[From the desk of Paul Davis – his opinions and no-one else’s, apart from the reporter’s opinions ]
* Mapped: Terror threat around the world
* Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware
* Ninety-seven per cent of IT professionals think standard antivirus software will stop zero-day attacks
* Cybercrime: Banks ‘Rewarding’ Bad Behaviour
* Banking malware slowed in 2015 – but don’t get too comfortable, Symantec warns
* Over 90 percent of CISOs expect to be hit by cyber attack in 2016
* INSIGHT: Are you liable for a cybersecurity attack?
* Global security threat told
* Emergency Java update fixes two-year-old flaw after researchers bypass old patch
* Australian industry lashes out at data breach notification scheme
* 5 key questions to determine your security posture
* Only 42% of cybersecurity professionals use shared threat intelligence
* Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks
Mapped: Terror threat around the world
The map explained: Those countries in dark red have a “high” threat from terror, those in red a “general” threat, those in orange an “underlying” threat and those in yellow a “low” threat.
The country had the highest terror threat level long before the deadly bomb attacks on a metro station and airport in Brussels, its capital.
The Foreign Office website states: “There is a high threat from terrorism.
Attacks could be indiscriminate, including on public transport and transport hubs and in other places visited by foreigners.
Brussels hosts a number of international institutions (EU and NATO) and government and foreign embassy buildings which are sensitive locations.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5a0ccbc4b9&e=20056c7556
Microsoft Adds New Feature in Office 2016 That Can Block Macro Malware
Microsoft is finally addressing the elephant in the room in terms of security for Office users and has announced a new feature in the Office 2016 suite that will make it harder for attackers to exploit macro malware.
Now, Microsoft is announcing a new feature in its Office 2016 suite that will allow corporate network administrators to block the execution of macros that retrieve content from untrusted sources, which in most network configurations is “the Internet.”
“This feature can be controlled via Group Policy and configured per application,” Microsoft explains. “It enables enterprise administrators to block macros from running in Word, Excel and PowerPoint documents that come from the Internet.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=49fa2fae6c&e=20056c7556
Ninety-seven per cent of IT professionals think standard antivirus software will stop zero-day attacks
The research was presented during today’s web seminar, entitled “Anti-virus software has had its day – how can you protect against advanced threats?”
It was also revealed that while 57 per cent have rolled out additional advanced threat detection and sandboxing solutions, as well as 32 per cent using application whitelisting techniques, only 15 per cent of respondents use truly advanced tactics, such as email filtering, network heuristics or read-only virtualisation.
Pannelist Bridget Kenyon (pictured), head of information security at University College London, expressed dismay at the results, stating:
While Kenyon acknowledged that “within a few hours the signature is in [antivirus] systems,” the fact that updating databases relies on systems being compromised in order to collect data makes standard antivirus software, in her mind, not fit for task.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=2df96de78a&e=20056c7556
Cybercrime: Banks ‘Rewarding’ Bad Behaviour
The Metropolitan Police commissioner says customers should be given incentives to tighten their passwords and update anti-virus software instead.
He said banks could make people more security conscious by refusing to reimburse people who had failed to protect themselves.
GCHQ says that 80% of cybercrime – which costs £1bn a year – could be prevented by more complex passwords and updated security software.
Police are set to include cybercrime estimates in their official crime statistics for the first time in July and Sir Bernard said this change could see crime figures double.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=4967553c2f&e=20056c7556
Banking malware slowed in 2015 – but don’t get too comfortable, Symantec warns
Australia is amongst the world’s top ten countries affected by banking malware, according to a Symantec analysis that found that one Australian bank was targeted by nearly 55 percent of all banking trojans analysed during 2015.
The company’s Financial Threats 2015 report analysed some 656 financially-targeted Trojans, which collectively sought to harvest access codes and other details from 547 banking institutions in 49 countries.
Malware authors’ increasing interest in Australian banks was correlated with a strong showing in the leaderboard for the countries with the most computers compromised by banking Trojans last year.
More than 20,000 Australian systems suffered attacks from such malware, ranking slightly behind France and just ahead of Russia in terms of absolute numbers of banking-related compromises.
Mobile attacks, in particular, had emerged as a favoured new attack vector by cybercriminals, with Kaspersky Labs recently noting that two mobile banking Trojans – Faketoken and Marcher – cracked the top-10 banking Trojans list.
In 2015, Kaspersky Labs noted, its tools blocked more than 1.9m attempts to launch malware capable of stealing money via online banking – up 2.8 percent on the previous year.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b3c5b68f2b&e=20056c7556
Over 90 percent of CISOs expect to be hit by cyber attack in 2016
This was a key, and rather worrying, finding from a survey by consultancy firm CEB of 160 FTSE-level organisations entitled IT Budget Benchmark 2016.
Furthermore, despite so many CISOs being aware of this threat almost three-quarters said they didn’t think they had adequate security in place to deal with the threat.
And many are throwing money at the problem in response, with CEB finding that security spend will account for 6.2 per cent of all IT budget spend this year.
Additionally many firms are looking to big data to help by being better able to spot threats before it’s too late.
However, CEB advised that ‘cyber hygiene’ is a better approach to tackling this threat, by educating staff to the types of cyber risks the organisation faces and making it clear good security is everyone’s responsibility.
Another area of increased spending is the cloud, where 92 per cent of firms expect to spend over five per cent of their IT budget on cloud services.
This is a notable increase on the 62 per cent that spent over five percent of their budget on cloud in 2011.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=edeaf2d032&e=20056c7556
INSIGHT: Are you liable for a cybersecurity attack?
By far the most misunderstood insurance coverage is cyberliability.
Just the name alone sounds futuristic and “techie.” Within the industry it’s also referred to as cybertheft, data security and data breach coverage.
In this article, I will give you a simple explanation of what it is, why your business might need it and how to start assessing your exposure.
What is it.
As a business you have a duty of care for how you use and store personally identifiable information and personal health information.
If this information is compromised in any way – whether accidentally released by your company or stolen from your computer, your business is responsible for the outcome to the information owners: your employees, customers, vendors, et cetera.
Some examples of this information would include name, Social Security number, date of birth, place of birth and maiden name.
Obviously, credit card numbers and financial data also are critical information.
Why is it important.
You use the information to conduct business and, as a result, misuse is legally your responsibility.
Think of its treatment as you would a physical piece of property.
If you take your car to get an oil change and it’s damaged in the process, the duty to correct the damage is on the business that allowed the damage to happen.
The same concept applies to an employee, customer or vendor’s information.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=dc2e3ed678&e=20056c7556
Global security threat told
Welcome to the White House.
Now read our take on global political landscape and trends for the next five years and beyond.
Bottom line: Get ready for a rocky road.
Their forecast calls for a slowing global economy dragged down by sluggish growth in China, and political volatility across the world, spurred by disillusionment with the status quo.
Insecurity will deepen rifts among social classes and religious groups.
Extremists will consolidate into large-scale networks across Africa, the Arab world and parts of Asia.
Competition among the U.S, China and Russia will heat up, raising the risk of confrontations.
Climate change is a problem now.
And technological advances will force governments and their citizens to wrestle with securing data, privacy, intellectual property and jobs lost to high-tech innovations.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ad44479f57&e=20056c7556
Emergency Java update fixes two-year-old flaw after researchers bypass old patch
Oracle has released an emergency Java security update to fix a critical vulnerability that could allow attackers to compromise computers when they visit specially crafted websites.
The company has assigned CVE-2016-0636 as the identifier for the vulnerability, which suggests that it is a new flaw discovered this year, but that’s not really the case.
Polish security firm Security Explorations confirmed via email that the new Java update actually fixes a broken patch for a vulnerability that the company originally reported to Oracle in 2013.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=df64ddfaf1&e=20056c7556
Australian industry lashes out at data breach notification scheme
Australian businesses say they are not sold on the government’s proposed mandatory data breach notification scheme, with some even going so far as to call for it to be abandoned.
However, Australia’s biggest industry groups are calling for changes to be made to avoid “notification fatigue” and to make their obligations clearer.
The Australian Industry Group – which represents 60,000 business across a range of sectors – said it couldn’t understand why such a scheme was required at all.
The Australian Retail Credit Association (ARCA) similarly argued the bill needed to be heavily edited if it was to progress any further.
According to PayPal, the legislation’s current scope of “harm” – which includes physical, psychological, economic and reputational – is “overly broad” and requires entities to assess characteristics of individuals without the requisite expertise to do so.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=f1cb6c3e15&e=20056c7556
5 key questions to determine your security posture
These topics serve as a great starting point for important discussions surrounding an organization’s security practice, with common security questions including:
1. What is your biggest security concern and is your security spend and expertise properly allocated to address that risk?
2. Do you have a clear picture of your overall security posture and of how it relates to industry best practices?
3. Do you currently conduct security assessments, such as penetration tests on a bi-annual basis?
4. How realistic is your plan to address the security gaps that you might have today?
5. Do you have an established process to address computer security breaches?
6. How confident are you of your ability to demonstrate compliance?
7. Given the skills gap that exists in security, do you view the ability to recruit and retain talent and expertise as a top priority?
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=668adc0720&e=20056c7556
Only 42% of cybersecurity professionals use shared threat intelligence
Intel Security released McAfee Labs Threats Report on cyber threat intelligence.
More than half, 59 percent, of survey respondents find such sharing to be “very valuable” to their organizations, while 38 percent find sharing to be “somewhat valuable.”
A near unanimous 91 percent of respondents voice interest in industry-specific cyber threat intelligence, with 54 percent responding “very interested” and 37 percent responding “somewhat interested.”
When asked why they have not implemented shared CTI in their enterprises, 54 percent of respondentssaid corporate policy as the reason.
It was followed by industry regulations with the percentage of respondents at 24.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d6333b65ff&e=20056c7556
Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks
The vulnerability was discovered by Stefan Metzmacher, a core developer of the Samba software, which is a popular open-source implementation of the SMB/CIFS (Server Message Block/Common Internet File System) networking protocol.
The company, which offers Samba consulting, support and development services, has even set up an website at badlock.org where more details will be released about the flaw on the disclosure date, which coincides with Microsoft’s Patch Tuesday — the day when Microsoft releases its monthly security updates.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=41cbf2f70a&e=20056c7556
============================================================
Feedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)
If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)
Unsubscribe from this list (http://paulgdavis.us3.list-manage1.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=ebfc90070e)
Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)