<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Amazon Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/amazon/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/amazon/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 03 Sep 2020 21:11:27 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Amazon Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/amazon/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 044 How Secure is the Cloud?</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-044-how-secure-is-the-cloud/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 23:05:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Amazon S3 buckets]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[AWS S3]]></category>
		<category><![CDATA[AWS S3 buckets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[How Secure is the Cloud]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[S3]]></category>
		<category><![CDATA[S3 buckets]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[Shared Folder Security]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2277</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 44. This week we&#8217;re going to talk about how secure is the cloud? How Secure is the Cloud? That&#8217;s a silly question, isn&#8217;t it? Every day millions of people all across the world store data in the cloud. Now the cloud storage providers offer great tools and features for us to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-044-how-secure-is-the-cloud/">#WeekendWisdom 044 How Secure is the Cloud?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 44. This week we&#8217;re going to talk about how secure is the cloud?<span id="more-2277"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2277-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4</a></video></div>
<h3>How Secure is the Cloud? That&#8217;s a silly question, isn&#8217;t it?</h3>
<p>Every day millions of people all across the world store data in the cloud. Now the cloud storage providers offer great tools and features for us to be able to secure our data on their infrastructure. But who is responsible for securing our data on their infrastructure?</p>
<p>You &#8230; or your IT team &#8230; or your security people. But it&#8217;s not totally the cloud storage provider&#8217;s responsibility to keep that data safe. They do have some responsibility but not as much as you might expect.</p>
<h3>Can I get a for example?</h3>
<p>For example, lots of us use things like Dropbox and Google Drive to be able to share data with people, including people outside of our organisations. Now after you finish a project with somebody and if you might have shared folders with them, do you go back in and revoke their access to that? Because if you don&#8217;t actively do so, they&#8217;re still gaining access to that data for months and years later. If you continue to use that folder, they&#8217;re still getting access to up-to-date data. So you have got to review any shared folders like that and revoke access where appropriate.</p>
<h3>Anything else?</h3>
<p>Similarly, on things like Amazon S3 buckets, which I talked about <a href="https://www.l2cybersecurity.com/cloud-security-your-responsibility/" target="_blank" rel="noopener noreferrer">three years ago</a>, a security firm last month had done an analysis and they found 4,000 Amazon S3 buckets that were publicly accessible. Very easy to get into and to find data. A lot of these S3 buckets had secret information in there, passwords etc.</p>
<p>So if you use Amazon S3 buckets, please do a good review on their security and put passwords on them and other security features. You might need to check to see if your staff might be using one quietly. You can get more details on <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/" target="_blank" rel="noopener noreferrer">Shadow IT here</a>.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We can conduct an audit on your infrastructure and look for signs of Cloud Storage. When we find it, we can provide guidance on securing it appropriately.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-044-how-secure-is-the-cloud/">#WeekendWisdom 044 How Secure is the Cloud?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4" length="24671618" type="video/mp4" />

			</item>
		<item>
		<title>Data Breaches Everywhere</title>
		<link>https://www.l2cybersecurity.com/data-breaches-everywhere/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 16:30:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[Quora]]></category>
		<category><![CDATA[VisionDirect]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1482</guid>

					<description><![CDATA[<p>It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. It really does look there&#8217;s data breaches everywhere you look. The worry about&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1497" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg" alt="data breaches everywhere" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. <span id="more-1482"></span>It really does look there&#8217;s data breaches everywhere you look. The worry about this, is that people may just think that this is the new normal and put up with it.</p>
<p><strong>Updated 05/12/18:</strong> To include the Dell, potential breach.</p>
<p>Last Wednesday, Dell announced a potential cybersecurity incident. This was followed on Friday when it was revealed that Marriott International Hotels had a massive 500m  records stolen. These were all forgotten by Monday for most normal people and then later on Monday Quora, an online question and answer forum had 100m records stolen. A couple of weeks ago, Amazon notified an unknown number of customers that their name and e-mail address were exposed. Earlier in the month, VisionDirect in the UK had lost payment card data for an undisclosed number of customers.</p>
<p>That&#8217;s just 5 companies that you probably <span style="text-decoration: underline;"><strong>have</strong></span> heard of. I covered the <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/" target="_blank" rel="noopener">NUI Galway breach</a> separately a couple of weeks ago. There were lots <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-november-2018-251-286753-records-leaked" target="_blank" rel="noopener">more breached last month</a>. I&#8217;ll give a synopsis on each one of the five and then discuss what can happen.</p>
<h3>Quora have some questions to answer</h3>
<p>So <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Quora-Security-Update-2018-12-03.pdf" target="_blank" rel="noopener">Quora had ~100m records accessed</a> by persons unknown. They detected the issue on Friday 30th November and on Monday 3rd December they endeavoured to contain the issue. They logged out the impacted individuals and forced them to reset their passwords when they log back in. What was taken by the bad guys?</p>
<ul>
<li>
<blockquote><p>Account information, e.g. name, email address, encrypted (hashed) password, data imported from linked networks when authorized by users</p></blockquote>
</li>
<li>
<blockquote><p>Public content and actions, e.g. questions, answers, comments, upvotes</p></blockquote>
</li>
<li>
<blockquote><p>Non-public content and actions, e.g. answer requests, downvotes, direct messages</p></blockquote>
</li>
</ul>
<p>They claim not many subscribers used the direct messages features, so really the most important items lost here was the account information.</p>
<h3>Marriott reserve second place in the data breach tables</h3>
<p>I actually missed this <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Marriott-Announces-Starwood-Guest-Reservation-Database-Security-Incident-2018-11-30.pdf" target="_blank" rel="noopener">story on Friday the 30th November</a>, as I had promised a customer a security assessment report by the end of the week. So I stayed off social media for the day, while I completed it. There were a LOT of tweets to get through that night! ? This is currently the second biggest data breach in history after Yahoo!&#8217;s almost impossible to match <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/" target="_blank" rel="noopener">record breaking 3 billion accounts breach</a> as revealed in October 2017. So what did Marriott lose? The contents of the Starwood guest reservation database, going back as far as 2014, containing:</p>
<ul>
<li>
<blockquote><p>For approximately 327 million of these guests, the information includes some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences.</p></blockquote>
</li>
<li>
<blockquote><p>For some, the information also includes payment card numbers and payment card expiration dates, but the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128).  There are two components needed to decrypt the payment card numbers, and at this point, Marriott has not been able to rule out the possibility that both were taken.</p></blockquote>
</li>
<li>
<blockquote><p>For the remaining guests, the information was limited to name and sometimes other data such as mailing address, email address, or other information.</p></blockquote>
</li>
</ul>
<p>Some of the data lost is genuinely concerning. Particularly the payment card information.</p>
<h3>Bad guys try to ding dong Dell</h3>
<p>This may or may not have been a breach. <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Dell-Announces-Potential-Cybersecurity-Incident-2018-11-28.pdf" target="_blank" rel="noopener">Dell haven&#8217;t given away too much information</a>. Their security measures detected unauthorised activity that was &#8230;</p>
<blockquote><p>&#8230; attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords.</p></blockquote>
<p>Dell couldn&#8217;t say at this point whether these details were actually extracted from their systems by the bad guys. But even if they were unsuccessful in taking data, this just demonstrates that even massive companies like Dell can be broken into. Massive companies like &#8230; ⬇⬇⬇</p>
<h3>Prime example of poor communication from Amazon</h3>
<p>The <a href="https://www.theregister.co.uk/2018/11/21/amazon_data_breach/" target="_blank" rel="noopener">Amazon data breach</a> on 21st November doesn&#8217;t seem too bad. All that might have been compromised was name and e-mail address. However their notification to affected customers was pretty poor.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1483 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png" alt="amazon breach email" width="648" height="296" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png 648w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email-300x137.png 300w" sizes="(max-width: 648px) 100vw, 648px" /></p>
<p>A lot of security professionals have said that this looks very &#8220;scammy&#8221;. While I would tend to agree as it&#8217;s very light on any details, there&#8217;s no suggestion that the recipient should take some urgent action. If that had been the case, I would fully agree.</p>
<h3>Is there short-sighted security in place at VisionDirect?</h3>
<p>Back on the 19th November, VisionDirect in the UK <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Customer-data-theft-_-Vision-Direct-UK-2018-11-03.pdf" target="_blank" rel="noopener">issued a statement</a> about a data breach. The breach affected customers who updated their details or placed orders between the 3rd November and 8th November. What data was accessed by the evil doers?</p>
<blockquote><p>The personal information was compromised when it was being entered into the site and includes full name, billing address, email address, password, telephone number and payment card information, including card number, expiry date and CVV.</p></blockquote>
<p>In fairness to them, they were very specific about the timeframe when the website was compromised. &#8220;Between 12.11am GMT 3rd November 2018 and 12.52pm GMT 8th November 2018.&#8221; This was repeated ad nauseam.</p>
<h3>What can happen when there are data breaches everywhere?</h3>
<p>A common feature of all the above breaches are names and email addresses. While you might not think these are worth anything, 50,000 valid email addresses can be sold for up to $50 on criminal exchanges on the &#8220;dark web&#8221;. I hate that term by the way. It&#8217;s so &#8220;hackery&#8221;. Anyway, your email address has a small, but material value.</p>
<p>Payment card data is the next thing that is of immediate value, particularly where the bad guys have the CVV/3 digit security number. These can be immediately put to work purchasing vouchers which are then immediately spent. The card numbers are also valuable on their own and sell for up to $60 each. While Marriott had the credit card numbers encrypted, they were not sure if the required information to decrypt them again was also exposed. So I would assume that it was.</p>
<p>Passwords are the next concern. Quora had &#8220;hashed&#8221; passwords which is good. These are hard (but not impossible) to crack. They also forced a password reset on affected subscribers, so that&#8217;s another mitigation. With VisionDirect, the password was totally compromised. This is because it was captured when a user was signing on to the site. They forced password changes on people who were impacted. However, if the password is used on ANY other account, particularly email, banking and social media, then you must change them all.</p>
<p>The rest of the data that was breached is still incredibly useful to the criminals. In particular from the Marriott breach. They have reservation details, probably into the future. So they know the future likely movements of people. They have loyalty card information, which, along with other data points, can be used to compromise a person&#8217;s Starwood&#8217;s Preferred Guest account and re-direct the rewards elsewhere.</p>
<p>The amount of data leaked, over such a long time at Marriott is pretty bad. This can be merged with lots of other data breaches and the evil doers can build quite a profile on each individual. I&#8217;ve discussed before how <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/" target="_blank" rel="noopener">breached data from multiple sources</a> can be put to evil use.</p>
<p>Data breaches everywhere indeed.</p>
<h3>How can we help?</h3>
<p>As the saying goes, preparation is half the battle. If you&#8217;ve not prepared to handle a data breach, it will be a much bigger struggle. We can help you prepare, both for a breach and handling the aftermath.</p>
<p>If you want to discuss further, please call on <span style="color: #0000ff;"><strong>087-436-2675</strong></span> or send an e-mail to <strong><a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a></strong> and somebody will get in touch. We will make it straightforward and easy for you to be ready for an incident.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>#GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
