IT Security News Blast 04-04-2018

How Detection and Response Affect Risk Management

How Detection and Response Affect Risk Management
A HIMSS 2018 survey of healthcare IT CIOs and CISOs suggests that the health sector is beginning to treat information security as general risk management. Increasingly, risk managers assess the threat of a potential “cyber” event much like the threat of an earthquake or active shooter. First, they quantify the loss expectancy using existing systems in terms of impact to the organization. The next step is to assess if additional actions can be taken to minimize the impact. At the same time, risk management programs are recognizing that the impact is expanded by regulatory oversight, such as the HIPAA security rule. In fact, risk management is becoming the lingua franca of the C-Suite in the boardroom.
https://criticalinformatics.com/resources/blog/how-detection-and-response-affect-risk-management/

Healthcare Pros Worry about Data Security at Other Organizations
This curious result suggests that healthcare professionals trust their own organizations, but not others, with cybersecurity. While many are concerned about the security of their healthcare data, only a small percentage of respondents believe that more regulation is the way to secure their data. In fact, only 29 percent of respondents think that more regulation is needed. Most are also skeptical about the wisdom of government-mandated backdoors into encryption for law enforcement purposes, with 76 percent believing such mandates could jeopardize their patients’ privacy and personal information.
https://healthitsecurity.com/news/healthcare-pros-worry-about-data-security-at-other-organizations

Healthcare CISO: ‘Hygiene and patching take you a long way’
You can’t protect everything. As a former national security adviser said, ‘If we guard our toothbrushes and diamonds with equal zeal, we will lose fewer toothbrushes and more diamonds,’ [attributed to McGeorge Bundy, national security adviser to President Johnson and special assistant to President Kennedy]. You must understand what normal activities are and what your crown jewels are — and that takes a lot of time, effort and tuning.
https://searchsecurity.techtarget.com/opinion/Healthcare-CISO-Hygiene-and-patching-take-you-a-long-way

Healthcare Cyber Security Market will Reach at a CAGR of 12% by 2023
The global healthcare cyber security market is expected to register a CAGR of 12% during the forecast period (2018 to 2023). Cyber-attacks are constantly increasing across the globe. The healthcare cyber security market is growing at a tremendous rate due to the growing need for network security in healthcare organizations. […] As connected technology becomes even more embedded in healthcare, cyber threats are expected to increase. So, this cyber threat is driving the market, along with the other factors, such as increasing demand of could services and low penetration of the information security systems in healthcare sector.
https://healthcaretrends24.com/51050/healthcare-cyber-security-market-will-reach-at-a-cagr-of-12-by-2023/

Financial Services Cybersecurity Systems and Services Market: Rise in Cyber Theft to Bolster Growth
On the basis of geography, the world financial services cybersecurity systems and services market is projected to be classified into regions such as the Middle East and Africa (MEA), Asia Pacific except Japan (APEJ), Europe, Latin America, and North America and countries such as Japan. Out of these geographical markets, North America could take the driver’s seat while expanding at a 15.8% CAGR. The attractiveness of this regional market could continue to reign until the end of the forecast period.
https://businessservices24.com/317174/financial-services-cybersecurity-systems-and-services-market-rise-in-cyber-theft-to-bolster-growth/

Poll: Cybersecurity Big Source Of Consumer Worry And Negligence
Eight of 10 consumers are concerned about businesses safeguarding their information, but more than three out of 10 have been negligent in not taking a basic step to protect it, a survey released today found. A bit more than one-third of Americans have never looked at their credit report, according to the poll of 1,006 adults last fall by the American Institute of CPAs.
https://www.forbes.com/sites/tedknutson/2018/04/03/poll-cybersecurity-big-source-of-consumer-worry-and-negligence/#57fce7965379

Third Gas Pipeline Data System Shuts a Day After Cyberattack
A third U.S. pipeline company reported its electronic system for communicating with customers has stopped working, a day after a cyberattack resulted in a similar shutdown. The Department of Homeland Security, which said Monday it’s gathering information about the potential intrusion, had no immediate comment on the latest shutdown. Tuesday’s closure affected Oneok Inc., which operates natural gas pipelines in the Permian Basin in Texas and the Rocky Mountain region. The cyberattack Monday didn’t affect flows on the pipeline.
https://www.bloomberg.com/news/articles/2018-04-03/day-after-cyber-attack-a-third-gas-pipeline-data-system-shuts

Russia Attacked the US Power Grid for Two Years. Now What?
It is estimated that U.S. utilities will spend over $7 billion on grid cybersecurity by 2020. To protect their systems, utilities must first understand how they are interconnected. Utilities will then be equipped to make better decisions as to which products are best to protect their systems from cyber threats. Every utility should create a register with details about identified risks, an analysis of exposure severity and evaluations of possible solutions. The register must be updated regularly as cyber threats and vulnerabilities change quickly.
https://www.realclearenergy.org/articles/2018/04/04/russia_attacked_the_us_power_grid_for_two_years_now_what_110283.html

Cybersecurity and the New Era of Space Activities
In crafting needed legislation for commercial space activities, Congress should bolster industry efforts to strengthen cybersecurity. Private-sector actors should strengthen their adoption of cybersecurity best practices and collaborate with one another on improving implementation of cybersecurity strategies. Internationally, the United States should pursue collaboration on space cybersecurity through the North Atlantic Treaty Organization (NATO), plurilateral space cooperation mechanisms, and bilateral forums.
https://www.cfr.org/report/cybersecurity-and-new-era-space-activities

The Next NSA Chief Is More Used to Cyberwar Than Spy Games
Nakasone’s recent career—leading the Army’s Cyber Command and creating Joint Task Force Ares, a Cyber Command operation with a mission of attacking and disrupting ISIS operations via the internet—has prepared him more for that Cyber Command role than for the NSA’s Sigint mission, some in the intelligence community say. And that has raised concerns that Nakasone won’t give equal weight or resources to the NSA half of his position.
https://www.wired.com/story/paul-nakasone-nsa-cyber-command/

States redesign election cybersecurity with $380 million boost
Several states have reported they are now in the process of developing proposals of how their funding will be spent, including Washington and Wisconsin, two states that were targeted in the previous presidential election. Washington state will receive $7.9 million to enhance cybersecurity and replace aging IT infrastructure, the office of Washington Secretary of State Kim Wyman announced March 29. That funding is required to be supplemented by an additional grant from the state of at least 5 percent, or about $400,000.
https://statescoop.com/states-redesign-election-cybersecurity-with-380-million-boost

The best cybersecurity analysts should play the part of detective
With an ever-growing threat from cyber attacks, we now live in a world where security operation centers (SOC) are the norm. These typically feature a number of cybersecurity analysts watching screens for alerts, and then following a play book for any alerts that occur. When done well, these operations will usually identify and remediate common attacks very quickly. For example, responding to an alert about a malware attack on a system, they would typically block the system from the network, and send field personnel to clean it up.
https://www.csoonline.com/article/3268030/data-protection/the-best-cybersecurity-analysts-should-play-the-part-of-detective.html

What Cybersecurity Jobseekers are Telling Us
Hiring organizations need to keep this in mind and be savvy about using these channels to obtain the people they need. Unlike twentieth century job hunting in technology fields, the new generation of talent knows they can achieve their career goals by leveraging their digital relationships. You may now be asking who really benefits from this phenomenon. The answer? Recruiters. Our next statistics show this trend clearly.  Forty-six percent of respondents say they are contacted by a recruiter at least once a week, and 21% claim that happens to them daily.
https://securityboulevard.com/2018/04/what-cybersecurity-jobseekers-are-telling-us/

Mass Surveillance Memes Show Our Collective Anxiety Over Government Spying
“These jokes are reflective of an underlying general anxiety about [surveillance],” Parker Higgins, director of special projects at the Freedom of the Press Foundation, said in a phone call with Motherboard. […] According to a Pew Research Study, as much as 86 percent of internet users have taken some measures to mask their online activity. The same Pew survey showed that younger people between the ages of 18 and 29 are more likely than adults to pay attention to privacy issues. They are also more likely to have given up personal information.
https://motherboard.vice.com/en_us/article/zmg3ky/surveillance-memes-nsa-fbi-facebook

Hold the phone: Mystery fake cell towers spotted slurping comms around Washington DC
The US Department of Homeland Security (DHS) says it has detected strange fake cellphone towers – known as IMSI catchers – in America’s capital. These devices, which can masquerade as real phone masts to track people’s movements and potentially eavesdrop on calls and texts, represent a real and growing security risk, the agency said. And whoever is operating them in Washington DC is, we’re told, a mystery to Uncle Sam’s g-men.
https://www.theregister.co.uk/2018/04/03/imsi_catcher_stingray_washington_dc/

Panera accused security researcher of “scam” when he reported a major flaw
Eight months ago, Panera Bread was notified of a security flaw that was leaking customer information to anyone who knew where to look for it. But the company failed to fix the flaw until this week after the breach was made public in a report suggesting that it affected 37 million customer records. […] The records “could be indexed and crawled by automated tools with very little effort,” Krebs wrote yesterday. Leaked data included Panera customers’ loyalty card numbers, “which could potentially be abused by scammers to spend prepaid accounts or to otherwise siphon value from Panera customer-loyalty accounts,” he wrote.
https://arstechnica.com/information-technology/2018/04/panera-accused-security-researcher-of-scam-when-he-reported-a-major-flaw/

How to delete your Facebook data in bulk with this Chrome extension
Through this Chrome extension, you can not only delete Facebook posts in bulk but also unlike them via an automated process. Before deleting the data, you need to create a backup of the data, which will include your photos, videos, posts, messages and chat conversations on Facebook. The information uploaded in the About section of your profile will also be included in the backup.
https://www.hackread.com/how-to-delete-your-facebook-data-in-bulk-with-chrome-extension/

Mad March Meltdown! Microsoft’s patch for a patch for a patch may need another patch
The out-of-band emergency update, KB4100480, was released by Microsoft last week to supplement a patch released in early March to address severe vulnerabilities accidentally introduced by Redmond’s engineers in their January and February security updates for Meltdown on Windows 7 and Windows Server 2008 R2. That early March update attempted to kill off security bug CVE-2018-1038, introduced in January’s Meltdown patch, but it wasn’t entirely effective, hence the need to grab and install KB4100480.
https://www.theregister.co.uk/2018/04/03/microsoft_windows_meltdown_patch_saga/

 

====

Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.