<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Experts&#039; Talk Archives - 3Cyber-Sec</title>
	<atom:link href="https://3cyber-sec.com/category/experts-talk/feed/" rel="self" type="application/rss+xml" />
	<link>https://3cyber-sec.com/category/experts-talk/</link>
	<description>Cyber Security</description>
	<lastBuildDate>Wed, 04 May 2022 14:33:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://3cyber-sec.com/wp-content/uploads/2021/05/cropped-profile_custom-32x32.png</url>
	<title>Experts&#039; Talk Archives - 3Cyber-Sec</title>
	<link>https://3cyber-sec.com/category/experts-talk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What are the most common human errors that allow hackers to penetrate your company&#8217;s system?</title>
		<link>https://3cyber-sec.com/2022/04/15/what-are-the-most-common-human-errors-that-allow-hackers-to-penetrate-your-companys-system/</link>
					<comments>https://3cyber-sec.com/2022/04/15/what-are-the-most-common-human-errors-that-allow-hackers-to-penetrate-your-companys-system/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Fri, 15 Apr 2022 14:20:19 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1364</guid>

					<description><![CDATA[<p>Many cyber attacks and data breaches that have happened in the past were possible due to human error. The Hacker News cites the IBM Cyber Security Intelligence Index Report that states that in 95% of breaches, human error was a significant factor. And that makes a lot of sense when you think about it. You [&#8230;]</p>
<p>The post <a href="https://3cyber-sec.com/2022/04/15/what-are-the-most-common-human-errors-that-allow-hackers-to-penetrate-your-companys-system/">What are the most common human errors that allow hackers to penetrate your company&#8217;s system?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Many cyber attacks and data breaches that have happened in the past were possible due to human error. The Hacker News cites the IBM Cyber Security Intelligence Index Report that states that in 95% of breaches, human error was a significant factor. And that makes a lot of sense when you think about it. You can have the most sophisticated cybersecurity strategy. Still, it won&#8217;t be effective if it is not implemented correctly and the organization&#8217;s staff members don&#8217;t follow it. </span></p>
<h2><span style="font-weight: 400;">Which are the most common mistakes from people that lead to data breaches or hacking?</span></h2>
<p><span style="font-weight: 400;">Ordinary staff members and even people from the top management of a company can be victims of a scam that leads to a breach in the systems. Every case is unique by itself. However, there are some common mistakes that people make, which costs them a lot. </span></p>
<h3><b>Weak password management</b></h3>
<p><span style="font-weight: 400;">Unfortunately, this is something very common. A lot of people don’t take the time to create strong passwords and change them frequently. On the other hand, storing them is another potential vulnerability. Here are some tips on how you can improve this: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Create strong and complicated passwords that you change at least once every six months; Passphrases are good option.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Don’t use the same password for two or more accounts; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Research and use reliable and secure password management software; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"> It is not recommended to save your password automatically in your browser; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enable two-factor identification and additional security questions when this is possible.</span></li>
</ul>
<p><span style="font-weight: 400;">Every company should provide guidelines to the employees on how to create and store their passwords and secrete codes. It is good if those rules are followed by them for their accounts as well &#8211; like social media, private email, etc. </span></p>
<h3><b>Inability to detect phishing emails and messages</b></h3>
<p><span style="font-weight: 400;">This is another big issue regarding staff members. In many organisations people don’t have the needed knowledge to spot and detect more complicated phishing emails. Here are some universal ways to do that:  </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Check the domain where the email comes from. Often by trying to imitate the website of mobile operators or financial institutions, the hackers create a copy of their standard email template or even of their websites. You can check the domain name and compare it to the real one. Often there is a very small difference that you can notice; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">No legitimate institution or organisation where you have registration, account, or subscription will ask you to enter the details of your account or credit/debit card in email. This is a huge red flag; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If someone on social media is sending you a link with no description or with a weird-looking one send them a message back and ask specifically what is this link and where it will redirect you when you click on it; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You can never be too careful &#8211; if you have any doubts about a certain email or message consult with the security officer in our organisation. It might be a false alarm but it is better to be safe than sorry. </span></li>
</ul>
<h3><img decoding="async" class="alignnone size-full wp-image-1367" src="https://3cyber-sec.com/wp-content/uploads/2022/04/3Cyber-Sec-Social-Blog-Image-1200-x-630-26.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2022/04/3Cyber-Sec-Social-Blog-Image-1200-x-630-26.png 1200w, https://3cyber-sec.com/wp-content/uploads/2022/04/3Cyber-Sec-Social-Blog-Image-1200-x-630-26-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2022/04/3Cyber-Sec-Social-Blog-Image-1200-x-630-26-480x252.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></h3>
<h3><b>Failing to update devices with much-needed software upgrades</b></h3>
<p><span style="font-weight: 400;">This is also a classic case. Very often companies issue patches or software updates that fix vulnerabilities in older versions of the software. Usually, they inform all users to update their devices with the latest version to eliminate the chance of security breaches. However, not everyone listens to them. </span></p>
<p><span style="font-weight: 400;">A while back we told you about the </span><a href="https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/"><span style="font-weight: 400;">big leak of VPN Account Passwords From 87,000 Fortinet FortiGate Devices</span></a><span style="font-weight: 400;">. It was possible because many users failed to update their devices and although the bug was fixed in May 2019 it remained one of the biggest exploits for hackers in 2020 as well. </span></p>
<p><span style="font-weight: 400;">That suggests that a lot of the clients of Fortinet may not have followed the instructions to upgrade their devices and that left them vulnerable. And this is not a standalone case. Such negligence can bring a lot of trouble. </span></p>
<h2><span style="font-weight: 400;">What can be done to prevent all of this? </span></h2>
<p><span style="font-weight: 400;">Nobody is perfect. People are going to make mistakes. It is inevitable. However, there are several ways you can help your employees have the needed skills and knowledge to minimize such errors and contribute to the cybersecurity of the whole organisation: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Invest in </span><a href="https://3cyber-sec.com/staff-awareness/"><span style="font-weight: 400;">staff awaraness training</span></a><span style="font-weight: 400;"> &#8211; make sure that the people that work for you are familiar and can identify information security threats and handle them accordingly. Like every other thing, this works best when the solution is tailor-made for the needs of the specific company;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Raise awaraness about cybersecurity &#8211; get the people involved and help them understand that cybersecurity is important to your company as all other everyday activities and business operations; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Provide resources and guidelines &#8211; the average person is not a cybersecurity expert and doesn’t have to be. However, you can help them by providing simple guidelines they can follow and giving them useful resources that won’t make following the security recommendations a burden. </span></li>
</ul>
<p><span style="font-weight: 400;">There is not a magic pill that can make human errors go away. What you can do is invest in staff training and make cybersecurity a strategic priority for your company and staff. If you need help with that just </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">give us a call</span></a><span style="font-weight: 400;">. Our </span><a href="https://3cyber-sec.com/our-team/"><span style="font-weight: 400;">expert team</span></a><span style="font-weight: 400;"> will be happy to help!</span></p>
<p>The post <a href="https://3cyber-sec.com/2022/04/15/what-are-the-most-common-human-errors-that-allow-hackers-to-penetrate-your-companys-system/">What are the most common human errors that allow hackers to penetrate your company&#8217;s system?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2022/04/15/what-are-the-most-common-human-errors-that-allow-hackers-to-penetrate-your-companys-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity in the financial and payment industry &#8211; a talk with Todor Kunev</title>
		<link>https://3cyber-sec.com/2021/12/22/cybersecurity-in-the-financial-and-payment-industry/</link>
					<comments>https://3cyber-sec.com/2021/12/22/cybersecurity-in-the-financial-and-payment-industry/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Wed, 22 Dec 2021 09:25:34 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1324</guid>

					<description><![CDATA[<p>We take a closer look at cybersecurity in the financial and payment industry. What are the most common attacks, measures, and standards?</p>
<p>The post <a href="https://3cyber-sec.com/2021/12/22/cybersecurity-in-the-financial-and-payment-industry/">Cybersecurity in the financial and payment industry &#8211; a talk with Todor Kunev</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">In our series “Expert Talks” we are discussing important cybersecurity issues with industry experts. Today, the focus is on the financial and payment industry, and we are sitting down with Todor Kunev to explore the topic of cybersecurity for all organisations that operate in those fields. </span></p>
<p><span style="font-weight: 400;">Todor is a cybersecurity leader with significant experience and an enviable reputation. During his years of professional career, he has developed cyber security control frameworks to serve the needs of heavily regulated leading Banking, Insurance, and Commercial entities.</span></p>
<h2><span style="font-weight: 400;">What are the cybersecurity risks in the financial and payment industry?</span></h2>
<p><span style="font-weight: 400;">The financial industry, in general, is very wide and it includes several large areas that are different from each other: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">payment industry; </span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://3cyber-sec.com/2021/09/15/ensuring-insurance-companies-cybersecurity/"><span style="font-weight: 400;">insurance industry; </span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">banking;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">finance. </span></li>
</ul>
<p><span style="font-weight: 400;">In recent years fin-tech is another big field that can be added to the list above. The organisations that operate in those highly regulated sectors store valuable information for their clients like: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">personal data;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">financial data; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">health records (for insurance companies). </span></li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1326" src="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-15.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-15.png 1200w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-15-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-15-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">In recent years cyber attacks in the financial sector have gone through the roof. For example, securitymagazine.com cites a </span><a href="https://newsroom.trendmicro.com/2021-09-14-Attacks-Surge-in-1H-2021-as-Trend-Micro-Blocks-41-Billion-Cyber-Threats"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from Trend Micro on ransomware. According to it, in the banking industry alone there is a 1,318% increase in ransomware attacks. However, this is not the only threat out there. </span></p>
<p><i><span style="font-weight: 400;">“Since the beginning of 2021, there have been some major cyber-attacks on financial institutions. Only in January, there were some attempts to target big names in the financial and payments industry like PayPal, American Express, and The Reserve Bank of New Zealand.</span></i> <i><span style="font-weight: 400;">From my experience, the 5 biggest cyber threats for the financial industry are: </span></i></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><i><span style="font-weight: 400;">Malware;</span></i></li>
<li style="font-weight: 400;" aria-level="1"><i><span style="font-weight: 400;">Ransomware;</span></i></li>
<li style="font-weight: 400;" aria-level="1"><i><span style="font-weight: 400;">Cyber attacks through 3rd party vendors;</span></i></li>
<li style="font-weight: 400;" aria-level="1"><i><span style="font-weight: 400;">DDoS attacks;</span></i></li>
<li style="font-weight: 400;" aria-level="1"><i><span style="font-weight: 400;">In-house threats. </span></i></li>
</ul>
<p><i><span style="font-weight: 400;">The financial industry is very attractive to hackers. And this will not change any time soon.”, </span></i><span style="font-weight: 400;">said Todor Kunev. </span></p>
<h2><span style="font-weight: 400;">Regulations and compliance in the financial and payment industry</span></h2>
<p><span style="font-weight: 400;">In any terms, the financial sector has many regulations and compliance standards. Some are specialised in specific industries. In the USA, for example, insurance companies fall under different acts like: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Health Insurance Portability and Accountability Act (HIPAA) – for healthcare data; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Gramm–Leach–Bliley Act (GLBA) – for financial data;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Sarbanes–Oxley Act (SOX) – for financial data.</span></li>
</ul>
<p><i><span style="font-weight: 400;">“Some regulations are valid for specific places where financial organisations operate. Others are valid for all and are mandatory. Such are </span></i><a href="https://3cyber-sec.com/pci-dss-compliance/"><i><span style="font-weight: 400;">PCI DSS</span></i></a><i><span style="font-weight: 400;"> for all businesses that handle card transactions, and the </span></i><a href="https://3cyber-sec.com/swift-security-program/"><i><span style="font-weight: 400;">SWIFT CSP</span></i></a><i><span style="font-weight: 400;"> &#8211; for financial institutions that are SWIFT members. On the other hand, there is the </span></i><a href="https://3cyber-sec.com/iso-27001-certification/"><i><span style="font-weight: 400;">ISO 27001</span></i></a><i><span style="font-weight: 400;">. It is not mandatory, but it is widely adopted.”</span></i><span style="font-weight: 400;">, m-r Kunev added. </span></p>
<p><span style="font-weight: 400;">It is important to note that failure to maintain compliance and cover the needed cybersecurity measures can result in heavy fines and reputational damages. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1325" src="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-14.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-14.png 1200w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-14-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-14-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">What lies behind the abbreviations? </span></h2>
<p><span style="font-weight: 400;">Every one of the widely-adopted standards helps financial institutions. Payment Card Industry Data Security Standard (PCI DSS), SWIFT CSP, and ISO/IEC 27001 can be considered the three pillars of cybersecurity compliance and certifications for financial institutions. They will help them in several areas including, but not limited to:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Build and maintain a secure network;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Protect cardholder data;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Maintain vulnerability management program;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement strong access control measures;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Regularly monitor and test networks.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Restrict internet access and protect critical systems;</span></li>
</ul>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Manage vulnerabilities;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Physically secure the environment; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prevent compromise of credentials;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Manage identities and segregate privileges;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Detect anomalous activity;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Plan for Incident Response. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Establish the context scope and objectives;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Establish a management framework;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct risk assessment;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement controls to mitigate risks;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct an internal audit; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Measure, monitor, and review;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct training. </span></li>
</ul>
<p><i><span style="font-weight: 400;">“Cybersecurity threats change and evolve. And so must change the approach that organisations in the financial and payment industry have in addressing those threats. Maintaining compliance is great and much needed. However, it is only the base for establishing their 360-degree cyber defense”</span></i><span style="font-weight: 400;">, outlined Todor Kunev.</span></p>
<p><span style="font-weight: 400;">The financial and payment sector is getting more attractive to new players like the many startup companies with innovative solutions. Security comes before everything else. If you don’t invest in it, you are going to pay the price for that. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/12/22/cybersecurity-in-the-financial-and-payment-industry/">Cybersecurity in the financial and payment industry &#8211; a talk with Todor Kunev</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/12/22/cybersecurity-in-the-financial-and-payment-industry/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts&#8217; talk: Cybersecurity in the Maritime industry</title>
		<link>https://3cyber-sec.com/2021/11/01/maritime-industry/</link>
					<comments>https://3cyber-sec.com/2021/11/01/maritime-industry/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 04:55:55 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1250</guid>

					<description><![CDATA[<p>Since the statistics about cyber threats in the maritime industry are showing only an increase, we have to ask ourselves what is done and can be done for prevention?</p>
<p>The post <a href="https://3cyber-sec.com/2021/11/01/maritime-industry/">Experts&#8217; talk: Cybersecurity in the Maritime industry</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">One of the most interesting things to go through is the different aspects cybersecurity has in each industry. In this expert talk, we are going to focus on one of the primary sectors that 3Cyber-Sec operates in &#8211; the maritime industry. Together with Stefan Radushev, managing director of the company and experienced cybersecurity consultant, we will review what this specific industry has to face in terms of challenges and good practices. </span></p>
<p><span style="font-weight: 400;">Stefan has a background as a specialist consultant in the maritime industry and will share his knowledge about the sector in this expert talk. In these articles, we are talking with experts on different subjects that provoke the interest of our audience. This is the first sector-specific discussion we are doing. We are confident that it will be useful and bring added value to our readers and to all the experts in the maritime business that are not aware of the subject. </span></p>
<h2><span style="font-weight: 400;">Cybercrime in the maritime industry &#8211; more essential than we think</span></h2>
<p><span style="font-weight: 400;">In today’s world, one of the biggest worries about organisations, regardless of their location and industry, is how vulnerable they are to cyber-attacks. We can mention specific sectors like finance, insurance, and healthcare where there is plenty of sensitive data and are preferred targets to hackers. And what about the maritime sector? </span></p>
<p><i><span style="font-weight: 400;">“When you take a closer look, the maritime sector seems to be big like the ocean. There are a variety of industries &#8211; from ports, through shipping, and up to IT systems and navigation. Most people don’t have a clue how huge the maritime economy is.”</span></i><span style="font-weight: 400;">, says Stefan Radushev.</span></p>
<p><span style="font-weight: 400;">In June this year, the CPO magazine came out with an </span><a href="https://www.cpomagazine.com/cyber-security/maritime-cyber-attacks-are-among-the-greatest-unknown-threats-to-the-global-economy/"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> titled: “Maritime Cyber Attacks Are Among the Greatest Unknown Threats to the Global Economy”. If you think this industry is irrelevant to you, just consider how one ship that got stuck </span><a href="https://www.bloomberg.com/news/features/2021-06-24/how-the-billion-dollar-ever-given-cargo-ship-got-stuck-in-the-suez-canal"><span style="font-weight: 400;">threatened the logistics of the whole world</span></a><span style="font-weight: 400;">. Since the pandemic started, the digital transition has gone over each industry. Also has increased the risk of cyberattacks. According to the article mentioned above, cyberattacks on vessels increased by 400%. And that is only at the beginning of when Covid-19 hit the world. </span></p>
<p><i><span style="font-weight: 400;">“If you read the </span></i><a href="https://lloydslist.maritimeintelligence.informa.com/LL1137457/One-ship-is-hacked-every-day-on-average"><i><span style="font-weight: 400;">statistics</span></i></a><i><span style="font-weight: 400;">, you can see that there is at least one incident a day related to the hacking of a vessel or company in the maritime business.”, </span></i><span style="font-weight: 400;">Stefan added. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1252" src="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-4.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-4.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-4-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-4-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">What can be done for prevention and what are the good practices in the sector?</span></h2>
<p><span style="font-weight: 400;">Since the statistics about cyber threats in the maritime industry are showing only an increase, we have to ask ourselves what is done and can be done for prevention? The first thing for sure will be to train all employees and increase their </span><a href="https://3cyber-sec.com/2021/10/13/staff-awareness-training-essentials/"><span style="font-weight: 400;">staff awareness</span></a><span style="font-weight: 400;"> about cybersecurity and the dangers that the business faces. </span></p>
<p><i><span style="font-weight: 400;">“When the team of the organisation recognizes the scope of the potential cyber-attacks and has the knowledge what to do to minimize the risk, you can be confident that your system, networks, and devices and your operation, in general, have better protection and chance of not being hacked”. </span></i><span style="font-weight: 400;">says Stefan Radushev. </span></p>
<p><span style="font-weight: 400;">Another good thing will be to explore the main vulnerabilities that the specific maritime business has in its cyber defense. There is no universal solution when it comes to cybersecurity. The best approach is the one tailor-made to the needs and challenges that each entity has. And in most cases, they are unique for each business. </span></p>
<p><i><span style="font-weight: 400;">“The first step is to know what you have to deal with. Imagine you are on a ship and are about to go out to the sea. You will check that everything with the vessel is secure before heading out into the water. If there is something that needs to be repaired, you will fix it. It is the same here. We have to identify the vulnerabilities, then treat them and make sure to be best prepared for any cybersecurity threats”</span></i><span style="font-weight: 400;">, the expert adds.</span></p>
<p><span style="font-weight: 400;">And this is a constant ongoing process. You can’t just do it once. Your staff should be trained regularly and continuously and the cybersecurity policies you have in place should be up to date with the latest threats. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1253" src="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-5.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-5.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-5-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-5-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">Good practices, guidelines, compliance, and standards about cybersecurity in the maritime industry</span></h2>
<p><span style="font-weight: 400;">Efforts on cybersecurity are not left to the maritime business alone. There are several standards and compliance checks that take care of the issues in the sector. The International Maritime Organization (IMO) has a dedicated section on its </span><a href="https://www.imo.org/en/OurWork/Security/Pages/Cyber-security.aspx"><span style="font-weight: 400;">website</span></a><span style="font-weight: 400;"> about maritime cyber risk. There are listed the following standards that businesses should meet:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Since January 2021, IMO has issued a new set of cybersecurity regulations that must be implemented by ship owners and managers; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"> Maritime Cyber Risk Management in Safety Management Systems resolution adopted in 2017 by the Maritime Safety Committee; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Entities like ICS, IUMI, BIMCO, OCIMF, INTERTANKO, INTERCARGO, InterManager, WSC, and SYBAss have provided materials with guidance about cybersecurity on board the vessels; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">There are reports for cybersecurity of ports (issued by IAPH Port Community) and recommendations on cyber resilience by IACS; </span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://3cyber-sec.com/iso-27001-certification/"><span style="font-weight: 400;">ISO/IEC 27001</span></a><span style="font-weight: 400;"> handles international information security management.</span></li>
</ul>
<p><i><span style="font-weight: 400;">“Each big company should have internal procedures and policies for the prevention of cybercrimes that have to be based on the standards mentioned above.”</span></i><span style="font-weight: 400;">, commented Stefan Radushev.</span></p>
<h2><span style="font-weight: 400;">Better late rather than never</span></h2>
<p><span style="font-weight: 400;">As we can see, the maritime industry faces increasing cybersecurity challenges. Companies in this field of work should act accordingly to reduce the potential threats they might face. Investing in cybersecurity is a step that should be done by all maritime stakeholders. With the growing number of cyberattacks, prevention is the best tool.  </span></p>
<p><i><span style="font-weight: 400;">“One of the oldest and most important industries in the world is stepping in the digital age very fast. This is uncharted territory for a lot of the decision-makers in the business. My advice to them is to turn to cybersecurity consultants that can help them develop and implement cybersecurity policies that are based on their needs. You won’t take a ship with a hole on the side to sail. Then why do that with the cybersecurity of your business?”, </span></i><span style="font-weight: 400;">commented Stefan Radushev. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/11/01/maritime-industry/">Experts&#8217; talk: Cybersecurity in the Maritime industry</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/11/01/maritime-industry/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts&#8217; Talk: Here&#8217;s What You Need To Know About Cybersecurity Honeypots</title>
		<link>https://3cyber-sec.com/2021/10/11/cybersecurity-honeypots/</link>
					<comments>https://3cyber-sec.com/2021/10/11/cybersecurity-honeypots/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Mon, 11 Oct 2021 06:52:14 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1231</guid>

					<description><![CDATA[<p>A cybersecurity honeypot is a shallow piece of the system of the organisation. It is designed with one single purpose - to attract the attention of any cyber attackers that will mistake it for an actual part of the system. </p>
<p>The post <a href="https://3cyber-sec.com/2021/10/11/cybersecurity-honeypots/">Experts&#8217; Talk: Here&#8217;s What You Need To Know About Cybersecurity Honeypots</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Let’s admit it &#8211; the first connection that you made with the word “honeypot” was Winnie-the-Pooh. In the same way, the ever-loved animated character is in love with honeypots, cybercriminals can be attracted and misled by these types of security decoy mechanisms. </span></p>
<p><span style="font-weight: 400;">This is the topic we are going to cover in our current edition of Expert´s Talk. In this series of articles, we are discussing with experts specific trends, insights, and perspectives in the field of cybersecurity. We will learn more about cybersecurity honeypots and the way they are used by Stefan Radushev. He is managing director and cybersecurity consultant in 3Cyber-Sec. Stefan has extensive knowledge and experience as a Cyber Security Consultant and Penetration tester within the Banking, Pharmaceutical, and  Maritime sectors. He can build comprehensive penetration testing scenarios in support of compliance frameworks so that remedial actions and processes can be set in place to eliminate and mitigate vulnerabilities in the companies he works with. </span></p>
<h2><span style="font-weight: 400;">What is a cybersecurity honeypot?</span></h2>
<p><span style="font-weight: 400;">A cybersecurity honeypot is a way for companies and experts to “hack” the hackers. This is a shallow piece of the system of the organisation. It is designed with one single purpose &#8211; to attract the attention of any cyber attackers that will mistake it for an actual part of the system. </span></p>
<p><i><span style="font-weight: 400;">¨In reality it is created to serve as a decoy and distract the attention from the real essential parts of the operations and infrastructure. Its main function is to alarm if an attack occurs. It also can help the people that installed and maintain it to understand the tactics and tools used by the hackers in their attempts to penetrate the organisation.¨</span></i></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1234" src="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-1.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-1.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-1-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-1-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">Types of honeypots used in practice</span></h2>
<p><span style="font-weight: 400;">As cybersecurity threats vary, so do the honeypots that are used to counter them. There are some preferred for the needs of the private sector, while others are strictly used by public bodies like government agencies and even military command bodies. Let’s go through the different types of honeypots out there: </span></p>
<h3><b>Honeypot that works with a low level of interaction</b></h3>
<p><span style="font-weight: 400;">As the name suggests, this type of cybersecurity honeypot is designed in a way to provide a limited part of the system in the form of a hacker bait. </span></p>
<p><i><span style="font-weight: 400;">¨It is hosted on a server and sets very streamline and numbered functionalities that can be appealing to hackers. The main goal here is to focus on the areas of the system that suffer cyber attacks most frequently. The end game? Locate where the attacks are coming from.¨</span></i></p>
<h3><b>Honeypot that works with a high level of interaction</b></h3>
<p><span style="font-weight: 400;">The complexity of the honeypot grows the investment you have to make to maintain it. Here we can have something that duplicates a whole production system. </span></p>
<p><i><span style="font-weight: 400;">¨This is like giving hackers a playground. You put some fences around and let them go wild inside. These types of honeypots can’t be detected by hackers so easily. And here the goal of the organisation/experts setting up the trap is different. It is to research and learn most they can about the cyber attacks and their source.¨</span></i></p>
<h3><b>Honeypot in the form of e-mail trap</b></h3>
<p><span style="font-weight: 400;">Spammers can be annoying and this is the way to deal with them. How an e-mail trap works are to set up a fake e-mail that all the spam letters will go to. After that their source can be tracked and blocked and you won’t hear of them again. </span></p>
<h3><b>Using a database as a decoy</b></h3>
<p><span style="font-weight: 400;">How do you limit attacks from SQL injections? Create a “fake” database and attract hackers to it while your real application remains intact and functional. If the database honeypot is compromised, observe what the vulnerable places are. If they are the same as in the real database take the actions needed to fix them. </span></p>
<h3><b>Net for the spider crawlers</b></h3>
<p><span style="font-weight: 400;">Here the name reveals the target. While other honeypots are directed at hackers and cyber attacks, here we are dealing with the automated spider crawlers. </span></p>
<p><i><span style="font-weight: 400;">¨“The net” here consists of a variety of online pages and links between them that will be a good pray for the spiders. The goal here is to study them and prevent further real damage they can do.¨</span></i></p>
<h3><b>Honeypot that prevents malware attacks</b></h3>
<p><span style="font-weight: 400;">This type of decoy is created in a way to trigger more malware attacks. Everything that is gathered here as useful information can be integrated into the development of software that detects and/or prevents malware attacks. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1235" src="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-2.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-2.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-2-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-2-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">Can you use more than one honeypot? </span></h2>
<p><span style="font-weight: 400;">There are cases where organisations set up two or more honeypots at the same time. These are called honey nets and they can even grow to honey farms in some cases. </span></p>
<p><i><span style="font-weight: 400;">¨If the network and infrastructure are big enough, such measures might be integrated into the whole cyber defense strategy of the company or institution.¨ </span></i></p>
<h2><span style="font-weight: 400;">The good and bad sides of having a honeypot</span></h2>
<p><span style="font-weight: 400;">Of course, the coin has two sides and there are pros and cons of maintaining cybersecurity honeypots. Here are the good ones: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You can learn useful insights about the cyber threats your company is facing; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You can understand what vulnerable places in the system are being targeted; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It sets a fake “red cape” for hackers to attack, instead of the system in place. </span></li>
</ul>
<p><span style="font-weight: 400;">On the other hand, there can be some downsides to honeypots that experts in the sector admit about: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If hackers find out that you give them decoy in the form of the honeypot, they can feed you false data, while planning an attack on your actual system; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You may have a honeypot set up that is not configurated in the best way to suit your organisation; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A honeypot can give you some misleading information even if there is no additional attack on your system. </span></li>
</ul>
<p><span style="font-weight: 400;">The integration of the correct cybersecurity honeypot(s) in your defense strategy against cybercrimes should be a tailor-made approach handled by experienced professionals. We at 3Cyber-Sec have a personal approach to any case our team examines. This allows us to give recommendations based on the needs of any client. If you want to learn more about our security services and find out if you really can use something like a cybersecurity honeypot, feel free to </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">reach out to us</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://3cyber-sec.com/2021/10/11/cybersecurity-honeypots/">Experts&#8217; Talk: Here&#8217;s What You Need To Know About Cybersecurity Honeypots</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/10/11/cybersecurity-honeypots/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts&#8217; Talk: Why Do You Need to Encrypt Your Data</title>
		<link>https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/</link>
					<comments>https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 23 Aug 2021 14:51:45 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1168</guid>

					<description><![CDATA[<p>Encryption is the process through which cryptographers transform data into code intending to protect it from unauthorized access.</p>
<p>The post <a href="https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/">Experts&#8217; Talk: Why Do You Need to Encrypt Your Data</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It’s finally time for our next Experts’ Talk article and we’re excited to share unique trends, insights, and perspectives from the cybersecurity world with you. This month we are joined by the Information Security Expert and certified Cybersecurity Consultant <a href="https://www.linkedin.com/in/steliyan-petkov/">Steliyan Petkov</a> with whom we will be exploring the topic of why data encryption is important and how it can help you minimize cybersecurity risks for your organization. Steliyan Petkov is a well-known expert in the field of Cybersecurity who has valuable experience gained across the highly regulated FinTech and Pharmaceuticals Industries. He focuses on assessing and evaluating risk from which Information Security Strategies can be both developed and enhanced. Steliyan Petkov’s expertise is further supported by his CISM, CISSP, and CDPSE Certifications.</p>
<h2>What does it mean to encrypt your data?</h2>
<p>So let’s not waste a minute and get started by defining what exactly does data encryption mean. Encryption is the process through which cryptographers transform data into code intending to protect it from unauthorized access. Usually, the sensitive data is scrambled and ordered in a practically unreadable way, and the information that it gives out does not make any sense. This unreadable text is referred to as ciphertext. To read the information users have to decrypt the ciphertext so that it transforms to its initial state of plaintext.</p>
<blockquote><p><em>“Encrypting data is not a new concept, it has been around for centuries. One of the oldest and most widely-known encryption techniques is the so-called Caesar&#8217;s cipher, named after the infamous Julius Caesar who used it to protect military messages. To encrypt a message using Caesar&#8217;s cipher you would need to replace each letter from the plaintext with a letter from the alphabet that is positioned a certain number of spaces before the letter that you need to replace. We refer to this number as the key because if the user knows what the number is, they can easily decipher the message. It sounds complicated, but it is actually pretty simple. So, for example, if you select the number 4 to be your key, then the letter A in the plaintext will be substituted by the letter W in the ciphertext, while the letter D will be switched for an A and so on. This method of encryption is called a substitution cipher, and while it was useful some decades ago, now we need to use more complicated methods of encryption.”</em>, shares Steliyan Petkov.</p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1169 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-36-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>So, for example, if you wanted to encrypt the word “CYBERSECURITY” by using Caesar&#8217;s cipher with a key of 3, you would end up with the following ciphertext: “ZVYBOPEZROFQV”. Another historical use of substitution cipher during WW2 is when the German Enigma machine was invented to help military officials send and receive secret information in the form of substitution cipher.</p>
<p>The encryption of data is still widely used today and it is arguably one of the essential cybersecurity practices. In fact, organizations and companies are often obligated to encrypt any sensitive data that they store or send via diverse communication platforms on the Internet. As Steliyan Petkov puts it, encryption could not only protect organizations from being hacked, but in case of an existing cyberattack, encryption could also make the difference between a massive breach of personal data and a compromising of unreadable ciphertext.</p>
<blockquote><p><em>“If you don’t encrypt the sensitive data your company handles, you are exposing your business to enormous risk. And I’m not only talking about the risk of a data breach, but also the risk of non-compliance with certain regulations and industry requirements. Consequently, if you’re not compliant, you may be faced with fines and reputational damages.”</em>, adds Petkov.</p></blockquote>
<p>Before we share which regulations require businesses to encrypt their data, however, we’ll first explore the different types of encryption used today.</p>
<h2>Types of Encryption</h2>
<p>There are two main types of encryption &#8211; Symmetric and Asymmetric (also known as public-key encryption). The differences between them lie in the speed of the process, the number of keys needed to encrypt and decrypt data, the length of the keys, as well as the means through which the keys are shared with other parties (key management).</p>
<ul>
<li>
<h3>Symmetric</h3>
</li>
</ul>
<p>This type of encryption uses one key for both processes &#8211; encryption and decryption. So, for example, if you want to send a secret message to John, you need to provide him with the encryption key, so that he can decrypt your message. Therefore, the risks associated with symmetric encryption are higher. As Steliyan Petkov explains it:</p>
<blockquote><p><em>“When only one key is used for encryption and decryption, both parties that participate in the communication need to know what that key is. Thus, the key needs to be exchanged and if this process is not done safely, the key could fall in the wrong hands. For example, you cannot simply send the key to the other party via email without it being encrypted itself. There are specific procedures that need to be followed when it comes to key management.”</em></p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1171 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-37-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<ul>
<li>
<h3>Asymmetric</h3>
</li>
</ul>
<p>With asymmetric encryption, there are two keys involved &#8211; one for encrypting the message (a public key) and one used to decrypt it (a private key). When this method is used, the sender encrypts the message with the public key and the receiver decrypts it with his/her private key.</p>
<blockquote><p><em>“The public key is available to anyone, hence the name. On the other hand, the private key is only known by the person receiving the message. Therefore, asymmetrically encrypted messages are less likely to be compromised by cybercriminals.”</em>, clarifies Petkov.</p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1172 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/07/3Cyber-Sec-blog-image-1200-x-600-38-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Because symmetric encryption is not as complicated as asymmetric, it is also a much faster process. Furthermore, the recommended length of the keys associated with both types of encryption is different. While in our example with Caesar&#8217;s cipher we only used a key containing one number (3), in reality, encryption keys consist of hundreds or thousands of numbers.</p>
<blockquote><p><em>“The encryption keys are essentially strings of symbols (digits, letters and some special characters) with different lengths. They could consist of 128, 192, or 256 numbers (professionals usually refer to those numbers as bits) and could even contain more than 2048 bits. At the time of writing, the recommended symmetric key length is 128 bits and higher, while the length for asymmetric keys is 2048 bits and higher.”</em>, shares Steliyan Petkov.</p></blockquote>
<h2>Why should you encrypt your sensitive data?</h2>
<p>Encrypting your data is crucial for your organization’s cybersecurity regardless of the industry your business operates in. Steliyan Petkov shares that many industry regulations require companies to encrypt their sensitive data:</p>
<blockquote><p><em>“Whether your business operates in the financial, healthcare, or any other sector, it’s strongly advisable, and in some cases compulsory, to encrypt the sensitive data you handle. The Health Insurance Portability and Accountability Act (HIPAA), for example, requires organizations to protect patients’ data via encryption or an equivalent alternative. Additionally, businesses can avoid hefty data breach fines from the California Consumer Privacy Act (CCPA) if the breached data cannot be accessed without a decryption key. Not to mention that the Payment Card Industry Data Security Standard (PCI DSS), as well as the Federal Information Processing Standards (FIPS) require organizations to encrypt sensitive data and anyone who fails to do so will be faced with expensive penalties.”</em></p></blockquote>
<p>According to<a href="https://info.entrust.com/rs/104-QOX-775/images/global-encryption-trends-study-re_es.pdf"> The Global Encryption Trends Study 2021</a> by Entrust, the data types that were routinely encrypted in 2020 were payment-related data (55%), financial records (55%), intellectual property (48%), employee data (48%), customer information (42%), healthcare information (26%), and non-financial business information (25%). Furthermore, according to the same study, the top four reasons for encryption in 2020 were:</p>
<ul>
<li>Protecting customer information &#8211; 54%</li>
<li>Protecting information against specific, defined threats &#8211; 50%</li>
<li>Protecting intellectual property &#8211; 49%</li>
<li>Complying with privacy or data security regulations and requirements &#8211; 45%</li>
</ul>
<p>It’s best if you outsource the task of encrypting your data to a professional cybersecurity team with the needed experience and expertise. 3Cyber-Sec’s team can protect your organization from cyber threats. As a boutique cybersecurity consultancy, we are passionate about providing tailored solutions to each of our clients and we’re always ready for new challenges. <a href="https://3cyber-sec.com/contact-us/">Contact us for a free consultation now</a>.</p>
<p>Did you enjoy our article? For more expert advice, read our last month’s talk, when we were joined by 3Cyber-Sec’s Business Development Manager and certified Cybersecurity Consultant Todor Kunev. Together with him, we discussed<a href="https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/"> the dangers phishing attacks propose for businesses and individuals.</a></p>
<p>The post <a href="https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/">Experts&#8217; Talk: Why Do You Need to Encrypt Your Data</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/08/23/experts-talk-why-do-you-need-to-encrypt-your-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts’ Talk: What Is Phishing And How Can You Spot It?</title>
		<link>https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/</link>
					<comments>https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 10:28:41 +0000</pubDate>
				<category><![CDATA[Experts' Talk]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=911</guid>

					<description><![CDATA[<p>3Cyber-Sec’s business development manager and certified cybersecurity consultant Todor Kunev gets to the bottom of phishing attacks and the dangers they propose for businesses and individuals.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/">Experts’ Talk: What Is Phishing And How Can You Spot It?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to the first post from 3Cyber-Sec’s monthly rubric “Experts’ Talk”! Each month we’ll be talking to recognized cybersecurity experts with the goal of shedding light on some of the key topics connected to the cyber world. Our guest experts will provide exclusively for our readers their unique perspectives on diverse questions in connection to their field of expertise. With years of experience and dozens of solved problems, they will give you essential advice that can save your business and help you stay afloat even in your hardest times. Make sure you don’t miss any publications from our sequence so you can stay on top of the latest trends and insights from the cybersecurity world and ensure your business’s safety.</p>
<p>Today, together with 3Cyber-Sec’s business development manager and certified cybersecurity consultant <a href="https://www.linkedin.com/in/todor-kunev/">Todor Kunev</a>, we’ll be getting to the bottom of phishing attacks and the dangers they propose for businesses and individuals. Todor Kunev is an exceptional industry professional, capable of devising and implementing cybersecurity scenarios to strengthen cybersecurity and safeguard sensitive information and systems for his clients. To achieve his current level of expertise, Todor has spent years working towards obtaining his licenses and certificates some of which include CDPSE, CISM, CCNP, and CCNA. He was eager to share his take on phishing with us, hoping that his advice might elevate some of the misunderstandings connected to the topic.</p>
<p>Let us explain what phishing is. It has nothing to do with the relaxing lake-house weekend you might be imagining. Although the word sounds just like the well-known hobby of fishing, phishing is not about you catching fish, but rather it’s about you being preyed upon by cybercriminals. In essence, this cyberattack type uses socially engineered emails (or in some cases text messages and voice calls) with the malicious intent to direct users to dangerous websites, distribute malware, collect credentials, and more.</p>
<p>As Todor Kunev puts it:</p>
<blockquote><p><em> “All phishing attacks aim to create a sense of urgency, provoke users’ interest or inflict fear. Once they’ve succeeded in grabbing users’ attention, cybercriminals usually propose a solution to the “urgent matter” in the form of a downloadable document or a link leading to a malicious website.”</em></p></blockquote>
<p>It is one of the most popular cyberattack methods which is widely used today. In 2020 alone, 75% of organizations had experienced phishing attacks, according to<a href="https://www.proofpoint.com/sites/default/files/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf"> research conducted by Proofpoint</a>. Furthermore, 74% of the attacks that targeted businesses in the US were successful. This data is concerning especially given the fact that phishing attacks could cost organizations $3.8 million on average, as reported by <a href="https://retruster.com/blog/phishing-attack-true-cost.html">retruster.com</a>. Therefore, businesses should do everything in their power to prevent this from happening to their organizations.</p>
<p>&nbsp;</p>
<h2>Types of phishing attacks</h2>
<p>There are quite a few types of phishing attacks depending on the communication channel and method used for the attack, as well as on its target. In terms of communication channels, we can outline four main types of phishing attacks &#8211; email phishing, smishing, search engine phishing, and vishing. As reported by <a href="https://www.tessian.com/blog/phishing-statistics-2020/">Tessian</a>, the most popular of them is email phishing with 96% of all attacks belonging to this category. The other 3% and 1% of the attacks were delivered via malicious websites (search engine phishing) and via smartphones (smishing and vishing) respectively. This data is also supported by <a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf">Proofpoint’s research</a>, which found that in 2020, 66% of the surveyed organizations experienced targeted phishing attacks, 61% of businesses faced smishing attacks and 54% of the respondents say they were targeted by vishing attacks.</p>
<blockquote><p><em>“Email phishing occurs when cybercriminals impersonate a person or a business and send you an email with the goal of tricking you into clicking on a malicious link or downloading an infected attachment. Smishing and vishing are both different types of phishing, however, they are not used to target users via email. Vishing is referred to when cybercriminals call you on the phone pretending to be an employee from a well-known company, Microsoft for example, and request that you give them your personal details or payment information. When you receive a text message with malicious links, then you’ve been targeted by a smishing attack. The word is formed from the combination between “SMS” and “phishing”. Last, but not least, search engine phishing, or “SEO poisoning” as we sometimes call it, is when hackers create malicious websites and try to rank them on the first pages of legitimate search engines such as Google. Those websites could offer irresistible product deals intending to collecting as many of the users’ card details as possible, or they could look like an exact copy of another website, again aiming to deceive the user into giving his or her personal information away.” </em>&#8211; explains Kunev.</p></blockquote>
<p>In terms of the target of the attack, there are two main types of phishing &#8211; whaling and spear phishing. They are both similar in the sense that they target specific groups of people. Spear phishing occurs when hackers strategically direct their malicious message towards a particular organization or a particular employee in a selected company. Whaling, on the other hand, refers to cybercriminals who target the CEOs or the “big fish” in a given organization.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-913 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-20-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>In his career as a cybersecurity expert, Todor Kunev has witnessed both whaling and spear phishing. According to him, those methods are particularly concerning because the messages they use are specifically crafted for the recipient (attack’s victim), which means the cybercriminals had to research their target.</p>
<blockquote><p><em>“Cybercriminals often research names and company roles of employees working in the targeted organization, they even go as far as stalking their social media profiles and browsing through their friends’ lists. The goal is to produce a highly targeted, highly personal message, which prompts the victim to reveal sensitive information (both personal or in relation to the business), make a bank transfer, or alter documents to the cybercriminal’s benefit.” </em>&#8211; says Kunev.</p></blockquote>
<p>Therefore, it is extremely difficult to recognize targeted phishing attacks such as spear phishing or whaling. In fact, <a href="https://securityboulevard.com/2020/12/staggering-phishing-statistics-in-2020/">97% of the users are unable to recognize a sophisticated phishing email</a>. However, if you’re not recognizing a problem, it doesn’t mean it’s not there.</p>
<p>&nbsp;</p>
<h2>Consequences of phishing attacks</h2>
<p>According to <a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2021.pdf">Proofpoint’s research</a>, due to phishing attacks in 2020 businesses were left to deal with data loss (60% of the respondents), compromised accounts (52% of the respondents), ransomware infections (47% of the respondents), malware infections (29% of the respondents), and financial loss or fraud (18% of the respondents). The consequences of phishing attacks also include legal trouble, reputational damages, and intellectual property loss. This includes trade secrets, research findings, new developments, and other valuable data, which often cost the targeted organization years of work and thousands of dollars of research. However, according to Todor Kunev, one of the most dangerous aspects of phishing is the fact that businesses take too long to even notice they were attacked.</p>
<blockquote><p><em>“It’s not uncommon for cybercriminals to target a business partner of yours in order to access your data. When the phishing attack is successful they can easily get hold of your network, because you and your employees perceive the already infected partner as a trusted source. Once the attackers gain initial access to your network through a given endpoint (one of your employees’ computers, for example) they may impersonate a legitimate user and continue to move laterally through your network. This means that even if you detect the initial point of access, you may not even notice or know that the cybercriminal is going through your files and systems and mapping them out until they find something of interest.”</em> &#8211; shares Todor Kunev.</p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-912 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-21-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>According to <a href="https://www.fortinet.com/resources/cyberglossary/cybersecurity-statistics">fortinet.com</a>, it takes approximately 280 days to identify and contain an average cyberattack. In the meantime, businesses lose $2.9 million a minute due to cybercrime, as reported by <a href="https://www.riskiq.com/resources/infographic/evil-internet-minute-2019/">riskiq.com</a>. We don’t even want to do the math on this one.</p>
<p>&nbsp;</p>
<h2>How to spot a phishing attack?</h2>
<p>Phishing attacks can often be easy to spot because of poor spelling and grammar, or because of poorly created links, which can hint that the web pages they lead to are fabricated. Some of the key clues of a phishing attempt are:</p>
<ul>
<li>The message is informing you that you need to take immediate action concerning a given matter</li>
<li>The message is sent from a public email domain (simply @yahoo.com, for example, as opposed to @3cyber-sec.com)</li>
<li>The domain name is spelled incorrectly</li>
<li>The email contains grammatical, spelling, and/or punctuation mistakes</li>
<li>The email includes a suspicious link or attachment</li>
</ul>
<p>However, targeted phishing attacks such as spear phishing or whaling can be difficult to recognize. That is why it’s important to educate your employees about the warning signs and appropriate action plans in case they are targeted. Todor Kunev’s expert opinion is that <a href="https://3cyber-sec.com/staff-awareness/">staff awareness training</a> should be done as regularly as possible, but not farther apart than 3 months:</p>
<blockquote><p><em>&#8220;In the digital transformation journey, our customers’ exposure change requires the implementation of robust security capabilities to mitigate risk-shift and enable the business’s vision. It is crucial for businesses to invest in staff cybersecurity awareness training because more often than not, your employee serves as the middleman between a cybercriminal and your organization. Your employees need to be able to recognize the warning signs and avoid opening suspicious emails.&#8221;</em> adds Kunev.</p></blockquote>
<p>If you don’t know how to organize staff cybersecurity awareness training, <a href="https://3cyber-sec.com/contact-us/">you can always contact us for advice</a>. 3Cyber-Sec’s team is composed of certified cybersecurity consultants, who can help you stay safe in the cyber world. We are determined to craft a tailored security solution for your specific needs.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/">Experts’ Talk: What Is Phishing And How Can You Spot It?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/06/21/experts-talk-what-is-phishing-and-how-can-you-spot-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
