Tag Archive for: Risky

How to face the new challenges in an ever-expanding – and risky – internet environment


Two decades ago, we kept everything relatively simple by containing our organization’s technology footprint within the closed fortress that was the corporate network. The IT staff determined which tools to deploy, and the security team figured out how to best protect them and the network.

This seems a distant memory now, thanks to modern innovation: Work-from-home (WFH) arrangements continue to transform the traditional office culture, with spikes in cloud adoption, shadow IT, and Bring Your Own … Everything. The resulting widespread connectivity has boosted productivity. But it has also ushered in a new era of exposure because of a vastly increased attack surface.

Subsequently, chief information security officers (CISOs) and their teams can no longer afford to view their roles as an “after the fact,” reactive responsibility. They must instead take proactive steps to identify all internet-facing assets from the very beginning and protect them. With improved visibility and a “security first” commitment, companies can operate with peace of mind.

To illustrate this, we recently published research in which we evaluated the presence of a variety of risks and vulnerabilities in random samples of 2.2 million hosts in our Universal Internet Dataset (UIDS). Here’s what we found:

  • WFH brings new challenges. Connecting remotely, employee-users are expanding the attack surface, although it’s an unintended result of their actions in most cases. Post-pandemic remote work has driven a 59%  increase in the use of tools and devices not approved by IT (commonly called shadow IT), leading to unmanaged devices/services because IT and security teams are left out of the conversation. What’s more, we have found that organizations now use an average of 44 different domain registrars and 17 hosting providers – another likely outcome of shadow IT that further contributes to visibility issues.
  • Misconfigurations and exposures create the most risks. Misconfigurations – such as unencrypted services, insufficient or missing security controls, and self-signed certificates – account for about 60% of internet risks. Exposures of services, devices and information represent 28%.
  • Exposures are not…

Source…

Analysis | The Postal Service secretly built a risky mobile voting system – The Washington Post



Analysis | The Postal Service secretly built a risky mobile voting system  The Washington Post

Source…

[Webinar] Risky Business – Protecting Your Data From Hackers? – April 21st, 11:30 am – 1:00 pm CDT | Association of Certified E-Discovery Specialists (ACEDS)


Paul Price

Paul Price
Vice President, Forensic Services
Xact Data Discovery

Paul Price is the Vice President, Forensic Services at Xact Data Discovery, where he manages the firm’s technical operations in areas of digital forensics and cyber security. In addition to supervising forensic examiners, he maintains an active case load and conduct digital forensic investigations for civil litigation, criminal matters, internal investigations, and cyber security efforts.

Prior to entering the private sector as a consultant, Mr. Price gained invaluable experience and training as a law enforcement officer, where he received certification as a Computer Forensic Examiner. Over the course of his career, Mr. Price has conducted, assisted, or supervised over 1000 forensic exams for local, state, and federal law enforcement agencies as well as law firms, corporations, and private individuals. His law enforcement background includes specialized assignments in Financial Crimes Investigation, Crime Scene, Computer Forensics, and Counterterrorism. Paul spent the last five years of his law enforcement career on assignment with the FBI working National Security matters and held a TS/SCI security clearance.

Mr. Price has worked on several high-profile engagements around the globe including cases dealing with Intellectual Properties, Trade Secrets, Bankruptcy, Embezzlement, Fraud, Commercial Litigation, Family Law, and Criminal matters. His work requires him to identify, preserve, analyze, and document electronically stored information (ESI) from computers, servers, mobile devices, VOIP systems, and many other sources of ESI for the purposes of evidentiary or root cause analysis. Mr. Price has been recognized and testified as a forensic expert in legal proceedings pending in both State and Federal courts.

Source…

87% of Americans view data privacy as a human right, but most still use risky security practices

Some 61% of consumers said they don’t use computer security software or multi-factor authentication. And, 69% of respondents said they choose not to install mobile device security software when …
computer security – read more