<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Best Practice Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/best-practice/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/best-practice/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 14:54:35 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Best Practice Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/best-practice/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NUI Galway Data Breach &#8211; Lessons learned?</title>
		<link>https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Nov 2018 10:16:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1451</guid>

					<description><![CDATA[<p>The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick may have had personal data on 5% of the student population. This 5% of an 18,000 student population&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1456" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg" alt="nui galway data breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. <span id="more-1451"></span>If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick <em><strong>may</strong></em> have had personal data on 5% of the student population. This 5% of an 18,000 student population gives us approximately 900 individuals being impacted by this breach. That personal data <em><strong>may</strong></em> have included exam results, as reported <a href="https://www.independent.ie/irish-news/news/university-at-centre-of-potential-data-breach-after-usb-stick-goes-missing-37542617.html" target="_blank" rel="noopener">by the Irish Independent</a>.</p>
<blockquote><p>While the University is unclear on the contents of the portable device, it may have held a file containing names of approximately 5% of the student body, their student number and exam results.</p></blockquote>
<p>It&#8217;s the uncertainty that is most worrying to me. Also their claim that they have strict policies in place relating to portable devices is a bit disingenuous. I&#8217;ve been through <a href="http://www.nuigalway.ie/about-us/office-secretary/policies-procedures/" target="_blank" rel="noopener">the policies</a> and also looked at their <a href="http://www.nuigalway.ie/data-protection/" target="_blank" rel="noopener">data protection section</a> and found some conflicting direction with regard to data handling and USB memory sticks.</p>
<p>The <a href="http://www.nuigalway.ie/media/oifiganrunai/files/QA401-Data-Handling.pdf" target="_blank" rel="noopener">Data Handling Policy</a> states the following about &#8220;NUI Galway Highly Restricted&#8221; data:</p>
<blockquote><p>Storage of this data outside of the source system, for example on a laptop or memory stick; must be approved by the data owner. Where data is held outside the source system it must be encrypted.</p></blockquote>
<p>That seems quite sensible, as approval would mean that somebody would know exactly what data is on there and it would then be encrypted. However their <a href="http://www.nuigalway.ie/media/informationsolutionsservices/files/ictpolicies/QA409_encryption-policy.pdf" target="_blank" rel="noopener">Encryption policy</a>, has something else to say on USB memory sticks:</p>
<blockquote><p>Portable storage capability such as DVD’s, CD’s and USB flash drives should not be utilised for classified data storage or transfer, even in an encrypted format.</p></blockquote>
<p>So the handling policy says it&#8217;s fine, but the encryption policy says no. It&#8217;s obvious that the data handling policy wasn&#8217;t followed with this data breach.</p>
<p>I thought it interesting that they have plenty on their site for how to use USB memory sticks and the <a href="http://www.nuigalway.ie/information-solutions-services/servicesforstaff/pcsuites/usbstorage/" target="_blank" rel="noopener">protections they have in place</a>.</p>
<blockquote><p>ISS have <strong>disabled Autorun</strong> on the all computers in the PC Suites as a precautionary measure to prevent the spread of viruses.  When autorun is disabled, a USB memory stick or software on a CD or DVD will no longer automatically start when inserted.</p></blockquote>
<p>So that&#8217;s great &#8230; lots of protection there &#8230; or maybe not. What if the USB device impersonated a keyboard? It could inject keystrokes that open up a command line, execute a command to download dodgy software and execute it. <a href="https://www.howtogeek.com/203061/don%E2%80%99t-panic-but-all-usb-devices-have-a-massive-security-problem/" target="_blank" rel="noopener">I&#8217;m not making this up</a>. The USB stick could also fry the electronics on your computer. Again <a href="https://www.l2cybersecurity.com/usb-machine-killer/" target="_blank" rel="noopener">this is something that happens</a>.</p>
<p>These USB memory sticks are such a problem from a data breach perspective that I always recommend companies and organisations to either block them completely or put in place a solution that automatically encrypts all data on them.</p>
<p>I did dedicate <a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">an entire commandment</a> to USB memory sticks. So you can get my deeply held views in there.</p>
<p>The NUI Galway data breach was an embarrassment for the University. I don&#8217;t think the exam results could be classified as sensitive personal data (special category). But I&#8217;m sure students wouldn&#8217;t like these been released publicly. As long as the powers that be learn a lesson from this sorry situation and implement more rigorous technical solutions, then it will hopefully prevent future, larger and more sanction-worthy breaches.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerable Shopping Carts lead to Credit Card breaches</title>
		<link>https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 21 Sep 2018 10:49:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Magecart]]></category>
		<category><![CDATA[Plugins]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1402</guid>

					<description><![CDATA[<p>You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more. If you operate some kind of&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1403" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg" alt="Vulnerable Shopping Carts" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />You may have heard about the <a href="https://www.rte.ie/news/2018/0627/973682-ticket-master-data/">Ticketmaster data breach</a> earlier this summer. You probably also have heard about the <a href="https://www.theguardian.com/business/2018/sep/07/british-airways-data-breach-what-to-do-if-you-have-been-affected">British Airways data breach</a> at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more.<span id="more-1402"></span> If you operate some kind of eCommerce site, where you have a checkout that collects credit card details for orders, then you need to check if you have been potentially compromised.</p>
<h3>What caused these vulnerable shopping carts?</h3>
<p>Basically the bad guys are sneaking in via plugins to the websites. It was very similar to how crypto-currency mining code <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">infiltrated UK government websites</a> earlier this year. In the case of the vulnerable shopping carts of Newegg, they plugged their nasty code into the &#8220;Feedify&#8221; plugin. This plugin is used to gather feedback from customers.</p>
<p>So when a customer browsed to the Newegg site, the webserver loads up the website. It then goes and brings in the code from the plugins. The Feedify plugin that was compromised gets loaded and the malicious code starts monitoring. It&#8217;s waiting for credit card information to be typed in. Once it gets that, it sends it off to the evil doers, a hacking group called <a href="https://www.riskiq.com/blog/labs/magecart-british-airways-breach/">Magecart</a>. This code was used to compromise the &#8220;Inbenta&#8221; customer service plugin with Ticketmaster and the &#8220;Modernizr&#8221; plugin for BA.</p>
<h3>So how can I protect my website from this?</h3>
<p>Well, you&#8217;ll need your web-person to do a couple of things.</p>
<ol>
<li>Define a Content Security Policy (CSP) for your website</li>
<li>Set-up Sub Resource Integrity (SRI) verification of your website plug-ins</li>
</ol>
<p>CSP will basically state the trusted locations that your website can load plugins from, so make sure these are set for your own site and that of your payment provider.</p>
<p>SRI is where you generate a &#8220;hash&#8221; (a unique code based on the content of an item) for your plugins when you create the site. When the plugin gets loaded by the browser of a customer, the plugin gets re-hashed and if the value does not match the original hash, then it has been altered.</p>
<p>You can get more details on CSP and SRI from <a href="https://scotthelme.co.uk/hardening-payment-forms-with-csp/">Scott Helme&#8217;s blog</a>.</p>
<p>In the meantime, #LetsBeCarefulOutThere.</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Eir laptop theft &#8211; could have been worse</title>
		<link>https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Aug 2018 11:11:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1346</guid>

					<description><![CDATA[<p>The eir laptop theft that was revealed this week was pretty &#8230; actually &#8230; it was really bad and deeply embarrassing for eir. However details that emerged from the statement by the Data Protection Commission showed that it could have been a LOT worse. 1,500 Laptops worse! First up though I did a short video recently&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/">Eir laptop theft &#8211; could have been worse</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1349" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1-150x150.jpg" alt="eir laptop" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />The eir laptop theft that was revealed this week was <del>pretty</del> &#8230; actually &#8230; it was really bad and deeply embarrassing for eir. However details that emerged from the <a href="https://www.dataprotection.ie/docs/EN/22-08-2018-Statement-by-Data-Protection-Commission-in-relation-to-Eir-breach-notification/m/1783.htm" target="_blank" rel="noopener">statement by the Data Protection Commission</a> showed that it could have been a LOT worse. 1,500 Laptops worse!<span id="more-1346"></span></p>
<p>First up though I did <a href="https://www.l2cybersecurity.com/data-breach-video-series-mobile-device-loss/" target="_blank" rel="noopener">a short video</a> recently explaining why loss of mobile devices (including laptops) is a Data Breach under #GDPR. Have a quick watch and then come back here.</p>
<h3>Why was the laptop not encrypted?</h3>
<p>They&#8217;ve not specified exactly what happened, but I surmise that eir use a third party package to secure their mobile devices and some of the many <a href="https://www.computerworld.com/article/3216425/microsoft-windows/microsoft-patch-alert-mainstream-august-patches-look-remarkably-good.html?nsdr=true&amp;page=2" target="_blank" rel="noopener">problematic monthly updates</a> that Microsoft released in July caused them issues. It must have been bad for them to have to decrypt 1,500 laptops. In fairness to eir, they at least notified the Data Protection Commission (DPC) about this on the 10th of August.</p>
<h3>What happened next?</h3>
<p>At some point between 10th August and last weekend one of the 1,500 unsecured laptops was stolen outside. In other words an employee/contractor removed one of the laptops from eir&#8217;s premises and then fell victim to a thief.</p>
<h3>What was on this eir laptop?</h3>
<p>According to the report from the DPC &#8211; names, email addresses, mobile numbers &amp; account numbers for 36,642 customers and names &amp; contact details for 177 eir employees.</p>
<h3>That doesn&#8217;t sound too bad &#8230; does it?</h3>
<p>As I say to people in my training, it&#8217;s all about the context. If you are a florist and you lose a list of names and addresses of your customers, there may not be a significant risk to those individuals in respect to their rights and freedoms. So you probably won&#8217;t need to notify them about the breach. It might be a borderline call as to whether you would need to notify the DPC. I would say you should.</p>
<p>Now lets say that list of names and addresses are for clients of a sexually transmitted disease clinic. The context now shifts dramatically as there is now a significant risk to the individuals rights and freedoms. If that list became public, there would be much embarrassment to those people. So you would definitely be reporting to the DPC and also notifying the affected people.</p>
<p>In the eir laptop case, the fact there are emails and account numbers is quite concerning. If an evil doer uses all of the available information, they could craft an extremely plausible phishing e-mail, which they could con the victim into doing something that is not in their best interests.</p>
<p>Also, if the bad guys combined the detail from the eir laptop with some information they gleaned from answers to <a href="https://www.l2cybersecurity.com/identity-theft-enabled-fun-quizzes/" target="_blank" rel="noopener">fun quizzes</a>, they may be able to impersonate the eir customer to an eir customer service agent and effectively take over the customers account.</p>
<h3>What should have happened?</h3>
<p>Once eir were aware that all of these devices were unsecured, they should never have been allowed to leave the premises. They should have been locked to the employees/contractors desks and the keys stored in the kennel of a hungry rottweiler until the issue with the patch was rectified.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1350 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller-200x300.jpg" alt="hungry rottweiler" width="200" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller-200x300.jpg 200w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller.jpg 283w" sizes="auto, (max-width: 200px) 100vw, 200px" /></p>
<h3>What have eir done?</h3>
<p>Well they had been busily working away re-encrypting their laptops and according to the DPC&#8217;s statement they had all but 46 completed as of 22nd August.</p>
<p>They have also notified the affected customers, by email from a &#8220;no-reply&#8221; email address, which is pretty crappy. They really should have a specific email address and freephone telephone number for those impacted customers.</p>
<h3>What should we all learn from this?</h3>
<p>The most important thing we should all learn from this eir laptop theft case is that, if you have a mobile device of any type, even if it doesn&#8217;t currently have personal data on it, <span style="text-decoration: underline;"><strong>encrypt the thing</strong></span>! If it&#8217;s not encrypted, <span style="text-decoration: underline;"><strong>keep it securely stored in your</strong></span><strong><span style="text-decoration: underline;"> premises</span></strong> &#8211; don&#8217;t ever take it off premises.</p>
<p>If you want to learn more about good security practice send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and we can talk to you about training and practical steps to improve your cyber security set-up.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/">Eir laptop theft &#8211; could have been worse</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Will your website be marked &#8220;Not Secure&#8221;?</title>
		<link>https://www.l2cybersecurity.com/will-your-website-be-marked-not-secure/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 18 Jul 2018 15:41:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1277</guid>

					<description><![CDATA[<p>Starting next week, some websites will be marked &#8220;Not Secure&#8221;. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites. This is being done to highlight negative behaviour in respect to security, rather than reinforcing positive behaviour. The others browsers (Firefox, Opera, Internet Explorer and Edge) will&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/will-your-website-be-marked-not-secure/">Will your website be marked &#8220;Not Secure&#8221;?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1278" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure-150x150.jpg" alt="be marked &quot;Not Secure&quot;" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Starting next week, some websites will be marked &#8220;Not Secure&#8221;. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites. <span id="more-1277"></span>This is being done to highlight negative behaviour in respect to security, rather than reinforcing positive behaviour. The others browsers (Firefox, Opera, Internet Explorer and Edge) will do something similar in due course. If your site is affected this might come as a shock to you, but trust me it is a positive step to a better internet. Read on and be re-assured.</p>
<h3>How will I know if my website will be marked &#8220;Not Secure&#8221;?</h3>
<p>If the link to your website is <span style="color: #ff00ff;"><strong>http<span style="color: #ff6600;">s</span></strong></span>://www.<span style="color: #ff0000;"><em>mywebsite</em>.ie</span> (with <span style="color: #ff0000;"><em>mywebsite</em>.ie</span> being whatever your website name and domain is) then you will be OK. Close this article and get on with your life.</p>
<p>If however the link to your website is <span style="color: #ff00ff;"><strong>http</strong></span>://www.<span style="color: #ff0000;"><em>mywebsite</em>.ie</span> (no &#8220;<span style="color: #ff00ff;"><strong><span style="color: #ff6600;">s</span></strong></span>&#8221; after the <span style="color: #ff00ff;"><strong>http</strong></span> bit), then Chrome will highlight this in the address bar as being &#8220;Not Secure&#8221; like this:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1279" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Not-Secure-2.jpg" alt="" width="297" height="92" /></p>
<h3>What&#8217;s the difference between http and https?</h3>
<p>http stands for HyperText Transport Protocol. It&#8217;s how web pages are transmitted around the internet. When your website is using http, it is transmitting all of the bits and pieces of data on your website to people browsing the site &#8220;in the clear&#8221; (i.e. exactly as it is seen). If anyone was to intercept the traffic, they would see exactly what it is that people are looking at on your website. They would also be able to add (or inject) data of their own into the traffic and thus make it appear that your website is serving advertisements (for example).</p>
<p>https adds the word &#8220;secure&#8221; to HyperText Transport Protocol. What happens now is that the data from your website will be encrypted (i.e. scrambled into meaningless gibberish) before it is transmitted to people browsing your website. If somebody intercepted the data, they would not be able to determine what it is that people are looking at on your website. The integrity of the data coming from your site is also maintained and nothing could be added to the traffic from your site.</p>
<h3>My site is simple and boring. I don&#8217;t ask for peoples details or credit card information. Why is this happening?</h3>
<p>A website that is using http only is very easily compromised and such a compromise could cause your business reputation damage. If you don&#8217;t believe me check out this video. If you want to watch the whole thing (it&#8217;s 24 minutes long) please do, but to see quickly just some of the compromises, watch from about 7:04 for about 5 minutes. I&#8217;m afraid he does talk very technically, but I think you will appreciate the consequences from seeing what happens to a plain, boring blog site.</p>
<p><iframe loading="lazy" title="Here&#039;s Why Your Static Website Needs HTTPS" width="500" height="281" src="https://www.youtube.com/embed/_BNIkw4Ao9w?start=424&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The reason this is happening is because more than 50% of the websites on the internet are now being delivered by https. So we are all familiar with the sight of the word &#8220;Secure&#8221; in green along with the padlock:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1281" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Secure.jpg" alt="" width="436" height="48" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Secure.jpg 436w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Secure-300x33.jpg 300w" sizes="auto, (max-width: 436px) 100vw, 436px" /></p>
<p>What a lot of people would think is that this means the website is trustworthy &#8230; that is NOT THE CASE at all! All it means is the <span style="text-decoration: underline;"><em><strong>connection</strong></em></span> between the website and a person&#8217;s web browser is encrypted securely. Evil doers have lots of websites that have this &#8220;Secure&#8221; marker too.</p>
<p>So Google are switching the focus from highlighting sites using https to highlighting sites that don&#8217;t. So the green &#8220;Secure&#8221; with the padlock will disappear from &#8220;normal&#8221; sites. Then sites using http will be marked &#8220;Not Secure&#8221; in red. This will be an impetus to help drive the internet to being more secure.</p>
<h3>My web person is saying that it will cost me money to get https on my website. This is just a rip-off!</h3>
<p>Actually you can get https on your website for free, very easily. Your domain hosting provider may offer this service to you (my own host does so). If not, then Troy Hunt (the gentleman speaking in the video above) set up a website called <a href="https://httpsiseasy.com/">HTTPS is easy</a> on which he has 4 short videos on how you can set up your website to be https for free and in about 5-10 minutes (although there is one bit where you may have to wait 24 hours for the internet to work it&#8217;s magic).</p>
<h3>Anything else?</h3>
<p>If you want to get some more advice, drop an email with your questions to <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a> and we&#8217;ll be happy to address them for you.</p>
<p>Also if you are interested in learning how to use the internet more safely, check out <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf">the training that we offer</a>. If you want to find out more then call on 087-436-2675 or e-mail <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>In the meantime, watch those videos and see how you can stop your website be marked &#8220;Not Secure&#8221;.</p>
<p>The post <a href="https://www.l2cybersecurity.com/will-your-website-be-marked-not-secure/">Will your website be marked &#8220;Not Secure&#8221;?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is somebody else using your password?</title>
		<link>https://www.l2cybersecurity.com/is-somebody-else-using-your-password/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 24 Feb 2018 10:21:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1135</guid>

					<description><![CDATA[<p>Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. ? So how do I&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1154" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg" alt="" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. <span id="c128" class="notranslate">?</span><span id="more-1135"></span></p>
<p>So how do I know these things? Where am I getting this figures from. Well just like November where I told you about the free <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad 9 service</a>, which prevents you going to know evil sites or in December where I told you about the free <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Security Planner tool</a>, which gave you simple advice on how best to protect your particular set-up, this month I give you the free <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords tool</a>, which was developed by highly respect security researcher <a href="https://www.troyhunt.com/">Troy Hunt</a>. Before you leap to the comments section highlighting my atrocious spelling &#8211; that&#8217;s how it is spelled &#8211; <a href="https://www.urbandictionary.com/define.php?term=pwned">pwned</a> is a computer gamer term for being completely dominated or compromised and is pronounced &#8220;powned&#8221; (to rhyme with &#8220;owned&#8221;).</p>
<p>So how does this pwned password tool answer the question is somebody else using your password? It&#8217;s quite simple, the Troy has got copies of online account information (including passwords) that has been breached from various sources over the last number of years. He has 500 million passwords on his database. Now he doesn&#8217;t have the passwords linked to their associated account, such that if he was hacked that somebody would get access to his juicy treasure trove of account information, it&#8217;s simply a database of passwords. He has used a certain very secure methodology to test the passwords, but there is no point in going into it here. If you&#8217;re a nerd with an itch to scratch, then you can read all about <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity">his methodology here</a>.</p>
<p>So how should you use this tool? Simple go to the <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords</a> page and type in your various passwords. Here is the result for &#8220;123456&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1152 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg" alt="poor choice of password" width="921" height="140" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg 921w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-300x46.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-768x117.jpg 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></p>
<p>And the result for &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1153" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg" alt="better choice of password" width="925" height="99" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg 925w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-300x32.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-768x82.jpg 768w" sizes="auto, (max-width: 925px) 100vw, 925px" /></p>
<p>So what should you do if your password has been used before, particularly where it has been used a LOT? It&#8217;s kind of obvious, but you need to change it. Yes, I know it&#8217;s a pain. Yes you might forget what you changed it to. Guess what? When you change it, write your new password down on a piece of paper and put it in your drawer or maybe your wallet/purse. <span id="c126" class="notranslate">?</span></p>
<p>No I haven&#8217;t taken complete leave of my senses. But this is a case of risk reduction. Sure, you have an open copy of your password in a public-ish place, but it&#8217;s not going to be there forever. You will consult this piece of paper regularly in the first 3-4 days after changing your password. As your muscle memory starts to kick in, you will consult it less and less. After a week to 10 days you probably won&#8217;t be using the piece of paper anymore, so at that point you can destroy it.</p>
<p>Keeping this reminder of your password to hand will also enable you to do one more brilliant thing with your password and that is to make it LOOOOOONNNNNGGGGG. Don&#8217;t use &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; because that&#8217;s mine <span id="c132" class="notranslate">?</span> but either use a long passphrase (a sequence of words like my example) that is <span style="text-decoration: underline;"><strong>at least</strong></span> 15-20 characters long or use a password manager to generate a long nonsensical password which it has to remember, but you don&#8217;t. You only have to remember the master password, which you will have made it long and complicated. More details about passwords can be found under <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">Commandment 8</a>, including talk about password managers.</p>
<p>Actually, one of the other really cool things Troy has done was to enable developers to create plug-ins that can query his database of passwords. One of the password managers (<a href="https://1password.com/">1Password</a>) has <a href="https://techcrunch.com/2018/02/23/1password-bolts-on-a-pwned-password-check/">incorporated this functionality</a> into it&#8217;s product, so if you chose a password that has been pwned, it will be flagged to you.</p>
<p>Finally, it would be remiss of me not to point out the main feature of Troy Hunt&#8217;s site. This has been around for many years and it&#8217;s the <a href="https://haveibeenpwned.com/">Have I been pwned?</a> feature. All you do is put in your e-mail address(es) or User IDs and it will tell you if they were part of a data breach of some online service. He has details on nearly 5 billion breached accounts, so it&#8217;s pretty comprehensive.</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerable Cisco Firewalls</title>
		<link>https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 14:25:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1133</guid>

					<description><![CDATA[<p>It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale. The vulnerable Cisco firewalls are in widespread use and they need to be&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/">Vulnerable Cisco Firewalls</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-1146 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk-150x150.jpg" alt="vulnerable cisco" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (<em>Common Vulnerability Scoring System</em>) scale. <span id="more-1133"></span>The vulnerable Cisco firewalls are in widespread use and they need to be patched urgently.</p>
<p>As is usual, the vulnerability lies in the software that runs on these firewalls. This Adaptive Security Appliance (ASA) software is what has been found to be vulnerable by a researcher who was to present his findings at a security conference in Belgium last Friday. He hasn&#8217;t released all of the juicy details yet and there are no reported exploits in the wild, but that could all change.</p>
<p>The affected devices, <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1">according to Cisco</a>, are:</p>
<ul>
<li>3000 Series Industrial Security Appliance (ISA)</li>
<li>ASA 5500 Series Adaptive Security Appliances</li>
<li>ASA 5500-X Series Next-Generation Firewalls</li>
<li>ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers</li>
<li>ASA 1000V Cloud Firewall</li>
<li>Adaptive Security Virtual Appliance (ASAv)</li>
<li>Firepower 2100 Series Security Appliance</li>
<li>Firepower 4110 Security Appliance</li>
<li>Firepower 4120 Security Appliance</li>
<li>Firepower 4140 Security Appliance</li>
<li>Firepower 4150 Security Appliance</li>
<li>Firepower 9300 ASA Security Module</li>
<li>Firepower Threat Defense Software (FTD)</li>
<li>FTD Virtual (FTDv)</li>
</ul>
<p>If you have any of these devices in your network, you should be getting your IT support to patch it as soon as possible. There were reported issues with the initial patches, but Cisco have now rectified those too.</p>
<p>The big concern was to do with the Virtual Private Network (VPN) component on the firewall. If you are able to connect in remotely to your network by way of this VPN, then your entire network is at risk of being compromised.</p>
<p>Of course you&#8217;ve been following <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/">Commandment 3</a> and have a firewall in place. Now you&#8217;ve also got to employ <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> and keep it updated.</p>
<p>For the technical types who are reading this, you can get a much more in-depth view of the vulnerable Cisco firewall issues on <a href="https://blogs.cisco.com/security/cve-2018-0101">a blog post</a> by Omar Santos.</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/">Vulnerable Cisco Firewalls</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Simple Security Planner tool for EVERYONE!</title>
		<link>https://www.l2cybersecurity.com/simple-security-planner-tool/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 10:32:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1017</guid>

					<description><![CDATA[<p>I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers. As I recently stated when talking about Quad9, I love it when the good guys come up with something&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1023" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png" alt="Security Planner" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I love it when I get to tell people about another great security tool. This simple Security Planner <a href="https://securityplanner.org/#/">tool</a> is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.<span id="more-1017"></span> As I recently stated when talking about <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9</a>, I love it when the good guys come up with something to help everyone &#8211; particularly the non-technical folks out there &#8230; after all you make up the vast majority of the users of the internet. <span id="c128" class="notranslate">?</span></p>
<p>This security planner was created by the good folk of the <a href="https://citizenlab.ca/">Citizen Lab</a>, an interdisciplinary group based at the Munk School of Global Affairs at the University of Toronto. It&#8217;s really, really, really easy to use and will guide you through everything from start to finish.</p>
<ol>
<li>It starts by asking what you use to handle private data (Windows computer, iThing, e-mail, etc.)</li>
<li>Then it asks what are your concerns (getting hacked,  infected, etc.)</li>
<li>Finally it asks if there is any particular reason for your concern (you&#8217;re being harrassed or dealing with a current issue, etc.)</li>
<li>Then it will give you an action list, with individual help on each thing that it recommends you to do.</li>
</ol>
<p>What I really appreciated was the first step it seems to give for everything &#8230; it&#8217;s to do with two-factor-authentication:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1025 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg" alt="" width="736" height="342" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg 736w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA-300x139.jpg 300w" sizes="auto, (max-width: 736px) 100vw, 736px" /></p>
<p>Regular readers of my blog/newsletter will know I&#8217;m always going <a href="https://www.l2cybersecurity.com/double-check-security/">on</a> and <a href="https://www.l2cybersecurity.com/protect-online-accounts/">on</a> and <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">on</a> about this. I don&#8217;t repeat myself often, unless it&#8217;s for a really, really, really good reason and two-factor-authentication is one such reason. It really does help protect your online accounts and so, where available, please, please, please use it.</p>
<p>So, for those of you reading this now, go ahead and use this security planner to help protect youself.</p>
<p>And then, when you go visiting your family over the Christmas period, particularly the more mature members of your nearest and dearest, why not sit down with them, fire up this website on their computer/tablet/phone and go through this fairly painless, simple process to get themselves as protected as you are. They&#8217;ll thank you for it and so will Santa. <span id="c116" class="notranslate">?</span></p>
<p>Happy Christmas! ?</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Sharing = Data Breach</title>
		<link>https://www.l2cybersecurity.com/password-sharing-data-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 10:09:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1020</guid>

					<description><![CDATA[<p>I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought &#8220;That&#8217;s not a good idea. This person needs to receive some security awareness training.&#8221; I even have a commandment for it.Then I find out that British MPs actually receive quite a lot of support and training in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/password-sharing-data-breach/">Password Sharing = Data Breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1033" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Underwear-150x150.jpg" alt="password sharing" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Underwear-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Underwear.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought &#8220;That&#8217;s not a good idea. This person needs to receive some security awareness training.&#8221; I even have a <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">commandment</a> for it.<span id="more-1020"></span>Then I find out that British MPs actually receive quite a lot of support and training in IT security matters.</p>
<p>On further reflection, this is actually an extremely worrisome <a href="https://www.theregister.co.uk/2017/12/04/dorries_i_give_my_staff_my_login_details/">scenario</a>. As an MP, Ms. Dorries would receive e-mail correspondence from her constituents on a daily basis. I wouldn&#8217;t expect all of them would be telling her she is doing a great job (though a small few might).</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1034 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Password-sharing.jpg" alt="nadine dorries password sharing" width="573" height="345" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Password-sharing.jpg 573w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Password-sharing-300x181.jpg 300w" sizes="auto, (max-width: 573px) 100vw, 573px" /></p>
<p>Most people contact their government representatives when they have a problem or concern. These problems or concerns are usually in respect to some dealing that they have with a government department, which they are hoping their elected representative can sort out for them.</p>
<p>The fact that an intern has full access to the representatives email because of password sharing, is staggering. Because they have Ms. Dorries password, when they use her e-mail, THEY are Ms. Dorries (in a virtual sense). So let&#8217;s for argument just say, this intern is a neighbour of the person who has e-mailed Ms. Dorries about a problem they have in accessing mental health services with the Department of Health.</p>
<p>The person sending the e-mail, sent it to Ms. Dorries &#8230; not to their neighbour &#8230; they would be justifiably horrified that their neighbour now knows they have issues with mental health. That information is sensitive personal data and must be protected at all costs.</p>
<p>Nadine Dorries has a very real operational issue to handle. She receives a lot of e-mail which she cannot be expected to process all on her own. However, the information she receives should always be considered sensitive personal data, so this needs protection (always has needed it and most definitely will continue to need it under the GDPR).</p>
<p>There is a facility in e-mail, that allows somebody to &#8220;delegate&#8221; access to their mailbox to others. Ms. Dorries should use this facility to delegate access to her mailbox to her &#8220;trusted&#8221; assistants. These trusted assistants should have some level of clearance and received data privacy/protection training, so they can then determine whether</p>
<ol>
<li>they should pass the e-mail to Ms. Dorries for direct resolution on a most sensitive matter.</li>
<li>handle the matter themselves, in confidence.</li>
<li>or pass a minor, non-sensitive issue to an intern to handle.</li>
</ol>
<p>The delegation function in e-mail will show an audit trail of what the delegate did with the e-mail, so there will be trace-ability if they do something naughty. By having the boss&#8217; password, there can be no trace-ability.</p>
<p>Therefore, sharing your password where you handle sensitive personal data is a data breach, plain and simple. This is because others have unrestricted, unauthorised, untraceable access to this personal data, which means you&#8217;ve lost control of it. As summary punishment, you should be made to wear the underwear of this post&#8217;s featured image on the outside of your clothes while you await a judgement from the Data Protection Commissioner.</p>
<p>And may Helen Dixon have mercy on your password sharing soul. <span id="c132" class="notranslate">?</span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/password-sharing-data-breach/">Password Sharing = Data Breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quad9 &#8211; Safer addressing on the internet</title>
		<link>https://www.l2cybersecurity.com/quad9-safer-addressing-internet/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Nov 2017 11:42:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1000</guid>

					<description><![CDATA[<p>I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make life safer for everyone. Basically if you use this service, it will pretty well prevent any malicious software from connecting your laptop, tablet, phone, smart watch,&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9 &#8211; Safer addressing on the internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1001" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9-150x150.jpg" alt="Quad9 Safer Addressing" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make life safer for everyone. <span id="more-1000"></span>Basically if you use this service, it will pretty well prevent any malicious software from connecting your laptop, tablet, phone, smart watch, smart toaster, smart whatever to an evil doer&#8217;s website, because it will not resolve the address. It can&#8217;t give 100% guaranteed protection, but it&#8217;ll be extremely effective &#8230; and did I mention, it&#8217;s FREE?!?!</p>
<h2>What is DNS?</h2>
<p>A Domain Name Service is the backbone of addressing, as every website is stored on a server located somewhere on the internet. Your favourite security website (<a href="http://www.L2CyberSecurity.com">www.L2CyberSecurity.com</a>) is sitting on a server in Dublin. That server has an Internet address of 217.78.11.90. You don&#8217;t need to know that long-winded number. You just need to know the nice, friendly name L2CyberSecurity.com. When you type that address, or click a link to that address in your browser, your PC/Laptop will pass the friendly name to some DNS server (whichever one it is configured to use), that will then return the long-winded number to the browser, so off it goes to that server and dishes up the webpage to you.</p>
<h2>How does the existing DNS fail to protect me?</h2>
<p>If you currently use the DNS server that your provider gives you, or perhaps <a href="https://www.opendns.com/">OpenDNS</a> or <a href="https://developers.google.com/speed/public-dns/">Google&#8217;s DNS,</a> then if you get infected with malicious software, this will probably try to &#8220;phone home&#8221;, i.e.- connect with a server controlled by the evil doers. It will look to connect to the server by referencing a friendly name (e.g.- www.scaryevilhackersoftware.co) and the <em>usual</em> DNS servers will resolve that to the bad guys server and facilitate the connection.</p>
<p>IT&#8217;S NOT THEIR FAULT! This is how the internet is supposed to work.</p>
<h2>How does Quad9 protect me?</h2>
<p>The good people over at IBM, the Packet Clearing House (PCH) and Global Cyber Alliance came together and set-up this global service. They have made it genuinely free to use, without any sneaky monitoring of what you do. When you have it set-up, <a href="https://www.quad9.net">Quad 9</a> will check a site you are trying to connect to against the IBM X-Force threat intelligence database of over 40 billion analysed web pages and images. it also uses feeds from 18 additional threat intelligence partners to block a large portion of the threats that present risk to end users and businesses alike. If the site you are trying to connect with is a known evil site, Quad9 will NOT resolve the friendly address to the long winded number. It will effectively return a &#8220;domain/site does not exist&#8221;.</p>
<h2>That sounds great. How do I set it up?</h2>
<p>For a business environment, please contact your IT Department or IT Service Provider. There could be internal DNS server dependencies which, if you implemented Quad9, might break an application. IT will need to make a determination on whether it can be implemented or not.</p>
<p>For home users, on the <a href="https://www.quad9.net/#/#setup-quad9">Quad 9 home page</a> there are videos and instructions for configuring Mac and Windows desktops/laptops.</p>
<p>However, for the best possible coverage, I would recommend you have this setting applied to the router or modem that your service provider installed with your connection. It should be noted that some internet providers do not allow changes to be made to their router (Imagine and Sky are two examples). You may need to log a support request to have the change applied to your router.</p>
<p>If you are, or know somebody who is technically competent (and game-playing teenagers may not fit this criteria <span id="c128" class="notranslate">?</span>), the change is as easy as logging into the router and changing, whats called, the DHCP settings. Before anything is changed, you should make a note of what the current DNS settings are. Then all you have to do is change the primary DNS server to 9.9.9.9 (4 nines &#8230; Quad9 &#8230; get it now? <span id="c103" class="notranslate">?</span>). The secondary address can be set to whatever was previously the primary address. Be sure to save the setting and reboot the router.</p>
<p>When the router comes back up, any device that connects to it (laptop, desktop, tablet, phone, smart toaster, etc.) will receive the protection of Quad9 automatically.</p>
<p>If you have any connectivity issues after the change, then simply log back into the router and put back the DNS settings under DHCP that had been there before, save the setting and reboot the router again.</p>
<p>One thing I had concerns about was performance. I previously used Google&#8217;s DNS (8.8.8.8) which was always pretty responsive. So when I tested it&#8217;s performance against Quad9&#8217;s I found that Quad9 was generally faster than Google. They are improving the service all the time as demand increases, so it should always be very quick.</p>
<p>So for me it&#8217;s a <span id="c420" class="notranslate">?</span><span id="c420" class="notranslate">?.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9 &#8211; Safer addressing on the internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Double check your security.</title>
		<link>https://www.l2cybersecurity.com/double-check-security/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 09 Nov 2017 11:00:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=980</guid>

					<description><![CDATA[<p>There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification). I bring this up as a real-life scenario came to my attention this week. I was giving a training session and during a break one of the attendees asked&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/double-check-security/">Double check your security.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-981" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/double-150x150.gif" alt="Double Check Security" width="150" height="150" />There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).<span id="more-980"></span></p>
<p>I bring this up as a real-life scenario came to my attention this week. I was giving a training session and during a break one of the attendees asked me about a strange WhatsApp message that she received.</p>
<p>She showed me the message, which reportedly came from Apple, about a transaction on her account, that occurred in Mexico, which they blocked. There was a link for her to check her account. She told me that she had clicked on the link, and after signing into her iTunes account nothing else happened. Before I could say anything, she clicked on the link again and there was the sign-in page.</p>
<p>I have to say, that the WhatsApp message and sign-in page looked very plausible and legitimate. There were no spelling mistakes or lousy formatting. I had to break the news to her that she had given her iTunes ID and password to the bad guys and she needed to change her password as quickly as possible. So I took her through the process on her iPhone. When we got as far as here, I breathed a sigh of relief.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-982 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password-300x177.jpg" alt="" width="300" height="177" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password-300x177.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password.jpg 550w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>With this <a href="https://support.apple.com/en-ie/HT204915">Two-Factor Authentication</a> turned on, the evil doers would not be able to access her iTunes, without access to her phone. That&#8217;s because Two-Factor Authentication is like a double check. When you sign in to an account with an ID and password, the service does a double check and sends a code to your phone as a text message, which you then type in to complete the sign in.</p>
<p>While we were reassured that her iTunes account was reasonably safe from being immediately hacked, I still got her to change her password to something new. I also advised her to change any other account that used that password as well.</p>
<p>This Two Factor Authentication malarkey is such a good idea, I&#8217;d even created it&#8217;s own <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/double-check-security/">Double check your security.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
