I was recently asked by a small business how could they secure their
IT on a budget this made me stop to think about that tricky subject
"security meets cost". It is in these terms that a business must be
practical, you need to stand back and identify your actual financial
loss were a cyber attack or unforeseen event to occur resulting in the
loss of data. And to be quite honest if your spending thousands on
perimeter controls and don't have anyone in your business who can
properly configure, monitor and maintain these devices then your really
just throwing money down the drain.
After going through the business I advised them to put in place a number of steps that would go a long way towards protecting them. It must be noted that the business in question did not deal with any payments card information (PCI), personally identifiable information (PII) or personal health information (PHI) if your business is dealing with the above then you will need to put more controls in place.
My plan for the business was pretty simple and I will lay it out below.
1) Education:
This is one of the fundamental roles that small businesses neglect, there are hundreds of services out there that will do training days on different areas in an easy to understand and education manner. If you can train staff to identify Phising, Smishing and other everyday threats then you are starting to win a war on the front line. Education helps get employees to think before opening an attachment or giving out "harmless" information over the phone. For the more adventures small business there are packages available for you to run harmless attacks that contain educational videos when clicked. PhishMe would be one such company that comes to mind in that regard.
2) Backups:
This one is quite simple but often forgotten, with the rise of ransomware every small business should keep daily or weekly backups. These backups should be occasionally tested to ensure that they can restore systems in the event of an emergency such as a ransomware infection.
3) Business Continuity Plan:
Every business should have one and should test it, you can work on building this up over a period of time but you need to start somewhere. EG. if the building floods are our desktops on the floor? Maybe we should elevate them to mitigate this problem. During this flood do employee have the ability to work from home? Yes we have remote access to the building over our companies VPN.
The above are just suggestions but you get the drift if you start to disect your company and compare it to potential events you might be surprised what you come up with. Fail to prepare then prepare to fail.
4) Virus and Anti- malware protection:
Again this is simple but neglected in many small businesses, buy a good antivirus and anti-malware package and set the updates to times you know your employees wont shut them down eg lunch time or after working hours. A good antivirus and malware solution is like having a security guard in your network throwing out all the bad guys.
5) Enable Bit-locker or the equivalent:
Bit-locker encrypts your disk so if someone breaks in and robs your physical machine in theory bit-locker will keep that information safe, unless of course the thief is Homeland security or the equivalent in which case your data is the least of your worries.
6) Password Policy:
Put in place a robust password policy that includes the rotation of passwords regularly and password history check to prevent the re-use of passwords.
7) Third party checks:
If you are using a third party to store data or to provide remote support ask them to provide you with a list of controls that are in place to protect you from a security point of view. If they tell you they are super secure and you need to trust them get worried because this means they haven't got anything to give you and your cloud solution is some guy with a laptop and 15 housemates that use it to stream illegal movies.
8) Document everything!
You should document all of your procedures and workflows because if one guy has all this information and gets hit by a bus your knowledge is dead. Good documentation is key to smooth transition and helps aid security through clarity.
If you get all the above in order you will have made a decent move towards securing your business at a minimal cost, of course there is plenty of room to do more but the hardest part is always to make a start.
Showing posts with label Google access. Show all posts
Showing posts with label Google access. Show all posts
Thursday, 16 February 2017
Wednesday, 13 July 2016
Pokemon Go grants itself "full access" to your Google account
In one of the most bizarre events in recent history Nintendo's new location-based augmented reality game Pokémon GO
has been making the news since it launched a few days ago. People are
so excited to catch 'em all that Nintendo's market-value has jumped
to $7.5 Billion (£5.8 Billion) in just two days – the highest surge since 1983.
Due to the huge interest surrounding Pokémon GO, even hackers are using the game's popularity to distribute malicious versions of Pokémon GO that could install DroidJack malware on Android phones, allowing them to compromise user's devices completely. Now I have watched the videos of grown men running around with this game and I must say this might just be the end for society. If you do actually care this app also comes with a huge privacy concern that if your not to busy trying to catch imaginary Pokemon then you should take a break and fix it. The latest threat is related to the privacy concerns raised about the iOS version of the official Pokémon GO app.
According to an article via The Hackers News: Adam Reeve labeled the game "malware," saying that Pokémon GO is a "huge security risk" as the game, for some reason, grants itself "full account access" to your Google account when you sign into the app via Google on iPhone or iPad.
Any app, according to Google's own support page, that granted Full account access, can:
If you want to fix this there are two things that you can do:
The second and simplest approach is to use a burner Google account. For this, create an all new Google account, with nothing in it, and use this account to sign into Pokémon GO as well as other apps that you may find doubtful.
Due to the huge interest surrounding Pokémon GO, even hackers are using the game's popularity to distribute malicious versions of Pokémon GO that could install DroidJack malware on Android phones, allowing them to compromise user's devices completely. Now I have watched the videos of grown men running around with this game and I must say this might just be the end for society. If you do actually care this app also comes with a huge privacy concern that if your not to busy trying to catch imaginary Pokemon then you should take a break and fix it. The latest threat is related to the privacy concerns raised about the iOS version of the official Pokémon GO app.
According to an article via The Hackers News: Adam Reeve labeled the game "malware," saying that Pokémon GO is a "huge security risk" as the game, for some reason, grants itself "full account access" to your Google account when you sign into the app via Google on iPhone or iPad.
Any app, according to Google's own support page, that granted Full account access, can:
"See and modify nearly all information in your Google Account (but it can't change your password, delete your account, or pay with Google Wallet on your behalf)."What exactly this means is quite unclear, but Reeve claimed that the Nintendo's Pokémon GO – developed by Niantic – can now:
- Read all your email.
- Send email on your behalf.
- Access your Google Drive documents (including deleting them).
- Look at your search history as well as Maps navigation history.
- Access your private photos stored in Google Photos.
- And a whole lot more.
If you want to fix this there are two things that you can do:
- Head onto your Google account permission page and look for Pokémon GO.
- Select Pokémon GO Release and click "REMOVE" button to revoke full account access.
- Launch Pokémon GO on your device and confirm it still works.
The second and simplest approach is to use a burner Google account. For this, create an all new Google account, with nothing in it, and use this account to sign into Pokémon GO as well as other apps that you may find doubtful.
Subscribe to:
Posts (Atom)