the majority of disclosures that Bitdefender works on with other IoT vendors.

“Amazon is one of the few that take security seriously,” he says. “Inherently everything has some flaw that will be discovered. The only challenge with IoT is whether you take that disclosure seriously.”

The trend that more vulnerabilities are being discovered in popular products is a sign that the manufacturers are paying attention and responding to researchers, Balan observes. “If someone does not have vulnerabilities disclosed in their product, then that is likely the most risky product, from a security perspective. If the vulnerabilities were discovered, then props to them — that’s a good thing.”

Related Content

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What a Security Products Blacklist Means for End Users and Integrators.”

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/iot/ring-flaw-underscores-impact-of-iot-vulnerabilities/d/d-id/1336304?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Hospital Cyberattacks Linked to Increase in Heart Attack Mortality

Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.

Ransomware attacks and data breaches targeting hospitals may cause a higher mortality rate among heart patients in the months and years after an incident, Vanderbilt University researchers report, as breach remediation time interferes with patient care and outcomes.

Researchers with Vanderbilt’s Owen Graduate School of Management analyzed healthcare data breaches recorded by the Department of Health and Human Services (HHS). They investigated patient mortality rates at more than 3,000 Medicare-certified hospitals between 2012 and 2016, 10% of which had reported a data breach. They found attackers are not directly controlling medication; rather, hospitals’ approach to breach remediation is slowing down doctors, nurses, and other healthcare practitioners responsible for cardiac care, according to an article on PBS NewsHour.

Specifically, the researchers wanted to know two factors: the time it takes for a patient with chest pain to get from an emergency room to receiving an electrocardiogram (EKG) reading, and the 30-day mortality rate for heart attacks. They learned the time it takes for someone to receive an EKG increased by up to 2.7 minutes after a breach. Further, this delay stayed as high as two minutes even three to four years after a breach occurred.

At the hundreds of hospitals in this study that reported data breaches, there were as many as 36 additional deaths per 10,000 heart attacks each year. It’s worth noting heart attacks are among the most common medical emergencies in the US: According to PBS, 735,000 Americans suffer one every year. The number of healthcare institutions affected by data breaches rose 20% in 2019, affecting medical records of 30 million health care customers – the most since 2015.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What a Security Products Blacklist Means for End Users and Integrators.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/hospital-cyberattacks-linked-to-increase-in-heart-attack-mortality/d/d-id/1336306?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Bugcrowd Pays Out Over $500K in Bounties in One Week

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.

Crowdsourced bug disclosure programs are popular. The latest evidence is Bugcrowd, which in October alone paid out $1.6 million to some 550 white hat hackers from around the world who collectively reported a total of 6,500 vulnerabilities in products belonging to companies signed up with the platform.

More than $513,000 of those payouts was made just last week—a record in a 7-day period for Bugcrowd since it launched in 2011. The biggest payout of $40,000 went to a hacker who disclosed a bug in an automotive software product.

Over 300 of the 6,500 valid bug submissions to Bugcrowd in October were classified as P1 under Bugcrowd’s vulnerability rating taxonomy. These are bugs that are most critical in nature.

Examples include privilege escalation bugs, remote code execution flaws, and bugs that enable financial theft or expose critically sensitive data such as passwords, says David Baker, CSO and vice president of operations at Bugcrowd. “Some recognizable examples of a P1 vulnerability are EternalBlue, BlueKeep, and Apache Struts, the vulnerability that led to the massive breach at Equifax.”

Bugcrowd’s numbers for October are considerably higher than five years ago, when it paid about $30,000 to 85 hackers. Just five of the bugs reported in October in 2014 were critical.

According to Bugcrowd, bug bounty payouts for 2019 so far is more than 80% higher than last year’s payouts, meaning that security researchers are finding and reporting a lot more bugs than ever under the program. “In a matter of a five-year span, we’ve exponentially multiplied payouts, Crowd engagement, and critical findings,” Bugcrowd said in a statement Friday. “To say we’re excited is an understatement.”

Managed vulnerability hunting and disclosure programs like Bugcrowd, HackerOne, and Synack have become popular in recent years. Many organizations—across industries and companies of all sizes—have signed up with these platforms and let freelance bug hunters poke and prod at their products for security vulnerabilities. The goal is to give organizations a way to find bugs in their software that they might have otherwise missed—and more cheaply than if they were to hire their own security researchers for the job.

As is to be expected a majority of the bugs that security researchers find and report to Bugcrowd are of the medium to low severity type, Baker says. “As a rule, there’s always going to be fewer critical issues than there are medium- or low-severity findings—simply by the fact that they’re harder to find,” he notes. “That said, the most dollars have gone out for medium-priority findings, compared to high or critical vulnerabilities,” he notes.

On average, bug submissions on Bugcrowd can fetch around $900. But high-severity and critical P1 bugs can garner around $3,000 on average and much more in some cases. “Car hacking skill tends to be a pretty lucrative skillset,” for instance, Baker says.

Since launch, security researchers have reported over 300,000 vulnerabilities to the Bugcrowd platform. Over the last year alone, submissions increased nearly two-fold, Baker says. Currently, hundreds of thousands of security researchers from around the world are signed up with the platform.

About 30% of them are from the United States. India hosts the second largest group, followed by Great Britain, Baker says. Over the last couple of years, crowdsourced security activity has really accelerated in India, he says. “We are seeing not just an increase in researchers but also a gradual increase in skills as people learn from and teach others.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What a Security Products Blacklist Means for End Users and Integrators.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/bugcrowd-pays-out-over-$500k-in-bounties-in-one-week/d/d-id/1336307?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

4 Ways to Soothe a Stressed-Out Incident Response Team

IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

In crafting your organization’s incident response (IR) plan, you thoroughly accounted for appropriate timelines, public relations, and a recovery strategy. But have you considered the food? Because the food is also important.

“We don’t think about the care and feeding of the incident-handling team,” says Cindi Carter, CSO at healthcare analytics provider MedeAnalytics. “Bring them some food. You need to make sure people are appreciated. Whether big or small, they are part of the effort, and these kinds of gestures go a long way.”

Indeed, once a breach is discovered or a security incident has disrupted operations, the IR team has their work cut out for them – often working nearly around the clock to both identify the cause of the threat and to get things running again. According to a poll earlier this year from NTT Security, the majority (59%) of organizations admitted they were not confident their companies could resume”business as usual” after the first 24 hours. Asked about their No. 1 focus in the first 24 hours after a security incident, nearly two-thirds (64%) of respondents said mitigating the threat was the main priority, while 36% said it was about identifying the cause. 

In this high-stress environment where just about everyone is nervous and the need for information is relentless, keep in mind these several critical considerations when helping your IR team stay productive and avoid burnout.

Sequester Your Team to Minimize Disruptions
Andrew Morrison, cyberstrategy, defense, and response leader and principal in Deloitte’s Risk Financial Advisory, says one of the most challenging aspects to working IR is that the need for information outpaces the actual supply of what’s coming in. Morrison’s team is the one heading into a client engagement to work IR – what he calls “every client’s worst nightmare.” The focus is almost always squarely on how to get out of the situation as soon as possible.

“Every executive wants to know what happened and in a time frame when it is difficult to determine,” Morrison says. “It is really a tug of war, and the investigator is at the heart of that. Innocently, the executives are asking for updates and status, and it distracts from the work.”

To deal with these requests, Morrison recommends the team assign a point person and then agree on a daily time for updates so that requests don’t come in all day.

Todd Borandi, a security industry veteran and previously CISO with the National Renewable Energy Laboratory, suggests the security manager give the team its own space so it can be separated from distractions.

“The last thing a high-functioning team needs is the shadow of their boss, or their boss’ boss, looming over them,” Borandi says. “Let them do what they have been trained to do and stay out of their way while they are trying to do it.”

Foster a Culture of Care and Courtesy
When it is obvious the stakes are high, IR team members will almost always remain committed to the work and not want to walk away. But Carter says it is important to remember the team comprises people who have lives that have also been disrupted by this demanding work.

“Encourage them to be able to say, ‘Hey, can someone pick up my kids from school?'” she says. “You have to think through those scenarios. These are people who have lives that don’t always have alternatives. You may have single parents, for example. You need to think about the outside needs of your team.”

Morrison says his teams tries to follow a work-by-the-sun model, bringing in off-shore teams who can pick up for a few hours while the on-the-ground team gets some rest.

“You need to guard against burn out,” Morrison advises. “Trying to work 24 hours isn’t productive either.”

However, even when security leaders want to give IR a break, their level of commitment may make them hesitate to take it.

“Some people have FOMO [fear of missing out] and want to be part of solution,” Carter says. “But they need to understand that through their work, they already are part of the solution, even if it didn’t happen on shift.”

Reward Them When the Dust Settles
Once the fire-drill-like environment is gone and the threat has been discovered and contained, you’ll want to ensure IR team members understand their work is appreciated, even after it’s over.

“When time is slow and the job is done, ensure you have the flexibility to offer these folks compensation for the marathons they will have to endure,” Borandi says.

Constantly striving to consider both the professional and personal needs of those who are called on under the most difficult situations will be key to smoothing the way the next time the IR team may be needed, Carter adds.

“We’re human beings,” she says. “We have to make sure in times of crisis that we take care of each other.”

Related Content:

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/4-ways-to-soothe-a-stressed-out-incident-response-team/b/d-id/1336308?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Another Facebook hoax: Robbers still throwing eggs at car windows?

Researchers who study the physics of hurling eggs at windshields – the ovoflingatologists – have access to such finely calibrated splatometers that they can apparently predict that if you turn on your wipers and windshield squirter, you will make a scrambled, milky mess that obscures visibility by (up to) an astonishing 92.5%.

So precise! Surprisingly precise, really. One would imagine that there are many variables that go into calculating egg obfuscation percentages: the egg size; how well-nourished the birds are; the number of eggs required to garnish an entire windshield; how much time highway robbers have to throw them before your moving car has, well, moved on and they miss their chance to attack you when you pull over to wipe it all off; how good their aim is; where the eggs land; how well the washer system and wipers work on the car they’ve targeted; or whether the eggs were laid by African or European swallows.

The many unpredictable variables behind that 92.5% may lead some of us to question the veracity of the “OFFICIAL MSG FROM POLICE” that’s been making the rounds on Facebook. Then too, the many times this cheesy omelette has been making the rounds and getting debunked along the way may lead us to the same conclusion: namely, that it’s a persistently clucking, never-say-die hoax.

Here’s the latest version, spotted on Facebook last week:

Egg Windshield Robbery

OFFICIAL MSG FROM POLICE:
If you are driving at night and eggs are thrown at your windscreen, do not stop to check the car, do not operate the wiper and do not spray any water, because eggs mixed with water become milky and block your vision up to 92.5%, and you are then forced to stop beside the road and become a victim of these criminals. This is a new technique used by gangs, so please inform your friends and relatives. And most importantly do not be selfish by refusing to share this message.

An “official” msg from what police?

When Snopes debunked this gobbler nearly a decade ago, in December 2009, the hoax slayers asked their police contacts about these supposed attacks and scoured news reports, looking for accounts of raw-egg-related robberies and carjackings, they failed to come up with even a single, solitary occurrence in the US.

Well, if not here, then perhaps in some rougher part of the world, one imagines? Later renditions of the hoax duly took it outside the US, changing “used by robbers” to “used by robbers in Johor Bahru”, which is the capital city of the state of Johor, perched on the southern tip of the Malay Peninsula.

Embellishments

Snopes says that later forms of what was initially spotted as a Yahoo Groups mail list post grew ever more festooned: one version added the claim that the attacks were happening “on interstates near exits.” Sometimes the messages waxed profound, dressed with this hollandaise sauce of pathos:

Folks are becoming more and more cruel daily. But this is just the beginning of pangs of distress. With the decline in economy and job losses, we can expect anything. Just can’t be too careful these days.

No, gosh darn it to heck, you can’t be too careful these days. Which is why you shouldn’t be “selfish” with your stubborn refusal to share the post, right? What empty shell of a human being would be so cruel as to not alert their friends and family?

One that thinks before they share, that’s who. Please do be a good social media citizen: don’t forward a post before you do a bit of research to find out whether it’s a rotten egg. It might feel fun to share just so you can make fun of it, but please do keep in mind that by doing so, you’re giving fraud-slingers that much more time in the spotlight, and by doing that, you’re playing into the hands of people who peck away at the credibility of what we all find online.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/S1g1Em4copk/

Leak of 4,000 Facebook documents heaps more trouble on internet giant

This week’s bold rebrand of Facebook to FACEBOOK can’t hide the growing sense that nobody is happy with the company right now.

October was particularly bad, climaxing with CEO Mark Zuckerberg being publicly beaten up by Democrat Alexandria Ocasio-Cortez during House Financial Services Committee hearings over the company’s allegedly lax attitude to policing political advertising.

All that after the company’s yet-to-launch global cryptocurrency Libra lost the symbolic backing of PayPal, followed days later by MasterCard, Visa and eBay.

And then, of course, there was the slow-motion scandal about developer access to customer data through things like the Groups API and the company’s general inability to get on top of the issue of dodgy malicious ads that hijack its platform.

Did we mention July’s record-breaking $5 billion fine by the US Federal Trade Commission (FTC) over its privacy fumbling?

The Six4Three saga

Just when you thought the hurt had to end, news site NBC this week published a “trove” of 7,000 documents connected to a bitter David and Goliath lawsuit brought against Facebook by US startup Six4Three over the former’s 2014 decision to shutter third-party access to its Friends API.

There’s backstory to this case – including the alleged handing over of a USB drive to British MP Damian Collins during a fake news inquiry by Six4Three’s CEO Ted Kramer. But the gist of the latest leak is it’s stuffed with documents Facebook might prefer had remained private.

This includes 4,000 internal Facebook emails (1,200 marked “highly confidential”), web chats, presentations and spreadsheets from the period between 2010 and 2015, before the world’s biggest social network was under the cosh.

British journalist Duncan Campbell also got hold of the same files in April, as did NBC which reported on them without making the source material public.

Much of what the cache reveals isn’t that new – mainly the sort of rival-squashing corporate megalomania and relaxed attitude to user data many suspect might be normal inside Silicon Valley companies.

Facebook gave access to user data even as it shut down its Friends API for others. Facebook wanted to spy on the locations of Android users. Facebook wanted to put a stone in the shoe of its rivals Google, Twitter and Amazon.

More significant might be the timing. It’s as if Facebook’s troubles are feeding off one another, gaining collective strength in ways that beget new scandals.

The long unwinding road

Yet another twist arrived this week with the revelation that California’s State Attorney General is probing Facebook and thinks the company might not have been handing over everything it needs to conduct its enquiries.

It looks as if this is just how it’s going to be for Facebook for the foreseeable future, as it’s never-ending travails embed themselves as the public face of growing dissatisfaction with big tech companies.

It’s far from the only brand name in the firing line but, for now at least, it’s by some distance the biggest target.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/hXGqIRYXl7E/

IT services pro hacked former client’s email

An IT project manager has pleaded guilty to accessing the email account of a former client’s CEO, said reports this week.

According to the Register, 27-year-old Leeds resident, Scott Burns, was charged under the Computer Misuse Act for tinkering with systems owned by Dart Group, which owns the Jet2 airline.

The hapless hacker was reportedly an IT project manager at Blue Chip Data Systems, which offers IT support and managed services. He accessed the email inbox of Steve Heapy, the CEO of Jet2 and its sister company Jet2holidays, although it isn’t clear what Burns was using the information for.

The Register found Burns’ LinkedIn account, which had listed a project entry under ‘Accomplishments’ relating to his work for Dart Group. Apparently, he helped move the company to Microsoft’s Office 365, including preparing back-end systems for a smooth migration of around 5,000 users.

As of yesterday, his LinkedIn account had been scrubbed of any accomplishments, and also didn’t show any employment history, although both Jet2 and Blue Chip Data Systems show up in his interests. He also posted seven months ago as an employee of Pure Technology Group, where he was “really chuffed to have been awarded employee of the quarter”.

According to the indictment, Burns accessed the CEO’s inbox over three weeks in January 2018. He tried to cover his tracks by accessing from different IP addresses. However, he slipped up when he eventually accessed the inbox from a Virgin Media account in his own name. That gave investigators the information they needed to track Burns’ computer, and it was game over.

Accessing a victim’s computer from an identifiable account is a common theme among hackers who get caught. For example, the FBI collared US hacker Kyle Milliken after he forgot to use his VPN to protect his IP address when hacking Disqus.

Are contractors your weakest link?

Contractors could be the weakest link in your security chain, and they should be held to the same levels of security that you expect from your own employees.

From unscrupulous individuals who sneak a peek at your personal data like Burns here, to being tempting targets for hackers, to simply being harder to police

As Naked Security writer John Hawes observed in an article about the US Department of Defense’s belated steps to ensure security standards of private sector companies doing business with the military:

Everyone we do business with, share data with, outsource operations to, sell things to or buy things from forms a part of our own security chain. A breach at any point in the chain can have an impact on the privacy and integrity of our data.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/b9fuhoB__qE/

6 Small-Business Password Managers

The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.PreviousNext

Good passwords are messy. They’re long, chaotic, and very difficult to memorize. That’s what makes them so strong. To keep them good and useful, though, requires a tool — a password manager.

The idea at the core of most password managers is simple: A database that matches user names and passwords to login pages is stored under the protection of a single strong password. When a login page is encountered, the password manager springs into action, filling in the necessary fields when unlocked with the master password.

With a password manager, the security best practice of a different strong password for every account can be followed, and changing those passwords on a regular basis becomes much less traumatic.

Any password manager worthy of consideration will perform this basic task well, though differences exist in how it is performed, how credentials are protected, and how the tool integrates with other security, directory, and network management components. These differences are especially critical for small businesses. Since smaller companies tend to have smaller budgets for IT staff, the need is high for a password manager that has features to fill in the blanks left by other products, is easy to integrate into existing infrastructure, and protects passwords for users who might have access to significant caches of critical data.

What products fit the bill? Dark Reading scoured the Internet for user comments, professional opinions, and published reviews of password managers of use to small business IT. We found half a dozen candidates that span a wide range of capabilities and prices.

As you click through the list, you’ll notice there are no free or open source options. That’s because all of the options in those categories are most suited to individual consumers, are quite complex to integrate into business infrastructures, or both.

We’d also like to know: Which password manager do you use for your small business? Do you worry about integration, or do see password management as a purely end-point issue suitable for a free-for-all solution? Let us know in the Comments section, below.

(Image: beebright VIA Adobe Stock)

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full BioPreviousNext

Article source: https://www.darkreading.com/operations/identity-and-access-management/6-small-business-password-managers/d/d-id/1336242?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

9 Principles to Simplify Security

This isn’t a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.

Complexity has become a significant issue. Enterprises suffer from overcomplicated cybersecurity environments that are underutilized, undermanaged, undermonitored, and laced with misconfigurations.

Complex environments cause a number of problems. They aren’t cost-efficient, it is impossible to optimize them, they significantly lengthen the incident response process, and they act as a barrier for innovation, often turning small requirements for technical changes into large-scale projects.

While cybersecurity threats are constantly rising, security professionals are expected to achieve more with the same amount of resources. This means choosing simplicity over complexity, making cybersecurity environments easy to manage, control, change, and maintain.

Follow these nine principles to simplify your cybersecurity environment:

1. Automation
Automation is the key to the future of cybersecurity. Many companies have already implemented various automation products, such as security orchestration, automation, and response (SOAR) and breach and attack simulation (BAS). But automation is not a product, it’s an approach. There are numerous activities that security teams can automate.

Action Items

  • Define “automation” as a strategic goal.
  • Ask each security team member for three ideas for tasks or processes that can be automated.
  • If possible, assemble an automation task force that will identify opportunities for process automation and simplification.

2. Utilization
Underutilization of security products is a global epidemic. Companies tend to purchase new solutions without realizing that they could have utilized existing ones.

Action Items

  • Make sure your team is familiar with your products to feel comfortable administrating them. (If they are not, the team will probably push to buy a new product instead of trying to utilize the current one.)
  • Ask your vendors to provide you with product training and inform you about new product features.
  • Learn from your peers about better ways to use the product.

3. Suites Over Individual Products
Companies should prioritize purchasing product suites over buying several separate point solutions, even if that means compromising, to some extent, on product quality.

Action Item

  • When possible, purchase suites instead of several separate solutions.

4. Managed Services
Depending on your specific situation, it might be highly preferable and cost-effective for you to use managed security services. Such services could shift some of the complexity to the service provider, allowing you to maintain a lighter technological environment.

Action Item

  • Consider managed services as an alternative for current solutions.

5. Overcome the Cross-Units Barrier
In most enterprises, it is almost impossible to implement and utilize a particular solution when more than one department wants to use it. In such cases, it is common for such projects to face issues such as “which unit is going to finance this?” and “who will get the credit?”

As an undesired consequence, in many cases, a relevant department will try to avoid such an issue either by implementing it without involving other potential stakeholders, or, worse, by passing on the product purchase altogether.

Action Items

  • Figure out if you can utilize solutions that are already implemented within the company.
  • Find out whether other departments can also benefit from your existing security products.
  • Overcome organizational barriers and look for cross-departmental solutions.

6. Cybersecurity Approach
A company’s approach toward cybersecurity is influenced by many factors, such as organizational culture, risk appetite, the CISO’s personal approach, and so on. Some approaches are much simpler to maintain compared with others. For example, a zero-trust strategy can save you a lot of time by creating a unified access methodology for employees, suppliers, and/or partners.

Action Item

  • Be smart about devising your strategy. Make sure it contains achievable goals.

7. Training and Knowledge Management
The more trained your security team is, the simpler it will be for team members to manage your security environment.

Action Item

  • Invest in workforce training!

8. Life-Cycle Management
When evaluating a new product, make sure to assess its entire life cycle. Sometimes, the product implementation seems straightforward, but then the organization discovers that the day-to-day operation of the product consumes an unacceptable amount of resources. This can happen for various reasons: The vendor issues critical patches frequently, the product’s documentation is lacking, the vendor has a poor support mentality, etc.

Action Item

  • Evaluate the product’s entire life cycle. Ask the vendor questions regarding product maintenance, patches, upgrade/update mechanism, documentation, etc.

9. Back to Basics
This is a hype-oriented industry. It’s easy to get excited about the next-generation-AI-powered-autonomous-anomaly-detection-prevention-response-and-remediation-system with smart-integration and advanced-data-visualization that runs on dedicated-quantum-computing-chip. But it is imperative to remember that the basic security controls are still the most important ones: Patch management, permissions, network segmentation, USB restrictions, etc.

Action Item

  • Don’t get swept away by new buzzwords. Make sure your foundations are strong.

As the quote often attributed to Einstein goes, “Everything should be made as simple as possible, but not simpler.” Simplification should become a strategic goal for every security team. Nevertheless, it’s not a one-size-fits-all situation. Simplify as much as you can, but no more than that.

Related Content:

 

Menny  Barzilay is a strategic adviser to leading enterprises worldwide as well as states and governments, and he also sits on the advisory boards of several startup companies. Menny is the CEO of Cytactic, a cybersecurity services company, and the founder of the … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/9-principles-to-simplify-security/a/d-id/1336253?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

What do you get when you allegedly mix Wireshark, a gumshoe child molester, and a court PC? A judge facing hacking charges

A judge in the US state of Georgia is facing hacking charges after she allegedly hired private investigators to look into what she believed was a spyware infection on her office computer.

Lawyers for Judge Kathryn Schrader are challenging a September indictment of three counts of computer trespass against herself and three gumshoes she recruited to monitor her work PC.

According to legal publication the Daily Report this week, the charges stem from a February incident in which Schrader allegedly brought in private dick TJ Ward to determine whether or not spyware had been placed on her office computer by Gwinnett County District Attorney Danny Porter. Porter denies the accusation.

Ward, in turn, hired computer consultants Ed Kramer and Frank Karic to examine Schrader’s machine, it is claimed. In an effort to root out any potential surveillance-ware on the machine, they installed the open-source packet sniffer Wireshark to inspect Schrader’s network connectivity, it is alleged.

State investigators, meanwhile, claimed that what Schrader and her computer forensics team did constituted illegal monitoring of the state court system’s network. In particular, the collection of network traffic via Wireshark raised serious legal issues, they said.

Further complicating matters was Kramer’s status as a convicted child molester, something that prosecutors believe should have precluded him from having any access to IT systems linked to court records. Kramer, who also co-founded the massive comics’n’nerds jamboree Dragon Con, had been sentenced to 20 years behind bars for child molestation, though he was released after five years for medical reasons.

Ethical hacking

Communication, communication – and politics: Iowa saga of cuffed infosec pros reveals pentest pitfalls

READ MORE

Crucially, in February this year, amid his alleged investigation of Schrader’s work PC, he was collared by cops who suspected him of photographing a seven-year-old boy in a doctor’s office.

That arrest breached the terms of his release from prison, and when the plod and the district attorney’s investigators searched his home, they reportedly found data files from the forensics job in a folder labelled Schrader. That sparked a police probe into Schrader, leading to these computer trespass charges being filed.

Schrader was recused as judge from all of her pending cases back in May while awaiting trial, and in turn, Porter has recused himself from Schrader’s case.

All four of the accused were charged and pleaded not guilty to the allegations. Ward and Karic were released on $25,000 bail while Kramer remains in prison. Schrader was released on her own recognizance, and has taken the additional step this week of moving to have her indictment thrown out.

The judge’s attorneys argue that even if she had asked the private dicks to do everything as alleged, it was her computer and she was entirely within her rights to have it examined for spyware.

“The indictment does not address how she did not have authority [to] access the computer network,” Schrader’s attorney was quoted as saying. ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/11/08/us_judge_indicted/