<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Cybersecurity &#8211; ECURON</title>
	<atom:link href="https://www.ecuron.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ecuron.com</link>
	<description>Information and Cybersecurity Consulting - CMMC RPO</description>
	<lastBuildDate>Wed, 20 Sep 2023 14:12:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.ecuron.com/wp-content/uploads/favicon.png</url>
	<title>Cybersecurity &#8211; ECURON</title>
	<link>https://www.ecuron.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enhancing Security with Cyber Threat Intelligence Services</title>
		<link>https://www.ecuron.com/enhancing-security-with-cyber-threat-intelligence-services/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 12 Sep 2023 20:52:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2077</guid>

					<description><![CDATA[In today&#8217;s digital age, where cybersecurity threats are becoming increasingly sophisticated and prevalent, the need for effective cyber threat intelligence services has never been greater. Organizations of all sizes and industries face the constant risk of data breaches, hacking attempts, and other malicious activities that can have devastating consequences.&#160;Cyber threat intelligence empowers organizations to stay [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><p>In today&#8217;s digital age, where cybersecurity threats are becoming increasingly sophisticated and prevalent, the need for effective <strong>cyber threat intelligence services</strong> has never been greater. Organizations of all sizes and industries face the constant risk of data breaches, hacking attempts, and other malicious activities that can have devastating consequences.</p><p>Cyber threat intelligence empowers organizations to stay one step ahead of cyber-criminals by understanding their tactics, motivations, and targets. With this knowledge in hand, businesses can develop robust cybersecurity strategies that effectively protect their sensitive data and critical assets.</p><p>In this post, we will explore the various aspects of cyber threat intelligence services: from its definition, its role in mitigating risks associated with cyber threats, to the benefits it offers to organizations across different sectors.</p><h2><strong>Why Your Business Needs Professional Cyber Threat Intelligence Services</strong></h2><p>Often abbreviated as CTI, <strong>Cyber Threat Intelligence is the process of collecting, analyzing, and interpreting data to identify potential cyber threats and vulnerabilities.</strong> It involves monitoring various sources such as dark web forums, hacker communities, and security research reports to identify emerging patterns and trends in cyber-criminal activities. By leveraging advanced technologies and expert analysis, threat intelligence services provide organizations with valuable insights into potential vulnerabilities within their infrastructure and networks. This allows them to proactively detect and mitigate threats before they can cause significant damage.</p><p>One of the key advantages of professional <strong>cyber threat intelligence services</strong> is their ability to provide <strong>real-time insights</strong> into emerging threats and trends. This enables businesses to stay one step ahead of cyber-criminals and take proactive security measures to mitigate risks effectively. By continuously monitoring your digital infrastructure, these services ensure that any suspicious activities or <a href="https://www.cisa.gov/resources-tools/resources/operational-value-indicators-compromise-white-paper" target="_blank" rel="noopener"><strong>indicators of compromise</strong></a> are promptly detected and addressed.</p><p>Furthermore, engaging with professional cybersecurity providers allows businesses to benefit from their extensive knowledge and expertise in cyber risk management. They can conduct thorough assessments of your existing security protocols, identify potential weaknesses, and recommend tailored solutions that align with your specific needs.</p><p>Investing in professional cyber threat intelligence services is an investment in the long-term success and resilience of your business. By proactively managing cyber risks, you not only protect sensitive data but also safeguard your reputation, customer trust, and overall business continuity.</p><p>With the ever-evolving nature of cyber threats, relying solely on traditional passive security measures is no longer sufficient. Your business needs professional cyber threat intelligence services to stay ahead of adversaries by detecting threats early on while implementing proactive security measures for a robust defense against potential breaches.</p><p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2087" src="https://www.ecuron.com/wp-content/uploads/threat-intelligence-service-discussion-6500c72998316.webp" alt="Threat Intelligence Service Discussion" width="720" height="300" srcset="https://www.ecuron.com/wp-content/uploads/threat-intelligence-service-discussion-6500c72998316.webp 720w, https://www.ecuron.com/wp-content/uploads/threat-intelligence-service-discussion-6500c72998316-300x125.webp 300w" sizes="(max-width: 720px) 100vw, 720px" /></p><h3><strong> 1. Identifying and Mitigating Potential Risks</strong></h3><p>Identifying and mitigating potential risks is of utmost importance to ensure the security and stability of an organization. This involves conducting comprehensive vulnerability assessments, performing risk analysis, and engaging in proactive threat hunting.</p><p><strong>Vulnerability assessments</strong> play a critical role in identifying weaknesses within an organization&#8217;s systems, networks, and applications. By conducting regular assessments, businesses can gain insights into potential vulnerabilities that could be exploited by malicious actors. This allows them to prioritize their efforts towards addressing these vulnerabilities before they can be exploited.</p><p><strong>Risk analysis</strong> goes hand in hand with vulnerability assessments by evaluating the potential impact and likelihood of various risks materializing. By analyzing the severity of identified vulnerabilities and assessing their potential consequences, organizations can make informed decisions on how to allocate resources for mitigation efforts.</p><p>But it doesn&#8217;t stop there. Proactive threat hunting involves actively searching for signs of malicious activity within an organization&#8217;s network or systems. This approach allows businesses to detect threats that may have gone unnoticed by traditional security measures such as firewalls or antivirus software.</p><h3><strong> 2. Staying Ahead of Emerging Threats and Attack Vectors</strong></h3><p>Staying ahead of emerging threats and attack vectors is crucial for businesses to protect their sensitive data and maintain the trust of their customers. With the rapid advancements in technology, cyber-criminals are constantly evolving their tactics to exploit vulnerabilities and gain unauthorized access.</p><p>To effectively combat these threats, organizations must conduct thorough cyber threat landscape analysis. This involves monitoring and analyzing the latest trends, techniques, and vulnerabilities that cyber-criminals may exploit. By understanding the current state of the threat landscape, businesses can proactively implement security measures to mitigate risks.</p><p>One of the most challenging aspects of emerging threats is <strong>zero-day vulnerabilities</strong>. These are previously unknown vulnerabilities in software or systems that hackers can exploit before developers have a chance to patch them. To address this issue, organizations need to have robust vulnerability management programs in place. This includes continuous monitoring for new vulnerabilities, timely patching or mitigation strategies, and proactive threat intelligence gathering.</p><p>Furthermore, staying ahead of emerging threats requires keeping up with new attack techniques. Cyber-criminals are constantly innovating and finding new ways to infiltrate systems or deceive users. By actively researching and understanding these tactics, organizations can develop effective defense strategies such as implementing advanced firewalls, intrusion detection systems, multi-factor authentication protocols, and employee training programs.</p><p>To stay ahead of emerging threats and attack vectors, organizations must continuously analyze the cyber threat landscape, address zero-day vulnerabilities promptly with robust vulnerability management programs, and stay informed about new attack techniques through research and proactive defense strategies. By doing so, businesses can enhance their cybersecurity posture and safeguard their critical assets from potential breaches or unauthorized access attempts.</p><p><img decoding="async" class="aligncenter size-full wp-image-2085" src="https://www.ecuron.com/wp-content/uploads/cyber-threat-intelligence-services-abstract-720.webp" alt="Cyber Threat Intelligence Services - abstract" width="720" height="354" srcset="https://www.ecuron.com/wp-content/uploads/cyber-threat-intelligence-services-abstract-720.webp 720w, https://www.ecuron.com/wp-content/uploads/cyber-threat-intelligence-services-abstract-720-300x148.webp 300w" sizes="(max-width: 720px) 100vw, 720px" /></p><h3><strong> 3. Enhancing Incident Response Capabilities</strong></h3><p>Incident response planning is crucial for organizations to effectively address and mitigate potential threats. However, simply having a plan in place is not enough. Organizations must also focus on enhancing their incident response capabilities to ensure swift and efficient action when a security incident occurs.</p><p>One key aspect of enhancing incident response capabilities is the development and implementation of effective incident containment and remediation strategies. These strategies involve identifying and isolating the affected systems or networks, as well as implementing appropriate measures to stop the spread of the incident and minimize its impact.</p><p>By investing in advanced technologies such as real-time monitoring tools, organizations can detect incidents early on and take immediate action to contain them. Additionally, leveraging automation can streamline the remediation process by rapidly deploying patches or updates to affected systems, reducing downtime and minimizing disruption to critical operations.</p><p>Organizations should prioritize continuous training and education for their incident response teams. By regularly conducting drills and simulations, team members can practice their skills in a controlled environment, ensuring they are prepared to handle incidents effectively when they arise.</p><p>Enhancing incident response capabilities is not only about reacting promptly to security incidents; it is also about learning from each experience. Organizations should conduct thorough post-incident analyses to identify areas for improvement in their planning, containment strategies, or overall security posture.</p><p>By focusing on enhancing their incident response capabilities through effective planning, robust containment strategies, leveraging advanced technologies, continuous training of personnel, and conducting post-incident analysis for continuous improvement; organizations can better protect themselves against cyber threats and minimize potential damages caused by security incidents.</p><h3><strong> 4. Strengthening Security Posture Through Actionable Insights</strong></h3><p>Real-time threat intelligence feeds with alerts and recommendations provide organizations with up-to-date information on emerging threats, vulnerabilities, and attack patterns. By continuously monitoring various sources such as dark web forums, hacker communities, and malware repositories, these feeds deliver actionable insights that enable proactive defense measures.</p><p>However, simply having access to threat intelligence is not enough. It is essential to have the ability to contextualize this information within the organization&#8217;s specific environment. This is where <strong>contextualized alerts</strong> and recommendations come into play. By analyzing the incoming threat intelligence in relation to an organization&#8217;s unique infrastructure, systems, and user behavior patterns, these tools can provide tailored insights that are directly relevant to the organization&#8217;s security posture.</p><p><img decoding="async" class="aligncenter size-full wp-image-2089" src="https://www.ecuron.com/wp-content/uploads/abstract-network-diagram-720.webp" alt="Abstract network diagram" width="720" height="300" srcset="https://www.ecuron.com/wp-content/uploads/abstract-network-diagram-720.webp 720w, https://www.ecuron.com/wp-content/uploads/abstract-network-diagram-720-300x125.webp 300w" sizes="(max-width: 720px) 100vw, 720px" /></p><p>The value of actionable insights gained from <strong>real-time threat intelligence</strong> feeds cannot be underestimated. By receiving timely alerts about potential threats or vulnerabilities specific to their environment, organizations can take immediate action to mitigate risks before they escalate into full-blown security incidents. Furthermore, contextualized recommendations empower security teams with the knowledge needed to prioritize remediation efforts effectively.</p><h3><strong>The Benefits of Outsourcing Cyber Threat Intelligence Services</strong></h3><p>One of the key advantages of outsourcing <a href="https://www.ecuron.com/cybersecurity-services/cyber-threat-intelligence-as-a-service/">cyber threat intelligence services</a> is cost-effectiveness. Building an in-house team with the necessary skills and knowledge can be expensive and time-consuming. Outsourcing allows businesses to access a dedicated team of experts without the overhead costs associated with hiring and training personnel.</p><p>Outsourcing and <strong>using cyber <a href="https://www.ecuron.com/cybersecurity-services/cyber-threat-intelligence-as-a-service/">threat intelligence as a service</a></strong> can provide numerous benefits for businesses of all sizes: it provides access to a wider range of expertise and resources that may not be available internally. By leveraging the expertise and resources of external providers specializing in <strong>cyber threat intelligence</strong>, companies can enhance their security posture and mitigate risks effectively.</p><h4><strong>By partnering with a trusted cyber threat intelligence service provider, organizations can strengthen their defense against evolving cyber threats while focusing on core business objectives.</strong></h4><p>To learn more about Ecuron&#8217;s Cyber Threat Intelligence Service see as stand alone service or as part of our vCISO offering  please see our <a href="https://www.ecuron.com/cybersecurity-services/cyber-threat-intelligence-as-a-service/" target="_blank" rel="noopener">Threat Intelligence Service</a> page or contact us.</p><p style="text-align: right;"><em>last changes: September 18th 2023</em></p></div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What to Do When Ransomware Attacks</title>
		<link>https://www.ecuron.com/what-to-do-when-ransomware-attacks/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 19:57:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Basics]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=1274</guid>

					<description><![CDATA[For many companies, it would be a nightmare to discover that they are the latest unwitting victim of a ransomware attack, capable of crippling computer systems and locking up data if a payment isn’t made to cybercriminals. There’s no magic wand that can make a ransomware attack simply disappear &#8211; with no impact at all [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>For many companies, it would be a nightmare to discover that they are the latest unwitting victim of a ransomware attack, capable of crippling computer systems and locking up data if a payment isn’t made to cybercriminals.</p>
<p>There’s no magic wand that can make a ransomware attack simply disappear &#8211; with no impact at all on an organization. However, you can lessen the problem by carefully following tried-and-trusted steps in the immediate aftermath of an attack.</p>
<p>The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing &amp; Analysis Center (MS-ISAC) have jointly released an <a href="https://www.cisa.gov/resources-tools/resources/stopransomware-guide" target="_blank" rel="noopener">in-depth guide</a> that not only includes recommendations on how you can reduce the chances of being the next ransomware victim, but also provide a step-by-step checklist for how to respond to a ransomware attack.</p>
<p>We believe that the ransomware response checklist could be a valuable addendum to organizations’ incident response plans. Your company does have a cyber incident response plan, right?</p>
<p>And the advice couldn’t be timelier, with more and more organizations hit by ransomware attacks that cripple their ability to operate normally or at all.</p>
<p>So, let’s take a look at the checklist step-by-step, focusing specifically on the very first things you should do:</p>
<blockquote><p><em>“1. Determine which systems were impacted, and immediately isolate them.</em></p>
<p><em>If several systems or subnets appear impacted, take the network offline at the switch level. It may not be feasible to disconnect individual systems during an incident.</em></p>
<p><em>If taking the network temporarily offline is not immediately possible, locate the network (e.g., Ethernet) cable and unplug affected devices from the network or remove them from Wi-Fi to contain the infection.”</em></p></blockquote>
<p>If it’s one or two computers that have been infected by the ransomware then you may be able to get away with just disconnecting those PCs and dealing with them individually. But if the infection has distributed itself more widely then you may have to take more significant action to prevent the ransomware from spreading further.</p>
<p>So clearly, it’s important to attempt to determine the scale of the problem as quickly as possible, as this will influence the nature of your response.</p>
<blockquote><p><em>“After an initial compromise, malicious actors may monitor your organization’s activity or communications to understand if their actions have been detected. Be sure to isolate systems in a coordinated manner and use out-of-band communication methods like phone calls or other means to avoid tipping off actors that they have been discovered and that mitigation actions are being undertaken.”</em></p></blockquote>
<p>In some instances, organizations have used personal email accounts or instant messaging services like WhatsApp to communicate if they fear corporate communications systems may be being monitored by the attackers.</p>
<p>Obviously, response teams should be careful to ensure that out-of-band communications they receive are genuinely from fellow workers rather than from malicious actors themselves.</p>
<blockquote><p><em>“Not doing so could cause actors to move laterally to preserve their access — already a common tactic — or deploy ransomware widely prior to networks being taken offline.”</em></p></blockquote>
<p>But what if you cannot temporarily shut down your network or disconnect affected computers from the network?</p>
<p>In that case, the response guide offers the following advice:</p>
<blockquote><p><em>“2. Only in the event you are unable to disconnect devices from the network, power them down to avoid further spread of the ransomware infection.”</em></p></blockquote>
<p>However, it should be noted that if you do this you may lose potential evidence about the attack which would be useful to the authorities.</p>
<p>Law enforcement agencies, as well as CISA and MS-ISAC, may be interested in gathering a wide variety of other information that could be useful in their investigation.</p>
<p>This includes, but is not limited to, the following:</p>
<ul>
<li>Recovered executable files</li>
<li>Copies of any readme file (this should not be removed as it often assists decryption)</li>
<li>Live memory (RAM) capture from systems with additional signs of compromise (use of exploit toolkits, RDP activity, additional files found locally)</li>
<li>Images of infected systems with additional signs of compromise (use of exploit toolkits, RDP activity, additional files found locally)</li>
<li>Malware samples</li>
<li>Names of any other malware identified on systems</li>
<li>Encrypted file samples</li>
<li>Log files (Windows Event Logs from compromised systems, Firewall logs, etc.)</li>
<li>Any PowerShell scripts found having executed on the systems</li>
<li>Any user accounts created in Active Directory or machines added to the network during the exploitation</li>
<li>Email addresses used by the attackers and any associated phishing emails</li>
<li>A copy of the ransom note itself</li>
<li>Ransom amount and whether or not the ransom was paid</li>
<li>Bitcoin wallets used by the attackers</li>
<li>Bitcoin wallets used to pay the ransom (if applicable)</li>
<li>Copies of any communications with attackers</li>
</ul>
<p>Even if there is little chance that an attacker might be identified and caught, details like the above – if shared with other companies – could help prevent them from becoming the next victim of the ransomware.</p>
<p>And it is only after the first two response steps that the guide recommends victims attempt to restore critical systems.</p>
<blockquote><p><em>“3. Triage impacted systems for restoration and recovery.</em></p>
<p><em>Identify and prioritize critical systems for restoration and confirm the nature of data housed on impacted systems.</em></p>
<p><em>– Prioritize restoration and recovery based on a predefined critical asset list that includes information systems critical for health and safety, revenue generation, or other critical services, as well as systems they depend on.</em></p>
<p><em>Keep track of systems and devices that are not perceived to be impacted so they can be deprioritized for restoration and recovery. This enables your organization to get back to business in a more efficient manner.”</em></p></blockquote>
<p>While these first three steps are being considered in order, there is additional work that can be taking place in parallel.</p>
<blockquote><p><em>“4. Confer with your team to develop and document an initial understanding of what has occurred based on initial analysis.”</em></p></blockquote>
<p>This clearly is a document that will grow over time as more information is found out about the ransomware, and what systems have been attacked and which have not.</p>
<blockquote><p><em>“5. Engage internal and external teams and stakeholders with an understanding of what they can provide to help you mitigate, respond to, and recover from the incident.”</em></p></blockquote>
<p>The guide provides contact information for CISA, MS-ISAC, as well as the FBI and US Secret Service.</p>
<blockquote><p><em>“Share the information you have at your disposal to receive the most timely and relevant assistance. Keep management and senior leaders informed via regular updates as the situation develops. Relevant stakeholders may include your IT department, managed security service providers, cyber insurance company, and departmental or elected leaders.”</em></p></blockquote>
<p>The guide also references the <a href="https://www.publicpower.org/system/files/documents/Public-Power-Cyber-Incident-Response-Playbook.pdf" target="_blank" rel="noopener">“Public Power Cyber Incident Response Playbook”</a>, which although targeted at power utilities contains advice that would be appropriate for any organization needing step-by-step guidance on how to engage teams and co-ordinate messaging to customers and the public.</p>
<p>Ideally you do not wait until you are suffering a ransomware attack to read guidance like this but build a playbook of your own in advance that is specific to your organization.</p>
<p>There are many more steps detailed, and good advice offered, in the full <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf" target="_blank" rel="noopener">MS-ISAC Ransomware Guide</a> and we would strongly recommend it to anyone responsible for securing an organization against an attack.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When Tools &#038; Templates Aren’t Enough</title>
		<link>https://www.ecuron.com/when-tools-and-templates-arent-enough/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 17:57:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity tools]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=1261</guid>

					<description><![CDATA[In this day and age, there is a tool for everything. Taxes, budgeting, dieting, all of these have tools. Some tools are so ubiquitous in our lives, that we cannot imagine life without it. Cybersecurity is no exception &#8211; there are tools for every need: from firewalls to antivirus and reporting to automation. When it [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In this day and age, there is a tool for everything. Taxes, budgeting, dieting, all of these have tools. Some tools are so ubiquitous in our lives, that we cannot imagine life without it.</p>
<p>Cybersecurity is no exception &#8211; there are tools for every need: from firewalls to antivirus and reporting to automation. When it comes to cybersecurity, proper usage of these tools is what separates a mature environment with real protection from cyber threats from a slapdash environment that has tools tossed together in the hopes that they will protect an organization. This difference in an organization’s cybersecurity maturity comes from something that tooling currently cannot offer it is the proper knowledge, understanding, and planning that allows organizations to design and develop an environment that mitigates risks effectively.</p>
<p>To ensure that organizations adhere to a certain level of security and maturity, the world has come up with various standards and frameworks that organizations can use as a guide for building their organization&#8217;s cybersecurity strategy. Frameworks such as NIST provide guidelines that organizations can use when building their cybersecurity strategy but do not provide certification options like standards such as ISO 27001 or SOC2 do. This certification option is essentially a verification for anyone else that an organization meets a standard level of cybersecurity which is quite important in today’s world. Having these certifications may be requirements at a government level, such as HIPAA, or they may be required to perform business with another organization at a contractual level.</p>
<p>Regardless of where the requirement is coming from, compliance with robust and well-designed standards is fast becoming the norm in today’s business industry. This shift has led to many organizations struggling to implement cybersecurity programs that adhere to the wide range of requirements these in-depth standards dictate. These new requirements in turn have led to the development and popularization of tools meant to help organizations achieve these compliance requirements. However, this has led many organizations to falsely believe they only need to use a tool to pass an audit. This is through no fault of the tool providers but rather it comes from a lack of thorough understanding or misunderstanding by the organization of what exactly is required for compliance with these standards.</p>
<p>Mature standards will often consist of at least two requirements: the first is documentation in the form of written policies, the second is implementation and the monitoring of controls. The written policies govern what an organization&#8217;s strategy will be, how they will identify risk, and how they plan to manage the risk. Implementation of controls on the other hand is closer to what people traditionally associate with cybersecurity: i.e. using firewalls to block network traffic or installing antivirus to prevent against malware. Tools are needed to implement many controls, including firewalls and antivirus, and many tools exist for helping an organization to implement a cybersecurity strategy that adheres to the standard the organization is attempting to meet. The keyword here is “help” &#8211; as they can play an important role and can be of great help to you and your organization. However, they ultimately cannot replace a solid cybersecurity strategy or knowledge to design and implement adequate controls. Controls, that not only fulfill the requirements but do not unnecessarily complicate processes for your employees.</p>
<p>To properly implement a cybersecurity program that will pass an audit and achieve certification, organizations need to have an in-depth understanding of how each requirement in a standard fits together to create a mature cybersecurity program. This task requires a human being with knowledge of the standard and the ability to both, create the policies necessary, and select the right controls for the organization. Once an organization has identified the person(s) who have this knowledge and can implement the standard for them, then the person(s) selected to do this work can identify tools that may make achieving the compliance easier.</p>
<p>These tools may include preassessment tools meant to identify and display the difference between where an organization currently stands and where they wish to be (Gap Analysis). Other preassessment tools allow for tracking of the status of the implementation, collecting documents as evidence, and the generation of reports to be used to demonstrate compliance in the audit itself. Regardless of which tool, they require people with the knowledge of the standard to input meaningful and adequate data so that these tools can be accurate.</p>
<p>Similarly, the use of templates for policies might help overcome initial writer’s block, hence facilitate the process of writing policies for an organization. Without a proper understanding of the requirements of the standards, however, these templates may end up lacking the necessary components that allow an organization to meet the standard and achieve certification.</p>
<h3>Bottom Line:</h3>
<p>Tools available for cybersecurity can play a useful role in a well-structured cybersecurity strategy. However, it is important to keep in mind that these tools are never a quick fix nor guarantee for security or compliance alone. In fact, using a variety of tools from multiply vendors might cause more and not fewer headaches. It is the knowledge of how standards work that allows us to pick the right tool for the job as well as understand the limitations of any tools selected.</p>
<p>When it comes to cybersecurity compliance with any of the standards specifically, self-assessment tools and software that keep track of the implementation status of a standard like ISO 27001 or NIST can be very useful, facilitate communication within the organization and with consultants like Ecuron. These tools can reveal gaps, track implementation and save time &#8211; but they can never replace the know-how to plan a solid cybersecurity strategy as a foundation or fulfill essential compliance requirements such as selecting efficient controls to put in place.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity: The Human Factor &#8211; Part 2</title>
		<link>https://www.ecuron.com/cybersecurity-the-human-factor-part-2/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 12 May 2020 14:50:48 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[human factor]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/lab/clone-of-cybersecurity-the-human-factor-part-1/</guid>

					<description><![CDATA[Welcome to the second part of the series on Cybersecurity: The Human Factor. In Part 1 we talked about the fact that attackers are constantly considering the human factor when developing and executing attacks. In this part we are going to examine the human factor from the defender’s perspective and explain why this creates a more [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><p>Welcome to the second part of the series on Cybersecurity: The Human Factor. In <a href="https://www.ecuron.com/cybersecurity-the-human-factor-part-1/">Part 1</a> we talked about the fact that attackers are constantly considering the human factor when developing and executing attacks. In this part we are going to examine the human factor from the defender’s perspective and explain why this creates a more secure environment.</p>
<p>As mentioned in the previous article, even nation state actors and Advanced Persistent Threats (APT&#8217;s) have real people behind them and these people are operating on all too human motivations such as financial gain, revenge, or to weaken others. As a defender it is vital to remember the human factor on the employee side of things – because the attackers haven’t for one moment forgotten that behind each defense is a human being with all the inherent shortcomings. Successful attack campaigns leverage this fallibility in order to succeed. This is exactly why phishing is such a successful attack venue for malicious actors.</p>
<p>To better understand your employees, it’s important to examine the motivations of the people within the organization. For most people, this motivation is to perform their job. Whether that comes from a desire to do a good job, from financial motivation, or from fear of losing the job does not matter. What is important is that they wish to perform their tasks within the organization as quickly and with as little pain as possible. This leads to the next very human aspect of your employees that it is important to understand: laziness. Whether dressed up as efficiency, or disguised as reduction of obstacles, ultimately people want to accomplish their goals and will do anything they can to reduce the actual headache associated with accomplishing that goal. By understanding that humans are inherently lazy you can examine your current security program through the lens of a user and identify where it creates unnecessary obstacles to performing daily tasks. I.e., is the implementation really seamless? By doing what you can to integrate security into the organization without hindering employee’s workflow, you are more likely to have an organization that responds positively when actual effort is required, such as getting employees to report phishing emails.</p>
<p>One common mechanism that is included with every operating system and most network devices is Access Control Lists (ACL&#8217;s). It is considered best practice to divide personnel roles based on what they need access too. For example: the sales team should have no need for administrative access to their workstations. By not giving them administrative access, you are limiting the options for any hacker and the potential damage to the organization in the event that the user makes a mistake (such as downloading a malicious attachment from a phishing email).</p>
<p>This is just one small example of using security to reduce the shortcomings of human beings, ensuring that even if they fail, the damage is limited in scope. One of the advantages of ACL’s is that &#8211; if properly set up &#8211; they are invisible to personnel performing their day to day tasks.</p>
<p>At the end of the day, security isn’t about technology in and of itself. Technology is a tool that is used to help us accomplish the goal of protecting an organization from threats and hereby reducing its risk. This technology can be better utilized when you consider both the security needs of your organization as well as the human factor of the equation. By understanding that attackers are humans as well with all too understandable motivations and goals, you can better identify places in your security that they might target. By reducing the chances for employees to make mistakes through properly implemented technology, you increase the overall security of the organization. By implementing this technology as seamlessly as possible, you reduce the headache of employees trying to perform their daily tasks and the chances of them looking for a workaround to your security measures in order to get their jobs done. <strong>Security isn’t just about technology, it&#8217;s about people too.</strong></p>
</div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity: The Human Factor &#8211; Part 1</title>
		<link>https://www.ecuron.com/cybersecurity-the-human-factor-part-1/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 06 May 2020 20:03:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[human factor]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/lab/?p=1013</guid>

					<description><![CDATA[No matter how much the threat landscape changes, there is one constant that will always stay the same: the people. When you hear about hackers or nation state actors, they are portrayed as either technical wizards doing things that no normal human can or as mysterious shadowy figures like those in fireside tales about the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>No matter how much the threat landscape changes, there is one constant that will always stay the same: the people. When you hear about hackers or nation state actors, they are portrayed as either technical wizards doing things that no normal human can or as mysterious shadowy figures like those in fireside tales about the Men in Black. The unfortunate effect of this type of glamorization and mystification of malicious actors in the threat landscape is that we tend to forget that behind this are real people with real motivations and real lives.</p>
<p>It is easy to get caught up in the hype of what the latest technology is, and the latest vulnerabilities in that technology &#8211; but it’s vital that we remember that the technology is only a tool to assist people in accomplishing their goals. Malicious actors aren’t just “out to get you”, they have motivations and goals that they are trying to accomplish. These goals vary from individual to individual, but most malicious attacks are performed for reasons as old as time: for financial gain, revenge, or to discredit rivals. Even nation state actors have goals that we can understand from a human motive: to further their own nation’s place in the world and to weaken their enemies. Whether that’s performed by introducing malware to affect nuclear centrifuges (Stuxnet) or by creating an army of bots and weaving a web of disinformation (Russian election interference), the motivations still become clear when you consider the people behind them and what it is that they hope to accomplish.</p>
<p>The reason it is so important to remember this: when malicious actors attack organizations, they are actively considering the people in place, their individual motivations. They are leveraging any personal information when building attack campaigns. Will people be more likely to open an attachment in an email from Bob274373982 or one claiming to be from the IRS that says they owe money? This is one reason why IRS scams are so popular each tax season. Does the developer really want to have to enter credentials each time they test an application? Of course not, so they come up with shortcuts. From hard-coded credentials, to passing in credentials automatically, or even removing authentication altogether when testing. While this isn’t something that most people are thinking about when they are just trying to do their job, it certainly is exactly something that malicious actors are considering while planning and executing their attack.</p>
<p>Fortunately, technology has come a long way forward in developing ways to counteract human weakness when it’s utilized properly. Tools that look for hard coded credentials in source code before the code is published can reduce the risk of lazy developers opening a security hole. Email filters and anti-phishing software can prevent the IRS scams from getting to employees in the first place. There are solutions, that when implemented properly, can be used to mitigate the risk presented by an organization’s untrained personnel.</p>
<p>Attackers have a very effective weapon in their arsenal when planning and executing attack campaigns – and it’s nothing technical: they constantly consider and plan around the human element. However, that doesn’t mean that the attackers are immune to human shortcomings. When designing an organization’s security strategy, it’s important to think about potential threats to your organization and what their possible motivations might be. This can help an organization better understand both, how they might be attacked and how to secure against that potential attack. In part two of this series we will explain the human side of the equation from a defender’s perspective and how that fits into an overarching security strategy.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>From the Front Line: Stories of Incident Response</title>
		<link>https://www.ecuron.com/from-the-front-line-stories-of-incident-response/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 13:56:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Incident Response]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/lab/?p=694</guid>

					<description><![CDATA[by Nicholas McBride &#8211; ECURON Cybersecurity Consultant Two stories from my own experiences demonstrate the importance of Incident Response Frameworks and the impacts of not having the right elements in place. The stories I relate here arose from my own experience assisting with Incident Detection and Response. In these cases, the lack of a robust [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>by Nicholas McBride &#8211; ECURON Cybersecurity Consultant</p>
<p>Two stories from my own experiences demonstrate the importance of Incident Response Frameworks and the impacts of not having the right elements in place. The stories I relate here arose from my own experience assisting with Incident Detection and Response. In these cases, the lack of a robust Incident Response Framework (IRF) led to an extended Incident Response (IR) process, resulting in increased risk towards the organization’s objectives. I’ll illustrate how a seemingly unimportant and often overlooked piece of an organization’s overall security posture can lead to substantial financial and mission objective impact. By sharing these stories, I hope to help you to avoid experiencing a similar challenge.</p>
<h3>Story One: When a Whale Gets Phished</h3>
<p><img loading="lazy" decoding="async" class="size-full wp-image-695 alignleft" src="https://www.ecuron.com/wp-content/uploads/email-phishing-attack.jpg" alt="Email phishing attack graphic" width="324" height="323" srcset="https://www.ecuron.com/wp-content/uploads/email-phishing-attack.jpg 324w, https://www.ecuron.com/wp-content/uploads/email-phishing-attack-300x300.jpg 300w, https://www.ecuron.com/wp-content/uploads/email-phishing-attack-150x150.jpg 150w" sizes="auto, (max-width: 324px) 100vw, 324px" />Phishing is the fraudulent practice of sending emails purporting to be from a reputable company that is actually sent from a malicious party usually with the intention of inducing the victim to reveal personal information such as passwords or credit cards. These emails are usually mass spammed with the idea that if you send enough of them you are bound to get some responses. A more targeted form of this attack, in which the threat actor tailors the email to specifically targeted individuals, is known as a Spear Phishing attack. Whale Phishing is a version of Spear Phishing in which the phishing emails are targeted at high-level executives. This allows an attacker to leverage the executives high level of access and authority within the organization for malicious purposes.</p>
<p>In this story the targeted individual was an executive within an organization who fell victim to a phishing attack that gave the attacker the credentials to the executive’s Office 365 account, allowing them to not only copy sensitive information from the executive’s email and SharePoint, but also to send emails as if they were the executive in question. The attacker leveraged this access to send an email to the financial department asking for a wire transfer to a bank account which, if not for the diligence of the employees of this organization, could have led to thousands of dollars in losses. That said, the importance of this story lies not in the attack itself but rather in the Incident Response process of the organization.</p>
<p>When I was first alerted to the email asking for the invoice I was looped in after the account password had been reset and Multi-Factor Authentication had been enabled to prevent the attacker from further illicit access. My purpose was to help the organization identify how the account was compromised and to determine the scope of the compromise. At this time, it was not yet confirmed that the initial attack vector was phishing and we also were unsure if the attacker had managed to con the executive into installing malicious software on the executive’s workstation as well. As such we decided upon a two prong approach of reading logs, both email and workstation, as well as performing basic endpoint investigation on the executive’s workstation to ensure that the machine was not compromised as well as the executive’s Office 365 account.</p>
<p>The issue that we ran into is that when attempting to perform the endpoint investigation on the executive’s workstation we were unable to get ahold of it. While this person was in the office for the first two days of the investigation, they were unwilling to give up their laptop, citing a variety of excuses. As a result, what might have been a week-long investigation turned into a several week ordeal lacking only performance of the endpoint check to consider this incident successfully resolved. The failing with this organization’s Incident Response Process became quite apparent: lack of executive buy-in. As discussed in my last article, it is vital that the security team have the authority to perform their jobs when in the middle of an incident. Had the executive’s workstation been infected, the risk to this company would have been greatly increased with each passing day.</p>
<p>While it is understandable that executives have mission critical work to perform, it is unacceptable not to work with the security team to find alternate ways to perform this work (even at a semi-reduced capacity) while an incident is ongoing. It is also important for the security team to understand the executive’s need to perform their job and to work with them and the IT team to solve this problem. My personal favorite method is to provide the executive with a replacement laptop that is built from a backup image of a known good configuration that they can use while security is performing their investigation, with the onus on the executive to have proper data backups so that they can access the information they need while the investigation is being performed. This would have led to a quickly resolved incident with all stakeholders assured that the threat had been properly contained and mitigated, allowing us to move on to other tasks rather than wasting time each day looking for suspicious logs coming from the executive’s potentially compromised workstation.</p>
<h3>Story Two: Clear Communications</h3>
<p><img loading="lazy" decoding="async" class="size-full wp-image-696 alignleft" src="https://www.ecuron.com/wp-content/uploads/information-security-team-communication.jpg" alt="information security team communicating" width="480" height="273" srcset="https://www.ecuron.com/wp-content/uploads/information-security-team-communication.jpg 480w, https://www.ecuron.com/wp-content/uploads/information-security-team-communication-300x171.jpg 300w" sizes="auto, (max-width: 480px) 100vw, 480px" />In this story I was brought in after the first 24 hours of the investigation had already passed to assist with providing ancillary information that would help the teams working the investigation to uncover the full timeline and scope of the compromise. I was told that a compromised system had been detected and initial investigation revealed lateral movement onto several systems. The goal of bringing me in was to help ensure that remediation had worked on the compromised systems and to look for Indicators of Compromise (IOC’s) from systems that had not been identified as compromised. It quickly became apparent that there was no IR in place, or if there was it was not flexible enough to account for this particular scenario. What should have been a 48 hour investigation followed by monitoring turned into an investigation that lasted almost a week as new problems in visibility were found and tools built to try and work around it. This was combined with a lack of clear and transparent communication between the various teams working on the incident and was further hindered by the fact that there were three third-party organizations working alongside the compromised organization, with limited communication and collaboration between the third-party organizations.</p>
<p>Over the course of this investigation it became clear that three key pieces were missing from the IRF that would have allowed for faster resolution and lessened financial impact. The first piece that was missing was a clearly defined escalation process. As a result, escalation to the wrong parties before certain parts of the IR process had taken place caused panic and led stakeholders to disagree on the best way to go about the IR. The second missing piece was designating who should oversee the IR process, from declaring it an incident to declaring the incident completed. And the final missing piece was clear communication between the various parties assisting in the investigation. The third-party organizations brought in to assist with the process were able to apply their own methodology and known best practices to the investigation of the compromise so that ultimately the incident was successfully contained and remediated. But the entire process was rendered highly inefficient due to the lack of a more clearly defined escalation process and assignation of responsibility within their own organization. Bad as it was in this relatively simple incident, such a problem would quickly spiral into major complications in a more complex and severe incident.</p>
<h4>Conclusion:</h4>
<p>As I’ve stated before, it is usually not the lack of proper tooling but rather the processes around tools and people involved in the IR process that leads to IR failure. In the first story we saw how a lack of executive buy in and lack of authority given to the security team can lead to greater financial risk for the entire organization. It’s not enough to have a security team with an Incident Response Framework, they also must be able to execute the processes laid out in the framework to be effective. In the second story we saw how a lack of clearly defined escalation paths and lack of assigned responsibility led to an increase in overall cost for the Incident Response process. By clearly stating to whom the incident should be escalated, we ensure that the proper stakeholders are notified at the proper time. With proper assignation of responsibility for each part of the IR process to the proper people we ensure that there is quick and clear communication amongst all parties involved, contributing to an efficient resolution.</p>
<p>When an organization includes these elements into their IRF, they reduce the risk to their organization in the event of an incident. This reduced risk directly translates to a reduced overall cost for the incident response process and a reduced negative impact upon the organization’s objectives. It is through proper planning and the design of flexible frameworks that organizations will be able to meet the ever-changing threat landscape of tomorrow.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Man In The Middle Attack (MITM) &#8211; A Primer</title>
		<link>https://www.ecuron.com/man-in-the-middle-attack-mitm-a-primer/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 18:47:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Man in the middle attack]]></category>
		<category><![CDATA[MITM]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/lab/?p=580</guid>

					<description><![CDATA[In conversations as a cyber security professionals we have had many discussions about different types of attacks &#8211; from SQL Injection attacks to password brute forcing and everything in between. Yet, there seems to be one type that causes more questions than most: “Man in the Middle” (MITM) attacks. Let’s clear up some of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In conversations as a cyber security professionals we have had many discussions about different types of attacks &#8211; from SQL Injection attacks to password brute forcing and everything in between. Yet, there seems to be one type that causes more questions than most: “Man in the Middle” (MITM) attacks. Let’s clear up some of the confusion.</p>
<h4>What a MITM attack is</h4>
<p>At its core, a MITM attack is a type of eavesdropping attack that occurs when a malicious actor inserts himself between two communicating parties. This allows the attacker to relay all communication, listen to it, modify it, and even impersonate one of the parties.</p>
<h4>Nothing new</h4>
<p>One of the most famous examples of a MiTM attack happened in 1568, long before computers were even invented. Known as the Babington Plot, communications between Mary Stuart and her supporters surrounding a plot to assassinate Queen Elizabeth I were intercepted by a third party. Altering the content of the messages revealed the identities of those involved in the plot, and they were executed.</p>
<p>In more recent times, MITM attacks have been used by everyone from criminals looking to commit financial fraud to the NSA looking to intercept Google searches. These modern MITM attacks, and the ones that the term is most applied to these days, are generally executed in the realm of Information Technology. There is a variety of ways that this technique can be used. Essentially, anytime there is communication between two parties a MiTM attack can be performed.</p>
<h4>MITM and emails</h4>
<p>When it comes to emails, this is often done using Domain Name Resolution (DNS) spoofing, in which an attacker convinces a victim that they are the authoritative DNS server and then routes the traffic to a server that the attacker controls. In the case of attacks against financial institutions, attackers will gain control of an email account of someone like a financial advisor or bank representative and then send an email purporting to be this person asking victims to send money to bank accounts owned by the attacker. Other cases are real estate closings and commercial transactions which are frequent targets: a hacker first acquires access to a firm&#8217;s server, then redirects all e-mails associated with the firm&#8217;s server to the hacker&#8217;s server. This allows him to subsequently change payment information and other information in those e-mails to defraud the firm and those working with the firm.</p>
<h4>The confusion</h4>
<p>A lot of the confusion seems to stem from the fact that unlike an SQL injection attack, which by definition only works against SQL databases, a MITM attack is not limited to one technology or type of technology. Instead, it is an umbrella term and can be performed anytime there are two parties communicating – typically combined with other techniques such as phishing. This ambiguity is the reason that one of the most robust attack type classifications, the <a href="https://attack.mitre.org/" rel="nofollow noopener" target="_blank">ATT&amp;CK matrix from Mitre</a>, doesn’t even list MiTM in their matrix of attack types.</p>
<h4>The bad news</h4>
<p>If a MITM attack is successfully performed, the victim has no idea that the attack is happening. In the case of fraudulent emails during real estate closings for example, the email was sent from a legitimate address, the victim has reason to trust the sender (i.e. title company), and there is plausible reason for the compromised email account to be asking for money to fund the business transaction. If the MiTM attacker used DNS spoofing, the victim would have to be actively monitoring every DNS request and know the legitimate DNS servers IP address by heart and then notice the discrepancy. And while there is software out there that can help detect DNS spoofing, a regular consumer will not be using it.</p>
<h4>The good news</h4>
<p>Without you even noticing, there are many protections against MITM attacks already in – such as right now while you are reading this article. One of the major reasons for websites to implement HTTPS is to greatly increase the difficulty of performing MITM attacks. When you first browsed to this website, your browser verified the validity of the SSL certificate of this website to ensure that the website you are visiting is exactly who it says it. Have you ever gotten a warning from your browser that the website your visiting isn’t safe? That’s usually because the SSL certificate is either expired or for a different website than the one you are visiting. This is how the browser tries to help you avoid being caught in a MiTM attack. To protect against financial attacks from compromised email accounts, many organizations require secondary authentication to help prevent that type of MiTM attack. Typically, before allowing monetary transfers a phone call to confirm the information and the request sent by email are mandatory.</p>
<h4>Bottom Line</h4>
<p>While there are many different types of MiTM attacks and they can occur in a variety of ways, Man-in-the-Middle means an attacker is positioned to intercept and/or modify communications between two parties. Email conversations are prone to this and DNS spoofing is a common way of achieving it.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerability Scanning vs Penetration Testing: Part 3</title>
		<link>https://www.ecuron.com/vulnerability-scanning-vs-penetration-testing-part-3/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 14 May 2019 16:46:18 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Penetration Test]]></category>
		<category><![CDATA[Vulnerability Scan]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=347</guid>

					<description><![CDATA[This is the last article in a three part series on vulnerability scanning vs penetration testing. In the first article we discussed the differences between vulnerability scanning and penetration testing and in the second article we went over the three main methodologies used when performing a penetration test. With this final article we would like [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This is the last article in a three part series on vulnerability scanning vs penetration testing. In the first article we discussed the differences between vulnerability scanning and penetration testing and in the second article we went over the three main methodologies used when performing a penetration test. With this final article we would like to give an overview of the five main types of penetration testing and demonstrate how they are performed by using the methodologies mentioned in the previous article. The goal here is to give you an idea of how the methodologies and types of penetration testing are utilized so that you can choose the right type and methodology of penetration test that best suits your organization’s security needs.</p>
<h4><strong>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Application Penetration Test</strong></h4>
<p>The application penetration test is a test designed to identify and demonstrate the exploitability in any given application, defined by the scope of the test. If, for example, you want an application penetration test on a web application used by your company then the penetration tester would limit the test to the web application itself and not attack the web server or other services running on the machine where the web application is hosted. The purpose here is to test the security of the web application itself and look for design flaws in the web application which could allow an attacker access to sensitive information. This can be accomplished by attacking it as an external attacker might, with no knowledge of the source code, which is an example of the black box methodology applied to an application penetration test with a scope of the web application. Or it could be accomplished by giving the penetration tester full access to the source code as well as a running instance of the application itself, an example of white box methodology applied to a web application penetration test.</p>
<p>Application penetration testing is not only limited to web applications however, it can be applied to any application that an organization has developed. Mobile applications, desktop applications, and anything in between can all be tested for vulnerabilities via various techniques specific to the application type being tested. Typically, web application testing is included with a network penetration test (more on that later), whereas desktop or server applications are often performed as standalone penetration tests that do not require an organization to spend the money and time on a lengthier full network penetration test.</p>
<h4><strong>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Network Penetration Test</strong></h4>
<p>A network penetration test is the next type of penetration test, and the one that most people think of when they discuss penetration tests. In a network penetration test the penetration tester will attempt to gain access to sensitive information by testing the full range of an organizations network. This usually involves techniques such as port scanning and open source intelligence gathering to gain information on the target network followed by vulnerability scanning to gain information about possibly vulnerable services being run by the target. Once access to the targets network has been achieved the penetration tester will then use the access they have gained to further penetrate the target organizations network as much as possible within the scope and the time constraints given by the engagement. While it is called a network penetration test, these tests usually include web application’s and any running services or programs that the penetration tester can gain access to. However, network penetration tests will usually not include other attack techniques such as social engineering or physical penetration testing.</p>
<h4><strong>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Social Engineering Penetration Test</strong></h4>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>The third major type of penetration test is the Social Engineering penetration test. Social Engineering is a type of attack that malicious actors use to leverage human nature in a variety of techniques against the target. The goal of this test is to try and utilize social engineering techniques to gain access to the target organization. Depending on the scope of the engagement, such as whether it includes physical locations, different types of Social Engineering techniques will be selected for use in the penetration test. The most common type of Social Engineering penetration test is Phishing, in which the penetration tester sends email’s to users in the organization under different pretexts to attempt to get the users to either download malicious files or give their credentials to the attacker. This may be performed either by itself or in combination with other penetration test types, such as a Network Penetration test.</p>
<p>Other Social Engineering techniques will often be used in combination with a Physical Penetration test to gain access to the offices of an organization. These include things such as tailgating, following an employee inside without having a badge, or pretending to be a service employee there to perform maintenance of some sort with the intention of gaining access to the building that the penetration tester shouldn’t have.</p>
<h4><strong>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Wireless Penetration Test</strong></h4>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Wireless penetration testing is when the penetration tester attempts to gain access to sensitive information via the organization’s wireless network. In this sort of test, the penetration tester will need to be on site in order to properly perform this test. In a black box wireless penetration test the tester will first have to gain access to the wireless network, which is a good way to test the security of the wireless network against attacks such as wireless password cracking. Once access has been gained, the penetration tester can then test for vulnerability to other attacks such as Man in The Middle (MiTM) attacks and sniffing for unsecured sensitive communications. Alternatively, a white box wireless penetration test would be when the penetration tester would be granted access to the wireless network so that they can test for the MiTM and unsecured communication’s without first having to spend the time trying to break into the wireless network resulting in a shorter amount of time needed to complete the penetration test.</p>
<h4><strong>5.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Physical Penetration Test</strong></h4>
<p>Physical penetration testing is often the most underutilized, and most sorely needed, of all penetration test types. It doesn’t matter how good your firewall is if an attacker can easily walk into your building and plug in a USB drive. Once an attacker has physical access to an organization’s environment, it is usually quite trivial to gain access to confidential and proprietary information. When a penetration tester is performing a Physical Penetration test, they will use a variety of Social Engineering techniques, such as tailgating, to gain access to a facility. The purpose of this sort of test is to test how easy it is to bypass physical defenses, up to and including personnel at the location, in order to gain access to the organization’s network. This type of penetration test is often one of the most costly as the penetration tester must be on location in order to perform it. However, it is also one of the most important to perform as physical access is usually the biggest vulnerability any organization will have.</p>
<h4><strong>What Is Right for Your Organization?</strong></h4>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>As seen above there are quite a few different types of penetration tests that can be performed, often with at least some level of overlap. When deciding which type of penetration test is right for your company it is important to consider what the goal of the penetration test is. Do you want to test for vulnerability to internet based attackers? Do you want to know the effectiveness of a phishing attack against your organization? Or are you most worried about people gaining access to your office in an illicit manner in order to access your proprietary information? Knowing what you want the penetration test to test for is the first step in deciding what type of penetration test is right for your organization.</p>
<p>After deciding upon what the purpose of a penetration test is you will be able to select the type, or multiple types, of penetration test that will best accomplish your objective. This is then followed by deciding upon the scope of the penetration test. In the case of a network penetration test you may wish to restrict the scope to specific IP addresses or domains, or you may wish for all IP’s and domains owned by your company to be tested by the penetration tester. This scope definition will also help you clarify what methodology you wish the penetration tester to utilize when performing the penetration test. If your goal is to test your vulnerability to internet based attackers against all of your company’s production assets, you would probably ask for a network penetration test including all web applications performed with the&nbsp;black box methodology. In other words, restricting the scope to only production assets to reduce the time of the engagement but asking them to attack those assets as a malicious internet based threat would.</p>
<p>On the other hand, maybe your goal is to test for your organization’s vulnerability to an insider threat. You could then ask for an on site penetration test involving Wi-Fi, Social Engineering, and Network Penetration using a white box methodology. While this type of test may involve techniques from several different types of penetration testing, by stating the goal as that of being testing for insider threat the penetration tester has specific attack venues to attempt via white box methodology which can significantly reduce the time needed to perform the engagement.</p>
<h4><strong>Red Team Testing</strong></h4>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>There is one final type of testing that goes by several names but is often referred to within the Information Security Community as <a href="https://en.wikipedia.org/wiki/Red_team" target="_blank" rel="noopener">Red Team testing</a>. This is basically a “gloves off” approach to penetration testing in which the penetration tester will perform any and all techniques they can to attempt to gain access to your companies’ sensitive information. Engagements of this variety often take much longer to complete and thus be more expensive, however, they are also the best way to gain a complete look into the state of information security within your company. It reflects best the threat an organization faces when under serious attack such as by state sponsored attackers. The team performing the penetration test will often break a Red Team engagement into several phases, each consisting of a different methodology and attack technique so that they can accurately simulate the various threats that your organization may face.</p>
<h4><strong>Post Engagement: What to Expect</strong></h4>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>After a penetration testing engagement is complete the final deliverable to an organization should be a report in which the penetration tester outlines the results of the test. Typically, report writing takes the same amount of time as the actual engagement, so for a 5 day engagement expect 5 days for the penetration tester to complete the report. Upon delivery of the report to the organization, a post-engagement meeting should be held between the penetration tester and the organization’s management team to discuss the findings in the report.</p>
<p>A good report will include an executive summary of the engagement which includes the purpose, a general idea of methodology and techniques utilized, and an overview of the findings. The report should contain a technical section that can be disseminated to the organization’s technical teams which outlines how the penetration tester was able to exploit vulnerabilities and what that allowed them access too. In addition, it should provide a detailed breakdown of each vulnerability found, whether or not it was exploited, the severity of the vulnerability, and a quick note on how to go about fixing the vulnerability. This technical portion should then be used by the organization to improve their security posture.&nbsp;<strong>&nbsp;</strong></p>
<h4><strong>Conclusion</strong></h4>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>&nbsp;When it comes to testing your organization’s security posture there is no better test than a penetration test. It can be used to test with a limited scope such as only your web application, it can be used to test your entire network including onsite Wi-Fi and secured areas via physical penetration testing or within the much wider scope of a red team engagement . And it can be performed in a couple of different ways, depending on what sort of threat to your organization you wish to test for and the time constraints on when you need the final report. Network penetration testing will often be longer than application penetration testing, however it also usually includes website application penetration testing within the scope. A physical penetration test may be done quite quickly; however, it will be more expensive due to the need of the penetration testing team to actually be on site in order to perform it. No matter the type of testing, you should always expect the final deliverable to be a detailed report that will not only detail the issues found but also give you a road map to addressing them.</p>
<p>To receive a sample report or to discuss your penetration testing needs please <a href="https://www.ecuron.com/contact/" target="_blank" rel="noopener noreferrer">contact us</a>.</p>
<p><strong>Previous Articles from This Series:</strong></p>
<p><a title="Vulnerability Scanning vs Penetration Testing: Part 1" href="https://www.ecuron.com/vulnerability-scans-vs-penetration-testing-part-1/" target="_blank" rel="noopener noreferrer">Vulnerability Scanning vs Penetration Testing: Part 1</a></p>
<p><a title="Vulnerability Scanning vs Penetration Testing: Part 2" href="https://www.ecuron.com/vulnerability-scanning-vs-penetration-testing-part-2/" target="_blank" rel="noopener noreferrer">Vulnerability Scanning vs Penetration Testing: Part 2</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Risks in The Healthcare Sector</title>
		<link>https://www.ecuron.com/cybersecurity-risks-in-the-healthcare-sector/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 15:47:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=337</guid>

					<description><![CDATA[The healthcare industry is under attack for a reason. Cybercriminals view it as a place that’s ripe for “big wins,” and the number of large healthcare institutions recently falling victim to data breaches shows they’re having success. But what exactly makes healthcare such a popular target among today’s cyber-criminal community &#8211; how big are cybersecurity [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The healthcare industry is under attack for a reason. Cybercriminals view it as a place that’s ripe for “big wins,” and the number of large healthcare institutions recently falling victim to data breaches shows they’re having success.</p>
<p>But what exactly makes healthcare such a popular target among today’s cyber-criminal community &#8211; how big are cybersecurity risks in the healthcare sector really? In this post, we will take a look at what’s so appealing to malicious hackers about the healthcare industry, including:</p>
<ul>
<li>Sensitivity and Value of Health Information</li>
<li>Control of Medical Devices and Systems</li>
<li>Healthcare is Vulnerable</li>
</ul>
<p><strong>Sensitivity and Value of Health Information</strong></p>
<p>Cybercriminals that are able to penetrate healthcare networks gain access to sensitive information through medical records. The value of a stolen record is based on its ability to be replaced. For example, credit cards are easy to replace. It simply involves a phone call to the card issuer and a trip to the bank to get a new one. Patient records and other human data, however, are difficult if not impossible to replace. Electronic Medical Records (EMRs) serve as a one-stop-shop thanks to the availability of full names, social security numbers, addresses, and more.</p>
<p>This information can be used for financial fraud outside the healthcare industry and if the victims’ health insurance information is gathered, criminals can then sell the information for even more money on black markets. In fact, one Medicare number can reportedly sell for nearly $500 on today’s black market &#8211; which is up to 10x the amount of a credit card number. Health insurance information can be leveraged for medical fraud, and arms criminals with the information needed to access free medical care, prescriptions, or even the ability to buy expensive medical equipment that can be sold for profit.</p>
<p>Lastly, stolen medical data can go undetected for much longer periods of time than something like a credit card, which is often closed within days of a breach.</p>
<p><strong>Control of Medical Devices and Systems</strong></p>
<p>More internet-connected medical devices and systems are being incorporated into the framework of healthcare than ever before. As a result, cybercriminals are being provided with more avenues of ingress and surfaces to attack than ever before.</p>
<p>Connected devices like drug pumps or pacemakers that are commandeered by cybercriminals could have fatal consequences. However, cybercriminals also try to breach non-life-threatening devices to gain access to systems. Newly introduced connected medical devices are especially vulnerable to threats, as security can oftentimes take a backseat to device performance and convenience across the industry.</p>
<p>Once cybercriminals find their way into networks, they aren’t just using access to steal patient data. In the past years, there have been a number of instances where ransomware was used as a means for quick financial “wins.” With ransomware attacks, cybercriminals seize control of systems and lock them up until the institution pays them currency for returned access. Healthcare institutions are often pressured into paying the sums of money being asked as prolonged downtime can be damaging not only to reputation as in any industry, but more importantly, patient safety. One of the most notorious ransomware attacks of all involved the WannaCry ransomware, which is believed to have struck 34% of all the National Health Service (NHS) trusts in England.</p>
<p>While we strongly oppose paying ransoms, this unique situation creates a more complicated scenario: It depends on the systems that were affected. Law enforcement has come out strong against paying the ransom for fear it will open up a Pandora&#8217;s box, but if patients’ health is at risk and the hospital&#8217;s business is affected severely, they may not have a choice.</p>
<p>But even if the attackers keep their word and decrypt your data after you pay, there is no guarantee that they will not leave other forms of malware running on the system in order to carry out other crimes, like sending spam emails, launching DDoS attacks, and stealing personal or financial data for use in online fraud and identity theft. This means, the cost of cleaning the organization’s IT environment could easily exceed the ransom that was paid many-fold.</p>
<p><strong>Healthcare is Vulnerable</strong></p>
<p>With so many connected pieces of medical equipment and different types of software being run, it’s a challenge for healthcare organizations to successfully defend against attacks. Inadequate budgets and a lack of skilled security personnel, combined with the hurdles presented by a variety of security needs, are all holding healthcare institutions back. And cybercriminals are aware of these struggles.</p>
<p>As a result, the industry’s vulnerability makes it an easy target for criminals. An attacker targeting a healthcare organization often has the luxury of gathering a little bit of information from one system, and then moving on to their next target without being detected. The number of vulnerable systems in an existing healthcare network makes it simple for them to collect a number of small wins over time that can equate to a big win overall.</p>
<p>And as proven in the last years, a relatively small-scale attack with only a few individual systems infected with ransomware can have a devastating effect – i.e. it can force an entire hospital to revert to a manual system to provide care because the data isn&#8217;t available otherwise. Health organizations have to start considering the fact that the integrity of the data and the availability of the data is in many ways more important for the operation than confidentiality.</p>
<p>End of 2018, Michigan-based medical billing company Wolverine Solutions Group (WSG) reported thousands of patients impacted by a ransomware attack. According to WSG, its critical operations were down for over 40 days after the ransomware attack was initially detected. While this is bad enough &#8211; work has continued in the months since to identify those individuals whose healthcare clients were affected. The company has mailed out a number of notifications to affected individuals in December, January and February, and says it will send out more this month.</p>
<p><strong>Final Thoughts</strong></p>
<p>As evidenced by the headline-grabbing data breaches over the past few years at large insurers and healthcare systems, hackers are finding the most lucrative information in patient medical records. As a result, there is more pressure than ever for healthcare organizations to refine their cybersecurity strategies.</p>
<p>Today’s healthcare organizations need to think about ways to speed up and improve their security. <a href="https://www.ecuron.com">Comprehensive cybersecurity</a> solutions that address today’s borderless attack surface make it possible for healthcare institutions to be both secure and high-performing at the same time. An added benefit of making security a primary requirement for every data record and application is faster processing due to increased trust and proven competence.</p>
<p><strong>Additional Reading:</strong></p>
<p><a href="https://www.theverge.com/2019/4/4/18293817/cybersecurity-hospitals-health-care-scan-simulation" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignleft wp-image-344 size-medium" src="https://www.ecuron.com/wp-content/uploads/Health-Cares-Huge-Cybersecurity-Problem-300x300.jpg" alt="Cybersecurity Risks in the Healthcare Sector" width="300" height="300" /></a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerability Scanning vs Penetration Testing: Part 2</title>
		<link>https://www.ecuron.com/vulnerability-scanning-vs-penetration-testing-part-2/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 25 Mar 2019 23:51:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Penetration Test]]></category>
		<category><![CDATA[Vulnerability Scan]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=333</guid>

					<description><![CDATA[After the explanation of the differences between vulnerability scanning and penetration testing in part 1 of this short series you recognize that your organization needs a penetration test. Next step is to determine what type of penetration testing exactly is required. Do you need a web application or a network penetration test? Should it be [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>After the explanation of the <a href="https://www.ecuron.com/vulnerability-scans-vs-penetration-testing-part-1/">differences between vulnerability scanning and penetration testing</a> in part 1 of this short series you recognize that your organization needs a penetration test. Next step is to determine what type of penetration testing exactly is required. Do you need a web application or a network penetration test? Should it be black box or white box? What is a red team engagement? Choosing to have a penetration test done is only the tip of the iceberg and our goal in this article is to help clarify what the different major testing methodologies are so that you can choose the best one to match your organization’s security goals.</p>
<p><strong>Penetration Testing Methodologies &amp; Scope</strong></p>
<p>When looking at the different types of penetration testing there are two parts that need to be considered: methodology and scope. The first determines what exact type of penetration test will be performed – where the different types are&nbsp;primarily differentiated by the amount of information provided to the tester at the outset. The second breaks down the scope of the penetration test which&nbsp;can vary by what is being examined: Will it be limited to just web applications? Will the network be involved? Should the server software be included? Would DDoS be allowed for testing? In today’s article I will focus on&nbsp;the main types of penetration testing techniques, and in a future article we will go into the issue of scope.</p>
<p><strong>Different Types of Penetration Testing: “Boxes”</strong></p>
<p>The&nbsp;three main&nbsp;types of penetration testing&nbsp;are often referred to as “Black Box”, “Grey Box”, and “White Box”.&nbsp;A&nbsp;different set of information about the IT infrastructure to be tested is provided to the tester&nbsp;in each of these,&nbsp;simulating the&nbsp;different types of attack which might be perpetrated by a malicious actor.&nbsp;The choice of which “Box” to use will be driven by the type of information the test is intended to reveal.</p>
<p><strong>Black Box Testing</strong></p>
<p>“Black box” is a term used through programming and engineering to depict a situation in which you know what goes in and what goes out but have no information about what happens within the box. For example, let’s look at a car. The average driver knows that a step on the accelerator (gas pedal) accelerates the car, however, they do not know exactly what sequence of events causes acceleration (black box). What is known is that the input, stepping on the accelerator, provides the output of acceleration.</p>
<p>Similarly, in black box penetration testing all that is known to the tester is the target IP’s, domains, and/or&nbsp;applications that they can attack. It is up to the penetration tester to use their own ingenuity and resources to determine specifics about the target&nbsp;such as the operating system, open ports, possibly undefended resources, etc. This type of penetration test is most analogous to a real-world malicious actor attempting to break into your organization. A malicious actor will only know what they can publicly find or derive via scanning tools and base their attack on that information.</p>
<p>While this covers the most common scenario, it does have the downside of missing anything that could be derived from an insider threat or any information that a malicious actor may find that the penetration tester cannot for whatever reason. To account for the possibility that a malicious actor may have more information &amp; resources available than thought possible – think i.e. state sponsored hacking &#8211; there are two more methodologies of penetration testing.</p>
<p><strong>White Box Testing</strong></p>
<p>The idea of a white box is meant to be the exact opposite of a black box: the tester can see every single internal working of the “box” that leads to an output. In terms of our vehicle acceleration analogy above, it’s more like a bicycle than it is a car engine. When you turn the pedal on a bicycle you can see the chain and the gears interacting which lets you see exactly how it is accelerated. In the same vein a white box penetration test is one in which the penetration tester has full access to the IT infrastructure source code, system architecture, and even internal security controls before beginning the penetration test. This allows the testers to perform a faster penetration test because they don’t have to wait for i.e. port scans to finish &#8211; instead they have that information available already. Similarly, the penetration tester does not have to gain access to an organization’s network via an exploit in order to find internal security controls that are lacking. The largest advantage of a white box test is that a penetration test is more likely to uncover problems than in a black box penetration test. Consequently, the resulting report will be more detailed which will allow an organization to have the greatest opportunity for improvement to its security posture.</p>
<p><strong>Grey Box Testing</strong></p>
<p>As the name implies, grey box testing is meant to combine the ideas from both black box testing and white box testing in a middle ground that uses aspects of both methodologies. Most often, this is achieved by providing the penetration tester limited information about the inner workings – i.e. by giving access to system architecture diagrams and possibly even source code for perusal.&nbsp;The idea here is to give the penetration tester&nbsp;knowledge that will allow them to target their attacks from the beginning like in a white box test, but still attack the organization from outside in a manner like a malicious external actor would. By utilizing diagrams and source code the tester can pinpoint the most likely weaknesses and get started on manually attacking those even while the automated scans a black box test uses are running concurrently.</p>
<p><strong>Which Box Is Right for Me?</strong></p>
<p>There is no one methodology that fits all organizations, as it is largely dependent on an organization’s individual security goals and requirements by security standards such as ISO 27001 or contract partners. To pick the appropriate methodology you need to determine what the goal of the penetration test is. If it’s simply to meet a contractual obligation, you may elect for a grey or black box test as it will most closely simulate an external actor. &nbsp;Unless the penetration tester can breach the perimeter, it will keep the list of fixes potentially required to a manageable amount. On the other hand, if your goal is to be as secure as possible no matter the work required to fix potential issues, you may elect for a white box test or a grey box test with source code analysis included. Here, the list of findings can result in a much longer list of fixes required and include various internal mechanisms that need to be addressed.</p>
<p>In the next article we will address different scopes of penetration tests in relation to the methodologies and how both, the scope and methodology chosen can influence time and investment.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
