<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Network Security Archives - My TechDecisions</title>
	<atom:link href="https://mytechdecisions.com/category/network-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://mytechdecisions.com/category/network-security/</link>
	<description>The end user’s first and last stop for making technology decisions</description>
	<lastBuildDate>Mon, 02 Feb 2026 01:50:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://mytechdecisions.com/wp-content/uploads/2017/03/cropped-TD-icon1-1-32x32.png</url>
	<title>Network Security Archives - My TechDecisions</title>
	<link>https://mytechdecisions.com/category/network-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ASCII Edge 2026 Unveils Speaker Lineup for MSP-Focused Conference Series</title>
		<link>https://mytechdecisions.com/news-1/ascii-edge-2026-conference-dates-speaker-lineup-msp-focused-conference-series/</link>
					<comments>https://mytechdecisions.com/news-1/ascii-edge-2026-conference-dates-speaker-lineup-msp-focused-conference-series/#respond</comments>
		
		<dc:creator><![CDATA[TD Staff]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 01:44:04 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[ASCII Edge 2026]]></category>
		<category><![CDATA[Carolyn April]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[James Gadomski]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[The ASCII Group]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=51486</guid>

					<description><![CDATA[<p>Editor’s Note: Another version of this article originally appeared on our sister-site Commercial Integrator on January 6, 2026. It has since been updated for My TechDecisions’ audience. The ASCII Group, the vendor-neutral community for managed service providers (MSPs) in North America, has unveiled the speaker lineup for its highly anticipated ASCII Edge 2026 conference series. This multi-city event [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/news-1/ascii-edge-2026-conference-dates-speaker-lineup-msp-focused-conference-series/">ASCII Edge 2026 Unveils Speaker Lineup for MSP-Focused Conference Series</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Editor’s Note: <span class="cf0">Another version of this article originally appeared on our sister-site </span></em><a href="https://www.commercialintegrator.com/news/epiphan-video-ec20-ptz-camera/145801/" target="_blank" rel="noopener"><span class="cf0">Commercial Integrator </span></a><em><span class="cf0">on January 6, 2026. It has since been updated for My TechDecisions’ audience.</span></em></p>
<p><a href="https://www.ascii.com/" target="_blank" rel="noopener">The ASCII Group,</a> the vendor-neutral community for managed service providers (MSPs) in North America, has unveiled the speaker lineup for its highly anticipated ASCII Edge 2026 conference series. This multi-city event is designed to empower MSP business owners through peer-driven education, hands-on workshops and community engagement.</p>
<p>Scheduled to take place in eight cities across the United States and Canada, ASCII Edge 2026 aims to foster in-person learning and candid discussions among MSPs. The series reflects The ASCII Group’s decades-long commitment to supporting the MSP community with practical insights and real-world expertise.</p>
<p>The 2026 conference will feature keynote addresses from J<a href="https://www.history.com/shows/the-bermuda-triangle-into-cursed-waters/cast/jimmy-gadomski" target="_blank" rel="noopener">ames Gadomski, a shipwreck treasure hunter and History Channel personality</a>, and <a href="https://www.linkedin.com/in/carolyn-april-90894233/" target="_blank" rel="noopener">Carolyn April, vice president of research and market intelligence at GTIA</a>. In addition to these high-profile speakers, the event will include sessions led by industry experts and experienced ASCII member MSPs. Notable speakers include Emily Tell of IdeaTilt, Wayne Hunter of Avtek Solutions, and Joe Rojas of Start Grow Manage, who will cover topics such as AI adoption, revenue strategies, and market differentiation.</p>
<p>The program also includes interactive workshops and peer discussions. One highlight is a Day 1 workshop presented by <a href="https://www.kaseya.com/" target="_blank" rel="noopener">Kaseya</a>, which will focus on helping MSPs leverage underutilized marketing development funds to drive measurable pipeline results. Additional workshops are expected to be announced in the coming months.</p>
<p>“ASCII Edge has always been about bringing the right people into the room,” said Jerry Koutavas, CEO of The ASCII Group. “When MSPs come together to share openly and learn from one another, they gain clarity and confidence in the decisions they’re making. That’s what ASCII Edge is designed to deliver.”</p>
<p>For more information about ASCII Edge 2026, including event details and registration, visit <a href="https://events.ascii.com/" target="_blank" rel="noopener">events.ascii.com.</a></p>
<p>The post <a href="https://mytechdecisions.com/news-1/ascii-edge-2026-conference-dates-speaker-lineup-msp-focused-conference-series/">ASCII Edge 2026 Unveils Speaker Lineup for MSP-Focused Conference Series</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/news-1/ascii-edge-2026-conference-dates-speaker-lineup-msp-focused-conference-series/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Universities Face Rising IoT Security Risks Amid Device Growth</title>
		<link>https://mytechdecisions.com/news-1/universities-face-rising-iot-security-risks-amid-device-growth/</link>
					<comments>https://mytechdecisions.com/news-1/universities-face-rising-iot-security-risks-amid-device-growth/#respond</comments>
		
		<dc:creator><![CDATA[Shankar Somasundaram]]></dc:creator>
		<pubDate>Mon, 04 Aug 2025 14:29:17 +0000</pubDate>
				<category><![CDATA[Facility]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Campus Safety]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=51436</guid>

					<description><![CDATA[<p>Note: The views expressed by guest bloggers and contributors are those of the authors and do not necessarily represent the views of, and should not be attributed to, My TechDecisions. Universities are filling up with network-connected devices. Smart locks manage building access. HVAC systems run on automated controls. Cameras stream to command centers. Vending machines, printers, thermostats, [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/news-1/universities-face-rising-iot-security-risks-amid-device-growth/">Universities Face Rising IoT Security Risks Amid Device Growth</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Note: </em><em>The views expressed by guest bloggers and contributors are those of the authors and do not necessarily represent the views of, and should not be attributed to, My TechDecisions.</em></strong></p>
<p>Universities are filling up with network-connected devices. Smart locks manage building access. HVAC systems run on automated controls. Cameras stream to command centers. Vending machines, printers, thermostats, research tools and classroom displays all connect to the network. The Internet of Things (<a href="/tag/IOT">IoT</a>) is everywhere.</p>
<p>These devices are often invisible to most of campus life, quietly making things run more smoothly. But for IT and security teams, they represent a rapidly growing liability. Each device is a potential entry point for an attacker looking for a path of least resistance. And too often, universities don’t even know what their IoT landscape actually looks like.</p>
<h2>The Expanding IoT Footprint in Higher Ed</h2>
<p>A modern institution of higher education operates more like a small city than a school. Hundreds of buildings may be tied into the same digital infrastructure, and each department brings its own tools and purchase preferences. Devices arrive from dozens of manufacturers and run software that is rarely standardized. The result is an unmanaged sprawl of smart systems, all connected and all potentially vulnerable.</p>
<p>The first security problem is that many, if not most, institutions still lack a complete inventory of their connected devices. Traditional discovery strategies often miss IoT assets because they communicate over obscure or proprietary protocols. Even when devices <em>are</em> visible, IT teams often don’t know what software they’re running or whether they’ve received recent updates.</p>
<p>The risks become clearer when you consider what these devices actually do. Connected door locks and building systems affect physical security, lab equipment and research infrastructure support time-sensitive or grant-funded work, and classroom technology and signage shape the student experience. Each of these categories carries risk not just to data, but to operations.</p>
<h2>Digital Breaches Can Have Physical Security Consequences</h2>
<p>Security breaches on campus no longer stop at stolen data, but have the potential to disrupt real-world systems. In a worst-case scenario, that puts people at risk. A compromised building automation system might allow an attacker to disable alarms or unlock secured areas. Access to HVAC systems could shut down ventilation in research facilities or residence halls. Camera systems might be hijacked to track movement or manipulate surveillance records.</p>
<p>These kinds of intrusions were once theoretical. Today, they are plausible and increasingly documented across sectors.</p>
<p>Universities are particularly exposed because they tend to maintain more open and flexible networks than traditional corporate environments. Academic freedom often requires fewer restrictions on network access, and many devices end up getting deployed without central IT involvement. Security policies may vary between departments or not exist at all for operational technologies.</p>
<h2>Traditional Campus Security Strategies Miss the Mark</h2>
<p>Most campus security stacks are built around endpoints like laptops and servers, but IoT devices are fundamentally different. They typically run stripped-down operating systems that don’t support endpoint agents. Many come with hardcoded credentials that users cannot change. Firmware updates are inconsistent or unavailable, and some devices lack even the most basic protections (like encrypted traffic or secure boot processes).</p>
<p>Conventional scanners often fail to detect them. Network monitoring tools might miss unusual traffic patterns because the devices operate outside expected behavior profiles. The gaps are large enough that attackers can use IoT devices as hidden footholds inside the network without immediate detection.</p>
<h2>Device Visibility, Prioritization and Monitoring: A Smarter Approach to IoT Risk</h2>
<p>To improve, universities must<em> start with visibility.</em> You can’t secure what you can’t see. Discovery mechanisms designed for IoT can uncover a full inventory of connected devices, including model numbers, firmware versions, and communication patterns. The strategy must rely on behavioral analysis, not just IP scans, to surface the devices that traditional systems miss.</p>
<p>Once visibility is established, prioritization becomes key. Not all devices present the same level of threat. A vulnerable light sensor behind a firewall might be low risk, while a connected access control panel exposed to the open internet is far more urgent. Universities should consider factors like how devices are segmented on the network, what privileges they have, and what kinds of traffic they generate.</p>
<p>Real-time behavioral monitoring adds an essential layer. IoT devices tend to behave predictably. A thermostat shouldn’t start making DNS requests or communicating with external command and control servers. When anomalies occur, they need to be flagged and acted on immediately.</p>
<h2>From Detection to Containment</h2>
<p>Once a threat is identified, containment must happen quickly. The longer a compromised device remains online, the more time an attacker has to move laterally. Automated isolation, packet capture, and investigation workflows allow campus teams to respond before an incident spreads.</p>
<p>Speed matters because the stakes are growing, and campus operations depend on uptime. Building access, lab integrity, and student services all rely on digital infrastructure working as expected, so a single compromised camera or lock can cascade into a serious operational failure.</p>
<h2>Start Now to Get Ahead</h2>
<p>Universities can act now without overhauling everything at once. The most important step is to begin discovering what’s on the network and where the gaps are. Prioritize the systems that support critical operations. Look at who owns which devices and what policies govern them. Start separating operational technology from academic and administrative networks wherever possible.</p>
<p>From there, teams can build a roadmap. IoT procurement processes should include baseline security requirements for all new devices. Update schedules should be set and tracked, and security policies should reflect the fact that many devices on campus cannot be patched or monitored like traditional endpoints.</p>
<p>Cultural change also plays a role and, in some ways, can be the most challenging factor. But ideally, facilities, IT, and academic departments will treat IoT security as a shared responsibility. Open communication and shared tooling help build consistent coverage across campus.</p>
<h2>A Critical Moment for Higher Education</h2>
<p>IoT devices will continue to scale, but universities have an opportunity to get ahead of the threat. With visibility, context, and faster responses, they can turn a chaotic sprawl of devices into a manageable and secure foundation. The longer they wait, the more difficult it will be to close the gaps.</p>
<p><em><span class="cf0">Another version of this article originally appeared on our sister-site <a href="https://www.campussafetymagazine.com/insights/iot-security-your-next-breach-could-start-with-your-thermostat/172525/" target="_blank" rel="noopener">CampusSafety</a> on August 4, 2025. It has since been updated for My TechDecisions&#8217; audience.</span></em></p>
<hr />
<p><em>Shankar Somasundaram is the CEO of <a href="https://asimily.com/" target="_blank" rel="noopener">Asimily</a>.</em></p>
<p>&nbsp;</p>
<p><!--StartFragment --></p>
<p><!--EndFragment --></p>
<p>The post <a href="https://mytechdecisions.com/news-1/universities-face-rising-iot-security-risks-amid-device-growth/">Universities Face Rising IoT Security Risks Amid Device Growth</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/news-1/universities-face-rising-iot-security-risks-amid-device-growth/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IT Leaders at Midsize Companies Are Rethinking Their Cloud Mix</title>
		<link>https://mytechdecisions.com/it-infrastructure/it-leaders-at-midsize-companies-are-rethinking-their-cloud-mix/</link>
					<comments>https://mytechdecisions.com/it-infrastructure/it-leaders-at-midsize-companies-are-rethinking-their-cloud-mix/#respond</comments>
		
		<dc:creator><![CDATA[Kamal Srinivasan]]></dc:creator>
		<pubDate>Sun, 20 Jul 2025 18:53:00 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Unified Communications]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[DaaS]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Hybrid Work]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[remote]]></category>
		<category><![CDATA[SaaS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VDI]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[web browser isolation]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=51432</guid>

					<description><![CDATA[<p>With the initial launch of the public cloud around 20 years ago, the industry ushered in a new era of scalable, on-demand &#8216;as-a-service&#8217; models. Fast forward to 2025, and the public cloud is far from retreating – it is now playing a central role in more complex, resilient IT strategies. But how companies are using [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/it-infrastructure/it-leaders-at-midsize-companies-are-rethinking-their-cloud-mix/">IT Leaders at Midsize Companies Are Rethinking Their Cloud Mix</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With the initial launch of the public cloud around 20 years ago, the industry ushered in a new era of scalable, on-demand &#8216;as-a-service&#8217; models. Fast forward to 2025, and the public cloud is far from retreating – it is now playing a central role in more complex, resilient IT strategies. But how companies are using the cloud is evolving. New <a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.parallels.com%2Fproducts%2Fras%2Fall-resources%2Freports%2Fcloud-survey-2025%2Freport%2F&amp;data=05%7C02%7Calyssa.borelli%40emeraldx.com%7Cf4ccdfb0a80e4c4e5cae08ddc60ab4db%7C661c8d9be19e4330b41275dce2d26154%7C0%7C0%7C638884471494618547%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=CYb5fwomfLj097%2Be7waKA26WiD81iwEkSgWThS6tvZ0%3D&amp;reserved=0">survey data from Parallels</a> reveals that IT professionals at midsize companies are not abandoning their cloud strategies, they’re further optimizing them – embracing hybrid and multi-cloud models that examine flexibility, performance and security. They are reexamining the cost and benefits of SaaS, VDI, DaaS and other cloud solutions.</p>
<p>For midsize companies, this shift reflects a more strategic, value-conscious approach to the cloud. They often lack the expansive budgets or large IT teams of enterprise organizations, so their cloud decisions are being made with tighter cost controls, simplified management and stronger ROI in mind. Cloud choices are more intentional – and often more innovative – as these businesses try to balance agility and security with operational efficiency.</p>
<p>This mindset is fueling a growing interest in hybrid and multi-cloud environments, in fact, 47% of the respondents are now operating in multi-cloud environments, while 35% are currently using hybrid cloud setups – with another 25% planning to adopt a hybrid cloud model soon – clear signs that midsize companies are diversifying their cloud strategies and getting smarter about how and where they deploy workloads, public cloud included.</p>
<h2><strong>Drivers of Change: Cost, Security and Complexity</strong></h2>
<p>Several powerful forces are shaping this shift, including cost efficiency, close examination of current SaaS, DaaS and VDI engagements, and heightened awareness of cyberattacks and vulnerabilities. For mid-market companies, in particular, budget management and risk mitigation are priorities. That’s why many are combining public cloud with on-premises infrastructure to extend its benefits while controlling costs and exposure.</p>
<p>Larger enterprises have similar drivers but have the advantage of more resources to devote to cyber defense and the increasing complexity of application workloads. These organizations are investing further in public cloud scalability while augmenting it with hybrid options for data control, compliance, or latency-sensitive workloads.</p>
<h2><strong>DaaS and VDI: Under Review, Not Rejected</strong></h2>
<p>Remote work has exponentially driven up the use of the cloud, and use of VDI and workload delivery systems like DaaS. However, IT leaders are now taking a hard look at how they deliver virtual desktops, not whether they belong in the cloud. According to survey data, IT flags “too many resources,&#8221; “lack of centralized control,&#8221; and “too expensive” as the top DaaS/VDI issues. Not far behind are concerns with performance and reliability.</p>
<p>These findings signal the need for better DaaS/VDI implementations and more flexible vendor agreements.  Companies, particularly those in the budget-conscious mid-market, are looking for shorter-term agreements, scalable pricing, and improved service levels to make DaaS and VDI work within their broader cloud strategy.</p>
<h2><strong>Securing the Hybrid Remote Environment</strong></h2>
<p>Security remains top of mind, with 35% of respondents from midsize companies reporting their company had experienced a security breach in the last year. Fear of <a href="/tag/malware">malware</a> and <a href="/tag/ransomware">ransomware attacks</a> and cloud vulnerabilities are the top two concerns. Midsize companies are willing to invest more in security: 90% are planning to significantly or moderately increase the budget this year. But this investment isn’t a signal that hybrid environments are inherently insecure, it’s a recognition that endpoint and browser-based threats are the new battlegrounds, especially as remote workers desire fast, no-fuss access to whatever data they need, on any device.</p>
<p>SaaS has been the go-to-choice for application delivery to remote workers. Since so many workers use SaaS applications, it is fertile ground for a security breach. IT professionals, as a result, are starting to look at browser isolation solutions to basically separate and lock down a worker’s browser session in the cloud. It prevents a cybercriminal from accessing the data, thereby containing any threat. If the web content a worker is viewing might be destructive, an isolation tool will also stop any possible threat to the larger network. Currently 40% of respondents at midsize companies have web browser isolation, still relying predominantly on traditional tools with firewalls, VPNs and anti-virus software, the top deployed threat defense solutions. Cloud-based isolation solutions themselves reinforce the continued relevance of the public cloud as a defense layer, not just a workload host.</p>
<p>Besides web browser isolation, which is definitely gaining traction, companies recognize the need for improved monitoring of device and application use that can signal a threat before it becomes a breach event. Mindful of budget and staff limitations, companies can look for remote application delivery solutions that support multiple cloud providers and can also integrate with monitoring and remediation tools.</p>
<h2><strong>Looking Ahead: Public Cloud at the Core of Hybrid Success</strong></h2>
<p>What the survey data ultimately show is that the public cloud is actually maturing. Companies, notably the mid-market, are embracing hybrid and multi-cloud setups. Public cloud remains at the heart of scalable IT strategy.</p>
<p>What’s changing is how it is combined with on-premises infrastructure, edge computing, and private cloud services to meet the unique needs of different workloads, users and security profiles.</p>
<p>With ease of platform integration, flexibility in workload placement, and improved security tooling, hybrid cloud strategies are enabling companies to get the best of both worlds, while keeping the public cloud as a vital, growing piece of their puzzle.</p>
<hr />
<p style="margin-top: 0in;"><i><span style="color: black;">Kamal Srinivasan is SVP of product and program management at </span></i><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.parallels.com%2F%3Futm_source%3Dvktr.com&amp;data=05%7C02%7Calyssa.borelli%40emeraldx.com%7Cf4ccdfb0a80e4c4e5cae08ddc60ab4db%7C661c8d9be19e4330b41275dce2d26154%7C0%7C0%7C638884471494634283%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=EEd0aXKK%2Bmd6F4B7DJpzxV5umbn%2FDdfdb1tAkxbcaBk%3D&amp;reserved=0" target="_blank" rel="noopener"><i><span style="color: #0f9ed5;">Parallels</span></i></a><i><span style="color: black;">, a part of the Alludo portfolio. With more than two decades of experience in the field, Srinivasan is known for building robust enterprise technology platforms. He previously served as the head of product at Blink Health, contributed to Microsoft&#8217;s Azure team and led incubator efforts to build drones and develop machine learning on satellite imagery for its infrastructure security business and was a cloud product lead at Oracle. </span></i><i><span style="color: black;">He holds a Ph.D. in computer engineering from the University of Wisconsin-Madison.</span></i></p>
<p>The post <a href="https://mytechdecisions.com/it-infrastructure/it-leaders-at-midsize-companies-are-rethinking-their-cloud-mix/">IT Leaders at Midsize Companies Are Rethinking Their Cloud Mix</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/it-infrastructure/it-leaders-at-midsize-companies-are-rethinking-their-cloud-mix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CrowdStrike Cyber Armageddon: How Do Firms Now Build Resilience?</title>
		<link>https://mytechdecisions.com/it-infrastructure/crowdstrike-cyber-armageddon-how-do-firms-now-build-resilience/</link>
					<comments>https://mytechdecisions.com/it-infrastructure/crowdstrike-cyber-armageddon-how-do-firms-now-build-resilience/#respond</comments>
		
		<dc:creator><![CDATA[Andersen Cheng]]></dc:creator>
		<pubDate>Fri, 13 Sep 2024 19:18:47 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[Crowdstrike outage]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=51015</guid>

					<description><![CDATA[<p>Towards the end of July, a botched software update at cyber security firm CrowdStrike caused chaos around the world, crippling IT systems that we all relied on. The disruption spanned across sectors; flights were grounded, patients were unable to contact healthcare services and customers were unable to make card payments. The event illustrated two things: [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/it-infrastructure/crowdstrike-cyber-armageddon-how-do-firms-now-build-resilience/">CrowdStrike Cyber Armageddon: How Do Firms Now Build Resilience?</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Towards the end of July, a botched software update at cyber security firm CrowdStrike caused chaos around the world, crippling IT systems that we all relied on. The disruption spanned across sectors; flights were grounded, patients were unable to contact healthcare services and customers were unable to make card payments.</p>
<p>The event illustrated two things:</p>
<ol>
<li>how deep the roots of digitization have become globally;</li>
<li>the fragility of the global technology ecosystem, exacerbated by an overreliance on a select number of cloud providers.</li>
</ol>
<p>This is a wake-up call for us all. Although not a cyber attack, imagine if a nation state was able to find and exploit such vulnerabilities through a coordinated and sustained attack?</p>
<p>It’s given us a glimpse into what cyber armageddon could look like; how should we respond?</p>
<h2><strong>The Interconnectivity Trade-Off </strong></h2>
<p>Dubbed “the largest IT outage in history,&#8221; the global technology outage was <a href="https://www.theguardian.com/technology/article/2024/jul/19/what-is-crowdstrike-microsoft-windows-outage">caused</a> when an update to one of CrowdStrike’s pieces of software, Falcon Sensor, malfunctioned, paralyzing computers running Windows and resulting in widespread tech failures around the world.</p>
<p>While not the cause, the severity of the impact was only made possible as a result of the increasingly interconnected systems and software that have become so entrenched in our digital infrastructure. The effects were also inflamed by the global reliance on a select number of cloud providers – with Windows devices the worst impacted, many initially thought it was solely a Microsoft issue.</p>
<p>This dependency has brought with it many benefits – global connectivity, efficiency and innovation. But it’s a simple fact that it leaves us all more vulnerable. If a major cloud provider goes down or is impacted, the world grinds to a halt.</p>
<p>For many of us in the business of IT and security, questions are starting to be asked about the trade-off: can we find a way to remain connected, but become more resilient and lessen the impact of events like these?</p>
<p>The initial discussion has been around reassessing cloud strategies, such as avoiding the automatic updating of patches. Some may also be thinking about a multi-cloud approach, where more than one cloud provider is used to ensure continuity if one goes down – “Microsoft is down? That’s ok, we can just switch to Google.” However, despite being a relatively simple undertaking, it would be an expensive luxury that’s out of reach for most.</p>
<h2><strong>Build Something from the Ground Up </strong></h2>
<p>Rather than trying to patch up ever more complex and interdependent legacy architecture, company boards should use this opportunity to explore shifting their legacy digital architecture to something built from the ground up and future proof.</p>
<p>That is, firms should be viewing this as an opportunity to run an entirely new, low-cost, digital infrastructure in parallel, which is independent of their primary cloud provider and legacy applications. The idea is that in the case of a major systems outage, organizations would have the ability to seamlessly switch over to this secondary infrastructure without manual intervention, allowing them to perform critical functions throughout the crisis. This infrastructure would be backed up with essential data, with advanced security protocols to protect against cyber threats. As a minimum, this provides an out-of-band communications channel for the board and senior management to tell staff and clients what to do and ensures they are not swamped by fraudulent scams after the Crowdstrike outage.</p>
<p>Imagine an airline affected by a major software outage. Having an independent backup system would allow them to continue day-to-day operations such as booking passengers, handling ticket changes and scheduling flights. Instead of relying on extensive manual interventions to recover the primary system, backup protocols would prevent disruption while the main systems are brought back online.</p>
<p>Any solution developed in this way needs to be quick-to-implement and must be able to initiate a contingency command and control process, handle basic tasks and keep the company running in the event of a major attack or outage. Our mission critical clients are beginning to build these fail-over systems that can handle basic tasks and keep the company running in the event of a major attack or outage. In some instances, these shadow systems operate entirely through a mobile messaging platform.</p>
<h2><strong>Continuity and Resilience are Possible </strong></h2>
<p>As businesses now begin to revisit how they can ensure a return to business as usual as quickly as possible when disaster strikes, they should not be clouded by all the technical terms and confusing offerings, and just focus on three simple and fundamental principles when assessing their current and future risks: completeness, accuracy and validity.</p>
<p>Shifting legacy digital architecture towards something that is built from the ground up ticks all these boxes.  Moreover, it addresses the inter-connectivity, inter-dependency and relatedness and reputational risks that we all face in the digital world today. This may just be the difference between surviving the next global meltdown or being left in its wake.</p>
<hr />
<p><em>Andersen Cheng is the founder and chairman of <a href="https://post-quantum.com/index.html" target="_blank" rel="noopener">Post-Quantum</a>.</em></p>
<p>The post <a href="https://mytechdecisions.com/it-infrastructure/crowdstrike-cyber-armageddon-how-do-firms-now-build-resilience/">CrowdStrike Cyber Armageddon: How Do Firms Now Build Resilience?</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/it-infrastructure/crowdstrike-cyber-armageddon-how-do-firms-now-build-resilience/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>7 Layers of DDoS Attacks and How To Prevent Them</title>
		<link>https://mytechdecisions.com/network-security/7-layers-of-ddos-attacks-and-how-to-prevent-them/</link>
					<comments>https://mytechdecisions.com/network-security/7-layers-of-ddos-attacks-and-how-to-prevent-them/#respond</comments>
		
		<dc:creator><![CDATA[Mia Turlington]]></dc:creator>
		<pubDate>Thu, 28 Dec 2023 14:50:21 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[DDoS Attacks]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=47998</guid>

					<description><![CDATA[<p>As businesses grow to gain traction and revenue from the Internet, the increasing reliance is an easy target for Distributed Denial of Service (DDoS) attacks. Like any new venture, risks are an undeniable part that comes with it. For eCommerce businesses, the main risk is DDoS attacks. Known as a dangerous and malicious attack to [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/7-layers-of-ddos-attacks-and-how-to-prevent-them/">7 Layers of DDoS Attacks and How To Prevent Them</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As businesses grow to gain traction and revenue from the Internet, the increasing reliance is an easy target for Distributed Denial of Service (<a href="https://mytechdecisions.com/tag/DDoS/">DDoS</a>) attacks. Like any new venture, risks are an undeniable part that comes with it.</p>
<p>For eCommerce businesses, the main risk is <a href="https://upcity.com/experts/what-is-a-ddos-attack/" target="_blank" rel="noopener">DDoS attacks</a>. Known as a dangerous and malicious attack to destabilize and halt services or products, its biggest drawback is disrupting operations. By making products or services utterly inaccessible to consumers, DDoS attacks effectively eliminate any incoming profits.</p>
<p>The key lies in understanding how it works to protect your business and keep out these intrusions. In this article, we will review the different layers and ways to prevent them.</p>
<h2>7 Layers of DDoS Attacks</h2>
<h4>1. Physical Layer Attacks</h4>
<p>These DDoS attacks target the network or infrastructure of a business. By using a range of techniques: overloading network switches, jamming wireless signals, or physically cutting cables, attackers can cut income streams if they can access a business’s location. The difficulty in preventing it lies in how unpredictable people can be. One of the best ways to combat this is by installing surveillance that regularly monitors and alerts owners of suspicious activities. This can mitigate risks, especially if alerts go directly to the police.</p>
<h4>2. Data Link Layer Attacks</h4>
<p>Unlike physical layer attacks, data link attacks target how network devices communicate. With a MAC (Media Access Control) address, attackers can trick digital devices into communicating with a fake network device. In other cases, it is also common to use STP (Spanning Tree Protocol) attacks to manipulate how the network switches forward traffic. The only way to manage this is by ensuring businesses have a foolproof authentication mechanism, including MAC filtering that drives smooth configuration.</p>
<h4>3. Network Layer Attacks</h4>
<p>Network layer attacks work by affecting data that is transmitted across the Internet. Through IP (Internet Protocol) fragmentation attacks, data is sent in small batches to overwhelm network devices. Or, attackers can engage in ICMP (Internet Control Message Protocol) floods where a target is drowned with ICMP messages. To prevent such occurrences, firewalls and intrusion detection systems should be utilized to block or flag uncommon network traffic.</p>
<h4>4. Transport Layer Attacks</h4>
<p>As the name suggests, transport layer attacks target how data is transmitted between network devices. By engaging in techniques such as <a href="https://www.fortinet.com/resources/cyberglossary/tcp-ip" target="_blank" rel="noopener">TCP (Transmission Control Protocol)</a> SYN floods, attackers send a high volume of TCP SYN requests to a target. On the other hand, they can also use UDP (User Datagram Protocol) floods, where a high volume of UDP packets is sent to the target. Hence, businesses need to implement load balancers and rate limiters to reduce and prevent possible transport layer attacks to halt a high volume of traffic from overwhelming their network devices.</p>
<h4>5. Session Layer Attacks</h4>
<p>Not limited to network devices, DDoS attacks can also occur in applications by targeting how they communicate. Using techniques such as SSL (Secure Sockets Layer) attacks, attackers exploit vulnerabilities in SSL/TLS (Transport Layer Security) protocols to intercept data, or they can drown a target with SIP (Session Initiation Protocol) messages. The easiest way to prevent session layer attacks is by ensuring applications are securely configured with updated SSL/TLS certificates.</p>
<h4>6. Presentation Layer Attacks</h4>
<p>As the name implies, presentation layer attacks work by attacking how information is presented to users. Through techniques such as XML (Extensible Markup Language) attacks, attackers either exploit vulnerabilities in XML parsers to execute malicious code or implement XSS (Cross-Site Scripting) attacks, where they inject malicious scripts into web pages. Firms can avoid presentation layer attacks with secure coding practices and frequent vulnerability scans.</p>
<h4>7. Application Layer Attacks</h4>
<p>For the application layer attacks, its emphasis lies in attacking the way applications function. Using techniques such as SQL (Structured Query Language) injection attacks, attackers inject malicious SQL queries into a target application to gain unauthorized access to data. In other cases, they can also use RFI (Remote File Inclusion) attacks to exploit vulnerabilities in web applications to execute malicious code. Unlike the other solutions, you can educate employees to prevent these attacks. You can eradicate this possibility by focusing on coding practices, phishing awareness, and password hygiene.</p>
<h4>DDos Protection</h4>
<p><a href="https://fastnetmon.com/2023/01/09/ddos-protection-faq/" target="_blank" rel="noopener">DDoS Protection</a> takes a community of conscious efforts to keep firms up and running. For businesses to excel, driving revenue and consumers to the store is no longer an option. Cybersecurity is vital to help safeguard existing assets and keep revenue flowing. Hence, implementing these features should be paramount to stay vigilant for businesses to flourish.</p>
<p>The post <a href="https://mytechdecisions.com/network-security/7-layers-of-ddos-attacks-and-how-to-prevent-them/">7 Layers of DDoS Attacks and How To Prevent Them</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/7-layers-of-ddos-attacks-and-how-to-prevent-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of the Year &#8211; Americas Award</title>
		<link>https://mytechdecisions.com/unified-communications/avi-spl-receives-cisco-2023-reimagine-workspaces-partner-of-the-year-americas-award/</link>
					<comments>https://mytechdecisions.com/unified-communications/avi-spl-receives-cisco-2023-reimagine-workspaces-partner-of-the-year-americas-award/#respond</comments>
		
		<dc:creator><![CDATA[TD Staff]]></dc:creator>
		<pubDate>Thu, 02 Nov 2023 17:17:34 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Managed Service]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Unified Communications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[AVI-SPL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[HaaS]]></category>
		<category><![CDATA[Hardware as a Service]]></category>
		<category><![CDATA[video devices]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=49079</guid>

					<description><![CDATA[<p>AVI-SPL, the global provider of digital enablement solutions has won the Cisco Webex Reimagine Workspaces Partner of the Year – Americas award for 2023. Per a statement, the award recognizes a solutions provider that has had the most success selling and implementing Cisco Video Devices to help customers create best-in-class workspaces. AVI-SPL has been a [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/unified-communications/avi-spl-receives-cisco-2023-reimagine-workspaces-partner-of-the-year-americas-award/">AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of the Year &#8211; Americas Award</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://mytechdecisions.com/tag/AVI-SPL/" target="_blank" rel="noopener">AVI-SPL</a>, the global provider of digital enablement solutions has won the Cisco Webex Reimagine Workspaces Partner of the Year – Americas award for 2023. Per a statement, the award recognizes a solutions provider that has had the most success selling and implementing Cisco Video Devices to help customers create best-in-class workspaces.</p>
<p>AVI-SPL has been a Cisco solutions provider for more than a decade, the company says. It thus continues to deepen and expand the expertise in its Cisco practice to guide companies everywhere. With this, it aims to reimagine the workplace for better employee, partner and customer engagement as new hybrid work models take hold. In <a href="https://blog.webex.com/hybrid-work/2023-webex-partner-award-winners/" target="_blank" rel="noopener">Cisco fiscal year (FY) 2023, AVI-SPL ranked as the #3 video devices partner</a> in the U.S. and globally.</p>
<p>“Cisco’s recognition of AVI-SPL as a leading workspaces partner speaks volumes to our ability to confidently guide customers to reimagine and realize the modern work experience,” says Tom Nyhus, AVI-SPL vice president of the Cisco practice. “By embracing Cisco Webex’s innovative, leading-edge roadmap and programs, together we’ve helped global companies stay securely connected and productive from anywhere.”</p>
<p>The partnership between Cisco and AVI-SPL grew significantly in 2023 with new, joint go-to-market efforts. Per a statement, AVI-SPL led the way with the new Cisco Webex Hardware as a Service (HaaS) program. It thus became one of the first partners to conduct a customer pilot of the program. AVI-SPL also beta-tested new video devices and provided feedback through Cisco’s Video Champions Advisory Council around market trends and customer needs.</p>
<p>The Cisco 2023 Webex Partner Award honors partners who have developed and delivered exceptional Cisco-based solutions and services during the past year.</p>
<p>Cisco announced the Annual Partner Awards during the WebexOne 2023 conference on October 25, 2023. Additional details on the 2023 awards are available on the Cisco Webex <a href="https://blog.webex.com/hybrid-work/2023-webex-partner-award-winners/" target="_blank" rel="noopener">blog</a>.</p>
<p><em>Another version of this article originally appeared on our sister-site <a href="https://www.commercialintegrator.com/news/avi-spl-cisco-2023-reimagine-workspaces-partner-of-the-year-americas/" target="_blank" rel="noopener">Commercial Integrator</a> on November 1, 2023. It has since been updated for My TechDecisions&#8217; audience.</em></p>
<p>The post <a href="https://mytechdecisions.com/unified-communications/avi-spl-receives-cisco-2023-reimagine-workspaces-partner-of-the-year-americas-award/">AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of the Year &#8211; Americas Award</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/unified-communications/avi-spl-receives-cisco-2023-reimagine-workspaces-partner-of-the-year-americas-award/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nearly 900 Schools Impacted by National Student Clearinghouse Data Breach</title>
		<link>https://mytechdecisions.com/network-security/nearly-900-schools-impacted-by-national-student-clearinghouse-data-breach/</link>
					<comments>https://mytechdecisions.com/network-security/nearly-900-schools-impacted-by-national-student-clearinghouse-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[TD Staff]]></dc:creator>
		<pubDate>Tue, 26 Sep 2023 19:39:30 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=49010</guid>

					<description><![CDATA[<p>The National Student Clearinghouse (NSC) revealed a recent data breach impacted 890 schools that use its services. A breach notification letter filed with the Office of the California Attorney General said the Cl0p ransomware gang gained access to its MOVEit managed file transfer (MFT) server on May 30 and stole files containing personally identifiable information (PII). Clearinghouse is a nonprofit that [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/nearly-900-schools-impacted-by-national-student-clearinghouse-data-breach/">Nearly 900 Schools Impacted by National Student Clearinghouse Data Breach</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The National Student Clearinghouse (NSC) revealed a recent data breach impacted 890 schools that use its services.</p>
<p>A <a href="https://oag.ca.gov/system/files/Exhibit%20B%20-%20Sample%20Individual%20Notification%20Letter.pdf" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">breach notification letter</a> filed with the Office of the California Attorney General said the Cl0p ransomware gang gained access to its MOVEit managed file transfer (MFT) server on May 30 and stole files containing personally identifiable information (PII).</p>
<p>Clearinghouse is a nonprofit that provides educational reporting, data exchange, verification, and research services to approximately 22,000 high schools and 3,600 colleges and universities, which make up roughly 97% of students in public and private institutions, according to <a href="https://www.bleepingcomputer.com/news/security/national-student-clearinghouse-data-breach-impacts-890-schools/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">Bleeping Computer</a>.</p>
<p>“On May 31, 2023, the Clearinghouse was informed by our third-party software provider, Progress Software, of a cybersecurity issue involving the provider’s MOVEit Transfer solution,” NSC wrote in the letter. “After learning of the issue, we promptly initiated an investigation with the support of leading cybersecurity experts. We have also coordinated with law enforcement.”</p>
<p>The stolen PII contained names, birth dates, contact information, Social Security numbers, student ID numbers and other school-related records. NSC said it has implemented patches to the MOVEit software and additional monitoring measures to further protect its systems and customers’ data. It is also offering identity monitoring services at no cost for two years.</p>
<p>In late May, the Cl0p <a href="https://mytechdecisions.com/tag/ransomware/" target="_blank" rel="noopener">ransomware</a> gang began exploiting an SQL injection vulnerability in the MOVEit Transfer platform, leveraging a zero-day security flaw and gaining access to an underlying database, reports <a href="https://www.helpnetsecurity.com/2023/09/25/clearinghouse-moveit-breach/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">Help Net Security</a>. Starting June 15, the cybercriminals started extorting organizations that fell victim to the attacks, exposing names on its dark web data leak site.</p>
<p>In late June, NSC notified the impacted schools about the breach but did not provide many details as the investigation was ongoing. At that time, <a href="https://www.databreaches.net/national-student-clearinghouse-notifies-schools-of-moveit-breach/" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="[&quot;603fb249c323f39e54bbf9db&quot;]">Databreachnet.com</a> reported that NCS’s name had been removed from Cl0p’s leak site, “which is often an indication that a victim paid.”</p>
<p>The breach has affected many organizations across the globe, including governments, financial institutions, pension systems, and other public and private entities. Among the victims are multiple U.S. federal agencies and two U.S. Department of Energy entities.</p>
<p>Coveware, a cyber extortion incident response firm, estimates the gang will collect around $75-100 million in payment due to high ransom requests.</p>
<p><em>Another version of this article originally appeared on our sister-site <a href="https://www.campussafetymagazine.com/safety/national-student-clearinghouse-data-breach-nearly-900-schools-impacted/" target="_blank" rel="noopener">Campus Safety</a> on September 25, 2023. It has since been updated for My TechDecisions&#8217; audience.</em></p>
<p>The post <a href="https://mytechdecisions.com/network-security/nearly-900-schools-impacted-by-national-student-clearinghouse-data-breach/">Nearly 900 Schools Impacted by National Student Clearinghouse Data Breach</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/nearly-900-schools-impacted-by-national-student-clearinghouse-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Progress Software Urges Further Action to Prevent MOVEit Exploitation</title>
		<link>https://mytechdecisions.com/network-security/progress-software-urges-further-action-to-prevent-moveit-exploitation/</link>
					<comments>https://mytechdecisions.com/network-security/progress-software-urges-further-action-to-prevent-moveit-exploitation/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Fri, 16 Jun 2023 15:11:00 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[MOVEit]]></category>
		<category><![CDATA[Progress Software]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48804</guid>

					<description><![CDATA[<p>The MOVEit Transfer story continues to plague IT departments and security professionals as Progress Software has issued another advisory, urging organizations to apply yet another patch to address a privilege escalation flaw in its Transfer product. The company’s update comes amid reports of widespread exploitation, including several at several U.S. agencies that were breached as [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/progress-software-urges-further-action-to-prevent-moveit-exploitation/">Progress Software Urges Further Action to Prevent MOVEit Exploitation</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://mytechdecisions.com/network-security/act-now-vulnerability-progress-softwares-moveit-transfer-software/">MOVEit Transfer story</a> continues to plague IT departments and security professionals as Progress Software has issued another advisory, urging organizations to apply yet another patch to address a privilege escalation flaw in its Transfer product.</p>
<p>The company’s update comes amid reports of widespread exploitation, including several at several U.S. agencies that were <a href="https://www.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html">breached</a> as part of the attack. Cybersecurity researchers say <a href="https://mytechdecisions.com/it-infrastructure/ransomware-groups-confirmed-to-be-exploiting-moveit-bug/">ransomware groups</a> have seized upon the vulnerability and are using it to exfiltrate data to compel victim organizations to pay the ransom.</p>
<p>In the <a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023">advisory</a>, dated June 16, Progress says it has discovered vulnerability in MOVEit Transfer that could lead to escalated privileges and potential unauthorized access to the environment.</p>
<p>“If you are a MOVEit Transfer customer, it is extremely important that you take immediate action as noted below in order to help protect your MOVEit Transfer environment,” the company says in the new advisory. “In Progress MOVEit Transfer versions released before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an un-authenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint which could result in modification and disclosure of MOVEit database content.”</p>
<p>The incident, which was first identified in late May, now stretches well into June as organizations rush to patch their systems and protect their environment.</p>
<p>According to Progress Software, “All MOVEit Transfer customers must take action and apply the patch to address the June 15th CVE-2023-35708 vulnerability discovered in MOVEit Transfer. “</p>
<p>However, organizations have two paths to take, depending on if they applied the remediation and patching steps from the first <a href="https://progress.lightning.force.com/articles/Knowledge/MOVEit-Transfer-Critical-Vulnerability-31May2023">MOVEit Transfer Critical Vulnerability (May 2023)</a> advisory prior to June 15.</p>
<p>For those who have not yet applied the May 2023 patch, they should do so and follow the remediation steps immediately, the company says. This includes the newest patch for two separate vulnerabilities, including the original from May 31 (CVE-2023-34362) and another identified on June 9 (CVE-2023-35036).</p>
<p>Once that is taken care of, organizations should apply the June 15 patch (CVE-2023-35708).</p>
<p>If organizations have applied the May 31 and June 9 patch, they should now apply the June 15 patch, which will bring them fully up to date.</p>
<p>There is a lot of information coming out about these bugs, but cybersecurity firm Rapid7 has a detailed <a href="https://www.rapid7.com/blog/post/2023/06/14/etr-cve-2023-34362-moveit-vulnerability-timeline-of-events/">timeline</a> of events, up until this new information.</p>
<blockquote><p><strong>May 27-28:</strong> <a href="https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/">Rapid7</a> services teams have so far confirmed indicators of compromise and data exfiltration dating back to at least May 27 and May 28, 2023 (respectively).</p>
<p><strong>May 31:</strong> Progress Software <a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023">publishes</a> an advisory on a critical SQL injection vulnerability in their MOVEit Transfer solution.</p>
<p><strong>May 31:</strong> Rapid7 begins investigating exploitation of MOVEit Transfer.</p>
<p><strong>June 1:</strong> Rapid7 <a href="https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/">publishes initial analysis </a>of MOVEit Transfer attacks after responding to incidents across multiple customer environments.</p>
<p><strong>June 1: </strong>The security community publishes <a href="https://www.trustedsec.com/blog/critical-vulnerability-in-progress-moveit-transfer-technical-analysis-and-recommendations/">technical details</a> and <a href="https://www.crowdstrike.com/blog/identifying-data-exfiltration-in-moveit-transfer-investigations/">indicators of compromise</a>.</p>
<p><strong>June 1: </strong>Compromises continue; Rapid7 responds to alerts.</p>
<p><strong>June 1: </strong>CISA <a href="https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer">publishes</a> Security Advisory.</p>
<p><strong>June 2:</strong> <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34362">CVE-2023-34362</a>is assigned to the zero-day vulnerability.</p>
<p><strong>June 2: </strong><a href="https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft">Mandiant</a> attributes the attack to a threat cluster with unknown motives.</p>
<p><strong>June 2: </strong><a href="https://docs.velociraptor.app/exchange/artifacts/pages/moveit/">Velociraptor</a> releases an artifact to detect exploitation of MOVEit File Transfer critical vulnerability.</p>
<p><strong>June 4: </strong><a href="https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/">Rapid7</a> publishes a method to identify which data was stolen.</p>
<p><strong>June 4: </strong><a href="https://novascotia.ca/news/release/?id=20230604003">Nova Scotian</a> government discloses it is investigating privacy breach.</p>
<p><strong>June 5: </strong>Microsoft <a href="https://twitter.com/MsftSecIntel/status/1665537730946670595">attributes</a> the attack to Lace Tempest, a <a href="https://twitter.com/MsftSecIntel/status/1651346656657305603">Cl0p ransomware affiliate</a> that has previously exploited vulnerabilities in other file transfer solutions (e.g., Accellion FTA, Fortra GoAnywhere MFT).</p>
<p><strong>June 5: </strong>UK companies BA, BBC, and Boots disclose breaches as<a href="https://news.sky.com/story/bas-uk-staff-exposed-to-global-data-theft-spree-12896900"> victims</a> in MOVEit File Transfer.</p>
<p><strong>June 5: </strong>Cl0p ransomware group<a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-moveit-extortion-attacks/"> claims</a> responsibility for the zero-day attack.</p>
<p><strong>June 6: </strong>Security firm Huntress releases a <a href="https://www.huntress.com/blog/moveit-transfer-critical-vulnerability-rapid-response">video</a> allegedly reproducing the exploit chain.</p>
<p><strong>June 6: </strong>The Cl0p ransomware group <a href="https://twitter.com/catc0n/status/1666229125713895426?s=46&amp;t=x32-GkquTskzg0MKYymrgA">posts a communication</a> on their leak site demanding that victim organizations contact them by June 14 to negotiate extortion fees in exchange for the deletion of stolen data.</p>
<p><strong>June 7: </strong>CISA publishes <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a">#StopRansomware</a> Cybersecurity Advisory regarding MOVEit File Transfer Vulnerability CVE-2023-34362.</p>
<p><strong>June 9:</strong> Progress Software updates advisory to include a patch for a <a href="https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability">second MOVEit Transfer Vulnerability</a>, which was uncovered by Huntress during a third-party code review. The vulnerability is later assigned <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35036">CVE-2023-35036</a>.</p>
<p><strong>June 12:</strong> Rapid7 releases a <a href="https://attackerkb.com/topics/mXmV0YpC3W/cve-2023-34362/rapid7-analysis">full exploit chain</a> for MOVEit Transfer Vulnerability CVE-2023-34362.</p></blockquote>
<p>Organizations impacted should consult Progress Software, their cybersecurity services provider, and CISA for more information.</p>
<p>The post <a href="https://mytechdecisions.com/network-security/progress-software-urges-further-action-to-prevent-moveit-exploitation/">Progress Software Urges Further Action to Prevent MOVEit Exploitation</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/progress-software-urges-further-action-to-prevent-moveit-exploitation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>June 2023 Patch Tuesday: Exchange Server, SharePoint, PGM</title>
		<link>https://mytechdecisions.com/network-security/june-2023-patch-tuesday-exchange-server-sharepoint-pgm/</link>
					<comments>https://mytechdecisions.com/network-security/june-2023-patch-tuesday-exchange-server-sharepoint-pgm/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 19:14:23 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patch management]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48788</guid>

					<description><![CDATA[<p>Microsoft has released fixes for about 70 vulnerabilities for its June 2023 Patch Tuesday release, and while none are listed as being actively exploited of publicly known, there are still a handful of critical-rated vulnerabilities that IT admins should prioritize this month. That list of bugs that should be prioritized includes two remote code execution [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/june-2023-patch-tuesday-exchange-server-sharepoint-pgm/">June 2023 Patch Tuesday: Exchange Server, SharePoint, PGM</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Microsoft has released fixes for about 70 vulnerabilities for its June 2023 Patch Tuesday release, and while none are listed as being actively exploited of publicly known, there are still a handful of critical-rated vulnerabilities that IT admins should prioritize this month.</p>
<p>That list of bugs that should be prioritized includes two remote code execution vulnerabilities in Microsoft Exchange Server, an elevation of privilege bug in Microsoft SharePoint, a trio of remote code execution flaws in Windows Pragmatic General Multicast, and a handful of others.</p>
<p>Based on input from security researchers from Zero Day Initiative (ZD), Tenable, Immersive Labs and others, here is a look at the vulnerabilities that warrant more attention for the June 2023 Patch Tuesday release.</p>
<h3><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32031">CVE-2023-32031</a> – Microsoft Exchange Server Remote Code Execution Vulnerability</h3>
<p>If this looks familiar, you aren’t alone. Microsoft has issued fixes for a number of Exchange Server remote code execution bugs in recent years, and this one is a bypass of fixes for <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41082">CVE-2022-41082</a> and <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529">CVE-2023-21529</a>, with the latter listed as being under active exploitation.</p>
<p>This vulnerability exists within the Command class, and the issue results from the lack of proper validation of user-supplied data, which can result in the deserialization of untrusted data. This bug requires the attacker to have an account on the Exchange server, but successful exploitation could lead to executing code with SYSTEM privileges.</p>
<h3><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28310">CVE-2023-28310 </a> &#8211; Microsoft Exchange Server Remote Code Execution Vulnerability</h3>
<p>This is the other Exchange RCE bug listed this month, and like its twin this month, is rated as important but considered more likely to be exploited. This also requires an attacker to be authenticated, so an attacker will need valid credentials.</p>
<p>According to researchers, both Exchange Server bugs closely mirror the vulnerabilities identified as part of the ProxyNotShell exploits. Successful exploitation could result in an attacker gaining access to an organization’s email account, or even the ability to impersonate any user.</p>
<p>Since attackers are adept at stealing valid credentials via phishing attacks, these should not be ignored.</p>
<h3><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357">CVE-2023-29357</a> – Microsoft SharePoint Server Elevation of Privilege Vulnerability</h3>
<p>According to researchers, this critical-rated vulnerability is used to bypass authentication due to a flaw within the ValidateTokenIssuer method. Microsoft lists enabling the AMSI feature to mitigate this flaw, but organizations are still urged to deploy the update as soon as possible.</p>
<p>Exploitation is achieved by sending a spoofed JWT authentication token to a vulnerable server, giving them privileged of an authenticated user on the target, researchers say.</p>
<h3><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363">CVE-2023-29363</a>/<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32014">32014</a>/<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32015">32015</a> – Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability</h3>
<p>This trio of vulnerabilities, all critical-rated, allow a remote, unauthenticated attacker to execute code on an affected system where the messag queuing service s running in a Pragmatic General Multicast (PGM) Server environment. This is the third month in a row that Microsoft has patched a critical-rated bug in this component.</p>
<p>For successful exploitation, a system must have message querying services enabled.</p>
<p><em>For further June 2023 Patch Tuesday analysis, consult research blogs from <a href="https://www.zerodayinitiative.com/blog/2023/6/13/the-june-2023-security-update-review">Zero Day Initiative</a>, <a href="https://www.tenable.com/blog/microsofts-june-2023-patch-tuesday-addresses-70-cves-cve-2023-29357">Tenable</a>, <a href="https://www.immersivelabs.com/topics/patch-tuesday/">Immersive Labs</a> and others. </em></p>
<p>The post <a href="https://mytechdecisions.com/network-security/june-2023-patch-tuesday-exchange-server-sharepoint-pgm/">June 2023 Patch Tuesday: Exchange Server, SharePoint, PGM</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/june-2023-patch-tuesday-exchange-server-sharepoint-pgm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Patch FortiGate SSL-VPN Devices Immediately</title>
		<link>https://mytechdecisions.com/network-security/patch-fortigate-ssl-vpn-devices-immediately/</link>
					<comments>https://mytechdecisions.com/network-security/patch-fortigate-ssl-vpn-devices-immediately/#respond</comments>
		
		<dc:creator><![CDATA[Zachary Comeau]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 15:59:33 +0000</pubDate>
				<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Patch management]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://mytechdecisions.com/?p=48777</guid>

					<description><![CDATA[<p>Cybersecurity firm Fortinet is warning organizations of a critical vulnerability in its FortiGate SSL-VPN devices, continuing a string of recent exploitations of vulnerabilities in similar devices due to their internet-facing nature and access to a victim’s network. The vulnerability–tracked as CVE-2023-27997–is a heap-based overflow flaw that could allow a remote attacker to execute arbitrary code [&#8230;]</p>
<p>The post <a href="https://mytechdecisions.com/network-security/patch-fortigate-ssl-vpn-devices-immediately/">Patch FortiGate SSL-VPN Devices Immediately</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cybersecurity firm Fortinet is warning organizations of a critical vulnerability in its FortiGate SSL-VPN devices, continuing a string of recent exploitations of vulnerabilities in similar devices due to their internet-facing nature and access to a victim’s network.</p>
<p>The vulnerability–tracked as CVE-2023-27997–is a heap-based overflow flaw that could allow a remote attacker to execute arbitrary code or commands via specially crafted requests, says the Sunnyvale, Calif.-based firewall and endpoint security firm.</p>
<p>According to Fortinet, its Product Security Incident Response Team, following a previous incident from January also impacting FortiOS SSL VPN with exploitation, initiated a code audit of the SSL-VPN module, leading to the identification of issues that have been remediated in the company’s patch.</p>
<p>The <a href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign" target="_blank" rel="noopener">investigation</a> found that CVE-2023-27997 “may have been exploited in a limited number of cases.”</p>
<p>In the company’s blog, Fortinet says the attacks mimic the activity of Volt Typhoon, a suspected China-sponsored hacking group that has been targeting critical infrastructure organization. However, Fortinet doesn’t go as far to link exploitation of the vulnerability to that group, but does expect Volt Typhoon and other threat actors to leverage the bug in unpatched software and devices.</p>
<p>FortiGate devices were identified by the U.S. National Security Agency as being <a href="https://mytechdecisions.com/network-security/microsoft-nsa-warn-of-stealthy-china-sponsored-hacking-group-volt-typhoon/" target="_blank" rel="noopener">targeted by Volt Typhoon</a> as an initial intrusion vector.</p>
<p>Organizations should apply the patch immediately. If they aren’t able to do so, disabling SSL-VPN is a legitimate workaround, the company says.</p>
<p>These devices and other SSL VPN products from Citrix, Pulse Secure and others have been popular targets in recent years, says Satnam Narang, senior staff research engineer at vulnerability management firm Tenable.</p>
<p>According to Narang, these flaws have not only been exploited by ransomware groups but also by nation-state aligned threat actors with a particular focus on flaws in Fortinet devices.</p>
<p>“SSL-VPNs are attractive targets due to their internet-facing nature, providing access to a company’s intranet,” Narang says. “They became even more popular at the beginning of the pandemic, as organization’s shifted towards allowing for remote work.”</p>
<p>Narang adds that pre-authentication bugs like CVE-2023-27997 are especially valuable to remote attackers because they don’t need to have valid credentials.</p>
<p>“Despite patches being available, the inherent value of the flaw remains significant, considering the ongoing success threat actors achieve by exploiting known, unpatched vulnerabilities,” Narang says. “It’s not a question of &#8216;if&#8217;, but rather &#8216;when&#8217; a public proof-of-concept exploit for this flaw is made public, that we can expect more widespread scanning and exploitation of vulnerable assets.”</p>
<p>The post <a href="https://mytechdecisions.com/network-security/patch-fortigate-ssl-vpn-devices-immediately/">Patch FortiGate SSL-VPN Devices Immediately</a> appeared first on <a href="https://mytechdecisions.com">My TechDecisions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mytechdecisions.com/network-security/patch-fortigate-ssl-vpn-devices-immediately/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
