Security OPS teams are often limited by their own rules. When an event is suspected, the only people allowed to have knowledge and information about the suspected event are security people, which limits not only the effectiveness of that investigative body, but also the effectiveness of detection, early-warning, and response ultimately. This need-to-know problem is the reason why many organizations have separate IT OPS and Security OPS event managers, ticketing systems, and investigative processes...
HP Following the Wh1t3 Rabbit - Practical Enterprise Security
Sophos - Naked SecurityApple has released updates for users of the iPod Touch, iPhone, iPad and Apple TV products that fix critical vulnerabilities. Apple users should update their devices to iOS 6.1 as soon as possible.
Sophos - Naked SecurityA new variant of the prevalent Citadel crimeware kit has been discovered to target Point of Sale (POS) devices. Find out more, in this analysis from SophosLabs expert James Wyke.
Network World - Networking Nuggets and Security SnippetsI was changing the channels this weekend and landed on the local news. Before moving on, I happened to catch two “local” stories:
1. Citizen’s Bank, a fairly large regional bank based here in New England was experiencing a Distributed Denial of Service (DDOS) attack. A group of Iranian hackers called the Martyr Izz ad-Din al-Qassam Cyber Fighters claimed responsibility.
2. The hacktivist...
Recent research investigated the status of data loss prevention (DLP) uptake in the UK. The results have shown that, despite a raft of high-profile data breach incidents in recent years, many organisations are still burying their heads in the sand.
Over half (58%) of respondents admitted to not using DLP technology, highlighting a gaping hole in the security defences of many companies and organisations. Of those that did deploy the technology, only 14% used it for flash drives, despite the fact that this is one of the easiest ways for an employee to steal information. Email/web fared slightly better (at 24% deployment), with database applications coming in at 23%.
So what causes an organisation to decide against protecting its information? Predictably, IT directors named cost as the biggest inhibitor, which comes as no surprise considering the strains IT budgets have been under in recent years. There is also the ever-present issue of how seriously the board takes IT security (or how much it understands what is at risk). It is likely that many decide that there hasn’t been a problem to date, so there is little need to allocate extra budget to shoring up defences. It is this short-sighted view that can irrevocably damage a company’s reputation.
It would be wise for organisations to consider the burden of responsibility and the impact of not putting in place appropriate security. Legislation aside, when a customer or prospect gives their personal details, confidential information or the like, they expect the recipient to treat them with respect and care. Losing their data, despite the ready availability of DLP systems, will likely be regarded as unacceptable by the customer, and begs the question: if the company can’t be trusted with securing a simple database (for example), how can it be trusted elsewhere?
It is time that organisations understand that a comprehensive and robust security solution is no longer an option, but an absolute necessity.
Sophos - Naked SecurityCheck what you share on your Facebook account *before* Facebook Graph Search is rolled out to a wider audience - or else prepare to suffer the consequences..
Sign up now »
Clearswift SECURE Email Gateway is an effective and resilient email gateway for 50 to 50,000 users.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.