<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Commandments Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/commandments/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/commandments/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 14:54:35 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Commandments Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/commandments/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NUI Galway Data Breach &#8211; Lessons learned?</title>
		<link>https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Nov 2018 10:16:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1451</guid>

					<description><![CDATA[<p>The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick may have had personal data on 5% of the student population. This 5% of an 18,000 student population&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1456" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg" alt="nui galway data breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. <span id="more-1451"></span>If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick <em><strong>may</strong></em> have had personal data on 5% of the student population. This 5% of an 18,000 student population gives us approximately 900 individuals being impacted by this breach. That personal data <em><strong>may</strong></em> have included exam results, as reported <a href="https://www.independent.ie/irish-news/news/university-at-centre-of-potential-data-breach-after-usb-stick-goes-missing-37542617.html" target="_blank" rel="noopener">by the Irish Independent</a>.</p>
<blockquote><p>While the University is unclear on the contents of the portable device, it may have held a file containing names of approximately 5% of the student body, their student number and exam results.</p></blockquote>
<p>It&#8217;s the uncertainty that is most worrying to me. Also their claim that they have strict policies in place relating to portable devices is a bit disingenuous. I&#8217;ve been through <a href="http://www.nuigalway.ie/about-us/office-secretary/policies-procedures/" target="_blank" rel="noopener">the policies</a> and also looked at their <a href="http://www.nuigalway.ie/data-protection/" target="_blank" rel="noopener">data protection section</a> and found some conflicting direction with regard to data handling and USB memory sticks.</p>
<p>The <a href="http://www.nuigalway.ie/media/oifiganrunai/files/QA401-Data-Handling.pdf" target="_blank" rel="noopener">Data Handling Policy</a> states the following about &#8220;NUI Galway Highly Restricted&#8221; data:</p>
<blockquote><p>Storage of this data outside of the source system, for example on a laptop or memory stick; must be approved by the data owner. Where data is held outside the source system it must be encrypted.</p></blockquote>
<p>That seems quite sensible, as approval would mean that somebody would know exactly what data is on there and it would then be encrypted. However their <a href="http://www.nuigalway.ie/media/informationsolutionsservices/files/ictpolicies/QA409_encryption-policy.pdf" target="_blank" rel="noopener">Encryption policy</a>, has something else to say on USB memory sticks:</p>
<blockquote><p>Portable storage capability such as DVD’s, CD’s and USB flash drives should not be utilised for classified data storage or transfer, even in an encrypted format.</p></blockquote>
<p>So the handling policy says it&#8217;s fine, but the encryption policy says no. It&#8217;s obvious that the data handling policy wasn&#8217;t followed with this data breach.</p>
<p>I thought it interesting that they have plenty on their site for how to use USB memory sticks and the <a href="http://www.nuigalway.ie/information-solutions-services/servicesforstaff/pcsuites/usbstorage/" target="_blank" rel="noopener">protections they have in place</a>.</p>
<blockquote><p>ISS have <strong>disabled Autorun</strong> on the all computers in the PC Suites as a precautionary measure to prevent the spread of viruses.  When autorun is disabled, a USB memory stick or software on a CD or DVD will no longer automatically start when inserted.</p></blockquote>
<p>So that&#8217;s great &#8230; lots of protection there &#8230; or maybe not. What if the USB device impersonated a keyboard? It could inject keystrokes that open up a command line, execute a command to download dodgy software and execute it. <a href="https://www.howtogeek.com/203061/don%E2%80%99t-panic-but-all-usb-devices-have-a-massive-security-problem/" target="_blank" rel="noopener">I&#8217;m not making this up</a>. The USB stick could also fry the electronics on your computer. Again <a href="https://www.l2cybersecurity.com/usb-machine-killer/" target="_blank" rel="noopener">this is something that happens</a>.</p>
<p>These USB memory sticks are such a problem from a data breach perspective that I always recommend companies and organisations to either block them completely or put in place a solution that automatically encrypts all data on them.</p>
<p>I did dedicate <a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">an entire commandment</a> to USB memory sticks. So you can get my deeply held views in there.</p>
<p>The NUI Galway data breach was an embarrassment for the University. I don&#8217;t think the exam results could be classified as sensitive personal data (special category). But I&#8217;m sure students wouldn&#8217;t like these been released publicly. As long as the powers that be learn a lesson from this sorry situation and implement more rigorous technical solutions, then it will hopefully prevent future, larger and more sanction-worthy breaches.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to deal with Ransomware.</title>
		<link>https://www.l2cybersecurity.com/deal-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 14:01:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1407</guid>

					<description><![CDATA[<p>I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. I have previously talked about how Ransomware can infect your machine. It can be by&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1408" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg" alt="Deal with Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware.jpg 500w" sizes="(max-width: 150px) 100vw, 150px" />I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. <span id="more-1407"></span>I have previously talked about how Ransomware can infect your machine. It can be by <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/" target="_blank" rel="noopener">dodgy looking e-mails</a> or <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/" target="_blank" rel="noopener">legitimate looking e-mails</a>. The variety is endless, but it is generally all down to somebody clicking a link or opening an attachment. I&#8217;ve got an <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">entire commandment</a> dealing with e-mails and how you should handle them.</p>
<p>What I&#8217;ve talked about above, is all prevention. However that doesn&#8217;t help you if you are staring at a monitor with a ransom demand on it. Let me give you a couple of examples of recently reported Ransomware incidents and how they were handled.</p>
<h3>Bristol Airport recovers from Ransomware Incident</h3>
<p>On the weekend of the 15th and 16th September, <a href="https://www.theregister.co.uk/2018/09/17/bristol_airport_cyber_attack/" target="_blank" rel="noopener">Bristol Airport suffered a Ransomware incident</a>. This incident took their flight information screens off-line for much of the weekend. Luckily no other safety or flight systems were affected.</p>
<p>How did the authorities at Bristol Airport deal with Ransomware? They re-built the systems and restored backups. They did not pay the Ransom.</p>
<h3>Scottish Brewery suffered a Ransomware incident from a job application.</h3>
<p>In the last couple of weeks, the <a href="https://www.bankinfosecurity.com/scottish-brewery-slammed-by-dharma-ransomware-variant-a-11537" target="_blank" rel="noopener">Arran Brewery in Scotland had all of it&#8217;s systems affected by Ransomware</a>. They had been running a recruitment campaign, advertising for a role via their own website. The evil doers took that ad and posted it to some international recruitment websites. The brewery then started receiving several e-mails a day from interested candidates from all over the world. In among those e-mails the bad guys slipped in one with Ransomware. The CV got opened and their files got scrambled. Not only were their live files affected, but their recent backups were too. These were stored online, attached to their network. Their most recent offline backups were 90 days old.</p>
<p>How did the brewery deal with Ransomware? They also re-built their systems and restored what backups they had. In this case though, they did consider paying the (GBP) £9,600 ransom. They came to the determination that the value of the data they lost (90 days of sales data) was less than the cost of the Ransom demand. They also took into consideration that paying the Ransom does not guarantee they would get back their data.</p>
<p>The brewery then did something really sensible. They have kept a copy of the scrambled data.</p>
<h3>Help may be available from the good guys.</h3>
<p>There is a not-for-profit, freely available service called <strong>No More Ransom</strong> (<a href="https://www.nomoreransom.org" target="_blank" rel="noopener">https://www.nomoreransom.org</a>). This is run by various Law Enforcement and Cyber Security firms around the world. They are constantly working on cracking the codes for the different Ransomware variants and enabling people to recover their data for free.</p>
<p>So the Arran Brewery is holding onto the scrambled data in the hope that someday they will be able to unscramble it.</p>
<h3>So how should you deal with Ransomware?</h3>
<p>Prevention is always better than a cure.</p>
<p>The first thing is to make sure you get your staff some security awareness training. This is something that I deliver. Details of the complete training is <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">available here</a>. We can do customised training to suit your organisation too. Call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail on <span style="color: #ff0000;"><a style="color: #ff0000;" href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a><span style="color: #000000;"> to discuss your requirements.</span></span></p>
<p>Then ensure that you have your systems <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">updated/patched regularly</a>, have security appliances like <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/" target="_blank" rel="noopener">Firewalls in place</a>, <a href="http://www.l2cybersecurity.com/use-anti-virus/" target="_blank" rel="noopener">Anti-Virus is generally helpful</a> against malicious software and also you <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">shouldn&#8217;t insert strange USB devices</a> into your computers.</p>
<p>Finally, you should have a good data backup system in place. This can be a very simple set-up or more complicated depending on your business needs. Again, I offer advice and support on backup strategies and business continuity planning. I also have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">a commandment about backups</a>.</p>
<p>That&#8217;s it! With all of the above in place, <span style="text-decoration: underline;"><strong>in the</strong> <strong>very unlikely event</strong></span> that you do subsequently suffer a Ransomware incident, you will be able to recover from it.</p>
<h3>What if it would cost me less to pay the ransom?</h3>
<p>This is a genuine struggle for a business owner, particularly small businesses. Recovering systems from a ransomware incident takes time, which costs money, and the business may be unable to operate while recovery is ongoing, so is not generating revenue. A good business continuity plan, should reduce such risks.</p>
<p>If you are tempted to pay, I just have two things I want you to consider:</p>
<ol>
<li>There is no guarantee that you will get your data back. Figures vary wildly from <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/" target="_blank" rel="noopener">50%</a> to <a href="https://gbhackers.com/ransomware-attack/" target="_blank" rel="noopener">100%</a> failure to recover data. If you pay and don&#8217;t get your data back, you will then have to pay the full cost of recovery anyway.</li>
<li>You are funding organised crime. You are paying criminals who not only do cyber crime, but human trafficking, drugs, weapons, etc. People think I am being jokey or have my tongue in cheek when I refer to <em><strong>Evil Doers</strong></em>. I&#8217;m not. This is an accurate description of these people. They! Are! <span style="text-decoration: underline;"><strong>Evil!</strong></span></li>
</ol>
<p>If you pay once, then the bad guys reckon you might pay again, so you will be a bigger target. My advice to deal with Ransomware is to implement preventative measures (call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail <a href="mailto:info@L2CyberSecurity.com"><span style="color: #ff0000;">info@L2CyberSecurity.com</span></a> to have a no obligation chat) and never pay these evil doers.</p>
<h3>What else do you need to consider?</h3>
<p>Don&#8217;t forget that if the data that gets scrambled contains personal data, then you have a data breach on your hands, which may be notifiable under the new Data Protection Act 2018 which incorporates the General Data Protection Regulation (GDPR). I&#8217;ve a short video here:</p>
<p><iframe title="What is a data breach - Ransomware" width="500" height="281" src="https://www.youtube.com/embed/PVnq6Bu-GEA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Finally, if you do suffer a Ransomware incident, a crime has been committed, so please report it to local Law Enforcement. They may not be able to do much about it, but it needs to be reported for statistical purposes if nothing else. If it can be shown that Cyber crime is as big a problem, as I know it to be, then the more reports to Law Enforcement will mean they will get more resources to be able to tackle it&#8217;s root cause.</p>
<p>#LetsBeCarefulOutThere and #StaySafe</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Posh POS was Compromised</title>
		<link>https://www.l2cybersecurity.com/posh-pos-was-compromised/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Apr 2018 10:58:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1292</guid>

					<description><![CDATA[<p>A headline worthy of The Register and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &#38; Taylor. These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this in a post on their site on the 1st April.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1293" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg" alt="POS compromised" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />A headline worthy of <a href="https://www.theregister.co.uk/2018/04/02/hacks_fifth_avenue_crooks_slurp_card_numbers_from_luxury_chain/">The Register</a> and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &amp; Taylor. <span id="more-1292"></span>These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this <a href="http://investor.hbc.com/releasedetail.cfm?ReleaseID=1062423">in a post on their site</a> on the 1st April. But it was no April Fool joke.</p>
<p>Basically the evil doers implanted malicious software on the Point of Sale (POS) terminals in the upmarket stores in the USA. For nearly a year (between May 2017 to March 2018) this malware was capturing customers credit/debit card details and passing this back to the bad guys. The crooks claimed to have gathered up to 5 million cards as a result of this hack and they have been selling off batches of them on the internet.</p>
<p>We are quite familiar with Chip &amp; PIN usage in Ireland as we have had it for quite some time. This does offer a great deal of protection as your card information is stored in an encrypted form on the chip. However in the US, they are only at the early stages of rolling out Chip &amp; PIN, so most people are still swiping their cards at the terminals. The magnetic stripes that are swiped do not have the data encrypted, and so the information can be accessed and passed on quite easily.</p>
<p>It&#8217;s not been revealed how the malicious software got onto their POS terminals, but it seems that the POS was compromised at all of their bricks and mortar stores in the US. Their online store was not affected.</p>
<p>Credit Card issuers are usually fairly good at detecting fraud by knowing their customers usual buying habits. So if somebody who usually spends €20-€50 on shopping items, suddenly attempts to buy high-end phones, tablets or televisions this should trigger an alert. However for the customers of Saks or Lord &amp; Taylor, such behaviour is much less likely to trigger an alert. So the crooks might be able to make away with a lot of goodies as a result.</p>
<p>The parent group, HBC, needs to put in place better segmentation and monitoring on their network, so if one store gets compromised, the malicious software cannot find it&#8217;s way easily to another store. They should also apply Commandments 1 (<a href="https://www.l2cybersecurity.com/use-automatic-updates/">automatic updates</a>), 2 (<a href="https://www.l2cybersecurity.com/use-anti-virus/">anti-virus</a>), 3 (<a href="https://www.l2cybersecurity.com/have-a-firewall-in-place/">firewall</a>) and 9 (<a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">control use of USB sticks</a>) to their POS network.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is somebody else using your password?</title>
		<link>https://www.l2cybersecurity.com/is-somebody-else-using-your-password/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 24 Feb 2018 10:21:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1135</guid>

					<description><![CDATA[<p>Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. ? So how do I&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1154" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg" alt="" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. <span id="c128" class="notranslate">?</span><span id="more-1135"></span></p>
<p>So how do I know these things? Where am I getting this figures from. Well just like November where I told you about the free <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad 9 service</a>, which prevents you going to know evil sites or in December where I told you about the free <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Security Planner tool</a>, which gave you simple advice on how best to protect your particular set-up, this month I give you the free <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords tool</a>, which was developed by highly respect security researcher <a href="https://www.troyhunt.com/">Troy Hunt</a>. Before you leap to the comments section highlighting my atrocious spelling &#8211; that&#8217;s how it is spelled &#8211; <a href="https://www.urbandictionary.com/define.php?term=pwned">pwned</a> is a computer gamer term for being completely dominated or compromised and is pronounced &#8220;powned&#8221; (to rhyme with &#8220;owned&#8221;).</p>
<p>So how does this pwned password tool answer the question is somebody else using your password? It&#8217;s quite simple, the Troy has got copies of online account information (including passwords) that has been breached from various sources over the last number of years. He has 500 million passwords on his database. Now he doesn&#8217;t have the passwords linked to their associated account, such that if he was hacked that somebody would get access to his juicy treasure trove of account information, it&#8217;s simply a database of passwords. He has used a certain very secure methodology to test the passwords, but there is no point in going into it here. If you&#8217;re a nerd with an itch to scratch, then you can read all about <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity">his methodology here</a>.</p>
<p>So how should you use this tool? Simple go to the <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords</a> page and type in your various passwords. Here is the result for &#8220;123456&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1152 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg" alt="poor choice of password" width="921" height="140" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg 921w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-300x46.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-768x117.jpg 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></p>
<p>And the result for &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1153" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg" alt="better choice of password" width="925" height="99" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg 925w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-300x32.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-768x82.jpg 768w" sizes="auto, (max-width: 925px) 100vw, 925px" /></p>
<p>So what should you do if your password has been used before, particularly where it has been used a LOT? It&#8217;s kind of obvious, but you need to change it. Yes, I know it&#8217;s a pain. Yes you might forget what you changed it to. Guess what? When you change it, write your new password down on a piece of paper and put it in your drawer or maybe your wallet/purse. <span id="c126" class="notranslate">?</span></p>
<p>No I haven&#8217;t taken complete leave of my senses. But this is a case of risk reduction. Sure, you have an open copy of your password in a public-ish place, but it&#8217;s not going to be there forever. You will consult this piece of paper regularly in the first 3-4 days after changing your password. As your muscle memory starts to kick in, you will consult it less and less. After a week to 10 days you probably won&#8217;t be using the piece of paper anymore, so at that point you can destroy it.</p>
<p>Keeping this reminder of your password to hand will also enable you to do one more brilliant thing with your password and that is to make it LOOOOOONNNNNGGGGG. Don&#8217;t use &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; because that&#8217;s mine <span id="c132" class="notranslate">?</span> but either use a long passphrase (a sequence of words like my example) that is <span style="text-decoration: underline;"><strong>at least</strong></span> 15-20 characters long or use a password manager to generate a long nonsensical password which it has to remember, but you don&#8217;t. You only have to remember the master password, which you will have made it long and complicated. More details about passwords can be found under <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">Commandment 8</a>, including talk about password managers.</p>
<p>Actually, one of the other really cool things Troy has done was to enable developers to create plug-ins that can query his database of passwords. One of the password managers (<a href="https://1password.com/">1Password</a>) has <a href="https://techcrunch.com/2018/02/23/1password-bolts-on-a-pwned-password-check/">incorporated this functionality</a> into it&#8217;s product, so if you chose a password that has been pwned, it will be flagged to you.</p>
<p>Finally, it would be remiss of me not to point out the main feature of Troy Hunt&#8217;s site. This has been around for many years and it&#8217;s the <a href="https://haveibeenpwned.com/">Have I been pwned?</a> feature. All you do is put in your e-mail address(es) or User IDs and it will tell you if they were part of a data breach of some online service. He has details on nearly 5 billion breached accounts, so it&#8217;s pretty comprehensive.</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Websites compromised to generate money</title>
		<link>https://www.l2cybersecurity.com/websites-compromised-generate-money/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 13 Feb 2018 11:53:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1137</guid>

					<description><![CDATA[<p>&#8220;Wait, what?!?!?? Websites can generate money? I&#8217;ve got a website. What do I have to do to get my hands on some of that lovely cash?&#8221; Calm yourself, it&#8217;s not the website doing the money generation and you are not the beneficiary. The bad guys are! ? Last weekend a security researcher called Scott Helme noticed&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">Websites compromised to generate money</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1149" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/mining-1-150x150.jpg" alt="generate money by cryptomining" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/mining-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/mining-1.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />&#8220;Wait, what?!?!?? Websites can generate money? I&#8217;ve got a website. What do I have to do to get my hands on some of that lovely cash?&#8221;</p>
<p>Calm yourself, it&#8217;s not the website doing the money generation and you are not the beneficiary. The bad guys are! <span id="c122" class="notranslate">?</span><span id="more-1137"></span></p>
<p>Last weekend a security researcher called Scott Helme noticed that when he visited some government websites, the processor usage on his machine would suddenly spike. If he went to a normal site (like YouTube) the processor usage would be more normal. Some of the sites that were shown to cause this spike in processor usage were:</p>
<ul>
<li>The United States Court information portal <strong><span style="text-decoration: underline;">www.uscourts.gov</span></strong></li>
<li>The UK&#8217;s Student Loans Company <strong><span style="text-decoration: underline;">www.slc.co.uk</span></strong></li>
<li>The UK&#8217;s data protection body, The Information Commissioner&#8217;s Office <strong><span style="text-decoration: underline;">www.ico.org.uk</span></strong></li>
<li>The Financial Ombudsman Service <strong><span style="text-decoration: underline;">www.financial-ombudsman.org.uk</span></strong></li>
<li>Also some of the UK NHS services</li>
</ul>
<p>Then some detective work revealed that these sites had one thing in common. They were all WordPress sites, but not only that, they all used a specific plug-in called <a href="https://www.texthelp.com/en-gb/products/browsealoud/">BrowseAloud</a>. This plug-in, created by a company called <em>Texthelp</em>, can be used by vision impaired people. It will speak the text on webpages to such individuals. There were <a href="https://publicwww.com/websites/browsealoud.com%2Fplus%2Fscripts%2Fba.js/">over 4,000 sites</a> shown to be affected by this compromise.</p>
<p>So what happened was, the evil doers compromised the plug-in software. When a web user browsed to an affected website and opened it in their browser, even without asking for the page to be read out to them, the plug-in would execute code which would &#8220;mine for monero cryptocurrency&#8221; or in normal language, it would generate money by using the web users processing power to carry out the complex calculations needed to create the cryptocurrency.</p>
<p>You might not think this is a big deal, but it is. Somebody is doing something illegal and using your machine to help them. It&#8217;s not your fault, but it is something to be concerned about. What if, instead of having plug-in execute code to generate money, that they used the processing power of your machine to send spam e-mail or target a particular web site to take it offline?</p>
<p>In fairness to <em>Texthelp</em>, as soon as they became aware of the issue, they took the plug-in offline until they resolved all issues with it. This kind of incident is similar to the <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya Ransomware outbreak</a> last year, in that the software that is in use was compromised at it&#8217;s source (also known as a supply-chain attack).</p>
<p>It&#8217;s hard to protect against these types of incidents, particularly where you are browsing a reputable website, which might be using a plug-in that has been compromised. As always I would suggest using an <a href="http://www.l2cybersecurity.com/use-anti-virus/">updated anti-virus</a>, keep your <a href="http://www.l2cybersecurity.com/use-automatic-updates/">software fully updated</a> and also use an ad-blocking extension/add-in on your browser.</p>
<p>The post <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">Websites compromised to generate money</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerable Cisco Firewalls</title>
		<link>https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 14:25:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1133</guid>

					<description><![CDATA[<p>It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale. The vulnerable Cisco firewalls are in widespread use and they need to be&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/">Vulnerable Cisco Firewalls</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-1146 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk-150x150.jpg" alt="vulnerable cisco" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (<em>Common Vulnerability Scoring System</em>) scale. <span id="more-1133"></span>The vulnerable Cisco firewalls are in widespread use and they need to be patched urgently.</p>
<p>As is usual, the vulnerability lies in the software that runs on these firewalls. This Adaptive Security Appliance (ASA) software is what has been found to be vulnerable by a researcher who was to present his findings at a security conference in Belgium last Friday. He hasn&#8217;t released all of the juicy details yet and there are no reported exploits in the wild, but that could all change.</p>
<p>The affected devices, <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1">according to Cisco</a>, are:</p>
<ul>
<li>3000 Series Industrial Security Appliance (ISA)</li>
<li>ASA 5500 Series Adaptive Security Appliances</li>
<li>ASA 5500-X Series Next-Generation Firewalls</li>
<li>ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers</li>
<li>ASA 1000V Cloud Firewall</li>
<li>Adaptive Security Virtual Appliance (ASAv)</li>
<li>Firepower 2100 Series Security Appliance</li>
<li>Firepower 4110 Security Appliance</li>
<li>Firepower 4120 Security Appliance</li>
<li>Firepower 4140 Security Appliance</li>
<li>Firepower 4150 Security Appliance</li>
<li>Firepower 9300 ASA Security Module</li>
<li>Firepower Threat Defense Software (FTD)</li>
<li>FTD Virtual (FTDv)</li>
</ul>
<p>If you have any of these devices in your network, you should be getting your IT support to patch it as soon as possible. There were reported issues with the initial patches, but Cisco have now rectified those too.</p>
<p>The big concern was to do with the Virtual Private Network (VPN) component on the firewall. If you are able to connect in remotely to your network by way of this VPN, then your entire network is at risk of being compromised.</p>
<p>Of course you&#8217;ve been following <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/">Commandment 3</a> and have a firewall in place. Now you&#8217;ve also got to employ <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> and keep it updated.</p>
<p>For the technical types who are reading this, you can get a much more in-depth view of the vulnerable Cisco firewall issues on <a href="https://blogs.cisco.com/security/cve-2018-0101">a blog post</a> by Omar Santos.</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/">Vulnerable Cisco Firewalls</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sneaky Tax Refund e-mails</title>
		<link>https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 09:55:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1139</guid>

					<description><![CDATA[<p>Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before. It is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1141" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg" alt="Tax refund scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.<span id="more-1139"></span></p>
<p>It is tax season in the US at the moment and there are a lot of scams going on, which the <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">IRS do warn people about</a>. This one caught my attention because it was a simple attempt to steal e-mail account credentials. Apparently there have been some changes made to the US tax code, which people are aware of but may not fully understand them, which may be enough to cause somebody to fall for this scam.</p>
<p>What happens is the victim receives an e-mail with the subject of &#8220;Federal Tax Refund Information&#8221;.</p>
<p>This e-mail then says &#8220;Good afternoon, I have a very important information for you concerning the Federal Tax Refund which I know that it will help you. Kindly check the attached file to view the details.&#8221; For those of you unfamiliar with <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, you might be tempted to open the attachment.</p>
<p>The PDF that is attached, when opened, simply contains what looks like a link to a Google Drive document.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1142 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png" alt="Tax refund scam google drive link" width="639" height="564" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png 639w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40-300x265.png 300w" sizes="auto, (max-width: 639px) 100vw, 639px" /></p>
<p>Which of course you want to look at because, money! There is also a sense of urgency introduced by saying the tax refund document is only stored for 14 days. While this is a fairly lengthy period by phishing standards, it still sows a sense of haste.</p>
<p>Clicking on the link, brings you to a website that looks an awful lot like a Google Docs sign-in page which, if you are not paying attention, might cause you to give away your Gmail account name and password. I refer, of course, to not paying attention in regards to the address of the sign-in page, which is circled in <span style="color: #ff0000;">red</span>:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1143 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png" alt="Tax refund scam google drive sign-in" width="616" height="536" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png 616w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54-300x261.png 300w" sizes="auto, (max-width: 616px) 100vw, 616px" /></p>
<p>That is not &#8220;https://accounts.google.com&#8221; which would be what you are would normally expect. Of course if a genuine account and password is provided, then the evil doers will now take full control over the e-mail account and use it for nefarious purposes, UNLESS of course you had followed <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">Commandment 7</a> and used two-factor authentication. If you had, you could then laugh at the bad guys attempting to login as you and failing because of this brilliant protection mechanism.</p>
<p>Then you calmly go ahead and change that password in ALL accounts that you used it in, because it&#8217;s now compromised.</p>
<p>While this has been relating to the US tax season, expect similar carry-on during October in Ireland.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Simple Security Planner tool for EVERYONE!</title>
		<link>https://www.l2cybersecurity.com/simple-security-planner-tool/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 10:32:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1017</guid>

					<description><![CDATA[<p>I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers. As I recently stated when talking about Quad9, I love it when the good guys come up with something&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1023" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png" alt="Security Planner" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I love it when I get to tell people about another great security tool. This simple Security Planner <a href="https://securityplanner.org/#/">tool</a> is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.<span id="more-1017"></span> As I recently stated when talking about <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9</a>, I love it when the good guys come up with something to help everyone &#8211; particularly the non-technical folks out there &#8230; after all you make up the vast majority of the users of the internet. <span id="c128" class="notranslate">?</span></p>
<p>This security planner was created by the good folk of the <a href="https://citizenlab.ca/">Citizen Lab</a>, an interdisciplinary group based at the Munk School of Global Affairs at the University of Toronto. It&#8217;s really, really, really easy to use and will guide you through everything from start to finish.</p>
<ol>
<li>It starts by asking what you use to handle private data (Windows computer, iThing, e-mail, etc.)</li>
<li>Then it asks what are your concerns (getting hacked,  infected, etc.)</li>
<li>Finally it asks if there is any particular reason for your concern (you&#8217;re being harrassed or dealing with a current issue, etc.)</li>
<li>Then it will give you an action list, with individual help on each thing that it recommends you to do.</li>
</ol>
<p>What I really appreciated was the first step it seems to give for everything &#8230; it&#8217;s to do with two-factor-authentication:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1025 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg" alt="" width="736" height="342" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg 736w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA-300x139.jpg 300w" sizes="auto, (max-width: 736px) 100vw, 736px" /></p>
<p>Regular readers of my blog/newsletter will know I&#8217;m always going <a href="https://www.l2cybersecurity.com/double-check-security/">on</a> and <a href="https://www.l2cybersecurity.com/protect-online-accounts/">on</a> and <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">on</a> about this. I don&#8217;t repeat myself often, unless it&#8217;s for a really, really, really good reason and two-factor-authentication is one such reason. It really does help protect your online accounts and so, where available, please, please, please use it.</p>
<p>So, for those of you reading this now, go ahead and use this security planner to help protect youself.</p>
<p>And then, when you go visiting your family over the Christmas period, particularly the more mature members of your nearest and dearest, why not sit down with them, fire up this website on their computer/tablet/phone and go through this fairly painless, simple process to get themselves as protected as you are. They&#8217;ll thank you for it and so will Santa. <span id="c116" class="notranslate">?</span></p>
<p>Happy Christmas! ?</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dodgy e-mail that looks legit.</title>
		<link>https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 10:45:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=984</guid>

					<description><![CDATA[<p>I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like last weeks story, this message looked kinda plausible.It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-985" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg" alt="Dodgy e-mail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like <a href="https://www.l2cybersecurity.com/double-check-security/">last weeks story</a>, this message looked kinda plausible.<span id="more-984"></span>It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one person to be waiting on a delivery to fall for it.</p>
<p>Here is the offending dodgy e-mail:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-986" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg" alt="" width="516" height="352" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg 516w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1-300x205.jpg 300w" sizes="auto, (max-width: 516px) 100vw, 516px" /></p>
<p>To me, there are a number of obvious indicators that this is a dodgy e-mail:</p>
<ol>
<li>The sending address (the bit after &#8220;UPS View&#8221;) was not a UPS address.</li>
<li>The two links in the e-mail did not go to a UPS website.</li>
<li>Most obviously &#8230; I wasn&#8217;t expecting a delivery!</li>
</ol>
<p>So lets take them one at a time:</p>
<ul>
<li>Some e-mail clients don&#8217;t actually show you the whole e-mail address of the sender. They just show the <em><strong>Display Name</strong></em>, which in this case is &#8220;UPS View&#8221;. So if you were using such a client, then it would appear to be a legitimate UPS e-mail address. However in my case, there was this @aol.com e-mail address, which is not associated with UPS.</li>
<li>When you see a link in an e-mail or website, you can hover the mouse over it. Somewhere towards the bottom of your browser window, you should be able to see where the link is going to take you. In this e-mail&#8217;s case it was going here, which is not a UPS site:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-991" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-2.jpg" alt="" width="252" height="19" /></p>
<ul>
<li>In my case I wasn&#8217;t expecting any delivery. But what if I was? What if I was an under pressure procurement clerk in a large organisation? I&#8217;d be getting deliveries on a regular basis. I&#8217;d be very inclined to click on those links.</li>
</ul>
<p><span style="text-decoration: underline; color: #ff0000;"><strong>Please note</strong></span> I carried out the following action on a sacrificial machine, so please do not be tempted to ever click on links to see what happens next. It could end very badly for you.</p>
<p>So what would have happened if I did click on the link? A word document, with a name that started &#8220;Tracking-3154631&#8230;&#8221; was downloaded. This document, if opened, would persuade me to click on &#8220;Enable Editing&#8221; and then click on &#8220;Enable Content&#8221;. Once I had taken those actions, macros (a set of instructions for a computer) in the word document would have downloaded a really nasty piece of software. Then all of my files would have been scrambled and I would be presented with a ransom demand to get my data back.</p>
<p>If I was that under pressure procurement clerk, it would not have stopped at just the files on my computer, but any files that I could access on the company&#8217;s network. That could be very, very disruptive to the organisation.</p>
<p>Out of curiosity, I checked the website (the bit before the &#8220;/UPS/16-Nov&#8230;.&#8221;) that hosted that document. It appears to be a legitimate business website. However, they&#8217;ve probably been hacked by the bad guys, who are now using their site to host their malicious downloads.</p>
<p>UPS offer advice on <a href="https://www.ups.com/us/en/about/news/fraud-alert.page">fraudulent e-mails</a>.</p>
<p>As usual, we&#8217;ve even got a <a href="https://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">commandment</a> that covers dodgy e-mails too. So have a read to see what you can do to protect yourself.</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Double check your security.</title>
		<link>https://www.l2cybersecurity.com/double-check-security/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 09 Nov 2017 11:00:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=980</guid>

					<description><![CDATA[<p>There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification). I bring this up as a real-life scenario came to my attention this week. I was giving a training session and during a break one of the attendees asked&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/double-check-security/">Double check your security.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-981" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/double-150x150.gif" alt="Double Check Security" width="150" height="150" />There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).<span id="more-980"></span></p>
<p>I bring this up as a real-life scenario came to my attention this week. I was giving a training session and during a break one of the attendees asked me about a strange WhatsApp message that she received.</p>
<p>She showed me the message, which reportedly came from Apple, about a transaction on her account, that occurred in Mexico, which they blocked. There was a link for her to check her account. She told me that she had clicked on the link, and after signing into her iTunes account nothing else happened. Before I could say anything, she clicked on the link again and there was the sign-in page.</p>
<p>I have to say, that the WhatsApp message and sign-in page looked very plausible and legitimate. There were no spelling mistakes or lousy formatting. I had to break the news to her that she had given her iTunes ID and password to the bad guys and she needed to change her password as quickly as possible. So I took her through the process on her iPhone. When we got as far as here, I breathed a sigh of relief.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-982 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password-300x177.jpg" alt="" width="300" height="177" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password-300x177.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/ios11-iphone7-settings-apple-id-password-security-change-password.jpg 550w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>With this <a href="https://support.apple.com/en-ie/HT204915">Two-Factor Authentication</a> turned on, the evil doers would not be able to access her iTunes, without access to her phone. That&#8217;s because Two-Factor Authentication is like a double check. When you sign in to an account with an ID and password, the service does a double check and sends a code to your phone as a text message, which you then type in to complete the sign in.</p>
<p>While we were reassured that her iTunes account was reasonably safe from being immediately hacked, I still got her to change her password to something new. I also advised her to change any other account that used that password as well.</p>
<p>This Two Factor Authentication malarkey is such a good idea, I&#8217;d even created it&#8217;s own <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/double-check-security/">Double check your security.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
