<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Defence in Depth Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/defence-in-depth/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/defence-in-depth/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Fri, 28 Sep 2018 14:32:12 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Defence in Depth Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/defence-in-depth/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to deal with Ransomware.</title>
		<link>https://www.l2cybersecurity.com/deal-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 14:01:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1407</guid>

					<description><![CDATA[<p>I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. I have previously talked about how Ransomware can infect your machine. It can be by&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1408" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg" alt="Deal with Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware.jpg 500w" sizes="(max-width: 150px) 100vw, 150px" />I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. <span id="more-1407"></span>I have previously talked about how Ransomware can infect your machine. It can be by <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/" target="_blank" rel="noopener">dodgy looking e-mails</a> or <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/" target="_blank" rel="noopener">legitimate looking e-mails</a>. The variety is endless, but it is generally all down to somebody clicking a link or opening an attachment. I&#8217;ve got an <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">entire commandment</a> dealing with e-mails and how you should handle them.</p>
<p>What I&#8217;ve talked about above, is all prevention. However that doesn&#8217;t help you if you are staring at a monitor with a ransom demand on it. Let me give you a couple of examples of recently reported Ransomware incidents and how they were handled.</p>
<h3>Bristol Airport recovers from Ransomware Incident</h3>
<p>On the weekend of the 15th and 16th September, <a href="https://www.theregister.co.uk/2018/09/17/bristol_airport_cyber_attack/" target="_blank" rel="noopener">Bristol Airport suffered a Ransomware incident</a>. This incident took their flight information screens off-line for much of the weekend. Luckily no other safety or flight systems were affected.</p>
<p>How did the authorities at Bristol Airport deal with Ransomware? They re-built the systems and restored backups. They did not pay the Ransom.</p>
<h3>Scottish Brewery suffered a Ransomware incident from a job application.</h3>
<p>In the last couple of weeks, the <a href="https://www.bankinfosecurity.com/scottish-brewery-slammed-by-dharma-ransomware-variant-a-11537" target="_blank" rel="noopener">Arran Brewery in Scotland had all of it&#8217;s systems affected by Ransomware</a>. They had been running a recruitment campaign, advertising for a role via their own website. The evil doers took that ad and posted it to some international recruitment websites. The brewery then started receiving several e-mails a day from interested candidates from all over the world. In among those e-mails the bad guys slipped in one with Ransomware. The CV got opened and their files got scrambled. Not only were their live files affected, but their recent backups were too. These were stored online, attached to their network. Their most recent offline backups were 90 days old.</p>
<p>How did the brewery deal with Ransomware? They also re-built their systems and restored what backups they had. In this case though, they did consider paying the (GBP) £9,600 ransom. They came to the determination that the value of the data they lost (90 days of sales data) was less than the cost of the Ransom demand. They also took into consideration that paying the Ransom does not guarantee they would get back their data.</p>
<p>The brewery then did something really sensible. They have kept a copy of the scrambled data.</p>
<h3>Help may be available from the good guys.</h3>
<p>There is a not-for-profit, freely available service called <strong>No More Ransom</strong> (<a href="https://www.nomoreransom.org" target="_blank" rel="noopener">https://www.nomoreransom.org</a>). This is run by various Law Enforcement and Cyber Security firms around the world. They are constantly working on cracking the codes for the different Ransomware variants and enabling people to recover their data for free.</p>
<p>So the Arran Brewery is holding onto the scrambled data in the hope that someday they will be able to unscramble it.</p>
<h3>So how should you deal with Ransomware?</h3>
<p>Prevention is always better than a cure.</p>
<p>The first thing is to make sure you get your staff some security awareness training. This is something that I deliver. Details of the complete training is <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">available here</a>. We can do customised training to suit your organisation too. Call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail on <span style="color: #ff0000;"><a style="color: #ff0000;" href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a><span style="color: #000000;"> to discuss your requirements.</span></span></p>
<p>Then ensure that you have your systems <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">updated/patched regularly</a>, have security appliances like <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/" target="_blank" rel="noopener">Firewalls in place</a>, <a href="http://www.l2cybersecurity.com/use-anti-virus/" target="_blank" rel="noopener">Anti-Virus is generally helpful</a> against malicious software and also you <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">shouldn&#8217;t insert strange USB devices</a> into your computers.</p>
<p>Finally, you should have a good data backup system in place. This can be a very simple set-up or more complicated depending on your business needs. Again, I offer advice and support on backup strategies and business continuity planning. I also have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">a commandment about backups</a>.</p>
<p>That&#8217;s it! With all of the above in place, <span style="text-decoration: underline;"><strong>in the</strong> <strong>very unlikely event</strong></span> that you do subsequently suffer a Ransomware incident, you will be able to recover from it.</p>
<h3>What if it would cost me less to pay the ransom?</h3>
<p>This is a genuine struggle for a business owner, particularly small businesses. Recovering systems from a ransomware incident takes time, which costs money, and the business may be unable to operate while recovery is ongoing, so is not generating revenue. A good business continuity plan, should reduce such risks.</p>
<p>If you are tempted to pay, I just have two things I want you to consider:</p>
<ol>
<li>There is no guarantee that you will get your data back. Figures vary wildly from <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/" target="_blank" rel="noopener">50%</a> to <a href="https://gbhackers.com/ransomware-attack/" target="_blank" rel="noopener">100%</a> failure to recover data. If you pay and don&#8217;t get your data back, you will then have to pay the full cost of recovery anyway.</li>
<li>You are funding organised crime. You are paying criminals who not only do cyber crime, but human trafficking, drugs, weapons, etc. People think I am being jokey or have my tongue in cheek when I refer to <em><strong>Evil Doers</strong></em>. I&#8217;m not. This is an accurate description of these people. They! Are! <span style="text-decoration: underline;"><strong>Evil!</strong></span></li>
</ol>
<p>If you pay once, then the bad guys reckon you might pay again, so you will be a bigger target. My advice to deal with Ransomware is to implement preventative measures (call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail <a href="mailto:info@L2CyberSecurity.com"><span style="color: #ff0000;">info@L2CyberSecurity.com</span></a> to have a no obligation chat) and never pay these evil doers.</p>
<h3>What else do you need to consider?</h3>
<p>Don&#8217;t forget that if the data that gets scrambled contains personal data, then you have a data breach on your hands, which may be notifiable under the new Data Protection Act 2018 which incorporates the General Data Protection Regulation (GDPR). I&#8217;ve a short video here:</p>
<p><iframe title="What is a data breach - Ransomware" width="500" height="281" src="https://www.youtube.com/embed/PVnq6Bu-GEA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Finally, if you do suffer a Ransomware incident, a crime has been committed, so please report it to local Law Enforcement. They may not be able to do much about it, but it needs to be reported for statistical purposes if nothing else. If it can be shown that Cyber crime is as big a problem, as I know it to be, then the more reports to Law Enforcement will mean they will get more resources to be able to tackle it&#8217;s root cause.</p>
<p>#LetsBeCarefulOutThere and #StaySafe</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerable Shopping Carts lead to Credit Card breaches</title>
		<link>https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 21 Sep 2018 10:49:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Magecart]]></category>
		<category><![CDATA[Plugins]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1402</guid>

					<description><![CDATA[<p>You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more. If you operate some kind of&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1403" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg" alt="Vulnerable Shopping Carts" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />You may have heard about the <a href="https://www.rte.ie/news/2018/0627/973682-ticket-master-data/">Ticketmaster data breach</a> earlier this summer. You probably also have heard about the <a href="https://www.theguardian.com/business/2018/sep/07/british-airways-data-breach-what-to-do-if-you-have-been-affected">British Airways data breach</a> at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more.<span id="more-1402"></span> If you operate some kind of eCommerce site, where you have a checkout that collects credit card details for orders, then you need to check if you have been potentially compromised.</p>
<h3>What caused these vulnerable shopping carts?</h3>
<p>Basically the bad guys are sneaking in via plugins to the websites. It was very similar to how crypto-currency mining code <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">infiltrated UK government websites</a> earlier this year. In the case of the vulnerable shopping carts of Newegg, they plugged their nasty code into the &#8220;Feedify&#8221; plugin. This plugin is used to gather feedback from customers.</p>
<p>So when a customer browsed to the Newegg site, the webserver loads up the website. It then goes and brings in the code from the plugins. The Feedify plugin that was compromised gets loaded and the malicious code starts monitoring. It&#8217;s waiting for credit card information to be typed in. Once it gets that, it sends it off to the evil doers, a hacking group called <a href="https://www.riskiq.com/blog/labs/magecart-british-airways-breach/">Magecart</a>. This code was used to compromise the &#8220;Inbenta&#8221; customer service plugin with Ticketmaster and the &#8220;Modernizr&#8221; plugin for BA.</p>
<h3>So how can I protect my website from this?</h3>
<p>Well, you&#8217;ll need your web-person to do a couple of things.</p>
<ol>
<li>Define a Content Security Policy (CSP) for your website</li>
<li>Set-up Sub Resource Integrity (SRI) verification of your website plug-ins</li>
</ol>
<p>CSP will basically state the trusted locations that your website can load plugins from, so make sure these are set for your own site and that of your payment provider.</p>
<p>SRI is where you generate a &#8220;hash&#8221; (a unique code based on the content of an item) for your plugins when you create the site. When the plugin gets loaded by the browser of a customer, the plugin gets re-hashed and if the value does not match the original hash, then it has been altered.</p>
<p>You can get more details on CSP and SRI from <a href="https://scotthelme.co.uk/hardening-payment-forms-with-csp/">Scott Helme&#8217;s blog</a>.</p>
<p>In the meantime, #LetsBeCarefulOutThere.</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Posh POS was Compromised</title>
		<link>https://www.l2cybersecurity.com/posh-pos-was-compromised/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Apr 2018 10:58:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1292</guid>

					<description><![CDATA[<p>A headline worthy of The Register and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &#38; Taylor. These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this in a post on their site on the 1st April.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1293" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg" alt="POS compromised" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />A headline worthy of <a href="https://www.theregister.co.uk/2018/04/02/hacks_fifth_avenue_crooks_slurp_card_numbers_from_luxury_chain/">The Register</a> and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &amp; Taylor. <span id="more-1292"></span>These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this <a href="http://investor.hbc.com/releasedetail.cfm?ReleaseID=1062423">in a post on their site</a> on the 1st April. But it was no April Fool joke.</p>
<p>Basically the evil doers implanted malicious software on the Point of Sale (POS) terminals in the upmarket stores in the USA. For nearly a year (between May 2017 to March 2018) this malware was capturing customers credit/debit card details and passing this back to the bad guys. The crooks claimed to have gathered up to 5 million cards as a result of this hack and they have been selling off batches of them on the internet.</p>
<p>We are quite familiar with Chip &amp; PIN usage in Ireland as we have had it for quite some time. This does offer a great deal of protection as your card information is stored in an encrypted form on the chip. However in the US, they are only at the early stages of rolling out Chip &amp; PIN, so most people are still swiping their cards at the terminals. The magnetic stripes that are swiped do not have the data encrypted, and so the information can be accessed and passed on quite easily.</p>
<p>It&#8217;s not been revealed how the malicious software got onto their POS terminals, but it seems that the POS was compromised at all of their bricks and mortar stores in the US. Their online store was not affected.</p>
<p>Credit Card issuers are usually fairly good at detecting fraud by knowing their customers usual buying habits. So if somebody who usually spends €20-€50 on shopping items, suddenly attempts to buy high-end phones, tablets or televisions this should trigger an alert. However for the customers of Saks or Lord &amp; Taylor, such behaviour is much less likely to trigger an alert. So the crooks might be able to make away with a lot of goodies as a result.</p>
<p>The parent group, HBC, needs to put in place better segmentation and monitoring on their network, so if one store gets compromised, the malicious software cannot find it&#8217;s way easily to another store. They should also apply Commandments 1 (<a href="https://www.l2cybersecurity.com/use-automatic-updates/">automatic updates</a>), 2 (<a href="https://www.l2cybersecurity.com/use-anti-virus/">anti-virus</a>), 3 (<a href="https://www.l2cybersecurity.com/have-a-firewall-in-place/">firewall</a>) and 9 (<a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">control use of USB sticks</a>) to their POS network.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Simple Security Planner tool for EVERYONE!</title>
		<link>https://www.l2cybersecurity.com/simple-security-planner-tool/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 10:32:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1017</guid>

					<description><![CDATA[<p>I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers. As I recently stated when talking about Quad9, I love it when the good guys come up with something&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1023" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png" alt="Security Planner" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I love it when I get to tell people about another great security tool. This simple Security Planner <a href="https://securityplanner.org/#/">tool</a> is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.<span id="more-1017"></span> As I recently stated when talking about <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9</a>, I love it when the good guys come up with something to help everyone &#8211; particularly the non-technical folks out there &#8230; after all you make up the vast majority of the users of the internet. <span id="c128" class="notranslate">?</span></p>
<p>This security planner was created by the good folk of the <a href="https://citizenlab.ca/">Citizen Lab</a>, an interdisciplinary group based at the Munk School of Global Affairs at the University of Toronto. It&#8217;s really, really, really easy to use and will guide you through everything from start to finish.</p>
<ol>
<li>It starts by asking what you use to handle private data (Windows computer, iThing, e-mail, etc.)</li>
<li>Then it asks what are your concerns (getting hacked,  infected, etc.)</li>
<li>Finally it asks if there is any particular reason for your concern (you&#8217;re being harrassed or dealing with a current issue, etc.)</li>
<li>Then it will give you an action list, with individual help on each thing that it recommends you to do.</li>
</ol>
<p>What I really appreciated was the first step it seems to give for everything &#8230; it&#8217;s to do with two-factor-authentication:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1025 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg" alt="" width="736" height="342" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg 736w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA-300x139.jpg 300w" sizes="auto, (max-width: 736px) 100vw, 736px" /></p>
<p>Regular readers of my blog/newsletter will know I&#8217;m always going <a href="https://www.l2cybersecurity.com/double-check-security/">on</a> and <a href="https://www.l2cybersecurity.com/protect-online-accounts/">on</a> and <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">on</a> about this. I don&#8217;t repeat myself often, unless it&#8217;s for a really, really, really good reason and two-factor-authentication is one such reason. It really does help protect your online accounts and so, where available, please, please, please use it.</p>
<p>So, for those of you reading this now, go ahead and use this security planner to help protect youself.</p>
<p>And then, when you go visiting your family over the Christmas period, particularly the more mature members of your nearest and dearest, why not sit down with them, fire up this website on their computer/tablet/phone and go through this fairly painless, simple process to get themselves as protected as you are. They&#8217;ll thank you for it and so will Santa. <span id="c116" class="notranslate">?</span></p>
<p>Happy Christmas! ?</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quad9 &#8211; Safer addressing on the internet</title>
		<link>https://www.l2cybersecurity.com/quad9-safer-addressing-internet/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Nov 2017 11:42:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1000</guid>

					<description><![CDATA[<p>I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make life safer for everyone. Basically if you use this service, it will pretty well prevent any malicious software from connecting your laptop, tablet, phone, smart watch,&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9 &#8211; Safer addressing on the internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1001" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9-150x150.jpg" alt="Quad9 Safer Addressing" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make life safer for everyone. <span id="more-1000"></span>Basically if you use this service, it will pretty well prevent any malicious software from connecting your laptop, tablet, phone, smart watch, smart toaster, smart whatever to an evil doer&#8217;s website, because it will not resolve the address. It can&#8217;t give 100% guaranteed protection, but it&#8217;ll be extremely effective &#8230; and did I mention, it&#8217;s FREE?!?!</p>
<h2>What is DNS?</h2>
<p>A Domain Name Service is the backbone of addressing, as every website is stored on a server located somewhere on the internet. Your favourite security website (<a href="http://www.L2CyberSecurity.com">www.L2CyberSecurity.com</a>) is sitting on a server in Dublin. That server has an Internet address of 217.78.11.90. You don&#8217;t need to know that long-winded number. You just need to know the nice, friendly name L2CyberSecurity.com. When you type that address, or click a link to that address in your browser, your PC/Laptop will pass the friendly name to some DNS server (whichever one it is configured to use), that will then return the long-winded number to the browser, so off it goes to that server and dishes up the webpage to you.</p>
<h2>How does the existing DNS fail to protect me?</h2>
<p>If you currently use the DNS server that your provider gives you, or perhaps <a href="https://www.opendns.com/">OpenDNS</a> or <a href="https://developers.google.com/speed/public-dns/">Google&#8217;s DNS,</a> then if you get infected with malicious software, this will probably try to &#8220;phone home&#8221;, i.e.- connect with a server controlled by the evil doers. It will look to connect to the server by referencing a friendly name (e.g.- www.scaryevilhackersoftware.co) and the <em>usual</em> DNS servers will resolve that to the bad guys server and facilitate the connection.</p>
<p>IT&#8217;S NOT THEIR FAULT! This is how the internet is supposed to work.</p>
<h2>How does Quad9 protect me?</h2>
<p>The good people over at IBM, the Packet Clearing House (PCH) and Global Cyber Alliance came together and set-up this global service. They have made it genuinely free to use, without any sneaky monitoring of what you do. When you have it set-up, <a href="https://www.quad9.net">Quad 9</a> will check a site you are trying to connect to against the IBM X-Force threat intelligence database of over 40 billion analysed web pages and images. it also uses feeds from 18 additional threat intelligence partners to block a large portion of the threats that present risk to end users and businesses alike. If the site you are trying to connect with is a known evil site, Quad9 will NOT resolve the friendly address to the long winded number. It will effectively return a &#8220;domain/site does not exist&#8221;.</p>
<h2>That sounds great. How do I set it up?</h2>
<p>For a business environment, please contact your IT Department or IT Service Provider. There could be internal DNS server dependencies which, if you implemented Quad9, might break an application. IT will need to make a determination on whether it can be implemented or not.</p>
<p>For home users, on the <a href="https://www.quad9.net/#/#setup-quad9">Quad 9 home page</a> there are videos and instructions for configuring Mac and Windows desktops/laptops.</p>
<p>However, for the best possible coverage, I would recommend you have this setting applied to the router or modem that your service provider installed with your connection. It should be noted that some internet providers do not allow changes to be made to their router (Imagine and Sky are two examples). You may need to log a support request to have the change applied to your router.</p>
<p>If you are, or know somebody who is technically competent (and game-playing teenagers may not fit this criteria <span id="c128" class="notranslate">?</span>), the change is as easy as logging into the router and changing, whats called, the DHCP settings. Before anything is changed, you should make a note of what the current DNS settings are. Then all you have to do is change the primary DNS server to 9.9.9.9 (4 nines &#8230; Quad9 &#8230; get it now? <span id="c103" class="notranslate">?</span>). The secondary address can be set to whatever was previously the primary address. Be sure to save the setting and reboot the router.</p>
<p>When the router comes back up, any device that connects to it (laptop, desktop, tablet, phone, smart toaster, etc.) will receive the protection of Quad9 automatically.</p>
<p>If you have any connectivity issues after the change, then simply log back into the router and put back the DNS settings under DHCP that had been there before, save the setting and reboot the router again.</p>
<p>One thing I had concerns about was performance. I previously used Google&#8217;s DNS (8.8.8.8) which was always pretty responsive. So when I tested it&#8217;s performance against Quad9&#8217;s I found that Quad9 was generally faster than Google. They are improving the service all the time as demand increases, so it should always be very quick.</p>
<p>So for me it&#8217;s a <span id="c420" class="notranslate">?</span><span id="c420" class="notranslate">?.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9 &#8211; Safer addressing on the internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The latest Ransomware outbreak &#8211; Petya</title>
		<link>https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 28 Jun 2017 09:24:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WannaCry]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=775</guid>

					<description><![CDATA[<p>So here we go again with another outbreak of Ransomware, based on the National Security Agency (NSA) hacking tools that were leaked by a hacking group. Some experts are calling this one Petya, as it seems very similar to the Petya Ransomware strain that has been around for over a year. Others are calling it&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">The latest Ransomware outbreak &#8211; Petya</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-782 alignleft" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen-300x300-1.png" alt="Petya / NotPetya / Petna" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen-300x300-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen-300x300-1-150x150.png 150w" sizes="auto, (max-width: 300px) 100vw, 300px" />So here we go again with another outbreak of Ransomware, based on the National Security Agency (NSA) hacking tools that were leaked by a hacking group. Some experts are calling this one Petya, as it seems very similar to the <a href="https://en.wikipedia.org/wiki/Petya_(malware)">Petya Ransomware</a> strain that has been around for over a year.<span id="more-775"></span></p>
<p>Others are calling it NotPetya or Petna, because it is essentially a new form of Ransomware. Whatever it&#8217;s called, doesn&#8217;t matter except to journalists who need sexy headlines. This is a significant threat, particularly to businesses that have networks that span the globe. I&#8217;ll refer to it as Petya for the purpose of this post.</p>
<p>There is still a lot of uncertainty around this, with conflicting reports indicating it comes in via e-mail or that it worms its own way into people&#8217;s networks. The latter is probably the more correct in this case. However the vast majority of other Ransomware strains that are out there usually spread by e-mail. So, as always follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> and discard any email from strangers and be cautious of email from known sources.</p>
<p>There seems to be growing confidence that this emanated from an accounting application that is widely used in the Ukraine called MeDoc or M.E.Doc. It seems the creator of the application was compromised and the evil doers put the Ransomware into their application and then pushed it to all their customers via an automatic update.</p>
<p><strong>Update as at 19:00 (IST) 28/06/2017: </strong></p>
<p><span style="color: #3366ff;"><em>As we mentioned earlier, it now seems that <a href="https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/">Microsoft</a> have confirmed that the M.E.Doc application, widely used in Ukraine, was the initial source of the outbreak.</em></span></p>
<p><span style="color: #3366ff;"><em>There are now <a href="https://twitter.com/craiu/status/880011103161524224">reports</a> emerging that a Ukrainian Government website is delivering or attempting to deliver Petya Ransomware to any visitors to the site. This is known as a Watering hole attack. If this starts spreading to other sites, this would become much more serious. Follow us on either/both <a href="https://www.facebook.com/L2Cyber/">Facebook</a> and <a href="https://twitter.com/L2Cyber">Twitter</a> to be kept up to date.</em></span></p>
<p><strong>Should I be worried?</strong></p>
<p>If you took action to protect yourself from WannaCry by patching all of your systems with the March updates from Microsoft, you are in pretty good shape. (Apologies for the tech-jargon in the next sentence &#8211; you might want to ask your IT provider about this) If the SMBv1 protocol (a means of accessing file shares across a network) through your firewalls has been closed or simply disabled any SMBv1 services running on your PC or servers, then it currently seems that Petya will not be able to get inside your network.</p>
<p>HOWEVER if you have ONE machine that has NOT been patched with the MARCH updates, then you may be at grave risk. This Petya strain of Ransomware, once it compromises a machine by exploiting the vulnerability patched in March, appears to use other methods to access the remaining machines within your network, even ones that are currently full patched.</p>
<p>So please, follow <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> and keep your machines fully patched as soon as is practical after the patches are released.</p>
<p><strong>How do I know if I&#8217;m being affected?</strong></p>
<p>If Petya gets into your machine, you may not immediately realise it, because the first thing it seems to do is schedule a reboot for 1 hour after it infects you. It is unclear as to whether it starts looking to reach other machines in your network at this time or after the reboot. I would suspect it probably would be trying to infect other machines in your network at this stage.</p>
<p>If your machine suddenly <span style="text-decoration: underline;">reboots without notice</span> and starts up like this <span style="color: #ff0000;"><strong>POWER OFF</strong></span> the machine immediately (pull the plug or press and hold the power button until it shuts down):</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-778" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Patya-ChkDsk.png" alt="" width="667" height="369" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Patya-ChkDsk.png 667w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Patya-ChkDsk-300x166.png 300w" sizes="auto, (max-width: 667px) 100vw, 667px" /></p>
<p>This screen is actually Petya scrambling your files. So the earlier you can stop the process by powering off, the more files that you will be able to recover.</p>
<p>I would also recommend that you immediately shut down all other machines that are on your network and seek technical support. By shutting down other machines that may be infected, but have not rebooted, you should not lose any of their data.</p>
<p>At this point you will need the assistance of your IT service provider to help recover the data.</p>
<p><strong>I&#8217;m looking at this screen, what should I do?</strong></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-777" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-1024x574.png" alt="Petya / NotPetya / Patna" width="1024" height="574" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-1024x574.png 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-300x168.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-768x430.png 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2.png 1437w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<p>First things first &#8211; <span style="text-decoration: underline; color: #ff0000;"><strong>DON&#8217;T PAY</strong></span>! I&#8217;m not just saying that because it&#8217;s not a good idea to fund criminals, but because YOU WON&#8217;T get your files back. This is a purely destructive form of Ransomware.</p>
<p>If you need advice or assistance, please do not hesitate to contact us by e-mail at <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a>.</p>
<p>Keep an eye on our <a href="https://www.facebook.com/L2Cyber/">Facebook</a> and <a href="https://twitter.com/L2Cyber">Twitter</a> for updates, as and when significant changes happen.</p>
<p>The post <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">The latest Ransomware outbreak &#8211; Petya</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Do you WannaCry? I didn&#8217;t think so.</title>
		<link>https://www.l2cybersecurity.com/wannacry-didnt-think-so/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 18 May 2017 12:30:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=660</guid>

					<description><![CDATA[<p>I delayed this week&#8217;s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I&#8217;ll start with some easy background on Ransomware and them explain what was special&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-didnt-think-so/">Do you WannaCry? I didn&#8217;t think so.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-thumbnail wp-image-661 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry-150x150.png" alt="Do you WannaCry?" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I delayed this week&#8217;s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I&#8217;ll start with some easy background on Ransomware and them explain what was special with WannaCry. Then we&#8217;ll get to protecting you.</p>
<p>This story is going to disappear from the news headlines fairly quickly, as there is nothing massively new or worrying coming out for the moment, so we&#8217;ll probably be back to normal by next week.</p>
<h2><span id="more-660"></span>What is Ransomware?</h2>
<p>Ransomware has been around for a good few years. Earlier versions were fairly rudimentary, as they only prevented the victim from using their PC and were easily mitigated. The term itself comes from the techie habit to combining words and in this case it is a combination of Ransom Software.</p>
<p>It normally spreads by e-mail attachment/link or a poisoned web page/online ad. If you open the attachment or click on a poisoned ad, a little piece of computer code executes, which downloads the actual  ransom software from the internet. This software then generates an extremely complicated &#8220;key&#8221;, which is used to scramble the data contained in your files (documents, spreadsheets, photos, videos, databases, etc.). It will carry out the scrambling on any drive that the PC running it can see (so hard drives, network drives, external drives, USB sticks, cloud drives, etc.).</p>
<p>A screen is popped up advising the victim about what has happened and provides instructions for how they can pay the ransom in order to get the &#8220;key&#8221; to unlock and recover their scrambled files. In some cases the &#8220;key&#8221; is stored on the evil doers servers, so if the victim does pay, they will be given the key and will be able to get their files back. There may even be a helpdesk telephone number which you can call to get assistance on how you can pay. This is usually because not everyone knows how to go through the cumbersome process of acquiring BitCoin &#8230; &#8220;Ah here! WTF is BitCoin?&#8221; I hear you cry! ? Basically BitCoin is a virtual currency, which is untraceable and that&#8217;s why the bad guys like it.</p>
<p>If the victim does get their files back, there is a good chance that the crooks will leave behind a &#8220;present&#8221;, which will wait a few weeks, then execute on it&#8217;s own and scramble the files again. The victim paid once, so there is a good chance they will do it again. However there is also a high probability that paying the ransom won&#8217;t mean you get your data back, as you might never get the key from the bad guys.</p>
<p>So that&#8217;s a very brief outline of what Ransomware is. In the last 2 years, it has become extremely prevalent. Over 50% of evil email contains some form of Ransomware.</p>
<h2>What was special about WannaCry?</h2>
<p><img loading="lazy" decoding="async" class="wp-image-662 size-medium alignright" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-300x225.jpg" alt="" width="300" height="225" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-300x225.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-768x577.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt.jpg 900w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>What made WannaCry special was the fact that it spread all by itself. It did not require anybody to click on a link or open an attachment. This is what technical types call a &#8220;worm&#8221;. What it does is it finds a machine on the internet that has a specific vulnerability which it exploits and loads itself into that machine, scrambles the data and then looks for more machines to infect on the local network, as well as on the internet.</p>
<p>My most avid readers ? will remember back in a March <a href="http://www.l2cybersecurity.com/patch-tuesday-double/">post</a>, I discussed the Microsoft Patch Tuesday was a double month, because there had been none in February. Then in an April <a href="http://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">post</a>, we found out why there was secrecy around the previous month&#8217;s patching. The US&#8217; National Security Agency (NSA) had their hacking toolkit released to the internet and Microsoft had spent February urgently patching vulnerabilities that the NSA toolkit exploited.</p>
<p>Which brings us neatly to WannaCry. The evil doers used one of the NSA tools to have their ransomware scan for machines that are vulnerable to a specific exploit and then infect any such machines it finds. Microsoft has issued the patch for this vulnerability in <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">March</a> however it was only issued for the versions of Windows that they still support (Windows Vista, 7, 8.1 and 10 as well as a bunch of server operating systems). Anybody running a Windows XP or 8.0 machine would be vulnerable. The British NHS still has a lot of Windows XP machines and these were the ones that got all of the attention when thousands of them became infected causing surgeries, diagnostic procedures and clinics to be cancelled as a result. In fairness to Microsoft they did subsequently release the patch for the unsupported versions of Windows, which will prevent this attack vector being used in future.</p>
<p>It started circulating on Friday 12th May, and by Saturday it was very widespread, so much so that it grabbed a lot of media attention. This is where it get my first problem &#8211; advice from newspaper &#8220;Tech&#8221; journalists. I&#8217;ll possibly get stick for this, but most of them are nothing more than <em>shiny gadget reviewers</em>. They don&#8217;t actually truly understand the underlying technology and just parrot &#8220;don&#8217;t click links&#8221;, &#8220;patch your software&#8221;, etc. While that is good advice, I then see them giving inaccurate reportage like &#8220;this was spread by somebody clicking on a link&#8221;. No it wasn&#8217;t! That&#8217;s not how a worm works!!! ? &#8230; On a related matter, which I think is hilarious &#8230; the shiny gadget reviewer on Ireland AM on TV3 gave better advice than any &#8220;Tech&#8221; journalist I&#8217;ve read this week. ?</p>
<p>My second problem was advice from &#8220;Experts&#8221; from larger cyber security firms. In the last few days I&#8217;ve heard two such experts (from different unnamed companies) say the same thing as the &#8220;Tech&#8221; journalists, except they made it worse by saying &#8220;this worm was spread by somebody opening an attachment.&#8221; THAT IS NOT HOW A WORM WORKS FFS!!! ?</p>
<p>My third problem is with technology vendors that try to capitalise on the fear, uncertainty and doubt (FUD) that was present in businesses across the globe on Monday morning. Coming out with nonsense like, &#8220;Our Whizz-Bang product will fully protect you from WannaCry.&#8221; as Mrs. Brown is known to say &#8220;That&#8217;s nice.&#8221; See below for some simple steps on how you can protect yourself, that is available for free and for nothing.</p>
<p>There are a lot of small to medium-sized, independent security consultancy firms out there that have been giving excellent, accurate and timely advice. These are the ones you should be listening too. They are staffed by people who actually truly know what is happening. I&#8217;d like to think I&#8217;m also in that category as I don&#8217;t state something unless I know it to be a fact. If I don&#8217;t know something, I will say so and will go and educate myself.</p>
<p>The spread of WannaCry was stanched by a Cyber Security blogger in the UK (<a href="https://twitter.com/MalwareTechBlog">@MalwareTechBlog</a>) who discovered that if a certain internet domain name was registered and active, the worm would not carry out it&#8217;s scrambling and scanning function. This was a great help to the world, which has led the young man to be hounded by tabloid newspapers. There you go &#8211; no good deed goes unpunished. ?</p>
<p>There is one aspect about this, that I&#8217;ve only seen mentioned once. What if the culprits behind this didn&#8217;t use Ransomware as the payload? They used the NSA tools to scan the internet for the vulnerability that allowed them execute something on hundreds of thousands of PCs. They chose Ransomware, which kinda gets in your face when it has done it&#8217;s dirty deed. What if they chose keyloggers (software that logs all key presses &#8211; used for stealing passwords) or other surreptitious, stealthy, spying software? We might never have realised there was something afoot. ?</p>
<p>There&#8217;s talk that it was the North Korean&#8217;s what did it! Is that interesting? &#8230; Maybe. I would have thought they might have preferred the stealth route, but their leader might have had other ideas.</p>
<h2>How do I protect myself?</h2>
<p>This is the insanely easy bit, believe it or not. All you have to do is follow 4 of my 10 commandments:</p>
<ul>
<li><a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> Keep all software up-to-date with automatic patching/updating</li>
<li><a href="http://www.l2cybersecurity.com/use-anti-virus/">Commandment 2</a> Use and keep up-to-date Anti-Virus software</li>
<li><a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">Commandment 4</a> Take regular backups of all your data and test that you can restore.</li>
<li><a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> Ignore email from strangers and be careful of email from friends, family, co-workers.</li>
</ul>
<p>Do those few things and you shouldn&#8217;t have to pay any ransom to anybody, because if 1, 2 and 5 fail you (for whatever reason), then 4 will recover you. ?</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-didnt-think-so/">Do you WannaCry? I didn&#8217;t think so.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Take a 2-Minute Privacy check-up.</title>
		<link>https://www.l2cybersecurity.com/take-2-minute-privacy-check/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 12 May 2017 15:47:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=649</guid>

					<description><![CDATA[<p>After last week&#8217;s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-650 size-thumbnail alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg" alt="2 Minute Privacy Check-up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />After last week&#8217;s brief shenanigans with <a href="http://www.l2cybersecurity.com/gmail-users-phished/">GMail getting phished badly</a> and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.<span id="more-649"></span></p>
<p>Most of the big on-line services have this facility buried in their settings somewhere, but when you find them, they are really easy to go through and it can be an eye-opening exercise. I discovered on my personal GMail account, that a phone I had on loan while my own was off getting repaired was still an authorised device on my account. I wasn&#8217;t too concerned, because I myself had carried out a factory reset on that phone before I handed the loaner back in.</p>
<p>However, most people would not think to do such a thing and, while you would expect the repair shop to do it as part of their procedures, this does not necessarily make it happen &#8230; and I&#8217;m not talking about the small phone repair shops that are dotted about the place either. A friend got a loaner phone from one of the big mobile companies while her&#8217;s was sent for repair. She took a few photos one day and was browsing them that evening and she came across a few dozen photos of some people she did not recognise. She mentioned this to the shop when she collected her repaired phone. They apologised profusely, immediately did a factory reset on the loaner and showed her the completely empty device when it restarted. That was OK for her. But what about the previous user of the device. What if she knew even one of the people in those photos? What if the photos were embarrassing or worse &#8230; incriminating? <img decoding="async" src="https://www.facebook.com/images/emoji.php/v8/f15/1/28/1f914.png" alt="?" /></p>
<p>Anyway, I&#8217;ve done a Billy Connolly and wandered wildly off-topic, so back to privacy check-ups.</p>
<p>You can do these all at once, if you want, or just take 2 minutes each day over the next few days and do a privacy check-up and security/account check-up on each account. I would also recommend you do this on a desktop/laptop, as the mobile apps may not have the full set of privacy settings to be checked. Finally don&#8217;t just be looking for authorised devices, keep an eye out for Apps which are authorised on your accounts, which you may no longer use. You should really remove their access.</p>
<p>GMail &#8230; has both privacy <a href="https://myaccount.google.com/privacy">https://myaccount.google.com/privacy</a> and security <a href="https://myaccount.google.com/security">https://myaccount.google.com/security</a> check-ups</p>
<p>LinkedIn &#8230; has privacy <a href="https://www.linkedin.com/psettings/privacy">https://www.linkedin.com/psettings/privacy</a> and account <a href="https://www.linkedin.com/psettings/account">https://www.linkedin.com/psettings/account</a> settings pages.</p>
<p>FaceBook &#8230; privacy <a href="https://www.facebook.com/settings?tab=privacy">https://www.facebook.com/settings?tab=privacy</a> and security <a href="https://www.facebook.com/settings?tab=security">https://www.facebook.com/settings?tab=security</a></p>
<p>Twitter &#8230; Privacy <a href="https://twitter.com/settings/safety">https://twitter.com/settings/safety</a> and account <a href="https://twitter.com/settings/account">https://twitter.com/settings/account</a> settings</p>
<p>Other online services that you use might have something similar. Just go into their settings and search for privacy and account or security tabs and simply go through each of them.</p>
<p>You might even pop a reminder into your calendar to come back in 6 months time and review these settings again because lets face it, something will have changed.</p>
<p>And hey &#8230; Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect your on-line accounts, but not with text messages.</title>
		<link>https://www.l2cybersecurity.com/protect-online-accounts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 12 Sep 2016 15:01:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=554</guid>

					<description><![CDATA[<p>As I outlined here, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of protecting yourself from the evil doers is to use, what is called, two factor authentication. If you are not doing this now, you really should be as it improves your protection massively. This is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/protect-online-accounts/">Protect your on-line accounts, but not with text messages.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As I outlined <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/" data-blogger-escaped-target="_blank">here</a>, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">protecting yourself from the evil doers is to use, what is called, two factor authentication. If you are not doing this now, you really should be as it improves your protection massively.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is where you can set your on-</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">line accounts to not only request your user ID and password (something you know) but also using your phone (something you have) by </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">way of an app or sending you a text message with a code that you enter on the site to confirm you are <b><u>you</u></b>. </span></p>
</div>
<p><span id="more-554"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you have this set-up to authenticate by a SMS Text message, then a bad guy who has access to your LinkedIn details from the </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><a href="https://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised" data-blogger-escaped-target="_blank">2012 hack</a> should not be able to access your e-mail account using the password that they have recovered from there, because as </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">soon as they try to access your e-mail account, you will be sent a text message. So you&#8217;re safe &#8230; right?</span></p>
</div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">Well, if they have your LinkedIn details, they may also have your mobile phone number (or they have it from other means). So as </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">soon as they try to access your e-mail and a text message is sent to you from your e-mail provider, they follow it up immediately </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">with a text from themselves to say somebody is trying to access your account and to reply to them with the 6 digit code that you </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">just received. If you do this, they immediately access your account and lock you out of it. You can see how this works on this </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">short video from Symantec.</span></p>
<p><iframe loading="lazy" title="SMS Phishing Scam for Email Accounts | Symantec" width="500" height="281" src="https://www.youtube.com/embed/_dj_90TnVbo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div data-blogger-escaped-style="text-align: justify;"> The three tips on that video at the end are very pertinent:</div>
<ol>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Beware of unsolicited text messages</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If unsure, check with your account provider</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Password recovery text services never require a response via text or other e-mail</span></li>
</ol>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So really, the best way to secure your account is to use an app on your smart phone like <a href="https://support.google.com/accounts/answer/1066447?hl=en" data-blogger-escaped-target="_blank">Google Authenticator</a>, <a href="https://www.twilio.com/authy" data-blogger-escaped-target="_blank">Authy</a> or <a href="https://duo.com/why-duo/why-two-factor-authentication-2fa" data-blogger-escaped-target="_blank">Duo</a>. These </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">are constantly generating random 6 digit codes which you can use to authorise your access to an account. These will work even in flight mode. So if you receive a text </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">message asking for your code, you can simply ignore it. Here&#8217;s an example from Google Authenticator:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-XIi-YThkLz8/V9a9SE62G8I/AAAAAAAAAX4/jT-34Q5rXvAct9GmAmjZBtGG7OpeJgVQgCLcB/s1600/Screenshot_2016-09-12-15-30-41.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-XIi-YThkLz8/V9a9SE62G8I/AAAAAAAAAX4/jT-34Q5rXvAct9GmAmjZBtGG7OpeJgVQgCLcB/s400/Screenshot_2016-09-12-15-30-41.png" width="225" height="400" border="0" /></a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;verdana&quot; , sans-serif;">The </span><a href="http://www.l2cybersecurity.com/security-awareness-training/" data-blogger-escaped-style="background-color: white; color: #4a4a4a; font-family: Verdana, sans-serif; text-decoration: none;" data-blogger-escaped-target="_blank">training</a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;verdana&quot; , sans-serif;"> that L2 Cyber Security Solutions delivers, will give you a better understanding of the threats that are out there and show you how you can easily protect yourself from them. </span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/protect-online-accounts/">Protect your on-line accounts, but not with text messages.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Ten Commandments of Cyber Security</title>
		<link>https://www.l2cybersecurity.com/the-ten-commandments/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 07 Jul 2016 12:00:33 +0000</pubDate>
				<category><![CDATA[Commandments]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=450</guid>

					<description><![CDATA[<p>The Ten Commandments of Cyber Security Click on the links for a summary and detail of each commandment. Thou shalt keep all of thy software and apps up-to-date with automatic updates. Thou shalt have Anti-virus software installed, updated and active. Thou shalt have a firewall in place on thine Desktop/Laptop as well as thine internet&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/the-ten-commandments/">The Ten Commandments of Cyber Security</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: center;">The Ten Commandments of Cyber Security</h2>
<p><img loading="lazy" decoding="async" class="aligncenter" title="The ten commandments" src="https://4.bp.blogspot.com/-UwOIjJZozPE/V0xr41Icg_I/AAAAAAAAAOg/CghkTxdJbS8tmLa38F-e366o971W2VfGQCLcB/s320/10%2BCommandments.gif" alt="The ten commandments of cyber security" width="320" height="284" /></p>
<div data-blogger-escaped-style="text-align: center;">
<p style="text-align: center;"><span style="color: #ff0000;"><strong><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="color: orange; font-family: &quot;verdana&quot; , sans-serif;">Click on the links for a summary and detail of each commandment.</span></strong></span></p>
</div>
<p><span id="more-450"></span></p>
<ol>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/use-automatic-updates/">Thou shalt keep all of thy software and apps up-to-date with automatic updates.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/use-anti-virus/">Thou shalt have Anti-virus software installed, updated and active.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/">Thou shalt have a firewall in place on thine Desktop/Laptop as well as thine internet connection.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">Thou shalt always backup thy data and regularly check its integrity.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Thou shalt cast aside e-mails from strangers and not open attachments/click links they may send you. (Corollary: Thou shalt never open an unexpected file/link from thine family, friends or colleagues)</span></a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/vi-encrypt-data-on-mobile-devices/">Thou shalt encrypt all data stored on thine mobile devices.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">Thou shalt use two factor authentication on any account that provides the facility.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">Thou shalt never reveal thine password for any account to anyone.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">Thou shalt never insert nor allow to be inserted, a USB memory stick that thy hath never had complete control of since it was removed from its packaging.</a></li>
<li data-blogger-escaped-style="text-align: justify;"><a href="http://www.l2cybersecurity.com/x-only-use-official-app-store/">Thou shalt only use the official app store for apps.</a></li>
</ol>
<p style="text-align: center;">For more information, please visit our <a href="http://www.L2CyberSecurity.com/">website</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/the-ten-commandments/">The Ten Commandments of Cyber Security</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
