8 December 2022

How Can CyberArk Help To Reduce The Risk Of Ransomware?

A Quick Reminder: What Is Ransomware?

Ransomware is a specific type of malicious software (or ‘malware’), designed to block access to a network or system until a ransom (a sum of money, usually demanded via cryptocurrency to ensure the anonymity of the recipient) is paid.

The malware usually works by encrypting key files on a network, rendering all users (even network admins) unable to view them. The hackers will then contact the organisation requesting a ransom be paid in exchange for the decryption key. Sometimes, the ransomware will also have the functionality to exfiltrate data from the encrypted network, allowing the hackers to steal as much data as they can access. Essentially, these attackers put their victims in a position whereby the quickest, easiest and often cheapest way to regain access to their organisation’s data is to pay the ransom.

You can find out more about ransomware and the reasons for its rise in popularity here.

The Potential Ramifications Of A Ransomware Attack

Thanks to its ability to spread quickly, impair systems and processes, and exfiltrate valuable data, ransomware is one of the most dangerous and costly forms of malware. And it’s growing fast, too. Roughly 37% of all organisations across the globe were victimised by a ransomware attack in 2021.

The most prominent ramification of a ransomware attack is the financial losses associated with it. According to an IBM Security report, the average total cost of a ransomware breach is somewhere around 4.62 million USD (£3.76 million).

It isn’t just about the money, either. Ransomware attacks can lead to:

– Loss of valuable company data
– Leaks of personal customer/employee information, which could lead to impersonation and/or personal financial losses
– A decrease in customer trust and brand loyalty
– Unexpected downtime for important business processes and/or systems
– An inability for the business to meet customer needs/requirements, potentially leading to a breach in contractual obligations and/or service agreements
– Dangers to customer safety (particularly in public infrastructure, public service and/or medical organisations)

The Best Solution

The good news is there are ways to protect your organisation from ransomware attacks – but traditional anti-virus solutions won’t cut it. These dated solutions use signature patterns to identify and block known malware variants, but contemporary ransomware is too smart for this. The latest malware programs continuously morph, ensuring they can’t be detected using signature-based methods.

The best way to successfully defend your network against today’s ransomware threat is by taking a multi-layered, ‘defence-in-depth’ approach to security.

This approach should include the following:

– A combination of Identity and Access Management (IAM) capabilities (e.g. multi-factor authentication, or ‘MFA’)
– An Endpoint Privilege Management (EPM) program
– A Privileged Access Management (PAM) solution

How CyberArk Can Help

Our partners at CyberArk are the masters when it comes to ransomware protection.

Identity and Access Management (IAM)

CyberArk Identity, CyberArk’s Identity and Access Management solution, allows organisations to quickly achieve their workforce identity security goals while enhancing operational efficiency. A SaaS-delivered solution, CyberArk Identity is designed for easy consumption and scalability, making it suitable for businesses of any size.

Find out more about the solution here.

Endpoint Privilege Management (EPM)

CyberArk Endpoint Privilege Manager is designed to remove local admin rights, enforce least-privilege security, defend against ransomware and cached credential compromise, and enable application control at the endpoint – thus helping to contain attackers at the point of entry, before they can traverse your network and inflict serious damage.

Find out more about the solution here.

Privileged Access Management (PAM)

CyberArk Privileged Access Manager is a solution designed to continuously discover and manage privileged accounts and credentials, isolate and monitor privileged sessions, and remediate risky activities across environments. With the option to purchase it as a SaaS or as a self-managed solution, CyberArk PAM can be implemented in organisations with or without experienced security teams.

Find out more about the solution here.

Are you looking for support implementing a CyberArk solution? You’re in the right place!

With a team packed with CyberArk experts (and even some past CyberArk employees!), there is no one more qualified to successfully implement and manage your CyberArk solution than Infosec K2K.

Get in touch with us to find out more about how we can help you.

23 November 2022

3 Tips For Implementing Zero Trust Security

Looking to implement zero trust at your organisation? Don’t start your project without reading these top 3 tips from the cyber security experts at Infosec K2K.

What Is Zero Trust?

There’s no doubt about it, Zero Trust is by far one of the hottest topics on the Cyber Security scene right now. And for good reason!

First popularized by Forrester Research analyst John Kindervag, the term ‘Zero Trust’ refers to a relatively new approach to cyber security. Rather than assuming that an identity can be trusted based on credentials or location, as with traditional perimeter-based security, zero trust presumes that no connections should be trusted. By trusting no one and nothing, zero-trust ensures that only devices and users with the correct authentication and authorization are able to access an organisation’s network.

1. Don’t Trust Admin Accounts

Standing accounts with any considerable level of admin access or power can be incredibly dangerous. Misuse of this elevated access, whether intentional or not, can cause serious damage to your business’ network. What’s more, if a threat actor gains access to one of these privileged accounts, the threat is far, far greater.

A true Zero Trust model involves a “least privilege” approach – i.e. a user is only given the absolute minimum privileges required and every privilege is only granted at the exact time it is needed and for the exact duration it is needed.

2. Don’t Trust Passwords

No matter how secure the user attempts to make their passwords, they are intrinsically insecure. The well-known and often-used practice of IT teams forcing business users to pick complex passwords and change them once a quarter is simply not enough anymore.

Instead, opt for a combination of authentication methods, often known as multi-factor authentication (MFA). Alongside password authentication, these methods could include:

Certificate-based authentication
Biometric authentication
Token-based authentication
Voice authentication

3. Don’t Trust Hybrid Privileged Roles

When making the move to cloud-based systems, many organisations choose to leverage their existing on-permises processes for administration in the cloud, so they simply make on-premises administrative accounts into hybrid accounts.

This approach is incredibly unsafe, as it allows attackers to take advantage of the complex legacy nature of the accounts to attack systems and access data in the cloud. In fact, it has already led to some serious attacks on cloud infrastructure.

Our tip? Keep cloud privileged roles cloud-only!

Are you looking for support implementing or improving your Zero Trust solution? You’re in the right place!

Having carried out multiple Zero Trust projects to date, the team at Infosec K2K are the experts when it comes to building a solution that truly sticks to all the principles of zero trust security, keeping your organisation safe and secure from potential cyber threats.

Get in touch with us to find out more about how we can help you.

10 November 2022

6 Cyber Security Trends To Stay Ahead Of In 2023

There’s no doubt about it, 2022 has been the biggest year yet for the cyber security industry. With more attacks and a greater cost per breach than ever before, the ever-changing cyber landscape can be difficult to keep track of.

To help you prepare for whatever the world of cyber crime has to throw at you, the experts at Infosec K2K have pulled together 6 key cybersecurity trends to keep an eye on over the next 12 months.

1. Evolving Cyber Threats

The Problem: As threat actors find new emerging tactics, techniques and procedures (TTPs) to exploit every day, and new vulnerabilities are constantly emerging, the threat landscape is evolving at a rate that is almost impossible to keep pace with.

How You Can Prepare For It: If you want to avoid a devastating security breach, ensuring your organisation is on top of the latest threats is a non-negotiable. We recommend putting in place a thorough crisis response plan, which can then be evaluated and evolved each time a new threat is dealt with. To see if your business is adequately prepared for the cyber threats of today and tomorrow, why not consider a security assessment? This meticulous procedure will look at every possible area of weakness in your organisation, evaluating the level of risk and providing detailed recommendations to help plug any gaps in your existing defenses.

2. Phishing

The Problem: One of the oldest but often most successful cyber threats, phishing continues to be one of the most popular methods of attack for threat actors worldwide. According to Security Magazine, businesses were hit by more than 255 million phishing attacks in the first 10 months of 2022 alone, a 61% increase on the same figures in 2021.

How You Can Prepare For It: Whilst spam filters and phishing tools can be effective in minimising the number of messages that make it through to your employees, the odd phishing attempt is bound to find its way into someone’s inbox sooner or later. The best way to prevent a successful phishing attempt is to educate your teams on the signs of a scam. Every employee in your business should know these three key things:
– How to spot a phishing email, call or message
– Who to report a phishing attempt and how
– What previous phishing attempts at your organisation have looked like

At Infosec K2K, we offer comprehensive cyber security training designed to help your employees to become more cyber-savvy, minimising the likelihood of a successful phishing attempt.

3. The Internet of Things

The Problem: As it spreads its way through our homes, offices and other shared spaces, Internet of Things (IoT) is quickly becoming an integral part of our everyday life. However, connecting a large number of devices to one seamless network brings with it a number of risks. Primarily, it only takes one device being hacked for a threat actor to gain access to the entire network of devices and the cloud network connecting them.

How You Can Prepare For It: We recommend taking great care when integrating IoT to your business and devices. Ensure that you have a strategy for built-in security and controls that can be applied to all IoT devices before you begin connecting them. When purchasing any devices, evaluate the potential vulnerabilities of each device and plug them before the device is introduced to your business, minimising the risk of a breach. Confirm that all devices are password protected (using secure and varied passwords) and that passwords are not stored unencrypted anywhere online.

4. Security At The Development Stage

The Problem: Without an understanding of the cyber security basics, many web and app developers unknowingly create vulnerabilities in the development process. This was brought to light way back in 2021, when the critical Log4shell vulnerability surfaced, yet it is still a concern.

How You Can Prepare For It: Consider how you can integrate cyber security into your development process as early as possible. How can your cyber security / IT and development teams work together? Can you move the security steps in your development pipeline right to the beginning, embedding them into the design principles, rather than seeing them as a final hurdle to jump over before go-live? Then think, how can you upskill your design and development teams to ensure a better understanding of the potential vulnerabilities they could be building into their work? If you don’t have the capacity or budget for an in-house cyber security team, don’t worry! Why not consider outsourcing to a cyber security partner, like Infosec K2K, to work in tandem with your developers?

5. The Cloud

The Problem: As flexible working becomes the norm and teams become more geographically fragmented, cloud adoption continues to accelerate. However, the move to the cloud can come with significant cyber security risks – particularly if security is not a key aspect of your adoption plan.

How You Can Prepare For It: If you are in the process of moving to the cloud, make cyber security part of your strategy for digital transformation and adopt a vulnerability management process (delivered either internally or externally) to keep an eye on it on an ongoing basis. If you have already moved to the cloud, consider a cyber security assessment to identify any potential vulnerabilities in your existing cloud environment.

6. Identity Protection

The Problem:It is a common misconception that identity theft is only a concern for the consumer, but it is also incredibly common in businesses. If enough information about your employee can be accessed online, even the least sophisticated cyber criminal can easily attempt to impersonate their professional profile and gain access to your business network.

How You Can Prepare For It: We recommend digitising as many of your processes as possible (e.g. using electronic signatures to sign important documents) and ensuring your employees understand the dangers of making their personal information available and accessible online. Something as simple as a post about a pet on a public social media profile could lead to a threat actor cracking an employee’s network password, so it is important that your employees are being careful when sharing information online.

Want to stay on top of the latest cybersecurity threats, hacks and trends? Subscribe to our weekly Cyber Newsletter here.

Are you a CISO, IT or Cyber Security professional looking for support from a reliable cyber security partner? Look no further!

Get in touch with us to find out more about how we can help you.

27 October 2022

The Rise Of Zero Trust: How Organisations Are Changing Their Approach To Access Management

The global zero trust market is growing fast – so fast, in fact, that it is projected to reach an astonishing $52 billion by 2026. And, given the ever-increasing threat posed by cyber criminals, it is hardly surprising (and a bit of a relief!) that organisations are stepping up.

Today, we’re exploring precisely what zero trust means, alongside the reasons and potential implications of its growth in the cyber security market.

What Is Zero Trust?

First popularised by Forrester Research analyst John Kindervag, the term ‘Zero Trust’ refers to an approach to cyber security that presumes that no connections to corporate networks and systems should be trusted. Rather than assuming trust, as perimeter-based security has done for many years. By trusting no one and nothing, zero-trust ensures that only devices and users with the correct authentication and authorisation are able to access an organisation’s network.

The Growth Of Zero Trust

With the number of cyber attacks on the rise, there is increasing pressure from regulatory bodies for organisations to improve their data protection and information security solutions.

These attacks commonly take advantage of vulnerabilities at endpoints and in cloud-based applications used by teams working remotely. So, as a solution with a greater level of security both at endpoints and for networks without a physical perimeter, zero trust is the obvious solution to reduce their frequency. According to a report published by Microsoft in 2021, 76% of organisations have at least started implementing a zero-trust strategy, while 35% believe they have fully implemented it.

Use Cases For Zero Trust

When it comes to real-world applications, there are two primary use cases for zero trust security. These are:

1. For globally distributed teams

Organisations requiring international, or even national, access to the same central business network rely on cloud-based applications, alongside remote access to sensitive company data and documentation. Some companies force remote employees to reach resources through a virtual private network, but this solution is inefficient and carries many risks and complications. In contrast, zero trust does not require users to connect to the entire corporate network before accessing cloud applications or resources, alleviating many of the issues associated with VPN access.

2. For third-party network access

When allowing third parties to access an organisation’s resources, alternative solutions to zero trust tend to provide access to the entire network, creating a hefty and unnecessary security risk. With zero trust and a least privilege approach, users are only allowed access if authorised and, when authorised, are only allowed access to the bare minimum of assets and applications.

Are you looking for support implementing or improving your Zero Trust solution? You’re in the right place!

Get in touch with us to find out more about how we can help you.

13 October 2022

What Is Ransomware?

Learn more about the most common cause of cyber security breaches worldwide and how you can protect your business from it.

In 2021, a company was hit by a ransomware attack approximately every 11 seconds.

As the necessary programs have become more and more accessible to potential hackers, ransomware attacks have been on a sharp rise over the past couple of years. But even those in the cyber security space don’t necessarily have the depth of knowledge to fully understand what a ransomware attack is, how they are carried out and/or the exact vulnerabilities they exploit.

This Cyber Security Awareness Month, we asked our cyber experts for a definitive answer to the question “what is ransomware?” and provide their advice on how to protect your business from an attack.

What Is Ransomware?

Ransomware is a specific type of malware (malicious software) designed to block access to a network or system until a ransom (usually a sum of money) is paid.

The malware usually works by encrypting key files on a network, rendering all users (even network admins) unable to view them. The hackers will then contact the organisation requesting a ransom be paid for the decryption key. Sometimes, the ransomware will also have the functionality to exfiltrate data from the encrypted network, allowing the hackers to steal as much data as they can access. Essentially, these attackers put their victims in a position where the quickest, easiest and often cheapest way to regain access to their organisation’s data is to pay the ransom. That’s why, in 2021, 32% of victims paid a ransom demand when hit by a ransomware attack.

Why Are Ransomware Attacks Now So Common?

The trend towards ransomware began back in May 2017, with the famous WannaCry ransomware attack. The WannaCry attack was a global epidemic caused by the spread of ransomware through computers operating Microsoft Windows. Cybercriminals took advantage of a weakness in the Windows operating system to encrypt users’ files and demand $300 in Bitcoin or their files would be deleted. That ransom was later upped to $600, as the attack became more widespread. The problem was, according to many sources, not a single victim got their files back (regardless of whether they paid the ransom or not).

Since then, ransomware has become more and more popular. Ransomware-as-a-service (or ‘Raas’) has even emerged – a business model through which cyber criminals license out their ransomware to people looking to perform a cyber attack themselves, but without the cyber know-how to create their own malware. As it has become the easiest and most accessible option to potential cyber criminals (even those that aren’t particularly good hackers), the popularity of ransomware has skyrocketed.

The COVID-19 pandemic and the rapid adaptation of organisations to remote working have also exacerbated the problem, as cloud implementations and the use of multiple remote devices have created vulnerabilities in cyber defences. In Q3 2020, as businesses were forced to adapt to remote working, ransomware attacks rose by 50% compared to Q1 of the same year.

How Can I Protect My Business From A Ransomware Attack?

1. Training and Education – The best way to protect your business from any type of cyber attack is to ensure cyber security best practices are second nature to your teams. Teach your employees to identify phishing emails, keep all their systems and applications updated and perform regular cyber security checks on their devices.

2. Data Backups – If you are hit with a ransomware attack, but you have recently backed up the data they have encrypted, you won’t need to pay the ransom and can go about your business without much worry. This also applies to many other types of attacks, whereby data is deleted, corrupted or edited, as well as general malfunctions that might damage or delete your data.

3. Patching – Regularly update your systems and applications with new cyber security patches. As these patches are usually released by developers to cover vulnerabilities they have found in their own applications, cybercriminals often look to these patches to uncover said vulnerabilities and exploit them through the systems of users yet to download the patch. If your employees aren’t quick enough to download recommended updates, they could fall victim to this kind of attack.

4. Privileged Access Management (PAM) – PAM is the term used to describe a number of cyber security strategies designed to control the access and permissions for users and accounts gaining access to systems, applications and files on an organisation’s network. By ensuring that access is only granted to those that absolutely need it, and with the lowest possible level of permissions, PAM strategies limit the risk to a network. After all, if everyone has access to everything, there are lots more potential entry routes for cybercriminals to exploit.

4. Privileged Access Management (PAM) – PAM is the term used to describe a number of cyber security strategies designed to control the access and permissions for users and accounts gaining access to systems, applications and files on an organisation’s network. By ensuring that access is only granted to those that absolutely need it, and with the lowest possible level of permissions, PAM strategies limit the risk to a network. After all, if everyone has access to everything, there are lots more potential entry routes for cybercriminals to exploit.

5. Endpoint Privilege Management (EPM) – EPM eliminates risks on the endpoint of your network (i.e. your employee’s devices) by using a combination of least privilege access (allowing users only the access they absolutely need) and application control (restricting or blocking any unauthorized applications or updates). Our go-to solution is CyberArk’s Endpoint Privilege Manager, an endpoint control solution that allows organisations to remove local admin rights, enforce a “least privilege” strategy and implement foundational endpoint security controls across all Windows, macOS and Linux endpoints, including hybrid and cloud environments.

6. Anti-Malware – Anti-malware software can protect your business against thousands of the most common types of ransomware. This software works by identifying and notifying you of a potential threat before it can execute an attack. They use artificial intelligence and machine learning to alert system administrators of suspicious or unusual activity on a network, helping your IT and/or cyber security teams to resolve an attack before data is encrypted, exported, edited or destroyed.

Looking for support assessing, improving or implementing your cyber security solutions to minimise the risk of a ransomware attack? You’re in the right place.

Get in touch with us to find out more about how we can help you.

13 September 2022

Unencrypted AWS Access Keys found in Mobile Apps – What Happened And How It Could’ve Been Avoided

Security researchers from the software manufacturer Symantec have found unencrypted AWS access keys in almost 1,900 smartphone apps in the public domain.

What Happened

Security researchers at Symantec found almost 1,900 publicly available smartphone apps (including mobile banking applications) with easily accessible unencrypted access keys, allowing them to access backend app data and private customer data. Within the 1,859 publicly available apps – 98% of them for iOS – the team of researchers found access tokens for amazon Web Services (AWS), which enabled access to a plethora of Amazon cloud data. Files belonging to 15,000 medium and large enterprises were discovered, alongside 300,000 biometric fingerprints.

How It Happened

Developers using AWS had put access tokens in clear text (entirely unencrypted) in source code, allowing anyone with the right knowledge and understanding of access keys to use them to access backend data on Amazon cloud. Not only this, but access to this data or the Amazon cloud was in many of those cases not restricted by any access management system or user identification process, meaning the researchers weren’t just able to access the data easily, but they could also modify and delete it, throwing into question the integrity of all data stored within the affected apps and institutions.

The Solution That Could Have Stopped It

Although the access keys in this case were explicitly found within mobile applications, they could all be used to access data stored in AWS. The question is, if you’re currently hosting with AWS, how do you ensure you aren’t falling foul of the same mistakes these developers made?

Well thankfully, if you do want to secure your AWS or any other public cloud hosting, there are lots of solutions on the market that can help you do that. Below are a few of the solutions you can adopt to keep your data safe…

– Firstly, you could use the CyberArk Cloud Entitlements Manager to gain an overall view of your permissions and access. This would help you to remove any excess permissions that are no longer required right across your cloud footprint.

– Secondly, you should secure your access keys. This step doesn’t necessarily require a program, but it does require you to ensure that they are not stored in source code in clear text! If you must store your access keys in source code, ensure they are encrypted.

– If you are an app developer hosting through AWS, a possible solution to secure any secrets in your CI/CD pipelines could be CyberArk’s new Secrets Hub. The recently launched “Secrets Hub for AWS Secrets Manager” removes secrets from your application and replaces them with API’s, simplifying the developer experience and ensuring one centralised security policy can be carried out across the entire enterprise.

– Finally, you also need to think about access management. If a hacker does manage to decrypt your access keys, how do you ensure that they do not have the permissions required to access and/or modify your data? Identity and access management are hot topics in the cyber security space right now and, at Infosec K2K, it is one of our core specialities. Find out more about how we can help you to control user access to your data here.

Looking for support assessing, improving or implementing your cyber security solutions? You’re in the right place.

Get in touch with us to find out more about how we can help you.

13 September 2022

The Uber Hack: What We Can Learn From The Latest High-Profile Cyber Attack

The world’s number 1 taxi app was hit by a rather serious cyber security attack recently. But what really happened and what can we learn from the Uber hack?

Last week, it was revealed that Mobility as a Service provider Uber was hit with a high-profile cyber attack that has left the company’s reputation at serious risk. In today’s blog we’re exploring exactly how the attack took place, how it could have been avoided, and what we (as IT teams, cyber security experts and business owners) can learn from it.

What Happened?

Allegedly, a young hacker was able to download HackerOne vulnerability reports and view and screenshot almost all of the company’s internal systems (including emails, Slack messages, the company’s security software and Windows domain).

The hacker is said to have breached Uber through a social engineering attack (an attack that utilises psychological manipulation to coerce a user into performing certain actions or divulging confidential information) on an employee. They launched what is known as an MFA Fatigue attack – whereby a hacker almost has access to a user’s account but is blocked by multi-factor authentication. The attacker then spams the employee with multi-factor authentication requests until they become tired of seeing them and accept them. In this case, they completed the process by contacting the employee, claiming to be Uber IT and asking that they accept the request. The employee did as they were told, providing the hacker with access to the company’s intranet.

Once on the intranet, the hacker claims to have found a PowerShell script containing plain text admin credentials for the company’s Thycotic privileged access management (PAM) platform.

This was then used to access logins for the company’s other internal services, including app sourcecode and databases.

What Can We Learn From The Uber Hack?

Well, in this case, the lessons are fairly simple.

1. Even if your business has a PAM solution in place, you will still require secure program enforcement to ensure all attack vectors are closed (even those that arise due to the introduction of a PAM solution, such as the one used to exploit Uber).

and

2. Never ever store your (privileged) credentials anywhere in clear text, especially not in automation scripts. Use encryption and/or dedicated solutions for secrets management, instead.

Don’t Let It Happen To You

You’ve worked far too hard to let your business (or the business you work for) fall victim to a cyber attack such as the recent Uber hack.

At Infosec K2K, we know what it takes to keep your business safe from the threats of today and those of the future.

Get in touch with us to find out more about how we can help you.

8 August 2022

The 5 Most Common Cyber Security Threats And How To Avoid Them

As cyber criminals continue to find new and more complex ways to infiltrate our networks, cyber crime continues to rise in complexity and frequency. In this blog, we’ll be highlighting some of the most common cyber security threats and explaining how you and your organisation can avoid falling victim to them.

1. Malware

What Is It?

Malware is intrusive software that aims to perform malicious tasks to gain access to a network, spy on user activity to obtain sensitive data, or disrupt and damage a computer and its systems. The most notable and severe method, ransomware, aims to extort the victim by encrypting files and demanding a ransom to regain access. Other common types of malware include Trojan horses, spyware, worms, viruses and adware. You might have come across this one in the form of dodgy, unsolicited pop-ups and ads on your computer that you just can’t get rid of – that’s how they draw you in.

How Can I Prevent It?

Unfortunately, preventing a malware attack isn’t easy, as modern antivirus products cannot tackle advanced cyber threats alone. But with the following, we can work to mitigate the risk.

• Unmanaged administration rights can pose a high-security risk for malware-driven attacks. Removing local admin rights, applying the principle of least privilege and implementing session isolation can effectively slow and control the spread of malware. Tools like Comprehensive PAM Controls from CyberArk use access management to protect against ransomware.

• With a multifaceted approach that utilises comprehensive cyber solutions to monitor and protect defences effectively, we can avoid falling victim to attack.

• Without advanced protection, malware can easily conceal itself in your network to evade detection, so using all-around preventative security measures will help you avoid becoming a target.

• The small things matter, too. Be vigilant of and avoid malicious content, keep software patched and updated, and enforce a strong password policy that uses multi-factor authentication.

2. Phishing

What Is It?

We’ve all heard of phishing, and have likely fallen victim to it ourselves, or at least know someone who has. Of the 39% of UK businesses who identified an attack last year, the most common threat vector was phishing attempts (83%). A phishing attack often arrives by email and uses fake links to websites posing as legitimate organisations to lure the victim into handing over valuable information like passwords, bank details, and intellectual property. This is the most common form of attack, with trickery an easy way to catch out victims who may not otherwise be aware of how to spot a phishing attempt.

How Can I Prevent It?

We can stop phishing attacks in their tracks in one of two ways – by learning how to detect attempted attacks, and investing in software that can do it all for us.

• Phishing is heavily reliant on human error, so education is the number one way to avoid these types of attacks. Learn how to identify suspicious content and when not to share personal information.

• The usual tell-tale signs of an illegitimate email, SMS or website are grammatical errors and spelling mistakes, an urgency to act now, unusual content or request or suspicious links or attachments. We can use tools like the National Cyber Security Centre’s suspicious website form to report these.

• Investing in phishing detection and response software that can identify malicious content online will help to reduce the risk of attack.

• Setting up simple tools like spam filters on your emails will make it harder for illegitimate messages to reach your inbox.

3. Zero-Day Exploit / Attack

What Is It?

A zero-day exploit or attack is where cyber criminals learn of and prey on undiscovered vulnerabilities in widely-used software applications and operating systems, and exploit them before they can be fixed. As users are unaware of the vulnerability, this form of attack is hard to predict. Unknown vulnerabilities could be your biggest downfall, and could cause huge reputational and operational damage for large-scale businesses if they’re not addressed before it is too late.

How Can I Prevent It?

The solution to mitigating the risk of zero-day exploits and attacks involves both an investment in software and small but effective solutions that organisations could easily implement themselves. Again, these attacks prey on human error, and it’s important to have preventative security solutions in place that can detect vulnerabilities sooner.

• Comprehensive anti-virus software solutions can block unknown threats and prevent attackers from installing unknown software on your computer.

• By performing simple software updates in which vendors have deployed security patches to protect against new vulnerabilities, you’re less likely to fall victim.

• Install a web application firewall (WAF) on your network to filter out malicious traffic. Again, this form of attack preys on human error.

4. Denial-of-Service (DoS)

What Is It?

A Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack is a malicious, targeted attack that aims to flood a network with illegitimate service requests and traffic to trigger a system crash, rendering it inaccessible for users. By disrupting business operations, the attack prevents users from performing routine tasks or accessing resources that are operated by the compromised computer or network. Find out more about DDoS attacks in our recent blog.

How Can I Prevent It?

Regardless of your defences, DoS attacks can still penetrate your system. But with the right solutions, the risk can be reduced.

• Invest in software that can detect abnormal traffic spikes from legitimate site usage, so that you can identify dry run test threats before a fully-fledged attack is executed.

• Penetration testing can be used to your advantage, by performing a simulated attack to uncover and patch any detected vulnerabilities.

• A web application firewall (WAF) can also be used to monitor HTTP traffic, to prevent cross-site forgery, file inclusion and SQL injection.

5. Man in the Middle (MITM)

What Is It?

A man-in-the-middle attack (MITM) sees an attacker intercepting communication between two parties to spy, steal personal information or credentials, or change the conversation in some way. The attacker will often rely on unsecured network connections like public Wi-Fi to intercept exchanges. However, with the advancement of technology, many email and chat systems are now using end-to-end encryption to prevent third parties from tampering with the data, meaning MITM attacks don’t happen as much as others.

How Can I Prevent It?

• Ensure you have a strong and secure network connection. Avoid using public Wi-Fi connections when engaging in confidential conversations where your data could be jeopardised. Instead, use a VPN to protect your internet connection and privacy online.

• Invest in endpoint security software that can check potentially dangerous websites and emails, and step in to provide defence if your network becomes infected.

• Educate employees on how to remain vigilant throughout the communication process, and only have these conversations when you have access to a secure connection.

Our Solution

Staying on top of emerging threats doesn’t need to be a challenge – and you don’t need to do it alone. With comprehensive security solutions from Infosec K2K, we can work closely with your organisation to protect against the most common forms of cyber security attacks. But how so? With a managed Security Operations Centre (SOC) that combines artificial intelligence and human expertise, we can grant increased visibility and control over security matters with advanced detection and prevention techniques. With the right solutions, we can work to eliminate these threats and create a safer space for organisations to operate without disruption.

We put security first. Take the next step in protecting what matters most with expert cyber solutions from our trusted team.

Get in touch with us to find out more about how we can help you.

26 July 2022

Should I Hire An In-House Cyber Security Team? The Pros and Cons Of In-House VS External Support

As technology advances, so does cyber crime, and when 95% of cyber security breaches are caused by human error, we can’t afford to make any more mistakes. If your current cyber solution is lacking, it might be time to re-analyse your existing security strategy. Or, if you’ve just started your journey to better protection, there’s a whole world of solutions out there. But which will come out on top – investing in an in-house team or seeking out external support? With advantages to both, read on to find out all you need to know before making that all-important decision.

So, you’ve decided to take your organisation’s security to the next level, great! But how do you know what’ll work best for you? Whether it’s hiring security experts to work in-house or investing in external support from an outsourced cyber security firm, there’s a lot to consider, and it all depends on the time and budget you’re willing to allocate and the goals you’re seeking to meet. Let’s dive deeper and look at what should be on the top of your radar when making the big decision.

Making that initial decision

Cyber security is ever evolving and methods of attack often change. Keeping security professionals on their feet at all times comes at a high price. To make that initial decision, there are 3 key points you’ll need to conquer first – money, time and needs..

How much money are you willing to spend?

This is a great place to start as ultimately, the budget you allocate will determine the extent of support you can receive. Whilst it might be tricky to put a number on it or invest in something that hasn’t necessarily happened yet, or you can’t yet see the benefit of, you’ll be better off for it (trust us!). When comparing the two types of support on offer, both are costly as they require specific expertise.

Hiring in-house requires extensive training, a complex set up and high salaries. Cyber-trained individuals are hard to come by, and if you can successfully source one, they are costly to keep. They need to be dedicated and well educated on the ever-changing world of cyber security, as it’s not a role you can float in and out of. Whilst, on the other hand, outsourcing is a more affordable solution that can cut costs that would be needed for recruiting and training internally.

An outsourced cyber firm will have everything ready to go, but as their capabilities stretch far and wide, and cyber criminals will strike at any point, you might need to splash the cash a bit more than you’d intended to.

How much time do you have or require?

In the case of cyber security, time is of the essence and critical to keeping your network adequately protected. Just like costs, time goes hand in hand with the budget. The more you invest, the more time you’ll receive. An internal team will require a few trained experts, plus technology that’ll need maintenance. Often, these internal hires are deemed “IT experts” and will be pulled from all directions to deal with other IT issues besides cyber security, which isn’t time efficient. If there are limited resources and other departments require more budget, cyber security could fall in priority and you could become an easy target!

Though, with an internal team, your organisation’s needs will come first so staff can react quickly, plus, offering greater control over your solutions where employees are easier to manage than third-party contractors whose resources are split amongst other clients.

But, with external support, you can free up time for your staff and have a better idea of what your invested time is going towards. Outsourcing is the fasted approach because of the severity of the situation, where security professionals are trained and ready to provide support imminently.

What does your business need?

Every business has different needs, which, most of the time, are dependent on its size. Look at the size of your business, the complexity of your system, the reach of your network, and the amount of data you’re storing. Whilst large organisations might be harder to breach, there are greater entry points for hackers to exploit. Whereas small enterprises are less likely to invest in sufficient protection so are less aware of the threat involved, making them an easier target. The key point to remember is: cyber criminals can affect businesses of any size and type.

Hiring in-house would provide better visibility of operations and knowledge of your organisation’s needs, making threats could be easier to predict and mitigate. The DIY approach to security will allow your internal team to handle issues head-on and skills can be repurposed if there is demand internally.

On the flip side, external support will offer solid expertise and experience in the industry – these companies work with multiple clients with various setups and know how to protect against many types of attacks, so understand the need for bespoke solutions.

Our solution

Our team at Infosec K2K are trusted, proactive and flexible, with a global reach to support clients wherever and whenever they need us. Depending on the stage you’re at in your cyber journey, the service(s) you require can differ, which is where we come in. Offering solutions for your unique requirements, we can assist those just starting who are wanting to bolster their defences with an expertly managed Security Operations Centre (SOC), those who’ve already got a solid plan in place but want to further highlight their commitment to security with assessments, certifications and accreditations, and much more.

If you’re looking to advance your cyber security solutions and want to invest in external support, look no further!

Get in touch with us to find out more about how we can help you.

19 July 2022

What is Denial-of-Service (DoS)? #INFOSECK2K101

The risk of cyber attack through malicious bot action is rising. Ransom-motivated DDoS attacks increased by 175% between Q3 2021 and Q4 2021. It’s important to understand the differences between legitimate and malicious web traffic. By adopting smart cyber solutions, we can better mitigate against the risk of a DDoS or DoS attack.

What is a DoS or DDoS attack? What does it involve?

A Denial-of-Service (DoS) or Distributed Denial-of-Service attack is a malicious, targeted attack. It aims to flood a network with illegitimate service requests and traffic to trigger a system crash. This renders it inaccessible for users. By disrupting business operations, the attack prevents users from performing routine tasks or accessing resources that are operated by the compromised computer or network.

Many DoS attacks can also develop into ransomware attacks. This stops to critical business operations, resulting in a loss of critical time and money and causing reputational damage.

Unlike other attack vectors, DoS isn’t reliant on criminal activity and can also occur naturally through what we would consider perfectly normal user interactions on the web. When we shop online, clicks are passed through our internet service provider, to external e-commerce applications and back to our site infrastructure. Servers work tirelessly to handle and execute each request. However, if there’s too much going on, the system can become overloaded, resulting in a denial of access to the service.

DoS and DDoS – What’s the Difference?

With different points of origin, these system infiltrations represent themselves in one of two forms:

  • Denial-of-Service (DoS) uses a script or tool to overload targets from a single machine. Since it comes from one location, it’s easier to detect the origin of a DoS and sever the connection. Thanks to advanced technologies in the modern cyber landscape, DoS can easily be deterred.
  • Distributed-Denial-of-Service (DDoS) attacks deploy several infected remote machines (bots) to generate a small number of requests, which when added together, overload the target. With increased speed making detection difficult, the attacks can result in significant damage when a large amount of traffic is sent from various locations simultaneously, making it a more sophisticated method of DoS attack.

Overload-based DoS attacks can target different types of resources. The majority falling into one of two categories: network layer or application layer. Network layer DoS attacks attempt to overwhelm the target by exhausting all available bandwidth. Whereas, application layer DoS attacks target the service application that users are aiming to access to deplete all resources and stop it from running completely.

What Do They Do?

The two main types of DoS attacks against web resources – network layer or application layer – have different aims. They’re either designed to crash or to flood.

  • Buffer overflow is the most common form of DoS attack. It occurs when the attacker drives more traffic to a network address than it can handle. A buffer represents the area of physical memory storage that is temporarily used to store data whilst it is being moved. An overflow occurs when the program seeking to write the data to the buffer overwrites neighbouring memory locations. The attack permeates all available bandwidth, such as CPU, disk space and internal memory. This results in slow performance and system crashes.
  • Flood attacks occur when attackers send too high a volume of traffic to a system for buffers to process, putting a stop to permitted network traffic. The type of flood attack is dependent upon the type of packet used, in which there are two common types of attack. ICMP floods attempt to overwhelm devices with fake Internet Control Message Protocol (ICMP) echo-request packets that ping all computers on the chosen network, whilst SYN floods can send= initial connection request (SYN) packets to servers, and flood the system to overrun all available ports.

Notable DDoS Attacks

DDoS mitigation service provider, Cloudflare, successfully prevented the largest HTTPS DDoS attack in history in June 2022, recorded as 26 million requests per second. The incident followed previous high records of 17.2M rps in April 2021 and 15M rps in April 2022.

Microsoft’s Azure cloud service mitigated a 2.4 terabits per second (TBPS) DDoS attack. This was the largest attack of its kind that the company had faced, and the second-largest DDoS attack ever recorded. The attack follows Google’s 2017 attack of 2.54 gigabytes per second (GBPS), which is the largest DDoS attack of all time.

Flashback to 2019. The Guardian reported that the UK Labour party had fallen victim to two “sophisticated and large-scale” DDoS attacks. These were driven by botnets seeking to flood servers and disrupt party operations. Though confident that the attack didn’t cause a data breach, campaign activities were slowed. Guidance was also sought from leading security professionals, National Cyber Security Centre.

Mitigating the risk of a DoS attack

Denial-of-service attacks cannot be prevented as such – cyber criminals will strike whenever they please. Regardless of the defences, your organisation has established, you may still become a target. But, by having the ability to detect abnormal traffic spikes from legitimate site usage, you’ll be one step closer to identifying dry run test threats before a fully-fledged attack is executed. With the following preventative measures, the risk of DoS attack can be mitigated.

  • Penetration testing to perform a stimulated attack that can uncover and patch detected vulnerabilities
  • DDoS testing or DDoS mitigation services use four key stages: detection, diversion, filtering and analysis
  • Web Application Firewall (WAF) to monitor HTTP traffic and prevent cross-site forgery, file inclusion and SQL injection
  • Response plan which should be included as standard in your cyber strategy if all else fails

Our Solution

A DoS or DDoS attack can’t be entirely avoided. However, there are still many ways we can create a solid security framework. This can prevent further damages should an attack occur. With our expert cyber solutions at Infosec K2K, we can stop businesses from falling victim to these types of attacks.

By investing in our managed cyber security services, like our Security Operations Centre (SOC), threats can be eliminated from the offset, thanks to 24/7 monitoring and detection of suspicious activity.

At Infosec K2K, we recommend performing a dry-run attack with Penetration Testing. We can highlight any potential system vulnerabilities for patching, to prevent the worst from happening. However, if that is the case and you’ve been exploited by DDoS, don’t panic.

Our solutions also apply post-attack. Our expert team will take control of the threat quickly and efficiently, so you don’t need to worry about it impacting your business any more than it already has. With the help of our expert cyber solutions, you can mitigate the risk of a DoS attack and better protect your business from cyber risk across the board.

Get in touch with us to find out more about how we can help you.