Home Blog Page 74

Identity And Access Management Takes Up A Month Every IT Year

Do you know that IT takes a month each year to manage identity and access? 1Password research finds that 20% of workers don’t follow company security policies all the time, enabled by IT departments who empathize with the pursuit of productivity.

A half-month-long survey carried out by AgileBits Inc. 1Password has revealed that in every IT year, identity and access management takes up one month. This was shown to be because not all workers follow company security policies. 

The research which was conducted from April 15 to April 23, 2020, was carried out via an e-survey structure developed by Method Research and distributed by Dynata. It involved up to 1,000 desk-job employees, all employed in the United States. 

Out of the 1,000 employees, about 500 were staff in the IT department of their respective companies. The remaining were from all the other departments. In addition, all the interviewed employees were well over 18 years old and were from different areas in the US. 

READ ALSO: Compliance In The Cloud: Why IAM Is Critical

According to the survey results, IT staff tasks themselves with Identity and Access Management duties like tracking app usage and resetting passwords. This goes on for about 21 days, about 9 days shy of a full month. 

Going into more detail, the survey showed that 15% of IT staff engage in employee password resetting a minimum of 21 times every week. About 57% of IT staff engage in the same for up to 5 times every week. 

The survey extended to Shadow IT behavior in the current remote working situation and the convenience, productivity, and security achievement power of the EPM. 

In all of this, the IT employees revealed a significant problem: the lack of reliable technology resources. Also, not all IT workers follow company security policies, which are tied down to the concern for employee effectiveness. 

4% of IT staff do not enforce company security policies at all because of the inconvenience of managing them and the productivity of the company’s workforce. About 25% enforce the policies but not universally, only in specific departments. 

For 38% of the interviewed workers, their companies do not engage in robust security policies, so the enforcement process is not very strict.

READ ALSO: Identity Theft Is Not A Joke, Jim [MUST READ Parody]

Password managers like 1Password continue to make tasks easier for the IT department, and 89% of IT employees confirm this. 57% attest to password managers helping them save time and frustration, while 37% confirm it helps improve productivity. 

They also help create happier employees, according to 26% of the staff, and another 26% attest to it helping prevent cyberattacks.

READ ALSO: How To Remotely Access Corporate Data Securely Without A VPN

Identity and Access Management (IAM): A Month Out of Your IT Year – FAQs

What is the identity and access management cycle?

The identity and access management (IAM) cycle refers to the ongoing process of managing user identities and their access privileges within a system or network. It’s a continuous loop that ensures the right people have access to the right resources at the right time.

What is the identity and access management process?

The IAM process typically involves several key stages:

  1. Provisioning: Creating new user accounts and assigning them initial access levels based on their role.
  2. Access Management: Granting or denying specific permissions to access resources (applications, data, systems) based on user roles and responsibilities.
  3. Governance & Compliance: Defining policies and procedures for user access and adhering to relevant security regulations.
  4. Monitoring & Auditing: Tracking user activity and access attempts to identify anomalies or suspicious behavior.
  5. Review & Re-certification: Regularly review user access privileges and adjust them based on role changes, promotions, or terminations.
  6. Deactivation/deprovisioning: Revoking access and potentially deleting user accounts when employment ends or access is no longer required.

What is the identity and access management standard?

There isn’t a single, universally mandated IAM standard. However, several industry best practices and frameworks guide IAM implementation. These frameworks like NIST (National Institute of Standards and Technology) provide secure identity and access management guidelines.

What are the stages of identity and access management?

The stages mentioned previously (provisioning, access management, governance, monitoring, review, deactivation) represent the core stages of the IAM lifecycle. While the specific names or order might vary slightly depending on the chosen framework, these stages ensure a comprehensive approach to user identity and access throughout their time within the system.

An important takeaway is that IAM is not a one-time setup. It’s a continuous cycle that requires ongoing monitoring, review, and adjustments. While a month of dedicated effort might be dedicated to initial setup or policy refinement, maintaining a secure IAM system is essential to any IT department’s ongoing responsibilities.

Note: This was initially published in August 2020, but has been updated for freshness and accuracy.


CHECK OUT:

Twitter Hack: Major Celebrities accounts used for Bitcoin Scam

The social media landscape witnessed a shocking event on July 15th, 2020. Twitter, a platform boasting over 330 million monthly users at the time, was struck by a cyberattack that compromised the accounts of prominent celebrities and corporations.

This wasn’t a random targeting of a few profiles; verified accounts with millions of followers, including those belonging to Elon Musk, Apple, Joe Biden, Jeff Bezos, and even former presidents like Barack Obama, were hijacked.

2020 Twitter Hack: A Daring Bitcoin Scam

The motive behind the hack was a brazen Bitcoin scam. Hackers gained control of these high-profile accounts and tweeted messages promising to double any Bitcoin sent to specific wallet addresses.

The tweets, often crafted to appear legitimate, enticed unsuspecting users. A common tactic involved requesting $1,000 in Bitcoin with the promise of receiving $2,000 in return.

The allure of doubling their money proved irresistible to some, leading to a reported loss of over $100,000 in stolen Bitcoin.

A Sophisticated Breach Exposes Security Gaps

The scale and sophistication of the attack were unprecedented. Investigators concluded it wasn’t a random attempt but a meticulously planned operation.

Hackers breached Twitter’s internal systems, bypassing security measures to gain control of these highly coveted accounts. The ease with which they navigated Twitter’s defenses pointed towards potential vulnerabilities within the platform itself.

Twitter Reacts and Locks Down Accounts

Hours after the initial breach, Twitter acknowledged the situation through its official support channel.

While details remained scarce, they advised users to reset their passwords and implement additional security measures. Notably, some verified accounts were temporarily restricted from tweeting, presumably to prevent further exploitation.

Social Media’s Vulnerability to High-Profile Scams

The incident highlighted the susceptibility of social media platforms to cyberattacks, particularly those targeting high-profile accounts. Bitcoin scams, although not new on Twitter, were amplified by the sheer number of compromised accounts involved.

Leveraging the trust associated with verified profiles, the hackers effectively bypassed the skepticism users might usually hold towards such financial offers.

READ ALSO: Controlling Data Breach And The Use Of DRM For Document Security

Tracing the Hackers: A Challenge in the Blockchain Age

Unfortunately, the decentralized nature of Bitcoin transactions made tracing the perpetrators a significant challenge.

Publicly available wallet addresses offered little in identifying the hackers, as the blockchain technology behind Bitcoin prioritizes anonymity.

Unconfirmed Rumors and Questions of an Insider Job

Amidst the chaos, unconfirmed reports on Twitter emerged, pointing the finger at a former Twitter developer, Samuel Hyde (@inteldotwav). However, Twitter never officially addressed this claim, leaving the true identity of the hackers shrouded in mystery.

The possibility of an “inside job” raised crucial questions about Twitter’s internal security protocols. If the breach originated from within the company, it indicated a significant vulnerability in access control and employee vetting procedures.

Individual Responsibility: Securing Your Accounts

However, focusing solely on the attacker diminishes the importance of individual account security. Regardless of the hack’s origin, Twitter users have a responsibility to safeguard their accounts.

Fortunately, Twitter offers robust security features like two-factor authentication (2FA), which adds an extra layer of protection during login attempts. Implementing 2FA significantly strengthens your account’s resilience against unauthorized access.

Read Also: The Must Dos And Don’ts For Protecting Your Password And Personal Data

Beyond 2FA: The Importance of Strong Passwords

Beyond 2FA, the importance of strong passwords cannot be overstated. Complex passwords incorporating a mix of uppercase and lowercase letters, numbers, and symbols are significantly harder to crack than simple, predictable phrases. Regularly changing your password further enhances security.

2020 Twitter Hack: Frequently Asked Questions

How did Twitter get hacked?

The attackers used social engineering, a tactic where they manipulated people into giving away information. They likely targeted Twitter employees with phishing emails or phone calls, tricking them into revealing login credentials or access to internal systems. This gave the hackers a foothold within Twitter, allowing them to hijack high-profile accounts.

READ ALSO: Identity Protection Explained in Fewer than 140 Characters

What was the Twitter phishing case in July 2020?

The July 2020 Twitter hack involved a social engineering attack that compromised numerous verified accounts. Hackers gained access and used them to promote a Bitcoin scam, defrauding unsuspecting users.

When was Twitter last hacked?

There have been other hacking incidents on Twitter besides the July 2020 event. However, it’s important to note that successful large-scale hacks like this one are uncommon.

How many accounts were hacked on Twitter?

Twitter has undisclosed the exact number of hacked accounts in July 2020. However, reports suggest it involved over 130 accounts, including many high-profile verified users.

How do your accounts get hacked?

There are various ways your accounts can be hacked. Phishing emails and fake websites are common methods. Here are some tips to protect yourself:

  • Be cautious of suspicious emails and links. Don’t click on links or attachments from unknown senders.
  • Use strong, unique passwords for each account. Consider a password manager to help you create and manage complex passwords.
  • Enable two-factor authentication (2FA) on all your accounts whenever possible. This adds an extra layer of security during login attempts.
  • Beware of social media scams. If an offer seems too good to be true, it probably is. Don’t send money or personal information based on unsolicited messages.

A Lasting Impact: Lessons Learned

The 2020 Twitter hack served as a stark reminder of the ever-evolving cyber threat landscape. It exposed vulnerabilities within the platform and highlighted the importance of user vigilance.

By implementing robust security measures like 2FA and strong passwords, users can take control of their online safety. Social media platforms are also responsible for continually strengthening their defenses and prioritizing user account security.

This Twitter hack incident serves as a cautionary tale, urging users and platforms to remain vigilant and proactive in the face of evolving cyber threats. The digital landscape is constantly changing, and both individual and collective efforts are crucial to maintaining a secure online environment.

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


INTERESTING POSTS

4 Common VPN Encryption Protocols Explained

In this post, we will discuss the VPN encryption protocols.

VPN services have found widespread use among individuals and corporate organizations, especially for their data encryption abilities. Different VPN services use different encryption protocols to encrypt users’ data traffic. 

Here, I will unravel the encryption protocols VPN service providers use and how they encrypt data.

VPN Encryption Protocols Explained

A virtual tunnel between your device and the VPN server (network) you’re connected to is automatically created when connected to a VPN server.

Data transmitted through this virtual encryption tunnel is encrypted (encoded) using some VPN protocols based on the VPN service provider’s preference.

The encryption protocol scrambles your data traffic into unreadable formats while transmitting it to and from your device to prevent data hijacking.

READ ALSO: The Ultimate VPN Guide – What Is A VPN?

Is VPN Encryption Secure?

Is VPN Encryption Secure

Most VPN protocols use symmetric-key encryption, which means both the users’ computers and the servers share a standard key for encrypting and decrypting data traffic from users’ devices.

The encryption protocol’s strength and complexity depend on the encryption keys’ length. Most VPNs use the AES-128 and 256bit encryption keys.  

To put this in perspective, since computers use only zeros and ones to carry out tasks, then a 128-bit encryption key will consist of 128 zeros and ones in a specific combination (key), which will require 6.2X1057 possible combinations of zeros and ones to guess the right key.

The above implies that it will take approximately one quintillion (a billion x billion) years for the most powerful computer in the world with a speed of 93.02 petaflops to guess the right key combination for decrypting 128-bit encrypted data!

You guessed right; the hackers don’t have such resources, and they wouldn’t be around that much considering the impossible amount of time it will take to achieve such a feat. This gives you an idea of how secure a VPN encryption is.

Choosing the right VPN encryption protocol involves understanding your priorities and the strengths and weaknesses of each option. Consulting with a reputable VPN provider can help you select the best protocol for your needs.

Common Types Of VPN Protocols

Common Types Of VPN Protocols

VPN protocols refer to instructions and processes that create a secure connection between a user’s device and the VPN server. They determine how the user’s data is routed through a connection. 

Based on the user’s needs, some VPN protocols emphasize security at the expense of speed. However, a suitable VPN protocol should be optimized for speed and security. 

1. OpenVPN

OpenVPN protocol uses a combination of SSL (Secure Socket Layer) and TSL (Transport Layer Security) encryption to establish a secure connection tunnel between the user’s device and the VPN server. 

A VPN encryption protocol comprises two components: the data channel and the control channel encryption. 

  • The data channel: The data channel uses an encryption algorithm (cipher) to scramble data traffic from the user’s device. 
  • The Control channel encryption: The control channel encryption uses Transport Layer Security (TSL)to establish a secure connection between a user’s computer and the VPN, combining hash authentication, handshake encryption, and cipher.

2. IKEv2/IPsec

Microsoft and Cisco designed Internet Key Exchange version 2 to succeed IKEv1. IKEv2 creates a secure connection between a user’s device and the VPN server using a security association protocol (SA protocol) to authenticate the user’s device and the VPN server.  

IKEv2 uses a symmetric encryption key to authenticate the user’s device and the VPN server and establish a secure connection between them.

Mobile devices widely use it to create reasonably secure and fast VPN protocols, and it is preferred over OpenVPN protocols for stability.

3. L2TP/IPsec

The Internet Service Provider (ISP) uses the Layer Two Tunneling Protocol (L2TP) to smooth online VPN functioning.

L2TP uses a combination of PPTP (point-to-point Tunneling Protocol) and (Layer 2 Forwarding Protocol) (L2F) to create a secure connection between a user’s device and the VPN server. 

L2TP slows internet connectivity speed, relies on IPSec to encrypt and authenticate data traffic between the user’s device and the VPN server, and does not have intelligent tools to bypass firewalls.

4. WireGuard

WireGuard is a new VPN protocol created to offer advantages in aspects where OpenVPN and IPsec are lacking.

Hence, it gives users a highly stable connection, simple setup, and lighter codebases of about 4000 lines (making spotting bugs easier), about 1% of OpenVPN and IPsec’s codebases.

READ ALSO: Best VPN For 2023: Top Picks Reviewed by Our VPN Experts

Common VPN Encryption Protocols: Frequently Asked Questions

What are common VPN encryption protocols?

A VPN encryption protocol dictates how data is scrambled and secured while traveling between your device and the VPN server. Some of the most common VPN encryption protocols include:

  • OpenVPN: Known for its strong security and open-source nature, allowing for independent audits and scrutiny.
  • IKEv2/IPsec: A combination that offers a good balance of security and speed. IKEv2 handles the key exchange, while IPSec encrypts the data.
  • L2TP/IPsec: Similar to IKEv2/IPsec, L2TP acts as a tunneling protocol, and IPSec provides encryption.
  • WireGuard®: A newer, lightweight protocol that prioritizes speed and ease of use while maintaining strong encryption.
  • SSTP (Secure Socket Tunneling Protocol): A Microsoft-developed protocol that offers good compatibility with Windows devices but may be less secure than other options.

Which encryption protocols might be used to secure a VPN?

The specific protocol a VPN service uses depends on the provider. Most reputable VPNs offer a choice between several protocols, allowing you to prioritize security, speed, or compatibility based on your needs.

READ ALSO: How to Use a VPN to Protect Your Online Privacy

What encryption should I use for a VPN?

The ideal encryption protocol depends on your priorities:

  • For maximum security: Choose OpenVPN or IKEv2/IPsec.
  • For a balance of security and speed: Consider IKEv2/IPsec or WireGuard®.
  • For ease of use and compatibility: WireGuard® or SSTP might be suitable options (though keep security in mind with SSTP).

What are the 4 main types of VPN?

There isn’t a standardized categorization into “4 main types” of VPNs. However, VPNs can be broadly classified based on their functionality:

  • Remote Access VPN: Allows secure connection to a private network, often used for corporate access.
  • Site-to-Site VPN: Connects two separate networks for secure data exchange, commonly used by businesses.
  • Point-to-Point VPN: Creates a secure tunnel between two individual devices.
  • Mobile VPN: Designed for use with smartphones and tablets, often focusing on ease of use.

What are three types of protocols used by a VPN?

There isn’t a fixed set of three protocols used by all VPNs. The most common ones include OpenVPN, IKEv2/IPsec, L2TP/IPsec, WireGuard®, and SSTP. However, some VPNs might offer additional or less common protocols.

What are the 3 main protocols that IPsec uses?

IPsec itself is a suite of protocols, not a single protocol. The three main protocols within IPSec are:

  • Authentication Header (AH): Ensures data integrity and origin verification.
  • Encapsulating Security Payload (ESP): Encrypts data for confidentiality.
  • Internet Key Exchange (IKE): Establishes a secure tunnel and manages key exchange for encryption and authentication.

Wrap-Up: What Is The Best VPN Encryption Protocol?

Since WireGuard is a ‘work in progress’ VPN protocol, it is best to settle for OpenVPN protocol since it offers users speed, a highly secure connection, and a reasonably stable connection.

Although there are many more VPN protocols than listed here, it is best to choose a suitable one optimized for speed and data security. 

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


RELATED POSTS

Exclusive Interview with Mark Stamford, CEO of OccamSec

In this exclusive interview, we spoke with Mark Stamford, CEO of OccamSec to learn more about enterprise cybersecurity technologies, Radius vendor assessment, and more about their company offerings.

OccamSec is an information security company that provides penetration services. Founded in 2010, OccamSec has evolved into becoming a leading cybersecurity technology provider for enterprises.

Here are Mark’s response to our questions:

1. Question: Your company performs lots of penetration tests, what can you say about the cybersecurity state of most online systems you’ve tested?

Mark Stamford: The general state has improved. Security technologies continue to improve, as has the understanding of risk and security. There are a range of accepted “best practices” which if followed will deter the average hacker. The gaps that remain after that are really the ones that continue to be tricky to fix because they are tricky to find. A lot of our work is in this space – what are the technical issues that are going to cost me my company/job/etc..? and how do we fix them.

The bigger issue is how organizations approach security. For all the articles we read about companies implementing security technologies there are many more who are still considering how best to proceed, and even if they need to. Case in point I was on a panel around cybersecurity, one of the audience asked: “why do we need computers?” I am going to assume their security is not so great..

2. Question: With Radius 2.0 recently released, what was the primary motive behind its initial launch and development?

Mark Stamford: There are two reasons, the first is we work with a lot of companies, almost universally, third party risk management tools annoy people. We figured we should try and make a better one.

The second is we believe that assessing the cybersecurity risk of an organization requires you to consider vendors you use. Each one is a potential hole into your network 20 years ago I used a data feed company to breach another, vendors are only more prevalent since then.

Radius enables us to provide a solution to solve our clients’ problems, and better assess how exposed they are.

3. Question: What are the core values you look after for individuals who wish to join your team?

Mark Stamford: OccamSec is a team, so the ability to play well with others is critical. For a long time, any new potential team member had to jump on a call with the whole company, if anyone got a bad vibe, or knew the candidate and that they wouldn’t fit, we would not proceed with them. We have eased up on that a little, but we still try to expose candidates to as much of the team as we can and make sure they are going to be a good fit.

We need people who are able to think and apply their knowledge to solving problems. Every project we do is different, from penetration testing a medical device, to physically breaching an oil facility, and everything in between. Enjoying solving problems, and realizing that the solution is different each time is key. Also realizing that you need to continuously learn to be good at your job. Technology, and security, are constantly changing, to be good at this you have to want to keep up.

Finally, we don’t do the corporate thing, we have no dress codes, no fixed office hours, you can talk about what you want, and we minimize office politics. Acceptance of that culture and the ability to thrive in it is vital.

4. Question: What counter-measures would you recommend to online entrepreneurs to minimize the risk of cyber-attacks?

Mark Stamford: First, try to not read too much coming out of the information security industry. So much is based around FUD (fear, uncertainty, and doubt). Instead think about what your business does, what you want to achieve, and how you want to achieve it. Spend some time considering how it could go wrong – what is your worst day? Then talk to someone in InfoSec and determine what the threats are, where you are vulnerable then fix them.

Too often we see tools being deployed as some kind of silver bullet. That never works, so save your money and start with some questions.

At a technical level, make sure you patch your software, this is the single easiest (and cheapest) way to lower your chance of having a problem.

5. Question: As a New York-based company, how is the presence of OccamSec in other continents? Are you planning on extending your reach anytime soon?

Mark Stamford: Our  HQ is in NYC and then we have team members across the US. We also have a team in London and Dubai. With the UK leaving the EU we’re looking at spinning up a team in mainland Europe. There’s been some discussion around Australia, although it is very early.

One good thing about our work is we can employ people regardless of where they are, all you need is an internet connection.

6. Question: What have been your significant achievement(s) in 2020 so far?

Mark Stamford: Navigating the current pandemic and ensuring our staff is ok. While business goals are important, without our team we would not exist. I am proud of the way the team has been through this and the support they have provided each other.

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


RELATED POSTS

Identity of the invisible god hacker revealed

The murky world of cybercrime has witnessed the unmasking of a prolific hacker, the one shrouded in mystery – the “Invisible God.”

Following criminal charges being filed, authorities have revealed the true identity of this individual responsible for a string of cyberattacks that breached the data security of over 300 entities across 44 countries.

This revelation sheds light on the hacker’s methods, the scale of the operation, and the international effort to bring him to justice.

From the Shadows to the Spotlight: Unveiling Andrey Turchin

The culprit behind the “Invisible God hacker” moniker is Andrey Turchin, a 37-year-old citizen of Kazakhstan. His journey into notoriety appears to have begun sometime in 2019.

Then, Turchin allegedly made a bold move: advertising stolen source codes and access credentials of prominent digital security companies like Trend Micro, McAfee, and Symantec.

This audacious act of putting his wares on display online attracted significant attention and solidified his reputation as the “Invisible God.” The price tag for these stolen digital keys? A staggering sum ranging from $300,000 to a whopping $1 million.

The financial impact of Turchin’s actions extended far beyond the direct sale of stolen data. By compromising the security systems of these companies, he potentially opened a backdoor for further attacks, causing significant financial losses for both the targeted companies and their clients.

Additionally, Turchin allegedly offered a dubious bonus with his stolen credentials – “invisibility” for his customers, implying a method to evade detection by law enforcement or security professionals.

READ ALSO: Identity Theft Is Not A Joke, Jim [MUST READ Parody]

A Long Game of Cat and Mouse: Unveiling the Invisible God hacker Identity

A Long Game of Cat and Mouse: Unveiling the Invisible God hacker Identity

While the recent unsealing of charges paints a picture of a sudden bust, reports suggest that Turchin’s true identity might have been known to authorities for some time.

The specific reasons for keeping this information confidential likely revolved around the complexities of international cybercrime investigations, where jurisdiction and diplomatic relations play a critical role. However, the details remained sealed until a recent court decision.

The unsealing of the charges against Andrey Turchin is credited to the efforts of Group-IB, a cybersecurity company with a proven track record in cybercrime investigations. Their meticulous investigation reportedly began in 2016, tracing Turchin’s online activity back to his initial appearance in the cybercriminal underworld.

Group-IB’s report paints a picture of a skilled hacker with a rapid evolution. While his technical expertise was undeniable, Group-IB describes him as lacking in business acumen during his early forays into cybercrime.

This aligns with the observation that his initial targets were hotels and banks, potentially indicating a less sophisticated approach at the start of his criminal career.

A Global Effort to Secure the Digital Landscape

The unsealing of charges against Andrey Turchin represents a significant step forward, but the fight against cybercrime is far from over. This case highlights the international nature of cybercrime and the need for global cooperation.

Authorities like the UK’s National Crime Agency and the FBI are actively involved in the investigation, demonstrating the commitment of various nations to tackling this growing threat.

Furthermore, the role of private security companies like Group-IB underscores the crucial collaboration between public and private entities in safeguarding the digital landscape. Their expertise in cyber forensics and intelligence gathering is instrumental in identifying and apprehending cybercriminals like Andrey Turchin.

Read Also: Breachers Gonna Breach: Protect Your Organization From Internal Threats

Looking Ahead: Lessons Learned and the Road to Justice

The case of the “Invisible God” offers valuable lessons for organizations and individuals alike. The sheer number of victims and the audacity of the attacks serve as a stark reminder of the ever-evolving threat landscape.

Organizations must continuously strengthen their cybersecurity posture by investing in robust security solutions and employee awareness training. Individuals, too, need to exercise caution when conducting online activities and remain vigilant against phishing attempts and other social engineering tactics.

As the legal proceedings against Andrey Turchin unfold, it will be critical to see how international cooperation plays out. Will other countries join the investigation? What steps will be taken to recover stolen data and compensate victims? These questions remain unanswered, but the unsealing of the charges signifies a positive step towards holding this prolific cybercriminal accountable for his actions.

The “Invisible God hacker” may have enjoyed a period of anonymity, but the combined efforts of law enforcement and security professionals have brought him to light. This case serves as a powerful message to cybercriminals: the shadows may offer temporary refuge, but the pursuit for justice is relentless.

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


INTERESTING POSTS

BlackRock malware deployed to hijack banking apps

Security researchers just found a new Android malware that affects mostly banking apps, and it is called “BlackRock.”

According to ThreatFabric, BlackRock’s icon is always hidden when launched on a mobile device. After that, it acts as a Google update to access users’ Accessibility Service.

As soon as it gains access to the privileges, it grants more permission. This allows it to communicate with its C&C (command-and-control) server to make overlay attacks.

When it reaches this stage, Malware checks to determine the application that runs on that target’s foreground. BlackRock then has the chance to deploy one of its dual overlays.

The overlays include the one that particularly mimicked any of the applications of its target or a generic credit card snatcher.

The Modus Operandi Of BlackRock Malware

The Modus Operandi Of BlackRock Malware

Interestingly, BlackRock malware targets apps related to banking operations in the United States, Europe, Canada, and Australia are its main target. Even with them as its primary target, this malware also went after lifestyle, communication, dating, and social applications.

According to ThreatFabric’s research, almost all trending dating and social applications are in the app. This choice of actor is likely due to this pandemic, which made people socialize more online. The actors have also likely tried to include dating applications, although it was rarely seen on the list.

The analysis of ThreatFabric revealed that the latest arrival of BlackRock is to revive LokiBot. The initial appearance of this threat was on the threat landscape between 2016 and 2017, with several attack campaigns.

It includes the one that deployed Ransomware anytime a user tried to remove it. The moment LokiBot’s source code was revealed online, it died down. Even at that, it still performed several attack operations as recently as May 2019.

How To Avoid BlackRock Malware

The emergence of this malware should give users more reason to download applications only from official marketplaces and trusted developers.

Smartphone users should be cautious of applications that require ‘excess’ permission. And you should also protect your bank accounts with some sort of two-factor authentication or something stronger.

How To Avoid BlackRock Malware

Frequently Asked Questions

What is BlackRock malware?

BlackRock is a type of malware specifically designed to target Android smartphones. It falls under banking malware, which aims to steal your banking apps’ financial information and login credentials.

READ ALSO: Benefits Of Core Banking Solutions

What is Android banking malware?

Android banking malware is malicious software created to target Android operating system users. These programs often disguise themselves as legitimate apps and lurk in the background, waiting to steal your banking login details and credit card information or even intercept SMS messages containing two-factor authentication codes.

How do I remove hidden malware from my phone?

If you suspect your phone is infected with BlackRock malware or any other type of malware, here are some steps you can take:

  • Run a security scan: Most antivirus apps offer scans to detect and remove malware. Run a full scan on your device and follow the app’s instructions to quarantine or remove any threats found.
  • Boot into Safe Mode: Booting into Safe Mode prevents third-party apps from running. This can help you identify if a downloaded app is the culprit. In Safe Mode, you can then uninstall any suspicious applications.
  • Factory Reset: A factory reset might be necessary if other methods fail. This will erase all your data and settings, so back up your phone beforehand. After the reset, only install apps from trusted sources like the Google Play Store.

Has BlackRock been hacked?

No, BlackRock itself is not a hacked program. It’s the malware itself that hackers use to try and steal information from your phone.

Is BlackRock a computer virus?

While the terms are sometimes interchangeable, BlackRock is more accurately classified as malware. A computer virus can replicate itself and spread from device to device, whereas BlackRock requires user interaction (downloading an infected app) to spread.

What is malware in banking?

Banking malware is a specific malware designed to target your financial information. These programs can steal login credentials for online banking apps, credit card details you enter while shopping online, or intercept SMS messages containing two-factor authentication codes for secure logins.

Hackers can steal your money or make unauthorized transactions by compromising your banking security.

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


RELATED POSTS

How To Get Money Back From A Scammer On Western Union

Western Union is one of the most used means of international money transfer. Find out how to get money back from a scammer on Western Union in this post. 

Scams take various forms, but the most popular scam often joked about is the “Nigerian Prince” email scam, which still rakes in over $700,000 in illegal funds yearly.

Although the scam originated in Nigeria and is also referred to by other synonyms like Nigerian letter scam, 419, etc., it is nevertheless a fraud that can also be perpetrated by non-Nigerians from other locations outside of Nigeria.

Scams of any sort often exploit the greedy nature of humans and fast payment services, which makes the transfer of money from the victims to scammers a quick and seamless process.

One such payment service often exploited in perpetrating scams is the Western Union transfer, which makes it possible to send and receive payments to any part of the world within minutes with simplified payment processes.

All that is needed to send money via Western Union is the name and location of the recipient (the scammer in this case).

Upon receipt of the money and transfer fee, Western Union generates a control number which the sender (the victim who just got scammed believing that a Nigerian Prince can make him/her rich with gold literarily picked on the streets of Africa!) sends to the recipient (the scammer).

The scammer smiles to the bank with the control number, knowing he has successfully hoodwinked his prey into believing there are endless riches on the street of Africa waiting to be picked!

Read Also: 5 Secure Online Payment Services To Consider

If A Scammer Has Hoodwinked You, Can You Get Your Money Back?

In most instances, people who are victims of scams never get their money back except:

  1. If you realize early enough that you have been scammed, you can contact Western Union’s fraud hotline at 1-800-448-1492, or fill the Western Union’s online fraud claim. That way, Western Union will stop the transaction and refund your money and the fee ONLY if the fund is yet to be picked up by the scammer.
  2. If you report a fraud case, Western Union will review your claim and determine if you’re entitled to a refund or not.

How To Get Money Back From A Scammer On Western Union

How To Get Money Back From A Scammer On Western Union

Recouping money lost through a Western Union scam can be difficult, but here are some steps you can take to try and get it back:

Act Quickly: The sooner you take action, the better your chances of recovering your funds.

1. Report the Scam to Western Union

Call Western Union’s fraud hotline at 1-800-448-1492 (US) or visit their global fraud hotline directory for your country. File a fraud claim online through their website.

Provide all details of the transaction, including the Money Transfer Control Number (MTCN), receiver information, and how the scam occurred.

2. Contact Your Bank or Credit Card Company

If you paid for the transfer using a bank account or credit card, report the scam to your financial institution immediately.

Depending on the circumstances, they might be able to reverse the charges or initiate a dispute process.

3. Report the Scam to Law Enforcement

File a police report to document the crime. This report may be helpful for your bank or credit card company’s investigation and potential future legal action.

Important points to remember:

  • Recovering funds depends on several factors, including how quickly you report the scam and whether the receiver has already collected the money.
  • Western Union may not be able to recover the funds if the receiver has already collected them.
  • There might be fees associated with filing a fraud claim with Western Union.

READ ALSO: What Are Phishing Scams And How You Can Avoid Them?

How to Cancel a Western Union Transfer and Recover Your Money

Once the user is sure the transaction is all a scam, here are the steps to be swiftly taken to outsmart the scammer and recover the money:

  1. Get the transaction details together. Undoubtedly, Western Union would ask for these to verify the transaction and process the request. The details may include the Money Transfer Control Number (MTCN), the total money sent, the sender’s name and address, the recipient’s country, etc.
  2. Find and contact the place where the transfer was purchased. The purchase must be made from a sending agency or an online platform. It is best to visit the physical location, and if impossible, a call should be staged.
  3. Provide the transaction details gathered earlier. Be cautious as this step and any mistake should not be made. A misspelt name may be enough reason for Western Union not to proceed with the request.
  4. You may pay some fees for the cancellation of the transaction. This fee may vary depending on the type of the actual transaction.
  5. Wait for the application to process and receive a refund. This process should not be time-consuming, and your refund should be available in a few minutes.

Even after receiving the refund, it’s essential to keep the details of the transaction. This is to ensure that it can be provided at due time when necessary.

Also, either the recovery was successful, or the scammer has picked the money already. It is helpful to report to avoid family, friends, and other Western Union users from making the same mistake. Report scams to Western Union by using the official report page, which can be accessed using the official link.

READ ALSO: How to Protect Yourself from Online Fraud [6 Surefire Internet Safety Tips]

Western Union Fraud Prevention Mechanisms

Western Union Fraud Prevention Mechanisms

Advanced technology, evidenced by the increase in fast and anonymous payment systems, makes the fight against scams and frauds a difficult one. However, Western Union has put in place the following mechanisms to prevent scams:

  1. Automated fraud warning
  2. Fraud prevention information is available at all Western Union locations in the world.
  3. Fraud prevention resources
  4. Fraud prevention awareness to sensitize people about scams

READ ALSO: How To Report Online Scams In The UK: Protecting Yourself and Stopping Fraudsters

How To Prevent Western Union Money Transfer Scams

  1. If the offer is “too good to be true,” it is a scam; do not fall for it.
  2. You should send money only to someone you have met in person.
  3. Do not give your bank details or personally identifiable information to someone you haven’t met in person.
  4. Government agencies won’t ask you to pay taxes and levies via Western Union or other money transfer services.
  5. Do not send money to “charity organizations.” Only scam charity organizations ask for donations via Western Union or other money transfer services
  6. If you’re purchasing goods or doing transactions via a platform, make payment using payment means provided on the platform only.
  7. Never be in a rush to transfer money or goods upon the receipt of cheques. Always learn to wait until the cheque is officially cleared for collection.
  8. Loans and credit card facilities won’t ask for payment before receiving money from them, so beware of such.
  9. Look for loopholes and report a suspected scam to law enforcement agencies.

Frequently Asked Questions

Can I get my money back if I was scammed?

There’s a chance, but it depends on how quickly you act and whether the receiver has already collected the money. Western Union may not be able to recover funds if they’ve been picked up.

Does Western Union refund scammed money?

Western Union doesn’t guarantee refunds for scams. However, they do have a fraud reporting process. If you report the scam quickly, they might be able to freeze the transfer if it hasn’t been collected yet.

How long does a Western Union refund take?

Unfortunately, there’s no guaranteed timeframe for getting your money back. It depends on Western Union’s investigation and the actions of your bank or credit card company.

Can you track down the scammer?

It’s challenging for an individual to track down a scammer. Law enforcement might be able to investigate based on your report, but this doesn’t guarantee finding the culprit.

How can I prevent future scams?

  • Be wary of unsolicited requests for money transfers, especially through Western Union.
  • Never send money to someone you don’t know and trust.
  • Verify any offers or requests for money transfers independently before sending funds.

By being cautious and taking these steps if scammed, you can hopefully recover your losses and avoid similar situations in the future.

Over To You

I hope this post answers all your questions on how to get your money back from a scammer on Western Union.

Although Western Union is an efficient money platform to send and receiving money locally and internationally; however, it is one of the hotspots for online scammers.

Nonetheless, by applying the tips mentioned above, you can prevent fraud demanding from the use of Western Union.

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


RELATED POSTS

Hackers Target WhatsApp with Verification Scam

Experts are afraid that users of the popular social media application WhatsApp will become easy victims of ongoing verification scam which targets sensitive data.

Since its launch in 2009, WhatsApp has grown to become one of the most used social media platforms in the World. After being acquired by Facebook in 2014, its numbers increased, and now, over two billion users make use of WhatsApp every month.

Hackers have introduced a new verification scam which put billions of WhatsApp users at risk. It is a clever hack, which is why experts fear that a lot of users will fall for it.

Usually, the hackers pose as friends and try to convince you to send them your login code. Other times, they pose as the WhatsApp Technical Team using the WhatsApp logo so they look legit enough. These hackers send messages to their targets, telling them that they need to verify their WhatsApp accounts.

Check out our review of OmniWatch, the solution that ensures your personal information stays off the dark web and data broker websites.

The WhatsApp verification scam not only puts users at risk of losing their details, but they can also lose their entire if they give out their login code. With the login code, the hackers will be able to send and read messages with the victims’ accounts.

Considering how frequently WhatsApp requires updating, most users will be unsuspicious of these messages. Users have been advised against falling victim to such scams as the WhatsApp Technical Team does not message users on the WhatsApp platform.

This was made known via a Whatsapp blog, WABetaInfo. They dismissed the messages as fake, and if WhatsApp were to message users, there would be a green verified indicator for authenticity. Furthermore, the blog made it clear that WhatsApp will never ask for user login codes or personal data.

Read Also: New WhatsApp Glitch: User Privacy Affected

How WhatsApp users can protect themselves against the verification scam

Users should note that the WhatsApp login code is private and shouldn’t be shared with any third party, no matter who requests for it. Furthermore, they can make use of the 2-factor authentication option featured in WhatsApp settings.

So, if they do give out their login code, the hackers would still need to bypass a second security protocol before getting access to their accounts.

Hackers Target WhatsApp with Verification Scam: Frequently Asked Questions

Is there a WhatsApp scam asking for verification code?

Yes, there is a circulating scam where attackers attempt to trick you into giving them your WhatsApp verification code.

Can my WhatsApp verification code be hacked?

Technically, the code itself cannot be hacked. However, if you reveal it to someone else, they can use it to verify their own device on your WhatsApp account, potentially locking you out.

Can a scammer hack my WhatsApp if I don’t give them the code?

No, simply not giving them the code prevents them from taking over your account.

READ ALSO: How To Get Money Back From A Scammer On Western Union

Why might WhatsApp ask for a verification code?

WhatsApp typically only asks for a verification code when you:

  • Register a new device with your WhatsApp account.
  • Reinstall WhatsApp on your phone.
  • Request your account information report.

What can a scammer do with my verification code?

If you share your verification code, a scammer can use it to verify their device and gain access to your WhatsApp account. This allows them to:

  • Impersonate you and chat with your contacts.
  • See your private messages and media.
  • Make calls or send messages in your name.

How can I stay safe from this scam?

  • Never share your verification code with anyone, not even WhatsApp itself (WhatsApp will never ask for your code via call or message).
  • Be wary of suspicious messages, even if they appear to be from a friend or family member. If someone asks for your code, contact them directly through a trusted channel to confirm its legitimacy.
  • Enable two-factor authentication on your WhatsApp account. This adds an extra layer of security by requiring a PIN in addition to the verification code when registering a new device.

By understanding this scam and following these precautions, you can protect yourself from falling victim and keep your WhatsApp account secure.

Note: This was initially published in July 2020, but has been updated for freshness and accuracy.


INTERESTING POSTS

Most Effective Cybersecurity Strategy For A Small Business [We Asked 45+ Experts]

This roundup post will reveal the most effective cybersecurity strategy for a small business.

Small business owners encounter a series of cyber threats, which might be deadly depending on their impact. 

We asked top executives, small business owners, and cybersecurity experts: What Is the Most Effective Cybersecurity Strategy for a Small Business?

So, after several email requests, Skype interviews, and phone calls, we got valuable responses.

Table of Contents

48 Effective Cybersecurity Strategy For A Small Business

  1. Paul Lipman – CEO of BullGuard Cybersecurity Company

cybersecurity strategy for small business

A multifaceted cybersecurity approach is the best cybersecurity strategy. Small businesses are more vulnerable to cyberattacks as these companies are typically not as well protected as their larger enterprise counterparts.

Small businesses must develop a cohesive cybersecurity plan that includes and communicates standards for security software to be run on every device on which work is done.

Security software must include anti-phishing capabilities to protect data and prevent security breaches.

  1. Lev Barinksiy – CEO of SmartFinancial Insurance

cyber insurance for business

Several insurance companies currently offer cyber insurance to small businesses. However, it is helpful for a small business to recruit a network defence specialist to improve their overall cybersecurity in their business environment.

Down the line, when cyber insurance becomes generally accepted, it will become a prerequisite for small business owners to provide the audit of the company’s defence processes.

  1. Braden Perry – Cybersecurity Attorney at Kennyhertz Perry, LLC

stringent cybersecurity policy

I work with several companies on cyber intrusions. The most significant trend is the increase in outsider attacks on small and large companies.

For outsider attacks, these cyber threats target company websites to deliver malicious payloads, which can cause severe damage.

With a stringent cybersecurity implementation and policy, small business owners can mitigate outsider attacks significantly.

  1. Logan Kipp – Director at SiteLock

educate employees on security best practices

Implement training & education: With the sudden shift to remote work, small businesses should educate their employees on security best practices when working online. From spotting phishing emails to utilizing two-factor authentication (2FA) and a strong password, companies can help ensure employees take all necessary steps internally to protect themselves.

By teaching employees to keep security top of mind at all times, companies can also establish a standard operating procedure, or “SOP,” on how documents should be handled and how potential vulnerabilities should be reported when working remotely.

Utilize VPN & website security tools: SMBs should use a virtual private network (VPN) when relying on external networks. In these even employees’ home networks, management of security controls is outside of the company’s scope. VPNs protect data by encrypting it as it’s transmitted across shared or public networks, keeping sensitive information, such as SSNs, passwords and credit card numbers, from being exposed.

Additionally, small businesses should routinely scan their websites for malware and vulnerabilities. By being proactive with their cybersecurity hygiene, organizations can help ensure that their customers and data remain safe and secure.

Be aware of the data you’re sharing: From inputting customer information into an online form to simply sending an email, businesses need to be mindful of the private information they share online. By being careful with sensitive information, companies can limit the risk of catastrophic data leaks if they fall victim to a hack or breach.

  1. Kenny Trinh – Founder & CEO of NetbookNews

backups are essential

The perfect cybersecurity strategy for a small business is regular backups. Backups are essential, especially in a small business environment.

Likewise, relying on human intervention, such as plugging in a flash drive, is a recipe for cybersecurity failure.

  1. Stacy Clements – Owner of Milepost 42 and Retired Air Force Cyber Operations Officer

nist cybersecurity framework

An effective cybersecurity strategy for a small business requires identifying cyber risks and determining appropriate ways to mitigate those risks and respond to cyber events.

The NIST Cybersecurity Framework provides this strategy for small companies, with best practices based on input from government, academic, and private sector professionals.

The Framework was deliberately designed to be flexible so it can be used for different sizes and types of entities.

Because it’s a free resource, several sectors have already created customized resources, such as the National Restaurant Association Toolkit for Restaurant Operators. Using the Framework to define and mitigate risk is an excellent strategy for small business owners.

  1. Vince Fishbone – Cybersecurity Expert at Kingpin Private Browser 

Use antivirus software and firewalls

I recommend that small businesses should secure themselves with antivirus software and firewalls in the first place. Even if it sounds basic, you would be surprised how many companies are not using up-to-date anti-malware solutions. That should be your first-level defence.

Both access control strategy and cybersecurity minimize human error. Determining who in the company structure will have access to different types of data is crucial. Every access should be recorded in the log file.

Many attacks or information leaks are dependent on the employees. Hackers often use social engineering for that purpose. Where possible, implement multi-factor authentication and reduce the chance of ransomware attacks by regular backups.

  1. Marty Puranik – President & CEO of Atlantic.Net, a HIPAA-Compliant Web Host

Use a vetted third-party cybersecurity solution provider

Companies should seek a solution that mitigates current cybersecurity challenges, provides ongoing support, and helps offset risks from the evolving threats of the future.

Small businesses could utilize their resources in good faith and provide training to staff. Still, the challenges and threats are incredibly diverse and require a wide range of expertise.

So, the best practice is to focus on your business’s core function and let a vetted third-party provider take care of the rest. They have trained professionals who help deploy the best solutions, provide ongoing support, and are always available to help support your business.

  1. Mike Shelah – Account Executive at Advantage Industries

technology training insurance process documentation

The best Cybersecurity Strategy is: “Technology, Training, Insurance & Process Documentation.

It all begins with the right technology — consistent updates, the proper firewall, the proper spam filtering and antivirus, as well as the use of multi-factor authentication.

Then, you train your people regularly with monthly, easy-to-digest lessons. This helps to create a culture of compliance.

You work closely with people who ignore the training or perform poorly on tests, as they are your greatest vulnerability. Work with your IT vendor and insurance agent to pick a policy that accurately reflects your company and needs.

Lastly, document all of your policies and procedures related to your industry and compliance regulations.

  1. Carl Fransen – Founder & CEO of CTECH Consulting Group

Use a modern system that contains identity management, threat analytics, document protection, and MFA

There must be an acknowledgement that having a firewall, server passwords/permissions, and an antivirus does not constitute adequate protection today.

Moving away from the traditional systems, such as relying on an on-premise server whose security is based on a password and user permissions, to a modern system that contains identity management, threat analytics, document protection, and multi-factor authentication must be part of any company’s security planning.

For an effective cybersecurity strategy, there’s always a need to address the weakest link in any organization: the staff.

Staff needs to be trained on properly using the company’s systems, identifying potential threats, and having a working knowledge of the proper security procedures.

Centralizing and dashboarding multiple security systems to provide a ‘single pane of glass’ overview of what is happening within a business will help technical staff correlate relevant data and make the appropriate decisions.

  1. Cameron Call – Technical Operations Manager at Network Security Associates

backup plus mfa

There are two simple things that every small business needs to implement. Once these are in place, they can begin building an effective strategy.

If you don’t have anything else, you should have backups. Anything in a network, or even an entire network, can be replaced. Data, however, cannot. Your client list, their files, accounts receivable entries, or anything else needed for the business to operate should be backed up.

After backups are MFA, with MFA, you don’t have to rely so much on your or your staff’s ability to detect a phishing email. It also helps if usernames and passwords are leaked online due to the fault of a service provider.

  1. Sean Nguyen – Director of Internet Advisor

be overprepared for every possible scenario

As small business owners, we’re aware that we’re the primary target for cybercriminals because we’re seen as easy hits. The statistics are brutal; this is the kind of thing that can wipe you out.

With remote work, I strongly emphasise employee security – full cybersecurity training, supplied security software, company devices with full facial recognition, etc.

The website is also fully locked down, from our domain to anti-spyware software, security patches, and everything else. We have security professionals checking everything regularly for suspicious activity. Our strategy is to “be over-prepared for every possible scenario”.

  1. Dan Merino – CEO of Green Dot Security

backups documentation security awareness training

Backups – Any good security person should say that the most locked down network is still open to attacks if the attacker is motivated enough; backups (especially with an offline and offsite copy) can get you out of many issues

Documentation – As much as possible, documents that spell out what to do in the case of a breach or cybersecurity incident can reduce downtime, speed up the isolation of issues and help the company to understand where they have shortcomings in security. Documentation should include a Cyber Incident Response Plan, Information Security Policy, Disaster Recovery / Business Continuity Plan and maybe more like a Security Framework Policy (which would outline the company’s various implemented security plans)

Layering – Adding as many different services and devices as can be afforded to help prevent attacks. For example, the firewall should have subscription security services so the gateway is more than just a traffic cop.

Security Awareness Training – At the end of the day, the weakest point in most networks is the users themselves. Many attacks exploit the fact that tech is complicated, and humans are easily tricked. Training should make users aware of the dangers that exist.

  1. Naheed Mir – Owner of Rugknots

put the cloud to work

The best cybersecurity strategy I recommend for small businesses is cloud security. Even though the cloud is a bit risky, you are less likely to lose critical data by storing data in the cloud.

Utilizing the cloud for storing data is an economical choice for small to average-sized organizations.

Whenever smaller businesses develop due to expanded sales, cloud storage and security tools can scale with the company. As cloud security constantly improves, your business must opt for cloud storage security.

  1. Calloway Cook – President of Illuminate Labs

Set up reCAPTCHA for Form Responses

Crafting a cybersecurity strategy for a small business is a cakewalk process. Web admins can set up reCAPTCHA on their forms for free using Google Developer Tools. This is a must for more prominent organisations because the more employees your company has, the more significant the attack vector.

reCAPTCHA is the best free tool available to ensure that forms are being completed by a human rather than a bot. It’s not perfect, and humans can still manually submit spam or phishing messages. However, this is a quick way to reduce risk, making it a cybersecurity significantly best practice.

  1. Mark Soto – Founder of Cybericus Cybersecurity Company

small business cybersecurity strategy

Use network segmentation, a process where you split your computer network into multiple segments.

Using network segmentation can help prevent your entire system from getting compromised if hackers can access one of your networks. It also gives you time to react in the worst-case scenario where the other networks are also in danger of being hacked.

With network segmentation, you can specify which network resources your users can access. This might be the most significant benefit of network segmentation in a world where malicious internal users make up at least 30% of data breaches.

  1. Jack Kudale – CEO of Cowbell Cyber

effective small business cybersecurity strategy

Cyber insurance is critical in protecting the assets of small businesses. Given their limited IT budgets and resources, small businesses are as susceptible to cyberattacks as large organizations and are heavily targeted by cybercriminals.

Small businesses can now benefit from tailored, standalone cyber coverage to help cover Security Breach Expenses, Security Breach Liability, Cyber Extortion and Ransomware Payment, and losses from Social Engineering incidents.

Cyberattacks are no longer an “if” scenario but rather a “when” scenario. Cyber insurance is a crucial step to mitigate the dreaded financial losses in the aftermath of a breach.

  1. Zoran Naumoski – Awareness Expert at Li-Fi

use lifi internet connection

As a small business owner working from home office for cyber-security, I strongly recommend using a Li-Fi internet connection in your office instead of the classic Wi-Fi connection, which can be easily hacked.

But with Li-Fi, it is the opposite and cannot be hacked by someone outside your office. Apart from that, small businesses should also focus on layered cybersecurity systems for their cybersecurity strategy.

  1. Jay Ryerse – Vice President, Cybersecurity Initiatives at ConnectWise

educate yourself

The biggest threat today is the unknown, so when it comes to cybersecurity, the best thing small businesses can do is educate themselves. They might have a lean team of IT people who know IT but don’t understand where cybersecurity fits.

There are free tools small businesses can put in place that are very effective in combating many common cyber threats, so they must understand what those are and how to implement them.

  1. Johnny Santiago – Brand Partnerships Manager for Social Catfish

ransomware cyberattack

Ransomware is a typical phishing attack, an encrypting malware that encrypts essential company files and holds them for ransom. Ransoms typically range from hundreds to thousands of dollars. Cybercriminals made over $1 billion last year from businesses attacked by ransomware.

Never open an attachment in an email you did not expect to receive or recognize the sender. It would be best to use the same caution when presented with URLs that you do not know, or that came from an unknown sender.

With today’s advanced ransomware techniques, you only have to visit a website to become infected. You DO NOT have to click anything on the site to infect the company with data encrypting ransomware.

Please follow the best practices outlined above to ensure you do your part to keep ransomware off the company network. Failure to do so could result in significant downtime and monetary cost to the business, and we all need to be vigilant in stopping these attacks.

  1. Ben Walker – Founder & CEO of Transcription Outsourcing, LLC

secure cloud storage small business

We work in the legal, law enforcement, medical, financial, and academic industries and have to abide by some stringent confidentiality agreements.  

That’s why I would tell you to host everything in the cloud with a company with HIPAA and CJIS compliance certifications and run criminal background checks on all your employees with sensitive data access.

We also have general liability and a separate cyber liability policy in case something terrible happens.

  1. Neil Kittleson – CEO of NKrypt

protect data

Cybersecurity strategies for small businesses must focus on protecting proprietary, employee, and customer data.  In today’s world, that means that you must leverage outside providers to help manage all of the systems needed to preserve the full scope of your organization.

The first step is to invest in the right external providers for data storage, email services, video conferencing, and collaboration tools.  

The second is applying the right security policies to use those tools: Enforce two-factor authentication, require VPN use by employees, and implement mobile device management.

The last step is training your employees on the risks to the business presented by cyber adversaries and ensuring they understand your tools and policies and why they are essential.

  1. Paul Kubler – Red Team Head at CYBRI

protect yourself against cyber attacks pareto

Small business owners’ most effective cybersecurity strategy to protect themselves against cyber attacks is to go after the low-hanging fruits, otherwise known as the 80-20 rule. A straightforward yet practical example is enabling multi-factor authentication on email accounts.

Another effective cybersecurity strategy for small businesses is to ensure that all passwords are longer than 14 characters and offer some complexity.

These give SMBs a considerable head start on cybersecurity cos it almost nothing and takes little time to set up. That way, a local business opportunity stands a chance against cyber threats.

  1. Nir Kshetri – Professor at the University of North Carolina-Greensboro and a Research Fellow at Kobe University

cybersecurity training

It is essential to develop effective policy and cybersecurity-ready human capital, which includes improving cyber-defence capabilities and minimizing deviant behaviours in the workforce. This is because the human factor is the weakest link in cybersecurity.

According to Dell SecureWorks, 90% of all malware infections involve human elements, such as opening email attachments or clicking links on websites before they can infiltrate the targets. CybSafe’s analysis of the data from the U.K.’s ICO indicated that human errors accounted for 90% of data breaches in the U.K. in 2019.

SMEs can take advantage of cybersecurity training provided by companies in effectively identifying and screening phishing emails. It is also essential to develop clear policies regarding access to organizational data and networks, especially during COVID-19 and remote working.

  1. Bryan Osima – CEO of Uvietech Software Solutions

small business cybersecurity

A standard entryway for a malicious attack on your website is through the forms and web applications that allow visitors to interact dynamically with your business. Most visits to your website will be benign, but all it takes is one malicious user or automated bot that crawls the internet, looking for vulnerable websites, to bring down your entire system.

These attacks work when malicious codes and scripts are injected into your site through your contact forms, order forms or other types of user input like comments, etc.

These scripts could either execute malicious codes that can hijack and bring down your server or databases or take over your website and inject codes into your web pages that affect other site users (this is known as a Cross-site Scripting attack).

With such cross-site scripting attacks, users to your site could have all communications from your site redirected to other sites, where phishing or other scam activities can be carried out,  or their computers could be infected with malware that turns their machines into spam bots that the malicious users control.

The solution to these attacks is to securely validate all input to your website through any exposed entry points, whether web forms, comment boxes, etc.

Never trust any input into your system, and thoroughly validate any submissions you receive to ensure that the types of content you expect are what you’re getting and that no malicious scripts are being introduced to your system from your website’s entry points.

  1. Tomas Statkus – CEO of ReviewedbyPro

use a vpn with dedicated ip address

The cheapest and the most influential small business security strategy is to use a VPN with a dedicated IP address (Virtual Private Network).

It can add many security features for the business, including malware protection, data encryption, Wi-Fi network protection, and secure connection to the website management systems, banks, CRM systems, etc.

  1. Brad Snow – Cloud Computing Specialist at Bridgepointe Technologies & Co-founder of Tech Exec Roundtable

periodic cybersecurity training for all employees

All employees must take security seriously and understand the potential ramifications of a breach.

All employees must be trained in security; I suggest training be done not just when onboarding but periodically throughout employment, such as a monthly refresher that includes pass/fail requirements. Also, phishing test emails are not a bad idea as a training component.

  • Updates: be sure someone is not just clicking past these.
  • Multi-factor authentication, a minimum of 2FA.
  • Firewall, don’t go cheap, but you don’t need to break the bank.
  • Limit exposure generally; if they don’t NEED access, don’t grant it.

Interview local MSPs if they are trying to scare you…it’s a red flag! You need someone who understands your work environment/flow and can help optimize security. If they aren’t, at minimum, mentioning all the things above, move on as well.

Security has to be taken seriously, and due to the ever-changing environment, it must be an ongoing effort. These are a few relatively simple things you can do independently, but no matter your size, hiring someone to handle them is worth exploring.

  1. Scott Croskey – Global Chief Security Officer at Cipher Security and part-time US Air Force Cyber Warfare Officer at US Cyber Command

use a Managed Security Service Provider (MSSP)

Small businesses still operating are likely doing so from a “work from home” (WFH) model. The best return on investment today is to protect your employee’s laptops/workstations.

At the same time, they work remotely with robust endpoint protection software and outsource the 24/7 management of it to a Managed Security Service Provider (MSSP).

This will cost a fraction of what it would cost to hire staff to support 24/7 operations fully.  Also, ensure the MSSP can protect your cloud-based environments, if applicable. 

  1. David Bell – Cybersecurity Editor at CountryVPNs

antivirus and vpn

I believe a small business that can’t afford to hire an MSSP or install cybersecurity technology should use a top-notch VPN service and a quality antivirus program.

A top-notch VPN service will not only help them hide their location by swapping their actual IP with the IP of the country they are connected to, but it will also encrypt their online communication so no one can access what they are doing online.

A quality Antivirus will block any malware used by cybercriminals in cyberattacks. So, if these two things are in place, small businesses have ensured their cybersecurity strategy.

  1. Osama Tahir – Cybersecurity Editor at VPNRanks

cybersecurity best practices

As a Cybersecurity expert, here’s my checklist of cybersecurity best practices for small business owners.

  • Small business owners must understand the risk factors and arrange digital assets for online safety.
  • They must protect their network access with Safe Wi-FI, Strong firewalls and more.
  • Limited access: This is an access control strategy, but one needs to find out or research which person needs access to which data.
  • Educate employees continually to use strong and secure passwords.
  • Ensure that your gadgets/equipment/devices are updated to the mark and secure from cyber-attacks.
  • Safest Cybersecurity Strategy: You must maintain the backup and recovery for the safe side.
  • Help from experts: Cybersecurity is quite complicated, especially for small businesses; you need to hire a consultant for help.
  1. Mihai Corbuleac – Information Security Consultant at StratusPointIT

implement 360 cybersecurity plan

There are many different approaches to cybersecurity, but the most critical aspect is to take action. To protect your business against any malware, it’s crucial to implement a 360-degree cybersecurity plan, including well-configured firewalls, antivirus software, a backup policy, and network security solutions to protect all connected devices.

Firstly, your security strategy should focus on identifying critical digital assets. Secondly, implement a secure communication method and create an efficient password management protocol. Safeguard your backups, and most importantly, educate your employees.

Other vital aspects – include using robust authentication methods (MFA – token, smart card, mobile app), physically securing equipment and ports, defining strong security rules for administrators, using traffic monitoring tools, performing regular internal security audits, etc.

For email security (because the email service is the primary vector for malware infections), you can handle it in-house with the right software (such as Mimecast) and regular security training for all email users, as it can significantly mitigate human error.

  1. Shagun Chauhan – Business Consultant at iFour Technolab

understand cyber risk digital asset

Every company is different, and their needs must be unique from those of competitors. It starts with building a cybersecurity strategy covering all threats, policy-making, access control, etc. As you build out your plan, here is one of the strong pillars you must focus on.

Many threats, such as phishing, ransomware, drive-by-downloads, etc., threaten businesses. Understand the threat and plan a successful attack to secure your company.

By understanding the critical assets from hubs of the network to the personal devices used by the employees and customers of your company and taking stock of digital landscapes, one can learn how to protect them.

This is because steps should be taken to protect the business from sudden cyber-attacks, which may affect the company’s continuity and cause a loss of data.

  1. Nick Santora – CEO and Founder of Curricula, A Cybersecurity Awareness Training Company

invest cybersecurity training

It’s security awareness training to recognize warning signs from potential hackers.

Small business leaders are running a mile a minute. They don’t have an IT team but have tremendous risk because one security breach could end them.

Your employees are on the frontlines to help protect your organization. It’s essential to teach employees how to be aware of threats, such as phishing scams.

For example, send real-world simulated email tests to your employees’ inboxes every month. It’s interesting to see how many people fail these tests and show the risk of being victims of a phishing scam.

  1. Dan L. Dodson – CEO of Fortified Health Security

network vulnerabilites cybersecurity response plan

With the economic environment the world was operating in changing overnight, small businesses need to remember the fundamentals of cybersecurity and ask themselves how the new work atmosphere could pose a more significant risk of attack, how to address those risks, and how to respond to an attack.

Vulnerabilities must be identified to understand how cybercriminals can access a network. The small business community must adapt to these new business models to protect their hard-earned reputation and preserve the confidence of the people with whom they do business.

  1. Sanjay Patoliya – Founder and Director of Teclogiq

backup cloud storage

Your business cannot operate effectively without access to your data. If you don’t back it up, your data may not be there for you when you need it the most.

A busy office creates thousands of files each day, and the secure backup of these files needs to be a part of your company’s cybersecurity strategy.

Backups should be made daily and mirrored in the cloud or an offsite server. An IT support and IT security professional should oversee backups.

  1. Stuart Cooke – Marketing Manager at Evalian

adequate cybersecurity training

In my opinion, educating your staff so that they can recognise the danger signs of a possible cybersecurity breach is the most crucial strategy for a small business.

Adequate cybersecurity training will ensure that your staff are more likely to spot suspicious activity and report it before it worsens. This could be the difference between addressing a data breach and stopping it before the hacker can get into your systems.

By training your staff on the signs to look out for, they will be less likely to open suspicious emails from addresses they don’t recognise and know to flag anything they believe to be fraudulent. The best rule to implement across your team is ‘if in doubt, flag it with an appropriate team member just to be safe’.

  1. Chris Noles – President of Beyond Computer Solutions

implement layers of protection

There is no silver bullet to prevent a cyberattack, but there are layers of protection that you can implement to reduce your risk significantly.  Cybersecurity is like having a monitored alarm system in your home so that you can detect intrusions.

Here are some essential guidelines to follow:

  • Multifactor or Two Factor authentication: You should enable this for all websites that contain personal, financial or healthcare information.  It would be best to allow this for your email to prevent business email compromise.
  • Train your staff – this is extremely important because attackers are not hacking their way in – companies are letting the attackers in because they are tricked by phishing emails!
  • Change passwords every 60 to 90 days, and don’t use the same password for multiple websites.
  • Have a computer use policy for your staff that defines how technology can, and more importantly, SHOULD NOT be used.
  • Update your computer systems with the latest updates
  • Partner with a Cybersecurity solutions provider like Experian or SpyCloud that focuses on detecting intrusions before they become breaches.  Unfortunately, most companies are compromised months before being aware of an intrusion.
  1. Erik Kangas – Founder of LuxSci, Former Senior Software Engineer at Akamai Technologies, and currently a Visiting Professor in Physics at MIT

hire cybersecurity experts outsource IT services

The best general advice for a cybersecurity strategy would be to hire intelligent, experienced cybersecurity people and place them in positions of authority concerning product development, IT infrastructure, and vendor choice.

They can help guide your organization to a solid cybersecurity footprint that is customized and appropriate for your particular business.

Beyond that, outsource any IT services to vendors respected for their security programs. This lowers IT costs and your organization’s risk and liability concerning security.

  1. Steven J.J. Weisman, Esq. – Lawyer, Author, College Professor at Bentley University, and Owner of Scamicide

cybersecurity firewalls

Small and medium-size businesses are significant targets for cyberattacks.  Often, small and medium-sized businesses don’t correctly establish security protocols and fail to monitor and update security procedures.  

While steps such as establishing proper firewalls, using security software and updating it as soon as updates are available, encrypting data, using strong passwords, using dual-factor authentication and not permitting unauthorized devices to be plugged into office computers are all essential elements of a security plan, the best thing that any company can do is to train its employees to recognize and avoid phishing and spear phishing emails and text messages.

Spear phishing emails are the basis of almost all cyberattacks; training employees to recognize these phishing emails and having a policy of not clicking on links or downloading attachments unless verified to be legitimate is the best thing a company can do.

  1. Alex Artamonov – Systems Engineer and Cybersecurity Specialist at Infinitely Virtual

cybersecurity threats focus

Due to both limited budgets and limited personnel, small businesses need to focus on immediate threats.  Given resource constraints, training end-users are typically Job #1.  That means mitigating such intrusions as phishing and malware infections; the most cost-effective way to do so often involves turning to paid and free courses online.  

Step #2 is creating an effective security policy consisting of strong passwords, regular password changes and two-factor authentication.  That last item may prevent unauthorized access to confidential data, even if a user account is compromised.  

Step #3: turn on the auto-update feature within the OS and any app.  Step #4: Install anti-malware software from a reputable vendor.  Finally, perform regular backups to local media and offsite storage (e.g., the cloud).  Verify that backups were successful, and do regular test restores.  

  1. Alex Paretski – Knowledge Manager at Itransition

focus on cybersecurity training

Regardless of their size, businesses must stick to the continuous security approach to guarantee the protection of their digital assets and data.

Unlike large enterprises, smaller companies can succeed in guarding their cybersecurity without investing in complex solutions. Instead, they can focus on more frequent employee security training, endpoint and device protection.

Small companies can also run comprehensive security tests more often than large companies.

For example, they can perform penetration testing and vulnerability assessments every six months or after any software and hardware modifications are made. These are some of the most effective activities to proactively detect and fix security defects promptly.

  1. Mark Stamford – Founder of OccamSec

effective cybersecurity strategy for a small business

Determine your critical assets and how much risk you are willing to assume. Risks include fines for getting hacked and increased insurance premiums.

Securing Wi-Fi and strengthening passwords are crucial. Finally, small businesses have decided how to secure their assets with their budgets.

And the risks are real. We breached a company full of social media users by friending them on social media and ultimately having them send us passwords – most strategies around small businesses will not focus on social media security.

Still, in this case, they should have. Bad guys don’t follow a ‘book”; they find the easiest way in and exploit it.

  1. Adi Donna – Founder of Cozy Down Home 

cybersecurity strategy for small and medium business

The firewall is a set of programs that protects the internet from hackers and prevents them from accessing data through private networks. Users can enable firewall protection from their system settings or install free firewall software available online.

Since most businesses work from home and hackers are more active than before, it is best to protect the internet connections so your relevant documents are not cracked or hacked during transferring.

If using mobile devices to hold company credentials, protect the devices with strong passwords and encrypted data, and install security apps to prevent your files from stealing when the phone is using public networks.

  1. Ken Jenkins – Principal and Founder of EmberSec

cybersecurity approach

A threat-informed cybersecurity posture remains a robust approach. This includes understanding threats and the business’s risk tolerance.

Instead of protecting on-prem employee workstations, sensitive data, and critical infrastructure, companies must focus on the attack surface and cover cloud-hosted solutions, including email, collaboration capabilities, authentication systems, and file sharing.

Understanding the cybersecurity baseline and reestablishing how to defend against it will strengthen the cybersecurity posture and raise the cost to adversaries.

Other recommendations:

  • Enforce the use of multi-factor authentication
  • Prioritize email security and boost anti-phishing training and awareness
  • Continuously patch applications and operating systems
  • Apply the CIS Top 20 framework
  1. Gintaras Steponkus – Marketing Manager at SolidGuides

fast cloud service for small business

Cloud backup service is no longer optional for small businesses as data backups have become necessary due to cyber attacks. However, there is a difference between the speed and reliability of the services available in the market.

Use services with high data transfer rates and strict security measures such as 2FA authentication, end-to-end encryption, etc.

Your data backup service should be on all the employees’ laptops dealing with company documents. Moreover, sometimes you need your data quickly, so choose the one that provides data delivery services on hard drives. 

  1. Steve Harrington – Vice President at Cygilant, a SMB-focused Cybersecurity Provider

managed services partners

Today’s small businesses face a trio of problems – fewer financial means, continued difficulty in hiring needed talent, and a continued onslaught of threats and breach attempts from cybercriminals who view their systems as easier to infiltrate. For many, this resource crunch has been exacerbated by the pandemic crisis.

Small businesses would be wise to seek managed services partners who can extend their team’s capabilities with automated technology and hands-on expertise, helping them overcome resource constraints while actively reducing threats and making compliance reporting easier.

Limiting the time small business IT staff need to spend managing daily alerts will maximize their time for situations more critical to the business.

  1. Jeff Kuhn – Senior Solutions Architect and Senior Partner at New England IT Partners

most effective cybersecurity measures for small businesses

Small businesses need to ensure they are protected from cyber criminals, as 1 in 5 small businesses fall victim to some cyber attack. While the company may be small, the target on them is much more significant from the eyes of the attackers.

Small businesses believe they won’t be targeted because of how small they are, so they spend less on protection. As most cyber-attacks are aimed at small businesses, they must implement as many security countermeasures as possible.

  1. Tom Mowatt – Managing Director of Tools4ever

small business cybersecurity

The best strategy you can use to protect your small business is a pre-emptive one. By implementing proper processes and instilling detailed access management, you can prevent most potential security threats before they even happen.

With an identity and access management solution, you can track which employees can access specific resources and enforce the Principle of Least Privilege (POLP) to ensure that no employee receives more access than needed to perform their job function or role.

Using these types of pre-emptive measures can significantly benefit the security of your business and can dramatically reduce any potential risks/breaches your organization could face.

Bottom Line

SMBs are open to cyber attacks as well as large enterprises. The alarming rate by which these cyber threats occur necessitates an effective cybersecurity strategy to counter such threats.

This roundup post has uncovered the most effective cybersecurity strategies that small businesses can adopt to protect their ventures.

Likewise, the interviewees have poured out their suggestions from practical experiences. They’ve overcome varying cybersecurity threats.

If you’re a small business owner yet to gear up your cybersecurity strategy, it might help to start implementing any of the abovementioned tips.

So, any time you encounter online security issues, you can apply any of the 48 tips in this post as a compass for your cybersecurity plan.

READ ALSO: How To Secure And Protect A Website [We Asked 38 Experts]

Note: This was initially published in May 2020, but has been updated for freshness and accuracy.


INTERESTING POSTS