<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Halkyn Security Blog</title>
	<atom:link href="http://www.halkynconsulting.co.uk/a/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.halkynconsulting.co.uk/a/</link>
	<description>Specialist Security &#38; Risk Management Consultants</description>
	<lastBuildDate>Fri, 27 Nov 2020 11:40:48 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">141257429</site>	<item>
		<title>DFIR on a Shoestring &#8211; Incident response for less</title>
		<link>http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 11:39:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[IR]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1853</guid>

					<description><![CDATA[<p>EDR and Forensics tools can be very expensive. This post looks at some cheap, or free, DFIR alternatives you absolutely should consider. Even if you have a good budget for high-end professional tools, it's worth building these into a toolbox you can use to solve problems or unexpected situations. </p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/">DFIR on a Shoestring &#8211; Incident response for less</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>First, it is widely accepted that cyber-attacks are inevitable. The idea that you can hope attackers will never show up only really works if you don&#8217;t have anything electronic. If you have a computer, especially an internet-connected one, you need to be ready to do some DFIR one day.<br />
<figure id="attachment_1862" aria-describedby="caption-attachment-1862" style="width: 215px" class="wp-caption alignleft"><img fetchpriority="high" decoding="async" data-attachment-id="1862" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/cyberattacks_inevitable_need_dfir/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?fit=1117%2C1561&amp;ssl=1" data-orig-size="1117,1561" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Cyber attacks are inevitable &#8211; you need to plan DFIR" data-image-description="&lt;p&gt;Cyber attacks are inevitable &#8211; you need to plan DFIR&lt;/p&gt;
" data-image-caption="&lt;p&gt;Cyber attacks are inevitable &#8211; you need to plan DFIR&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?fit=215%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?fit=733%2C1024&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?resize=215%2C300&#038;ssl=1" alt="Cyber attacks are inevitable - you need to plan DFIR" width="215" height="300" class="size-medium wp-image-1862" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?resize=215%2C300&amp;ssl=1 215w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?resize=733%2C1024&amp;ssl=1 733w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?resize=768%2C1073&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?resize=1099%2C1536&amp;ssl=1 1099w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/cyberattacks_inevitable_need_DFIR.png?w=1117&amp;ssl=1 1117w" sizes="(max-width: 215px) 100vw, 215px" data-recalc-dims="1" /><figcaption id="caption-attachment-1862" class="wp-caption-text">Cyber attacks are inevitable &#8211; you need to plan DFIR</figcaption></figure>For lots of businesses, this creates a problem. Good DFIR is <strong>not</strong> cheap and even if you don&#8217;t need highly skilled professionals, buying the tooling can be eyewateringly expensive. One of the basic components you need is an EDR (endpoint detection and reporting) tool. There are amazing products in this space but they aren&#8217;t cheap. Basic deployments can quickly hit 5 figures, per year, for even small networks. </p>
<p>It&#8217;s the same with forensics tools &#8211; they are brilliant and can really help you find things, but for most of the commercial tools its another 5 figures per year for a licence. It&#8217;s ok if you have a big budget, but putting £50,000+ a year aside for just two DFIR tools is challenging for most people. When you add in the tools you need to cover the extra bits you will almost certainly need, then it really becomes a financial burden. This is without considering the cost of skilled staff.</p>
<p>The good news is that there are lots of alternative options. You can build a fully functional DFIR capability for a fraction of the cost, using a mix of free or low priced tooling. One caveat, free isn&#8217;t really free. You will need to pay with your own time to resolve any issues or purchase support contracts, but even these are often less than the annual cost of a commercial licence of the big-name products. In this post, we will look at some options you really should consider, even if you have an expensive tool already, as these can help cover the inevitable gaps.</p>
<h2>Your Low-Cost DFIR Toolkit</h2>
<p>First some caveats. This isn&#8217;t an in-depth look at the tools, that might come later. Also it wont cover everything &#8211; it cant. There will always be new projects or ones we haven&#8217;t heard of. If this spurs you into looking for a good tool then we have achieved our aim! Finally, it&#8217;s not going to cover things like SIEMs or Log Analysis/centralisation. That is critical for DFIR but requires additional focus. If we can, we will pick this up in a future post.</p>
<p>To help organise this, we can group the tools into categories.</p>
<h3>Endpoint Detection and Response</h3>
<p><strong>Velociraptor</strong> &#8211; <a href="https://www.velocidex.com/" rel="noopener noreferrer" target="_blank">https://www.velocidex.com/</a><br />
<a href="https://www.velocidex.com/about/" rel="noopener noreferrer" target="_blank"><figure id="attachment_1870" aria-describedby="caption-attachment-1870" style="width: 313px" class="wp-caption alignright"><img decoding="async" data-attachment-id="1870" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/velociraptor/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Velociraptor.png?fit=313%2C230&amp;ssl=1" data-orig-size="313,230" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Velociraptor &#8211; Endpoint Security Made Easy" data-image-description="&lt;p&gt;Velociraptor &#8211; Endpoint Security Made Easy&lt;/p&gt;
" data-image-caption="&lt;p&gt;Velociraptor &#8211; Endpoint Security Made Easy&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Velociraptor.png?fit=300%2C220&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Velociraptor.png?fit=313%2C230&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Velociraptor.png?resize=313%2C230&#038;ssl=1" alt="Velociraptor - advanced open-source endpoint monitoring, digital forensic and cyber response platform" width="313" height="230" class="size-full wp-image-1870" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Velociraptor.png?w=313&amp;ssl=1 313w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Velociraptor.png?resize=300%2C220&amp;ssl=1 300w" sizes="(max-width: 313px) 100vw, 313px" data-recalc-dims="1" /><figcaption id="caption-attachment-1870" class="wp-caption-text">Velociraptor &#8211; Endpoint Security Made Easy</figcaption></figure></a>At the time of writing, this is probably one of the best EDR platforms available &#8211; free or paid for. It uses an agent which reports into the main console allowing for very versatile deployment options. In the event of an incident, the investigator logs into the console and can control the agents to either hunt for malicious activity, run targeted collections, file analysis or even pull large data samples.</p>
<p>If you need support this is available for a fee but it is still significantly cheaper than some of its closed-source, commercial competitors.</p>
<p>The main challenge you are likely to face is the bandwidth between console and agent. However, this is true for all EDR products and any remote access solution. If you have a need to regularly collect full disk or memory images, then you either need to ensure incredibly high bandwidth (images can be 1tb or larger) or establish a way to do local evidence collections.</p>
<h3>Evidence Collection</h3>
<p><strong>Kape</strong> &#8211; <a href="https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape" rel="noopener noreferrer" target="_blank">Kroll artifact parser extractor</a><br />
<a href="https://binaryforay.blogspot.com/2019/02/introducing-kape.html" rel="noopener noreferrer" target="_blank"><figure id="attachment_1869" aria-describedby="caption-attachment-1869" style="width: 203px" class="wp-caption alignright"><img decoding="async" data-attachment-id="1869" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/kape/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/kape.png?fit=203%2C106&amp;ssl=1" data-orig-size="203,106" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="KAPE &#8211; DFIR/Triage Tool" data-image-description="&lt;p&gt;KAPE &#8211; great for DFIR / Triage and evidence collection&lt;/p&gt;
" data-image-caption="&lt;p&gt;KAPE &#8211; great for DFIR / Triage and evidence collection&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/kape.png?fit=203%2C106&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/kape.png?fit=203%2C106&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/kape.png?resize=203%2C106&#038;ssl=1" alt="KAPE - DFIR/Triage Tool" width="203" height="106" class="size-full wp-image-1869" data-recalc-dims="1" /><figcaption id="caption-attachment-1869" class="wp-caption-text">KAPE &#8211; great for DFIR / Triage and evidence collection</figcaption></figure></a>Another amazing tool. This is free for internal use but requires a licence to be used as a service. If you want it to run internally by your own staff, there shouldn&#8217;t be any problems.<br />
Kape allows for targeted evidence collection into a versatile VHDX format container. This can have the impact of changing a 1TB full disk image into 200MB of targeted data. You lose things like the ability to scan unallocated space but in 99% of incidents, you won&#8217;t do that. If you have any doubt, then you can use Kape to gather &#8220;triage&#8221; data for quick analysis while you send the disk image in slower time.<br />
Every IR team should have a copy of Kape and some practice in its use.</p>
<p><strong>CyLR</strong> &#8211; <a href="https://github.com/orlikoski/CyLR" rel="noopener noreferrer" target="_blank">Live Response</a><br />
Similar to Kape, this is a tool which runs rapid collection of pre-determined artifacts on the target system. It is less configurable than Kape but has some advantages in that it runs on multiple platforms and you can use to send the collected data to a remote system via SFTP. This can be invaluable if you need a sysadmin local to the victim system to capture data and send it back to your analysis server (or AWS S3 buckets).</p>
<p><strong>Belkasoft RAM Capturer</strong> &#8211; <a href="https://belkasoft.com/ram-capturer" rel="noopener noreferrer" target="_blank">https://belkasoft.com/ram-capturer</a><br />
There are many tools you can use to capture RAM from a target system, but we&#8217;ve found Belkasoft&#8217;s tool one of the easiest to use. It is definitely something you should practice with and make sure it fits your DFIR workflow. One additional consideration, as endpoints become more secure, the ability to capture RAM (and analyse it) is reducing. If you are running the cutting edge versions of Windows, you need to make time to practice RAM dumping to make sure it is still feasible. </p>
<p><strong>FTKImager</strong> &#8211; <a href="https://accessdata.com/product-download/ftk-imager-version-4-5" rel="noopener noreferrer" target="_blank">https://accessdata.com/product-download/ftk-imager-version-4-5</a><br />
FTK, by Access Data, is one of two biggest forensic tool providers in the world. The full suite is pretty expensive, but the free Imager is very useful for collecting data from a suspect system. It works on a variety of platforms and stores images in standard formats. An additional advantage of FTKImager is that it also captures memory.</p>
<h3>Forensic Suites</h3>
<p><strong>Autopsy / TheSleuthKit</strong> &#8211; <a href="https://www.sleuthkit.org/autopsy/" rel="noopener noreferrer" target="_blank">https://www.sleuthkit.org/autopsy/</a><br />
<a href="http://sleuthkit.org/autopsy/docs/user-docs/4.17.0//index.html" rel="noopener noreferrer" target="_blank"><figure id="attachment_1872" aria-describedby="caption-attachment-1872" style="width: 243px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1872" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/autopsy/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/autopsy.png?fit=243%2C226&amp;ssl=1" data-orig-size="243,226" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Autopsy &#8211; Open source digital forensics platform" data-image-description="&lt;p&gt;Autopsy &#8211; Open source digital forensics platform&lt;/p&gt;
" data-image-caption="&lt;p&gt;Autopsy &#8211; Open source digital forensics platform&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/autopsy.png?fit=243%2C226&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/autopsy.png?fit=243%2C226&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/autopsy.png?resize=243%2C226&#038;ssl=1" alt="Autopsy - Open source digital forensics platform" width="243" height="226" class="size-full wp-image-1872" data-recalc-dims="1" /><figcaption id="caption-attachment-1872" class="wp-caption-text">Autopsy &#8211; Open source digital forensics platform</figcaption></figure></a>Saying Autopsy is a graphical interface for the Sleuth Kit is oversimplistic but helps set the scene. However, Autopsy is probably one of the best forensic tools available and, as it is free, is significantly better value for money than any of the others. It handles windows images with ease as well as Android, iOS and some other unusual file structures. </p>
<p>Autopsy is fully extensible, with a thriving community creating new modules to ingest and analyse data. You can even develop your own if there is a specific need. </p>
<p>Even on systems with limited resources (in forensics terms, this means under 32GB RAM) Autopsy is a fast tool. It allows the investigator access to the disk structures while it is still processing data. Once the processing is complete, it is packaged into useful categories &#8211; such as email, downloads, executables, etc &#8211; which helps the investigator quickly get the information they need. With the timeline, report generation and ability to search for threat intelligence in STIX format, this easily matches the capabilities of products costing £10,000 per user.</p>
<p><strong>iBackUpBot</strong> &#8211; <a href="https://www.icopybot.com/itunes-backup-manager.htm" rel="noopener noreferrer" target="_blank">https://www.icopybot.com/itunes-backup-manager.htm</a><br />
This is a little bit more of a niche product, but if you need to investigate iOS images, it can be invaluable. It isn&#8217;t really a forensic suite in the normal sense, but if your employees have iPhones or iPads it allows you to easily analyse the data including messages, contacts, installed applications and much more.</p>
<h3>Analyst Tooling</h3>
<p>There are a lot of products here and we can never do justice to all of them. Rather, in no specific order, this is a list of tooling which will help your day to day IR tasks, allow you to carry out basic analysis of malicious files and even extract malicious code out of office documents.</p>
<p>If you do DFIR, you want access to all of these tools.</p>
<ul>
<li><strong>Zimmerman Tools</strong> &#8211; <a href="http://ericzimmerman.github.io/#!index.md" rel="noopener noreferrer" target="_blank">http://ericzimmerman.github.io/#!index.md</a></li>
<li><strong>Regrippper</strong> &#8211; <a href="https://github.com/keydet89/RegRipper3.0" rel="noopener noreferrer" target="_blank">https://github.com/keydet89/RegRipper3.0</a></li>
<li><strong>Sysinternals</strong> &#8211; <a href="https://docs.microsoft.com/en-gb/sysinternals/downloads/" rel="noopener noreferrer" target="_blank">https://docs.microsoft.com/en-gb/sysinternals/downloads/</a></li>
<li><strong>PEStudio</strong> &#8211; <a href="https://www.winitor.com/" rel="noopener noreferrer" target="_blank">https://www.winitor.com/</a></li>
<li><strong>Oletools</strong> &#8211; <a href="https://www.decalage.info/python/oletools" rel="noopener noreferrer" target="_blank">https://www.decalage.info/python/oletools</a></li>
<li><strong>oledump</strong> &#8211; <a href="https://blog.didierstevens.com/programs/oledump-py/" rel="noopener noreferrer" target="_blank">https://blog.didierstevens.com/programs/oledump-py/</a></li>
<li><strong>Volatility</strong> &#8211; <a href="https://www.volatilityfoundation.org/26" rel="noopener noreferrer" target="_blank">https://www.volatilityfoundation.org/26</a></li>
<li><strong>Volatility 3</strong> &#8211; <a href="https://github.com/volatilityfoundation/volatility3" rel="noopener noreferrer" target="_blank">https://github.com/volatilityfoundation/volatility3</a></li>
<li><strong>bulk_extractor</strong> &#8211; <a href="https://github.com/simsong/bulk_extractor" rel="noopener noreferrer" target="_blank">https://github.com/simsong/bulk_extractor</a></li>
</ul>
<h3>Operating Systems</h3>
<p>This is fairly complex and heavily influenced by personal choice. We would strongly recommend your incident response &#8220;team&#8221; has access to Linux and Windows platforms. This gives maximum flexibility when it comes to assessing attacks and, generally speaking, its a lot &#8220;safer&#8221; to analyse malicious Windows code on a Linux platform and vice-versa. Virtual Machines are a good choice here.</p>
<p><strong>Linux Sift</strong> &#8211; <a href="https://digital-forensics.sans.org/community/downloads" rel="noopener noreferrer" target="_blank">https://digital-forensics.sans.org/community/downloads</a><br />
This is probably the main &#8220;go-to&#8221; Linux distro you&#8217;ll use in DFIR. It has most of the tools you need built in &#8211; at least the ones which run on Linux. Sift is especially useful if you need to analyse unusual file systems or structures which dont have widespread support. A good example here is the Linux LVM2 Logical Volume Manager which splits the filesystem across multiple disks. Most forensic tools &#8211; even expensive commercial ones &#8211; struggle to recreate these. However you can mount then natively on Linux Sift.</p>
<p><strong>REMnux</strong> &#8211; <a href="https://remnux.org/" rel="noopener noreferrer" target="_blank">https://remnux.org/</a><br />
This is a Linux distro dedicated to reverse-engineering malware and malware analysis. </p>
<p><strong>MS Windows</strong> and / or <strong>Flare</strong> <a href="https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html" rel="noopener noreferrer" target="_blank">Fireeye Flare VM</a><br />
You will almost certainly need a windows machine to do DFIR. You can either build your own by installing tools you are comfortable using or you can use the Flare VM provided by FireEye. You will need your own windows licence, but Flare does provide a ready-made install of the tools you are most likely to need. It also includes some FireEye specific tools like Floss which you should consider installing if you go with a self-build VM.</p>
<p>Generally speaking, we strongly advise you use virtualisation for all your IR platforms. This allows you to take regular snapshots and if the inevitable accident happens and your investigation machine is infected, it is trivial to revert.</p>
<h2>Summary &#8211; DFIR is affordable</h2>
<p>So, as you can see there are very cost effective ways to build a robust DFIR environment. If you get all the tools here, including the ones where a commercial licence is needed (such as PEStudio), and the cost of Windows / VMWare licences you are probably looking at a budget of under £500 per year for almost unlimited endpoints. For a mall organisation, you could probably bring this down to the cost of a Windows licence.</p>
<p>Cyber attacks are inevitable. Incidents are inevitable. None of this has to leave you bankrupt.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/">DFIR on a Shoestring &#8211; Incident response for less</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2020/11/dfir-with-low-cost-or-free-tools/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1853</post-id>	</item>
		<item>
		<title>Linux DFIR: Workflow for a busy responder</title>
		<link>http://www.halkynconsulting.co.uk/a/2020/11/linux-dfir-workflow-for-a-busy-responder/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 13:11:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1841</guid>

					<description><![CDATA[<p>Linux DFIR may feel like it is a complicated and arcane process, but it doesn&#8217;t need to be. Yes, there are challenges around memory collection and lots of modern EDR tools perform badly, but this should never be an issue for a good incident responder. The biggest issue tends to be that IR in this [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2020/11/linux-dfir-workflow-for-a-busy-responder/">Linux DFIR: Workflow for a busy responder</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Linux DFIR may feel like it is a complicated and arcane process, but it doesn&#8217;t need to be. Yes, there are challenges around memory collection and lots of modern EDR tools perform badly, but this should never be an issue for a good incident responder. The biggest issue tends to be that IR in this environment is rare, so you are less likely to have a &#8220;go-to&#8221; mental list of commands and steps to follow.<br />
<figure id="attachment_1842" aria-describedby="caption-attachment-1842" style="width: 253px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1842" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/linux-dfir-workflow-for-a-busy-responder/1200px-tux-svg/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?fit=1200%2C1421&amp;ssl=1" data-orig-size="1200,1421" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1200px-Tux.svg" data-image-description="" data-image-caption="&lt;p&gt;Linux DFIR Guide&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?fit=253%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?fit=865%2C1024&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?resize=253%2C300&#038;ssl=1" alt="Linux DFIR - It happens!" width="253" height="300" class="size-medium wp-image-1842" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?resize=253%2C300&amp;ssl=1 253w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?resize=865%2C1024&amp;ssl=1 865w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?resize=768%2C909&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/1200px-Tux.svg.png?w=1200&amp;ssl=1 1200w" sizes="auto, (max-width: 253px) 100vw, 253px" data-recalc-dims="1" /><figcaption id="caption-attachment-1842" class="wp-caption-text">Linux DFIR Guide</figcaption></figure> This guide will help you solve that. </p>
<p>However, there are some important points to bear in mind. Most importantly, Linux is a very configurable platform so you may find that the system you are responding to is very, very different from other machines even if they run the same base OS. </p>
<p>This means that while you should go in with a plan, you also need to be open-minded enough to adapt things on the fly &#8211; especially if you discover your tools are producing unexpected output. If at all possible, test this on your Linux machines while there isn&#8217;t an incident, during the <a href="http://www.halkynconsulting.co.uk/a/2019/05/incident-response-phases-preparation/" rel="noopener noreferrer" target="_blank">preparation phase</a>, and this will allow you to fine-tune things to maximise the chance of success.</p>
<p>With that out of the way, let&#8217;s look at some key parts of the process.</p>
<h2>Linux DFIR Workflow</h2>
<p>As with everything in IR, it is really important to have an idea of the workflow you want to follow. The more you can document this, the better quality your evidence is. Even if you never intend to set foot in a court, a good evidence process means you can be more confident about findings and you can trust that you haven&#8217;t overlooked anything important.</p>
<p><em>NOTE:</em> This guide is based on a responder who has direct access to the live system and will be working locally. This is not a guide for dead box/image-based forensics. The activity here <strong>will</strong> change the state of the target system and <strong>will</strong> generate log entries/history records. This reinforces the need to keep detailed notes so that the investigator&#8217;s activity can be eliminated from the evidence.</p>
<h3>Example Collection Workflow</h3>
<p><strong>Set up documentation</strong>. You can keep notes by hand but Linux also includes the <code>script</code> command which logs output of each command as you type it and saves the data to file when you exit. You can invoke <code>script -a</code> to save the file to a separate device if you want to retain off-disk evidence. You can find out more about this often-overlooked command on the <a href="https://man7.org/linux/man-pages/man1/script.1.html" rel="noopener noreferrer" target="_blank">script man page</a>.</p>
<p><strong>Ensure you have trusted tools</strong>. Remember if you are on a compromised system, the attackers can modify binaries and you have no way to trust the output. Even simple tools like ls can be compromised effectively. Ideally, you will bring your own tools, either from bootable media or via statically linked binaries. If you have to use commands on the operating system bear in mind the risk and try to find multiple ways to validate the output.</p>
<p><strong>Gather data</strong>. Your organisation may have specific requirements here but we would recommend something along the following lines:</p>
<ul>
<li>Document system name and the start date/time of the review.</li>
<li>Dump memory for analysis at a later date. On Linux this can be complex but it is outside the scope of this post.</li>
<li>Get OS details. <code>uname -a</code> and <code>lsb_release -a</code> are useful commands here.</li>
<li>Confirm who is logged in. You can use <code>w</code> for this.</li>
<li>Review bash history. Its worth capturing a copy of this early on so you can read each user&#8217;s <code>.bash_history</code> file later on, this is especially important if you may be adding commands to it. </li>
<li>Get the system environment details. Run <code>env</code> and save the output to a text file.</li>
<li>Get networking information. This is where <code>ifconfig</code> and <code>arp -a</code> are useful.</li>
<li>Check network connections. You can use <code>netstat</code> or <code>lsof</code> here, or both. It is worth saving this to a text file as it can be verbose. </li>
<li>Log running processes. It is worth starting with <code>ps -aux</code> here.</li>
<li>Log loaded modules. Start with <code>lsmod</code> but consider using <code>modinfo</code> if more detail is needed.</li>
<li>Check scheduled tasks. Look in the <code>crontab</code> and associated folders.</li>
<li>Check auditing. For example, <code>auditd</code> on CentOS</li>
<li>Check for binaries with SUID bit set. You can capture this with `find / -perm -4000 2>/dev/null` and if anything unexpected appears it is worth investigating.</li>
<li>Validate group memberships. You can <code>cat /etc/group</code> and <code>cat /etc/passwd</code> to ensure there are no unexpected accounts or memberships. The sudo group is often targeted by attackers.</li>
</ul>
<p>Combined with the memory image, you probably have enough information here to get a good understanding of what has happened on the system and allow you run triage as part of the Linux DFIR workflow. But to reiterate, it is important to tailor this to your environment.</p>
<p>If you need greater detail, you should consider taking a disk image and importing it into a forensic tool or deploying applications from <a href="https://www.sleuthkit.org/sleuthkit/" rel="noopener noreferrer" target="_blank">TSK</a> to do a more detailed file system analysis.</p>
<p>Finally, as we said, for all forms of DFIR (including Linux DFIR) it is good practice to keep notes. As a result, as well as running script, its worth making sure the output of all your tools is saved to a text file with a common naming convention. For example, you might want to run <code>lsb_release -a >> lsb_release_YYYYMMDD.txt</code> or <code>lsb_release -a >> CASENUMBER_lsb_release.txt</code>. This will allow you to recheck output without having to rerun tools and help when you review evidence at a later date.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2020/11/linux-dfir-workflow-for-a-busy-responder/">Linux DFIR: Workflow for a busy responder</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1841</post-id>	</item>
		<item>
		<title>Linux Incident Response Guide</title>
		<link>http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 05 Nov 2020 10:00:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1800</guid>

					<description><![CDATA[<p>Linux incident response is straightforward but it does need some practice to get used to the key elements. This post looks at some of these to help kickstart your IR.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/">Linux Incident Response Guide</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Linux incident response is a topic which is often overlooked. There is a belief that the operating system is more &#8220;secure&#8221; than other platforms, but this is only partly true. The reality is attackers compromise Linux machines on a regular basis and, while it isn&#8217;t yet the year of &#8220;Linux on the desktop&#8221; it is very likely that a corporate webserver, database server or other customer-facing platform is running a variant of the OS. Added to this is the prevalence of Linux variations running in AWS or GCP.</p>
<figure id="attachment_1801" aria-describedby="caption-attachment-1801" style="width: 247px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1801" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/linux-2025130_1280/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?fit=1057%2C1280&amp;ssl=1" data-orig-size="1057,1280" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Linux &#8211; Even the penguin needs DFIR." data-image-description="&lt;p&gt;Linux &#8211; Even the penguin needs DFIR.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Linux &#8211; Even the penguin needs DFIR.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?fit=247%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?fit=846%2C1024&amp;ssl=1" class="size-medium wp-image-1801" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?resize=247%2C300&#038;ssl=1" alt="Linux Incident Response - Linux Logo" width="247" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?resize=320%2C388&amp;ssl=1 320w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?resize=846%2C1024&amp;ssl=1 846w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?resize=768%2C930&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?resize=540%2C654&amp;ssl=1 540w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/linux-2025130_1280.png?w=1057&amp;ssl=1 1057w" sizes="auto, (max-width: 247px) 100vw, 247px" data-recalc-dims="1" /><figcaption id="caption-attachment-1801" class="wp-caption-text">Linux &#8211; Even the penguin needs DFIR.</figcaption></figure>
<p>As a result of this, it is inevitable that sooner or later you will need to respond to an incident where your open-source OS skills are put to the test.</p>
<p>The good news is that the basics are the same. <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" target="_blank" rel="noopener noreferrer">PICERL</a> is a good framework to use. <a href="https://www.halkynconsulting.co.uk/a/2019/05/incident-response-phases-preparation/" target="_blank" rel="noopener noreferrer">Preparation</a> really, really matters. You need to build good processes. You also need to practice them regularly. Once you are into the incident, the normal workflow should still be followed. The big difference, however, is in how you do things. You may also find that a lot of the EDR tools you&#8217;d use in Windows DFIR aren&#8217;t available or simply don&#8217;t work. Even when they do, the data may be different.</p>
<p>A good example is when it comes to &#8220;evidence of execution.&#8221; In a Windows environment, we have access to prefetch, shimchache and other useful data repositories. There isn&#8217;t any real equivalence in Linux, which forces responders to be more inventive.</p>
<h2>Linux Response &#8211; Preparation</h2>
<p>As always in IR, if you get the preparation right, the response will work better. There are some key points you need to decide in advance because your decision will dictate how you respond.</p>
<p>The priority has to be your incident response plan. This needs to include who is responsible for the platform and who needs to be involved in the incident response team. If you have Linux admins, you probably need to include them as their knowledge will be invaluable. Your plan is also where you decide how you want your response to run and how much &#8220;evidential&#8221; care needs to be spent on the collection steps.</p>
<p>You also need to make sure your infrastructure is ready to help you respond. There are entire books on forensic readiness, but the key points to consider are:</p>
<ul>
<li>Sync time across the network. This is crucial if you want to be able to make sense of events.</li>
<li>Normalise everything to UTC &#8211; this is vital if you are a global org or have endpoints in different timezones.</li>
<li>Make sure logs are generated and sent to a SIEM (or equivalent for review). You need to check system logs, firewall logs, IDS logs, email logs and application logs are all being collected.</li>
<li>Ensure backups are being created on a regular basis, ensure they are being tested for usability and ensure that some are kept offline.</li>
<li>Baseline. Baseline everything you can. Gold images, reference hashes of installed applications etc. Hash as much as possible &#8211; your future self will thank you. Of course, you need to maintain the hashes after patches.</li>
</ul>
<h2>Linux DFIR &#8211; Responding!</h2>
<p>Once you&#8217;ve triggered the incident process it is time to turn your plan into action. Just to reiterate, the high-level steps are basically the same on any platform and the workflow is reasonably straightforward. A good workflow is:</p>
<ul>
<li>Snapshot the scene/capture images</li>
<li>Confirm the incident</li>
<li>Analyze volatile information (typically memory)</li>
<li>Analyse filesystem</li>
<li>Build a timeline</li>
<li>Carve deleted data &#038; recover filesystem artefacts</li>
<li>Close the incident (report / lessons learned)</li>
</ul>
<p>In this blog post, we are going to look at some of the differences you need to consider when you run this workflow on a Linux host.</p>
<h3>Confirming the incident</h3>
<p>Incident response, on any OS, is a costly &amp; resource-intensive activity. It is important that you limit the number of times you trigger full DFIR by thorough confirmation. When you respond, the first thing you want to do is find out what the attackers might have changed. In Linux, this includes, but isn&#8217;t limited to, unusual processes; hidden files &#038; directories; altered system files; modified log entries and strange ports listening or with established connections.</p>
<p>Lots of this is easiest to find on the live file system. If you have an EDR tool which can give you access this will help but you may need to consider having to SSH in and run commands directly as part of your preparation phase. Where possible, taking a snapshot and mounting it is a better option. </p>
<p>Assuming you have access to the running system, start by looking at the running processes. </p>
<p><code>ps -auxww</code><br />
<figure id="attachment_1824" aria-describedby="caption-attachment-1824" style="width: 680px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1824" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/ps_aux_output/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?fit=1722%2C524&amp;ssl=1" data-orig-size="1722,524" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Example output from ps -auxww" data-image-description="&lt;p&gt;Example output from ps -auxww&lt;/p&gt;
" data-image-caption="&lt;p&gt;Example output from ps -auxww&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?fit=300%2C91&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?fit=1024%2C312&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?resize=680%2C207&#038;ssl=1" alt="ps_auxww output example" width="680" height="207" class="size-large wp-image-1824" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?resize=1024%2C312&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?resize=320%2C97&amp;ssl=1 320w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?resize=768%2C234&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?resize=1536%2C467&amp;ssl=1 1536w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?resize=540%2C164&amp;ssl=1 540w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/ps_aux_output.png?w=1722&amp;ssl=1 1722w" sizes="auto, (max-width: 680px) 100vw, 680px" data-recalc-dims="1" /><figcaption id="caption-attachment-1824" class="wp-caption-text">Example output from ps -auxww</figcaption></figure></p>
<p>You can also use lsof as a way to find backdoors. Remember, both commands are noisy so consider piping to less or using grep to find specifics. This can be very effective at finding subverted code such as fork()ed processes which have been renamed.</p>
<p><code>lsof</code><br />
Example output:</p>
<pre>
COMMAND    PID  USER   FD  TYPE DEVICE NODE NAME
smbd       871  root   6u  IPv4   9001 TCP *:2003 (LISTEN)
smbd       871  root   6u  IPv4   9001 TCP *:443 (LISTEN)
initd    11201  root   3u  IPv4  10112 TCP 10.10.10.1:64213->54.13.13.13:1111
initd    11201  root   9u  IPv4  10112 TCP 10.10.10.1:1111->66.77.121.221:4444
</pre>
<p>In the example above the Samba server is listening on some strange ports &#8211; 2003 and 443. Also, the initd process has an active TCP connection to two external IP addresses, again with suspicious ports. </p>
<p>Combining ps and lsof gives an incident responder the ability to drill deeply into what is running on the suspect system. In turn, this helps confirm that something is amiss.</p>
<h3>Linux Memory Analysis</h3>
<p><figure id="attachment_1810" aria-describedby="caption-attachment-1810" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1810" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/linux_dfir/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?fit=914%2C720&amp;ssl=1" data-orig-size="914,720" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Linux Incident Response" data-image-description="&lt;p&gt;Linux &#8211; Digital Forensics and Incident Response&lt;/p&gt;
" data-image-caption="&lt;p&gt;Linux &#8211; Digital Forensics and Incident Response&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?fit=300%2C236&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?fit=914%2C720&amp;ssl=1" class="size-medium wp-image-1810" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?resize=300%2C236&#038;ssl=1" alt="Linux DFIR" width="300" height="236" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?resize=300%2C236&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?resize=768%2C605&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/Linux_DFIR.png?w=914&amp;ssl=1 914w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1810" class="wp-caption-text">DFIR Processes are just as relevant on Linux.</figcaption></figure><br />
Volatile data is crucial for incident responders. In practical terms, this means RAM as getting the actual cache data &#038; registers is often too challenging to be realistic. We&#8217;ve talked about <a href="https://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/" rel="noopener noreferrer" target="_blank">how important memory analysis is</a> in the past, so we will assume that you understand the basics. </p>
<p>This post is about Linux and, unfortunately, it can be difficult to capture a useable memory sample and even harder to analyse it. The issue is largely down to having the correct &#8220;profile&#8221; to allow your tools to know what structures exist in memory. With Windows, tools like Volatility (2.x or older) rely on pre-built profiles. With Volatility 3 (and rekall) the profile isn&#8217;t needed, but the tool still needs to know how to read the memory sample. With a Linux image this becomes complex at best.</p>
<p><strong>Capturing the image.</strong><br />
The most important bit is how you capture the image. If you are running a Virtual Machine, then it might be as simple as taking a snapshot and using the memory file. However, you still need to get the right profile information. An example of this is on the <a href="https://github.com/volatilityfoundation/volatility/wiki/Linux#creating-a-new-profile" rel="noopener noreferrer" target="_blank">Volatility github pages</a>.</p>
<p>If you need to dump memory from the live system, the most used tools are:</p>
<ul>
<li>LinPMem &#8211; <a href="https://github.com/Velocidex/c-aff4/releases" rel="noopener noreferrer" target="_blank">https://github.com/Velocidex/c-aff4/releases</a></li>
<li>LiME &#8211; <a href="https://github.com/504ensicsLabs/LiME" rel="noopener noreferrer" target="_blank">https://github.com/504ensicsLabs/LiME</a></li>
</ul>
<p>It is worth noting that lots of commercial forensic platforms struggle with Linux memory, so it is worth practising the manual methods to make sure you can respond in a timely fashion.</p>
<p>There is a very useful tool which automates a lot of the capture &amp; profile creation steps: <a href="https://github.com/halpomeranz/lmg" rel="noopener noreferrer" target="_blank">LMG by Hal Pomeranz</a>, who is widely regarded as the leading expert on Linux IR. </p>
<h3>Capturing Disk Images</h3>
<p>If you have an EDR platform or Linux-friendly forensics tool, then capturing a disk image should be reasonably simple. If your suspect device is a virtual machine, then you can use the VMDK files (or equivalent). However, if you find yourself needing to respond manually, there are some useful tools you can use.</p>
<figure id="attachment_1833" aria-describedby="caption-attachment-1833" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1833" data-permalink="http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/disks/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?fit=1280%2C720&amp;ssl=1" data-orig-size="1280,720" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Disk imaging is an important part of forensics" data-image-description="&lt;p&gt;Disk imaging is an important part of forensics&lt;/p&gt;
" data-image-caption="&lt;p&gt;Disk imaging is an important part of forensics&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?fit=300%2C169&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?fit=1024%2C576&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?resize=300%2C169&#038;ssl=1" alt="Disk platters" width="300" height="169" class="size-medium wp-image-1833" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?resize=320%2C180&amp;ssl=1 320w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?resize=1024%2C576&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?resize=768%2C432&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?resize=540%2C304&amp;ssl=1 540w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2020/11/disks.jpg?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1833" class="wp-caption-text">Disk imaging is an important part of forensics</figcaption></figure>
<p><strong>Disk copying</strong><br />
You can create a bit for bit copy of the disk for analysis in pretty much any tool. This retains deleted data so you can recover lost files. You can use dd for this, but a better tool is dc3dd which allows you to create a checksum at the same time. The syntax is pretty simple:<br />
<code>dc3dd if=/dev/sda of=/mnt/usb/diskimage.raw hash=sha512 hlog=/mnt/usb/hash.txt</code><br />
This will take a copy of sda and put it on a device at /mnt/usb. However, there are other tricks you can use.</p>
<p>Another example is if you want to take a disk image and send it over the network to your evidence machine. You can use netcat on both ends for this (or cryptcat if you want to use an encrypted tunnel).</p>
<p><code>dc3dd if=/dev/sda hash=sha512 | nc 10.10.10.10 5555</code><br />
This will send the data to a listener which can, in turn, simply store the data to a local file.</p>
<h3>Timelines &#8211; Linux Variations</h3>
<p>The general process is the same as on Windows and the analysis of inode data is very valuable. The main point here is that there is a difference in how timestamps work. Windows has four timestamps in $STANDARD_INFO and four in $FILE_NAME. Most Linux environments have three &#8211; MAC &#8211; with EXT4 introducing a Born-on time to more closely resemble Windows.<br />
<strong>M</strong>odification Time, also referred to as <em>mtime</em>. This is the last time data was written to the file.<br />
<strong>A</strong>ccess Time, also referred to as <em>atime</em>. This is the last time the file was read.<br />
<strong>C</strong>hange Time, also referred to as <em>ctime</em>. This is the last time the inode contents were written.<br />
<strong>B</strong>orn-on time, also referred to as <em>btime</em>. EXT4 file systems also record the time the file was created. </p>
<p>Incident responders can use this to hunt across a file system to find things the attacker may have changed. For example, if you think an attack took place in the last week, you can run:<br />
<code>find / -mtime -7</code><br />
This will return every file with a modification date in the last 7 days.</p>
<h3>Attacker behaviour and profiling</h3>
<p>To finish off, we are going to look at some of the more common files you should check as you profile a suspect system:<br />
<code>/etc/hosts</code>: this shows any static IP assignments and can identify attackers trying to create routes in plain sight.<br />
<code>/etc/passwd</code>: Look for unexpected accounts, especially UID 0 accounts.<br />
<code>/etc/shadow</code>: Look for any unexpected modification which may indicate attackers have changed a legitimate password.<br />
<code>/etc/sudoers</code>: shows users with the ability to run commands with elevated privileges.<br />
<code>/etc/group</code>: check for changes to group memberships. GID27 is traditionally the SUDOERS group so special attention needs to paid here.<br />
<code>(user path)/.ssh/authorized_keys</code>: Check to see if anything has been added. Attackers add keys to maintain access.<br />
<code>/etc/inittab</code>: Attackers can add code here to have it execute when initd restarts.<br />
<code>Directory names starting with .</code>: This is a technique to try and hide entire directories where the attacker can store tools/data.<br />
<code>Regular files in /dev</code>: The /dev folder should hold devices. If you find any regular files in there its worth a closer look.</p>
<p>It is also worth looking at the modification times of binaries &#8211; anything changed recently is interesting, largely because Linux patching tends to be a lot less frequent than windows. When you build your timeline you should also check if files have a timestamp that is out of place for its inode number as this is often a sign of timestomping.</p>
<p>If your system uses a package management tool, you should check to see if anything is different from the &#8220;official&#8221; version. Changes should be considered for investigation.</p>
<p>Lastly, you should always check for SUID/SGID binaries to see if anything unusual has been created. </p>
<h2>Linux Forensics &#8211; Summary</h2>
<p>To summarise, your overall DFIR approach should be largely unchanged. You still need to have a plan and when you respond you still need to follow a suitable methodology. The biggest difference is that responders tend to have less direct exposure to Linux and, as a result, are less comfortable with the files and folders you need to analyse.</p>
<p>You should address this during the preparation phase of your IR cycle. Build response plans, checklists, train your team etc. It will all be useful at some point.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2020/11/linux-incident-response-guide/">Linux Incident Response Guide</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1800</post-id>	</item>
		<item>
		<title>Incident Response Phases &#8211; Lessons Learned</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/09/incident-response-lessons-learned/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2019/09/incident-response-lessons-learned/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 09:04:18 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Lessons Learned]]></category>
		<category><![CDATA[PICERL]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1790</guid>

					<description><![CDATA[<p>Lessons Learned is the final phase of the incident response cycle. This is where you identify the root cause of the incident and any problems or issues you faced with the response. Your findings should always feed back into the planning phase. This keeps the cycle working and improving. </p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/09/incident-response-lessons-learned/">Incident Response Phases &#8211; Lessons Learned</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" rel="noopener noreferrer" target="_blank">previous post</a> we discussed Incident Response (IR) processes and our preference is one that runs Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned (PICERL). In this post, we are going to be looking a bit more into the final phase of IR &#8211; Lessons Learned.</p>
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" class="size-medium wp-image-1730" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - PICER Lessons Learned" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework</figcaption></figure>
<p>As the final step, this is probably the IR phase that gets most overlooked. But it is one of the two most important. After the excitement and stress of clearing out an incident, it is really important that you learn. Overlooking this step inevitably leads to repeating problems. First you never really solve the problem that let the attackers in. Secondly, any issues your responders faced remain. Together this means you see more incidents and they take longer to resolve.</p>
<p>Learning from experience really is important.</p>
<h2>Lessons Learned</h2>
<p>This phase goes by many names. For example, you might call it a &#8220;debrief&#8221; or a &#8220;wash up&#8221;. The exact name isn&#8217;t as important as making sure you <strong>do it</strong>. However, it is also important that this is a learning phase. Avoid falling into the trap of blaming people. Also, avoid any hint it is a witchhunt or an attempt to sack someone. This can be hard, as sometimes a person is responsible. But at a practical level, this should be something outside the IR process.</p>
<p>In this phase, you are trying to answer the following questions.</p>
<ol>
<li>What happened?</li>
<li>How did it happen?</li>
<li>How did we deal with it?</li>
<li>What went well?</li>
<li>What went badly?</li>
<li>Most importantly, what do we need to change?</li>
</ol>
<p>Now it is totally down to your organisation how formal you want this to be. What matters above all else, is that you go through this. For example, you might decide that <a href="https://www.sans.org/reading-room/whitepapers/incident/paper/33901" rel="noopener noreferrer" target="_blank">major incidents need a formal report and review</a>. But then decide that minor events simply need an email update. But other organisations might want a formal report for every incident. Remember, though, that this can be resource-intensive so keep in mind how many incidents you have when deciding this.</p>
<p>The ultimate goal of this phase is to understand what happened. That is really all that matters so the specifics can be quite &#8220;personal.&#8221; It certainly helps if, during planning, you decide how this phase will be run. In the same vein, planning allows you to make sure you capture the right data. Without the right data, you can&#8217;t learn, so you can see the problem here.</p>
<h3>Take Note</h3>
<p>One big caveat to remember is that sometimes the lesson is trivial. For instance, with a single malware event, you probably dont need a full report. </p>
<p>Also, try to focus on how to improve rather than punish. If your lesson learned is that a person messed up, this isn&#8217;t helpful. Instead, you can focus on the need for more training, or better still, improved processes. You might feel people are to blame, but most of the time that is only because technology or process failed.</p>
<h2>Summary &#8211; what have we learned?</h2>
<p>In short, the lessons learned phase is critical to good IR practices. However, it entirely depends on your planning and IR data collection. In addition, the exact process should depend on your specific needs and the nature of the incident. Some organisations have a formal process with pre-designed data capture forms. Others go for an ad-hoc meeting. The important thing is making sure it happens and doesn&#8217;t simply burn resources.</p>
<p>If you want to know more, or get some help with an incident or even building your own incident response process then <a href="https://www.halkynconsulting.co.uk/security/contact-security-team" rel="noopener noreferrer" target="_blank">get in touch and our consultants will be happy to assist</a>.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/09/incident-response-lessons-learned/">Incident Response Phases &#8211; Lessons Learned</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2019/09/incident-response-lessons-learned/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1790</post-id>	</item>
		<item>
		<title>Incident Response Phases &#8211; Recovery</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/08/incident-response-phases-recovery/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sun, 18 Aug 2019 07:09:07 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[PICERL]]></category>
		<category><![CDATA[Recovery]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1781</guid>

					<description><![CDATA[<p>Recovery is the fifth phase of the incident response cycle. This is the time to bring your services back online and restore normal business operations. Just make sure you do it in a secure manner.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/08/incident-response-phases-recovery/">Incident Response Phases &#8211; Recovery</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" rel="noopener noreferrer" target="_blank">previous post</a> we discussed Incident Response (IR) processes and our preference is one that runs Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned (PICERL). In this post, we are going to be looking a bit more into the Recovery phase of IR.</p>
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" class="size-medium wp-image-1730" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - PICE Recovery L" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework</figcaption></figure>
<p>The incident is going well. First, you found something was wrong. Then you carried out an investigation and found evil. Next, you implemented containment measures. Finally, you eradicated all traces from your network. Now its time to recover. </p>
<p>As you will see, this is the second of the &#8220;shorter&#8221; posts. This isn&#8217;t because it is less important, rather it is just very dependant on your needs.</p>
<h2>Recovery</h2>
<p>Now we are in the phase where you return to normal, in as much as you can without opening new risks. Your goal is a restoration of services, but equally important is doing so without allowing the attackers back in. As you can guess, this means recovery hinges off your preparation and investigation. Like we&#8217;ve said before: if you fail to plan, you&#8217;ve planned to fail.</p>
<p>As with the previous phase, what you do here really depends on the situation. This means you can&#8217;t plan definitive actions, but it is important to plan goals. Usually, this means ensuring that you align with the business goals. However, there are some things to consider.</p>
<ul>
<li>One step at a time. It is really important to phase the return to normal service. Obviously, if only one machine is affected this might not matter. However, if you are trying to recover an enterprise, plan ahead. Remember, you eat the elephant one bite at a time.</li>
<li>Monitor. When you bring systems back, monitor them for a while. Of course you investigated well, so your plan is sound. However, mistakes still happen. Dont bring everything back to discover a mistake.</li>
<li>Document. Always with IR it is important to keep notes. This is no exception. Make a note of when each system is recovered. Importantly make notes of what you are monitoring for and what you find.</li>
</ul>
<h2>Generally Good Advice</h2>
<p>Remember, the exact steps depend on your needs. They also depend on what the attacker has done. Lastly, they depend on your policies, plans and procedures.</p>
<p>However, having said this, there is some simple advice you should follow:</p>
<p><strong>Step 1</strong>: Assess everything you need to recover and prioritise based on business impact. It is important to minimise disruption to the business. Because of this, you might want to recover critical systems first. However, if the risk is high, you might want to recover them last. It is up to you!</p>
<p><strong>Step 2</strong>: Develop a recovery plan. This can be a simple list of items. On the other hand it can be a complex project. </p>
<p><strong>Step 3</strong>: Recover the first things. First things first! Whatever you&#8217;ve picked to go first, bring it back into service. Monitor it. By this, we mean look for all the things. Dont just look for the attack you found. If you can, gather data and <a href="https://en.wikipedia.org/wiki/Cyber_threat_hunting" rel="noopener noreferrer" target="_blank">threat hunt</a>. Above all else, do not rush this step. If you find evil, trigger an incident.</p>
<p><strong>Step 4</strong>: Recover the next thing. When you are happy with the first thing, recover the next. Do the same with monitoring. If you can, threat hunt. If you find evil trigger an incident.</p>
<p><strong>Step 5</strong>: Repeat step 4 until you run out of things.</p>
<p>Congratulations. Recovery is complete.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/08/incident-response-phases-recovery/">Incident Response Phases &#8211; Recovery</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1781</post-id>	</item>
		<item>
		<title>Incident Response Phases &#8211; Eradication</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/08/incident-response-eradication/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 01 Aug 2019 10:50:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Eradication]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[PICERL]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1775</guid>

					<description><![CDATA[<p>Eradication is the fourth phase of the incident response cycle. This is the implementation of more permanent measures to get the attacker out of the network and keep them out.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/08/incident-response-eradication/">Incident Response Phases &#8211; Eradication</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" rel="noopener noreferrer" target="_blank">previous post</a> we discussed Incident Response (IR) processes and our preference is one that runs Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned (PICERL). In this post, we are going to be looking a bit more into the Eradication phase of IR.</p>
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" class="size-medium wp-image-1730" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - PIC Eradication RL" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework</figcaption></figure>
<p>If you&#8217;ve got this far, you have identified that an incident took place. Then you carried out an awesome investigation to understand what happened. Consequently, you were able to contain the attack. Now you need to get the attackers out. You need to eradicate them from your environment. </p>
<h2>Eradication</h2>
<p>Containment is a short term solution. Now we are looking at a long-term solution. In other words, we want to get the attacker completely out. In addition, we want to keep them out in the future. It is important to remember that every incident is different. As a result of this, eradication measures can vary wildly. This is a good example of why it is critically important to investigate well. You can&#8217;t eradicate the attacker&#8217;s access if you dont know how they got it.</p>
<p>Sometimes you might manage this by simply deleting malware. In other incidents, you might need to completely rebuild the domain. Ultimately, you need to deal with the information you have and act decisively. Although speed of response matters, you must never, ever, be hasty.</p>
<h3>Key Decisions</h3>
<p>Previously we&#8217;ve talked about how important planning is. This is another phase where that is true. You cant plan the specific steps to be taken, but you can give guidance. For example, you need to give guidance on:</p>
<ul>
<li><strong>Confidence of Compromise</strong>. By this, it means how sure do you need to be that a specific device was compromised. Generally speaking, your investigators will never be 100% confident they have identified every compromised machine. You need to decide how to deal with &#8220;might&#8221; type statements. Often you will want to treat this as confirmed, but eradication can have a cost. For example, rebuilding takes time and resources. You can&#8217;t rebuild every time you find malware. As a result, you need a management decision in advance.</li>
<li><strong>Rebuild, reinstall or remove</strong>. This seems simple but it isn&#8217;t. First, there is a difference in business impact. For example, simply deleting a virus is a lot cheaper than rebuilding an entire server. Next, it hinges on your risk tolerance. In general, you want to make sure your managers know this balance in advance.	</li>
<li><strong>Pace</strong>. Previously we&#8217;ve said about skipping containment. You cant skip eradication. If you do, you&#8217;ve ignored the incident. However, you do need to decide how fast you want to move. Remember the saying &#8220;<a href="https://en.wiktionary.org/wiki/more_haste,_less_speed" rel="noopener noreferrer" target="_blank">More Haste, Less Speed</a>.&#8221; It really does apply in IR. If doing it completely is slow, that is still better.</li>
<h2>Summary</h2>
<p>As you can imagine, this is an important phase. You cant skip it. Also, you cant rush it. </p>
<p>For these reasons, you need to build a methodological approach, then follow it.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/08/incident-response-eradication/">Incident Response Phases &#8211; Eradication</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1775</post-id>	</item>
		<item>
		<title>Incident Response Phases – Containment</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/07/incident-response-containment/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 13 Jul 2019 11:37:16 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Containment]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[PICERL]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1758</guid>

					<description><![CDATA[<p>Containment is the third phase of the IR Cycle. You investigate what happened and implement measures to stop the attack spreading or doing more harm than you are prepared to accept.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/07/incident-response-containment/">Incident Response Phases – Containment</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" rel="noopener noreferrer" target="_blank">previous post</a> we discussed Incident Response (IR) processes and our preference is one that runs Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned (PICERL). In this post, we are going to be looking a bit more into the Containment phase of IR.</p>
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" class="size-medium wp-image-1730" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - PI Containment ERL" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework</figcaption></figure>
<p>You have identified an event. Then you confirmed it was an incident. So now you need to look at containment. This is where your IR team start to earn their pay. But there are some pitfalls &#8211; most importantly do not rush! Also, there are times you may even want to skip this step entirely. All of this should be decided in your preparation phase.</p>
<h2>Containment</h2>
<p>Simply, containment means stopping the attack spreading. Now, in practice, this can be complex but the theory is simple. Because incidents are varied try to avoid setting prescriptive plans. Instead, empower your IR team to make tactical decisions. </p>
<p>Keep in mind this is a short term strategy. You are trying to seize the initiative from the attacker. A common model here is the <a href="https://en.wikipedia.org/wiki/OODA_loop" rel="noopener noreferrer" target="_blank">OODA-loop</a>. Here you are trying to change the cadence so you no longer constantly react to the attacker. Good strategy here turns the tables and forces the attacker to react to your actions. Ultimately this means your containment strategy decides how successful your IR will be.</p>
<h3>Warning!</h3>
<p>First a quick warning. <strong>Never &#8211; ever &#8211; rush into containment</strong>. It is tempting and natural, to want to pull cables or shut systems down when you see an attack. But this can be a mistake. Rarely will this turn out to be a &#8220;good&#8221; strategy. More often you will undermine the IR process, destroy evidence and warn the attacker. Ultimately the decision should be taken by the Incident Manager, so your Plan needs to support them. However, you also need to remember that during the stress of IR, don&#8217;t add to it by panicking about containment.</p>
<p>One point to remember: as a human, you can never react as fast as a computer. This means waiting a bit longer is unlikely to make things significantly worse.</p>
<h3>Containment Guidance</h3>
<p>So, with the warning out of the way, how do we do this?</p>
<p>Unfortunately, there is no one-size-fits-all answer. In essence, it is simply &#8220;do good IR.&#8221; Because that isn&#8217;t helpful, there are some steps to consider.</p>
<h4>Investigation</h4>
<p>Begin by finding out as much as possible. Gather information about the incident. Then analyse it as much as you <em>need</em>. This is important &#8211; too much delays things, too little leads to mistakes. This can be more art than science, but experience improves things. Your incident manager should try to focus the investigation to minimise spurious activity. </p>
<p>As investigators find things, this &#8220;intelligence&#8221; should be fed back to the Incident Management Team to make decisions. Another important point here is to try to reduce noise. Lots of information will appear, avoid being distracted by irrelevant data or information you cant act on.</p>
<h4>Action</h4>
<p>Next, take the information and turn it into action. This is the primary role of the incident manager. As investigators provide more data, a containment strategy is likely to emerge. In turn, the manager should use this to direct investigators. Through this iterative process, a robust strategy will be formed.</p>
<p>Some examples include:</p>
<ul>
<li>Create an incident response VLAN. Move infected machines into it. This allows monitoring/response but prevents further spread or C2.</li>
<li>Locking compromised user accounts. This prevents an attacker from continuing to use them to get access.</li>
<li>Blocking external access to vulnerable websites. This prevent an attacker from using webshells.</li>
</ul>
<p>Remember all this carries risk. Your actions are likely to alert the attacker. If they have other ways in, you might lose visibility. Only act based on your investigation.</p>
<h3>Skip it</h3>
<p>Occasionally you might decide to skip this phase. Yes, this is shocking! But remember, none of this is prescriptive. </p>
<p>Containment works best with low-skilled attackers. If you have an advanced adversary, you might only alert them. As a result, waiting until you can eradicate may be better. You can give guidance here in your Plans. However, the final decision should be based on the investigation. </p>
<h2>Stopping the spread</h2>
<p>In summary, this is the goal of containment. You need to try and prevent things from getting worse. Let your risk appetite guide decisions. Investigate well and build a robust strategy. When you are ready to implement, be decisive. </p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/07/incident-response-containment/">Incident Response Phases – Containment</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1758</post-id>	</item>
		<item>
		<title>Incident Response Phases – Identification</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/06/incident-response-identification/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sun, 09 Jun 2019 14:42:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[PICERL]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1761</guid>

					<description><![CDATA[<p>Identification is the second phase of the IR Cycle. This is where you determine if an incident has happened, what type of incident and how important it is to your business.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/06/incident-response-identification/">Incident Response Phases – Identification</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" rel="noopener noreferrer" target="_blank">previous post</a> we discussed the importance of having an Incident Response (IR) process and our preference is one that runs Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned (PICERL). This time we are looking at the second phase: Identification.</p>
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" class="size-medium wp-image-1730" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - P Identification CERL" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework</figcaption></figure>
<p>During this phase of IR, we start what most people recognise as Incident Response. As a result, the pressure will start to mount. However, responders must still understand and follow process.</p>
<h2>Identification</h2>
<p><em>Something</em> has happened. Possibly something bad. Right now, no one really knows for sure. Incident responders need to act quickly, yet accurately, to assess the situation. By this we mean they need to IDENTIFY what has happened. You want them to understand it well enough to decide if this event really is an &#8220;incident&#8221;, or if this is something that can be addressed in other ways.</p>
<p>Although this sounds simple, it rarely is. The &#8220;fog of war&#8221; makes decisions difficult. There is never enough information. Also, you will feel there is never enough time. Resisting this is important. To do this, you need a good identification process/workflow. As an example of how important this is, the <a href="https://www.ncsc.gov.uk/collection/incident-management/cyber-incident-response-processes" rel="noopener noreferrer" target="_blank">UK Government guidance on IR</a> has THREE steps dedicated to incident identification.</p>
<h3>Remember to prepare</h3>
<p>Identification is the second step of the IR cycle. <a href="https://www.halkynconsulting.co.uk/a/2019/05/incident-response-phases-preparation/" rel="noopener noreferrer" target="_blank">This means you should have prepared before you get here</a>. Your preparation should include guides on classifying &#038; prioritising incidents. Also, you probably want some playbooks on how to respond, but that&#8217;s the next step.</p>
<h2>What does this all mean</h2>
<p>In summary, &#8220;identification&#8221; here means being able to validate an event is an incident; putting it in a category to help responders &#038; management reporting; prioritise it to protect resources; importantly, be able to determine if any regulator/government agency needs to be involved. In other words, it is easy.</p>
<p>Except it isn&#8217;t. However, if you plan &#038; practice it becomes easier. Above all else, give your responders the authority &#038; trust to make decisions here. Remember, until they assess it is an incident, you simply have an event. In other words, &#8220;something happened&#8221; and you dont know anything else for sure.</p>
<h3>The Event</h3>
<p>First, we need to look at the event. In IT lots of things happen all the time. For example, your firewall is almost constantly being probed. In addition, your mailboxes are bombarded with spam/phishing. Meanwhile, your staff are visiting websites and people are ringing up trying to bluff their way to speaking with the boss.</p>
<p>This is constant. There is no way you can treat every event as an incident. Apart from anything else, this would bankrupt you in days. So, clearly, we can see there needs to be a way to tell the difference between an &#8220;event&#8221; and an incident. This is why identification matters.</p>
<h4>Sources</h4>
<p>When looking at the event, consider the source. Some are more trusted than others. However, dont automatically dismiss sources, just weight your confidence appropriately. For example, if a random phone call says &#8220;you&#8217;ve been hacked&#8221;, you might want to worry less than if a Specialist Police Officer turns up and tells you the same thing. In your planning phase, you can document this. Alternatively, Responders should be trained to assess this on the fly.</p>
<p>Remember to consider possible internal and external sources. Additionally, be open to reporting. Above all else, you want people to report incidents early when you can respond, not after a breach.</p>
<h5>Internal Examples</h5>
<ul>
<li>SIEM/Monitoring</li>
<li>Firewall</li>
<li>User reports</li>
<li>Pentest/Red Teams</li>
<li>Internal Threat Hunts</li>
</ul>
<h5>External Examples</h5>
<ul>
<li>Customer reporting</li>
<li>Client/supplier/3rd party notification</li>
<li>Law Enforcement report</li>
<li>News Reporter telling you</li>
<li>Attacker notification</li>
</ul>
<p>Clearly it is better to detect the incident internally. If a national news crew turn up at your office, things are probably already out of control. In short, you want to detect the incident rather than be notified. </p>
<p>However, if you are notified, good IR will still see you through the problem. </p>
<h3>Congratualtions, its an INCIDENT!</h3>
<p>So, you&#8217;ve confirmed the event is bad. Responders have declared an incident and your response process is gearing up. Meanwhile, staff, customers and clients are going about their business as normal. You need to decide how much disruption this incident is going to cause.</p>
<p>However, although this is important, it isn&#8217;t set in stone. During the response, you may learn new things which change your view. You might discover it&#8217;s all a mistake. Alternatively, you might discover what you thought was minor is a full breach. Whatever the outcome, never hesitate to reassess the incident.</p>
<p>Incident identification should lead to three bits of knowledge. </p>
<h4>Categorisation</h4>
<p>First, you want to categorise the incident. That is to say, describe it in a manner you can use to track against other incidents. This can be as simple or complex as you want. Some organisations have a basic model along the lines of:</p>
<ul>
<li>Malware</li>
<li>Phishing</li>
<li>Intrusion</li>
<li>etc</li>
</ul>
<p>While others go for lots of detail:</p>
<ul>
<li>Trojan &#8211; Windows</li>
<li>Worm &#8211; Windows</li>
<li>RCE &#8211; Windows</li>
<li>Trojan &#8211; Linux</li>
<li>etc</li>
</ul>
<p>You need to pick whatever works best for your organisation. You can, if you want, build a huge model with a detailed taxonomy and <a href="https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/at_download/fullReport" rel="noopener noreferrer" target="_blank">ENISA has good guidance</a> on this. But you may find this is overkill. All you really need is something Responders can use and provides some management information.</p>
<h4>Prioritisation</h4>
<p>It won&#8217;t always be an issue, but most incidents impact your normal activities. You need to establish how important this incident is compared with everything else that is going on. Also, you may need to divert resources from other parts of the business. You may need to shut down profit-generating functions to prevent further damage. Clearly you can&#8217;t treat every incident as if it was the end of the world. However, you cant treat all of them as if they dont matter either.</p>
<p>Consequently, you need some way to prioritise. Again, this should be part of your planning documentation. You can go for a simple 1 &#8211; 5 scale or you can do detailed assessments of potential costs and impact. Whatever you pick, it has to work and be useable by a responder under stress. As a result, simpler is probably better.</p>
<h4>Escalation</h4>
<p>Last part of identification is deciding what &#8220;level&#8221; this problem sits at. Escalation can be a responder deciding if they can deal with it or if they need help from a broader team. Also, it can be an entire organisation deciding if they need to bring a 3rd party in. Incidents frequently happen at weekends/holidays. Incident responders are almost always under pressure and isolated. As a result, clearly defined escalation criteria are essential. Minimise the guesswork needed. Provide a framework that supports your responder.</p>
<p>Examples of escalations include:</p>
<ul>
<li>Individual responder requiring support from network and sysadmins</li>
<li>Response team calling in 3rd party support</li>
<li>Identifying a breach and requiring legal/PR support</li>
<li>Discovering criminal employee activity which needs Law Enforcement asssitance</li>
</ul>
<p>As you can see, it varies wildly. Therefore make sure you plan this well.</p>
<h2>Identification is&#8230;</h2>
<p>To summarise, identification is how you tell the difference between an <em>event</em> and an <em>incident</em>. Good practices here will save you money, and stress, in the long term by minimising the disruption and cost of an incident. In addition, it reinforces the need to have strong preparation. The IR cycle works best when all the steps are carried out. </p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/06/incident-response-identification/">Incident Response Phases – Identification</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1761</post-id>	</item>
		<item>
		<title>Incident Response Phases &#8211; Preparation</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/05/incident-response-phases-preparation/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 11 May 2019 10:12:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[PICERL]]></category>
		<category><![CDATA[Preparation]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1742</guid>

					<description><![CDATA[<p>Preparation is the first phase of the IR Cycle. Doing well here is the difference between good incident response and dealing with a breach or crisis.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/05/incident-response-phases-preparation/">Incident Response Phases &#8211; Preparation</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a <a href="https://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/" rel="noopener noreferrer" target="_blank">previous post</a> we discussed the importance of having an Incident Response (IR) process and our preference is one that runs Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned (PICERL). In this post, we are going to be looking a bit more into the Preparation phase of IR.<br />
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" class="size-medium wp-image-1730" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - Preparation ICERL" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework &#8211; Starts with Preparation!</figcaption></figure></p>
<h2>Preparation</h2>
<p>Lots of people overlook this phase because it isn&#8217;t &#8220;dynamic&#8221; and doesn&#8217;t have the technical excitement of other phases, but the reality is you are either <em>preparing for an incident</em> or <em>responding to an incident</em>. What matters is how you spend your time in this phase. If you use this time well, every incident you deal with will be better managed with a significantly improved outcome. However, if you waste this time, every incident will be significantly harder, more costly and cause greater impact. Really the choice is yours!</p>
<h2>Fail to Prepare, Prepare to Fail</h2>
<p>It really is that simple.</p>
<h2>Preparation Guide</h2>
<p>There is a lot of work to do in this phase, even though some will think it is a case of Incident Responders not doing their job. The exact activity will be organisation specific but there are some key activities everyone should follow. If you are looking for even more succinct guidance, FireEye, a world leading IR company, have an <a href="https://www.fireeye.com/blog/products-and-services/2018/02/preparing-for-an-incident-response.html" rel="noopener noreferrer" target="_blank">excellent article on IR Preparation</a>. </p>
<h3>Key Elements</h3>
<p>When we assist an organisation in building an IR capability, we focus on technical and non-technical elements of preparation. This allows defenders to have realistic goals &#8211; if you are new to this, it can seem like an insurmountable hurdle &#8211; and allows management to have good visibility of progress towards a continuously improving target. </p>
<p>Remember, you never finish the Incident Response Cycle. You remain in <strong>preparation</strong>, striving to get better until there is an incident. Then you respond, learn from it and improve your preparation for the next one. </p>
<h4>Technical Preparation</h4>
<p><strong>Attack Surface Reduction</strong>. Also referred to as &#8220;<em>system hardenin</em>g&#8221; or &#8220;<em>vulnerability management</em>&#8221; and lots of other terms. This is the ongoing process of trying to minimise the entry points for an attacker. It is also looking at your internal systems, making sure that an attacker who gets in cant easily move around. Typical activities here include patching, turning off unnecessary services and account management. If you are fortunate enough to have a dedicated IR team, they should work closely with your SOC or IT Service Management teams to limit the scope of attacks.<br />
<strong>Monitoring</strong>. If you can&#8217;t see an attack, you can&#8217;t respond. It isn&#8217;t good enough to <em>think</em> monitoring is in place, you need to check this. Check:</p>
<ul>
<li>The right things are logged</li>
<li>That the right alerts fire</li>
<li>The right people see the alerts</li>
<li>People know what to do with the alerts</li>
</ul>
<p>All of this is essential to give your IR team a fighting chance. This is a good thing to use a Red Team for, or an <a href="https://www.halkynconsulting.co.uk/security/security-services" rel="noopener noreferrer" target="_blank">external security consultancy</a> to give you some assurance.</p>
<h4>Non-Technical Preparation</h4>
<p><strong>Documentation</strong>. This is essential. Your policies set the benchmark for how and when IR will work. Good documentation will help a stressed incident manager make the right decision under pressure. It should be readily available, remember your IT systems may be compromised, and easy to follow. While every organisation&#8217;s needs differ, you should look to cover the following points:</p>
<ul>
<li><em>Authorisations</em>. What is an incident manager authorised to do? Also, what are responders authorised to do?</li>
<li><em>Requirements</em>. Are there timescales you want the IR team to adhere to? Do you need &#8220;court-ready&#8221; evidential collection? Decisions like this <strong>must </strong>be made in advance.</li>
<li><em>Communications Plan</em>. Establish who needs to be told. Plan how people can communicate if normal systems are compromised. Decide who would be responsible for notifying a regulator if needed. Likewise, set a process for reporting to customers/clients/suppliers. After that, establish how frequently are updates provided and who gets them.</li>
<li><em>IR Processes</em>. Help your responders out by giving them good guides. For example, give step by step instructions on how you want RAM captured. Similarly, instructions for dealing with phishing help focus the mind. However, ensure that your IR team are flexible to deal with the unknown.</li>
<li><em>Environmental information</em>. Most importantly, you need to document your environment. In other words, have a network diagram and CMDB for example. This means your team can quickly understand the impact. Also, it allows them to know who to call for assistance.</li>
</ul>
<p><strong>Practice</strong>. The saying &#8220;practice makes perfect&#8221; is accurate. Also, it is really important for IR preparation. Incident responders need to practice. Practice includes activities like external CTFs, Competitions or in-house exercises. You can practice rarely-used skills in a CTF. Conversely, you learn your environment with an in-house exercise. This is all good. However, avoid giving your responders &#8220;busy&#8221; work or &#8220;BAU&#8221; tasks. Responders need to be ready to drop everything.</p>
<h2>Preparation really does matter</h2>
<p>To summarise, and repeat a phrase, if you fail to prepare, you really need to prepare to fail. Preparation is a critical step of the incident response cycle. You are in this phase whenever you are not actively responding to an incident. As a result, you should make the most of it.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/05/incident-response-phases-preparation/">Incident Response Phases &#8211; Preparation</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1742</post-id>	</item>
		<item>
		<title>Incident Response &#8211; Process Matters</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 11 Apr 2019 11:04:03 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Incident Management]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[IR Process]]></category>
		<category><![CDATA[IRM]]></category>
		<category><![CDATA[PICERL]]></category>
		<category><![CDATA[Process]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1724</guid>

					<description><![CDATA[<p>Breaches are pretty much inevitable. Having good incident response processes can be the difference between it being painful and it being catastrophic to your organisation.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/">Incident Response &#8211; Process Matters</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the last month, there has been news about a range of cybersecurity breaches. The Register <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener noreferrer">reported over 620 million hacked accounts</a> being available from breaches on popular apps like MyFitnessPal and ShareThis. At the same time ransomware continues to disrupt <a href="https://www.databreaches.net/more-than-5-months-after-ransomware-incident-wolverine-solutions-group-still-notifying-more-than-700-companies-and-1-2-million-patients/" target="_blank" rel="noopener noreferrer">healthcare</a>, <a href="https://www.bleepingcomputer.com/news/security/ransomware-attack-on-jackson-county-gets-cybercriminals-400-000/" target="_blank" rel="noopener noreferrer">government</a> and <a href="https://www.vice.com/en_us/article/8xyj7g/ransomware-forces-two-chemical-companies-to-order-hundreds-of-new-computers" target="_blank" rel="noopener noreferrer">private companies</a>. It seems a redundant truth to say breaches are inevitable. This means incident response is a critical business process for every organisation. <a href="http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/">Incident Response really does matter</a>.</p>
<figure id="attachment_1730" aria-describedby="caption-attachment-1730" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1730" data-permalink="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/picerl/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" data-orig-size="719,718" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Process &#8211; PICERL" data-image-description="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-image-caption="&lt;p&gt;PICERL &#8211; Common incident response process / framework&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?fit=719%2C718&amp;ssl=1" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - PICERL" width="300" height="300" class="size-medium wp-image-1730" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/04/PICERL.png?w=719&amp;ssl=1 719w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1730" class="wp-caption-text">PICERL &#8211; Common incident response process / framework</figcaption></figure>
<p>When it comes to building an Incident Response process, you need to decide on a framework. This can be anything you want. The key is pick one you understand and covers the important stages. PICERL (shown left) is one of the more common frameworks used to build an incident response process. In this, the flow runs <strong>P</strong>reparation, <strong>I</strong>dentification, <strong>C</strong>ontainment, <strong>E</strong>radication, <strong>R</strong>ecover and then <strong>L</strong>essons Learned. Future blog posts will look at each stage of PICERL in a bit more detail.</p>
<p>If you are starting off, all that matters is that you <strong>have</strong> a process. </p>
<h2>Incident Response Process Matters</h2>
<p>Key areas to consider are the fundamental areas of incident response &#8211; the things you do before the incident, how you respond to the incident and what you do after the incident. It may seem strange but all three areas are equally important so make sure you don&#8217;t just focus on the bit in the middle. The more effort you, or your response team, put into the first and last stages, the better and faster the middle bit will happen.</p>
<p>Once you have built a framework (or adopted an existing one) you can start to flesh out the details. Avoid perfection here and don&#8217;t think that once a document is written, it has to be set in stone. You can&#8217;t predict every incident in advance and trying to do so is the path to madness. Start with some likely events and document how you want your incident response team to respond. Then, over time build new ones. When you have incidents, update and modify your process documents. </p>
<p>When you adopt new technology, or change business processes, update and change your documents. When you get new staff into the incident response team, have them read &#038; review the documents to see if they have any suggestions for improvements. It doesn&#8217;t matter how you do it, just need to keep the documents living and current. </p>
<p>Avoid the trap of thinking you need a finalised version for Audit or Compliance (you might do, but that is a different problem), and focus on having a version which works, can be used by your responders and relates to your current business. </p>
<h2>Summary</h2>
<p>As always, if you want specialised training for your IR team, we can provide tailored courses on or off-site for your staff, as well as table-top scenarios and red team exercises to ensure practical experience. Alternatively, you can look to send your staff on public training such as <a href="https://www.sans.org/course/hacker-techniques-exploits-incident-handling" rel="noopener noreferrer" target="_blank">SANS SEC504</a> and <a href="https://www.sans.org/course/advanced-incident-response-threat-hunting-training" rel="noopener noreferrer" target="_blank">SANS FOR508</a>.</p>
<p>If you want to find out more, as always, <a href="https://www.halkynconsulting.co.uk/contact/contact-security-team">get in touch</a>.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/04/incident-response-process-matters/">Incident Response &#8211; Process Matters</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1724</post-id>	</item>
		<item>
		<title>Security Certifications &#8211; is X good or bad?</title>
		<link>http://www.halkynconsulting.co.uk/a/2019/02/security-certifications-is-x-good-or-bad/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 14 Feb 2019 11:39:09 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[CEH]]></category>
		<category><![CDATA[Certifications]]></category>
		<category><![CDATA[CISM]]></category>
		<category><![CDATA[CISSP]]></category>
		<category><![CDATA[Professional Qualifications]]></category>
		<category><![CDATA[Qualifications]]></category>
		<category><![CDATA[Security Certifications]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1717</guid>

					<description><![CDATA[<p>Security certifications are a hot topic. No one cert is intrinsically better than others, pick the one that opens the most doors for you.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/02/security-certifications-is-x-good-or-bad/">Security Certifications &#8211; is X good or bad?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the most common online discussions in the security industry is about security certifications. This normally starts when someone asks what they should work towards or is Cert X better than Cert Y. As you can imagine, the answers are mixed.</p>
<p>The cold hard truth is that there is no real way to say one cert is better than another. It is 100% down to personal opinion. As security is a very broad field, you can find amazing practitioners who have zero certs and you can meet very bad professionals who have the full catalogue of security certifications. The certification itself is rarely an indicator of how good someone will be for your team.</p>
<p>People will always have a preference. Some will like the more management approach, some want them to be more technical. Some think &#8220;open book&#8221; certs are cheating, others think closed book certs are a needless test of how well people memorise trivial information.</p>
<p>There isn&#8217;t a right answer for any of this. All education is good. If you want the tl;dr it is that you need to do the research to find out what is offered by various security certifications and <strong>pick the one that is best for you</strong>. There is a caveat here because it depends on what your motivation is.</p>
<p>You might be looking to learn something new and the cert itself is just a way to test your own understanding. This is good and if this is your motivation, pick any cert and you will learn something.</p>
<p>However, for lots of people, the cert is there to meet a professional need. Often this to land a job, keep a job or get a promotion. If this is your motivation then it really does matter which one you go for.</p>
<h2>Security Certifications as a Gatekeeper</h2>
<figure id="attachment_1714" aria-describedby="caption-attachment-1714" style="width: 150px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1714" data-permalink="http://www.halkynconsulting.co.uk/a/securitycertifications/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?fit=966%2C439&amp;ssl=1" data-orig-size="966,439" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Security Certifications listed on a typical job advert." data-image-description="&lt;p&gt;Security Certifications listed on a typical job advert.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Security Certifications listed on a typical job advert.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?fit=300%2C136&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?fit=966%2C439&amp;ssl=1" class="size-thumbnail wp-image-1714" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?resize=150%2C150&#038;ssl=1" alt="Job advert asking for irrelevant security certifications" width="150" height="150" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?resize=80%2C80&amp;ssl=1 80w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?zoom=2&amp;resize=150%2C150&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2019/06/securitycertifications.png?zoom=3&amp;resize=150%2C150&amp;ssl=1 450w" sizes="auto, (max-width: 150px) 100vw, 150px" data-recalc-dims="1" /><figcaption id="caption-attachment-1714" class="wp-caption-text">Security Certifications listed on a typical job advert.</figcaption></figure>
<p>The reality for most job seekers is that you need to get through some strange HR / corporate practices. In the example job advert (found on jobserve.co.uk), there is a clear statement that &#8220;Professional Industry Recognised Certifications&#8221; are an essential requirement and it goes on to list some security certifications.</p>
<p>However, there is no logic behind this. The cert requirement is simply a way to eliminate people they don&#8217;t want to hire and make it harder for applicants. If you need a CISSP, you need someone with a very different skill set and knowledge than a CISM (which is mostly management, projects and stakeholder engagement) and drastically different from a CEH &#8211; which is a pentester qualification. If <strong>any</strong> of these security certifications are acceptable, then it should also be OK to apply with none. It&#8217;s not feasible to believe that they want either a junior pentester or senior program manager for the role. The <strong>only</strong> explanation is that they&#8217;ve asked for security certifications to act as a gatekeeper and eliminate a percentage of candidates.</p>
<p>If HR departments and hiring managers had any sense, life would be easier and fairer but it simply isn&#8217;t. As a result, you may be forced to get certificates you don&#8217;t like for no reason other than the job requires it. In the UK in 2019, the most common qualification this applies to is the CISSP. </p>
<p>This is not an intrinsically bad security certification. CISSP holders range from super skilled and knowledgeable to people you can&#8217;t believe passed the exam. This is true of <strong>every single qualification in the world</strong>, so don&#8217;t think it is a criticism of the CISSP. The marketing efforts which have gone into pushing the CISSP means that if you hold it, you can pretty much apply for any security role from pentester, to incident handler, to forensic investigator to management. Now you may think this makes no sense, and it doesn&#8217;t, but that doesn&#8217;t matter. It is the way the world is.</p>
<h2>One other consideration</h2>
<p>Most certs come in two big bucket flavours. Ones where you go and learn a lot of stuff and then sit an exam and ones where you should already know a lot of stuff before you go for the exam.</p>
<p>To explain this, these are examples:</p>
<ul>
<li><strong>CISSP / CISM</strong>: Both certs where you need 5 years experience before you sit the exam. You can get &#8220;bootcamp&#8221; courses but these are largely sold as refreshers rather than teaching brand new knowledge.</li>
<li><strong>OSCP</strong>: This is largely a cert where you learn lots of new stuff then sit a very challenging practical exam. Yes, some people will already know everything before they start the course, but that is 100% not what is expected. The course is designed to teach new things, not simply refresh knowledge.</li>
</ul>
<p>This can lead to a lot of the dissatisfaction with some security certifications, especially as the courses are often expensive. People frequently attend a CISSP bootcamp and complain the cert is lacklustre because they learned nothing new on the course. This should never be the purpose of the course.</p>
<h2>What does this mean?</h2>
<p>The upshot is that if you are looking for one qualification to rule them all, it probably doesn&#8217;t exist. </p>
<p>You really need to decide what matters to you. Is it for personal development or to influence your career? If it is the latter, the best thing to do is search for job adverts. Find the ones you are interested in and check what qualifications they ask for. Whichever qualification is asked for the most, is the one you really want. </p>
<p>In the UK, in the first half of 2019, for security roles, this is unquestionably the CISSP. But don&#8217;t take our word for it. Research it yourself. Find the jobs you like, find the career path you want and see what (if anything) is the required qualification. </p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2019/02/security-certifications-is-x-good-or-bad/">Security Certifications &#8211; is X good or bad?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1717</post-id>	</item>
		<item>
		<title>Memory analysis in incident response &#8211; never leave home without it</title>
		<link>http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 15 Jan 2018 13:00:08 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Memory Analysis]]></category>
		<category><![CDATA[Volatility]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1647</guid>

					<description><![CDATA[<p>Incident response is often a stressful, high-pressure situation. Responders are desperately trying to claw together information. All around them the world is collapsing. Furthermore, everything important seems to be deleted or obfuscated. Yet it is not all doom and gloom. They have memory analysis. Life can be hard for the incident responder. You are faced [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/">Memory analysis in incident response &#8211; never leave home without it</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1651" aria-describedby="caption-attachment-1651" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1651" data-permalink="http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/memoryanalysis/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?fit=774%2C500&amp;ssl=1" data-orig-size="774,500" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Memory Analysis Tools" data-image-description="" data-image-caption="&lt;p&gt;Memory analysis tools help fight forgetfulness&#8230;&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?fit=300%2C194&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?fit=774%2C500&amp;ssl=1" class="size-medium wp-image-1651" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?resize=300%2C194&#038;ssl=1" alt="Memory analysis tools help fight forgetfulness..." width="300" height="194" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?resize=300%2C194&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?resize=768%2C496&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysis.jpg?w=774&amp;ssl=1 774w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1651" class="wp-caption-text">Memory analysis tools help fight forgetfulness&#8230;</figcaption></figure>
<p>Incident response is often a stressful, high-pressure situation. Responders are desperately trying to claw together information. All around them the world is collapsing. Furthermore, everything important seems to be deleted or obfuscated. Yet it is not all doom and gloom. They have memory analysis.</p>
<p><a href="http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/">Life can be hard for the incident responder</a>. You are faced with malware and/or attacker tools, often heavily disguised. Attackers pack &amp; obfuscate malware to avoid AV. Memory resident attacks can execute without ever touching a disk. Even when you think you&#8217;ve won, you discover the attackers are back in again. It can be demoralising.</p>
<p>Memory analysis can help you escape this nightmare cycle.</p>
<h2>What do we mean by memory analysis?</h2>
<figure id="attachment_1650" aria-describedby="caption-attachment-1650" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1650" data-permalink="http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/memory_analysis/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?fit=1200%2C900&amp;ssl=1" data-orig-size="1200,900" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Memory Analysis Supports Incident Response" data-image-description="&lt;p&gt;Memory analysis supports incident response in ways people never consider&lt;/p&gt;
" data-image-caption="&lt;p&gt;Memory analysis supports incident response in ways people never consider&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?fit=1024%2C768&amp;ssl=1" class="size-medium wp-image-1650" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?resize=300%2C225&#038;ssl=1" alt="Memory analysis supports incident response in ways people never consider" width="300" height="225" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?resize=768%2C576&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?resize=1024%2C768&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memory_analysis.jpg?w=1200&amp;ssl=1 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1650" class="wp-caption-text">Memory analysis supports incident response in ways people never consider</figcaption></figure>
<p>At a very high level, we mean collecting RAM from a machine in support of incident response. This can come in many forms.</p>
<p>Computer memory can be thought of as the space your computer uses to do things. This is where things like the screen you see on login reside. You open a new application, it is loaded into memory. For Windows users, if you open Task Manager, that list of running processes are all in memory. Also increasing memory is a fast way to really boost performance.</p>
<p>Memory is really important. This is just as true for the investigator. Because of what it holds, memory analysis can be very revealing.</p>
<p>The most striking demonstration is in hunting malware.</p>
<p>Crafty attackers change their code to avoid detection. They encrypt payloads to fool monitoring. They armour their attacks to make life harder for reverse engineers. All of this can be very effective and it makes life hard for responders.</p>
<p>However, in memory, things are very different. Malware in RAM is exposed. It has to run, so it has to be readable. As a result of this, memory analysis can give a clear insight into attacks. For most investigations, this makes a significant difference.</p>
<h2>Some problems</h2>
<p>However, it isn&#8217;t simple perfection. As you might imagine, memory analysis has its own problems.</p>
<figure id="attachment_1666" aria-describedby="caption-attachment-1666" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1666" data-permalink="http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/memoryanalysissues/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysissues.jpg?fit=461%2C384&amp;ssl=1" data-orig-size="461,384" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Memory Analys vs Reboot" data-image-description="&lt;p&gt;Memory Analys vs Reboot&lt;/p&gt;
" data-image-caption="&lt;p&gt;Memory Analys vs Reboot&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysissues.jpg?fit=300%2C250&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysissues.jpg?fit=461%2C384&amp;ssl=1" class="size-medium wp-image-1666" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysissues.jpg?resize=300%2C250&#038;ssl=1" alt="Memory Analysis vs Reboot" width="300" height="250" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysissues.jpg?resize=300%2C250&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysissues.jpg?w=461&amp;ssl=1 461w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1666" class="wp-caption-text">Memory Analysis vs Reboot</figcaption></figure>
<p>First of all, memory is volatile. This means it changes and when the system loses power, memory is often gone. Often but not always. In incident response, one of the first things you should do is capture the memory. Even if you later don&#8217;t need it. If you don&#8217;t grab it at the start, you may never get it.</p>
<p>Sometimes you don&#8217;t have any choices here. Often, troubleshooting involves a power cycle. People who panic may pull the power cord. All of this goes towards flushing volatile memory. Consequently, investigators get cold, dead, computers to analyse. Yet, despite this, there are still opportunities (<em>hiberfil.sys/pagefile.sys</em>). More on this in a future post.</p>
<p>Another issue is memory can be big. Modern computers often have at least 8GB of ram. If you are looking at servers then 32GB and upwards is normal. This is great for performance. Because of this size, however, memory capture can be slow. It can frequently take over an hour to capture RAM. This might sound trivial but during that time, the RAM will have changed a lot. The volatile nature can be a nightmare for unsuspecting investigators.</p>
<h2>Memory analysis solutions</h2>
<p>Above all, good incident response processes help. Have the right tools available to capture memory. Make sure captures start first. Make sure there are good records. All of this works towards mitigating problems.</p>
<p>There are lots of memory collection tools. Rather than think &#8220;TOOL X&#8221; is the best, try them all. Find the one which fits with your workflow the best. Then learn its strengths and weaknesses.</p>
<figure id="attachment_1667" aria-describedby="caption-attachment-1667" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1667" data-permalink="http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/memoryanalysistools/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?fit=2000%2C2000&amp;ssl=1" data-orig-size="2000,2000" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Memory Analysis Needs Tools" data-image-description="&lt;p&gt;Memory Analysis Needs Tools&lt;/p&gt;
" data-image-caption="&lt;p&gt;Memory Analysis Needs Tooling&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?fit=1024%2C1024&amp;ssl=1" class="wp-image-1667 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?resize=300%2C300&#038;ssl=1" alt="Memory Analysis Needs Tools" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?resize=768%2C768&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?resize=1024%2C1024&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2018/01/memoryanalysistools.png?w=2000&amp;ssl=1 2000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1667" class="wp-caption-text">Memory Analysis Needs Tooling</figcaption></figure>
<p>When it comes to analysis itself, there are two main tools to consider.</p>
<p>First of all, <a href="https://github.com/volatilityfoundation/volatility" target="_blank" rel="noopener">Volatility</a> is one of the best-known tools. Every responder should have at least a basic understanding of how to use this. It is free, open source and cross-platform.  Volatility is written in Python, making it easy to extend. One of the best things is the sheer range of <a href="https://github.com/volatilityfoundation/community" target="_blank" rel="noopener">community plugins</a> available.</p>
<p>The second tool you should look at is <a href="http://www.rekall-forensic.com/" target="_blank" rel="noopener">Rekall</a>. In some respects, this is more polished but right now it has fewer plugins. Rekall can be faster with new operating systems and integrates well with IR tools.</p>
<p>Finally, out of the main tools, is <a href="https://www2.fireeye.com/PPC-mandiant-redline-download-analyze-malware-ioc.html" target="_blank" rel="noopener">Redline</a>. This is a free product provided by Mandiant. Unlike the other two, this is a fully GUI tool. Redline provides an easy to use interface at the cost of some flexibility.</p>
<p>Just like with collection, never feel you have to pick one tool over others. Practice them all. Then use them all. Learn how the results from one tool lead to the next. Most of all, become proficient at using the right tool for the right task.</p>
<p>A good example is to use Redline first &#8211; giving you high-level insights. Then use Volatility to drill into details.</p>
<h2>Memory Analysis &#8211; Volatility Plugins</h2>
<p>Finally, as mentioned, the strength of Volatility is the community plugins. To this end, on <a href="https://github.com/TazWake/volatility-plugins">Taz Wake&#8217;s GitHub</a> pages we will be releasing IR plugins for everyone to use/ adapt/develop. Feedback is always welcome.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2018/01/memory-analysis-dfir/">Memory analysis in incident response &#8211; never leave home without it</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1647</post-id>	</item>
		<item>
		<title>Christmas &#8211; Seasonal Shutdown</title>
		<link>http://www.halkynconsulting.co.uk/a/2017/12/christmas-seasonal-shutdown/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 21 Dec 2017 09:00:28 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Halkyn Consulting]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1637</guid>

					<description><![CDATA[<p>Merry Christmas Halkyn Consulting will enter its Christmas shut down period on Friday 22 Dec. We remain closed to new business until Tuesday, 2 Jan 2018. As always, existing customers can still engage us through the normal means. So all that remains now is for us to wish all of you a Happy Solstice, Merry [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/12/christmas-seasonal-shutdown/">Christmas &#8211; Seasonal Shutdown</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Merry Christmas</h2>
<figure id="attachment_1639" aria-describedby="caption-attachment-1639" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1639" data-permalink="http://www.halkynconsulting.co.uk/a/2017/12/christmas-seasonal-shutdown/christmas-xmas-christmas-tree-decoration/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?fit=5760%2C3840&amp;ssl=1" data-orig-size="5760,3840" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;2.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark III&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;400&quot;,&quot;shutter_speed&quot;:&quot;0.025&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Seasonl greetings to one and all" data-image-description="" data-image-caption="&lt;p&gt;Merry Christmas&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?fit=1024%2C683&amp;ssl=1" class="size-medium wp-image-1639" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?w=2400&amp;ssl=1 2400w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/christmas-xmas-christmas-tree-decoration.jpg?w=3600&amp;ssl=1 3600w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1639" class="wp-caption-text">Merry Christmas</figcaption></figure>
<p>Halkyn Consulting will enter its Christmas shut down period on Friday 22 Dec. We remain closed to new business until Tuesday, 2 Jan 2018. As always, existing customers can still engage us through the normal means.</p>
<p>So all that remains now is for us to wish all of you a Happy Solstice, Merry Christmas and a Happy New Year. We look forward to working with you in 2018. Stay secure.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/12/christmas-seasonal-shutdown/">Christmas &#8211; Seasonal Shutdown</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1637</post-id>	</item>
		<item>
		<title>Checklist or your memory, is one better?</title>
		<link>http://www.halkynconsulting.co.uk/a/2017/12/memory-checklist/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 09 Dec 2017 23:40:44 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Checklists]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1606</guid>

					<description><![CDATA[<p>No matter how much expert knowledge you have, how good you think your memory is, using a checklist is simply good security practice.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/12/memory-checklist/">Checklist or your memory, is one better?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1608" aria-describedby="caption-attachment-1608" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1608" data-permalink="http://www.halkynconsulting.co.uk/a/2017/12/memory-checklist/checklists-better-than-memory/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?fit=3456%2C2304&amp;ssl=1" data-orig-size="3456,2304" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;1&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;X-M1&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;1600&quot;,&quot;shutter_speed&quot;:&quot;0.016666666666667&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="checklists-better-than-memory" data-image-description="&lt;p&gt;Checklists support your memory.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Checklists support your memory.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?fit=1024%2C683&amp;ssl=1" class="wp-image-1608 size-medium" title="Checklist to support your memory." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?resize=300%2C200&#038;ssl=1" alt="Checklist to support your memory." width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/12/checklists-better-than-memory.jpeg?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1608" class="wp-caption-text">Use a checklist, don&#8217;t rely on your memory.</figcaption></figure>
<p>Quite rightly, security professionals are proud of how much information they hold in their heads. There is no doubt that to be effective you need to have immediate access to lots of different concepts. However, the really effective ones also have a checklist.</p>
<p>First off &#8211; the problem. Lots of certificate exams are memory tests and lots of hiring managers believe tests &#8220;under pressure&#8221; show value. But really this is just a test of how much information you can hold for a short period of time. This is great if you are sitting a closed-book exam. It is also why boot camps work. Now ask yourself &#8211; is hearing something &amp; remembering it long enough to answer an exam question a good thing? In practice, to be good at your job you just need to know what you <em>have</em> to look up and be able to look it up quickly. Having a checklist is a definite win.</p>
<h2>Checklist vs You?</h2>
<p>The next issue is simply ego. We believe we <strong>know security</strong> so having to stop and follow a guide is somehow embarrassing. Everyone has confidence issues and when we see other people reciting things from memory (for example, dropping into conversation that ISO27001 Annexe A, 9.3 is <em>User Responsibilities</em>), it can be daunting.</p>
<p>Here, the simple thing is to realise it is irrelevant. If someone has memorised Annex A, the CSA CCM, NIST SP800-53 or whatever, be pleased for them but it may help less than you think.</p>
<p>Other than a tiny percentage of people who are truly able to memorise and recall on demand, most people actually remember less than they think. They may truly believe they have memorised Annex A and, if they are good, they will be right 90% of the time.</p>
<p>And there is the point. <strong>They will be wrong 10% of the time</strong>. This may not matter (getting 9.3 and 9.4 mixed up isn&#8217;t really a life or death issue) but when it is important, you need a checklist.</p>
<p>Rather than say &#8220;you aren&#8217;t good enough to memorise (whatever)&#8221;, using a checklist says you are professional enough to realise that it is IMPORTANT that nothing gets overlooked. You realise it is IMPORTANT that every step gets followed. There is a reason why experienced pilots still go through a checklist before every flight.</p>
<h2>When do I need a checklist?</h2>
<p>So, the simple answer to this difficult question is &#8211; whenever it is important that every step is followed or every option is considered. Only you can be the judge of that, but try to avoid letting your ego take over and decide &#8220;hey, a true professional would know to do it <em>this</em> way.&#8221;</p>
<p>The main examples we recommend checklists are for:</p>
<ul>
<li><strong>Incident Response</strong>. Here the importance is to make sure the right steps happen in the right sequence, every time, in a high-stress situation. Every collection must be forensically sound and every analysis must be methodological. This is crying out for a checklist response.</li>
<li><strong>Audit and Assessment</strong>. Different importance. Now, this isn&#8217;t about the stress it&#8217;s about dealing with tedium. Every audit must be repeatable and follow the exact correct steps. You can&#8217;t miss anything out and you need to deal with the fact that as you get bored, your mind wanders. Following a checklist can save you. An example of this is the <a href="http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/" target="_blank" rel="noopener noreferrer">ISO27001 self-assessment</a> checklist we provide.</li>
</ul>
<p>There will be lots of other situations &#8211; some of which you will need to decide for your organisation. Sadly we don&#8217;t have a checklist for &#8220;situations where you need a checklist&#8221;.</p>
<p>Whatever you do, don&#8217;t let your ego force you to try to remember things when you don&#8217;t need to. Save your brain power to think of innovative solutions to problems and use the checklist to manage your back-end processes.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/12/memory-checklist/">Checklist or your memory, is one better?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1606</post-id>	</item>
		<item>
		<title>Threat Hunting &#8211; essential for every business</title>
		<link>http://www.halkynconsulting.co.uk/a/2017/09/threat-hunting-essential-every-business/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Tue, 12 Sep 2017 19:17:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Threat Hunting]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1570</guid>

					<description><![CDATA[<p>Lots of articles, blog posts and webcasts talk about threat hunting. Despite this few, if any, organisations do it. This is a mistake. Security hit the headlines again recently, when Equifax admitted to a breach exposing around 143 million records of personal data. While details are still emerging, it looks like the attackers compromised an [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/09/threat-hunting-essential-every-business/">Threat Hunting &#8211; essential for every business</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1571" aria-describedby="caption-attachment-1571" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1571" data-permalink="http://www.halkynconsulting.co.uk/a/2017/09/threat-hunting-essential-every-business/equifax_threat_hunting/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?fit=2708%2C1464&amp;ssl=1" data-orig-size="2708,1464" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Equifax &#8211; Needed good threat hunting" data-image-description="&lt;p&gt;Equifax &#8211; Needed good threat hunting&lt;/p&gt;
" data-image-caption="&lt;p&gt;Equifax &#8211; Needed good threat hunting&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?fit=300%2C162&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?fit=1024%2C554&amp;ssl=1" class="size-medium wp-image-1571" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?resize=300%2C162&#038;ssl=1" alt="Equifax - Needed good threat hunting" width="300" height="162" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?resize=300%2C162&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?resize=768%2C415&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?resize=1024%2C554&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/equifax_Threat_hunting.png?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1571" class="wp-caption-text">Equifax &#8211; Needed good threat hunting</figcaption></figure>
<p>Lots of articles, blog posts and webcasts talk about threat hunting. Despite this few, if any, organisations do it. This is a mistake.</p>
<p>Security hit the headlines again recently, when <a href="https://krebsonsecurity.com/2017/09/the-equifax-breach-what-you-should-know/">Equifax admitted to a breach</a> exposing around 143 million records of personal data. While details are still emerging, it looks like the attackers compromised an external website and exfiltrated the data. There are no specifics on the attack yet but it takes time to copy out that much data<a href="#one"><sup>1</sup></a>. Good threat hunting uses this time to detect attackers. This would have allowed Equifax to implement countermeasures to minimise the breach<a href="http://two"><sup>2</sup></a>.</p>
<p>Any organisation can threat hunt. Threat hunting uses your existing security controls to identify attackers before they can destroy your business. It doesn&#8217;t replace anything. You cant use it to replace your AV or firewalls, no matter what vendors say. Hunting doesn&#8217;t mean you can get rid of your incident response teams.</p>
<p>In our experience, effective threat hunting simply makes everything else work better. The hunts give your IR teams better data to work from. Lessons you learn from hunting helps establish more effective controls.  In short, good threat hunting makes everything better.</p>
<p>Every organisation should hunt threats on their network. You don&#8217;t need to buy anything new and you can do it with your own staff. This post gives some tips to get you started but nothing beats experience and formal training. Halkyn Security offer a threat hunting service, which includes helping set up your teams to hunt. However if you want formal training we strongly recommend <a href="https://www.sans.org/">SANS</a> courses, at least for key staff.</p>
<h2>Cyber Security and Threat Hunting</h2>
<p>Traditional security focuses on established controls. This is your firewall, endpoint antivirus, mail filter and similar tools. A very good example of traditional security is the <a href="http://www.halkynconsulting.co.uk/a/?s=cyber+essentials">Cyber Essentials</a> scheme. As the name says, this is essential.</p>
<p>Next you need to ensure a way to respond to incidents. From Talk Talk to Equifax, it is apparent that incidents will continue to happen. As a result, <a href="http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/">incident response really does matter</a>.</p>
<p>Even with this in place, problems will still happen. Advanced Persistent Threat might be a marketing term, but the reality is persistent attackers exist. Criminals, or nation states, will spend time subverting your controls.</p>
<p>Here lies the problem. If an attacker can bypass your controls, what triggers your incident response process? Often, sadly, it is public notification when other people discover your breach.</p>
<figure id="attachment_1591" aria-describedby="caption-attachment-1591" style="width: 123px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1591" data-permalink="http://www.halkynconsulting.co.uk/a/2017/09/threat-hunting-essential-every-business/threathunting-equation/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/threathunting-equation.png?fit=123%2C19&amp;ssl=1" data-orig-size="123,19" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Threat Hunting &#8211; The IR Equation" data-image-description="&lt;p&gt;Threat Hunting &#8211; The IR Equation&lt;/p&gt;
" data-image-caption="&lt;p&gt;Threat Hunting &#8211; The IR Equation&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/threathunting-equation.png?fit=123%2C19&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/threathunting-equation.png?fit=123%2C19&amp;ssl=1" class="wp-image-1591 size-full" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/09/threathunting-equation.png?resize=123%2C19&#038;ssl=1" alt="Threat Hunting - The IR Equation" width="123" height="19" data-recalc-dims="1" /><figcaption id="caption-attachment-1591" class="wp-caption-text">Threat Hunting &#8211; The IR Equation</figcaption></figure>
<p>Defending your information relies on a simple equation. If the time to detect (D) the attackers and the time to respond (R) to the attack is less than it takes the attacker (A) to complete their mission, you win. If it isn&#8217;t, the attacker wins. The fundamental goal of threat hunting is to speed up your side. This is how you win.</p>
<p>When the dust settles, it turns out most breaches last months. Attackers spend time moving around. They collect sensitive data. The data is hoarded into staging servers. Eventually, the attackers exfiltrate the data. At this point it is too late for anything other than a PR exercise to limit the damage. However, in the weeks and months before this your organisation has thousands of opportunities to detect and defeat the attack. Threat hunting really does make the difference.</p>
<h2>Threat hunting for beginners</h2>
<p>You agree threat hunting is a good idea, now where do you start? This guide can help but remember nothing matches either skilled staff or bringing in dedicated threat hunting teams.</p>
<p>To get started, think of each threat hunt as a way of testing a theory. Build a theory. Decide what evidence would support it (or disprove it) and then collect the data.</p>
<p>Every environment is different so we cant give you a specific examples for your network here. However, we can provide some examples you might want to tailor:</p>
<h3>Threat hunting example scenarios</h3>
<p>Here are some example threat hunting scenarios. This is not an exhaustive list and the idea is you will build on this to develop good practices for your own organisation.</p>
<p><strong>Network Threats</strong></p>
<ul>
<li><span style="text-decoration: underline;">Command and Control Channels</span>. If you have a compromised device, it has to talk to the attackers. Collate your firewall and proxy logs. Split them into hourly segments. Find any device which is present in every segment. Establish why.</li>
<li><span style="text-decoration: underline;">Unusual protocols</span>. Check the data going out of your organisation. If you see encrypted traffic on port 80 it is unusual. Establish what has caused this.</li>
<li><span style="text-decoration: underline;">Suspicious encryption</span>. When your users visit HTTPS sites, there is a TLS/SSL handshake. When malware calls home it normally uses preset encryption. Look at your Port 443 traffic and investigate any connections without a handshake.</li>
</ul>
<p><strong>Endpoint Threats</strong></p>
<ul>
<li><span style="text-decoration: underline;">Persistence</span>. Collate startup entries (registry keys, autoruns etc) from all endpoints and scan for unusual entries. Any machine with unique software in startup / run keys should be investigated.</li>
<li><span style="text-decoration: underline;">Account use</span>. Collate event logs from all endpoints and scan for user account logins. Investigate outliers and unusual events like remote logins with local accounts.</li>
<li><span style="text-decoration: underline;">Unusual software</span>. Audit the software installed on all your devices. Sort the list to identify what software is only on one or two devices. Investigate this software.</li>
</ul>
<h2>Threat Hunting &#8211; the future</h2>
<p>As we said, this is just the start. Run some hunts with the information here and see what happens. If you find attackers, roll into your incident response. When it comes to the lessons learned feed back into your future threat hunting. As you mature, you can integrate threat intelligence feeds.</p>
<p>If you aren&#8217;t sure where to begin, consider sending your staff on training courses or <a href="http://www.halkynconsulting.co.uk/contact/contact-security-team">bringing in external help</a>.</p>
<p>The more you hunt, the better you will get and the more you will learn. The time to start is right now.</p>
<hr />
<p><a id="one"></a>1 &#8211; If each record was 1kb in size, this is a 143gb data set for the attackers to exfiltrate without detection.</p>
<p><a id="two"></a>2 &#8211; We have no way of knowing if Equifax was running threat hunts or had other controls in place. This is not a dissection of their specific situation, it is just an example.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/09/threat-hunting-essential-every-business/">Threat Hunting &#8211; essential for every business</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1570</post-id>	</item>
		<item>
		<title>UOC &#8211; Cybersecurity Conference 2017</title>
		<link>http://www.halkynconsulting.co.uk/a/2017/03/uoc-cybersecurity-conference-2017/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 23 Mar 2017 09:15:50 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Chester]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[UoC]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1552</guid>

					<description><![CDATA[<p>Cybersecurity is big news with governments and businesses suffering at the hands of cyber attacks. As a result of this, the University of Chester (UoC) STEMs society is hosting a Cybersecurity Conference on the 28th March 2017. The primary aim is to raise awareness of Cybersecurity. In addition, it will provide an opportunity to build professional networks and encourage career [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/03/uoc-cybersecurity-conference-2017/">UOC &#8211; Cybersecurity Conference 2017</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1553" aria-describedby="caption-attachment-1553" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1553" data-permalink="http://www.halkynconsulting.co.uk/a/2017/03/uoc-cybersecurity-conference-2017/uoc_cybersecurityconf/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?fit=1805%2C907&amp;ssl=1" data-orig-size="1805,907" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="UOC Cyber Security Conference 2017" data-image-description="&lt;p&gt;UOC Cyber Security Conference 2017&lt;/p&gt;
" data-image-caption="&lt;p&gt;UOC Cyber Security Conference 2017&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?fit=300%2C151&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?fit=1024%2C515&amp;ssl=1" class="size-medium wp-image-1553" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?resize=300%2C151&#038;ssl=1" alt="UOC Cyber Security Conference 2017" width="300" height="151" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?resize=300%2C151&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?resize=768%2C386&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?resize=1024%2C515&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/UOC_CybersecurityConf.png?w=1805&amp;ssl=1 1805w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1553" class="wp-caption-text">UOC Cyber Security Conference 2017</figcaption></figure>
<p>Cybersecurity is big news with governments and businesses suffering at the hands of cyber attacks. As a result of this, the University of Chester (UoC) STEMs society is hosting a Cybersecurity Conference on the 28th March 2017.</p>
<p>The primary aim is to raise awareness of Cybersecurity. In addition, it will provide an opportunity to build professional networks and encourage career development. Most of all this event provides an opportunity for you to ask any questions you might have. The current line up of speakers includes some genuine experts. As a result this presents a great opportunity to discuss what matters to you.</p>
<p>The event is at Thornton Science Park and UoC staff, students and guests are welcome.  Advance registration is required via <a href="https://www.eventbrite.co.uk/e/university-of-chester-cybersecurity-conference-2017-tickets-31394215945" target="_blank">EventBrite</a> and it starts at 1700hrs. Attendance is free. So there really is no reason to miss out on this event.</p>
<h2>UoC CyberSecurity Conference</h2>
<p>The guest speakers include:</p>
<ul>
<li>Taz Wake – Cybersecurity and Risk Consultant at Halkyn Consulting Ltd, based in North Wales.</li>
<li>James Simpson – Cybersecurity Consultant &amp; Director at Secti Ltd, based in Shropshire.</li>
<li>Matt Hull – MSc Student at the University of Chester &amp; Detective Constable at Cheshire Constabulary</li>
<li>GCHQ – GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.</li>
<li>Detective Superintendent Jon Betts &#8211; Head of Criminal Justice &amp; Custody at Cheshire Constabulary</li>
</ul>
<p>While the event is on, free refreshments, including pizzas, will be provided.</p>
<p>Please note, Thornton Science Park is an access controlled site. As a result<strong> all guests are required to register in advance</strong>. Also, all guests are to use car park B for parking. More details are available from the event organiser or the EventBrite page.</p>
<p>In conclusion, if you live in the North West and have even the slightest interest in Cybersecurity, you should attend this event. So dont hesitate, book it now on <a href="https://www.eventbrite.co.uk/e/university-of-chester-cybersecurity-conference-2017-tickets-31394215945" target="_blank">EventBrite</a>.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/03/uoc-cybersecurity-conference-2017/">UOC &#8211; Cybersecurity Conference 2017</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1552</post-id>	</item>
		<item>
		<title>Dashboards vs Security &#8211; are they really helping?</title>
		<link>http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 20 Mar 2017 14:06:24 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Dashboards]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Security Operations]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1539</guid>

					<description><![CDATA[<p>Metrics, Dashboards and Security Like them or not, metrics are a fundamental part of every organisation. Security doesn&#8217;t get to a free pass. It is a rare CISO who doesn&#8217;t demand dashboards showing how all the security controls are performing. Therefore for most organisations, this is a fight long lost. This may not always be a [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/">Dashboards vs Security &#8211; are they really helping?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Metrics, Dashboards and Security</h2>
<figure id="attachment_1544" aria-describedby="caption-attachment-1544" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1544" data-permalink="http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/dashboards/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/dashboards-e1489871362629.png?fit=300%2C197&amp;ssl=1" data-orig-size="300,197" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Example Security Dashboards" data-image-description="&lt;p&gt;Example Security Dashboards&lt;/p&gt;
" data-image-caption="&lt;p&gt;Example Security Dashboards&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/dashboards-e1489871362629.png?fit=300%2C197&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/dashboards-e1489871362629.png?fit=300%2C197&amp;ssl=1" class="size-medium wp-image-1544" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/dashboards.png?resize=300%2C197&#038;ssl=1" alt="Example Security Dashboards" width="300" height="197" data-recalc-dims="1" /><figcaption id="caption-attachment-1544" class="wp-caption-text">Example Security Dashboards</figcaption></figure>
<p>Like them or not, metrics are a fundamental part of every organisation. Security doesn&#8217;t get to a free pass. It is a rare CISO who doesn&#8217;t demand dashboards showing how all the security controls are performing. Therefore for most organisations, this is a fight long lost. This may not always be a bad thing either.</p>
<p>Really, dashboards are a good way of showing metrics. Metrics themselves aren&#8217;t inherently evil. As a result, you&#8217;d think dashboards would enhance your infosec work.</p>
<p>However, all to often the opposite is true. Metrics end up collected just for the sake of it. As a result, dashboards end up being nice shiny things for people to stare at. This is not good.</p>
<h2>What do you mean?</h2>
<p>First off, an example to explain this. Two of the most common metrics collected in security are patching and anti-virus status. Both are generally good things so people want to measure them. As a result, these are often cited in security guidance &#8211; such as <a href="http://www.csoonline.com/article/2118152/metrics-budgets/a-few-good-information-security-metrics.html" target="_blank">CSO Online&#8217;s article</a>. While this seems like a great idea it has problems.</p>
<ul>
<li><strong>Patching</strong>. Nearly every program will measure things like the number of systems patched to &#8220;current&#8221; levels. Normally this means they&#8217;ve had all the patches applied within 48 or so hours. For most enterprises, hitting 95% here is a really good thing and will be green on the dashboards.</li>
<li><strong>Antivirus</strong>. Another common one where people measure the number of systems with recent AV updates. Most of the time this is &#8220;updates issued in the last 24 hours&#8221; with 98% compliance target. As a result, unless things break, it is often green.</li>
</ul>
<figure id="attachment_1547" aria-describedby="caption-attachment-1547" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1547" data-permalink="http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/malware-but-dashboards-show-green/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?fit=800%2C600&amp;ssl=1" data-orig-size="800,600" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="but my av dashboard&#8230;" data-image-description="&lt;p&gt;but my av dashboard&#8230;&lt;/p&gt;
" data-image-caption="&lt;p&gt;but my av dashboard&#8230;&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?fit=800%2C600&amp;ssl=1" class="size-medium wp-image-1547" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?resize=300%2C225&#038;ssl=1" alt="but my av dashboard..." width="300" height="225" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?resize=768%2C576&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/malware-but-dashboards-show-green.png?w=800&amp;ssl=1 800w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1547" class="wp-caption-text">Your AV is green&#8230;</figcaption></figure>
<p>The problem is that this dashboard doesn&#8217;t tell you anything useful. If your organisation has 200 systems, you could have 10 totally unpatched and 4 without any functional AV and still show green on the dashboard. One phishing campaign and 4 &#8211; 10 machines are compromised. All the while, your dashboards show green and the attacker steals data.</p>
<p>So, is there really any value in this obsession with metrics?</p>
<p>Actually, yes. Metrics do have a place in every organisation. Just not driving dashboard showing your executive view of security. Its important to pick good, effective metrics. It is more important to truly understand the message they give you.</p>
<h2>Dashboards, what are they good for?</h2>
<p>Actually, lots of things.</p>
<p>Metrics are best at showing things which are changing towards a target. They are brilliant at project measurements. Also, they are good at showing progress towards a goal. These are all areas where metrics excel.</p>
<p>When it comes to &#8220;steady state&#8221; measurements, it is a bit different. They can do it, but you need to realise they are telling you something different. Metrics tell you what your risk level is and help drive improvements. They help support compliance programs. This is all useful stuff.</p>
<p>However, most dashboards don&#8217;t give you situational awareness. Don&#8217;t let them trick you into thinking they do. Real operational dashboards take a lot of effort to create and manage. If you have an out-of-the box product, you don&#8217;t have this.</p>
<h2>What should you do?</h2>
<p>If your dashboards are basically compliance reports, then accept it. Compliance is good but it isn&#8217;t security. Educate yourself that green doesn&#8217;t mean secure, it just means things are operating. Use them to inform your risk management but remember 1 vulnerable device is enough to compromise your entire network.</p>
<p>Take time to decide if you want security metrics. If you do, fully understand what you want them for. Without this, your dashboards will be pointless. Try to avoid simply googling for ideas. Good security metrics come from your organisations controls &amp; requirements &#8211; not a template.</p>
<p>If you really want security monitoring, then don&#8217;t go for dashboards, monitor your enterprise. Centrally log events, look for malicious activity and threat hunt. You can measure this but it will never look good on a dashboard.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/">Dashboards vs Security &#8211; are they really helping?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2017/03/dashboards-vs-security-really-helping/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1539</post-id>	</item>
		<item>
		<title>Security Incident Response Really Does Matter</title>
		<link>http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Wed, 08 Mar 2017 21:42:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1523</guid>

					<description><![CDATA[<p>Incident response is one of those things you really hope you&#8217;ll never have to use, but know you will. Or at least you should know! Even with the best security, there will come a day when you are up to your eyes in chaos. Either a live security incident or, worse still, picking up the pieces [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/">Security Incident Response Really Does Matter</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Incident response is one of those things you really hope you&#8217;ll never have to use, but know you will. Or at least you should know! Even with the best security, there will come a day when you are up to your eyes in chaos. Either a live security incident or, worse still, picking up the pieces after a breach.</p>
<p>This has stood out a couple of times recently. Someone <a href="http://edition.cnn.com/2017/03/08/politics/philip-mudd-cia-wikileaks/index.html" target="_blank">appears to have breached</a> the US Central Intelligence Agency and, at the opposite end of the spectrum, a small business in the UK looks seriously hacked. Two events which, although unrelated, show that whoever you are, security events are inevitable. Equally inevitable, some will turn into a full blown incident. At this point you realise you have either planned and prepared properly or suffer the consequences.</p>
<h2>The UK angle &#8211; SME hacked</h2>
<figure id="attachment_1524" aria-describedby="caption-attachment-1524" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1524" data-permalink="http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/chilternseeds/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?fit=2483%2C1621&amp;ssl=1" data-orig-size="2483,1621" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Impact &#8211; Chiltern Seeds" data-image-description="&lt;p&gt;Incident Impact &#8211; Chiltern Seeds&lt;/p&gt;
" data-image-caption="&lt;p&gt;Incident Impact &#8211; Chiltern Seeds&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?fit=300%2C196&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?fit=1024%2C669&amp;ssl=1" class="size-medium wp-image-1524" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?resize=300%2C196&#038;ssl=1" alt="Incident Impact - Chiltern Seeds" width="300" height="196" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?resize=300%2C196&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?resize=768%2C501&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?resize=1024%2C669&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/ChilternSeeds.png?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1524" class="wp-caption-text">Incident Impact &#8211; Chiltern Seeds</figcaption></figure>
<p><a href="http://www.chilternseeds.co.uk" target="_blank">Chiltern Seeds </a>is a UK based, family run business offering seeds and plants with a personal touch from a small team. They have a web presence which enables them to service customers across the UK. From the available information, they didn&#8217;t cut corners. A custom built website supports customers. Payments go to a dedicated provider. Good web practices.</p>
<p>All of this is good stuff. It isn&#8217;t enough to guarantee never having an incident though.</p>
<p>At the end of February, they suffered a web outage, followed over the next few days with customers (and curiously some non-customers) getting a very well phrased phishing email. This took them to a page trying to steal payment card information. <a href="https://myonlinesecurity.co.uk/spoofed-chiltern-seeds-delivery-confirmation-you-have-won-a-hamper-scam/" target="_blank">Details</a> of this stage of the incident are online and well worth reading.</p>
<p>This is a terrible situation for any business, especially a small one who is unlikely to have a dedicated incident response (IR) team. The problem is that this is fairly common. Equally common is the lack of IR preparation. This is where &#8220;bad&#8221; gets worse. No preparation basically means no real incident response.</p>
<p>There is more pain for Chiltern Seeds with IR work happening in the public domain. Customers (admittedly tech savvy ones) are looking into the incident and drawing conclusions. Customers are challenging the claims made by Chiltern Seeds and for a time at least, they have lost control of the narrative. A bad situation is at risk of spiralling out of control.</p>
<p>IR is there to stop this.</p>
<h2>Incident Response &#8211; do better!</h2>
<p>This post cant cover every possible situation or every possible response scenario. If we tried, it would still fail because IR has to align to your business. However, there are principles to follow.</p>
<h3>Plan. Then plan. And then plan some more.</h3>
<figure id="attachment_1528" aria-describedby="caption-attachment-1528" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1528" data-permalink="http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/hacked/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?fit=900%2C563&amp;ssl=1" data-orig-size="900,563" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Hacked? Time for incident response&#8230;" data-image-description="&lt;p&gt;Hacked? Time for incident response&#8230;&lt;/p&gt;
" data-image-caption="&lt;p&gt;Hacked? Time for incident response&#8230;&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?fit=300%2C188&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?fit=900%2C563&amp;ssl=1" class="wp-image-1528 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?resize=300%2C188&#038;ssl=1" alt="Hacked? Time for incident response..." width="300" height="188" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?resize=300%2C188&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?resize=768%2C480&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2017/03/hacked.png?w=900&amp;ssl=1 900w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1528" class="wp-caption-text">Hacked? Time for incident response&#8230;</figcaption></figure>
<p>First of all, if you take no other action, come up with an incident response plan. Decide right now what you will do if bad things happen. Don&#8217;t try to plan for every possible incident, just plan for high level events. Involve <a href="http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/" target="_blank">key stakeholders </a>are ensure everyone has an idea of what to do. This is essential if you don&#8217;t want to panic when something goes wrong in the middle of the night.</p>
<p>Examples of high level events you should plan for:</p>
<ul>
<li>Denial of service attack on your websites</li>
<li>Malicious software or unusual code on your sites</li>
<li>Customers reporting suspicious activity</li>
<li>Unusual events on your firewall or web proxy</li>
<li>Phishing emails</li>
</ul>
<p>A fundamental rule is that more planning leads to a better response. There is no escaping this. Accept it and plan.</p>
<h3>Scan and Monitor</h3>
<p>Your incident response plan is useless if it never triggers. This is more important than you might imagine. If you don&#8217;t know you&#8217;ve been hacked, you cant respond to it. Additionally, if you only find out about an incident from your customers, it is way too late.</p>
<p>You fix this problem by creating awareness. This includes scanning, logging and, most importantly, analysing the data. However you do this doesn&#8217;t matter, just do it. Some key considerations are:</p>
<ul>
<li>Learn what your customer facing website code should look like and scan for changes</li>
<li>Monitor the traffic going through your firewall</li>
<li>Monitor changes on your PCs, Databases and code repositories</li>
<li>Scan for vulnerabilities and missing patches</li>
<li>Scan for sensitive data in the wrong place (such as a PHP include with DB login credentials stored in the root of your webserver)</li>
</ul>
<h3>Respond to the incident at a speed you can manage.</h3>
<p>When the inevitable happens, you have to take action. This is where your planning earns its money. Don&#8217;t allow the stress and uncertainty of the incident to make you take action before you are ready. One major mistake from the 2015 <a href="https://www.engadget.com/2015/10/23/talktalk-hack-explainer/" target="_blank">TalkTalk hack </a>was engaging with the media faster than the incident response teams could gather information. This meant that the message to the public was often confusing and contradictory.</p>
<p>It is vital to engage with the media and your customers quickly. But it is more important to do it accurately. If your message is slow, people will complain. A constantly changing message will create confusion. However, if your message is wrong, it can be catastrophic.</p>
<p>The important thing to remember is that the better you plan, the better your incident response will be. If you want to communicate fast and often, your plan must support it.</p>
<h2>Incident Response Matters. Take it seriously.</h2>
<p>That is the crucial message here. No matter the size of your organisation, if you have computers or a website, something bad will happen. Don&#8217;t be surprised when it does, because <strong>you know you need an incident response plan</strong>.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2017/03/security-incident-response-matters/">Security Incident Response Really Does Matter</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1523</post-id>	</item>
		<item>
		<title>North Wales Cyber Security Cluster &#8211; April 2016 Meeting</title>
		<link>http://www.halkynconsulting.co.uk/a/2016/04/north-wales-cyber-security-cluster/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 18 Apr 2016 07:45:00 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Education and Awareness]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Cyber Security Cluster]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1481</guid>

					<description><![CDATA[<p>The North Wales Cyber Security Cluster is meeting on 21 April at Solvings Ltd, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn about cyber security. Access to cluster meetings is free and everyone is welcome. No prior knowledge is needed. There really are no stupid questions! Clusters [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/04/north-wales-cyber-security-cluster/">North Wales Cyber Security Cluster &#8211; April 2016 Meeting</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1482" aria-describedby="caption-attachment-1482" style="width: 300px" class="wp-caption alignright"><a href="http://northwalescyber.net/" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1482" data-permalink="http://www.halkynconsulting.co.uk/a/2016/04/north-wales-cyber-security-cluster/cybercluster-april2016/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?fit=800%2C454&amp;ssl=1" data-orig-size="800,454" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Cyber Security Cluster &#8211; April 2016" data-image-description="&lt;p&gt;Cyber Security Cluster &#8211; April 2016&lt;/p&gt;
" data-image-caption="&lt;p&gt;Cyber Security Cluster &#8211; April 2016 meeting&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?fit=300%2C170&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?fit=800%2C454&amp;ssl=1" class="size-medium wp-image-1482" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?resize=300%2C170&#038;ssl=1" alt="Cyber Security Cluster - April 2016" width="300" height="170" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?resize=300%2C170&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?resize=768%2C436&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/04/cybercluster-april2016.png?w=800&amp;ssl=1 800w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1482" class="wp-caption-text">Cyber Security Cluster &#8211; April 2016 meeting</figcaption></figure>
<p>The North Wales Cyber Security Cluster is meeting on 21 April at <a href="http://www.solvings.com/" target="_blank">Solvings Ltd</a>, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn about cyber security.</p>
<p>Access to cluster meetings is free and everyone is welcome. No prior knowledge is needed. There really are no stupid questions!</p>
<p>Clusters exist <a href="http://www.ukcybersecurityforum.com/index.php/cyber-security-clusters" target="_blank">across the UK</a> and grew out of the UK Governments Cyber Security Strategy. In North Wales, meetings are monthly. Each session comprises a mix of presentations, information sharing and networking.</p>
<p>Halkyn Consulting is proud to be presenting a session on cyber attacks for the April meeting. We will look at why cyber security is different &amp; why it matters. Following this, we will cover hackers. This will include what motivates them and what techniques they use.</p>
<p>In this session we will also present a case study involving a live &#8220;hacking&#8221; demonstration. This is based on an investigation we carried out for a UK client. The demonstration will show, in near real time, how swiftly hackers can compromise a system. This is true, even for a fairly well secured system.</p>
<p>If time allows, we will cover some additional cases involving blended attacks and newer tools. All of this is based on real-world examples of attacks hitting UK businesses.</p>
<p>To close our session, we will talk about incident response. This is a crucial part of every cyber security plan. We will look at three common IR models. We will also briefly cover the six steps of incident response. A future session will concentrate this in more detail.</p>
<p>Everyone really is welcome to the Cyber Security Cluster. Free up a couple of hours on Thursday and pop in to say hello. Please help to spread the word. North Wales can be a centre of Cyber Security excellence.</p>
<p>You can <a href="https://www.eventbrite.co.uk/e/north-wales-cyber-security-cluster-april-2016-tickets-24604494706" target="_blank">register for a seat via EventBrite</a> or even just turn up on the day. See you there!</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/04/north-wales-cyber-security-cluster/">North Wales Cyber Security Cluster &#8211; April 2016 Meeting</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1481</post-id>	</item>
		<item>
		<title>Ransomware: Don&#8217;t panic &#8211; deal with it</title>
		<link>http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Tue, 22 Mar 2016 22:32:51 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Essentials]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1468</guid>

					<description><![CDATA[<p>Since Cryptolocker appeared in late 2013, it seems hardly a day can go by without some ransomware attack hitting the news. The variations all have entertaining names like Teslacrypt, Locky, PayCrypt (etc). The impact on the victims can be monumental. Tracking sites show new versions appearing several times a day &#8211; much faster than most [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/">Ransomware: Don&#8217;t panic &#8211; deal with it</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1469" aria-describedby="caption-attachment-1469" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/ransomware/" rel="attachment wp-att-1469"><img loading="lazy" decoding="async" data-attachment-id="1469" data-permalink="http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/ransomware/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/ransomware.png?fit=590%2C428&amp;ssl=1" data-orig-size="590,428" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Ransomware bites hard but good security controls are effective" data-image-description="&lt;p&gt;Ransomware bites hard but good security controls are effective&lt;/p&gt;
" data-image-caption="&lt;p&gt;Ransomware bites hard but good security controls are effective&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/ransomware.png?fit=300%2C218&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/ransomware.png?fit=590%2C428&amp;ssl=1" class="size-medium wp-image-1469" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/ransomware.png?resize=300%2C218&#038;ssl=1" alt="Ransomware bites hard but good security controls are effective" width="300" height="218" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/ransomware.png?resize=300%2C218&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/ransomware.png?w=590&amp;ssl=1 590w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1469" class="wp-caption-text">Ransomware bites hard but good security controls are effective</figcaption></figure>
<p>Since Cryptolocker appeared in late 2013, it seems hardly a day can go by without some ransomware attack hitting the news. The variations all have entertaining names like Teslacrypt, Locky, PayCrypt (etc). The impact on the victims can be monumental. Tracking sites show new versions appearing several times a day &#8211; much faster than most Anti-Virus products update their definition files. If you are infected, your files really are lost unless you pay.</p>
<p>All of this points to a specific type of malicious software which is causing some very, very big problems to businesses and home users across the globe. In late 2015, even the <a href="https://securityledger.com/2015/10/fbis-advice-on-cryptolocker-just-pay-the-ransom/" target="_blank" rel="noopener noreferrer">FBI suggested paying the ransom</a> was the only option for some victims.</p>
<p>But it doesnt have to be this way. <a href="#ransomwaresimplesteps" target="_blank" rel="noopener noreferrer">Simple steps</a> can prevent infections. Simple steps can allow you to recover.</p>
<p>If you access the internet or read email ransomware is attacking you. Dont be scared about it. Dont be overwhelmed. Dont think it is not important enough. Dont procrastinate. Just deal with it today.</p>
<h2>What is ransomware?</h2>
<p>From <a href="https://en.wikipedia.org/wiki/Ransomware" target="_blank" rel="noopener noreferrer">Wikipedia</a>:</p>
<blockquote><p><b>Ransomware</b> is a type of malware that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction.</p></blockquote>
<p>Although only really in the news a lot now, this type of malware has been around for a long time. In 1989 &#8220;PC Cyborg&#8221; was locking users computers and spreading via floppy disks. As the internet evolved, so did the ransomware. For a long time, the attacks came in via email and only hit Windows users. However, things are changing. Research indicates that over 50% of infections are from users accessing malicious webpages. This year (2016) has now seen the first OSX ransomware infections hitting Mac users.</p>
<p>The reality is that this is so profitable, criminals will put a lot of effort into keeping it working. If your defences stand still, it will beat you.</p>
<h3>Common Myths</h3>
<p>There are some common misconceptions around ransomware which hinder investigations. Don&#8217;t hinder your response by barking up the wrong tree.</p>
<ul>
<li><strong>Myth 1: Ransomware is always sent by email</strong>. Far from it. Two years ago this was true, but in the last 18 months things have changed. While email is still a common attack vector, more users are compromised by browser exploits.</li>
<li><strong>Myth 2: Ransomware is infectious</strong>. Most people&#8217;s experience of malware is with a virus that spreads by infecting machine after machine. Current versions of ransomware, however do not do this. By its nature, this type of attack tends to be a single shot, with each user having to be infected directly by the source.</li>
<li><strong>Myth 3: Ransomware targets businesses</strong>. No. Most attacks are targeting home users. This is where the attackers make their money. The assumption is corporate environments can recover without paying. However, attackers don&#8217;t tend to be choosy, so businesses do get hit.</li>
<li><strong>Myth 4: Multiple attacks mean targeting</strong>. Still no. Ransomware is so common you cant ever assume that several users getting infected is sign that your business is being targeted. It just means attackers have a big list of your email addresses or your users all visit the same sites.</li>
<li><strong>Myth 5: Only people who visit dodgy sites get attacked</strong>. Modern attacks are delivered through otherwise legitimate content delivery networks. Ransomware has infected visitors to newspaper websites, Yahoo pages and much more. Any internet activity can lead to an infection.</li>
</ul>
<h2 id="ransomwaresimplesteps">Dealing with Ransomware &#8211; Simple Steps</h2>
<figure id="attachment_1472" aria-describedby="caption-attachment-1472" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1472" data-permalink="http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/ransomwareresponse-highlevelsteps/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/RansomwareResponse-HighLevelSteps.png?fit=487%2C411&amp;ssl=1" data-orig-size="487,411" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Ransomware Response &#8211; High Level Steps" data-image-description="&lt;p&gt;2 simple steps for dealing with ransomware.&lt;/p&gt;
" data-image-caption="&lt;p&gt;2 simple steps for dealing with ransomware.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/RansomwareResponse-HighLevelSteps.png?fit=300%2C253&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/RansomwareResponse-HighLevelSteps.png?fit=487%2C411&amp;ssl=1" class="size-medium wp-image-1472" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/RansomwareResponse-HighLevelSteps.png?resize=300%2C253&#038;ssl=1" alt="2 simple steps for dealing with ransomware." width="300" height="253" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/RansomwareResponse-HighLevelSteps.png?resize=300%2C253&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/03/RansomwareResponse-HighLevelSteps.png?w=487&amp;ssl=1 487w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1472" class="wp-caption-text">2 simple stages in dealing with ransomware.</figcaption></figure>
<p>For all the trouble it causes, dealing with this form of malware is actually quite simple.</p>
<p>First and foremost is preventing the attacks. This is really important.</p>
<p>However before you go any further, you need to fully understand that <strong>nothing</strong> will be 100% effective. The more users you have, the greater the chance of an infection. Our experience is that in a given month, you should expect 1 successful infection for every 5000 users you have.</p>
<p>Accept this. Put good controls in place but realise that you will still need to respond.</p>
<h3>Prevention first</h3>
<p>Good preventive controls will eliminate 80 &#8211; 90% of all malware attacks, including ransomware. The exact level of detail will depend on your environment so make sure you plan this properly.</p>
<p>Start with the basics:</p>
<ol>
<li><strong>Patch</strong>. Most ransomware attacks exploit unpatched systems. When patches are released you need to apply them as soon as practical. The longer you delay, the greater the risk.</li>
<li><strong>Filter emails</strong>. You need to inspect anything coming into your environment. Use a good mail filter. Block incoming phishing attacks. Block spoofed mails. Block suspicious attachments. Never trust email. Never allow files with .js, .exe, .wsf or .scr extensions. Scan zip files. Still dont trust email.</li>
<li><strong>Run AntiVirus</strong>. While it isn&#8217;t perfect, <a href="http://www.halkynconsulting.co.uk/a/2015/10/av-is-not-dead-it-just-has-limits/">AV really isnt dead</a>. If you run a good AV tool, with regular updates and heuristics enabled, most ransomware attacks will be blocked. Brand new variants will still get through, but you will be protected against the thousands and thousands of older versions.</li>
<li><strong>Use your firewall</strong>. Make sure your firewall blocks outbound connections to known C&amp;C servers. This can disrupt the ransomware as it tries to get the encryption keys, preventing it from running. It isn&#8217;t perfect but without it, life is harder.</li>
<li><strong>Minimise privileged accounts</strong>. Administrator accounts must never be used for routine activity. Privilege escalation must be controlled and, ideally, requires manual credential entry each time. If you absolutely must allow privileged accounts access to the internet, this should be whitelisted. Privileged accounts must never be used to access email. If a privileged account is infected by ransomware everything is much, much worse.</li>
<li><strong>Backup. Backup. Backup. Backup</strong>. Take backups. Backup everything you can. Data storage is cheap so there is very little reason to not take copies of everything. The more you backup, the faster you can recover from ANY problem. Take daily, weekly, monthly backups. Test and verify them on a regular basis. It is important to make sure any backups you take are &#8220;offline&#8221; otherwise ransomware can hit them as well as your life system.</li>
</ol>
<p>Once you have all that, look to up your game:</p>
<ol>
<li><strong>Manage Network Shares</strong>. This is the biggest problem for most businesses. Infected users end up destroying files belonging to everyone else because network shares are badly managed. Make sure users only access folders they need to access. If you can, make sure network shares are not mapped as drive letters. Never allow the <em>everyone</em> or <em>all users</em> AD groups to have read/write access.</li>
<li><strong>Harden your browsers</strong>. Restrict what people can do with downloaded files. Make sure browser activity is AV scanned.</li>
<li><strong>Manage application paths</strong>. Use GPO or similar to prevent software from running in &#8220;unusual&#8221; locations. Never allow files to run from <code>%LocalAppData%</code> locations. Ideally whitelist applications you allow to run rather than try to block the ones you dont want.</li>
<li><strong>Aggressively filter email</strong>. Scan everything. Block macros in attachments. Block anything you cant scan. Sandbox everything which comes in.</li>
<li><strong>Install ad-blockers and disable flash</strong>. This closes the door on two of the most common web-based attack vectors.</li>
</ol>
<h3>If ransomware prevention fails, respond</h3>
<p>Respond, but respond properly. Most of the harm from ransomware is the result of confused, delayed or inconsistent activity by the people tasked with responding.</p>
<p><strong>Step 1</strong>: Have an incident response plan and stick to it. Don&#8217;t allow panic or knee-jerk reactions to dominate during an attack or things will go wrong. Make the plan when things are calm and trust it. If its bad, fix it <em>after</em> the incident, not during.</p>
<p><strong>Step 2</strong>: Dont panic. Ransomware doesnt spread from machine to machine. Take rational steps to minimise business impact. Ignore the people who are screaming about disconnecting everything or shutting everything down. Follow your IR Plan.</p>
<p><strong>Step 3</strong>: Know where you are in the attack chain. If you&#8217;ve discovered the &#8220;ransom note&#8221; its too late to do anything to prevent the attack. However if your SIEM has alerted to an blocked outbound connection to a C&amp;C server, you can do things.</p>
<p><strong>Step 4</strong>: Dont panic. Seriously. Think carefully about what has happened. If you find the ransom note, there is almost zero value in shutting things down or disconnecting services. The attack is already over. All you are doing is hurting your business more.</p>
<p><strong>Step 5</strong>: Identify the point of infection. The first rule is that if you find encrypted files on a server, it probably isn&#8217;t the source of the infection. Remember, ransomware attacks people so only systems which allow web-browsing or email can be the source. Don&#8217;t waste time looking in the wrong place. Use file modification timestamps and ownership to identify the source. This means you shouldn&#8217;t rush in and destroy the evidence.</p>
<p><strong>Step 6</strong>: Still dont panic. It is only ransomware. It wont spread from machine to machine. It has either been blocked or finished its attack. Stay calm and follow your IR plan.</p>
<p><strong>Step 7</strong>: Clean the source. When you find Patient Zero, clean their system. Ideally rebuild the OS and reset all account credentials. Find out what let the ransomware in and implement fixes.</p>
<p><strong>Step 5</strong>: Clean and restore the rest of the environment. Delete the encrypted files and restore from backups. Get your business up and running again quickly.</p>
<p>Assuming you have good backups, following this process means you will lose, at most, a few hours work for one user and a couple of hours to restore backup files.</p>
<p>This is a far cry from the <a href="http://www.theguardian.com/technology/2016/feb/17/los-angeles-hospital-hacked-ransom-bitcoin-hollywood-presbyterian-medical-center" target="_blank" rel="noopener noreferrer">Hollywood Presbyterian Medical Center</a> which paid a ransom of US$17,000 or <a href="http://siliconangle.com/blog/2016/03/22/ransomware-holds-hospital-data-hostage/" target="_blank" rel="noopener noreferrer">Kentucky’s Methodist Hospital</a> which declared a state of emergency to deal with a ransomware attack. It is also quite different from <a href="http://www.bbc.co.uk/news/uk-england-lincolnshire-35443434" target="_blank" rel="noopener noreferrer">Lincolnshire County Council</a> which had to shut down all its IT services for five days to deal with one ransomware attack. On a smaller scale, although possibly with much greater impact, dont be like the <a href="http://www.dailypost.co.uk/news/north-wales-news/rhyl-businessman-held-ransom-online-10807004" target="_blank" rel="noopener noreferrer">Denbighshire based small business</a> which was nearly wiped out by ransomware.</p>
<p>Don&#8217;t make the same mistakes. Implement good practices. Plan well. Prepare for attacks and respond to ransomware in an appropriate manner. Don&#8217;t make a bad situation worse, just deal with the attack.</p>
<p>Keep in mind, <a href="https://www.cyberstreetwise.com/cyberessentials/" target="_blank" rel="noopener noreferrer">Cyber Essentials</a> is a UK government initiative which is geared towards organisations implementing cost-effective controls which are very effective at minimising the risks from attacks like ransomware. If you achieve certification then there is a good chance you&#8217;ve covered the basic requirements! <a href="http://halkynconsulting.co.uk/security/contact-security-team" target="_blank" rel="noopener noreferrer">Get in touch</a> if you want to find out more about how you can become Cyber Essentials certified and protect your business &amp; your supply chain.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/">Ransomware: Don&#8217;t panic &#8211; deal with it</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2016/03/ransomware-dont-panic-deal/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1468</post-id>	</item>
		<item>
		<title>Cyber Essentials &#8211; Would it have saved Lincolnshire County Council?</title>
		<link>http://www.halkynconsulting.co.uk/a/2016/02/cyber-essentials-would-it-have-saved-lincolnshire-county-council/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 01 Feb 2016 09:00:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Essentials]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1451</guid>

					<description><![CDATA[<p>Cyber Essentials is a UK Government driven scheme which is designed to help businesses of all size reduce the risk and impact from malware attacks. It is mandatory for those who provide services to the MOD. Cyber Essentials is becoming mandatory for those who provide services to any other government department &#8211; including local government [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/02/cyber-essentials-would-it-have-saved-lincolnshire-county-council/">Cyber Essentials &#8211; Would it have saved Lincolnshire County Council?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1452" aria-describedby="caption-attachment-1452" style="width: 279px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1452" data-permalink="http://www.halkynconsulting.co.uk/a/2016/02/cyber-essentials-would-it-have-saved-lincolnshire-county-council/cyber-essentials-logo/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/Cyber-Essentials-Logo.png?fit=279%2C262&amp;ssl=1" data-orig-size="279,262" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Cyber Essentials &#8211; Foundational Cyber Security" data-image-description="&lt;p&gt;Cyber Essentials &#8211; Foundational Cyber Security&lt;/p&gt;
" data-image-caption="&lt;p&gt;Cyber Essentials &#8211; Foundational Cyber Security&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/Cyber-Essentials-Logo.png?fit=279%2C262&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/Cyber-Essentials-Logo.png?fit=279%2C262&amp;ssl=1" class="size-full wp-image-1452" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/Cyber-Essentials-Logo.png?resize=279%2C262&#038;ssl=1" alt="Cyber Essentials - Foundational Cyber Security" width="279" height="262" data-recalc-dims="1" /><figcaption id="caption-attachment-1452" class="wp-caption-text">Cyber Essentials &#8211; Foundational Cyber Security</figcaption></figure>
<p>Cyber Essentials is a UK Government driven scheme which is designed to help businesses of all size reduce the risk and impact from malware attacks. It is mandatory for those who provide services to the MOD. Cyber Essentials is becoming mandatory for those who provide services to any other government department &#8211; including local government and councils.</p>
<p>This is a good thing.</p>
<p>Despite there being some criticisms of Cyber Essentials, the scheme does what it says on the tin. It helps businesses prevent things like ransomware knocking them out.</p>
<p>Sadly, not every government department practices what they preach.</p>
<figure id="attachment_1454" aria-describedby="caption-attachment-1454" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1454" data-permalink="http://www.halkynconsulting.co.uk/a/2016/02/cyber-essentials-would-it-have-saved-lincolnshire-county-council/lincolnshirecountycouncil/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?fit=971%2C767&amp;ssl=1" data-orig-size="971,767" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Lincolnshire County Council &#8211; Hit by ransomware Jan 2016" data-image-description="&lt;p&gt;Lincolnshire County Council &#8211; Hit by ransomware Jan 2016&lt;/p&gt;
" data-image-caption="&lt;p&gt;Lincolnshire County Council &#8211; Hit by ransomware Jan 2016&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?fit=300%2C237&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?fit=971%2C767&amp;ssl=1" class="size-medium wp-image-1454" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?resize=300%2C237&#038;ssl=1" alt="Lincolnshire County Council - Hit by ransomware Jan 2016" width="300" height="237" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?resize=300%2C237&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?resize=768%2C607&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/02/LincolnshireCountyCouncil.png?w=971&amp;ssl=1 971w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1454" class="wp-caption-text">Lincolnshire County Council &#8211; Hit by ransomware Jan 2016</figcaption></figure>
<p>Around 26 January 2016, Lincolnshire County Council was hit with a ransomware attack. Initial <a href="http://www.bbc.co.uk/news/uk-england-lincolnshire-35443434" target="_blank">reports from the BBC </a>claimed the demands were for £1m. However by the end of the week this <a href="http://www.bbc.co.uk/news/uk-england-lincolnshire-35453801" target="_blank">had been corrected</a> to the more <em>normal</em> £300.</p>
<p>Ransomware can be devastating for home users. It has the potential to destroy priceless data. Few home users take proper back ups and end up having to pay. This means there is a lot of money to be made.</p>
<p>Organisations are different. The assumption is they will have backups. There is also an assumption they will never pay. This all means criminals very rarely target businesses with ransomware. What is likely to have happened is simply a user made a mistake with their email.</p>
<p>This happens a lot. It is also one of the reasons why Cyber Essentials was created and why it is so valuable for businesses.</p>
<h2>Would Cyber Essentials Have Helped?</h2>
<p>Within the Cyber Essentials framework there are five security control areas. These are the foundations of good security.</p>
<ol>
<li>Boundary Firewalls &amp; Internet Gateways.</li>
<li>Secure Configuration.</li>
<li>Access Control.</li>
<li>Malware Protection.</li>
<li>Patch Management.</li>
</ol>
<p>As you can see, it is simple. It is also very effective. Good controls for all five are likely to have prevented the ransomware attack. Even if they didn&#8217;t, the Council could have bounced back in less than a week.</p>
<p>If Cyber Essentials had been in place, the following should have worked:</p>
<ul>
<li>The initial phishing attack should have been detected at the boundary.</li>
<li>If devices were properly configured, ransomware would struggle to run. There would also be no fear of lateral movement. This fear forced the council to shut down all services for a week.</li>
<li>Secure configuration also includes a working backup policy. Taking a week to restore from backups is shocking.</li>
<li>Good access control policies would prevent the ransomware encrypting anything other than the files belonging to the infected user.</li>
<li>Having effective anti-malware means using more than &#8220;signature based&#8221; detection. The news reports all state this ransomware variant was too new for AV signatures. This means that they were not using heuristics&#8230;.</li>
<li>Most, if not all, ransomware relies on systems missing critical patches.</li>
</ul>
<p>In a nutshell, Cyber Essentials would have saved the Council here. The worst that ransomware should do is a few hours downtime for one user while you restore from backups. Everything else means you&#8217;ve made major mistakes.</p>
<p>Ransomware isn&#8217;t new. It shouldn&#8217;t be unexpected. Suffering from it should no longer be acceptable. If you outsource, you absolutely MUST ensure your provider knows what they are doing. This does not seem to be the case here.</p>
<p>Cyber Essentials is not a silver bullet. However, it will prevent 80% of cyber attacks.</p>
<p>Is there a good reason to not have Cyber Essentials?</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/02/cyber-essentials-would-it-have-saved-lincolnshire-county-council/">Cyber Essentials &#8211; Would it have saved Lincolnshire County Council?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1451</post-id>	</item>
		<item>
		<title>3 essential elements of any Infosec function</title>
		<link>http://www.halkynconsulting.co.uk/a/2016/01/infosec-3-essential-elements-of-your-team/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 08 Jan 2016 21:06:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1436</guid>

					<description><![CDATA[<p>As the news often shows, Information Security (infosec) is a big part of any organisation. From the small business with just a couple of computers to the global enterprise, infosec wraps around what you do, keeping you safe. Infosec is the function which keeps you servicing your customers. It protects your data. It ensures that [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/01/infosec-3-essential-elements-of-your-team/">3 essential elements of any Infosec function</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1437" aria-describedby="caption-attachment-1437" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1437" data-permalink="http://www.halkynconsulting.co.uk/a/2016/01/infosec-3-essential-elements-of-your-team/887808_82418671/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?fit=2492%2C1900&amp;ssl=1" data-orig-size="2492,1900" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Infosec &#8211; its a team sport" data-image-description="&lt;p&gt;Infosec &#8211; its a team sport&lt;/p&gt;
" data-image-caption="&lt;p&gt;Infosec &#8211; its a team sport&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?fit=300%2C229&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?fit=1024%2C781&amp;ssl=1" class="wp-image-1437 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?resize=300%2C229&#038;ssl=1" alt="Infosec - its a team sport" width="300" height="229" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?resize=300%2C229&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?resize=768%2C586&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?resize=1024%2C781&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/887808_82418671.jpg?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1437" class="wp-caption-text">Infosec &#8211; its a team sport</figcaption></figure>
<p>As the news often shows, Information Security (infosec) is a big part of any organisation. From the small business with just a couple of computers to the global enterprise, infosec wraps around what you do, keeping you safe.</p>
<p>Infosec is the function which keeps you servicing your customers. It protects your data. It ensures that you have a reasonable chance of still working tomorrow.</p>
<p>The challenge is not in realising the need for information security, it is in making it work.</p>
<p>At a very high level you need to ensure that three key elements are in place. With them, you can get world class security. Without them, you will always be behind the curve.</p>
<h2>Essential Elements for World Class Infosec in your Business</h2>
<h3>Good, internal, security team.</h3>
<figure id="attachment_1442" aria-describedby="caption-attachment-1442" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1442" data-permalink="http://www.halkynconsulting.co.uk/a/2016/01/infosec-3-essential-elements-of-your-team/infosecteam/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?fit=2161%2C1849&amp;ssl=1" data-orig-size="2161,1849" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Internal Infosec Team &#8211; The Foundation of Everything." data-image-description="&lt;p&gt;Internal Infosec Team &#8211; The Foundation of Everything.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Internal Infosec Team &#8211; The Foundation of Everything.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?fit=300%2C257&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?fit=1024%2C876&amp;ssl=1" class="size-medium wp-image-1442" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?resize=300%2C257&#038;ssl=1" alt="Internal Infosec Team - The Foundation of Everything." width="300" height="257" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?resize=300%2C257&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?resize=768%2C657&amp;ssl=1 768w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/infosecteam.jpg?resize=1024%2C876&amp;ssl=1 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1442" class="wp-caption-text">Internal Infosec Team &#8211; The Foundation of Everything.</figcaption></figure>
<p>This forms the foundations of everything you do so they need to be good. If your team is &#8220;average&#8221; or worse, fix that before you do anything else.</p>
<p>A good, internal, infosec team will allow you to improve and grow. These will be the people who know everything about your organisation. Your internal team will know where the problems are. They will know who is responsible for systems. They will know what is normal and what isn&#8217;t.</p>
<p>With a good internal team, you can parachute in external support and things will just work. It is hard to overstate how important this actually is. One of the biggest mistakes companies make is paying for external services without the internal framework to support it. Avoid this mistake at all costs.</p>
<h3>Good external infosec consultants.</h3>
<figure id="attachment_1444" aria-describedby="caption-attachment-1444" style="width: 198px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/contact/contact-security-team" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1444" data-permalink="http://www.halkynconsulting.co.uk/a/2016/01/infosec-3-essential-elements-of-your-team/halkynsecurityinfosecconsultants/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/HalkynSecurityInfoSecConsultants.png?fit=198%2C185&amp;ssl=1" data-orig-size="198,185" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Halkyn Security Consultants &#8211; Infosec Experts" data-image-description="&lt;p&gt;Expert External Infosec Consultants &#8211; Halkyn Consulting.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Expert External Infosec Consultants &#8211; Halkyn Consulting.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/HalkynSecurityInfoSecConsultants.png?fit=198%2C185&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/HalkynSecurityInfoSecConsultants.png?fit=198%2C185&amp;ssl=1" class="wp-image-1444 size-full" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2016/01/HalkynSecurityInfoSecConsultants.png?resize=198%2C185&#038;ssl=1" alt="Expert External Infosec Consultants - Halkyn Consulting." width="198" height="185" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1444" class="wp-caption-text">Expert External Infosec Consultants &#8211; Halkyn Consulting.</figcaption></figure>
<p>Your internal team learn your environment inside out. They become experts in it. However you also need experts on the outside world. Techniques change. Good practice evolves.</p>
<p>Your great internal team needs fresh ideas and fresh input. Rather than have a staff churn, external consultants can provide this.</p>
<p>External consultants can also provide the infosec &#8220;bigger picture.&#8221; By bringing experience from other companies, they can help you change your ways for the better. This allows you to learn from the pain others have felt.</p>
<p>Sometimes internal infosec teams feel threatened by external consultants, so you need to manage this. Make it clear that the external experts are there to help and support. If you get this right, you will significantly enhance your security.</p>
<p>If you are building a security team from the ground up, then external consultants can give you the knowledge to get things moving. The consultants can help you select a team. They can train your team. They can test and benchmark your team.</p>
<h3>Good, ideally external, testers.</h3>
<p>Test. Test as much as possible. Pentest, VA scans, etc., they are all good. The more testing you do, the more confidence you can have in your systems. Without testing, you are basically hoping things work well.</p>
<p>You can use internal test teams. These will know where to really probe for dirt. However, they will also suffer from this knowledge. They will attack in the paths you&#8217;ve predicted. They will use the exploits you are expecting.</p>
<p>This is good, and much better than nothing. It isn&#8217;t perfect and it really isn&#8217;t world class.</p>
<p>In the same way external consultants bring new ideas, external testers really push your infosec teams. They will think of things you have never considered. They will test systems in ways you cant imagine. They will show you what an attacker can learn. They will highlight the mistakes better than anything internal.</p>
<p>The biggest &#8220;lesson learned&#8221; from a real external pentest comes at the end. When your internal team get the report and try to work out how the attackers got in. Spend time looking at how the controls were bypassed. Spend time finding ways to detect it <em>next time</em>. There will be a next time, you just have to hope you are ready before an attacker finds it.</p>
<h2>Conclusion &#8211; 3 elements for world class infosec</h2>
<p>So, in summary, there are three essential building blocks for every infosec team. It is easy to identify them, but it is also easy to overlook one or more. All are essential if you want to drive the maximum security benefit for your organisation.</p>
<p>The real challenge is in making sure you implement all three properly. You need good teams to start with and a plan to make them all better. You need to drive continual improvement. You need to learn from everything that goes wrong. If you do this, you will have a great security team and your infosec processes will be robust.</p>
<h3>Need help?</h3>
<p>If you need help with this, Halkyn Consulting can offer advice, support, assistance and mentorship at every stage.</p>
<p>We can help you build your internal infosec team from the ground up. We can help you improve them. We can help you benchmark them. We can train your incident responders, we can support your forensics collections.</p>
<p>If you have a good, trusted, internal information security team, we can help bring in new ideas. We can provide external frames of reference. We can help you learn from the lessons other companies suffer.</p>
<p><a href="http://www.halkynconsulting.co.uk/contact/contact-security-team" target="_blank">Take the first steps to improving your security today and get in touch with us to find out more</a>.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2016/01/infosec-3-essential-elements-of-your-team/">3 essential elements of any Infosec function</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1436</post-id>	</item>
		<item>
		<title>Incident Response &#8211; 5 key stakeholder groups</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 07 Dec 2015 08:59:40 +0000</pubDate>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1421</guid>

					<description><![CDATA[<p>Incident response is a vital component of every organisations security. It provides the safety net for when the inevitable happens and other controls fail. A good incident response team will also have subject matter experts who can guide your entire organisation&#8217;s security strategy. If you take security even slightly seriously, you will have an incident [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/">Incident Response &#8211; 5 key stakeholder groups</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1422" aria-describedby="caption-attachment-1422" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?ssl=1"><img loading="lazy" decoding="async" data-attachment-id="1422" data-permalink="http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/untitled-1/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?fit=800%2C800&amp;ssl=1" data-orig-size="800,800" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Incident Response Team" data-image-description="&lt;p&gt;Incident Response &#8211; Your team cant function in a vacuum. &lt;/p&gt;
" data-image-caption="&lt;p&gt;Incident Response &#8211; Your team cant function in a vacuum. &lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?fit=800%2C800&amp;ssl=1" class="size-medium wp-image-1422" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?resize=300%2C300&#038;ssl=1" alt="Incident Response - Your team cant function in a vacuum." width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/Untitled-1.png?w=800&amp;ssl=1 800w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1422" class="wp-caption-text">Incident Response &#8211; Your team cant function in a vacuum.</figcaption></figure>
<p>Incident response is a vital component of every organisations security. It provides the safety net for when the inevitable happens and other controls fail. A good incident response team will also have subject matter experts who can guide your entire organisation&#8217;s security strategy.</p>
<p>If you take security even slightly seriously, you will have an incident response team. Often called a &#8220;CSIRT,&#8221; but you may use other titles like SIRT, IRT or CERT. Ideally, you&#8217;ve put your technical expertise here so that they can respond to incident across the board. You&#8217;ve manned it properly so the team have resources to deal with the volume of incidents you face and you&#8217;ve given them the tools to detect, confirm, investigate and contain incidents in a timely manner.</p>
<p>If you&#8217;ve done all this, you&#8217;ve done well and your response will be pretty good.</p>
<p>However, even the best CSIRT team needs help. Your handlers may be experts but you want them spending time on incidents, not constantly refreshing their knowledge of the ins and outs of your environment.</p>
<p>You can solve this by making sure they interact with key stakeholders in your business.</p>
<h2>5 Key Stakeholders for Incident Response</h2>
<p>Every organisation is different. However, your CSIRT must find a way to engage with the equivalents of the following groups:</p>
<ol>
<li><strong>IT Services</strong>.  Your incident response team need to establish solid relationships with all the key parts of your IT Services organisation. Internally, this includes networking, database teams and developers. Externally you need to include hosting providers and service providers. This is the most crucial relationship they can have.</li>
<li><strong>Security Management</strong>. You need more than a CSIRT. The incident responders can be expected to own every aspect of security. You need to ensure they have a route to engage other parts of security and especially security management / leadership teams.</li>
<li><strong>Legal</strong>. Incidents open the door for lots of legal considerations. You need to make decisions about what to report and how significant an event may be. Your incident responders should be technical experts, not legal experts. This means your handers must have a way of seeking guidance from real lawyers. Ignore legal at your peril.</li>
<li><strong>Human Resources</strong>. Users are a frequent cause of security incidents. Your incident response team need to be able to handle these in the correct way. To enable this, the CSIRT need to engage with HR. Ideally, there will be regular links to ensure compliance and an ad-hoc link when an incident happens. As with legal, ignore HR at your peril.</li>
<li><strong>Public Relations</strong>. Incidents can go public with very little warning. No one wants to make the Talk Talk mistake with a CEO talking faster than your incident response team can work. It is vital that your incident response guys engage with PR before and during incidents. Your PR team are experts in making sure the incident response message is the right one. If you need to go public and there is no link between incident response and PR, you will feel pain. Lots of pain.</li>
</ol>
<h2>Incident Response Communications</h2>
<p>So, you know it makes sense to engage, but how can you do it?</p>
<p>Step 1: <strong>Identify the right people</strong>. Find or nominate key individuals within the stakeholder groups. These do not need to be security experts, but they need to be aware of the incident response team&#8217;s existence. Make them aware of their duties &#8211; normally act as a support point for any incident activity.</p>
<p>Step 2: <strong> Set up regular security cadence meetings</strong>. People forget things. You can minimise this with a regular meeting between all the stakeholders. You can use this to drive improvements, review previous incidents or just remind everyone.</p>
<p>Step 3: <strong>Incident Response Escalations</strong>. Your team is in-flight with an incident, have them set up pro-active alerting. Don&#8217;t call everyone, every time, but your handlers need to be planning ahead. Your incident response team need to be warming up key contacts so when they have to press the button, it doesn&#8217;t shock anyone.</p>
<h2>Incident Response Really Matters!</h2>
<figure id="attachment_1424" aria-describedby="caption-attachment-1424" style="width: 300px" class="wp-caption alignleft"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?ssl=1"><img loading="lazy" decoding="async" data-attachment-id="1424" data-permalink="http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/ira-quote/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?fit=550%2C550&amp;ssl=1" data-orig-size="550,550" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Brighton Bombing 1984 &#8211; IRA" data-image-description="&lt;p&gt;Brighton Bombing 1984 &#8211; IRA. &lt;/p&gt;
" data-image-caption="&lt;p&gt;Brighton Bombing 1984 &#8211; IRA&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?fit=550%2C550&amp;ssl=1" class="size-medium wp-image-1424" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?resize=300%2C300&#038;ssl=1" alt="Brighton Bombing 1984 - IRA" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/12/IRA-Quote.png?w=550&amp;ssl=1 550w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1424" class="wp-caption-text">Brighton Bombing 1984 &#8211; IRA</figcaption></figure>
<p>No matter how good your security is, there will be a time when it fails. An attacker will get through.</p>
<p>This doesn&#8217;t mean you should ignore other controls. It doesn&#8217;t mean you should give up hope.</p>
<p>However, it does mean you need to have a plan B. A good incident response team gives you this <em>plan B</em>.</p>
<p>Your incident response team need your security controls. They need your logs. They need tools to contain incidents. They need skills and knowledge.</p>
<p>When they have all this, the need engagement with others!</p>
<p>With all this, you make it less likely the attackers will &#8220;get lucky.&#8221;</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/">Incident Response &#8211; 5 key stakeholder groups</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/12/incident-response-key-stakeholders/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1421</post-id>	</item>
		<item>
		<title>Halkyn Consulting &#8211; Site Redesign / Cyber Security Cluster</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/11/halkyn-consulting-site-redesign/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sun, 22 Nov 2015 18:10:39 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Halkyn Security Consultants]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1402</guid>

					<description><![CDATA[<p>As you may have noticed, the Halkyn Consulting website has undergone a redesign. This is aimed to improve our responsiveness on multiple platforms, allow us to expand our services without compromising readability and to help showcase our new activities. The new site is now fully live. If you have any comments or feedback we would [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/11/halkyn-consulting-site-redesign/">Halkyn Consulting &#8211; Site Redesign / Cyber Security Cluster</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1406" aria-describedby="caption-attachment-1406" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/"><img loading="lazy" decoding="async" data-attachment-id="1406" data-permalink="http://www.halkynconsulting.co.uk/a/2015/11/halkyn-consulting-site-redesign/halkyn_screenshot/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/11/halkyn_screenshot.png?fit=900%2C749&amp;ssl=1" data-orig-size="900,749" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Halkyn Security &#8211; Website Redesign" data-image-description="&lt;p&gt;The new Halkyn Consulting Security Services website&lt;/p&gt;
" data-image-caption="&lt;p&gt;The new Halkyn Consulting Security Services website&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/11/halkyn_screenshot.png?fit=300%2C250&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/11/halkyn_screenshot.png?fit=900%2C749&amp;ssl=1" class="size-medium wp-image-1406" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/11/halkyn_screenshot.png?resize=300%2C250&#038;ssl=1" alt="The new Halkyn Consulting Security Services website" width="300" height="250" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/11/halkyn_screenshot.png?resize=300%2C250&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/11/halkyn_screenshot.png?w=900&amp;ssl=1 900w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1406" class="wp-caption-text">The new Halkyn Consulting Security Services website</figcaption></figure>
<p>As you may have noticed, the Halkyn Consulting website has undergone a redesign. This is aimed to improve our responsiveness on multiple platforms, allow us to expand our services without compromising readability and to help showcase our new activities.</p>
<p>The new site is now fully live. If you have any comments or feedback we would love to hear from you. You can get in touch with us via <a href="http://www.halkynconsulting.co.uk/a/contact-halkyn-security-consultants/" target="_blank">the blog</a> or <a href="http://www.halkynconsulting.co.uk/contact/contact-security-team" target="_blank">our contact page</a>.</p>
<p>Over the coming months we will continue to improve, based on your feedback. Additionally, we are continuing to add services and this will be the subject of a future blog post. This is all part of our drive to provide world class services across all security disciplines.</p>
<p>Linked to this, we are proud to be active supporters of the <a href="http://northwalescyber.net/" target="_blank">North Wales Cyber Security Cluster</a>. This group meets monthly and everyone is welcome to attend. The objective is to help all members learn about cyber security. Each month, different guest speakers cover a relevant topic. This is then followed with extensive group discussion and information sharing. Since joining the Cluster, Halkyn Security is proud to now be considered a core member. If you are interested in cybersecurity, please get in touch with the cluster organiser and come to the next session.</p>
<p>Our plans for the next year are to increase the awareness training packages we deliver. To meet this, we will be speaking to Cluster members about running free sessions across North East Wales. If this would interest you please get in touch. At the end of November Halkyn Consulting is assisting Heimdallr &amp; the GTA. For this event we will deliver a 2 day package on Cybersecurity. <a href="https://www.gta.gg/course/understanding-cybercrime-security-and-forensics-in-the-work-place/" target="_blank">Find out more on the GTA Website</a>. Further courses are planned next year.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/11/halkyn-consulting-site-redesign/">Halkyn Consulting &#8211; Site Redesign / Cyber Security Cluster</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1402</post-id>	</item>
		<item>
		<title>AV is not dead &#8211; it just has limits</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/10/av-is-not-dead-it-just-has-limits/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 26 Oct 2015 09:00:42 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Anti Virus]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Information Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1384</guid>

					<description><![CDATA[<p>Antivirus (AV) has been around for decades now and this is both a good and bad thing. On one hand, AV is so well known most people already understand that they need to have it. But on the other, all the attackers know about it. This means the first step in pretty much every attack [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/10/av-is-not-dead-it-just-has-limits/">AV is not dead &#8211; it just has limits</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Antivirus (AV) has been around for decades now and this is both a good and bad thing. On one hand, AV is so well known most people already understand that they need to have it. But on the other, all the attackers know about it. This means the first step in pretty much every attack is &#8220;bypass AV.&#8221;</p>
<figure id="attachment_1386" aria-describedby="caption-attachment-1386" style="width: 240px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1386" data-permalink="http://www.halkynconsulting.co.uk/a/2015/10/av-is-not-dead-it-just-has-limits/protect-152531_1280/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?fit=1024%2C1280&amp;ssl=1" data-orig-size="1024,1280" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="AV is not dead" data-image-description="&lt;p&gt;AV is not dead, just understand what it can and cant do.&lt;/p&gt;
" data-image-caption="&lt;p&gt;AV is not dead, just understand what it can and cant do.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?fit=240%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?fit=819%2C1024&amp;ssl=1" class="wp-image-1386 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?resize=240%2C300&#038;ssl=1" alt="AV is not dead, just understand what it can and cant do." width="240" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?resize=240%2C300&amp;ssl=1 240w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?resize=819%2C1024&amp;ssl=1 819w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/protect-152531_1280.png?w=1024&amp;ssl=1 1024w" sizes="auto, (max-width: 240px) 100vw, 240px" data-recalc-dims="1" /><figcaption id="caption-attachment-1386" class="wp-caption-text">AV is not dead, just understand what it can and cant do.</figcaption></figure>
<p>The reality is, bypassing AV is actually not that hard. Partly this is because there is a tendency for antivirus software to use &#8220;signature&#8221; based detection. Here, all an attacker needs to do is make an insignificant change and the signatures can be totally different.</p>
<p>Even the better AV products, which uses things like heuristics can be bypassed with freely available tools.  An example is the <em>Shikata ga nai</em> framework designed to leave AV helpless.</p>
<p>The availability of these tools is now so widespread that lots of security professionals are confidently making statements like &#8220;<a href="http://www.theguardian.com/technology/2014/may/06/antivirus-software-fails-catch-attacks-security-expert-symantec" target="_blank">AV is dead</a>&#8221; or posts titled &#8220;<a href="http://rageweb.info/2011/04/14/why-anti-virus-protection-is-a-joke/" target="_blank">Why antivirus protection is a joke</a>.&#8221; You can even watch <a title="Sacred Cash Cow Tipping Bypassing AV" href="https://www.youtube.com/watch?v=8Z7L498dNB0" target="_blank">an excellent YouTube video</a> on how to bypass antivirus.</p>
<p>Basically, everything these people are saying is correct. Attackers can and will bypass antivirus. Often they will do it with very little effort.</p>
<p>Despite what the vendor may tell you, you can have a top end, fully updated AV product and <strong>still</strong> get hacked. A lot.</p>
<p>But this is missing the point. It doesn&#8217;t mean that the product is useless or that we should all give it up and live in an AV-free world. It just means that, like every security product, it has its place. Remember, <strong>there is no holy grail</strong>, <strong>silver bullet</strong>, <strong>product</strong> that can do everything and protect you from every cyber threat.</p>
<p>The important thing to remember is if you <em>DONT</em> have antivirus, even the lazy attackers who cant be bothered to bypass it will get in to your system.</p>
<h2>Bringing AV Back to Life</h2>
<p>So, we&#8217;ve established that the reports of antivirus being dead are premature, but what do we do about it?</p>
<p>Remember, security is all about defence in depth. You need to be adding so many layers of controls that the attacker runs out of steam long before they hit your important assets. Within this model, AV has a crucial part to play.</p>
<p>With this in mind, here are our handy hints on how to keep AV alive in your organisation and make sure it is providing the value you expect.</p>
<ul>
<li>Review your security model. AV has a part to play but it is only a part. Make sure you have other controls.</li>
<li>Fund AV properly. Dont blow your budget on an incremental improvement to AV but also dont scrimp and get some freeware version which you cant manage.</li>
<li>Implement good security practices. Whatever else you do, you need to consider the top three security controls: <em>Application Whitelisting; Patching; Privilege Management</em>. With these in place, your AV works much better. Without them, you will still get hacked. A lot.</li>
<li>Use your antivirus. We&#8217;ve lost count of the number of incidents we are called to support which have an origin in a machine where AV has been disabled or not updated in months. This is poor practice.</li>
</ul>
<p>The key point here is that AV needs to be part of your security controls. It should never be the only control you have but that isn&#8217;t enough of a reason to not have it. While it is possible for reasonably low skilled attackers to circumvent your antivirus controls, you would be amazed at how much it will still stop.</p>
<p>If you implement the three security good practices mentioned above, and run an up-to-date AV tool, 90% (or more) of attacks will fail.</p>
<p>Don&#8217;t give up on AV simply because it cant work on its own.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/10/av-is-not-dead-it-just-has-limits/">AV is not dead &#8211; it just has limits</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1384</post-id>	</item>
		<item>
		<title>Supplier Security &#8211; A lesson for T-Mobile</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/10/supplier-security-a-lesson-for-t-mobile/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 03 Oct 2015 20:34:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Supplier Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1363</guid>

					<description><![CDATA[<p>Supplier security is something most organisations are at least aware of, and lots actually realise they need to do something about it. However, most of the time, &#8220;doing something&#8221; about it involves a quick chat with the supplier, possibly a generic check-list and a review that the contract at least mentions security. The problem is thinking [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/10/supplier-security-a-lesson-for-t-mobile/">Supplier Security &#8211; A lesson for T-Mobile</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1365" aria-describedby="caption-attachment-1365" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?ssl=1" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1365" data-permalink="http://www.halkynconsulting.co.uk/a/2015/10/supplier-security-a-lesson-for-t-mobile/suppliersecurity-tmobile/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?fit=1269%2C973&amp;ssl=1" data-orig-size="1269,973" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Supplier security problems result in this notice from the CEO of T-Mobile" data-image-description="&lt;p&gt;Supplier security problems result in this notice from the CEO of T-Mobile&lt;/p&gt;
" data-image-caption="&lt;p&gt;Supplier security problems result in this notice from the CEO of T-Mobile&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?fit=300%2C230&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?fit=1024%2C785&amp;ssl=1" class="wp-image-1365 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?resize=300%2C230&#038;ssl=1" alt="Supplier security problems result in this notice from the CEO of T-Mobile" width="300" height="230" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?resize=300%2C230&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?resize=1024%2C785&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/SupplierSecurity-TMobile.png?w=1269&amp;ssl=1 1269w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1365" class="wp-caption-text">Supplier security problems result in this notice from the CEO of T-Mobile</figcaption></figure>
<p>Supplier security is something most organisations are at least aware of, and lots actually realise they need to do something about it. However, most of the time, &#8220;doing something&#8221; about it involves a quick chat with the supplier, possibly a generic check-list and a review that the contract at least mentions security. The problem is thinking if the supplier drops the ball, the supplier will suffer the harm.</p>
<p>This week, T-Mobile USA were unfortunate enough to be the example showing why that mindset is really, really wrong. There is no escaping the fact that supplier security matters. If you aren&#8217;t driving them hard things will end badly.</p>
<h2>Supplier security &#8211; what went wrong for T-Mobile?</h2>
<p><em>First off, for the avoidance of doubt, there is no reason to think T-Mobile have done anything wrong. Nothing here is meant to imply they failed to implement good supplier security controls</em>.</p>
<p>Yesterday, it was reported (<a href="http://krebsonsecurity.com/2015/10/experian-breach-affects-15-million-consumers/" target="_blank">here</a> and <a href="https://grahamcluley.com/2015/10/experian-hacked-15-million-mobile-customers-risk/" target="_blank">here</a>) that the credit checking agency Experian had suffered a major breach. The breach exposed personal data belonging to T-Mobile USA customers. Initial reports are that the breach lasted over 2 years and around 15 million records have been compromised.</p>
<p>It seems the attacker(s) accessed a file containing every credit check Experian has ever conducted for T-Mobile. The customers put their faith in T-Mobile and there was no breach at T-Mobile. However, they are still the ones who will feel the impact here.</p>
<p>As an immediate damage limitation exercise, Experian have offered anyone affected by this a free 2 year account on ProtectMyID. Unfortunately this means you need to continue trusting Experian and its not clear how effective a credit checking agency will be at general ID protection.</p>
<p>For T-Mobile, this is a pretty painful situation. They had no breach, but their customers suffered. Some customers will blame T-Mobile for this. Some customers may leave T-Mobile. Customers don&#8217;t care about supplier security.</p>
<p>Don&#8217;t forget, if this was the UK/EU, the Data Controller is the one who gets the fine not necessarily the data processor.</p>
<h2>Supplier security &#8211; what should you do?</h2>
<p>No one wants to be in the same boat as T-Mobile but every business needs suppliers of some description. So, the question is, how can you check your supplier security is good enough?</p>
<p><strong>Step 1</strong> &#8211; <strong>actually take your supplier security seriously</strong>. Don&#8217;t assume it is just a task you have to tick off on an audit list. Don&#8217;t assume all your suppliers are the same. You need to fully integrate your supplier security processes in to everything you do.</p>
<p><strong>Step 2</strong> &#8211; <strong>risk assess your suppliers</strong>. Not all suppliers carry the same risk. Not all suppliers need the same level of scrutiny. Supplier security is never a one-size-fits all problem. Some suppliers will provide business critical services. Some will be able to cause you massive reputational damage. Some wont. You need to understand every supplier. In some cases, it may even be necessary to war game possible scenarios so you can really understand how things can go wrong. Figure out what happens if they go bust, get breached or just mess up. Once you know this, you know how much pain you can feel from this supplier.</p>
<p><strong>Step 3</strong> &#8211; <strong>drive the supplier security process</strong>. The low risk suppliers can probably stay with the check list approach. The high risk suppliers really need a dedicated supplier security assessment. This means you need to dedicate resources to go and fully understand how the supplier protects your services. If they aren&#8217;t up to scratch, find a new one.</p>
<h2>Supplier security doesn&#8217;t need to be hard.</h2>
<figure id="attachment_1376" aria-describedby="caption-attachment-1376" style="width: 215px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/security-resources/downloads/SupplierSecurityAssessmentQuestionnaire.pdf"><img loading="lazy" decoding="async" data-attachment-id="1376" data-permalink="http://www.halkynconsulting.co.uk/a/2015/10/supplier-security-a-lesson-for-t-mobile/supplier-security-assessment-questionnaire/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/supplier-security-assessment-questionnaire.png?fit=615%2C857&amp;ssl=1" data-orig-size="615,857" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Supplier Security Assessment Questionnaire &#8211; Provided for free by Halkyn Consulting" data-image-description="&lt;p&gt;Supplier Security Assessment Questionnaire &#8211; Provided for free by Halkyn Consulting&lt;/p&gt;
" data-image-caption="&lt;p&gt;Supplier Security Assessment Questionnaire (PDF)&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/supplier-security-assessment-questionnaire.png?fit=215%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/supplier-security-assessment-questionnaire.png?fit=615%2C857&amp;ssl=1" class="size-medium wp-image-1376" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/supplier-security-assessment-questionnaire.png?resize=215%2C300&#038;ssl=1" alt="Supplier Security Assessment Questionnaire - Provided for free by Halkyn Consulting" width="215" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/supplier-security-assessment-questionnaire.png?resize=215%2C300&amp;ssl=1 215w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/10/supplier-security-assessment-questionnaire.png?w=615&amp;ssl=1 615w" sizes="auto, (max-width: 215px) 100vw, 215px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1376" class="wp-caption-text">Supplier Security Assessment Questionnaire (PDF)</figcaption></figure>
<p>There are lots of resources available to help with supplier security assessments &#8211; such as our free <a href="http://www.halkynconsulting.co.uk/security-resources/downloads/SupplierSecurityAssessmentQuestionnaire.pdf" target="_blank">Supplier Security Assessment Questionnaire</a>, or if you are willing to pay, the <a href="https://www.securityforum.org/tools/isf-sset/" target="_blank">Supplier Security Evaluation Tool</a> (SSET) provided by the ISF.</p>
<p>Whatever approach you decide, the most important thing is having an approach to supplier security which you actually use.</p>
<p>Never allow yourself to fall into the trap of thinking your suppliers don&#8217;t need supervision. Never fall into the trap of thinking that their problems will only be their problems. Never fall into the trap of assuming contracts will protect you.</p>
<p>Supplier security is important. Never forget that.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/10/supplier-security-a-lesson-for-t-mobile/">Supplier Security &#8211; A lesson for T-Mobile</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1363</post-id>	</item>
		<item>
		<title>Phishing and Malware &#8211; FedEx missed delivery</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/09/phishing-and-malware-fedex-missed-delivery/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/09/phishing-and-malware-fedex-missed-delivery/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Tue, 08 Sep 2015 22:26:23 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1356</guid>

					<description><![CDATA[<p>It seems that every day, new script kiddies discover the likes of the Social Engineering Toolkit or Metasploit and launch a new wave of phishing attacks. Unfortunately it seems that this time the attackers are too lazy to even try. Today&#8217;s email &#8211; screenshot on the right &#8211; is a reasonably straight forward phishing attempt. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/09/phishing-and-malware-fedex-missed-delivery/">Phishing and Malware &#8211; FedEx missed delivery</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It seems that every day, new script kiddies discover the likes of the Social Engineering Toolkit or Metasploit and launch a new wave of phishing attacks. Unfortunately it seems that this time the attackers are too lazy to even try.</p>
<figure id="attachment_1357" aria-describedby="caption-attachment-1357" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?ssl=1" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1357" data-permalink="http://www.halkynconsulting.co.uk/a/2015/09/phishing-and-malware-fedex-missed-delivery/malware/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?fit=732%2C584&amp;ssl=1" data-orig-size="732,584" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="FedEx Delivery Phishing Email" data-image-description="&lt;p&gt;FedEx Delivery Phishing Email &#8211; there is no reason ANYONE should ever open this attachment.&lt;/p&gt;
" data-image-caption="&lt;p&gt;FedEx Delivery Phishing Email&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?fit=300%2C239&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?fit=732%2C584&amp;ssl=1" class="wp-image-1357 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?resize=300%2C239&#038;ssl=1" alt="FedEx Delivery Phishing Email - there is no reason ANYONE should ever open this attachment." width="300" height="239" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?resize=300%2C239&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/09/malware.png?w=732&amp;ssl=1 732w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1357" class="wp-caption-text">FedEx Delivery Phishing Email</figcaption></figure>
<p>Today&#8217;s email &#8211; screenshot on the right &#8211; is a reasonably straight forward phishing attempt. The idea is to convince the victim that the attachment is interesting enough to open. When it is opened, bad things happen.</p>
<p>Normally, a phishing attack will put at least a bit of effort in, but not this time.</p>
<p>As you can see, the text itself is very short. This may be an attempt to avoid spam filters but it also has the effect of making this email look like almost NO other commercial email. As an example, When was the last time you got an official email without a pointless disclaimer somewhere?</p>
<p>Secondly it ticks every box in the &#8220;anti-Phishing&#8221; awareness lessons:</p>
<ul>
<li>The from address name doesnt relate to the displayed address.</li>
<li>It doesnt mention me by name.</li>
<li>The English doesnt make sense.</li>
<li>The dates are the wrong way round (for British people!)</li>
<li>Having an email address of @tauntsociety.com just seems designed to raise suspiciouns.</li>
<li>It makes no sense to send a shipping label by email, let alone have it in a zip file.</li>
</ul>
<p>None of this is encouraging me to open the file. Hopefully no one reading this would open the file either. However, sadly, there are enough people who will, to make the attacks continue.</p>
<h2>Newbie Phishing or did it get some things right?</h2>
<p>Amazingly some parts of this attack are effective, but I dont think that is a result of the phishing source. Its more a case of chance.</p>
<ul>
<li>The email arrived into Exchange today and was not detected as malicious by two web based mail scanners.</li>
<li>The email was delivered to the client machine and not detected as malicious by the local AV (Avast) or Windows Defender. (This is unusual as a check on the hashvalue at <a href="https://www.virustotal.com/en/file/ceff33248cdc9095373d1867612f24565b1a969107e4caa6b517d108da8a2c2e/analysis/1441746991/" target="_blank">Virus Total</a> says Microsoft detects it as malware)</li>
<li>The payload is detected by Sophos as a ransomware trojan dropper so any unwitting home users who have run this are likely to either lose all their data or pay the ransom.</li>
</ul>
<p>Ransomware is very big business so it is surprising that the attackers here have gone to the trouble of finding malware less than half the AV clients will detect (and most only with very recent database updates), but spoiled the phishing attack with terrible execution.</p>
<p>Surprising and fortunate for a lot of people really.</p>
<h2>Phishing is here to stay</h2>
<p>The main take-away lesson here is that phishing attacks will never go away. Some will get through every technological defence you have so it is critically important that you secure the human.</p>
<p>There is no escaping this. If your users are not security aware, you <strong>will</strong> lose data to these attacks as long as you are on the internet.</p>
<h2>Techie Bits &#8211; The Phishing Attack Path</h2>
<p>Looking at the message headers, it looks like this attack has been launched by someone using a form t0 email script on either a site they manage, or one with very weak controls.</p>
<p>Below is the list of message headers, and I&#8217;ve marked in bold the interesting bits. (<em>And yes, I&#8217;ve redacted a couple of bits because it shows some internal data I dont want webscrapers to pull out of the text, no other reason</em>).</p>
<blockquote><p>Received: from [REDACTED] ([REDACTED]) by mx.kundenserver.de<br />
(mxeue106) with ESMTPS (Nemesis) id 0LbeXr-1YonOk26NH-00lDRc for<br />
&lt;REDACTED&gt;; Tue, 08 Sep 2015 07:01:13 +0200<br />
Received: from gateway36.websitewelcome.com ([50.116.126.2]) by<br />
mx.kundenserver.de (mxeue106) with ESMTPS (Nemesis) id<br />
0Lo4jI-1Z2KB721JA-00fwNj for &lt;REDACTED&gt;; Tue, 08 Sep 2015<br />
07:01:13 +0200<br />
Received: by gateway36.websitewelcome.com (Postfix, from userid 1000)<br />
id 079D6A7914FD7; Tue, 8 Sep 2015 00:01:12 -0500 (CDT)<br />
Received: from sheridan.websitewelcome.com (sheridan.websitewelcome.com [192.185.83.170])<br />
by gateway36.websitewelcome.com (Postfix) with ESMTP id 02213A7916142<br />
for &lt;REDACTED&gt;; Tue, 8 Sep 2015 00:01:12 -0500 (CDT)<br />
Received: from valence by sheridan.websitewelcome.com with local (Exim 4.85)<br />
(envelope-from &lt;valence@sheridan.websitewelcome.com&gt;)<br />
id 1ZZB1r-000SER-Po<br />
for REDACTED; Tue, 08 Sep 2015 00:01:11 -0500<br />
To: REDACTED<br />
Subject: Shipment delivery problem #00963055<br />
<strong>X-PHP-Script: tauntsociety.com/post.php for 195.228.155.205</strong><br />
Date: Tue, 8 Sep 2015 00:01:11 -0500<br />
From: &#8220;FedEx 2Day&#8221; &lt;marion.estes@tauntsociety.com&gt;<br />
Reply-To: &#8220;FedEx 2Day&#8221; &lt;marion.estes@tauntsociety.com&gt;<br />
Message-ID: &lt;d82c38c685b2827699dc64547da46f1d@tauntsociety.com&gt;<br />
X-Priority: 3<br />
MIME-Version: 1.0<br />
Content-Type: multipart/mixed;<br />
boundary=&#8221;b1_4ea1c7b3b292b76548671d11a5513ac6&#8243;<br />
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report<br />
<strong>X-AntiAbuse: Primary Hostname &#8211; sheridan.websitewelcome.com</strong><br />
X-AntiAbuse: Original Domain &#8211; halkynconsulting.co.uk<br />
X-AntiAbuse: Originator/Caller UID/GID &#8211; [2477 32007] / [47 12]<br />
X-AntiAbuse: Sender Address Domain &#8211; sheridan.websitewelcome.com<br />
X-BWhitelist: no<br />
X-Source-IP:<br />
X-Exim-ID: 1ZZB1r-000SER-Po<br />
X-Source: /opt/php54/bin/php-cgi<br />
<strong>X-Source-Args: /opt/php54/bin/php-cgi /home/valence/public_html/tauntsociety.com/post.php</strong><br />
<strong>X-Source-Dir: valencestreet.com:/public_html/tauntsociety.com</strong><br />
X-Source-Sender:<br />
X-Source-Auth: valence<br />
X-Email-Count: 2<br />
X-Source-Cap: dmFsZW5jZTt2YWxlbmNlO3NoZXJpZGFuLndlYnNpdGV3ZWxjb21lLmNvbQ==<br />
Content-Transfer-Encoding: 7bit<br />
Envelope-To: &lt;REDACTED&gt;<br />
X-UI-Filterresults: notjunk:1;V01:K0:qdxaUM074Do=:ERu/AyiRUwE+dkIYUTry1QLuld<br />
RiwUfU76tsxGWh3tj7pO8+nRn2+93rW0rJF/SYfshLWPyLBZTtkmTI5nPp1KlrYWjeqls+5tM<br />
2Yii7RrJuUdm1835qim6c9yqTBiwuL+ite7F2RDuJzaAKUS4TppyZc/CZyV09CcSOA4hN8It/<br />
7weuLi/lsI9Ni90Bpj2l2UJdkCOSblgS/wfSVYc7/VUgT64ibY5VWmRGIlyNEeOuR8KSpdHp0<br />
JKgGwUvHOXR9vSOP6lNhwgeJNWbKWBDnDmqud4C9h3uJUq/Nf5AcmGG3sVjFrIiMGPAssglbe<br />
OgFpYDplFUOyrRyVqnMf2WrqmbChGruU8RgW7fD9limqkBwAXq8bO0iSjg/c48W0rnyqwaHZR<br />
zlc4PWu98IDpXgkOllcXAOyZHIoimL7JW8xdXaZCsYkiRMvebQFWG7rYVX2j5gG1KeYR1PdMG<br />
amFuVrQL1D5nCpCByoOXIMfIk8dEsH81B+whRv2rUUC3w1rHiIgOMv9NQNRp+7Vp/aL6xaw6b<br />
pVt39gmDo6kF/OnWxL+pY7tdkrz96aILPs6Smz29I+dDFJ0i0GZtcKMFCdjnfWe+GTkf6TNAp<br />
yJp3xIPCOABU9oauWLaPib3ZFY8rLmxwdrG3lHoceq85oVx0rId4Hm0jgu581hV5dF36T1w62<br />
Ud2qputDDhD4Wsmy3Km8tp7x31LkimF3q9VLVPjuBewfHClw1EK1xmvhKyXXm+oKh33NDbm+N<br />
8pFKxmx6xhWz1KxT6cWyzc8nYAGQpESX6w==<br />
X-Antivirus: avast! (VPS 150907-1, 07/09/2015), Inbound message<br />
X-Antivirus-Status: Clean</p></blockquote>
<p>This appears to show a couple of things:</p>
<ul>
<li>The attack was launched from a post.php script on tauntsociety.com</li>
<li>The from and reply-to addresses are completely untrustworthy as this is a phishing attack designed to get the victim to open a payload, not reply. This means there is no reason to assume they point to a valid mailbox. However in this instance, they point to one on tauntsociety.com.</li>
<li>The mail went via websitewelcome.com&#8217;s email server using an account called <em>valence@sheridan.websitewelcome.com</em></li>
<li>Websitewelcome.com appears to provided to resellers by HostGator and it appears that <em>sheridan.websitewelcome.com</em> hosts a CPanel portal for webmail.</li>
<li>Both valencestreet.com and tauntsociety.com are registered by the same person at 2400 Valence Street, New Orleans. This appears to be a residential address and the owner has used a gmail account to sign up.</li>
<li>The tauntsociety website looks like it hasn&#8217;t been cared for in a while although there is an associated twitter feed which is very active.</li>
<li>The header data here does not give us any better insight into the source of the phishing attack than it came from &#8220;valence&#8221;.</li>
</ul>
<p>Based on the totality of information here, the most likely attack path is that a malicious party has used the script on tauntsociety to send an email. It is also likely that the script is hardcoded to present the valence@sheridan.websitewelcome.com account credentials.</p>
<p>While this instance has been a private individual, who may or may not have the knowledge to properly secure a website, similar attacks happen using corporate servers every day.</p>
<p>At Halkyn Consulting we research this out of curiousity, but some attack victims will be reporting it to the police. It may be possible for them to be more accurate than the &#8220;Valence&#8221; account but this is very much a gamble and it is just as likely that websitewelcome.com don&#8217;t store any more details than the credentials used.</p>
<p>As a result, if your company owns sites with scripts that fall out of good management, you will find yourself liable for the misuse. And you really dont want that.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/09/phishing-and-malware-fedex-missed-delivery/">Phishing and Malware &#8211; FedEx missed delivery</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/09/phishing-and-malware-fedex-missed-delivery/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1356</post-id>	</item>
		<item>
		<title>Finphishing &#8211; 8 steps to criminal profits</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/08/finphishing-8-steps-to-criminal-profits/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 28 Aug 2015 14:33:12 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[FinPhishing]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1345</guid>

					<description><![CDATA[<p>FinPhishing &#8211; or financial spear phishing &#8211; is a form of social engineering attack which is becoming massively profitable for the criminal enterprises involved. Unfortunately for the victims it is very cheap to deploy and nearly always gets past technological security controls such as spam filtering and malware detection. As a result of this, businesses [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/08/finphishing-8-steps-to-criminal-profits/">Finphishing &#8211; 8 steps to criminal profits</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>FinPhishing &#8211; or financial spear phishing &#8211; is a form of social engineering attack which is becoming massively profitable for the criminal enterprises involved. Unfortunately for the victims it is very cheap to deploy and nearly always gets past technological security controls such as spam filtering and malware detection.</p>
<figure id="attachment_1347" aria-describedby="caption-attachment-1347" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?ssl=1" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1347" data-permalink="http://www.halkynconsulting.co.uk/a/2015/08/finphishing-8-steps-to-criminal-profits/screenshot-3/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?fit=838%2C618&amp;ssl=1" data-orig-size="838,618" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="FinPhishing Email" data-image-description="&lt;p&gt;FinPhishing &#8211; short and succinct message, simple to generate but potentially deadly to the victim.&lt;/p&gt;
" data-image-caption="&lt;p&gt;FinPhishing &#8211; short and succinct message, simple to generate but potentially deadly to the victim.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?fit=300%2C221&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?fit=838%2C618&amp;ssl=1" class="wp-image-1347 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?resize=300%2C221&#038;ssl=1" alt="FinPhishing - short and succinct message, simple to generate but potentially deadly to the victim." width="300" height="221" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?resize=300%2C221&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/08/screenshot.png?w=838&amp;ssl=1 838w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1347" class="wp-caption-text">FinPhishing &#8211; short and succinct message, simple to generate but potentially deadly to the victim.</figcaption></figure>
<p>As a result of this, businesses across the globe are losing fortunes in fake wire transfers to overseas bank accounts with only limited hope of ever getting their money back.</p>
<p>FinPhishing (under various names) isn&#8217;t new &#8211; there are reports of <a href="http://www.omaha.com/money/impostors-bilk-omaha-s-scoular-co-out-of-million/article_25af3da5-d475-5f9d-92db-52493258d23d.html" target="_blank">Scoular Co</a>.,(a US based private equities trader) losing $17.2m to a FinPhishing attack in June 2014. This has been followed in January by the Internet Crime Complaint Centre reporting that US businesses had lost $214m to scams similar to this in the previous 14 months.</p>
<p>More recently, in early August, <a href="http://krebsonsecurity.com/2015/08/tech-firm-ubiquiti-suffers-46m-cyberheist/" target="_blank">Ubiquiti Networks</a> disclosed a loss of US$46m to a FinPhishing scam which was discovered in June.</p>
<p>FinPhishing is big business for criminals.</p>
<h2>What is FinPhishing</h2>
<p>In summary &#8211; financial spear phishing (FinPhishing for ease) is a type of social engineering attack which tricks the victim into making a large sum transfer to a bank account managed by the attackers.</p>
<p>The attacks are all very similar and rely very heavily on corporate culture to work. Unfortunately the tendency of designers to make email user interfaces more &#8220;user friendly&#8221; actually helps the attacker here.</p>
<h2>The FinPhishing Attack</h2>
<p>The screenshot accompanying this post shows an initial finphishing email received by a target company. From this we can see the key elements of how the attack is constructed:</p>
<ol>
<li>Attackers look over public websites for information to identify the business structure. This includes obvious sites such as LinkedIn but also ones people don&#8217;t tend to directly post their own data to, such as ZoomInfo.com.</li>
<li>Once they build up your organisation chart, they try to identify a person in a position of authority (CEO, MD etc) and a person working in a finance role. The finance person is now the target of the attack (victim).</li>
<li>The attackers craft an email looking like it has come from the CEO/MD etc., often including the correct email address in the message &#8220;From:&#8221; field, but it will have a different email in the Reply-To or X-Sender headers.</li>
<li>The message makes a terse request about sending funds for some urgent business activity. The brevity means it bypasses most spam filters and the lack of payload or malicious link allows it to bypass AV or threat monitoring.</li>
<li>The victim reads the email and it looks like it is legitimately from the CEO/MD &#8211; unfortunately most email systems only show the From address &#8211; so they reply either asking for more details or in some cases starting the process.</li>
<li>Very alert victims may notice the email client now shows a new email address in the &#8220;To:&#8221; box but this is actually very rare and sophisticated attackers can mask this.</li>
<li>Once the victim responds, the phishers know they have access to a live person who at least partly thinks the request is legitimate and they can begin the second stage of the attack which is an initial transfer of a reasonably small amount of funds (often in the $50 &#8211; 100k region).</li>
<li>If this works, the attackers will go all out and generate increasingly urgent, demanding requests to get as much as possible before they are detected.</li>
</ol>
<h2>Security measures</h2>
<p>At its core, FinPhishing is just a social engineering attack. This means you need to concentrate on the people involved.</p>
<ul>
<li>Provide all your workforce security awareness training which emphasises the risks from social engineering attacks.</li>
<li>Ensure anyone working in finance understands what this sort of attack looks like and what to look out for in a phishing email.</li>
<li>If possible configure your mail clients to give as much detail as possible about the message headers.</li>
<li>Establish authorisation processes so that no one can transfer large amounts of money out of your business without solid confirmation &#8211; no matter how urgent it may be.</li>
<li>If you are caught by this scam alert your bank and  involve the police or law enforcement as quickly as possible. Recovering funds is always going to be difficult, so any delay will just make it worse.</li>
</ul>
<h2>Summary</h2>
<p>FinPhishing is cheap, easy and lucrative. This means there is currently little or no incentive for attackers to stop and the low technological requirements mean that even if current attackers are caught and move on, others will fill the gap.</p>
<p>The best, possibly only, defence is to ensure you have robust processes and alert staff. If you do fall victim to an attack, make sure you can react quickly and hopefully you will save your business.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/08/finphishing-8-steps-to-criminal-profits/">Finphishing &#8211; 8 steps to criminal profits</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1345</post-id>	</item>
		<item>
		<title>Security breaches &#8211; do you know what to do next?</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Wed, 22 Jul 2015 22:51:07 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1318</guid>

					<description><![CDATA[<p>One sad fact about security is that no matter what controls you put in place, you will suffer breaches and if you are on the internet it is likely to happen sooner rather than later. People sometimes hold to a &#8220;physical world&#8221; security model which has a clearly defined threat actor (e.g. a burglar) casing [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/">Security breaches &#8211; do you know what to do next?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One sad fact about security is that no matter what controls you put in place, you will suffer breaches and if you are on the internet it is likely to happen sooner rather than later.</p>
<figure id="attachment_1328" aria-describedby="caption-attachment-1328" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1328" data-permalink="http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/anonymous_internet_breaches/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?fit=1280%2C1024&amp;ssl=1" data-orig-size="1280,1024" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Anonymous &#8211; often linked to security breaches" data-image-description="&lt;p&gt;Anonymous &#8211; often linked to security breaches&lt;/p&gt;
" data-image-caption="&lt;p&gt;Anonymous &#8211; often linked to security breaches&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?fit=300%2C240&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?fit=1024%2C819&amp;ssl=1" class="size-medium wp-image-1328" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?resize=300%2C240&#038;ssl=1" alt="Anonymous - often linked to security breaches" width="300" height="240" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?resize=300%2C240&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?resize=1024%2C819&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/anonymous_internet_breaches.jpg?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1328" class="wp-caption-text">Anonymous &#8211; often linked to security breaches and globally distributed enough that it is hard, if not impossible, to anticipate if, when and how they will attack</figcaption></figure>
<p>People sometimes hold to a &#8220;physical world&#8221; security model which has a clearly defined threat actor (e.g. a <em>burglar</em>) casing properties in their target area for an eventual break in. if you are unlucky enough to leave a door open on the night they are casing you, you get robbed.</p>
<p>This is a good way of thinking but it is crucial to remember that on the internet, the burglars are worldwide and they are running automated tools which are constantly casing your property to see if there is something they can exploit. This means any momentary lapse (such as not applying a software patch, or changing a configuration setting) can be found by attackers and exploited faster than most people realise. The lesson is simple:<strong> Breaches can, and will, happen at any time of the day or night, while you are working, sleeping or on holiday</strong>.</p>
<p>This is <strong>not</strong> saying your security controls are useless &#8211; far from it. Without them, the breaches will be more frequent, more damaging and harder to recover from. You do however, have to avoid the mindset that security is putting in place controls and then saying &#8220;job done.&#8221;</p>
<h2>If breaches are inevitable, why do I need controls?</h2>
<p>Let&#8217;s clear this up first. You need your security controls. You really do.</p>
<p>Security is best delivered by applying layers of controls and constantly striving to maintain and improve them. Good security controls help you with:</p>
<ul>
<li>Making you a hard enough target that lots of attackers, especially <em>script kiddies</em>, will simply go elsewhere.</li>
<li>Delaying attackers enough that your detection systems will be alerted to their presence.</li>
<li>Collecting enough data to allow you to investigate breaches.</li>
<li>Being adaptive enough to respond to attacks in real time.</li>
</ul>
<p>If you come from a physical security background, this might be familiar as all security controls have the same basic requirements.</p>
<h2>So, breaches happen, what do I need to do?</h2>
<p>First off, if you are reading this as a breach happens, it is too late. Sorry. Incident response is <strong>all</strong> down to planning. If you don&#8217;t plan properly, any successful incident response activity is pretty much down to random chance. Secondly, if you handle regulated data such as personal data/PII, credit card data etc., then you need to make sure your plans are acceptable. The advice here is generic and high level.</p>
<p>So, to answer the question:</p>
<ol>
<li><span style="text-decoration: underline;">You need to plan, plan and plan some more</span>. Your plans need to include who is responsible for doing what. Your plans need to cover everything from minor incidents to breaches which put your very companies existence at risk.</li>
<li><span style="text-decoration: underline;">Test your plans</span>. This is crucial. Make sure everyone involved knows what they need to do. Make sure the communications channels you have work. Make sure it all works at any time of the night or day. Make sure it works when your key decision makers are unavailable. Then test it all again. And again.</li>
<li><span style="text-decoration: underline;">Provide resources for incident response</span>. This isn&#8217;t free. If you are a small business with limited internet facing systems you might just be able to get away with an ad-hoc incident response team, but don&#8217;t assume a good sysadmin or a good networks person makes a good incident responder. Also remember breaches are stressful. Your incident responders will burn out if you ask them to do too much.</li>
<li><span style="text-decoration: underline;">Learn from your mistakes</span>. Just as breaches are inevitable, so are incident response mistakes. You need to be mature enough to analyse your behaviours and learn from what went wrong. Your attackers are constantly improving, you need to do the same.</li>
</ol>
<h2>In practical terms</h2>
<figure id="attachment_1336" aria-describedby="caption-attachment-1336" style="width: 234px" class="wp-caption alignleft"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?ssl=1"><img loading="lazy" decoding="async" data-attachment-id="1336" data-permalink="http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/breach_response_process/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?fit=594%2C760&amp;ssl=1" data-orig-size="594,760" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Responding to breaches &#8211; six steps" data-image-description="&lt;p&gt;Responding to breaches &#8211; six steps&lt;/p&gt;
" data-image-caption="&lt;p&gt;Responding to breaches &#8211; six steps&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?fit=234%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?fit=594%2C760&amp;ssl=1" class="size-medium wp-image-1336" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?resize=234%2C300&#038;ssl=1" alt="Responding to breaches - six steps" width="234" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?resize=234%2C300&amp;ssl=1 234w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/07/breach_response_process.png?w=594&amp;ssl=1 594w" sizes="auto, (max-width: 234px) 100vw, 234px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1336" class="wp-caption-text">Responding to breaches &#8211; six steps</figcaption></figure>
<p>As part of your plans, you need to be aware of the six high-level steps of incident response (see image), and your processes need to cover each step.</p>
<p>You need to make sure that you have an incident response team who have the right skills and knowledge to do the job. You also need to make sure you resource the team well enough that they aren&#8217;t trying to juggle a day job as well as respond to incidents and you have some way to rotate people.</p>
<p>There are no hard and fast rules on how much of your security budget should go on incident response &#8211; it really depends on your individual circumstances &#8211; but two things are always true. You need a security budget and some of it must be spent on incident response. Don&#8217;t fool yourself into thinking anything else is financially sensible or a long term option.</p>
<p>Make sure your incident response team either have the authority to act or the ability to seek this authority at very, very short notice any time of the day or night. The last thing you want is the complete loss of your network because the incident responders didn&#8217;t have the authority to pull the plug on an infected machine and couldn&#8217;t find the person to who did.</p>
<p>All of this goes a long way to making sure your organisation is resilient enough that an incident can&#8217;t kill you. At the end of the day, that is what really matters.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/">Security breaches &#8211; do you know what to do next?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/07/security-breaches-do-you-know-what-to-do-next/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1318</post-id>	</item>
		<item>
		<title>Halkyn Consulting &#8211; Vacation and Course Period</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/05/halkyn-consulting-vacation-and-course-period/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/05/halkyn-consulting-vacation-and-course-period/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 15 May 2015 20:04:46 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1301</guid>

					<description><![CDATA[<p>As our existing clients may be aware, Halkyn Consulting has entered into a three week period where we maximise our courses and vacation time. During this period we will be unable to respond to new clients but will continue to service existing clients. During this period there will be a delay in our responses and [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/05/halkyn-consulting-vacation-and-course-period/">Halkyn Consulting &#8211; Vacation and Course Period</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As our existing clients may be aware, Halkyn Consulting has entered into a three week period where we maximise our courses and vacation time. During this period we will be unable to respond to new clients but will continue to service existing clients.</p>
<p>During this period there will be a delay in our responses and we may be unable to provide copies of the ISO27001 checklist as quickly as normal.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/05/halkyn-consulting-vacation-and-course-period/">Halkyn Consulting &#8211; Vacation and Course Period</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/05/halkyn-consulting-vacation-and-course-period/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1301</post-id>	</item>
		<item>
		<title>Security researchers demo GPU Keylogger</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/05/security-researchers-demo-gpu-keylogger/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Wed, 13 May 2015 21:17:37 +0000</pubDate>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Key Logger]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1297</guid>

					<description><![CDATA[<p>Reported on the Register today, security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of a computer: http://www.theregister.co.uk/2015/05/13/graphics_card_malware_gpu_keylogger/</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/05/security-researchers-demo-gpu-keylogger/">Security researchers demo GPU Keylogger</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Reported on the Register today, security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of a computer: <a href="http://www.theregister.co.uk/2015/05/13/graphics_card_malware_gpu_keylogger/">http://www.theregister.co.uk/2015/05/13/graphics_card_malware_gpu_keylogger/</a></p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/05/security-researchers-demo-gpu-keylogger/">Security researchers demo GPU Keylogger</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1297</post-id>	</item>
		<item>
		<title>Security Patches &#8211; Internet Explorer &#8211; Act Fast</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/05/security-patches-internet-explorer/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Wed, 13 May 2015 21:06:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Patching]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1289</guid>

					<description><![CDATA[<p>For lots of enterprises, security patches are a pain to test, a pain to deploy and frequently frustrating when they require downtime for the inevitable system reboots. However, security patches are also a significantly important mechanism for protecting your environment against attacks. They really are. This month, Microsoft have announced 13 security patches &#8211; three of which are [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/05/security-patches-internet-explorer/">Security Patches &#8211; Internet Explorer &#8211; Act Fast</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For lots of enterprises, security patches are a pain to test, a pain to deploy and frequently frustrating when they require downtime for the inevitable system reboots.</p>
<p>However, security patches are also a <strong>significantly</strong> important mechanism for protecting your environment against attacks. They really are.</p>
<figure id="attachment_1290" aria-describedby="caption-attachment-1290" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?ssl=1"><img loading="lazy" decoding="async" data-attachment-id="1290" data-permalink="http://www.halkynconsulting.co.uk/a/2015/05/security-patches-internet-explorer/security-patches/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?fit=827%2C659&amp;ssl=1" data-orig-size="827,659" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Security Patches &#8211; May 2015" data-image-description="&lt;p&gt;Security Patches &#8211; May 2015&lt;/p&gt;
" data-image-caption="&lt;p&gt;Security Patches &#8211; May 2015&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?fit=300%2C239&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?fit=827%2C659&amp;ssl=1" class="size-medium wp-image-1290" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?resize=300%2C239&#038;ssl=1" alt="Security Patches - May 2015" width="300" height="239" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?resize=300%2C239&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/Security-Patches.png?w=827&amp;ssl=1 827w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1290" class="wp-caption-text">Security Patches &#8211; May 2015</figcaption></figure>
<p>This month, Microsoft have announced 13 security patches &#8211; three of which are rated as &#8220;critical&#8221; by both <a title="Microsoft Security Bulletin Summary for May 2015" href="https://technet.microsoft.com/en-us/library/security/ms15-may.aspx" target="_blank">Microsoft</a> and <a title="May 2015 Microsoft Patch Tuesday Summary - SANS Internet Storm Center" href="https://isc.sans.edu/forums/diary/May+2015+Microsoft+Patch+Tuesday+Summary/19685/" target="_blank">SANS</a> despite there being no known exploits in the wild.</p>
<p>Unfortunately for lots of organisations, this means that they will downgrade the priority and, in some cases, will delay patching for weeks if not months.</p>
<p>This is a mistake.</p>
<p>On the day security patches are announced, it is rarely clear if exploits are out in the wild. The nature of vulnerability research means that lots of the specifics are kept quiet and often different researchers hit upon the same vulnerability at the same time.</p>
<p>The problem is that it isnt JUST the researchers who find vulnerabilities.</p>
<p>So, on the day the security patch is released, we know that there are &#8220;white hat&#8221; researchers who can exploit the vulnerability but we dont know if there are any (or how many) nasty &#8220;black hat&#8221; types have also found it. If <a href="http://www.metasploit.com/" target="_blank">Metasploit</a> doesnt have a module for the exploit then we sort of guess its not in the wild, but this is just a guess.</p>
<figure id="attachment_1292" aria-describedby="caption-attachment-1292" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1292" data-permalink="http://www.halkynconsulting.co.uk/a/2015/05/security-patches-internet-explorer/patch-151979_1280/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?fit=1280%2C640&amp;ssl=1" data-orig-size="1280,640" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Security Patches &#8211; IT Plasters" data-image-description="&lt;p&gt;Security Patches &#8211; IT Plasters&lt;/p&gt;
" data-image-caption="&lt;p&gt;Security Patches &#8211; IT Plasters&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?fit=300%2C150&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?fit=1024%2C512&amp;ssl=1" class="wp-image-1292 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?resize=300%2C150&#038;ssl=1" alt="Security Patches - IT Plasters" width="300" height="150" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?resize=300%2C150&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?resize=1024%2C512&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/05/patch-151979_1280.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1292" class="wp-caption-text">Security Patches &#8211; IT Plasters</figcaption></figure>
<p>From here things get worse. As soon as patches are released, the bad guys will be able to start reverse engineering the code and building exploits. Worryingly this can happen an awful lot faster than most IT managers would ever imagine.</p>
<p>It is realistic to assume that within about 24 hours of a security patch being released, high end hackers will have a way of exploiting the vulnerability. Within 48 &#8211; 72 hours more will have it and by the end of the first week, exploits will be available to pretty much any malicious hacker who wants it. It might not yet be a metasploit module, but that just means you are safe from the bottom end script kiddies.</p>
<p>Delaying patches is a massive mistake. Check them, test them and get them into the environment as quickly as possible or make sure you fully understand the risks and have some compensating controls in place.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/05/security-patches-internet-explorer/">Security Patches &#8211; Internet Explorer &#8211; Act Fast</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1289</post-id>	</item>
		<item>
		<title>Phishing attacks continue to evolve and spread malware</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/04/phishing-attacks-continue-to-evolve-and-spread-malware/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/04/phishing-attacks-continue-to-evolve-and-spread-malware/#comments</comments>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Sun, 26 Apr 2015 14:30:04 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1273</guid>

					<description><![CDATA[<p>As most internet users know, phishing attacks are very common. The term itself dates back to 1995 (e.g. AOHell) and social engineering (which is basically what phishing is) goes back as long as we have had societies. At a basic level, phishing is an attempt by a malicious party to get the recipient (victim) to [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/04/phishing-attacks-continue-to-evolve-and-spread-malware/">Phishing attacks continue to evolve and spread malware</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As most internet users know, phishing attacks are very common. The term itself dates back to 1995 (e.g. <a title="AOHell - An early phishing and hacking tool targeting AOL users" href="http://en.wikipedia.org/wiki/AOHell" target="_blank">AOHell</a>) and social engineering (which is basically what phishing is) goes back as long as we have had societies.</p>
<figure id="attachment_1276" aria-describedby="caption-attachment-1276" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?ssl=1" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1276" data-permalink="http://www.halkynconsulting.co.uk/a/2015/04/phishing-attacks-continue-to-evolve-and-spread-malware/phsihingemail/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?fit=900%2C662&amp;ssl=1" data-orig-size="900,662" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Phishing Email" data-image-description="&lt;p&gt;Phishing Email &#8211; note the detail attempting to give it an air of legitimacy. &lt;/p&gt;
" data-image-caption="&lt;p&gt;Phishing Email &#8211; note the detail attempting to give it an air of legitimacy. &lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?fit=300%2C221&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?fit=900%2C662&amp;ssl=1" class="wp-image-1276 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?resize=300%2C221&#038;ssl=1" alt="Phishing Email - note the detail attempting to give it an air of legitimacy. " width="300" height="221" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?resize=300%2C221&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/04/phsihingemail.png?w=900&amp;ssl=1 900w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1276" class="wp-caption-text">Phishing Email &#8211; note the detail attempting to give it an air of legitimacy.</figcaption></figure>
<p>At a basic level, phishing is an attempt by a malicious party to get the recipient (victim) to carry out an action. Over the years this has ranged from giving up sensitive details (passwords, credit card details etc) to simply opening a malicious file.</p>
<p>Following on from the success of these attacks, banks and credit card companies have taken significant steps to combat fraud so, now, the majority of phishing attacks look to get you to open a file. Examples include documents such as &#8220;invoice.xlsx&#8221; or &#8220;payment.pdf&#8221; type files. These are normally &#8220;trojans&#8221; which, when opened, will carry out attacks on your operating system directly.</p>
<p>Most of the time, these phishing messages are generated by scripts across multiple languages. Frequently this results in the awkward English which alerts the recipient and forms the brunt of most anti-phishing awareness training.</p>
<p>However, the attackers are always evolving and today our email systems started getting this message:</p>
<blockquote><p>Dear Sir,</p>
<p>I am trying to call you on phone now to explain to you about the amendment of the invoice as discussed on tuesday but your number is not connecting. regards to our phone call on tuesday afternoon, i have attached to you the  profoma invoice for the new order.</p>
<p>You have to know that attached is the amended proforma invoice and design for our shipment, because price in invoice was not our agreement after the confirmation of the order. please you have to confirm that the stated prices are correct.</p>
<p>We expect to receive the shipment of goods within the specified time on this order. kindly give me your confirmation and your profoma for payment arrangement.</p>
<p>Any questions, kindly let me know.</p>
<p>Best regards,</p>
<p>Ishmel Zahab</p>
<p>&nbsp;</p>
<p>Manager<br />
Business Empire International<br />
Marketing, Trading, Consulting<br />
Suite # 15, 2nd Floor, Rehmat Center,<br />
I-8 Markaz Islamabad, Pakistan.<br />
Tel:   +9251 4138116, 4938119<br />
Cell:  +92 865 506 6191<br />
Fax:   +9211 4861 376</p>
<p>URL: www.empireinternational.com    sales@empireinternational.com</p>
<p>Skype: businesempire</p>
<p>&nbsp;</p>
<p>* This is a system generated document and does not require signature.</p></blockquote>
<p>As you can see, there is a massive element of legitimacy around the content here, it is able to get through lots of spam filters and it is likely to be convincing enough for a lot of people to open the attached RAR file. (The attached file contains a trojan downloader which can flood the target machine with lots of unwanted additional software).</p>
<p>The bad news here is that the attackers are becoming more advanced in their trickery.</p>
<p>The good news is that they are still quite obvious when you know what to look for and this phishing provides lots of examples to use in your awareness training packages.</p>
<h2>Phishing Indicators</h2>
<p>Using this email, we can list the key indicators which should make any recipient suspicious enough to look into things further. Some are more technical than others, but all internet users should be aware enough to at least consider there.</p>
<ul>
<li>The email is unexpected. We have never done business with this organisation, have never given them a phone number, never had a phone call with this organisation and never made an order. <em>Note: the attackers are trying to take advantage of people who might assume someone else in the organisation has made an order. <strong>Don&#8217;t fall for this</strong>.</em></li>
<li>The email is vague. There are no specifics. The recipient name isn&#8217;t used. There is no indication as to what the goods might be. <em>Note: the attackers have to be vague because they don&#8217;t know what the target organisation is likely to sell. This is a good clue it is phishing.</em></li>
<li>The language used is awkward. This is harder for non-native English speakers and should only be a weak indicator of phishing. However, for native English speakers, the grammar and language is very unusual. The first sentence of the middle paragraph is trying to get the recipient to open the attachment, but the language used is unfathomable.<em> Note: Attackers tend to use scripts to generate phishing messages which leads to this weird use of language</em>.</li>
<li>The recipients are hidden. The attacker has used a mailing list of targets but the content implies this should be a very one to one message. It seems unlikely that they would have had the same phone problems with multiple organisations so it makes no sense for this message not to be to a named person. <em>Note: the attackers are trying to mask the size of their mailing list. Any message which is to a hidden list should be treated as suspicous and is almost certainly spam</em>.</li>
<li>The from address doesn&#8217;t match the company name. As you can see in the screenshot above, the message appears to come from lima@generalemballage.com but the signature line is empireinternational.com. This is unusual and should make any reader wary of the content. <em>Note: Attackers often have to use hijacked mail relays or compromised accounts which is why the recipient address is often unusual. Always check it</em>.</li>
<li>The URL is wrong. Business Empire International has a web presence and the postal address matches the details given in the email &#8211; however it&#8217;s website is http://bei.com.pk/ not www.empireinternational.com (which at the time of writing appears to not be in use). This indicates that the scammers may have been gearing up to create a &#8220;backstory&#8221; website to give credibility, but a google search indicates the correct URL to visit. <em>Note: Phishing counts on people not checking the details, so make sure you do check any emails you are suspicious of</em>.</li>
<li>Finally, a technical check indicates that none of the information presented in the email headers is trustworthy, making the entire message suspicious.<em> Note: it is probably not worth checking every email but learn how to check file headers in your chosen mail client</em>.</li>
</ul>
<p>The technical details mentioned above are the internet headers (file &#8211; &gt; properties in MS Outlook). For this message the key bits were:</p>
<p>The initial mail header reads:<br />
<code>Received: from [91.236.116.134] (port=50012 helo=[10.116.134.14]) by cpanel.puninar.com with esmtpa (Exim 4.85) (envelope-from &lt;lima@generalemballage.com&gt;) id 1Ylw02-000758-81; Sat, 25 Apr 2015 16:03:51 +0700</code></p>
<p>This tells us where the message originated and from this, it looks like the phishers had access to a Dedicated Server account hosted in Sweden. It is likely that they have actually compromised a workstation and are using this connection rather than a direct attack on the servers.</p>
<p>Next we look at the from and reply-to fields:<br />
<code>From: "Ishmel Zahab "&lt;lima@generalemballage.com&gt;<br />
Date: Sat, 25 Apr 2015 17:03:05 +0800<br />
Reply-To: sales@empireinternational.com</code><br />
This is a very good indicator of phishing &#8211; the from account is a different domain to the reply-to. Attackers often use this to make sure any curious reply messages are captured by them, rather than the person they are impersonating.</p>
<p>Lastly, with this message, we have some useful headers the mail transport agent have added to assist in tracking down malicious use:<br />
<code>X-AntiAbuse: This header was added to track abuse, please include it with any abuse report<br />
X-AntiAbuse: Primary Hostname - cpanel.puninar.com<br />
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]<br />
X-AntiAbuse: Sender Address Domain - generalemballage.com<br />
X-Get-Message-Sender-Via: cpanel.puninar.com: authenticated_id: hrd@puninaryusen.com</code></p>
<p>Here we have some useful information.</p>
<ol>
<li>The compromised service appears to be cpanel.puniar.com but this doesn&#8217;t exist as a web address.</li>
<li>The sender domain claims to be generalemballage.com &#8211; which exists but appears to be located in Algeria and Tunisia.</li>
<li>The User ID apparently associated with the outbound email is hrd@puninaryusen.com. This email address is associated with a lot of job adverts in Indonesia.</li>
</ol>
<p>All of this gives us some useful background into the phishing message. We can, with reasonable confidence, conclude that the hrd@puninaryusen.com email account has been compromised (probably by malware) and is being used to spread more malware via some open mail relays and possibly a compromised mail account owned by generalemballage.com.</p>
<p>It also gives us utmost confidence in deleting the message without ever reading the attachment.</p>
<p>As there are a couple of other organisations who already appear to be compromised by this email, it would be good practice to notify them &#8211; however this may be difficult if they don&#8217;t have public &#8220;abuse&#8221; or technical support contacts. As an example, puninaryusen.com doesn&#8217;t have a functioning site so may not have any one to respond to the phishing report.</p>
<p>So, in summary, phishing is likely to remain with us as long as people interact with other people. It is important to make sure you (and your employees etc.) remain far enough ahead of what the attackers do that you can spot their methods and understand your systems well enough to realise when someone is trying to trick you.</p>
<p>If they get past your defences, then it is time to roll out the incident response but that is for another day.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/04/phishing-attacks-continue-to-evolve-and-spread-malware/">Phishing attacks continue to evolve and spread malware</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/04/phishing-attacks-continue-to-evolve-and-spread-malware/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1273</post-id>	</item>
		<item>
		<title>Budgets &#8211; Security&#8217;s friend or foe</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/03/budgets-securitys-friend-or-foe/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 09 Mar 2015 09:55:24 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Asset Protection]]></category>
		<category><![CDATA[Budgets]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1250</guid>

					<description><![CDATA[<p>Budgets are integral to every business. The start up&#8217;s business plan has to include budgets and the multinational will have an entire finance unit geared around making sure that every year the numbers are crunched, and budgets allocated. At a very fundamental level, a budget allows businesses to grow. It allows them to develop without going [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/03/budgets-securitys-friend-or-foe/">Budgets &#8211; Security&#8217;s friend or foe</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Budgets are integral to every business. The start up&#8217;s business plan has to include budgets and the multinational will have an entire finance unit geared around making sure that every year the numbers are crunched, and budgets allocated.</p>
<figure id="attachment_1252" aria-describedby="caption-attachment-1252" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1252" data-permalink="http://www.halkynconsulting.co.uk/a/2015/03/budgets-securitys-friend-or-foe/budgets_finance_accounting/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?fit=1800%2C1440&amp;ssl=1" data-orig-size="1800,1440" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Budgets need to be managed properly or security suffers" data-image-description="&lt;p&gt;Budgets need to be managed properly or security suffers&lt;/p&gt;
" data-image-caption="&lt;p&gt;Budgets need to be managed properly or security suffers&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?fit=300%2C240&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?fit=1024%2C819&amp;ssl=1" class="size-medium wp-image-1252" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?resize=300%2C240&#038;ssl=1" alt="Budgets need to be managed properly or security suffers" width="300" height="240" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?resize=300%2C240&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?resize=1024%2C819&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets_finance_accounting.jpg?w=1800&amp;ssl=1 1800w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1252" class="wp-caption-text">Budgets need to be managed properly or security suffers</figcaption></figure>
<p>At a very fundamental level, a budget allows businesses to grow. It allows them to develop without going bankrupt. It mitigates the risks from excessive or wayward employees. Possibly most importantly, budgets can limit financial exposure and ensure that the company can continue to pay dividends.</p>
<p>This is good. This is all good.</p>
<p>This is also essential for business security. Without defined budgets, it is impossible for a company to even know if it is overspending, or taking too much risk, and this seriously undermines security.</p>
<p>Unfortunately budgets frequently develop a life of their own. As organisations grow, so does the budget and so does the complexity. This is where, suddenly, your budget strategy can start to work against you.</p>
<p>For start ups, it isn&#8217;t a problem. Most of the time, the financial data will be theoretical and simple. The budget is there to get funding and it is all controlled by one business.</p>
<p>As businesses get bigger, one of the first changes which happens is creating different &#8220;business units&#8221; or budget categories. This can be hidden under lots of different names (cost centre, billing unit etc), but the effect is the same.</p>
<p>It is easy to see why businesses do this. Having separate budgets for separate functions helps focus spending. It also helps identify weak / strong parts of the business.</p>
<p>The problem is that security is all encompassing but organisations create &#8220;security&#8221; budgets. This can create a major risk.</p>
<h1>When budgets create risk &#8211; cutting costs</h1>
<p>For most managers with budget responsibility, certain mindsets evolve:</p>
<ol>
<li>Budgets should be reduced whenever possible, often every year.</li>
<li>Any budget not spent is lost in subsequent years.</li>
<li>Subordinates who come in under-budget get rewarded (but the budget is reduced each year).</li>
<li>Subordinates who increase budget are penalised.</li>
</ol>
<p>In very basic terms, this makes sense. The idea is that it increases efficiency and rewards innovation. These are good traits.</p>
<p>It also means that business units become very focussed on what &#8220;rewards&#8221; them specifically and what they have to pay for. This is still good.</p>
<p>Where it goes wrong is when one cost centre realises it can cut costs because any impact will be carried elsewhere. This is a double-whammy for the business itself, not only will the impact be felt <em>somewhere</em>, but the person leading to this gets rewarded.</p>
<p>As mentioned before, security is really everyone&#8217;s business but gets parcelled off into its own department. Oddly, IT Security seems to be the worst affected by this, frequently seen as an unwanted part of IT rather than an essential business enabler.</p>
<p>By creating departmental budgets, your organisation may be unwittingly encouraging people to undermine security. Is this really what you want?</p>
<h1>Security-damaging budgets &#8211; case study</h1>
<figure id="attachment_1261" aria-describedby="caption-attachment-1261" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1261" data-permalink="http://www.halkynconsulting.co.uk/a/2015/03/budgets-securitys-friend-or-foe/budgets-security-risk/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?fit=1200%2C900&amp;ssl=1" data-orig-size="1200,900" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Dont let budgets dilute the overall cost to your business" data-image-description="&lt;p&gt;Dont let budgets dilute the overall cost to your business&lt;/p&gt;
" data-image-caption="&lt;p&gt;Dont let budgets dilute the overall cost to your business&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?fit=1024%2C768&amp;ssl=1" class="wp-image-1261 size-medium" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?resize=300%2C225&#038;ssl=1" alt="Dont let budgets dilute the overall cost to your business" width="300" height="225" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?resize=1024%2C768&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/03/budgets-security-risk.jpg?w=1200&amp;ssl=1 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1261" class="wp-caption-text">Don&#8217;t let budgets dilute the overall cost to your business</figcaption></figure>
<p>In the last two months, Halkyn Consulting has worked with two organisations who have suffered from this. Both encountered costly security issues which arose from the application of discrete budgets. Both had very good security teams, who we assisted in developing improvements. Both could have saved significant amounts of money by <strong>not</strong> cutting budgets earlier on. Both rewarded the personnel responsible for the savings but had no mechanism to hold them accountable for the costs.</p>
<p>Just to reiterate: <strong>Both companies implemented &#8220;savings&#8221; which led to the overall organisation losing significantly more than they saved</strong>.</p>
<p>To explain this, we will use one of the clients as a case study into how budgets can bite.</p>
<p><span style="text-decoration: underline;">Case Study: National business services provider</span>.</p>
<p>Our client had a well developed IT infrastructure supporting 24 office locations across the country, a single data centre and a large field sales team. The sales team were entirely reliant on portable devices. The organisation took its security seriously and has a well resourced IT Security team. All is good so far.</p>
<p>The cost of purchasing mobile devices was taken from the regional sales teams budgets. The cost of responding to security incidents was taken from IT Security. The cost of managing security infrastructure was taken from IT Security.</p>
<p>About 24 months ago, a well meaning sales executive saw a way to reduce costs. The sales teams were purchasing &#8220;approved&#8221; devices which were built to meet the IT Security requirements. It turned out to be a lot cheaper to let users bring their own devices (BYOD) or purchase more basic ones off the shelf.</p>
<p>In all, the sales executive shaved approximately £150,000 off the costs of purchasing assets. This aligned to a major move towards mobile technology and data sharing applications.</p>
<p>The problem was that now, the IT Security team had little or no control over what was happening. Worse than that, the IT Security team had no knowledge of what was happening. The move to BYOD was done in such a way that monitoring was removed and after the first wave of new devices, no one even thought to engage the IT people.</p>
<p>After a few months problems started to occur. Malware was on the rise. Users were falling victim to phishing attacks. Devices containing commercially sensitive data were lost.</p>
<p>In hindsight, the increase security costs in responding to these incidents was assessed to be £170,000 in the first twelve months alone.</p>
<p>Then a pretty nasty bit of malware hit. One of the field sales team was hit with malware. This then sent emails to everyone in his address book and the vast majority of users became infected and started sending outbound spam. Now, the field sales team were, in effect acting as a massive criminal botnet. More than a few users were then hit with ransomware and critical data was encrypted. As a final nail, only now it was discovered that the users with trendy BYOD devices didn&#8217;t have centrally managed backups and the data was irretrievably lost.</p>
<p>The final assessment was that in the 24 month period, security incidents had cost the company a total of £385,000 in direct costs and an unknown amount of lost sales.</p>
<p>Because of the company structure, however, the costs were carried by the IT Security department and the savings were carried by the field sales department. The executive who led this change was rewarded with a large bonus 18 months ago and left the company 12 months ago.</p>
<p>The bottom line? The sales executive was rewarded for losing the company over £235,000 simply because the budget structure made it initially look like a saving.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/03/budgets-securitys-friend-or-foe/">Budgets &#8211; Security&#8217;s friend or foe</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1250</post-id>	</item>
		<item>
		<title>Staysure security breach leads to ICO Fine</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/03/staysure-security-breach-leads-to-ico-fine/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Mon, 02 Mar 2015 09:00:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPA]]></category>
		<category><![CDATA[ICO]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1243</guid>

					<description><![CDATA[<p>The Information Commissioner&#8217;s Office announced on 24 Feb 2015 that it had levied a monetary penalty of £175,000 against the holiday insurance company Staysure. The fine came about as a result of Staysure suffering a security breach on their website which exposed more than 100,000 customer records and led to more than 5,000 customers having their credit [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/03/staysure-security-breach-leads-to-ico-fine/">Staysure security breach leads to ICO Fine</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Information Commissioner&#8217;s Office announced on 24 Feb 2015 that it had levied a monetary penalty of £175,000 against the holiday insurance company Staysure. The fine came about as a result of Staysure suffering a security breach on their website which exposed more than 100,000 customer records and led to more than 5,000 customers having their credit cards used by fraudsters.</p>
<p>What is really surprising about the ICO investigation &#8211; and almost certainly led to the fairly large fine for a private sector body &#8211; is the discovery that Staysure had some very serious security failings.</p>
<p>The <a title="ICO fines insurance firm after hacked card details used for fraud" href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2015/02/ico-fines-insurance-firm-after-hacked-card-details-used-for-fraud/" target="_blank">ICO reported</a> that:</p>
<blockquote><p>Attackers potentially had access to over 100,000 live credit card details, as well as customers’ medical details. Credit card security numbers, the number on the signature strips on the back of the cards, were also accessible despite industry rules that they should not be stored at all.</p></blockquote>
<p>The important bit is the last sentence. Staysure have massively failed to comply with the PCI-DSS guidelines and by retaining this data have exposed their customers to monumental risks.</p>
<p>This is bad practice and any security professional would advise against it. In fact it is hard to see how this can be done while still complying with any of Staysure&#8217;s IT security policies, until you read further on in the announcement:</p>
<blockquote><p>The company had no policy or procedures in place to review and update IT security systems, and had twice failed to update database software which could have prevented this incident. This left security flaws in the system, some for as long as five years, which hackers ultimately exploited to gain access to customer information.</p></blockquote>
<p>So, it seems that despite providing an insurance product, in a heavily regulated industry and handling large amounts of very sensitive personal and financial data for their customers, Staysure failed to implement some basic security controls.</p>
<p>Staysure has been in business for ten years and has been exploited for at least five of them.</p>
<figure id="attachment_1244" aria-describedby="caption-attachment-1244" style="width: 298px" class="wp-caption aligncenter"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?ssl=1"><img loading="lazy" decoding="async" data-attachment-id="1244" data-permalink="http://www.halkynconsulting.co.uk/a/2015/03/staysure-security-breach-leads-to-ico-fine/staysure/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?fit=1072%2C1080&amp;ssl=1" data-orig-size="1072,1080" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Staysure Insurance" data-image-description="&lt;p&gt;Staysure insurance fined for failing to have any security policies.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Staysure insurance fined for failing to have any security policies.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?fit=298%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?fit=1016%2C1024&amp;ssl=1" class="size-medium wp-image-1244" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?resize=298%2C300&#038;ssl=1" alt="Staysure insurance fined for failing to have any security policies." width="298" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?resize=298%2C300&amp;ssl=1 298w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?resize=1016%2C1024&amp;ssl=1 1016w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/staysure.jpg?w=1072&amp;ssl=1 1072w" sizes="auto, (max-width: 298px) 100vw, 298px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1244" class="wp-caption-text">Staysure insurance fined for failing to have any security policies.</figcaption></figure>
<p>It is hard to know what the impact to Staysure&#8217;s business will be as a result of this breach. It may be minor &#8211; beyond the fine- but for any company dealing with customer data this is a massive risk to have carried for so long.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/03/staysure-security-breach-leads-to-ico-fine/">Staysure security breach leads to ICO Fine</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1243</post-id>	</item>
		<item>
		<title>Retail security in an online world</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/#comments</comments>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Sat, 21 Feb 2015 21:23:34 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Asset Protection]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Loss Reduction]]></category>
		<category><![CDATA[Retail Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1225</guid>

					<description><![CDATA[<p>The internet has been changing the world for decades now, and nowhere has this been more obvious than the retail sector. Internet access has opened up new markets, invented new businesses and allowed retailers to grow in ways never before imagined. However, along with this growth, the internet has also shown that retail security needs [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/">Retail security in an online world</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The internet has been changing the world for decades now, and nowhere has this been more obvious than the retail sector. Internet access has opened up new markets, invented new businesses and allowed retailers to grow in ways never before imagined. However, along with this growth, the internet has also shown that retail security needs to evolve and adapt to keep up.</p>
<figure id="attachment_1229" aria-describedby="caption-attachment-1229" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1229" data-permalink="http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/010509_0747_0056_lsms/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/010509_0747_0056_lsms.jpg?fit=600%2C400&amp;ssl=1" data-orig-size="600,400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Retail security" data-image-description="&lt;p&gt;Retail security &#8211; behind a computer, its hard to spot criminals&lt;/p&gt;
" data-image-caption="&lt;p&gt;Retail security &#8211; behind a computer, its hard to spot criminals&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/010509_0747_0056_lsms.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/010509_0747_0056_lsms.jpg?fit=600%2C400&amp;ssl=1" class="size-medium wp-image-1229" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/010509_0747_0056_lsms.jpg?resize=300%2C200&#038;ssl=1" alt="Retail security - behind a computer, its hard to spot criminals" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/010509_0747_0056_lsms.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/010509_0747_0056_lsms.jpg?w=600&amp;ssl=1 600w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1229" class="wp-caption-text">Retail security &#8211; behind a computer, its hard to spot criminals</figcaption></figure>
<p>Earlier this year, we <a title="Retail security, business protection, loss reduction" href="http://www.halkynconsulting.co.uk/a/2015/01/retail-security-business-protection-loss-reduction/" target="_blank">talked about the BRC Retail Crime Survey</a>, which highlighted that retailers in the UK are quite rightly concerned about the security risks they face as they go online. Correctly, the BRC placed a lot of emphasis on the police to investigate crime and arrest criminals, however the basics of retail security really need to be driven by the retailers themselves.</p>
<p>Retail security in an online world needs to follow on from the good practices driven by centuries of experience &#8211; shops lock up at night, tills are kept safe, stock is protected &#8211; it just needs to adapt.</p>
<h1>Retail security &#8211; online threats</h1>
<p>The first step to adapting is understanding how things are different online. This is important because all too often retailers leave their doors wide open, their tills abandoned and their stock exposed simply because they don&#8217;t realise where the walls and doors have move to.</p>
<p>By learning how criminals will leverage the internet, retailers can also learn what they need to do to avoid becoming a victim of crime.</p>
<p>While we can&#8217;t cover everything in one blog post &#8211; we can look at one common attack which frequently leaves a retailer out of pocket with very little risk to the criminal.</p>
<h2>Triangulation attacks</h2>
<p>One type of threat which retail security faces in the online world is called a &#8220;triangulation attack.&#8221;</p>
<figure id="attachment_1232" aria-describedby="caption-attachment-1232" style="width: 610px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/retailfraudflow/" rel="attachment wp-att-1232"><img loading="lazy" decoding="async" data-attachment-id="1232" data-permalink="http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/retailfraudflow/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?fit=1297%2C1010&amp;ssl=1" data-orig-size="1297,1010" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Retail Security &#8211; Triangulation Attack Flow" data-image-description="&lt;p&gt;&lt;strong&gt;Retail security threats &#8211; triangulation attack workflow. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is a simplified version of how retailers face financial loss and customer dissatisfaction as a result of a triangulation attack. Read more about this on our blog post.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Retail security threats &#8211; triangulation attack workflow.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?fit=300%2C234&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?fit=1024%2C797&amp;ssl=1" class="wp-image-1232 size-large" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?resize=610%2C475&#038;ssl=1" alt="Retail security threats - triangulation attack workflow." width="610" height="475" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?resize=1024%2C797&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?resize=300%2C234&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/02/retailfraudflow.png?w=1297&amp;ssl=1 1297w" sizes="auto, (max-width: 610px) 100vw, 610px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1232" class="wp-caption-text">Retail security threats &#8211; triangulation attack workflow.</figcaption></figure>
<p>The way this attack works is quite simple &#8211; which is why it presents a growing problem for retail security and can cost businesses dearly.</p>
<ol>
<li><strong>A criminal gets hold of a stolen credit card</strong>. This is surprisingly easy and criminals can either steal them by hacking other retailers or purchase them directly on the black market.</li>
<li><strong>The criminal posts an advert online</strong>. Often on eBay, but other second-hand sales portals (such as Craigslist, Facebook marketplace etc) are used. This is normally for a fairly high value item such as the latest iPhone or games console. However, as retail security becomes more aware, criminals are moving to sell less obvious items.</li>
<li><strong>The innocent customer bids or purchases the item</strong>. The customer is pretty innocent in all this and normally just thinks they are getting an excellent bargain.</li>
<li><strong>The criminal places the customers order with an innocent retailer</strong>. This is where the triangulation begins. Using the stolen credit card, the criminal orders the goods to be shipped to the innocent customer. The customer, however, pays the criminal &#8211; normally via a difficult to trace PayPal, Moneygram or Western Union transaction.</li>
<li><strong>The credit card company&#8217;s security kicks in</strong>. At some point the stolen card will be reported and blocked. Unfortunately this is often after the order has been placed and the innocent retailer has shipped the product. This is one reason why retail security needs to link up with other sectors to function properly.</li>
<li><strong>The bank / card payment company refuse to pay or reclaim funds</strong>. For the retailer, this is where it really hurts. Frequently, the retailer has shipped the product when the bank reverse the payment leaving the innocent retailer out of pocket.</li>
<li><strong>Retailer has to make a choice</strong>. When a retailer becomes a victim of this scam, they have to decide if they can absorb the loss and move on, or if they are going to try and recover the product from the customer. Having a good retail security policy in place before this happens will help you decide which is best for your business as both options carry costs.</li>
<li><strong>Everyone but the criminal loses out</strong>. As a retailer, even if you manage to get the product back from the customer, you will have lost time and money in recovering it and you will have certainly lost a lot of goodwill with the innocent customer. The criminal, however, has made off with the customers money and is likely to be very difficult to trace.</li>
</ol>
<p>As you can see, for very little effort, the criminal has made a profit and without good retail security measures in place, the retailer and customer have lost out.</p>
<p>A few years ago this sort of attack was pretty much entirely aimed at Amazon, eBay and the likes, however this is no longer true. The big targets have spent massive amounts of money on building anti-fraud teams, retail security specialists and e-crime investigators so the criminals have moved on.</p>
<p>Now, any retailer, in any sector, is at risk.</p>
<p>Dont wait until it is too late and dont rely on the police to lock your doors. Good retail security is the responsibility of every retailer.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/">Retail security in an online world</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/02/retail-security-in-an-online-world/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1225</post-id>	</item>
		<item>
		<title>ISO27001 Self Assessment Checklist hits record downloads</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/02/iso27001-self-assessment-checklist-record-downloads/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2015/02/iso27001-self-assessment-checklist-record-downloads/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Thu, 19 Feb 2015 10:56:55 +0000</pubDate>
				<category><![CDATA[Security News]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1235</guid>

					<description><![CDATA[<p>The ever popular ISO27001 self assessment checklist is now being downloaded at around 1000 times a month. Since we published it in October 2013, there have been over 13000 copies downloaded and we have provided unprotected versions to over 900 different organisations and individuals. Hopefully this is a sign that security is being taken seriously [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/02/iso27001-self-assessment-checklist-record-downloads/">ISO27001 Self Assessment Checklist hits record downloads</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The ever popular <a title="ISO27001 Self assessment checklist" href="http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/" target="_blank">ISO27001 self assessment checklist</a> is now being downloaded at around 1000 times a month. Since we published it in October 2013, there have been over 13000 copies downloaded and we have provided unprotected versions to over 900 different organisations and individuals.</p>
<p>Hopefully this is a sign that security is being taken seriously across the globe! As always, if there is anything your organisation would like advice on, we&#8217;d be more than happy to assist.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/02/iso27001-self-assessment-checklist-record-downloads/">ISO27001 Self Assessment Checklist hits record downloads</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2015/02/iso27001-self-assessment-checklist-record-downloads/feed/</wfw:commentRss>
			<slash:comments>76</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1235</post-id>	</item>
		<item>
		<title>Retail security, business protection, loss reduction</title>
		<link>http://www.halkynconsulting.co.uk/a/2015/01/retail-security-business-protection-loss-reduction/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Tue, 20 Jan 2015 22:21:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Asset Protection]]></category>
		<category><![CDATA[BCS]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Loss Prevention]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1200</guid>

					<description><![CDATA[<p>Retail security is in the news again as the British Retail Consortium (BRC) report that crime in this sector has reached a 10 year high. This reporting appears to indicate crime accounts for almost 0.2% of the total sector turnover. As reported by the BBC this includes the possibly obvious activities such as shoplifting, but [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/01/retail-security-business-protection-loss-reduction/">Retail security, business protection, loss reduction</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1203" aria-describedby="caption-attachment-1203" style="width: 250px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="1203" data-permalink="http://www.halkynconsulting.co.uk/a/2015/01/retail-security-business-protection-loss-reduction/crime_p_icon/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/Crime_P_icon.png?fit=500%2C450&amp;ssl=1" data-orig-size="500,450" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Retail crime is more than just shoplifting" data-image-description="&lt;p&gt;Retail crime is more than just shoplifting. Cybercrime is now presenting a significant issue for all businesses and the customer-facing retail sector is bearing the brunt of this.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Retail crime is more than just shoplifting.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/Crime_P_icon.png?fit=300%2C270&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/Crime_P_icon.png?fit=500%2C450&amp;ssl=1" class="wp-image-1203" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/Crime_P_icon.png?resize=250%2C225&#038;ssl=1" alt="Retail crime is more than just shoplifting." width="250" height="225" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/Crime_P_icon.png?w=500&amp;ssl=1 500w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/Crime_P_icon.png?resize=300%2C270&amp;ssl=1 300w" sizes="auto, (max-width: 250px) 100vw, 250px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1203" class="wp-caption-text">Retail crime is more than just shoplifting.</figcaption></figure>
<p>Retail security is in the news again as the British Retail Consortium (BRC) report that crime in this sector has reached a 10 year high. This reporting appears to indicate crime accounts for almost 0.2% of the total sector turnover.</p>
<p>As reported by the BBC this includes the possibly obvious activities such as shoplifting, but also some more high tech twists as cyber crime and internet fraud are being included.</p>
<p>The summary of this is that crime, in general, presents a fairly significant risk for any retail business, even though the sector itself is quite large:</p>
<p>(source: <a title="BBC News: Retail crime in UK at 10-year high, industry report says" href="http://www.bbc.co.uk/news/business-30889846" target="_blank">BBC News</a>)</p>
<blockquote><p>Crime cost the UK retail industry £603m in the 2013-14 financial year, 18% higher than the previous 12 months, according to new research.</p></blockquote>
<p>This is the highest level of crime in the retail sector reported since the BRC began keeping records in 2003. For some retailers, especially within the small &#8211; medium business sector, the losses incurred by criminal activities outweigh any other operating costs and for all assets stolen the business owner not only loses a sale, but must pay to replace the loss.</p>
<p>For most retailers, crime in this sector is assumed to be mostly shoplifting with jewellers and electronics stores also facing the risk of more obvious robberies.</p>
<p>However, the BRC report also shows that online activity presents a very significant issue for UK retailers and, combined with fraud, this criminal activity has more than made up for a reduction in the traditional methods: (Again, from the BBC News item, emphasis mine)</p>
<ul>
<li>customer theft made up the bulk of the criminal activity, accounting for 81% of all incidents</li>
<li>retailers reported a total of 135,814 incidents of fraud, <strong>up 12%</strong> on the previous financial year</li>
<li>there were five robberies per 100 stores in 2013-14, a <strong>29% decrease</strong> but the cost per robbery fell only marginally, from £1,316 per incident in 2012-13 to £1,280 per incident in 2013-14</li>
</ul>
<p>It seems that for every robbery or burglary, there are over 100 fraud cases, driven by online / cyber criminals attacking the business.</p>
<p>This is captured in the <a title="BRC British Retail Crime Survey" href="http://www.brc.org.uk/brc_policy_content.asp?id=263&amp;iCat=48&amp;iSubCat=646&amp;sPolicy=Retail%20Crime&amp;sSubPolicy=BRC%20Retail%20Crime%20Survey" target="_blank">Report</a> itself with the following bullet point:</p>
<blockquote><p>Retailers reported that cyber attacks pose a critical threat to their business.</p></blockquote>
<h2>Retail sector and Cybercrime</h2>
<p>It shouldn&#8217;t come as a surprise that, as more of the retail sector moves online, so do the criminals targeting this sector. The BRC British Retail Crime report contains this statement:</p>
<blockquote><p>The majority of retailers reported an increase in cyber attacks in 2013-14 and that they pose a critical threat to their business. These ranged from Denial-of-Service attacks to data theft.</p></blockquote>
<p>The benefits from being online are significant &#8211; from direct engagement with customers to rationalisation of supply chains &#8211; so there is genuine value for all retailers to have some sort of presence.</p>
<p>However, as with all business decisions, this needs to be done with a clear understanding of the security risks and what sensible measures should be taken to minimise them. No retail organisation would open a store in a new area without doing at least some research but it seems the rush to get online bypasses this common sense approach.</p>
<figure id="attachment_1218" aria-describedby="caption-attachment-1218" style="width: 300px" class="wp-caption alignleft"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?ssl=1"><img loading="lazy" decoding="async" data-attachment-id="1218" data-permalink="http://www.halkynconsulting.co.uk/a/2015/01/retail-security-business-protection-loss-reduction/investigations_a_large/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?fit=1000%2C833&amp;ssl=1" data-orig-size="1000,833" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="The retail sector remains vulnerable to cyber attacks" data-image-description="&lt;p&gt;The retail sector remains vulnerable to cyber attacks&lt;/p&gt;
" data-image-caption="&lt;p&gt;The retail sector remains vulnerable to cyber attacks&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?fit=300%2C250&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?fit=1000%2C833&amp;ssl=1" class="size-medium wp-image-1218" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?resize=300%2C250&#038;ssl=1" alt="The retail sector remains vulnerable to cyber attacks" width="300" height="250" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?resize=300%2C250&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2015/01/investigations_a_large.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1218" class="wp-caption-text">The retail sector remains vulnerable to cyber attacks</figcaption></figure>
<p>In 2013-2014, the biggest cyber risks to the retail sector came from online fraud &#8211; largely credit and debit card fraud, however the report also captures the growing trend in more asymmetric cyber attacks such as denial of service, data theft and ransomware.</p>
<p>Although no major UK retailer has hit the news, in the US cyber attacks in the retail sector have produced massive headlines with Target, Home Depot and many other large chains falling victim.</p>
<p>Unfortunately for most smaller organisations, the internet is a great equaliser. It gives retailers the opportunity to sell their products with the same impact as the big chains.</p>
<p>However this means you face the same risks as the big chains, so can you afford the same security?</p>
<h2>Retail cyber security &#8211; key risks</h2>
<ul>
<li><strong>Cyber Fraud</strong>. Criminals will make fake orders, use fake payment cards and many more malicious tricks to get you to give them things for free. This can be harder to spot than real world fraud so you need to be on your guard.</li>
<li><strong>Customer data</strong>. If you collect customer information, such as name &amp; home address, you need to make sure you properly protect it or you could be fined under the Data Protection Act 1998 (with up to £500,000 in fines for a breach).</li>
<li><strong>Credit / debit card data</strong>. If you process this yourself, you need to make sure it cant be breached and dont forget this is very, very high value information for hackers.</li>
<li><strong>Cyber vandals</strong>. Sometimes you will fall foul to &#8220;script kiddies&#8221; and other low-level miscreants. This is likely to lead to website defacements or denial of service attacks. Even though these seem trivial, they can become very costly to deal with and cause your business a lot of damage.</li>
<li><strong>Competitors</strong>. Still rare in the UK, but the internet gives greater scope, especially in more competitive retail markets, for hard to detect and hard to prosecute corporate espionage.</li>
<li><strong>Customers</strong>. Last but not least, there are always risks around what your customers do when they are on your websites or in your retail stores. For lots of businesses it makes sense to offer customers things like free WiFi access, but you need to make sure you have considered the implications &#8211; such as a customer using the free WiFi to commit criminal acts. In 2009, for example, a <a title="UK pub fined 8k for customers WiFi activity" href="http://www.techradar.com/news/internet/broadband/uk-pub-fined-8k-for-drinker-s-wi-fi-download-654606" target="_blank">UK pub was fined £8k</a> for allowing a customer to commit a copyright breach.</li>
</ul>
<h2>Retail cyber security &#8211; what to do</h2>
<p>There is no magic bullet, one-size-fits-all, solution for cyber security, in the retail sector or elsewhere. If anyone claims they can provide this, it is likely to be a scam.</p>
<p>Cyber security is fundamentally the same as the rest of your security. It is about understanding the risks and taking the correct measures to minimise them.</p>
<p>Don&#8217;t be put off using the internet for your business. Yes, there are risks, but there are lots of benefits and lots of ways you can protect yourself.</p>
<p>Some things to consider include:</p>
<ul>
<li>Firewalls</li>
<li>Antivirus</li>
<li>Email filtering</li>
<li>Patch management</li>
<li>Proxy servers for all internet traffic</li>
<li>Network filtering and acceptable use banners for guest/customer services</li>
<li>Robust business continuity planning</li>
<li>Encryption of all sensitive data</li>
<li>Outsourcing payment card processing</li>
<li>Good physical security</li>
<li>Penetration testing for all online applications</li>
</ul>
<p>No article or blog post is every going to compensate for detailed, specific, expert advice so please make sure you seek out a specialist to make sure what you are doing is sensible and effective.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2015/01/retail-security-business-protection-loss-reduction/">Retail security, business protection, loss reduction</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1200</post-id>	</item>
		<item>
		<title>Insider Threat &#8211; Apple Employee Jailed and Fined</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/12/insider-threat-apple-employee-jailed-fined/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Tue, 09 Dec 2014 20:39:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1185</guid>

					<description><![CDATA[<p>The insider threat is in the news again. On 8 December it was reported that ex-Apple employee, Paul Devine, had been sentenced to jail and a fine following a guilty plea on counts of wire fraud and money laundering . From the news reporting, this trusted insider was involved in providing Apple suppliers with confidential information [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/12/insider-threat-apple-employee-jailed-fined/">Insider Threat &#8211; Apple Employee Jailed and Fined</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1186" aria-describedby="caption-attachment-1186" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1186" data-permalink="http://www.halkynconsulting.co.uk/a/2014/12/insider-threat-apple-employee-jailed-fined/handcuffs-146551_1280/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?fit=1280%2C942&amp;ssl=1" data-orig-size="1280,942" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Insider breaches dont always lead to jail time" data-image-description="&lt;p&gt;Insider breaches dont always lead to jail time&lt;/p&gt;
" data-image-caption="&lt;p&gt;Insider breaches dont always lead to jail time&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?fit=300%2C220&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?fit=1024%2C753&amp;ssl=1" class="size-medium wp-image-1186" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?resize=300%2C220&#038;ssl=1" alt="Insider breaches dont always lead to jail time" width="300" height="220" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?resize=300%2C220&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?resize=1024%2C753&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/handcuffs-146551_1280.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1186" class="wp-caption-text">Insider breaches don&#8217;t always lead to jail time</figcaption></figure>
<p>The insider threat is in the news again. On 8 December it was reported that ex-Apple employee, Paul Devine, had been sentenced to jail and a fine following a guilty plea on counts of wire fraud and money laundering .</p>
<p>From the news reporting, this trusted insider was involved in providing Apple suppliers with confidential information about forthcoming products, which in turn allowed them to establish more favourable deals with Apple.</p>
<p>Apple filed its own civil suit against the insider, charging him with accepting more than $1 million in bribes from at least six supplier companies (<a title="Ex-Apple exec going to jail for kickback scheme" href="http://www.cnet.com/news/ex-apple-executive-going-to-jail-for-kickback-scheme/" target="_blank">as reported by C|Net</a>).</p>
<h2>Insider threat and crime</h2>
<figure id="attachment_1190" aria-describedby="caption-attachment-1190" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1190" data-permalink="http://www.halkynconsulting.co.uk/a/2014/12/insider-threat-apple-employee-jailed-fined/jail/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?fit=1072%2C857&amp;ssl=1" data-orig-size="1072,857" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="Crime can result in jail for insiders" data-image-description="&lt;p&gt;Crime can result in jail for insiders&lt;/p&gt;
" data-image-caption="&lt;p&gt;Crime can result in jail for insiders&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?fit=300%2C239&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?fit=1024%2C818&amp;ssl=1" class="size-medium wp-image-1190" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?resize=300%2C239&#038;ssl=1" alt="Crime can result in jail for insiders" width="300" height="239" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?resize=300%2C239&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?resize=1024%2C818&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/12/jail.jpg?w=1072&amp;ssl=1 1072w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1190" class="wp-caption-text">Crime can result in jail for insiders</figcaption></figure>
<p>This situation highlights what is likely to happen when an insider breaks the company policies as well as the law.</p>
<p>Paul was charged with very serious crimes &#8211; wire fraud, conspiracy and money laundering &#8211; which meant he faced 20 years in prison if found guilty. As a result of this, law enforcement investigative resources were involved and he had a very strong incentive to plead guilty for a lesser charge.</p>
<p>However, it is unlikely that even if Apple gets all $4.5 million of the fine, it will cover the business lost over the 5 years he was providing insider information to suppliers and the costs of the subsequent legal actions.</p>
<p>Insider security breaches can be significantly harmful, even for the most technologically advanced company.</p>
<h2>Insider threats and your business</h2>
<p>The unfortunate reality is that most insider security breaches are not this high profile, are not this clearly a crime but significantly more harmful to the company involved.</p>
<p>Your trusted workers are the vital lifeblood for your business, they have to know secrets you want to keep from your competitors (or suppliers, or even customers) and this is why the insider threat is so harmful.</p>
<p>When it comes to risk assessments ask yourself how well you would cope if your key employees were cutting deals to get kickbacks from suppliers, customers or even competitors.</p>
<p>Can you cope with this happening?</p>
<p>Would you be able to detect it?</p>
<p>What could you do about it?</p>
<h2>Combating the insider threat</h2>
<p>There are no simple answers and any action you take to minimise the insider threat has to be driven by your own organisational risk assessments and prevailing circumstances. Your controls should evolve as your business changes and if you are ever in any doubt, specialist advice is available from <a title="Contact Halkyn Consulting Security Team" href="http://www.halkynconsulting.co.uk/security/contact-security-team">Halkyn Consulting</a>.</p>
<p>However, in very general terms, there are three things you need to consider in minimising the insider risk:</p>
<ul>
<li><strong>Pre-employment / Background Screening</strong>. Before you hire a new employee you should carry out some checks. As a bare minimum in the UK, you need to verify they have a right to work, but over and above this you should be checking that their application or CV is true and they are who they say they are. For sensitive posts you can consider additional checks into financial probity or criminal records, but this has to be proportionate for the role.</li>
<li><strong>Employee Aftercare</strong>. Once you hire someone it is important that your organisation keeps your employees feeling welcome and part of the overall team. Your managers should be alert to the indicators of disaffected or dishonest employees and co-workers should feel able to discuss concerns. Remember, it is in every employees interest that you stay in business.</li>
<li><strong>Monitoring</strong>. Employees with access to sensitive or business critical information should be monitored and made aware of this monitoring. As part of your overall security environment, you should consider having audit controls in place to alert you to suspicious events (such as suppliers suddenly taking a hard line, or emails from an employee to a competitor) and a way to track behaviours back to the correct insider.</li>
</ul>
<p>Of course, none of this guarantees you will be safe from insider breaches, but they do mean you can minimise the risk and maximise your ability to detect and recover from them.</p>
<p>Remember, your employees are your lifeblood but it only takes the poison of one bad insider to kill off your business. Make sure your trust is well placed and remain alert to problems.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/12/insider-threat-apple-employee-jailed-fined/">Insider Threat &#8211; Apple Employee Jailed and Fined</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1185</post-id>	</item>
		<item>
		<title>Employee Security &#8211; High risk terminations</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/10/employee-security-high-risk-terminations/</link>
		
		<dc:creator><![CDATA[Halkyn Security Team]]></dc:creator>
		<pubDate>Thu, 23 Oct 2014 21:31:12 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[HR]]></category>
		<category><![CDATA[HR Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1162</guid>

					<description><![CDATA[<p>Employee security really does matter. Your employees are the lifeblood of every organisation. You put a lot of effort into hiring new staff, you train them, you nurture them and in return you get a massive amount of value. However, like it nor not, there will come a point in time when even your best [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/10/employee-security-high-risk-terminations/">Employee Security &#8211; High risk terminations</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1164" aria-describedby="caption-attachment-1164" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1164" data-permalink="http://www.halkynconsulting.co.uk/a/2014/10/employee-security-high-risk-terminations/hand-65688_1280/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280.jpg?fit=1280%2C945&amp;ssl=1" data-orig-size="1280,945" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Employee Security &#8211; Layoffs" data-image-description="&lt;p&gt;Employee security: Layoffs are high risk situations.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Employee security: Layoffs are high risk situations.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280.jpg?fit=300%2C221&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280.jpg?fit=1024%2C756&amp;ssl=1" class="wp-image-1164 size-medium" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280-300x221.jpg?resize=300%2C221" alt="Employee security: dismissals create risks." width="300" height="221" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280.jpg?resize=300%2C221&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280.jpg?resize=1024%2C756&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/hand-65688_1280.jpg?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1164" class="wp-caption-text">Employee security: dismissals create risks.</figcaption></figure>
<p>Employee security really does matter. Your employees are the lifeblood of every organisation. You put a lot of effort into hiring new staff, you train them, you nurture them and in return you get a massive amount of value. However, like it nor not, there will come a point in time when even your best employee goes.</p>
<p>This is when your employee security program gets really tested. Even an amicable departure, where the employee is happily leaving for a new job, retirement or just to live a life of luxury after winning the lottery, carries with it risks for your business.</p>
<p>When the employee is being dismissed things are much worse. If the employee has access to company secrets, or special privileges, then you have a very high risk termination on your hands.</p>
<p>No one ever wants to plan for layoffs, downsizing or employee misconduct but if one of these bad things happens to your business, if you haven&#8217;t planned for it, the pain will be significantly greater.</p>
<figure id="attachment_1172" aria-describedby="caption-attachment-1172" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1172" data-permalink="http://www.halkynconsulting.co.uk/a/2014/10/employee-security-high-risk-terminations/termination-110302_1280/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280.jpg?fit=1280%2C905&amp;ssl=1" data-orig-size="1280,905" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Employee security &#8211; Layoffs create risk" data-image-description="&lt;p&gt;Employee security &#8211; Layoffs frequently raise tension and create risk across the business.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Employee security &#8211; Layoffs frequently raise tension and create risk across the business.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280.jpg?fit=300%2C212&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280.jpg?fit=1024%2C724&amp;ssl=1" class="size-medium wp-image-1172" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280-300x212.jpg?resize=300%2C212" alt="Employee security - Layoffs frequently raise tension and create risk across the business." width="300" height="212" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280.jpg?resize=300%2C212&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280.jpg?resize=1024%2C724&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/10/termination-110302_1280.jpg?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1172" class="wp-caption-text">Employee security &#8211; Layoffs frequently raise tension and create risk across the business.</figcaption></figure>
<p>When you dismiss an employee, for whatever reason, everyone involved is in an emotional state. This means mistakes will be made, tempers lost and bad things may happen. Bad things can range from losing data and clients, to acts of violence and vandalism.</p>
<p>You prevent this by having a clearly understood process, documented beforehand and agreed with any unions or employee representation. While this wont make anyone any happier, it does mean you have the best possible chance to minimise any further harm.</p>
<p>Planning your employee security program to cover the whole career of your employees makes much more sense.</p>
<h2>Employee Security &#8211; the basics</h2>
<p>Fundamentally, there are three stages to employee security:</p>
<ul>
<li><strong>Pre-employment</strong>. This is what you do before you hire them. This includes, interviews, reference checks, tests etc. For sensitive posts you should consider <a title="BS 7858:2012 Security screening of individuals employed in a security environment. Code of practice" href="http://shop.bsigroup.com/ProductDetail/?pid=000000000030237324" target="_blank">BS7858</a> screening and for sensitive Government work <a title="HMG National Security Vetting: forms and guidance" href="https://www.gov.uk/government/collections/national-security-vetting" target="_blank">clearances  and vetting</a> are likely to be needed.</li>
<li><strong>During employment</strong>. Once you employ someone, it is crucial you dont just drop end your employee security at the screening. Make sure employees are engaged and supported by your organisation throughout their career.</li>
<li><strong>Resignation and dismissals</strong>. This is the high risk area, the employee is about to leave and no longer has any loyalties or formal obligations. Disgruntled employees may steal or break things, aggressive employees may become violent and even otherwise perfect employees may take company secrets to their new employer.</li>
</ul>
<h2>Employee Security &#8211; your plans</h2>
<p>Planning your employee security program is essential. Good planning will show your stakeholders your commitment to security and, in the event of a dispute, will provide evidence that your organisation has acted fairly and in a pre-agreed manner. If a dismissal goes to an employment tribunal, following a pre-arranged plan is pretty much essential.</p>
<p>You need to plan for each stage and should look to produce a published policy on employee security, laying out the objectives and reinforcing management commitment to the principles of fairness and security.</p>
<p>From this build in a list of plans for how you will address each of the three stages and what your expectations are.</p>
<p>An example would be documenting what pre-employment checks will take place, who carries them out, how decisions should be made on findings and how long data will be retained for both people offered a job and those turned down.</p>
<h3>Employee Security &#8211; Resignations and Dismissals</h3>
<p>Planning around employee exits is so important, it is suggested that you create several plans depending on the nature of your employees. You need to consider the role of the employee and what assets they have access to as well as the nature of the departure.</p>
<p>At a minimum, your plans <strong>must</strong> consider the following employee groups:</p>
<ul>
<li><span style="text-decoration: underline;">Employees with access to commercially sensitive information</span>. This includes sales teams, commercial managers, developers etc. It is good practice to ensure Non Disclosure Agreements are in place and the employee is reminded of any obligations on exit.</li>
<li><span style="text-decoration: underline;">Employees with privileged access</span>. When it comes to system administrators, key holders and the like, you need to ensure your process fully revokes all access and is able to check that nothing has been subverted before the employee is finally let go. Discovering a problem after they have gone is going to cause you all kinds of pain.</li>
<li><span style="text-decoration: underline;">Employees with high value assets</span>. If you have team members who look after large amounts of cash, company cars etc, your plan should document how these are accounted for before the employee leaves.</li>
</ul>
<p>Additionally, at a minimum, you need to plan for the following types of departure:</p>
<ul>
<li><span style="text-decoration: underline;">Retirement</span>. Here the employee is likely to leave on good terms but you will lose corporate knowledge and should look to capture as much as possible.</li>
<li><span style="text-decoration: underline;">Resignation to move to a new line of work</span>. Similar to retirement, the employee is likely to be on good terms but you need to be sure all assets are returned and any commercially sensitive knowledge is protected.</li>
<li><span style="text-decoration: underline;">Resignation to move to a competitor</span>. While the employee may be on good terms, there is an increased risk of knowledge theft or the employee looking to access your clients for their new organisation. Ensure all plans include reinforcement of any NDA / Non-Compete agreements.</li>
<li><span style="text-decoration: underline;">Dismissal from downsizing / restructuring</span>. The employee is likely to be angry and annoyed at the organisation so efforts should be made to minimise any confrontation or situations which could lead to escalation. In most circumstances, once an employee is notified of a dismissal they should not be expected to continue with productive work.</li>
<li><span style="text-decoration: underline;">Dismissal for misconduct</span>. This is the highest risk. The employee is likely to be shocked and angry with a significant tendency to lash out. Your plan should look to minimise stress on all parties, ideally ensuring that the employee is notified by at least two people and once notified, the employee should not be permitted to return to any form of work or retain any company assets.</li>
</ul>
<h2>Planning your security</h2>
<p>There is a lot to consider with employee security but it is crucially important to your business.</p>
<p>When you are a new or growing company, frequently taking on new, great, staff, the prospects of dismissal may seem impossibly distant. Unfortunately this is not true and it is a very real event for pretty much every business.</p>
<p>If you plan properly &#8211; in advance &#8211; when your employees leave everyone will be happier and able to move on. If you fail to plan properly, the outcomes can be catastrophic.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/10/employee-security-high-risk-terminations/">Employee Security &#8211; High risk terminations</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1162</post-id>	</item>
		<item>
		<title>Prison Service in NI Warned over Data Breach</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/06/prison-service-ni-warned-data-breach/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sun, 22 Jun 2014 21:07:15 +0000</pubDate>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPA]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1143</guid>

					<description><![CDATA[<p>The prison service in Northern Ireland has been warned by the ICO over another data breach. The ICO press release is available online: http://ico.org.uk/news/latest_news/2014/prison-service-warned-after-maze-records-sold-at-auction-18062014 This incident relates to the Prison Service auctioning off a cabinet containing records from the Maze prison. Interestingly, this breach took place in 2004, when the Northern Ireland Office was responsible, but nothing [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/06/prison-service-ni-warned-data-breach/">Prison Service in NI Warned over Data Breach</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The prison service in Northern Ireland has been warned by the ICO over another data breach. The ICO press release is available online: <a title="ICO Press Release" href="http://ico.org.uk/news/latest_news/2014/prison-service-warned-after-maze-records-sold-at-auction-18062014" target="_blank">http://ico.org.uk/news/latest_news/2014/prison-service-warned-after-maze-records-sold-at-auction-18062014</a></p>
<figure id="attachment_1144" aria-describedby="caption-attachment-1144" style="width: 278px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1144" data-permalink="http://www.halkynconsulting.co.uk/a/2014/06/prison-service-ni-warned-data-breach/prisonserviceniwarned/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned.jpg?fit=975%2C1050&amp;ssl=1" data-orig-size="975,1050" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Prison Service warned over data breach" data-image-description="&lt;p&gt;Prison Service warned over data breach&lt;/p&gt;
" data-image-caption="&lt;p&gt;Prison Service warned over data breach&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned.jpg?fit=278%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned.jpg?fit=950%2C1024&amp;ssl=1" class="wp-image-1144 size-medium" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned-278x300.jpg?resize=278%2C300" alt="Prison Service warned over data breach" width="278" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned.jpg?resize=278%2C300&amp;ssl=1 278w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned.jpg?resize=950%2C1024&amp;ssl=1 950w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/PrisonServiceNIWarned.jpg?w=975&amp;ssl=1 975w" sizes="auto, (max-width: 278px) 100vw, 278px" data-recalc-dims="1" /><figcaption id="caption-attachment-1144" class="wp-caption-text">Prison Service warned over data breach</figcaption></figure>
<p>This incident relates to the Prison Service auctioning off a cabinet containing records from the Maze prison.</p>
<p>Interestingly, this breach took place in 2004, when the Northern Ireland Office was responsible, but nothing was reported at the time. In the end the breach was discovered while the ICO was investigating a Prison Service breach from 2012, which resulted in the Department of Justice being fined.</p>
<p style="color: #333333;" align="left">ICO Assistant Commissioner for Northern Ireland, Ken Macdonald, said:</p>
<blockquote dir="ltr" style="color: #333333;">
<p style="color: #333333;" align="left">“This is a story of basic errors and poor procedures, which if the incident happened today would see us issuing a substantial fine.</p>
<p style="color: #333333;" align="left">“The loss of this information represents not only an embarrassing episode for the prison service in Northern Ireland, but a serious breach of the Data Protection Act that could have had damaging repercussions for the individuals affected.</p>
<p style="color: #333333;" align="left">“The incident went unreported for eight years and the same mistakes were allowed to occur. It is only now that we have seen a commitment from the Department of Justice Northern Ireland to tackle these problems and keep people’s information secure.”</p>
</blockquote>
<p>Sadly this is a common problem &#8211; basic security controls are either not in place or are allowed to be ignored.</p>
<p>At the most fundamental level, the Prison Service (or the Northern Ireland Office in 2004), should have maintained a record of what assets it was responsible for and their locations. This would have prevented the cabinet being sold off at auction.</p>
<p>Failing that, before any assets (information assets, technology or physical products such as cabinets and furniture) are disposed, they absolutely must be checked to ensure no sensitive data is being accidentally leaked.</p>
<p>Hopefully the Prison Service has learned from this, and it should also act as a reminder to all organisations that they should review all asset lifecycle policies to make sure they are suitable.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/06/prison-service-ni-warned-data-breach/">Prison Service in NI Warned over Data Breach</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1143</post-id>	</item>
		<item>
		<title>Truecrypt encryption software still available for download</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/06/download-truecrypt-still-possible/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 31 May 2014 23:32:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Truecrypt]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1132</guid>

					<description><![CDATA[<p>It seems that Truecrypt is too popular a tool for people to give up on it and version 7.1a is still available for download. A website has sprung up at truecrypt.ch offering downloads of Truecrypt binaries and source code. The download site appears to have been set up by a Swiss national and provides links [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/06/download-truecrypt-still-possible/">Truecrypt encryption software still available for download</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It seems that Truecrypt is too popular a tool for people to give up on it and version 7.1a is still available for download.</p>
<figure id="attachment_1134" aria-describedby="caption-attachment-1134" style="width: 300px" class="wp-caption alignleft"><a href="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/06/download_truecrypt.jpg"><img loading="lazy" decoding="async" data-attachment-id="1134" data-permalink="http://www.halkynconsulting.co.uk/a/2014/06/download-truecrypt-still-possible/download_truecrypt/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/download_truecrypt.jpg?fit=946%2C887&amp;ssl=1" data-orig-size="946,887" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Download Truecrypt at Truecrypt.ch" data-image-description="&lt;p&gt;Download Truecrypt at Truecrypt.ch&lt;/p&gt;
" data-image-caption="&lt;p&gt;Download Truecrypt at Truecrypt.ch&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/download_truecrypt.jpg?fit=300%2C281&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/download_truecrypt.jpg?fit=946%2C887&amp;ssl=1" class="size-medium wp-image-1134" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/06/download_truecrypt-300x281.jpg?resize=300%2C281" alt="Download Truecrypt at Truecrypt.ch" width="300" height="281" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/download_truecrypt.jpg?resize=300%2C281&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/06/download_truecrypt.jpg?w=946&amp;ssl=1 946w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1134" class="wp-caption-text">Download Truecrypt at Truecrypt.ch</figcaption></figure>
<p>A website has sprung up at <a title="Download Truecrypt" href="http://truecrypt.ch/" target="_blank">truecrypt.ch</a> offering downloads of Truecrypt binaries and source code.</p>
<p>The download site appears to have been set up by a Swiss national and provides links to multiplatform version of Truecrypt 7.1a &#8211; as well as an <a title="Download older versions of Truecrypt" href="http://truecrypt.ch/download/older/" target="_blank">archive</a> hosting everything going back to version 1.0 of the software.</p>
<p>Unfortunately the site does not host a download of the source code, but it does link to a <a title="GitHub - Truecrypt sourcecode" href="https://github.com/FreeApophis/TrueCrypt" target="_blank">GitHub repository</a> with it in.</p>
<p>This is an excellent resource, as truecrypt is a genuinely useful tool for people wishing to keep information private.</p>
<p>There is one important caveat here, however, in that there is no way to confirm the provenance or validity of any software you download from this site. It is not owned by the truecrypt developers and, most people, will not be able to determine if the binaries have been tampered with.</p>
<p>As a result, and this is always good practice, if you opt to download Truecrypt from this site make sure you also check the digital signature (a &#8220;hash&#8221; value) against something you know to be correct.</p>
<p>The hash values will differ depending on how you generate them but most sites will list a selection. As an example, you can use the following sites to verify the signature of a truecrypt download:</p>
<ul>
<li>http://truecryptcheck.wordpress.com/</li>
<li>http://video2.golem.de/files/1/8/13138/truecrypt_7.1a_download_und_hashwerte.txt?start=0.00 (note: this site is provided by Truecrypt.ch)</li>
<li>https://defuse.ca/truecrypt-7.1a-hashes.htm</li>
</ul>
<p>And yes, the third site provides different hashes because it has assessed different versions of the Truecrypt 7.1a binary.</p>
<p>So, in summary, you can still download truecrypt but you need to put a lot more effort into make sure what you get the real thing. If this is important to you, you need to download a different encryption package.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/06/download-truecrypt-still-possible/">Truecrypt encryption software still available for download</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1132</post-id>	</item>
		<item>
		<title>Truecrypt encryption software ceases production</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/05/truecrypt-encryption-software-ceases/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 31 May 2014 22:50:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Truecrypt]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1116</guid>

					<description><![CDATA[<p>On 28 May 2014, the developers of the reasonably infamous encryption software Truecrypt apparently announced that the program was over and that the risk of security weaknesses meant people should stop using it. Since this announcement, the Truecrypt website at http://truecrypt.org now redirects to the Sourceforce page (http://truecrypt.sourceforge.net/) which reports that development ended in &#8220;5/2014&#8221; following Microsoft [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/05/truecrypt-encryption-software-ceases/">Truecrypt encryption software ceases production</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On 28 May 2014, the developers of the reasonably infamous encryption software Truecrypt apparently announced that the program was over and that the risk of security weaknesses meant people should stop using it.</p>
<p>Since this announcement, the Truecrypt website at http://truecrypt.org now redirects to the Sourceforce page (http://truecrypt.sourceforge.net/) which reports that development ended in &#8220;5/2014&#8221; following Microsoft moving Windows XP out of support.</p>
<p>It also contains an ominous warning:</p>
<blockquote><p><span style="color: #ff0000;">WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues</span></p></blockquote>
<p>(screenshot of the page below)</p>
<figure id="attachment_1118" aria-describedby="caption-attachment-1118" style="width: 610px" class="wp-caption aligncenter"><a href="http://truecrypt.sourceforge.net/" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1118" data-permalink="http://www.halkynconsulting.co.uk/a/2014/05/truecrypt-encryption-software-ceases/truecrypt_ceases_production/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production.jpg?fit=1680%2C1050&amp;ssl=1" data-orig-size="1680,1050" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Truecrypt notifies the world it is over" data-image-description="&lt;p&gt;Truecrypt notifies the world it is over&lt;/p&gt;
" data-image-caption="&lt;p&gt;Truecrypt notifies the world it is over&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production.jpg?fit=300%2C187&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production.jpg?fit=1024%2C640&amp;ssl=1" class="wp-image-1118 size-large" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production-1024x640.jpg?resize=610%2C381" alt="Truecrypt notifies the world it is over" width="610" height="381" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production.jpg?resize=1024%2C640&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production.jpg?resize=300%2C187&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/Truecrypt_ceases_production.jpg?w=1680&amp;ssl=1 1680w" sizes="auto, (max-width: 610px) 100vw, 610px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1118" class="wp-caption-text">Truecrypt notifies the world it is over</figcaption></figure>
<p>Taken at face value, this is certainly a shame for millions of users across the world. Truecrypt, although never a profitable bit of software, has been used by countless reporters, dissidents and others wishing to protect their sensitive &amp; private data. We frequently recommend <a title="Posts Tagged with Truecrypt" href="http://www.halkynconsulting.co.uk/a/tag/truecrypt/" target="_blank">Truecrypt</a> to personal users and the only thing preventing it being an enterprise class tool was the lack of centralised management.</p>
<p>Most famously, Truecrypt was used by Edward Snowden and the journalist Glenn Grenwald to protect the NSA reports Snowden was trying to make public. Snowden&#8217;s continued use of Truecrypt has been taken by many to imply that the NSA hadn&#8217;t been able to compromise its encryption technology.</p>
<p>Unusually, as part of its closure notice, Truecrypt is encouraging users to migrate to Bitlocker (on Windows platforms), a whole disk encryption tool. This is only available to Ultimate, Pro and Enterprise licence holders, preventing this being an option for most non-Enterprise users.</p>
<p>Additionally, while it provides whole disk encryption, Bitlocker is not an exact alternative for Truecrypt as it lacks the following:</p>
<ul>
<li>Cross platform encryption.</li>
<li>The ability to provide encrypted containers on removable media.</li>
<li>Hidden partitions allowing for deniable containers and mitigating the risks of &#8220;<a title="Wikipedia - Rubber Hose Cryptanalysis" href="http://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis" target="_blank">rubber hose cryptanalysis</a>&#8220;</li>
</ul>
<p>For some people, the ultimate issue is that Bitlocker is provided by Microsoft and there have long been accusations that backdoors or other covert accesses have been established to allow the US Government / Law Enforcement the ability to decrypt data. This has never been proven and is frequently denied by Microsoft. Bitlocker does have an option to place the encryption key in Escrow which may have led to these worries, but this is not mandatory.</p>
<p>As a result of the Snowden / NSA leaks casting doubt about a lot of security products, a crowdfunded <a title="Is TrueCrypt Audited Yet?" href="http://istruecryptauditedyet.com/" target="_blank">audit of Truecrypt</a> was set up. This produced its first set of reports on 14 April which found a total of 11 vulnerabilities, of which four were medium, four were low and three were informational-only (<a title="Open Crypto Audit Project - TrueCrypt" href="https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf" target="_blank">full copy of the report is available online</a>).</p>
<p>If you have ever had any software, especially a complex one, audited &amp; tested, you will agree this is a very positive set of findings and the report concludes that the bugs appear to be the result of code errors rather than intentional backdoors or malicious activity.</p>
<p>While a follow up report is due in the second half of 2014, overall this audit appears to be saying that Truecrypt version 7.1a is an acceptable product.</p>
<h2>Truecrypt site &#8211; dire warnings and a new version</h2>
<p>The audit findings and the warning notice on the Truecrypt page are actually pretty compatible. The notice says it may contain unfixed security issues and, assuming the developers never intend to change another line of code this is true.</p>
<p>Bugs in software sometimes only come to light years after they were coded (Heartbleed is a good example of this) and if the developers are planning to retire from this project, then any future bugs will not only remain unfixed but may be backwards compatible enough to compromise data containers people create today.</p>
<p>However, the unusual thing here is that the site also provides a &#8220;new&#8221; version of Truecrypt (version 7.2) to enable users to decrypt their containers and migrate to Bitlocker (or their chosen encryption tool). This makes sense in the context that someone might find an encrypted container in the future and have no other way of accessing the data.</p>
<h2>So, What happened to Truecrypt, and what is the future?</h2>
<figure id="attachment_1128" aria-describedby="caption-attachment-1128" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1128" data-permalink="http://www.halkynconsulting.co.uk/a/2014/05/truecrypt-encryption-software-ceases/document-encrypted-yellow/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?fit=2400%2C2400&amp;ssl=1" data-orig-size="2400,2400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Encryption without Truecrypt?" data-image-description="&lt;p&gt;Without Truecrypt, selecting encryption software is a lot harder.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Without Truecrypt, selecting encryption software is a lot harder.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?fit=1024%2C1024&amp;ssl=1" class="wp-image-1128 size-medium" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow-300x300.png?resize=300%2C300" alt="Without Truecrypt, selecting encryption software is a lot harder." width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?resize=1024%2C1024&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?resize=50%2C50&amp;ssl=1 50w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/05/document-encrypted-yellow.png?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1128" class="wp-caption-text">Without Truecrypt, selecting encryption software is a lot harder.</figcaption></figure>
<p>At the moment, the short answer is &#8220;Nobody except the developers really know.&#8221;</p>
<p>The way the development ended has, unsurprisingly, stirred up huge amounts of theories ranging from it being sulky pout when the developers realised that they were getting very little in the way of donations but the audit project exceeded its crowdfunding goals &#8211; to the conspiracy theories that this is a &#8220;canary&#8221; warning Truecrypt users that they have been subjected to something similar to a <a title="Wikipedia - National Security Letter" href="http://en.wikipedia.org/wiki/National_security_letter" target="_blank">National Security Letter</a> by the US Government, forcing them to hand over secrets which compromise the software.</p>
<p>With this notification, the development teams have pulled the binaries and source code bundles for all the older versions of Truecrypt, meaning the hobbled version 7.2 is the only one you can get now. This version will not allow you to create new encrypted containers and is simply there to help you migrate to a different platform.</p>
<p>Unfortunately there doesn&#8217;t seem to be one that currently matches the feature set of Truecrypt so, for most people, this will mean moving to a variety of tools.</p>
<p>As a brief checklist for home users / small businesses you might want to consider the following:</p>
<ul>
<li>Something which provides you with whole disk encryption. This is essential for portable devices (laptops) and prevents people accessing your data if they steal your device.</li>
<li>Something which allows you to encrypt files or folders and move them on portable devices. This means you can create an encrypted object and move it from one place to another on portable devices such as USB sticks.</li>
<li>Something which works the same on all the platforms you use. This is essential if you have more than one operating system &#8211; such as Windows and Apple devices.</li>
<li>Something which allows plausible deniability. This means if you are ever threatened with violence or punishment, you can surrender one key and still protect the important data.</li>
</ul>
<p>Unfortunately this can be a very complicated topic and we aren&#8217;t in a position to make blanket recommendations in a blog post. The choice of encryption tools will depend very heavily on your personal circumstances and reasons for protecting the data.</p>
<p>You can get a <a title="Wikipedia - Comparison of disk encryption software" href="http://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software" target="_blank">comparison of different encryption software packages online</a> and if you want to discuss this further, or engage our security specialists for an in depth review of your needs then <a title="Contact Halkyn Consulting Security Team" href="http://www.halkynconsulting.co.uk/contact/contact-security-team" target="_blank">get in touch</a>.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/05/truecrypt-encryption-software-ceases/">Truecrypt encryption software ceases production</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1116</post-id>	</item>
		<item>
		<title>Physical security is important for data protection</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/03/physical-security-data-protection/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sun, 23 Mar 2014 20:56:29 +0000</pubDate>
				<category><![CDATA[Downloads]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPA]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1081</guid>

					<description><![CDATA[<p>Physical security has always been a cornerstone of any Information Security program. As a topic, it is covered by every major security standard. Most have entire sections dedicated to physical security: ISO27001:2013 has A.11 &#8220;Physical and Environmental Controls&#8220; The SoGP has CF3.3 &#8220;Sensitive Physical Information&#8221; and CF19 &#8220;Physical and Environmental Security&#8221; PCI-DSS Requirement 9 mandates [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/03/physical-security-data-protection/">Physical security is important for data protection</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_910" aria-describedby="caption-attachment-910" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="910" data-permalink="http://www.halkynconsulting.co.uk/a/2013/09/physical-security-still-matters/information-security-service-lg/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?fit=2304%2C1532&amp;ssl=1" data-orig-size="2304,1532" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;3.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1269171653&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0.025&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Physical security protects information" data-image-description="&lt;p&gt;Good physical security protects your information.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Good physical security protects your information.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?fit=300%2C199&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?fit=1024%2C680&amp;ssl=1" class="size-medium wp-image-910" alt="Good physical security protects your information." src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_-300x199.jpg?resize=300%2C199" width="300" height="199" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?resize=300%2C199&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?resize=1024%2C680&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?resize=120%2C80&amp;ssl=1 120w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-910" class="wp-caption-text">Good physical security protects your information.</figcaption></figure>
<p>Physical security has always been a cornerstone of any Information Security program. As a topic, it is covered by every major security standard. Most have entire sections dedicated to physical security:</p>
<ul>
<li>ISO27001:2013 has A.11<em> &#8220;Physical and Environmental Controls</em>&#8220;</li>
<li>The SoGP has CF3.3 &#8220;<em>Sensitive Physical Information</em>&#8221; and CF19 &#8220;Physical and Environmental Security&#8221;</li>
<li>PCI-DSS Requirement 9 mandates &#8220;<em>Restrict physical access to cardholder data</em>&#8220;</li>
<li>The NIST Cybersecurity framework includes PR.AC-2: &#8220;<em>Physical access to assets is managed and protected</em>.&#8221;</li>
<li>Even the 1995 NIST SP800-12<em> &#8220;Introduction to Computer Security: The NIST Handbook,&#8221;</em> has Chapter 15 dedicated to physical security.</li>
<li>The UK Government&#8217;s <a title="Security Policy Framework (SPF) October 2013 version" href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/255910/HMG_Security_Policy_Framework_V11.0.pdf" target="_blank">Security Policy Framework (SPF) October 2013</a> version includes it as Security Policy 4 &#8220;<em>Physical security and counter terrorism</em>.&#8221;</li>
</ul>
<p>Despite this, controls are still being neglected. Private sector organisations and government agencies spend fortunes on security, but then compromise it by missing out physical controls.</p>
<p>What makes this stranger is that most physical security controls are cheap and easy to implement. Maybe it is just they aren&#8217;t flashy and aren&#8217;t normally excitingly high-tech. Good security controls just work.</p>
<h2>The perils of ignoring physical security</h2>
<p>The Information Commissioner&#8217;s Office (ICO) has been busy enforcing the Data Protection Act this month, with a couple of actions being directly down to poor physical security practices.</p>
<p>First, on 13 March 2014, the <a title="Home care agency warned after vulnerable people’s details left in the street" href="http://ico.org.uk/news/latest_news/2014/home-care-agency-warned-after-vulnerable-peoples-details-left-in-the-street-13032014" target="_blank">ICO announced</a> that it had issued an enforcement notice on Neath Care, with the following message:</p>
<blockquote><p>[Neath Care] has been found in breach of the Data Protection Act after the files of 10 vulnerable and elderly people were found on a street in Neath Port Talbot.</p></blockquote>
<p>It appears that the care agency failed to implement basic physical security controls such as asset management, monitoring and transport. This led to an employee taking the documents out of the office, dropping them and not realising until a member of the public reported it.</p>
<p>Often organisations have excellent controls around the expensive things (e.g. computers, laptops) but then forget everyone once the data has come off the printer. It seems unlikely that an employee would leave a laptop on the pavement and not notice.</p>
<p>When handling sensitive data, organisations should have a comprehensive security strategy which includes handling, and accounting for, paper copies. All employees should be made aware of this and, as always, records must be kept.</p>
<p>The next breach of interest was reported by the ICO in a <a title="Kent Police fined £100,000 after interview tapes abandoned at former station" href="http://ico.org.uk/news/latest_news/2014/kent-police-fined-100000-after-interview-tapes-abandoned-at-former-station-19032014" target="_blank">19 March announcement</a>. This time it was serious enough that Kent Police were fined £100,000. This was quite a shocking example of how people can forget to track old, low-financial-value physical assets:</p>
<blockquote>
<p align="left">The Information Commissioner’s Office has served <a title="ICO has served a Monetary Penalty Notice on Kent Police" href="http://ico.org.uk/news/latest_news/2014/~/media/documents/library/Data_Protection/Notices/kent-police-monetary-penalty-notice.pdf" target="_blank">a monetary penalty of £100,000</a> on Kent Police after confidential information, including copies of police interview tapes, was left in the basement of a former police station.</p>
<p align="left">The highly sensitive information included records relating back to the 1980s, thought to have been left at the site when the building was vacated in July 2009.</p>
<p align="left">The information was discovered when a police officer was visiting a business owner about an unrelated matter on 27 November 2012 and noticed a pile of tapes with the logo of Kent Police stuck on them. The business owner confirmed that he had found the tapes in the basement of the old police station, after purchasing the site two months before, and was planning on watching them for entertainment.</p>
</blockquote>
<p>It is almost certain that none of the officers or staff abandoned these tapes on purpose. It is almost certain that the business owner took them with malicious intent. However, the breach still happened.</p>
<p>Most people will agree that police interview tapes are pretty sensitive affairs. The officers will be asking questions about crimes, possibly including otherwise unreported information, and the interviewee will be providing information they may not expect anyone else to hear.</p>
<p>Given that these tapes may have ended up being used as evidence, it seems strange that they weren&#8217;t properly accounted for when the station moved offices. The problem is often that boring, &#8220;old-fashioned,&#8221; equipment is frequently overlooked when people concentrate on the modern equivalents.</p>
<p>The ICO&#8217;s Head of Enforcement sums it up well:</p>
<blockquote>
<p align="left">How a police force could leave such information unattended in a basement for several years is difficult to understand.</p>
<p align="left">Ultimately, this breach was a result of a clear lack of oversight, information governance and guidance from Kent Police which led to sensitive information being abandoned.</p>
</blockquote>
<p>Good information governance has to include good physical security controls &#8211; the most basic of which is making sure you know where your assets are. Anything else is basically asking for a breach.</p>
<h2>Physical security underpins everything</h2>
<p>This is the crucial point. Good physical security controls are so important that, without them, all your other controls are undermined to the degree that they may become pointless.</p>
<p>Good physical security controls are cheap &#8211; in the two cases here, a simple asset register would have saved both organisations &#8211; and easy to implement. They don&#8217;t make headline news, they don&#8217;t get people exited on twitter, they don&#8217;t come with flashy vendor presentations, but they <strong>do work</strong>. Isn&#8217;t that what actually matters?</p>
<h2>Physical Security Assessment Form &#8211; Free Download</h2>
<figure id="attachment_1097" aria-describedby="caption-attachment-1097" style="width: 187px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/security-resources/downloads/physical_security_assessment_form.pdf"><img loading="lazy" decoding="async" data-attachment-id="1097" data-permalink="http://www.halkynconsulting.co.uk/a/2014/03/physical-security-data-protection/physicalsecurityassessmentform/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform.png?fit=800%2C1149&amp;ssl=1" data-orig-size="800,1149" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Physical Security Assessment Form &#8211; Free Download" data-image-description="&lt;p&gt;Physical Security Assessment Form &#8211; Free Download&lt;/p&gt;
" data-image-caption="&lt;p&gt;Physical Security Assessment Form &#8211; Free Download&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform.png?fit=208%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform.png?fit=712%2C1024&amp;ssl=1" class="wp-image-1097 " title="Physical Security Assessment Form - Free Download" alt="Physical Security Assessment Form - Free Download" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform-208x300.png?resize=187%2C270" width="187" height="270" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform.png?resize=208%2C300&amp;ssl=1 208w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform.png?resize=712%2C1024&amp;ssl=1 712w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/physicalsecurityassessmentform.png?w=800&amp;ssl=1 800w" sizes="auto, (max-width: 187px) 100vw, 187px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1097" class="wp-caption-text">Physical Security Assessment Form &#8211; Free Download</figcaption></figure>
<p>Halkyn Consulting has produced a <a title="Physical Security Assessment Form - Free Download" href="http://www.halkynconsulting.co.uk/security-resources/downloads/physical_security_assessment_form.pdf" target="_blank">physical security assessment form as a freely downloadable resource</a> to help organisations get a baseline of their current security and see what areas need improving.</p>
<p>In addition to this form, our <a title="Halkyn Consulting Security Resources" href="http://www.halkynconsulting.co.uk/security-resources/index" target="_blank">security resources area</a> has a selection of other tools you can use to assess, understand and improve your physical security controls.</p>
<p>As part of our commitment to improving security awareness in general, if there is a specific tool you cant find but think would help people then please <a title="Contact Halkyn Security Team" href="http://www.halkynconsulting.co.uk/security/contact-security-team" target="_blank">get in touch</a> and we will see if we can help you out.</p>
<p><strong>Remember &#8211; all good security builds on good physical security controls.</strong></p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/03/physical-security-data-protection/">Physical security is important for data protection</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1081</post-id>	</item>
		<item>
		<title>DPA Registration is important if you want to avoid a fine</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/03/dpa-registration-important/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Wed, 12 Mar 2014 20:55:18 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPA]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Law]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1070</guid>

					<description><![CDATA[<p>Here in the UK, the Data Protection Act (DPA) has been law for 14 years now (the act is dated 1998 and commenced in 2000). Despite this, there are some organisations who are not aware of their obligations to comply, even when it is clear they are handling data which would be protected under the [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/03/dpa-registration-important/">DPA Registration is important if you want to avoid a fine</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1072" aria-describedby="caption-attachment-1072" style="width: 240px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1072" data-permalink="http://www.halkynconsulting.co.uk/a/2014/03/dpa-registration-important/glasses-doc1-hi/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi.jpg?fit=1200%2C1500&amp;ssl=1" data-orig-size="1200,1500" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;36&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;NIKON D2X&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1184937108&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;60&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="DPA &#8211; follow the law or risk a fine" data-image-description="&lt;p&gt;DPA &#8211; follow the law or risk a fine&lt;/p&gt;
" data-image-caption="&lt;p&gt;DPA &#8211; follow the law or risk a fine&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi.jpg?fit=240%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi.jpg?fit=819%2C1024&amp;ssl=1" class="size-medium wp-image-1072" alt="DPA - follow the law or risk a fine" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi-240x300.jpg?resize=240%2C300" width="240" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi.jpg?resize=240%2C300&amp;ssl=1 240w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi.jpg?resize=819%2C1024&amp;ssl=1 819w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/03/glasses-doc1-hi.jpg?w=1200&amp;ssl=1 1200w" sizes="auto, (max-width: 240px) 100vw, 240px" data-recalc-dims="1" /><figcaption id="caption-attachment-1072" class="wp-caption-text">DPA &#8211; follow the law or risk a fine</figcaption></figure>
<p>Here in the UK, the Data Protection Act (DPA) has been law for 14 years now (the act is dated 1998 and commenced in 2000). Despite this, there are some organisations who are not aware of their obligations to comply, even when it is clear they are handling data which would be protected under the act.</p>
<p>On 11 March, the Information Commissioner&#8217;s Office (ICO) announced another fine for a DPA breach, and as with so many cases before it, this was easily avoidable. When it comes to the DPA, very small amounts of preparation really can make a difference.</p>
<p>The latest DPA fine was levied against a Cardiff-based company providing &#8220;green deals&#8221; energy assessments called Becoming Green (UK) Ltd.</p>
<p>The ICO&#8217;s <a title="Cardiff company fined for failing to register with the ICO" href="http://ico.org.uk/news/latest_news/2014/becoming-green-uk-ltd" target="_blank">press release</a> reports:</p>
<blockquote><p>The offence was uncovered when the company was being monitored following concerns about compliance. An ICO case worker noticed Mr Muhith [Green Deal(UK) Ltd&#8217;s company director] had not registered the company with the ICO. As Becoming Green (UK) Ltd processed customers’ personal data this was a breach of the DPA.</p></blockquote>
<p>As a result of this failing, the company director, Mr Abdul Muhith, was fined £597 personally. The company was also fined an additional £597. Although not covered in the ICO press release, other reporting (<a title="Green Deal firm took £299 and disappeared" href="http://www.mirror.co.uk/news/uk-news/becoming-green-ltd-becoming-green-2529393" target="_blank">the Mirror, online</a>) on the company implies that the ICO was investigating as a result of Green Deal Ltd (a previous company run by Mr Muhith) using inmates at an open-prison to run telesales. This behaviour is likely to be seen as putting DPA regulated personal data at risk, justifying ICO involvement.</p>
<h2>DPA Registration &#8211; what should have happened</h2>
<p>As always, we can only work on the published information but it seems that this is a very clear cut example of spending £35 to prevent a £1194 fine. It is especially strange that a company already under the ICO spotlight didn&#8217;t take measures to ensure DPA compliance.</p>
<p>The DPA can seem daunting to some people, but the ICO provides a lot of free guidance (or you can engage specialist consultants to help ensure compliance) to help businesses determine what they need to do.</p>
<p>If you aren&#8217;t sure if you need to register under the DPA, the ICO website provides a<a title="Data protection registration: self-assessment" href="http://ico.org.uk/for_organisations/data_protection/registration/self-assessment" target="_blank"> self-assessment tool</a>. This has very simple question sets and helps you quickly work out your obligations.</p>
<p>Should you need to register, this can also be done <a title="Register (notify) under the Data Protection Act" href="http://ico.org.uk/for_organisations/data_protection/registration" target="_blank">online</a> and costs £35 a year to maintain. If you decide to risk it and not register, remember you need to last 35 years without being caught before it becomes cost effective&#8230;</p>
<p>Basically, registration under the DPA is simple, cheap, easy and a legal obligation. Failing to do so is madness.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/03/dpa-registration-important/">DPA Registration is important if you want to avoid a fine</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1070</post-id>	</item>
		<item>
		<title>Security logs can save your systems and data</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/02/security-logs-can-save-you/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 28 Feb 2014 20:57:54 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Loss Prevention]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1050</guid>

					<description><![CDATA[<p>It goes without saying that security logs are not the most interesting of topics. They are often viewed as a necessary evil, and in some instances they are even minimised to prevent storage or bandwidth issues. Both of these approaches are wrong. Boring or not, security logs are one of, if not the, the most [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/02/security-logs-can-save-you/">Security logs can save your systems and data</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It goes without saying that security logs are not the most interesting of topics. They are often viewed as a necessary evil, and in some instances they are even minimised to prevent storage or bandwidth issues.</p>
<figure id="attachment_1051" aria-describedby="caption-attachment-1051" style="width: 320px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1051" data-permalink="http://www.halkynconsulting.co.uk/a/2014/02/security-logs-can-save-you/security_logs/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/security_logs.jpg?fit=400%2C242&amp;ssl=1" data-orig-size="400,242" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Security Logs" data-image-description="&lt;p&gt;Security logs aren&#8217;t interesting but they are very important.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Security logs aren&#8217;t interesting but they are very important.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/security_logs.jpg?fit=300%2C181&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/security_logs.jpg?fit=400%2C242&amp;ssl=1" class=" wp-image-1051 " alt="Security logs aren't interesting but they are very important." src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/02/security_logs.jpg?resize=320%2C194" width="320" height="194" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/security_logs.jpg?w=400&amp;ssl=1 400w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/security_logs.jpg?resize=300%2C181&amp;ssl=1 300w" sizes="auto, (max-width: 320px) 100vw, 320px" data-recalc-dims="1" /><figcaption id="caption-attachment-1051" class="wp-caption-text">Security logs aren&#8217;t interesting but they are very important.</figcaption></figure>
<p>Both of these approaches are wrong.</p>
<p>Boring or not, security logs are one of, if not the, the most fundamental aspects of your IT security controls. Without good security logs you don&#8217;t even know if your system has been breached, let alone what you need to do about it.</p>
<p>Logging is so fundamental to security that most of the time, you have to make a concious effort to turn it off. For most people, the hard part is actually just deciding on how much they want to store.</p>
<p>Unfortunately, even if you are sensible enough to have good logging turned on, there is one extra little step you need to take. Monitor the logs.</p>
<p>In January 2014, the US luxury department store Neiman Marcus announced it had been subjected to a major security breach (as reported by <a title="Krebs on Security - Neiman Marcus breach" href="http://krebsonsecurity.com/2014/01/hackers-steal-card-data-from-neiman-marcus/" target="_blank">Krebs on Security</a>) which may have compromised significant numbers of customer credit cards, charge cards and store cards. Some reports have stated that of the breached cards, over 9000 have been used fraudulently since the attack and this has fuelled significant debate over how it could have been prevented.</p>
<p>Based on a report published in February 2014, it seems the answer is actually &#8211; <strong>security logs</strong>. Bloomberg&#8217;s BusinessWeek <a title="Neiman Marcus Hackers Set Off 60,000 Alerts While Bagging Credit Card Data" href="http://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data" target="_blank">reported an except</a> from the post-incident forensic investigation stating:</p>
<blockquote><p>The company’s centralized security system, which logged activity on its network, flagged the anomalous behavior of a malicious software program—although it didn’t recognize the code itself as malicious, or expunge it, according to the report.</p></blockquote>
<p>So far, this is good news. Security logs capturing unexpected behaviour is a good thing and exactly how you would expect a <abbr title="Security Information and Event Management">SIEM</abbr> system to work.</p>
<p>However, things didn&#8217;t go as well as it should have:</p>
<blockquote><p>The system’s ability to automatically block the suspicious activity it flagged was turned off because it would have hampered maintenance, such as patching security holes, the investigators noted.</p></blockquote>
<p>This is the first major problem people face with security logs and event monitoring. Too often they are perceived as getting in the way of business and turned off&#8230;</p>
<p>In all, the report by Protivi mentions 59,746 security alerts that were ignored or suppressed for one reason or another.</p>
<p>We are not saying that security logs alone would have defeated the attack here. However, if someone at Neiman Marcus had been alerted to the malicious activity, they could have done something. Instead, thanks to suppressed or ignored logs, the attack went through.</p>
<h2>Security logs &#8211; what should you do?</h2>
<p>Good security logs and good log management is critical for security. Top tips for implementing this are:</p>
<ul>
<li><strong>Collect as many logs as possible</strong>. Hard disk space is cheap. Turn on all logging and store the logs as long as your business can justify. This really cant be overstated. <strong>Collect logs</strong>. If you have security logs you can be alerted to incidents and you can investigate. If you didn&#8217;t collect the logs you can never create them. Whatever you do, make sure you collect logs.</li>
<li>Correlate the logs. You can do this with software or by &#8220;hand&#8221;. Correlation means having a way to know how one log entry relates to another.</li>
<li>Set up alerting. No human being will ever pay proper attention to log files themselves. Even if you find one who does, software will be faster, cheaper and work 24/7.</li>
<li>Fine tune your alerting. All logging creates false positives and false negatives. Tune the alerting until you get the right balance. Only you will know how important false positives are, so we cant tell you how to tune. We can tell you that you should tune. If you dont, your logs will swamp you. Just dont tune too much, otherwise you miss important things.</li>
<li><strong>Respond to your alerts</strong>. This is why tuning matters. Once you have tuned your system, alerts are important. If development or business processes generate alerts, fix the problem, dont suppress the alert. If you find yourself ignoring alerts, you&#8217;ve got something wrong.</li>
</ul>
<p>Logging really is important. Security logs tell you what is happening on your network and support incident response. If you dont log, you are blind. If you dont enable logging before you get hacked it is too late for you.</p>
<p>Just as important, and as Neiman Marcus has shown, is actually paying attention to the alerts your security logs generate.</p>
<p>Security is important to every business, not just technology or government workers. Retail organisations are increasingly targeted by hackers and criminals and security threats are evolving. It is no longer possible to assume that because you work in an unregulated environment, security doesn&#8217;t matter. Security does matter, so make sure you do it properly.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/02/security-logs-can-save-you/">Security logs can save your systems and data</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1050</post-id>	</item>
		<item>
		<title>City of London Police &#8211; update</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/02/city-of-london-police-update/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Sat, 01 Feb 2014 16:13:48 +0000</pubDate>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[City of London]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Crime Reduction]]></category>
		<category><![CDATA[London]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1036</guid>

					<description><![CDATA[<p>As part of the cross-sector safety and security communications plan, the City of London police have announced today some significant changes being made to reinforce the ring of steel around the Square Mile. City of London Police: Ring of steel just got tougher New tactics, new tools and new technology will be launched in February [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/02/city-of-london-police-update/">City of London Police &#8211; update</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As part of the cross-sector safety and security communications plan, the City of London police have announced today some significant changes being made to reinforce the ring of steel around the Square Mile.</p>
<h2>City of London Police: Ring of steel just got tougher</h2>
<figure id="attachment_1041" aria-describedby="caption-attachment-1041" style="width: 225px" class="wp-caption alignright"><a href="http://www.flickr.com/photos/26782864@N00/6981581864/in/photolist-bCWr47-bCW45E-iAdxAr-bCVNN5" target="_blank"><img loading="lazy" decoding="async" data-attachment-id="1041" data-permalink="http://www.halkynconsulting.co.uk/a/2014/02/city-of-london-police-update/6981581864_4e71c91fb2_b/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/6981581864_4e71c91fb2_b.jpg?fit=768%2C1024&amp;ssl=1" data-orig-size="768,1024" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="City of London Police &#8211; Mounted Officer" data-image-description="&lt;p&gt;Mounted Officer &#8211; City of London Police. Photo by William Warby (http://www.flickr.com/photos/wwarby/)&lt;/p&gt;
" data-image-caption="&lt;p&gt;Mounted Officer &#8211; City of London Police. Photo by William Warby (http://www.flickr.com/photos/wwarby/)&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/6981581864_4e71c91fb2_b.jpg?fit=225%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/6981581864_4e71c91fb2_b.jpg?fit=768%2C1024&amp;ssl=1" class="size-medium wp-image-1041 " alt="Mounted Officer - City of London Police. Photo by William Warby (http://www.flickr.com/photos/wwarby/)" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/02/6981581864_4e71c91fb2_b-225x300.jpg?resize=225%2C300" width="225" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/6981581864_4e71c91fb2_b.jpg?resize=225%2C300&amp;ssl=1 225w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/02/6981581864_4e71c91fb2_b.jpg?w=768&amp;ssl=1 768w" sizes="auto, (max-width: 225px) 100vw, 225px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1041" class="wp-caption-text">Mounted Officer &#8211; City of London Police. Photo by William Warby</figcaption></figure>
<p>New tactics, new tools and new technology will be launched in February to help protect the Square Mile from the threat of terrorism and wider crime.</p>
<p><strong>New tactics</strong>: Following a successful pilot scheme towards the end of 2012 and further refinements throughout last year, a new, multi-layered approach to deter hostile reconnaissance throughout the City will be adopted as ‘business as usual’ from 10 February under the new name of <strong>Project Servator</strong>.</p>
<p>The new policing tactics involve replacing the old-style, single staffed entry points with highly visible deployments that can occur anywhere in the City at any time and draw on a range of varying resources including specially trained overt and plain-clothed officers, marked and unmarked vehicles, cycles, horses and dogs and other measures that may not be visible including CCTV.</p>
<p>This activity will be supported by officers trained to engage with and reassure visitors and the local community who also have an important role to play by reporting any suspicious behaviour and explaining to their staff and customers about the nature of the operations.</p>
<p><strong>New tools and technology</strong>: In-car Automatic Number Plate Recognition (ANPR) and video systems have been fitted to 22 marked police vehicles and new, back office, software will ensure that all intelligence can be produced more efficiently and used in a more targeted way. Months of extensive trials are now complete and the new system goes live in February. ​​​​​​​​​​​</p>
<p>​​​​​​​​This significant capital spend will bring important benefits to officers working out on the streets. ​</p>
<p>​​​​​​​Commander Operations, City of London Police, Wayne Chance, said:</p>
<blockquote><p>&#8220;Protecting the City as a global financial centre remains a key priority for the City of London Police and, as the nature of the threat evolves, deterrence and detection measures need to develop accordingly.&#8221;</p>
<p>​​&#8221;As a force, we are the pioneers of a new approach to policing that aims to deter and detect criminal and terrorist activity, as well as to reassure the general public.&#8221;</p>
<p>​​​&#8221;These new tactics, coupled with the new technology and tools to support our officers out on the street, will mean a more enhanced and strategic approach to protecting the Square Mile and is part of our drive to deploy our resources more effectively and more intelligently.&#8221;</p></blockquote>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/02/city-of-london-police-update/">City of London Police &#8211; update</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1036</post-id>	</item>
		<item>
		<title>Data protection needs good physical security</title>
		<link>http://www.halkynconsulting.co.uk/a/2014/01/data-protection-physical-security/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Thu, 30 Jan 2014 22:11:16 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Asset Protection]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Act]]></category>
		<category><![CDATA[Physical Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1022</guid>

					<description><![CDATA[<p>Data protection is frequently in the news as organisations more become aware of just how important it is to their business. Unfortunately all too often data protection measures focus on the technical aspects, overlooking the basic need for good physical security controls. Technical controls, such as encryption &#38; access management are important for data protection [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/01/data-protection-physical-security/">Data protection needs good physical security</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1023" aria-describedby="caption-attachment-1023" style="width: 241px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/contact/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="1023" data-permalink="http://www.halkynconsulting.co.uk/a/2014/01/data-protection-physical-security/1144732_29248124/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/01/1144732_29248124.jpg?fit=2848%2C3545&amp;ssl=1" data-orig-size="2848,3545" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;NIKON D300&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1234119734&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;105&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.00625&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Data protection needs good physical security" data-image-description="&lt;p&gt;Data protection needs good physical security&lt;/p&gt;
" data-image-caption="&lt;p&gt;Data protection needs good physical security&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/01/1144732_29248124.jpg?fit=241%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/01/1144732_29248124.jpg?fit=822%2C1024&amp;ssl=1" class="size-medium wp-image-1023" alt="Data protection needs good physical security" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2014/01/1144732_29248124-241x300.jpg?resize=241%2C300" width="241" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/01/1144732_29248124.jpg?resize=241%2C300&amp;ssl=1 241w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/01/1144732_29248124.jpg?resize=822%2C1024&amp;ssl=1 822w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2014/01/1144732_29248124.jpg?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 241px) 100vw, 241px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1023" class="wp-caption-text">Data protection needs good physical security</figcaption></figure>
<p>Data protection is frequently in the news as organisations more become aware of just how important it is to their business. Unfortunately all too often data protection measures focus on the technical aspects, overlooking the basic need for good physical security controls.</p>
<p>Technical controls, such as encryption &amp; access management are important for data protection but they need to build on good physical security.</p>
<p>Security is all about providing layers of protection. If you ignore or weaken one layer, you weaken everything. If you don&#8217;t protect your physical assets, you are&#8217;t providing proper data protection measures.</p>
<p>The multinational Coca-Cola recently discovered the importance of asset protection when it reported the compromise of 74,000 people&#8217;s data (as reported by <a title="Coca-Cola suffers data breach after employee 'borrows' 55 laptops" href="http://news.techworld.com/security/3499054/coca-cola-suffers-data-breach-after-employee-borrows-55-laptops/" target="_blank">Techworld</a>):</p>
<blockquote><p>Coca-Cola has admitted falling prey to bizarre slow-motion data breach in which an employee apparently stole dozens of laptops over several years containing the sensitive data of 74,000 people without anyone noticing.</p></blockquote>
<p>According to the reporting, over a six year period, a former employee removed 55 laptops containing a mix of employee records. The data put at risk included information such as social security numbers and may have had significant market value.</p>
<p>An interesting twist here is: (from the same article)</p>
<blockquote><p>The mystery of how the laptops disappeared is almost as strange as the fact that they later reappeared, allowing the breach to be characterised as temporary.</p></blockquote>
<p>It seems the laptops were not being stolen for their resale value. This does raise the question about what the previous employee was looking to do with them.</p>
<h2>Data protection &#8211; asset control</h2>
<p>When we talk about temporary breaches on network assets, we normally mean that there hasn&#8217;t been time or evidence that a hacker got in and stole data. This gives some reassurance to the data subjects and helps narrow down process and policy failures.</p>
<p>In this example it may not be so reassuring.</p>
<p>The &#8220;missing&#8221; laptops were not encrypted. This means the whole time they were out of Coca-Cola&#8217;s control anyone could have extracted any of the personal data on them. It only takes a few minutes to copy thousands of files to USB so it would have been possible for every record here to have been copied thousands of times.</p>
<p>Importantly, the apparent total lack of any form of asset control here means it isn&#8217;t really possible for Coca-Cola to know how long they were missing. The available reporting indicates that if they hadn&#8217;t returned, no one would have even realised the breach took place.</p>
<p>Asset control is a pretty fundamental aspect of both good service management and good security. It is not just a &#8220;Physical Security&#8221; issue that IT teams can pass off to the site security teams, it is a fundamental requirement. If you don&#8217;t manage all your assets properly, all your other controls suffer.</p>
<p>ISO27002:2013 spells out the requirement for asset control in 8.1:</p>
<blockquote><p>Assets associated with information and information processing facilities should be identified and an inventory of these assets should be drawn up and maintained.</p></blockquote>
<p>It seems in this instance, the inventory either did not exist or it was not maintained. Without a well maintained asset list you can never be sure that other controls are working. In this case, if Coca-Cola had kept an inventory, it could have identified the lack of encryption.</p>
<p>Remember, data protection needs good security. Don&#8217;t miss out on vital steps. Asset control really is vital.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2014/01/data-protection-physical-security/">Data protection needs good physical security</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1022</post-id>	</item>
		<item>
		<title>127.0.0.1 redirect causing wordpress connectivity problems.</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/12/127-0-0-1-redirect-causing-wordpress-connectivity-problems/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2013/12/127-0-0-1-redirect-causing-wordpress-connectivity-problems/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security Team]]></dc:creator>
		<pubDate>Mon, 30 Dec 2013 20:12:49 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Server Admin]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1012</guid>

					<description><![CDATA[<p>There seems to be a problem with either WordPress or one of its plugins that is redirecting the login script to a non-existent listener on local host (127.0.0.1). At the moment we have implemented a work-around, but any contributors may have difficulty logging in. A quick google search shows that this is happening to other [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/12/127-0-0-1-redirect-causing-wordpress-connectivity-problems/">127.0.0.1 redirect causing wordpress connectivity problems.</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1014" aria-describedby="caption-attachment-1014" style="width: 300px" class="wp-caption alignleft"><a href="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop.jpg"><img loading="lazy" decoding="async" data-attachment-id="1014" data-permalink="http://www.halkynconsulting.co.uk/a/2013/12/127-0-0-1-redirect-causing-wordpress-connectivity-problems/wordpress-127-0-0-1-redirect-loop/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop.jpg?fit=1000%2C402&amp;ssl=1" data-orig-size="1000,402" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;3.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1269171653&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0.025&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Wordpress Redirecting to 127.0.0.1 on login" data-image-description="&lt;p&gt;Wordpress Redirecting to 127.0.0.1 on login&lt;/p&gt;
" data-image-caption="&lt;p&gt;Wordpress Redirecting to 127.0.0.1 on login&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop.jpg?fit=300%2C120&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop.jpg?fit=1000%2C402&amp;ssl=1" class="size-medium wp-image-1014" alt="Wordpress Redirecting to 127.0.0.1 on login" src="https://i0.wp.com/www.halkynsecurity.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop-300x120.jpg?resize=300%2C120" width="300" height="120" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop.jpg?resize=300%2C120&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/wordpress-127.0.0.1-redirect-loop.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-1014" class="wp-caption-text">WordPress Redirecting to 127.0.0.1 on login</figcaption></figure>
<p>There seems to be a problem with either WordPress or one of its plugins that is redirecting the login script to a non-existent listener on local host (127.0.0.1). At the moment we have implemented a work-around, but any contributors may have difficulty logging in. A quick google search shows that this is happening to other users so hopefully we can resolve it soon.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/12/127-0-0-1-redirect-causing-wordpress-connectivity-problems/">127.0.0.1 redirect causing wordpress connectivity problems.</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2013/12/127-0-0-1-redirect-causing-wordpress-connectivity-problems/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1012</post-id>	</item>
		<item>
		<title>December DPA Breach Fines</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/12/december-dpa-breach-fines/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Mon, 30 Dec 2013 20:07:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Act]]></category>
		<category><![CDATA[DPA]]></category>
		<category><![CDATA[Fine]]></category>
		<category><![CDATA[ICO]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=1001</guid>

					<description><![CDATA[<p>The run up to Christmas 2013 has shown that the Information Commissioners Office is still busy fining organisations and individuals for breaches of the Data Protection Act (DPA). In December two new civil monetary penalties were issued with a total of over £175,000. Both cases highlighted the value of being proactive and implementing good security [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/12/december-dpa-breach-fines/">December DPA Breach Fines</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1003" aria-describedby="caption-attachment-1003" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="1003" data-permalink="http://www.halkynconsulting.co.uk/a/2013/12/december-dpa-breach-fines/id-10042498/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/ID-10042498.jpg?fit=400%2C265&amp;ssl=1" data-orig-size="400,265" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="The DPA is Law" data-image-description="" data-image-caption="&lt;p&gt;The DPA is Law &#8211; it always applies and ignorance is no defence.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/ID-10042498.jpg?fit=300%2C198&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/ID-10042498.jpg?fit=400%2C265&amp;ssl=1" class="size-medium wp-image-1003 " title="The DPA Is Law" alt="The DPA Is Law" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/ID-10042498-300x198.jpg?resize=300%2C198" width="300" height="198" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/ID-10042498.jpg?resize=300%2C198&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/ID-10042498.jpg?w=400&amp;ssl=1 400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1003" class="wp-caption-text">The DPA is Law &#8211; it always applies and ignorance is no defence. *</figcaption></figure>
<p>The run up to Christmas 2013 has shown that the Information Commissioners Office is still busy fining organisations and individuals for breaches of the Data Protection Act (DPA). In December two new civil monetary penalties were issued with a total of over £175,000. Both cases highlighted the value of being proactive and implementing good security controls in advance of a DPA breach, albeit in two very different ways.</p>
<p>Unusually, December saw one of the rare instances where the ICO levied a DPA fine (albeit a small one) against an individual working in the health sector. The second item was a much more significant penalty for a payday loans firm. This is less surprising as several organisations in that sector appear to operate as if regulations don&#8217;t apply.</p>
<h2>DPA Fine for GP Surgery Manager</h2>
<p>Early in December, the ICO <a title="GP surgery manager prosecuted for illegally accessing patients’ medical records" href="http://www.ico.org.uk/news/latest_news/2013/gp-surgery-manager-prosecuted-for-illegally-accessing-patients-medical-records-02122013" target="_blank">announced</a> the outcome of a case against a former-GP surgery&#8217;s finance manager who pleaded guilty to unlawfully accessing patient medical records on over 2000 occasions.</p>
<p>Discussing the DPA breach, the ICO Head of Enforcement, Stephen Eckersley, said:</p>
<blockquote><p>We may never know why Steven Tennison decided to break the law by snooping on hundreds of patients’ medical records. What we do know is that he’d received data training and knew he was breaking the law, but continued to access highly sensitive information over a 14-month period.</p></blockquote>
<p>As a result of this activity, Mr Tennison was fined a total of £996 and ordered to pay a £99 victim surcharge and £250 prosecution costs.</p>
<p>In this case, the GP&#8217; surgery appears to have functioning detective controls which allowed them to identify Mr Tennison&#8217;s unlawful behaviour and provide sufficient evidence to the ICO to avoid suffering any sanctions themselves.</p>
<p>We have discussed issues around the insider threat (and <a title="Pre-employment Security Screening – Reducing the workforce risk" href="http://www.halkynconsulting.co.uk/a/2013/02/pre-employment-security-screening-reducing-the-workforce-risk/" target="_blank">the importance of pre-employment screening</a>) before, but the sad fact is even the most trusted employees can go off the rails. What has worked here, and helped the Surgery remain compliant with the DPA, is that there were correct processes and policies in place.</p>
<p>This is a very good example of the benefits of investing in proper security processes before a breach happens. For organisations within the health sector, the alternative tends to be a hefty fine from the ICO, or worse:</p>
<blockquote><p>The ICO continues to call for more effective deterrent sentences, including the threat of prison, to be available to the courts to stop the unlawful use of personal information.</p></blockquote>
<h2>Payday loans firm breaches Privacy and Electronic Communications Regulations (PECR)</h2>
<figure id="attachment_1007" aria-describedby="caption-attachment-1007" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="1007" data-permalink="http://www.halkynconsulting.co.uk/a/2013/12/december-dpa-breach-fines/stockvault-pen-on-diagram103905/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905.jpg?fit=3072%2C2048&amp;ssl=1" data-orig-size="3072,2048" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;9&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 300D DIGITAL&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1196339202&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;27&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.025&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Payday Loan? DPA still applies" data-image-description="&lt;p&gt;Payday loan companies need to be aware of the DPA and PECR.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Payday loan companies need to be aware of the DPA and PECR.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905.jpg?fit=1024%2C682&amp;ssl=1" class="size-medium wp-image-1007 " title="Payday loan companies need to be aware of the DPA and PECR." alt="Payday loan companies need to be aware of the DPA and PECR." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905-300x200.jpg?resize=300%2C200" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905.jpg?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/12/stockvault-pen-on-diagram103905.jpg?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-1007" class="wp-caption-text">Payday loan companies need to be aware of the DPA and PECR.</figcaption></figure>
<p>The other case from December centred on the marketing tactics of a Payday Loans firm which breached the Privacy and Electronic Communications Regulations rather than the DPA directly.</p>
<p>The company, First Financial, and it&#8217;s director had been fined over £1000 each in October for DPA breaches (failing to register) although it seems that this wasn&#8217;t enough to help them avoid falling into the ICO&#8217;s clutches a second time.</p>
<p>This time, the £175,000 penalty followed over 4000 complaints that First Financial were sending out unsolicited text messages to people. These messages purported to be from friends and encouraged the recipient to take out a very high interest loan.</p>
<p>Commenting on the company, and the director&#8217;s behaviour, Simon Entwisle, said:</p>
<blockquote><p>People are fed up with this menace and they are not willing to be bombarded with nuisance calls and text messages at all times of the day trying to get them to sign up to high interest loans. The fact that this individual tried to distance himself from the unlawful activities of his company shows the kind of individuals we’re dealing with here.</p>
<p>We will continue to target these companies that continue to blight the daily lives of people across the UK. We are also currently speaking with the government to get the legal bar lowered, allowing us to take action at a much earlier stage.</p></blockquote>
<p>In this instance, the company were trying to hide their tracks by using un-registered SIM cards to send the messages indicating that this was a blatant deliberate violation of the DPA / PECR rather than ignorance of the law.</p>
<p>While it is unlikely that the director of First Financial would have been willing to implement good security controls to comply with the DPA, the fact is any organisation involved in direct marketing risks allowing this sort of behaviour. Without security controls, breaching the DPA / PECR can result in extensive fines undermining any profit made and risking a collapse of the business.</p>
<p>Good security and governance controls would have enabled First Financial to identify the risky behaviours in advance giving them the opportunity to remain legally compliant while still driving the business forward.</p>
<p>It is a shame that so many organisations believe they need to play fast and loose with the regulations rather than working to succeed in a legal and compliant manner. As long as this behaviour continues, the ICO (and others) will push for harsher and harsher penalties. In anything but the very shortest term, businesses which need to cheat the law to make a profit are doomed to fail.</p>
<p>Security and Governance controls really do protect the business and help it thrive in any environment.</p>
<p><span style="color: #808080;">* Image courtesy of Jeroen van Oostrom / FreeDigitalPhotos.net</span></p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/12/december-dpa-breach-fines/">December DPA Breach Fines</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1001</post-id>	</item>
		<item>
		<title>Business continuity – 5 things to consider this winter</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/11/business-continuity-5-things/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Fri, 01 Nov 2013 15:27:15 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Education and Awareness]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Business Protection]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=984</guid>

					<description><![CDATA[<p>In the northern hemisphere at least, winter is now upon us and this is time for all business owners to think about how well their business can cope if the weather turns bad. In the UK, we have had a succession of very bad winters and all size of organisations have suffered. In 2009, the [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/11/business-continuity-5-things/">Business continuity – 5 things to consider this winter</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_986" aria-describedby="caption-attachment-986" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="986" data-permalink="http://www.halkynconsulting.co.uk/a/2013/11/business-continuity-5-things/3335271065_9ac014c638_b/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b.jpg?fit=1024%2C683&amp;ssl=1" data-orig-size="1024,683" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Snow can disrupt your business." data-image-description="&lt;p&gt;Snow can disrupt your business.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Snow can disrupt your business.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b.jpg?fit=1024%2C683&amp;ssl=1" class="size-medium wp-image-986" alt="Snow can disrupt your business." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b-300x200.jpg?resize=300%2C200" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b.jpg?resize=120%2C80&amp;ssl=1 120w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/11/3335271065_9ac014c638_b.jpg?w=1024&amp;ssl=1 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-986" class="wp-caption-text">Snow can disrupt your business.</figcaption></figure>
<p>In the northern hemisphere at least, winter is now upon us and this is time for all business owners to think about how well their business can cope if the weather turns bad. In the UK, we have had a succession of very bad winters and all size of organisations have suffered. In 2009, the snow is reported to have cost UK business in excess of £1bn. This rose to £6bn over the winter of 2010 and in the long winter of 2012/2013 businesses reported lost £500m a day.</p>
<p>Now, obviously these numbers include huge losses suffered by major organisations, but for most small to medium enterprises there was noticeable pain. The Federation of Small Businesses reported that in March 2013 alone, the snowfall cost small businesses an average of £1,580 and an average of 2.2 days trading were lost. For some, another bad winter might be enough to put them out of business entirely.</p>
<p>However, it doesn&#8217;t have to be this way.</p>
<p>Sensible business practices and a view to ensuring “business continuity” is in place can mitigate most, if not all, the problems associated with bad weather conditions.</p>
<p>This doesn&#8217;t mean you need to go through a full blown BS25999 / ISO22301 process and produce reams of documents covering what your business will do if there is a volcano or aliens invade. However it does mean you should take a good look at your business and see what you would need to do in the event of a problem. As the saying goes, failing to plan is planning to fail and if your business is important to you, you should plan to keep it going.</p>
<h2>Five key steps to protecting your business</h2>
<p>At a very high level, there are five steps you can walk through to make sure you have considered the most likely and most relevant issues in protecting your business.</p>
<ol>
<li><b>Location</b>. Think about where your business is located – not just your head office, but any important sales locations, warehouses, depots etc. For example: If you are on a flood plain, you need to anticipate being flooded. Once you have a good understanding of this, you will have a clearer idea of what risks your business faces.</li>
<li><b>Services</b>. Next you need to consider what services are essential to your day to day running. Can your business function if the telephone lines go down? Do you depend on an internet connection for all your activities? Do you have your own electricity generators? Can your offices remain open if the water mains burst? When you identify what is important you can begin to plan how your business will react to likely problems.</li>
<li><b>Supply Chain</b>. Once you are happy with your location and services, you need to consider what impact supply chain problems will have on your day to day operations. If you have “Just in Time” supply strategy, you need to know you can cope if your suppliers are unable to deliver. A lot of this may highlight a need to check supplier contracts and carry out robust assessments of your suppliers.</li>
<li><b>Workforce</b>. It may seem obvious, but making sure your employees and contractors can do the job you are paying them to do is often overlooked. It may seem strange to do this after the earlier steps but this doesn&#8217;t indicate it is less important. Once you understand the risks your business faces and what you will need to do to keep office locations / warehouses (etc.) open, you will have a clearer idea of how best to manage your workers. Things to consider include allowing your workforce to work from home or arranging a way of getting people to alternative locations. All of this must be driven by your business needs and planning ahead gives you the greatest chance of getting it right.</li>
<li><b>Infrastructure</b>. The last in our list of high level concerns is the impact any infrastructure problems might have on your plans. By now you should have an idea of what risks your locations face, what services are required and where you need your suppliers and workforce. From this, you can now get a picture of what problems with national and local infrastructure may impact your business. Here you need to consider things like your employees ability to get to the locations – in the March 2013 snowfalls lots of roads and train routes were closed and this can significantly impact your plans to send employees to remote locations. Ideally you should try to make sure your business continuity plans are not reliant on vulnerable routes. Additionally, you should consider how infrastructure issues will impact your customers – if you rely on an out of town sales location, consider how you can cope if snow cuts off the access roads for a couple of days.</li>
</ol>
<p>When you have gone through each of the five steps, you will have an excellent idea of how your business can be impacted by unexpected situations. This doesn&#8217;t mean you can sit back and relax – now you need to make sure your business continuity plans make sense, address the issues and, most importantly, <b>actually work</b>.</p>
<p>In an ideal world, you will test your business continuity plans by playing out every possible scenario in real time, moving your employees around. However, for most small businesses this is overkill and will actually cause more harm than it will prevent.</p>
<p>This is no excuse, though, to not sit down with key members of your organisation and talk through the plan, looking for problems and challenging assumptions. This approach allows you to cover off dozens of situations for almost no cost – just a bit of time.</p>
<p>No one can really predict the future and the weather remains as unpredictable now as it was 2000 years ago but there is no excuse for not planning to keep your business up and running. Good planning can, for small businesses, be the difference between success and failure. Even if we have the mildest winter on record, it isn&#8217;t a waste of time.</p>
<p>If you want to know more about this, please <a title="Get in touch with the security team" href="http://www.halkynconsulting.co.uk/security/contact-security-team">get in touch</a> and our security consultants will help you build a tailor-made business continuity plan and then work with you to make sure it is robust and tested.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/11/business-continuity-5-things/">Business continuity – 5 things to consider this winter</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">984</post-id>	</item>
		<item>
		<title>ISO27001 compliance checklist available for download</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/#comments</comments>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 25 Oct 2013 20:42:30 +0000</pubDate>
				<category><![CDATA[Downloads]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Checklists]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Self Assessment]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=961</guid>

					<description><![CDATA[<p>As mentioned previously, we have now uploaded our ISO 27001 (also known as ISO/IEC 27001:2013) compliance checklist and it is available for free download. Please feel free to grab a copy and share it with anyone you think would benefit. Designed to assist you in assessing your compliance, the checklist is not a replacement for [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/">ISO27001 compliance checklist available for download</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_963" aria-describedby="caption-attachment-963" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/security-resources/downloads/ISO27001-2013-ComplianceChecklist.xlsx"><img loading="lazy" decoding="async" data-attachment-id="963" data-permalink="http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/iso27001-checklist-screenshot/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/ISO27001-Checklist-Screenshot.jpg?fit=400%2C216&amp;ssl=1" data-orig-size="400,216" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="ISO27001 Checklist tool &#8211; screenshot" data-image-description="&lt;p&gt;ISO27001 Checklist tool &#8211; screenshot&lt;/p&gt;
" data-image-caption="&lt;p&gt;ISO27001 Checklist tool &#8211; screenshot&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/ISO27001-Checklist-Screenshot.jpg?fit=300%2C162&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/ISO27001-Checklist-Screenshot.jpg?fit=400%2C216&amp;ssl=1" class="size-medium wp-image-963 " title="ISO27001 Checklist tool - screenshot" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/ISO27001-Checklist-Screenshot-300x162.jpg?resize=300%2C162" alt="ISO27001 Checklist tool - screenshot" width="300" height="162" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/ISO27001-Checklist-Screenshot.jpg?resize=300%2C162&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/ISO27001-Checklist-Screenshot.jpg?w=400&amp;ssl=1 400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-963" class="wp-caption-text">ISO27001 Checklist tool &#8211; screenshot</figcaption></figure>
<p>As <a title="ISMS: New version of ISO/IEC 27001 – Time to update?" href="http://www.halkynconsulting.co.uk/a/2013/10/isms-new-version-isoiec-27001/" target="_blank" rel="noopener">mentioned previously</a>, we have now uploaded our ISO 27001 (<em>also known as ISO/IEC 27001:2013</em>) compliance checklist and it is available for free download. Please feel free to grab a copy and share it with anyone you think would benefit.</p>
<p>Designed to assist you in assessing your compliance, the checklist is not a replacement for a formal audit and shouldn&#8217;t be used as evidence of compliance. However, this checklist can assist you, or your security professionals:</p>
<ul>
<li>to assess your current security measures in a structured way;</li>
<li>to make sure you that  have looked at all the relevant controls;</li>
<li>to identify areas where your current controls are strong and areas where you can achieve  improvements;</li>
<li>to achieve compliance with the standards;</li>
<li>to consider what evidence you have that could  demonstrate your compliance to an external party.</li>
</ul>
<p>Additionally, the tool can provide dashboards allowing you to present management information (MI) across your organisation. This shows where you are in your compliance program and how much progress you have achieved. Presenting information in this manner can be beneficial when it comes to winning stakeholder support in your security improvement plan, as well as demonstrating the value added by security.</p>
<p>You can grab the <a title="ISO27001 Checklist available for free download." href="http://www.halkynconsulting.co.uk/security-resources/downloads/ISO27001-2013-ComplianceChecklist.xlsx" target="_blank" rel="noopener">checklist directly</a> (<em>in Excel format</em>) or visit the <a title="Security resources &amp; whitepapers - free downloads from Halkyn Security" href="http://www.halkynconsulting.co.uk/security-resources/index" target="_blank" rel="noopener">Security Resources</a> part of our website for this checklist and many more useful security tools and documents. Halkyn Security makes these documents available to help people improve their security and we never demand you log in, or register, for access.</p>
<p>If you want the document in a different format (such as OpenOffice) <a title="Contact Halkyn Security Team" href="http://www.halkynconsulting.co.uk/contact/contact-security-team" target="_blank" rel="noopener">get in touch</a> and we will be happy to help you. The checklist uses basic office protection (to prevent accidental modification) but we are  happy to provide unprotected versions on request.</p>
<p>We have tried to make the checklist easy to use, and it includes a page of instructions to assist users. If you do have any questions, or want to talk through the process then let us know. Our security consultants are experienced in delivering ISO27001 compliant security solutions across a wide range of environments and we love&#8217;d love the opportunity to help you improve your security.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/">ISO27001 compliance checklist available for download</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2013/10/iso27001-compliance-checklist/feed/</wfw:commentRss>
			<slash:comments>73</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">961</post-id>	</item>
		<item>
		<title>Twitter &#8211; Possible social engineering attack</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/#comments</comments>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Tue, 15 Oct 2013 22:42:04 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=940</guid>

					<description><![CDATA[<p>This evening I managed to end up getting my personal twitter account hijacked and malicious users were able to send out direct messages before I got at least some element of control back. First off, I want to apologise to anyone who got a strange DM from me, telling them to click on a suspicious [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/">Twitter &#8211; Possible social engineering attack</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_944" aria-describedby="caption-attachment-944" style="width: 300px" class="wp-caption alignright"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg"><img loading="lazy" decoding="async" data-attachment-id="944" data-permalink="http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/messagesource/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg?fit=1586%2C990&amp;ssl=1" data-orig-size="1586,990" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="messagesource" data-image-description="&lt;p&gt;Twitter &#8211; email headers&lt;/p&gt;
" data-image-caption="&lt;p&gt;Twitter &#8211; email headers&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg?fit=300%2C187&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg?fit=1024%2C639&amp;ssl=1" class="size-medium wp-image-944" alt="Twitter - email headers" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource-300x187.jpg?resize=300%2C187" width="300" height="187" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg?resize=300%2C187&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg?resize=1024%2C639&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/messagesource.jpg?w=1586&amp;ssl=1 1586w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-944" class="wp-caption-text">Twitter &#8211; email headers</figcaption></figure>
<p>This evening I managed to end up getting my personal twitter <a title="My twitter account" href="https://twitter.com/tazwake" target="_blank">account</a> hijacked and malicious users were able to send out direct messages before I got at least some element of control back.</p>
<p>First off, I want to apologise to anyone who got a strange DM from me, telling them to click on a suspicious looking link. I&#8217;ve tried to delete them all now and I hope no one clicked on any links.</p>
<p>Although, I cant fully confirm this yet, the attack appears to have been the result of following a link to reset my twitter password. The email came from a very legitimate looking email account and the headers (see image) appear to be from twitter. However, when I did follow the link, and reset my password, I was immediately booted into a sort of limbo where I could neither log in or out of my account. Eventually I got control back by opening a new browser session and forcing yet another password reset. In the three minutes while I couldn&#8217;t get access, several direct messages were sent out to people trying to get them to click on a suspicious looking link.</p>
<h2>Twitter password reset email &#8211; background</h2>
<p>At 2313 (all times UK BST) an email landed in my inbox saying it was from twitter and reporting that they had reset my password:</p>
<blockquote><p>Twitter believes that your account may have been compromised by a website or service not associated with Twitter. We&#8217;ve reset your password to prevent others from accessing your account.</p></blockquote>
<p>Now, at this point, I hadn&#8217;t used my twitter account since 14 October and I certainly hadn&#8217;t added any new services or visited any websites trying which needed a twitter login. This meant I was a bit suspicious about the email so I checked the headers. Everything here checked out &#8211; and it still does which is why I am a bit dubious about this being the attack vector &#8211; so, at 2320hrs I clicked on the link.</p>
<p>From here, I was taken to a legitimate looking twitter password reset page. I created a new password and things went a bit strange. When I put the new password in, I was redirected to a log in page again, which seemed a bit more unusual but I had no warnings about HTTPS errors or the like, so I tried to log in with the new password.</p>
<p>When I clicked to submit the password, I was immediately bounced back to the login page and this happened a couple of times. After the fourth attempt, I tried to click on the forgotten password link, but I just got a message saying I needed to log out again first &#8211; with no mechanism to log out.</p>
<p>At this point I realised something was up and that my twitter account was probably genuinely compromised now. Yes, I can be a bit slow on the update.</p>
<h2>Twitter account recovery</h2>
<p>When the penny finally dropped I started trying to recover my account. First I went to a new browser session, which was clear of any twitter cookies or saved data and requested a password reset. I got the password reset email at 2329, leaving a gap of 9 minutes between when I thought I had reset my password and when I got control of it again.</p>
<figure id="attachment_952" aria-describedby="caption-attachment-952" style="width: 300px" class="wp-caption alignleft"><a href="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg"><img loading="lazy" decoding="async" data-attachment-id="952" data-permalink="http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/legitimatetwitteremail/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg?fit=1680%2C1050&amp;ssl=1" data-orig-size="1680,1050" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Twitter &#8211; Legitimate message headers" data-image-description="&lt;p&gt;Twitter &#8211; Legitimate message headers&lt;/p&gt;
" data-image-caption="&lt;p&gt;Twitter &#8211; Legitimate message headers&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg?fit=300%2C187&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg?fit=1024%2C640&amp;ssl=1" class="size-medium wp-image-952" alt="Twitter - Legitimate message headers" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail-300x187.jpg?resize=300%2C187" width="300" height="187" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg?resize=300%2C187&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg?resize=1024%2C640&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/legitimatetwitteremail.jpg?w=1680&amp;ssl=1 1680w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-952" class="wp-caption-text">Twitter &#8211; Legitimate message headers</figcaption></figure>
<p>Being a bit paranoid now, I double checked the reset details but with some extra confidence as I had genuinely requested it this time. A copy of the message source is shown in the image here.</p>
<p>Worryingly it was pretty much identical to the previous one. As I didn&#8217;t have much to lose, I clicked on the link and reset my password.</p>
<p>This time, it went very differently and I was given proper access as you would expect. Once I had got in (2330hrs), I checked my direct messages and it seems that between 2320 and 2329hrs, my account had been sending out direct messages to my followers asking them to click on a link. Fortunately not that many had been sent (about 3 a minute) which may have been an attempt to avoid detection.</p>
<h2>Analysis</h2>
<p>Without access to twitter&#8217;s logs or the like, I cant ever really be sure what happened, but there are clues available.</p>
<p>First off &#8211; the malicious direct messages were only sent in the period of time between my click on the first email and the password reset request. This means that the first email has to be treated with some increased suspicion, for the following reasons:</p>
<ol>
<li>It was unsolicited.</li>
<li>It was unspecific.</li>
<li>It mentioned my twitter user name but not my &#8220;name&#8221; (which the later, legitimate email did)</li>
<li>It created the sense of panic about my account being compromised.</li>
</ol>
<p>Despite this, the email has been digitally signed using twitter&#8217;s RSA key and the URL it referenced looks to all intent and purposes to be a legitimate twitter link for password resets.</p>
<p>The only difference I can find between the original message and the second (presumed legitimate) one is in the tracking string attached to it. On the first email, the link has the following appended to it:</p>
<blockquote><p>?utm_campaign=twitter20080313004041&amp;utm_medium= email&amp;utm_source=resetpwnotice</p></blockquote>
<p>On the second one, the tracking link reads:</p>
<blockquote><p>?utm_campaign= resetpw20100823&amp;utm_content=action&amp;utm_medium= email&amp;utm_source=resetpw</p></blockquote>
<p>However, it is hard to see how this can be converted into an attack vector, so it is probably nothing more than an artefact in the way twitter tracking works.</p>
<p>If the email hadn&#8217;t been compromised in some way, the next alternative is that some form of attack is being mounted when the password is being reset. During this time, as far as my browser was showing, I was connected over HTTPS and no alerts were shown.</p>
<p>Unfortunately it is unlikely I will ever get to the bottom of this, and it may have been a problem with a connected service or even a website and all the emails were legitimate &#8211; it was just a timing error that meant the attack took place in the gap.</p>
<p>If you have ever been in this situation, I would love to hear about it. Hopefully it can add some more knowledge and help solve the puzzle.</p>
<p><strong>The main lesson here is to be on guard for any suspicious activity with social networking accounts. Even if you get a legitimate email, take time to double check what is happening and if things go wrong, act quickly to regain control.</strong></p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/">Twitter &#8211; Possible social engineering attack</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2013/10/twitter-social-engineering-attack/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">940</post-id>	</item>
		<item>
		<title>ISMS: New version of ISO/IEC 27001 &#8211; Time to update?</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/10/isms-new-version-isoiec-27001/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 14 Oct 2013 21:13:08 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[ISMS]]></category>
		<category><![CDATA[ISO27001]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=929</guid>

					<description><![CDATA[<p>As you may be aware, the ISO/IEC 27001 standard for Information Security Management Systems (ISMS) was updated and the 2013 version became the &#8220;official&#8221; version at the start of October 2013. The previous version for ISMS requirements was ISO/IEC 27001:2005, and for eight years now, organisations have been working towards, and achieving, certification to that [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/10/isms-new-version-isoiec-27001/">ISMS: New version of ISO/IEC 27001 &#8211; Time to update?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_934" aria-describedby="caption-attachment-934" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="934" data-permalink="http://www.halkynconsulting.co.uk/a/2013/10/isms-new-version-isoiec-27001/1336892_40263449/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449.jpg?fit=2652%2C1924&amp;ssl=1" data-orig-size="2652,1924" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="1336892_40263449" data-image-description="&lt;p&gt;An ISMS is fundamental to how you make sure your business is properly protected.&lt;/p&gt;
" data-image-caption="&lt;p&gt;An ISMS is fundamental to how you make sure your business is properly protected.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449.jpg?fit=300%2C217&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449.jpg?fit=1024%2C742&amp;ssl=1" class="size-medium wp-image-934" alt="An ISMS is fundamental to how you make sure your business is properly protected." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449-300x217.jpg?resize=300%2C217" width="300" height="217" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449.jpg?resize=300%2C217&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449.jpg?resize=1024%2C742&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/10/1336892_40263449.jpg?w=2400&amp;ssl=1 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-934" class="wp-caption-text">An ISMS is fundamental to how you make sure your business is properly protected.</figcaption></figure>
<p>As you may be aware, the ISO/IEC 27001 standard for Information Security Management Systems (ISMS) was updated and the 2013 version became the &#8220;official&#8221; version at the start of October 2013. The previous version for ISMS requirements was ISO/IEC 27001:2005, and for eight years now, organisations have been working towards, and achieving, certification to that standard.</p>
<h2>ISMS Requirements &#8211; Changes?</h2>
<p>The change between the 2005 version and the current 2013 standard is more than just cosmetic and there is a lot of improvements for your ISMS. There are some areas where controls have been regrouped within Annex A, but there are also new controls for project management, outsourcing, design &amp; engineering and information security events. Additionally the risk management approach has been brought more in line with ISO 31000.</p>
<h2>What should you do?</h2>
<p>Overall, the main impact is that a lot of existing ISMS document will need to be reviewed (and possibly references changed) and anyone working towards certification needs to make a decision as to which path they will go down.</p>
<ul>
<li>If you are close to completing your implementation and will be able to get through all the required visits by the assessors no later than the end of September 2014, then you can opt to certify your ISMS against ISO/IEC 27001:2005.</li>
<li>Alternatively you can make the changes required to realign your ISMS to ISO/IEC 27001:2013 now and work towards certification that way. If your are more than 12 months away from full implementation of your ISMS, this is your only option.</li>
</ul>
<p>Unless you really are very, very close to finishing your ISMS certification against the 2005 standard, we would strongly recommend you use the new 2013 version.</p>
<p>If your ISMS is currently certified to the 2005 version of the standard, your certification will remain valid until the end of your 3 year renewal cycle. However once you come up for re-certification you will need to work against the 2013 standard.</p>
<p>As far as we are aware, it is not possible to recertify against the 2005 during the twelve month &#8220;grace period&#8221; that has been offered for new certifications.</p>
<h2>Supply chain ISMS certification</h2>
<p>When it comes to your supply chain, one of the benefits of ISO/IEC 27001 certification is that it allows you to develop a level of trust. If your supplier has managed to achieve and maintain certification, then you have a reasonable level of assurance that they have implemented a working ISMS and will protect your data to at least some degree.</p>
<p>It is of critical importance that as part of this assurance you get access to copies of the documentation sets provided for certification, evidence that the ISMS is properly implemented and a good understanding of the scope submitted for certification audit. If you can tick these three boxes, you can have quite a good level of assurance around your supplier.</p>
<p>Now that the 2013 standard is official, you should also make sure that your supply chain move to meet the new requirements in a timely fashion. As mentioned above, any certifications currently valid will remain so, but it will help for you to engage your suppliers and find out what their plans for the transition are. By October 2016 all your suppliers should have had to recertify and it is unlikely that any ISO/IEC 27001:2005 certifications will be valid.</p>
<h2>Coming Soon</h2>
<p>To assist you with moving towards the 2013 standard, we will be providing a free downloadable checklist document that you can use to self-assess your ISMS compliance. Hopefully this will be ready before 25 October 2013.</p>
<p>Following on from that, we will also look to update our Security Policy Framework (SPF) mapping to assist suppliers to the Government / MOD. That is likely to be ready by the end of the year.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/10/isms-new-version-isoiec-27001/">ISMS: New version of ISO/IEC 27001 &#8211; Time to update?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">929</post-id>	</item>
		<item>
		<title>Physical Security &#8211; It still matters</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/09/physical-security-still-matters/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Fri, 20 Sep 2013 22:21:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Loss Prevention]]></category>
		<category><![CDATA[Physical Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=908</guid>

					<description><![CDATA[<p>When it comes to security, there is an unfortunate tendency for organisations (large and small) to fall into the trap of treating their physical security as something separate or different from their information security needs. Despite physical security having a place in every international security standard (such as ISO 27001), ownership of physical risks often [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/09/physical-security-still-matters/">Physical Security &#8211; It still matters</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_910" aria-describedby="caption-attachment-910" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="910" data-permalink="http://www.halkynconsulting.co.uk/a/2013/09/physical-security-still-matters/information-security-service-lg/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?fit=2304%2C1532&amp;ssl=1" data-orig-size="2304,1532" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;3.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1269171653&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0.025&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Physical security protects information" data-image-description="&lt;p&gt;Good physical security protects your information.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Good physical security protects your information.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?fit=300%2C199&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?fit=1024%2C680&amp;ssl=1" class="size-medium wp-image-910 " alt="Good physical security protects your information." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_-300x199.jpg?resize=300%2C199" width="300" height="199" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?resize=300%2C199&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?resize=1024%2C680&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/information-security-service.lg_.jpg?resize=120%2C80&amp;ssl=1 120w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-910" class="wp-caption-text">Good physical security protects your information.</figcaption></figure>
<p>When it comes to security, there is an unfortunate tendency for organisations (large and small) to fall into the trap of treating their physical security as something separate or different from their information security needs. Despite physical security having a place in every international security standard (such as ISO 27001), ownership of physical risks often ends up being moved away from the &#8220;Information Security&#8221; specialists and bundled in with safety or facilities management.</p>
<p>As we have said in the past, <a title="Security design – physical security measures" href="http://www.halkynconsulting.co.uk/a/2013/06/security-design-physical-security-measures/" target="_blank">physical security really does matter</a> to your organisation. If you don&#8217;t take it seriously, it doesn&#8217;t matter how much cybersecurity you have in place, you will suffer losses.</p>
<p>There is an assumption that the big global banks are very much leaders when it comes to security and preventing criminals getting access to their money. Banks have led the way with development of anti-theft measures, counter-fraud, hacker prevention and much more. Most banks spend inordinate amounts of money building very robust networks with strong firewalls and access controls. This all makes sense, because when it comes to robbing money, most criminals dream of getting a big score from a big bank.</p>
<p>With this sort of threat level, spending lots of money on security is actually very sensible for a bank. As you may imagine, they really do spend lots of money.</p>
<p>This means that the recent news was a bit of a surprise. Not one, but two global banks were targeted by a reasonably unsophisticated type of attack which has been known about for over a decade and is countered by pretty basic physical security measures.</p>
<figure id="attachment_917" aria-describedby="caption-attachment-917" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/contact/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="917" data-permalink="http://www.halkynconsulting.co.uk/a/2013/09/physical-security-still-matters/000801_0257_0052_tsms/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?fit=1000%2C1000&amp;ssl=1" data-orig-size="1000,1000" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Keyboards &#8211; protect them with physical security" data-image-description="&lt;p&gt;Keyboards &#8211; protect them with physical security&lt;/p&gt;
" data-image-caption="&lt;p&gt;Keyboards &#8211; protect them with physical security&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?fit=1000%2C1000&amp;ssl=1" class="size-medium wp-image-917" alt="Keyboards - protect them with physical security" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms-300x300.jpg?resize=300%2C300" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?resize=100%2C100&amp;ssl=1 100w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/09/000801_0257_0052_tsms.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-917" class="wp-caption-text">Keyboards &#8211; protect them with physical security</figcaption></figure>
<p>The first news broke around 13 September 2013 with reports that the <a title="Met Police - Police Central e-crime Unit" href="http://content.met.police.uk/Site/pceu" target="_blank">Police Central e-crime Unit</a> (PCeU) had foiled a planned attack by a criminal group in London to pose as an engineer then plant a &#8220;KVM&#8221; switch in the Salford Quays branch. When this happened, the <a title="Arrests over 'cyber plot' to steal from Santander bank" href="http://www.bbc.co.uk/news/uk-england-london-24077094" target="_blank">BBC News</a> reported a gang of 12 people had been arrested in connection with the planned attack.</p>
<p>A week later (20 Sept 2013), a very similar news item appeared when eight men were arrested following the theft of £1.3 million from Barclays Bank using an identical attack. <a title="Barclays Bank computer theft: Eight held over £1.3m haul" href="http://www.bbc.co.uk/news/uk-england-24172305" target="_blank">As reported, again by the BBC</a>, This time a fake engineer visited the Swiss Cottage branch of Barclays and attached a malicious KVM switch to a computer. This enabled the gang to get remote access and siphon out the money.</p>
<p>While intelligence led policing seems to have saved Santander from any loss, Barclays was not so lucky. Even if they do recover most of the money, the harm has still been done. This is a very good example spending a fortune on technical security controls not mattering. If there is a physical security weakness, attackers will get in.</p>
<p>(<em>Note: a KVM is a &#8220;keyboard, video, mouse&#8221; switch which is normally used to allow one person to control several devices. In these attacks the KVM appears to have been linked to a device controlled by the criminals allowing them to access the bank&#8217;s networks</em>)</p>
<h2>Physical security protects assets &#8211; lessons learned</h2>
<p>Although we may never know all the details, from the published reports there are some lessons for everyone here.</p>
<p>The criminals appear to have been trying to exploit two weaknesses &#8211; lack of physical security sweeps and a relaxed approach to service engineers. The fact that two global banks appear to have suffered the same issues is especially interesting and may be a sign that this is prevalent across business sectors.</p>
<p>First &#8211; how to combat the two main weaknesses that the criminals wanted to exploit:</p>
<ol>
<li>Physical security is important. If your organisation separates physical and IT security, you will have a weakness that a criminal will exploit. Don&#8217;t fall into this trap.</li>
<li>Ensure your staff are security aware enough that they can spot when strange things appear on their machines or in the office.</li>
<li>If you have security guards / officers on site, make sure they carry out regular physical security sweeps. This should include checking for documents left out, cabinets left unlocked and any strange devices attached to machines.</li>
<li>Unless there is a business reason for it, lock down your computer ports. This wont prevent a KVM switch attack but it will prevent similar attacks on USB ports.</li>
<li>Manage your service providers. If an engineer comes on-site in a sensitive area you should be supervising them. No engineer should ever get access without having their credentials checked and any unexpected engineer visits should be treated with extreme caution.</li>
</ol>
<p>Security, including physical security, is never perfect but if you can implement these five steps you will significantly reduce your risks.</p>
<p>One extra issue worth considering &#8211; although there is no indication it is relevant to the two cases here &#8211; is the risk of an insider being involved. If the criminal gangs had managed to subvert an employee, then they wouldn&#8217;t have had to sneak in as an engineer and the attacks become significantly harder to detect.</p>
<p>This is one reason why good background screening and employee after care is essential to your overall security posture. Without it, you are just creating a new opportunity for criminals to get access.</p>
<h2>Physical Security &#8211; Information Security &#8211; Personnel Security &#8211; Security</h2>
<p>The overarching lesson here is that security is security. Protecting your business, preventing theft, guarding your reputation, keeping your assets safe (and so on) is all part of the same mission.</p>
<p>The more you fragment your security into different areas the more you increase the chance that a gap will appear which a criminal will exploit. You may not have the threat profile of a bank, but eventually criminals will notice your weakness and take advantage of it.</p>
<p>In recent years there has been a tendency to split information security off to the IT Department, personnel security gets pushed to HR and physical security ends up with the facilities management team. This is a mistake.</p>
<p>In an ideal world, your organisation will have a &#8220;security&#8221; department which covers all of this and has links to other departments as needed. Even if we don&#8217;t live in an ideal world, you need a centralised &#8220;Chief Security Officer&#8221; type role to join up the competing interests and make sure that all your security controls join up properly.</p>
<p>Frequently this is called &#8220;Holistic&#8221; security and buzzword or not, it just makes sense.</p>
<p>To finish, a quote from Alex Grant, Managing Director, Fraud Prevention, Barclays</p>
<blockquote><p>Barclays has no higher priority than the protection and security of our customers against the actions of would-be fraudsters.</p></blockquote>
<p>Well said. Every business should take a similar position, but remember &#8211; actions speak louder than words. <strong>If you value your security, do it properly</strong>.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/09/physical-security-still-matters/">Physical Security &#8211; It still matters</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">908</post-id>	</item>
		<item>
		<title>Encryption &#8211; it is your responsibility</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/08/encryption-it-is-your-responsibility/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Tue, 20 Aug 2013 21:54:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Truecrypt]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=890</guid>

					<description><![CDATA[<p>Encryption is important. This has always been well known, and with the recent revelations about PRISM and related Government monitoring of communications, people have become understandably more interested in the topic. However, keep in mind the fact that doing encryption wrong is worse than not doing it. In recent years it has become more and [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/08/encryption-it-is-your-responsibility/">Encryption &#8211; it is your responsibility</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_893" aria-describedby="caption-attachment-893" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="893" data-permalink="http://www.halkynconsulting.co.uk/a/2013/08/encryption-it-is-your-responsibility/020610_1547_0022_lsms-2/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/020610_1547_0022_lsms.jpg?fit=300%2C200&amp;ssl=1" data-orig-size="300,200" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Hosted data should always be encrypted" data-image-description="&lt;p&gt;Hosted data should always be encrypted&lt;/p&gt;
" data-image-caption="&lt;p&gt;Hosted data should always be encrypted&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/020610_1547_0022_lsms.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/020610_1547_0022_lsms.jpg?fit=300%2C200&amp;ssl=1" class="size-full wp-image-893" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/020610_1547_0022_lsms.jpg?resize=300%2C200" alt="Encryption - use it wisely or people are reading your data" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/020610_1547_0022_lsms.jpg?w=300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/020610_1547_0022_lsms.jpg?resize=120%2C80&amp;ssl=1 120w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-893" class="wp-caption-text">Encryption &#8211; use it wisely or people are reading your data</figcaption></figure>
<p>Encryption is important. This has always been well known, and with the recent revelations about PRISM and related Government monitoring of communications, people have become understandably more interested in the topic. However, keep in mind the fact that doing encryption wrong is worse than not doing it.</p>
<p>In recent years it has become more and more common for people to store personal data and commercial data on a variety of 3rd party platforms &#8211; Google Docs, Skydrive, Dropbox, Box.net etc.</p>
<h2>Encryption needs to be locally managed</h2>
<p>At the most basic level, if you host your data somewhere outside your control &#8211; be that a cloud provider or more traditional hosting session &#8211; then you really should be encrypting it. When you do use encryption it is of the utmost importance that <strong>you</strong> manage the keys yourself. Anything else is giving you a very dangerous false sense of security and means your encryption can be trivially bypassed without you even knowing.</p>
<p>However, this fundamental principle seems to have been overlooked with Google&#8217;s latest PR campaign which looks to allay customer fears by implementing automatic encryption to all uploads. <strong>This is a very bad idea</strong>.</p>
<p>The Telegraph <a title="Google boosts cloud security with automatic encryption" href="http://www.telegraph.co.uk/technology/google/10254223/Google-boosts-cloud-security-with-automatic-encryption.html" target="_blank">reported the news of Google automatic encryption</a> with the following:</p>
<blockquote><p>&#8220;We know that security is important to you and your customers. Our goal is to make securing your data as painless as possible,&#8221; Google product manager Dave Barth said in a <a href="http://googlecloudplatform.blogspot.co.uk/2013/08/google-cloud-storage-now-provides.html" target="_blank">blog post</a> introducing the update.</p></blockquote>
<p>Now, it is true that implementing encryption can be difficult, but that is largely down to the level of experience and expertise your staff have. <strong>If security is important, then you absolutely must make sure you have the right people to do it</strong>. If security is important, then this is really not the place to cut costs.</p>
<p>The article continues with this, also from Dave Barth:</p>
<blockquote><p>&#8220;If you require encryption for your data, this functionality frees you from the hassle and risk of managing your own encryption and decryption keys. We manage the cryptographic keys on your behalf using the same hardened key management systems that Google uses for our own encrypted data, including strict key access controls and auditing.&#8221;</p></blockquote>
<p>Now this is a bit calculating and presents an image which isn&#8217;t really true.</p>
<p>Remember the fundamental principle &#8211; if you dont manage your own encryption keys, your data is insecure? Well it applies here. It especially applies here.</p>
<p>Managing your own encryption keys may be a hassle, but it is less of a risk than trusting a third party to do it for you &#8211; especially a third party which has no real obligation to your stakeholders, is big enough to likely shrug off any legal efforts you make, refuses to acknowledge the jurisdiction of the ICO / Data Protection Act and was reportedly complicit in revealing data to the Government agencies it is implying it will protect your data from.</p>
<p>If you rely on Google&#8217;s (or anyone) automatic encryption then you are relying on them making sure all their employees are honest and legitimate, making sure that that they never go out of business, making sure that they never engage in covert arrangements with Government agencies or other companies, making sure they never get hacked, making sure they never have an outage when you need access etc.</p>
<p>You may be confident that one or two of the above will never happen to your provider, but you actually need to be 100% confident that nothing bad will happen. Isn&#8217;t that asking a bit much?</p>
<p>Using automatic encryption may remove some hassle, but it significantly increases the risks your data faces, often to the point at which you are better leaving it unencrypted and assuming it has been compromised.</p>
<h2>Encryption &#8211; the basic rules</h2>
<p>When it comes to your encryption, there are actually some simple rules to keep in mind and the whole thing is easier than it looks. With encryption, the only hard parts are working out what technology to use and picking a suitable key (e.g. password).</p>
<ol>
<li><strong>All your data must be encrypted locally</strong>. Even if your provider uses SSL, before you send anything out of your immediate control you absolutely need to know that it is encrypted to whatever standard you have decided upon.</li>
<li><strong>You must manage encryption keys yourself</strong>. These are the crown jewels and if you lose them or compromise them, your data is lost or compromised. However, keep in mind, things that are important to you might not be as important to other people so you are the best person to look after your encryption keys.</li>
<li><strong>Store encryption keys separately from the data</strong>. If someone has your data and your key, the encryption is meaningless. Keep them apart unless you need to decrypt / encrypt.</li>
<li><strong>Guard your encryption keys</strong>. It should go without saying that your encryption keys need to be backed up and protected. If you have an information classification scheme, your encryption keys should be treated the same as the information they protect. Try to avoid falling into the trap of encrypting your encryption keys though&#8230; that just gets confusing.</li>
</ol>
<p>If you live in a country where the state can force you to reveal keys (such as the United Kingdom, China etc) or there is a risk someone could place you under duress, then consider a deniable container. This is offered by products such as <a title="TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux" href="http://www.truecrypt.org/" target="_blank">Truecrypt</a> and gives you the ability to surrender the outer encrypted data while keeping your secrets safe. This is especially useful if you or your employees travel and there is a risk of unwanted attention as it means they can comply with any demands (lawful or otherwise).</p>
<p>The bottom line is that encryption is not hard, it is not hassle and if you really do think security is important you should be doing it. The key phrase, however, is that <strong>you</strong> should be doing it, not someone else.</p>
<p>Anything else means you don&#8217;t really think security is important.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/08/encryption-it-is-your-responsibility/">Encryption &#8211; it is your responsibility</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">890</post-id>	</item>
		<item>
		<title>Suspicious mail advice &#8211; Advice from NaCTSO</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/08/suspicious-mail-advice-advice-from-nactso/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 19 Aug 2013 16:34:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Anti Terrorism]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<category><![CDATA[security education and awareness]]></category>
		<category><![CDATA[Security Training]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=875</guid>

					<description><![CDATA[<p>This communication regarding suspicious mail has been issued by the National Counter Terrorism Security Office (NaCTSO) and the Centre for Protection of the National Infrastructure (CPNI). Please feel free to forward it on wherever appropriate. If you would like more advice about your specific situation, what risks you might face from suspicious mail (or other [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/08/suspicious-mail-advice-advice-from-nactso/">Suspicious mail advice &#8211; Advice from NaCTSO</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_879" aria-describedby="caption-attachment-879" style="width: 200px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="879" data-permalink="http://www.halkynconsulting.co.uk/a/2013/08/suspicious-mail-advice-advice-from-nactso/london_suspicious_mail_threats/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/london_suspicious_mail_threats.jpg?fit=200%2C300&amp;ssl=1" data-orig-size="200,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Handling suspicious mail" data-image-description="&lt;p&gt;There is a slightly increased risk of suspicious mail packages being delivered to DWP-linked organisations.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Handling suspicious mail&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/london_suspicious_mail_threats.jpg?fit=200%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/london_suspicious_mail_threats.jpg?fit=200%2C300&amp;ssl=1" class="size-full wp-image-879 " title="Handling suspicious mail" alt="There is a slightly increased risk of suspicious mail packages being delivered to DWP-linked organisations." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/london_suspicious_mail_threats.jpg?resize=200%2C300" width="200" height="300" data-recalc-dims="1" /><figcaption id="caption-attachment-879" class="wp-caption-text">Handling suspicious mail</figcaption></figure>
<p>This communication regarding suspicious mail has been issued by the National Counter Terrorism Security Office (NaCTSO) and the Centre for Protection of the National Infrastructure (CPNI). Please feel free to forward it on wherever appropriate.</p>
<p>If you would like more advice about your specific situation, what risks you might face from suspicious mail (or other security related issues), or would like help training your staff in handling packages, then <a title="Get in touch with Halkyn Security " href="http://www.halkynconsulting.co.uk/security/contact-security-team">get in touch</a>.</p>
<p>You can download advice on <a href="http://www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/Suspicious-Package-Indicators.pdf">Suspicious Package Indicators</a> and some Police <a href="http://www.halkynconsulting.co.uk/a/wp-content/uploads/2013/08/G23904-560.pdf">advice on suspected contaminated mail</a>.</p>
<h2>Suspicious mail advice</h2>
<p>The recent delivery of a number of packages to an address in London led the recipient to believe that the contents were contaminated and request police assistance.</p>
<p>While the packages were found to contain a harmless substance and the matter was resolved, it has highlighted an opportunity to provide guidance on the safe handling of mail and the initial response when recipients have concerns regarding potential contamination.</p>
<p>This is especially the case with businesses and charitable organisations connected with the Department of Work and Pensions&#8217; mandatory work activity placement scheme who may be the recipients of unsolicited packages sent as part of a campaign of protest against the scheme.</p>
<p>While we are not aware of any specific threat, details available on websites may have been used to identify such companies and encourage protest against them</p>
<p>This is an important reminder for security managers to review their mail handling procedures and ensure that all relevant staff are aware of and understand the correct protocols. This in turn means that any item of concern can be dealt with appropriately and a proportionate police response can be provided.</p>
<p>Further advice and threat reporting is available from: <a title="National Counter Terrorist Security Office" href="http://www.nactso.gov.uk/" target="_blank">http://www.nactso.gov.uk/</a> | <a title="Centre for the Protection of National Infrastructure" href="http://www.cpni.gov.uk/" target="_blank">http://www.cpni.gov.uk/</a></p>
<p>In an emergency call 999<br />
For non emergencies call 101<br />
For the Anti Terrorist Hotline call 0800 789 321<br />
<a title="Metropolitan Police Anti Terrorist Hotline" href="http://www.met.police.uk/so/at_hotline.htm" target="_blank">http://www.met.police.uk/so/at_hotline.htm</a></p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/08/suspicious-mail-advice-advice-from-nactso/">Suspicious mail advice &#8211; Advice from NaCTSO</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">875</post-id>	</item>
		<item>
		<title>Sensitive data should not go by fax!</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/08/sensitive-data-should-not-go-by-fax/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Fri, 09 Aug 2013 22:57:44 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPA]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Personal Data]]></category>
		<category><![CDATA[Sensitive Data]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=850</guid>

					<description><![CDATA[<p>You may want to check your calendars again. Even though we are now well into the 21st century, it seems that some organisations are still sending sensitive data by fax machine &#8211; and not just the NHS (who were fined £55,000 for the inevitable breach). It seems banks, who really should know better, cant help [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/08/sensitive-data-should-not-go-by-fax/">Sensitive data should not go by fax!</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You may want to check your calendars again. Even though we are now well into the 21st century, it seems that some organisations are still sending sensitive data by fax machine &#8211; and not just the NHS (<a title="Fax machines – not suitable for sensitive data" href="http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/">who were fined £55,000 for the inevitable breach</a>). It seems banks, who really should know better, cant help themselves.</p>
<figure id="attachment_753" aria-describedby="caption-attachment-753" style="width: 300px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="753" data-permalink="http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/faxmachines/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?fit=1000%2C1000&amp;ssl=1" data-orig-size="1000,1000" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Fax Machines" data-image-description="&lt;p&gt;Fax Machines &#8211; out of date and insecure&lt;/p&gt;
" data-image-caption="&lt;p&gt;Fax Machines &#8211; Dont use for sensitive data&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?fit=1000%2C1000&amp;ssl=1" class="size-medium wp-image-753" alt="Fax Machines - out of date and insecure - do not use for sensitive data" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines-300x300.jpg?resize=300%2C300" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?resize=100%2C100&amp;ssl=1 100w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-753" class="wp-caption-text">Fax Machines &#8211; Dont use for sensitive data</figcaption></figure>
<p>This month (August 2013), the ICO has issued a Civil Monetary Penalty (fine) of £75,000 to <a title="Bank of Scotland - fined £75000 for a DPA breach" href="http://www.bankofscotland.co.uk/" target="_blank">Bank of Scotland</a> for repeatedly faxing customer&#8217;s sensitive data to incorrect fax numbers.</p>
<p>In the press release about the fine, the ICO notes that Bank of Scotland were even notified about the problem in 2009 but failed to take any corrective action. As a result, over 30 faxes were sent incorrectly. The faxes themselves included pay statements, bank account details, names, addresses etc. In all, an ideal haul for anyone looking to commit identity theft.</p>
<p>In light of this, the fine itself seems pretty trivial compared to what the ICO is able to issue. To emphasise this point, this is what <a title="Bank of Scotland receives £75K penalty after four year fax blunder" href="http://www.ico.org.uk/news/latest_news/2013/Bank-of-Scotland-receives-75000-penalty-after-three-year-fax-blunder-05082013" target="_blank">Stephen Eckersley, Head of Enforcement at the ICO said</a>:</p>
<blockquote><p>To send a person’s financial records to the wrong fax number once is careless. To do so continually over a four year period, despite being aware of the problem, is unforgivable and in clear breach of the Data Protection Act.</p></blockquote>
<p>It is unforgivable.</p>
<h2>Protecting sensitive data &#8211; lessons learned</h2>
<p>The first point we want to hammer home is that you should not use fax machines for sensitive data. You really shouldn&#8217;t. If you are doing this, then stop now.</p>
<p>However, if you really must, and you have it on your risk register, then learn to do it properly.</p>
<ul>
<li><span style="line-height: 16px;">If you send sensitive data use pre-programmed numbers. Do not rely on busy staff hitting the correct buttons.</span></li>
<li>Manage the process. Have a way in which errors can be rectified when you discover them.</li>
<li>Keep records of what you are sending and who it is going to.</li>
<li>Work to eliminate the use of fax machines for your processes.</li>
</ul>
<p>The last point is worth looking at in more detail.</p>
<p>If you use fax machines for sensitive data you absolutely must be looking at a way to remove them. Sending data by fax is only slightly better than a totally unencrypted email and, in some respects, has more room for error. Remember, your fax goes unencrypted over what is now likely to be an IP switched network. At least with email you can put controls on your exchange server and firewall.</p>
<p>If you are capturing sensitive data from your customers, you owe it to them and your business to do it properly. It is even more cost effective to do it properly.</p>
<p><strong>Continuing to send sensitive data by fax is begging for an ICO sanction.</strong></p>
<p>Take this opportunity to review your processes. Determine what sensitive data you are collecting and how you move it around your organisation.</p>
<p>In this example, Bank of Scotland were collecting application forms physically from customers and faxing them to a central processing unit. It is hard to think of a reason why this wouldn&#8217;t have been better sent over internal email. Most modern business copiers have an option to copy to internal email, so this would have even been possible from the branches themselves.</p>
<p>Banks, and the NHS, aren&#8217;t alone here. US-based organisations (e.g. the <a title="EC-Council" href="http://www.eccouncil.org/" target="_blank">EC-Council</a>, who should know better) seem to frequently ask for customers to fax credit card &amp; bank details, which is crying out for problems. There are numerous online payment processors which reduce the need to have a member of staff collect the faxes and manually process the payment, as well as provide security to the customer. While US companies might not fear the ICO, the fact is they are risking their customers security, and this is rarely good for business.</p>
<p>Whatever  your situation, wherever you are based, stop using fax machines to send sensitive data. There really is a better way.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/08/sensitive-data-should-not-go-by-fax/">Sensitive data should not go by fax!</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">850</post-id>	</item>
		<item>
		<title>NHS Trust fined £200,000 following data disposal errors</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/07/nhs-trust-fined-data-disposal/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Mon, 15 Jul 2013 19:08:21 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Data Disposal]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[NHS]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Management]]></category>
		<category><![CDATA[Supplier Management]]></category>
		<category><![CDATA[Supplier Security Management]]></category>
		<category><![CDATA[Supply Chain Security]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=798</guid>

					<description><![CDATA[<p>Although it has a well structured, well run and reasonably well resourced security management service, the NHS still seems to struggle with some aspects of compliance with the Data Protection Act. As a result, another NHS trust has fallen foul of the Information Commissioner&#8217;s Office (ICO) and fined a significant amount of money. Based on [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/07/nhs-trust-fined-data-disposal/">NHS Trust fined £200,000 following data disposal errors</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Although it has a well structured, well run and reasonably well resourced security management service, the NHS still seems to struggle with some aspects of compliance with the Data Protection Act. As a result, another NHS trust has fallen foul of the Information Commissioner&#8217;s Office (ICO) and fined a significant amount of money.</p>
<figure id="attachment_559" aria-describedby="caption-attachment-559" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="559" data-permalink="http://www.halkynconsulting.co.uk/a/2013/02/another-lack-of-encryption-leads-to-a-data-protection-act-fine/healthcaresecuritysml/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/02/healthcaresecuritysml.jpg?fit=300%2C250&amp;ssl=1" data-orig-size="300,250" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="NHS Security" data-image-description="&lt;p&gt;Healthcare Security &#8211; Sensitive data needs proper protection.&lt;/p&gt;
" data-image-caption="&lt;p&gt;NHS &#038; Healthcare Security : Sensitive data needs proper protection.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/02/healthcaresecuritysml.jpg?fit=300%2C250&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/02/healthcaresecuritysml.jpg?fit=300%2C250&amp;ssl=1" class="size-full wp-image-559 " alt="NHS &amp; Healthcare Security - Sensitive data needs proper protection." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/02/healthcaresecuritysml.jpg?resize=300%2C250" width="300" height="250" data-recalc-dims="1" /></a><figcaption id="caption-attachment-559" class="wp-caption-text">NHS &amp; Healthcare Security: Sensitive data needs proper protection.</figcaption></figure>
<p>Based on the <a title="ICO fines NHS Surrey for failing to check the destruction of old computers" href="http://www.ico.org.uk/news/latest_news/2013/ico-issues-nhs-surrey-monetary-penalty-of-200000" target="_blank">ICO&#8217;s press release</a>, it appears that NHS Surrey had outsourced the disposal of its computers and related assets. Unfortunately, after 2 years, they were notified by a member of the public that a disk purchased from eBay contained patient data.</p>
<p>According to the press release, when NHS Surrey collected the computer and processed it, they discovered records belonging to 900 adults and 2000 children. Faced with this information, the trust was able to recover 39 further devices from the trading arm of the data destruction provider. Of this batch, 10 were previously owned by NHS Surrey and three contained sensitive patient data.</p>
<p>NHS Surrey appear to have entered into an arrangement whereby the data disposal company removed the devices for free on the grounds that they could sell on any salvageable materials. From the ICO&#8217;s report, this appears to have been a bit of an informal arrangement and no contract was in place and no monitoring conducted.</p>
<p>Stephen Eckersley, Head of Enforcement, described this as &#8220;<em>one of the most serious the ICO has witnessed</em>&#8221; with the following points noted in the press release:</p>
<blockquote><p>The ICO’s investigation found that NHS Surrey had no contract in place with their new provider, which clearly explained the provider’s legal requirements under the Data Protection Act, and failed to observe and monitor the data destruction process.</p>
<p>NHS Surrey mislaid the records of the equipment passed for destruction between March 2010 and 10 February 2011, and was only able to confirm that 1,570 computers were processed between 10 February 2011 and 28 May 2012. The data destruction company was unable to trace where the computers ended up, or confirm how many might still contain personal data.</p></blockquote>
<figure id="attachment_823" aria-describedby="caption-attachment-823" style="width: 300px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/security/security-policy"><img loading="lazy" decoding="async" data-attachment-id="823" data-permalink="http://www.halkynconsulting.co.uk/a/2013/07/nhs-trust-fined-data-disposal/disposal/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal.jpg?fit=1056%2C600&amp;ssl=1" data-orig-size="1056,600" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Data Disposal &#8211; Manage it properly" data-image-description="&lt;p&gt;Data disposal should always be a well managed process.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Data disposal should always be a well managed process.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal.jpg?fit=300%2C170&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal.jpg?fit=1024%2C581&amp;ssl=1" class="size-medium wp-image-823" alt="Data disposal should always be a well managed process." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal-300x170.jpg?resize=300%2C170" width="300" height="170" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal.jpg?resize=300%2C170&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal.jpg?resize=1024%2C581&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/disposal.jpg?w=1056&amp;ssl=1 1056w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-823" class="wp-caption-text">Data disposal should always be a well managed process.</figcaption></figure>
<p>This is similar to the incident reported last year where the <a title="Secure Data Disposal - not really..." href="http://www.halkynconsulting.co.uk/a/2012/09/secure-data-disposal-not-really/" target="_blank">Scottish Borders Council was fined £250,000</a> for failing to protect data during the disposal process and personal data ended up in public waste bins.</p>
<p>One major difference is that, unlike the local Councils in the UK, the NHS has a well structured, centrally managed system to enforce security compliance on third party suppliers. It appears to have failed here.</p>
<h2>Lessons learned from the NHS &#8211; Supplier Security Management</h2>
<p>There is a lot that can be learned here, even if you don&#8217;t work for the NHS. If you handle personal data or if you just have commercially sensitive information, you need to make sure you dispose of your assets properly. If your files end up on eBay then you face a regulator fines, loss of competitive advantage and reputational damage.</p>
<p>You can avoid this. Quite easily actually.</p>
<p>The Data Protection Act is quite clear about the obligation and the 7th principle states</p>
<blockquote><p>Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.</p></blockquote>
<p>Even if you don&#8217;t process personal data, this is a good principle to adhere to when it comes to protecting your corporate data.</p>
<p>With this in mind, there are some steps you can take to avoid following NHS Surrey&#8217;s footsteps:</p>
<ol>
<li><span style="line-height: 16px;">Have a policy and plan in place to manage your information lifecycle. This needs to document how you create, maintain and dispose of all your information assets. </span></li>
<li>Keep an accurate, and well maintained record, of where your sensitive information is stored. You should always be able to tell if a hard disk has had &#8220;important&#8221; information on it or not.</li>
<li>If you outsource your disposal you <strong>absolutely</strong> must make sure there is a robust contract in place. This contract must oblige the service provider to securely dispose of any data. If nothing else, this means that in the event some data surfaces, you have options to protect yourself.</li>
<li>Make sure you manage your disposal process. In-house or outsourced, you should nominate a suitable person to be responsible for ensuring data is properly disposed.</li>
</ol>
<p>Following these four steps will help you avoid following in the footsteps of NHS Surrey and the Scottish Borders Council. More importantly, it will help you avoid you suffering a fine in the region of £200,000.</p>
<p>Good supplier security management is not free, but it is a lot cheaper than the alternatives.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/07/nhs-trust-fined-data-disposal/">NHS Trust fined £200,000 following data disposal errors</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">798</post-id>	</item>
		<item>
		<title>Governance failure costs £45,000</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/07/governance-failure-costs-45000/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Sat, 13 Jul 2013 21:49:13 +0000</pubDate>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<category><![CDATA[security education and awareness]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=768</guid>

					<description><![CDATA[<p>A breakdown of internal governance processes has led to the Information Commissioner&#8217;s Office (ICO) issuing a civil monetary penalty (fine) on Tameside Energy Services Ltd, a Manchester based company claiming to offer a range of energy improvements and making heavy use of cold-call sales tactics. Showing a growing tendency to fine private companies, the ICO reported [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/07/governance-failure-costs-45000/">Governance failure costs £45,000</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_772" aria-describedby="caption-attachment-772" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="772" data-permalink="http://www.halkynconsulting.co.uk/a/2013/07/governance-failure-costs-45000/telesales_governance/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance.jpg?fit=600%2C400&amp;ssl=1" data-orig-size="600,400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;9&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS-1Ds Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1123666663&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;70&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.01&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Telesales needs good governance" data-image-description="&lt;p&gt;Telesales can be effective at promoting your business but you need good governance in place to make it work for you.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Telesales can be effective at promoting your business but you need good governance in place to make it work for you.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance.jpg?fit=600%2C400&amp;ssl=1" class="size-medium wp-image-772 " title="Telesales requires good governance to work for your business" alt="Telesales can be effective at promoting your business but you need good governance in place to make it work for you." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance-300x200.jpg?resize=300%2C200" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance.jpg?resize=120%2C80&amp;ssl=1 120w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/07/telesales_governance.jpg?w=600&amp;ssl=1 600w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-772" class="wp-caption-text">Telesales can be effective at promoting your business but you need governance structures in place to make it work for you.</figcaption></figure>
<p>A breakdown of internal governance processes has led to the Information Commissioner&#8217;s Office (<a title="The Information Commissioner's Office" href="http://www.ico.org.uk/" target="_blank">ICO</a>) issuing a civil monetary penalty (fine) on Tameside Energy Services Ltd, a Manchester based company claiming to offer a range of energy improvements and making heavy use of cold-call sales tactics.</p>
<p>Showing a growing tendency to fine private companies, the ICO reported that Tameside Energy Services was responsible for over 1000 complaints from customers over failures to remove people from their contact lists and a failure to properly check the Telephone Preference Services (<a title="The Telephone Preference Service" href="http://www.tpsonline.org.uk/tps/index.html" target="_blank">TPS</a>) lists before making cold calls.</p>
<p>In the statement announcing the fine, Simon Entwisle, Director of Operations for the ICO <a title="ICO announces fine on Manchester based energy company" href="http://www.ico.org.uk/news/latest_news/2013/ico-continues-crackdown-on-nuisance-calls-as-energy-company-fined-45000" target="_blank">said</a>:</p>
<blockquote><p>This is not the first and will not be the last monetary penalty issued by the ICO for unwanted marketing calls. These companies need to listen – bombarding the public with cold calls will not be tolerated. Were it not for the company’s poor financial position, this monetary penalty would have been £90,000.</p></blockquote>
<blockquote><p>We are continuing our work with the industry, government and other regulators, including OFCOM, to co-ordinate our efforts to tackle this problem. We would like to see the law changed to make it simpler for us to punish companies responsible for repeated and continuous breaches of the law.</p></blockquote>
<p>The lack of organisation governance appears to be part of a larger problem with this company. However if they had spent a trivial sum of money on implementing a governance process, they would have saved ten times that amount of money in fines.</p>
<p>It seems to go without saying that cold calling is largely unpopular and it is likely that as issues like this get more coverage, more people will know to complain. The ICO has even set up a reporting tool (<a title="The ICO nuisance call reporting tool" href="https://www.snapsurveys.com/swh/surveylogin.asp?k=134674895144" target="_blank">available online</a>) to make it easier to report nuisance calls.</p>
<h2>Cold calling needs good governance</h2>
<p>However, lots of companies still use cold calling telesales and it can be a very effective way to get new business. So, the question is, how do you make sure it works for your company rather than open you up to potentially massive fines?</p>
<p>The simple answer is governance.</p>
<p>In this example, the existence of a governance team would have driven compliance &#8211; both with removal requests and TPS checks &#8211; and prevented both customer annoyance and the ICO fine.</p>
<p>Whatever your line of business, whatever size your organisation, you need to address governance, risk and compliance. It doesn&#8217;t matter if this is one department, three or a dozen. It doesn&#8217;t even matter if this is part of your security team, audit team or even sales teams. The only thing that matters is that you have it.</p>
<p>Risk management is not just about preventing people stealing your assets, it is also about ensuring you have proper governance processes to stop your own business cannibalising itself. Sales methods are there to grow your business, not to have you fined.</p>
<p>The sad truth is that if your sales methods need to bypass these checks to make money for your business, something is fundamentally wrong. Good governance would identify this in advance and help you regain control.</p>
<p>Don&#8217;t cut corners with your risk management, governance or compliance. Ever.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/07/governance-failure-costs-45000/">Governance failure costs £45,000</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">768</post-id>	</item>
		<item>
		<title>Fax machines &#8211; not suitable for sensitive data</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 14 Jun 2013 20:21:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[NHS]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<category><![CDATA[security education and awareness]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=722</guid>

					<description><![CDATA[<p>It seems some technologies are hard to get rid of and it seems that people are still using fax machines to send data despite them being slow, cumbersome, unreliable and, most importantly, insecure. As it is 2013, it should go without saying that fax machines are not an appropriate mechanism to send anything sensitive and [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/">Fax machines &#8211; not suitable for sensitive data</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It seems some technologies are hard to get rid of and it seems that people are still using fax machines to send data despite them being slow, cumbersome, unreliable and, most importantly, insecure. As it is 2013, it should go without saying that fax machines are not an appropriate mechanism to send anything sensitive and certainly not sensitive personal data.</p>
<figure id="attachment_724" aria-describedby="caption-attachment-724" style="width: 300px" class="wp-caption alignright"><a href="http://www.halkynconsulting.co.uk"><img loading="lazy" decoding="async" data-attachment-id="724" data-permalink="http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/020610_1547_0022_lsms/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms.jpg?fit=1000%2C665&amp;ssl=1" data-orig-size="1000,665" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Data" data-image-description="&lt;p&gt;Data needs to be protected in transport.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Data needs to be protected in transport.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms.jpg?fit=300%2C199&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms.jpg?fit=1000%2C665&amp;ssl=1" class="size-medium wp-image-724" alt="Data needs to be protected in transport - not sent over fax machines." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms-300x199.jpg?resize=300%2C199" width="300" height="199" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms.jpg?resize=300%2C199&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms.jpg?resize=120%2C80&amp;ssl=1 120w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/020610_1547_0022_lsms.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-724" class="wp-caption-text">Data needs to be protected in transport.</figcaption></figure>
<p>However, this is exactly what has cost the North Staffordshire Combined Healthcare NHS trust £55,000 this week. To make matters worse, the Trust has a set of policies to cover sending data over fax machines, but they appear to have been ignored. As a reminder &#8211; <strong>normal fax machines are insecure</strong>. And we would even go as far as to say even if you set up good cryptography to secure your fax machines, they are still the worst option.</p>
<p>In an announcement on 13 May 2013, the Information Commissioners Office (ICO) reported that the NHS Trust had sent sensitive medical data over their fax machines to the wrong number on three separate occasions. The Trust only became aware of the problem when the recipient eventually wrote to them.</p>
<p>It appears that this breach was the result of a combination of factors. First off, fax machines are a bad idea for sensitive data. To make it worse, it appears the trust staff were not aware of how to use fax machines in a secure manner. Combining these two almost guarantees a security breach.</p>
<p>The <a title="Fax Machine Blunder Leads to £55000 Fine" href="http://www.ico.org.uk/news/latest_news/2013/fax-blunder-leads-to-55000-penalty-for-north-staffordshire-trust-13062013" target="_blank">ICO is less damning</a> over the use of fax machines and concentrates on the process and user awareness:</p>
<blockquote><p>Let’s make no mistake, this breach was entirely avoidable. One phone call ahead to the trust’s Wellbeing Centre would have alerted its staff to the fact that the number they were entering was incorrect. This would have stopped highly sensitive information about the care of vulnerable people being sent to a member of the public on three separate occasions.</p></blockquote>
<blockquote><p>This case should act as a warning to all organisations that routinely send out sensitive personal information by fax. Make sure you have appropriate procedures and controls in place, so that errors can be spotted before it is too late.</p></blockquote>
<p>We would suggest that this is the bare minimum to consider if you use fax machines &#8211; for any data  &#8211; but first you should review why you are using them in the first place.</p>
<p>Recently we have been engaged with a couple of organisations who have used fax machines to send corporate data. In two instances this included information that would be considered sensitive in most context (although not covered Data Protection Act 1988).</p>
<p>Both companies have detailed security policies governing the transmission of data and what encryption is required. However, neither appeared to realise that data over fax machines was sent in the clear with very little way of knowing who the recipient was.</p>
<h2>Fax machines are not suitable for sensitive information.</h2>
<p>Just in case you aren&#8217;t convinced, lets look at some reasons why fax machines are risky.</p>
<ul>
<li>The data is (normally) unencrypted. Fax machines simply scan the image and send the bits over the phone line. Anyone between you and the recipient can read the data.</li>
<li>You cant be sure the line between sender and recipient is direct. Most telephone connections use IP somewhere along the path. This means the day of a single bit of copper between each machine are long gone. When you use fax machines, you have as much control over what equipment is between parties as you do with email.</li>
<li>Using fax machines gives you no control, or assurance, over who is at either end. Most of the time, documents you fax end up falling out of the machine onto the floor where they wait to be found.</li>
<li>When you send documents over fax machines, you have no real way of knowing if they arrived unless you implement a laborious process of telephone calls before and after.</li>
</ul>
<figure id="attachment_753" aria-describedby="caption-attachment-753" style="width: 300px" class="wp-caption alignleft"><a href="http://www.halkynconsulting.co.uk/"><img loading="lazy" decoding="async" data-attachment-id="753" data-permalink="http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/faxmachines/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?fit=1000%2C1000&amp;ssl=1" data-orig-size="1000,1000" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Fax Machines" data-image-description="&lt;p&gt;Fax Machines &#8211; out of date and insecure&lt;/p&gt;
" data-image-caption="&lt;p&gt;Fax Machines &#8211; Dont use for sensitive data&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?fit=1000%2C1000&amp;ssl=1" class="size-medium wp-image-753" alt="Fax Machines - out of date and insecure" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines-300x300.jpg?resize=300%2C300" width="300" height="300" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?resize=100%2C100&amp;ssl=1 100w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/faxmachines.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-753" class="wp-caption-text">Fax Machines &#8211; out of date and insecure</figcaption></figure>
<p>Obviously you can implement mitigating controls (such as telephone calls before and after, or expensive encrypted fax lines) and still use fax machines. The problem is this all creates a cost just to allow you to use an outmoded communications path. Would you put this much effort in to allow your business to still use smoke signals?</p>
<p>What compounds the problem is the vast majority of documents sent by fax are generated on internet connected computers, using networked data, and then printed off before being sent. This creates the new problem of having to secure the printed copy at both ends.</p>
<p>A much easier solution is to email the document and use any of the good (often free) encryption tools that are available. Now the only challenge is to share the encryption key (password) with the other side, but this can be easily done over different channels. If you regularly exchange sensitive information with a single endpoint (as in the NHS example), rather than use fax machines, you can set up an end to end encrypted email system. If that  is too technical, then you can still pre-arrange what your passwords will be and use any free encryption packages.</p>
<p>Of course, nothing in security is perfect and every solution will have risks. The problem with fax machines is that they actually <strong>increase</strong> the risks over what you would get using unencrypted email.</p>
<p>Now, having said all that, one use for fax machines is as a third line disaster recovery option. If your online comms are down and you absolutely must send a document, then fax it. <strong>Just don&#8217;t think it is in any way secure</strong>.</p>
<p>Take this opportunity to review your processes. If you have fax machines, find out why you use them and what business functions they provide that cant be replicated using email. Don&#8217;t accept the argument that you need to capture signatures &#8211; this can be done electronically or even scan a signature in. Make sure there is a good, strong business reason to take this risk.</p>
<p>If you absolutely must use fax machines make sure that you have good policies and processes to secure their use.</p>
<p>Finally, and this is the important bit, make sure all your staff are 100% sure how to use them and have the time and space to do it properly. Do not allow your managers to rush staff into unsafe practices and do not allow your staff to develop bad habits.</p>
<p>Fax machines are bad news from a security standpoint, so if you want them, you have to work hard to minimise your risks.</p>
<p>Our <a title="Specialist Security Consultants" href="http://www.halkynconsulting.co.uk/" target="_blank">security experts</a> can help you secure your use of fax machines, or better still help you move to a more secure communications path. <a title="Specialist Security Consultants - Contact Us" href="http://www.halkynconsulting.co.uk/contact/contact-security-team" target="_blank">Get in touch</a> to find out more.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/06/fax-machines-not-suitable-for-sensitive-data/">Fax machines &#8211; not suitable for sensitive data</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">722</post-id>	</item>
		<item>
		<title>Lack of Laptop Encryption costs City Council £150,000</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/06/lack-of-laptop-encryption-costs-city-council-150000/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Fri, 07 Jun 2013 20:29:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[ICO]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=707</guid>

					<description><![CDATA[<p>The Information Commissioner&#8217;s Office (ICO) has announced today that it has fined Glasgow City Council £150,000 following the loss of two laptops because neither had any encryption software applied. The fine follows an incident where two laptops were stolen from Council offices during refurbishment. To complicate matters, the Council had already been made aware of [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/06/lack-of-laptop-encryption-costs-city-council-150000/">Lack of Laptop Encryption costs City Council £150,000</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Information Commissioner&#8217;s Office (ICO) has <a title="Lack of encryption results in ICO fine of £150k for Glasgow City Council" href="http://www.ico.org.uk/news/latest_news/2013/Glasgow-city-council-fined-150000-07062013" target="_blank">announced today</a> that it has fined Glasgow City Council £150,000 following the loss of two laptops because neither had any encryption software applied.</p>
<figure id="attachment_709" aria-describedby="caption-attachment-709" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" data-attachment-id="709" data-permalink="http://www.halkynconsulting.co.uk/a/2013/06/lack-of-laptop-encryption-costs-city-council-150000/04_04_4_a7-2/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?fit=1200%2C800&amp;ssl=1" data-orig-size="1200,800" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;7.32&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;FinePixS1Pro&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;995372793&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;183&quot;,&quot;iso&quot;:&quot;400&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Laptops: Encryption is important" data-image-description="" data-image-caption="&lt;p&gt;All portable computing devices are at risk of theft or loss. Encryption helps manage this risk.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?fit=1024%2C682&amp;ssl=1" class="size-medium wp-image-709 " title="Encryption should be used on all portable devices" alt="All portable computing devices are at risk of theft or loss. Encryption helps manage this risk." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7-300x200.jpg?resize=300%2C200" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?resize=120%2C80&amp;ssl=1 120w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/04_04_4_a7.jpg?w=1200&amp;ssl=1 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-709" class="wp-caption-text">All portable computing devices are at risk of theft or loss. Encryption helps manage this risk.</figcaption></figure>
<p>The fine follows an incident where two laptops were stolen from Council offices during refurbishment. To complicate matters, the Council had already been made aware of the risks of theft and although one laptop was locked in a storage drawer, the key to the drawer was kept insecure along with the second laptop.</p>
<p>The investigation into the two stolen laptops revealed that the council had issues a large number of devices without any encryption and, although lots of these were later encrypted,  74 remain unaccounted for (and without encryption) with at least six known to have been stolen. Two years previously the Council had been issued with an enforcement notice following the loss of unencrypted memory sticks.</p>
<p>Kevin Macdonald, the ICO&#8217;s Assistant Commissioner for Scotland said:</p>
<blockquote><p>To find out that these poor practices have returned some two years later shows a flagrant disregard for the law and the people of Glasgow. The council should be held to account, and the penalty goes some way to achieving that.</p></blockquote>
<p>It is staggering to think that in such a short time, the Council has managed to fall into such a bad habits around basic security principles.</p>
<h2>Encryption is the essential last resort for IT</h2>
<p>Security &#8211; be it around IT hardware, portable devices (laptops or tablets or phones), documents, people, or anything &#8211; is built on a framework of overlapping security controls. The idea being that if one control fails, security is still in place because the other controls still work.</p>
<p>When it comes to portable IT assets &#8211; especially laptops &#8211; the sad truth is that they are at significantly greater risk of loss or theft than pretty much anything else in your inventory. Users will consistently circumvent your physical security controls (i.e. leaving them on trains, forgetting to lock drawers etc), and they are an attractive target for criminals.</p>
<p>This means it is essential that you assume they <strong>will be stolen</strong> and ensure that encryption is part of every single build.</p>
<h2>Four main lessons</h2>
<p>There are a lot of lessons that can be learned from the fine issued to Glasgow City Council, so you should take this opportunity to review your processes and see where you can improve.</p>
<p>The four main take away points from this are:</p>
<ul>
<li><span style="line-height: 16px;">Ensure all portable devices are encrypted &#8211; with laptops this should be whole disk encryption at a minimum, for tablets or smartphones your mobile device management policy should include mandatory file encryption and strong passwords.</span></li>
<li>Ensure all your employees are properly trained in how to care for portable devices and how to use your security furniture. Keys must always be properly secured.</li>
<li>Maintain a working, accurate asset register. Without it you don&#8217;t even know if your devices have been lost / stolen.</li>
<li>Have a functioning risk management process in place which is able to respond to changing threat levels (such as the reports of increased crimes) and is able to drive security practices within your business.</li>
</ul>
<p>Without these four simple steps, your security activity is fundamentally undermined and it is only a matter of time before you suffer a loss and (if it relates to personal data) a penalty from the Information Commissioner.</p>
<p>Security must never be seen as a cost to your business, it is there to protect against greater losses and allow you to continue to operate. Cutting corners is not a good use of your resources and, as we keep saying, unless you put aside enough resources to deal with the inevitable security breaches, it is a massive risk management failure.</p>
<p>Implementing encryption would have been a lot cheaper for Glasgow City Council.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/06/lack-of-laptop-encryption-costs-city-council-150000/">Lack of Laptop Encryption costs City Council £150,000</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">707</post-id>	</item>
		<item>
		<title>Security design &#8211; physical security measures</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/06/security-design-physical-security-measures/</link>
		
		<dc:creator><![CDATA[Halkyn Security]]></dc:creator>
		<pubDate>Mon, 03 Jun 2013 21:09:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[secure by design]]></category>
		<category><![CDATA[security assessment]]></category>
		<category><![CDATA[security design]]></category>
		<category><![CDATA[Security Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=677</guid>

					<description><![CDATA[<p>Physical security really does matter. When it comes to protecting your property, stock, customers, employees or other assets, the physical security measures you can put in place form the foundations for any other loss prevention or information security program. Implementing good physical security measures saves you money in the long run and is often a [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/06/security-design-physical-security-measures/">Security design &#8211; physical security measures</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Physical security really does matter. When it comes to protecting your property, stock, customers, employees or other assets, the physical security measures you can put in place form the foundations for any other loss prevention or information security program. Implementing good physical security measures saves you money in the long run and is often a basic requirement for insurance coverage.</p>
<figure id="attachment_681" aria-describedby="caption-attachment-681" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="681" data-permalink="http://www.halkynconsulting.co.uk/a/2013/06/security-design-physical-security-measures/000909_0495_0014_nsms/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/000909_0495_0014_nsms.jpg?fit=1000%2C655&amp;ssl=1" data-orig-size="1000,655" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Protect your assets" data-image-description="&lt;p&gt;Protect your assets&lt;/p&gt;
" data-image-caption="&lt;p&gt;Protect your assets&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/000909_0495_0014_nsms.jpg?fit=300%2C196&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/000909_0495_0014_nsms.jpg?fit=1000%2C655&amp;ssl=1" class="size-medium wp-image-681" alt="Physical Security - Protect your assets" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/000909_0495_0014_nsms-300x196.jpg?resize=300%2C196" width="300" height="196" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/000909_0495_0014_nsms.jpg?resize=300%2C196&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/06/000909_0495_0014_nsms.jpg?w=1000&amp;ssl=1 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-681" class="wp-caption-text">Protect your assets &#8211; whatever they are</figcaption></figure>
<p>Unfortunately, physical security measures are frequently overlooked. Even when they are considered, often organisations devolve this to the facilities management team rather than a centralised security domain. To make matters worse, even when physical security is a part of the organisation it is unfortunately common for this function to remain on a separate reporting chain to the rest of the security and risk management activities.</p>
<p>This is not good for your business because <strong>physical security is important</strong>. Just to reiterate something we have said lots of times &#8211; <strong>not having robust physical security processes, properly implemented, in your organisation undermines all your other security controls</strong>.</p>
<h2>The problems with physical security</h2>
<p>The world isn&#8217;t a perfect place and there are some factors which lead to problems when it comes to perfecting your security measures.</p>
<ol>
<li>Physical security isn&#8217;t generally exiting or newsworthy.  It doesn&#8217;t matter how important physical protection measures are, information security and the threat of Cyber-Hackers is always going to grab the headlines. When it comes to spending priorities, headlines win.</li>
<li>Physical security is sometimes (wrongly) seen as something anyone can do. Even though it is a very specialised field, there is an assumption that anyone can look at locks or put up a fence.</li>
<li>It is often too late for the most cost effective physical security controls and this leads to organisational inertia against implementing new ones. The best time to implement security controls is at the design stage but for most, this is not an option and you are faced with bolting controls onto existing facilities.</li>
</ol>
<h2>Physical security &#8211; solutions?</h2>
<p>The hardest solution is also the most important one. <strong>Security is important</strong> and all your key stakeholders need to realise this and fully understand the implications. If your organisation has a Chief Security Officer (CSO) then it is a step in the right direction, but there still needs to be continued effort to ensure that security gets the right profile. If you don&#8217;t have a CSO, then the job of selling security is yours. Work hard.</p>
<p>The second solution is to realise that physical security is very much a discipline that needs skilled, qualified and experienced professional staff for it to work. This comes at a price, but remember, if paying an unskilled, unqualified person to do physical security is not a saving &#8211; it is just a waste of money. You wouldn&#8217;t try to cut corners asking your sales manager to double as an accountant or legal advisor, so don&#8217;t do it with the security professionals. Facilities management is linked to physical security but it is not the same thing and there is no automatic assumption that someone good at one role is good at the other.</p>
<p>The last bullet point is where it gets interesting.</p>
<p>If you are moving to a new home, your business is building new premises or even just expanding, then you have the chance to get the best possible value from your physical security measures. Designing in security allows you to ensure that every control is suitable for your needs and implemented for as little cost as possible.</p>
<p>Sadly, this is a very rare situation.</p>
<p>It is more likely that you need to build security into an operating environment &#8211; be it a home built years ago, offices in constant use or a busy warehouse. Here you no longer have the option to specify what the walls will be made out of, or how high the windows will be from the floor, you simply have to implement physical security in the best possible manner.</p>
<p><strong>The best way to do this is by using good physical security design.</strong></p>
<p>This is not design in the way you might do it for a new site, where the physical security professional sits down with architectural drawings. Instead, it is using your experts to design a robust physical security program that fits your situation.</p>
<p>A well designed physical security plan will follow some common steps, similar to the normal quality assurance / continual improvement process models:</p>
<ol>
<li><span style="line-height: 16px;">Identify the goals of the physical security plan. [Plan]</span></li>
<li>Design &amp; implement the physical security system. [Do]</li>
<li>Evaluate and test the system. [Check]</li>
<li>Monitor and manage (and improve) the physical security system as part of your normal business. [Act]</li>
</ol>
<p>It is a mistake to allow this process to turn into a box-ticking, check-list, exercise but for some stages having reference lists can help ensure that nothing gets overlooked and you can demonstrate due diligence to an external party.</p>
<p>An example of where a physical security check-list might help is during the planning stages when you need to carry out surveys of the site and determine what is already there and can be used. We have produced a <a title="Physical Security Assessment Form - Halkyn Security Consultants" href="http://www.halkynconsulting.co.uk/security-resources/downloads/physical_security_assessment_form.pdf" target="_blank">physical security assessment form</a> [available for free download] which can be used for this purpose or can form the basis of one developed for your own purposes.</p>
<p>At Halkyn Consulting we offer a wide range of <a title="Physical Security Services - Halkyn Consulting Ltd" href="http://www.halkynconsulting.co.uk/security/physical-security" target="_blank">physical security services</a>, including design assessments for new build, risk management and physical security improvements. If you have your own security team, we are always happy to provide support, guidance and mentorship to help improve your security, protect your assets and reduce any losses. <a title="Contact Halkyn Security Consultants" href="http://www.halkynconsulting.co.uk/security/contact-security-team" target="_blank">Get in touch</a> to find out more.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/06/security-design-physical-security-measures/">Security design &#8211; physical security measures</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">677</post-id>	</item>
		<item>
		<title>Passwords are not bad, just dont trust vendors</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/05/passwords-are-not-bad-just-dont-trust-vendors/</link>
					<comments>http://www.halkynconsulting.co.uk/a/2013/05/passwords-are-not-bad-just-dont-trust-vendors/#comments</comments>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Thu, 16 May 2013 19:32:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Risk Management]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=634</guid>

					<description><![CDATA[<p>Passwords are in the news again, with yet another headline crying out for the death of the password and claiming that everyone should move to two factor authentication (2FA) for all their online activities. As with all these claims, it is worth looking at them in greater detail before we give up on of the [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/05/passwords-are-not-bad-just-dont-trust-vendors/">Passwords are not bad, just dont trust vendors</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_640" aria-describedby="caption-attachment-640" style="width: 300px" class="wp-caption alignright"><img loading="lazy" decoding="async" data-attachment-id="640" data-permalink="http://www.halkynconsulting.co.uk/a/2013/05/passwords-are-not-bad-just-dont-trust-vendors/04_04_4_a7/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?fit=1200%2C800&amp;ssl=1" data-orig-size="1200,800" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;7.32&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;FinePixS1Pro&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;995372793&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;183&quot;,&quot;iso&quot;:&quot;400&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Entering Passwords" data-image-description="&lt;p&gt;Passwords are far from ready to die yet.&lt;/p&gt;
" data-image-caption="&lt;p&gt;Passwords are far from ready to die yet.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?fit=300%2C200&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?fit=1024%2C682&amp;ssl=1" class="size-medium wp-image-640" alt="Passwords are far from ready to die yet." src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7-300x200.jpg?resize=300%2C200" width="300" height="200" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?resize=120%2C80&amp;ssl=1 120w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/05/04_04_4_a7.jpg?w=1200&amp;ssl=1 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /><figcaption id="caption-attachment-640" class="wp-caption-text">Passwords are far from ready to die yet.</figcaption></figure>
<p>Passwords are in the news again, with yet another headline crying out for the death of the password and claiming that everyone should move to two factor authentication (2FA) for all their online activities. As with all these claims, it is worth looking at them in greater detail before we give up on of the single most cost effective methods for getting a certain level of assurance around someone&#8217;s identity.</p>
<p><a title="PayPal security boss: OBLITERATE passwords from THE PLANET" href="http://www.theregister.co.uk/2013/05/10/paypal_password_obliterate/" target="_blank">The Register reported</a> PayPal&#8217;s Chief Information Security Officer (CISO) Michael Barrett speaking as a representative of the Fast Identity Online (FIDO) Alliance, saying:</p>
<blockquote><p>Our [FIDO&#8217;s] intention is to really obliterate, within a certain number of years, both passwords and PINs and see the whole internet — including internally in enterprises — obliterate user IDs and passwords and PINs from the face of the planet.</p></blockquote>
<p>This is interesting and may appear to be a worthy goal, but we strongly disagree.</p>
<h1>Quick primer on passwords and how you should use them</h1>
<h2>What are passwords?</h2>
<p>First off, as a bit of a quick background, Passwords are one type of &#8220;Single Factor Authentication&#8221; and, often combined with a User ID (name, number, email address, whatever), are used to authenticate a user to a service. Other types of single factor would be fingerprints, retina scans, smart cards and the like. When you combine these factors you get &#8220;Multi factor Authentication&#8221; and this is often what most people talk about for replacing passwords.</p>
<p>Single factor authentication gives a basic level of assurance that the person is who they say they are and, in situations where this is insufficient you should add additional layers but bear in mind that this increases cost, complexity and poor installations are often worse than no authentication.</p>
<p>Generally, the more importance you place on knowing &#8220;who&#8221; the person you are interacting with, the more factors you should use, but you must use them properly.</p>
<p>Keep this in mind: <strong>If you implement your authentication badly, it doesn&#8217;t matter how many factors you use</strong>.</p>
<h2>Are passwords bad?</h2>
<p>The simple answer is &#8220;No.&#8221; Passwords are not inherently bad and the use of passwords (or more properly an ID &amp; Password) for authentication is perfectly reasonable for 99.999% of the situations where they are deployed. In our consulting work, we encounter more situations where people have used more factors than they need, then situations where they haven&#8217;t used enough.</p>
<h3>Are some passwords bad?</h3>
<p>Possibly. Various security &amp; IT related websites will regularly announce how &#8220;password&#8221; or &#8220;123456&#8221; are the most common passwords (such in <a title="Lame Passwords are still rife" href="http://www.theregister.co.uk/2012/12/03/lame_passwords_still_rife/" target="_blank">this article on the Register</a>), often implying this is why passwords are inherently broken and how users cant be trusted to select stronger passwords.</p>
<p>It is certainly true that using &#8220;common&#8221; or easily guessed passwords is a bad idea, and it can significantly increase the ease with which a malicious party (hacker, spy, jealous co-worker, whatever) can compromise your password, but this is normally going to be a weakness about how the authentication is implemented, rather than the actual password itself.</p>
<p>A &#8220;bad&#8221; password is really one which can be broken by an attacker and while this is a simple statement, the practicality is a bit more involved. If you have a login screen which allows three attempts before lock out, it is unlikely that the malicious user is going to get to &#8220;Monkey&#8221; (number 6 on the list) before the account has locked &#8211; and if &#8220;monkey&#8221; is different from &#8220;Monkey&#8221; in the system then you can be reasonably sure it wont fail when attacked.</p>
<p>Another issue with bad passwords is that we often look at them the wrong way round. When you see a password written down as &#8220;zaq12wsx&#8221;, it can be easy to realise this is obvious from the left hand side of a UK keyboard but unless the attacker has this knowledge they need to cycle through billions of possible other combinations.</p>
<h2>What makes a good password?</h2>
<p>With passwords two things are important &#8211; length and complexity. More of either is good and more of both is better. A long password will be difficult enough to compromise that most attackers will give up &#8211; as an example, a 15 character password made from single case letters will take about 53,000 years to crack (<a title="Password Recovery Speeds" href="http://www.lockdown.co.uk/?pg=combi" target="_blank">source</a>). If you make it complex (mix of upper and lower case, numbers and other keyboard characters) you can make it even harder.</p>
<p>Unfortunately, sometimes systems are badly designed and enforce shorter password sequences &#8211; this is where complexity becomes much more important and the use of random generators becomes worthwhile. Despite what you may think, humans are terrible at thinking up random passwords and even worse when it comes to recognising them.</p>
<p>Interestingly, once you move out of the most glaringly obvious passwords (e.g. &#8220;1234&#8221;) it doesn&#8217;t really matter if you use a random generator or not, as the attacker is still going to have to brute force the keyspace to work out what your password is. This means that to an attacker &#8220;easypwd1&#8221; is just as hard (or easy) to compromise as &#8220;t8yuas1e&#8221; -even though the first one looks like it should be trivial to crack.</p>
<p>Keep this in mind when you visit sites that offer to rate your password strength or when security professionals try to lecture you on how passwords are broken.</p>
<p>The important thing for a password is keyspace which is, as we said, driven by length and complexity, randomness is a distant second (third) in this unless your attacker has access to what ever process you use to invent your password.</p>
<h2>Can you give us an example of good passwords?</h2>
<p>Possibly, but remember that once they are printed on the internet, they are likely to end up in a dictionary list somewhere so, rather than search for a password you want to use, take the advice here and use it to construct your own.</p>
<figure style="width: 355px" class="wp-caption alignright"><a href="http://xkcd.com/936/"><img loading="lazy" decoding="async" class=" " title="Password Strength - xkcd.com" alt="Password Strength - xkcd.com" src="https://i0.wp.com/imgs.xkcd.com/comics/password_strength.png?resize=355%2C289" width="355" height="289" data-recalc-dims="1" /></a><figcaption class="wp-caption-text">Password Strength &#8211; xkcd.com</figcaption></figure>
<p>Good passwords are long and complex, but length is the most important so the oft-posted advice from <a title="Password Strength" href="http://xkcd.com/936/" target="_blank">XKCD.com</a> works here.</p>
<p>Dont fixate on trying to come up with impossible to remember strings of what you think are random letters and numbers &#8211; cracking tools will easily bypass most things you can invent.</p>
<p>Instead, use sentences with spaces and relevant capital letters. If you must (company password policy rules etc.  use symbols then you can add them or replace letters with them but remember to keep it long. As passwords go &#8220;This is my massively long password with little complexity&#8221; is harder to crack than &#8220;ExdYx4G53PmXSH&#8221; and you are only likely to remember one of them. Obviously if it is a service you have to authenticate to frequently, you might not want such a long password or you may need to improve your typing speed.</p>
<h3> Should you write passwords down?</h3>
<p>This may come as a shock but there is no automatic reason why you shouldn&#8217;t write your password down, but in a work environment you may have rules about what you can and can&#8217;t do.</p>
<p>It all boils down to what your threat assessment says &#8211; unfortunately when it comes to passwords, too many people fall into the trap of blindly following default rules no matter what the situation is.</p>
<p>For people who are responsible for developing password policy, ask yourself if your threat actors really do have the ability to read passwords written down on post-it notes next to your employees monitors. If your main threat is internet based script kiddies, then they are not going to find someone to come and work as a janitor in your offices so they can desk surf for passwords to your corporate facebook account. Seriously.</p>
<p>Every security decision you make must be based on a realistic threat and risk assessment otherwise it is pointless.</p>
<h1>So, what is the problem with Passwords?</h1>
<p>Passwords are far from perfect. If nothing else they are but a single factor of authentication   and that implies there is only a certain amount of trust you can ever give them. Passwords also have a long history so people tend to take them for granted and feel that because so much else has changed, it must mean passwords are &#8220;old fashioned&#8221; now.</p>
<p>This is combined with lots of high profile cracks of various databases and regular news items about how a whole directory of passwords has been dumped on <a title="Pastebin" href="http://pastebin.com/" target="_blank">pastebin</a> or similar sites.</p>
<h2>Is it all bad?</h2>
<p>No, far from it. Few, if any, corporate security breaches are the result of hackers directly compromising a user password (more on that in a bit). Unless you are a famous celebrity on twitter, the chances are no one is going to bother even trying to guess your password, let alone actually manage it.</p>
<h2>So how do the hacks happen?</h2>
<p>The overwhelming majority of hacks are the result of other techniques (such as <a title="SQL injection - OWASP" href="https://www.owasp.org/index.php/SQL_Injection" target="_blank">SQL injection</a>) which then allow the attackers to get a dump of the password file for offline attack. This is frequently what makes the news and is nothing at all to do with passwords being unfit for purpose.</p>
<p>There are still some instances where attackers can subvert a password implementation but, again, nearly every instance is actually the result of something being fundamentally wrong in how the passwords are used.</p>
<h2>How do you implement passwords badly?</h2>
<p>For the user, passwords should be easy. For the system owner / manager, passwords should also be easily implemented (they come built into pretty much every operating system in the world) but this is frequently where things go wrong.</p>
<p>If you have a system which requires user authentication, you need to make sure you implement it properly.</p>
<p>This means things like not allowing unlimited attempts, not sending passwords in plain text over the internet, not storing passwords in clear text and not allowing trivial bypasses of your authentication steps. All of these are easily avoidable, yet account for almost all the reasons why passwords (and user identities) fall into the hands of hackers.</p>
<p>None of this shows passwords themselves are a bad choice of single factor authentication, poor implementation will undermine any technology choice. If anything, poor implementation of other authentication methods (or multi-factor authentication) is going to be worse because it undermines a greater assumed trust.</p>
<h1>So, why are passwords in the news all the time?</h1>
<p>Normally, this happens when a product vendor decides to announce their new, all singing, all dancing smartcard, finger print reader or retinal scan device.</p>
<p>The recent Register article is a good example, FIDO is looking to produce an authentication device that they would like you to spend money purchasing and implementing so it is in their best interests to remind people about the &#8220;weaknesses&#8221; of passwords.</p>
<p>Unfortunately no device overcomes the fundamental problems with poor implementations, they just become expensive ways to create a device management nightmare.</p>
<p>Smartcard and fingerprint readers appear to be good, but at some stage your data has to be encrypted and sent to the server for authentication &#8211; if this is done badly, it opens a clear attack channel and gives the hacker a massively enhanced level of authentication on your network.</p>
<p>Devices (smartcards, scanners etc.  have to be managed so you can trust what is coming in from the other end. If a hacker has your device they can spend months working out how it encodes authentication data and then use this to attack you. Token devices that get lost have to be withdrawn and replaced. You even have to consider how the user authenticates to their device in the first place.</p>
<p>All of this creates a huge headache and is off putting for most (non-governmental) organisations, so it is understandable that there is a commercial need to play down the utility of passwords as a single authentication factor and if they can make customers scared of anyone who doesn&#8217;t use multi-factor authentication, all the better.</p>
<p>But, do you really want a product vendor to do your risk assessment for you? Should you listen to the vendor when they tell you what is, or isn&#8217;t, good for your network? I would suggest not, but you might have more money than you know what to do with.</p>
<p><strong>The bottom line is security must always be driven by a threat based risk assessment and you should never, ever, trust a product vendor to do this on your behalf.</strong></p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/05/passwords-are-not-bad-just-dont-trust-vendors/">Passwords are not bad, just dont trust vendors</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.halkynconsulting.co.uk/a/2013/05/passwords-are-not-bad-just-dont-trust-vendors/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">634</post-id>	</item>
		<item>
		<title>Security awareness training &#8211; value or not?</title>
		<link>http://www.halkynconsulting.co.uk/a/2013/04/security-awareness-training-value-or-not/</link>
		
		<dc:creator><![CDATA[Taz Wake - Halkyn Security]]></dc:creator>
		<pubDate>Sun, 21 Apr 2013 16:15:52 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Education and Awareness]]></category>
		<category><![CDATA[Awareness Training]]></category>
		<category><![CDATA[Business Protection]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<category><![CDATA[security education and awareness]]></category>
		<category><![CDATA[Security Training]]></category>
		<guid isPermaLink="false">http://www.halkynconsulting.co.uk/a/?p=606</guid>

					<description><![CDATA[<p>Last month (27 March), the security and cryptography expert Bruce Schneier posted an article on his blog about Security Awareness Training. Now, it should go without saying that Bruce Schneier is one of the leading lights in the IT Security world, he has written several very informative books which would always top our suggestions for [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/04/security-awareness-training-value-or-not/">Security awareness training &#8211; value or not?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_619" aria-describedby="caption-attachment-619" style="width: 300px" class="wp-caption alignright"><a title="Contact Halkyn Consulting for Security Training Advice" href="http://www.halkynconsulting.co.uk/security/contact-security-team"><img loading="lazy" decoding="async" data-attachment-id="619" data-permalink="http://www.halkynconsulting.co.uk/a/2013/04/security-awareness-training-value-or-not/security-awareness-training/" data-orig-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/04/security-awareness-training.jpg?fit=600%2C450&amp;ssl=1" data-orig-size="600,450" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;3.6&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot A300&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1080215364&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;5&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0.066666666666667&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Security Awareness Training" data-image-description="" data-image-caption="&lt;p&gt;Security awareness training drives value within your security programs.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/04/security-awareness-training.jpg?fit=300%2C225&amp;ssl=1" data-large-file="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/04/security-awareness-training.jpg?fit=600%2C450&amp;ssl=1" class="size-medium wp-image-619 " title="Security Training" alt="Security Awareness Training" src="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/04/security-awareness-training-300x225.jpg?resize=300%2C225" width="300" height="225" srcset="https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/04/security-awareness-training.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/www.halkynconsulting.co.uk/a/wp-content/uploads/2013/04/security-awareness-training.jpg?w=600&amp;ssl=1 600w" sizes="auto, (max-width: 300px) 100vw, 300px" data-recalc-dims="1" /></a><figcaption id="caption-attachment-619" class="wp-caption-text">Security awareness training drives value within your security programs.</figcaption></figure>
<p>Last month (27 March), the security and cryptography expert Bruce Schneier posted an article on his blog about <a title="Bruce Schneier Article on training" href="http://www.schneier.com/blog/archives/2013/03/security_awaren_1.html" target="_blank">Security Awareness Training</a>. Now, it should go without saying that Bruce Schneier is one of the leading lights in the IT Security world, he has written several very informative books which would always top our suggestions for recommended reading lists and, most of the time, what he says about security is completely spot on.</p>
<p>However, this time it seems he has made a significant mistake and it is largely driven by his focus on the IT part of <em>information security</em>.</p>
<p>In the article, Bruce writes:</p>
<blockquote><p>I personally believe that training users in security is generally a waste of time, and that the money can be spent better elsewhere. Moreover, I believe that our industry&#8217;s focus on training serves to obscure greater failings in security design.</p></blockquote>
<p>The two statements here aren&#8217;t really as linked as Bruce makes out.</p>
<p>It is almost certainly true that a lot of security training is worthless and driven simply by external compliance requirements and it is true that focus on training can be used to avoid having to implement good security practices, but once we move away from a very narrow sphere of security, for all practical purposes this breaks down.</p>
<p>The result of this is that security awareness training is currently one of the most cost effective methods of improving your security.</p>
<p>It should always be the primary goal of any security implementation to ensure that security exists even if the end user is clueless, but unfortunately user activity is almost always required to support and supplement the built in security controls and this is where security awareness training becomes paramount.</p>
<p>Bruce address his main concerns to those who think security awareness training is good (which is why it seems appropriate to address it in a post here), saying: [Emphasis added]</p>
<blockquote><p>To those who think that training users in security is a good idea, I want to ask: &#8220;Have you ever met an actual user?&#8221; <strong>They&#8217;re not experts, and we can&#8217;t expect them to become experts</strong>. The threats change constantly, the likelihood of failure is low, and there is enough complexity that it&#8217;s hard for people to understand how to connect their behavior to eventual outcomes. So they turn to folk remedies that, while simple, don&#8217;t really address the threats.</p></blockquote>
<p>The problem seems to be less driven by the value of &#8220;security awareness training&#8221; but more by what Bruce expects the outcome of this training to be.</p>
<p>No one in their right mind expects a security awareness training program to turn people into security experts. No one. This is a strawman which undermines what the real value of security awareness training actually is &#8211; and that is employees who are more alert about security risks and more able to help you protect your business, its assets and themselves from a variety of threats.</p>
<p>Security awareness training does not replace the need to have a competent, skilled, motivated and professional security team. It does not remove the need to have properly implemented security controls. It doesn&#8217;t mean you can blame your employees for every breach. It doesn&#8217;t even mean that you can sit back and assume you will never experience a security breach.</p>
<p><strong>Security awareness training does mean, however, that you have taken the proper steps to help ensure your employees are part of your overall security posture.</strong></p>
<p>Security is about much more than protecting IT assets, it is about much more than ensuring your employees don&#8217;t click on dodgy facebook links and it is about much more than making sure they aren&#8217;t careless with their account credentials.</p>
<p>If your awareness program only looks at this, or if your awareness program is trying to create IT Security experts in one session a year, then you are getting it wrong. You are missing a major point with how to best use the time and how to best engage your employees into your security process.</p>
<h2>Good Security Awareness Training</h2>
<p>Your security awareness training needs to be driving three main themes to your employees:</p>
<ol>
<li><span style="line-height: 16px;"><strong>Why security is important to your business</strong>. You need to make your employees understand their responsibilities and how their actions are important to the bottom line (their jobs).</span></li>
<li><strong>How security is implemented in your business</strong>. What alarms do you have? What are the rules for lone workers? Where are phones allowed? Are employee owned devices allowed etc. This is the meat of the training and is how you make your employees aware of the security around them. (It is awareness training after all)</li>
<li><strong>What do your employees have to do</strong>. Once they know the why and how, it is time to explain to your employees what is expected of them when they are going about their business: How do they summon help? How do they report a breach? What is the process for locking the office at night? How do they get access outside normal working hours? and so on.</li>
</ol>
<p>None of this will turn them into experts, but equally it is far from a waste of your resources. Failing to provide security training means &#8211; in the current world at least &#8211; that <strong>you will spend more on security controls and / or suffer more security breaches</strong>.</p>
<h2>Security training &#8211; do&#8217;s and don&#8217;t&#8217;s</h2>
<p>As Bruce Schneier says, it would be great if we could engineer out the need for your employees to play a part but the reality is that the spectrum of security risks is so wide, so complicated and so changeable, that this is unlikely to ever happen.</p>
<p>Don&#8217;t fixate on the computer user part of your security, don&#8217;t believe that security awareness training is wasted but also don&#8217;t think of it as a magic bullet.</p>
<p><strong>Do provide good quality, appropriate and effective security awareness training for your employees</strong>.</p>
<p>The post <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a/2013/04/security-awareness-training-value-or-not/">Security awareness training &#8211; value or not?</a> appeared first on <a rel="nofollow" href="http://www.halkynconsulting.co.uk/a">Halkyn Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">606</post-id>	</item>
	</channel>
</rss>
