Features Archives - IT Security Guru https://www.itsecurityguru.org/category/features/ The Site for our Community Thu, 21 Sep 2023 08:39:57 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png Features Archives - IT Security Guru https://www.itsecurityguru.org/category/features/ 32 32 SME Cyber Security – Time for a New Approach? https://www.itsecurityguru.org/2023/09/21/sme-cyber-security-time-for-a-new-approach/?utm_source=rss&utm_medium=rss&utm_campaign=sme-cyber-security-time-for-a-new-approach Thu, 21 Sep 2023 08:39:57 +0000 https://www.itsecurityguru.org/?p=49765 The UK is home to around 5.5 million Small and Medium-sized Enterprises (SMEs). They collectively account for 99.9% of businesses, generating three fifths of employment, and with a combined turnover of £2.3 trillion. As such, they represent a vital element of the economy and a significant national asset, which in turn, highlights a need to […]

The post SME Cyber Security – Time for a New Approach? appeared first on IT Security Guru.

]]>
The UK is home to around 5.5 million Small and Medium-sized Enterprises (SMEs). They collectively account for 99.9% of businesses, generating three fifths of employment, and with a combined turnover of £2.3 trillion. As such, they represent a vital element of the economy and a significant national asset, which in turn, highlights a need to ensure that they are protected. The connected and IT-dependent nature of modern businesses means that the cyber perspective will be crucial here, but smaller organisations are typically not well placed in terms of related expertise and capability. Many take steps to outsource their security, in the hope that someone else will manage it (although even this arguably requires some knowledge of where to look and what to look for), whereas others may be reliant on limited in-house knowledge or potentially, overlook things entirely.  

The annual DSIT study of Cyber security skills in the UK labour market consistently reveals a lack of basic skills, with the 2023 results indicating that 50% of businesses have a basic skills gap in relation to technical cyber security (estimated to equate to approximately 739,000 businesses). The basic skills referred to in this context includes areas such as configuring firewalls, detecting and removing malware, and choosing secure settings. The gap is lower in large businesses (18%), highlighting that smaller organisations face the more pronounced problem. Many SMEs are consequently ill-positioned to attend to their own needs, leaving them both exposed and dependent upon further support in the event of incidents, or when making security-related decisions (including those around technology adoption and procurement).  

More directly highlighting a challenge for smaller businesses, the latest release of the UK Cyber Security Breaches Survey suggests a drop in attention toward a range of basic cyber hygiene related activities, such as use of password policies, use of network firewalls, and timely application of security-related software updates (all of which have declined around 10% in the last two years). The survey observes that the results in large businesses have not changed, and so the difference is attributable to the SME community (and in particular, to the situation within micro businesses). While the decline may be explained by factors such as post-pandemic challenges and financial pressures during an economic downturn, the net result will nonetheless be that organisations are less protected and at greater potential risk from incidents and attackers (which in turn, could have more serious consequences and costs for the affected businesses).  Such factors further highlight the potential for SMEs to be even more exposed and in need of greater support. 

In parallel, SMEs face an increasing expectation to address cyber security and comply with good practice. An example is the increasing requirement for compliance with Cyber Essentials, where SMEs can potentially find themselves obliged to meet standards that they lack the skills to action.  

This backdrop provides the context for a new 2.5 year research project led by the University of Nottingham, in partnership with Queen Mary University of London and the University of Kent.  The aim of the research is to better understand the cyber security support needs of the SMEs (particularly those of smaller businesses), and to pilot a new approach that engages them in further supporting each other.  

The initial phase of the research seeks to establish SMEs’ current understanding and confidence around cyber security, as well as their awareness and perceptions of available support. It will examine the situations in which SMEs may seek advice and support (e.g. what happens when they have concerns, questions, or indeed, incidents), and the extent to which they feel that they achieve effective outcomes. At the same time, consideration will also be given to the existing routes for support, looking at the coverage and consistency of advice, as well as the confidence and capacity of those offering it. 

Based upon the findings from these initial activities, the research will then take a more specific focus by attempting to track and analyse individual ‘support journeys’ from participating SMEs.  The intention is to determine a set of related case studies, looking at the nature and extent of support being sought, and the factors that lead to successful or unsuccessful outcomes.  The ultimate aim of the project is to then use the collective findings to inform the design, implementation and piloting of Cyber Security Communities of Support (CyCOS).  

These will be a basis for local collaboration and cooperation between SMEs and associated advisory sources, with the community offering a basis for SMEs to identify and share their support needs and have contact with advisory sources positioned to help them (which may include peer support from other SMEs). The project aims to trial the operation of the CyCOS via three pilots, enabling a practical evaluation of the approach, with a view towards establishing a repeatable model that can be adopted more widely. 

SMEs that would potentially be interested in being kept updated or contributing to the work are invited to contact the research team via steven.furnell@nottingham.ac.uk.  

Equally, if you would like to learn more from Professor Steven Furnell on how we, as a cyber security community, can better support SMEs, be sure to attend his Global Cyber Summit session at International Cyber Expo (London Olympia) at 5pm on the 26th of September 2023.

He will address the following:

  • Recognising the support needs of small businesses, including their current understanding and confidence around cyber security
  • The coverage, consistency and accessibility of existing support routes available to SMEs
  • The concept of Cyber Security Communities of Support, fostering localised collaboration between SMEs and advisory sources  

To register for FREE as a visitor: https://ice-2023.reg.buzz/eskenzi

The post SME Cyber Security – Time for a New Approach? appeared first on IT Security Guru.

]]>
Over a Third of UK Population Believe Prison is the Most Suitable Punishment for Individuals Responsible for Data Breach https://www.itsecurityguru.org/2023/09/19/over-a-third-of-uk-population-believe-prison-is-the-most-suitable-punishment-for-individuals-responsible-for-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=over-a-third-of-uk-population-believe-prison-is-the-most-suitable-punishment-for-individuals-responsible-for-data-breach Tue, 19 Sep 2023 12:56:01 +0000 https://www.itsecurityguru.org/?p=49671 New statistics by International Cyber Expo reveal that in the event of a data breach at an organisation, nearly one in every five (19%) individuals across the UK believe the person(s) who allowed initial entry via phishing, poor security practices etc. should be held most responsible and face the harshest penalty. Additionally, of these individuals, […]

The post Over a Third of UK Population Believe Prison is the Most Suitable Punishment for Individuals Responsible for Data Breach appeared first on IT Security Guru.

]]>
New statistics by International Cyber Expo reveal that in the event of a data breach at an organisation, nearly one in every five (19%) individuals across the UK believe the person(s) who allowed initial entry via phishing, poor security practices etc. should be held most responsible and face the harshest penalty. Additionally, of these individuals, over a third (34%) consider prison to be the most suitable punishment for a data breach. The research shines a renewed spotlight on blame culture.  

This survey was conducted among 1,000 nationally representative UK respondents (aged 16+) by Censuswide, on behalf of International Cyber Expo

Granted, a higher proportion of the population (29%) think the cybercriminals who exploited the organisation’s vulnerabilities should be held most responsible. Yet, historically, most cyber crimes go unreported and cybercriminals are rarely convicted. When asked who should be responsible for financially compensating the victims of a data breach (i.e. the individuals, not the corporation), 35% believe it should be the perpetrators, followed by the Courts through compensation orders (26%) and the Treasury through the Proceeds of Crime procedures (20%). However, in each of these scenarios, a clear determination of the offender is required, which is not often achieved with cybercrime.

International Cyber Expo’s Advisory Council member, Flavia Kenyon – Barrister at The 36 Group, adds: “It is imperative that cyber laws and regulations continuously adapt to keep up with technological innovation, so that they are fit for purpose in order to ensure clarity, effective compliance, and enforcement.  

The current legal framework is fragmented, and in the absence of an overarching cybersecurity legislation, there is a raft of acts and regulations. The Computer Misuse Act 1990, the main act that criminalises unauthorised access to computers, the so-called ‘hacking offences’, is often enforced in conjunction with the Data Protection Act 2018, and even with the Fraud Act 2006, and the Proceeds of Crime Act 2002 to punish those responsible for cyber-attacks, enable asset-tracing and compensate victims.  

Additionally, there are mandatory duties (including directors’ duties under the Companies Act 2006) that trigger civil liability and fines for non-compliance under the DPA 2018, the UK-GDPR, NIS Regulations (Network and Information Security Regulations 2018), and the latest Telecommunications (Security) Act 2021, the latter expected to be fully implemented in 2024.  

Time will tell if this legal framework can deliver on ensuring protection of our most critical digital infrastructure and of our most-pressured asset, data.  

When it comes to liability, and enforcement, it is important to distinguish between software developers, who purely develop the code underlying open-source protocols, from third parties who use the protocol to cause harm and/loss, and those who provide, operate, and control the network, and benefit from it financially.”

Apart from the cybercriminals themselves and individuals who allowed initial entry, 18% of survey respondents believe the CEO or board members of software providers (e.g video conferencing tools, cloud file storage etc.) should be held most responsible for not providing secure products and updates. A further 15% and 14%, respectively, hold the CEO or board members of the targeted organisation, and the CEO or board members of cybersecurity providers most responsible. This is interesting in light of the White House’s recently announced National Cybersecurity Strategy, which endeavours to shift the liability for insecure software products and services to the entities making them. Meanwhile, 16% of respondents maintain that the cybersecurity team of the targeted organisation should be the ones held most responsible; which may add to fears among CISOs of personal liability.

The International Cyber Expo takes place next week. It is held on the 26th and 27th of September 2023 at London Olympia. To register for FREE as a visitor visit: https://ice-2023.reg.buzz/eskenzi

The post Over a Third of UK Population Believe Prison is the Most Suitable Punishment for Individuals Responsible for Data Breach appeared first on IT Security Guru.

]]>
MGM and Caesars Casinos Suffer Massive Cyberattack https://www.itsecurityguru.org/2023/09/15/mgm-and-caesars-suffer-massive-cyberattack/?utm_source=rss&utm_medium=rss&utm_campaign=mgm-and-caesars-suffer-massive-cyberattack Fri, 15 Sep 2023 12:54:17 +0000 https://www.itsecurityguru.org/?p=49630 Two of Las Vegas’ iconic casinos, the MGM and Caesars hotel, have fallen victim to a major cyberattack. Over the course of this week, it has been revealed that computer systems had been left severely disrupted, causing widespread panic throughout the hospitality and gaming industry. Reports claim casino guests and staff have had difficulties accessing […]

The post MGM and Caesars Casinos Suffer Massive Cyberattack appeared first on IT Security Guru.

]]>
Two of Las Vegas’ iconic casinos, the MGM and Caesars hotel, have fallen victim to a major cyberattack. Over the course of this week, it has been revealed that computer systems had been left severely disrupted, causing widespread panic throughout the hospitality and gaming industry.

Reports claim casino guests and staff have had difficulties accessing room reservations, making transactions, and using key services. The management immediately initiated an emergency response protocol to contain the situation and mitigate the damage.

MGM Resorts International, the parent company of MGM Caesar, confirmed the attack in a press release issued this week. The statement noted that the company’s IT security teams were working tirelessly to restore normalcy. In the meantime, they assured customers that their personal and financial information remained secure due to advanced encryption protocols and immediate action taken to isolate the affected systems.

Local law enforcement and federal agencies have launched an investigation into the cyberattack. Their primary focus is on identifying the perpetrators behind this breach and determining their motives. The casino’s surveillance footage is expected to be a crucial piece of evidence in the ongoing investigation.

This incident serves as a stark reminder of the importance of cybersecurity measures, not only for corporations but also for the protection of customers’ sensitive information. As the investigation unfolds, MGM Resorts International has promised to keep its stakeholders and the public informed about any developments related to the cyberattack.

The following cybersecurity experts have provided their insights and thoughts.

James McQuiggan, security awareness advocate at KnowBe4:

Organizations work tirelessly to protect their infrastructure and data from cybercriminals. The challenge lies with the third-party service providers who can also access the network. If they have a different security culture and mindset, it can only be a matter of time before your organization succumbs to an attack. While cybersecurity occurs daily, a Third Party Risk Management program is crucial to assess vendors, security practices, controls, past breaches, and financial stability. Proactively managing third-party cyber risk is crucial for resilience. A robust TPRM program can pay significant dividends in the long run and will only lead to a data breach without one.

Darren James, a Senior Product Manager at Specops Software:

This is another example of where threat actors are using a combination of publicly available information, technology, and human behavior to gain access to valuable and sensitive systems and data. It’s important for organizations to realize that zero trust extends to all processes including those of the service desk. Securely verifying the user at the other end of the line has never been more important, you can no longer rely on weak factors such as a recognizable voice, or a shared code word. Without secure verification at the service desk, you’ll be leaving yourselves open to both monetary and reputational consequences – something that appears in this case that could have been avoided.

Erfan Shadabi, cybersecurity expert at comforte AG:

In an era where digital transformation is reshaping the way the tourism industry operates, the reliance on interconnected systems and data-driven processes has never been greater. As such, the sector becomes an attractive target for cybercriminals seeking financial gain or to exploit vulnerabilities for malicious purposes. The MGM Resorts incident is emblematic of this overarching challenge. Recognizing the pivotal role technology plays in enhancing guest experiences, optimizing operations, and facilitating global connectivity, the tourism industry must allocate resources to bolster its cybersecurity posture. To that purpose, data-centric security stands as the most effective approach in safeguarding organizations within the tourism industry due to its inherent focus on protecting the core asset that cybercriminals seek to exploit: data itself.

Fergal Lyons, Cybersecurity Evangelist at Centripetal:

“While the event has not been officially disclosed, the early indications are that this is severe and widespread ransomware attack. If past performance in this industry is an indicator, then we could anticipate MGM paying the ransom if they see no other option.. Cybercriminals are finding ransomware to be a lucrative industry, capitalizing on vulnerabilities and exploiting careless employees. The methods employed are diverse, tailored to the specific companies they target. Thus, it is imperative that all businesses take extra precautions to evade becoming the next target. Utilizing already available threat intelligence on these ransomware groups can thwart impending attacks and avert data breaches. Adopting a proactive, intelligence-based stance against potential threats is crucial as relying solely on a reactive approach to threat hunting may be too late, resulting in irreversible harm.”

The post MGM and Caesars Casinos Suffer Massive Cyberattack appeared first on IT Security Guru.

]]>
Armis forges ahead into Cyber Exposure Management as it readies for IPO https://www.itsecurityguru.org/2023/09/15/armis-forges-ahead-into-cyber-exposure-management-as-it-readies-for-ipo/?utm_source=rss&utm_medium=rss&utm_campaign=armis-forges-ahead-into-cyber-exposure-management-as-it-readies-for-ipo Fri, 15 Sep 2023 10:30:59 +0000 https://www.itsecurityguru.org/?p=49625 During a live-streamed even this week, Armis co-founders Yevgeny Dibrov and Nadir Izrael laid out the company’s vision for the future, which is centred around its newly announced AI-powered cyber exposure management platform dubbed Centrix™.   “In a perimeter-less world, where assets are digitally connected, traditional cybersecurity boundaries no longer exist. Legacy on-premises systems and […]

The post Armis forges ahead into Cyber Exposure Management as it readies for IPO appeared first on IT Security Guru.

]]>
During a live-streamed even this week, Armis co-founders Yevgeny Dibrov and Nadir Izrael laid out the company’s vision for the future, which is centred around its newly announced AI-powered cyber exposure management platform dubbed Centrix™.

 

“In a perimeter-less world, where assets are digitally connected, traditional cybersecurity boundaries no longer exist. Legacy on-premises systems and point solutions are no longer fit for purpose, leaving your attack surface and most critical assets open and exposed to cyber criminals and multiple bad actors,” explained Nadir Izrael, CTO and Co-Founder, Armis. “The sheer scale and dynamic nature of the attack surface necessitates an entirely different, AI-driven approach, and that’s what Armis Centrix™ is – the AI that powers a suite of powerful tools for managing cyber risk exposure.”

 

It’s a strong message, particularly in light of recent cyberattacks like the one on MGM over the weekend. Addressing how organisations, especially larger ones, are still struggling to get cybersecurity right, Armis CISO Curtis Simpson emphasised that by 2025, the number of connected assets will grow to 50 billion.

 

“Even today, 80% of these assets remain unseen, unmanaged and lacking in any security measures,” he said.  “In parallel, vulnerabilities have also increased at a rate of 689% over the last 6 years.  Environments are now incredibly complex, hybrid environments with many forms of interconnected assets.  Attackers are now regularly taking advantage of this complexity to establish a foothold and then move through environments quietly, exploiting as many vulnerabilities on unseen assets as possible.”

 

Simpson also noted that due to this fast-changing and challenging situation, it is understandable to see organisations struggling to stay ahead. “The challenge is that everything from IoT, OT and physical / virtual IT devices are not only interconnected at scale, but the business use of such assets evolves constantly, as does the corresponding threat landscape.  The challenge is that when we consider capabilities like vulnerability scanning and penetration testing, the traditional security stack was not built with this degree of change and exponential growth of varying forms of interconnected assets,” he explained.

 

“Anything from an embedded vulnerability in a VOIP phone to an exposure in a cloud container can be used as a stepping-stone in today’s most material and subversive attacks,” Simpson continued.

 

He stated that this means that organisations must first focus on ensuring that they have continuous, contextual visibility into their entire attack surface. Simpson posited, “Next, based on this intelligence, surgically prioritise vulnerability mitigation and remediation based on the potential for material impact, not only the CVSS score.  From there, the continuous monitoring of all connected assets against their potential to materially disrupt the business becomes paramount.”

 

Ultimately, Simpson concluded, “the long-term successful approach to optimising resiliency and minimising the materiality of cyberattacks revolves around contextual asset intelligence that spans the entire connected landscape.”

 

 

Enter Armis Centrix™

Armis Centrix™ helps organisations see, protect and manage their entire attack surface, continuously safeguarding their mission-critical assets from cyber threats. Born in the cloud and fueled by AI, only Armis Centrix™ delivers a true modular approach to cyber exposure management covering the most critical cybersecurity needs for Armis clients across four solutions:

  • Asset management and securityComplete asset inventory of all asset types allowing any organisation to see and secure the attack surface
  • OT/IOT securitySee and secure OT/IOT networks and physical assets, ensure uptime and build an effective and comprehensive security strategy
  • Medical device securityComplete visibility and security for all medical devices, clinical assets and the entire healthcare ecosystem – with zero disruption to patient care
  • Vulnerability prioritisation and remediationConsolidate, prioritise and remediate all vulnerabilities; improve mean time to remediation (MTTR) with automatic remediation and ticketing workflows

Armis also shared that customers across the globe have been expanding their use of the Armis Platform with a 50% adoption rate of two solutions in the Armis portfolio and over 15% using three or more of its solutions in the past year.

 

Armis protects critical assets for notable companies

Some notable recent wins include Vestas, the leading manufacturer and service provider for sustainable wind energy in the world, Reckitt, the multinational consumer goods company, Booking Holdings, the world leader in online travel, the Port of Antwerp, the world’s largest cargo port and JLR, the biggest luxury vehicle manufacturer in the UK.

 

“As a leading manufacturer and service provider for sustainable wind energy, our customers require a high degree of security controls to meet regulatory requirements. We utilise Armis to detect and respond to threats and have worked extensively with Armis to shape the integration, so the product fits into our overall detect and response strategy. The insights provided by Armis have proven highly valuable in day-to-day operations again and again, and we are currently expanding our installation,” said Steffen Høgh Vinter, Director CMRC Enablement and Problem Management, Vestas

 

“When we started the program from a central cyber team, we had no visibility into our factory so every device was unseen. Now, with Armis deployed in half our factories, we’ve seen 10s of 1000s of devices that we didn’t know about before. Armis is allowing us to address three use cases: firstly, giving us that visibility that we didn’t have before. Secondly, allowing us to identify vulnerabilities, which allows us to de-risk our state.  And thirdly allows us to identify any unusual behavior that’s happening in our network,“ said David Boyd, Director of Cyber Strategy & Engagement at Reckitt.

 

“Armis is one of those inventions that simply needed to happen. It meets a foundational, unmet need in cybersecurity, namely the ability to “see all evil” (on the network) by discovering rogue devices and providing real time intelligence about their identity and condition. With Armis, there’s no need for an army of engineers or analysts to decipher complex systems and their signals,” said Spencer Mott, Chief Security Officer, Booking Holdings

 

Armis CEO and co-founder, Yevgeny Dibrov, concluded: “We focus on empowering businesses with asset intelligence and actionable plans so they can be assured that their infrastructure is safe and operational at all times. I measure our success not only in financial growth, but in the positive impact that the company is having on virtually all industries thanks to the trust that our customers have given us.”

 

 

 

The post Armis forges ahead into Cyber Exposure Management as it readies for IPO appeared first on IT Security Guru.

]]>
Almost One in Three Parents Have Never Spoken to Their Children About Cybersecurity https://www.itsecurityguru.org/2023/09/12/almost-one-in-three-parents-have-never-spoken-to-their-children-about-cybersecurity/?utm_source=rss&utm_medium=rss&utm_campaign=almost-one-in-three-parents-have-never-spoken-to-their-children-about-cybersecurity Tue, 12 Sep 2023 10:58:42 +0000 https://www.itsecurityguru.org/?p=49574 Today, Keeper Security have announced the release of the Keeper Security Parental Practices Report: Conversations on Cybersecurity, which explores parental attitudes, practices and concerns regarding cybersecurity discussions with their children and sheds light on this imperative topic for families. The report found that one in three (30%) of parents admitted that they have never spoken […]

The post Almost One in Three Parents Have Never Spoken to Their Children About Cybersecurity appeared first on IT Security Guru.

]]>
Today, Keeper Security have announced the release of the Keeper Security Parental Practices Report: Conversations on Cybersecurity, which explores parental attitudes, practices and concerns regarding cybersecurity discussions with their children and sheds light on this imperative topic for families. The report found that one in three (30%) of parents admitted that they have never spoken to their children about cybersecurity. 

Additionally, over 40% of parents who admitted that they didn’t know how to create strong passwords, still give their child access to their mobile phones and almost a third (32%) give them access to their computers.

Conducted in 2023 by Censuswide, the comprehensive survey engaged 4005 parents across diverse backgrounds in the US, UK, France and Germany. The research delved into parental comfort levels and frequency that parents discussed cybersecurity with their children, who is deemed responsible for these conversations, and the digital platforms their children are allowed to access.

The report found, unsurprisingly that cybersecurity was less taboo than sex, with 57% of respondents saying that they found greater comfort discussing password security than sex education. 16% felt more comfortable talking about sex though. Significantly, almost one in five (19%) expressed discomfort discussing either subject.

When it comes to which parent educated their children about cybersecurity, the research found that mothers conducted the majority of cybersecurity discussions, with 56% of parents saying mums were responsible for cybersecurity talks with their children.

Alarmingly, 30% of parents confessed to not addressing cybersecurity with their children at all. Meanwhile, 75% of parents with 12-16-year-olds and 62% with 8-11-year-olds had engaged their children in these discussions. Younger children’s internet exposure without cybersecurity guidance raises serious concerns, as 44% own mobile phones and 46% have online gaming accounts.

Children’s access to digital accounts varied by age, with 73% of 12-16-year-olds owning mobile phones. Of the one in three parents that said their child does not understand how to create a secure password, almost half (48%) have their own phone and their own online gaming accounts (44%).

Only 45% of parents believed their 8-11-year-olds could create strong passwords, while 70% held the same confidence for 12-16-year-olds. Parents with insufficient password security knowledge themselves admitted to granting their children access to their devices, highlighting a potential risk.

“In an era marked by digital immersion, parenting responsibilities extend beyond the traditional concerns. As children spend more time online, the discourse around cybersecurity has become a crucial element of modern parenting,” said Darren Guccione, CEO of Keeper Security. “This study highlights the need for increased awareness and education on digital safety among parents, as well as the importance that schools play in filling this gap, and perhaps, taking action at an earlier age.”

To view the full study, please visit: https://www.keeper.io/hubfs/Reports/Parental-Practices-Report-2023-UK.pdf

The post Almost One in Three Parents Have Never Spoken to Their Children About Cybersecurity appeared first on IT Security Guru.

]]>
School’s Back, Cyberattack: Navigating Cyberattacks in the Education Sector https://www.itsecurityguru.org/2023/09/06/schools-back-cyberattack-navigating-cyberattacks-in-the-education-sector/?utm_source=rss&utm_medium=rss&utm_campaign=schools-back-cyberattack-navigating-cyberattacks-in-the-education-sector Wed, 06 Sep 2023 09:53:52 +0000 https://www.itsecurityguru.org/?p=49466 It’s a fact that all organisations are valuable targets for cybercriminals, no matter the size of the organisation. However, some sectors are targeted more than others. Education is one of those sectors. In 2022, the UK Government outlined the percentage of organisations that had identified breaches or attacks over a period of 12 months, which […]

The post School’s Back, Cyberattack: Navigating Cyberattacks in the Education Sector appeared first on IT Security Guru.

]]>
It’s a fact that all organisations are valuable targets for cybercriminals, no matter the size of the organisation. However, some sectors are targeted more than others. Education is one of those sectors.

In 2022, the UK Government outlined the percentage of organisations that had identified breaches or attacks over a period of 12 months, which found that 39% of all UK businesses suffered a breach. For educational institutions, that number was significantly higher. The research found that further education colleges (88%) and higher education colleges (92%) are most likely to identify breaches or cyberattacks.

But what makes education a highly coveted industry for cybercriminals to attack? Erfan Shadabi, Cybersecurity Expert at comforte AG, explains: “Educational institutions, ranging from primary schools to universities, have become attractive targets for cybercriminals. These organisations house vast amounts of sensitive data, including personal information of students, staff, and parents, as well as intellectual property, research data, and financial records.”

“The consequences of a successful cyber attack in an educational setting can be devastating, affecting not only the institution’s reputation but also the education and safety of students. Thus, it is imperative that educational institutions proactively invest in cybersecurity measures. Implementing data-centric security protocols in educational institutions can significantly reduce the risk of data breaches and disruptions caused by cyberattacks.”

But with young people heading back to school this week, the National Cyber Security Centre (NCSC) has issued warnings for educational institutions to tighten security defences and remain vigilant to attacks.

Brian Higgins, security specialist at Comparitech, explains further: “It’s a particularly vulnerable time for schools right now, so much so that the National Cyber Security Centre has issued a warning across the country for improved defences and vigilance. The beginning of the school year sees hundreds of new users added to the network; students, staff, parents, suppliers etc. along with all of the devices and social media channels they will be using to stay connected. The vulnerabilities available to cybercriminals are plentiful.”

Referencing recent infrastructure issues hitting schools across the country, Higgins continues: “There’s no doubt that the current concrete issue will be exploited by online fraudsters, it only takes a DDoS to launch the most basic ransomware attack and its plausible that disgruntled pupils who may have recently received less than favourable exam results may seek some form of digital revenge. The Department of Education have rather unhelpfully stated that cybersecurity is a matter for individual schools so the best place to look for help and guidance is the NCSC. They have plenty of free resources for schools on their website and it’s never too late to learn.”

Just this week, it was revealed that one London secondary school had been forced to delay the start of the new term by a week. Highgate Wood Secondary School in Haringey is alleged to have suffered from a cyberattack, although it is believed that no data was accessed during the breach. This follows news earlier this year that a spate of Sussex schools had suffered cyberattacks.

Rebecca Moody, Head of Data research at Comparitech, said: “While the nature of the cyber attack is yet to be confirmed, this does sound like it has all of the hallmarks of a ransomware attack. As hackers look to coordinate their attacks, hitting a school just as it is about to reopen after the school holidays is arguably a prime time. We have also noted an increase in ransomware attacks on educational institutions this year, when compared to last.”

“Last year, we recorded 119 confirmed ransomware attacks on schools and colleges across the globe. So far this year, we’ve already logged 90. What is of concern is the number of records impacted in these attacks. Throughout 2023, 5.23 million records have been noted as breached as a result of ransomware attacks on schools/colleges. Across the 119 tracked last year, just 1.19 million records were breached.”

“If Highgate Wood Secondary School is confirmed as a ransomware attack, the next question will be what data could have been stolen by the hackers. As ransomware hackers continue to steal vast amounts of data while also encrypting systems, schools need to act quickly to not only try and regain control of their systems but to offer the best possible protection for students and staff if data is affected.”

The motives for cybercriminals are often unclear, sometimes hackers demand ransom, others may steal data and others may act as disruptive ‘hacktivists’. According to recent research by Outpost24, a ‘hacktivist’ can be defined as non-state actors that aim for the ‘disruption of services’ but do ‘not intend to cause harm.’

Darren James, a Product Specialist at Specops Software, an Outpost24 Company, adds: “It’s not only the poor state of the buildings that is having an impact on the new school term this year. One school has delayed the return of their students by nearly a week due to a cyber attack. The education sector is another popular target for cybercriminals and Hackivists.”

“From what we know so far this attack must have taken down one of the school’s core systems, and it is having to be rebuilt which is causing the delay. Whether the rebuild was due to data destruction or that the original was inherently insecure remains unknown, the good news is that so far it seems no data was stolen. As always with these types of denial-of-service attacks it’s important to remember the basics – make sure your users have strong, unbreached passwords (or even better passphrases and MFA) and make sure that you have tested your backups.”

Any organisation that stores data is a coveted target for cybersecurity. Evidently, it is time for educational institutions to brace themselves for a breach. School’s back, cyberattack.

 

 

 

 

 

 

The post School’s Back, Cyberattack: Navigating Cyberattacks in the Education Sector appeared first on IT Security Guru.

]]>
International Cyber Expo Commits to Highlighting Importance of Wellbeing in Cybersecurity https://www.itsecurityguru.org/2023/09/05/international-cyber-expo-commits-to-highlighting-importance-of-wellbeing-in-cybersecurity/?utm_source=rss&utm_medium=rss&utm_campaign=international-cyber-expo-commits-to-highlighting-importance-of-wellbeing-in-cybersecurity Tue, 05 Sep 2023 10:45:58 +0000 https://www.itsecurityguru.org/?p=49454 We all know that cybersecurity is stressful; we’ve seen the many stats that say that professionals are burnt out and stressed. But what the industry needs is changemakers and people willing to lead the movement towards a healthier future. Today, The Nineteen Group has announced that they are revolutionising wellbeing support for professionals at cybersecurity […]

The post International Cyber Expo Commits to Highlighting Importance of Wellbeing in Cybersecurity appeared first on IT Security Guru.

]]>
We all know that cybersecurity is stressful; we’ve seen the many stats that say that professionals are burnt out and stressed. But what the industry needs is changemakers and people willing to lead the movement towards a healthier future. Today, The Nineteen Group has announced that they are revolutionising wellbeing support for professionals at cybersecurity exhibitions. Enter The International Cyber Expo‘s Cyber Wellbeing Corner, the first of its kind at cybersecurity exhibitions globally.

The Nineteen Group have joined forces with Jamf and The Zensory to develop The Cyber Wellbeing Corner, a space at this year’s exhibition dedicated to the wellbeing of cybersecurity professionals. It is the first of its kind for cybersecurity exhibitions globally.  

Notably, over half of people within cybersecurity have experienced emotions such as depression or anxiety due to feeling overwhelmed at work. That’s why it’s crucial to provide safe, neuroinclusive decompression spaces, like The Cyber Wellbeing Corner, for professionals. Additionally, 20% of the country’s workforce is neurodiverse, which could mean that spaces like exhibitions are overwhelming, overstimulating and exhausting. With the cybersecurity industry striving to be more neuroinclusive, it’s important to make sure events, such as the International Cyber Expo, are as welcoming for all as possible. As such, within The Cyber Wellbeing Corner there will be a separate quiet decompression space, featuring sensory experiences, open to everyone. 

Rachael Shattock, Group Event Director at Nineteen Group, explains: “It’s more important than ever to support the wellbeing of cybersecurity professionals. With burnout at an all-time high and mental health issues running rife throughout the industry, it’s important that we, as a community, take a stand to prioritise mental health. You never know who may need help, or when. Additionally, exhibitions can be overwhelming, so it’s important that we are neuroinclusive and provide an area for people to recalibrate at the show.” 

The Cyber Wellbeing Corner will be located within the International Cyber Expo, taking place at Olympia London on the 26th and 27th September 2023. The Corner will also feature a dedicated quiet space, pay-what-you-like masseurs, a resource wall with various helplines and support websites, a hydration station, and a soft seating area. There will also be wellbeing experts on hand from The Zensory, as well as representatives from Jamf. 

Yvonne Eskenzi, Co-Founder of The Zensory, adds: “It’s incredibly important to look after the wellbeing of cybersecurity professionals. After all, they protect all of us and our organisations. Having been in the industry for three decades, it’s evident that the problem isn’t getting better. What the industry needs is changemakers who are willing to dedicate time and effort to reducing burnout and mental health issues across the industry. That’s why The Zensory are thrilled to be supporting The Cyber Wellbeing Corner, as the first of its kind at cybersecurity exhibitions.” 

The Cyber Wellbeing Corner will feature the foundation of the new Cyber Wellbeing Commitment, a commitment made for and by the cybersecurity community to better mental health in the sector. There will be a chance for cybersecurity professionals to shape this commitment based on change they want to see reflected in the industry. Additionally, organisations and individuals can register their interest in the charter to provide ongoing feedback.   

Aaron Webb, Senior Product Marketing Manager – Security at Jamf, says: “The Cyber Wellbeing Corner aligns with everything we believe in as a business, that’s why we’re incredibly proud to be sponsoring it. We must support professionals across the cybersecurity industry and having spaces like this at events is a great first step. Wellbeing support, like technical solutions, are never a ‘one size fits all’ exercise, but an ongoing commitment.”

The Cyber Wellbeing Corner can be found at the International Cyber Expo, held at London Olympia on the 26th and 27th September. Registration for the event is open now. To register for FREE as a visitor sign up at: https://ice-2023.reg.buzz/eskenzi 

The post International Cyber Expo Commits to Highlighting Importance of Wellbeing in Cybersecurity appeared first on IT Security Guru.

]]>
It’s Time to Approach The Cybersecurity Skills Gap Differently https://www.itsecurityguru.org/2023/08/18/its-time-to-approach-the-cybersecurity-skills-gap-differently/?utm_source=rss&utm_medium=rss&utm_campaign=its-time-to-approach-the-cybersecurity-skills-gap-differently Fri, 18 Aug 2023 14:09:51 +0000 https://www.itsecurityguru.org/?p=49347 The cybersecurity skills gap and talent shortage is a topic on the agenda of almost every board across the industry – and it’s becoming an ever more urgent discussion. In fact, according to the 2023 State of the CISO report by Salt Security, 91% of CISOs agree that finding and keeping qualified cybersecurity talent significantly […]

The post It’s Time to Approach The Cybersecurity Skills Gap Differently appeared first on IT Security Guru.

]]>
The cybersecurity skills gap and talent shortage is a topic on the agenda of almost every board across the industry – and it’s becoming an ever more urgent discussion. In fact, according to the 2023 State of the CISO report by Salt Security, 91% of CISOs agree that finding and keeping qualified cybersecurity talent significantly impacts their ability to deliver on digital transformation initiatives. With an estimated global workforce gap of around 3.4 million people, it’s time to rethink our approach to tackling the ever-increasing cybersecurity skills gap. But where to start?

For Camellia Chan, CEO and Co-Founder of Flexxon (who was also one of our ‘Most Inspiring Women in Cyber in 2022‘), the narrative around cybersecurity hiring needs to be approached differently: “There is a popular misconception that entering the tech world requires years of formal, technical education – but we must shift the narrative. I did not have those credentials when I joined the industry, I studied business management at university. But if you have a passion and want to work hard, there are many ways for you to pick up the skills and be an excellent cybersecurity professional. That’s why it’s crucial that business invest in quality education and training for employees.”

Viewing talent as an investment is not uncommon, but an open mind to the idea of the ‘perfect candidate’ is crucial, especially when it comes to education, according to Haris Pylarinos, CEO and Co-Founder at Hack The Box: “We should move away from a traditional hiring model that focuses solely on university degrees and specific certifications.”

“This way, a broader range of candidates, including self-taught hackers and experienced professionals from various backgrounds, can apply. This approach matches what I feel is more important in the industry today – practical experience. Relying solely on a university degree will actually sabotage your hiring efforts.”

Edward Thorpe, Lead Talent Acquisition Partner at Garrison, expresses a similar view: “By considering talent outside of cyber, from fintech or gaming as examples, we can start to develop pipelines of more diverse talent eager to work in an industry that is equally prosperous, yet less competitive and potentially more rewarding.”

Ilona Simpson, CIO, EMEA, at Netskope, suggests that the problem is that many educators focus only on encouraging people to get into STEM: “It implies that you only need engineers. You also need customer support, you need corporate managers, you need UX designers… You need everyone. You need every skill in our industry.”

But where else can this talent be found? Steven Wood, Director of Sales Engineering at OpenText Cybersecurity, suggests: “Expanding talent catchment profiles, implementing supportive intern programs, revising recognition, and giving the cybersecurity team a seat at the boardroom table are all credible actions that businesses should take today.”

When it comes to existing recruitment practices, Jamal Elmellas, Chief Operating Officer at cybersecurity recruitment agency Focus-on-Security notes: “Hiring from within the same small talent pool is undoubtedly causing issues in the cybersecurity sector. It’s intensifying competition over top talent, particularly those with three to six years’ experience, and this is leading to more churn. A transient workforce does nobody any favours.”

Additionally, Elmellas outlines the significant risk to approaching the talent shortage with an ‘anything goes’ type attitude: ” If we throw open the gates, we risk diluting the industry by introducing a whole swathe of people with no technical skills. While that may fill the recruitment gap, it does nothing to address the problem the business has which is a lack of trained and competent cybersecurity professionals, resulting, once again, in less resilience.”

Chris Cooper, a member of ISACA Emerging Trends Working Group, shares a similar worry: “Employers should be asking if applicants are able to demonstrate transferable skills which could be applied to a career in cyber – we should be actively sharing our experience with each other so everyone can benefit.”

Evidently, in order to create a robust future, it’s important that we diversify our hiring views in many different ways. Crucially, a diversity of thought (whether that’s voices across industries, regions, genders etc.) is necessary for a strong future. Tech has always been forward thinking, but in many ways the industry lags behind its counterparts in terms of diversity. In fact, according to research by Eskenzi PR and Marketing, only one fifth of cybersecurity leadership roles are filled by women.

Caitlin Nowlin, Program Manager at Hyland, further explains: “No matter the task, it’s always important to have multiple perspectives. Our background and experiences can impact how we approach a problem or activity, and having a broad set of individuals working on something means all the kinks are ironed out. This approach requires diversity – of gender, race, ethnicity, background and even education is key to making something the best it can be. But there is a huge gap right now, especially in tech and computer science industries.”

Jamal Elmellas, Chief Operating Officer at cybersecurity recruitment agency Focus-on-Security, continues: “We can’t continue along the path we are on where the sector is made up of predominantly white middle-aged men but nor can we pretend this is an unskilled career path. We need to tread carefully. Implying that soft skills are enough to succeed in the sector is disingenuous.”

Evidently, there’s no one path to ‘solving’ the skills gap. Instead, an open mind in the hiring process, alongside retaining talent is key – to plug the skills gap and make organisations as safe as possible.

The post It’s Time to Approach The Cybersecurity Skills Gap Differently appeared first on IT Security Guru.

]]>
Wellbeing Tips to Improve Your 2023 https://www.itsecurityguru.org/2023/08/11/wellbeing-tips-to-improve-your-2023/?utm_source=rss&utm_medium=rss&utm_campaign=wellbeing-tips-to-improve-your-2023 Fri, 11 Aug 2023 13:01:50 +0000 https://www.itsecurityguru.org/?p=49615 Well-being is an essential aspect of life that allows us to work towards happiness and contentment. With the hustle and bustle of daily life, it can be easy to forget to take care of ourselves, but making time for self-care is crucial for our overall health and well-being. If you want to start practicing self-care […]

The post Wellbeing Tips to Improve Your 2023 appeared first on IT Security Guru.

]]>
Well-being is an essential aspect of life that allows us to work towards happiness and contentment. With the hustle and bustle of daily life, it can be easy to forget to take care of ourselves, but making time for self-care is crucial for our overall health and well-being. If you want to start practicing self-care but are unsure on what to do and where to begin, we’ve compiled a list of our top 5 well-being tips to make things easier for you.

Prioritise Sleep

Sleep is incredibly important, and is possibly the most vital component of overall health and well-being. Unfortunately, many of us prioritise work and other responsibilities over getting enough rest. However, getting enough sleep is essential to ensure you have the energy and mental clarity necessary to tackle whatever the day may throw at you. 

According to the National Sleep Foundation, adults should aim for 7-9 hours of sleep per night, but this may vary with age, activity level, and gender. To improve your sleep hygiene, consider establishing a consistent sleep schedule, as well as creating a relaxing bedtime routine, and minimising distractions in your sleep environment.

Incorporate Movement Into Your Routine 

Incorporating physical activity into your routine is a great way to boost your well-being, as exercise is famed for its numerous benefits, including improved cardiovascular health, increased muscle strength, and reduced stress levels. Participating in regular physical activity can even lead to better sleep quality, improved mood, and increased self-esteem!

One of the best ways to incorporate movement into your routine is by participating in sports. Sports provide an opportunity to socialise, build teamwork skills, and improve physical fitness simultaneously. Whether it’s joining a local football league, playing a quick round of golf, or hitting the tennis courts, incorporating sports into your routine can be an enjoyable and effective way to improve your overall well-being.

Practise Mindfulness

Mindfulness is allowing yourself to be present and fully engaged in the current moment. To practice mindfulness, try focusing on your breath, participating in meditation or yoga, or even simply taking a few moments to appreciate your surroundings. Taking a bit of time every day to practice mindfulness can help reduce stress, increase self-awareness, and improve overall well-being.

Nourish Your Body with Healthy Foods

Eating a balanced diet is essential for overall health and well-being, so making sure you consume a variety of nutrient-dense foods can provide your body with the fuel it needs to function optimally. A healthy diet can also help reduce the risks of chronic diseases and improve mood and cognitive function.

To nourish your body with healthy foods, consider incorporating more fruits and vegetables into your diet, choosing lean protein sources, and limiting processed and sugary foods. Even making small changes, such as cooking at home more often or packing healthy snacks for when you’re on the go can help ensure that you are fueling your body with the nutrients it needs to thrive.

Cultivate Strong Relationships

While often overlooked, maintaining solid relationships with friends and family is essential for overall well-being. Social support can provide us with a sense of belonging and help reduce stress levels, as well as provide us with a sense of purpose and meaning in life.

To cultivate strong relationships, consider reaching out to friends and family members regularly, making time for social activities and games, as well as practicing active listening and communication skills. If you’re looking to make new friends, joining sports teams or clubs can provide a great opportunity to connect with others who share similar interests and hobbies.

The post Wellbeing Tips to Improve Your 2023 appeared first on IT Security Guru.

]]>
Ransomware on manufacturing industry caused $46bn in losses https://www.itsecurityguru.org/2023/08/03/ransomware-on-manufacturing-industry-caused-46bn-in-losses/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-on-manufacturing-industry-caused-46bn-in-losses Thu, 03 Aug 2023 10:01:27 +0000 https://www.itsecurityguru.org/?p=49180 Between 2018 and 2023, 478 manufacturing companies have suffered a ransomware attack, leading to a loss of approximately $46.2 billion in downtime alone. Serious cyber incidents affecting manufacturing companies can lead to significant disruptions to production lines. As a result, customer orders can be left unfulfilled and day-to-day operations come to a standstill. Comparitech recently […]

The post Ransomware on manufacturing industry caused $46bn in losses appeared first on IT Security Guru.

]]>
Between 2018 and 2023, 478 manufacturing companies have suffered a ransomware attack, leading to a loss of approximately $46.2 billion in downtime alone.

Serious cyber incidents affecting manufacturing companies can lead to significant disruptions to production lines. As a result, customer orders can be left unfulfilled and day-to-day operations come to a standstill.

Comparitech recently analysed how widespread these types of attacks on the manufacturing sector are to find out their true cost. Using their worldwide ransomware tracker, the Comparitech team searched for reports on the amount of downtime caused, how much data was stolen, how much the ransom demands were, and whether or not these ransom demands were met.

Some key findings include:

Between 2018 to July 2023 there were:

  • 478 confirmed ransomware attacks on manufacturing companies.
  • More than 7.5 million individual records were breached as a result of these attacks–at least.
  • Ransom demands were found to be between $5,000 and $50 million.
  • Hackers demanded an average of $11.2 million. Approximately $5.5 billion in ransom has been demanded in total.
  • Only four companies are known to have paid the ransom but many organisations will withhold this information in fear it makes them more vulnerable to these attacks. A confirmed $750,000 was paid across two of these attacks.
  • Downtime varied from several hours to 76 days.
  • Manufacturers within the transportation/automotive sector saw the highest number of attacks (92), closely followed by electronics/appliances manufacturers (80).
  • Egregor and Conti were the most dominant strains of ransomware in 2020 and 2021 (respectively) with LockBit dominating in 2022 and 2023 (so far).

Ultimately, these numbers show yet another example as to why manufacturers are so susceptible to attacks and why they must better secure themselves.

The post Ransomware on manufacturing industry caused $46bn in losses appeared first on IT Security Guru.

]]>