Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of more What is metadata, how is it used and why is it important? When we interact over more Mass surveillance is the subjection of a population or significant component of more There’s a good chance you were affected by the Equifax hack of 143 million more Facebook has the ability to spy on users in their homes and offices because more

Constant vigilance is the key to protection from phishing and cyber crime

Alan Phillips is a security expert and quoted extensively in an article in the Financial Times as part of a special report on cyber security. The article looks at computer crime and how, although much of this is opportunistic and random, some cyber attacks are focused and target a specific individual or organization

Alan says: “Perpetrators of these ‘advanced persistent threats’ (APTs) spend much more time gathering information than other hackers.”

Cyber Crime Constant Vigilance Key to Protection from Phishing (PDF)

The material could be about operational activities, staff members, IP addresses, even job advertisements. “By the time they launch the attack, they have a high degree of success,” Alan says.

Alan talks about how APTs can be hard to spot and says it is like having an invisible man in your house: “You only see him if he leaves muddy footprints.”

Alan goes on to advocate “dynamic” defence – making frequent small changes to system configurations to thwart offensive techniques. He recommends regularly testing defences and instant response plans, “so people know what to do when something does happen”.

He also advocates logging and monitoring as much detail as possible around sensitive data, “so you have the forensic information to work out what’s gone wrong – otherwise, you might suspect a breach for a long time without being able to discover it”.

Staff should be discouraged from listing their technical skills on sites such as LinkedIn, because this might give away operational activities, Alan says. Criminals can work out what software you are running.

Alan also suggests staff should not use their work email addresses and IDs on public websites such as help forums. Another simple precaution that is often overlooked is removing default, factory-set system passwords.

You can read the article in full here.

Tags: , , ,

No Comments

Leave a reply

Story Page