Translate

Wednesday, December 18, 2013

White House sticks with double duty for NSA director.

The White House's decision, which is part of a wider review of US surveillance policy, comes just days before a presidential task force was expected to submit recommendations that "constitute a sweeping overhaul of the NSA," reported The Wall Street Journal earlier Friday, citing "people familiar with the plans."  READ MORE 

Sunday, December 1, 2013

Understanding Security Threats for Business – Securing Structured and Unstructured Data

Not enforcing a company's intellectual property rights could adversely affect the company's financial results.  Intellectual property rights, including patents, plant variety protection, trade secrets, confidential information, trademarks, trade names and other forms of trade dress, are important to the company's business.

Companies must design and implemented internal controls to restrict access to and distribution of its intellectual property. Despite these precautions, the company's intellectual property is vulnerable to unauthorized access through cyber-attacks, theft, and other security breaches.

Vulnerabilities are aspects of IT infrastructure that can potentially be exploited, leading to unauthorized access, loss or exposure of sensitive data, disruption of services, failure to comply with regulatory requirements, or other unwanted outcomes. Vulnerabilities can stem from many sources, including: software defects, improper configurations, human error.
Malware refers to malicious software or scripts designed to access or harm information technology resources without their owner’s authorization.
Hacking refers to intentional attempts to access or harm information technology resources without authorization by thwarting logical security mechanisms. Hacking is usually conducted remotely, lending itself to attacker benefits of anonymity, automation, and scale.


Typical Threat includes the following:

Blended threats, which are designed to exploit multiple channels for getting end-users to voluntarily give up private information:
·         Phishing refers to seemingly innocuous email that contains links to malicious executables or web sites; corporate, personal and web email are all active targets
·         Spear phishing refers to phishing that is directed at specific companies or specific individuals, in which attackers gather additional information in advance to personalize the email communication and thereby increase their likelihood of success
·         Vishing (a combination of "voice" and "phishing") refers to the use of fake phone sites; e.g., the end-user may receive an email requesting that they call a toll-free number, or they may receive a phone call requesting that they call a toll-free number or visit a website
·         Smishing (a combination of "SMS" and "phishing") refers to the use of short message service (SMS) text messages; e.g., the end-user may receive a text message requesting that they call a toll-free number or visit a website
·         Drive-by downloads, in which end-users unintentionally download and install malicious executables, for example:
·         By end-users merely visiting infected web sites, or by end-users purposely downloading and installing what they mistakenly believe to be legitimate software
·         Attackers are using search engine optimization (SEO) techniques to drive end-users to web sites that are infected with malicious code
·         Shortened URLs make it even easier for attackers to disguise malicious links, and to exploit end-user trust through social engineering
·         Anonymous proxy servers, which access Internet resources on behalf of the original requester, can be used by attackers to hide malicious target URLs from web security monitoring and filtering technologies
·         International domain names that contain no Latin characters have increased the opportunity for attackers to exploit malicious, mixed-character URLs that are visually indistinguishable from their legitimate counterparts


81% of all data breach incidents leveraged hacking, 69% involved malware, and 61% used a combination of both
 97% of data breaches could have been avoided through the use of simple or intermediate controls

By not implementing the right controls for access to data this creates an opportunity for internal threats to occur within a business organization.

The question is “are your employees selling you out to the best bidder or they just plain ignorant to the fact that some activities are leaving company data exposed to theft by a business competitor or opportunistic hacker."

Points of concerns that companies need to be ware of include:
·         Password policies need to be implemented infrastructure wide within an organization.  Complex passwords are the best password to use and should be enforced from an access control perspective allowing very little room for error on an employee’s part.
·         Control access to handheld devices such as Laptop, Smartphone’s, and Tablets.  Install company managed encryption and anti-virus software onto all of these types of devices.
·         Onboard and terminations policies are often neglected and opens the door for disgruntle employees to walk away from a company with trade secrets and confidential information. Restrict access to information through strict access control policies.  Remote wipe handheld devices, and recover laptops from terminated employees immediately.
·         Strict usage policies can prohibit employees from sending sensitive information via insecure e-mail.  E-mail content scanning technology can also help. 

This was just a shortlist of the many concerns companies need to be educated on.  Bringing consultants specialize in the area of Internal company security may be a good idea for SBMs not equipped with an IT security team.

I will be providing comprehensive articles and whitepapers on the security of Structured and Unstructured Data soon. 

What types of security issues are you concerned about in your business?
Recommended Reading:


Sunday, November 24, 2013

Is Bitcoin Technology Secure?

The Bitcoin value reaches an all-time high of more than $800.  Yet the public wants to know how to use the currency and how secure is the technology?   Bitcoin is an online financial network that people use to send payments from one person to another.  In no way can this technology be compared to credit cards or US currency.  The currency is decentralized which means that no one owns or controls the Bitcoin network.  It has a peer-to-peer structure, with hundreds of computers all over the Internet working together to process Bitcoin transactions.  Bitcoin is not regulated by the government.  So who in their right mind would conduct commercial transactions with the use of Bitcoin?

Bitcoin transactions became mainstream in 2011, and seem to becoming more and more popular.  There are almost 12 million bitcoins in existence, so the Bitcoin "money supply" is now worth around $7 billion.  This technology is highly innovative and attracting to interest of many computer geeks and hobbyist alike.   Why not be in a position where you can produce as much currency as you like especially when there are merchants/consumers that are willing to trade in it?  There are reports of 10,000 merchants accepting Bitcoins in 2013.  Bitcoin has been associated with some illicit activity as well.  Suspected to be used in illegal gambling and drug trafficking.  

Bitcoin Security

There are very few off-line Bitcoin transactions occurring across the country.  Do you really know who you are making the transactions with, and will legal agreements stand up in court?  Bitcoins are stored in wallets online or on a person’s local computer.  The files contain encryption keys, or secret codes that allow you to transfer bitcoins to other people.  Bitcoin technology is a prime target for hackers.  Maybe the best option would be to print out the currency by the use of a paper wallet and store the currency in a safety deposit box.  The best practice would be to store the currency on a computer that is never continuously connected to the Internet.

Read more about Bitcoin Technology


For nationwide computer repairs and serving call 1 888 556-6371

Thursday, November 14, 2013

Hotmail Hoax

According to Sophos the number virus this week is the Hotmail Hoax.

Beware of the following text in emails:


 Hello to everyone from the Hotmail Headquarters! This is just a little test to see who is actively using their email account and in effect deleting all inactive users accounts. This process will make the whole site faster and easier to use for the active users. Now on to what to do with this email. All you have to do is forward this on to at least 10 registered Hotmail users. If you don't forward this on within 48 hours of reading it, your account will be deactivated momentarily until you contact Hotmail Headquarters.


READ THE PARAGRAPH IF YOU WANT TO KEEP YOUR HOTMAIL ACCOUNT!!!!!!!!!!!!!!!!!!!

Dear Hotmail User,

Because of the sudden rush of people signing up to Hotmail, it has come to our attention that we are vastly running out of resources. So, within a month's time, anyone who does not receive this email with the exact subject heading, will be deleted off our server. Please forward this email so that we know you are still using this account.

WARNING WARNING

We want to find out which users are actually using their Hotmail accounts. So if you are using your account, please pass this e-mail to every Hotmail user that you can and if you do not pass this letter to anyone we will delete your account.


Unfortunately people tend to believe Hoax messages and over react to the messages in E-mail.  We get calls everyday from people asking about possible viruses associated with their E-mail account.  Best rule of thumb is to delete the message rather than open it.  Go to another PC or Laptop and research the message on one of the popular virus protection sites.  We recommend Sophos, Trend or AVG as a good resources to research possible virus threats. Set up your E-mail client so that emails are scanned before download from your service provider.

If you are having severe problems with viruses on your computer systems

Call 888-556-6371 or Click http://ow.ly/qOzd4

Sunday, November 10, 2013

Civilian or Military Personnel Heading the Cyber Command?


 
What are the reasons behind the government appointing a civilian to the head of the NSA.  Gen. Keith Alexander was tapped to become head of America's national spying agency in 2005, and took up the additional role of the head of Cyber Command five years later.  The governments thought being that by combing the two agencies the country would be better protected.  Yet by combining the two agencies the civilian population may be a victim of abuse of power by the NSA.  By splitting the agencies and placing a civilian in charge of cyber security the potential of government agencies over stepping their bounds and violated a civilian’s rights to privacy become less of a threat.  Many Americans believe the NSA is listening to their phone calls and reading their emails.  By splitting the agencies this could renew the trust of the American people.
Read Related Stories:
 
 
 

Thursday, November 7, 2013

The FBI Moneypak Virus – A VERY NASTY VIRUS

The Ransom virus was discovered in 2012. The virus is categorized as Ramsomware by Anti Virus software developers. he FBI virus utilizes Trojan horses in order to gain access and lock computer systems. This is a classic form of social engineering were people are intimated by a fake agency; normally the FBI demanding money in the form of a fine in amounts $100, $200, $300, or more to be paid in order to unlock the computer system within the allotted time of 48 to 72 hours by use of Moneypak cards. For the novice PC user this I know can be very intimidating. We have had customers actually turn off their computer an never turn it back on again until months later. This virus is in no way associated with the government.
10 STEPS FOR REMOVING RANSOMWARE
Here’s how to use a free Symantec service that the company says often removes the virus:
1. If the computer is Internet connected, shut it off by holding down the power button for about 10 seconds.
2. Turn it back on while repeatedly tapping the F8 key.
3. When it brings up the “advanced boot options,” use the down arrow to select “safe mode with networking” and hit “enter.” You should see a screen that says “safe mode.”
4. Open a browser — such as Google Chrome, Mozilla Firefox or Internet Explorer — and go towww.norton.com/npe
5. Click the button to download the Norton Power Eraser, save it to your desktop and double-click the icon to run the file.
6. After reading the user license and clicking “agree,” click “scan for risks.”
7. As Power Eraser restarts the computer, repeatedly hit the F8 button and again select safe mode with networking.
8. Click “run” so Power Eraser can scan for the virus.
9. Once it finishes, you’ll see “scan complete” in a window with the results. Then click the “fix” button.
10. Click “restart” to reboot the computer again. You should see a confirmation that threat has been removed.
IF THIS IS FAR TOO COMPLICATED FOR YOU? CALL:Call 1 888 556-6371
Source: Symantec
Read More: http://www.mercurynews.com/business/ci_24387863/what-do-when-your-computer-gets-kidnapped-by