Tag Archives: companies

Insiders, their costumes are so good you won’t even recognize them.

halloween panda securityKnock knock! Trick or treat! Companies and cybercriminals play the same game. You could be opening back doors to cybercriminals this year, without even knowing it. You’ll lose this game if you don’t fight back. Ransomware attacks will capture your documents and the attackers will be expecting a big juicy reward (if you want your files back, that is). This Halloween, beware!

An insider could already be hiding within company walls, brewing up trouble. A recent study shows that 60% of attacks perpetrated in businesses were carried out from inside the workplace. From undercover spies to terrorism gangs to disgruntled employees that steal top-secret information. Double, double toil and trouble…

And what about you? What type of Insider are you?

gohst panda securityAttacks by staff with privileged access represents one of the greatest threats for the security of the corporate information and data of your customers. Research conducted by Ponemon Institute indicate that hackers and criminal insiders are the main culprits of the security holes and data breaches. Three quarters of these attacks are ill intended, and one quarter of them are accidently carried out by employees without bad intention.

This year, the global cost of the infractions carried out by insiders with bad intentions is 154 euros per capita, much higher than the cost of infractions caused by system errors and involuntary offenses (about 125 euros and 120 euros per capita).

A history of perfect crimes

wolfman panda securityAt the beginning of this month, an employee from the US government, Harold Thomas Martin, was accused of stealing classified information related to the NSA (National Security Agency). Let’s not forget the Edward Snowden leak from three years ago.

Shalom Bilik, who was subcontracted for computer system maintenance for Israel’s Ministry of Social Security and Welfare, accessed a database and stole information pertaining to 9 million Israeli citizens so he could sell it later on the black market.

Even Dropbox couldn’t escape from the insiders, when a cybercriminal stole data pertaining to more than 500 million users thanks to a negligence of an employee. It happened this time because of the carelessness of a Dropbox employee. The cybercriminals were able to obtain his LinkedIn password, which was the same one he used for saving files in the Dropbox Cloud. Stored in the cloud was a work document that contained a long list of email addresses. Access to more than 500 million users? What a treat for criminals who want to trick users with massive same campaigns.

Some tips to keep you protected from internal threats

  1. freddy panda securityStart using a cybersecurity solution that has advanced protection features, and that also has the capacity to detect and remedy possible threats.
  2. Lack of control over what happens in all devices and systems is a common point in all analyzed attacks. What will help us is a tool that’s capable of controlling all active processes on every device connected to the corporate network.
  3. Revise personnel policies and control systems in order to adjust to privacy requirements and adapt them to the technology that’s available.
  4. Keep your operating systems updated and programs on all of your company’s devices.

Make sure that Halloween only comes once a year. Manage, control and protect your information against advanced threats with Panda Solutions for Companies.

The post Insiders, their costumes are so good you won’t even recognize them. appeared first on Panda Security Mediacenter.

(In)Security Cameras

camera panda security

When security cameras are more like a hole than a protecting Wall, you have a problem. Cameras are a double-edged sword and webcams are the perfect example of that: they allow people to keep in touch with their loved ones and help companies hold meetings regardless of the distance between participants. However, even Mark Zuckerberg covers his laptop camera for security reasons in order to avoid being spied on. The danger in this case seems obvious, but our laptop cameras are not the only ones that pose a certain risk.

Many companies use video surveillance systems, and security cameras obviously play a key part in those systems. Watching the areas that surround a company’s premises to prevent theft or try to identify potential trespassers is something essential for any organization. However, a network of surveillance cameras can also become a threat if attackers find a vulnerability in it.

This has been shown by a recent study carried out by a team of Hungarian researchers who found multiple vulnerabilities in the cameras of Taiwanese CCTV manufacturer AVTECH. These flaws could pose many risks to companies entrusting their business security to this maker’s devices if connected to the Internet.

Security, step-by-step

First, the cloud that these cameras connect to in order to sync data does not use the HTTPS protocol to secure transmissions. As a result, any cyber-criminal could be able to access the footage captured by the CCTV cameras, which could also be downloaded without needing to enter a username and password.

This way, an attacker with the necessary knowledge could obtain the images taken by a company’s video surveillance system, and use that information for more dangerous activities. They could use that information to, for example, find out the exact location of the security personnel at any time, find out if there are employees on the premises or if the place is empty, and even use the cameras to view passwords and confidential data.

In addition to the severity of the flaws, what really surprises us is the fact that AVTECH has not given any kind of explanation about the vulnerabilities discovered or any potential fixes. Obviously, any organization thats use surveillance products must be able to trust them as well as the makers that provide them, something that seems extremely difficult in this case.

Even though it’s true that any surveillance system can have its flaws, there are steps that can be taken to reduce the risk to businesses: do not connect video surveillance devices to the Internet, and keep your devices’ firmware always up to date.

The post (In)Security Cameras appeared first on Panda Security Mediacenter.

Most company training programs leave out important IT security information. Are you at risk?

formacion_FOTO1

Workers are the first and the weakest link in the security chain (including your boss), especially if they have not received adequate training to defend themselves against cyber-attackers. Sadly, if malware were to sieve into an employee’s Smartphone or mobile device it could potentially cost a company more than 8,000 euros. This is the beginning of the end, and opens the door for cyber-thieves to steal massive amounts of sensitive information from your company.

 

There are some basic tips that every company should give their employees to keep their personal data and computers protected against cybercriminals, like: confirming the identity of anyone requesting information, keeping passwords secure, and backing up their computer. Alarmingly, organizations are neglecting to share this security-related knowledge with their employees, as seen in a recent study.

 

46% of the companies who participated in the study assumed that this type of preparation or formation would be obligatory for all employees. But in fact, only 60% of the companies that have fallen victim to information theft oblige their workers to go through a learning period, which would educate them on internet security and ensure that confidential data will not be compromised.

 

As shown in a study, less than half of companies assumed that IT security training is obligatory for businesses

 

Sadly, for the companies who do have “training” programs, there is a lot of important information left out. In fact, many security training periods only educate workers about basic IT procedures. Approximately 43% of the surveyed companies offer a basic course for their employees, and usually they do not address many of the risks that often lead to cyber-attacks.

 

Phishing and social engineering are two main threats in our cyber-sphere, but only a small fraction (49%) of companies review them in their security courses. In addition, two significant topics that are barely talked about (if they’re talked about at all) at these training programs are: mobile device security (38% of courses include this subject) and Cloud security accounts (29%).

 

Knowledge is power. It is the greatest barrier against these type of internet-related attacks; the nightmare of a cyber-attack can be easily prevented if employees are taught how to use the internet in a responsible manner. Bots or no bots, when it comes to cyber-security strategies, humans are still a company’s greatest weakness or their greatest strength. Everything depends on the level of training that is available to them.

The post Most company training programs leave out important IT security information. Are you at risk? appeared first on Panda Security Mediacenter.