{"id":1241,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail213-suw14-mcdlv-net\/"},"modified":"2021-12-30T11:39:01","modified_gmt":"2021-12-30T11:39:01","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail213-suw14-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail213-suw14-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail213.suw14.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* How Your Voice Is Preventing Hackers From Accessing Financial Information<br \/>\n* Infamous Hacking Groups: 5 Things They Hope to Accomplish<br \/>\n* 6 cybersecurity and emergency situations every IT department should train for<br \/>\n* The 5 most common reasons for corporate data loss<br \/>\n* Complex Bitcoin Phishing Scheme Revealed &#8211; Cisco&#8217;s OpenDNS Security Team<br \/>\n* Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods<br \/>\n* Overcoming the barriers to ISO 27001 adoption for success on G-Cloud<br \/>\n* The key tenets of a regional cyber security framework<br \/>\n* 5 questions the CISO should ask the Threat Analyst<br \/>\n* Taking cyber risk management to the next level<\/p>\n<p>How Your Voice Is Preventing Hackers From Accessing Financial Information<br \/>\nVoice biometrics is being implemented by many financial institutions such as banks and retirement providers, because it does not require consumers to be physically present or have the software capable of authenticating them through their fingerprint or an iris scan.<br \/>\nThe technology encompasses an individual&#8217;s voiceprint of over 100 vocal and personal characteristics with 50% consisting of their physical traits such as their vocal cords, sinuses and lung capacity and the remaining half comprising of their personal tone, pitch and pace when they speak, she said.<br \/>\nMany companies utilize the technology by acquiring a person&#8217;s voiceprint passively or simply capturing it as the individual inquires about a transaction and answers questions with a customer service representative.<br \/>\nThe next time they call to ask about a purchase or a deposit, the company can compare their current voice against the voiceprint, Thomson said.<br \/>\nWithin seconds, the employee at the bank can determine if the caller&#8217;s voice matches the voiceprint.<br \/>\nAfter a pilot program last year, Citigroup now authenticates a small fraction of its customers who have their branded credit cards by using NICE&#8217;s voice biometrics technology.<br \/>\nAs of June, 750,000 customers out of a total of 23.8 million active and inactive accounts can access their accounts by using their voiceprint.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=387a25a475&#038;e=20056c7556<\/p>\n<p>Infamous Hacking Groups: 5 Things They Hope to Accomplish<br \/>\nAs one might assume, not all hacking groups are bent on simply causing mass destruction of computer systems or stealing user information.<br \/>\nPossibly the most well-known hacking group, Anonymous, is infamous for their strong-armed methods to raise awareness of hacktivist related issues.<br \/>\nOn the flip side, some hacker collectives do not want to defend the interests of the greater good, but merely work to defend their opinions and attack those that oppose their views.<br \/>\nFor instance, the Syrian Electronic Army (SEA) is a group of hackers that strongly voices their support for the President of Syria, Bashar al-Assad.<br \/>\nAlthough the first two examples of hacking groups were more politically motivated, not all hacking initiatives are driven to fight for a specific cause or interest.<br \/>\nSome are simply created to arbitrarily wreak havoc on networks and computer systems.<br \/>\nFor example, one hacking group that focuses on hacking for sport is known as Lulz Security or LulzSec for short.<br \/>\nTheir group motto is aptly written as, \u201cLaughing at your security since 2011.\u201d<br \/>\nOther hacking groups are more insidious in the way they deal with hacking attempts and primarily want to strike fear in others.<br \/>\nIn 2014, a hacker collective called the Lizard Squad successfully shut down the online Xbox and Sony PlayStation gaming networks, which caused major outages during a peak holiday gaming season.<br \/>\nUnfortunately, this isn\u2019t where the issue ends.<br \/>\nLastly, some hacking groups form in order to educate the general public on the dangers of cyber security vulnerabilities.<br \/>\nOver thirty years ago, a hacking group called the Chaos Computer Club (CCC) was formed with the sole purpose of exploiting various security flaws that are present in today\u2019s cyber security standards.<br \/>\nCCC is regarded as one of Europe\u2019s largest and well-known hacking groups in existence.<br \/>\nIn the mid-1980s, the group once successfully stole 135,000 Deutsch Marks from an establish credit union in Germany to highlight the lack of proper security for their computer systems.<br \/>\nThe club then returned the money once they gained notoriety for their accomplishment.<br \/>\nThese days, CCC is working to shed some of the negative connotations associated with hackers and look to rebrand themselves as \u201ctechnology experts.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3223d2b388&#038;e=20056c7556<\/p>\n<p>6 cybersecurity and emergency situations every IT department should train for<br \/>\nSerious vendor vulnerability<br \/>\nMajor web site rollback<br \/>\nSocial engineering attack<br \/>\nInsider data theft<br \/>\nCritical change request<br \/>\nContinuity of IT leadership<br \/>\n[Paul would also add-in be prepared for the UnExpected, i.e. when there is a predefined playboook.]<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=767ed7ce83&#038;e=20056c7556<\/p>\n<p>The 5 most common reasons for corporate data loss<br \/>\nA recent study by Kroll Ontrack revealed very interesting data gathered using the company&#8217;s data recovery tool.<br \/>\nAccording to the study, the main problem, accounting for 25% of the total number of cases, is failure to detect the storage drive.<br \/>\nThat is logical, especially if we are talking about hard drives and flash drives, which are used in mass storage devices in all kinds of corporate environments despite being much more prone to failure than other more reliable types of devices, like magnetic tape.<br \/>\nAnother of the big problems behind data loss is the device not powering on, which can be caused by a failure in the power supply or in other components.<br \/>\nCuriously, in third place, we find one of the reasons that can cause hardware to fail, and that is the device being dropped on the floor from height.<br \/>\nFurthermore, the increased use of solid-state drives (SSD) with flash memory in recent years will undoubtedly have pushed this percentage up.<br \/>\nThese types of drive offer faster access to data than conventional mechanical hard drives, but also are more prone to failure if used to write data continually, which is why they are not recommended for use in servers or in computers where reliability is critical.<br \/>\nIn fourth and fifth place in the table, we can find two reasons that tend to be caused by software failures occurring at the same time as the data is being used, or malware that directly affects the stored data.<br \/>\nSo here we are talking about files being deleted (accidentally or deliberately) or becoming corrupted.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=606ce4bd2b&#038;e=20056c7556<\/p>\n<p>Complex Bitcoin Phishing Scheme Revealed &#8211; Cisco&#8217;s OpenDNS Security Team<br \/>\nCriminals have started staging phishing campaigns having discovered that Bitcoin can provide an easier way to steal, says Cisco\u2019s OpenDNS security team after they revealed a complex phishing scheme aimed at collecting user credentials from various Bitcoin-related services.<br \/>\nThe discovery was made after the price of the digital currency rose by over 58% to reach about $775 in the last month (though it has dropped in a week) based on several factors.<br \/>\nThe latter includes the finite and constrained supply of Bitcoin, its pending supply growth reduction next month, the anticipated supply drop which will drive demand and more people using and wanting Bitcoin.<br \/>\nCyren says it detected the investment pattern of a phishing campaign &#8211; rental of botnets, purchase of exploit kits, and the acquisition of compromised site lists &#8211; as its attack vector is pay-per-click advertising via Google AdWords.<br \/>\nThe OpenDNS Labs detected blolkchain[.]com which was another phish on the same IP 89.248.171.88 June 13 2016.<br \/>\nThey were able to uncover three anonymous offshore hosting companies using the identified websites\u2019 IP space.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=de9946c972&#038;e=20056c7556<\/p>\n<p>Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods<br \/>\nNearly every day there is a headline brandishing the news of yet another distributed denial of service (DDoS) attack on some major organization.<br \/>\nMany other organizations experience DDoS attacks on a daily basis, but those attacks don\u2019t make headline news.<br \/>\nIt\u2019s an alarming situation, globally.<br \/>\nIn a recent survey of IT security professionals and network operators at the RSA Conference 2016, 31% of respondents stated that their enterprise experiences DDoS attacks weekly or daily.<br \/>\nThis survey also asked participants about their current methods of handling the DDoS threat; nearly one third (30%) of respondents still rely on traditional security infrastructure products (firewall, IPS, load balancers) to protect their businesses from DDoS attacks.<br \/>\nAlthough hackers often launch DDoS attacks purely to create a nuisance by taking a website offline, it\u2019s becoming very common for hackers to launch \u201cDark DDoS\u201d attacks that distract IT security staff while the hackers launch malware or infiltrate sensitive databases.<br \/>\nIn all of these cases, the DDoS attacks are low-threshold, short-duration attacks that escape the attention of IT security staff; such attacks may not cripple a website but they can negatively affect network or application performance.<br \/>\nAn organization\u2019s security posture is only as good as their ability visualize the security events in the environment.<br \/>\nA robust modern DDoS solution will provide both instantaneous visibility into DDoS events as well as long-term trend analysis to identify adaptations in the DDoS landscape and deliver corresponding proactive detection and mitigation techniques.<br \/>\nAutomatic DDoS mitigation is available today to eradicate the threat to your business and eliminate both the service availability and security impact.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6ca0332140&#038;e=20056c7556<\/p>\n<p>Overcoming the barriers to ISO 27001 adoption for success on G-Cloud<br \/>\nbarriers ISO 27001 adoptionA recent attention grabbing headline that was just too controversial to ignore: \u201cSloppy SaaS firms lose out on G-Cloud deals, research suggests\u201d.<br \/>\nIn the article, former EuroCloud secretary general Lindsay Smith stated that the majority of SaaS providers on the UK G-Cloud were failing to win business there because their listings are not up to scratch.<br \/>\nHis research into Digital Marketplace buying trends suggests three-quarters (77%) of SaaS suppliers recorded zero sales during the 12 months to January 2016.<br \/>\nThe fact is that whilst ISO 27001 certification is not a prerequisite to working with the public sector, there is little doubt that a UKAS accredited ISMS is an important differentiator.<br \/>\nAn ISO 27001 implementation is no insignificant investment.<br \/>\nTaking into consideration the cost of gaining in-house expertise, or buying it in from external consultants, audit visits and certification, all on top of the anticipated management resource can result in a hefty budget being needed.<br \/>\nOf course, there are firms that will promise to \u2018deliver\u2019 an ISMS to minimise disruption to business and eliminate the need for in-house expertise.<br \/>\nSome will even guarantee UKAS certification.<br \/>\nHowever, the costs are high and without an organisation\u2019s active involvement, understanding and ownership, there is a danger this becomes a \u2018manual\u2019 to be dusted-off prior to each annual audit.<br \/>\nIf you are on G-Cloud presumably you want to do business with government.<br \/>\nMore and more firms are recognising they\u2019ll stand a far better chance with ISO 27001.<br \/>\nBut, keep in mind that a UKAS accredited ISO 27001:2013 certification is the only one they will recognise so, whilst arguably more rigorous and expensive, choosing a non-UKAS accredited certification could be a false economy.<br \/>\nBecause it is the only independently audited ISMS it demonstrates the competence, impartiality and performance capability of certification bodies.<br \/>\nThis reduces the need to be assessed by customers and supply chain partners and will differentiate you amongst knowledgeable buyers and procurement departments.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bd46eb7a94&#038;e=20056c7556<\/p>\n<p>The key tenets of a regional cyber security framework<br \/>\nAt the recent Fortinet Partner Conference 2016 in Chengdu, China, representatives from Cyber Security Malaysia (CSM), Korea Internet and Security Agency (KISA), Philippine National Police Anti-Cybercrime Group (PNP ACG), Frost &#038; Sullivan and the host vendor shared ideas and possibilities for an Asia Pacific Security Framework.<br \/>\nInspired by the tenets of the US National Institute of Standards and Technology cyber security framework, the panelists discussed incident response, culture and education, risk and resiliency, collaboration and enforcement.<br \/>\nKISA, for example, has established systems and policies for incident response to mitigate distributed denial of service (DDoS) and malware attacks; and a threat intelligence-sharing program in collaboration with industry players such as Fortinet.<br \/>\nIn the Philippines, the PNP ACG was established to implement and enforce laws on cybercrimes and pursue an effective anti-cybercrime campaign in line with the PNP Patrol Plan 2030.<br \/>\nBy 2025, the PNP ACG aims to be a highly responsive and dynamic unit in enforcing laws such as the Cybercrime Prevention Act 2012 and the Data Privacy Act of 2012.<br \/>\nMeanwhile, the Cyber Security Malaysia specialist agency provides technical assistance and training services in support of the country\u2019s cyber crisis management.<br \/>\nIts core services include: cyber security emergency services; security quality management services; info-security professional development and outreach; and cyber security strategic engagement and research.<br \/>\nFrost &#038; Sullivan recommends operationalizing cyber protection for defending against known threats; cyber intelligence for uncovering unknown threats; and cyber resilience for organizational readiness and responsiveness.<br \/>\nRepresentatives from the respective national cyber security agencies agree that, beyond just sharing information, there\u2019s a need to collaborate on a higher scale.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e194fc40bd&#038;e=20056c7556<\/p>\n<p>5 questions the CISO should ask the Threat Analyst<br \/>\nThe following five questions represent a way for the CISO to start a risk-based dialogue that can be a source of metrics supporting the use of threat intelligence data.<br \/>\nThe answers to the questions can also be a regular part of board level discussions.<br \/>\n&#8211; What are the risks to our brand?<br \/>\n&#8211; Are our employees\u2019 credentials part of any mass exposure?<br \/>\n&#8211; Are we as aligned as we can be with security operations?<br \/>\n&#8211; How do we know we are hunting the right threats?<br \/>\n&#8211; What can we share with and learn from other companies in our industry vertical?<br \/>\nMaking threat intelligence data useful requires a robust threat intelligence platform that can off-load correlation IOCs with log data from the SIEM.<br \/>\nThis is a necessary step for making tens of millions of active IOCs useful for threat hunting.<br \/>\nThis approach is efficient and aligned across threat analysts, SOC personnel and incident responders.<br \/>\nA proactive approach to cyber security means finding threats before they become a problem.<br \/>\nMake everyone a threat hunter by unleashing your entire security team\u2019s creativity but keep it efficient through active prioritisation and inside the bounds of what matters to the organisation.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0866ea0c3d&#038;e=20056c7556<\/p>\n<p>Taking cyber risk management to the next level<br \/>\nBanks, investment companies, and insurers are prime targets for cybercriminals looking to steal money or information, disrupt operations, destroy critical infrastructure, or otherwise compromise data-rich financial services institutions (FSIs).<br \/>\nIndeed, FSIs lead the pack in terms of the average cost of cybercrime incurred by companies in a particular industry, counting both internal activities and external consequences.<br \/>\nThat figure reached $28.3 million in 2015\u2014which is significantly higher than the six-year average for FSIs of $19.4 million annually (see figure 1).1<br \/>\nYet despite having had several years to bolster cybersecurity capabilities, our latest research found that many FSIs are still struggling to keep up with a moving target.<br \/>\nBasic blocking and tackling strategies to lock down devices, systems, and platforms remain a work in progress at many companies because of the pace of attacks, the growing sophistication of threat actors, as well as multiplying, often conflicting demands facing chief information security officers (CISOs).<br \/>\nAdding to the sense of urgency surrounding cybersecurity is the massive technological transformation underway in financial services driven by fintech, regtech, mobile applications, cloud adoption, and other emerging developments.<br \/>\nCISOs and the business executives they work with are being challenged to become more agile and provide a frictionless customer experience.<br \/>\nBeyond facilitating technology upgrades, they must balance the needs of cybersecurity with other forces, such as cost reduction, globalization of the workforce, and regulatory compliance.<br \/>\nOverall, we found that while some FSIs have become leaders in cyber risk management, there is a wide variance on the cybersecurity maturity curve.<br \/>\nThe bar needs to be raised for many individual companies and the industry as a whole.<br \/>\nOur interviews with leading players and experience in serving clients across financial services provide a number of key insights into how these challenges might be overcome, whether by sharing leading practices or through continuous innovation, just as the threat actors themselves have done.<br \/>\nThe bottom line is that by whatever measurement, cybersecurity is not being shortchanged by FSIs, and the vast majority of those we spoke with don\u2019t foresee a significant slowdown in spending anytime soon.<br \/>\nOne respondent said trends in cybersecurity spending are the \u201cnew normal,\u201d noting that his budget will likely have to keep increasing to stay ahead of evolving threat actors.<br \/>\nLonger term, at some point CISOs will have to start making hard choices on spending priorities, based on a true cybersecurity game plan that is aligned with the company\u2019s business and technology strategies.<br \/>\nSince it is probably unlikely, even for the largest institutions, to allot funds to build capabilities in all areas of security simultaneously, CISOs should triage among competing calls for investments.<br \/>\nOne interviewee advises his staff to be \u201cdisciplined\u201d about product choices as new solutions emerge.<br \/>\nCISO teams should see what works and what doesn\u2019t before adding or substituting new security technologies as they are introduced.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1d6e31a916&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=8369782959)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * How Your Voice Is Preventing Hackers From Accessing Financial Information * Infamous Hacking Groups: 5 Things They Hope to Accomplish * 6 cybersecurity and emergency situations every IT department should train&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1241","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1241"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1241\/revisions"}],"predecessor-version":[{"id":3728,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1241\/revisions\/3728"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}