Monthly Archives: October 2014

Put Defences In Place Now As Malware And Identity Fraud Surge – Charles Leaver

This post has been composed by Charles Leaver, CEO Ziften Technologies.

In a report it was exposed that breaches of customer data suggests that there are more and more identity thefts being performed nowadays. This is extremely alarming for everyone.

The report was carried out by the National Consumers League and it exposes that in the year 2013, around 33% of consumer data breaches caused identity fraud, and this means that the figure has actually tripled since 2010. This distressing rise can be explained by some clear reasons. Cyber bad guys are using far more sophisticated methods now and there is an absence of cyber attack laws that require organizations to divulge when they have had an attack. To make matters worse there are few companies using endpoint detection and response systems to secure their data. All this means that we are going into a climate where consumers are discovering that their data is continuously under attack by deceitful hackers.

John Breyault, who belongs to the National Consumers League, mentioned that cyber attack breach legislation like the one operating in California can help with the minimization of breach fall outs by mandating the organizations that have actually been infiltrated to quickly get the word out.

He went on to state that after a breach prompt notification is required so that individuals can conduct a “harm analysis” once they know about an attack. This is everyone’s right and at the moment the type of problem that would set a notice in motion stays really broad.

Sadly, it is not just identification theft that is under the spotlight. A different report revealed that malware is now more common than it ever was.

Every Third Computer Has A Malware Infestation According To A Report

 

The Anti Phishing Workers Group published a report stating that malware was likely to be present in up to a third of the computer systems throughout the world by the final quarter of 2013. This is a substantial boost when compared to the previous quarter says Tech News World. The technical director of a security lab that investigates cyber attacks, Luis Corons, said that brand-new malware strains are being created at an incredibly rapid pace and that malware infections might rise even further.

He mentioned that the creation of new malware samples has just skyrocketed and it has actually doubled from the final quarter of 2013 to the very first quarter of 2014.

The findings of these 2 reports highlights the fact that there is no room for complacency in organizations when it concerns security. Every organization has to sure up its endpoint detection and response systems or face the fact that a cyber attack is increasingly most likely to be coming their way.

 

 

 

 

 

Charles Leaver

Breaches And Malware Now Attract Fines So Get Defenses In Place Now – Charles Leaver

Posted By Charles Leaver Chief Executive Officer Ziften Technologies.

 

With malware ending up being more stealth and the fines that business face when they suffer a breach from it makes the case for installing endpoint detection and response systems even more critical than it remained in the past. Without the right defenses implemented there is not only the threat of a major cyber attack, but also fines and claims that can be extremely damaging to a business. If an enterprise believes that it is insusceptible to cyber attacks then they are being conceited and ignorant. The cyber criminals out there are making their attacks almost undetectable nowadays.

 

Serious Malware Hazard Now Evading Detection

 

Embedding a secret message into something unexpected is called steganography and is not something brand-new that has actually arrived with the Web. In the 1600’s, Gaspar Schott developed a book which described how a secret message could be hidden in a musical score which could be decrypted by those that learned about it. The approach utilized was the notes on the score would represent a letter of the alphabet and therefore the message could be checked out.

This practice has some worrying ramifications as it supplies a practically foolproof way of hiding information that should not exist. Cyber criminals have actually been using steganography for a number of years now. It was reported in a Federal Plan Cyber Security which was published by the National Science and Technology Council in 2006, that steganography represents a particularly sneaky way for terrorists to penetrate U.S. systems.

The report mentioned that these tools are inexpensive and widespread making steganography an enabling technology for the foes of the United States.

Nowadays cyber security attacks are widespread and hackers are leveraging steganography to carry out attacks that are practically undetected and extremely advanced. In a paper on the risks of steganography, it was mentioned that there is momentum gathering in its usage among cyber bad guys who can use the technique to breach networks without detection. The report went on to say that Internet based steganography has ended up being a lot more advanced and will just end up being more so in the years to come.

While steganography does present a big danger it can be alleviated by executing an endpoint detection and response system. This system will carefully watch all areas where a cyber crook might gain access and it is advised that all companies take this essential action.

 

The Penalties Are High For Organizations That Suffer A Cyber Attack

 

The hazard of a steganographic attack need to certainly be enough for you to install an endpoint detection and response system however if it isn’t then the significant fines that your company can face for a breach should be. Any organization is prone to attacks and fines. As an example of this the Women and Infant Hospital in Providence, Rhode Island, needed to pay $150,000 as a result of a cyber attack which saw the details of 12,000 people jeopardized. The Modesto Bee specified that the data that the healthcare facility lost consisted of Social Security numbers, dates of birth as well as ultrasound imagery.

The corporate world can likewise suffer at the hands of a malicious breach. eBay faced a lawsuit from a consumer in Louisiana after they were attacked according to Computerworld. Colin Green, who submitted the law suit, is not alone in being dissatisfied and represents countless individuals who were not happy that their personal data was exposed when the cyber attack happened at eBay. The potential fines and law suits make the investment in a proven endpoint detection and response system really worthwhile.

 

 

Charles Leaver