-
We’re all infected and don’t know it. Assuming you are infected
positions you better to proactively harden your systems and remove
zero-day infections. With this key assumption, you need to backup all
your data files, wipe and reimage your computers and install only
legally owned copies of software.
-
You can’t let Smartphones and Tablets onto corporate networks (bring
your own devices – BYOD dilemma) unless they can be managed. This also
means deleting all apps and then starting to install trustworthy apps
from sources you know and trust. How many apps do we have installed
without knowing if they have backdoors or they, themselves, are not just
tools and games but are also RATs in disguise?
-
Employees at Sony are not trained like employees at Coca Cola. This
company hasn’t had a breach or lost a secret formula in 100 years.
Cyberarmies could attack Coke for the formula and most likely would
never succeed in getting it, using the means they used on Sony. Why?
Because Coke practices Employee Training (for social engineering), has
frequently tested and updated security policies (including physical
security, people security and network security) and they don’t leave the
secret formula out in the open – they practice COUNTERVEILLANCE
- Train Employees Better
- Harden Systems
- Detect and Removing RATs
- Deploy Full Disk Encryption and Real-time Backups
- Defend Against Phishing Attacks
- Manage the BYOD Dilemma
I would suggest we all start writing emails as if everyone in the world can see them. Sony Pictures executives have learned this lesson the hard way. But, again, that’s not what caused the breach, that’s data that was stolen and used against them – that’s just throwing salt in the wound. The real issue is that all employees need better security training.
How Do RATs Travel Behind Corporate Firewalls?
While most folks think it’s the phishing attack (through the email port – the front door) as the only and key point of entry, you need to start assuming that most of your smartphone or tablet apps are creepware – malware that spies on you and your online behavior – many free apps are RATs. Do you really need them? Delete all of the apps you aren’t using that often. Replace those apps that take advantage of too many of your privacy settings like GPS, phone & SMS logs, personal identity information, with similar apps that don’t. If you don’t manage this bring your own device (BYOD) dilemma then expect RATs on your portable devices to invade your corporate network.
Coca Cola Practices Counterveillance – You Should Too
How old is the Coca Cola recipe? Has it been hacked or stolen in over 100 years? So what is Coca Cola doing better than everyone else? They are taking the above suggestions, and frequently checking and rechecking their security posture. If you don’t have a plan, expect to be a victim in the Year of the RAT. If you can make the important information “invisible” to the malware – the RAT, then they can’t steal it.
Practicing Counterveillance, like Coca Cola could be the most important thing you do for privacy and security. Think about it. If you could be invisible, no one could see you. They wouldn’t know when you are browsing the web or using your smartphone. If you could make all the private information about yourself become completely invisible, no one could every steal it. That’s right – your personally identifiable information (PII) could not be stolen if no one could see you or your data. It’s so simple – it sounds too good to be true. Right? If you could make yourself invisible, if you could hide your PII from prying eyes, you would be practicing counterveillance. That’s right – you would be countering surveillance.
What makes the US B2 Stealth bomber so unique?
It disperses its radar signature so that it becomes invisible to traditional radar – the design of the ‘skin’ of this aircraft is a counterveillance technology. It is possible to become nearly invisible but you’re right to think it’s very challenging – many would say nearly impossible. However, if you start out with this as a goal ‘how do I make my data invisible to criminals and hackers?’ then each day you should be working to reach this goal – to build your own B2 Steath bomber – a more secure and encrypted database, better password management, real-time backups, defense against RATs and phishing attacks and ultimately better trained employees who realize that ‘loose lips sink ships.’
0 comments:
Post a Comment