IT - Security

16 Top Endpoint Protection Platforms
CSO Online, August 17th, 2020
Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.

"Endpoint security has long been an important part of cybersecurity within any enterprise's overall security architecture, particularly to provide protection for remote devices that connect to an enterprise network. When laptops, smartphones, or desktop computers connect to a network, they establish network nodes and create points of vulnerability. Endpoint security might also be used with on-premises desktops to act as an additional layer of security or as a last line of defense designed to catch whatever threats slip through other network protections..."

Black Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives

"In the first week of August 2020, as I prepped my kids for the start of virtual 7th and 12th grade, I attended my first full virtual conference.

To its credit, Black Hat USA 2020 turned hard left once it was clear that large live events wouldn't be happening in the second half of 2020, and what they managed to pull off was nothing short of a miracle. Even if, from an analyst's perspective, the event was nothing like an in-person event, it was incredibly useful for all involved..."

54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals

"Of those, more than 70 percent of respondents plan to continue to use telemedicine post-pandemic.

However, healthcare providers should note that privacy and protection of sensitive health data was a major concern for telemedicine users and breaches could prompt patients to switch doctors..."

Password policies aren't adequate for corporate cybersecurity

"Every year, billions of personal and corporate accounts are hacked. And every year, organizations respond in the same way: enforcing stricter password policies. The result? A false sense of accomplishment and a short-lived boost to security, followed by a return to the usual: insecure passwords and, of course, more compromised accounts.

Password policies are a common band-aid approach that do not solve the security woes of organizations when, in fact, a more fundamental solution is needed to prevent corporate account breaches..."

Securing remote connections is critical, especially in a pandemic. Enact these RDP security best practices at your organization to prevent ransomware, brute-force attacks and more

"The COVID-19 pandemic has forced many organizations to rush to upgrade their networks. Some shouldered the challenge of giving employees access to office workstations and applications from their homes for the first time, while others had to handle a big increase in the number of remote connections.

The majority of organizations using Windows machines rely on Remote Desktop Protocol (RDP). This proprietary protocol developed by Microsoft is built into Windows OSes and enables remote connections to other computers. RDP opens a "listening" socket that accepts authenticated inbound connection attempts over port 3389, providing network access to a Windows machine for a remote user over an encrypted channel. Network administrators use RDP to carry out tasks and diagnose issues on remote servers, while many employees use it to log in to their organization's network to access email and files..."

New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises

"Respondents named threat detection, incident response and flexibility/openness to change while working remotely as the top three areas that blue teams must improve upon. This indicates an increase in technical and adaptability challenges since the same study was performed in 2019, where the focus fell heavily on teamwork and communication.

While 37 percent of blue teams always or often catch these 'bad actors,' 55 percent say they only succeed sometimes, and 7 percent rarely or never achieve this feat. On a positive note, these numbers indicate a trend in the right direction compared to last year's study, which showed one-third rarely or never catching red teams..."

Not all cybersecurity awareness training vendors are the same or are right for your organization. Here's how to find the best match

"In an era when a single misguided keystroke can endanger an entire enterprise, employee security training isn't just a good idea - it's a necessity. While it's well known that employees are often the weakest link in the cybersecurity chain, it's far less recognized that a properly trained staff can actually serve as the first line of defense.

The secret to transforming everyday employees into cybersecurity watchdogs is comprehensive training. While many enterprises rely on internal training teams, others are turning to outside vendors for assistance, realizing that the threat landscape is evolving so rapidly that it's best to place training into the hands of experts who are dedicated to staying on top of new and evolving trends..."

The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address

"Election security was a hot topic that was discussed by a number of presenters and delegates at Black Hat USA 2020.

Despite being a virtual event his year, that did not inhibit many enthusiastic discussions regarding the security around November's U.S. elections.

Delegates and the general public agreed that they do not want a repeat of the 2016 U.S. elections, in which foreign actors allegedly sought to interfere. As a result of a U.S. Department of Justice special council investigation, a 2018 indictment accused 12 Russian GRU intelligence officials of posing as "a Guccifer 2.0 persona" in order hack into computers of the Democratic National Committee..."

Enterprise Cybersecurity Hygiene Checklist For 2020
SearchSecurity, August 21st. 2020
Cybersecurity hygiene in the enterprise must be a shared responsibility between employees and employers. Follow these steps to get the job done by both

"Cybersecurity hygiene has always been a critical component of any infosec program. Just as washing your hands and brushing your teeth are important to personal hygiene, password updates and software patches are important to cybersecurity hygiene -- and critical to preventing data loss, breaches or identity theft.

Many cybersecurity hygiene steps are well known, but the COVID-19 pandemic, which created dramatic shifts in volumes of remote workers, has thrust the need for bringing cybersecurity hygiene into the 21st century into sharp focus. Keeping corporate assets safe amid the enterprise's recently widely expanded boundary into every employee's home -- combined with the explosion of cloud use -- has proven difficult for security teams -- to say the least..."

Five Ways To Maximize FIDO
HelpNet Security, August 19th, 2020
Perform a quick Google search for 'causes of data breaches', and you will be inundated with reports of stolen credentials and weak passwords

"Organizations can spend billions on technology to harden their systems against attack, but they are fighting a losing battle until they are able to confidently attribute a login with a valid user.

What is FIDO, and why does it matter?

FIDO stands for Fast Identity Online. It is a free and open set of standards and technologies that aims to reduce the world's reliance on passwords. FIDO is designed to bolster authentication assurance by 'protecting' and eliminating passwords..."

Shielding against identity theft in a post-pandemic world

"It's currently a buyers market for criminals with an eye for identity theft. Thanks to ongoing lockdown measures, workforces everywhere are scattered, individual employees are more vulnerable than ever to social engineering tactics, and sensitive data that was once protected by robust on-premise security and corporate networks is now accessible via unsecured home environments.

What's more, organizations across the globe are scrambling to digitize their processes, regulators have yet to enforce remote security procedures, and our most valuable data can now be accessed via easily penetrable devices on a basic home network..."

In the second 2020 MIT Sloan CIO Digital Learning Series, a panel of IT security leaders discussed how they are keeping their organizations secure in a COVID-19 environment

"The sudden shift to a remote work environment in the wake of the pandemic exposed organizations to more cybersecurity attacks than ever before, particularly ransomware and phishing attacks. The number of workers using personal devices on insecure home networks has created a unique opportunity for hackers and scammers to easily access and steal company data.

To mitigate the risk and ensure that data remains secure, IT security leaders are reevaluating how to maintain cybersecurity across this distributed environment..."

What Are The Three Pillars Of Cybersecurity?
CloudSavvyIT, August 18th, 2020
Cybersecurity is a business issue, not an IT issue. Organizations must foster a cybersecurity culture championed by management and supported by technology, governance, and staff awareness

"Counterintuitively, headline-grabbing cyberattacks like the recent Blackbaud data breach and Twitter hack can make upper management and c-suite executives feel safe and immune to cyber threats. If there are bigger and better targets out there, why will hackers ever pay attention to their organization?

But just like criminals in the physical world, there are various strata of cybercriminal. There are criminals who conduct diamond heists, and there are criminals who snatch handbags. Plainly these are not the same individuals. The cybercriminals who target high-profile high-value victims are unlikely to turn their sights on the average small to medium enterprise (SME)..."

Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know

"Multifactor authentication (MFA), which requires users to authenticate their identities with at least two factors in order to access an application, appears to be gaining ground in the enterprise. A survey of 47,000 organizations conducted by LastPass late last year found 57% of businesses around the world are currently using MFA, which was up 12% over the previous year.

Statistics also make a compelling case for MFA's effectiveness. Earlier this year, Microsoft reported that 99.9% of the breached accounts it tracks didn't use MFA..."

Since the shift to remote working, businesses have been exposed to greater cyber risk

"Since the shift to remote working, businesses have been exposed to far greater cyber risk - and have suffered more data breaches as a result.

This is according to a new report from cybersecurity firm Malwarebytes, which claims 20 percent of businesses have suffered a breach due to the actions of a remote worker since lockdown was introduced.

As a consequence, these businesses faced higher costs, with almost a quarter (24 percent) having faced unexpected expenses..."

See all Archived IT - Security articles See all articles from this issue