Cybersecurity is a constant battle as there are always new threats to consider and safeguard against. With companies and individuals storing an incredible amount of personal and business data on their devices, keeping this information protected requires rigid security practices.
However, one of the most challenging cyber threats to prevent is zero-click attacks. These are especially dangerous because, unlike more common cyberattacks, a victim’s devices can be compromised without them ever knowing. So, what can be done?
Here, we explore how to recognise these malicious malware attacks while offering tips that help prevent your devices from being exploited.
Nettitude
Recent Posts
Topics: cybersecurity, zero click attack
Security Considerations in Amazon Web Services (AWS)
What is Amazon S3?
What is Amazon EC2?
Misconfigurations in AWS EC2
AWS Identity and Access Management (IAM)
What is Amazon RDS?
There are several reasons to adopt cloud services, and there has been a growing increase in total spend on cloud services over the last decade. Cloud computing offers speed and agility, competitive pricing models to deploy various IT resources and flexibility.
The cloud services market share is dominated by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Of the three main providers, AWS currently occupies the highest percentage of the market as of 2022. This blog focuses on security within AWS specifically, highlighting security issues within common services as well as secure design choices and practices.
AWS has hundreds of services within its global infrastructure. These can be broken down into high-level services such as Storage, Compute, Databases, and Security, Identity & Compliance. Below are some examples of the most popular services that sit within these class types:
● Storage – Simple Storage Service (S3)
● Compute – Elastic Compute Cloud (EC2)
● Security, Identity & Compliance – Identity Access Management (IAM)
● Databases – Relational Database Service (RDS)
Topics: cloud security, AWS
Building Baseline Security in the Cloud with Policies
AWS (Amazon Web Services) policies
Microsoft Azure policies
How implementing baseline policies in a cloud environment helps
Cloud security can often feel like an overwhelming practice. Cloud environments can employ many resources with varied functions, leading to the complicated task of securing these resources. Implementing baseline policies within your cloud environment can simplify the task of implementing common security practices uniformly across all resources. Cloud providers simplify this practice through policy-checking services. In Amazon Web Services (AWS), the service is called Config, while in Azure the service is called Policy.
Within AWS Config and Azure Policy, there are policy deployments in line with the Center for Internet Security (CIS) recommendations. The CIS issues a document with configuration recommendations for common services within cloud deployments. These services include identity management, compute, storage, networking, monitoring, and database configurations. For AWS, the list of recommendations is approximately 60 items. Instead of examining each item within a document, using AWS Config or Azure Policy can automate the process and alert you to many misconfigurations within minutes. This offers quick and easy deployment of baseline security configurations and continuous monitoring of the compliance state of those policies within the environment.
The following sections detail how to implement these baseline policies for AWS and Azure. It should be noted that some costs may be incurred related to the use of these services.
Topics: cloud security, Microsoft Azure, AWS
A pretext is designed to convince a target to divulge information to an attacker. This information could include, but is not limited to, requests for company documents, user credentials, and personally identifiable information. A successful pretext convinces the target that a request is legitimate and the information being asked for is reasonable.
Topics: pretexting, pretexting attack, what is pretexting, how to prevent pretexting, phishing
Ransomware attacks have continued to evolve into one of the most significant risks for every organisation. In fact, 37% of organisations said they had been the victim of a ransomware attack in 2021.
So, how did we get here and how is ransomware continuing to evolve today? We answer these questions and explain how you can make your business more resilient to ransomware attacks.
Topics: ransomware, how to prevent ransomware, how to avoid ransomware, how to stop ransomware, Protect from ransomware, Ransomware attack
When a ransomware attack hits, time is of the essence to limit the impact on your organisation's operations. It has been said that prior preparation and planning prevents poor performance, helping with time management and ensuring that tasks are completed most efficiently.
The threat from ransomware continues to develop significantly. Previously, one or two endpoints would be compromised and have ransomware deployed to them. Now, attackers are compromising entire networks and deploying ransomware to every endpoint within the network.
Topics: ransomware, what is ransomware, how to prevent ransomware, how to avoid ransomware, how to stop ransomware
74% of organisations lack a cyber incident response plan, according to Ponemon Institute. This is an incredible figure given most boardrooms would cite cyber-attacks as the biggest risk to their business. Quite often, leaders do not know where to start when it comes to cybersecurity. With the risk feeling widespread, where do you focus your resources?
A documented cyber incident response plan is a must for every business. Having this in place will accelerate your response to a significant attack and minimise damage, and it is not as complex as you think to create one.
Topics: Cyber Incident Response Plan Checklist, Cyber Incident Response Plan, Cyber Incident Response Plan Template, Example Cyber Incident Response Plan
Steps to reduce alert fatigue in your cybersecurity team | Nettitude
Effective cybersecurity relies on your team being alerted to potential issues within your systems and networks. However, the sheer number of alerts generated by improperly configured cybersecurity technology and frameworks causes analysts to develop alert fatigue, as countless false positives and minor issues lead to significant disruption and distraction.
With so many potential threats and a limited number of resources, it can be difficult to prioritise which alerts to investigate. As a result, your team may become overwhelmed and start to ignore or dismiss potentially serious threats. In addition, constantly responding to false positives can take valuable time away from other tasks, such as investigating potential incidents. So, what can we do to resolve the challenging problem of alert fatigue?
Topics: Cyber Security, cybersecurity, Threat Landscape, Alert Fatigue
How to Reduce Your Attack Surface - Just How Big Is It? | Nettitude
Many organisations struggle to quantify the full extent of their threat landscape and attack surface. This is compounded by issues surrounding vulnerability prioritisation, which has become a problem. It causes headaches due to several factors such as cost, disruption, and time. Organisations, therefore, need to start adopting a risk-based approach to influence where effort should be invested to reduce the attack surface and the risk posed to the organisation.
Organisations need to start asking themselves what might happen if an asset were to be compromised: what information does that asset hold and what problems could that cause to the organisation if it was suddenly unavailable (or worse stolen) and in someone else’s hands? This approach helps with the plight of remediation, but it’s not enough.
Topics: Managed Vulnerability Scanning, Vulnerability Management, Vulnerability Scanning, Managed Security Services, Attack Surface Reduction, Reduced Attack Surface
If you do not know your risks, how can you be safe? This reality is prompting many businesses to set up regular vulnerability scanning to defend against cybercrime.
A 2021 cybersecurity report by the UK Government states that 39% of UK businesses reported a security breach in the last 12 months. Apparently, 21% lost money, data, or assets. The risk is real and 77% say it is a huge priority for directors.
Cybercrime can be indiscriminate. Whatever size your business is, you need to know how to scan for network, system, and website vulnerabilities that leave you open to attack.
Topics: Managed Vulnerability Scanning, Vulnerability Management, Vulnerability Scanning, Managed Security Services, Vulnerability Scan Tools, Types of Vulnerability Scanning