Sunday, 15 November 2015

Week #11: CryptoWall Struck My Job's File Server (Part 3) !

The CrytoWall has been officially removed from our servers! Unfortunately, all backups failed which left the company having to revert to outdated files which is technically, three months old.  How we manage to retrieve such data? While that's a long funny story, we had an old decommission server blade that was supposed to be wiped and refurbished three months ago still laying around the server room. Lady luck was on our side because it was the old File Storage server. 

Once the files were restored a Postmortem meeting was called. We concluded that more restrictions would be placed, banning USB storage devices and personal emails. Also, next year we will be looking into a new Enterprise Antivirus solution and more space will be provided for data backups.

Sunday, 8 November 2015

Week #10: CryptoWall Struck My Job's File Server (Part 2) !

Not much as been done with regards to recovering data. We just happen to be extremely lucky that a backup of some of the most vital data was stored on an inactive server. The CrytoWall virus seems to have spread throughout the network. I firmly believe that it was on the network for a very long time, and it was undetected by our antivirus software. This week we have taken some high-risk computers of the network until we find a solution to this vexing problem.

Saturday, 31 October 2015

Week #9: CryptoWall Struck My Job's File Server!

Well, this is a first for me. But, my next two blogs will be based on a real life situation that my job is currently combatting. The dreaded CryptoWall has struck our file storage servers and encrypting all necessary documents and leaving behind a ransom note requiring a cash payment on keys for the decryption.

To address this issue we first need to understand what is a CrytoWall?

CryptoLocker/Wall is a ransomware trojan that targeted computers running Microsoft Windows. CryptoLocker/Wall is transmitted via email attachments, web downloads,  and even infected USB drives.  The malware could be embedded within your system for long periods until it is triggered. Once, active the malware encrypts a particular type of files stored on local and mounted network drives using an RSA public-key cryptography, with the private key stored on the malware's servers. The malware then displays a message that offers to decrypt the data if a fixed deadline makes a payment. If the deadline is not met, then expect to pay a higher price for the key.

Next week I will give an update how we address this issue...

Sunday, 25 October 2015

Week #8 - Upgrade from Windows XP NOW!

Windows XP

Windows XP should be a thing of the past now, but sadly many users are still having a hard time parting ways of this  dead operating system
On April 8th, 2014 Microsoft officially end  Windows XP support, but today a strong 250 Million users are still using this operating system.

According to Net Applications, Windows XP users account for nearly 17 percent of worldwide share.

Why should I upgrade? 

Windows XP  is a security concern. Win XP-based machines are still stable, but Microsoft will no longer roll out security updates for it. That means a computer with OS will be more susceptible to hackers and malware, which could exploit flaws that Microsoft is no longer fixing to gain access to your machine and steal your personal information.

References

Windows XP Usage Still Strong at 250 Million Users ... (n.d.). Retrieved from https://redmondmag.com/articles/2015/04/08/windows-xp-usage.aspx

Why You Should Ditch Windows XP Now | News & Opinion | PCMag.com. (n.d.). Retrieved from http://www.pcmag.com/article2/0,2817,2456104,00.asp

Sunday, 18 October 2015

Week #7 How to make Windows 10 more secure

By default Windows, 10 violates your privacy. When launching Microsoft new browser Edge to search, Bing already knows your location. You notice that all the banner ads are geared toward your hobby.

You’d be surprised by the amount of personal information Windows 10 collects from its users daily. Information such as phone numbers, GPS location, credit card numbers, and even video and audio messages. While, Microsoft’s privacy statement outlines all the data that is collected and how it is used to enhance your experience and claim that the information is safe.  Unfortunately,  you had to agree to their terms when you downloaded & installed Windows 10  terms of service.

In this Age of the Unread Terms of Service Agreement, it’s important to, read the Terms of Service, Use, and Private Policy.  It has become too easy for technologies giants to gather personal information without us realizing it.

Fortunately, Microsoft has incorporated a few settings we could disable to secure our data which is located within the Setting Panel

w10-1.jpg

w10-2.jpg

w10-3.jpg



References

"Hacking Defined Experts | Hacking News &amp; Tutorials."Insert Name of Site in Italics. N.p., n.d. Web. 19 Oct. 2015 <http://www.hackingdefinedexperts.com/.

Windows 10 violates your privacy by default, here's how you ...(n.d.). Retrieved from https://www.yahoo.com/tech/s/windows-10-violates-privacy-default-121036079.html

Sunday, 11 October 2015

Week #6 2013's List of Weak & Common Passwords

062524 worst passwords

If  your passwords are displayed here, go change immediately!


Tips on Making Your Password Stronger:

It needs to have 12 Characters, Minimum

Your password should include Numbers, Symbols, Capital Letters, and Lower-Case Letters: Using a mix of different types of characters to make the password harder to crack.

Stay away from obvious dictionary words and combinations of dictionary words. 

 Don’t use common substitutions, either — for example, “H0use” isn’t strong just because you’ve replaced an o with a 0. 


Try to mixing your password up with symbols— for example, Password can be spelled like P@$$W0rD. The use of symbols can be extremely hard to crack.


References

Top 25 most commonly used and worst passwords of 2013 ...(n.d.). Retrieved from http://www.networkworld.com/article/2226175/microsoft-subnet/top-25-most-commonl

Sunday, 4 October 2015

Week #5 Andriod a Liability or an Asset?

Today, Android is the world's most favorite mobile operating system, but it is slowly becoming a liability rather than an asset. The Android platform suffers the issue of fragmentation meaning there are multiple versions of the same operating system on the market, even on newer devices.  Manufacturers often make their its own changes to the platform, so they could be behind Google's current reference release. Also, carriers and manufacturers may not update their products' to the updated Android OS version when Google does, or they take months or even years to do so.
As a result, many people within the same organization might be using outdated versions that could be riddled with security vulnerabilities.

Now Android has a new malware that can render the phone useless which is:




Android/Lockerpin.A: This is a Malicious apps that disable Android phones until owners pay a hefty ransom. If the user refuses to pay, he/she would have no choice but to do a factory reset, losing all their data.









References



New Android ransomware locks out victims by changing lock ...(n.d.). Retrieved from http://arstechnica.com/security/2015/09/new-android-ransomware-locks-out-victims

Sunday, 27 September 2015

Week #4 Protecting Home Networks

Most households now run wireless networks with various devices needing a constant connection to the Internet. These devices  includes: 

  • Computers,
  • Gaming devices,
  • Smart TVs and;
  • Smartphones 

To protect your wireless home network you need to have the right tools in place along with educating family members on how to use the Internet safely and securely.

The first step is to Keep a Clean Machine to achieve this an  antivirus software is needed to eliminate all threats/ malicious software within the devices. Also, all Internet-enabled devices should have the latest operating system, web browsers, and security software.

Tip for securing Wireless router:

  • Change the name of your router
  • Change the default password
  • Enable router's Firewall
  • Limit access to the network by MAC addresses 
References 
The iGuardian: A Smart Way to Protect Your Home Network.(n.d.). Retrieved from http://www.makeuseof.com/tag/iguardian-smart-way-protect-home-network/


Sunday, 20 September 2015

Week #3 IT Security Planning & Tips for Network Security Planning


The most important part of deployment any type of IT system is planning. Although It is not possible to plan for security with regards to IT, however, a full risk assessment of all system can be performed. Security planning involves developing security policies and implementing controls to prevent computer risks.






Network Security Planning Tips

1. Educate Employees (VERY IMPORTANT)
The biggest threat to a  IT security is the people right in that building! Mandatory company training can go a long way towards informing employees of their responsibilities while teaching them best practices for managing IT devices and information.

2.  Eliminate the  BYOD (Bring Your Own Device) Plan
Don’t allow your employees to deal with company data on personal devices.

3. Restrict Information
Private information should only be available on a need-to-know basis.

4. Maintaining Your Systems
Failing to update computer programs or using outdated computer equipment can create a lot of room for hackers to infiltrate your systems.

5. Have a Disaster Plan






Friday, 11 September 2015

Week #2 What is application security?



Application security is the use of software, hardware, and procedural methods to protect applications from external threats. 
There are many risks associated with developing applications especially if the program will store sensitive data.  Below are common Application Security Issues which must be addressed during the development phases of an Application:

Input 
Validation Tampering
A input validation is  the outer defensive perimeter for a application. This perimeter protects the  logic, processing and output generation. Examples of input validation tampering are cross-site scriptingSQL injectioncanonicalization 

Software Tampering


This is when someone modifies the runtime behavior to perform unauthorized actions. 

Saturday, 5 September 2015

How to Keep Your Mobile Devices Secure While Traveling



Because today's smart devices are so much more powerful and can hold so much more information than ever before, the risks of being exploited are increasing.  Not to mention that we also have a tendency to carry both personal & business data around with us on the same device, hence making our mobile devices looked so appealing to hackers. 



Tips for Keeping Your Mobile Devices Secure

1. Make sure your  Mobile Operating software is up-to-date.
2. Use Strong Passwords
3. Avoid unencrypted public Wifi Networks
4. Use VPNs
5. Disable Cookies and autofill
6. Play close attention to 3rd Party Applications security permission changes