mitigation-security

Repeat After Me… Nobody Is Safe From Cyber Attacks

Nobody Is Safe From Cyber Attacks

The last couple of years have shown the world that seemingly nobody is safe from cyber attacks. The 2017 breach of Equifax was proof that now, even the common person should begin paying attention to cyber threats and take measures to protect their personal lifetime data. In fact, Gallup recently released a report showing that cybercrime tops Americans’ crime worries, with 67 percent of Americans worrying about hackers stealing personal information and 66 percent worrying about identity theft. For comparison, only 38 percent were concerned about having their car stolen or broken into, the third highest crime-fear on the list.

A separate survey, the SolarWinds MSP’s 2017 investigation into cybersecurity preparedness, showed that businesses don’t exactly agree with public perception — even if they should. The results of the report show that 87 percent of businesses are confident in their cybersecurity preparedness, even though 71 percent of them had at least one breach in the previous year. A false sense of security in the face of inadequate defense tends to make the perfect target, which may have explained the rise in ransomware infections in the last couple of years.

It would have been impossible to predict that businesses, hospitals, and the public alike would be hit so hard by malware and other types of data breaches — but one man thinks that the knows where hackers are going to strike next.

Sgt. Mark Varnau of the San Diego County Sheriff’s Office is also the law enforcement coordinator for the Computer and Technology Crime High-Tech Response Team, aka CATCH. In an article with San Diego Union Tribune, Varnau is warning that the cloud is where cyber criminals will strike next.

Ransomware will attack the cloud,” he said. “They’re not there yet, but it is a matter of time.”

The Future of Cyber Security Will be Fought in the Cloud

The Anti-Phishing Working Group’s H1 2017 Phishing Activity Trends Report noted a marked increase in phishing attacks against businesses in both the Logistics & Shipping and the Cloud Storage & File Hosting sectors. The perpetrators of these attacks are cyber gangs who are compromising the accounts both individuals and enterprises.

According to a release on Business Wire, “These free hosts are not only easy and cheap to use, but they also allow threat actors to create subdomains spoofing a targeted brand, resulting in a more legitimate-looking phishing site. Free hosts also afford phishers additional anonymity, because these services do not make registrant information easily available.”

It’s fitting that the FBI released a press release at the end of October 2017 titled “FBI Tech Tuesday—Building a Digital Defense Against Cloud Computing Dangers”. In it, they say of the cloud that the “system has its advantages… However, cloud computing also comes with its own set of risks. The two biggest concerns? Losing access to your data and someone else stealing your data.”

Malware, such as ransomware, alongside DDoS attacks are what will hit cloud providers and their clients first, akin to the Dyn DDoS attack in late 2016 rendered the internet useless for half a day. There are always going to be things out of your control. Nevertheless, the FBI suggests cloud users should begin by answering these questions in order to suss out and patch their weak spots:

  • Does your cloud service provider have adequate backups and redundancies? If the company hosts a back-up copy of your data separate from the primary files, it could make it available to you in the case of a ransomware attack or a hardware failure.
  • Does your provider have adequate logging? If there is an attack, you want your cloud service company to have a clear idea of what happened so that it can patch its security against future attacks.
  • Does your provider have a distributed denial of service (DDoS) mitigation plan? The key phrase to listen for is “black hole.” In this context, a black hole is an inactive or unused IP address where the unwanted traffic from a DDoS attack can be sent without notifying the bad guy.
  • Are strong password requirements enforced? Do you use two-factor authentication? Yes, bad guys might still be able to get your data without directly logging into your account, but why make it easy for them?
  • Do your employees know what a “phishing” attempt may look like and how to respond? They should be very aware of how this social engineering technique works and know not to click on any embedded links.
  • Finally, is your data encrypted at rest and in transit? You want legitimate users to be the only ones with the opportunity to read it.

Your Employees Are Putting You In Danger

Not only should your employees know what phishing emails are and how to steer clear of them, they should also know what other actions they commit may put your business in danger of breach. Wombat Security reports that human error is to blame for the majority of successful phishing attacks on companies, such as oversharing on social media or unsafe use of wi-fi.

Eastern Kentucky University Online’s resources suggest five ways for businesses to simultaneously reduce human error and increase security of information. These include:

  1. Training. Crew resource management (CRM) training involving cybersecurity means imagining and rehearsing scenarios and practicing how to respond and contain them. EKU reports that 54% of companies surveyed said that their company offers cybersecurity training—and of those, only 65% said that training was ongoing.
  2. Multifactor Identification and Authentication Management. Too many industries, including, unfortunately, nuclear power plants, still use factory-set passwords. However, even adding one more identification factor can increase security.
  3. Network Management. Mapping your network and performing a threat and risk analysis will identify weak points and potentially exploitable vectors. Patching this holes can keep your ship from sinking.
  4. System Monitoring and Surveillance. This involves both machine and human intervention. Machines first collect data, then humans are in charge of analyzing it determining whether the network is secure. Make sure standardized rules and best practices are provided and enforced.
  5. Breach Detection. Unfortunately, prevention isn’t enough anymore. Software that detects breaches is essential, and human understanding and analysis of the system is essential to implementing the best monitoring and breach detection techniques.

Adding to employer’s woes is the skills gap that’s beginning to widen in the cybersecurity industry. Every year in the US, 40,000 jobs for information security go unfilled, threatening to manifest into a global shortage of 2 million by 2019. This puts additional importance on business training programs for both cloud service providers and their clients to make sure current employees are as educated as they can at mitigating cyber risks.

With all of this in mind, it’s clear that organizations both using and providing cloud services need to take precautions to protect themselves the best they can against cyberthreats. However, with the right questions, the right training programs, and the right talent, businesses big and small will mitigate substantial risks, allowing them to face cyberthreats in the cloud with confidence.

By Andrew Heikkila

Andrew Heikklia

Andrew Heikkila is a writer, artist, and business owner from the Pacific Northwest. Because technology has become the cornerstone of modern human existence, Andy finds himself writing about it often, usually in relation to the IoT, cybersecurity, the blockchain, or just good ol’ business integration.

Andy’s writing contributions can also be seen on TechCrunch, Business 2 Community and Datafloq.

CONTRIBUTORS

Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Cloud Computing Certification Courses

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Chris Gerva

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...