Why you need to know all the cloud services that your organisation uses

by | May 29, 2021 | News, Security

If you don’t where it is, you can’t protect it.

Do you know where ALL your organisation’s data is – not physically, but on which web and cloud services?

Here’s the problem.  If you don’t where it is, then you can’t protect it. The secondary problem is finding out, because not everyone in your organisation will be onboard.  It is common for people to sign up to web services because they offer something useful that helps them do their job.

They sign up using their email address and creating a password.   There is the first headache – how does anyone track what has been signed up to across your organisation, let alone who has access to it? If that person leaves, no one will change the account credentials if they don’t know about it, but your ex-colleague still has access.

Secondly, what data do they upload?  Is that data that you have a legal or moral responsibility for?

 

There’s nothing noble about Nobelium.

This isn’t theory – it’s real.    USAID is a pretty important US organisation – promoting democracy and human rights around the world.  Turns out, someone there was using a well-known email database tool called Constant Contact.  But their account wasn’t well protected. Worse still, their account had a huge mailing set up, and of course, it had all the official USAID templates.

So, these Nobelium people, allegedly a Russian state-sponsored hacker group, compromised the Constant Contact account and sent a bulletin out.  The bulletin contained malware that allowed the hackers to take command and control over victims computers.  Ironically the fake email alleged interference in the US federal elections.

So, what can you do?

The first step is knowing what SaaS tools your people are using.  We call this SHADOW IT and it is inevitable.  Rather than stopping it, the job IT has is to identify it and manage it.  The second step is to secure those platforms.  That’s why our KARE for Security S2 plan contains a useful tool to help you identify what services your people are using.

Refer : What We Know About The Apparent Russian Hack Exploiting USAID : NPR

When hacking can help.

When hacking can help.

Ukraine is pretty well known for tech innovation. In fact it was worth $US6.8 Billion last year  Ukraine’s Booming Tech Outsourcing Sector at Risk After Russian Invasion - WSJ.   On top of that ‘legitimate’ work, Ukraine has also been home to some of the...

Sigh!  How dumb and immoral can hackers get?

Sigh! How dumb and immoral can hackers get?

You can only sigh! We are witness astounding bravery and inspirational leadership in the Ukraine.  We are watching the unfortunate abandoning everything they have built up to become refugees as they flea the dangers. The world is heartbroken. But amongst us there are...

Latest trend – hacking Teams

Latest trend – hacking Teams

Over a quarter of a billion people use Teams every month. Under the current lockdown/isolate/work-from-home regimes, it is a vital tool for most of us.  Many organisations including us even use it for our phones because it is so flexible and excellent value. You can...

2021 Trend Reports confirms cyber-security advice

2021 Trend Reports confirms cyber-security advice

How many people DON’T report ransomware attacks? It’s too early to see the Q42021 results from CertNZ but their Q3 report tells there were 2,072 incidents that they responded to in Q3 and fraud/scam’s were up 25%. Their report confirms that the very risks we have been...

Hackers Caught!  Millions Seized

Hackers Caught! Millions Seized

Crime doesn’t always pay. The FSB reports (if you can read Russian) that they have taken down the “Revil” band of hackers. These are the people that have caused absolute havoc, from disrupting the US oil pipelines, to the Kaseya attack that took out businesses all...

What’s worse than having to pay Ransomware?

What’s worse than having to pay Ransomware?

The answer : Having to pay it twice - (or even more). Your Cyber-Security is under more pressure than ever. According to Infosecurity magazine, "double" extortion ransomware victims are up a massive 935% - thats a ten-fold increase year-on-year. This is driven by the...

“Phishmas” – its not that punny

“Phishmas” – its not that punny

Whatever it takes to draw your attention to Cyber Security is worth it. Just because we take time off at Christmas doesn't mean the hackers do. They have taken a lot of heart from the way we have all embraced home-delivery for our shopping and are doubling down with...

Is your Fingerprint effective security?

Is your Fingerprint effective security?

Straight out of the movies We are all used to the idea of using our fingerprints to log into our cell phones and, for some of us, our laptops. We’ve been told fingerprints are secure, and effective for ‘biometric authentication’ In the movies, we see finger prints...