What Happens When The Cyber Alarms Don’t Work?

What Happens When The Cyber Alarms Don’t Work?

Over half of all organizations assume that their IT networks have been penetrated, or will be in the future. The number of IT professionals admitting that they really don’t have complete control over sensitive systems and data is increasing each year.

The First Line of Defense Has Already Fallen

Perimeter detection is the first line of defense against any attack, whether it be physical, think an alarm going off when security in your home is breached, or an ATM blocking your back card if there have been too many incorrect PIN entries. The issue currently facing many IT experts, security analysts and information security professionals is that there has previously been an over reliance on perimeter detection as the ONLY line of defense. Not only are cyber-attacks completely bypassing perimeter detection, a recent survey reported that up to 30% of all security breaches never triggered the virtual alarms, but that preventative discovery is close to non-existent in many organizations.

What is even more alarming is what happens after a security breach.cyber bypass detection

The speed with which an organization reacts after a breach is vital in not only securing sensitive information but in examining and investigating exactly what happened, finding the compromised end-points and determining the full data risk impact as fast as possible. The problem is that most organizations are reactive instead of proactively aggressive in their search for potential threats at all times. In the same survey, it was noted that up to 25% of IT security professionals were notified of data breaches and cyber-attacks by a 3rd party. By then it could be too late.
Figuring out what happened after the fact is essential. Yes. Creating a secure environment that STOPS attacks is even more vital. To do that security professionals need to be vigilant, proactive and relentless in their hunt for cyber threats before they become cyber casualties of war.

Security Gap Allegedly Causes Medical Mishaps

Security Gap Allegedly Causes Medical Mishaps

St Jude Sues MedSec

A lawsuit was recently filed in which allegations of conspiracy, market manipulation, and false statements were made against MedSec and other companies and individuals.

Alleged Security Flaws Making Headlines

In August 2016, MedSec released shocking information to the media about the medical device making company, St. Jude. According to MedSec, a company that provides vulnerability research solutions, major security vulnerabilities were discovered in St Jude’s defibrillators and pacemaker. MedSec also claimed that these vulnerabilities could put patients’ lives in danger if exploited by hackers.

(more…)

Cyber attack on hotel’s computers left guest locked out

Cyber attack on hotel’s computers left guest locked out

After having its systems frozen by hackers an Austrian high-end resort is dumping electronic room cards for old fashioned locks and keys. The management in the Austrian Alps, of Romantik Seehotel Jaegerwirt, said that they have been repeatedly targeted by cybercriminals. One latest infection with ransom applications, on Dec. 6, led to an entire shutdown of resort computers. The couple needed to pay 1,500 euros worth of the electronic currency bitcoin to restore their network.hotel room card key

The story of the hack of the resort was broadly shared after several publications erroneously reported that the ransomware led to guests being locked in or from their rooms. But Brandstaetter stated that the attack only led to new guests being not able to get the keys to their rooms for a couple hours. New arrivals were treated to champagne and went trekking or skiing in the interim, she said. The spate of electronic intrusions has prompted the resort to update its network. Most radically, she said the resort would eventually go back to the lock and key system as in times of our grandpas.”