27 October 2022

The Rise Of Zero Trust: How Organisations Are Changing Their Approach To Access Management

The global zero trust market is growing fast – so fast, in fact, that it is projected to reach an astonishing $52 billion by 2026. And, given the ever-increasing threat posed by cyber criminals, it is hardly surprising (and a bit of a relief!) that organisations are stepping up.

Today, we’re exploring precisely what zero trust means, alongside the reasons and potential implications of its growth in the cyber security market.

What Is Zero Trust?

First popularised by Forrester Research analyst John Kindervag, the term ‘Zero Trust’ refers to an approach to cyber security that presumes that no connections to corporate networks and systems should be trusted. Rather than assuming trust, as perimeter-based security has done for many years. By trusting no one and nothing, zero-trust ensures that only devices and users with the correct authentication and authorisation are able to access an organisation’s network.

The Growth Of Zero Trust

With the number of cyber attacks on the rise, there is increasing pressure from regulatory bodies for organisations to improve their data protection and information security solutions.

These attacks commonly take advantage of vulnerabilities at endpoints and in cloud-based applications used by teams working remotely. So, as a solution with a greater level of security both at endpoints and for networks without a physical perimeter, zero trust is the obvious solution to reduce their frequency. According to a report published by Microsoft in 2021, 76% of organisations have at least started implementing a zero-trust strategy, while 35% believe they have fully implemented it.

Use Cases For Zero Trust

When it comes to real-world applications, there are two primary use cases for zero trust security. These are:

1. For globally distributed teams

Organisations requiring international, or even national, access to the same central business network rely on cloud-based applications, alongside remote access to sensitive company data and documentation. Some companies force remote employees to reach resources through a virtual private network, but this solution is inefficient and carries many risks and complications. In contrast, zero trust does not require users to connect to the entire corporate network before accessing cloud applications or resources, alleviating many of the issues associated with VPN access.

2. For third-party network access

When allowing third parties to access an organisation’s resources, alternative solutions to zero trust tend to provide access to the entire network, creating a hefty and unnecessary security risk. With zero trust and a least privilege approach, users are only allowed access if authorised and, when authorised, are only allowed access to the bare minimum of assets and applications.

Are you looking for support implementing or improving your Zero Trust solution? You’re in the right place!

Get in touch with us to find out more about how we can help you.

13 October 2022

What Is Ransomware?

Learn more about the most common cause of cyber security breaches worldwide and how you can protect your business from it.

In 2021, a company was hit by a ransomware attack approximately every 11 seconds.

As the necessary programs have become more and more accessible to potential hackers, ransomware attacks have been on a sharp rise over the past couple of years. But even those in the cyber security space don’t necessarily have the depth of knowledge to fully understand what a ransomware attack is, how they are carried out and/or the exact vulnerabilities they exploit.

This Cyber Security Awareness Month, we asked our cyber experts for a definitive answer to the question “what is ransomware?” and provide their advice on how to protect your business from an attack.

What Is Ransomware?

Ransomware is a specific type of malware (malicious software) designed to block access to a network or system until a ransom (usually a sum of money) is paid.

The malware usually works by encrypting key files on a network, rendering all users (even network admins) unable to view them. The hackers will then contact the organisation requesting a ransom be paid for the decryption key. Sometimes, the ransomware will also have the functionality to exfiltrate data from the encrypted network, allowing the hackers to steal as much data as they can access. Essentially, these attackers put their victims in a position where the quickest, easiest and often cheapest way to regain access to their organisation’s data is to pay the ransom. That’s why, in 2021, 32% of victims paid a ransom demand when hit by a ransomware attack.

Why Are Ransomware Attacks Now So Common?

The trend towards ransomware began back in May 2017, with the famous WannaCry ransomware attack. The WannaCry attack was a global epidemic caused by the spread of ransomware through computers operating Microsoft Windows. Cybercriminals took advantage of a weakness in the Windows operating system to encrypt users’ files and demand $300 in Bitcoin or their files would be deleted. That ransom was later upped to $600, as the attack became more widespread. The problem was, according to many sources, not a single victim got their files back (regardless of whether they paid the ransom or not).

Since then, ransomware has become more and more popular. Ransomware-as-a-service (or ‘Raas’) has even emerged – a business model through which cyber criminals license out their ransomware to people looking to perform a cyber attack themselves, but without the cyber know-how to create their own malware. As it has become the easiest and most accessible option to potential cyber criminals (even those that aren’t particularly good hackers), the popularity of ransomware has skyrocketed.

The COVID-19 pandemic and the rapid adaptation of organisations to remote working have also exacerbated the problem, as cloud implementations and the use of multiple remote devices have created vulnerabilities in cyber defences. In Q3 2020, as businesses were forced to adapt to remote working, ransomware attacks rose by 50% compared to Q1 of the same year.

How Can I Protect My Business From A Ransomware Attack?

1. Training and Education – The best way to protect your business from any type of cyber attack is to ensure cyber security best practices are second nature to your teams. Teach your employees to identify phishing emails, keep all their systems and applications updated and perform regular cyber security checks on their devices.

2. Data Backups – If you are hit with a ransomware attack, but you have recently backed up the data they have encrypted, you won’t need to pay the ransom and can go about your business without much worry. This also applies to many other types of attacks, whereby data is deleted, corrupted or edited, as well as general malfunctions that might damage or delete your data.

3. Patching – Regularly update your systems and applications with new cyber security patches. As these patches are usually released by developers to cover vulnerabilities they have found in their own applications, cybercriminals often look to these patches to uncover said vulnerabilities and exploit them through the systems of users yet to download the patch. If your employees aren’t quick enough to download recommended updates, they could fall victim to this kind of attack.

4. Privileged Access Management (PAM) – PAM is the term used to describe a number of cyber security strategies designed to control the access and permissions for users and accounts gaining access to systems, applications and files on an organisation’s network. By ensuring that access is only granted to those that absolutely need it, and with the lowest possible level of permissions, PAM strategies limit the risk to a network. After all, if everyone has access to everything, there are lots more potential entry routes for cybercriminals to exploit.

4. Privileged Access Management (PAM) – PAM is the term used to describe a number of cyber security strategies designed to control the access and permissions for users and accounts gaining access to systems, applications and files on an organisation’s network. By ensuring that access is only granted to those that absolutely need it, and with the lowest possible level of permissions, PAM strategies limit the risk to a network. After all, if everyone has access to everything, there are lots more potential entry routes for cybercriminals to exploit.

5. Endpoint Privilege Management (EPM) – EPM eliminates risks on the endpoint of your network (i.e. your employee’s devices) by using a combination of least privilege access (allowing users only the access they absolutely need) and application control (restricting or blocking any unauthorized applications or updates). Our go-to solution is CyberArk’s Endpoint Privilege Manager, an endpoint control solution that allows organisations to remove local admin rights, enforce a “least privilege” strategy and implement foundational endpoint security controls across all Windows, macOS and Linux endpoints, including hybrid and cloud environments.

6. Anti-Malware – Anti-malware software can protect your business against thousands of the most common types of ransomware. This software works by identifying and notifying you of a potential threat before it can execute an attack. They use artificial intelligence and machine learning to alert system administrators of suspicious or unusual activity on a network, helping your IT and/or cyber security teams to resolve an attack before data is encrypted, exported, edited or destroyed.

Looking for support assessing, improving or implementing your cyber security solutions to minimise the risk of a ransomware attack? You’re in the right place.

Get in touch with us to find out more about how we can help you.

13 September 2022

Unencrypted AWS Access Keys found in Mobile Apps – What Happened And How It Could’ve Been Avoided

Security researchers from the software manufacturer Symantec have found unencrypted AWS access keys in almost 1,900 smartphone apps in the public domain.

What Happened

Security researchers at Symantec found almost 1,900 publicly available smartphone apps (including mobile banking applications) with easily accessible unencrypted access keys, allowing them to access backend app data and private customer data. Within the 1,859 publicly available apps – 98% of them for iOS – the team of researchers found access tokens for amazon Web Services (AWS), which enabled access to a plethora of Amazon cloud data. Files belonging to 15,000 medium and large enterprises were discovered, alongside 300,000 biometric fingerprints.

How It Happened

Developers using AWS had put access tokens in clear text (entirely unencrypted) in source code, allowing anyone with the right knowledge and understanding of access keys to use them to access backend data on Amazon cloud. Not only this, but access to this data or the Amazon cloud was in many of those cases not restricted by any access management system or user identification process, meaning the researchers weren’t just able to access the data easily, but they could also modify and delete it, throwing into question the integrity of all data stored within the affected apps and institutions.

The Solution That Could Have Stopped It

Although the access keys in this case were explicitly found within mobile applications, they could all be used to access data stored in AWS. The question is, if you’re currently hosting with AWS, how do you ensure you aren’t falling foul of the same mistakes these developers made?

Well thankfully, if you do want to secure your AWS or any other public cloud hosting, there are lots of solutions on the market that can help you do that. Below are a few of the solutions you can adopt to keep your data safe…

– Firstly, you could use the CyberArk Cloud Entitlements Manager to gain an overall view of your permissions and access. This would help you to remove any excess permissions that are no longer required right across your cloud footprint.

– Secondly, you should secure your access keys. This step doesn’t necessarily require a program, but it does require you to ensure that they are not stored in source code in clear text! If you must store your access keys in source code, ensure they are encrypted.

– If you are an app developer hosting through AWS, a possible solution to secure any secrets in your CI/CD pipelines could be CyberArk’s new Secrets Hub. The recently launched “Secrets Hub for AWS Secrets Manager” removes secrets from your application and replaces them with API’s, simplifying the developer experience and ensuring one centralised security policy can be carried out across the entire enterprise.

– Finally, you also need to think about access management. If a hacker does manage to decrypt your access keys, how do you ensure that they do not have the permissions required to access and/or modify your data? Identity and access management are hot topics in the cyber security space right now and, at Infosec K2K, it is one of our core specialities. Find out more about how we can help you to control user access to your data here.

Looking for support assessing, improving or implementing your cyber security solutions? You’re in the right place.

Get in touch with us to find out more about how we can help you.

13 September 2022

The Uber Hack: What We Can Learn From The Latest High-Profile Cyber Attack

The world’s number 1 taxi app was hit by a rather serious cyber security attack recently. But what really happened and what can we learn from the Uber hack?

Last week, it was revealed that Mobility as a Service provider Uber was hit with a high-profile cyber attack that has left the company’s reputation at serious risk. In today’s blog we’re exploring exactly how the attack took place, how it could have been avoided, and what we (as IT teams, cyber security experts and business owners) can learn from it.

What Happened?

Allegedly, a young hacker was able to download HackerOne vulnerability reports and view and screenshot almost all of the company’s internal systems (including emails, Slack messages, the company’s security software and Windows domain).

The hacker is said to have breached Uber through a social engineering attack (an attack that utilises psychological manipulation to coerce a user into performing certain actions or divulging confidential information) on an employee. They launched what is known as an MFA Fatigue attack – whereby a hacker almost has access to a user’s account but is blocked by multi-factor authentication. The attacker then spams the employee with multi-factor authentication requests until they become tired of seeing them and accept them. In this case, they completed the process by contacting the employee, claiming to be Uber IT and asking that they accept the request. The employee did as they were told, providing the hacker with access to the company’s intranet.

Once on the intranet, the hacker claims to have found a PowerShell script containing plain text admin credentials for the company’s Thycotic privileged access management (PAM) platform.

This was then used to access logins for the company’s other internal services, including app sourcecode and databases.

What Can We Learn From The Uber Hack?

Well, in this case, the lessons are fairly simple.

1. Even if your business has a PAM solution in place, you will still require secure program enforcement to ensure all attack vectors are closed (even those that arise due to the introduction of a PAM solution, such as the one used to exploit Uber).

and

2. Never ever store your (privileged) credentials anywhere in clear text, especially not in automation scripts. Use encryption and/or dedicated solutions for secrets management, instead.

Don’t Let It Happen To You

You’ve worked far too hard to let your business (or the business you work for) fall victim to a cyber attack such as the recent Uber hack.

At Infosec K2K, we know what it takes to keep your business safe from the threats of today and those of the future.

Get in touch with us to find out more about how we can help you.

8 August 2022

The 5 Most Common Cyber Security Threats And How To Avoid Them

As cyber criminals continue to find new and more complex ways to infiltrate our networks, cyber crime continues to rise in complexity and frequency. In this blog, we’ll be highlighting some of the most common cyber security threats and explaining how you and your organisation can avoid falling victim to them.

1. Malware

What Is It?

Malware is intrusive software that aims to perform malicious tasks to gain access to a network, spy on user activity to obtain sensitive data, or disrupt and damage a computer and its systems. The most notable and severe method, ransomware, aims to extort the victim by encrypting files and demanding a ransom to regain access. Other common types of malware include Trojan horses, spyware, worms, viruses and adware. You might have come across this one in the form of dodgy, unsolicited pop-ups and ads on your computer that you just can’t get rid of – that’s how they draw you in.

How Can I Prevent It?

Unfortunately, preventing a malware attack isn’t easy, as modern antivirus products cannot tackle advanced cyber threats alone. But with the following, we can work to mitigate the risk.

• Unmanaged administration rights can pose a high-security risk for malware-driven attacks. Removing local admin rights, applying the principle of least privilege and implementing session isolation can effectively slow and control the spread of malware. Tools like Comprehensive PAM Controls from CyberArk use access management to protect against ransomware.

• With a multifaceted approach that utilises comprehensive cyber solutions to monitor and protect defences effectively, we can avoid falling victim to attack.

• Without advanced protection, malware can easily conceal itself in your network to evade detection, so using all-around preventative security measures will help you avoid becoming a target.

• The small things matter, too. Be vigilant of and avoid malicious content, keep software patched and updated, and enforce a strong password policy that uses multi-factor authentication.

2. Phishing

What Is It?

We’ve all heard of phishing, and have likely fallen victim to it ourselves, or at least know someone who has. Of the 39% of UK businesses who identified an attack last year, the most common threat vector was phishing attempts (83%). A phishing attack often arrives by email and uses fake links to websites posing as legitimate organisations to lure the victim into handing over valuable information like passwords, bank details, and intellectual property. This is the most common form of attack, with trickery an easy way to catch out victims who may not otherwise be aware of how to spot a phishing attempt.

How Can I Prevent It?

We can stop phishing attacks in their tracks in one of two ways – by learning how to detect attempted attacks, and investing in software that can do it all for us.

• Phishing is heavily reliant on human error, so education is the number one way to avoid these types of attacks. Learn how to identify suspicious content and when not to share personal information.

• The usual tell-tale signs of an illegitimate email, SMS or website are grammatical errors and spelling mistakes, an urgency to act now, unusual content or request or suspicious links or attachments. We can use tools like the National Cyber Security Centre’s suspicious website form to report these.

• Investing in phishing detection and response software that can identify malicious content online will help to reduce the risk of attack.

• Setting up simple tools like spam filters on your emails will make it harder for illegitimate messages to reach your inbox.

3. Zero-Day Exploit / Attack

What Is It?

A zero-day exploit or attack is where cyber criminals learn of and prey on undiscovered vulnerabilities in widely-used software applications and operating systems, and exploit them before they can be fixed. As users are unaware of the vulnerability, this form of attack is hard to predict. Unknown vulnerabilities could be your biggest downfall, and could cause huge reputational and operational damage for large-scale businesses if they’re not addressed before it is too late.

How Can I Prevent It?

The solution to mitigating the risk of zero-day exploits and attacks involves both an investment in software and small but effective solutions that organisations could easily implement themselves. Again, these attacks prey on human error, and it’s important to have preventative security solutions in place that can detect vulnerabilities sooner.

• Comprehensive anti-virus software solutions can block unknown threats and prevent attackers from installing unknown software on your computer.

• By performing simple software updates in which vendors have deployed security patches to protect against new vulnerabilities, you’re less likely to fall victim.

• Install a web application firewall (WAF) on your network to filter out malicious traffic. Again, this form of attack preys on human error.

4. Denial-of-Service (DoS)

What Is It?

A Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack is a malicious, targeted attack that aims to flood a network with illegitimate service requests and traffic to trigger a system crash, rendering it inaccessible for users. By disrupting business operations, the attack prevents users from performing routine tasks or accessing resources that are operated by the compromised computer or network. Find out more about DDoS attacks in our recent blog.

How Can I Prevent It?

Regardless of your defences, DoS attacks can still penetrate your system. But with the right solutions, the risk can be reduced.

• Invest in software that can detect abnormal traffic spikes from legitimate site usage, so that you can identify dry run test threats before a fully-fledged attack is executed.

• Penetration testing can be used to your advantage, by performing a simulated attack to uncover and patch any detected vulnerabilities.

• A web application firewall (WAF) can also be used to monitor HTTP traffic, to prevent cross-site forgery, file inclusion and SQL injection.

5. Man in the Middle (MITM)

What Is It?

A man-in-the-middle attack (MITM) sees an attacker intercepting communication between two parties to spy, steal personal information or credentials, or change the conversation in some way. The attacker will often rely on unsecured network connections like public Wi-Fi to intercept exchanges. However, with the advancement of technology, many email and chat systems are now using end-to-end encryption to prevent third parties from tampering with the data, meaning MITM attacks don’t happen as much as others.

How Can I Prevent It?

• Ensure you have a strong and secure network connection. Avoid using public Wi-Fi connections when engaging in confidential conversations where your data could be jeopardised. Instead, use a VPN to protect your internet connection and privacy online.

• Invest in endpoint security software that can check potentially dangerous websites and emails, and step in to provide defence if your network becomes infected.

• Educate employees on how to remain vigilant throughout the communication process, and only have these conversations when you have access to a secure connection.

Our Solution

Staying on top of emerging threats doesn’t need to be a challenge – and you don’t need to do it alone. With comprehensive security solutions from Infosec K2K, we can work closely with your organisation to protect against the most common forms of cyber security attacks. But how so? With a managed Security Operations Centre (SOC) that combines artificial intelligence and human expertise, we can grant increased visibility and control over security matters with advanced detection and prevention techniques. With the right solutions, we can work to eliminate these threats and create a safer space for organisations to operate without disruption.

We put security first. Take the next step in protecting what matters most with expert cyber solutions from our trusted team.

Get in touch with us to find out more about how we can help you.

26 July 2022

Should I Hire An In-House Cyber Security Team? The Pros and Cons Of In-House VS External Support

As technology advances, so does cyber crime, and when 95% of cyber security breaches are caused by human error, we can’t afford to make any more mistakes. If your current cyber solution is lacking, it might be time to re-analyse your existing security strategy. Or, if you’ve just started your journey to better protection, there’s a whole world of solutions out there. But which will come out on top – investing in an in-house team or seeking out external support? With advantages to both, read on to find out all you need to know before making that all-important decision.

So, you’ve decided to take your organisation’s security to the next level, great! But how do you know what’ll work best for you? Whether it’s hiring security experts to work in-house or investing in external support from an outsourced cyber security firm, there’s a lot to consider, and it all depends on the time and budget you’re willing to allocate and the goals you’re seeking to meet. Let’s dive deeper and look at what should be on the top of your radar when making the big decision.

Making that initial decision

Cyber security is ever evolving and methods of attack often change. Keeping security professionals on their feet at all times comes at a high price. To make that initial decision, there are 3 key points you’ll need to conquer first – money, time and needs..

How much money are you willing to spend?

This is a great place to start as ultimately, the budget you allocate will determine the extent of support you can receive. Whilst it might be tricky to put a number on it or invest in something that hasn’t necessarily happened yet, or you can’t yet see the benefit of, you’ll be better off for it (trust us!). When comparing the two types of support on offer, both are costly as they require specific expertise.

Hiring in-house requires extensive training, a complex set up and high salaries. Cyber-trained individuals are hard to come by, and if you can successfully source one, they are costly to keep. They need to be dedicated and well educated on the ever-changing world of cyber security, as it’s not a role you can float in and out of. Whilst, on the other hand, outsourcing is a more affordable solution that can cut costs that would be needed for recruiting and training internally.

An outsourced cyber firm will have everything ready to go, but as their capabilities stretch far and wide, and cyber criminals will strike at any point, you might need to splash the cash a bit more than you’d intended to.

How much time do you have or require?

In the case of cyber security, time is of the essence and critical to keeping your network adequately protected. Just like costs, time goes hand in hand with the budget. The more you invest, the more time you’ll receive. An internal team will require a few trained experts, plus technology that’ll need maintenance. Often, these internal hires are deemed “IT experts” and will be pulled from all directions to deal with other IT issues besides cyber security, which isn’t time efficient. If there are limited resources and other departments require more budget, cyber security could fall in priority and you could become an easy target!

Though, with an internal team, your organisation’s needs will come first so staff can react quickly, plus, offering greater control over your solutions where employees are easier to manage than third-party contractors whose resources are split amongst other clients.

But, with external support, you can free up time for your staff and have a better idea of what your invested time is going towards. Outsourcing is the fasted approach because of the severity of the situation, where security professionals are trained and ready to provide support imminently.

What does your business need?

Every business has different needs, which, most of the time, are dependent on its size. Look at the size of your business, the complexity of your system, the reach of your network, and the amount of data you’re storing. Whilst large organisations might be harder to breach, there are greater entry points for hackers to exploit. Whereas small enterprises are less likely to invest in sufficient protection so are less aware of the threat involved, making them an easier target. The key point to remember is: cyber criminals can affect businesses of any size and type.

Hiring in-house would provide better visibility of operations and knowledge of your organisation’s needs, making threats could be easier to predict and mitigate. The DIY approach to security will allow your internal team to handle issues head-on and skills can be repurposed if there is demand internally.

On the flip side, external support will offer solid expertise and experience in the industry – these companies work with multiple clients with various setups and know how to protect against many types of attacks, so understand the need for bespoke solutions.

Our solution

Our team at Infosec K2K are trusted, proactive and flexible, with a global reach to support clients wherever and whenever they need us. Depending on the stage you’re at in your cyber journey, the service(s) you require can differ, which is where we come in. Offering solutions for your unique requirements, we can assist those just starting who are wanting to bolster their defences with an expertly managed Security Operations Centre (SOC), those who’ve already got a solid plan in place but want to further highlight their commitment to security with assessments, certifications and accreditations, and much more.

If you’re looking to advance your cyber security solutions and want to invest in external support, look no further!

Get in touch with us to find out more about how we can help you.

19 July 2022

What is Denial-of-Service (DoS)? #INFOSECK2K101

The risk of cyber attack through malicious bot action is rising. Ransom-motivated DDoS attacks increased by 175% between Q3 2021 and Q4 2021. It’s important to understand the differences between legitimate and malicious web traffic. By adopting smart cyber solutions, we can better mitigate against the risk of a DDoS or DoS attack.

What is a DoS or DDoS attack? What does it involve?

A Denial-of-Service (DoS) or Distributed Denial-of-Service attack is a malicious, targeted attack. It aims to flood a network with illegitimate service requests and traffic to trigger a system crash. This renders it inaccessible for users. By disrupting business operations, the attack prevents users from performing routine tasks or accessing resources that are operated by the compromised computer or network.

Many DoS attacks can also develop into ransomware attacks. This stops to critical business operations, resulting in a loss of critical time and money and causing reputational damage.

Unlike other attack vectors, DoS isn’t reliant on criminal activity and can also occur naturally through what we would consider perfectly normal user interactions on the web. When we shop online, clicks are passed through our internet service provider, to external e-commerce applications and back to our site infrastructure. Servers work tirelessly to handle and execute each request. However, if there’s too much going on, the system can become overloaded, resulting in a denial of access to the service.

DoS and DDoS – What’s the Difference?

With different points of origin, these system infiltrations represent themselves in one of two forms:

  • Denial-of-Service (DoS) uses a script or tool to overload targets from a single machine. Since it comes from one location, it’s easier to detect the origin of a DoS and sever the connection. Thanks to advanced technologies in the modern cyber landscape, DoS can easily be deterred.
  • Distributed-Denial-of-Service (DDoS) attacks deploy several infected remote machines (bots) to generate a small number of requests, which when added together, overload the target. With increased speed making detection difficult, the attacks can result in significant damage when a large amount of traffic is sent from various locations simultaneously, making it a more sophisticated method of DoS attack.

Overload-based DoS attacks can target different types of resources. The majority falling into one of two categories: network layer or application layer. Network layer DoS attacks attempt to overwhelm the target by exhausting all available bandwidth. Whereas, application layer DoS attacks target the service application that users are aiming to access to deplete all resources and stop it from running completely.

What Do They Do?

The two main types of DoS attacks against web resources – network layer or application layer – have different aims. They’re either designed to crash or to flood.

  • Buffer overflow is the most common form of DoS attack. It occurs when the attacker drives more traffic to a network address than it can handle. A buffer represents the area of physical memory storage that is temporarily used to store data whilst it is being moved. An overflow occurs when the program seeking to write the data to the buffer overwrites neighbouring memory locations. The attack permeates all available bandwidth, such as CPU, disk space and internal memory. This results in slow performance and system crashes.
  • Flood attacks occur when attackers send too high a volume of traffic to a system for buffers to process, putting a stop to permitted network traffic. The type of flood attack is dependent upon the type of packet used, in which there are two common types of attack. ICMP floods attempt to overwhelm devices with fake Internet Control Message Protocol (ICMP) echo-request packets that ping all computers on the chosen network, whilst SYN floods can send= initial connection request (SYN) packets to servers, and flood the system to overrun all available ports.

Notable DDoS Attacks

DDoS mitigation service provider, Cloudflare, successfully prevented the largest HTTPS DDoS attack in history in June 2022, recorded as 26 million requests per second. The incident followed previous high records of 17.2M rps in April 2021 and 15M rps in April 2022.

Microsoft’s Azure cloud service mitigated a 2.4 terabits per second (TBPS) DDoS attack. This was the largest attack of its kind that the company had faced, and the second-largest DDoS attack ever recorded. The attack follows Google’s 2017 attack of 2.54 gigabytes per second (GBPS), which is the largest DDoS attack of all time.

Flashback to 2019. The Guardian reported that the UK Labour party had fallen victim to two “sophisticated and large-scale” DDoS attacks. These were driven by botnets seeking to flood servers and disrupt party operations. Though confident that the attack didn’t cause a data breach, campaign activities were slowed. Guidance was also sought from leading security professionals, National Cyber Security Centre.

Mitigating the risk of a DoS attack

Denial-of-service attacks cannot be prevented as such – cyber criminals will strike whenever they please. Regardless of the defences, your organisation has established, you may still become a target. But, by having the ability to detect abnormal traffic spikes from legitimate site usage, you’ll be one step closer to identifying dry run test threats before a fully-fledged attack is executed. With the following preventative measures, the risk of DoS attack can be mitigated.

  • Penetration testing to perform a stimulated attack that can uncover and patch detected vulnerabilities
  • DDoS testing or DDoS mitigation services use four key stages: detection, diversion, filtering and analysis
  • Web Application Firewall (WAF) to monitor HTTP traffic and prevent cross-site forgery, file inclusion and SQL injection
  • Response plan which should be included as standard in your cyber strategy if all else fails

Our Solution

A DoS or DDoS attack can’t be entirely avoided. However, there are still many ways we can create a solid security framework. This can prevent further damages should an attack occur. With our expert cyber solutions at Infosec K2K, we can stop businesses from falling victim to these types of attacks.

By investing in our managed cyber security services, like our Security Operations Centre (SOC), threats can be eliminated from the offset, thanks to 24/7 monitoring and detection of suspicious activity.

At Infosec K2K, we recommend performing a dry-run attack with Penetration Testing. We can highlight any potential system vulnerabilities for patching, to prevent the worst from happening. However, if that is the case and you’ve been exploited by DDoS, don’t panic.

Our solutions also apply post-attack. Our expert team will take control of the threat quickly and efficiently, so you don’t need to worry about it impacting your business any more than it already has. With the help of our expert cyber solutions, you can mitigate the risk of a DoS attack and better protect your business from cyber risk across the board.

Get in touch with us to find out more about how we can help you.

9 February 2022

Why Your Business Needs a Security Operations Centre (SOC)

What should my company invest in? What are the best solutions to detect, monitor and eliminate risk? The answer often directs us to the trusty Security Operations Centre (SOC). Devo’s Ponemon Institute research revealed that 40% of IT professionals classed their SOC as very important to their organisation’s overall cyber security strategy. For increased visibility and control over our security matters, the combination of artificial intelligence (SIEM) and human expertise (SOC) is a winning solution. Reducing risk, one threat at a time.

What is a SOC?

To survive a cyber attack, organisations must arm themselves with technology that can detect incidents in their infancy. But, that does require input from us, too. The most effective way to integrate your defences is with a Security Operations Centre (SOC). An effective SOC offers 24/7 surveillance of computer networks and servers to identify vulnerabilities in digital infrastructure and mitigate the cyber risk. It uses artificial intelligence through Security Information and Event Management (SIEM) to collect and analyse accumulated log data which, when combined with human expertise, forms an everlasting security solution. A SOC allows for greater visibility and stronger security procedures. The result? Better protection for your most valuable assets.

Why Your Business Needs a SOC

All organisations should be prepared when it comes to cyber security, but those operating across a number of networks and locations must be extra vigilant. For bad actors looking to compromise data, such large-scale, remote working companies are the top targets. However, by investing in an effective, centralised SOC, your business can maintain a strong defence. A managed SOC, working alongside SIEM tools, will help to detect, monitor and eliminate incoming threats. Without the data obtained from these cyber solutions, it would be impossible to determine the root cause of a breach and protect from future threats. So, for those looking to get more from their cyber security investments, a SOC could be the ideal solution.

Centralised Monitoring for Increased Visibility

Cyber criminals will strike whenever they feel they’re most likely to be successful, often attacking at unsociable hours when your employees aren’t alert to the threat. We need to adopt security solutions that can protect us from attacks, even when we’re not around to detect them. Organisations must be able to monitor and mitigate cyber risks easily, with maximum visibility. They must be able to manage critical IT infrastructure (and communicate its risks and vulnerabilities) all in one. This is where SOC comes in.

The downside? For optimised performance, the SOC solution requires 24/7 observation from reactive analysts and responders. Your dedicated security professionals must be ready and waiting to jump on flagged threats when required, as every second that passes is an opportunity for attackers to cause more damage!

Why Digital Transformation Has Created Risks

The recent adoption of digital transformation processes and remote working has resulted in increased use of cloud technologies and internet-connected devices, plus the connection of mobile and computing devices to corporate networks. Because of this, security measures are left with reduced visibility. By investing in a SOC that can detect, analyse and manage security alerts on a mass scale, security risks can become less of a worry.

Combining AI With Human Expertise

By blending advanced AI technology with unparalleled human expertise, a SOC forms the perfect cyber security combination. Managed by a single team internally, the SOC works hard to keep the entire organisation afloat. The collaborative practice between team members on a centralised system makes it easier to meet the cyber security needs of an organisation, leading to improved incident response times and better detection of threats.

Reduced Security Costs

Investing in solid security solutions isn’t cheap. But you’ll find that budgeting for cyber security as one of your top priorities is well worth it. Considering the detrimental impact that a cyber attack could have on your business, the associated costs are easily justified. According to its Cost of a Data Breach Report 2021, IBM reported that last year had the highest average cost of a data breach in its 17 years of researching the topic. Rising from $3.86 million to $4.24 million, this is far more than what investing in cyber security solutions will cost you.

Get more out of your security investments with a simple SOC. With the ability to streamline processes, quickly identify risks and reduce the impact of security incidents, the SOC will ensure continued business growth and development. A SOC can reduce business costs by creating a base for security resources to work together as one. With this, recruitment of extra staff to cover the workload and duplication of tasks are avoided. By investing in an effective SOC that can deter cyber attacks and avoid damage, you’ll receive a significant return on investment.

Our Solution

An outsourced SOC can take the hassle out of juggling security solutions in-house, reducing the time, cost and resources expended for your business. With the help of a third-party cyber security provider, like us at Infosec K2K, you can trust in the knowledge that your company’s security is in the very capable hands of expert professionals, who’ll monitor and manage cyber risk 24/7. Wherever you are on your cyber security journey, we’ll help you to reach your destination – secure business protection. So, why not start with an expertly managed SOC?

Take the next step in protecting what’s important for your business. Find out more about the power of our expertly managed SOC.

Get in touch with us to find out more about how we can help you.

31 January 2022

The Accreditations Your Business Needs to be Cyber Security Certified

Cyber security is becoming an increasingly important investment for small to large-scale businesses, as the sector sees exponential growth in technology and digital transformation. Though for some, the advantages are unclear. Reports show that privacy and security are hard to prioritise with 72% of consumers and executives reluctant to invest in something that “feels invisible” like behind-the-scenes security. By outlining the many benefits, and impact, that information security accreditations and certifications can have in preventing the risk of attack, the investment is made worthwhile.

With the number of data breaches, malware infections and cyber attacks on the rise year-on-year, the demand for skilled cyber security experts and cyber-aware business leaders has never been greater. This bears the question: what skills and expertise do we need to excel in the complex world of cyber security? Besides experience, accreditation and certification are the answer. But these responsibilities fall not just to IT professionals and c-suite executives, but all company staff to combat growing threats together. Knowledge is power, and power is protection.

Undertaking the necessary means to become security certified will show potential clients that you’ve committed to taking the necessary steps to keep them safe. Customers can be reassured that the security within your organisation has a level of validation, showing that you are a trusted provider in the cyber security field. By adhering to a high standard of security measures, your business will be able to continue to support the scale and success of its solutions, administering protection when customers need it the most.

So, What are the Top Cyber Security Accreditations that Businesses Should Be Investing In?

To help protect your vital business data and operations, it’s worthwhile investing in cyber security certifications and accreditations to keep your workforce security smart. Though these are generally aimed at professionals with IT experience, there are also certifications in cyber security designed for business leaders with minimal knowledge. Online criminals know no boundaries – all the more reason to invest in cyber-upskilling within your business.

Cyber Essentials

Cyber Essentials is a government-backed certification designed to increase cyber security within organisations, protecting them from falling victim to common cyber attacks. The requirements cover five main technical controls that aim to protect devices, internet connection, data and services. These include: software updates, firewalls and routers, malware protection, access control and secure configuration.

With two types of certifications – Cyber Essentials and Cyber Essentials Plus – you have greater control over the level of protection you wish to invest in. With Cyber Essentials Plus your business will receive the added benefit of a more hands-on technical verification approach, involving the administration of vulnerability assessments for additional assurance.

The benefits of having Cyber Essentials are:

  • Safeguarding your business from 80% of common cyber attacks.
  • Greater opportunity to acquire Government contracts and win new business opportunities that require the certification.
  • Reassuring customers that you are dedicated to protecting your IT against cyber attacks and gaining a competitive edge in showing that you can execute this.
  • Attracting new clients with increased cyber credibility and reputation.
  • Having clear levels of cyber security outlined for long-term safety.

Note: In a recent announcement, the (NCSC) confirmed that updates would be made to the technical controls of its Cyber Essential scheme, coming into effect on the 24th January 2022. The updates will reflect the changes that businesses and governments need to adopt to remain cyber secure in the wake of increasing cyber crime. If your business has invested in Cyber Essentials, you may be affected by these changes. To keep your solution up-to-date, read more about update requirements in our recent blog here.

To find out more about how to obtain a Cyber Essentials certification for your business, visit the National Cyber Security Centre website here.

ISO 27001

ISO 27001 is recognised internationally as an information security standard, offering a best practice framework for Information Security Management Systems (ISMS). The accreditation consists of 114 controls that can be used to better secure overall information security, protecting your most vital business assets like confidential information, brand image and other private details. Application of ISO 27001 is a fitting response to legal and customer requirements such as GDPR and potential security threats including cyber crime, data breaches, misuse, theft and viral attacks.

ISO 27001 has seen a 24.7% increase in worldwide certificates in 2020, thus highlighting its importance in maintaining information security compliance for businesses across the globe.

The benefits of the ISO 27001 certification are:

  • Showing your commitment to following information security best practices.
  • Providing your company with an expert evaluation of whether your critical, private information is adequately protected.
  • The ability to identify and treat security threats according to the level and type of risk that your business is willing to take and tolerate.
  • Meeting supply chain contracts that specify ISO 27001 as a must-have certification.
  • Peace of mind knowing that you meet necessary security laws (e.g. GDPR).
  • Improved customer and business partner confidence.

To find out how your business can achieve an accredited ISO 27001 certification, visit the International Organization for Standardization website here.

Certified Cyber Security Consultancy (CCSC)

If your company operates on a consultancy basis or provides these additional services, then you may benefit from becoming a Certified Cyber Security Consultancy. The certification aims at providing support on a variety of complex cyber security issues to government, wider public sector and Critical National Infrastructure (CNI) organisations. Upon completion of the certification, consultancies can prove that their services meet the NCSC’s high-quality standard for specially tailored cyber security advice. Currently, consultancy companies can be certified to offer the following cyber services: audit and review, risk assessment, risk management and security architecture.

The benefits of becoming a CCSC are:

  • Receiving expert cyber security advice from a network of certified professional NCSC Assured Service Providers.
  • Exclusive access to member benefits with Tier 1 and Tier 2 options, such as an invitation to the annual CYBERUK event, priority NCSC support and quality management, membership of the Scheme CiSP group, an invitation to Master Class events or Community event workshops, and much more.
  • To show that your company meets the NCSC’s standards as a trusted cyber consultancy, acting in the government’s name

To find out how your cyber consultancy could benefit from additional support from industry professionals, visit the National Cyber Security Centre website here.

What Certifications are Available for Cyber Professionals?

A rise in cybercrime has generated an urge for cyber security professionals to join the sector. But the cyber security field is not easy to navigate, requiring candidates to invest in additional training and development. By increasing skill sets, individuals can arm themselves with the required knowledge to better understand how to defend against attack. With the implementation of certifications and accreditations, job-seekers and hiring employers can rest in the knowledge that career pathways are clear and businesses can be safeguarded by skilled workers.

By 2021, experts expect there to be 3.5 million unfilled cyber security jobs worldwide, one reason why thousands of professionals are turning their attention to cyber security.

If you’re seeking to recruit new talent to grow your workforce or searching for a role in cyber security yourself, here are the top certifications you should be looking for, as ranked by the most popular recruitment sites.

Advanced and intermediate certifications for cyber security / IT professionals:

  1. Certified Information System Security Professional (CISSP)
  2. Certified Information Systems Auditor (CISA)
  3. Certified Information Security Manager (CISM)
  4. CompTIA Security+ Certified Ethical Hacker (CEH)

Beginner certifications for business professionals:

  1. UK Professional Development Academy – Cyber Security Beginner Certificate
  2. Lockcode Cyber Security – The Cyber Threat to UK Businesses Course
  3. Open University Open Learn – Introduction to Cyber Security Course

Our Solution

Having a compliant, industry-standard cyber plan in place can seem daunting if you’re just starting out, but it doesn’t need to be under our guidance. We’ll ensure your business is cyber security certified by selecting the right certifications and accreditations to undertake to meet specific security demands. The Infosec K2K portfolio of Policy and Process Assessments will help you to obtain the necessary accreditations to stay protected as part of a long-term strategy, not a box-ticking exercise. Take the next steps in protecting your business from the risk of cyber attack with the investment in industry-standard support and learning.

Find out how Infosec K2K’s specialist security assessments can keep your business protected in the long term.

Get in touch with us to find out more about how we can help you.

27 January 2022

All you need to know about the Cyber Essentials update

Following the migration of office to home working and adoption of cloud technologies for remote collaboration, cyber criminals have identified even more vulnerabilities in which to exploit. So, with these rapid changes, we’ve had to advance existing cyber security strategies to deny these newfound opportunities for attack. And at the centre of our attention right now is the National Cyber Security Centre (NCSC) Cyber Essentials scheme, with the power to combat 85% of the most common cyber attacks to eliminate threats for organisations across the globe.

What is Cyber Essentials?

Cyber Essentials is a Government-backed scheme, introduced by the NCSC, to help protect organisations from the ever-evolving cyber threat landscape and safeguard against common cyber attacks. By completing the certification, organisations can demonstrate their commitment to cyber security. The requirements cover five main technical controls that aim to protect devices, internet connection, data and services. These include software updates, firewalls and routers, malware protection, access control and secure configuration.

The two levels of certification – Cyber Essentials and Cyber Essentials Plus – can help you determine the level of protection you invest in. With Cyber Essentials Plus you’ll receive the added benefit of a more hands-on technical verification approach, involving the administration of vulnerability assessments for additional assurance. Certification for both levels can be achieved through NCSC’s partner, Information Assurance for Small and Medium Enterprises Consortium (IASME).

Why is it Changing and What are the Updates?

The scheme, reviewed by experts at IASME to ensure effectiveness, has released updates for 2022 to keep its five technical controls in line with evolving security challenges. Since its launch in 2014, this is the biggest major update to the technical controls, and it comes as no surprise, after businesses worldwide have had to rapidly adopt digital transformations mid-pandemic.

Home Routers

Security has become a challenge since working from home, which led to an update in Cyber Essentials for home routers. Whilst routers were previously provided by the employer on-site, the shift to remote working and purchase of home routers has put them out of scope. Now, IoT devices must be protected with a firewall, rather than a home router (unless provided by their employer, then it will be in scope of Cyber Essentials). These changes can be easily met with the use of a Virtual Private Network (VPN) that uses a corporate firewall, therefore transferring the boundary of the scope.

Cloud Services

To meet the demands of remote working, cloud services have been fully integrated into the scheme’s update. Organisations will need to check that their existing services meet Cyber Essentials standards. Platform as a Service (PaaS) and Software as a Service (SSaS) are now in scope, and so, organisations must take responsibility for user access control and the secure configuration of their services. Those taking charge of implementing one or more of the five controls within its cloud services must provide evidence of doing so to the required standard.

Password and Multi-factor Authentication (MFA)

Where we’ve adapted to using cloud services to access corporate information, so have cyber criminals, but they’re using it to launch attacks. To mitigate the risk of attack, we can use MFA as an extra layer of protection, which requires more than one verification method to access an account. Cyber Essentials have suggested four types of additional factors that may be considered: a managed enterprise device, an app on a trusted device, a physically separate token and a known or trusted account.

Critical Updates

The new scope outlines that all high and critical updates must be applied within 14 days and unsupported software removed. All in-scope devices must be licensed and supported, and have automatic updates enabled. When updates become unsupported, these must be removed from devices. These device updates should be performed within 14 days of being released, in which: update fixes vulnerabilities are defined as ‘critical’ or ‘high risk’, updates address vulnerabilities with a CVSS v3 score of 7 or above, or if there are no details on the level of vulnerabilities being fixed.

Organisations can no longer be selective about which patches they use, as this can render them vulnerable, the extent of which was emphasised by a public cyber attack against a vulnerability in the Microsoft Exchange System. After developing from a complex state actor attack to a commoditised ransomware attack in just seven days, the update to Cyber Essentials technical controls concerning 14-day critical updates is justified.

To read the full list of Cyber Essential updates that must now be adhered to, find out more via IASME.

So, What’s Next?

The updates to Cyber Essentials technical controls came into effect for new assessment accounts on 24th January 2022. Those undergoing assessments now, or before the date, will continue to reflect the existing technical controls, so in-progress certifications will not be affected. The NCSC has applied 12 months of grace for those needing to complete new certifications within the next 6 months. Though, if your Cyber Essentials is up for renewal after the 24th of January 2022, you’ll need to consider making the required changes to your existing cyber security solutions.

And, for those looking to invest in Cyber Essentials for their business, there’s no better time than now! With fresh new updates rolled out in January, the scheme is at its peak performance.

To take control of your vulnerabilities and find out what updates you’ll need to implement, contact our expert team at Infosec K2K. We’ll help you stay protected against rising cyber security threats.

Get in touch with us to find out more about how we can help you.