10 Cybersecurity Lessons We Should Have Learned in 2015

10 Cybersecurity Lessons We Should Have Learned in 2015

Like most things in our businesses, if something is staring us in he face that particular day it probably goes unnoticed. We find, with our clients, that cybersecurity is no exception. With the number and severity of threats lurking on the Internet of Things, cybersecurity should be given a more prominent role in monthly reviews, strategic planning, and even budgetary meetings. Below are 10 things that 2015 should have taught us, but probably didn’t.

  1. Keep Backups. No, Really. Ransomware was everywhere in 2015, and there’s no reason to expect its growth will stop or slow down. Research found that ransomware use was growing, the malware itself was growing more sophisticated, the business models were becoming more varied, it had an exceptionally high return on investment, and many targets were helpless against it. Even several police departments simply paid up when they couldn’t recover their assets any other way.
  2. Extortionists Have More Than Ransomware At Their Disposal. In addition to the criminals using ransomware to extort mpney from victims, there are bad guys gathering their Bitcoins from DDoS, doxing, or other cyber-enhanced blackmail threats. The Ashley Madison breach gave extortionists, blackmailers, and the average unscrupulous capitalist plenty of opportunities to collect.
  3. Watch Out For Insiders. Another reason to manage privileged accounts is that not all who are privileged are trustworthy. 2015 kicked off with news that Morgan Stanley fired a wealth advisor who accessed data on about 10 percent of its client roster and publicly posted details for 900 of them online.
  4. Don’t Get Sick. Over the past 10 years, more than one-quarter of reported data breacheshappened in the healthcare industry, according to Trend Micro. This year, the PHI exposures at medical insurers were of gobsmacking dimensions — 10 million records exposed by Excellus Blue Cross Blue Shield (BCBS), 11 million by CareFirst BCBS, 11 million by Premera BCBS, 250,000 by LifeWise, and a stomach-turning 80 million from Anthem Healthcare.
  5. Flash Will Survive The Apocalypse. Adobe Flash has been riddled with critical vulnerabilities this year, including some zero-days revealed in the Hacking Team leaks. US-CERT released an advisory, Mozilla stopped running Flash by default, and Facebook’s security chief demanded Adobe announce a date of-death for Flash. Yet, the technology persists. So, Flash is in the same category as cockroaches and ticks. Everyone wants them to die, but try as they might, they just can’t kill them. So, really, if you want your manifesto to still be viewable after the collosal supervolcano or sentient robot uprising, build it in Flash.
  6. Government Jobs Aren’t Really So ‘Secure’. The breach at the U.S. Office of Personnel Management resulted in the exposure of personal data on anyone who’s had a background check via OPM going back to the year 2000. In all, 21.5 million people’s Social Security numbers, residency and employment history, family, health, and financial history as well as fingerprints on 5.6 million people were exposed.
  7. Trust Apple, But Not As Much. Although security researchers agree that the state of Apple security is still far better than Android, but the trusted development environment took some serious hits this year. XCodeGhost snuck Trojanized iOS apps into the official App Store, a variety of proof-of-concept exploits in Gatekeeper allow unsigned code to run on OS X, and malware for iOS and Mac is increasing.
  8. Take The Train Instead. This was the year when car hacking really got taken seriously. Security researchers Chris Valasek and Charlie Miller conducted a controversial demonstration taking remote control of a Jeep Cherokee and bringing it to a screeching stop. The Virginia State Police showed their cruisers could be compromised and researchers showed SMS messages sent to insurance dongles can kill brakes on cars. The issue got so unavoidable that Chrysler recalled 1.4 million vehicles and Intel founded a Car Security Review Board.
  9. Everyone Could Be A Target Of Cyber Espionage. Whether it’s the St. Louis Cardinals hacking the Houston Astros,cybercriminals attacking Kaspersky Lab to stay ahead of their threat intelligence, or operators of a shadowy illegal online gambling businesshacking their third-party software provider to make sure their work for a competing gambling company wasn’t a threat to their business, the takeaway is that cyber-espionage can happen to anyone.
  10. Beware The Thing. Cars and drones, Fitbits and smart fridges, baby monitors and Hello Barbie, satellites and smart cities…security vulnerabilities were found all over the Internet of Things this year. The coolest hacks this year were all at that intersection between the physical and the virtual and the FBI even came out with a warning about the cybersecurity risks of IoT devices. Luckily, new organizations are arising to try to fix IoT security before it gets completely out of hand.
user-gravatar
George McCracken
No Comments

Post a Comment

Comment
Name
Email
Website