Can you be a great CEO by ignoring Cyber?

The digital world, the cyber world, is creating huge problems for business.

People like me and the security community have been screaming for the last 10 or so years about the problems, issues and dangers that the digital world delivers to business.

We have shown numerous times that the digital realm is a huge problem for anyone who thinks that:

  • they are not a target,
  • have nothing worth stealing or
  • cyber security is too expensive.

Time and time we have seen data breaches and ransomware attacks that have crippled organisations, both large and small.

We have seen the most secure people in the world get breached time and time again.

Still no one is listening!

We are told we are being scare mongers, unrealistic, even calling our reputations into question. BUT, we still see the problems and although we are screaming we cannot convince people to do something about it.

Like me there are a number of people or organisations who are more interested in education and the process of education and training than selling tin (unnecessary technology) to a business.

We are more interested in raising awareness, and raising awareness is where we need to start.

As a CEO, manager, owner or board member you already have a handle on risk management. You live and breath cashflow, revenue streams, management teams and HR, it is all part of the process of being in charge. All this is taught in managers school or more importantly the school of hard knocks.

If you don’t learn these basics then you are going out of business. Slow or fast you will eventually go out of business.

There is a saying that “you don’t know what you don’t know”, in todays business world that is a specific reference to the digital realm.

We are all focussed on new and shiny, even I get caught up in the hype of new “whatever”. Most of them have a digital component incorporated into that new shiny thing.

We seldon look at the complex systems that make that part of the digital world work for you. It is complex!

As a CEO you need to understand the risks that cyber delivers to your organisation. Where do you get that understanding?

In most organisations business security lands smack bang on the desk of the IT section, the person who knows computers or the risk compliance officer.

They do not know what to do, they need guidance, direction and most importantly they need the AUTHORITY to enact change.

Business security is a very specialised area of expertise. You need to enact a framework.

You need to spend money wisely.

You need to continiously work on making the organisation more secure. Today we are more secure than yesterday!

Without understanding the risks, implementing change and giving a responsible person the authority to make change you are ignoring the Cyber Realm.

Without enacting a framework, you are at the mercy of the next cyber event.

Without a framework for business security you are not a very good CEO. That would really hurt.

Roger Smith is a highly respected expert in the fields of cyber crime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cyber security) on Cyber crime, Cyber security and the hacking techniques used by the digital criminal.   

He is an Amazon #1 selling author on Cyber crime with his best selling book, Cyber crime a clear and present danger, going to number one in 3 sections of Amazon.   

He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cyber crime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.

The importance of a NIST rating

10 very good reasons you should know your NIST score!

NIST is not new.
In fact it has been around since its first iteration in 2014.
The National Institute for Science and Technology (NIST) developed a cybersecurity rating system to make it easy for any organisation to show where they are in protecting their digital information, systems and organisation.
Like other frameworks, and there are a few, it has its good points and bad.  One of its better points is that it is easy to implement although it can be a little labour intensive to start off.
The most important part is that it is a standard.  A standard figure that any business can compare with any other business, no matter the size, who they are or where they are located.
NIST is not a competition.   It is just a rating system, but it does become competative, both internally and external.
It is a way for any organisation to compare its cybersecurity capability internally as well as a standard for anyone else who may ask for it in the process of doing business.
It allows management to make decisions on who and how they want to do business with other organisations.
This framework is based on 5 areas of expertice: identify, detect, protect, respond and recover.
Each area of expertice has a number of questions and each question has a range of predetermined responses.   The answers are scored ranging from 0 (nothing is in place) to 4 (a process is inplace, used at all times and supported and signed off by management).   Once all the questions have been answered the score is talied up and devided by the number of questions (98).
This gives everyone a score beteen 0 and 4.
Most organisations when first questioned come in under 1.   Still it is not a competition, so this is your start point.

1 – NIST is easy to understand

Every organisation can have a NIST score, it takes a couple of hours to sit down and honestly answer the 98 questions.   This gives everyone the ability to have a starting point in protecting their organisation from a cyber event.

2 – NIST can be used to compare with others in your industry and across all industries

When it comes to camparing one NIST rating to another it is easy.   If your score is 2.8 and you want to do business or a joint venture with another organisation who has a NIST score of under 1 then you need to be able to manage the risk associated with that score.

3 – You can use your score to track your progress

If your original NIST score is 1.2 and you have upgraded your technology, implemented policies and added proceedures then your NIST score will start to increase.   For every change for the better that you put in place it increases your score.   Small infremental changes that have a big impact on your protection in the digital world.

4 – NIST is Objective

We all have an opinion and we all look at life differently.   NIST takes this into account and delivers an objective view of your business.   The 98 questions are designed to apply objectivity to a sometimes subjective decision.

5 – A NIST Score is credible

Giving every organisation the ability to compare their cyber event capability on a level playing field means that you are comparing apples with other apples.   You get a true rating of your cyber risk visibility.   It also weeds out the unscruptious who think that can bluff their way through the world.

6 – NIST shows your cyber event risk

The difference between a rating of 1 and a rating of 3 is very different.   A rating of 3 means that the risk of a cyber event is greatly reduced.   Greatly reduced, faster recovered from and easier managed.

7 – Your NIST score is easy to understand

If the policy within your organisation is to only do business with organisations that have a NiST rating above 2 you have an understanding that the information that is going to go between the organisations is correctly managed.

8 – NIST is community based

There is a huge community that is starting to use the NIST rating as a measure for their cyber event resilience.   They are there to help and best of all they have been there and done that.

9 – NIST adapts to the future

One of the best things about NIST is that in will handle the changes that are on the horizon.   they will handle those changes not because the changes are known, no one knows them, but because it is a framework designed to protect your organisation.   That framework allows an organisation to adapt its protection no matter what the changes are.
Not many people predicted the impact of social, mobile and IOT but it didn’t matter with a NIST environment because all you had to do was ADAPT to the changes.

10 – NIST gives your business a competitive advantage.

Any advantage in business is better than no advantage but the advantage that NIST gives to an organisation can be significant.   NIST allows an organisation to develop policies and procedure that can be deployed within the organisation that predicts how other organisations will interact with it.   In addition it allows an organisation to make management decisions based on fact.   Nist can also be used in the marketing of the security around your organisation.
Management has now got a scientific way of managing the internal and external risk to the organisation in the digital and cyber arenas.  This allows them to make objective based decisions, create systematic policies and invest in the right technologies to protect the organisation.
NIST is also great at weeding out those people that you are going to do business and organisation that are looking to do business with you.   A NIST rating allows you to manage who you are going to do business with.
If management has a policy of only doing business with organisations that have a NIST rating above 2.5 it means that information passed to that organisation is going to be secured in the same way and with similar protective practices that you have in place.
So what is your NIST rating?
Contact me: to discuss your cyber risk and business security
If you want to know more then come to one of the Business Security Intensive Workshops in a city near you.   https://www.business-security.com.au/intensive
Roger Smith is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.   
He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one in 3 sections of Amazon.   
He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intelectual propert from the digital world.
What is the difference between a Penetration Test and a vulnerability scan?

Duty of Care in a cybercrime world!

We are all connected in today’s world through the invisible and mostly unknown world of the internet.
We practically do everything in “cyber” space.   From ordering food, organizing a date to storing our whole lives in bits and bytes.
Email, social media, web and mobility are all driving our world.
Everything is connected to the internet!
So who is responsible for making sure all that information, all of those little bits of information is safe.
Is it the person who supplies that information?
Is the organisation collecting it and storing it?
Is it the Governments responsibility?
We all know that it can’t be the people who are are collecting and storing the information.   The giants of the internet tell us they are just a platform!
We click through all of these legal documents, acceptable use policies, that have been designed to protect them from practically every eventuality.
SME’s don’t have that luxury.   Our reputation is our only constant and we need to keep it safe.   When it comes to SME’s, ask these questions.
What is the difference between a Penetration Test and a vulnerability scan?

What is the difference between a Penetration Test and a vulnerability scan?

If you are collecting that information – What’s your duty of care?   

Have you done everything in your power to protect that information?
Have you done everything to comply with all of those regulatory requirements that make doing business difficult?
To support your clients, customers and staff are you protecting their information?
If you are supplying the information – what is your duty of care?
Have you asked the simple question, how much information am I putting out there.   When I take a photo and upload it to social media have I removed the geo tags.
When I get into a conversation with someone on social media am I checking their “humanness”, are they really that person?
Am I mistrusting everyone, am I paranoid about everything, am I aware of some of the things that can significantly impact my life, both in the real world or in the digital.
These are the questions that we need to ask and here is some advice.
In today’s world have you done this?
  • “TRUST NO ONE”
  • Be aware
  • Get paranoid and
  • Use some common sense.

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, Presenter for the Business Security Intensive, author of the Digital Security Toolbox and Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

6 cybersecurity countermeasures your organisation needs right now

Modern organisations use and need access to today’s technology but understand little of the actual underlying systems.

This creates a huge problem for the cybersecurity of the organisation.

With due diligence to the fore you would think that implementing a cloud solution would be relatively easy, everyone is doing it and of course it will make the organisation more competitive.

But will it?

Today’s organisational technical environment are a hash of unrelated systems needed to fit a niche requirement, combined with the least available spend and with the best return available.

It is no wonder that inter operability becomes a huge problem when combined with the cybersecurity aspects of protecting the organisation.

Now tie that in with the business compliance requirement and you can see how big a problem business security becomes.

There are a number of strategic requirements that can be used to make the organisation more secure.

They are:

Education

Teach your children well, never mind the children, teach your staff an understanding of cybersecurity and securing your business. Your staff are usually the first line of defence and the last line of resistance.

They will see something happen, open an attachment, follow a malicious link and they need to be able to recognise what they have done and then do something about it.

Realise that they have gone to a malicious website and unplug the network card.

Technology

Invest in the best.

The newest operating systems and applications, the best firewall you can afford to buy, the most secure wireless and VPN system.

They are all important in protecting your organisation.

But, they all need to be updated and patched as required.

Data management

Who has access to what and what can they do with it. Where is it stored and have you got a backup of all critical data.

Those questions are all part of the risk management component of an organisation.

When it comes to risk and data always err on the best protection that you can afford.

User access

Restrict access to system.

Need to know, yes its an old saying but it still has currency in today’s world.

Make it a rule that no administration account has access to the internet or has an email account. These are the primary attack vectors for a cyber criminal.

Policies, procedures and processes

Build them and they will protect your organisation. There is a fine line between over restrictive and non existent.

All of the three P’s should be designed to support business functionality.

Back it up

No matter the expense, an investment in a backup strategy, a disaster recovery plan and a business continuity plan can mean the business will survive a silly mistake.

No matter the situation a decent strategy around recovery will save you every time.

Your organisation can come to a complete stop with one interaction with a dedicated bad guy. Make sure that you are not exposing your organisation to that problem

Everyone within the organisation has a requirement to look for the signs that depict a cyber attack.

Use them, educate them and make sure that everyone knows that the requirements are within their job purview.

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, Presenter for the Business Security Intensive, author of the Digital Security Toolbox and Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Stopping Cyber Events, It’s all about focus

Until the people in charge, managers, board members realize that

  • cyber crime is not going away,
  • no one is immune and
  • protection is everyone’s problem but needs to be addressed from the management down

We will continue to have spectacular cyber events.

Spectacular cyber events that cross over from the internet into the real world.

Stop the blame game and focus on the solutions.

The solutions need not be expensive, but they have to be implemented.

They are your first line of defence.

In today’s social media driven world any mistakes will be highlighted, in some cases spectacularly.

People no longer keep they mouths shut.

They open their mouths for political gain, to score points, to settle old scores, for just plain vindictiveness or they are just being idiots.

The information will come out.

The information will come out whether you want it to or not.

I was told something a long time ago.

It was called the today tonight test.

and i think that it still applies today.   If i had made a mistake and someone put a TV camera and microphone in my face would I still be able to say that i acted in the best interests of what ever i am talking about.

If i could then OK, if not why not?

Armed with this piece of advice I have kept it in mind with everything that I have done since.

I think it is about time that government officials, politicians, board members and C level executives went back to applying the same principle.

If you stuffed up, admit it, take the bumps and bruises and get on with fixing the problem.

The Japanese attitude of fixing the problem not assign the blame is really important in today’s world.

The rain of cyber events

We are all still looking to assign the blame

In the last cyber attack (wannacry) the blame game has once again come to the fore.

  • Stop thinking that the cyber event will not happen – it will
  • Stop thinking that the cyber problem is going to go away – it will not
  • Stop thinking that investing in cyber event prevention is too expensive – it is not
  • For F!?k sake, Just stop

Today’s cyber criminal needs you to think that the operating system is fine even though it hasn’t been updated or patched in years.

Needs you to think that easy to remember passwords are not a problem.

Needs you to think that your staff are informed or trained enough to prevent a cyber event – they are not

Needs you to not invest in better security around everything digital.

Needs you to think that the whole cyber problem is an IT problem.

The cyber criminal is happy that you think that, because that is how they get in.   Once in, well we saw the repercussions on the weekend of the 12 May 2017.

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, Presenter for the Business Security Intensive, author of the Digital Security Toolbox and Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Why Business Security is a specialised field

I am sorry, but if I hear another IT person or manager express that they do not know how they were target by malware when they have Anti Virus I am going to scream.

The issues and problems associated with Business Security needs to have a different and more refined and robust focus than normal IT.

They need to focus on what the bad guys are actually capable of.

Normal IT, in most organisations, have a primary focus of keeping the lights on, making things work and keeping it functional.

We have to stop thinking that Business Security is the realm of IT, because it is not.

Business Security is a whole of business process and HAS to be treated that way.

This is why you need a professional who is focused on the security component of an organisation.

Someone who can cross all of the areas of the business and get all levels involved in the process.   For small and medium business, this is an expense that few can afford.

The ways that a system and organisation can be compromised are numerous, and in most ways are practically invisible to small and medium sized organisations.

There are also numerous reasons that they are targeted, but automated systems are the primary contender.

The only reason they are targeted is that they are connected to the internet.

The bad guys need no other excuse than you have a digital device and it is connected to the internet.

In addition small and medium organisations do not have the three things that are vital to protecting the organisation:

  • Skills
  • Time
  • Money

Investing in these things are normally outside the purview of ordinary business.

Its not from want or trying.

Most want to be secure.

They just do not know how to get to that next level, and if they knew would not have the above resources to make it happen.

Cybersecurity / Business Security is a typical catch 22 situation.

Professional Business Security Support

You need to invest in the skills, time and money but do not have the skills, time and money within the organistion to be able to apply what you need.

This is why you need a framework.

A framework that is going to apply a progressive protection strategy around the business.

That framework can be any of the available frameworks but for small and medium business i think that mine would be a great place to start.

My framework puts technology, management, adaptability and compliance into a system where each additional components makes the organisation just that little bit more secure.

Try it here

In addition a managed Security Service Package is a great way to make your money, expertise and time go a lot further.

Most MSSP’s will look after all of those critical components of an organisation.

They have the skills to do it, they have the expertise to make it more secure than an untrained person and will definitely make your money go a lot further.

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, Presenter for the Business Security Intensive, author of the Digital Security Toolbox and Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

What are the riskiest network TCP / UDP ports and how do you secure them?

Vulnerabilities do not rest on TCP ports, they rest on services.

Any TCP port can be open but if there is no corresponding service using that port an attack on the port will most probably fail.

There are exceptions to this – TCP Port knocking and encryption allow a port to be open but will register as closed.

All hacking / malware attacks are targeted at those services and each of those services can have different applications behind them.

A little background – A Quick introduction to hacking.

Vulnerabilities are discovered and used in attacks based on a number of things:

  • application, – what is the application that is using the TCP port, Apache and IIS have different vulnerabilities and they both can be as unsafe or as safe as each other.   It depends on the attacker, defender, version and the installation process
  • version, – one version will be more secure that the previous one – In the labs we demonstrate a problem with VS-FTP version 2.3.4 it has a back door hard coded into the software.   Anyone who knows that can use it to compromise the server it is installed on.   By upgrading to 2.3.5. you remove the vulnerability and the back door.   With the introduction of IOT the main vector of attack are port 80 attacks and hard coded default usernames and passwords
  • installation process – the installation process for a number of applications have a default username and password.   If these are not changed then the system is vulnerable.   Tomcat and vnc are examples of known default usernames and passwords.
  • interaction within the application and the operating system. – there are a number of applications that are vulnerable when installed on a specific type of operating system.  Code red – targeted port 80 (HTTP) to attack the SQL components of a web server on port 1433 (MSSQL)

Fingerprinting and scanning

This is the process of finding out what application and services are behind the port.

It also tells us what version is running.

A simple NMap scan will deliver this information to anyone who knows how to use it.

A simple Nessus scan will reveal even more!

User rights and shell

A hacker needs 2 things to be dangerous.

He needs to have the authority – administrator (god) access and he needs to create a shell, something to run commands, scripts or applications in.

You can still do damage to a system if you have less than admin access but it is only to the application that is running – compromising tomcat will give me access to the web server component of a system.  There are ways to escalate the user from a service to the administrator.

If you do not have the ability to gain a shell then most attacks will not work.

In the world of penetration testing we can discover hundreds of vulnerabilities but only one or two or ten will enable me to compromise the system with both administrator access and a shell.

They are the only ones we report, resolve and remediation.

Hackers use Google and YouTube

Most hackers will find information on what they are targeting, how to do it and what they need to do through a basic search.

So with that all being said – here are the top 20 ports with their corresponding application. Insecure network services

TCP PortsPort numbers

  • 21. TCP – Ftp – file transfer protocol – one of the oldest ports on the internet and is used to transfer information from one system to another over a TCP connection.   Can be used in Command and Control of malware.
  • 23 – TCP – telnet – the most basic of shells, can be used to transfer commands and scripts from computer to computer.   Unencrypted and easily captured.
  • 25  TCP – SMTP – email servers – exchange, sendmail, and any system that has been designed to send email as part of its system requirement.
  • 69 – UDP – TFTP trivial file transfer protocol – used to update and transfer information from computers to routers.   Information can be intercepted because it is a UDP connection.
  • 80. TCP – HTTP – hyper text transfer protocol – Apache, iis
  • 143 – TCP – imap – mail protocol
  • 110 – TCP – pop3 – mail protocol
  • 443 – TCP – HTTPS secure hypertext transfer protocol
  • 53 – TCP/UDP -DNS domain name service – bind, windows
  • 8080 – TCP – tomcat  management –
  • 161 – TCP – SNMP –
  • 3389 – TCP – RDP – remote desktop protocol
  • 4444 – TCP/UDP – metasploit
  • 1433 – TCP – SQL
  • 137,138,139 – UDP – netbios
  • 1723 – TCP – VPN PPTP
  • 9100 – TCP Internet Printing
  • Gaming ports – inbound and outbound – some games install and connect to a web based server on a specific port based on the game.   The game allows an attacker to use the game as a platform to store and activate malware.

There is no way to secure individual ports and their applications except to make sure the application and operating system are up to date.

There are a number of ways to protect an organisation:

a second generation firewall / next generation firewall will inspect packets at the network, data and physical level as they enter and leave and compare that information to its database.

If an attack is indicated it will either stop it or move it to a sandbox.

The other ways are through logging, auditing and reporting.

Depending on the size of the organisation a SIEM maybe necessary, but a process of alerts is vital to catching the initial components of a breach.

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, Presenter for the Business Security Intensive, author of the Digital Security Toolbox and Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Why do i need a Managed Security provider?

Why are we the weakest link in cybersecurity – we just don’t care!

The threats are NOT imaginary.

The threats are real!

The visibility of the wannacry attack actually highlights how vulnerable the world is with its reliance on all things digital

Zero day exploits and known vulnerabilities are available for every operating system, including IOT devices.

 Anything with a digital signature can be hacked.

Where it all breaks down is that in most cases there is a human who is attached to the device.

A human who has the ability to veto all security measures in their hurry to do something, anything with the device.

How often have we seen the “updates available” on our server, laptop, smart device or application and have been in too much of a hurry to apply them.

In most cases it would take 10 minutes out of our busy daily schedule, 10 minutes where we have to find something else to do – not screen related.

cybersecurity We are so busy that we cannot find that 10 minutes?

Most systems are now being designed to make it obvious, and will persistently tell us that we need to update.

What do we do?

We complain that we do not have enough time.   We are too busy.   We cannot stop for that brief space of time to increase our security.

The SMB patch for wannacry has been available since march, that is almost 8 weeks before the cryptovirus attack, but the impact was significant because we were too busy.

I thought that we had learned from the “code red” attack in the early 2000’s, that patching is a very important part of digital security, obviously not!

“Code Red” crippled the internet because of un patched SQL servers, the patch had been available for 3 months prior to the release of the virus.

Most of the problems with security in the digital world is US.

We are too focused on our tools to see the underlying features that have actually been put in place to protect us.

There is a quote I often use in my training “THERE IS NO PATCH FOR HUMAN STUPIDITY”

 We are the weakest link in cybersecurity, in the digital chain where we should be the strongest.

In most cases we are very stupid!

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, Presenter for the Business Security Intensive, author of the Digital Security Toolbox and Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Ransomware – So you think you have nothing worth stealing?

Lets just look at that for a moment

In today’s world we all use the internet to do business, to communicate, to have fun.

What we forget is this!

  • You have a Mobile phone or tablet = target
  • You have email = target
  • You have a web site = target
  • You own a Smart TV = target
  • You live in a Smart home = target
  • Have anything that is part of the Internet of things = target

There is no getting away from it.

If you are connected to the internet, the digital world, the cyber world, in any shape or form – you are a target.

Do you now agree that you are a target!

By being a target, what are they after?

Most people think that they have nothing worth stealing?

In today’s digital world, that is bull.

If I was a hacker – What could I steal from you?

Lets just start with just the basics –

  • money or access to money
  • Intellectual property, trade secrets or restrict access to information
  • PI information about you

Additionally, Technology – your computers, phones, tablets, your smart devices.

Things you may not even consider your phone systems and your gaming console.

So you are also saying that you have nothing worth stealing!

So lets look at the phenomena that is the fastest growing digital crime ever seen – ransomware.

Ransomware Why is ransomware so effective?

To anyone who has been a target of ransomware, you realise very very fast that not having access to things that you considered not inportant, suddenly become very important.

With a ransomware attack you have three actions –

  1. its not important so I won’t worry about it,
  2. I will pay the ransom or
  3. I will restore from backup

Your choice, but i can guarantee that not having a tested and secure backup will haunt you.

The problem with the digital world is we are all exposed.

We are all targets.

More importantly, if you don’t do something about it who will?

Want to know more about business security?

Join us for the business security intensive

http://www.business-security.com.au/intensive

Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

What is the difference between a Penetration Test and a vulnerability scan?

Google Alerts – The week I died 7 times, and how I knew about it!

What a weird thing!

 I have a Google alert for my name, just to check that people are not talking about me.
Recently, over the space of about 10 days i died and was buried 7 times.
A disconcerting occurrence.   I was happy to see that none of them were me.
It has bought to my notice the importance of google alerts.
For those people not using google alerts i would suggest that you do.
Google alerts scans the internet for any reference of the criteria you have configured for your alert within a set period of time – mine are last 24 hours.

I have a number of alerts configured.

I have an alert that triggers on “cyber, cybercrime, cybersecurity, digital security, MSP, managed services and business security”.  This is to keep me up to date in industry newsWhat is the difference between a Penetration Test and a vulnerability scan?
I have an alert that triggers on our clients names, products and services. This keeps me up to date with what our clients are doing and if there is any chatter that could potentially turn into a problem.
I have an alert that triggers on any of our business names, products and services.  This tells me of there is any chatter about our organisation and so that we are aware of problems before they become issues.
Google alerts are a cheap and inexpensive way (free) of keeping track of what is happening on the internet around you and your niche.   I would suggest that you utalise it.
Roger Smith is the CEO of R & I ICT Consulting Services, Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity), Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world.