Archive for December, 2014

Chuck Leaver – Chicago Has A High Instance Of Cyber Attacks

From the desk of Chuck Leaver CEO Ziften Technologies

If you live in Chicago or run a company or work there, you ought to pay attention to a report that discloses that Chicago is one of the most susceptible cities in the USA for cyber attacks. The National Consumers League, who are Washington D.C. based group who concentrate on customer support, published the report as stated by The Chicago Sun-Times. The report exposed some distressing findings and amongst these was the discovery that 43% of the city’s population reported that their data was stolen and that their information was used to make purchases online. This suggests that cyber bad guys are being more forward thinking when it comes to taking personal data.

So if you suffer a cyber attack on your company you need to expect the taken data to be utilized for destructive functions. The National Consumers League vice president of public policy, John Breyault, stated “Chicago people who get a data-breach notification must pay particular attention to purchases made via the Internet (in their name).”.

The citizens of Chicago are not being inactive and simply dismissing this important report. The Illinois state Attorney General Lisa Madigan, is leading the efforts to develop a federal group who will have the obligation of investigating data security incidents, so state CBS Chicago. Madigan’s office are examining the attacks on Neiman Marcus and Target as well as others and Madigan feels that with the current severity of attacks the government has to take some responsibility and handle the problem.

Madigan said “It simply makes good sense that somebody has to take responsibility in this day and age for putting in place safety requirements for our individual monetary info, because otherwise you have disruption and a significant effect, potentially, to the general market.” The time frame for developing this group is uncertain at the current time. Making things take place at the federal level can be very sluggish.

Endpoint Threat Detection And Response Software Will Offer Protection.

If you run a business in Chicago (or elsewhere) then there is no requirement for you to wait for this federal group to be established to secure your business’s network. It is suggested that you implement endpoint detection and response software because this will supply major defense for your network and make it practically hacker attack proof. If you fail to benefit from robust endpoint threat and detection systems then you are leaving the door completely open for cyber bad guys to enter your network and cause you a great deal of damage.



Chuck Leaver – Bank Attacks Are A Lesson For All Organizations

Written by Chuck Leaver Ziften CEO

The world of international hacking includes a lot of cyber lawbreakers that it would be difficult to name all them. Nevertheless, there are some hacking cooperatives that make their voices heard louder than the others, and a fine example of this is the Anonymous group. Mostly produced to be a hacking group that was loosely assembled, on occasions the Anonymous group will perform high profile attacks by using the hacking expertise of its members to make life challenging for federal governments and big corporations. Digital Journal has actually revealed that Norway banks have actually ended up being a target of the Anonymous group.

Anonymous Make All Of Their Cyber Attacks At The Same Time As A Display Of Power

Through making use of cyber attacks Anonymous is a group that wants to show the world the power that is has. It surprised no one that the Norwegian component of Anonymous decided that they would attack a number of the nation’s banks, the decision was likewise made to attack all the banks at the same time. On a particular time on the exact same day, eight of Norway’s biggest banks were hacked by the group, and this led to the electronic banking services of the 8 banks being severely interrupted.

Manager of the Evry security team, Sverre Olesen, said “the extent of the attack is not the best we have actually seen, but it is the very first time that such an attack has actually hit many central agencies in the financial sector in Norway”.

Besides demonstrating the power that the Anonymous group possesses, the fact that all of the attacks occurred at the same time reveals that cyber crime is ending up being more of a collaborative effort with hackers collaborating to compare notes and supplying an unified force against chosen targets. Any company is vulnerable to this.

They Enjoy Remaining in The Spotlight

The majority of cyber criminals are not searching for any publicity, they simply wish to take cash quickly. They simply want to get in and out quick. However the Anonymous group takes pleasure in remaining in the limelight despite the fact that there is no public link to any specific individual.

According to allvoices, after the cyber attack on the Norwegian banks had actually occurred Anonymous did not lose any time taking credit for this in public. The cyber attacks on the banks not only interrupted the online pay platforms but also developed severe troubles for consumers of the banks.

This attack by Anonymous underlines the requirement for all organizations to implement endpoint threat detection and response systems that will protect them from the very same disastrous incidents happening to them.



Chuck Leaver – Bank Attacks Prove The need For Layered Security Protection

Chuck Leaver CEO Ziften composes

There have actually been a number of cyber attacks on ATMs which have permitted criminals to steal millions of dollars. In order to combat this danger, monetary companies need to comprehend the various elements of cyber security and the factors behind their utilization. Financial data will always be highly preferable to cyber crooks as the majority of wish to generate income quickly which implies that consumer monetary records and ATMs are both at risk. To implement the ideal security procedures, monetary companies have to understand the layers that they need to keep the bad guys away.

Unfortunately, unlike mythological monsters of legend, there isn’t really a single weapon in the security system arsenal that can protect a server from being hacked. There are no cure-all applications to stop hacking. The very best way to secure online servers of ATMs and banks, the monetary companies will have to utilize a number of different methods to keep their details protected. According to PC World, the hackers that infiltrated the ATMs did so using malware that was extremely challenging to find. Banks truly need to utilize endpoint security as cyber bad guys can attempt to penetrate systems by creating hacking tools that are a hazard to bank security through making use of computers that are utilized by bank tellers. This will provide plenty of alternatives to penetrate the network of ATMs.


A Human Eye Is Needed With Modern Security


The days have now gone where firewall programs and automated services sufficed to keep hackers at bay. Banks should be utilizing endpoint threat detection and response systems to keep out the cyber lawbreakers. There was a post on about US bank accounts being infiltrated by cyber lawbreakers from Russia and this shows the terrible impact that hackers can have on banks that are not correctly secured. Making use of security staff members 24/7 with products provided by security professionals is one way to make sure that a network is not compromised, however this is only one piece of the security puzzle that has to be applied.

There needs to be a modification in the company culture so that using strong passwords is adopted, a policy that values security presented that prevents individuals bringing USB drives, and other computer system equipment, to the workplace without permission are actually essential. This and other policies that will prevent malicious elements from penetrating a server are all important. A malware attack can be avoided earlier with making use of endpoint security. Using more powerful locks so that the crooks could not break through and install the destructive software would likewise have actually helped.

Using different security layers to prevent cyber lawbreakers accessing networks an organization will buy time for human beings to identify and stop the threats prior to any damage is caused. A passive security system that responds far too late is not adequate to provide the high levels of security that organizations have to keep their data safe.