Privilege Access Management It is in the Security 101 manual that end users (no matter who they are) should not have admin rights on their workstations. Certain users may be allocated an administrative account for their workstation, but this account must not have internet access or an associated email account and must not be used for normal day to day tasks. However, in general this is not a recommended approach and also has its share of problems. The reason for this is simple, admin rights enable applications and processes to execute in the context of a privileged user which in essence means code can get installed or access the system at a low level, in many cases without the user knowing. Removing admin rights on a Windows workstation will immediately thwart somewhere in the region of 80% of current threats. It also allows the Domain administrators to take back control of their endpoints. How often have we heard this from decision makers? “I don’t mind users having
Posts
Email Retention Policies
- Get link
- X
- Other Apps
Many companies have little to no email retention policies in place. The idea here is to ensure that if a business related email is required, it can be recovered for up to a 6 year period. However it has also been raised that 6 years may not actually be sufficient when projects which are completed over a long period of time are concerned. Therefore 6 yrs from time of project completion should be the consideration. In some cases financial data may need a slightly longer period of retention to match other financial requirements. The question is how do you manage this type of thing. Users have the ability to delete their emails etc and therefore relying on users to manage their own mailboxes completely may not be the best option. Many companies opt for an email archiving solution which provides a copy of every email in and out to be stored safely and all access to these stored messages audited for compliance. With the adoption of cloud email services this retention can present
NotPetya Cyberwarfare ?
- Get link
- X
- Other Apps
It is interesting that many are regarding this latest NotPetya attack as Cyberwarfare and not Ransomware. The main reasons for this assumption are as follows: Due to the nature of the infection, it would appear that Ransomware is being used to mask the true nature of the attack. The files seem to be unrecoverable. Similar to wiping a hard disk, the entire drive is rendered unuseable by overwriting the Master File Table. It would definitely appear that the intention is to destroy rather than hold to Ransom.
Athena Spyware and EternalRocks
- Get link
- X
- Other Apps
Wikileaks last week released documents detailing an application created by the CIA used to covertly monitor and control virtually any current version of Windows. Basically the application named Athena is spyware which gives full rights over the PC to the control. There is even a full user guide. HERE . And there is also news of a rival to Wannacry called EternalRocks which has the potential to be even more destructive. Eternal rocks makes use of seven of the NSA exploits leaked. Wannacry used two of the exploits. At present there is no reported activity related to this malware but it is very covert and includes serveral techniques to avoid detection. So the question is, who are the bad guys? The ones who leak the information or the ones who know about it but decide not to tell anyone? We know in reality that the bad guys are already two steps ahead of the authorities when it comes to CyberSecurity so would it not be in everyones interest if the Authorities actually made a
SHA-1 Certificates will be rejected by the latest browsers.
- Get link
- X
- Other Apps
Websites and systems protected using certificates using Sha-1 algorithms will no nonger be accepted by new browsers. IE11 and Chrome for example wont allow a user to continue on to the site regardless. Most public CA's have been issuing more scure certificates for some time now, however many internal CA's are still using Sha-1 to sign their certificates. Its time to check and upgrade/reconfigure if you want your systems to keep running smoothly. Microsoft for example has several articles on how to deal with the situation in their support site. I recently helped a customer running Windows Server 2008 Domain to upgrade their CA to issue the higher security certs.
Is your company ready for GDPR ?
- Get link
- X
- Other Apps
What is it ? Put simply it is a set of new policies adding to the current Data Protection Laws in the EU. Companies will be required to respect "the right to be forgotten". This means that you must be fully in control of your data in such a way that all digital traces pertaining to any individual must be fully deleted should the request be made. Whats is in scope ? Basically all of your data must be cleansed of any identifying data if requested. This will include all past and present data including archives and backups. What if I dont comply with a request ? Penalties will be imposed of up to 4 percent of worldwide turnover. How should this be implemented ? You will need to be able to demonstrate a process which is implemented and fully documented which complies with each request. What problems need to be overcome ? The biggest issue is knowing your data. In other words having fully indexed data and systems which will ensure this can be conducted in a tho
Fortinet releases 5.6 FortiOS for Fortigate but Analyzer users should not upgrade yet.
- Get link
- X
- Other Apps
The new release of FortiOS has been around for several weeks now, however many users are realising that they cannot continue to use their FortiAnalyzer running the 5.4 code. It needs to be upgraded to 5.6 on the Analyzer as well. One problem is that we are still waiting for 5.6 for FAZ. Therefore people are downgrading. In all fairness the FAZ compatibility guide is quite clear but why release one without the other.