<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/data-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/data-breach/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:03:53 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Data Breach Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/data-breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 099 Using the security.txt file</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Oct 2021 07:15:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Reporting a Data Breach]]></category>
		<category><![CDATA[Reporting Data Breaches]]></category>
		<category><![CDATA[Security Researchers]]></category>
		<category><![CDATA[security.txt]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Using the security.txt file]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2627</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file. Why is this a thing If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file.<span id="more-2627"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2627-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4</a></video></div>
<h3>Why is this a thing</h3>
<p>If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data on some underground forums, where they might try and sell it to other criminal gangs, for their use.</p>
<p>But there are also, usually, good guy security researchers in those forums too, keeping an eye on things. If they come across some company’s data being trying to be sold, they may try to notify the company that there has been a breach as they may not be aware of it. Sometimes the security researchers find it difficult to get through to these companies to make contact with somebody that they can discuss this data breach.</p>
<h3>How can using the security.txt file help</h3>
<p>That’s where the security.txt file comes in. This is just a simple text file that contains some contact information for somebody in the security area or in IT. Somebody that would be reachable by email and maybe if you want to do it securely they may also include the public encryption key for the email to make sure that all communications are kept secured so that the security researchers can reach out and contact the company. They can use the contact address and get in touch there to report the data breach and maybe other vulnerabilities that they may have discovered.</p>
<h3>Where can I find out more</h3>
<p>So it&#8217;s always good to have this and it&#8217;s usually placed on your website in a well-known location. Here is the <a href="https://securitytxt.org/" target="_blank" rel="noopener">security.txt proposed standard</a>.</p>
<p>So if you have a website, set-up this security.txt file for it.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4" length="35355646" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 068 A Data Breach of Bank Details</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-068-a-data-breach-of-bank-details/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 05 Mar 2021 02:00:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bank Details]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach of Bank Details]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[Data Protection Commission Report 2020]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2467</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 68. This week we&#8217;re going to talk about a data breach of bank details. Where is this coming from? As I said last week, the Data Protection Commission had issued a report for 2020. I&#8217;ve had a chance to read through it now in a bit more detail. I really love&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-068-a-data-breach-of-bank-details/">#WeekendWisdom 068 A Data Breach of Bank Details</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 68. This week we&#8217;re going to talk about a data breach of bank details.<span id="more-2467"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2467-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>As I said last week, the Data Protection Commission had issued a report for 2020. I&#8217;ve had a chance to read through it now in a bit more detail. I really love looking at the case studies that they include there because these are real life events that have occurred.</p>
<p>One of them struck me as something that could occur anywhere.</p>
<h3>What? A data breach of bank details??? That&#8217;s serious!</h3>
<p>It was Case Study 15: Bank details sent by WhatsApp. What had occurred was that a customer of a financial institution had gotten in contact with them wanting to get a copy of their BIC and IBAN details. The member of staff that was dealing with the enquiry knew this person. So, because of that, they took a picture of the details on their personal phone and sent them by WhatsApp to the customer.</p>
<h3>WhatsApp is encrypted, so it must be safe. Right?</h3>
<p>But it turns out the details that they took the photo of were for somebody else. So, when the customer reported this incident to the bank, they realised this was a data breach. That customer had seen somebody else&#8217;s personal details.</p>
<h3>How does a business prevent this type of issue?</h3>
<p>This is simply a staff training issue. Staff need to be aware that they should always follow proper protocols when dealing with people&#8217;s personal details. To make sure that they provide the correct details to the correct person.</p>
<p>As I say it could happen to anybody. So use that example with your staff today.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-068-a-data-breach-of-bank-details/">#WeekendWisdom 068 A Data Breach of Bank Details</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4" length="31885243" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 067 Data Protection Commission Report 2020</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-067-data-protection-commission-report-2020/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 26 Feb 2021 02:15:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[Data Protection Commission Report 2020]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR Complaints]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2462</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 67. This week we&#8217;re going to talk about Data Protection Commission Report 2020. Yesterday the Data Protection Commission (DPC) in Ireland released their annual report for 2020 and I&#8217;ll just give a quick summary of its findings here. What is the number 1 complaint that the DPC get? The number one&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-067-data-protection-commission-report-2020/">#WeekendWisdom 067 Data Protection Commission Report 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 67. This week we&#8217;re going to talk about Data Protection Commission Report 2020.<span id="more-2462"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2462-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4</a></video></div>
<p>Yesterday the Data Protection Commission (DPC) in Ireland released their annual report for 2020 and I&#8217;ll just give a quick summary of its findings here.</p>
<h3>What is the number 1 complaint that the DPC get?</h3>
<p>The number one source of complaints for the third year in a row under the GDPR remains access requests. So, businesses out there are still having trouble giving people access to their data that they&#8217;re entitled to.</p>
<p>I always focus in the training to make sure that people get their access rights done properly. They have proper procedures in place to handle these requests from individuals.</p>
<h3>Any figures for Data Breaches?</h3>
<p>Over in regard to data breaches. The number of those reported to the Data Protection Commission has increased again by about 8% overall.</p>
<p>But the number one source of data breaches was unauthorised disclosures of personal data, which was up 12.5% over last year, to nearly 6,000 breaches, which is really, really significant.</p>
<p>Data Breaches caused by hacking were up about 40% and Ransomware incidents also doubled over last year. So, things are going the wrong way.</p>
<h3>Is there any good news in the Data Protection Commission Report 2020?</h3>
<p>Just to finish on a happy note. I was delighted to see that data breaches in regard to phishing have halved over last year. So that must mean people are getting really good training out there on how to spot dodgy emails.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-067-data-protection-commission-report-2020/">#WeekendWisdom 067 Data Protection Commission Report 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4" length="31011550" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 056 Credential Stuffing</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 02:15:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Account Compromise]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Stuffing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[HaveIBeenPwned]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Reuse]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Unique Password]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2388</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing. Where is this coming from? I have introduced the www.HaveIBeenPwned.com service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing.<span id="more-2388"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2388-4" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>I have introduced the <a href="https://www.haveibeenpwned.com" target="_blank" rel="noopener noreferrer">www.HaveIBeenPwned.com</a> service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have been included in data breaches. When they&#8217;ve gone to look and see what was breached, in a number of cases they had at least their email address and password for that service were included in the data breach.</p>
<p><em>Also check out previous <a href="https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 014</a>, <a href="https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 015</a> and <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 016</a>.</em></p>
<h3>Data breaches are bad. What should they do?</h3>
<p>So they asked me &#8220;What should I do?&#8221;. The first thing of course is always, they must change their password on that service or site or whatever it was that was breached. Then I ask &#8220;Do you use that password anywhere else?&#8221; And they say &#8220;Yeah. I use it on multiple sites&#8221; or &#8220;It&#8217;s my favourite password. I use it everywhere.&#8221;</p>
<p>So I said &#8220;Well you&#8217;re going to have to change that password on all of these other platforms.&#8221;</p>
<p>They say &#8220;That&#8217;s going to be an awful lot of effort. Why should I worry?&#8221;</p>
<h3>Why did you call this post Credential Stuffing?</h3>
<p>You worry because of a thing called Credential Stuffing. What happens is that the bad guys, they take these data breaches, say from LinkedIn back in 2012. They take those email addresses and passwords that they have cracked and they try to sign into Facebook, into Twitter, into Microsoft 365, into Google G Suite, into Gmail and many, many other services. The criminals will try all of these things automatically.</p>
<p>They are stuffing credentials into services to be able to try and break in. That is what credential stuffing is all about. That is why you should not use the same password across multiple platforms and services.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4" length="29665510" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 052 Using Shared Accounts</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-052-using-shared-accounts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 00:05:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shared Accounts]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2357</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 52. This week we&#8217;re going to talk about using shared accounts. First of all what do I mean by a shared account? What is a Shared Account? A shared account is a generic user ID or username that has its password known by multiple people. Now I&#8217;m distinguishing this from generic&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-052-using-shared-accounts/">#WeekendWisdom 052 Using Shared Accounts</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 52. This week we&#8217;re going to talk about using shared accounts.<span id="more-2357"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2357-5" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-052-lo.mp4?_=5" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-052-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-052-lo.mp4</a></video></div>
<p>First of all what do I mean by a shared account?</p>
<h3>What is a Shared Account?</h3>
<p>A shared account is a generic user ID or username that has its password known by multiple people. Now I&#8217;m distinguishing this from generic accounts which might have their password only known by one person. They&#8217;re ok. There&#8217;s no real risks there. So that could be an Accounts user ID or a HR user ID.</p>
<h3>How about an example?</h3>
<p>But the shared accounts are risky. So just as an example in a hotel environment you might have multiple staff that look after the reception desk. They might all have access to a &#8220;reception&#8221; account that is set up on the computer there. so that they don&#8217;t have to be logging in, logging out or things like that on that computer.</p>
<h3>What is risk of using shared accounts?</h3>
<p>Now the thing is because multiple people know that password you lose control over any tracking over what that account does. So one of those staff logged into the account and they transfer a database of information off to some external account, you don&#8217;t know which one of the multiple people that know the password, you don&#8217;t know who did it. It can be very difficult to track that down.</p>
<p>So those are the kind of risks that exist with using shared accounts.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-052-using-shared-accounts/">#WeekendWisdom 052 Using Shared Accounts</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/10/WeekendWisdom-052-lo.mp4" length="26306261" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 014 Have you been in a data breach</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 07 Feb 2020 10:55:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Have you been in a data breach]]></category>
		<category><![CDATA[HaveIBeenPwned]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1831</guid>

					<description><![CDATA[<p>Welcome to weekend wisdom number 14. This week we&#8217;re going to talk about have you been in a data breach? We&#8217;ve heard of companies having data breaches and losing people&#8217;s data. But how could you find out if you are included in some of the data breaches? There is a free site from a gentleman&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/">#WeekendWisdom 014 Have you been in a data breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to weekend wisdom number 14. This week we&#8217;re going to talk about have you been in a data breach?<span id="more-1831"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1831-6" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-014-lo.mp4?_=6" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-014-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-014-lo.mp4</a></video></div>
<p>We&#8217;ve heard of companies having data breaches and losing people&#8217;s data. But how could you find out if you are included in some of the data breaches? There is a free site from a gentleman called Troy hunt from Australia and the site is called <a href="http://www.haveibeenpwned.com" target="_blank" rel="noopener noreferrer">www.haveibeenpwned.com</a>. &#8220;Pwned&#8221; is hacker-speak for &#8220;Owned&#8221; or compromised so &#8220;Have I been compromised .com&#8221; really.</p>
<h3>So have you been in a data breach?</h3>
<p>All you have to do is:</p>
<ol>
<li>Go to the site</li>
<li>Enter your email address</li>
<li>Click &#8220;Pwned?&#8221;</li>
</ol>
<p>If it it comes up saying no pwnage found, happy days that email address is safe. It is not included in a data breach that Troy Hunt is aware of.</p>
<p>However if you input your email address and click &#8220;Pwned?&#8221; and it comes up &#8220;Oh no pwnage found&#8221;:</p>
<ol>
<li>Scroll down the web page</li>
<li>It will show you what breaches you have been included in</li>
<li>It will also show you what details have been lost in that data breach</li>
</ol>
<p>So you are now aware of what information is out there in the wild.</p>
<h3>Can I receive a warning if I have been in a data breach?</h3>
<p>If you want to be notified, if you ever do come into a data breach in the future, from this website:</p>
<ol>
<li>You can click notify me</li>
<li>Then click the I&#8217;m not a robot</li>
<li>Click &#8220;please notify me of pwnage&#8221;</li>
<li>Then you will be sent a verification email</li>
<li>Once you click OK on that, then you will be registered with the site</li>
</ol>
<p>So if that email address ever does come up in a data breach in future you will get notified.</p>
<p>So that&#8217;s it for this week let&#8217;s be careful out there we&#8217;ll talk to you again next week.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/">#WeekendWisdom 014 Have you been in a data breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-014-lo.mp4" length="23545451" type="video/mp4" />

			</item>
		<item>
		<title>Whatsapp Authentication Sucks</title>
		<link>https://www.l2cybersecurity.com/whatsapp-authentication-sucks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 11 Jan 2019 16:56:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1570</guid>

					<description><![CDATA[<p>Whatsapp Authentication sucks. It sucks really badly. I&#8217;d never thought about it before, but then I saw this tweet yesterday. A lady got a new phone number and when she set up Whatsapp, she had a load of messages on there from the previous owner of the number. &#8220;Wait a minute!&#8221; I hear you cry &#8220;Surely&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/">Whatsapp Authentication Sucks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1571" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks-150x150.png" alt="Whatsapp authentication sucks" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks.png 300w" sizes="(max-width: 150px) 100vw, 150px" />Whatsapp Authentication sucks. It sucks really badly. I&#8217;d never thought about it before, but then I saw <a href="https://twitter.com/abbyfuller/status/1083560674884694017?s=19" target="_blank" rel="noopener">this tweet yesterday</a>. A lady got a new phone number and when she set up Whatsapp, she had a load of messages on there from the previous owner of the number. <span id="more-1570"></span>&#8220;Wait a minute!&#8221; I hear you cry &#8220;Surely Whatsapp, owned by Facebook and used by millions of people, has super security?&#8221; Well I&#8217;m sure it&#8217;s back-end systems are all well protected. The messages between users are all properly encrypted and secure. But to authenticate to the service &#8230; all you need is a telephone number. If you use the telephone number of another user or a former user, you get their messages!!! There is a way to prevent this, which I&#8217;ll get to later.</p>
<h3>Setting up an account is sooo easy</h3>
<p>Cast your mind back to when you set up Whatsapp on your phone for the first time and you set up your account with them. Did you specify a User ID or Username? Did you give it a password? The answer is no. The only authentication was your telephone number, which your phone was giving the app.</p>
<h3>Recycling is good for the planet, but not good for security</h3>
<p>Mobile telephone numbers get recycled by telephone companies all the time. This is because they don&#8217;t have an unlimited amount of numbers that they can issue. If you watch enough crime programmes on the TV, you will see a lot of &#8220;burner&#8221; phones being used. These are basically a cheap phone and number that might only be used once or twice and then is disposed of forever. Also, people having affairs would sometimes have a second &#8220;secret&#8221; phone for communicating with their paramour. If the affair doesn&#8217;t last long, that phone number will be disposed of.</p>
<p>So phone companies that have old numbers, where a contract hasn&#8217;t been renewed or a prepaid number has not been topped up in some time, they will simply assign them to new SIM cards and push them out through their retail channels. Thus the number is recycled and reused.</p>
<p>This is what happened to <a href="https://twitter.com/abbyfuller/status/1083560674884694017?s=19" target="_blank" rel="noopener">Abby Fuller</a>. She got a new number and when she installed Whatsapp, she had all of the messages from that telephone number&#8217;s previous owner restored onto her device. Because the number is the only means of identifying an account, this is why Whatsapp authentication sucks.</p>
<p>She took the correct course of action and deleted everything. However if she had a bad side, she could have downloaded all of the messages or even worse, she could have impersonated that number&#8217;s previous owner in those messages and caused all sorts of issues.</p>
<h3>So Whatsapp authentication sucks. What can I do about it?</h3>
<p>You can set up, what Whatsapp calls, two step verification. With this enabled, if you (or somebody else), try to setup Whatsapp with your number on a different phone, you (or they) will be asked for a PIN number, which only you should know.</p>
<p>It&#8217;s really easy to set up:</p>
<ol>
<li>Go into your Whatsapp settings</li>
<li>Select Account -&gt; Two step verification</li>
<li>It will have an explanation screen. Click Enable</li>
<li>Provide a 6 digit PIN number and then confirm it</li>
<li>Optionally (but recommended) you can provide an email address should you forget the PIN number, where a PIN reset request can be sent. You will need to confirm that email address</li>
<li>That&#8217;s it</li>
</ol>
<p>If somebody gets your number or they try to take over your phone number, when they try to set up Whatsapp, they will need to input the PIN you just set up. It&#8217;s not really the best <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/" target="_blank" rel="noopener">two step verification</a> in the world, but it should be effective.</p>
<p>I must try and persuade the few Whatsapp groups that I am involved in to switch to something more secure like <a href="https://signal.org/" target="_blank" rel="noopener">Signal</a>.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/">Whatsapp Authentication Sucks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of my 2018 predictions.</title>
		<link>https://www.l2cybersecurity.com/review-2018-predictions/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 31 Dec 2018 09:28:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[2018]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Predictions]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1533</guid>

					<description><![CDATA[<p>I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one of those, so here is my review. I’ve included the original text below in blue, but the full article for my 2018 predictions is here. &#160; &#160;&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2018-predictions/">Review of my 2018 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1053" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300-150x150.png" alt="will 2018 bring" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300.png 300w" sizes="(max-width: 150px) 100vw, 150px" />I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one of those, so here is my review. I’ve included the original text below in blue, but the full article for my 2018 predictions is <a href="https://www.l2cybersecurity.com/will-2018-bring/" target="_blank" rel="noopener">here</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span id="more-1533"></span></p>
<h3>1. There will be another large scale incident on a similar scale to WannaCry</h3>
<p><span style="color: #0000ff;">Every year there are really large attacks using different methods to cause problems. In 2016 we saw huge floods of data <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">attacking online services</a>. This flood was caused by poorly secured internet connected security cameras. 2017 saw Ransomware worms in <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> and <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya</a>. The latter of these was quite ingenious in the way it worked, as it used different methods to move around networks, once it successfully infected a machine. I’m going to guess that we’ll see something of similar complexity being used, perhaps in a more targeted way – possibly by way of altering a widely used <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">application’s source code</a> and lying dormant until activated.</span></p>
<p>There was one huge, record breaking event, but it didn&#8217;t feature in most of the global news as it affected a US based service provider. It was a large distributed denial of service attack, which <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/" target="_blank" rel="noopener">I reported here</a>. Earlier in the year, there was a situation where websites that used <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/" target="_blank" rel="noopener">a certain popular plug-in</a> were &#8220;mining&#8221; virtual currency for the bad guys. In September, there was number of well known websites, <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/" target="_blank" rel="noopener">like Ticket Master and British Airways</a>, who had their payment pages compromised. People who used those sites had their credit card information stolen.</p>
<p>I&#8217;ll take a partial on this, as the stories above didn&#8217;t have the same kind of media frenzy or global awareness as previous incidents.</p>
<h3>2. Past Data Breaches will impact victims financially on a large scale</h3>
<p><span style="color: #0000ff;">With so many data breaches occurring throughout 2017 (and for years earlier), there is a huge amount of useful and usable data that the evil doers can, if they used some <a style="color: #0000ff;" href="https://en.wikipedia.org/wiki/Big_data">big-data methodologies</a>, mine to extract and target individuals and hit them financially. It’s not credit card numbers I’d be worried about, as the issuers are fairly good at catching fraud and protecting the card holder. It’s all of the other information that could be used to craft a very convincing e-mail/letter/WhatsApp message that will cause the victim to send money to the bad guys.</span></p>
<p>I reckon I got this one. Old passwords that were breached a long time ago (possibly from the 2012 LinkedIn breach), were used to make a <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">sextortion e-mail</a> appear more credible and a lot of people fell for it. According to <a href="https://cryptoblockwire.com/sextortion-scam-500000-bitcoin-btc/" target="_blank" rel="noopener">some reports</a>, 1,000 people paid approximately $500,000. An <a href="https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922" target="_blank" rel="noopener">earlier analysis</a> of the payments showed that some people paid up to $4,900, with the average being $1,900.</p>
<h3>3. GDPR will cause a big Facebook-type company to be fined</h3>
<p><span style="color: #0000ff;">I suspect there are individuals out there waiting in the long grass for May 25th 2018 to roll around so they can launch all manner of <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/gdpr-glossary/#subjectaccessrequest">subject access requests</a> on various companies and government departments that they don’t like. Just to be a nuisance. I do, however, expect that some large global corporation, that has a lot of personal data on a huge number of people, will end up being investigated and, either in 2018 or 2019, be levied a massive, multi-million Euro fine. But they will fight back and hold up the imposition of the fine for a number of years. They may even expose flaws in the GDPR legislation.</span></p>
<p>The cases are still under investigation, so I&#8217;ll take a partial on this, but it&#8217;s not a Facebook-type company that is going to be fined, but Facebook themselves. They currently have <a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-announces-statutory-inquiry-facebook" target="_blank" rel="noopener">multiple post-GDPR investigations underway</a> with the Data Protection Commission.</p>
<h3>4. Crypto-currency hack</h3>
<p><span style="color: #0000ff;">If BitCoin is still a valuable thing in 2018 (and hasn’t crashed and burned), I expect the evil doers will be doing their best to hack the BitCoin block chain in order to steal some of that sweet, sweet virtual currency.</span></p>
<p>This was a miss. I&#8217;ve not heard of any successful block chain hacks and BitCoin&#8217;s value has fallen so low, it&#8217;s probably not worth the effort to attempt to hack it any more.</p>
<h3>5. Data breaches will see a massive increase in reporting in Ireland</h3>
<p><span style="color: #0000ff;">While there have been data breaches reported in Ireland, they are few and far between. However, I fully expect that the requirement to report data breaches to the Data Protection Commissioner under the GDPR, will cause an increase in the reports of data breaches occurring. I have a useful <a style="color: #0000ff;" href="https://www.youtube.com/watch?v=w8CAmzboqxg">short video here</a> showing that there are many different types of data breach that might need to be reported.</span></p>
<p>This was a kinda easy one to predict. In 2017, there were on average 230 data breaches reported to the Data Protection Commissioner each month. Two months after the GDPR had been implemented, the Data Protection Commission (as it is now known) had received <a href="https://www.irishtimes.com/business/technology/dpc-receives-over-1-100-reports-of-data-breaches-since-start-of-gdpr-rules-1.3580240" target="_blank" rel="noopener">nearly 600 data breach notifications</a> per month.</p>
<h3>Results for my 2018 predictions</h3>
<p>2 correct, 2 partials and 1 incorrect. Not too bad.</p>
<p>I don&#8217;t plan on doing this again next year. However, if enough people ask me to do so, then I&#8217;ll reconsider. Send me an e-mail at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and let me know if you want to see a 2019 set of predictions.</p>
<p>Wishing you and yours a safe and secure 2019.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2018-predictions/">Review of my 2018 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Paying Ransomware may break the law</title>
		<link>https://www.l2cybersecurity.com/paying-ransomware-may-break-law/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Dec 2018 10:09:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Criminals]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1512</guid>

					<description><![CDATA[<p>Some businesses that are affected by a Ransomware incident, make a decision to pay the criminals in order to recover their data. This is usually because they believe it is more expensive to go through the recovery process. If they have poor or non-existent backups, then that may very well be the case, so they&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/paying-ransomware-may-break-law/">Paying Ransomware may break the law</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text alignwide">
<figure class="wp-block-media-text__media"><img decoding="async" class="alignleft wp-image-2950 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Paying-Ransomware-150x150.jpg" alt="paying ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Paying-Ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Paying-Ransomware.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" /></figure>
<div class="wp-block-media-text__content">
<p>Some businesses that are affected by a Ransomware incident, make a decision to pay the criminals in order to recover their data. This is usually because they believe it is more expensive to go through the recovery process. If they have poor or non-existent backups, then that may very well be the case, so they end up paying Ransomware.</p>
</div>
</div>
<p><span id="more-1512"></span></p>



<p>My attitude has always been to never pay. This is because:</p>



<ol class="wp-block-list">
<li>You stand a very good chance of not being able to get your data back.</li>
<li>You are giving good money to criminals. This will be used to fund criminal enterprises like human trafficking, drug smuggling, gunrunning, etc.</li>
<li>With some simple preparation, it&#8217;s unnecessary.</li>
<li>You might need the money to pay a GDPR related fine.</li>
</ol>



<p>We&#8217;ll deal with those later, but first I want to address why &#8230;</p>



<h2 class="wp-block-heading">Paying Ransomware may break the law.</h2>



<p>If your business is in any way a part of a US corporation, then you are probably already screening all of your financial transactions against a list provided by the Office of Foreign Assets Control (OFAC). This is a part of the US Government&#8217;s Treasury Department. They produce a list of designated individuals, businesses and countries with which US corporations are prohibited from doing business with. It&#8217;s all about cutting off avenues to finance terrorism. If your business tries to transfer money to one of these designated individuals, screening that transaction against the OFAC list should flag it as being illegal. To date it&#8217;s all been about identifying bank accounts.</p>



<p>Last month <a href="https://www.bleepingcomputer.com/news/security/making-a-ransomware-payment-it-may-now-violate-us-sanctions/" target="_blank" rel="noreferrer noopener" aria-label="OFAC included a couple of cryptocurrency addresses (opens in a new tab)">OFAC included a couple of cryptocurrency addresses</a> (a virtual wallet for a digital currency) in this list. They attributed them to a couple of Iranian criminals who are allegedly behind a particular type of Ransomware, called SamSam.</p>



<p>So this means that any US company that gets affected by SamSam, will break US Federal Law if they pay the ransom into those virtual wallets. The fines that can be imposed for such breaches would be a lot higher than the Ransom demand. As nearly all Ransomware is paid by some form of cryptocurrency, then this screening is likely to spread to other such virtual wallets.</p>



<p>&#8220;I&#8217;m not affiliated with a US corporation, so I can pay the ransom.&#8221; says you. Let&#8217;s go back to the 4 points I made earlier.</p>



<h2 class="wp-block-heading">You might pay for nothing.</h2>



<p>If you pay, you might not get your data back. Figures vary wildly from <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/" target="_blank" rel="noreferrer noopener">50%</a> to <a href="https://gbhackers.com/ransomware-attack/" target="_blank" rel="noreferrer noopener">100%</a> failure to recover data. If you pay and don’t get your data back, you will then have to pay the full cost of recovery anyway.</p>



<h2 class="wp-block-heading">You&#8217;re funding criminal activity.</h2>



<p>When you pay, you are funding organised crime. You are paying criminals who not only do cyber crime, but human trafficking, drugs, weapons, etc. All the crime and terrorism news you see online, on TV or in the papers &#8211; That! That is what ransom payments are helping to fund.</p>



<p>People think I am being jokey or have my tongue in cheek when I refer to <em><strong>Evil Doers</strong></em>. I’m not. This is an accurate description of these people. They! Are! <strong>EVIL!</strong></p>



<p>So no paying Ransomware. OK?</p>



<h2 class="wp-block-heading">Be prepared.</h2>



<p>It may be the Boy Scouts motto (full disclosure, I never was one ?) but it should be part of your business&#8217; policies.</p>



<p>The first thing is to make sure you get your staff some security awareness training. This is something that I deliver. Details of the complete training is <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noreferrer noopener">available here</a>. We can do customised training to suit your organisation too. Call me on <span style="color: #0000ff;">087-436-2675</span> or e-mail on <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noreferrer noopener">info@L2CyberSecurity.com</a> to discuss your requirements.</p>



<p>Then ensure that you have your systems <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noreferrer noopener">updated/patched regularly</a>, have security appliances like <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/" target="_blank" rel="noreferrer noopener">Firewalls in place</a>, <a href="http://www.l2cybersecurity.com/use-anti-virus/" target="_blank" rel="noreferrer noopener">Anti-Virus is generally helpful</a> against malicious software and also you <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noreferrer noopener">shouldn’t insert strange USB devices</a> into your computers.</p>



<p>Finally, you should have a good data backup system in place. This can be a very simple set-up or more complicated depending on your business needs. Again, I offer advice and support on backup strategies and business continuity planning. I also have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noreferrer noopener">a commandment about backups</a>.</p>



<p>That’s it! With all of the above in place, <strong>in the</strong> <strong>very unlikely event</strong> that you do subsequently suffer a Ransomware incident, you will be able to recover from it.</p>



<p>There is also some help available from the good guys. It&#8217;s a not-for-profit, freely available service called <strong>No More Ransom</strong> (<a href="https://www.nomoreransom.org/" target="_blank" rel="noreferrer noopener">https://www.nomoreransom.org</a>). This is run by various Law Enforcement and Cyber Security firms around the world. They are constantly working on cracking the codes for the different Ransomware variants and enabling people to recover their data for free.</p>



<h2 class="wp-block-heading">The GDPR has something to say.</h2>



<p>If your business processes personal data of individuals who are resident in the European Economic Area (EEA), then it is subject to the GDPR. If the files that are scrambled by the Ransomware contain personal data, then technically you have a data breach on your hands. I have a short video explaining this here:</p>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted" title="05 Ransomware" width="500" height="315" src="https://video.infosec.exchange/videos/embed/2d3785ce-f11a-40a5-af41-bf4d096e9706#?secret=cwrnAmarT5" data-secret="cwrnAmarT5" frameborder="0"></iframe></p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Finally, if you do suffer a Ransomware incident, a crime has been committed, so please report it to local Law Enforcement. They may not be able to do much about it, but it needs to be reported for statistical purposes if nothing else. If it can be shown that Cyber crime is as big a problem, as I know it to be, then the more reports to Law Enforcement will mean they will get more resources to be able to tackle it’s root cause.</p>



<p>Lets be careful out there.</p>



<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/paying-ransomware-may-break-law/">Paying Ransomware may break the law</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Breaches Everywhere</title>
		<link>https://www.l2cybersecurity.com/data-breaches-everywhere/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 16:30:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[Quora]]></category>
		<category><![CDATA[VisionDirect]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1482</guid>

					<description><![CDATA[<p>It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. It really does look there&#8217;s data breaches everywhere you look. The worry about&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1497" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg" alt="data breaches everywhere" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. <span id="more-1482"></span>It really does look there&#8217;s data breaches everywhere you look. The worry about this, is that people may just think that this is the new normal and put up with it.</p>
<p><strong>Updated 05/12/18:</strong> To include the Dell, potential breach.</p>
<p>Last Wednesday, Dell announced a potential cybersecurity incident. This was followed on Friday when it was revealed that Marriott International Hotels had a massive 500m  records stolen. These were all forgotten by Monday for most normal people and then later on Monday Quora, an online question and answer forum had 100m records stolen. A couple of weeks ago, Amazon notified an unknown number of customers that their name and e-mail address were exposed. Earlier in the month, VisionDirect in the UK had lost payment card data for an undisclosed number of customers.</p>
<p>That&#8217;s just 5 companies that you probably <span style="text-decoration: underline;"><strong>have</strong></span> heard of. I covered the <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/" target="_blank" rel="noopener">NUI Galway breach</a> separately a couple of weeks ago. There were lots <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-november-2018-251-286753-records-leaked" target="_blank" rel="noopener">more breached last month</a>. I&#8217;ll give a synopsis on each one of the five and then discuss what can happen.</p>
<h3>Quora have some questions to answer</h3>
<p>So <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Quora-Security-Update-2018-12-03.pdf" target="_blank" rel="noopener">Quora had ~100m records accessed</a> by persons unknown. They detected the issue on Friday 30th November and on Monday 3rd December they endeavoured to contain the issue. They logged out the impacted individuals and forced them to reset their passwords when they log back in. What was taken by the bad guys?</p>
<ul>
<li>
<blockquote><p>Account information, e.g. name, email address, encrypted (hashed) password, data imported from linked networks when authorized by users</p></blockquote>
</li>
<li>
<blockquote><p>Public content and actions, e.g. questions, answers, comments, upvotes</p></blockquote>
</li>
<li>
<blockquote><p>Non-public content and actions, e.g. answer requests, downvotes, direct messages</p></blockquote>
</li>
</ul>
<p>They claim not many subscribers used the direct messages features, so really the most important items lost here was the account information.</p>
<h3>Marriott reserve second place in the data breach tables</h3>
<p>I actually missed this <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Marriott-Announces-Starwood-Guest-Reservation-Database-Security-Incident-2018-11-30.pdf" target="_blank" rel="noopener">story on Friday the 30th November</a>, as I had promised a customer a security assessment report by the end of the week. So I stayed off social media for the day, while I completed it. There were a LOT of tweets to get through that night! ? This is currently the second biggest data breach in history after Yahoo!&#8217;s almost impossible to match <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/" target="_blank" rel="noopener">record breaking 3 billion accounts breach</a> as revealed in October 2017. So what did Marriott lose? The contents of the Starwood guest reservation database, going back as far as 2014, containing:</p>
<ul>
<li>
<blockquote><p>For approximately 327 million of these guests, the information includes some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences.</p></blockquote>
</li>
<li>
<blockquote><p>For some, the information also includes payment card numbers and payment card expiration dates, but the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128).  There are two components needed to decrypt the payment card numbers, and at this point, Marriott has not been able to rule out the possibility that both were taken.</p></blockquote>
</li>
<li>
<blockquote><p>For the remaining guests, the information was limited to name and sometimes other data such as mailing address, email address, or other information.</p></blockquote>
</li>
</ul>
<p>Some of the data lost is genuinely concerning. Particularly the payment card information.</p>
<h3>Bad guys try to ding dong Dell</h3>
<p>This may or may not have been a breach. <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Dell-Announces-Potential-Cybersecurity-Incident-2018-11-28.pdf" target="_blank" rel="noopener">Dell haven&#8217;t given away too much information</a>. Their security measures detected unauthorised activity that was &#8230;</p>
<blockquote><p>&#8230; attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords.</p></blockquote>
<p>Dell couldn&#8217;t say at this point whether these details were actually extracted from their systems by the bad guys. But even if they were unsuccessful in taking data, this just demonstrates that even massive companies like Dell can be broken into. Massive companies like &#8230; ⬇⬇⬇</p>
<h3>Prime example of poor communication from Amazon</h3>
<p>The <a href="https://www.theregister.co.uk/2018/11/21/amazon_data_breach/" target="_blank" rel="noopener">Amazon data breach</a> on 21st November doesn&#8217;t seem too bad. All that might have been compromised was name and e-mail address. However their notification to affected customers was pretty poor.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1483 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png" alt="amazon breach email" width="648" height="296" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png 648w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email-300x137.png 300w" sizes="auto, (max-width: 648px) 100vw, 648px" /></p>
<p>A lot of security professionals have said that this looks very &#8220;scammy&#8221;. While I would tend to agree as it&#8217;s very light on any details, there&#8217;s no suggestion that the recipient should take some urgent action. If that had been the case, I would fully agree.</p>
<h3>Is there short-sighted security in place at VisionDirect?</h3>
<p>Back on the 19th November, VisionDirect in the UK <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Customer-data-theft-_-Vision-Direct-UK-2018-11-03.pdf" target="_blank" rel="noopener">issued a statement</a> about a data breach. The breach affected customers who updated their details or placed orders between the 3rd November and 8th November. What data was accessed by the evil doers?</p>
<blockquote><p>The personal information was compromised when it was being entered into the site and includes full name, billing address, email address, password, telephone number and payment card information, including card number, expiry date and CVV.</p></blockquote>
<p>In fairness to them, they were very specific about the timeframe when the website was compromised. &#8220;Between 12.11am GMT 3rd November 2018 and 12.52pm GMT 8th November 2018.&#8221; This was repeated ad nauseam.</p>
<h3>What can happen when there are data breaches everywhere?</h3>
<p>A common feature of all the above breaches are names and email addresses. While you might not think these are worth anything, 50,000 valid email addresses can be sold for up to $50 on criminal exchanges on the &#8220;dark web&#8221;. I hate that term by the way. It&#8217;s so &#8220;hackery&#8221;. Anyway, your email address has a small, but material value.</p>
<p>Payment card data is the next thing that is of immediate value, particularly where the bad guys have the CVV/3 digit security number. These can be immediately put to work purchasing vouchers which are then immediately spent. The card numbers are also valuable on their own and sell for up to $60 each. While Marriott had the credit card numbers encrypted, they were not sure if the required information to decrypt them again was also exposed. So I would assume that it was.</p>
<p>Passwords are the next concern. Quora had &#8220;hashed&#8221; passwords which is good. These are hard (but not impossible) to crack. They also forced a password reset on affected subscribers, so that&#8217;s another mitigation. With VisionDirect, the password was totally compromised. This is because it was captured when a user was signing on to the site. They forced password changes on people who were impacted. However, if the password is used on ANY other account, particularly email, banking and social media, then you must change them all.</p>
<p>The rest of the data that was breached is still incredibly useful to the criminals. In particular from the Marriott breach. They have reservation details, probably into the future. So they know the future likely movements of people. They have loyalty card information, which, along with other data points, can be used to compromise a person&#8217;s Starwood&#8217;s Preferred Guest account and re-direct the rewards elsewhere.</p>
<p>The amount of data leaked, over such a long time at Marriott is pretty bad. This can be merged with lots of other data breaches and the evil doers can build quite a profile on each individual. I&#8217;ve discussed before how <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/" target="_blank" rel="noopener">breached data from multiple sources</a> can be put to evil use.</p>
<p>Data breaches everywhere indeed.</p>
<h3>How can we help?</h3>
<p>As the saying goes, preparation is half the battle. If you&#8217;ve not prepared to handle a data breach, it will be a much bigger struggle. We can help you prepare, both for a breach and handling the aftermath.</p>
<p>If you want to discuss further, please call on <span style="color: #0000ff;"><strong>087-436-2675</strong></span> or send an e-mail to <strong><a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a></strong> and somebody will get in touch. We will make it straightforward and easy for you to be ready for an incident.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>#GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
