In the real world, I.T. professions need to make exceptions to rules. They need adjustable parameters, and they need the ability to audit the results of these policies. Businesses need to take a more pragmatic approach to security. They need to permit only what is required and trust nothing else. But that does not mean making it difficult to permit what is required.
Today I walked the exhibit hall at the RSA conference and spoke to numerous endpoint security vendors to ask them how they were dealing with new or unknown malware. While the specific answer varied depending on the vendor, all of the answers revolved around a similar strategy. According to the vendors at the booth’s the use of next generation endpoint security products were somehow now better at detecting malware. This was now magically possible because of technologies such as artificial intelligence, machine learning, or the latest algorithm.
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: "How can I make myself unhackable?" Seldom do they understand when I try to explain that there is no such thing as unhackable.
The purpose of this guide is to help business owners better understand cyber risks and how those risks can be reduced to an acceptable level. Securing your cyber environment is much like securing your house. It is impossible to make your house 100% secure, but you can take steps to reduce the risk of an intrusion. Most people take steps such as installing an alarm, high-grade locks, and a camera system. The rest of the risk is transferred to the insurance company.
ThreatLocker, C.E.O talks about how socially engineered text message encourages users to download software that could pose a risk.
As computer games evolve, gaming businesses are no longer just focusing on better graphics. Game manufacturers are turning to the internet for better collaboration, game rooms, multi-person battles, and even a marketplace to buy and sell items in a virtual world.
In the last 12 months, we have seen a growing number of people citing that Apple computers are more secure than Windows computers. We have also seen an increasing number of Macintosh computers with viruses.
We often hear that Macintosh computers are secure and cannot be hacked. The reasons vary from the fact that they build on a Unix base, that they are a different beast, or that Apple blocked unsigned software.
While none of these comments are wrong, they are also not right. It is true that generally speaking, people who use Macintosh computers get fewer viruses than those running Windows. There are many reasons for this, and one valid reason is that there are fewer Apple computers. Therefore, it is more difficult for viruses to spread.
Computer viruses generally stay within their own operating system. It is not common for viruses to be designed to run on multiple operating systems. This makes Mac computers less likely to be infected with a virus, as there are fewer hosts to transmit the virus. That said, the population of Macintosh computers is growing at a steady rate. As the number of people using Macintosh computers increases, so does the likelihood of contracting a virus.
Another point that is often made is that Macintosh computers will not let you run a file that is not digitally signed by a developer who is approved by Apple. While this has some truth, it is no different to Windows blocking the execution of downloaded files using the smart screen. If a user wishes to open the file, they still can just right-click (or two-finger-click) on the file, and then click "run." Anybody who uses a Mac regularly is very familiar with this and does it to install legitimate software all the time. This process is no more efficient than any other annoying error that users inevitably click "yes" to.
Macintosh users are often told that they do not need antivirus software, and not to worry about security on their Mac. However, users should install antivirus software, remain cautious about what software they install, and take all of the same security precautions as Windows users.
Mac computers are less likely to get a virus, but less likely does not mean "will not." Macintosh viruses are certainly not any less aggressive or damaging than Windows viruses. It is also worth remembering that viruses are not the only threat to consider. Quite often, hackers use legitimate RSAT tools to gain access to your data.
While the industry focuses on protecting Windows users, Mac users idly sit by as hackers eye up their computers, data, and financial records.
Businesses spend billions of dollars every year on cyber security products. firewalls, antivirus, IDS, dual factor authentication, Web and e-mail security are just some of the areas that billions of dollars are poured. Despite the enormous amounts of money and resources that are spent on cyber security, businesses are still hacked and infected with various malware threats.
While these security products are significant, the leading cause of pretty much all cyber breaches relate to humans.
The human threat to cybersecurity is broken down into two areas: intentional breaches and unintentional breaches. Unintentional breaches are the most common type of cybersecurity breach. In most cases, it occurs when a user executes some malware on their computer. The malware could be in the form of an e-mail attachment, a link in an e-mail, or downloading from the Internet.
The perpetrators are criminals looking to steal identities and infect computers with malware such the "Wanna Cry" ransomware.
Larger organizations equally suffer from untargeted attacks, but additionally suffer from more sophisticated targeted attacks that are intended to steal a particular set of data. An example of this is the 2016 DNC hack by Russian State sponsors, where malware installed on a PC allowed the hacker to gain access to the DNC's e-mails and documents.
ThreatLocker Control stops both types of attacks by blocking applications from running that have not been pre-authorized. ThreatLocker Control also provides a simple approval method for administrators to grant access to software that is permitted.
Intentional breaches are less frequent but usually have a much higher cost for the organization. The most notable one of these breaches was when Edward Snowden copied large volumes of information from the NSA and leaked it to the press. Meanwhile, the NSA was unaware that the data had even been copied.
This also happens in smaller businesses when a disgruntled employee decides to copy all the customer data and take it to a competitor. ThreatLocker Behavioral Monitor helps prevent these types of breaches. By monitoring day-to-day user activity and comparing access to previous patterns, ThreatLocker can identify possible data breaches and notify the relevant parties.
The ThreatLocker Behavioral Monitor keeps an audit of all accessed files that can be used in the litigation or investigation of cyber breaches. Whether the breach is intentional or unintentional, humans are a huge consideration when securing your business's infrastructure. Business managers and owners all like to trust the people they work with. Trusting your team is important for every business, but trusting your team not to make a mistake or not to knowingly cause a serious data breach will most likely at some point cause irrevocable damage.
Trust by verifying.
ThreatLocker attended the 2nd Annual Cyber Investing Summit at the New York Stock Exchange yesterday. During our visit, we found that the investment outlook on Cyber Security is growing, with a great belief that the market is a huge market and a stable investment.
The belief is that new legislation will help tackle cyber threats in the government and that critical infrastructure. However, we believe the NIST standard that the government is basing legislation on is the lowest common dominator and we would like to see a proactive plan for cyber security and not continuously being reactive.
There are several new products coming to market, many of which will make good ground in stepping up the level of security. However, the majority of the focus appears to be at server, transport and authentication level.
There was some content that helps address the human element of cyber security, by training users and creating better awareness. There were no new products that did anything tangible to take control and stop these threats.
Take Control of your business with ThreatLocker Control.
Author: Danny Jenkins C.E.O of ThreatLocker as a guest writer for Orlando Business Journal.
When Donald Trump mused during the first presidential debate that the culprit behind the hack of the Democratic National Committee could be “somebody sitting on their bed that weighs 400 pounds,” he may have echoed a common stereotype of the hacker as couch potato.