Category Archives: IT Management

How Can Artificial Intelligence (AI) Improve Cybersecurity?

1. Automation: Artificial intelligence can automate a variety of tasks related to cybersecurity, such as monitoring networks, scanning for vulnerabilities, and identifying malicious activity. This can help reduce the workload of cyber security professionals and improve threat detection.

2. Malware Detection: AI-powered algorithms are capable of quickly analyzing large amounts of data and identifying patterns that indicate malicious activity. This can help security professionals identify malicious software quickly and accurately.

3. Network Security: AI can be used to detect and respond to malicious network traffic. AI-powered systems can monitor and block suspicious activity, as well as analyze existing data to identify potential threats.

4. Access Control: AI can be used to detect suspicious user behavior and enforce access control policies. AI-powered systems can monitor user activity and block unauthorized access to sensitive data and systems.

Source:

Text generated by ChatGPT, developed by OpenAI (https://openai.com/) accessed on Mar 27, 2023.

What Are The Best Defenses Against Ransomware?

Ransomware is a type of malicious software that encrypts files on a victim’s computer and demands payment in exchange for the decryption key. To defend against ransomware, it is important to have a multi-layered defense strategy that includes the following measures:

  1. Backup your data: The most effective defense against ransomware is to regularly back up your data to an external hard drive, cloud storage or another secure location. This way, if your computer is infected with ransomware, you can restore your files without having to pay the ransom.
  2. Keep software up-to-date: Ransomware often exploits vulnerabilities in software to infect a computer. Regularly updating your operating system, web browsers, and other software can help to patch these vulnerabilities.
  3. Use anti-virus software: Install and regularly update anti-virus software to protect against malware, including ransomware.
  4. Use strong passwords: Use strong passwords and enable two-factor authentication on all accounts to prevent unauthorized access.
  5. Be cautious with email and attachments: Be wary of suspicious emails and attachments, and avoid clicking on links or opening attachments from unknown or suspicious sources.
  6. Use a firewall: A firewall can help to block unauthorized access to your computer and protect against ransomware.
  7. Educate yourself: Educate yourself on the latest ransomware threats and best practices for cybersecurity. Stay up-to-date on new threats and trends in the cybersecurity landscape to better protect yourself and your data.

Source:

Text generated by ChatGPT, developed by OpenAI (https://openai.com/) accessed on Feb 19, 2023.

Cybersecurity Outlook in 2023

The world of cybersecurity is constantly evolving, and the outlook for 2023 is no different. As technology continues to advance, so too does the need for increased security measures. With the rise of the Internet of Things (IoT), artificial intelligence (AI), and cloud computing, the need for robust cybersecurity solutions is greater than ever.

The most significant development in the world of cybersecurity in 2023 will be the emergence of quantum computing. Quantum computing is a revolutionary technology that has the potential to revolutionize the way we process data and solve complex problems. With its ability to process data at speeds far beyond what traditional computers can achieve, quantum computing will be a game-changer for cybersecurity.

The use of AI and machine learning will also become increasingly important in the world of cybersecurity. AI and machine learning can be used to detect and respond to cyber threats in real-time, allowing organizations to stay one step ahead of malicious actors. AI and machine learning can also be used to automate many of the mundane tasks associated with cybersecurity, freeing up resources for more important tasks.

The use of blockchain technology will also become increasingly important in the world of cybersecurity. Blockchain technology can be used to create secure, immutable records of transactions and data, making it difficult for malicious actors to tamper with or steal data. Blockchain technology can also be used to create secure networks that are resistant to cyber attacks.

Finally, the use of cloud computing will become increasingly important in the world of cybersecurity. Cloud computing allows organizations to store and process data in the cloud, making it easier to access and manage data from anywhere in the world. Cloud computing also makes it easier to scale up or down depending on the needs of the organization, allowing organizations to save money on hardware and software costs.

Overall, the outlook for cybersecurity in 2023 is very positive. With the emergence of quantum computing, the use of AI and machine learning, the use of blockchain technology, and the use of cloud computing, organizations will have access to powerful tools and technologies that can help them stay one step ahead of malicious actors.

Source:

This content is AI-generated using ChatGPT.

I asked chatGPT to write a blog on Cybersecurity Outlook in 2023. This is the output. Pretty impressive!

Single Sign On (SSO)

Single sign-on (SSO) is an important aspect of access management. It is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials – for example, a username and password coupled with multi factor authentication (MFA). This makes life easier for end users since they don’t have to remember multiple passwords. This also provides administrators a centralized way to manage all accounts and govern which users have access to them.

SSO works based upon a trust relationship set up between an application, known as the service provider, and an identity provider. This trust relationship is often based upon a certificate that is exchanged between the identity provider and the service provider. This certificate can be used to sign identity information that is being sent from the identity provider to the service provider so that the service provider knows it is coming from a trusted source. In SSO, this identity data takes the form of tokens which contain identifying bits of information about the user like a user’s username.

Advantages of SSO include the following:

  • Users need to remember and manage fewer passwords and usernames for each application.
  • The process of signing on and using applications is streamlined — no need to reenter passwords.
  • Fewer complaints or trouble about passwords for IT helpdesks.

Disadvantages of SSO include the following:

  • An attacker who gains control over a user’s SSO credentials is granted access to every application the user has rights to, increasing the amount of potential damage.
  • It does not address certain levels of security each application sign-on may need.
  • If availability is lost, users are locked out of all systems connected to SSO.

Sources:

https://www.techtarget.com/searchsecurity/definition/single-sign-on

https://www.onelogin.com/learn/how-single-sign-on-works

OWASP API Security Top 10

What is an API?

An application programming interface, or API, enables companies to open up their applications’ data and functionality to external third-party developers and business partners, or to departments within their companies. This allows services and products to communicate with each other and leverage each other’s data and functionality through a documented interface.

What is API Security?

Digital transformation is driving API adoption. APIs are the core of service-oriented and microservices architectures. They power mobile, web applications, SaaS and IoT devices. They can be found in customer-facing, partner-facing and internal applications. APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) to business partners and customers. Because of this, APIs have increasingly become a target for attackers.

API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).

What are the OWASP API Security Top 10?

Here are the 2019 API Security top 10 and their mitigations:

  • API1:2019 Broken Object Level Authorization APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be considered in every function that accesses a data source using an input from the user. Read more.
  • API2:2019 Broken User Authentication Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user’s identities temporarily or permanently. Compromising a system’s ability to identify the client/user, compromises API security overall. Read more.
  • API3:2019 Excessive Data Exposure Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Read more.
  • API4:2019 Lack of Resources & Rate Limiting Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force. Read more.
  • API5:2019 Broken Function Level AuthorizationComplex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions. Read more.
  • API6:2019 Mass Assignment Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on an allowlist, usually leads to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to. Read more.
  • API7:2019 Security Misconfiguration Security misconfiguration is commonly a result of unsecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information. Read more.
  • API8:2019 Injection Injection flaws, such as SQL, NoSQL, Command Injection, etc., occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Read more.
  • API9:2019 Improper Assets Management APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints. Read more.
  • API10:2019 Insufficient Logging & Monitoring Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. Read more.

Sources:

https://owasp.org/www-project-api-security/

https://www.ibm.com/cloud/learn/api

Cybersecurity Top Defenses

Majority of ramsomware and cyberattacks stem from phishing, social engineering, unpatched software and weak passwords. Mitigating these cover more than 80% of your cybersecurity defenses. Here are the three top defenses that you should prioritize right away to minimize your cybersecurity risk:

  1. Mitigate Social Engineering
    1. Educate your users about cybersecurity on a regular basis. Use creative ways for them to get engaged
    2. Codify security policies and make sure to enforce them.
    3. Use technical defenses such as screening out phishing emails from your email system. A useful anti-phishing guide can be obtained from this website: https://info.knowbe4.com/comprehensive-anti-phishing-guide
  2. Patch your Operating Systems, application software, firmware, and appliances.
    1. Review vulnerabilities and patch your software regularly. Patches for critical vulnerabilities should be applied as soon as possible.
    2. Be aware of current threats and work with your vendor to obtain security patches. Use the following website to check known exploited vulnerabilities and mitigate them right away: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
  3. Use Multifactor Authentication (MFA)
    1. Even if cyber criminals are able to obtain your users’ passwords, an MFA using a second source of authentication will be able to prevent attack.
    2. At the very least, set an enforceable policy for your users to use unique, 12-char fully random, unguessable passwords.

Cyberthreat Defense Report 2021

CyberEdge Group has been conducting yearly surveys to IT security professionals all over the world. The latest one – 2021 Cyberthreat Defense Report – is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries.

The report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

Here are the key insights from the 2021 report:

  • A record 86% of organizations suffered from a successful cyberattack last year
  • A record 69% of organizations were compromised by ransomware
  • 57% of ransomware victims paid ransoms last year, but one-quarter (28%) of them failed to recover their data
  • Low employee awareness and lack of skilled personnel inhibit IT security’s success
  • 87% of organizations are experiencing a shortfall of skilled IT security personnel
  • The typical enterprise IT security budget increased 4% last year, but the rate of budget growth slowed for the first time in years
  • Four out of five respondents prefer security products that feature machine learning (ML) and artificial intelligence (AI) technology
  • The percentage of IT security applications and services are delivered from the cloud climbed from 36% to 41%

The report can be downloaded from the ISC2 site: https://www.isc2.org/-/media/ISC2/Research/Cyberthreat-Defense-Report/2021/CyberEdge-2021-CDR-Report-v10–ISC2-Edition.ashx

Source: 2021 Cyberthreat Defense Report, CyberEdge Group, LLC.

Updated CIS Controls Version 8

One of the most adopted security frameworks is the CIS Controls (formerly known as Critical Security Controls). It has been updated in May of 2021 to keep up with the ever changing cybersecurity landscape. CIS Controls are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are recommended set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks. Compared to the other security frameworks such as the NIST CSF (Cybersecurity Framework), CIS Controls are more prescriptive.

CIS Controls v8 has been enhanced to keep up with modern systems and software. Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics prompted the update and supports an enterprise’s security as they move to both fully cloud and hybrid environments.

Here are the updated 18 CIS Controls:

  1. Inventory and Control of Enterprise Assets – Actively manage (inventory, track, and correct) all enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/Internet of Things (IoT) devices; and servers) connected to the infrastructure physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise. This will also support identifying unauthorized and unmanaged assets to remove or remediate.
  2. Inventory and Control of Software Assets – Actively manage (inventory, track, and correct) all software (operating systems and applications) on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.
  3. Data Protection – Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.
  4. Secure Configuration of Enterprise Assets and Software – Establish and maintain the secure configuration of enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/IoT devices; and servers) and software (operating systems and applications).
  5. Account Management – Use processes and tools to assign and manage authorization to credentials for user accounts, including administrator accounts, as well as service accounts, to enterprise assets and software.
  6. Access Control Management – Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software.
  7. Continuous Vulnerability Management – Develop a plan to continuously assess and track vulnerabilities on all enterprise assets within the enterprise’s infrastructure, in order to remediate, and minimize, the window of opportunity for attackers. Monitor public and private industry sources for new threat and vulnerability information.
  8. Audit Log Management – Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack.
  9. Email and Web Browser Protections – Improve protections and detections of threats from email and web vectors, as these are opportunities for attackers to manipulate human behavior through direct engagement.
  10. Malware Defenses – Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
  11. Data Recovery – Establish and maintain data recovery practices sufficient to restore in-scope enterprise assets to a pre-incident and trusted state.
  12. Network Infrastructure Management – Establish, implement, and actively manage (track, report, correct) network devices, in order to prevent attackers from exploiting vulnerable network services and access points.
  13. Network Monitoring and Defense – Operate processes and tooling to establish and maintain comprehensive network monitoring and defense against security threats across the enterprise’s network infrastructure and user base.
  14. Security Awareness and Skills Training – Establish and maintain a security awareness program to influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise.
  15. Service Provider Management – Develop a process to evaluate service providers who hold sensitive data, or are responsible for an enterprise’s critical IT platforms or processes, to ensure these providers are protecting those platforms and data appropriately.
  16. Application Software Security – Manage the security life cycle of in-house developed, hosted, or acquired software to prevent, detect, and remediate security weaknesses before they can impact the enterprise.
  17. Incident Response and Management – Establish a program to develop and maintain an incident response capability (e.g., policies, plans, procedures, defined roles, training, and communications) to prepare, detect, and quickly respond to an attack.
  18. Penetration Testing – Test the effectiveness and resiliency of enterprise assets through identifying and exploiting weaknesses in controls (people, processes, and technology), and simulating the objectives and actions of an attacker.

Sources:

https://www.sans.org/blog/cis-controls-v8/

https://www.cisecurity.org/controls/v8/

Effective Incident Response and Management

Cyber attacks are all too common these days. They are getting faster, more frequent and more sophisticated. Companies should be prepared when these inevitable attacks occur. One of the critical security controls to mitigate and lower this risk is to have an effective incident response and management program.

The goal of the incident response and management program is to successfully detect, understand, manage, investigate, and recover from the breach in the shortest amount of time possible. Not having an effective program:

  • may damage company reputation, lose money, customers, and competitive advantage, or incur hefty fines
  • may take several weeks or months to detect the breach
  • maybe too late for the company to develop procedures, data collection, legal protocols, and communications strategy when a breach occurs
  • may lead to panic mode leading to more damage, infecting more systems and losing more data.

An effective incident management plan should:

  • determine and document the scope of the breach (such as systems and data impacted, department impacted, magnitude of impact, and severity)
  • collect forensic evidence from log data, security tools, disk images, security video, etc.
  • perform root cause analysis (RCA)
  • return to secure state by remediation or mitigation
  • gather threat intelligence to improve defense, deploy security solutions, and detect malicious behaviors

There are several processes for an effective incident response: Preparation Process -> Detection Process -> Analysis Process -> Notification Process -> Remediation or Mitigation Process

What to do in the preparation process:

  1. Understand your environment and the threats to it
  2. Define roles and responsibilities and contact information
  3. Gather third-party contact information to be used to report a security incident, such as Law Enforcement, relevant government departments, vendors, etc.
  4. Plan how to respond and identify key partners, data sources and technologies
  5. Practice just like a Disaster Recovery (DR) test
  6. Continually review and refine the plan as the environment changes

What to do during detection process:

  1. Assess threats by gaining visibility to any active threats
  2. Define reporting outlet and encourage end user reporting
  3. Use technology to detect attack
  4. Contain damages by stopping the attack and recovering the affected endpoints

What to do during analysis process:

  1. Determine the impact and scope of the breach
  2. Protect and preserve the forensic evidence for investigation and root cause analysis
  3. Perform any remediation

What to do during notification process:

  1. Communicate diligently to upper management, internal stakeholders, or end users
  2. If the breach has to be communicated externally (e.g. to customers, law enforcement, etc.), involve the legal team and use your defined communication strategy.

What to do during remediation or mitigation process:

  1. Implement temporary measures
  2. Coordinate with stakeholders
  3. Document changes
  4. Secure defenses

An effective incident response program is a well documented plan (consisting of people, processes, and technologies) that is up to date and highly tailored to the need of the company.

IoT Security

The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the Internet. These include surveillance cameras, lightbulbs, medical devices, pacemakers, smartphones, home routers, thermostats, printers, control systems and pretty much any device that is connected to the Internet, all collecting and sharing data. They have sensors that detect states or movement of equipment or materials and the data acquired by the sensors are transmitted over the network to a server. Location information can be derived as well.

The explosion of IoT devices has also increased cyberattacks on them. Hackers probe and access them via http, ftp or telnet ports to check what kind of devices they are. They also check for backdoor ports. Then they gain access by logging in via telnet (the common one, although they may also use other vulnerable ports) using default or weak username and password, and sometimes using dictionary attack. Once they gain access, they will install malware. Once malware is installed, the device will be under control of the hacker’s server, and is then used for further cyberattacks.

Hackers usually control hundreds of thousands of IoT devices all around the world that are used for DDoS (Distributed Denial-of-Service) attacks. These DDoS attacks can cause significant impact to companies being targeted.

IoT devices are specially vulnerable because they are usually online 24/7, they don’t have security or anti-virus protection, they have weak/default login password and they have global IP addresses. Security is an afterthought of the manufacturers of these devices.

To mitigate IoT security vulnerabilities, there should be an active monitoring and alerting system that notify users when their IoT devices are vulnerable, so they can take appropriate action. Technology solutions must be established to remotely detoxify IoT malware while the original IoT functions can continue to operate. There should also be a way to remotely disable IoT device.

Companies should have a strict security controls for connecting IoT devices in their network.

Finally, the industry should develop IoT security guidelines for IoT device maker/developer, IoT service provider, and IoT device user, as well as promote international standardization.