<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyberlink Security Blog Archives - Cyberlink Security</title>
	<atom:link href="https://cyberlinksecurity.ie/category/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberlinksecurity.ie/category/blog/</link>
	<description>Professional Cybersecurity Services</description>
	<lastBuildDate>Tue, 18 May 2021 07:26:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cyberlinksecurity.ie/wp-content/uploads/2019/06/cyberlink-symbol_clipped_rev_1shrter150-150x150.png</url>
	<title>Cyberlink Security Blog Archives - Cyberlink Security</title>
	<link>https://cyberlinksecurity.ie/category/blog/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ransomware attack on Cork University Hospital computers</title>
		<link>https://cyberlinksecurity.ie/ransomware-attack-on-cork-university-hospital-data/</link>
					<comments>https://cyberlinksecurity.ie/ransomware-attack-on-cork-university-hospital-data/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 18 May 2021 07:18:04 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4627</guid>

					<description><![CDATA[<p>As you have probably read, computers from the HSE were infected with ransomware last week. The HSE was forced to shut down parts of its IT operation to contain the spread of the cyber attack. Ransomware is a very lucrative business model for cyber criminals and another recent case, the Colonial Pipeline case, shows how [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/ransomware-attack-on-cork-university-hospital-data/">Ransomware attack on Cork University Hospital computers</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As you have probably read, computers from the HSE were infected with ransomware last week. The HSE was forced to shut down parts of its IT operation to contain the spread of the cyber attack.</p>
<p>Ransomware is a very lucrative business model for cyber criminals and another recent case, the Colonial Pipeline case, shows how a wide-spread ransomware attack can have a serious social impact as well. And if you are a health care organisation, suffering from a ransomware attack during the COVID pandemic may have serious, or even fatal, consequences.</p>
<p>Although it is currently not clear how this attack on the HSE was executed, there is a suspicion that it may have involved a user clicking on a link, and thus opening the internal network to the attackers. If true, this shows you one of the main challenges of Cybersecurity.  The scales are tipped against you because anyone defending themselves needs to close ALL vulnerabilities, whereas an attacker just needs ONE vulnerability to breach the secure perimeter.</p>
<p>This also means that organisations need to defend that interest on all levels, with people being one of the most important ones. Sure, you need good technology as well to support your defences, but solely trusting technology and hoping a box with flashing lights will save your bacon is like driving a car blindfolded.</p>
<p>To be able to defend your interests, and those of your customers, you need to make sure your people are trained properly, as they can be your best first line of defence. Support them with the proper technology to defend themselves and don’t assume it will never happen to you. It is better to be prepared, and make sure you can limit the impact of a ransomware attack by segmenting your internal network.   In addition, to be able to recover quickly, make sure you have working backups, that are stored offline, just in case.</p>
<p>The best approach is to look beyond technology alone and implement your cybersecurity from a broader perspective.</p>
<p>For more information on how Cyberlink Security could help you, please contact us at info@</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/ransomware-attack-on-cork-university-hospital-data/">Ransomware attack on Cork University Hospital computers</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberlinksecurity.ie/ransomware-attack-on-cork-university-hospital-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Will quantum computers break today&#8217;s encryption?</title>
		<link>https://cyberlinksecurity.ie/will-quantum-computers-break-todays-encryption/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 15 Feb 2021 08:53:31 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4570</guid>

					<description><![CDATA[<p>Short overview between classical computing and quantum computing. Classical computers carry out logical operations using the definite position of a physical state. These are usually binary, meaning its operations are based on one of two positions. A single state &#8211; such as on or off, up or down, 1 or 0 &#8211; is called a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/will-quantum-computers-break-todays-encryption/">Will quantum computers break today&#8217;s encryption?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 id="short-overview-between-classical-computing-and-quantum-computing">Short overview between classical computing and quantum computing<a class="headerlink" href="#short-overview-between-classical-computing-and-quantum-computing" title="Permanent link">.</a></h3>
<p>Classical computers carry out logical operations using the definite position of a physical state. These are usually binary, meaning its operations are based on one of two positions. A single state &#8211; such as on or off, up or down, 1 or 0 &#8211; is called a bit.</p>
<p>Quantum computers perform calculations based on the probability of an object’s state before it is measured &#8211; instead of just 1s or 0s.</p>
<p>This means that quantum computers have the potential to process exponentially more data compared to classical computers.</p>
<p><img decoding="async" alt="bits" src="/wp-content/uploads/2021/02/bits.png"/></p>
<h2 id="quantum-computers-on-cybersecurity">Quantum computers on cybersecurity<a class="headerlink" href="#quantum-computers-on-cybersecurity" title="Permanent link">.</a></h2>
<p>In cybersecurity, quantum computers are depicted as the breakers of the current encryption running our world, making our data private, guarding it against prying eyes. Should we be afraid? The short answer is no, although the potential for quantum computers to break RSA 2048 (one of today’s most powerful and secure encryption forms) in as little as 8 hours is possible, for it to happen quantum computing technology would have to advance much more.<br />
As it stands right now our state-of-the-art quantum computers can use 70 qubits, to reach the 8-hour cracking time researchers estimate that a 20 million-qubit quantum computer would be required. </p>
<p>NIST predicts that quantum computing regarding the cracking of RSA will take 15 years, while some researchers predict as little as 5 years.</p>
<p>So, should we be worried about the next 5 or 15 years? Thankfully the answer is also no, quantum technology is not exactly new, and a lot of theory is already available, as such security researchers have already developed what are called post-quantum codes that even a quantum computer would not be able to crack. So, it is already possible to safeguard data today against future attacks by quantum computers. But these encryption methods are not yet used as standard. </p>
<p><img decoding="async" alt="hacker" src="/wp-content/uploads/2021/02/hacker.jpg"/></p>
<h3 id="what-about-data-previosly-captured-on-traffic">What about data previosly captured on traffic?<a class="headerlink" href="#what-about-data-previosly-captured-on-traffic" title="Permanent link">.</a></h3>
<p>In 5 or 15 years, whenever or if advanced quantum technology would be plentifully available to the public, there is a risk that data captured by a malicious actor, could then in the future be decrypted. For the average person, this is not worrisome, for example, data decrypted regarding credit card data would be worthless in the future, however for governments and entities that rely on secrecy this could arise to be a very big issue, as disclosure of classified data even if 5, 15 years old could be very impactful.</p>
<h2 id="conclusion">Conclusion<a class="headerlink" href="#conclusion" title="Permanent link">.</a></h2>
<p>Although quantum computing is relatively far away in order to disturb our present ecosystem in the digital world, measures and standards should be implemented in a timely manner(post-quantum codes) in order to safeguard future data.</p>
<p>By Andre Gomes</p>
</article>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/will-quantum-computers-break-todays-encryption/">Will quantum computers break today&#8217;s encryption?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A look into GDPR and the late Easy Jet Breach</title>
		<link>https://cyberlinksecurity.ie/a-look-into-gdpr-and-the-late-easy-jet-breach/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 05 Sep 2020 09:10:34 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4559</guid>

					<description><![CDATA[<p>A brief description of GDPR &#160; The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy in the European Union (EU) and the European Economic Area (EEA). It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR’s primary aim is to give [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/a-look-into-gdpr-and-the-late-easy-jet-breach/">A look into GDPR and the late Easy Jet Breach</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<article class="markdown-body">
<h2 id="a-brief-description-of-gdpr">A brief description of GDPR</h2>
<p>&nbsp;</p>
<p>The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy in the European Union (EU) and the European Economic Area (EEA). It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR’s primary aim is to give control to individuals over their data and to simplify the regulatory environment for international business by unifying the regulation within the EU. The regulation contains provisions and requirements related to the processing of personal data of individuals (formally called data subjects in the GDPR) who are located in the EEA, and applies to any enterprise—regardless of its location and the data subjects’ citizenship or residence—that is processing the personal information of data subjects inside the EEA.</p>
<p>There are several rules and restrictions imposed by GDPR one of these is to ensure that when processing private data, it is done so with integrity and confidentiality in mind, which unfortunately many companies fail to have proper security controls in place to enforce such requirements.</p>
<p>There are two tiers of penalties, which max out at €20 million or 4% of global revenue (whichever is higher), plus data subjects have the right to seek compensation for damages.</p>
<p>GDPR was designed to unify data privacy laws across all of its member countries as well as providing greater protection and rights to individuals. GDPR was also created to alter how businesses and other organizations can handle the information of those that interact with them. Unfortunately through poor security practices many companies still fail to comply with GDPR. One example of such is Easy Jet.</p>
<p>More information on GDRP can be found <a href="https://gdpr.eu/what-is-gdpr/">here</a>.</p>
<h2 id="the-easy-jet-data-breach">The Easy Jet data breach</h2>
</article>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-4563" src="https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-1024x576.jpg" alt="" width="1024" height="576" srcset="https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-1024x576.jpg 1024w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-300x169.jpg 300w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-768x432.jpg 768w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-1536x864.jpg 1536w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-1920x1080.jpg 1920w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-1228x691.jpg 1228w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-614x346.jpg 614w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-295x166.jpg 295w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1-590x332.jpg 590w, https://cyberlinksecurity.ie/wp-content/uploads/2020/09/easy-jet-1.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<article class="markdown-body">On 19th May 2020, EasyJet confirmed that it had been the target of an attack from a highly sophisticated source, with the email addresses and travel details of about 9 million customers breached. Its investigation also found that about 2,200 passengers had their credit card details stolen. The airline said it took immediate steps to respond to and manage the incident. And it claims to take issues of security extremely seriously.</p>
<p>The ICO(Information Commissioner’s Office), which is the United Kingdom equivalent to GDPR after investigation, issued a record £183m fine over the breach. Compensation pay-outs to customers could see that reach £3bn.</p>
<p>Under GDPR (General Data Protection Regulation), if EasyJet is found to have mishandled customer data, it could face fines of up to 4% of its annual worldwide turnover. (256 million pounds).</p>
<p>Unfortunately easy jet is still one of the many companies affected by data breaches. <a href="https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/">Graph</a> of companies affected by the 30,000+ breach of records.</p>
<h2 id="conclusion">Conclusion</h2>
<p>As hackers became more resourceful and specialized so must companies invest in protecting themselves and their customers, we live in a world where just enough is no longer enough, and upgrading and testing(Internally and externally) a company’s current security controls should always be deemed as a top priority, especially if it handles private information.</p>
<p>By Andre Gomes</p>
</article>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/a-look-into-gdpr-and-the-late-easy-jet-breach/">A look into GDPR and the late Easy Jet Breach</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What am I protecting my cybers from? (part 2)</title>
		<link>https://cyberlinksecurity.ie/what-am-i-protecting-my-cybers-from-part-2/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 09:23:57 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4553</guid>

					<description><![CDATA[<p>This is the second part of the blog post on risk management as part of your cyber security strategy. In the first part I shared my approach to risk management with you, which is primarily to identify your threats by answering the question &#8220;What can possibly go wrong?&#8221;. You have several means at your disposal to help [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-am-i-protecting-my-cybers-from-part-2/">What am I protecting my cybers from? (part 2)</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This is the second part of the blog post on risk management as part of your cyber security </span><span style="font-weight: 400;">strategy. In the first part I shared my approach to risk management with you, which is primarily </span><span style="font-weight: 400;">to identify your threats by answering the question &#8220;What can possibly go wrong?&#8221;.</span></p>
<p><span style="font-weight: 400;">You have several means at your disposal to help you identify the (real!) threats to your </span><span style="font-weight: 400;">systems. First of all, there are a lot of lists available that provide you with all kinds </span><span style="font-weight: 400;">of threats from various threat actors and environments. You &#8216;only&#8217; have to choose the </span><span style="font-weight: 400;">right ones. And in my opinion, the right ones are threats that you can handle when they </span><span style="font-weight: 400;">materialize and where your organisation has a good chance of survival. Because there are </span><span style="font-weight: 400;">obvious and less obvious threats that will have such a big impact on your organisation, or </span><span style="font-weight: 400;">society at large, that you cannot even think of implementing controls to counter them.</span></p>
<p><span style="font-weight: 400;">But please note, I am referring to threats with a huge impact here: not threats that are </span><span style="font-weight: 400;">very unlikely to occur, but those with a chance of occurring that is not 0. These so called black swans are extremely difficult to assess as they may occur once in a lifetime, but when that happens they will almost certainly have a serious impact. An example of this is a case where a </span><span style="font-weight: 400;">customer had a twin datacenter, one close to an airport and the other close to a big chemical </span><span style="font-weight: 400;">plant. What are the chances of a plane crashing and a disaster happening at the plant at </span><span style="font-weight: 400;">the same time? So proposing a third completely off-site data center was an expensive option and senior management was not keen on paying for that. But when asked to sign off on accepting the risk, they were not very keen to do that either! So in the end they agreed to have a cold standby with off-site backups as an economical and manageable solution. This may not </span><span style="font-weight: 400;">work for you, so please assess the risks properly, and maybe ask Mr. Murphy for a second </span><span style="font-weight: 400;">opinion.</span></p>
<p><span style="font-weight: 400;">But I digress. All sorts or threat lists are available on the Internet, and as part of </span><span style="font-weight: 400;">Risk Assessment Tooling like IRAM(2).</span></p>
<p><span style="font-weight: 400;">However, as you may know, I am not a fan of checklists, and urge you to use your common </span><span style="font-weight: 400;">sense as well. To assist you in identifying threats to your unique scope and situation,</span></p>
<p><span style="font-weight: 400;">you should at least apply the STRIDE threat model as well. I have used that on a number </span><span style="font-weight: 400;">of occasions and it turns out to be really helpful. You can find a good definition of</span></p>
<p><span style="font-weight: 400;">the model in Wikipedia ( LINK: </span><a href="https://en.wikipedia.org/wiki/STRIDE_(security)"><span style="font-weight: 400;">https://en.wikipedia.org/wiki/STRIDE_(security)</span></a><span style="font-weight: 400;"> ).</span></p>
<p><span style="font-weight: 400;">The short and sweet of the STRIDE model is that it defines six threat categories, and you </span><span style="font-weight: 400;">can brainstorm to your heart&#8217;s content on threats for each category. The categories are:</span></p>
<ul>
<li><span style="font-weight: 400;"><em>Spoofing</em>: stealing a digital identity to break confidentiality and authenticity;</span></li>
<li><span style="font-weight: 400;"><em>Tampering</em>: manipulating data to break the integrity, with or without breaking confidentiality;</span></li>
<li><span style="font-weight: 400;"><em>Repudation</em>: is plausible deniability possible or not? (BTW, this should really be </span><span style="font-weight: 400;">non-repudiation, but then the acronym would not roll of the tongue so easily, STNIDE does </span><span style="font-weight: 400;">not have the same ring to it);</span></li>
<li><span style="font-weight: 400;"><em>Information disclosure</em>: this is really any threat related to breaking confidentiality;</span></li>
<li><span style="font-weight: 400;"><em>Denial of Service</em>: these are all threats to the availability of your information and system;</span></li>
<li><em>Elevation of privileges</em>: This is related to authorization, and can have impact on all 3 basic security aspects (Confidentiality, Integrity and Availability).</li>
</ul>
<p><span style="font-weight: 400;">Using this model in one or more workshops with business owners can be a very enlightening </span><span style="font-weight: 400;">experience, as much for you as a cyber security specialist as for the business owners. Because </span><span style="font-weight: 400;">when you do a session like this, with different people, you as a cyber security specialist </span><span style="font-weight: 400;">will quickly learn what the business sees as real risk, and that can be quite different</span></p>
<p><span style="font-weight: 400;">from what you see often from a purely technical viewpoint. So, applying the STRIDE model not </span><span style="font-weight: 400;">only helps you identify new threats, it is also a means of establishing better</span></p>
<p><span style="font-weight: 400;">communications with the business (which is, in my humble opinion, the biggest problem in </span><span style="font-weight: 400;">cyber security).</span></p>
<p><span style="font-weight: 400;">This brings us to the conclusion of this second part. In the next one I will look with you </span><span style="font-weight: 400;">at how to further complete your risk management process.</span></p>
<p><span style="font-weight: 400;">Until next time, and as always, stay safe!</span></p>
<p><span style="font-weight: 400;">Arthur Donkers </span></p>
<p>PS, If you like Wikipedia, or use it on a regular basis, please consider a small donation, they do a great job and can use your financial support!</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-am-i-protecting-my-cybers-from-part-2/">What am I protecting my cybers from? (part 2)</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are the browser wars over?</title>
		<link>https://cyberlinksecurity.ie/are-the-browser-wars-over/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 07:49:29 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4543</guid>

					<description><![CDATA[<p>Some thoughts on the situation at Mozilla and the impact on Firefox&#8230; As you may have heard, a few weeks ago Mozilla had to reduce their workforce by 250 people. This is the second time this year that they have reduced their workforce. Already some people think that this may mean the end for the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/are-the-browser-wars-over/">Are the browser wars over?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Some thoughts on the situation at Mozilla and the impact on Firefox&#8230;</p>
<p>As you may have heard, a few weeks ago Mozilla had to reduce their workforce by 250 people. This is the second time this year that they have reduced their workforce. Already some people think that this may mean the end for the Firefox browser, Thunderbird email client and other software that has been, and still is being, developed by the Mozilla Foundation.</p>
<p>The fear now is that FireFox will slowly die off and we will be stuck with just one browser, Chrome/Chromium from Google. From a security perspective this will mean a move towards a monoculture for browsers, and that will mean in turn that any vulnerability discovered in that browser will have far reaching consequences. It is the same in biology: whenever you create a monoculture in your crops, you will suffer a lot of pain when your crops inevitably get infested with disease or bugs.</p>
<p>And although I completely agree with the risks associated with monoculture, and the necessity for a proper browser alternative, we may need to look a little closer at the current situation. When researching global browser market share, we see that there is already a more or less effective monoculture.</p>
<p>Current market share shows the following percentages:<img decoding="async" loading="lazy" class="aligncenter size-large wp-image-4544" src="https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-1024x576.png" alt="" width="1024" height="576" srcset="https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-1024x576.png 1024w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-300x169.png 300w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-768x432.png 768w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-1228x691.png 1228w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-614x346.png 614w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-295x166.png 295w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007-590x332.png 590w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/StatCounter-browser-ww-monthly-201907-202007.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><br />
Chrome: 65.89% Safari: 16.65% Firefox: 4.26% Samsung Internet: 3.43% Opera: 2.05% Edge: 1.91%<br />
(Source: <a href="https://gs.statcounter.com/browser-market-share" target="_blank" rel="noopener noreferrer">https://gs.statcounter.com/browser-market-share</a>)</p>
<p>In addition, Microsoft has recently declared the end-of-life for Internet Explorer 11, forcing everyone to use Edge, and the latest version of Edge is, as some of you may know, based on the Chromium engine.</p>
<p>So effectively, we are already in a monoculture, with all the implications for security that come with that.</p>
<p>So the question remains, can we do anything to turn this around and keep or increase the market share of Firefox to reduce the mono in the culture? Frankly, I don&#8217;t know the answer to that. A web browser is one of the most complicated packages of software, even more complicated than some operating systems. Maintenance, backwards compatibility, covering for user and web developer errors, parsing Javascript and supporting multiple platforms does not make the job of developing a browser easy (or cheap). And personally I never quite understood the business model behind a browser. A web browser is such a ubiquitous piece of software for users, expected to come at no cost, that it is very hard to make money off the browser software itself (the core business of the Mozilla Foundation). It is not that the browser manufacturers get a percentage of the advertising that is shown through their browser, or that vendors of systems pay them for their browser software.</p>
<p>So to be quite honest, I think the situation for browser security and mono culturism is already worse than we think and, although I hope they survive, the end of Mozilla and Firefox will do little to change that situation.</p>
<p>As always, stay safe,<br />
Arthur Donkers</p>
<p>Cyberlink Security</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/are-the-browser-wars-over/">Are the browser wars over?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why so many bitcoin scams? They are cheap, easy, and efficient to execute.</title>
		<link>https://cyberlinksecurity.ie/why-so-many-bitcoin-scams-they-are-cheap-easy-and-efficient-to-execute/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 09:57:58 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4519</guid>

					<description><![CDATA[<p>Introduction Even though it’s not an old tactic for black hat hackers, Bitcoin scams have begun to be more and more prevalent, especially after the July 2020 hack, where 130 high-profile twitter accounts got compromised by outside parties. According to Wikipedia “more than 320 transactions had already taken place on one of the wallet addresses, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/why-so-many-bitcoin-scams-they-are-cheap-easy-and-efficient-to-execute/">Why so many bitcoin scams? They are cheap, easy, and efficient to execute.</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<article class="markdown-body">
<h1 id="introduction">Introduction<a class="headerlink" title="Permanent link" href="#introduction"></a></h1>
<p>Even though it’s not an old tactic for <a href="https://en.wikipedia.org/wiki/Black_hat_(computer_security)">black hat hackers</a>, Bitcoin scams have begun to be more and more prevalent, especially after the July 2020 hack, where 130 high-profile twitter accounts got compromised by outside parties. According to Wikipedia “more than 320 transactions had already taken place on one of the wallet addresses, and bitcoin to a value of more than US$110,000 had been deposited in one account before the scam messages were removed by Twitter.”</p>
<p>With cryptocurrency, scammers can attain more sophistication and longevity with the same ‘scam routine’ at a ‘minimal cost’ (i.e minimal hassle, expense, fears, etc).</p>
<h2 id="the-elon-musk-impersonation-cryptocurrency-giveaway-scam">The Elon Musk (Impersonation) Cryptocurrency Giveaway Scam<a class="headerlink" title="Permanent link" href="#the-elon-musk-impersonation-cryptocurrency-giveaway-scam"></a></h2>
<p>Lately, there have been multiple instances of bitcoin scams in youtube, this scam relies on the popularity of the famous entrepreneur Elon Musk and SpaceX, the channel normally has thousands of subscribers and a very similar name to the companies Elon owns or Nasa. The scammers can create a Youtube channel and raise the number of subscriber and number of view artificially, probably by using <a href="https://en.wikipedia.org/wiki/Botnet">botnets</a>, by having a few thousand subscribers and having a decent number of viewers, the scammers manage to trick the Youtube algorithm and consequently, the stream pops up in the recommended list. The stream consists of the following bitcoin scam definitions:</p>
<h3 id="impersonation">Impersonation<a class="headerlink" title="Permanent link" href="#impersonation"></a></h3>
<p>In today’s age, it is quite easy to create social media accounts like Facebook, youtube e.t.c, scammers would use this strategy to for example lie in wait until the person they are trying to impersonate publishes content. The impersonator then replies to it with a follow-up message &#8211; with for example a free giveaway. It would be also possible for impersonators to directly message a potential victim. It is a best practice that when you receive an odd request or offer to always double-check a person to confirm the authenticity via multiple mediums of communication.</p>
<h3 id="free-giveaways">Free Giveaways<a class="headerlink" title="Permanent link" href="#free-giveaways"></a></h3>
<p>Scammers seek to take advantage of people by offering free giveaways of bitcoin in exchange for sending a small amount to register, or by providing some personal information (which can be turned into profit later on by the perpetrators).</p>
<p>Here are a few of these scams:</p>
<p><img decoding="async" src="/wp-content/uploads/2020/08/views.png" alt="something" /></p>
<p><img decoding="async" src="/wp-content/uploads/2020/08/site.png" alt="something" /></p>
<p><img decoding="async" src="/wp-content/uploads/2020/08/little.png" alt="something" /></p>
<p>Notice that the number of subscribers and viewers is very much unrealistic for a newly created stream and channel. Clear evidence of the use of <a href="https://en.wikipedia.org/wiki/Botnet">botnets</a></p>
<p>Normally on these scams, there is a landing page where more information can be found:</p>
<p><img src = "/wp-content/uploads/2020/08/Elon-musk-bur-code.png" alt="bitcoin scam" /></p>
<p>It is also very common to have a live feed of the transactions that have been occurring on the <a href="https://en.wikipedia.org/wiki/Cryptocurrency_wallet">wallet</a>, of course, all of them fake:<br />
<img decoding="async" src="/wp-content/uploads/2020/08/transaction.png" alt="somrhing" /></p>
<p>Digging a little bit more and after performing a DNS query on the website URL of one the streams we find that server of one of the landing pages is located in Russia:</p>
<p><img decoding="async" src="/wp-content/uploads/2020/08/russia.png" alt="something" /></p>
<p>Since one of the functionalities of digital currency is to have a <a href="https://en.wikipedia.org/wiki/Bitcoin#:~:text=The%20bitcoin%20blockchain%20is%20a,bitcoin%20software%20maintains%20the%20blockchain.">bitcoin ledger</a>, where it keeps a list of all the transactions done by all the users, we can use we can look that during the 20 min period where the scam was active, the scammers manage to profit 1.55807986 bitcoin which translates to $18136.05 :</p>
<p><img decoding="async" loading="lazy" class="size-full wp-image-4524 alignnone" src="https://cyberlinksecurity.ie/wp-content/uploads/2020/08/scam.jpg" alt="" width="698" height="249" srcset="https://cyberlinksecurity.ie/wp-content/uploads/2020/08/scam.jpg 698w, https://cyberlinksecurity.ie/wp-content/uploads/2020/08/scam-300x107.jpg 300w" sizes="(max-width: 698px) 100vw, 698px" /></p>
</article>
<p>&nbsp;</p>
<p>Note that there was no sent bitcoin from this bitcoin wallet.</p>
<h2 id="conclusion">Conclusion<a class="headerlink" title="Permanent link" href="#conclusion"></a></h2>
<p>These types of scams are incredibly popular because they are so cheap, easy, and efficient to execute, partly because unfortunately there are a lot of people that are still not informed well enough of this type of <a href="https://en.wikipedia.org/wiki/Social_engineering_(security)">social engineering</a> strategy. When stumbling into these kinds of scenarios it is best to keep the adage at mind “If something seems too good to be true, it probably is.”.</p>
<p>&nbsp;</p>
<p>By Andre Gomes</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/why-so-many-bitcoin-scams-they-are-cheap-easy-and-efficient-to-execute/">Why so many bitcoin scams? They are cheap, easy, and efficient to execute.</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What does it take to build good pentest boxes to test cyber security skills?</title>
		<link>https://cyberlinksecurity.ie/what-does-it-take-to-build-good-pentest-boxes-to-test-cyber-security-skills/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:19:14 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4509</guid>

					<description><![CDATA[<p>Or ‘why we love building boxes’.  If you are a pen tester (penetration tester), hacker or otherwise involved in the technical security of computers, chances are you have played one or more Capture the Flag competitions. Most conferences nowadays offer teams the opportunity to participate in a CTF, and sites like Vulnhub (http://vulnhub.com), TryHackme (http://tryhackme.com) [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-does-it-take-to-build-good-pentest-boxes-to-test-cyber-security-skills/">What does it take to build good pentest boxes to test cyber security skills?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Or ‘why we love building boxes’. </span></p>
<p><span style="font-weight: 400;">If you are a pen tester (penetration tester), hacker or otherwise involved in the technical security of computers, chances are you have played one or more Capture the Flag competitions. Most conferences nowadays offer teams the opportunity to participate in a CTF, and sites like Vulnhub (</span><span style="font-weight: 400;">http://vulnhub.com</span><span style="font-weight: 400;">), TryHackme (</span><span style="font-weight: 400;">http://tryhackme.com</span><span style="font-weight: 400;">) or Hack the Box (</span><span style="font-weight: 400;">http://hackthebox.eu</span><span style="font-weight: 400;">) offer players ample opportunity to play these challenges at their own pace. </span></p>
<p><span style="font-weight: 400;">Playing CTF&#8217;s challenges your creative thinking and forces you to think outside the box. Most of the machines focus on one specific technology or vulnerability and so offer you the opportunity to learn them hands-on. My friend Andreas and I have played a lot of these CTF&#8217;s, and learned a lot from them. </span></p>
<p><span style="font-weight: 400;">However, after a while, playing these CTF&#8217;s becomes less challenging. In most cases, getting a foothold (your initial shell access on the system) is still interesting, but the escalation to a high privileged account becomes something that you have seen and done before. And you will also start to notice that most CTF boxes are not modelled on real-life systems (there is no real need for that, but don&#8217;t think that a &#8216;real&#8217; pen test is anything like a CTF). </span></p>
<p><span style="font-weight: 400;">Andreas was already involved in building the Tempus Fugit boxes for Vulnhub, and I offered my help to build the next one in that series (if I recall correctly, TF3). Now the tables were turned and we (I) was working on the other side, trying to come up with (not so) clever ways to gain access to the box we were building and how to escalate the privileges. </span></p>
<p><span style="font-weight: 400;">We decided to make our boxes as life-like as possible, based on my experience as a pen tester and new vulnerabilities published on exploit DB </span><span style="font-weight: 400;">ttp://www.exploit-db.com/</span><span style="font-weight: 400;">). </span></p>
<p><span style="font-weight: 400;">It turned out to be a great learning experience, and building boxes based on real life examples and new vulnerabilities is a great way to acquire new skills that you can use, either for your pen testing jobs or your sysadmin jobs. We have since built boxes for Vulnhub and TryHackme and had some great feedback from people who have played them. </span></p>
<p><span style="font-weight: 400;">If you&#8217;re interested in trying it yourself, here are the steps we followed when building a new box. </span></p>
<p><span style="font-weight: 400;">Firstly, we had to come up with a scenario and background story. This helps in building a box that is as close to a real life situation as possible. It helps enormously to have a solid background story, especially if you are building a series of boxes. Our current series on TryHackme is based on a story about the Windcorp corporation which keeps getting hacked, fixes the previous vulnerabilities but then makes (real life) mistakes in building a new system. </span></p>
<p><span style="font-weight: 400;">The second step is to select a platform for the CTF machine. In most cases this is Linux, because it is free, but luckily we can also use Windows if we are building systems for TryHackme. To enhance our own learning experience, the THM Windcorp series is based on the Windows platform. </span></p>
<p><span style="font-weight: 400;">The third, and often hardest part, is finding a vulnerability that leads to the initial foothold (access) on the system. We consult ExploitDB for new vulnerabilities, or use things I have seen during a pen test, or use software we find interesting. For one of our boxes, we found a 0-day in an interesting piece of software that we had used to create an initial foothold on the system. </span></p>
<p><span style="font-weight: 400;">Once a player has an initial foothold, you need to think of a way to escalate the privileges. This can be by using another, vulnerable, software package. For Windows we sometimes make deliberate configuration errors that regular sysadmins make, as well as opening the system to SYSTEM access. </span></p>
<p><span style="font-weight: 400;">So far we have learned a lot when building each of these boxes and will continue to do so. </span></p>
<p><span style="font-weight: 400;">If you are interested in playing a CTF, please visit one of the sites we mentioned. If you&#8217;re interested in building a box yourself, don&#8217;t hesitate to give it a try. You will definitely learn a lot and other people will certainly enjoy hacking your CTF box. </span></p>
<p><span style="font-weight: 400;">Stay safe! </span></p>
<p><span style="font-weight: 400;">Arthur Donkers Andreas Finstad </span></p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-does-it-take-to-build-good-pentest-boxes-to-test-cyber-security-skills/">What does it take to build good pentest boxes to test cyber security skills?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What am I protecting my cybers from? (part 1)</title>
		<link>https://cyberlinksecurity.ie/what-am-i-protecting-my-cybers-from-part-1/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 12:15:59 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4505</guid>

					<description><![CDATA[<p>This blog post is, at least in my opinion, part of the most important piece of your cyber security strategy puzzle; your risk management. If you look at information security in general, and ISO27001 in particular, you always need to find that sweet spot that gives you the most protection for your money. Blindly following [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-am-i-protecting-my-cybers-from-part-1/">What am I protecting my cybers from? (part 1)</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This blog post is, at least in my opinion, part of the most important piece of your cyber security strategy puzzle; your risk management. If you look at information security in general, and ISO27001 in particular, you always need to find that sweet spot that gives you the most protection for your money. Blindly following checklists that have been handed down for generations will help you in some way, but it will certainly not provide you with the best solution (protection and moneywise). </span></p>
<p><span style="font-weight: 400;">So how do you find that sweet spot? By carefully planning and executing your risk management on a regular basis. Your risk management will provide you with the actual threat, vulnerabilities, impacts and mitigations that suit your situation and context. Executing your risk management will enable you to focus on actual security issues and risks that need to be addressed, instead of using fear mongering to try to do it all. </span></p>
<p><span style="font-weight: 400;">Oh, and why do I say &#8220;your&#8221; risk management? Because each organisation is unique, and therefore needs to find and adapt their own methodology, criteria and mitigations. This is where ISO27001 really helps you &#8211; it requires you to have a risk management process in place and active, but it does not force you to perform it in a predefined way. Just make sure you apply it consistently throughout your organisation and make sure you document the process and the results. </span></p>
<p><span style="font-weight: 400;">To make sure we&#8217;re all on the same page, I would like to share with you the definitions I use for threat, impact, vulnerability and risk. There is some confusion about these terms, and threats and risks in particular are (wrongly) used interchangeably. I stick to the definitions PECB uses in its training material. </span></p>
<p><span style="font-weight: 400;">And bear in mind that you can use the same process to identify opportunities as well. These are just &#8216;risks&#8217; with a positive outcome and connotation. </span></p>
<p><span style="font-weight: 400;">So here it goes&#8230; </span></p>
<p><i><span style="font-weight: 400;">Threat</span></i><span style="font-weight: 400;">: an event that can happen and has an impact on your business goals and drivers. In cyber security a threat almost always has a negative impact, e.g. a threat damages your reputation, or encrypts your data, etc. Examples of threats are data theft, ransomware, data breaches etc. Threats will always exist, and can have an internal or external source. </span></p>
<p><span style="font-weight: 400;">The opposite of a threat would be an advantage, an event that provides a benefit to the organisation, and has a positive impact. </span></p>
<p><i><span style="font-weight: 400;">Vulnerability</span></i><span style="font-weight: 400;">: a weakness in a control, asset, process or organisation that enables a threat to actually have the impact and cause damage. Examples of vulnerabilities are lack of an up to </span></p>
<p><span style="font-weight: 400;">date virus scanner, lack of awareness training for personnel, etc. And please note that increasing your tolerance to vulnerabilities may help you to seize business opportunities because it can improve your time-to-market or other driving factors. As long as you apply proper risk management, you can make a balanced decision. </span></p>
<p><i><span style="font-weight: 400;">Impact</span></i><span style="font-weight: 400;">: this is obviously the direct and indirect damage you suffer once a threat has materialized. And again, the impact may also be a positive one, let&#8217;s call that a reward. </span></p>
<p><i><span style="font-weight: 400;">Likelihood</span></i><span style="font-weight: 400;">: the chance that a threat (or benefit) will actually materialize. This is based on statistics but often also involves gut instinct.. This is the hardest part of the risk equation to get right. Rare cases (i.e. the black swans), that have a very small (but not 0) chance of occurring but have a huge impact, are often the hardest. Management often don&#8217;t want to spend a lot of money on these, but on the other hand, they don&#8217;t want to sign off on them either. I might do a special post on this in the near future, we have had enough events recently (Twitter, Garmin) that warrant a new look at these black swans. </span></p>
<p><i><span style="font-weight: 400;">Risk</span></i><span style="font-weight: 400;">: in its simplest form, the risk (or opportunity) is a result of multiplying the likelihood and impact and can often be expressed as a number. This can result in a quantitative value (often money related) or a quantitative value, (critical, high, medium, low). </span></p>
<p><span style="font-weight: 400;">So the next time you hear someone say that ‘the risk is theft of personal data’, what they actually mean is the ‘threat’. </span></p>
<p><span style="font-weight: 400;">And on a final note, if you use a quanlitative risk model, please use a scale with an even number of steps (1, 2, 3, 4 or critical, high, medium, low). Most people like to make safe choices and if you use a scale with an uneven number, they tend to go for the middle one. Using a scale with an even number forces them to make a choice. </span></p>
<p><span style="font-weight: 400;">This brings us to the conclusion of this post. In the next one I will look with you at how to apply the risk model and look at a simple, but very effective, model for identifying threats. </span></p>
<p><span style="font-weight: 400;">Until next time, as always, stay safe! </span></p>
<p><span style="font-weight: 400;">Arthur Donkers </span></p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-am-i-protecting-my-cybers-from-part-1/">What am I protecting my cybers from? (part 1)</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What do I need to protect with cybersecurity?</title>
		<link>https://cyberlinksecurity.ie/what-do-i-need-to-protect-with-cybersecurity/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 17:46:58 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4500</guid>

					<description><![CDATA[<p>In the previous posts we looked at why we need a cybersecurity strategy and what the scope of this strategy should be. Answering this question brings us automatically to the next, which is: What should we protect? This can be answered relatively easily by identifying your assets within the scope of your cybersecurity strategy. What has [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-do-i-need-to-protect-with-cybersecurity/">What do I need to protect with cybersecurity?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">In the previous posts we looked at why we need a cybersecurity strategy and what the scope </span><span style="font-weight: 400;">of this strategy should be. Answering this question brings us automatically to the next, which </span><span style="font-weight: 400;">is:</span></p>
<p><span style="font-weight: 400;">What should we protect?</span></p>
<p><span style="font-weight: 400;">This can be answered relatively easily by identifying your assets within the scope of </span><span style="font-weight: 400;">your cybersecurity strategy. What has value to you, and your stakeholders, within this scope?</span></p>
<p><span style="font-weight: 400;">To identify these assets, just follow the steps laid out in most ISMS implementations &#8211; there </span><span style="font-weight: 400;">is no real difference between an ISMS or your cybersecurity strategy here. The easiest assets </span><span style="font-weight: 400;">to start with are, obviously, all your tangible assets like computer systems, network equipment, </span><span style="font-weight: 400;">licenses, credentials for accessing your cloud provider and many more.</span></p>
<p><span style="font-weight: 400;">Things get more interesting when you have to identify your intangible assets. To begin with, you should cast the net as wide as possible and then eliminate any non-essential assets from that haul. You will probably find assets like software, reputation and maybe even search engine rankings and industry scores in this list.</span></p>
<p><span style="font-weight: 400;">But look a little beyond these obvious ones. Most (smaller) companies I know that provide specialized services often have a SPOK (Single Point of Knowledge). This is the person who knows everything about the software or process that is at the core of their business. The SPOK is often one of the first people to start working for the company and as the company grows, so does their involvement and therefore their &#8216;SPOKness&#8217;. Making sure that knowledge and expertise is shared within the company is both better for the company (&#8216;what if the SPOK falls ill?&#8221;), and better for the SPOK as well (&#8216;I really could do with a holiday&#8217;).</span></p>
<p><span style="font-weight: 400;">The second area of interest comes into play when you are part of a supply or value chain. You </span><span style="font-weight: 400;">may be &#8216;just&#8217; a small step in the whole chain, but your organisation handles valuable assets </span><span style="font-weight: 400;">nonetheless. And although these assets are not technically yours, you still need to protect </span><span style="font-weight: 400;">them while you are handling them. You may need to store them, or add some value to them, </span><span style="font-weight: 400;">but in all cases you must be sure that they are properly protected and their confidentiality, </span><span style="font-weight: 400;">integrity and availability can be guaranteed.</span></p>
<p><span style="font-weight: 400;">To be able to identify how critical an asset is, you should always ask yourself the &#8216;what if&#8217; </span><span style="font-weight: 400;">questions: &#8216;What if the asset is no longer available?&#8217;, &#8216;What if I can no longer rely on the</span></p>
<p><span style="font-weight: 400;">integrity of my asset?&#8217; and &#8216;What if my asset has been disclosed without my consent?&#8217;. If your </span><span style="font-weight: 400;">business is seriously impacted when answering one or more of these questions, you have probably found a critical asset (tangible or intangible) and you need to take measures to protect it.</span></p>
<p><span style="font-weight: 400;">This brings us to the conclusion of this post, and makes a nice bridge to the next one. In </span><span style="font-weight: 400;">the next post we will look at what we are protecting our assets from. What are threats, </span><span style="font-weight: 400;">vulnerabilities, impacts and risks?</span></p>
<p><span style="font-weight: 400;">Until next time, as always, stay safe!</span></p>
<p><span style="font-weight: 400;">Arthur Donkers </span></p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/what-do-i-need-to-protect-with-cybersecurity/">What do I need to protect with cybersecurity?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why are we seeing such high profile failures of cybersecurity?</title>
		<link>https://cyberlinksecurity.ie/why-are-we-seeing-such-high-profile-failures-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 17:39:37 +0000</pubDate>
				<category><![CDATA[Cyberlink Security Blog]]></category>
		<guid isPermaLink="false">https://cyberlinksecurity.ie/?p=4496</guid>

					<description><![CDATA[<p>How safe are we when the systems designed to save us fail?  In the last few months a number of high impact vulnerabilities have been discovered in security perimeter equipment (i.e. security devices that are supposed to protect your internal network from the evils lurking on the Internet). Remember the vulnerabilities found in Citrix Netscaler, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/why-are-we-seeing-such-high-profile-failures-of-cybersecurity/">Why are we seeing such high profile failures of cybersecurity?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">How safe are we when the systems designed to save us fail?  In the last few months a number of high impact vulnerabilities have been discovered in security perimeter equipment (i.e. security devices that are supposed to protect your internal network from the evils lurking on the Internet). Remember the vulnerabilities found in Citrix Netscaler, and more recently in F5 and Palo Alto, to name just a few.</span></p>
<p><span style="font-weight: 400;">Who broke the cybersecurity egg-basket? These publications often had sample code that showed how easy it was to exploit their vulnerabilities and malign elements on the internet did not hesitate to weaponize them to gain access.</span></p>
<p><span style="font-weight: 400;"> A lot of technical analyses followed.   Publications, companies and individuals combined forces to find vulnerable devices on the Internet and help secure them. </span><span style="font-weight: 400;">It is of course very important to fix the immediate problem and help secure internal networks again as soon as possible. However, if we look a little beyond that first triage, we may need to start reconsidering the current security models and find a new way of managing our information security.</span></p>
<p><span style="font-weight: 400;">Most organisations still follow a security model that keeps bad actors out (i.e. external Internet based threats) and fully trusts that their internal network will be safe. But if these bad actors can cross the perimeter, there are no other real defences to stop them once inside. I have seen this model on many occasions and refer to it as the (Kinder) egg model. The goodies are inside, and if you break the outer shell, you have unrestricted access.</span></p>
<p><span style="font-weight: 400;">The egg shell for information security is built with firewalls, reverse proxies, VPN tunnels and all kinds of other solutions and products. If you can do a scan of your perimeter, you will probably see more &#8216;doors&#8217; in it than you expect, and some doors are stronger than others. And only one door needs to break for the bad actors to cross the perimeter. Not to mention all the cloud based services being used, third party networks, remote management services and of course, all the work from home solutions that have been implemented.</span></p>
<p><span style="font-weight: 400;">One can wonder if this egg model of (only) protecting your perimeter is still sufficient. It is still based on the assumption that you can prevent bad things from happening, often by deploying technical solutions.</span></p>
<p><span style="font-weight: 400;">In my opinion, this model no longer holds. We are slowly seeing a paradigm shift from prevention to &#8220;assume breach&#8221;, where we need to assume some actor has breached our perimeter and has gained access to (parts of) our internal network. If we work from this assumption, we can see that we need to protect our internal network just as much as our perimeter. Therefore, segregating your internal network into zones, to limit the impact of a breach and give each asset the protection it requires, is a necessary step. By building internal boundaries we will not prevent a breach from happening, but we can limit the impact as much as we can.</span></p>
<p><span style="font-weight: 400;">And internal segregation is just one piece of the puzzle. If we follow the &#8220;assume breach&#8221; approach, we also need to be able to detect those breaches as quickly as we can, and respond accordingly. This means that your security budget should be balanced between preventive measures (the boxes with blinking light all vendors want to sell you), detection measures (collect </span><span style="font-weight: 400;">important log data and analyse it automatically, but also train your staff in recognising &#8216;strange&#8217; behaviour) and responsive and corrective measures (this is mainly a people thing, your staff needs to know what to do in case of an incident).</span></p>
<p><span style="font-weight: 400;">As is now apparent, handling the &#8220;assume breach&#8221; paradigm becomes less dependent on technology and more on the people in your organisation. The old cliche that people are your weakest security link no longer holds in my opinion. With proper awareness and training, your people can become your strongest security control, both for detecting bad things that happen and resolving them in a quick and effective manner.</span></p>
<p><span style="font-weight: 400;">Stay safe!</span></p>
<p><span style="font-weight: 400;">Arthur Donkers</span></p>
<p>The post <a rel="nofollow" href="https://cyberlinksecurity.ie/why-are-we-seeing-such-high-profile-failures-of-cybersecurity/">Why are we seeing such high profile failures of cybersecurity?</a> appeared first on <a rel="nofollow" href="https://cyberlinksecurity.ie">Cyberlink Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
