10 May
Ransomware is costing Millions of dollars per day.

Ransomware is costing Millions of dollars per day.

Written by 

Albert E. Whale, CEH CHS CISA CISSP BSEE
May 9, 2021

Ransomware is costing Millions of dollars per day. Maybe you think that I’m exaggerating, I’m not. The cost in the Healthcare industry alone in 2020 was over $21 Billion, that’s only in Healthcare.  What happens to your business after the Ransomware breach?  Your costs go up, people lose their jobs, and your clients seek other businesses to deal with, right?

Recently ‘Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks’


You’ve probably seen Disaster Girl before, haven’t you?

IT Security Solutions has reported issues with many different Routers, Wireless Access Points, and other devices inside the networks.  This is the big problem because traditional tools are unable to discover the Built in Malware, the Configurations deployed, or any number of other factors.  

What are you doing to protect your business environment?  If your plan is the Legacy Firewall or Virus Scanners on the end points, then you are only looking for tomorrow’s attack.  

What happened yesterday?  Did you or your staff report issues inside the environment which may be the start to Ransomware?  I’m guessing, probably not.  Please don’t expect the SIEM that you invested in to identify the security issues either.  These devices are typically programmed from internal teams, and they don’t have 100% coverage on the logfiles they are reviewing.  

At best, they can tell you about the activities which already occurred, they stopped nothing.  Is that the plan?  Review the logs to determine what could have happened?  In the meantime, the average breach costs approximately $4 Million dollars, takes MONTHS to identify and 6 to 18 months to fix.  Can your business hold its breath for that long?  Can our Country hold its breath?

Recently the Colonial Pipeline breach force the shutdown of country’s Oil, Gas & Diesel distribution network.  

Cyberattacks Against U.S. Infrastructure Are ‘Here To Stay’ After 100-Gigabyte Colonial Pipeline Hack, Biden Official Warns – forbes.com

I’ll bet you thought that your backups would protect your business.

No Timeline for Massive Oil Pipeline Restart Has Traders Worried – Bloomberg.com

Hot Backups are not the answer.  If they were, Ransomware would not be as effective as it already is.  These issues outline serious cybersecurity matters in our businesses and our National Critical Infrastructure.  If we continue to the same thing over and over again, we will continue to have the same results.


Insanity, doing the same thing over and over again and expecting different results. – Albert Einstein

If your business hasn’t changed the strategy for your organization, we can help.  Today can be the first day, for your organization’s stability.  Let us have a conversation together and develop the strategy that will work for you.

IT Security Solutions recommends at least an annual Security assessment to determine the security posture and formal detection of internal activities.  While this is the minimum recommendation, even doing the Minimum does not detect the activities as well as out continuous monitoring solutions for our clients.

IT Security Solutions, Inc. is a Pittsburgh based technology company with 25+ years of cyber security domain expertise catering to businesses of all sizes. The solutions offered range from technology security audits and penetration testing to continuous network scanning. The company recently launched ITS Safe™, a proprietary managed security solution that blocks hackers from attacking networks – the largest IT security threat facing businesses today.

Contact IT Security Solutions to discuss how a paradigm shift will benefit your company today.

www.IT-Security-Solutions.com  www.ITS-Safe.com

412-889-6870  

info@IT-Security-Solutions.com

15 Dec
Can you TRUST your vendors?

The FireEye and Solarwinds breach.

I was drinking my coffee this morning and I read that FireEye was Breached.  What?  I read that a second time.  This time I also found out that their testing tools were also stolen.  This is bad, I thought, because FireEye is used in many industries, but to suffer a Breach and lose your testing tools will certainly compromise their reputation.

How did this happen?

According to FireEye’s website, this came as part of a Global Campaign[1]. More importantly, they are indicating that users of the SolarWinds Orion network monitoring product was the source of the Breach.

The issue here is that they gained access to the internal resources and utilized these resources internally to hide and disguise their activity. They indicated that these activities occurred earlier this year, sometime in the Spring of 2020.

When was the last time your company had a formal security assessment?  How about an assessment for the software you use internally as well?  While you cannot be everywhere all at the same time, mandating security assessments for the vendor tools you use is a good way to delegate.   Don’t forget to have an assessment performed on the network, your design, and security policies and procedures.

Everyone thinks that they have it covered, until they don’t. It’s what they are missing that causes the Breach.

Everyone thinks that they have it covered, until they don’t. It’s what they are missing that causes the Breach.  While we understand that no one wants to be told that they missed something.  

Which is better

  • Finding a problem and fixing it before a Breach,
  • Announcing it to the world that you’ve had a Breach?

… the cost of a Breach is very costly usually $200k to $3.8M or more.  These are also known as Business ending events.

The cost of a Security Assessment is generally a fixed priced and is easily absorbed by the business.  However, the cost of a Breach is very costly ($200k to $3.8M or more), and it is shared by the business and all of its clients.


Security is our Business

There are many ways to effect change in the organizations.  The most beneficial are the ones that are driven from the top down.  While organizations were built to support the business internally, the advancement of the attackers to gain access to the internal resources has changed the way we need to work on Cybersecurity.

Here are a few quick hits that will move the needle for you more in your favor.

  • Make time for a Security Assessment as recommended
  • Develop your company’s Policies and Procedures
  • Employ a comprehensive monitoring appliance to maintain your company’s security.

As we have seen in the FireEye Breach and other Breaches, the attacks are from the inside – out.  Meaning that they were able to get past the Firewalls, and not get detected by Virus scanners or other current technologies. These tools are all based on their ability to identify new attempts with the current Known threats.  That leaves all of the previously successful Breaches, and attacks using unknown threats exposed.

The ITS SafeTM security appliance includes out of the box capabilities to start working right away.  ITS Safe is built to Detect, Defend against and Destroy Intruders.  We are shifting organizations from a traditional security approach to continual assurance.

By implementing ITS Safe, the detection of activities inside allows us to eliminate the threats that other tools miss entirely.  Get ITS Safe Today to keep your business safe.

Minimizing the threats of attacks on employees and businesses are the basis for the development of the ITS SafeTM Managed Security Appliance.  Because attacks can happen anytime, the ITS Safe appliance continually monitors activities inside the network for both Inbound and Outbound traffic.

Sign up today to get a complimentary consultation

https://its-safe.it-security-solutions.com/managed-security-service-for-your-organization

https://IT-Security-Solutions.com –   Contact me now

We are your trusted cyber security partner.

[1] A Global Campaign makes sense because they are all connected to the Internet, and that’s still a Global network, if my memory serves me right.

26 Mar
Iron City Risk Avengers – Week of March 11th to 15th

In the News this week, RDA Conference & my conference at Duquesne emphasize comprehensive security for small businesses, PA is #2 for the worst in Cyber security, Georgia County pays $400K for Ransomware, New POS Malware, Citrix is hacked. Lastly, if you are not testing your security, guess who is.
Wow! What a busy week.

Connect with us:

Albert Whale – Albert.Whale@IT-Security-Solutions.com
Jim Loeffler – jaloeffler@getintune.com

The mission of the Risk Avengers podcast is to discuss current cyber security issues, procedures for protecting your business, as well as Compliance requirements for business owners.

Our 10 minute format is designed to make it easy for listeners to get up to date on the current People, Processes and Problems for your Business.

The show is Hosted by Albert Whale, Founder & CEO of IT Security Solutions, and Jim Loeffler, President of InTune Business Advisors.

Join us to discover the road for improved security and protecting your business, be it small or global.

The information discussed on this podcast is presented for informational purposes only. It is not intended as nor does it constitute specific information security or accounting advice and should not be acted upon as such.

21 Jan
A positive change, with Albert Whale and Jim Loeffler – Episode 8

This is the second episode for 2019, and what we are focusing on today is focusing on the positive effects for your business.  Are you the Weakest link? How do the attackers are get past your Firewall and Virus Scanners.

Here are two reasons:

• Hackers have the same tools.

• They know how to evade them.

  •  

Using the Internet allows attackers to follow you inside the firewall.

Facebook

Redit

Yahoo

Hotmail

Gmail

Read More “A positive change, with Albert Whale and Jim Loeffler – Episode 8”
15 Jan
The pain of staying the same, is worse than the pain of change – Episode 7

Today we are discussing the concept of change.  The title of the episode is called: “The pain of staying the same is worse than the pain of change.”  Most organizations fail to recognize that change is a process that makes improvements to the organization, instead of ignoring the problems and continuing to do the same things over and over again.  There is pending legislation that wants to fine or Jail CEOs that fail to do enough to protect the organization, and the data that they are using.

The mission of the Risk Avengers podcast is to discuss current cyber security issues, procedures for protecting your business, as well as Compliance requirements for business owners. 

Our 10 minute format is designed to make it easy for listeners to get up to date on the current People, Processes and Problems for your Business.

The show is Hosted by Albert Whale, Founder & CEO of IT Security Solutions, and Jim Loeffler, President of InTune Business Advisors.

Join us to discover the road for improved security and protecting your business, be it small or global.

The information discussed on this podcast is presented for informational purposes only. It is not intended as nor does it constitute specific information security or accounting advice and should not be acted upon as such.

http://traffic.libsyn.com/ironcityriskavengers/The_Pain_of_the_same_exceeds_the_pain_of_change.m4a

  • 1
  • 2
Sidebar: