Author: rescue@crimefire.in

  • A Guide to Stopping Global Cyber Crime at the Local Level – Spiceworks News and Insights

    Prevention, response, and recovery are the key to mitigating ransom threats in our daily lives.

    Cyber attacks put everyone at risk by compromising the data that runs the world and cost companies millions of dollars. Simon Taylor, founder and CEO, HYCU, shares how organizations can take steps to prepare, react and recover from a breach without paying a ransom.
    Ransomware is the most significant cyber threatOpens a new window faced by private and government organizations. These organizations manage crucial data, from healthcare to education to infrastructure. Cybercriminals accessing and holding that data for ransom threaten our everyday activities and potentially our lives. The key to mitigating that threat is prevention, response and recovery.
    Data is our most valuable and exploitable asset. Our society relies on it to survive, and losing data costs money and reduces global security. Each company plays a role in the endeavor to secure this vital asset. 
    How much damage do cyber attacks cause? Take a look at these statistics. 
    Each time an organization pays a ransom, it emboldens cybercriminals. Being prepared to recover data in case of attack prevents the need for payments and removes the financial incentive for the hackers.
    See More: Five Cybersecurity Misconceptions Putting Organizations At Risk
    Hacking has become incredibly easy. Ransomware as a service means people don’t have to write code to execute an attack. With more bad actors out there, taking immediate precautions to protect your data is imperative. 
    Organizations can take these steps to help prevent a breach: 
    Training employees may be the most vital step. Stanford University research Opens a new window found that employee mistakes cause 88% of data breaches. Company leaders must take the time to educate their staff about phishing and other security threats and implement best practices to prevent them.
    With the current state of cybercrime, anti-intrusion measures matter. But don’t stop there. Prepare your organization to respond in the inevitable event of a breach.   
    Breaches are expensive – the longer your system is down, the more it costs your organization in time, lost revenue and resources – not to mention the risk of being unable to access crucial data. But you can keep criminals from accessing your most valuable assets and set yourself up to recover and restore your data quickly with the right backup and recovery strategies. 
    Let’s look at the necessary steps:
    Under the cloud shared responsibility model, in an enterprise that runs and manages its own IT infrastructure on-premise, IT staff is responsible for the security, as well as the applications and data that run on it. That means your cloud service stores your data but places the responsibility on you to protect it. Bringing in a third party to look after your data can ensure you have the proper steps and policies in place to recover lost data. 
    When backing up your data, you need to understand where it is backed up and if you have immutable storage where no one can access it. One standard to adopt is the 3-2-1 rule: your data should be backed up three times on two different media (on an appliance and in the cloud, for example) with at least one backup offsite. You should also periodically check to ensure your critical information is, in fact, stored. 
    Many companies may be surprised to learn they can’t recover their data, even if it is backed up. A backup system is only as strong as the recovery plan. Your data may be lost without one. 
    If you are hacked and decide to pay the ransom, should the hacker actually return access, there is a significant amount of cleanup required, including removing hacked files and inspecting databases in addition to restoring the data. That process can cause extensive system downtime and drive up the costs of the attack. If you don’t pay a hacker, rebuilding your network from backups is not a quick operation without a restoration process. This process requires a pre-planned step-by-step procedure to retrieve and restore your data. This strategy significantly cuts the time needed to get your system up and running. You might consider three restoration infrastructures: software, appliance, or Backup as a Service (BaaS).
    Using software involves in-house deployment of backup software. Third-party appliances combine the software and hardware components necessary to back up data within one device. Backup as a Service provides automated, no-maintenance backups.
    Each infrastructure has its pros and cons, but Backup as a Service can make a recovery from offsite backups faster and simpler than the other solutions. It also reduces the amount of regular backup maintenance required from your organization’s IT department. 
    Your disaster recovery process is not a set-it-and-forget-it strategy. You need to write out the plan. Set a schedule to update the process based on business needs and IT environment changes. Don’t forget to test it to ensure you can execute the plan during a worst-case scenario.
    For the cyber ecosystem to work together to stop global cybercrime, organizations need to focus on quantifying what steps they can and should take to avoid paying a ransom.
    There are multiple free services available to evaluate your company’s readiness to respond to an attack, that identify gaps in backup and recovery processes so you can address them.
    We are all in this fight together. Ensuring you can recover your data without paying a ransom saves you significant time and money and removes the incentive for criminals to continue their attacks. It will take all of us to end the global scourge of ransomware and make the world a safer place for everyone.
    How are you upgrading your cyber attack response strategy? Tell us on FacebookOpens a new window , TwitterOpens a new window , and LinkedInOpens a new window .

    Founder and CEO, HYCU

    source

  • Cybercrime cost American seniors $3 billion last year, a 62% jump – USA TODAY

    Kids, it’s time to have “the talk” with your parents and grandparents.
    Cybercrime cost Americans over 50 nearly $3 billion last year, a whopping 62% increase from 2020, according to the FBI’s 2021 Elder Fraud Report.
    In fact, the number of victims could be much higher, as seniors are also less likely to report fraud, says the FBI. This is supported by figures from the FTC, which show that while 44% of younger people in their 20’s reported losing money to fraud, only 20% of those in their 70’s did the same.
    The risks are wide-ranging, from fraudulent phone calls to phishing attempts via email, texts to social media messages, or shopping scams designed to dupe seniors out of their savings.
    The pandemic played a role here, too, believes Michael Jabbara, Visa’s vice president and global head of fraud services.
    “It’s no surprise we’ve seen a massive shift over the years towards digital transactions, but with this shift there’s also an increase focus from fraudsters,” says Jabbara. “This is especially true for elder individuals who may be a target because of a lack of technical sophistication and because they don’t always report these crimes to authorities.”
    Jabbara says “grandparent scams” are still a popular attack method.
    “This is where a fraudster spoofs a relative’s phone number and sends a message asking for money due to a medical emergency or text books, or whatever the case may be,” he said
    Jabbara says Visa has invested more than $9 billion in anti-fraud measures over the over the last five years, including the use of artificial intelligence and advanced data analytics, “to ensure we’re keeping our network safe and secure across the globe.”
    “Fraudsters are able to glean those personal details the grandparent posted pictures on Facebook or Instagram, allowing them to craft a very believable message,” Jabbara said. “Or in other cases, a family member’s account is hacked and a fraudster gets access to their email, they’ll target an elder family member with a similar plea for money or help. They play on their emotions.”
    Seniors also pay out more. Disturbing data published by cybersecurity company Comparitech shows that while the average loss from those in their ‘was $324, it jumps to $426 for victims in their 60’s, $635 among 70-somethings, and a staggering median loss of $1,300 among those in their 80’s.
    Daniel Markuson, digital privacy expert with NordVPN, a leading Virtual Private Network (VPN) provider, see below, says its recent survey found that 84% of Americans have experienced a form of “social engineering,” where fraudsters attempt to fool you into divulging confidential or personal information.
    “Phishing scams are one of the most common tactics among cybercriminals, designed to trick people into clicking on links that download malicious files often containing a virus,” explains Markuson. “So, one of the main tips we have for seniors is to be cautious and question everything they receive from unknown senders.”
    Markus says often there are grammar mistakes in the email you received, a sense of urgency to confirm your details, or a strange-looking email domain.
    When it comes to protecting our loved ones, letting them know about these risk plays a big role.
    Jabbara says one of the best practices to fight back is to have a “tech check-in” with aging relatives, to go over these assorted tips.
    Share with care: Limit how much personal information you share online. Set your social media profiles to private. If someone asks to connect with you on social media, only accept their request if you know them.
    Be wary of “emergencies”: Your family or friends can easily be hacked to send out emails or text messages claiming to be urgently in need of cash or gift cards, scamming you out of money or gift cards.
    When in doubt, just ask: If you really think it could be your daughter or grandson reaching out, don’t confirm by replying to the message you received. Instead, reach out in another fashion, such as calling them. Chances are, it’s fake. Block and report the fraudulent message.
    Lock your devices: Use a passcode or fingerprint to lock your phone or tablet. If you have a computer, use a strong password that’s at least 12 characters long.
    Shop safer: Always use a secure Internet connection when making a purchase. Reputable websites use technologies such as SSL (Secure Socket Layer) that encrypt data during transmission. You will see a little padlock icon in your browser(and usually “https” at the front of your address bar to confirm it’s a secure connection. Only shop on sites that take secure payment methods, such as credit cards.
    Enable multifactor authentication: When it comes to logging into your online accounts, add a second layer of defense by enabling multifactor authentication, sometimes referred to as “two-factor authentication.” This means you not only need a password or passcode (or biometrics logon, like a fingerprint of facial scan) to confirm it’s you, but also a one-time code you’ll receive on your mobile phone to type in.
    Install good cybersecurity software: Just as you wouldn’t leave the front door to your home unlocked, you shouldn’t let your tech be vulnerable to attacks, whether it’s a virus or other malicious software, called “malware,” that sneaks onto your device or caused by being tricked into giving out sensitive information.
    Good antimalware that’s updated often can identify, quarantine, delete and report any suspicious activity coming into your computer or flag sensitive info going out.
    “Seniors have more important things to do than worry about than being protected online,” says Gagan Singh, executive vice president and chief product an revenue officer for cybersecurity company McAfee.
    A just-announced tool called McAfee+, from $49.99/first year, then $139.99/year after that, was created to make it easy for everyone to confidently live life online no matter how much or little they know about technology and online threats including identity theft.
    “Our new product lineup includes tools that help people prevent identity theft and credit fraud, including credit monitoring, credit lock, removing their personal data online, identity monitoring, and website safety notifications,” says Singh.
    Resist free wireless Internet at, say, a coffee shop or in an airport. It’s best to wait until you’re on a secured Internet connection at home, or use your smartphone as a personal hotspot, which is safer than public Wi-Fi. If you must use a hotspot, never conduct any financial transactions – like online banking, trading or shopping – as you never know if your information is being tracked and logged.
    A VPN conceals your online identity by using encryption technology, therefore what you do and where you go online cannot be seen by your service provider, the government, search engine, browser company, social media sites, advertisers and malicious types.
    “VPN is an easy-to-use tool that helps users to make sure their network is secure at all times,” confirms Markuson. “For seniors, who sometimes find it hard to keep up with latest technology and cybersecurity trends, it is a perfect solution [as] VPN not only helps to stay safe while using public Wi-Fi, it also make sure user’s private data is safe from snooping.”
    NordVPN can be purchased starting at $3.69/month with a two-year subscription that includes three months for free.
    Follow Marc on Twitter for his “Tech Tip of the Day” posts: @marc_saltzman. Email him or subscribe to his Tech It Out podcast. The views and opinions expressed in this column are the author’s and do not necessarily reflect those of USA TODAY.

    source

  • An anatomy of crypto-enabled cyber crime – Financial Times

    Expert insights, analysis and smart data help you cut through the noise to spot trends, risks and opportunities.
    Join over 300,000 Finance professionals who already subscribe to the FT.
    OR
    BEST VALUE – SAVE 20%
    Then ₹5,667 every 3 months
    Sign in
    Check if your university has an FT membership to read for free.
    We use cookies and other data for a number of reasons, such as keeping FT Sites reliable and secure, personalising content and ads, providing social media features and to analyse how our Sites are used.
    International Edition

    source

  • How cybercrime is going small time – Protocol

    Blockbuster hacks are no longer the norm – causing problems for companies trying to track down small-scale crime
    Cybercrime is often thought of on a relatively large scale. Massive breaches lead to painful financial losses, bankrupting companies and causing untold embarrassment, splashed across the front pages of news websites worldwide. That’s unsurprising: cyber events typically cost businesses around $200,000, according to cybersecurity firm the Cyentia Institute. One in 10 of those victims suffer losses of more than $20 million, with some reaching $100 million or more.
    That’s big money – but there’s plenty of loot out there for cybercriminals willing to aim lower. In 2021, the Internet Crime Complaint Center (IC3) received 847,376 complaints – reports by cybercrime victims – totaling losses of $6.9 billion. Averaged out, each victim lost $8,143.
    Many identity thefts and online scams, however, net perpetrators even less: just a few hundred dollars. For just $25, cybercriminals can purchase a cloned VISA or Mastercard, plus its PIN. That card data opens a treasure trove for criminals, including locally purchasing gift cards, or other fencible commodities such as electronics and jewelry sold off at a discount.
    “Criminals have two primary goals: making money and staying out of harm’s way,” says Nick Biasini, head of outreach at Cisco Talos. Cybercrime provides an attractive avenue for both. “The inherent risk associated with committing cybercrime-fueled fraud is far lower than selling drugs or other types of crime. Additionally, the margins are far better. A criminal can turn a small investment into big profits simply from buying stolen information and using it to commit some form of fraud. During the pandemic unemployment fraud has been a lucrative favorite of criminals. Plus by keeping the monetary values lower they are less likely to draw the attention of state and federal authorities.”

    A growing problem for local law enforcement

    Cyber criminals can attack virtually anyone from virtually anywhere, and cybercrime as a service, where the non-technically minded can hire tools to hack accounts without any specialist knowledge, has become commonplace. Even organized crime syndicates in Spain and Italy are getting into the game.

    Federal authorities, usually alerted by IC3, put their scarce resources toward solving large-scale crimes. They work with financial institutions or corporations most impacted by specific breaches. This means the majority of crimes – with their far smaller paydays – tend to fly under the radar.

    A look at the data

    But some companies are tracking the rise of small-scale cybercrime. Cisco Talos analyzes data to spot trends that help its incident response team alert customers to potential cybersecurity attacks, and then respond and recover to breaches rapidly.

    It has found while drug felonies over the last eight years dropped drastically, before stabilizing during the pandemic, cybercrime has shot up. From 2015 to 2021, the number of reported cybercrimes nearly tripled, and losses soared nearly fivefold.

    “Criminals today have a far better technical understanding then they did five or ten years ago,” says Biasini. “Additionally, it shows how they really understand inherent risk, it’s just safer to commit fraud and cybercrime than it is to sell drugs. As an added bonus, they also have become proficient in cryptocurrencies, providing alternative avenues for purchasing illicit goods and money laundering.”

    Source: New York Police Department

    Source: IC3 2021 Internet Crime Report

    An evolving challenge

    If this trend continues, the emerging wave of cybercrime will look less like epic breaches and more like scamming citizens out of their tax return or signing them up for fraudulent unemployment benefits. Those two crimes already rank in the top five of identity theft types for 2021, with unemployment scams leading the pack.

    How, then, can we expect local law enforcement to possibly keep up? After all, they’re already busy policing and prosecuting what most people consider ‘real world’ crimes. Cybercrime is an entirely different problem. It requires pouring over data both from the criminal themselves and the victims they target with their fraud, trying to somehow build a solid, forensically sound case.

    “Cisco Talos has always worked closely with local, state, and federal law enforcement organizations to help them succeed in their tasks,” says Biasini. “We are always willing and able partners to help take cybercriminals off the streets. We provide law enforcement with information we uncover during our investigations and oftentimes lend our people, processes, and technologies to help investigations already underway.”

    One solution is for local law enforcement to identify staffers in their ranks with an aptitude for online sleuthing. Cybercrime units are perfect for people who have a research bent, because digital detective work is a big part of the job.

    Another alternative forces are pursuing is recruiting young people from computer science programs, or tasking high schools with helping train up a new generation of defenders with the mentality and skills to turn what today is a sideline for police into a mainline function. It’s already happening worldwide: in the UK, a $7 million government program led to the creation of cybercrime units in every police force in England and Wales.

    And we’re seeing it here too in the United States. Several organizations have stepped up as resources for law enforcement. Every state has at least one agency devoted to helping police fight cybercrime. And the National Computer Forensics Institute offers courses, both in-person and virtual, to train basic and advanced examiners, first responders, and prosecutors and judges.

    It’s all in the aim of trying to crack down on small time cybercrime, preventing the small leaks that turn into a torrent of losses that we know about from thousands of years of history.

    People have been swindled since before man created monetary systems. These aren’t new crimes; just new ways to commit them. But as cybercrime increasingly goes small-time, those on the front lines will need new and more effective ways to fight it.

    Read the detailed blog on the shifting trends in small time cybercrime in Nick’s blog here. Click here to get to know Cisco Talos, the industry-leading threat intelligence group fighting the good fight.

    A growing problem for local law enforcement
    Cyber criminals can attack virtually anyone from virtually anywhere, and cybercrime as a service, where the non-technically minded can hire tools to hack accounts without any specialist knowledge, has become commonplace. Even organized crime syndicates in Spain and Italy are getting into the game.
    Federal authorities, usually alerted by IC3, put their scarce resources toward solving large-scale crimes. They work with financial institutions or corporations most impacted by specific breaches. This means the majority of crimes – with their far smaller paydays – tend to fly under the radar.
    A look at the data
    But some companies are tracking the rise of small-scale cybercrime. Cisco Talos analyzes data to spot trends that help its incident response team alert customers to potential cybersecurity attacks, and then respond and recover to breaches rapidly.
    It has found while drug felonies over the last eight years dropped drastically, before stabilizing during the pandemic, cybercrime has shot up. From 2015 to 2021, the number of reported cybercrimes nearly tripled, and losses soared nearly fivefold.
    “Criminals today have a far better technical understanding then they did five or ten years ago,” says Biasini. “Additionally, it shows how they really understand inherent risk, it’s just safer to commit fraud and cybercrime than it is to sell drugs. As an added bonus, they also have become proficient in cryptocurrencies, providing alternative avenues for purchasing illicit goods and money laundering.”
    Source: New York Police Department
    Source: IC3 2021 Internet Crime Report
    An evolving challenge
    If this trend continues, the emerging wave of cybercrime will look less like epic breaches and more like scamming citizens out of their tax return or signing them up for fraudulent unemployment benefits. Those two crimes already rank in the top five of identity theft types for 2021, with unemployment scams leading the pack.
    How, then, can we expect local law enforcement to possibly keep up? After all, they’re already busy policing and prosecuting what most people consider ‘real world’ crimes. Cybercrime is an entirely different problem. It requires pouring over data both from the criminal themselves and the victims they target with their fraud, trying to somehow build a solid, forensically sound case.
    “Cisco Talos has always worked closely with local, state, and federal law enforcement organizations to help them succeed in their tasks,” says Biasini. “We are always willing and able partners to help take cybercriminals off the streets. We provide law enforcement with information we uncover during our investigations and oftentimes lend our people, processes, and technologies to help investigations already underway.”
    One solution is for local law enforcement to identify staffers in their ranks with an aptitude for online sleuthing. Cybercrime units are perfect for people who have a research bent, because digital detective work is a big part of the job.
    Another alternative forces are pursuing is recruiting young people from computer science programs, or tasking high schools with helping train up a new generation of defenders with the mentality and skills to turn what today is a sideline for police into a mainline function. It’s already happening worldwide: in the UK, a $7 million government program led to the creation of cybercrime units in every police force in England and Wales.
    And we’re seeing it here too in the United States. Several organizations have stepped up as resources for law enforcement. Every state has at least one agency devoted to helping police fight cybercrime. And the National Computer Forensics Institute offers courses, both in-person and virtual, to train basic and advanced examiners, first responders, and prosecutors and judges.
    It’s all in the aim of trying to crack down on small time cybercrime, preventing the small leaks that turn into a torrent of losses that we know about from thousands of years of history.
    People have been swindled since before man created monetary systems. These aren’t new crimes; just new ways to commit them. But as cybercrime increasingly goes small-time, those on the front lines will need new and more effective ways to fight it.
    Read the detailed blog on the shifting trends in small time cybercrime in Nick’s blog here. Click here to get to know Cisco Talos, the industry-leading threat intelligence group fighting the good fight.
    Chris Stokel-Walker is a freelance technology and culture journalist and author of “YouTubers: How YouTube Shook Up TV and Created a New Generation of Stars.” His work has been published in The New York Times, The Guardian and Wired.
    To give you the best possible experience, this site uses cookies. If you continue browsing. you accept our use of cookies. You can review our privacy policy to find out more about the cookies we use.

    source

  • Your biggest cyber-crime threat has almost nothing to do with technology – ZDNet

    Most Popular
    You’re asked about the biggest cybersecurity threats faced by business – which ones spring to mind first?
    Maybe it’s relentless ransomware attacks, with cyber criminals encrypting networks and demanding vast sums for a decryption key – even from hospitals. Or maybe it’s a sneaky malware attack, which lets hackers hide inside the network for months on end, stealing everything from usernames and passwords to bank details. 
    Both of these are on the list, for sure. These are awful attacks to experience and can cause terrible damage. But there’s another much simpler form of cyber crime that makes scammers the most money by far – and doesn’t get much attention.
    The scale of business email compromise (BEC) attacks is clear: according to the FBI, the combined total lost to BEC attacks is $43 billion and counting, with attacks reported in at least 177 countries. 
    SEE: The next big security threat is staring us in the face. Tackling it is going to be tough
    What makes BEC such a rich opportunity for scammers is there’s rarely a need to be a highly skilled hacker. All someone really needs is a laptop, an internet connection, a bit of patience – and some nefarious intent.
    At the most basic level, all scammers need to do is find out who the boss of a company is and set up a spoofed, fake email address. From here, they send a request to an employee saying they need a financial transaction to be carried out quickly – and quietly.
    It’s a very basic social-engineering attack, but often, it works. An employee keen to do as their boss demands could be quick to approve the transfer, which could be tens of thousands of dollars or more – particularly if they think they’ll be chastised for delaying an important transaction.
    In more advanced cases, the attackers will break into the email of a colleague, your boss or a client and use their actual email address to request a transfer. Not only are staff more inclined to believe something that really does come from the account of someone they know, scammers can watch inboxes, wait for a real financial transaction to be requested, then send an email from the hacked account that contains their own bank details. 
    By the time the victim realises something is wrong, the scammers have made off with the money and are long gone. 
    What’s most challenging about BEC attacks is that while it’s a cyber crime that is based around abusing technology, there’s actually very little that technology or software can do to help stop attacks because it’s fundamentally a human issue. 
    Anti-virus software and a good email spam filter can prevent emails containing malicious links or malware from arriving in your inbox. But if a legitimate hacked account is being used to send out requests to victims using messages in emails, that’s a problem – because as far as the software is concerned, there’s nothing nefarious to detect, and it’s just another email from your boss or your colleague. 
    And the money isn’t stolen by clicking a link or using malware to drain an account – it’s transferred by the victim to an account they’ve been told is legitimate. No wonder it’s so hard for people to realise they’re making a mistake. 
    SEE: Brazen crooks are now posing as cybersecurity companies to trick you into installing malware
    But victim blaming isn’t the answer and isn’t going to help – if anything, it will make the problem worse. 
    What’s important in the battle against BEC attacks is ensuring that people understand what these attacks are and to have processes in place that can prevent money being transferred.  
    It should be explained that it’s very unlikely that your boss will email you out of the blue asking for a very urgent transfer to be made with no questions asked. And if you do have concerns, ask a colleague – or even talk to your boss to ask if the request is legitimate or not. It might seem counterintuitive, but it’s better to be safe than sorry. 
    Businesses should also have procedures in place around financial transactions, particularly large ones. Should a single employee be able to authorise a business transaction valued at tens of thousands of dollars? Probably not.  
    Businesses should ensure multiple people have to approve the process – yes, it might mean transferring finances takes a little longer, but it will help ensure that money isn’t being sent to scammers and cyber criminals. That business deal can wait a few more minutes. 
    Technology can help to a certain extent, but the reality is these attacks exploit human nature. 
    ZDNet’s Monday Opener is our opening take on the week in tech, written by members of our editorial team. 

    source

  • Breaking down barriers in the fight against cyber-crime – BBC

    Louise Meney was 12 when she discovered hacking while browsing the internet with her first computer.
    More than two decades later she now dreams of making a living from it thanks to a pioneering new course designed to break down gender barriers.
    Ms Meney is one of 77 women who signed up for the free programme, which is based at Glasgow Caledonian University (GCU).
    And by the end of the year she will be able to pursue her dream of a career in in the booming cyber-security industry.
    As well as meeting the soaring demand for experts, the qualification is also designed to challenge the make-up of the tech industry, where less than a quarter of professionals are female.
    Recruits for the Women Do Cyber programme – a partnership between Cisco, Scottish Women in Technology (SWiT) and GCU – include students who are currently unemployed.
    The initiative has also been supported by Police Scotland and the Scottish government.
    Ms Meney was at secondary school when she started hacking after discovering a how-to website.
    She told BBC Scotland: "It is something I have always enjoyed doing but not from a bad perspective.
    "I think people hear the word hacker and the immediately think 'bad guy who is going to steal my bank details'.
    "There is a field of hacking that is ethical.
    "We are the people who work to stop people from penetrating systems and getting access to information that they should not have."
    Ms Meney, 36, aspires to work for a purple team which involves a mix of offensive and defensive security.
    One area she hopes to specialise in is bug bounties, which are paid out if hackers can identify weaknesses in IT systems.
    She described the course as the new challenge she had been looking for.
    "I have always been a bit geeky," she said.
    "I was working as a software engineer for the last few years but I was not enjoying it any more."
    Ms Meney found out about the new opportunity as she was still in touch with lecturers from the applied psychology degree she completed at GCU in 2017.
    She said: "When I was speaking to them it just seemed like the perfect course for me with my interests and background."
    Ms Meney, who lives in Milton, Glasgow, has been out of work since she contracted Covid early in the pandemic so she did not hesitate to register for the course.
    The former software engineer said: "I am unable to predict how my body will react on a certain day.
    "If my long Covid symptoms were playing up then I would not be able to perform on a technical test."
    She said she was open and honest in her application about her ongoing issues and praised the support she had received.
    She added: "It has given me a lot of hope and exposed me to people I would not have met otherwise."
    The course, which started last month, is aimed at women aged 18 and above, including those who are currently unemployed or underemployed.
    No previous knowledge or experience in technology or maths is required to become a Cisco Certified CyberOps Associate, which is industry recognised qualification.
    Louise Morran is a defuelling project manager at the Hunterston B nuclear power plant in North Ayrshire.
    It was shut down for the final time in January after generating electricity for 46 years.
    The site, owned by EDF Energy, is undergoing a three-year process of defuelling with the spent nuclear fuel sent to Sellafield for reprocessing.
    Ms Morran, from Kilmarnock, said her employers had been supportive of her enrolling on the course, given the vulnerabilities of the energy sector to a cyber-attack.
    Her course work currently takes up one day during the week and a day at the weekend.
    She added: "It is good doing my full-time job at the same time because I can take what I am learning outwith work and then see how it could be applied to my day-to-day job.
    "Cyber-security is only going to get more and more important."
    Ms Morran, 30, highlighted the shift to home working and a massive increase in internet use during the Covid lockdowns as potential weak spots which could be exploited by criminals.
    She has been familiar with gender gaps since her early student days when she was one of just four women on her electrical and mechanical engineering course at the University of Strathclyde.
    She said: "It was quite obvious from the start but I have noticed more recently through my work that more of the apprentices coming into the energy industry are female."
    There are no such issues on the GCU course and Ms Morran described the number of women involved as "amazing".
    Asked if she had a message for those considering it, she replied: "Go for it. Stop doubting yourself."
    Cyber-crime is a global threat and is one of the biggest challenges facing law enforcement.
    Lone hackers and gangs use sophisticated scams to target individuals, businesses and essential services.
    More than 400 cyber-attacks were reported in Scotland in 2020/21 and notable recent victims include the Scottish Environment Protection Agency (Sepa) and the charity SAMH.
    The UK's National Crime Agency said cyber-criminals sought to exploit human or security vulnerabilities in order to steal passwords, data or money directly.
    The most common threats include:
    Hacking – including of social media and email passwords
    Phishing – bogus emails asking for security information and personal details
    Malicious software – including ransomware through which criminals hijack files and hold them to ransom
    Distributed denial of service (DDOS) attacks against websites – often accompanied by extortion
    The NCA said most cyber-attacks could be prevented by taking these basic security steps:
    Chioma Uzoamaka hopes a career in cyber-crime will allow her to balance her work and busy family life.
    The former business analyst has four children aged between seven and 10.
    Ms Uzoamaka, 41, previously worked in network security and is enjoying the new course.
    She said: "It is a good start for me to help fight crime and I hope it will encourage more women to work in cyber-security."
    Course mentor Ashley Beck said the threat was incredibly difficult to manage as so many more people were now online.
    The former detective added that law enforcement needed support to keep up with a complex and ever-growing landscape.
    Ms Beck, who is now a senior law enforcement consultant, added: "Everybody thinks it is just big companies that get targeted but actually you are talking about people downloading applications that actually give organised criminal groups access to everything that you click on on your device.
    "It could be your banking app or anything like that."
    Silka Patel, founder of SWiT, believes the course will have a positive impact as only 23% of Scotland's tech workforce is currently female.
    She added: "Diversity should not be an afterthought, it should be built in from the beginning.
    "This course helps women feel like they belong in the sector."
    Dr Salma Mohamed, lecturer in cyber-security networks at GCU, is confident the programme will help to change perceptions of hacking.
    She said: "The first image you have is this person who is male with a hood just sitting at a computer.
    "We just need to make this image disappear and prove that there is this opportunity that we can have a female that can do the job but, of course, ethical hacking."
    Dr Mohamed said cyber-crime increased during the pandemic and revealed she was targeted by a bogus caller who said he was from HMRC.
    Police Scotland has described the fight against cyber-crime as a national priority.
    Chief Supt Faroque Hussain said: "It poses a real and substantial threat to our communities and businesses and having a legacy in this academic course to upskill women on the subject is a meaningful reflection of the preventative measures we are taking.
    "The women on this programme will learn about the real and present danger posed by the online arena.
    "Having their knowledge underpinned with academic rigour will hopefully gain them entry into digital-security-related employment where they can make a direct contribution to the country's cyber-capability."
    The senior officer also donated laptops to students who didn't have access to one.
    Chief Supt Hussain added: "With cyber-crime reports almost doubling in a year with an increase of 95%, we need to take action now to protect people from digital harm and crimes in the virtual world."
    £18m cyber-security hub centre opens in Dundee
    Hackers had second go at Sepa during cyber attack
    Mental health charity targeted in cyber attack
    Sepa subject of 'significant cyber attack'
    New police centre to tackle cyber crime
    Protecting yourself against cybercrime
    Ukraine doubles down in Bakhmut defence – Zelensky
    The crane who refuses to leave its human saviour. Video
    S Korea to pay victims of Japan WW2 forced labour
    The crane who refuses to leave its human saviour. Video
    Twitter insiders: We can't protect users from trolling under Musk
    Quake survivors living in fear on Turkey's streets
    The island paradise held prisoner by heroin
    How Korean dramas took over Bollywood-mad India
    An Irish Goodbye tackles male grief in bid for Oscar glory
    Why do we value gold so much? Video
    The Murdaugh trial is over, but infamy lingers for town
    What is the plan to protect the high seas?
    The university that changed the world
    11 of the best films to watch in March
    Why scraping burnt toast may be wise
    © 2023 BBC. The BBC is not responsible for the content of external sites. Read about our approach to external linking.

    source

  • The Global Defense Cyber Security Market size is expected to reach … – GlobeNewswire

    | Source: ReportLinker ReportLinker
    Lyon, FRANCE
    New York, Feb. 23, 2023 (GLOBE NEWSWIRE) — Reportlinker.com announces the release of the report “Global Defense Cyber Security Market Size, Share & Industry Trends Analysis Report By Deployment, By Type, By Offering, By Application, By Regional Outlook and Forecast, 2022 – 2028” – https://www.reportlinker.com/p06422353/?utm_source=GNW

    Presently, cyber threats are more persistent, smarter and concentrated on high-value assets, which have increased the demand for a strong and high-tech cyber security system for defense industry. Furthermore, the growing risk of the cyber threat to critical infrastructures by criminal organizations and the technological enhancement in the cyber security industry is the major driving factor in its increased utilization throughout defense organizations.

    A more connected defense & intelligence world would ensure that the soldiers get information with precision and in less time. But increased connectivity also means more ways for cyberattacks, data leaks, and other breaches in IT (information & technology) security. This remains the issue at the crux of modern cybersecurity problems. However, technological developments would give organizations more techniques and tools to protect themselves from any significant cyberattack on their networks. Various cybersecurity companies are introducing new and enhanced products which can aid cybersecurity professionals in defending legacy and cloud networks, which can help the defense forces to work soundly while keeping their networks safe.

    COVID-19 Impact

    Organizations are speeding up their digital transformation and cyber security as much of the work starts to get online. With this, the operational, legal, reputational, and compliance implications would be significant if the cybersecurity risk is neglected. Out of these organizations, defense is among the top most sector to adopt cyber security solutions to safeguard their confidential data from cyberattacks. Many governments have increased funding for adopting cyber security in the military, which aids the government & military in blocking any upcoming threats and sharing intelligence about the cyber activity. The defense’s increasing adoption of cyber security to secure their database and information has propelled the market growth during the pandemic.

    Market Growth Factors

    Rising IT expenditure for defense

    Defense IT expenses are on the surge across many developed nations. The growth of IT software, hardware, and services has implemented several changes in the defense sector, including live combat surveillance, superiority in air & space, smart weapons and battlefield management in network-centric environments, and force multipliers-related software. In addition, implementing IT solutions has become significant in defense operations due to the increasing evolution in the type and occurrence of attacks globally.

    The rapidly increasing usage of autonomous aircraft

    The rising number of artificial intelligence applications in aircraft may require reliable and high-tech defence cyber security solutions. New technological advancements like the maintenance capability are used to defend the aircraft’s onboard systems from cyber-attacks. These new systems aid in increasing the aircraft defence against cyber threats and give the flight-critical abilities to verify and install multiple software and mission data files onto the aircraft. This development of autonomous aircraft to protect them from cyberattack and ensures their proper operation while being efficient by the military is expected to boost the defence cybersecurity market’s growth.

    Market Restraining Factors

    Less awareness regarding cybersecurity

    Against any intrusion by offenders, criminals, or antagonistic countries, the government workforce is the first line of defence. The internet has made it easier for the antagonist to attack any department, municipality, agency, or department of any nation. Nations with IT technology are easily targeted for malware infections or ransomware attacks. That is why attacker targets under-prepared government bureaucrats with malware, email phishing scams, or stolen passwords to enter and steal confidential government data or lock up critical systems needed for the services and operations. For instance, phishing scams utilize fake emails or text messages to lure individuals into clicking on sketchy website links to steal personal information.

    Deployment Outlook

    By deployment, the defense cyber security market is classified into on-premise and cloud. The cloud segment projected a prominent growth rate in the defense cybersecurity market in 2021. This is because cloud-based technology operates on remote system servers over the internet, which don’t require any dedicated server specialist for maintenance. The cloud-managed services are generally available as SaaS (security as a service) models with annual or monthly charges. These charges cover the monitoring, supervision of network servers, cloud storage for all data, backup recovery, system optimization, etc.

    Type Outlook

    On the basis of type, the defense cyber security market is divided into endpoint security, network security and content security. The endpoint security segment held the highest revenue share in the defense cyber security market in 2021. The growth is due to the increasing usage of behavioral and automation analysis for threat detection. These solutions are considered to be an essential asset of the defense sector. Also, many key players have started to invest heavily in these solutions. Hence, the rising investments, with the growing amount of data across different verticals within the defense sector have surged the segment’s market expansion in the forecasted period.

    Offering Outlook

    Based on offering, the defense cyber security market is bifurcated into solutions and services. The services segment held the highest revenue share in the defense cyber security market in 2021. This is due to their assistance in identifying vulnerabilities, ensuring security, and closing protection gaps, which work efficiently to prevent any cyber breach. With cyber security, organizations attain a synergistic balance from all three facets of defense in depth strategy, which are operation, people, and technology. This would support the market expansion in this segment.

    Application Outlook

    Based on application, the defense cyber security market is segmented into military, public utilities, communication networks and others. The military segment dominated the defense cyber security market with the maximum revenue share in 2021. This is because various defense groups can only operate efficiently if the information is shared securely. Using cyber security systems, the military can send messages, media, reports, and broadcasts while also being able to make secure calls. As a result, security officers may access needed information securely.

    Regional Outlook

    Region-wise, the defense cybersecurity market is analyzed across North America, Europe, Asia Pacific, and LAMEA. The North America region held the highest revenue share in the defense cyber security market in 2021. This is due to the robust presence of various market incumbents, combined with the region’s recent threats. The defense sector in many nations across the region are increasing their spending, which has surged the requirement for defense cyber security. As many developed countries depend on the internet for their daily work and various other operations, cybersecurity applications have increased and thereby boosted the market growth in the region.

    The major strategies followed by the market participants are Partnerships. Based on the Analysis presented in the Cardinal matrix; AT&T, Inc., Intel Corporation and Cisco Systems, Inc. are the forerunners in the Defense Cyber Security Market. Companies such as Thales Group S.A., BAE Systems PLC, and IBM Corporation are some of the key innovators in Defense Cyber Security Market.

    The market research report covers the analysis of key stake holders of the market. Key companies profiled in the report include Intel Corporation, AT&T Inc., IBM Corporation, BAE Systems plc, Thales Group S.A., DXC Technology Company, Cisco Systems, Inc., Raytheon Technologies, Corporation (Collins Aerospace), Lockheed Martin Corporation, Northrop Grumman Corporation.

    Recent Strategies Deployed in Defense Cyber Security Market

    Partnerships, Collaborations and Agreements:

    Nov-2022: Raytheon Technologies came into collaboration with Microsoft, a global IT technology company. This collaboration would aim to upgrade the aerospace and defense businesses employees with cloud-based tools, technologies, and platforms to increase collaboration, enhance operations and discover insights that propel larger value for customers.

    Nov-2022: Lockheed Martin signed an agreement with Microsoft, a global Information technology company. This agreement would aim to help power the next generation of technology for the Department of Defense. The agreement would operate in four critical areas that include Classified Cloud Innovations, 5G.MIL Programs, and Digital Transformation.

    Oct-2022: Cisco announced a partnership with DGC, a company engaged in offering cybersecurity solutions. Under this partnership, the latest cybersecurity package consists of a subset of managed security services that had been created to deliver critical data protection and risk detection abilities with the potential of coping with emerging complex cyber threats in the region.

    Oct-2022: Thales announced a partnership with Monaco Cyber Sécurité, the security player in the principality. Through this partnership, Thales would bring cyber incident feedback to customers in the zone and beyond.

    Jun-2022: BAE Systems teamed up with Clavister, a Europe-based cyber security specialist. This collaboration would aim to enhance the cyber security of its CV90 IFV solution. Additionally, BAE Systems and Clavister integrated its battle-proven technology and years of specialization in cyber security with the new European research and developments in AI technology.

    Mar-2022: Lockheed Martin teamed up with SpiderOak Mission Systems, a U.S.-based software company that creates cybersecurity products and solutions. In this collaboration, both collaborations are developing and testing a zero-trust cybersecurity platform to secure data in the space data supply chain.

    Feb-2022: Northrop Grumman Corporation came into an agreement with Echodyne, the radar platform company. In this Agreement, the companies would work to determinate additional applications for Echodyne’s line of commercially advanced radars.

    Jan-2022: IBM partnered with the Cybersecurity and Infrastructure Security Agency (CISA). In this partnership, IBM would participate as an Alliance partner in the Joint Cyber Defense Collaborative and its critical mission to build a coordinated and collective defense against cybercrime.

    Dec-2021: IBM formed a partnership with Du, Emirates Integrated Telecommunications Company. Under this partnership, Du would leverage IBM’s security software and solutions across its Digital Trust portfolio and it’s Cyber Defense Centre.

    Dec-2021: Thales partnered with Du, an Emirates Integrated Telecommunications Company. The team-up would make sure the DU aligns with Thales’ technology to improve the du Cybersecurity Defense Centre and Digital Trust offering. Data breaches evolving in frequency across the digital landscape and regulatory needs mandating related compliance.

    Oct-2021: Raytheon Technologies collaborated with IBM, a global hybrid cloud and AI and business services provider. In this collaboration, both companies would develop artificial intelligence, quantum, and cryptographic solutions for the intelligence, defense, and aerospace industries, consisting of the federal government. Moreover, with the combined expertise of IBM’s breakthrough commercial research with Raytheon Technologies’ research plus defense and aerospace expertise, both companies would be able to solve challenges.

    Jan-2021: Thales signed an agreement with TT Electronics, a provider of engineered electronics for performance-critical applications. Under this agreement, both companies would allow the future development of operational technology-based cybersecurity research and initiatives. This agreement makes sure TT delivers an additional level of security assurance for its aerospace, medical, industrial, and defense customers who rely on Thales’ to produce highly complex systems.

    Feb-2020: Raytheon Company collaborated with IronNet Cybersecurity, Inc. a network security company that enables nations and enterprises to defend against emerging threats in real-time. The integrated solutions are created to be part of a combined defense portfolio for important infrastructure and national security systems and networks.

    Product Launches and Expansions:

    Oct-2022: BAE Systems unveiled the Viper Memory Loader Verifier II (MLV II), the latest version of maintenance ability that would decrease vulnerability to cyber-attacks for F-16 aircraft. This latest version of the product would consist of cyber-hardened aircraft mission capabilities with an open system architecture that decreases lifecycle costs.

    Nov-2021: AT&T introduced a combined, controlled cybersecurity solution to help U.S. Federal agencies upgrade and secure their IT infrastructure in compliance with TIC 3.0 cybersecurity guidance. AT&T Government trusted Internet integrates and provides fiber connectivity, security capabilities, and software-defined wide area networking (SD-WAN) technology through a single provider.

    Acquisitions and Mergers:

    Oct-2022: Thales acquired S21sec, a European cybersecurity company based in Spain and Portugal, and Excellium, a European cybersecurity company based in Luxembourg and Belgium. Through this acquisition, Thales would add value to the company’s cyber solutions portfolio as well as make sure S21sec and Excellium customers from long-term continuity, improved high-performance solutions, and long-term continuity.

    Jul-2022: Thales took over OneWelcome, a company involved in Customer Identity and Access Management. Under this acquisition, Thales would strengthen its leading place as a global cybersecurity player and a provider of trusted and secure digital identities.

    Mar-2022: BAE Systems acquired Bohemia Interactive Simulations, a global software company at the forefront of simulation training solutions for military and civilian organizations. This acquisition would place BAE Systems to fulfill its customer’ evolving requirements in the quickly rising market for global military training and provide next-generation virtual systems to help the U.S. military and its allies successfully prepare for future scenarios.

    Geographical Expansions:

    Apr-2022: Thales expanded its business to Morocco by opening a Cyber Security Operations Center. This facility would offer real-time security against cyber-attacks in Morocco and across the African Continent. With this facility, Thales strengthen its position as a cybersecurity leader with the creation of the latest security operations center across the African continent.

    Feb-2022: IBM opened a new cyber-security facility in Bengaluru, India. This expansion would address the issues of its clients across the Asia Pacific region and help enterprises plan for and manage the rising threat of cyberattacks to businesses. The Center would operate as a strategic hub for IBM’s cybersecurity activities in the region, consisting of IBM Research, IBM Garage, and IBM Consulting.

    Scope of the Study

    Market Segments covered in the Report:

    By Deployment

    • On-premise

    • Cloud

    By Type

    • Endpoint Security

    • Network Security

    • Content Security

    By Offering

    • Solution

    o Identity & Access Management

    o Security & Vulnerability Management

    o Data loss Prevention Management

    o Threat intelligence & Response Management

    o Unified Threat Management

    o Enterprise risk & Compliance

    o Managed Security

    o Others

    • Services

    By Application

    • Military

    • Communication Networks

    • Public Utilities

    • Others

    By Geography

    • North America

    o US

    o Canada

    o Mexico

    o Rest of North America

    • Europe

    o Germany

    o UK

    o France

    o Russia

    o Spain

    o Italy

    o Rest of Europe

    • Asia Pacific

    o China

    o Japan

    o India

    o South Korea

    o Singapore

    o Malaysia

    o Rest of Asia Pacific

    • LAMEA

    o Brazil

    o Argentina

    o UAE

    o Saudi Arabia

    o South Africa

    o Nigeria

    o Rest of LAMEA

    Companies Profiled

    • Intel Corporation

    • AT&T Inc.

    • IBM Corporation

    • BAE Systems plc

    • Thales Group S.A.

    • DXC Technology Company

    • Cisco Systems, Inc.

    • Raytheon Technologies Corporation (Collins Aerospace)

    • Lockheed Martin Corporation

    • Northrop Grumman Corporation

    Unique Offerings

    • Exhaustive coverage

    • Highest number of market tables and figures

    • Subscription based model available

    • Guaranteed best price

    • Assured post sales research support with 10% customization free
    Read the full report: https://www.reportlinker.com/p06422353/?utm_source=GNW

    About Reportlinker
    ReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need – instantly, in one place.

    __________________________

    source

  • New power system cybersecurity architectures can be 'vaults … – Utility Dive

    Let Utility Dive’s free newsletter keep you informed, straight from your inbox.

    Topics covered: smart grid tech, clean energy, regulation, generation, and much more.
    Topics covered: utility-scale storage, distributed storage, storage technologies, policy and regulations, and more.
    Topics covered: load mgmt, dynamic pricing, energy efficiency, and much more.
    In partnership with
    Topics covered: solar tech, business models, regulation and policy, distributed solar, utility solar.
    In partnership with
    Layered, automated, deep defenses for growing distribution system vulnerabilities will be tested by an NREL-private partnership.
    New utility cybersecurity strategies are needed to counter sophisticated intrusions now threatening the operations of an increasingly distributed power system’s widening attack surface, security analysts agree.
    There are cyber vulnerabilities in “every piece of hardware and software” being added to the power system, the September 2022 Cybersecurity and Infrastructure Security Agency, or CISA, Strategic Plan 2023-25 for U.S. cybersecurity reported. Yet 2022 saw U.S. utilities propose $29.22 billion for hardware and software-dependent modernizations, the North Carolina Clean Energy Technology Center reported Feb. 1.
    New hardware and software can allow malicious actors to have insider access through utilities’ firewalled internet technology to vital operations technology, cyber analysts said.
    “No amount of traditional security will block the insider threat to critical infrastructure,” said Erfan Ibrahim, CEO and founder of independent cybersecurity consultant The Bit Bazaar. “The mindset of trusted versus untrusted users must be replaced with a new zero trust paradigm with multiple levels of authentication and monitoring,” he added.
    Growing “distribution system entry points” make “keeping hackers away from operations infrastructure almost unworkable,” agreed CEO Duncan Greatwood of cybersecurity provider Xage. But distributed resources can provide “resilience” if a distributed cybersecurity architecture “mirrors” the structure of the distribution system where they are growing to “contain and isolate intrusions before they spread to operations,” he said.
    New multi-level cybersecurity designs can provide both rapid automated distributed protections for distributed resources and layers of protections for core assets, cybersecurity providers said. But the new strategies remain at the concept stage and many utilities remain unwilling to take on the costs and complexities of cybersecurity modernization, analysts said.
    Critical infrastructure is already vulnerable to insider attacks. 
    The 2021 Colonial Pipeline shutdown started with a leaked password, according to public reports. A 2019-2020 attack known as SUNBURST and directed against U.S. online corporate and government networks went through SolarWinds and other software vendors, CISA acknowledgedAnd Russia’s 2015 shutdown of Ukraine’s power system was through authenticated credentials, likely using emails, CISA also reported.
    In 2021, there were ransomware attacks on 14 of the 16 U.S. “critical infrastructure” sectors, including the energy sector, the FBI reported. And new vulnerabilities allowed attacks that also caused data losses, disrupted network traffic, and even denial-of-service shutdowns, according to technological and research firm Gartner.
    Attacks on utility OT can come through distributed solar, wind and storage installations, employee internet accounts, smart home devices, or electric vehicles, Gartner, other analysts, and the May 2021 Biden executive order requiring improved power system cybersecurity agreed.
    Existing Critical Infrastructure Protection, or CIP, Reliability Standards established by the North American Electric Reliability Corporation, or NERC, are inadequate, a January 2022 Notice of Proposed Rulemaking from the Federal Energy Regulatory Commission said. They focus only on defending the “security perimeter of networks,” the commission said.
    “Vendors or individuals with authorized access that are considered trustworthy might still introduce a cybersecurity risk,” the rulemaking said. The RM22-3-000 proceeding will provide direction on how to update CIP standards to better protect utilities, federal regulators added.
    The most recent Biden administration and FERC initiatives focused on the power sector, though utilities and system operators declined to reveal information about vulnerabilities or actual attacks.
    There were an “all-time high” 20,175 new OT vulnerabilities in U.S. networks identified by cybersecurity analysts in 2021, according to a 2022 assessment by cybersecurity provider Skybox Security. And faster and more frequent exploitation of new vulnerabilities in 2021 showed “cyber-criminals are now moving to capitalize on new weaknesses,” it added.
    A December 2021 CISA Emergency Directive recognized exploitation of a vulnerability in the Apache Log4j tool that records and scans almost all communications between online systems, the Wall Street Journal reported at the time. Downloaded millions of times, it could allow attackers to send and execute malicious code and is unlikely to be “fully ‘fixed’ for years,” cybersecurity specialist Wei Chieh Lim blogged in May 2022.
    The Log4j vulnerability “was so trivial it was first exploited by Minecraft gamers,” showing utilities could be unaware of “hundreds, if not thousands, of vulnerabilities,” said CEO Tony Turner of cybersecurity provider Opswright.
    A software bill of materials, or SBOM — an inventory of all system components — could be a solution to vulnerabilities like Log4j, cyber analysts said.
    SBOMs were mandated by the May 2021 Biden executive order. And SBOM best practices and minimum requirements were added in a July 2021 National Telecommunications and Information Administration report. But SBOMs “are only one element” in the needed cybersecurity rethinking, consultant and provider Ibrahim said.
    Internet technology began with firewalls and outward-facing defenses, but new distributed power systems make penetrations into the outer layers of networks almost inevitable, Ibrahim and other cybersecurity analysts said. Only a multi-faceted cybersecurity architecture throughout a utility’s operations can protect both OT’s new distributed attack surface and its vital operational core, many agreed.
    The most common utility cybersecurity approach is compliance with NERC CIP standards, and possibly with narrower International Society of Automation, or ISA, 62443 standards, Opswright’s Turner said. But the NERC CIP standards are being reformed and ISA standards “are narrowly focused on vulnerabilities in automation and control systems,” Turner said. 
    A new Department of Energy “cyber-informed engineering,” initiative may offer better cybersecurity for critical infrastructure, Turner said. It proposes to “engineer out” risk “from the earliest possible phase of design” of the OT system’s cyber-defense, which is “the most optimal time to introduce both low cost and effective cybersecurity,” DOE’s paper said.
    Utilities need to “close the gap” between IT and OT systems, said Skybox’s Senior Technical Director David Anteliz. But the “complexity of multi-vendor technologies” and “disjointed architectures across IT and OT” increase security risk, as do increased accesses by third parties for which “less than half” of utilities have policies, a Skybox November 2021 survey found.
    “I can guarantee you there are people doing things in the background at utilities now,” Anteliz said. “Skybox’s answer is automation of defense-in-depth and layered architecture, which provides ongoing monitoring, visibility, understanding and response to what needs to be secured and where,” he added.
    Segmentation in the design can isolate utility control rooms and make them “vaults,” Skybox’s 2022 vulnerability trends paper said. And automated aggregation of data and system information from “every corner of the network” can inform automated reactions and provide “ongoing oversight” that allows utilities to move “from reaction to prevention,” it added.
    Other cybersecurity analysts have designed detailed zero trust and defense-in-depth conceptual architectures that can be applied to the U.S. power sector.
    The first of “four functional levels of security” is basic “network hygiene,” by establishing user access rules and priority lists, use cases, and necessary transactions, the Bit Bazaar’s Ibrahim said. Properly applied interactions can be limited “to those who need to transact,” he said.
    The second level is a “signature-based intrusion detection system,” or IDS, which automates the established priority lists to limit accesses to “authenticated users and a valid use case,” he said. The third level is a “context-based” IDS, which expands on the access limitations by “blocking or flagging” inadequately authenticated transactions, Ibrahim said.
    Those IDS function “in stealth mode,” unseen even by insiders, but every network session is monitored, and any “departure from normal transactions and rules” terminates the session, he said. Utility security incident and event management systems detect and analyze all transactions, and respond to and report those questioned or terminated, Ibrahim said.
    The fourth level, “endpoint security,” is overseen by automated “hypervisor” software and has three layers of protection, Ibrahim said. An intrusion may “corrupt” target applications, but the “endpoint hardware” will be protected by the hypervisor and a “last gasp message” may allow a network edge mesh or network core defenses to avoid a “cascading” OT network failure, he added.
    Mesh “is a collaborative ecosystem of tools and controls” to protect a power system’s expanding perimeter of distributed resources and vulnerable third-party devices, according to Gartner. Its “distributed security tools” offer “enhanced capabilities for detection” and “more efficient responses” to intrusions, Gartner added.
    Mesh cannot eliminate insiders with “legitimate credentials,” which is why utility hardware- and software-dependent system modernizations “should have multi-layer defenses and every line of new code checked,” Ibrahim said. But “if a system is compromised at its edge, like at the level of smart meters or EV chargers, mesh can respond to avoid the compromise spreading,” he said.
    These conceptual architectures “can increase situational awareness and control,” but most utilities are still focused on complying with NERC CIP standards to avoid fines, Opswright’s Turner said. Many utilities argue that designed cyber-defense “complexities can slow and confuse system monitoring and responses,” and that the increased security does not justify the cost, he added.
    It is, however, “not clear there is a better choice,” because firewalling the coming power system’s potentially millions of distributed devices “is not practical,” he said.
    A hierarchical zero trust architecture with a firewalled core, a monitored middle layer of gateways protecting operations and a mesh at the network’s edge is the emerging consensus solution to comprehensive OT system security, Turner, Ibrahim and others agreed.
    But attacks are proliferating despite federal directives and mandates and proposed provider concepts, showing more work is needed, cyber-experts and power system stakeholders agreed.
    Work continues in the public and private sectors to develop zero-trust tools and technologies that will enable the conceptual architectures to better defend OT for the electric power and other sectors.
    The Clean Energy Cybersecurity Accelerator, or CECA, program from DOE’s National Renewable Energy Laboratory, launched in December, is a “sandbox” for innovative cybersecurity pilot projects. It will deploy and test strategies for addressing new power system vulnerabilities introduced by clean energy technologies, the CECA website said.
    “U.S. critical infrastructure is increasingly targeted by adversaries,” NREL Director, Cybersecurity Research Program, Jonathan White told a January 17 CECA planning webinar. Funded by the program’s utility sponsors, which include Duke Energy, Xcel Energy and Berkshire Hathaway, or BHE, solutions will be assessed using NREL’s Advanced Research on Integrated Energy Systems, “Cyber Range,” NREL scientists told the webinar.
    The Cyber Range is NREL’s proprietary, up-to-20 MW renewables-powered system integrated with distributed resources like electric vehicles and batteries and built for testing innovative technologies, according to NRELFirst CECA demonstrations will test Xage, Blue Ridge Networks and Sierra Nevada Corp. cyber defense approaches.
    BHE wants to leverage NREL’s “rigorous testing,” to find “technical solutions” and effective “fast-track technologies” to improve cyber defenses, BHE Spokesperson Jessi Strawn said.
    CECA will allow utilities and solution providers to “stress-test disruptive security technologies,” and give “defenders” an opportunity to “get ahead of threat actors,” added a statement from BHE Director of Security and Resilience Jeffrey Baumgartner.
    Duke Energy is “regularly approached by vendors who have innovative technologies” and CECA is a way to “test them in a non-live environment,” said Duke spokesperson Caroline Portillo. The opportunity is especially valuable because the tests will be “at scale in a sandbox environment,” and will be followed by technical performance assessments by participating sponsor utilities, she added.
    Results of initial tests for authenticating and authorizing distributed energy resources integrated into OT environments “will be critical” as Duke and other utilities add those resources, Portillo said.
    “The point of the NREL program is to build a neutral ground for solution providers and utilities to collaborate on OT cybersecurity innovations,” said Xage CEO Greatwood. “Tech companies have been frustrated by the stately pace of change in the utility business,” he added.
    But if “end user utilities engage” in CECA, “tech companies will gain [an] understanding of their needs” and utilities can “obtain technical validation” of solutions, he added. “Xage already has utility customers,” but this is a chance for it to demonstrate how an automated, widely-present mesh defense like Xage Fabric works “in a zero trust cybersecurity architecture for OT environments,” Greatwood said.
    A system “is only as secure as its weakest link” and “the weakest link in power systems with millions of distributed resources is not very secure because it offers a lot of entry points for attackers,” he said. “Mesh architecture mirrors the distributed physical architecture” and “can recognize and isolate, or at least control,” intruders without proper authorization and authentication, Greatwood added.
    The power system environment “is evolving” toward “growing network, infrastructure and architectural complexity,” and “vulnerabilities will persist,” Gartner observed in January 2022.
    But those vulnerabilities must be addressed because limiting “access to critical systems can be the greatest impediment to cyber breaches,” Ibrahim said. Building the best protections “may take time, money and a change in management processes, but those are small costs compared to the billions that can be lost from a successful intrusion,” he added.
    Get the free daily newsletter read by industry experts
    At least $4 billion of the tax credits under the expanded Qualifying Advanced Energy Project Credit program must go to projects at closed coal mines or retired coal-fired power plants.
    The rules will require federally funded chargers to be built in the United States, beginning with final assembly and some manufacturing processes.
    Keep up with the story. Subscribe to the Utility Dive free daily newsletter
    Keep up with the story. Subscribe to the Utility Dive free daily newsletter
    Subscribe to Utility Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    At least $4 billion of the tax credits under the expanded Qualifying Advanced Energy Project Credit program must go to projects at closed coal mines or retired coal-fired power plants.
    The rules will require federally funded chargers to be built in the United States, beginning with final assembly and some manufacturing processes.
    The free newsletter covering the top industry headlines

    source

  • IT security budgets triple as businesses confront more cyberattacks … – Cybersecurity Dive

    Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

    The report highlights the growing risk cyberattacks pose to businesses across the globe, as well as the increased financial toll these attacks are having on corporate finances. 
    Companies are spending millions of dollars to protect their data and operations against sophisticated attacks, the survey found. 
    The insurance industry is encountering additional pressures to protect companies against increasingly expensive disruptions and data loss, which places added pressure on the industry to protect its own profitability against potentially catastrophic business claims. 
    “Cyber risk has risen to the same strategic level as traditional financial and operational risks, thanks to a growing realization by business that the impact can be just as severe,” Alana Muir, head of cyber at Hiscox, said in a statement. 
    “While there has been some fluctuation over the years, cyberattacks are on the rise, so the increased focus and investment from businesses to minimize damage to their brand, operations and customers is positive.” 
    The report is based on a survey of more than 5,100 executives, IT managers, department heads and other executives across the U.K., U.S., France, Germany, Belgium, Spain, Ireland and the Netherlands.
    Get the free daily newsletter read by industry experts
    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
    Enterprise cybersecurity is navigating market turmoil and vendor consolidation. Here’s what experts expect to happen to the industry in 2023.
    Subscribe to Cybersecurity Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
    Enterprise cybersecurity is navigating market turmoil and vendor consolidation. Here’s what experts expect to happen to the industry in 2023.
    The free newsletter covering the top industry headlines

    source

  • Cardiovascular Associates Files Notice of Data Breach, Leaking … – JD Supra

    On February 3, 2023, Cardiovascular Associates (“CVA”) filed a notice of data breach with the Attorney General of California after the company learned that certain systems within its network were subject to unauthorized access. Based on the company’s official filing, the incident resulted in an unauthorized party gaining access to consumers’ names, Social Security numbers, dates of birth, medical and treatment information, billing and claims information, financial account information, and credit/debit card information. After confirming that consumer data was leaked, Cardiovascular Associates began sending out data breach notification letters to all individuals who were impacted by the recent data security incident.
    If you recently received care through a Cardiovascular Associates provider, you probably didn’t think twice before giving medical staff all the information they asked for. Some of this undoubtedly included information that you would usually safeguard. Of course, because these doctors are renowned healthcare providers, you trusted Cardiovascular Associates. However, in the wake of the Cardiovascular Associates data breach, many patients are raising questions about the organization’s commitment to patient privacy. As we’ve discussed in prior posts, healthcare providers have a duty to protect the patient information in their possession, and, if a provider negligently leaks this sensitive information, they may be liable through a data breach lawsuit.
    The available information regarding the Cardiovascular Associates breach comes from the company’s filing with the Attorney General of California as well as notice posted on the CVA website. According to these sources, on December 5, 2022, CVA learned that some of its computer systems may have been subject to unauthorized access. In response, CVA restricted access to its network and began working with a forensics firm to investigate the incident and determine what, if any, patient information was leaked as a result of the incident.
    Upon discovering that sensitive consumer data was made available to an unauthorized party, Cardiovascular Associates began to review the affected files to determine what information was compromised and which consumers were impacted. While the breached information varies depending on the individual, it may include your full name, date of birth, and address, Social Security number, health insurance information, medical and treatment information, billing and claims information, passport and driver’s license number, credit and debit card information, and financial account information.
    On February 3, 2023, Cardiovascular Associates sent out data breach letters to all individuals whose information was compromised as a result of the recent data security incident.
    Cardiovascular Associates is a healthcare practice based in Birmingham, Alabama. The practice provides heart and vascular care services, advanced cardiac imaging, preventative cardiology, and interventional cardiology. Cardiovascular Associates is affiliated with Brookwood Baptist Health, a large-scale provider of healthcare services across Alabama. Cardiovascular Associates operates 11 locations across Alabama. Cardiovascular Associates employs more than 129 people and generates approximately $20 million in annual revenue. Brookwood Baptist Health employs more than 4,300 people and generates approximately $1.2 billion in annual revenue.
    See more »
    DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.
    © Console and Associates, P.C. | Attorney Advertising
    Refine your interests »
    Back to Top
    Explore 2023 Readers’ Choice Awards
    Copyright © JD Supra, LLC

    source