Our Mission: Secure S.A.

 In Security

At Blackbird IT, we’re taking it upon ourselves to educate South Australian businesses on the pitfalls and common misconceptions around cyber security. Together with the South Australian community, we’re endeavouring to achieve zero data breach headlines in South Australia by 2020.
To do this, it’s imperative your organisation is aware of these six security threats circulating now.

icon-passwords

Threat:

Passwords

Why?

Password re-use and poor password choice are providing cybercriminals easy access to your network. One password in the wrong hands can quickly unravel your organisation’s security posture.

WHAT YOU CAN DO NOW:

After examining a database of over 28 million users and their 61 million passwords, researchers at Virginia Tech University uncovered 52% of users had the same passwords for different services. Educate staff on ensuring their passwords for IT services across both personal and work accounts are all unique. Share the website www.HaveIBeenPwned.com with staff to see if their credentials have been exposed.

Assess your organisation’s domain for potential data breaches using the above tool and implement a password manager such as Last Pass or 1Password, to ensure each company password is unique. Also, implement 2-factor authentication across your environment.

icon-phishing

Threat:

Phishing

Why?

Cybercriminals are regularly using social engineering techniques to convince users to click on links or open attachments in Phishing emails carrying malicious payloads. These techniques are successful because users are too trusting of email.

WHAT YOU CAN DO NOW:

Educate your staff using free tools such as the Sophos Anti Phishing Toolkit.
This toolkit will assist your staff in how to spot Phishing emails. For further protection, use Sophos Phish Threat to identify where further training might be required.

90% of data breaches involve Phishing, that’s why it’s imperative to undertake regular testing with tools like the Sophos Phish Threat, to assess your staff’s ability to identify Phishing scams.

icon-spear-phishing

Threat:

SPEAR PHISHING

Why?

Spear Phishing is a type of Phishing attack that targets a specific contact or organisation. While they require more effort, they can be more lucrative for the cybercriminal and are growing in prevalence. Whaling is a type of Spear Phishing that targets high profile individuals with valuable information or authority over finances. Impersonation tactics are often used to convince victims to redirect funds to the cybercriminal’s account.

WHAT YOU CAN DO NOW:

Implement an operational process to ensure that changes in supplier financial details must require vocal verification with a known contact at the supplier. Ensure staff making the call are on the lookout for anything that is out of character or seems suspicious. In addition to educating users with the Sophos Anti Phishing Toolkit and Sophos Phish Threat, you can also educate users on known scams targeting businesses such as the iTunes Card scam that often occurs at Christmas time.

icon-lost-stolen-devices

Threat:

LOST/STOLEN DEVICES

Why?

Devices go missing, they get left on trains, in coffee shops and unattended in public places. If an cybercriminal has physical access and drives aren’t encrypted, it’s a trivial process to circumnavigate a password on the device and gain access. According to a study by Beazley Insurance, 73% of service breaches involving portable devices in 2013 could have been prevented with encryption.

WHAT YOU CAN DO NOW:

Enable built-in encryption with Sophos Central Device Encryption on Windows laptops, and Sophos Central Mobile or Jamf Pro on Apple laptops. This will prevent access to file stored on the device, in the event of theft or misplacement.

Implement an encryption management platform across your laptop fleet such as Sophos Encryption, in case users lock themselves out of the device.
You can also implement a mobile device management platform such as Sophos Central Mobile or Jamf Pro, to ensure company smartphones and tablets are protected.

icon-ransomeware

Threat:

RANSOMWARE

Why?

Occurs when cybercriminal use built-in encryption tools to encrypt and capture company data, preventing access until a fee has been paid. According to security firm PhishMe, Ransomware attacks have increased over 97% in the past two years. There is a growing trend whereby cybercriminal first gain access to systems via weak passwords and then remove antivirus software, before infecting both production and backup systems with Ransomware.

WHAT YOU CAN DO NOW:

It’s essential that backup data is copied to an air gapped network (via a service such as Veeam Cloud Connect) to ensure the backup files can’t be compromised if network defences have been breached. Network policies can be deployed to ensure that downloaded files can’t be automatically executed, preventing many ransomware variants from launching.

Implement enterprise grade protection across your environment with Sophos Endpoint Protection and Intercept-X.

icon-visual-hacking

Threat:

VISUAL HACKING

Why?

Visual hacking occurs when a user is working in public and prying eyes attempt to retrieve sensitive or confidential information. Slow motion cameras on smartphones are often used to capture keyboard presses when passwords are entered. Often though, an cybercriminal may simply be opportunistic such as seeing a competitor slide deck when flying to pitch to the same customer.

WHAT YOU CAN DO NOW:

Educate your users on the dangers of accessing confidential information in public, you never truly know who could be watching. As a direct response to the threat of visual hacking, HP has developed an embedded security tool in their business PCs called HP Sure View, which is an integrated privacy screen developed to thwart visual hackers.

At Blackbird IT, we strive to provide a service that allows our clients to perform as well as possible, our customers’ success drives our success. We want to educate the South Australian community on prominent cyber-security threats, and the free and often simple educational processes you can put in place to avoid becoming the next victim. Through working with Sophos and spreading the word, we want to ensure your technology gives you value, and South Australia remains secure.

If you would like to discuss best practice IT security solutions, please give us a call on (08) 7324 7777, or alternatively, make an enquiry and we’ll give you a call.

Recent Posts
Sophos