Keeping up on ways to protect your business from a cyber attack can feel intimidating, especially because of the continuously changing methods criminals use to social engineer us. The bottom line is it only takes one click at any time by anyone to open the door to the attackers.
In this episode:
One Click That’s All – Ep 380
Today’s Episode is brought to you by:
Kardon
and
HIPAA for MSPs with Security First IT
Subscribe on Apple Podcast. Share us on Social Media. Rate us wherever you find the opportunity.
The Privacy and Security Boot Camp
3.5 day In Person Event
Mar 12, 13, 14 and 15, 2023
PriSecBootCamp.com
Great idea! Share Help Me With HIPAA with one person this week!
Learn about offerings from the Kardon Club
and HIPAA for MSPs!
Thanks to our donors. We appreciate your support!
If you would like to donate to the cause you can do that at HelpMeWithHIPAA.com
Like us and leave a review on our Facebook page: www.Facebook.com/HelpMeWithHIPAA
If you see a couple of numbers on the left side you can click that and go directly to that part of the audio. Get the best of both worlds from the show notes to the audio and back!
PriSec Session of the Week
[03:34] Monday will be MURPHY’S LAW DAY. Check out Donna’s and David’s description of what we’ll cover on this topic at the PriSec Boot Camp in Louisville, KY.
One Click That’s All
[13:02] 3 days ago, there was this tweet:https://twitter.com/ClareONeilMP/status/1583710791672307712
Today:
Hackers hit cybersecurity conference
As the comments from the waiting participants began to mount, a fake Eventbrite link – which many unsuspecting users clicked upon – was posted in the LinkedIn chat function asking for credit card details, leading the institute to plead with participants not to try to use any links posted in the chat.
When an official-looking AICD link appeared to the event, some users who hadn’t learned their lesson the first time around tried to follow it, only to complain that it didn’t work and eventually, about 30 minutes into the debacle, the institute bowed to the inevitable and canceled the event.
Any bets on what happened here?
Credential theft by some sort of social engineering is the most likely culprit. The news will be interesting to follow on this one. We know the methods for hacking humans continue to grow and be exploited. We can call it social engineering, hacking the human or insider threats. The bottom line is it only takes one click at any time by anyone to open the door to the attackers.
Biggest Risk
[20:11] The UK Information Commissioner’s Office released a great article explaining what happened and why they fined a company £4.4 million. Interserve is a British construction and support services business that exposed the information for their 133,000 employees. Note they said they considered potential factors for reducing the fine but “no reductions were made to the final fine amount”. Ouch!Here is what happened (according to the nice explainer video): An Interserve employee forwarded a phishing email to another employee. The other employee opened it and downloaded the attachment (or linked to one) which installed malware. Boom, the door was opened just enough to let the attackers roam far and wide. They compromised 283 systems and 16 accounts before launching a ransomware attack.
But wait, there’s more! The company’s AV quarantined the malware when it was launched and sent an alert, but no one looked into it seriously. No one! There you have it folks! That’s your check-the-box security in full display.
The investigation also found they weren’t doing risk assessments, training staff or patching software. The perfect ingredients for an eventual attack. It was like they were sitting ducks waiting for the hunter to find their pond.
In the press release the Commissioner’s quote included a statement that I think we need to reiterate and keep doing so. There was more to it but here is the part that got the headline and also my attention:
Complacency is exactly what we talk about here in many different ways. The lack of concern, the overconfidence, the failure to take this stuff seriously is how this company was attacked. There were many ways they could have prevented or mitigated the situation but they didn’t make it a priority.
The world we live in continues to evolve as do the methods and reasons these attacks are carried out. Which brings us to another article from CheckPoint Research that is both informative and nerve-racking.
[34:37]They explain what they see happening concerning the rise of hacktivism that is no longer the loosely organized groups like Anonymous but now formal state-mobilized groups with deep organizational structure, requirements, and sophisticated tools. They are already growing their attack targets outside the Middle East and Eastern Europe moving west to target US governments and businesses.
Here are the core points about their common characteristics:
- Clear and consistent political ideology
- Well-designed hierarchy for members and leadership
- Formal recruitment process
- Tools that the groups provide to their members
- Aligned on the targets
- Robust public relations operations to publicize and promote their successes, including on major media channels and websites
To make that even more concerning is that in some cases there is even organized cooperation between groups which allows them to amplify their abilities exponentially. Just to reiterate all the points made here a very stark paragraph lays out concerns that will keep us awake at night.
Nobody ever thinks that they’re going to end up as a target of a hacktivist or other cybercriminal. Until they do.
Complacency is the biggest risk we face and the risk keeps coming and getting more complex. Just training your staff once a year or showing them the same security awareness videos doesn’t work anymore. You have to mix it up, do something different to get people’s attention and keep it to have a fighting chance at not being an easy target.
Remember to follow us and share us on your favorite social media site. Rate us on your podcasting apps, we need your help to keep spreading the word. As always, send in your questions and ideas!
HIPAA is not about compliance,
it’s about patient care.TM
Special thanks to our sponsors Security First IT and Kardon.