In your efforts to fix everything, here’s RedLegg’s cyber-news update, featuring some of the top vulnerabilities, risks, and happenings in the industry.
The U.S. Loses Over $1.5 Trillion in a Decade of Data Breaches
Companies may be spending a small amount now vs the incident response, recovery and PR costs associated with a breach.
9 YEARS to Discover a Breach?!?!?
Dominion National, a dental and vision insurer, discovered that a breach occurred 9 years ago! This is a massive problem and one that shows poor security on the part of the organization. This reinforces the importance of Detect and Response tools like SIEM and EDR, as well as leveraging threat intel.
Bluekeep Coverage Increases Patching
As much as it PAINS us that it takes massive media coverage to get patching done, we’re glad to see this happening. Remember though, you may need a proper vulnerability management program. This includes vulnerability scanning, such as RedLegg’s vuln scan service and an automated patching solution to cover OS and application patching beyond the Microsoft level.
Riviera Beach, FL to Pay Nearly $600,000 Ransom to Attackers
RedLegg sells phishing tests, and our customers are generally happy with only 20% of their staff clicking on the tainted email. This story drives home how it only takes ONE click to cause a major breach. This particular opening of a tainted email is costing the city $600,000.
If you’re a small business or in an industry like manufacturing, thinking there is “nothing important to attack,” this is not true. Small businesses usually have weaker security postures and are prime targets for ransomware attacks and whaling.
vCISO is highly recommended, but there are some additional ways to help protect these networks including tools like Email Security, security awareness training and phishing exercises, and a valid Business Continuity and Disaster Recovery (BCDR) plan and recovery tool to be able to restore the network without paying the ransom.
Security Practice Principles
There is this little conference in Indianapolis that a handful of folks are talking about. Here is a video on Security Practice principles from the conference.
iOS Devices Compromised, Again
It feels like every other day we see a vulnerability on Android or iOS come to light. Recently, Apple is up to bat. What’s unique about this is it is only 149 lines of codes yet offers an extremely sophisticated attack leveraging multiple malicious domains and PNG files in ad networks.
Malware and Attacks Everywhere:1. Trojan
Cyberattack campaign leveraging trojans in Excel.
A massive espionage campaign involved the theft of call records from attacked cell network providers to conduct targeted surveillance on individuals of interest.
3. Dell Computers Vulnerability
It has been revealed that a Windows support tool bundled with Dell computers has a high-severity security hole that leaves millions of systems at risk of a privilege-escalation attack. This has the potential to affect multiple systems.
Want even more? Read about...