<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Krisi, Author at 3Cyber-Sec</title>
	<atom:link href="https://3cyber-sec.com/author/kris/feed/" rel="self" type="application/rss+xml" />
	<link>https://3cyber-sec.com/author/kris/</link>
	<description>Cyber Security</description>
	<lastBuildDate>Mon, 23 Aug 2021 14:51:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://3cyber-sec.com/wp-content/uploads/2021/05/cropped-profile_custom-32x32.png</url>
	<title>Krisi, Author at 3Cyber-Sec</title>
	<link>https://3cyber-sec.com/author/kris/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Experts&#8217; Talk: Why Do You Need to Encrypt Your Data</title>
		<link>https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/</link>
					<comments>https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 23 Aug 2021 14:51:45 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1168</guid>

					<description><![CDATA[<p>Encryption is the process through which cryptographers transform data into code intending to protect it from unauthorized access.</p>
<p>The post <a href="https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/">Experts&#8217; Talk: Why Do You Need to Encrypt Your Data</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It’s finally time for our next Experts’ Talk article and we’re excited to share unique trends, insights, and perspectives from the cybersecurity world with you. This month we are joined by the Information Security Expert and certified Cybersecurity Consultant <a href="https://www.linkedin.com/in/steliyan-petkov/">Steliyan Petkov</a> with whom we will be exploring the topic of why data encryption is important and how it can help you minimize cybersecurity risks for your organization. Steliyan Petkov is a well-known expert in the field of Cybersecurity who has valuable experience gained across the highly regulated FinTech and Pharmaceuticals Industries. He focuses on assessing and evaluating risk from which Information Security Strategies can be both developed and enhanced. Steliyan Petkov’s expertise is further supported by his CISM, CISSP, and CDPSE Certifications.</p>
<h2>What does it mean to encrypt your data?</h2>
<p>So let’s not waste a minute and get started by defining what exactly does data encryption mean. Encryption is the process through which cryptographers transform data into code intending to protect it from unauthorized access. Usually, the sensitive data is scrambled and ordered in a practically unreadable way, and the information that it gives out does not make any sense. This unreadable text is referred to as ciphertext. To read the information users have to decrypt the ciphertext so that it transforms to its initial state of plaintext.</p>
<blockquote><p><em>“Encrypting data is not a new concept, it has been around for centuries. One of the oldest and most widely-known encryption techniques is the so-called Caesar&#8217;s cipher, named after the infamous Julius Caesar who used it to protect military messages. To encrypt a message using Caesar&#8217;s cipher you would need to replace each letter from the plaintext with a letter from the alphabet that is positioned a certain number of spaces before the letter that you need to replace. We refer to this number as the key because if the user knows what the number is, they can easily decipher the message. It sounds complicated, but it is actually pretty simple. So, for example, if you select the number 4 to be your key, then the letter A in the plaintext will be substituted by the letter W in the ciphertext, while the letter D will be switched for an A and so on. This method of encryption is called a substitution cipher, and while it was useful some decades ago, now we need to use more complicated methods of encryption.”</em>, shares Steliyan Petkov.</p></blockquote>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-1169 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36-480x240.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>So, for example, if you wanted to encrypt the word “CYBERSECURITY” by using Caesar&#8217;s cipher with a key of 3, you would end up with the following ciphertext: “ZVYBOPEZROFQV”. Another historical use of substitution cipher during WW2 is when the German Enigma machine was invented to help military officials send and receive secret information in the form of substitution cipher.</p>
<p>The encryption of data is still widely used today and it is arguably one of the essential cybersecurity practices. In fact, organizations and companies are often obligated to encrypt any sensitive data that they store or send via diverse communication platforms on the Internet. As Steliyan Petkov puts it, encryption could not only protect organizations from being hacked, but in case of an existing cyberattack, encryption could also make the difference between a massive breach of personal data and a compromising of unreadable ciphertext.</p>
<blockquote><p><em>“If you don’t encrypt the sensitive data your company handles, you are exposing your business to enormous risk. And I’m not only talking about the risk of a data breach, but also the risk of non-compliance with certain regulations and industry requirements. Consequently, if you’re not compliant, you may be faced with fines and reputational damages.”</em>, adds Petkov.</p></blockquote>
<p>Before we share which regulations require businesses to encrypt their data, however, we’ll first explore the different types of encryption used today.</p>
<h2>Types of Encryption</h2>
<p>There are two main types of encryption &#8211; Symmetric and Asymmetric (also known as public-key encryption). The differences between them lie in the speed of the process, the number of keys needed to encrypt and decrypt data, the length of the keys, as well as the means through which the keys are shared with other parties (key management).</p>
<ul>
<li>
<h3>Symmetric</h3>
</li>
</ul>
<p>This type of encryption uses one key for both processes &#8211; encryption and decryption. So, for example, if you want to send a secret message to John, you need to provide him with the encryption key, so that he can decrypt your message. Therefore, the risks associated with symmetric encryption are higher. As Steliyan Petkov explains it:</p>
<blockquote><p><em>“When only one key is used for encryption and decryption, both parties that participate in the communication need to know what that key is. Thus, the key needs to be exchanged and if this process is not done safely, the key could fall in the wrong hands. For example, you cannot simply send the key to the other party via email without it being encrypted itself. There are specific procedures that need to be followed when it comes to key management.”</em></p></blockquote>
<p><img decoding="async" class="alignnone wp-image-1171 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37-480x240.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<ul>
<li>
<h3>Asymmetric</h3>
</li>
</ul>
<p>With asymmetric encryption, there are two keys involved &#8211; one for encrypting the message (a public key) and one used to decrypt it (a private key). When this method is used, the sender encrypts the message with the public key and the receiver decrypts it with his/her private key.</p>
<blockquote><p><em>“The public key is available to anyone, hence the name. On the other hand, the private key is only known by the person receiving the message. Therefore, asymmetrically encrypted messages are less likely to be compromised by cybercriminals.”</em>, clarifies Petkov.</p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1172 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Because symmetric encryption is not as complicated as asymmetric, it is also a much faster process. Furthermore, the recommended length of the keys associated with both types of encryption is different. While in our example with Caesar&#8217;s cipher we only used a key containing one number (3), in reality, encryption keys consist of hundreds or thousands of numbers.</p>
<blockquote><p><em>“The encryption keys are essentially strings of symbols (digits, letters and some special characters) with different lengths. They could consist of 128, 192, or 256 numbers (professionals usually refer to those numbers as bits) and could even contain more than 2048 bits. At the time of writing, the recommended symmetric key length is 128 bits and higher, while the length for asymmetric keys is 2048 bits and higher.”</em>, shares Steliyan Petkov.</p></blockquote>
<h2>Why should you encrypt your sensitive data?</h2>
<p>Encrypting your data is crucial for your organization’s cybersecurity regardless of the industry your business operates in. Steliyan Petkov shares that many industry regulations require companies to encrypt their sensitive data:</p>
<blockquote><p><em>“Whether your business operates in the financial, healthcare, or any other sector, it’s strongly advisable, and in some cases compulsory, to encrypt the sensitive data you handle. The Health Insurance Portability and Accountability Act (HIPAA), for example, requires organizations to protect patients’ data via encryption or an equivalent alternative. Additionally, businesses can avoid hefty data breach fines from the California Consumer Privacy Act (CCPA) if the breached data cannot be accessed without a decryption key. Not to mention that the Payment Card Industry Data Security Standard (PCI DSS), as well as the Federal Information Processing Standards (FIPS) require organizations to encrypt sensitive data and anyone who fails to do so will be faced with expensive penalties.”</em></p></blockquote>
<p>According to<a href="https://info.entrust.com/rs/104-QOX-775/images/global-encryption-trends-study-re_es.pdf"> The Global Encryption Trends Study 2021</a> by Entrust, the data types that were routinely encrypted in 2020 were payment-related data (55%), financial records (55%), intellectual property (48%), employee data (48%), customer information (42%), healthcare information (26%), and non-financial business information (25%). Furthermore, according to the same study, the top four reasons for encryption in 2020 were:</p>
<ul>
<li>Protecting customer information &#8211; 54%</li>
<li>Protecting information against specific, defined threats &#8211; 50%</li>
<li>Protecting intellectual property &#8211; 49%</li>
<li>Complying with privacy or data security regulations and requirements &#8211; 45%</li>
</ul>
<p>It’s best if you outsource the task of encrypting your data to a professional cybersecurity team with the needed experience and expertise. 3Cyber-Sec’s team can protect your organization from cyber threats. As a boutique cybersecurity consultancy, we are passionate about providing tailored solutions to each of our clients and we’re always ready for new challenges. <a href="https://3cyber-sec.com/contact-us/">Contact us for a free consultation now</a>.</p>
<p>Did you enjoy our article? For more expert advice, read our last month’s talk, when we were joined by 3Cyber-Sec’s Business Development Manager and certified Cybersecurity Consultant Todor Kunev. Together with him, we discussed<a href="https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/"> the dangers phishing attacks propose for businesses and individuals.</a></p>
<p>The post <a href="https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/">Experts&#8217; Talk: Why Do You Need to Encrypt Your Data</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Curious Case of The SolarWinds Cyberattack</title>
		<link>https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/</link>
					<comments>https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 09 Aug 2021 11:13:26 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1182</guid>

					<description><![CDATA[<p>After the global media outburst during the last few months, it is safe to say that the SolarWinds cyberattack is fairly popular and many people know about it today. However, this does not change the fact that no one was prepared for the unprecedented hack while it was taking place.</p>
<p>The post <a href="https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/">The Curious Case of The SolarWinds Cyberattack</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">After the global media outburst during the last few months, it is safe to say that the SolarWinds cyberattack is fairly popular and many people know about it today. However, this does not change the fact that no one was prepared for the unprecedented hack while it was taking place.  </span></p>
<p><span style="font-weight: 400;">We’ve witnessed several US federal agencies and thousands of businesses being compromised with (possibly) a single supply chain cyberattack targeting SolarWinds &#8211; a company that provides network monitoring products to top USA state-owned and public organizations. What’s unique about this attack is its sheer magnitude. It was executed in a professional and precise manner with the help of complicated techniques. The cybercriminals behind it were highly knowledgeable and experienced hackers. They used sophisticated methods that enabled them to attack multiple companies while remaining undetected for at least 10 months. </span></p>
<p><span style="font-weight: 400;">While the investigation as to what exactly happened, who is responsible, and what will be the consequences is still ongoing, we’re here to take a look at this curious case and shed light on the key findings available to the public so far.</span></p>
<h2><span style="font-weight: 400;">How was the SolarWinds cyberattack performed, who was compromised, and who is responsible?</span></h2>
<blockquote><p><span style="font-weight: 400;">The SolarWinds hack was a supply-chain attack. </span></p></blockquote>
<p><span style="font-weight: 400;">Cyberattacks of this kind can compromise the security of a given organization through third-party providers who have access to the organization&#8217;s network, systems, and data. In this case, the hacked third-party provider was SolarWinds. As a result, </span><a href="https://whatis.techtarget.com/feature/SolarWinds-hack-explained-Everything-you-need-to-know"><span style="font-weight: 400;">over 18 000 networks, systems, and data were compromised</span></a><span style="font-weight: 400;">. Additionally, more than 200 private businesses (including big names such as Microsoft, Cisco, FireEye, and Intel) and </span><a href="https://www.nbcnews.com/news/us-news/russian-hackers-breach-u-s-government-effort-aimed-agencies-private-n1251057"><span style="font-weight: 400;">several federal agencies</span></a><span style="font-weight: 400;"> including the US Department of Commerce, the US Department of Homeland Security, the US Department of the Treasury, the National Institutes of Health, the US Department of Energy, and the National Nuclear Security Administration were also affected by the attack.  </span></p>
<p><span style="font-weight: 400;">Although it is still not confirmed who is responsible for the hack, </span><a href="https://www.wsj.com/articles/pompeo-blames-russia-for-solarwinds-hack-11608391515"><span style="font-weight: 400;">US government officials</span></a><span style="font-weight: 400;"> and popular media websites such as The </span><a href="https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html"><span style="font-weight: 400;">Washington Post</span></a><span style="font-weight: 400;">, have claimed that the attack was performed by a <strong>Russian hacking group referred to as APT29 or Cozy Bear</strong>. The idea that the hacking group was state-funded and a part of Russia&#8217;s foreign intelligence service was also mentioned to the public. Donald Trump, on the other hand, </span><a href="https://www.businessinsider.com/solarwinds-software-cybersecurity-breach-trump-russia-china-pompeo-technology-2020-12"><span style="font-weight: 400;">posted a tweet about two weeks after the attack’s</span></a><span style="font-weight: 400;"> discovery in which he expressed his beliefs that China may be the one behind it. That said, for the time being, there is no proof that either of the two countries was involved.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1183 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189.png" alt="" width="1200" height="492" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189-980x492.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189-480x270.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><a href="https://www.zdnet.com/article/microsoft-solarwinds-attack-took-more-than-1000-engineers-to-create/"><span style="font-weight: 400;">According to Microsoft</span></a><span style="font-weight: 400;">, there were more than a thousand cybercriminals who participated in the creation of the SolarWinds cyberattack and they must have had incredible skill sets. </span><a href="https://www.kiuwan.com/solarwinds-hack-timeline/"><span style="font-weight: 400;">It is believed</span></a><span style="font-weight: 400;"> that the initial hack took place way back in September 2019 when the attackers used a highly sophisticated malicious software referred to as </span><b>SUNSPOT</b><span style="font-weight: 400;"> to insert the now-infamous </span><b>SUNBURST</b><span style="font-weight: 400;"> malware into SolarWinds’ IT management software product </span><a href="https://www.solarwinds.com/orion-platform"><span style="font-weight: 400;">Orion</span></a><span style="font-weight: 400;">. The cybercriminals were able to replace one of Orion’s source files and add the SUNBURST backdoor code to it, which allowed them to bypass the cybersecurity defense systems that were in place, gain access to SolarWinds’ networks, as well as to SolarWinds’ clients’ networks, transfer files, execute files, profile the system, reboot the machine, and disable system services. As</span><a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html"><span style="font-weight: 400;"> FireEye shares:</span></a></p>
<blockquote><p><span style="font-weight: 400;">The malware masked its network traffic as Orion Improvement Program (OIP) traffic and stored reconnaissance results within legitimate plugin configuration files, enabling it to blend in with legitimate SolarWinds activity. </span></p></blockquote>
<p><span style="font-weight: 400;">The SUNBURST backdoor enabled the attackers to introduce another malicious software, which was used to trojanize a series of Orion update fails, which were released by the IT service provider SolarWinds between March 2020 and June 2020, </span><a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html"><span style="font-weight: 400;">as CSO shares</span></a><span style="font-weight: 400;">. Once they gained access to the compromised systems, the hacker group was careful not to leave any traces and preferred to steal and use credentials to move laterally through the networks and establish remote access.</span></p>
<h2>Detection and Response</h2>
<p><span style="font-weight: 400;">The hack was first detected by the cybersecurity company FireEye at the beginning of December 2020. </span><a href="https://edition.cnn.com/videos/business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness/video/playlists/business-cybersecurity/"><span style="font-weight: 400;">FireEye discovered that there has been unauthorized access</span></a><span style="font-weight: 400;"> to their systems and traced back the trail to SolarWinds. On the same day, 13th of December 2020, the USA’s Cybersecurity and Infrastructure Security Agency (CISA) issued an </span><a href="https://cyber.dhs.gov/ed/21-01/"><span style="font-weight: 400;">emergency directive</span></a><span style="font-weight: 400;"> with instructions for mitigating SolarWinds Orion Code Compromise. Furthermore, SolarWinds started informing its clients via </span><a href="https://twitter.com/solarwinds/status/1338325699300651018"><span style="font-weight: 400;">Tweets</span></a><span style="font-weight: 400;"> that they need to immediately upgrade the Orion Platform to another version to address the vulnerability. Shortly after, </span><a href="https://investors.solarwinds.com/news/news-details/2020/SolarWinds-Releases-Updates-to-Address-Vulnerability-Related-to-SUPERNOVA-Malware/default.aspx"><span style="font-weight: 400;">SolarWinds introduced two additional updates</span></a><span style="font-weight: 400;"> that were meant to serve as “hotfixes” along with instructions for their implementation.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1184 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998.png" alt="" width="1200" height="402" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998-980x402.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998-480x270.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">In mid-December, FireEye discovered a “killswitch”, which could block the functions of the malware and prevent it from doing further harm. However, as </span><a href="https://www.darkreading.com/attacks-breaches/fireeye-identifies-killswitch-for-solarwinds-malware-as-victims-scramble-to-respond/d/d-id/1339746"><span style="font-weight: 400;">darkreading.com shares:</span></a><span style="font-weight: 400;"> </span></p>
<blockquote><p><span style="font-weight: 400;">FireEye’s fix wasn’t effective for networks where the attackers might have already deployed additional persistence mechanisms. </span></p></blockquote>
<p><span style="font-weight: 400;">The scope of the attack became clear by the end of December when the majority of the victims were named in the press. At the beginning of January 2021 </span><a href="https://www.cisa.gov/news/2021/01/05/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure"><span style="font-weight: 400;">a joint statement </span></a><span style="font-weight: 400;">by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) was released. The statement informed that the National Security Council staff has stood up a task force construct composed of the FBI, CISA, and ODNI and supported by NSA. The task force group was named Cyber Unified Coordination Group and its main purpose was to “</span><i><span style="font-weight: 400;">coordinate the investigation and remediation of this significant cyber incident involving federal government networks</span></i><span style="font-weight: 400;">”. On the 6th of January CISA issued supplemental guidance in relation to the emergency directive for mitigation of the SolarWinds hack. Furthermore, the security agency updated the directive with additional information and instructions once more &#8211; on the 22nd of April. </span></p>
<p><span style="font-weight: 400;">At the end of January 2021, CISA issued a</span><a href="https://us-cert.cisa.gov/ncas/analysis-reports/ar21-027a"><span style="font-weight: 400;"> malware analysis report</span></a><span style="font-weight: 400;"> with technical details about the malicious software used for the attack, while SolarWinds also published a </span><a href="https://www.solarwinds.com/sa-overview/securityadvisory"><span style="font-weight: 400;">security advisory </span></a><span style="font-weight: 400;">with information about the company’s response to the incident. Around one month later, in late February, the national security adviser Jake Sullivan announced during </span><a href="https://edition.cnn.com/2021/02/19/politics/sullivan-solarwinds-khashoggi/index.html"><span style="font-weight: 400;">an interview for CNN</span></a><span style="font-weight: 400;"> that the US administration is working towards addressing those responsible for the attack within weeks: </span></p>
<blockquote><p><i><span style="font-weight: 400;">We are in the process now of working through a series of steps to respond to Solar Winds, including steps that will hold who we believe is responsible for this and accountable, and you will be hearing about this in short order. We&#8217;re not talking about months from now, but weeks from now, that the United States will be prepared to take the first steps in response to solar winds</span></i><span style="font-weight: 400;">.</span></p></blockquote>
<p><span style="font-weight: 400;">The cyberattack was so sophisticated that it became the reason for several council hearings the first of which </span><a href="https://www.reuters.com/article/us-usa-cyber-solarwinds-idUSKBN2AI2NN"><span style="font-weight: 400;">was held </span></a><span style="font-weight: 400;">on the 23rd of February by the US Senate intelligence committee. During the hearing executives from SolarWinds, Microsoft, FireEye, and CrowdStrike discussed the attack. As </span><a href="https://seekingalpha.com/pr/18204767-tech-firms-say-little-doubt-russia-behind-major-hack"><span style="font-weight: 400;">Associated Press</span></a><span style="font-weight: 400;"> informs, the CEO of FireEye, Kevin Mandia, told the Senate that his company has had nearly 100 people working to study and contain the breach since they detected it in December 2020. On February 26th the executives from SolarWinds, FireEye, and Microsoft were summoned once more to testify before a</span><a href="https://www.c-span.org/video/?509349-2/house-hearing-solarwinds-hack"><span style="font-weight: 400;"> joined house hearing</span></a><span style="font-weight: 400;"> held by the US House of Representatives&#8217; Oversight and Homeland Security Committees. The main topics of the hearing were concerned with how and why did the SolarWinds hack happened, was classified government information compromised, and what are the existing vulnerabilities to the cyber supply chain.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1185 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">At the beginning of March 2021, CISA issued another set of guides on remediating networks affected by the SolarWinds hacks and encouraged affected organizations to review and apply the necessary guidance. At the end of the same month, news broke that the SolarWinds hacker group also managed to access email accounts belonging to the Trump administration’s head of the Department of Homeland Security and DHS cybersecurity staff members whose jobs included hunting threats from foreign countries, as </span><a href="https://apnews.com/article/solarwinds-hack-email-top-dhs-officials-8bcd4a4eb3be1f8f98244766bae70395"><span style="font-weight: 400;">Associated Press shares</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">One of the last actions in response to the SolarWinds cyberattack was undertaken a couple of weeks ago when on June 21st the US Securities and Exchange Commission started an investigation that aims to determine if any of the compromised companies failed to disclose that they had been affected by the SolarWinds hack, </span><a href="https://www.reuters.com/technology/us-sec-official-says-agency-has-begun-probe-cyber-breach-by-solarwinds-2021-06-21/"><span style="font-weight: 400;">as reported by Reuters</span></a><span style="font-weight: 400;">.</span></p>
<h2>Consequences of the SolarWinds Cyberattack</h2>
<p><span style="font-weight: 400;">Even now, one year and nine months after the initial SolarWinds cyberattack and seven months after the hack’s discovery, the investigation and remediation activities continue.</span><a href="https://www.technologyreview.com/2021/03/02/1020166/solarwinds-brandon-wales-hack-recovery-18-months/"><span style="font-weight: 400;"> According to Brandon Wales</span></a><span style="font-weight: 400;">, the acting director of CISA, officials will have fully secured the compromised government networks not earlier than 2022. Additionally, Wales said that even fully understanding the extent of the damage will take months and it could take up to 18 months before the US government recovers from the SolarWinds hack: </span></p>
<blockquote><p><span style="font-weight: 400;">There are two phases for response to this incident. There is the short-term remediation effort, where we look to remove the adversary from the network, shutting down accounts they control, and shutting down entry points the adversary used to access networks. But given the amount of time they were inside these networks—months—strategic recovery will take time</span><i><span style="font-weight: 400;">.</span></i></p></blockquote>
<p><span style="font-weight: 400;"><strong>Of course, the biggest, scariest, and most obvious outcome of the SolarWinds attack is the fact that thousands of private and several government organizations were compromised.</strong> It shouldn’t come as a surprise that </span><a href="https://www.techrepublic.com/article/how-the-solarwinds-attack-may-affect-your-organizations-cybersecurity/"><span style="font-weight: 400;">according to a survey by Domain Tool</span></a><span style="font-weight: 400;">s, 96% of the 200 respondents, amongst which global security specialists and executives, were concerned by the SolarWinds cyberattack. Furthermore, 60% of the impacted respondents said they were still not sure whether the compromised data was breached and 21% admitted that their sensitive data was in fact breached. </span></p>
<p><span style="font-weight: 400;">It is not a secret that cyberattacks often lead to a damaged reputation and the SolarWinds case isn’t an exception. SolarWinds was planning to spin out SolarWinds MSP &#8211; another service offered by the company which provides monitoring and management IT solutions. After the attack, however, SolarWinds decided to re-brand their MSP business, which is now known as N-able. According to </span><a href="https://www.channele2e.com/news/n-able-spin-out-on-track-for-q2-2021/"><span style="font-weight: 400;">channele2e.com</span></a><span style="font-weight: 400;">, although company officials have stated that the N-able business and associated MSP software were not involved in the Orion attack, the January 2021 sales in the MSP software business were slightly impacted by it.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1186 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">The attack is also going to cost a lot of money. According to </span><a href="https://www.msspalert.com/cybersecurity-news/solarwinds-revenue-earnings-after-hack/"><span style="font-weight: 400;">MSSP Alert</span></a><span style="font-weight: 400;">, <strong>SolarWinds said that it already had to pay $3.5 million in one-time expenses</strong> related to the hack. Furthermore, <strong>the company’s executives said that they estimate costs of $20 million to $25 million related to the hack</strong> and going towards upgrading the company’s security posture in 2021. </span></p>
<p><span style="font-weight: 400;">No one is safe against innovative cyberattack methods &#8211; that is the essential lesson to learn from the sophisticated SolarWinds hack. Businesses have to be cautious when trusting third-party providers regardless of how well-known their brands are. Furthermore, cybersecurity experts and companies should continuously strive to better their defense mechanisms so that they can respond adequately and mitigate future risks. Last but not least, organizations need to achieve greater visibility concerning the vulnerabilities of their systems and networks. </span></p>
<p><span style="font-weight: 400;">If you need help with identifying the vulnerabilities of your systems or if you seek expert cybersecurity advice, </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">contact us for a free consultation</span></a><span style="font-weight: 400;">. 3Cyber-Sec is a boutique cybersecurity consultancy company. Our primary focus lies in the development of cyber and information security control frameworks, infrastructure as well as vulnerability management solutions.</span></p>
<p>The post <a href="https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/">The Curious Case of The SolarWinds Cyberattack</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What Is Vulnerability Assessment And Why Is It Important?</title>
		<link>https://3cyber-sec.com/2021/07/26/what-is-vulnerability-assessment-and-why-is-it-important/</link>
					<comments>https://3cyber-sec.com/2021/07/26/what-is-vulnerability-assessment-and-why-is-it-important/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 26 Jul 2021 10:32:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity Explained]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1159</guid>

					<description><![CDATA[<p>Vulnerability assessments determine the extent to which a technology asset could be threatened by a potential circumstance or event.</p>
<p>The post <a href="https://3cyber-sec.com/2021/07/26/what-is-vulnerability-assessment-and-why-is-it-important/">What Is Vulnerability Assessment And Why Is It Important?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With the ever-developing digitalization further enhanced by the global pandemic, new technological advances, and innovative network systems are constantly being introduced to our society. To remain competitive and continue to conduct business successfully, organizations incorporate technology and networks in their everyday activities more than ever before. In fact,<a href="https://topdesignfirms.com/web-design/blog/online-presence-management"> according to Top Design Firms’ survey</a>, 71% of small businesses have a company website, and 44% of those without a website plan to create one this year.</p>
<p>Although those shifts have many positive aspects, such as easier and faster customer service, they also propose cybersecurity risks for organizations. <a href="https://www.retarus.com/blog/en/alarming-cybersecurity-statistics-for-2021-and-the-future/">Retarus.com</a> shares some quite alarming statistics connected to cyberattacks in the last couple of years, including the fact that in comparison to 2019 we’re witnessing 358% more malware attacks and 435% more ransomware attacks. Therefore, businesses need to take the necessary measures and protect themselves and their clients against cybercriminals. The first step to the cybersecurity of any company, however, is outlining the key vulnerabilities associated with the organization’s specific industry and business type. To do this cybersecurity specialists conduct vulnerability assessments.</p>
<h2>What is a vulnerability assessment?</h2>
<blockquote><p>Essentially, a vulnerability assessment is an ongoing process that identifies the security vulnerabilities of a given company’s network system, IT applications, and infrastructure by performing security scans either manually or with the help of automated testing tools.</p></blockquote>
<p>In other words, it is used to determine the extent to which a technology asset could be threatened by a potential circumstance or event. Once the threats and the weak spots are outlined, cybersecurity specialists create a vulnerability assessment report that includes detailed information about the findings. Vulnerability assessment reports enable organizations to gain a clear understanding of their security posture and take the necessary actions to mitigate or eliminate any cybersecurity risks they may be faced with.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1160 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-34-e1627461593115.png" alt="" width="1200" height="483" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-34-e1627461593115.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-34-e1627461593115-980x483.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-34-e1627461593115-480x270.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>When performing vulnerability assessments cybersecurity specialists not only quantify the vulnerabilities but also analyze and prioritize them based on predefined risks. Moreover, vulnerability assessments are a component of the company&#8217;s holistic security program to maintain compliance with popular industry standards, like for example <a href="https://3cyber-sec.com/iso-27001-certification/">ISO27001</a>, <a href="https://3cyber-sec.com/pci-dss-compliance/">PCI DSS</a>, <a href="https://3cyber-sec.com/swift-security-program/">SWIFT Customer Security Program</a> (for financial institutions), and HIPPA (for the healthcare sector), and many more.</p>
<p>It is important for business owners to differentiate between <a href="https://3cyber-sec.com/penetration-testing/">penetration testing</a> and vulnerability assessment, as although similar, each of both services has a unique nature. While the latter can help outline vulnerable spots in the systems of a given organization via scans, penetration testing goes much deeper into those vulnerabilities to determine their potential impact. In this sense, vulnerability assessment and penetration testing complement each other and can be used together to gain a better and more comprehensive understanding of the critical threats for the organization.</p>
<h2>Types of Vulnerability Assessment</h2>
<p>In terms of the examined areas of a company’s infrastructure, there are three main types of vulnerability assessments:</p>
<ul>
<li>
<h3>External Scans</h3>
</li>
</ul>
<p>They aim to outline vulnerabilities in the external IT infrastructure which can be accessed from anybody through the Internet. Cybersecurity experts conduct external vulnerability assessments without having physical access to the scanned network.</p>
<ul>
<li>
<h3>Internal Scans</h3>
</li>
</ul>
<p>Internal Scans are used to detect vulnerabilities in the network of a given organization and, unlike external scans, are performed with full access to the scanned organization’s internal network. These types of scans can outline security gaps inside a company’s network and detect already existing malware, which has penetrated the defense systems.</p>
<ul>
<li>
<h3>Environmental Scans</h3>
</li>
</ul>
<p>These scans aim to outline vulnerabilities connected to the specific operational technologies a given organization uses, for example, cloud services, mobile devices, and IoT.</p>
<p><strong>Additionally, vulnerability scans can also be classified based on the assets they examine:</strong></p>
<ul>
<li>Network-based scans: aim to detect if any unauthorized devices or users are connected to the network</li>
<li>Host-based scans: aim to outline vulnerabilities on workstations, servers, or other network hosts</li>
<li>Wireless scans: aim to detect unauthorized open Wi-Fi networks in the organization’s infrastructure</li>
<li>Database scans: aim to discover vulnerabilities in the database of a given organization</li>
<li>Application scans: aim to detect vulnerabilities in web- and mobile-based applications</li>
</ul>
<h2>The vulnerability assessment process</h2>
<p>Any <a href="https://3cyber-sec.com/vulnerability-assessment/">vulnerability assessment</a> regardless of its type is conducted by following the same steps: Planning, Asset Discovery, Conducting the Scans, Analyzing the Findings, Creating a Remediation Plan, Recommendations.</p>
<p>During the planning stage, cybersecurity experts will research the organization’s network and environment to familiarize themselves with the specifics of the particular business. Within the Asset Discovery process, they will also outline the main goals of the vulnerability assessment and will determine which assets need to be scanned in order for the assessment’s objectives to be met. Then, the cybersecurity experts will either use manual or automated tools to scan the organization’s network. Usually, the scanning will result in a list of vulnerabilities and the level of their severity according to the Common Vulnerability Scoring System (CVSS). <a href="https://www.first.org/cvss/">CVSS is a published standard used by organizations worldwide</a>. It is a system that produces a numerical score reflecting the severity of a given vulnerability and labeling it as either low, medium, high, or critical.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1161 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-35.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-35.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-35-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-35-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Once the scans are completed and the vulnerabilities, as well as their severities, are outlined, the experts will then analyze the findings of the scans. They will rule out any false positive signals, evaluate and interpret the results and the risks, and outline the possible causes of the vulnerabilities. Last but not least, the cybersecurity experts will create a thorough report and an appropriate mitigation plan that focuses on the highest severity priorities and that is tailored to reflect the unique nature of the organization and its operations.</p>
<blockquote><p>Furthermore, vulnerability assessment is and should be an ongoing process.</p></blockquote>
<p>A single assessment can only provide you with a snapshot of your security posture at a given moment in time and does not guarantee that after a few months your network will be still facing the same vulnerabilities (or that it will be still secured once you’ve implemented the mitigation or remediation solutions). Therefore, to maintain a good security posture and to keep compliant with the industry regulations organizations need to continuously conduct vulnerability assessments. Deriving from these facts, it is safe to say that the final step of vulnerability assessment is repetition.</p>
<h2>Why is vulnerability assessment important?</h2>
<p>One of the key benefits of vulnerability assessment is the fact that it helps organizations improve their cybersecurity visibility and gain valuable information about the threats they may be faced with. Visibility is crucial because you cannot protect what you cannot see.<a href="https://cdn2.hubspot.net/hubfs/4118561/BCC030%20Vulnerability%20Stats%20Report%20(2020)_WEB.pdf"> According to Edgescan’s vulnerability statistics report</a> from 2020, 64% of professionals admitted to not being fully aware of their organization’s web applications or end-points. Furthermore, nearly 68% believe their visibility is ‘average’ while acknowledging they do not monitor some connected devices. This data emphasizes the significant lack of visibility into assets for most organizations, which is alarming but can be improved by conducting regular vulnerability assessments.</p>
<p>Furthermore, <a href="https://info.edgescan.com/hubfs/Edgescan2021StatsReport.pdf">Edgescan’s 2021 vulnerability statistics report</a> points out that 50% of the vulnerabilities discovered in internal web applications were rated as high or critical risk, while external networks have a high or critical risk density of 32%. Additionally, the report shows that the average time needed for mitigating high-risk vulnerabilities is 84.4 days while critical-risk vulnerabilities are usually mitigated within 50.9 days. During this time cybercriminals can take advantage of the weak spots in the organization, which can lead to data breaches and different types of cyberattacks. Consequently, this could cost the business even more time and money to recover. Therefore, the faster those vulnerabilities are detected, the quicker they will be resolved and won’t propose any threats to the organization.</p>
<p>Vulnerability assessment can not only help businesses ensure the safety of their organization, but it can also serve as proof of the security posture of a given company. Moreover, vulnerability assessment is a key part of becoming compliant with certain industry regulations such as and not limited to ISO27000, PCI DSS, SWIFT Security Program, and HIPPA, as mentioned above. Last but not least, vulnerability assessments can help organizations evaluate the risks third-party service providers propose to the business.</p>
<p>Don’t hesitate to <a href="https://3cyber-sec.com/contact-us/">contact us</a> if it’s time for evaluation of the vulnerabilities of your company’s network, or if you simply have any questions about vulnerability assessments and cybersecurity as a whole. <a href="https://3cyber-sec.com/our-team/">3Cyber-Sec’s team</a> is always ready to help by providing tailored solutions to organizations operating in diverse industries. Our expertise and collaborative approach allow us to focus on and respond to the specific needs of each of our clients.</p>
<p>The post <a href="https://3cyber-sec.com/2021/07/26/what-is-vulnerability-assessment-and-why-is-it-important/">What Is Vulnerability Assessment And Why Is It Important?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/07/26/what-is-vulnerability-assessment-and-why-is-it-important/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts’ Talk: What Is Phishing And How Can You Spot It?</title>
		<link>https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/</link>
					<comments>https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 10:28:41 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=911</guid>

					<description><![CDATA[<p>3Cyber-Sec’s business development manager and certified cybersecurity consultant Todor Kunev gets to the bottom of phishing attacks and the dangers they propose for businesses and individuals.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/">Experts’ Talk: What Is Phishing And How Can You Spot It?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to the first post from 3Cyber-Sec’s monthly rubric “Experts’ Talk”! Each month we’ll be talking to recognized cybersecurity experts with the goal of shedding light on some of the key topics connected to the cyber world. Our guest experts will provide exclusively for our readers their unique perspectives on diverse questions in connection to their field of expertise. With years of experience and dozens of solved problems, they will give you essential advice that can save your business and help you stay afloat even in your hardest times. Make sure you don’t miss any publications from our sequence so you can stay on top of the latest trends and insights from the cybersecurity world and ensure your business’s safety.</p>
<p>Today, together with 3Cyber-Sec’s business development manager and certified cybersecurity consultant <a href="https://www.linkedin.com/in/todor-kunev/">Todor Kunev</a>, we’ll be getting to the bottom of phishing attacks and the dangers they propose for businesses and individuals. Todor Kunev is an exceptional industry professional, capable of devising and implementing cybersecurity scenarios to strengthen cybersecurity and safeguard sensitive information and systems for his clients. To achieve his current level of expertise, Todor has spent years working towards obtaining his licenses and certificates some of which include CDPSE, CISM, CCNP, and CCNA. He was eager to share his take on phishing with us, hoping that his advice might elevate some of the misunderstandings connected to the topic.</p>
<p>Let us explain what phishing is. It has nothing to do with the relaxing lake-house weekend you might be imagining. Although the word sounds just like the well-known hobby of fishing, phishing is not about you catching fish, but rather it’s about you being preyed upon by cybercriminals. In essence, this cyberattack type uses socially engineered emails (or in some cases text messages and voice calls) with the malicious intent to direct users to dangerous websites, distribute malware, collect credentials, and more.</p>
<p>As Todor Kunev puts it:</p>
<blockquote><p><em> “All phishing attacks aim to create a sense of urgency, provoke users’ interest or inflict fear. Once they’ve succeeded in grabbing users’ attention, cybercriminals usually propose a solution to the “urgent matter” in the form of a downloadable document or a link leading to a malicious website.”</em></p></blockquote>
<p>It is one of the most popular cyberattack methods which is widely used today. In 2020 alone, 75% of organizations had experienced phishing attacks, according to<a href="https://www.proofpoint.com/sites/default/files/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf"> research conducted by Proofpoint</a>. Furthermore, 74% of the attacks that targeted businesses in the US were successful. This data is concerning especially given the fact that phishing attacks could cost organizations $3.8 million on average, as reported by <a href="https://retruster.com/blog/phishing-attack-true-cost.html">retruster.com</a>. Therefore, businesses should do everything in their power to prevent this from happening to their organizations.</p>
<p>&nbsp;</p>
<h2>Types of phishing attacks</h2>
<p>There are quite a few types of phishing attacks depending on the communication channel and method used for the attack, as well as on its target. In terms of communication channels, we can outline four main types of phishing attacks &#8211; email phishing, smishing, search engine phishing, and vishing. As reported by <a href="https://www.tessian.com/blog/phishing-statistics-2020/">Tessian</a>, the most popular of them is email phishing with 96% of all attacks belonging to this category. The other 3% and 1% of the attacks were delivered via malicious websites (search engine phishing) and via smartphones (smishing and vishing) respectively. This data is also supported by <a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf">Proofpoint’s research</a>, which found that in 2020, 66% of the surveyed organizations experienced targeted phishing attacks, 61% of businesses faced smishing attacks and 54% of the respondents say they were targeted by vishing attacks.</p>
<blockquote><p><em>“Email phishing occurs when cybercriminals impersonate a person or a business and send you an email with the goal of tricking you into clicking on a malicious link or downloading an infected attachment. Smishing and vishing are both different types of phishing, however, they are not used to target users via email. Vishing is referred to when cybercriminals call you on the phone pretending to be an employee from a well-known company, Microsoft for example, and request that you give them your personal details or payment information. When you receive a text message with malicious links, then you’ve been targeted by a smishing attack. The word is formed from the combination between “SMS” and “phishing”. Last, but not least, search engine phishing, or “SEO poisoning” as we sometimes call it, is when hackers create malicious websites and try to rank them on the first pages of legitimate search engines such as Google. Those websites could offer irresistible product deals intending to collecting as many of the users’ card details as possible, or they could look like an exact copy of another website, again aiming to deceive the user into giving his or her personal information away.” </em>&#8211; explains Kunev.</p></blockquote>
<p>In terms of the target of the attack, there are two main types of phishing &#8211; whaling and spear phishing. They are both similar in the sense that they target specific groups of people. Spear phishing occurs when hackers strategically direct their malicious message towards a particular organization or a particular employee in a selected company. Whaling, on the other hand, refers to cybercriminals who target the CEOs or the “big fish” in a given organization.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-913 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>In his career as a cybersecurity expert, Todor Kunev has witnessed both whaling and spear phishing. According to him, those methods are particularly concerning because the messages they use are specifically crafted for the recipient (attack’s victim), which means the cybercriminals had to research their target.</p>
<blockquote><p><em>“Cybercriminals often research names and company roles of employees working in the targeted organization, they even go as far as stalking their social media profiles and browsing through their friends’ lists. The goal is to produce a highly targeted, highly personal message, which prompts the victim to reveal sensitive information (both personal or in relation to the business), make a bank transfer, or alter documents to the cybercriminal’s benefit.” </em>&#8211; says Kunev.</p></blockquote>
<p>Therefore, it is extremely difficult to recognize targeted phishing attacks such as spear phishing or whaling. In fact, <a href="https://securityboulevard.com/2020/12/staggering-phishing-statistics-in-2020/">97% of the users are unable to recognize a sophisticated phishing email</a>. However, if you’re not recognizing a problem, it doesn’t mean it’s not there.</p>
<p>&nbsp;</p>
<h2>Consequences of phishing attacks</h2>
<p>According to <a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf">Proofpoint’s research</a>, due to phishing attacks in 2020 businesses were left to deal with data loss (60% of the respondents), compromised accounts (52% of the respondents), ransomware infections (47% of the respondents), malware infections (29% of the respondents), and financial loss or fraud (18% of the respondents). The consequences of phishing attacks also include legal trouble, reputational damages, and intellectual property loss. This includes trade secrets, research findings, new developments, and other valuable data, which often cost the targeted organization years of work and thousands of dollars of research. However, according to Todor Kunev, one of the most dangerous aspects of phishing is the fact that businesses take too long to even notice they were attacked.</p>
<blockquote><p><em>“It’s not uncommon for cybercriminals to target a business partner of yours in order to access your data. When the phishing attack is successful they can easily get hold of your network, because you and your employees perceive the already infected partner as a trusted source. Once the attackers gain initial access to your network through a given endpoint (one of your employees’ computers, for example) they may impersonate a legitimate user and continue to move laterally through your network. This means that even if you detect the initial point of access, you may not even notice or know that the cybercriminal is going through your files and systems and mapping them out until they find something of interest.”</em> &#8211; shares Todor Kunev.</p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-912 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>According to <a href="https://www.fortinet.com/resources/cyberglossary/cybersecurity-statistics">fortinet.com</a>, it takes approximately 280 days to identify and contain an average cyberattack. In the meantime, businesses lose $2.9 million a minute due to cybercrime, as reported by <a href="https://www.riskiq.com/resources/infographic/evil-internet-minute-2019/">riskiq.com</a>. We don’t even want to do the math on this one.</p>
<p>&nbsp;</p>
<h2>How to spot a phishing attack?</h2>
<p>Phishing attacks can often be easy to spot because of poor spelling and grammar, or because of poorly created links, which can hint that the web pages they lead to are fabricated. Some of the key clues of a phishing attempt are:</p>
<ul>
<li>The message is informing you that you need to take immediate action concerning a given matter</li>
<li>The message is sent from a public email domain (simply @yahoo.com, for example, as opposed to @3cyber-sec.com)</li>
<li>The domain name is spelled incorrectly</li>
<li>The email contains grammatical, spelling, and/or punctuation mistakes</li>
<li>The email includes a suspicious link or attachment</li>
</ul>
<p>However, targeted phishing attacks such as spear phishing or whaling can be difficult to recognize. That is why it’s important to educate your employees about the warning signs and appropriate action plans in case they are targeted. Todor Kunev’s expert opinion is that <a href="https://3cyber-sec.com/staff-awareness/">staff awareness training</a> should be done as regularly as possible, but not farther apart than 3 months:</p>
<blockquote><p><em>&#8220;In the digital transformation journey, our customers’ exposure change requires the implementation of robust security capabilities to mitigate risk-shift and enable the business’s vision. It is crucial for businesses to invest in staff cybersecurity awareness training because more often than not, your employee serves as the middleman between a cybercriminal and your organization. Your employees need to be able to recognize the warning signs and avoid opening suspicious emails.&#8221;</em> adds Kunev.</p></blockquote>
<p>If you don’t know how to organize staff cybersecurity awareness training, <a href="https://3cyber-sec.com/contact-us/">you can always contact us for advice</a>. 3Cyber-Sec’s team is composed of certified cybersecurity consultants, who can help you stay safe in the cyber world. We are determined to craft a tailored security solution for your specific needs.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/">Experts’ Talk: What Is Phishing And How Can You Spot It?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>One Of The Biggest Data Breaches Of The Century: Sina Weibo</title>
		<link>https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/</link>
					<comments>https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 10:27:40 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=904</guid>

					<description><![CDATA[<p>Whether it’s because they are immensely popular and have billions of active users, or because influential people can be easily reached and blackmailed through such platforms, hackers just love to delve into innovative cyberattack methods directed towards social media.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/">One Of The Biggest Data Breaches Of The Century: Sina Weibo</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Social platforms are one of the evergreen targets for cybercriminals. Whether it’s because they are immensely popular and have billions of active users, or because influential people can be easily reached and blackmailed through such platforms, hackers just love to delve into innovative cyberattack methods directed towards social media. Facebook, Instagram, Twitter, LinkedIn, and other similar websites also provide the opportunity for paid advertising, which can often reach millions of people thus offering a huge audience to the attacker. <a href="https://www.forbes.com/sites/davidthier/2020/07/05/hackers-are-spreading-trump-propaganda-through-roblox/?sh=5073d92a6aa7">There have been reported cases</a>, in which attackers have even distributed political propaganda within social media and gaming applications. What we’re getting to is: social media was, is, and will continue to be a desirable field for cybercriminals for all sorts of reasons.</p>
<p>It is not a secret that cyberattacks often aim to cause data breaches. According to the <a href="https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q3%20Data%20Breach%20QuickView%20Report.pdf">RiskBasedSecurity report</a>, data breaches exposed 36 billion records in the first three quarters of 2020. And of course, we shouldn’t forget that social platforms also store massive amounts of sensitive data related both to the users and to the particular network as well. Furthermore, personal data was involved in 58% of last year’s breaches, as shared by <a href="https://www.varonis.com/blog/cybersecurity-statistics/">varonis.com</a>. Just a few months ago, a hacker who tackled a vulnerable feature of Facebook in 2019, leaked the personal data of more than 533 million Facebook users for free. As <a href="https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4">Business Insider shares</a>, the exposed data includes the personal information of users from 106 countries, including over 32 million in the US, 11 million in the UK, and 6 million in India. It includes their phone numbers, Facebook IDs, full names, locations, birthdates, bios, and, in some cases, email addresses.</p>
<p>So we shouldn’t be surprised that one of the biggest data breaches of the century was extremely similar to Facebooks’ sensitive data leak. It targeted the Chinese microblogging website Sina Weibo, which is often referred to as the Chinese Twitter.</p>
<p>&nbsp;</p>
<h2>The Sina Weibo Data Breach</h2>
<p>At the end of March 2020, the former security chief of Alibaba Wei Xingguo announced via a Weibo post that the personal data of more than 538 million of the Twitter-like platform users, including his own, was compromised and leaked online. The breach included details such as real names, usernames, user IDs, number of Weibo tweets, number of followers and accounts users are following, gender, and geographic location. Fortunately, no passwords were leaked, however, this does not mean that the exposed information could not lead to scams, fraud, and other types of impersonation attempts.</p>
<p>To make things worse, the sensitive information of 172 million of all compromised user accounts was sold on the dark web for as little as 1,799 Chinese Yuan or approximately 250 U.S. dollars, as <a href="https://securityboulevard.com/2020/03/stolen-data-of-538-million-weibo-users-for-sale-on-the-dark-market/">Security Boulevard</a> shares. It isn’t hard to believe that the incident resulted in negative public outbursts and was covered by a number of Chinese and international media.</p>
<p>&nbsp;</p>
<h2>Sina Weibo’s Official Statement</h2>
<p>On the 21st of March last year, Sina Weibo posted an <a href="https://weibo.com/2735327001/IzCMJioqC?type=comment">official statement</a> in regards to the breach. The company acknowledged the incident as a severe one and expressed its beliefs that the breach is a result of a so-called dictionary attack. A dictionary attack is a form of brute-force attack which aims to guess a password or another security code by trying thousands or millions of likely possibilities. For example, previously used passwords or lists with key phrases, which are usually obtained from past security breaches.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-906 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Sina Weibo claimed that back in 2011 the company introduced a special service that enabled users to look for other Weibo accounts by matching them to the list of their smartphone contacts. However, the company clarifies that users could only gain information about a given number-related account name. In the same statement, Weibo assured users that their passwords are protected with one-way encryption and are not stored as plain text. The company warned users that although their passwords are safely stored, their Weibo accounts could still be stolen in case their password is used for multiple platforms and websites.</p>
<p>Additionally, according to <a href="https://www.itproportal.com/news/data-of-over-500m-weibo-users-for-sale-on-the-web/">IT Pro Portal</a>, Sina Weibo stated its engineers had identified certain accounts that tried to upload large batches of contacts in late 2018 in order to match them with phone numbers held in the database. It’s interesting that the attack allegedly occurred in 2018, but it was either not noticed for a couple of years, or the information about it was simply silenced. Furthermore, Sina Weibo’s statement is not particularly convincing, because it contains contradictory points. The company claims that passwords were not leaked, however, implies that the attack was initiated because hackers were able to obtain users’ passwords and thus gained access to the leaked information (usernames, gender, location, etc.). As <a href="https://tesonet.com/cybersecurity/a-cautionary-tale-the-biggest-data-breaches-of-the-century/">tesonet.com</a> shares, Chinese security experts also detected technical irregularities with the company’s claims. A definite conclusion hasn’t been reached yet and the question of how the data was obtained is still up for debate.</p>
<p>Weibo’s Director of Information Security Luo Shiyao also commented on the attack, downplaying it as cited by <a href="https://securityaffairs.co/wordpress/100243/data-breach/weibo-data-dark-web.html">Security Affairs</a>:</p>
<blockquote><p><em>“Phone numbers were leaked due to brute-force matching in 2019 and other personal information was crawled on the Internet. When we found the security vulnerability we took measures to fix it. We also reported to the police as soon as possible and submitted related information to them. Besides, we have been investigating the ‘gray industry’ because we take user personal information very seriously, especially when the personal data contains phone numbers. Don’t be credulous. Both password fields and Know Your Customer (KYC) data fields are not shown in the description. Don’t worry too much. Good night.”</em></p></blockquote>
<p>&nbsp;</p>
<h2>The Consequences of Sina Weibo Data Breach</h2>
<p>Soon after the breach was announced, China&#8217;s information technology regulator summoned Sina Weibo for a face-to-face meeting over the leak. The Twitter-like platform was obliged to enhance its internal data security management and eliminate further risks. As <a href="https://www.yicaiglobal.com/news/china-it-ministry-takes-sina-weibo-to-task-over-538-million-user-data-leak">yicaiglobal.com</a> shares, the Chinese Ministry of Industry and Information Technology issued a press release which confirmed that Sina Weibo has taken action in response to the information breach, such as updating its interface security strategy. However, there is no official information about whether Sina Weibo was fined because of the breach or not. As <a href="https://www.varonis.com/blog/cybersecurity-statistics/">varonis.com</a> shares, usually, the average cost of a data breach is $3.86 million as of 2020.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-905 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Even if the company hasn’t been fined yet, it did suffer reputational damages which resulted in a decrease in Sina Weibo users. As reported by <a href="https://www.chinainternetwatch.com/statistics/weibo-mau/">China Internet Watch</a>, users now are 4% less than the same period last year. The average daily users also suffered a 5% year-over-year decrease.</p>
<p>&nbsp;</p>
<h2>Stay Safe</h2>
<p>While your organization may be protected against cybercriminals, the third-party website you use may still propose risks for you and for your company. Cyberattacks on social media can compromise your company’s data if you have created an account for your business. However, you shouldn’t let fear stop you from growing and expanding your organization.</p>
<p>Stay safe by having a thorough cybersecurity program with clear response plans in place. If you need help with keeping your organization safe in the cyber world, don’t hesitate to <a href="https://3cyber-sec.com/contact-us/">contact us</a>. 3Cyber-Sec is a boutique cybersecurity consultant that protects its clients from cyberthreats by crafting tailored security solutions. We use a unique collaborative approach to guide our clients throughout their cyber journeys safely.</p>
<p>&nbsp;</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/">One Of The Biggest Data Breaches Of The Century: Sina Weibo</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The 5 Biggest Cyberthreats To Financial Institutions</title>
		<link>https://3cyber-sec.com/2021/06/21/the-5-biggest-cyber-threats-to-financial-institutions/</link>
					<comments>https://3cyber-sec.com/2021/06/21/the-5-biggest-cyber-threats-to-financial-institutions/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 10:26:17 +0000</pubDate>
				<category><![CDATA[Industry-specific Advice]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=895</guid>

					<description><![CDATA[<p>While there are many methods through which a cyberattack can be performed, some of them are more popular when it comes to hacking banks and financial institutions. Read our article to find out which they are.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/the-5-biggest-cyber-threats-to-financial-institutions/">The 5 Biggest Cyberthreats To Financial Institutions</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While all businesses should constantly improve their cybersecurity programs, cybercriminals tend to target financial institutions the most. The simple reason for that lies in the fact that they handle a lot of sensitive data such as clients’ names, contact information, social security numbers, information about their financial statuses, and last but not least, they hold clients’ money! What’s more important, is that banks are not what they used to be two decades ago when people had to go in each time they needed to make a transfer or draw money out. Nowadays, consumers can do pretty much everything with a mouse click. We don’t have to carry cash, we don’t even have to carry credit cards anymore &#8211; to pay for our groceries, we simply need a smart device such as a mobile phone, a tablet, or even a smartwatch.</p>
<p>In January 2021 alone there have been three major cyberattacks directed towards financial institutions, as reported by <a href="https://carnegieendowment.org/specialprojects/protectingfinancialstability/timeline">carnegieendowment.org</a>. It’s important to note that there are big names such as PayPal, American Express, and The Reserve Bank of New Zealand amongst the targeted organizations. Cyberattacks typically aim to steal money or information or disrupt the operations of a financial institution. This includes attacks on the financial institution itself, its customers or members, or its service providers.</p>
<p>&nbsp;</p>
<h2>Top 5 Cyberthreats Financial Institutions Face</h2>
<p>While there are many methods through which a cyberattack can be performed, some of them are more popular when it comes to hacking banks and financial institutions. Keep reading to find out which they are.</p>
<h3>1. Malware</h3>
<p>By definition, malware is any software, which is intentionally designed to damage or destroy computer systems, servers, clients, and computer networks. Your organization can get infected with malware through email attachments, flash drives or external hard drives, infected end-user devices such as smartphones or tablets, or downloads from malicious or compromised websites. As <a href="https://purplesec.us/resources/cyber-security-statistics/">purplesec.us</a> shares, 90% of financial institutions reported being targeted by malware in 2018 and companies spent an average of $2.4 million in defense against such malicious software.</p>
<h3>2. Ransomware</h3>
<p>Ransomware attacks are similar to malware attacks because they are also executed with the help of malicious software. The difference, however, is that when it comes to ransomware, usually the used malware encrypts the files on your device and hackers demand a ransom in order to decrypt the files and restore the device to its functional state. According to<a href="https://safeatlast.co/blog/ransomware-statistics/#gref"> safeatlast.co</a>, there’s a 19-day downtime following a ransomware attack, and businesses are blackmailed to pay a ransom of $233,217 on average. Furthermore, it is predicted that the global cost associated with ransomware recovery will exceed $20 billion in 2021.</p>
<h3>3. Cyberattack through third-party vendors</h3>
<p>When working with third-party vendors, banks and financial institutions are often put at risk of cyberattacks. Even if a given financial institution has taken measures to establish solid cybersecurity controls and action plans, its partners could be vulnerable to attacks. This may lead to the contamination of the bank itself. Naturally, data breaches may follow, which could result in millions of dollars in expenses. In fact, <a href="https://www.forbes.com/sites/forbestechcouncil/2021/02/11/understanding-the-third-party-impact-on-cybersecurity-risk/?sh=4c160d157089">one of the largest data breach settlements in history ($18.5 million)</a> was paid by Target after cybercriminals managed to exploit third-party access and exfiltrated payment information, which impacted more than 41 million customers.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-900 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-16.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-16.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-16-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-16-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h3>4. DDoS attack</h3>
<p>Attacks that disrupt a website&#8217;s operation and block the users from accessing the site are called DDoS (distributed denial-of-service) attacks. In essence, the cybercriminal uses botnets (a network of Internet-connected devices usually build of infected user systems) to drastically increase the traffic towards the victim’s website. Therefore, authentic users can’t get through as the servers overload. As<a href="https://gomindsight.com/insights/blog/7-cyber-security-threats-to-financial-services/"> gomindsight.com</a> shares, 1/3 of network downtime incidents are attributed to DDoS attacks, costing businesses financial losses and reputation damages. Often, DDoS attacks are used as a distraction while another cyberattack takes place simultaneously.</p>
<h3>5. In-house threats</h3>
<p><a href="https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company">Harvard business review</a> shared IBM’s report findings that 60% of cyberattacks were carried out by insiders. Moreover, the same security research also found that the financial industry is amongst the top three most targeted sectors. Whether through human errors or carefully calculated actions, employees can contribute towards your company being hacked. Therefore, it’s important to conduct <a href="https://3cyber-sec.com/staff-awareness/">regular security awareness training</a>.</p>
<p>It’s crucial for financial organizations to take the necessary steps to avoid such attacks and mitigate their consequences. To further ensure the safety of financial institutions and to protect sensitive data, governments and organizations came up with a number of compulsory regulations, with which financial institutions must comply.</p>
<p>&nbsp;</p>
<h2>Essential Cybersecurity Regulations for Financial Institutions</h2>
<p>The financial industry is amongst the most strictly regulated ones. There are many regulations that are specific to each country, but there are also global requirements that banks and other organizations in the financial industry must adhere to. Three major ones are PCI DSS, ISO/IEC 27001, and SWIFT CSP.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-967 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/financial-cybersecurity-regulations.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/financial-cybersecurity-regulations.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/financial-cybersecurity-regulations-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/financial-cybersecurity-regulations-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><strong>PCI DSS</strong> stands for <a href="https://3cyber-sec.com/pci-dss-compliance/">Payment Card Industry Data Security Standard</a>. This standard specifies requirements for the processing, storage, and transfer of payment card data. These standards apply to organizations, institutions, merchants, and payment solution providers. The PCI DSS aims to prevent credit card fraud and further strengthen the security of cardholder data. It’s important to note that financial organizations will be fined if they fail to comply with this regulation. According to <a href="https://www.centurybizsolutions.net/pci-compliance/is-pci-compliance-mandatory/#:~:text=If%20a%20data%20breach%20occurs,ranging%20between%20%245%2C000%20and%20%24500%2C000.&amp;text=If%20you're%20not%20PCI%20compliant%2C%20you%20run%20the%20risk,credit%20card%20payments%20at%20all.">centurybizsolutions.net</a>, the penalties can vary between $5,000 and $500,000.</p>
<p>The <strong>ISO/IEC 27001</strong> is part of the larger array of ISO/IEC 27000 security standards. The abbreviation stands for<a href="https://3cyber-sec.com/iso-27001-certification/"> International Organization for Standardization / International Electrotechnical Commission</a>. Information security management systems (ISMS) should be created and operated in accordance with this standard. Its main purpose is to set guidelines for best practices in order to prevent and protect sensitive data. If your organization complies with ISO/IEC 27001 this will secure its services and give you a competitive advantage. If, however, you fail to comply, you may still apply for a reassessment, but this can cost you as much as 60% of the original assessment, depending on your level of non-compliance, as shared by <a href="https://www.standardfusion.com/blog/the-cost-of-a-failed-iso-audit/">standardfusion.com</a>.</p>
<p>Every organization which uses SWIFT (Society for Worldwide Interbank Financial Telecommunication) services must comply with the <a href="https://3cyber-sec.com/swift-security-program/"><strong>SWIFT CSP</strong></a>. CSP stands for Customer Security Program. Its goal is to outline requirements for the protection of data, managing access, and responding to incidents. SWIFT routinely inspects its members to ensure that they maintain adequate cybersecurity controls. If the inspections outline non-compliant organizations, SWIFT notifies industry regulators such as the UK&#8217;s Financial Conduct Authority.</p>
<p>Those are the three compulsory global cybersecurity standards for financial organizations. There are also local laws and guidelines which need to be considered by businesses operating in the financial sector. It’s crucial to take measures and ensure that your business is compliant with the cybersecurity frameworks, especially if you work with sensitive data. Otherwise, you risk becoming a target for a cyberattack.</p>
<p>&nbsp;</p>
<h2>Take measures before it’s too late</h2>
<p>As we become increasingly dependent on technology and as new FinTech inventions become widely popular in people’s day-to-day life, cybercrime is only going to continue to thrive. Therefore, it’s important to take the necessary measures and protect your organization, especially if it operates in the financial industry.</p>
<p>If you’re not sure how you can achieve that, feel free to <a href="https://3cyber-sec.com/contact-us/">contact us</a>. 3Cyber-Sec is always ready to help you stay safe in the cyberworld. We are a team of highly experienced, certified professional cybersecurity consultants. Our approach is one of collaboration, with a clear focus on understanding the specific challenges and risks faced by each client. We’ll be happy to hear from you and craft a tailored solution for your organization’s cybersecurity.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/the-5-biggest-cyber-threats-to-financial-institutions/">The 5 Biggest Cyberthreats To Financial Institutions</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/06/21/the-5-biggest-cyber-threats-to-financial-institutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What Is vCISO And Why Do You Need To Hire One?</title>
		<link>https://3cyber-sec.com/2021/06/21/what-is-vciso-and-why-do-you-need-to-hire-one/</link>
					<comments>https://3cyber-sec.com/2021/06/21/what-is-vciso-and-why-do-you-need-to-hire-one/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 10:23:45 +0000</pubDate>
				<category><![CDATA[Cybersecurity Explained]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=881</guid>

					<description><![CDATA[<p>Put into simple words vCISO is an abbreviation that stands for a virtual chief information security officer. As the job title suggests, vCISOs protect organizations against cyberattacks by constructing and implementing security programs specifically tailored to suit the needs of a given company.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/what-is-vciso-and-why-do-you-need-to-hire-one/">What Is vCISO And Why Do You Need To Hire One?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If there is one thing we’ve learned over the past few years it is that technology, the Internet, and businesses go hand in hand in today’s world. This became even more obvious when the global crisis struck and everyone had to either go online or go bankrupt. The new normal, however, created new risks and threats, which need to be noticed, addressed, and managed.</p>
<p>Nowadays, pretty much every organization handles sensitive information, connected both to the business itself, as well as to its clients. Whether companies realize the importance of protecting sensitive data, however, is a whole different story. Unfortunately, professional negligence does not go unnoticed by cybercriminals as we witness daily cyberattacks and security breaches. <a href="https://www.forbes.com/sites/chuckbrooks/2021/03/02/alarming-cybersecurity-stats-------what-you-need-to-know-for-2021/?sh=7eb266e858d3">As Forbes shares</a>, Google alone has detected 2,145,013 phishing sites as of Jan 17, 2021, which is a 27% increase compared to the same period last year when the registered phishing websites were 1,690,000. The financial losses associated with cyberattacks are often colossal, but what’s more important is that the reputation of the hacked organization also suffers immensely.</p>
<p>The good news is that businesses are not doomed to live in constant fear of being compromised. There is a solution to this problem &#8211; organizations need to construct a solid security architecture in order to protect their clients and employees against cyberthreats. You can achieve that by hiring a vCISO.</p>
<p>&nbsp;</p>
<h2>What is a vCISO?</h2>
<p>Put into simple words vCISO is an abbreviation that stands for a virtual chief information security officer. As the job title suggests, vCISOs protect organizations against cyberattacks by constructing and implementing security programs specifically tailored to suit the needs of a given company.</p>
<p>In order to keep your company protected against cyberattacks, a virtual security officer will first identify potential threats and security flaws for your business in order to determine the risks, develop and manage your cybersecurity program, revise and build security policies and frameworks, outline incident response processes and guidelines, and continuously monitor and report meaningful Key Performance Indicators (KPI’s) to the stakeholders. By doing this Cyber Risk Management is transformed into a Business-as-Usual process in every organization. Furthermore, vCISOs can help you comply with key industry-specific regulations and requirements such as PCI, HIPPA, ISO, and many more.</p>
<p>Overall, you should perceive your vCISO as a trusted expert who is always there for you and your organization and whose primary goal is to guide, advise and safely lead you throughout your cyber journey. Although CISO (chief information security officer) and vCISO can be extremely similar in terms of their professional tasks (and titles for that matter), there are a few drastic differences between the two.</p>
<p>&nbsp;</p>
<h2>vCISO vs. CISO</h2>
<p>Hiring a vCISO and hiring a CISO can turn out to be two distinctly different experiences for your company. The latter means to delegate your cybersecurity needs to an in-house professional, who is your employee and works solely for your company. On the flip side, virtual chief information security officers often manage the cybersecurity needs of more than one organization by implementing a risk-focused approach and remaining result-oriented. The fact that vCISOs work with many organizations simultaneously, however, does not mean that they are less invested in protecting your company against attacks. On the contrary, vCISOs can turn out to be more competent and experienced than their in-house colleagues, simply because they have had the chance to work for businesses operating in diverse industries and requiring varied security demands.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-883 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-14.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-14.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-14-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-14-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Nowadays, companies are forced to build their online presence, because of the pandemic and many of them have never set foot in the digital before. Furthermore, we’ve seen a rapid increase in the number of regulations and requirements concerning the protection of vulnerable data. Therefore, cybersecurity experts also saw an increase in their workload, which means that finding skilled professionals with experience in your specific business area is not a particularly easy task. It may take a long time before you are finally able to come across a good match for your company. Not to mention that you may end up in a sticky situation even before you’ve found “the one” and you should try to avoid that at all cost!</p>
<p>Therefore, many organizations prefer outsourcing their cybersecurity needs to consultancy companies, which offer vCISO as a service.</p>
<p>&nbsp;</p>
<h2>Why do you need to hire a vCISO?</h2>
<p>If you’re not sure why you might need to protect your company’s sensitive information from cybercriminals, then the next paragraphs should give you all the answers.</p>
<p>First and foremost, we have to warn you: don’t wait until the ship has sailed to protect your organization. It’s important to point out that the costs of recovering from a cyberattack can often be much more expensive than those of taking measures to prevent it. <a href="https://cybersecurityventures.com/top-5-cybersecurity-facts-figures-predictions-and-statistics-for-2021-to-2025/">According to cybersecurityventures.com</a>, cybercrime is predicted to inflict damages totaling $6 trillion USD globally in 2021, while <a href="https://www.statista.com/statistics/991304/worldwide-cybersecurity-spending/#:~:text=Global%20cybersecurity%20spending%202017%2D2021%20(COVID%2D19%20adjusted)&amp;text=In%202019%2C%20spending%20in%20the,(COVID%2D19)%20impact.">Statista predicts</a> that this year the global spending on cybersecurity products and services will reach 54 billion USD. Therefore, it becomes obvious that recovering from a cyberattack can lighten your wallet much more than dedicating a budget for cybersecurity before it’s too late.</p>
<p>Furthermore, businesses that operate in certain industries such as financial, insurance, and healthcare, are required to comply with a number of regulations, some of which obligate them to employ third-party cybersecurity experts. Additionally, with <a href="https://www.insurancejournal.com/news/international/2021/04/19/610514.htm">the continuous rise of cyberattacks</a>, it is believed that the regulatory landscape will change. <a href="https://securityboulevard.com/2020/12/2021-predictions-cyber-risk-global-attacks-and-regulatory-change/">As securityboulevard.com shares</a>, we shouldn’t be surprised if more strict regulations with heavier fines and shorter implementation time arise in the near future.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-885 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-15.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-15.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-15-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-15-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>The fact that detecting breaches and dealing with them are not easy tasks is yet another reason to utilize a trusted partner in your cybersecurity initiatives. While <a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/#:~:text=The%20latest%20forecast%20is%20for,every%2040%20seconds%20in%202016.">cyberattacks occur every 11 seconds</a>, some companies take as long as 6 weeks to detect that their data has been compromised <a href="https://www.cybintsolutions.com/cyber-security-facts-stats/">as reported by cybintsolutions.com</a>. Not to mention that this is also valid when it comes to big companies such as Facebook. On top of that, over 77% of organizations do not have a cybersecurity incident response plan, which means that even if they recognize a cyberattack in action, they would not know what steps to take in order to resolve the situation successfully.</p>
<p>&nbsp;</p>
<h2>Is your organization protected?</h2>
<p>Keep in mind that the vCISO you decide to trust should be able to give answers to reasonable questions, such as:</p>
<ul>
<li>Is my business protected?</li>
<li>What are the cyberattack risks my organization faces?</li>
<li>How badly could my business be affected and how big could the costs be?</li>
<li>Which regulatory requirements do I need to comply with and why?</li>
<li>What do we need to do in the short and mid-term to mitigate the risk?</li>
<li>How much will the cyber protection measures cost me?</li>
<li>Which are the essential cybersecurity KPIs that we need to monitor if we want to be confident in our protection measures?</li>
</ul>
<p>Now that our article is coming to an end, we hope you have a clearer idea of why hiring a vCISO can turn out to be one of the most important decisions you’ve ever made. It can not only result in you saving money to invest in growing your business further but it will also give you peace of mind (and we know that’s priceless).</p>
<p>To learn more about vCISO as a service, <a href="https://3cyber-sec.com/virtual-ciso/">click here</a>. Additionally, if you have any further questions about this service or cybersecurity as a whole, <a href="https://3cyber-sec.com/contact-us/">don’t hesitate to reach out and contact us</a>. 3Cyber-Sec is always ready to help you and give you advice on how to protect your organization’s sensitive data. As a boutique cybersecurity consultancy, we value each of our clients and strive to answer their individual needs with tailored security solutions.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/what-is-vciso-and-why-do-you-need-to-hire-one/">What Is vCISO And Why Do You Need To Hire One?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/06/21/what-is-vciso-and-why-do-you-need-to-hire-one/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
