Archive for October, 2014

Protect Your Organization From Increasing Identity Thefts And Malware Infestations – Chuck Leaver

This post has been written by Chuck Leaver, Chief Executive Officer Ziften Technologies.

In a report it was revealed that breaches of consumer data implies that there are more and more identity thefts being performed nowadays. This is extremely worrying for everybody.

The report was performed by the National Consumers League and it exposes that in the year 2013, around 33% of customer data breaches led to identity fraud, and this means that the statistic has actually tripled since the year 2010. This worrying increase can be explained by some clear reasons. Cyber criminals are using a lot more advanced strategies now and there is a lack of cyber attack laws that force companies to divulge when they have had an attack. To make matters even worse there are very few companies using endpoint detection and response systems to protect their data. All of this means that we are entering a climate where customers are finding that their data is continuously under attack by unethical hackers.

John Breyault, who is a member of the National Consumers League, specified that cyber attack breach legislation like the one operating in California can help with the reduction of breach fall outs by mandating the organizations that have been infiltrated to rapidly get the word out.

He went on to state that after a breach timely notification is required so that people can perform a “damage analysis” once they learn about an attack. This is everyone’s right and at the moment the type of issue that would set a notification in motion stays really broad.

Sadly, it is not just identification theft that is under the spotlight. Another report highlighted that malware is now more prevalent than it ever was.

 

Every Third Computer system Has A Malware Infection According To A Report

 

The Anti Phishing Workers Group published a report stating that malware was most likely to be present in up to a third of the computers across the world by the last quarter of 2013. This is a significant boost when compared with the previous quarter states Tech News World. The technical director of a security lab that investigates cyber attacks, Luis Corons, said that brand-new malware strains are being created at a very fast pace and that malware infections could increase even further.

He mentioned that the development of new malware samples has just skyrocketed and it has doubled from the last quarter of 2013 to the very first quarter of 2014.

The findings of these 2 reports highlights that there is no space for complacency in companies when it concerns security. Every company has to sure up its endpoint detection and response systems or deal with the fact that a cyber attack is increasingly most likely to be coming their way.

 

 

 

 

By Chuck Leaver

Chuck Leaver – Don’t Risk Fines For Breaches And Malware Implement Defenses

With malware ending up being more stealth and the fines that business face when they suffer a breach from it makes the case for executing endpoint detection and response systems much more critical than it remained in the past. Without the ideal defenses executed there is not only the threat of a major cyber attack, but likewise fines and suits that can be very damaging to a business. If an enterprise believes that it is immune to cyber attacks then they are being arrogant and naive. The cyber wrongdoers out there are making their attacks almost undetectable these days.

 

Major Malware Risk Now Averting Detection

 

Embedding a secret message into something unexpected is called steganography and is not something new that has shown up with the Web. In the 1600’s, Gaspar Schott produced a book which described how a secret message could be concealed in a musical arrangement and that this could be decrypted by those that knew about it. The approach used was the notes on the score would represent a letter of the alphabet and for that reason the message could be checked out.

This practice has some distressing ramifications as it provides a nearly foolproof way of hiding details that should not be there. Cyber criminals have actually been utilizing steganography for numerous years now. It was reported in a Federal Plan Cyber Security which was published by the National Science and Technology Council in 2006, that steganography represents an especially sneaky method for terrorists to infiltrate U.S. systems.

The report specified that these tools are affordable and widespread making steganography an enabling technology for the adversaries of the United States.

Nowadays cyber security attacks are widespread and hackers are leveraging steganography to perform attacks that are practically undetected and really sophisticated. In a paper on the hazards of steganography, it was specified that there is momentum gathering in its use amongst cyber lawbreakers who can use the technique to breach networks without detection. The report went on to state that Internet based steganography has ended up being a lot more sophisticated and will just end up being more so in the years to come.

While steganography does present a big risk it can be mitigated by executing an endpoint detection and response system. This system will carefully watch all locations where a cyber criminal could gain access and it is recommended that companies take this crucial action.

 

The Penalties Are High For Organizations That Suffer A Malicious Breach

 

The threat of a steganographic attack should definitely suffice for you to execute an endpoint detection and response system but if it isn’t then the substantial fines that your organization can face for a breach should be. Any organization is prone to attacks and fines. As an example of this the Women and Infant Hospital in Providence, Rhode Island, had to pay $150,000 as a result of a cyber attack which saw the information of 12,000 individuals jeopardized. The Modesto Bee mentioned that the data that the health center lost included Social Security numbers, dates of birth as well as ultrasound imagery.

The corporate world can likewise suffer at the hands of a malicious breach. eBay faced a law suit from a customer in Louisiana after they were infiltrated according to Computerworld. Colin Green, who submitted the law suit, is not alone in being discontented and represents millions of individuals who were not pleased that their individual data was exposed when the cyber attack happened at eBay. The potential fines and lawsuits make the investment in a proven endpoint detection and response system really rewarding.