SIDEBAR
»
S
I
D
E
B
A
R
«
Technology Alone Is Not Enough for Security
Sep 21st, 2015 by aperio

What is “social engineering?”

Even if you think you’ve taken every possible step to make certain your data is secure, there’s one aspect of security you may well have overlooked – exploitation of the human factor, which is also referred to as “social engineering.” In the context of IT security, this involves the psychological manipulation of people so they act in a way that allows attackers to get past technological security features, or so they share information that should be confidential. For example, rather than trying to break into a system or crack a password, an attacker would instead persuade a human user to give them a password.

What are some kinds of social engineering to watch out for?

Phishing: This is a technique of getting confidential information by fraudulent methods. It can involves attempts to acquire user names, passwords, credit card details, or even money. Phishing attempts frequently make use of the following techniques to make people more likely to share information:
●    Using link shorteners or embedded links to create apparently legitimate links. After these links are clicked, they direct the victim to websites created for fraudulent purposes.
●    Using threats to create a sense of urgency and fear so the victim will act quickly without thinking through their actions (e.g., “Your account will be canceled unless you act immediately!”).
Tips for preventing phishing: You and your employees should be wary of requests for information that should be confidential. Take the time to verify that these requests are legitimate before providing information.

Tailgating: Also known as “piggybacking,” this kind of attack refers to a method of entering an unattended but secured area by simply walking in behind a person who has the proper access. After gaining access to a secured area, an attacker has much easier access to unattended laptops, etc.
Tips for preventing tailgating: You and your employees need to create an atmosphere where it is not considered “common courtesy” to allow entrance to unknown people who do not have the proper security credentials. While it might seem polite to hold the door for another person, train employees to only do so if they also verify that the other person has the appropriate security card or other credential.

Quid pro quo: Quid pro quo means, “something for something.” These attacks involve a promised benefit in exchange for information. For example, a common type of attack can involve a person who makes multiple calls to phone numbers at a company, pretending to be a technical support representative calling to help with a reported problem. Odds are good that after enough calls, they’ll stumble upon a person who does, in fact, have a problem. At that point, the attacker may exploit their victim by having them install malware or otherwise give the attacker access.
Tips for preventing quid pro quo attacks: Technical support representatives should be able to provide identifying information (e.g., a ticket number for a reported issue) before you or your employees trust them with information or access. More generally, you and your employees should be wary of offers that appear “too good to be true,” and of unexpected offers to improve credit scores, financing, and so on.

Additional tips to avoid social engineering attacks

Don’t be in a hurry – Attackers want you to act before you think. When dealing with suspicious requests, remember to slow down.
Be wary of unusual emails – If an email that appears to come from a trusted source seems odd to you, that source may have been hacked. Verify the source of the email.
Educate and train your employees regularly – Make sure everyone in your company is familiar with the various types of social engineering attacks and that they know which information is considered confidential.

UNITRENDS LUNCH AND LEARN EVENT
Sep 18th, 2015 by aperio

REGISTER FOR OUR LUNCH AND LEARN EVENT BY CLICKING HERE

Congratulations Lee
Aug 29th, 2015 by aperio

It was 15 years ago when we first opened our doors at Aperio IT and it was 15 years ago when Lee applied for a job and stepped foot in our office.  It was than we hired him as a Systems Engineer.  Lee has been like the glue to Aperio IT, holding everything together, figuring out problems before they become problems and we couldn’t of asked for a better employee.  Lee was recently promoted to our Service Manager where he oversees all of our Help Desk.  Lee has helped shape our company into what it is today and we never could of done it without him.  Thank you so much Lee.  We are looking forward to 15 more years with you.

 

aperio006 aperio007

The Importance Of Penetration Testing
Aug 25th, 2015 by aperio

The penetration test is an industry standard security test to determine the security level of an IT infrastructure by attempting to exploit a number of vulnerabilities (with the appropriate authorization) of the system including but not limited to; the operating system, application flaws, configurations and potential end-user behavior that could pose risk. By deliberately attempting to hack into their own system technicians can assess the efficiency of their defensive mechanisms and so can better manage their systems by spotting potential vulnerabilities before they are exploited by hackers.

Ordinarily tests would be performed manually by an in-house security technician or an independent security consultant service with the help of automated technologies and software designed to simultaneously attack the system’s network, its devices, servers, applications and other points of weakness. If any vulnerabilities are found then technicians will attempt to see how far they can penetrate into the system to see what else could potentially be exploited. The information gathered from these tests is then compiled and presented to IT and network managers in order to advise them on how secure their infrastructure is and priorities areas which need to be secured further and to revise practice and procedures.

This may seem like a lot of work for something that bears very little fruit however nothing could be further from the truth: a 2014 study conducted by the Ponemon Institute, it was concluded that a data breach costs the affected company $3.5million in direct losses; this includes the financial effects of negative press, loss of customers as well as legal fines and penalties, not to mention the value of the data itself that has been lost.

Although there is no set standard as to how often penetration testing should be performed it is strongly advised that they be run on a regular basis to ensure consistent network management and to discover and remedy new threats posed to IT systems before they are exploited by attackers. It is strongly advised that penetration tests should be performed whenever; new network infrastructure added or altered, new office or network locations are established, new security patches have been applied and if end-user policies are modified.

Not only does penetration testing allow network managers to efficiently deal with the risks posed by network vulnerabilities, it also profits the organisation by reducing periods of network down-time for maintenance, helps to avoid fines posed by the government and other regulating authorities for failing to meet security requirements, but also helps to preserve customer loyalty. All in all it is something that every business should be investing in.

Article Source: http://EzineArticles.com/9131247
Thank you to everyone who attended our Security themed lunch and learn.
Aug 20th, 2015 by aperio

Thank you ESET and Barracuda Networks for coming out and giving awesome presentations. We will be having another event in October so like us on facebook and add us on linked in so you can stay up to date for our upcoming events and other local tech events in the area.

aperio006 aperio011 aperio013 aperio017

SIDEBAR
»
S
I
D
E
B
A
R
«
»  Substance:WordPress   »  Style:Ahren Ahimsa