Get Real About User Security Training
Do you despair that users will never learn to avoid stupid security mistakes that compromise your organization? Maybe you're not spending enough time and effort on training. Roger Grimes at InfoWorld wrote an excellent article how to deploy great security awareness training, where he reviews KnowBe4's platform. You should check out this article!
http://www.infoworld.com/article/2920804/security/get-real-about-user-security-training.html
Mitnick's Tips To Combat Social Engineering
Leon Spencer at ZDNet interviewed Kevin Mitnick. A quick summary: Social engineering helped renowned former hacker Kevin Mitnick break into so many computer systems that he ended up on the FBI's most wanted list. Now, the information security expert shares his tips on how to protect against some of the most effective techniques.
"According to Mitnick, social engineering could be as simple as an attacker strategically targeting a specific operative in a company with a phishing email. Or it could be what he calls the "long con": An intensive, weeks- or months-long manipulation of one or several significant employees within an organization.
"In either case, social engineering plays the first part of a two-step attack, where the first part is the "con", getting the target to comply with a request, and the second part is the exploit resulting from the vulnerability thrown up by the con, such as a vulnerability in the software that resides on the victim's desktop.
"Social engineering is a particularly effective method for breaching a secure network, because any weakness that emerges generally comes down to human error." Full article with Tips at ZDNet:
http://www.zdnet.com/article/mitnicks-tips-to-combat-social-engineering/
Last weekend Kevin was member of a panel at a very intriguing event in Chicago. He started off the event with 20 minutes of hacks and then was part of a 3-person keynote panel with Sir John Sawers, former Chief of the Secret Intelligence Service (MI6) and General Keith B. Alexander, former Commander, U.S. Cyber Command and Director, NSA. More at:
http://www.internationaltelecomsweek.com/ITW2015OfficialOpening.html
" Love is a game that two can play and both win. "
- Eva Gabor, Actress
" Find a place inside where there's joy, and the joy will burn out the pain. "
- Joseph Campbell - Author
Thanks for reading CyberheistNews!
But if you want to unsubscribe, you can do that right here.
Warm Regards, Stu Sjouwerman | Email me: feedback@knowbe4.com
|
|
What Our Customers Are Saying About Our Security Awareness Training
"I wanted to give you an update on our security awareness training. When we did the baseline phishing campaign for 85 employees and we had a click rate of 42%. After that data was captured, HR sent out a mandatory training notice that all employees had to take the Kevin Mitnick Security Awareness Training 2015 training video and that it had to be completed by a certain date.
"At that date, all but 2 had completed the training. We also require all new employees to take that training as well. As the end of the training period neared, I setup scheduled phishing campaigns using random templates, mostly financial and social, for 4 groups, each group starting a different week and day. I ran the reports for April, and we had a click rate of 2%, basically 2 people out of 86 people clicked.
"A very significant reduction in click rates, and more importantly reducing the possibility of getting hacked from a malicious email. Considering the costs of recovering from a ransomware attack, the training is well worth the cost.
"The phishing campaigns will continue each month and monitored, we are sending out a security tips email each month, and we will be opening up the additional training modules to all employees soon.
Thanks for your great support and great products!"
- D.H., Senior Network/Desktop Engineer
Find out how affordable Kevin Mitnick Security Awareness Training is for your own organization. Get a quote now and be pleasantly surprised:
http://info.knowbe4.com/kmsat_get_a_quote_now
This Week's Five Most Popular HackBusters Posts
What are IT security people talking about? Here are this week's five most popular hackbusters posts:
- So, the NSA Has an Actual Skynet Program:
http://www.hackbusters.com/news/stories/319948-so-the-nsa-has-an-actual-skynet-program
- USBKill — Code That Kills Computers Before They Examine USBs for Secrets:
http://www.hackbusters.com/news/stories/318260-usbkill-code-that-kills-computers-before-they-examine-usbs-for-secrets
- US Court Rules NSA Phone surveillance Program is illegal:
http://www.hackbusters.com/news/stories/319470-us-court-rules-nsa-phone-surveillance-program-is-illegal
- London Railway System Passwords Exposed During TV Documentary:
http://www.hackbusters.com/news/stories/316896-london-railway-system-passwords-exposed-during-tv-documentary
- The FBI's Secret Air Force Watched The Streets Of Baltimore:
http://www.hackbusters.com/news/stories/319326-the-fbi-s-secret-air-force-watched-the-streets-of-baltimore
SANS Releases May OUCH!
SANS said: "We are excited to announce the May issue of OUCH! This month, led by Guest Editor Brian Honan, we focus on securing the cyber generation gap. Many of us have family members that may not be technically savvy and are intimidated by security. This newsletter explains how you can help those family members and any children that may be visiting them. We encourage you to share OUCH! with anyone you want, including family, friends or as part of your security awareness program. All we request is you do not modify or sell the newsletters." English Version (PDF)
http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201505_en.pdf
More Evidence That Employee Negligence Is Security Risk No. 1
New survey shows that "companies cannot eradicate security risk solely through the use of better technology," the report authors said. Technical security solutions do not stop employees from being phished, nor prevent IT staff from failing to review logs or improperly configuring servers.
Thirty-six percent of data security incidents handled last year by the BakerHostetler law firm were due to employee negligence, making it the leading cause of security incidents. According to the firm's newly released report, other causes were outsider and insider theft, malware and phishing attacks.
Take away: "Our analysis shows that best-in-class cyber risk management starts with awareness that breaches cannot be prevented entirely, so emphasis is increasingly on defense-in-depth, segmentation, rapid detection and containment, coupled with ongoing effort to monitor threat intelligence and adapt to changing risks," said BakerHostetler's Craig Hoffman. Article at:
http://gcn.com/articles/2015/05/07/employee-security-risk.aspx?s=gcntech_080515
Run SAP? Almost 95% Of You Are Vulnerable To Hackers
Not many of you run SAP, but why am I talking about this? The lesson learned is applicable to all of us. Keep on reading.
More than 95 percent of enterprise SAP installations are exposed to high-severity vulnerabilities that could allow attackers to hijack a company's business data and processes, new research claims.
According to a new assessment released by SAP (short for Systems, Applications & Products) solutions provider Onapsis, the majority of cyber attacks against SAP applications in the enterprise are: