Cybersecurity

270

Solutions

29

Articles & Videos

624

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

Only 10 days left to sign up for our ransomware prevention and preparation Course of the Month for June. With a 300% increase in ransomware attacks from 2015 to 2016, it is vital to decrease your vulnerability to the next attack and enhance your security by enrolling today.




5
 

Expert Comment

by:Josh Petraglia
Signed up. What a perfect topic to cover!!!
2
Comprehensive Backup Solutions for Microsoft
LVL 4
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

A $1 million payout in a ransomware case?! Well crap... That's worrisome. What'll the hackers do with that money? How many new attempts will this incentivize? What would you do in their place?

https://arstechnica.com/security/2017/06/web-host-agrees-to-pay-1m-after-its-hit-by-linux-targeting-ransomware/
4
 
LVL 11

Expert Comment

by:Maclean
Restore last good version, apologize to clients, and probably end up losing clients would be the proper thing to do.
I would assume that if it was done due to damage control, paying up would lose me more clients and face then dealing with the issue at hand best as one can. This is a terrible incentive to these type of ransomware developers. They might now target this webhost on purpose in the future.
2
 
LVL 6

Expert Comment

by:Nicholas
And the reality is now that this is public news they will lose all their customers anyway and probably be outta business within a month

If some hosting company can afford to pay that much money to get their data back they should have been able to employ someone for a lot less money to make sure it didn't happen in the first place
4
UpGuard's cyber risk analyst, Chris Vickery, discovers 198 million US voting records in an Amazon S3 bucket freely available online. One particular spreadsheet also calculates the voters probabilities for situations such as "how likely you are to have voted for a certain presidential candidate".  This breach is another reminder of how important personal data security is.
5
 
LVL 6

Expert Comment

by:Nicholas
Having this data in a public cloud provider is wrong to start with no?
After a quick glance through the article the data wasn't even encrypted.
1
 
LVL 17

Expert Comment

by:Lucas Bishop
Millions of dollars worth of data analysis, available for anyone to download for free. Brilliant!
1
0
DNS-Protection-with-ConnectWise.png
It's always exciting around here! We're thrilled to expand our partnership with ConnectWise to offer customers better protection and performance. To get insight into why this matters, we sat down with George Anderson, Webroot’s product marketing director for business solutions, and Gavin Gamber, vice president of Channel Sales and Alliances at ConnectWise.
 
What is DNS Protection? Why is it important? Why do ConnectWise partners need this?  
 
Read more here.
4
Hackers.jpg

Treat 64-bit malware like any other possible threat. Invest in a credible threat intelligence platform, understand your organisation's risk tolerance level and plan accordingly. Be smart and be alert. Keep systems up-to-date, understand what devices need an internet connection, review user permissions and privileges, create and execute a backup strategy. But mostly importantly continue to educate your users about cyber dangers, and test your incident response and disaster recovery plans regularly.

Read more here.
2
 
LVL 1

Expert Comment

by:Juana Villa
Your link is not working, I think you meant "http://wbrt.io/xm9e"
Anyway, I agree as users we all need to know how to protect our data.
1
 

Author Comment

by:Drew Frey
Great catch! Thanks for keeping me a watchful eye out.
1
NYS 20th Annual Cyber Security Conference

I will be attending this conference in Albany, N.Y. this Wednesday and Thursday.   If you are going to be there, ley me know (maybe we can meet).  

Over the years I have become more involved in security related areas of information technology. I hope to learn more/ keep up to date by attending this conference.
10
 
LVL 6

Expert Comment

by:Brian Matis
That sounds great, Thomas! I'm a huge fan of the Socratic method (to the point where I get worried some people may try to poison me one day... j/k ;-) And thinking strategically about anything can be quite a challenge, but an increasingly important one as more and more of the tactical type work is moving entirely into automation.

Not familiar with Bloom's Taxonomy; I'll have to go look that one up...

Looking forward to the summary!
0
 
LVL 28

Author Comment

by:Thomas Zucker-Scharff
My summary of the 20th Annual New York State Cyber Security Conference & 12th Annual ASIA conference

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compliance issues with which they have to deal.  If those do not apply to you, this conference may have limited application as well.

I did enjoy putting some faces to people I had only corresponded with.  I also wanted to hear as much as possible about ransomware (these presentations turned out to be only okay), and cryptography (not a gripping presentation – it was a presentation of thesis work and ongoing research – but nonetheless very interesting).  They did a good job of setting  you up for the days events with a decent Keynote speaker.  The lunch speakers were not as polished, but did have good things to say.

I enjoyed going around to the vendors , even if their swag was not class A stuff. (some had excellent stuff while others had none – the full gamut)  

I have to say again that the highlight of the conference, for me, was the very non-technical, and only slightly security related talk by Christie Struckman of the Gartner Group, session 4 on the first day.  I would encourage anyone in a leadership position to check it out.  I have asked for her slides and will try to make a pdf of them available if she is amenable to that.  My takeaway on that talk was: There are leaders and there are Bosses.  The leaders help their teams think about solutions and then make decisions, the bosses make decisions and tell their teams to carry them out.  I think the quote she used at the beginning was excellent:

socrates-quote.jpg
2
Every 10 seconds, a consumer gets hit with ransomware. Enroll in June’s featured Course of the Month to learn the basics of ransomware, how it works, how to prevent it, and what to do if you’ve been infected. Premium members, Team Accounts, and Qualified Experts will enjoy this free course written by our resident security expert, Thomas Zucker-Scharff. Learn more and enroll today!

facebook-ad-1200x628.png
6
The recent malware attack brings to light the need for more security and privacy online. The Experts Exchange community has prepared for this shift with the release of anonymous questions--a feature for Premium Members, Team Accounts, and Qualified Experts.
Benefits include:
Masked user identities. These questions are inaccessible to all search engines and questions will not visibly link back to profiles. Logged out users cannot see these questions at all.
Sensitive information removed from questions, by severing ties that could connect you back to your employer or a project.
Freedom to explore different tech topics you may be interested in but have before been afraid to look into.
To learn how to ask anonymous questions check out this video! https://www.youtube.com/watch?v=uFJF70wsd4c
8
3
Three Reasons Why Backup is Strategic
LVL 4
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

The global technology community is grateful for Marcus Hutchins and his team of tech professionals for their genius download of the malware domain and sinkhole use to stop the international Ransomware attack. The media is calling him an accidental hero, but we will continue to refer to him as an expert! However, as stated by Hutchins, this sinkhole is only a fix to one sample of the WannaCry attack. To protect yourself from further attacks, please patch your systems as soon as possible. More on the specifics of both the fix and the WannaCry Ransomware attack found in this link.
wannacry.jpghttps://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
10
Given the global WannaCry crisis that's been developing over the last few days, this morning Experts Exchange fast-tracked the Ransomware proposed topic and made it official.

So as you discuss the impact of WannaCry, and share news and advice related to it or Ransomware in general, be sure to use the new topic in your posts, questions, articles or videos. And special thanks to all of the IT Experts that are helping to combat this menace!
10
 

Expert Comment

by:Daniella Barion
It's great, let's share ideas and discuss security matter.
1
4
 

Expert Comment

by:Daniella Barion
Information is one of the greatest treasures and has a different value for individuals, companies or government so it becomes strategic to preserve this security. Unfortunately, the vulnerability is real.
0
5
ESET are offering free online Cyber Security Awareness Training to educate employees about the dangers online.  If you're interested in knowing a little more about the very basics of Cyber Security you can have a look at the course here:
https://www.eset.com/us/cybertraining/
5
 
LVL 1

Expert Comment

by:Juana Villa
WOW! That is pretty cool. Thanks for sharing :D
1
 
LVL 22

Author Comment

by:David Atkin
You're welcome Juana :)
1

Cybersecurity

270

Solutions

29

Articles & Videos

624

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.