- Enterprises face an uphill battle when dealing with cybersecurity challenges. Hackers constantly evolve their malware and cyber-threat tactics, making it difficult to keep up with the threat landscape. Meanwhile, cybersecurity solutions can overwhelm IT security teams with their complexity and maintenance demands.
- A managed security service is a commitment that requires funding and resources. So when should you seek one out?
- When your IT security team is overwhelmed
- Sometimes you need to recognize that you won’t be filling the openings in your security team anytime soon. Sometimes you just don’t have the time to train new recruits or you may not find the right talent and personality to match the team.
- When your solutions confound you
- Some solutions pose different sets of challenges. For example, SIEM has maintenance and upkeep demands tied into its correlation rules; without regular adjustments and review, SIEM solutions can generate numerous false positives.
- For the intelligence
- They have independent lines of threat intelligence. They know the threat landscape better than anyone and can help prepare your business and its individual use case for what comes next.
- Ben Canner | April 28, 2021
hak-iq.us20.list-manage.comApril 28, 2021
- Wyoming's Department of Health (WDH) has announced the accidental exposure of personal health information belonging to more than a quarter of the state's population on GitHub.com.
- Data in the leaked files included the results of tests for influenza and COVID-19 performed across the United States between January 2020 and March 2021. One file containing breath alcohol test results was also exposed.
- Along with the test results were patients' names, ID numbers, addresses, dates of birth, and dates of when tests had been carried out.
- “While WDH staff intended to use this software service only for code storage and maintenance rather than to maintain files containing health information, a significant and very unfortunate error was made when the test result data was also uploaded to GitHub.com,” said WDH director Michael Ceballos.
- Sarah Coble | April 28, 2021
hak-iq.us20.list-manage.comApril 28, 2021
- Some IT decision-makers chaff at the idea of SIEM can help them deflect modern cyber-threats; SIEM does possess a reputation as being difficult to work with and generating false positives.
- Current research suggests SIEM becomes part of a wider cybersecurity platform unified by security orchestration, automation, and response (SOAR). SOAR decentralizes and re-centralizes cybersecurity tools like SIEM, firewalls, and identity management by unifying each’s findings under one pane of glass.
- Visibility is the most essential cybersecurity principle. Without visibility, you’re literally operating in the dark. You can’t protect what you can’t see.
- SIEM can assist with increasing network visibility via its log management. However, using SIEM as a visibility tool raises new questions. Where should your SIEM prioritize? How can it handle a scaled environment? Can you maintain visibility over your network when it isn’t under your direct vision to begin with?
- A next-generation SIEM solution should enable your IT security team to revise and monitor configuration rules on the fly, easing the visibility issue.
- Ben Canner | April 27, 2021
hak-iq.us20.list-manage.comApril 27, 2021
- Some Queensland hospitals and health services have resorted to manual processing patients after a cyber attack brought down the IT systems of UnitingCare Queensland.
- UnitingCare is the second Australian provider of health services to be crippled by a cyber attack in the last six weeks after Victoria’s Eastern Health was taken offline last month.
- VMware cyber security strategist, Rick McElroy, said hospitals were a prime target for cyber attacks due to the potentially valuable personal information they hold.
- “While the attack methods may vary, most cybercriminals are motivated by a financial incentive,” he said.
- “Given the critical nature of data at healthcare organisations, they are often a prime target for attacks, as cybercriminals know patient care is on the line and organisations are more apt to pay.”
- According to US cyber security company Coveware, 77 per cent of ransomware attacks in the first three months of this year involved a threat to leak stolen data.
- That number is increasing as cyber criminals have moved toward the ‘double extortion’ model of ransomware in which the groups lock down a network and threaten to publish information unless a ransom is paid.
- Casey Tonkin | April 27, 2021
hak-iq.us20.list-manage.comApril 27, 2021
- It has been revealed that any person can access Apple users’ email addresses and mobile numbers, despite being a stranger and it is done by just sharing pane on the device after the sharing process is initiated.
- The basic requirement to perform this is a stable Wi-Fi connection and the proximity between the two Apple devices.
- Primarily, there are two reasons behind this security flaw. First and foremost is the process of finding contact and the next is AirDrop uses a “mutual authentication” process to draw a comparison between the phone numbers and email addresses of a possible receiver.
- Besides that, a weak hashing system of Apple further allows hackers to access personal details.
April 26, 2021
hak-iq.us20.list-manage.comApril 27, 2021