Events

But I’m Too Small?

It is hard to believe, but there is a myth still shared by many small businesses and individuals.  The myth is “I’m too small for anyone to attack my business.”  This myth is far from reality.  A review of the target distribution data provided by hackmageddon.com shows that for 2019, the number one group being attacked is the individual (27%) and the number two group is multiple industries (14.3%), which is the small business group.

31% of all the cyber-attacks are designed for the individual and small business.  There is a logical reason for this.  Big business is taking cybersecurity seriously.  They have made it difficult for the criminals to break into their systems.  Criminals typically don’t want to work hard.  They have developed easily deployable tools to find those organizations that believe they are too small to be attacked (I call them “the low hanging fruit”).  At minimum, even if you don’t think you have anything worth stealing, your data has value to you.  Imagine not being able to access the data on your computer system.  That is the goal of ransomware, which continues to be one of the greatest threats to most organizations.  The reason for the steady increase in ransomware attacks is because it is an extremely successful tool to exploit money from their victims.

Implementing the best security tools won’t guarantee you will not experience some type of a cyber-event, but ignoring the facts and doing nothing, guarantees you are more likely to experience a bad day.

There is a minimum number of things that every business should implement that will minimize the threat of a cyber-attack such as ransomware.  The cost of these security tools has continued to drop and is now affordable for most small and medium sized businesses.  Quanexus has developed our Q-Stack which is a layered security approach to protect against cyber-threats.

Request your free network assessment today. There is no hassle, or obligation.

If you would like more information, contact us here or call 937.885.7272.

Follow us on FacebookTwitter and LinkedIn and stay up to date on by subscribing to our email list.

Posted by Jack Gerbs in Cybersecurity, Information Security, Physical Security, Recent Posts, Small Business, Wireless

Layered Security with Q-Stack

Our CEO, Jack walks through the layered security steps Quanexus uses to protect your data.

 

Posted by Jack Gerbs in Cybersecurity, Information Security, Physical Security, Recent Posts, Small Business, Wireless

Have You Been Hacked? Indicators of Compromise (IOC)

How do you know if you have been hacked?  Organizations often find out they have been hacked 3 to 6 months after the initial incident.  Typically, they learn of the hack from an outside source.

There are many items that should be monitored in a network to determine if there is a potential incident.  Below is a list of a few key items for monitoring Active Directory (AD) and your firewall.

In AD monitor these key items:

  • Any network login from a user with privileged (administrative) access. Privileged accounts should only be used to manage the network.  Users with administrative accounts should have a regular user account to perform normal business functions.  The use of privileged accounts must be justified.
  • The creation and deletion of user accounts.
  • The modification of user access rights – escalation or de-escalation.
  • Failed logins. Many failed logins can indicate the account is at risk.

On your firewall monitor these key items:

  • Top users by bandwidth and sessions. These metrics should be used to create a baseline to detect anomalies.
  • Outbound firewall traffic that is being blocked. This indicates that a user or their computer is trying to reach unauthorized sites.

The items suggested above are the minimum key indicators that can be monitored to help you if you have a potential incident.

Posted by Jack Gerbs in Cybersecurity, Information Security, Recent Posts, Small Business, Wireless

Capital One Data Breach from My Perspective

Capital One was breached and had 106 million applicants’ information stolen. This breach is one of the largest data breaches to occur. In comparison, the Equifax breach affected 150 million people. Capital One’s breach included 100 million US and 6 million Canadian applicants. These numbers are significant because with the US population estimated at being 330 million people, including minors, this means the breach affects an incredible percentage of US adults.

How did this happen? Capital One has embraced a cloud strategy and uses Amazon’s cloud services. Paige A. Thompson, a 33-year-old, hacked through Capital One’s firewall and was able to steal the applicant data. The stolen data includes applicant information from 2005 to early 2019. The data elements included in the breach include: addresses, dates of birth, self-reported income, social security numbers, bank account numbers, email addresses and more. Fortunately, only 140,000 social security numbers and 80,000 bank account numbers were stolen. This is a very small percentage of the overall breach. Additionally, no credit card numbers or user passwords were stolen. The criminal complaint against Ms. Thompson is, she intended to sell the data on-line. Capital One has stated that it is unlikely the stolen information was disseminated or used for fraud.

What you need to know and do: Because no passwords were stolen, there is no immediate threat of fraudulent bank or credit card transactions. If data was successfully sold on the Dark Web, you can expect an increase in social engineering attacks targeted to individuals and businesses. These attacks will be in the form of SPAM emails, telephone calls, etc. Everyone needs to understand how crafty these criminals are in creating messages that look legitimate.

WARNING: Criminals always take advantage of a crisis. If you receive an email from Capital One advising that you were affected by the breach, it could be a SPAM email. Always verify the link in any email before you click (“Think Before you Click-It”). Even better, don’t click on any links in emails. It is a better practice to go directly to the company’s web site by typing in the URL in a new browser.

Remember: It typically takes more than one thing to go wrong for a company to suffer an IT security incident. For more information on protecting or managing your network, contact Quanexus at www.quanexus.com or call 937-885-7272.

Request your free network assessment today. There is no hassle, or obligation.

Follow us on FacebookTwitter and LinkedIn and stay up to date on by subscribing to our email list.

Posted by Jack Gerbs in Cybersecurity, Information Security