• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74

    Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74
  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How to Start Somewhere, Right Now

Apr 5, 2022 by iHash Leave a Comment

Cybersecurity Risk

Between a series of recent high-profile cybersecurity incidents and the heightened geopolitical tensions, there’s rarely been a more dangerous cybersecurity environment. It’s a danger that affects every organization – automated attack campaigns don’t discriminate between targets.

The situation is driven in large part due to a relentless rise in vulnerabilities, with tens of thousands of brand-new vulnerabilities discovered every year. For tech teams that are probably already under-resourced, guarding against this rising tide of threats is an impossible task.

Yet, in the battle against cybercrime, some of the most effective and most sensible mitigations are sometimes neglected. In this article, we’ll outline why cybersecurity risks have escalated so dramatically – and which easy wins your organization can make for a significant difference in your cybersecurity posture, right now.

Table of Contents

  • Recent major cyberattacks point to the danger
  • The backdrop to these events
  • Mitigation is tough and multi-pronged
  • A quick win that’s neglected
  • Why patching is held back
  • Actively taking steps against cyber risks
  • Quick wins are everywhere

Recent major cyberattacks point to the danger

Cyber security has arguably never been more important. With the rise in vulnerability numbers that continues unabated for years now, alongside the geopolitical tensions, no company can claim it has cybersecurity that is impervious to penetration. In recent weeks, we’ve seen non-stop reports of security breaches at Microsoft, Nvidia, Vodafone, and many others.

This March, a group of teenagers belonging to the Lapsus$ group managed to hack Microsoft and steal the source code for key products including its Cortana voice assistant, and an internal Azure developer server.

Lapsus$, who consists of a group of teenagers, didn’t stop there. Nvidia was also targeted, as the company admitted that sensitive corporate data was leaked, including proprietary information as well as employee credentials. Something similar happened to consumer group Samsung, and to consultancy Globant. All damage caused by just one group of miscreants.

The backdrop to these events

Of course, Lapsus$ is just one active group. There are countless others going after major and minor organizations alike. The list is endless – this February mobile, fixed-line, and TV services were taken offline for a big chunk of Portugal’s population as Vodafone Portugal suffered a major cyber breach. And nobody is spared – in January 2022, the Red Cross was hacked, exposing the personal data of hundreds of thousands of people.

Hacking, intrusions, extorsions… left, right, and center. Where does it end?

Well, it’s not likely to end anytime soon. There’s a steady stream of new vulnerabilities, and by extension, new threats appearing. By 2021, almost 22,000 new vulnerabilities were published on the National Vulnerability Database, an increase of 27% over the count for 2018, just 3 years ago.

Every year the total list of vulnerabilities grows, creating an ever-larger mountain of possible risks. The list of actors with interest in successfully exploiting vulnerabilities isn’t exactly shrinking either, as the latest geopolitical instability adds to the threat.

Mitigation is tough and multi-pronged

A lot of effort goes into fixing the problem – in trying to mount a defense. But as our long list of examples proved, and as this list of major hacks underlines, these defenses don’t always work. It is too easy to under resource, and resources can easily be allocated incorrectly.

The problem is that fighting against cybercrime is a multi-pronged task – you can’t beat cybercriminals by focusing on one or two defensive aspects alone. It needs to be the entire remit, ranging from endpoint security and encryption, through to firewalls and advanced threat monitoring – and on to hardening exercises such as patching and restricted permissions.

All of these components need to be in place and performed consistently, but that’s a big ask when IT teams are struggling for staff resources. In all fairness, it’s impossible to set up a watertight cybersecurity perimeter – if multi-billion-dollar firms can’t do it, it’s unlikely that the typical business will. But some essential parts of vulnerability management are sometimes neglected.

A quick win that’s neglected

According to the Ponemon report, it takes roughly five weeks to fix a vulnerability. Therein lies a major part of the issue. Fixing vulnerabilities through patching is arguably one of the most effective ways to combat cyber threats: if the vulnerability no longer exists, the opportunity to exploit it disappears too.

The need to patch has been mandated at the highest level – including by the Cybersecurity and Infrastructure Security Agency (CISA), which recently published a list of vulnerabilities that must be patched by covered organizations. Similarly, CISA’s recent Shields Up notification also points strongly to patching as a critical step that significantly supports cybersecurity.

Given the relative ease of patching – apply it and it works – patching should be a no-brainer. Patching is an easy win that can easily transform an organization’s cybersecurity posture. A recent study by the Ponemon Institute found that of the respondents that suffered a breach, 57% said it was due to a vulnerability that could have been closed by a patch.

Why patching is held back

We’ve established that patching is effective and attainable – so the question is, what’s holding back patching? There are multiple reasons for that – including, for example, the occasional risk that an untested patch can lead to system failure.

But the most obvious problem is disruption during patching. Patching a system traditionally leads to it being unavailable for some amount of time. It doesn’t matter if you’re patching a critical component like the Linux Kernel or a specific service, the common approach has always been to reboot or restart after deploying patches.

The business implications are significant. Though you can mitigate via redundancy and careful planning, there’s still a risk of lost business, reputational damage, performance degradation, and unhappy customers and stakeholders.

The result is that IT teams have struggled with maintenance windows that are woefully inadequate, often too spread apart to properly react to a threat landscape that can see attacks happen within minutes of the disclosure of a vulnerability.

Actively taking steps against cyber risks

So yes, organizations need to patch consistently as the first step amongst many. There’s a way forward for patching, thankfully, and it’s called live patching technology. Live patching solutions like TuxCare’s KernelCare Enterprise provide a non-disruptive solution to the patching challenge.

By installing patches on running software on the fly, it removes the need for disruptive reboots and restarts – and maintenance windows. There is, therefore, no need to wait to install a patch. What’s more, the automated nature of live patching means that patching windows are virtually eliminated.

It’s essentially instantaneous patch deployment – as soon as the vendor releases a patch, that patch gets applied which reduces exposure and the risk window to the minimum, with zero impact on business activities.

This alternative, effective approach to patching illustrates how there are effective steps to take within the cybersecurity battle – steps that are resource-friendly too. Another simple but effective way to harden systems against cybersecurity threats is MFA. Organizations that are not yet using multi-factor authentication (MFA) should enable it wherever providers offer it.

Quick wins are everywhere

The same goes for other quick wins. Take the principle of least privilege, for example. Simply by instilling a permissions-aware culture into tech teams, organizations can ensure that potential actors have minimal opportunities to enter into systems – and to progress if they do manage to enter. That goes for network segmentation, another resource-friendly but effective tool against the cybercrime threat.

The point is that as much as the cybersecurity threat is just about out of control, there are nonetheless many reasonably easy routes that allow organizations to mount a stronger defense. In other words, ignoring tools such as live patching, MFA, and permissions management simply makes a tough fight much harder. In contrast, jumping on these quick wins can quickly strengthen your cybersecurity posture.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, hacking news, how to hack, information security, network security, ransomware malware, software vulnerability, Start, the hacker news

Special Offers

  • Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74

    Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74
  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

Jun 25, 2022 By iHash

More Than You Know: The Enterprise Worth of Natural Language Generation 

Jun 24, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74

Expires June 25, 2122 23:59 PST Buy now and get 31% off KEY FEATURES Create a smart home with the Eco4life Wireless Alarm Security System 5 Pieces Kit. With this system, you can monitor your home and alert you of any activity through cell phones, smart devices, and home automation systems. Use the eco4life app […]

Elastic Contributors: Announcing New Features and Ways to Earn Points

Elastic Contributors: Announcing New Features and Ways to Earn Points

Table of Contents What’s new?1. Additional opportunities to earn bonus points2. We accept code contributions made to non-Elastic repositories3. Extra points for referring a contributor4. Dispute declined contributions5. View other participants’ contributions What’s new? 1. Additional opportunities to earn bonus points Contributors can now earn bonus points for submitting content in different solutions and contribution […]

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment. The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based Mitel VoIP device sitting on the network perimeter, while […]

Animation Desk Windows Pro Lite: Lifetime Subscription for $59

Expires June 23, 2122 23:59 PST Buy now and get 59% off KEY FEATURES Your tablet is your animation desk. Animation Desk Windows is a user-friendly animation software for drawing frame-to-frame 2D animation. You can start from scratch or create animations on top of a video and photos with many tools. FEATURES FOR CREATING ANIMATION […]

“Above the Trend Line” – Your Industry Rumor Central for 6/23/2022

Above the Trend Line: your industry rumor central is a recurring feature of insideBIGDATA. In this column, we present a variety of short time-critical news items grouped by category such as M&A activity, people movements, funding news, industry partnerships, customer wins, rumors and general scuttlebutt floating around the big data, data science and machine learning […]

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. “We’re trying to do the right thing and that’s more than other companies working in the industry,” Chaim Gelfand, the company’s general counsel and chief compliance […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT