Cyber Security

stock-photo-31068622-safety-concept-cyber-security-on-digital-backgroundCybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity.

The New Cyber criminals have now ways to get backed up by Criminal organizations and or radical political groups.

Today’s Cyber criminal have more resources available to plan an Attack and have more technical knowledge. Most of these groups are not motivated by money alone.They are better organized and have funds available to them in many different ways.

stock-photo-3413560-teen-boy-in-the-darkThis is not just a kid in the basement breaking into big corporations for kicks and giggles.

New criminals know what to do with the stolen data they just got a hold of. The kid in the basement would not know what to do with that data.

Criminal organization knows exactly what to do or who to sell stolen intellectual property to on the gray or black market. Criminal organizations and nation-states have far greater financial resources than independent individuals.

Some of these organizations would look like a legitimate business with an office. Equipped with cubicles for computer operators( Cyber-criminals Station).  A receptionist to take calls from customer there scamming.That phone number they just called probably changes the next day.stock-photo-42016610-group-of-business-people-discussing-network-security

Not only do we face more sophisticated adversaries today, but the types of information of value to them are continually expanding as well.

These groups can do interesting things with the most seemingly innocuous bits of information.

The way attack strategies are design nowadays is not a direct attack against a high value server.

The new cyber criminal attacks a certain individual on the server there planning to break into. This is done by getting an individual to click an infested link.

stock-photo-31670732-hacker-programing-in-technology-enviroment-with-cyber-iconsResulting in the users computer getting infected by malware . At this point the malware acts as a control point so the attacker can gain root access to users  computers.

This malware most likely be running in the background. The attacker now has a control point inside the network. Allowing to further expand there attack.

“The key here is that instead of malware and network exploits being separate disciplines as they were in the past, they are now integrated into an ongoing process”.’ Key components of the advanced attack strategy include infection, persistence, communication, and command and control.”  …Resource: Cybersecurity For Dummies, Palo Alto Networks

Once the attacker has a hold of the shell access. First thing they do is exploit the target. After this, they deliver the malware in the background through the app that’s open already or connection.

stock-photo-42348230-virus-attackIn fact, based on its own research, Palo Alto Networks has found that as much as 90 percent of unknown or targeted malware capable of avoiding traditional antivirus technology is delivered from real-time web applications as opposed to corporate e-mail.

Normally attacks that are targeted will develop its own unique type of malware. Since these attacks are specifically customized for that specific target.These attacks are hard to detect. They avoid security by avoiding traditional antivirus detection.

The Primary role of malware attacks plays a central role in the attackers arsenal. An the life cycle of the attack. Cyber criminals have found waysstock-photo-62866222-malware-wordcloud-concept-illustration to deliver malware undetected. Hiding malware communications (with encryption), and avoiding traditional signature-based detection.

These attacks are sophisticated but they do have there vulnerabilities of their own. Today’s threats are networked threats that need your network to communicate. If a threat can’t communicate, the attack can be largely neutralized.

Also there is numerous opportunities exist in your network to detect. The fact that the attack has multiple steps to accomplish full attack.  If an attacker can infect targets, persist on, communicate with, and manage infected hosts, then the attacker can do almost anything.

Organizations need to focus on expanding visibility beyond the network perimeter — both inward and outward. This is best accomplished with network segmentation and a next-generation firewall to enforce central controls on internal and external (such as remote and mobile access) network traffic.

stock-photo-23331063-cyber-attack-headline The sky is NOT falling! Today’s threats are not so advanced that they are impossible to control. They are not completely new, just more common and better organized. Solutions do exist, and organizations can adopt best practices and adapt to changes in the threat landscape. Don’t fall into a trap. The attackers have evolved, but security has as well.

 

 

 

 

Feel Free to Drop a Comment

You can also find me in Wealthy Affiliates

contact me at: david@howsafeareyoutoday.com

Wish you all the Best

David

 

 

Resource: Cybersecurity For Dummies, Palo Alto

What to do when Password is stolen.

 

Most of us don’t practice good password management. To many times we would not create a unique password. We don’t care about creating a unique password each time a password is required.

It becomes a concern when a huge site that has a large amount of members gets hacked. If you are the type that uses the same password for everything.

You could be putting yourself at risk. Guess what? the bad guys know this.

images22222images3424432

I did some research and found ways you can protect yourselves if you think your password has been stolen. Because we can’t control website password practices.

Change your password .It is not as simple as you think. You must change the password for every account you used the same password. Now you got to think about what data did the hackers where exposed to.

There some people like to store all there information in there e-mail folders. Lets say you send it your self a password list so you can remember all your passwords.

The hacker got a hold of your email password now, he has access to all your other passwords.

121212112weweewe

If you think your accounts password for your Bank,Utilities  or any other places have been affected.

Make sure you call them and check if there’s been any activity.  Keep a record of everyone you have spoken to.

Is suggested you keep backups of your contacts. Criminals would erase your contact list so you can’t warn them of the scam.

Spread the word to Relatives and friends first, that your account has been compromised.

222112dsdddd

If you can Monitor your bank activities or if you have some kind of credit monitoring service that monitors your credit..

When using passwords use strong passwords.  You can save yourself  a big head ache just by using strong passwords.

Don’t use a simple password for everything. Use movie lines or catchy phrases you heard. Changed them them into a passwords.

Get creative at the same time,find a way to remember them.

Feel free to Drop me a Comment.

Or you can reach me at Wealthy Affiliates

Your Friend

David