Security

Keeping bad guys out

In our previous blog post, we talked about how to protect your organization by keeping your company's organization chart private. We encouraged you to adopt a policy to keep details off your website and off social media, including LinkedIn. In this post on security, we're going to look at how to keep bad actors out of your facility by focusing on physical security.

Physical security in a digital age

Does your company issue ID cards to employees? Chances are you do. [...]

Helping hackers or why you shouldn’t publish your organization chart

Organizations love to share information about themselves. Accomplishments, awards, and including who works there - especially high profile employees like executives, vice presidents, senior managers, and occasionally team members. Did you know by publishing information on your corporate website, you're making it easier to attack your business? In this article, we will show how you increase your attack surface by making it easier for hackers to impersonate key employees.
Hacking the company... with help
When hackers look to attack a company, [...]

Bleeding Bit: Two Bluetooth Chip Flaws in Cisco and Meraki Devices

Two flaws in Bluetooth chips open millions of devices to attack
Security researchers detailed a pair of critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in global access points and networking devices.
The Hacker News fills in the details: "Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including medical devices such as insulin pumps and pacemakers, as well as point-of-sales and IoT devices.
"Discovered by [...]

KRACK: Your wireless network is at risk!

The other day a massive vulnerability was discovered in WPA2 wireless encryption which secures just about every wireless network - from the one in homes, to your office, to even your favourite coffee shop where you have to ask the barista for the daily wifi password. Every OS - Windows, macOS, Linux, Apple iOS, Android - are all susceptible to this attack.
https://youtu.be/Oh4WURZoR98
This attack is called KRACK which stands for Key Reinstallation Attack. This attack can be used to read data transmitted between [...]

The Changing Face of Cybercrime – Know Your Enemy

As a cybersecurity professional, you are the guardian of data, the gate keeper, and the architect of defense. You live on the front lines of a digital battle against invisible enemies and advanced persistent threats.
It’s your job is to find and protect any possible vulnerability or weakness that could be exploited anywhere in your organization at any time—24/7/365.
Your enemy’s job is to find one weakness. Just one!
Your enemy will exploit your infrastructure, your people, and anyone connected to you [...]

Going Virtual: The Security Considerations of Public vs. Private Cloud

Cloud computing can bring significant benefits to your IT operation, but it can also carry some security risks, so organizations need to understand how they can take advantage of all it has to offer without putting their data at risk. This article describes how to develop a cloud-based computing strategy that mixes scalability with security.
Two main factors that attract companies to the cloud: the first is its potential for cost efficiency. Eliminating the capital expenditure on local servers can [...]

Beware: Mac Malware Is on the Rise

For the longest time, there has been an assumption amongst many Mac® users that their operating system of choice is secured against the malware threat. While there may have been some truth to this a few years back, it certainly isn't the case anymore. Today, there are a growing number of active threats targeting macOS®. Perhaps more importantly, as the popularity of the platform grows, so does the amount of malware emerging from the shadows.
A Growing Market and Threat
According [...]

Preventing internal email spoofing with Office 365

Email spoofing is a problem that affects companies world wide. This type of spoofing email is complex because it looks legitimate. After all, the email did appear to come from within your domain! Companies can lose millions of dollars through sophisticated phishing attacks and internal spoofing. The attacker will send an email posing as someone like the CEO. The attacker will send this email to someone, typically in the finance department, to wire money into an account. But here's where [...]

New Ransomeware “Nyetya” in the Wild

Cisco is calling Nyetya "WannaCry's bad cousin" and it's no surprise as to why. This ransomware uses PSEXEC, a very legitimate administration tool from Microsoft, and WMIC to execute it's processes. It steal credentials and spreads through networks using EternalBlue and EternalRomance SMB 1 exploits which were patched by Microsoft in MS17-010
Machines that are patched against these exploits (with security update MS17-010) or have disabled SMBv1 are not affected by this particular spreading mechanism. Please refer to our previous blog for details on these [...]

Protecting your network from web threats

Every day, new threats emerge on the Internet called Zero Days which are threats that have not yet been identified and patched. How do you protect your network from these threats?
Our simple list

Patch often! Patching can stop a zero day dead in the water. No matter if it's a core network device like a router or if it's a computer in the office. Often, the zero day affects an older version of the software and the patch stops the [...]