29.03.2022 Views

CS Mar Apr 2022

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Computing<br />

Security<br />

Secure systems, secure data, secure people, secure business<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

The Cloud Conundrum<br />

Often hailed as the way forward, why is<br />

cloud sometimes poorly protected?<br />

IT equipment junked<br />

Many devices are dumped<br />

before end of working life<br />

Virtual world,<br />

real danger<br />

The Metaverse spells much<br />

promise - and many perils<br />

Global menace<br />

Vulnerabilities pave way for<br />

all-out ransomware attacks<br />

Computing Security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2022</strong>


comment<br />

ALTERING THE BALANCE OF POWER<br />

There is still a clear<br />

lack of diversity and<br />

inclusion in tech.<br />

Early in <strong>Mar</strong>ch, on<br />

International Women's Day,<br />

this discrepancy was<br />

highlighted, encouraging<br />

many to re-evaluate their<br />

organisations, hiring<br />

practices and more.<br />

As a female founder and<br />

CEO of a cybersecurity<br />

company, International<br />

Women's Day was<br />

incredibly important to Camellia Chan, CEO and founder X-PHY, a Flexxon brand (AIcybersecurity<br />

company) - pictured above. "I'm a firm believer that diverse talent is crucial<br />

to the industry, especially as we witness an upheaval in innovation and digital<br />

transformation," she states.<br />

Despite this, the number of tech roles held by women increased by a mere 2% in<br />

2021, she points out.<br />

How can a better balance be achieved? "We need to empower women from a young<br />

age and encourage them to be ambitious," she comments. "Seeing women in highpowered<br />

roles is excellent and proactivity is key to ensuring they stay there. Businesses,<br />

too, have a crucial role to play. Hiring and recruitment practices are incredibly important<br />

and, with visible female role models and leaders in the industry, we encourage women<br />

to envision a future in tech."<br />

Put simply, she adds, diverse talent brings new perspectives and innovation. "Talented,<br />

driven women - as well as employees of different ages, nationalities and domains -<br />

create an impactful environment by challenging norms, building competencies and<br />

championing excellence."<br />

While progress has been made, she concludes, "we need to remember there is still<br />

work to be done in the world of cybersecurity and tech. We must be more dedicated<br />

than ever to inspiring, encouraging and influencing women".<br />

Brian Wall<br />

Editor<br />

Computing Security<br />

brian.wall@btc.co.uk<br />

EDITOR: Brian Wall<br />

(brian.wall@btc.co.uk)<br />

LAYOUT/DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk)<br />

SALES:<br />

Edward O’Connor<br />

(edward.oconnor@btc.co.uk)<br />

+ 44 (0)1689 616 000<br />

Lyndsey Camplin<br />

(lyndsey.camplin@btc.co.uk)<br />

+ 44 (0)7946 679 853<br />

Stuart Leigh<br />

(stuart.leigh@btc.co.uk)<br />

+ 44 (0)1689 616 000<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexions Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK: £35/year, £60/two years,<br />

£80/three years;<br />

Europe: £48/year, £85/two years,<br />

£127/three years<br />

R.O.W:£62/year, £115/two years,<br />

£168/three years<br />

Single copies can be bought for<br />

£8.50 (includes postage & packaging).<br />

Published 6 times a year.<br />

© <strong>2022</strong> Barrow & Thompkins<br />

Connexions Ltd. All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent,<br />

in writing, from the publisher.<br />

www.computingsecurity.co.uk <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

@<strong>CS</strong>MagAndAwards<br />

3


Secure systems, secure data, secure people, secure business<br />

Computing Security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2022</strong><br />

contents<br />

CONTENTS<br />

Computing<br />

Security<br />

The Cloud Conundrum<br />

Often hailed as the way forward, why is<br />

cloud sometimes poorly protected?<br />

IT equipment junked<br />

Many devices are dumped<br />

before end of working life<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Virtual world,<br />

real danger<br />

The Metaverse spells much<br />

promise - and many perils<br />

COMMENT 3<br />

Altering the balance of power<br />

Global menace<br />

Vulnerabilities pave way for<br />

all-out ransomware attacks<br />

ARTICLES<br />

NEWS 6 & 8<br />

Ransomware's next big victim<br />

Malware steals details in '30 minutes'<br />

Return to office sparks danger fears<br />

Adarma research findings reveal<br />

ransomware disconnect<br />

Cloudflare swoops in to buy up Vectrix<br />

BETTER INFORMATION SECURITY:<br />

ALL IN THE MINDSET 10<br />

Paul Harris, Managing Director, Pentest<br />

Limited, discusses what is needed for<br />

successful information security<br />

improvement<br />

THE CLOUD CONUNDRUM 18<br />

Cloud, in its various shapes, is often hailed as<br />

the way forward - so why is it sometimes so<br />

poorly protected? Computing Security finds<br />

out where the cracks are in an increasingly<br />

cloud-laden age<br />

THE MSP ATTACK TARGET 12<br />

NHS BREACHES - WHAT NEXT? 24<br />

Managed services providers are fast<br />

NHS data leaks are all too frequent.<br />

overtaking their customers as a primary<br />

Particularly disturbing recently was how<br />

target, according to recent research<br />

the private medical information on tens of<br />

VIRTUAL WORLD, REAL DANGER 14<br />

thousands of patients was hacked. Have<br />

The Metaverse is a virtual reality world<br />

we all but reached the point where nothing<br />

characterised by a 3D multi-sensory<br />

can be protected anymore?<br />

experience - and many dangers<br />

ESET AND INTEL JOIN FORCES 15<br />

ESET has set out to integrate Intel Threat<br />

Detection Technology into its multilayered<br />

cybersecurity technology suite<br />

RANSOMWARE: GLOBAL MENACE 28<br />

GETTING RIGHT TO THE<br />

With many organisations using outdated<br />

HEART OF YOUR DATA 16<br />

and ineffective technology and corporate<br />

Businesses now have tools and software<br />

strategies, the fear is they could soon be<br />

platforms galore to run their operations.<br />

victims of an all-out attack<br />

Nick Evans, Sales & <strong>Mar</strong>keting Manager,<br />

Geolang, looks at what this means for<br />

data management<br />

UKRAINE’S CALL FOR CYBER HELP<br />

PROMPTS RAPID RESPONSE 21<br />

An international team commits to help<br />

defend the country from cyber-attacks<br />

LOGJAM OF CONCERNS 32<br />

Log4shell is a critical vulnerability in the<br />

I.T. EQUIPMENT JUNKED EARLY 22<br />

Many UK businesses admit to disposing<br />

logging tool Log4j, used by millions of<br />

of devices and IT equipment before they<br />

computers worldwide. Some months on,<br />

reach the end of their useful working life<br />

although fixes have been issued, they<br />

will still need to be implemented and it<br />

PRODUCT REVIEW 11<br />

appears this has been far from universal.<br />

Hornetsecurity 365 Total Protection<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />

4


news<br />

Jake Moore,<br />

ESET<br />

NEW MALWARE NEEDS 30 MINUTES<br />

TO STEAL YOUR DETAILS<br />

Anew malware only needs 30 minutes<br />

to steal your details. That's the new<br />

finding from Bleeping Computer.<br />

The widespread malware known as<br />

Qbot (aka Qakbot or QuakBot) has<br />

recently returned to light-speed attacks<br />

and, according to analysts, it only takes<br />

around half an hour to steal sensitive<br />

data after the initial infection.<br />

According to a new report by DFIR,<br />

Qbot was performing these quick datasnatching<br />

strikes back in October 2021<br />

and it now appears that the threat<br />

actors behind it have returned to similar<br />

tactics.<br />

SYSTEM PRIVILEGES GAINED<br />

The initial access is typically achieved<br />

via an Excel (XLS) document that uses<br />

a macro to drop the DLL loader on the<br />

target machine. This payload then<br />

executes to create a scheduled task via<br />

the msra.exe process and elevates itself<br />

to system privileges.<br />

Additionally, the malware adds the<br />

Qbot DLL to Microsoft Defender's<br />

exclusion list, so it won't be detected<br />

when injection into msra.exe happens.<br />

"The quicker malware can execute, the<br />

more chance it has of performing its<br />

mission before it is detected," says Jake<br />

Moore - pictured top - former head of<br />

Digital Forensics at Dorset Police, now<br />

the global cybersecurity advisor at ESET.<br />

"It is vital that people are aware of<br />

attachments in emails, even from known<br />

senders, and to question whether they<br />

really need to edit the document."<br />

GOVERNMENTS ARE RANSOMWARE'S NEXT BIG VICTIM<br />

Asustained meteoric rise in ransomware is identified in a<br />

Bill Conner, SonicWall<br />

new report, with 623.3 million attacks occurring globally.<br />

Nearly all monitored threats, cyberattacks and malicious<br />

digital assaults rose in 2021, including: ransomware,<br />

encrypted threats, IoT malware and cryptojacking.<br />

"Cyberattacks become more attractive and potentially more<br />

disastrous as dependence on information technology<br />

increases," states SonicWall president and CEO Bill Conner<br />

in the wake of the company's <strong>2022</strong> SonicWall Cyber Threat<br />

Report. "Securing information in a boundless world is a near<br />

impossible and thankless job, especially as the boundaries of<br />

organisations are ever-expanding to limitless endpoints and<br />

networks." SonicWall Capture Labs recorded 318.6 million<br />

more ransomware attacks than 2020 - a 105% increase.<br />

Ransomware volume has risen 232% since 2019.<br />

CLOUDFLARE SWOOPS IN TO BUY UP VECTRIX<br />

Cloudflare has acquired Vectrix, a provider of one-click<br />

visibility and control across their SaaS applications.<br />

Vectrix is reported to enhance Cloudflare's existing Zero Trust<br />

platform, Cloudflare One, by allowing security teams to scan<br />

third-party tools - including Google Workspace, GitHub and<br />

AWS - to detect and mitigate issues such as inappropriate<br />

file sharing and user permission misconfigurations.<br />

"Tens of thousands of organisations rely on Cloudflare One's<br />

Zero Trust platform to keep their teams and data secure,"<br />

says Matthew Prince, co-founder and CEO of Cloudflare.<br />

"Cloudflare's global network blocks attempts to compromise<br />

data at multiple levels while accelerating traffic to the<br />

Internet. We're excited to welcome the Vectrix team to<br />

Cloudflare to help deliver the fastest, most secure, and<br />

robust Zero Trust platform for the enterprise."<br />

BITDEFENDER PLEDGES SUPPORT TO UKRAINE<br />

Matthew Prince,<br />

Cloudflare<br />

Bitdefender is now offering its cybersecurity<br />

Florin Talpes,<br />

expertise to Ukraine, in the wake of the<br />

Bitdefender<br />

Russian invasion. The company has expanded<br />

its collaboration with Romania's National Cyber<br />

Security Directorate (DNSC) to provide that knowhow,<br />

threat intelligence and technology free "to<br />

support the people of Ukraine and its allies".<br />

Says Florin Talpes, co-founder and CEO of<br />

Bitdefender: "We are deeply saddened by the<br />

unprovoked brutal act of war against the free people of Ukraine and are committed to doing<br />

what we can to support them and our NATO allies. As proud Romanians and a company of<br />

global citizens, we stand with our northern neighbours who bravely fight for their future."<br />

6<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


Strengthen your data resilience with<br />

Immutable Backup from Arcserve<br />

Buy an Arcserve Appliance secured by Sophos,<br />

and get OneXafe immutable storage!<br />

Arm your business with a multi-layer protection approach to strengthen your overall data resilience. Arcserve<br />

brings you data backup, recovery, and immutable storage solutions with integrated cybersecurity to defeat<br />

ransomware and provide the best-in-class data management and data protection solution in the market.<br />

Arcserve UDP Data<br />

Protection Software<br />

Unified data and ransomware<br />

protection to neutralize<br />

ransomware attacks,<br />

restore data, and perform<br />

orchestrated recovery.<br />

Arcserve Appliances<br />

All-in-one enterprise backup,<br />

cybersecurity, and disaster<br />

recovery, with multipetabyte<br />

scalability.<br />

StorageCraft OneXafe<br />

Immutable Storage<br />

Scale-out object-based NAS<br />

storage with immutable<br />

snapshots to safeguard data.<br />

Get multi-layer protection!<br />

SCAN HERE


news<br />

THE CYBERTHREAT HEAT IS ON<br />

Menlo Security has identified a surge in<br />

cyberthreats, termed Highly Evasive<br />

Adaptive Threats (HEAT), that bypass<br />

traditional security defences.<br />

HEAT attacks are a class of cyber threats<br />

targeting web browsers as the attack vector<br />

and employs techniques to evade detection<br />

by multiple layers in current security stacks<br />

including firewalls, Secure Web Gateways,<br />

sandbox analysis, URL Reputation and<br />

phishing detection.<br />

HEAT attacks are used to deliver malware<br />

or to compromise credentials, which in<br />

many cases leads to ransomware attacks.<br />

In an analysis of almost 500,000 malicious<br />

domains, The Menlo Security Labs research<br />

team discovered that 69% of these websites<br />

used Highly Evasive Adaptive Threats tactics<br />

to deliver malware.<br />

These attacks empower bad actors to<br />

deliver malicious content to the endpoint<br />

by adapting to the targeted environment.<br />

Since July 2021, Menlo Security has seen<br />

a massive 224% increase in HEAT attacks.<br />

Says Amir Ben-Efraim, co-founder and CEO<br />

of Menlo Security: "An industry report found<br />

that 75% of the working day is spent in<br />

a web browser, which has quickly become<br />

the primary attack surface for threat actors,<br />

ransomware and other attacks.<br />

“The industry has seen an explosion in the<br />

number and sophistication of these highly<br />

evasive attacks," he continues, "and most<br />

businesses are unprepared and lack the<br />

resources to prevent them."<br />

ADARMA RESEARCH FINDINGS REVEAL RANSOMWARE DISCONNECT<br />

UK independent cyber threat management company<br />

John Maynard, Adarma<br />

Adarma has released research findings into how<br />

organisations perceive today's threats and how prepared<br />

they are to respond. "Ransomware is at epidemic levels and<br />

there is a disconnect between organisations' confidence in<br />

their levels of preparedness in the face of an attack and what<br />

we are seeing on the ground," says John Maynard, chief<br />

executive officer at Adarma.<br />

"With almost 60% of UK businesses with more than 2,000<br />

employees having experienced a ransomware attack, it is<br />

critical that we elevate this risk within our own organisations."<br />

The research - from a ransomware study of 500 C-level<br />

executives at UK businesses with over 2,000 employees -<br />

found that a worrying 58% of respondents have experienced<br />

a ransomware attack.<br />

RETURN TO THE OFFICE OF EMPLOYEES SPARKS MANY DANGERS<br />

With COVID restrictions lifted and employees<br />

increasingly returning to their offices, it's<br />

Chris Vaughan, Tanium<br />

important for IT teams to consider all the risks that<br />

are associated with this move, says Chris Vaughan,<br />

AVP - technical account management, Tanium. "It's<br />

time for IT departments to consider that employees<br />

returning to the office and reconnecting their devices<br />

to the corporate network may increase risks.<br />

Employees working off personal laptops, tablets and<br />

mobiles often carry higher cybersecurity risks, due to<br />

issues like not having up to date patches installed.<br />

"There is a possibility that they will unknowingly bring<br />

in devices that are infected with malware, trojans,<br />

viruses etc that have laid dormant until this point,<br />

ready to spread when an opportunity occurs."<br />

OLD I.T. EQUIPMENT DITCHED PREMATURELY, ACCORDING TO NEW STUDY<br />

Anew study by EuroPC has revealed that nearly<br />

three quarters of UK business owners throw<br />

their old or broken IT equipment away, with<br />

laptops, servers and routers the most common<br />

items disposed of.<br />

Moreover, 59% of UK businesses have thrown<br />

away a piece of equipment before it broke and<br />

still had life left in it. More than half surveyed<br />

admitted that they switch out their IT equipment<br />

and devices every three to five years, on average.<br />

More encouragingly, some 87% of business owners surveyed confirmed that they want to<br />

make greener tech choices in the future.<br />

8<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


ehavioural insights<br />

INFORMATION SECURITY<br />

IMPROVEMENT - IT'S ALL<br />

IN THE MINDSET<br />

PAUL HARRIS, MANAGING DIRECTOR<br />

AT PENTEST LIMITED, TALKS ABOUT<br />

THE MINDSET THAT IS NEEDED FOR<br />

SUCCESSFUL INFORMATION<br />

SECURITY IMPROVEMENT<br />

Whether you're looking to get fit,<br />

learn a new language or improve<br />

your information security, starting<br />

any improvement process can be difficult.<br />

You're going to have to learn skills,<br />

understand new concepts, think about<br />

things differently and, most importantly,<br />

put the effort in. It's not going to be easy,<br />

but with consistent effort in the right areas,<br />

improvements will follow.<br />

However, for many, improvement efforts<br />

aren't consistent. Many do the hard work of<br />

getting started, achieve some of the desired<br />

benefits and then think it is time to ease<br />

off, to take a foot off the accelerator and<br />

continue the same process. Improvements<br />

will surely continue, right? Wrong - that's<br />

where the improvement process slows<br />

down or even comes to a grinding halt.<br />

IMPROVEMENT NEVER STOPS<br />

The truth is that the improvement process<br />

never truly stops. One week you're riding<br />

high, feeling like you've mastered it, the next<br />

week you realise you've barely scratched the<br />

surface. Perfection is unattainable. That<br />

'perfect' body is always just out of reach,<br />

fluency in a second language doesn't mean<br />

that you know everything and being 100%<br />

secure just isn't possible.<br />

The improvement process should never be<br />

about achieving perfection. It's about having<br />

a growth mindset, one that embraces<br />

challenges and effort, striving for progress,<br />

rather than perfection. You only have to look<br />

at some of the world's top-performing teams<br />

and organisations to see this mindset in<br />

action. Yes, they demand results, but it isn't<br />

about seeking perfect results; it's about<br />

challenging themselves to do better, time<br />

and time again. If they're not moving<br />

forward, then they're falling behind.<br />

When it comes to information security, this<br />

progressive mindset has been one that has<br />

been developing, albeit slowly. For many<br />

years, information security was seen as<br />

a nice to have and, if you didn't have<br />

dedicated security personnel, or a large<br />

security budget, then the chances are<br />

security was seen as an afterthought. But<br />

times have quickly changed, end users are<br />

now increasingly aware of their data and<br />

how it is protected, clients and suppliers are<br />

now demanding robust security assurances<br />

before entering into contracts, there is<br />

increased awareness of the impact successful<br />

breaches can have and regulations such as<br />

GDPR have quickly pushed information<br />

security up the agenda.<br />

'TICK-IN-THE-BOX' EXERCISE<br />

But there is still a lot of work to be done;<br />

many organisations still see information<br />

security as a tick-in-the-box exercise and<br />

many have plateaued when it comes to<br />

their improvement efforts. Any security<br />

improvement work is better than none,<br />

but basic checks and comfortable well-worn<br />

processes won't deliver major improvements<br />

or supply the continuous assurances that<br />

many now need.<br />

Progressive companies are now demanding<br />

more, in terms of their security: from themselves,<br />

from suppliers and from security<br />

partners. And it's these companies that will<br />

see the greatest improvements. So, you<br />

have to ask yourself, have you got the right<br />

mindset when it comes to your information<br />

security improvement efforts and, if not, are<br />

you up for the challenge?<br />

10<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


product review<br />

HORNETSECURITY 365 TOTAL PROTECTION<br />

The concerted move to home and<br />

hybrid working practices has seen<br />

cloud services uptake increase<br />

exponentially and none more so than<br />

Microsoft 365. This popularity brings its<br />

own challenges, though, as Microsoft 365<br />

has become one of the top targets for<br />

cybercriminals and yet its email security<br />

features are comparatively limited.<br />

The safest course of action is to adopt<br />

a multi-layered defence, using a third-party<br />

specialist product to bolster Microsoft's<br />

native security tools, and Hornetsecurity<br />

365 Total Protection looks a great choice.<br />

It delivers a highly affordable solution<br />

that's easy to deploy and its wealth of<br />

email security measures include artificial<br />

intelligence (AI)-based protection.<br />

Three options are available with the<br />

Business package, providing all key threat<br />

defence measures, along with live email<br />

tracking, compliance filtering and content<br />

control. The Enterprise version includes<br />

ATP (advanced threat protection) cloud<br />

sandboxing, 10-year email archiving,<br />

forensics analysis tools, e-discovery and<br />

continuity services, while the Backup<br />

package adds automated backup and<br />

recovery for mailboxes, Teams, OneDrive<br />

plus SharePoint and even Windows<br />

endpoints.<br />

We tested 365 Total Protection in a live<br />

environment and found the 30-second<br />

deployment claim quite achievable. After<br />

changing our MX records, we used the<br />

registration link to authenticate with our<br />

Microsoft 365 account and sat back while<br />

the setup routine created the necessary<br />

connectors for inbound and outbound mail<br />

processing by the Hornetsecurity servers.<br />

Protection is instant, as the default<br />

settings enable full spam and malware<br />

protection, which block suspect emails<br />

before they reach your mailbox. Nuisance<br />

newsletters and mass marketing campaigns<br />

are handled efficiently by the Infomail filter,<br />

which uses over 15,000 heuristics to weed<br />

them out.<br />

We could keep a close eye on the action,<br />

as the cloud portal's live email tracking view<br />

shows logs of all inbound and outbound<br />

email activity. Emails are colour-coded to<br />

clearly show their classification and we<br />

could view all details about each one,<br />

including header information.<br />

The list can be refined with filters and<br />

each message provides a drop-down menu<br />

for adding the sender to deny or allow lists,<br />

reporting it as spam or releasing it with the<br />

Enterprise version, ensuring suspect emails<br />

are passed to the ATP service for further<br />

examination. Self-service features enable<br />

users to review emails in their personal<br />

portal and release them, if permitted,<br />

while regular reports showing spam activity,<br />

quarantined attachments, plus the reasons<br />

for rejection, are sent to each user.<br />

Performance is excellent as, during our<br />

month-long live tests, not a single suspect<br />

message slipped past Hornetsecurity's<br />

defences. The content control service<br />

also worked well, with it removing<br />

encrypted attachments and those<br />

containing executables or Word, Excel<br />

and PowerPoint files with macros.<br />

The compliance filter provides more<br />

granular control of emails by applying<br />

data leak prevention rules to outbound<br />

messages that look for keywords in the<br />

body, subject and attachment and rejects<br />

them, if a match is found. Another valuable<br />

feature is enforcing rule-based encryption for<br />

specific outbound messages, with recipients<br />

receiving a web link to view them securely.<br />

The Enterprise ATP service deals efficiently<br />

with emails containing malicious URLs,<br />

content or attachments and its URL rewrite<br />

feature opens a web session to a secure<br />

proxy to check where the link connects to<br />

and if threats are present. Spear phishing<br />

emails are dealt with by the targeted<br />

forensics filter, which identifies spoofed<br />

addresses, determines the message intent<br />

and sees if it is attempting to fool users into<br />

handing over passwords.<br />

Hornetsecurity 365 Total Protection<br />

impressed us with its swift deployment,<br />

extensive mail security measures and flawless<br />

performance. Furthermore, it's perfect for<br />

small business and enterprises alike, as all<br />

three packages are offered at very attractive<br />

prices.<br />

Product: 365 Total Protection<br />

Supplier: Hornetsecurity<br />

Web site: www.hornetsecurity.com<br />

Contact: +44 2030 869-833<br />

Email: sales@hornetsecurity.com<br />

Price: Business from £1.75 per user per<br />

month (exc VAT)<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

11


MSP insights<br />

THE MSP ATTACK TARGET<br />

MANAGED SERVICES PROVIDERS ARE QUICKLY OVERTAKING THEIR CUSTOMERS AS<br />

A PRIMARY TARGET, ACCORDING TO RESEARCH THAT HAS RECENTLY BEEN RELEASED<br />

Lee Robinson, Meta Eagle: the industry has<br />

a major role to play in guiding businesses<br />

down the right path.<br />

Attacks on MSPs - managed service<br />

providers - and their customers have<br />

almost doubled in the last 18 months,<br />

while security remains a top growth<br />

opportunity.<br />

Research conducted by an independent<br />

research firm and commissioned by N-able<br />

has found that managed services providers<br />

are quickly overtaking their customers as<br />

a primary target for cybercriminals. The<br />

findings also reveal that, while 90% of the<br />

surveyed MSPs suffered a cyberattack in<br />

the last 18 months, the number of attacks<br />

these MSPs are preventing has almost<br />

doubled, from 6 to 11.<br />

The report, 'State of the <strong>Mar</strong>ket: The New<br />

Threat Landscape', reflects the responses of<br />

500 participants - sourced from the US and<br />

Europe by an independent research team -<br />

about their security experiences before the<br />

COVID-19 pandemic and today to discover<br />

what had changed. There has been an<br />

assumption that the increase in hybrid<br />

working has meant a shift in how threat<br />

attackers are operating. N-able's research has<br />

been looking at that shift and what it means<br />

for MSPs.<br />

"MSPs have worked tirelessly throughout<br />

the pandemic to ensure that the businesses<br />

they support can stay online and connected<br />

as circumstances changed," comments Dave<br />

MacKinnon, chief security officer, N-able. "But<br />

the cybercriminals they're protecting against<br />

are working equally as hard to make use of<br />

these shifts against their targets. MSPs need<br />

to understand how the threat landscape<br />

continues to evolve, and make the changes<br />

needed to protect both their customers and<br />

themselves, and make the most of the<br />

enormous opportunity that enhancing<br />

security provides."<br />

The N-able research reveals:<br />

Almost all (90%) MSPs have suffered a<br />

successful cyberattack of some sort in the<br />

last 18 months and the same amount<br />

have seen an increase in the number of<br />

attacks they are preventing each month.<br />

On average, the number of attacks being<br />

prevented has risen from six to 11<br />

82% of MSPs have also seen attacks on<br />

their customers rise, though not quite at<br />

the same rate, with an average of 14<br />

attacks prevented per month<br />

While some progress is being made on<br />

important security processes, such as<br />

automating backup, many basics are still<br />

not in place. For example, while most<br />

MSPs offer two-factor authentication to<br />

their customers, only 40% have<br />

implemented it in-house<br />

DDoS and ransomware are among the<br />

main attacks MSPs are detecting, but the<br />

top attack remains phishing<br />

The effects of cyberattacks are wide<br />

ranging. Over half of MSPs say that<br />

financial loss and business disruption<br />

resulted after a cyberattack, but many said<br />

they have lost business (46%), suffered<br />

reputational effects (45%) and even seen<br />

their customers suffer a loss of trust<br />

(28%). While MSP budgets are only<br />

increasing at an average of 5%, they are<br />

focusing this extra investment on key<br />

areas, including data security, cloud<br />

security and infrastructure protection.<br />

There's good news, too. The majority of<br />

SMEs, seven in every 10, are planning to<br />

increase their security budget. The one outlier<br />

is France, but, even there, six in 10 SMEs are<br />

increasing their budgets, according to the<br />

report. "Of the rest, most are maintaining<br />

the same budgets, with only 2% looking to<br />

12<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


MSP insights<br />

decrease budgets. The increases are<br />

substantial, an average of 7%. Given recent<br />

circumstances, this is a solid investment by<br />

businesses in security. For MSPs, this means<br />

there is a big opportunity available. For many<br />

customers, they do not have to work hard to<br />

convince them that security is important and<br />

needs investment; rather, the conversation<br />

needs to be about where the money should<br />

be spent and how to make the most of this<br />

increase.<br />

"SMEs are keen to spend this increase on<br />

data security and cloud security, with identity<br />

access way down the priority list. MSPs<br />

should follow their customers' lead to an<br />

extent when offering additional and improved<br />

services, but should also remember that they<br />

are the experts."<br />

WHERE ARE MSPS SPENDING THEIR<br />

MONEY RIGHT NOW?<br />

The most common security tools receiving<br />

this extra investment include data security,<br />

cloud security, and infrastructure protection.<br />

Identity access is the least common<br />

investment. "The toolsets MSPs are<br />

implementing include data encryption,<br />

antivirus and multifactor authentication.<br />

There are also some interesting regional<br />

variations, with French MSPs investing heavily<br />

in VPNs, while the UK and Germany are<br />

putting money into email filtering solutions."<br />

"Automating key functions is critical to<br />

making headway against cybercriminals,"<br />

adds N-able. "Automated backups are the<br />

most common form of automation used by<br />

MSPs to keep their customers' businesses<br />

secure, used by 85% of all respondents."<br />

LAST LINE OF DEFENCE<br />

Backup is seen as crucial - the last line of<br />

defence - and MSPs must be able to recover<br />

customers' data and systems, no matter what.<br />

"In general, backup is provided to most<br />

customers, but of major concern is the fact<br />

that only 40% of businesses are backing up<br />

workstations every 48 hours or less."<br />

THREAT GROWS GREATER<br />

Lee Robinson, co-founder and director, Meta<br />

Eagle, is equally alarmed by the way in which<br />

MSPs are being singled out. "As this report<br />

reveals, the threat among the MSP<br />

community is becoming increasingly real.<br />

"And now we're seeing our customers<br />

becoming more aware to exploits and<br />

vulnerabilities out there in the world. They<br />

want to actively engage in conversation, so<br />

they can understand how best they can be<br />

protected," he points out.<br />

"The industry has a major role to play in<br />

guiding businesses down the right path. This<br />

includes a cultural shift from having an IT<br />

partner that is simply looked at as a bottomline<br />

cost, but more of an investment into<br />

your business. Strong IT support, while<br />

empowering you to work from anywhere,<br />

should also secure your data, mitigate risk<br />

and put contingences in place, should the<br />

worse happen."<br />

MUTI-FACETED PROBLEM<br />

Lisa Niekamp-Urwin, CEO, Tomorrow's<br />

Technology Today, points to the "shocking<br />

statistics" within the report regarding the very<br />

real cyber threat for the MSP community and<br />

says it "speaks to the need to address the<br />

issue from many sides".<br />

In particular, she says hygiene becomes<br />

a critical factor - "removing admin rights,<br />

MFA, EDR, MDR, backup, log retention,<br />

monitoring, hardening, the list goes on and<br />

on. When I joined this MSP twenty years<br />

ago, I didn't anticipate having a security<br />

engineer on staff full-time. Yet, here we are -<br />

it's a huge priority".<br />

In today's climate, she adds, the industry<br />

needs to step up its game. "MSPs need to do<br />

their research, understand and listen to what<br />

is happening to their community; interrogate<br />

their stack and make sure there are no holes.<br />

And follow the golden rule…. MFA [multifactor<br />

authenticate] everything!"<br />

Dave MacKinnon, N-able: MSPs need<br />

to understand how the threat landscape<br />

continues to evolve and make changes to<br />

protect themselves and their customers.<br />

Lisa Niekamp-Urwin, Tomorrow's<br />

Technology Today: MSPs need to do their<br />

research, understand and listen to what is<br />

happening to their community.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

13


metaverse<br />

VIRTUAL WORLD, REAL DANGER<br />

THE METAVERSE IS A VIRTUAL REALITY WORLD<br />

CHARACTERISED BY A 3D MULTI-SENSORY EXPERIENCE -<br />

AND ALSO MANY DANGERS<br />

Francis Gaffney, Mimecast: each metaverse<br />

uses its own economy, giving rise to<br />

countless new cryptocurrencies.<br />

As the buzz surrounding the emergence<br />

of what has become known as the<br />

'metaverse' increases, many are raising<br />

concerns about the potential risks in an<br />

environment where the boundaries between<br />

the physical and virtual worlds continue to blur<br />

- and amongst those sharing this alarm is<br />

weforum.org.<br />

"Addressing the necessity of constructing<br />

trusted ecosystems within the technologies<br />

developed for the metaverse is a critical<br />

consideration," it states. "These trusted<br />

ecosystems will constitute building in<br />

algorithms, structures, frameworks,<br />

regulations and policies within hardware and<br />

software development cycles to address the<br />

distinct elements of safety, privacy and security<br />

within the DNA of the technology."<br />

SERIOUS RISKS EMERGING<br />

With Microsoft, Google and ,most recently,<br />

Disney all working towards a profoundly<br />

augmented reality, there is real potential for<br />

an explosion of growth to an already trilliondollar<br />

market. That is where security concerns<br />

arise for Francis Gaffney, director of Threat<br />

Intelligence at Mimecast. "Despite claims<br />

that virtual worlds will be subject to the<br />

forthcoming Online Safety Bill and stringent<br />

UK regulation, the risk of any new technological<br />

revolution should not be underestimated<br />

and serious risks are emerging as<br />

more users adopt the metaverse concept,"<br />

warns Gaffney.<br />

As companies in the metaverse can monitor<br />

physiological responses and biometric data,<br />

such as voice recognition and heart-rate<br />

sensors, there is much concern that the vast<br />

amount of data collected and stored online<br />

will form an increasingly attractive target for<br />

the growing number of advanced cyber<br />

criminals. "This depth of information being<br />

stored online means that theft of metaverse<br />

user accounts, their unique access, or<br />

biometric data will become commonplace in<br />

the virtual world," he adds, "as cyber criminals<br />

look to either steal or 'spoof' biometric data<br />

and commit identity theft."<br />

As we shift from stealing passwords to<br />

stealing fingerprints and move towards crimes<br />

being committed through digital transactions,<br />

the virtual world is becoming increasingly<br />

difficult to police, he says. "Another target for<br />

criminals will be new cryptocurrencies. Each<br />

metaverse uses its own economy, giving rise to<br />

countless new cryptocurrencies. In these virtual<br />

economies, portability and secure exchange<br />

offices are required. Maintaining security of<br />

these will be a major challenge as threat actors<br />

will be hoping to launder 'money' and exploit<br />

currency exchanges in this domain."<br />

Additional security consideration includes<br />

exposing younger users to harm, grooming<br />

and radicalisation in a setting with little<br />

regulation and the growing trend of<br />

'hacktivism'. "While, a serious violation can<br />

lead to a ban, there's nothing stopping these<br />

individuals from creating a new account,"<br />

Gaffney points out. "Having a persistent avatar<br />

linked biometrically to a person in the physical<br />

domain may go some way to limit this, but<br />

this raises debates around individual human<br />

rights and privacy."<br />

THE FIGHTBACK<br />

So, how do we deal with the ongoing and<br />

ever more complex challenges around data<br />

storage and security? "The metaverse must<br />

differentiate themselves from the competition<br />

by providing 'good security'," he advises.<br />

"To achieve this, preparatory work needs<br />

to be done by security organisations to<br />

understand the risks and deploy the right<br />

cybersecurity resources, in order to establish<br />

a virtual environment that everyone can enjoy<br />

safely and without consequence."<br />

14<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


joint venture<br />

ESET AND INTEL JOIN FORCES<br />

MOVE AIMS TO ENHANCE ENDPOINT SECURITY WITH HARDWARE-BASED RANSOMWARE DETECTION<br />

ESET has set out to integrate Intel<br />

Threat Detection Technology<br />

(Intel TDT) into its multi-layered<br />

cybersecurity technology suite.<br />

"Recognising the complex and evolving<br />

nature of ransomware, an ever more<br />

formidable threat to customers' work<br />

and personal lives, ESET will enhance its<br />

software-based detection technologies<br />

with a ransomware detection only Intel<br />

hardware can deliver," says the company.<br />

With continuous progress in technological<br />

innovations often bringing new<br />

tools for the sustained growth and<br />

security of SMBs, the integration of Intel<br />

TDT aims to ensure that ESET endpoint<br />

security software running on Intel-based<br />

PCs can "deliver superior ransomware<br />

protection", adds ESET.<br />

States Elöd Kironský, chief of Endpoint<br />

Solutions and Security Technologies at<br />

ESET: "This collaboration recognises<br />

the immediate boost in ransomware<br />

protection that integrating Intel's<br />

hardware-based ransomware detection<br />

technology can deliver. Tapping into<br />

telemetry at the CPU level is an effective<br />

step we can take to enable improved<br />

tracking of malicious encryption.<br />

Basically, for ESET this means exposing<br />

ransomware as it attempts to avoid<br />

detection in memory. ESET has always<br />

believed in the multi-layered approach<br />

and, by adding the silicon layer, we<br />

recognise that hardware-based security<br />

is the next milestone in battling threats."<br />

Due to the devastating impacts of<br />

past ransomware attacks and the evergrowing<br />

complexity of maintaining<br />

secure endpoint defences, ransomware<br />

remains a top concern right across the<br />

industry. In order to better address this,<br />

integrating ransomware detection<br />

improvements to ESET endpoint security<br />

solutions will seek to deliver enhanced<br />

immunity to most detection bypasses.<br />

"Furthermore, with Intel TDT machine<br />

learning constantly evolving and<br />

progressing, the ability of ESET endpoint<br />

security solutions to detect derivative<br />

variants of ransomware threats will<br />

progress in lockstep," continues the<br />

company.<br />

PARALLEL BENEFITS<br />

For ESET and its clients, the value<br />

proposition of this collaboration is said<br />

to lie in the parallel benefits of using<br />

Intel TDT machine learning models to<br />

assist with the detection of ransomware<br />

and simultaneously offloading these<br />

processing demands to the Intel<br />

integrated graphics controller (GPU),<br />

in the process keeping overall system<br />

performance high.<br />

"Low impact to system performance is<br />

an area that ESET has always prioritised<br />

within its multi-layered software<br />

architecture," points out Kironský, "and<br />

is a key selling point for many of our<br />

clients. Leveraging tech that can help<br />

us with prevention and protection,<br />

while also preserving performance, is<br />

a win-win choice."<br />

The benefits of this integration will<br />

become available later this year in an<br />

upcoming release of ESET's endpoint<br />

security products. In the first round of<br />

releases, ESET will focus on endpoints<br />

with 9th Gen and newer Intel Core and<br />

Intel vPro Windows-based PCs, which<br />

Elöd Kironský, ESET: his company<br />

"recognises that hardware-based security<br />

is the next milestone in battling threats".<br />

are capable of leveraging Intel TDT "outof-the-box".<br />

Adds Carla Rodriguez, senior<br />

director Ecosystem Partner Enablement,<br />

Intel Corp: "Ransomware impacts both<br />

small businesses and large enterprises<br />

and can result in economic fallout<br />

on a global scale. ESET's ransomware<br />

optimisations will work across both Intel<br />

vPro Enterprise and our new Intel vPro<br />

Essentials targeted for SMBs.<br />

"This delivers a compelling hardware<br />

and software bundle that delivers rightsized<br />

security for businesses of any size<br />

and delivers higher efficacy security when<br />

ESET software is run on Intel-based PCs.<br />

This is a major step forward to turn the<br />

tide against ransomware."<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

15


compliance<br />

GETTING TO THE HEART OF YOUR DATA<br />

TOP COMPANIES NOW USE A RAFT OF TOOLS AND SOFTWARE PLATFORMS TO RUN THEIR OPERATIONS.<br />

NICK EVANS, SALES & MARKETING MANAGER, GEOLANG (PICTURED BELOW) LOOKS AT THE IMPLICATIONS<br />

THIS HAS FOR DATA MANAGEMENT<br />

Today, it is more important than ever<br />

to have a solid understanding of your<br />

data, but with an increasing number<br />

of business systems being used, it's also<br />

harder than ever before to have this<br />

understanding. Since the implementation<br />

of GDPR, the UK has reported 40,026<br />

personal data breach notifications, with<br />

8,355 being reported in 2020 and 9,490<br />

in 2021 - a 13.6% increase in one year.<br />

(ITPro.co.uk - Sabina Weston - Jan <strong>2022</strong>)<br />

From CRMs to ERPs, payrolls to<br />

inventories, data runs everything and<br />

businesses are now collecting more of it<br />

than ever before, but what does this mean<br />

when you're having to work in line with<br />

localised data compliance laws (eg, GDPR,<br />

HIPPA, CCPA etc)?<br />

Sure, some of the collected information<br />

isn't a problem - anyone knowing how<br />

much handwash they have in their<br />

cleaning cupboard is only a good thing<br />

now - but storing GDPR-related data is<br />

a whole different story.<br />

Top companies today use an average of<br />

37 different tools or software platforms<br />

to run their day-to-day operations. On<br />

average, small to medium-sized businesses<br />

in <strong>2022</strong> use nearly 10 (9.6, to be exact)<br />

business systems operationally, with larger<br />

businesses using up to a staggering 37<br />

systems. That's a lot of solutions that tend<br />

to store a lot of the same information<br />

(first/last names, email addresses, postal<br />

addresses, dates of birth, financial<br />

records, health records etc). So, how<br />

easy is it to understand what is going<br />

on inside all these different systems -<br />

all the endpoints (Windows, Mac, Linux<br />

machines) and the fileservers that run<br />

a business in <strong>2022</strong>? Simply put, it's not<br />

easy at all.<br />

WHY DO I NEED TO UNDERSTAND<br />

WHAT MY DATA LOOKS LIKE?<br />

If you don't understand what data is<br />

being stored inside your digital estate,<br />

how can you confidently know that you<br />

are operating inside your local data<br />

compliance laws? Since its inception<br />

on 25 May 2018, GDPR (General Data<br />

Protection Regulation) has been put<br />

in place to govern the way in which<br />

a business can use, process and store<br />

personal data (information about an<br />

identifiable, living person) and provides a<br />

very strict set of rules in how that business<br />

can use, manage and handle this data.<br />

If a business is found to be operating<br />

outside of these rules, there can be major<br />

consequences and crippling fines.<br />

16<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


compliance<br />

ORGANISATIONS LOSE AN AVERAGE<br />

OF $4 MILLION IN REVENUE, DUE TO<br />

A SINGLE NON-COMPLIANCE EVENT.<br />

(Saviynt.com - The True Cost of Non-<br />

Compliance - MJ Kaufmann - <strong>Apr</strong> 2021)<br />

WHAT SORT OF FINE COULD I FACE,<br />

IF I AM NOT COMPLYING WITH GDPR<br />

LAWS?<br />

The UK GDPR and DPA 2018 set a<br />

maximum fine of £17.5 million or 4%<br />

of annual global turnover, whichever is<br />

greater, for infringements while the EU<br />

GDPR sets a maximum fine of €20 million<br />

(about £18?million) or 4% of annual<br />

global turnover, whichever is greater,<br />

for infringements. (Legislation.gov.uk -<br />

Relevant provisions of the Act - See<br />

Sections 155 to 159, Part 6)<br />

HOW HAS COVID-19 CHANGED THE<br />

WAY THAT DATA IS MANAGED?<br />

With all the disruptions from Covid-19,<br />

businesses have had to quickly find new<br />

ways of working. For many companies<br />

around the world, remote working is<br />

the new normal. With remote working,<br />

businesses have had to figure out ways of<br />

having their workforce collaborate and<br />

work together, resulting in a significant<br />

spike in organisations adopting the usage<br />

of platforms like Microsoft Teams, Google<br />

Workplace, Atlassian tools (Confluence,<br />

Jira and Bitbucket), Alfresco, Slack…the<br />

list is forever growing.<br />

Collaboration is a truly wonderful thing,<br />

but with this rise in collaborative tools<br />

being adopted, key sensitive data is now<br />

stored in even more places, making it<br />

even harder for businesses to get a firm<br />

grasp of how data is being shared<br />

between their staff.<br />

Not only have IT teams had to adopt<br />

this new way of working, evaluate and<br />

implement new tools to keep businesses<br />

running, but they've also had to get<br />

their heads around the complexities of<br />

compliance regulations, which is no easy<br />

feat. To many business leaders, IT teams<br />

today are modern-day saints. The top<br />

three skills for compliance officers are:<br />

subject matter expertise, communication<br />

skills and anticipating future regulatory<br />

trends. With businesses only growing the<br />

number of solutions they use, surely<br />

staying on top of their data will become<br />

an unmanageable task?<br />

REGULATORS FINED BANKS $10<br />

BILLION IN A 15-MONTH PERIOD<br />

THROUGH 2019, WITH MOST OF<br />

THOSE FINES CAUSED BY CYBER-<br />

ATTACKS (60%) (Fenergo - Jan 24,<br />

2020)<br />

What if there was a solution that provided<br />

a report highlighting exactly what GDPRrelated<br />

data was being stored and where<br />

it was stored? What if that solution was<br />

able to scan not just one single instance<br />

of a collaborative tool, but the entire<br />

digital estate (CRMs, marketing tools,<br />

sharing platforms, endpoints, fileservers)<br />

and provide visibility into data stored<br />

EVERYWHERE? Would that make the<br />

unmanageable manageable? Having a<br />

rich understanding of stored compliancerelated<br />

data, across all tools and solutions<br />

used inside a business, is the only way of<br />

operating in line with ones regionalised<br />

compliance regulations.<br />

Stagnant budgets and a shifting<br />

workforce have left many compliance<br />

teams feeling stretched, with 87% of<br />

businesses reporting that they have<br />

no additional capacity, due to being<br />

understaffed or only adequately staffed.<br />

ENTER GEOLANG DATA DISCOVERY<br />

The GeoLang Data Discovery tool has<br />

been created to help organisations<br />

confidently operate within the compliance<br />

regulations they must follow by scanning<br />

their digital estate (endpoints, fileservers,<br />

Office 365, Google Workspace, Atlassian<br />

Jira/Confluence/Bitbucket [data centre and<br />

cloud] and Alfresco), providing a report<br />

(The Hero Report) that highlights the<br />

company risk profile, what sensitive data<br />

has been found, where sensitive data has<br />

been found, key risk areas, how current<br />

risks have been mitigated, mean time to<br />

resolution and the current risk exposure.<br />

In all, 44% of businesses say that their<br />

top compliance management challenges<br />

are handling compliance assessments,<br />

undergoing control testing, and implementing<br />

policy and process updates.<br />

(MetricStream State of Compliance Survey<br />

Report 2021)<br />

Generated at the touch of a button (or<br />

delivered automatically), the high-level<br />

Data Discovery Executive Summary<br />

('HERO Report') provides configurable<br />

and periodic reporting on risk assessment<br />

and risk mitigation, as a dynamic report,<br />

but also available in PDF or editable<br />

format for distribution to managers. Userfriendly<br />

dashboards are also available in<br />

one central location.<br />

Pre-defined and bespoke rule sets,<br />

including GDPR, PCI, or HIPAA, are<br />

supported, along with granular regular<br />

expressions, keyword lists and compound<br />

queries. GeoLang Data Discovery searches<br />

unstructured datasets stored in over 200<br />

formats across your digital estate and<br />

with the 'find files similar to' function,<br />

one can quickly build repositories from<br />

dispersed business data.<br />

To understand how GeoLang can help<br />

simplify the management of data<br />

compliance, help get your data ready for<br />

a cloud migration/digital transformation<br />

project or even ease how Digital Subject<br />

Access Requests (DSARs) are managed,<br />

you can check out the Geolang website<br />

at: www.geolang.com. Alternatively,<br />

contact the company by emailing:<br />

contact@geolang.com.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

17


cloud<br />

THE CLOUD CONUNDRUM<br />

CLOUD, IN ITS VARIOUS SHAPES, IS OFTEN HAILED AS THE WAY<br />

FORWARD - SO WHY IS IT SOMETIMES SO POORLY PROTECTED?<br />

COMPUTING SECURITY FINDS OUT WHERE THE CRACKS ARE IN<br />

AN INCREASINGLY CLOUD-LADEN AGE<br />

Arecent study found that 88% of<br />

respondents believe the security of<br />

their cloud environment will become<br />

increasingly important over the next year.<br />

At the same time, 79% of respondents<br />

expressed misgivings (overwhelmed,<br />

uncertain, lack of control etc) over their<br />

organisation's current security posture.<br />

Why are so many failing to enact greater<br />

protections in the face of an enemy that only<br />

gets more determined to exploit them? And<br />

what are the likely outcomes where they<br />

continue to pursue that same path?<br />

There are many factors that play into this<br />

scenario, states John Stevenson, a managing<br />

director in Protiviti's security and privacy<br />

practice. "A good number of organisations<br />

simply lack power in their technical<br />

organisations, which means vulnerabilities<br />

don't get remediated as they should.<br />

Instead, exceptions are put in place, because<br />

remediation is deemed too risky for the<br />

business units. Couple that with what<br />

usually appears to be a grossly understaffed<br />

vulnerability remediation team and you're<br />

left with a situation ripe for ransomware,<br />

takeover etc."<br />

Over the last few years, Stevenson has<br />

encountered an increase in remediation<br />

exceptions being put in place versus<br />

implementing technical compensating<br />

controls to serve as security rings around<br />

the vulnerable asset. "Most companies do a<br />

decent job at document their compensating<br />

controls, but very few take the time to<br />

perform TESTS of their compensating<br />

controls. They just assume things will work<br />

as planned versus doing real-world analysis."<br />

VULNERABILITIES CHAINED TOGETHER<br />

One of the other downfalls of traditional<br />

vulnerability management programs that he<br />

singles out is the failure to fully understand<br />

how vulnerabilities could be chained together<br />

to create a major opening for attackers. "Take,<br />

for example, a low or medium vulnerability<br />

that only allows non-administrative access to<br />

a server, then a different low or medium<br />

severity vulnerability that allows privileged<br />

access, but only if already authenticated.<br />

Programs that patch only high and critical<br />

vulnerabilities are, by default, creating higher<br />

risk, since they're not gathering enough<br />

information to show this type of scenario."<br />

How do you resolve this and get to a place<br />

where exposure is consistently minimal?<br />

"Lack of adequate staffing and non-robust<br />

programs are the two largest contributing<br />

factors to the problem," says Stevenson. "In<br />

most instances, companies should strongly<br />

consider outsourcing their vulnerability<br />

management program to a reputable vendor<br />

with a strong offering in this area.<br />

"If outsourcing is not an option, companies<br />

should consider investing in a deeply rooted,<br />

robust vulnerability management program<br />

that aggregates vulnerabilities and weighs<br />

the individual business units, so the risk rating<br />

is accurate for a particular section of the<br />

overall enterprise. As an example: a low-risk<br />

vulnerability that focuses on availability may<br />

be okay for a technology company to accept,<br />

but could end up being a life-or-death<br />

situation for a hospital. Without proper<br />

context, risk ratings and power to implement<br />

and adequate staffing, organisations will<br />

continue to struggle with managing risk to<br />

their systems."<br />

UNRESTRICTED ACCESS TO SERVICES<br />

According to Raghu Nandakumara, senior<br />

director, head of industry solutions at Illumio,<br />

one of the most frequent mistakes that is<br />

seen during cloud implementation is teams<br />

unintentionally enabling unrestricted access<br />

to services, often caused by misconfigured<br />

security policy. "Any resources left accessible<br />

via the internet are essentially fair game for<br />

threat actors," he cautions, "and, if something<br />

is connected to the internet, with enough<br />

time and effort criminals will find a way to<br />

access it.<br />

Today, however, as our operating models<br />

evolve and data becomes increasingly<br />

dispersed, due to at-home working, firms<br />

18<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


cloud<br />

are battling even harder to keep up with<br />

accelerated change, he adds. "A recent<br />

Forrester study saw 63% of respondents<br />

claim that their firm was unprepared for<br />

the quickened pace of cloud migration and<br />

transformation. An equal number found it<br />

difficult to maximise the productivity of<br />

remote workers without introducing new<br />

security risks.<br />

"The growing complexity of inter-cloud<br />

and data centre communications makes it<br />

particularly challenging for organisations<br />

to understand and properly protect their<br />

environments, which leaves the door wide<br />

open for attackers. In such instances,<br />

where decision makers feel constrained by<br />

inadequate technologies for today's new<br />

challenges, Zero Trust is one of the most<br />

effective, and necessary, approaches for any<br />

organisation looking to digitally transform<br />

and grow their company in a secure way."<br />

A major challenge when it comes to cloud<br />

security is visibility, he continues. "Whether<br />

it's hybrid cloud, multi-cloud or both, you<br />

need to see your entire environment, and<br />

how your applications and workloads<br />

interact. Zero Trust builds resilience into<br />

organisations' multi-cloud environments<br />

to dramatically reduce the fallout of cyberattacks."<br />

With comprehensive, intelligent visibility<br />

(that incorporates vulnerability data on your<br />

networks' assets), organisations can have<br />

single interface to understand and mitigate<br />

risk across multi-cloud, hybrid cloud and<br />

on-premises data centre environments,<br />

he asserts. "This means that users can see<br />

all communication between workloads and<br />

applications across their distributed business<br />

estate, understand which assets and data to<br />

prioritise, respond to threats and ultimately<br />

better protect their organisation."<br />

Cloud is now shaping the way businesses<br />

manage their processes and handle their<br />

data, so ensuring that these services are<br />

thoroughly secure must be priority number<br />

one, adds Nandakumara. "Most company<br />

infrastructures will now be comprised of<br />

multiple cloud environments, as well as<br />

some on-premises systems. Visibility is<br />

crucial for maintaining a strong defence line<br />

along the perimeter and will also pave the<br />

way for a more secure and resilient future<br />

based on Zero Trust."<br />

STRIKING THE PERFECT BALANCE<br />

Winny Thomas, principal security architect<br />

at Versa Networks, believes the greatest<br />

challenge when it comes to cloud<br />

environments is striking the perfect balance<br />

between accessibility and security. "All<br />

users want to feel the same quality of user<br />

experience, irrespective of whether they are<br />

working in an office or working from home.<br />

Whilst this is crucial, organisations also have<br />

to consider the security implications when<br />

growing their cloud infrastructure."<br />

The acceleration of digital transformation<br />

over the last two years has, Thomas states,<br />

caused a significant increase in cloud<br />

infrastructure within organisations. "This<br />

ultimately creates security gaps and blind<br />

spots, especially when organisations<br />

have overlapping cloud and on-premises<br />

technology. If a threat actor breaches an<br />

organisation's network, then malware is<br />

free to move laterally and cause significant<br />

damage. Therefore, it is crucial that<br />

organisations implement solutions that are<br />

able to manage both network performance<br />

and security."<br />

MEETING BUSINESS NEEDS<br />

Solutions, such as secure access service<br />

edge (SASE), which deliver a tighter<br />

integration between security and network<br />

performance through the cloud, would<br />

ensure that all users are adequately secure,<br />

while also being able to meet their business<br />

needs, Thomas argues. "With SASE, security<br />

teams can be confident that every endpoint<br />

on the network has the same security and<br />

management capabilities, which reduces<br />

John Stevenson, Protiviti: too many<br />

organisations lack power in their<br />

technical organisations, resulting in<br />

vulnerabilities not being remediated.<br />

the gaps in their hybrid-cloud, multi-cloud<br />

or cloud-native environment and ultimately<br />

makes it harder for threat actors to breach.<br />

"With segmentation policies also<br />

integrated into SASE, threat actors no<br />

longer have the freedom to move laterally.<br />

Restricting malware to one area of the<br />

network ensures that security teams are<br />

able to find threats quicker and ultimately<br />

deal with them much faster. Not only does<br />

SASE strengthen an organisation's security<br />

posture, but also its networking<br />

performance."<br />

As SASE is a single software stack, data<br />

no longer needs to pass through multiple<br />

devices or virtual network functions,<br />

improving connection speeds and reducing<br />

latency. "Organisations that implement<br />

solutions such as SASE will be able to<br />

guarantee that their cloud infrastructure<br />

can offer users the best possible<br />

connectivity, while ensuring the network<br />

is impregnable to malicious actors."<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

19


cloud<br />

Raghu Nandakumara, Illumio: a frequent<br />

mistake during cloud implementation is<br />

teams unintentionally enabling unrestricted<br />

access to services, often caused by<br />

misconfigured security policy.<br />

Winny Thomas, Vera Networks: the greatest<br />

challenge with cloud environments is striking<br />

the perfect balance between accessibility and<br />

security.<br />

CLOUD TECHNOLOGY ADOPTION<br />

IS ALL SET TO TAKE OFF<br />

Meanwhile, a new survey has found that<br />

93% of IT industry are planning to adopt<br />

cloud technology within five years. The<br />

survey, conducted by Hornetsecurity, points<br />

to hybrid cloud solutions becoming the longterm<br />

target for two in three companies<br />

The hybrid cloud adoption survey of 900-<br />

plus IT professionals, primarily based in<br />

Europe and North America, reveals that the<br />

majority of businesses (93%) are adopting a<br />

hybrid of cloud and on-premise solutions or<br />

migrating fully to the cloud within five years.<br />

Half of respondents (51%) reported that they<br />

will be 'mostly in the cloud' in five years, with<br />

one or two workloads remaining on premise.<br />

In all, 28% of respondents said they would<br />

remain 'mostly on premise', with a workload<br />

or two in the cloud.<br />

Hybrid cloud solution as permanent<br />

destination<br />

While 29% of respondents said they are using<br />

hybrid cloud solutions as a stepping stone to<br />

a full cloud environment, 67% of respondents<br />

see hybrid as a final destination for their<br />

infrastructure, due to workloads that must<br />

remain on premise. The rest claim to be<br />

remaining 100% on premise. When asked<br />

why companies were remaining on premise,<br />

many respondents cited data control, security<br />

and cost concerns with cloud technology.<br />

Trust issues with cloud<br />

The hybrid cloud adoption survey also found<br />

that trust issues with the public cloud are<br />

present within companies of all sizes, with<br />

31-36% of all surveyed company size<br />

categories reporting concerns.<br />

The survey also showed that with experience<br />

comes more distrust in the public cloud.<br />

Respondents with 20-plus years’ experience<br />

were more likely to express concerns with the<br />

trustworthiness of cloud platforms (34%)<br />

than those with 1-5 years’ experience (24%).<br />

Half of all respondents mentioned 'legacy<br />

systems or software' as another major reason<br />

certain workloads must remain on premise,<br />

while 'application compatibility' was reported<br />

as a roadblock to cloud migration for four in<br />

10 companies. Industry regulations such as<br />

GDPR, HIPAA and CMMC, amongst others,<br />

were also cited as an obstacle for cloud<br />

adoption by 29% of respondents.<br />

Multiple challenges blocking cloud adoption<br />

Many companies surveyed stated they were<br />

holding back from full cloud migration, due<br />

to a lack of 'technical know-how or certified<br />

staff' (48%), difficulties with 'application of<br />

best practices within the company' (33%),<br />

issues with connectivity (33%), and 'secured<br />

access' (29%).<br />

The most common workload preventing IT<br />

departments from lifting all services to the<br />

cloud was 'Print & Imaging Services' (55%).<br />

Databases, file storage and application<br />

services are also cited as reasons for<br />

remaining partially on premise, with 50%,<br />

45%, and 43% of respondents indicating<br />

such intentions respectively.<br />

Hornetsecurity's survey shows that hybrid<br />

cloud solutions still bring with them several<br />

challenges. Chief among them is 'monitoring<br />

and security', with half of respondents<br />

expressing concerns in this area. 'Networking<br />

and connectivity' is another concern shared by<br />

nearly half of all respondents (48%). Finally,<br />

'training and certification', 'manageability and<br />

tooling', and 'resiliency and data recovery' also<br />

factor into the disquiet shared by 35%, 35%,<br />

and 33% of respondents respectively.<br />

Cloud solutions versus on premise<br />

Some 47% of respondents who form part of<br />

internal IT teams reported that they see their<br />

workloads 'mostly in the cloud' in five years,<br />

versus 52% of respondents whose company<br />

used MSP services, and 54% of respondents<br />

that worked at MSPs. Internal IT departments<br />

reported a lack of trust in cloud services at<br />

almost the same rate as those using MSP<br />

services, with 34% and 33% respectively.<br />

20<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


Ukraine backup<br />

CALL FOR HELP PROMPTS RAPID RESPONSE<br />

A TEAM OF EXPERTS HAS BEEN SET UP TO HELP DEFEND UKRAINE FROM CYBER-ATTACKS<br />

Acyber rapid-response team (CRRT) is<br />

being deployed across Europe, after<br />

a call went out from Ukraine for help,<br />

as reported by the BBC.<br />

The newly-formed team of eight to 12<br />

experts from Lithuania, Croatia, Poland,<br />

Estonia, Romania and the Netherlands has<br />

committed to help defend Ukraine from<br />

cyber-attacks - remotely and on site in the<br />

country. An official warned attacks were<br />

likely. "We can see that cyber-measures are an<br />

important part of Russia's hybrid toolkit," the<br />

CRRT official said.<br />

It comes after the UK and the US blamed<br />

Russia for cyber-attacks earlier this month<br />

that temporarily took a small number of<br />

Ukrainian banking and government websites<br />

offline.<br />

The Lithuanian Ministry of Defence tweeted:<br />

"In response to Ukraine request, [we] are<br />

activating [a] Lithuanian-led cyber rapidresponse<br />

team, which will help Ukrainian<br />

institutions to cope with growing cyberthreats.<br />

#StandWithUkraine."<br />

CRRTs are a European Union initiative to<br />

deepen defence and co-operation between<br />

member states. They are said to be equipped<br />

with commonly developed cyber toolkits<br />

designed to detect, recognise and mitigate<br />

cyber-threats. An official told the BBC that<br />

the team was "composed of different cyberexpertise,<br />

such as incident response,<br />

forensics, vulnerability assessment, to be able<br />

to react to a variety of scenarios". Russia has<br />

previously been accused of 'hybrid warfare',<br />

combining cyber-attacks with traditional<br />

military activity, in Georgia and Crimea. "The<br />

EU and Ukraine blamed Russia after<br />

thousands of people in multiple cities in<br />

Ukraine experienced power cuts, in 2015 and<br />

2016, when hackers temporarily shut off<br />

electricity substations," states the BBC. "The<br />

US, UK and EU also blamed it for the hugely<br />

disruptive NotPetya wiper attack."<br />

Experts say about 2,000 NotPetya attacks<br />

were launched in 2017, mainly aimed at<br />

Ukraine, but the malicious software spread<br />

globally, causing billions of dollars of damage<br />

to computer systems across Europe, Asia and<br />

the Americas.<br />

POSITIVE NEWS<br />

According to John Fokker, head of cyber<br />

investigations & principal engineer, Trellix, the<br />

news that the EU is deploying a Cyber Rapid-<br />

Response Team is extremely positive. "The<br />

initial cyber-attacks on Ukraine were intended<br />

to be very public and evident in their nature<br />

and impact. However, we anticipate that this<br />

will change in the future, and any attacks will<br />

be incredibly discreet, as attackers seek to<br />

conceal their activity and ultimate objectives.<br />

"Cyber-attacks are increasingly used as<br />

a means of modern warfare. Our research*<br />

found that Russian and Chinese nation-state<br />

backed groups are believed to be responsible<br />

for nearly half (46% combined) of all<br />

observed APT threat activity. Cybersecurity<br />

John Fokker, Trellix: Cyber-attacks are<br />

increasingly used as a means of modern<br />

warfare.<br />

must be a worldwide priority and we must<br />

collaborate to defend against these threats."<br />

Threat intelligence will be crucial to<br />

mitigating risk, he adds. "It will allow security<br />

professionals to strengthen detection, plus<br />

respond in real-time to active threats. The use<br />

of machine learning analytics will also help<br />

to predict and detect attacks, identify root<br />

causes, and guide adaption and response to<br />

whatever threat Ukraine may face."<br />

*https://www.trellix.com/en-us/threat-center/threatreports/jan-<strong>2022</strong>.html<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

21


tech scrap<br />

I.T. EQUIPMENT JUNKED PREMATURELY<br />

MANY UK BUSINESSES DUMPING THEIR DEVICES BEFORE THEY REACH END OF WORKING LIFE<br />

More than 50% of businesses that<br />

were questioned in a new study<br />

acknowledged that they switched<br />

out their IT equipment and devices every<br />

three to five years, on average.<br />

On the plus side, some 87% of business<br />

owners admitted that they wanted to make<br />

greener tech choices in the future.<br />

The findings are revealed by EuroPC, whose<br />

team conducted a survey as a part of an<br />

ongoing study into the issue of electronic<br />

waste. More than 1,200 UK business owners<br />

took part, giving insight into their thoughts<br />

on using refurbished IT products for work<br />

purposes. This follows the revelation that<br />

145,000 tonnes of commercial and industrial<br />

waste are thrown away every year*.<br />

THROWN AWAY<br />

When asked what business owners typically<br />

do with IT equipment that is no longer of<br />

use, just 26% said they have a refurbishment<br />

partner who repairs equipment for them on<br />

the occasions where something does break.<br />

The remaining businesses admitted that they<br />

tend to throw their old or broken equipment<br />

away (74%).<br />

The most common IT equipment that<br />

business owners have confessed to<br />

disposing of were revealed to be: laptops -<br />

87%; servers - 76%; routers - 63%;<br />

monitors - 59%; and desktops - 48%.<br />

What's more, approximately two thirds of<br />

business owners said they have previously<br />

thrown away IT equipment before it had<br />

reached the end of its life (59%), and a<br />

further 54% admitted to switching out their<br />

devices every three to five years, on average.<br />

Quizzed on the reasons why they replace<br />

their equipment so often, 'improving speed'<br />

was the most popular response given<br />

(49%), along with increased reliability (24%)<br />

and security (17%).<br />

When asked about their thoughts on<br />

refurbished products, one in three stated<br />

that they naturally assumed refurbished IT<br />

equipment would be less reliable and riskier.<br />

However, almost four-fifths of business<br />

owners said they would happily swap to<br />

refurbished products, rather than brandnew,<br />

if they could achieve the same level<br />

of performance and save on costs (79%).<br />

On top of this, over four quarters of<br />

business owners also confessed that they<br />

were not fully aware of the issues around<br />

e-waste, nor the extent of its impact on the<br />

environment (82%). With this in mind, all<br />

business owners were asked whether they<br />

would consider making greener tech<br />

choices in the future, to which 87% of<br />

respondents agreed - citing 'sustainability'<br />

as the main reason why (78%).<br />

Alan Gilmour, managing director at<br />

www.EuroPC.co.uk, says there's a common<br />

assumption that refurbished products are<br />

more likely to fail, because used equipment<br />

is seen as less reliable and riskier. "However,<br />

this isn't the case, as refurbished equipment<br />

can achieve the same level of performance<br />

and save companies significant amounts<br />

of money in the long run. By extending the<br />

life of IT equipment that businesses already<br />

have, companies can reduce the amount<br />

of e-waste produced at the same time.<br />

"It's certainly refreshing to see the sheer<br />

number of business owners that are willing<br />

to make greener tech choices in the future,<br />

by choosing refurbished products over<br />

brand-new," he concludes.<br />

*https://www.letsrecycle.com/news/uk-the-secondlargest-producer-of-weee/<br />

22<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


ADISA ICT Asset Recovery Standard 8.0<br />

is formally approved by the UK ICO<br />

(Approval ICO – <strong>CS</strong>C/003 and ICO – <strong>CS</strong>C/004)<br />

Use an ADISA Certified company to be assured of UK GDPR compliance<br />

when disposing of your IT assets.<br />

Visit adisa.global to find out more<br />

Want to know how to retire assets<br />

so you can promote reuse AND meet<br />

data protection legislation?<br />

ADISA offers a range of training courses all presented by<br />

leaders in the field, including a brand-new course which helps<br />

data controllers write an asset retirement program to achieve<br />

the objective of meeting sustainability and security targets.<br />

Visit adisa.global/training to find out more


NHS breaches<br />

NHS BREACHES - JUST A FACT OF LIFE NOW?<br />

WHAT WILL IT TAKE TO STOP ALL OF THE HACKS ON THE NHS FROM HAPPENING...<br />

OR HAVE WE REACHED THE POINT WHERE NOTHING CAN BE PROTECTED ANYMORE?<br />

The NHS is no stranger to being hacked.<br />

It has a sorry history of such breaches,<br />

with particularly disturbing such incident<br />

occurring in February this year when private<br />

medical information about tens of thousands<br />

of NHS patients was leaked. The confidential<br />

files include hospital appointment letters for<br />

women who have suffered miscarriages, test<br />

results of cervical screening and letters to<br />

parents of children needing urgent surgery<br />

at Alder Hey Children's Hospital, Liverpool,<br />

according to The Mail on Sunday.<br />

Thousands of letters were leaked in error<br />

by PSL Print Management, a Preston-based<br />

consultancy firm paid millions each year by<br />

the NHS. The lost documents were said to<br />

have contained names, addresses, phone<br />

numbers and NHS numbers. The information<br />

is reported to date back as far as 2015,<br />

despite data protection laws stipulating that<br />

medical data must be deleted as soon as it<br />

is no longer needed.<br />

That the NHS gets breached shouldn't be that<br />

much of a surprise, considering its scale and<br />

unwieldy structure. But to fail to adhere to<br />

the data protection laws, something that<br />

should be built in to its operating processes,<br />

suggests inattention and poor management.<br />

One person who recognises the pressure<br />

and strain that the NHS is under is Matt<br />

Aldridge, principal solutions consultant,<br />

Carbonite + Webroot. "The sheer size and<br />

scope of the NHS, its complex supply chain,<br />

and the fact that the public sector uses many<br />

contractors and outside parties, makes it<br />

a difficult task to manage and secure. It's<br />

therefore unsurprising that breaches of<br />

important medical information are becoming<br />

more and more common.<br />

MULTIPLE LAYERS OF DEFENCE NEEDED<br />

"The defence of our data is an ongoing task<br />

that never ends. To meet the challenge<br />

of securing the increasing<br />

amount of data generated and<br />

shared across healthcare<br />

networks, organisations need<br />

to take a proactive stance<br />

regarding<br />

data protection and cybersecurity," he adds.<br />

"Health data is incredibly important to people<br />

and is far more 'personal' than other<br />

information. This means that the industry is<br />

very much in the spotlight and must address<br />

security to the highest standard - and<br />

organisations must ensure they have multiple<br />

layers of defence in place to do so."<br />

This involves ensuring robust measures<br />

are in place to reduce the risks as much as<br />

possible and applying strict controls on how<br />

patient data can be stored and transmitted -<br />

relying purely on technology as an organisation's<br />

only form of defence is extremely<br />

short-sighted, Aldridge points out. "An<br />

organisation is only as strong as its weakest<br />

link - and, in terms of cybersecurity, poorly<br />

trained employees often unwittingly fill this<br />

role. Providing employees with<br />

the help that they need to<br />

become more security<br />

literate, as well as<br />

ensuring they<br />

make the<br />

best<br />

24<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


NHS breaches<br />

use of provided technology, is crucial to a<br />

successful multi-layered defence strategy."<br />

Staff training is therefore essential for<br />

defending against cyber-attacks, and<br />

employees need to know what to look out<br />

for, he points out. "The training materials<br />

used need to be updated continuously to<br />

reflect the latest threat trends - and regular<br />

simulations should be run to ensure that the<br />

training has the desired effect. Training will<br />

help prevent data leaks like this one, which<br />

seemingly occurred due to an employee error,<br />

and reduce the severity of attacks overall."<br />

There is also the added importance of<br />

having unique passwords for each service<br />

and enabling two-factor authentication<br />

whenever possible. "Individuals should remain<br />

vigilant in scrutinising the types of emails they<br />

receive - and this should be underpinned<br />

by cybersecurity technology such as email<br />

filtering and anti-malware protection. In<br />

addition to these layers of security, real-time<br />

assessment of bad or anomalous behaviours<br />

within the architecture are becoming more<br />

prevalent to help with breach detection.<br />

Finally, in this case, it appears that inadequate<br />

data archiving measures were in place to<br />

ensure compliance with data protection<br />

regulations - and it is important that<br />

archiving and backup processes are carefully<br />

planned and monitored to ensure the most<br />

effective data protection outcome."<br />

These layers of protection all need to build<br />

on a foundation of good cyber hygiene,<br />

such as regularly installing patches on servers,<br />

endpoints and network devices along with<br />

running reputable antivirus and anti-malware<br />

software, Aldridge concludes. "Policies and<br />

processes should also be in place to prevent<br />

confidential materials being sent via email or<br />

being extracted to the external USB storage."<br />

ANY DATA IS NOW AT RISK<br />

Given the current landscape, we must face<br />

the fact that any data is at risk of being<br />

leaked, breached, stolen or encrypted, says<br />

Peter Stelzhammer, co-founder at AV-<br />

Comparatives. "Organisations must be<br />

prepared and be aware that, even with the<br />

best protection money can buy, there is still<br />

the risk of an insider job, a hacker better than<br />

your cybersecurity system or a software bug<br />

in one of the systems." Information is there<br />

to be shared and this is especially important<br />

in the health sector- patient data must be<br />

available always and everywhere for those<br />

who need it, he states. "While this data is<br />

vital for patient care, security should not be<br />

sacrificed for accessibility."<br />

There is far more at stake in this sector than<br />

simply the loss of data, he continues: cyber<br />

criminals could potentially alter data sets,<br />

such as prescribed medications, or disrupt<br />

medical schedules posing a risk to the<br />

health and wellbeing of patients. "To protect<br />

sensitive data, organisations should use stateof-the-art<br />

multi-layered cybersecurity that is<br />

independently tested and they must restrict<br />

data access to only those people who really<br />

need it."<br />

Companies should also carry out risk<br />

management, not only for a data breach, but<br />

also what to do if your data gets lost, due to<br />

a faulty IT system. "It's also important to have<br />

a rolling back-up to help prevent huge data<br />

losses and speed up the process of getting<br />

back online," adds Stelzhammer. "If you can<br />

prepare a plan of what to do if a data breach<br />

happens by testing the systems and your<br />

incident response processes, this will help the<br />

entire workforce, not just the security team,<br />

should a breach occur."<br />

His final advice to organisations? "Don't bury<br />

your head in the sand," he comments. "Seek<br />

external help and, if a breach occurs, be sure<br />

to inform those concerned and the authorities<br />

immediately."<br />

THE TRADITIONAL APPROACH IS NOT<br />

THE WAY FORWARD<br />

Felix Rosbach, product manager at comforte<br />

AG, says that a data breach affecting the<br />

highly sensitive data of tens of thousands<br />

of NHS patients might make you question<br />

whether healthcare providers are serious<br />

about data privacy and security. "This<br />

report should trigger alarm bells within the<br />

healthcare sector," he states. "After all, it is<br />

difficult to grasp a situation in which<br />

thousands of subjects have had their most<br />

personal and sensitive health information<br />

compromised. And while it sometimes feels<br />

like we reached the point where nothing<br />

can be protected anymore, this is not the<br />

case. Often, these types of data breaches<br />

occur because of a traditional approach to<br />

cybersecurity, protecting borders and<br />

perimeters or limited budget due to unwise<br />

business decisions."<br />

Effective data security and the principles<br />

of Zero Trust need to be applied directly to<br />

sensitive patient information, he insists.<br />

"By protecting patient information utilising<br />

methods such as tokenisation or formatpreserving<br />

encryption, organisations can<br />

continue to work with sensitive data in its<br />

protected state. Better yet, if [or when]<br />

threat actors gain access to protected data,<br />

they cannot comprehend it or leverage<br />

it for personal gain or other nefarious<br />

purposes. If a healthcare organisation isn't<br />

actively assuming the worst and exploring<br />

data-centric security to protect patient<br />

data, the long-term prognosis doesn't look<br />

good," Rosbach warns.<br />

HUGE ATTACK SURFACE<br />

The healthcare sector has always been<br />

extremely attractive to threats actors<br />

looking to cause havoc, sys Ronan David,<br />

chief of strategy at EfficientIP. "Not only<br />

do healthcare organisations hold a wealth<br />

of customer and employee data, but the<br />

large number of devices and platforms<br />

connected to their networks means that<br />

their attack surface is huge. If the functions<br />

of the health system do not work, then it<br />

puts patient lives at risk, thus putting a<br />

severe amount of pressure on the NHS to<br />

give into the threat actor's demands?<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

25


NHS breaches<br />

Felix_Rosbach, comforte AG: effective<br />

data security and the principles of<br />

Zero Trust need to be applied directly<br />

to sensitive patient information.<br />

Matthew Aldridge, Webroot: unsurprising<br />

that breaches of important medical<br />

information are becoming more and more<br />

common.<br />

"We have witnessed many healthcare<br />

organisations become victims of cyberattacks<br />

and, while organisations have<br />

concentrated on trying to secure endpoints<br />

and certain devices, such as Internet-of-<br />

Things (IoTs), they fail to secure the Domain<br />

Name System (DNS), which is ultimately<br />

being used as a path for cyber criminals to<br />

launch cyberattacks. By design, DNS is an<br />

open service, with virtually all internet and<br />

internal network traffic travelling through it.<br />

If a DNS server goes down, then the<br />

network is essentially halted, which means<br />

access to vital applications and services will<br />

stop. DNS servers have therefore become a<br />

leading point of entry for attackers and data<br />

exfiltration."<br />

Research by EfficientIP and IDC found that<br />

the average cost per DNS attack increased to<br />

£629,720 in 2021, a rise of 12% from 2020<br />

and the sharpest increase seen, compared to<br />

other industries such as telco, finance, retail<br />

and education, he adds. "It is not just the<br />

monetary cost which has a significant<br />

impact on healthcare organisations, but<br />

also the length of time systems are down."<br />

According to David, it took the healthcare<br />

industry an average 6.28 hours to mitigate<br />

each attack, which is too long when it can<br />

take only seconds for a cyber criminal to<br />

launch an attack. 53% of companies said<br />

that application downtime could have heavy<br />

consequences for both patients and<br />

providers. "When healthcare professionals<br />

are already under enough pressure, the last<br />

thing they need is an announcement that<br />

their systems aren't working due to an<br />

attack on the DNS. To ensure proper<br />

protection, organisations need to implement<br />

DNS security solutions that enable real-time<br />

traffic analysis which can detect, and thwart<br />

threats hidden in the traffic. Additionally,<br />

application access control at the user level<br />

strengthens the security chain at the earliest<br />

point in the flow, reducing the attack<br />

surface and blocking the lateral movement<br />

of malware."<br />

If the healthcare industry wants to protect<br />

users, data and applications properly, DNS<br />

security is a must-have in any modern<br />

arsenal of defence against cybersecurity<br />

threats, he insists. "It must be seen as the<br />

absolute foundation to security and Zero-<br />

Trust projects."<br />

ACHIEVING THE PERFECT BALANCE<br />

Paul Prudhomme, head of threat<br />

intelligence advisory at IntSights, a Rapid7<br />

Company, believes achieving the perfect<br />

balance between usability and security has<br />

always been the greatest challenge for IT<br />

systems and this rings very true for the<br />

healthcare sector. "The time-sensitive nature<br />

of the healthcare industry has resulted in<br />

the clash between the two sides and has<br />

ultimately seen healthcare organisations<br />

prioritising usability," he points out. "With<br />

seconds making all the difference when<br />

it comes to patient care, security can<br />

sometimes be seen as an inconvenience,<br />

especially when operations are delayed for<br />

minutes or potentially hours due to security<br />

teams needing to patch a vulnerable<br />

device. However, this decision ultimately<br />

makes the healthcare industry a priority<br />

target for threat actors, knowing that there<br />

are plenty of vulnerable devices on their<br />

network, which have the potential to cause<br />

significant damage."<br />

Medical devices, such as operating room<br />

monitors, are a popular entry point for<br />

threat actors when trying to breach a<br />

healthcare organisation's network. Their<br />

weak security means that threat actors<br />

can easily leverage them for access and<br />

then move laterally across the network.<br />

"Hospitals are popular targets for ransomware<br />

gangs, due to the amount of personal<br />

data they hold. Patient records contain<br />

Personally Identifiable Information (PII),<br />

which can be held to ransom from the<br />

hospital or sold on the dark web."<br />

With hospitals seemingly being the perfect<br />

target for cyber criminals, the healthcare<br />

26<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


NHS breaches<br />

industry would greatly benefit from understanding<br />

who is likely to attack them and<br />

how, he adds. "It is also critical for the<br />

healthcare sector to strike the right balance<br />

between usability and security. Any chosen<br />

solutions should improve security posture,<br />

while minimising the impact on service."<br />

First, healthcare organisations should<br />

ensure that they have offline backups and<br />

strong encryption in place, Prudhomme<br />

recommends. "The best form of defence<br />

against threats like ransomware attacks is<br />

to eliminate the opportunity of paying a<br />

ransom demand. Ransomware gangs have<br />

learnt that backups are the best form of<br />

defence against their attacks and strong<br />

encryption is going to make it nearly<br />

impossible for them to leak the data."<br />

Healthcare organisations can look to<br />

technology such as threat intelligence to<br />

shed light on the tactics, techniques, and<br />

procedures (TTPs) of threat actors and get<br />

the heads up on threats before they<br />

actually happen. "This allows them to tailor<br />

their security strategy accordingly," he adds.<br />

"When healthcare organisations understand<br />

who may attack them and how they could<br />

do it, they can put security measures in<br />

place that are effective, but minimise the<br />

cost."<br />

CRIMINAL SUCCESS NOT A GIVEN<br />

While attacks are inevitable, criminal<br />

success is not, comments David Sygula,<br />

senior analyst at CybelAngel. "The trouble<br />

is that organisations are big and there is a<br />

lot of data in many hands. Organisations<br />

often don't realise that they've left sensitive<br />

data exposed and therefore believe they're<br />

completely secure." There are several ways<br />

that organisations can unintentionally<br />

leave data vulnerable to cyber theft, such<br />

as exposed databases, forgotten databases<br />

and third-party weaknesses.<br />

"Over time," he states, "we've noticed that<br />

a major cause of exposed cyber records is<br />

human negligence, either because of skill<br />

shortages, overwhelming workloads or lack<br />

of visibility. "To keep data secure, teams<br />

must stay on top of patching, although this<br />

can be complicated and time-consuming.<br />

Additionally, if the open API access is<br />

misconfigured, then all efforts will go to<br />

waste and the data will be left exposed<br />

anyway. One wrong move could result in<br />

devastating consequences."<br />

Looking beyond the initial fear of losing<br />

sensitive data, once an attacker gains<br />

access to the network they will endeavour<br />

to keep their foothold so they can breach<br />

more data. "No part of the system will be<br />

safe," warns Sygula. "It can be hard to tell<br />

which areas of the network are infected.<br />

Even if the initial point of entry is discovered,<br />

criminals can navigate undetected,<br />

causing major damage before they are<br />

finally discovered."<br />

GETTING THE BASI<strong>CS</strong> RIGHT<br />

An effective security strategy must be built<br />

on strong foundations - which start with<br />

getting the basics right, he adds.<br />

"As patching systems are a crucial element<br />

of securing data, organisations must ensure<br />

the necessary training is provided to avoid<br />

human error, especially if there is a skills<br />

shortage. Additionally, IP scanning solutions<br />

can help identify existing data leaks and<br />

which databases, cloud storage or network<br />

storage devices need priority action." The<br />

final step, he points out, is automating this<br />

process, so that incidents are handled<br />

quickly and efficiently.<br />

"Digital risk solutions are available to<br />

disrupt their kill chain by blocking the<br />

footholds that attackers rely on," Sygula<br />

concludes. "Organisations will be able to<br />

uncover existing exposures and correct any<br />

weaknesses within databases before any<br />

damage is done. This increased visibility is<br />

vital for maintaining and strengthening<br />

defences - and keeping attackers out."<br />

Paul Prudhomme, IntSights, a Rapid7<br />

Company: it is critical for the healthcare<br />

sector to strike the right balance between<br />

usability and security.<br />

Ronan David, EfficientIP: the Domain Name<br />

System is ultimately being used as a path for<br />

cyber criminals to launch cyberattacks.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

27


ansomware<br />

RANSOMWARE NOW A GLOBAL MENACE<br />

WITH MANY ORGANISATIONS USING OUTDATED AND INEFFECTIVE TECHNOLOGY AND<br />

CORPORATE STRATEGIES, THE FEAR IS THEY COULD SOON BE VICTIMS OF AN ALL-OUT ATTACK<br />

Hackers are increasingly offering services<br />

or exploits 'for hire', prompting the<br />

chief executive of the National Cyber<br />

Security Centre to urge organisations to<br />

review their defences. With ransomware<br />

branded "a rising global threat", what steps<br />

should they take to protect themselves? And<br />

are many of those using technology and<br />

corporate strategies that are no longer fit for<br />

purpose, leaving themselves increasingly likely<br />

to be ransomware's next victims?<br />

Here is what they seem to be up against.<br />

The 'as a service' market on the darknet,<br />

including ransomware-as-a-service, is<br />

growing rapidly. "This makes it easier for<br />

perpetrators to launch highly sophisticated<br />

cyberattacks," cautions Daniel Hofmann, CEO,<br />

Hornetsecurity. "In response, organisations<br />

must be prepared and amplify their<br />

defences."<br />

First of all, this means investing in, or<br />

upgrading to, a robust security service from<br />

a reputable third party, coupled with backup<br />

and recovery capabilities. This combined<br />

approach protects against attacks while<br />

enabling remediations should disaster strike.<br />

Both parts of the equation are essential,<br />

he says. "Heightened awareness across an<br />

organisation is equally important. Employees<br />

should receive cybersecurity training and<br />

refreshers, so that they can recognise<br />

ransomware and other malware, avoid<br />

succumbing to such threats and know what<br />

to do in case of an attack. As part of this,<br />

companies should also have the appropriate<br />

policies and an incident response (IR) plan,<br />

with a view to risk mitigation and damage<br />

control."<br />

To further batten down the hatches,<br />

companies should use multifactor<br />

authentication (MFA) and apply judicious<br />

permissions management, states Hofmann.<br />

"MFA enforces more than one method of<br />

user authentication. It is easy enough to<br />

implement and is a perfect foil to cybercriminals<br />

who have managed to steal<br />

a user's login credentials, for instance, since<br />

it prevents them from completing the next<br />

step to gain access. "<br />

Another tactic he singles out is to reduce<br />

the permissions granted to users and user<br />

accounts. "That, in turn, limits what an<br />

attacker can do, should the account be<br />

breached. This is particularly important<br />

for the accounts of system administrators<br />

themselves, given their access to entire<br />

IT systems."<br />

It's also about going back to basics to<br />

reduce risks, he adds: "installing the latest<br />

software updates to patch vulnerabilities,<br />

since there are typically publicly available<br />

exploits for these out there; and ensuring<br />

that the company's backups are functional<br />

through regular testing".<br />

Hofmann points out that it is pointless<br />

having a backup solution, if you are unable<br />

to recover backed up data. "Failing to look<br />

after aspects like this might leave systems<br />

administrators with a false sense of security."<br />

SOPHISTICATED, HIGH-IMPACT ATTACKS<br />

Britain, the United States and Australia<br />

recently issued a rare joint alert over<br />

a wave of ransomware attacks, warning that<br />

cyber gangs are becoming "increasingly<br />

professional". Cybersecurity authorities in the<br />

three countries said they had seen an increase<br />

in "sophisticated, high-impact" attacks on<br />

businesses, including in critical sectors such<br />

as health, education, financial services and<br />

energy, according to The Times.<br />

in response, Jim Hietala, vice president,<br />

business development and security for The<br />

Open Group, told Computing Security: "In the<br />

Digital Age, it's necessary for organisations<br />

to ensure a seamless flow of data across<br />

28<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


ansomware<br />

a plethora of networks, applications and<br />

storages. However, the dilemma is that it<br />

is no longer feasible, or even possible, to<br />

consider all elements of the service topology<br />

as 'trusted'. Zero Trust is a critical concept,<br />

because it brings security to the users, data/<br />

information, applications, APIs, devices,<br />

networks, cloud etc wherever they may be -<br />

instead of forcing them onto a 'secure'<br />

network.<br />

"The cybersecurity industry is more difficult<br />

to navigate than ever before," he adds.<br />

"Continuous data breaches and ransomware<br />

attacks, which are impacting commercial<br />

entities and governmental agencies, prove<br />

that network-centric approaches no longer<br />

work. The industry needs to establish<br />

standards and best practices for Zero Trust<br />

as the overarching information security<br />

approach for the digital age and create<br />

models that are data- and asset-centric,<br />

as opposed to traditional network-centric<br />

approaches."<br />

DEPLORABLE STATE OF SECURITY<br />

The only success story we can attribute to<br />

ransomware is publicly benchmarking its<br />

victims on the deplorable state of their<br />

organisation's security, says Ian Thornton-<br />

Trump, chief information security officer<br />

for Cyjax. "Although sensational headlines<br />

about a company becoming a victim and an<br />

endless stream of cyber security vendor fear,<br />

uncertainty and doubt related to 'protection<br />

from ransomware', it seems most people<br />

have missed the point. A cyber security event<br />

that involves ransomware is the result of<br />

one or more cyber security failures at a<br />

technological or human level. In short,<br />

ransomware is the symptom of the disease<br />

of poor cyber security, not something which<br />

'just happens'."<br />

He likens ransomware's impact on an<br />

organisation to the three-act structure model<br />

used in narrative fiction that divides a story<br />

into three parts (acts). Often called the<br />

'Setup', the 'Confrontation' and the<br />

'Resolution', it was popularised by Syd Field in<br />

his 1979 book 'Screenplay: The Foundations<br />

of Screenwriting'.<br />

THE SETUP<br />

In the beginning, systems are brought to<br />

their knees - outages happen. that's a fact of<br />

life, but it becomes sinister the moment you<br />

are told the files are stolen, encrypted and<br />

you must pay not to have them publicly<br />

dumped and pay for a decryption key and<br />

software. "Just a point here. If you claim you<br />

are investigating a 'cyber security incident'<br />

and its ransomware, and yet it takes you<br />

more than a week to inform customers and<br />

regulators, you may need to question your<br />

organisations capacity for incident response<br />

and understanding of governance, risk and<br />

compliance."<br />

THE CONFRONTATION<br />

The middle of a ransomware event is<br />

the 'chaos' of the event itself, requiring<br />

extraordinary efforts to restore services and/<br />

or negotiate with the attackers. This is the<br />

organisation in 'true' crisis where the very<br />

worst days of everyone's working life are<br />

being played out. "The only word that can<br />

adequately describe the feeling is profound<br />

'tragedy' - it's a loss against malicious actors<br />

and all the stages of grief are played out as<br />

a mad hunt is on for the install CDs, the<br />

licence codes and the backup tapes. It's an<br />

extraordinary stressful time and the single<br />

most destructive words to utter at this<br />

moment are: 'I told you so'."<br />

THE RESOLUTION<br />

The end of the event is the realisation, after<br />

the extraordinary expenditure of time, effort<br />

and money, that the ransomware could have<br />

been prevented, mitigated, if only the security<br />

expense, life cycle management, asset<br />

inventory etc <br />

had all been done proactively. Every ransomware<br />

event comes with a healthy amount of<br />

hubris and lessons learned - only if the post<br />

event discussion happens. Most organisations<br />

survive a ransomware event, but it's financial<br />

impact and customer trust may take years to<br />

repair.<br />

"When we examine the big ransomware<br />

stories - at least the ones that share deep<br />

technical details - there are always items<br />

which we could have done better or been<br />

more prepared for," continues Thornton-<br />

Trump. "Since the first crypto locker viruses in<br />

2015, it's hard to be sympathetic towards<br />

organisations that succumb to this attack in<br />

2021, but it's understandable. If you think<br />

ransomware is what you need to protect your<br />

organisation against, you're missing the story.<br />

Ransomware is telling you about the state of<br />

your security."<br />

FINANCIAL INSTITUTIONS<br />

TAKE A BATTERING<br />

"Financial institutions are facing rising cyber<br />

threats and the warning from the FCA serves<br />

as a reminder that no business is safe from<br />

attack," says Fabien Rech, VP EMEA, Trellix.<br />

"We recently found that the financial services<br />

industry accounted for 22% of ransomware<br />

and 37% of Advanced Persistent Threat<br />

detections in Q3 2021. As cybercriminals<br />

adapt their methods to target the most<br />

sensitive data and services, FS firms must<br />

shore up their defences to mitigate further<br />

threats."<br />

How exactly? "They must deploy a security<br />

strategy that includes a living platform that<br />

can learn and adapt defences based on the<br />

threat. This platform generates and prioritises<br />

comprehensive threat insights from both<br />

outside and inside the company to adaptively<br />

strengthen detection, and it responds in realtime<br />

to active threats."<br />

According to research findings from Trellix,<br />

in the third quarter of 2021 "high-profile<br />

ransomware groups disappeared,<br />

reappeared, reinvented and even attempted<br />

to rebrand, while remaining relevant and<br />

prevalent as a popular and potentially<br />

devastating threat against an increasing<br />

spectrum of sectors. Even though<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

29


ansomware<br />

Daniel Hofmann, Hornetsecurity:<br />

ransomware-as-a-service is growing.<br />

This makes it easier for perpetrators to<br />

launch highly sophisticated cyberattacks.<br />

Jamie Moles, ExtraHop: there are things<br />

that businesses can do to beef up their<br />

cybersecurity posture.<br />

ransomware activity was denounced and<br />

banned from numerous cybercriminal forums<br />

in Q2 2021, our team has observed activity<br />

among the same threat actors on several<br />

forums using alternate personas".<br />

Tellingly, in December 2021 Trellix provided<br />

research that assisted FBI and Europol in the<br />

arrest of REvil affiliates and the seizure of<br />

$2 million in ransom. "As the threat of<br />

ransomware continues to grow, financial<br />

institutions must rely on technology that<br />

moves as quickly as the cybercriminals and<br />

can adapt in real-time to get ahead," adds<br />

the company. "Unfortunately, failing to take<br />

this approach only means opening<br />

themselves up to an attack."<br />

ACTIVE COUNTERMEASURES NEEDED<br />

Ransomware is, of course, highly profitable<br />

and, as such, it's not going away anytime<br />

soon, points out Ashok Sankar, VP of product<br />

and solutions marketing, ReliaQuest. "The<br />

enlarged attack surface of the modern,<br />

digital enterprise, plus the interconnected<br />

supply chain, makes trying to stop it<br />

complex. Although the insistence of the<br />

N<strong>CS</strong>C and other security leaders urging<br />

organisations to strengthen defences is<br />

welcomed, unfortunately thinking purely<br />

from a reactionary perspective is not enough.<br />

We also need to deploy active countermeasures<br />

that target the weaknesses of<br />

the hostage takers."<br />

One of the characteristics of ransomware<br />

is it has a relatively long dwell time, Sankar<br />

adds. "On average, hackers are inside an<br />

organisation for around 10 weeks before<br />

striking. During this delay, hackers will move<br />

laterally through the network to carry out<br />

reconnaissance and pre-strike preparation<br />

which generates detectable patterns.<br />

Unfortunately, not every organisation has<br />

the tools and skill sets to decipher these<br />

'indicators of compromise' and react to the<br />

adversary's tactics. And even the ones that<br />

have are often chasing tails, due to potential<br />

false alerts."<br />

The response to ransomware needs three<br />

key pillars, he states. "The first is, of course,<br />

strengthening our defences. And that means<br />

not just buying more tools, but embracing<br />

organisation-wide frameworks and controls,<br />

such as Cyber Essentials, NIST, ISO27001 -<br />

or whatever works for your organisation.<br />

The MITRE ATT&CK framework is particularly<br />

useful in helping you to map out defences<br />

and understanding your level of preparedness.<br />

Implementation of controls needs to be<br />

supported with regular training and external<br />

audit, which recognises that people within<br />

the organisations and the threat landscape<br />

will constantly change."<br />

Next is a pragmatic approach, he advises.<br />

That means accepting that no single software<br />

element can stop ransomware. "Instead, we<br />

need to use what we have in more effective<br />

ways. This requires unifying the myriad of<br />

cyber security tools and ingesting telemetry<br />

from across the ecosystem, so there are<br />

no blind spots, driving singular situational<br />

awareness. Technology platforms that<br />

employ an XDR architecture can help<br />

integrate disparate systems and threat<br />

intelligence to make it easier to detect early<br />

signs of ransomware dwell. Finally, we need<br />

to be less prey and a bit more predator. We<br />

must be proactive and go hunting! This<br />

means employing expertise to actively chase<br />

down indicators of compromise that suggest<br />

hacker activities inside our systems. Just<br />

assuming that our defences are bulletproof is<br />

naïve, so allocating resources to more active<br />

responses is vital."<br />

FALSE SENSE OF SECURITY<br />

Ransomware is extremely threatening to<br />

organisations, whether they be government<br />

entities, privately owned businesses,<br />

healthcare providers or companies in charge<br />

of critical national infrastructure, states Jamie<br />

Moles, senior technical manager, ExtraHop.<br />

"What most organisations lack, however, is<br />

adequate IT security posture. According to<br />

a recent survey, 75% of UK IT decisionmakers<br />

are confident in their company's<br />

30<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


ansomware<br />

ability to meet cybersecurity threats, yet 82%<br />

of organisations have suffered a ransomware<br />

attack in the past five years. This false sense<br />

of security is dangerous and can leave the<br />

door open for bad actors."<br />

There are a few things businesses can do to<br />

beef up their cybersecurity posture, Moles<br />

adds. "Continuous monitoring of the network<br />

for the use of insecure protocols is one<br />

example. Having a network detection and<br />

response (NDR) tool that can flag early signs<br />

of a breach prior to exfiltration and the<br />

ransomware payload being deployed is<br />

a key step to stopping a full-blown attack.<br />

A quick response will also allow identification<br />

of where the threat actor entered, so that<br />

developers can mitigate risk and, if possible,<br />

patch vulnerable code."<br />

Realistically, it's not possible to stop every<br />

single attack, he points out. "Preventing<br />

criminals from entering networks is still<br />

important, but IT needs a plan for when<br />

an intrusion does happen -catching the<br />

attackers in their midgame before the<br />

intrusion develops into a successful breach<br />

and theft or encryption of data. Ensuring<br />

good protocol, network segmentation and<br />

behavioural monitoring of the environment<br />

is crucial for organisations to help protect<br />

themselves."<br />

UNWANTED GIFT<br />

Ransomware is "the gift that keeps on giving"<br />

is the wry observation of Keith Driver, chief<br />

technical officer at Titania. "It's one of<br />

cybercriminals' favourite tactics, and it works.<br />

Attacks are skyrocketing. It only takes a quick<br />

search to find the names of recent victims -<br />

Nvidia, McDonald's, Acer, Ultimate Kronos<br />

Group (UKG), Colonial Pipeline. The list goes<br />

on; and those are the ones we know about.<br />

It's been reported that 84% of organisations<br />

have fallen victim to some form of phishing<br />

or ransomware attack in the last 12 months.<br />

And it's predicted that the global costs will<br />

reach $20 billion, a 75% increase from half<br />

a decade ago." The escalating problem is<br />

something businesses need to get ahead of,<br />

he states. "As well as defending the permit,<br />

educating users about phishing and the<br />

dangers of corrupted devices, more robust<br />

network security, especially around the core<br />

network, needs to be at the centre of a<br />

company's IT security plan. Maintaining<br />

network integrity will prevent data from<br />

being lost, stolen or held to ransom."<br />

Network segmentation and the principle of<br />

least privilege should be at the top of the<br />

agenda, he says. "They help prevent lateral<br />

movement within the network, limiting<br />

attacker options and visibility of network data<br />

during an assault. Segmenting the network<br />

and implementing least privilege policies<br />

helps with the journey to Zero Trust architectures:<br />

design principles recommended by<br />

CISA, DISA and the UK's N<strong>CS</strong>C.<br />

The benefits of network segmentation are<br />

numerous, he adds. "As well as making it<br />

more difficult to move east to west to pivot<br />

across networks, it makes it easier to monitor<br />

the network, too, and reduces the mean time<br />

to detect and remediate an attack (MTTD<br />

and MTTR). Security professionals can identify<br />

threats faster and isolate incidents quickly<br />

with a well-planned segmented network.<br />

With ransomware, the less access to valuable<br />

information the criminals have, the less data<br />

they can hold at ransom." As attacks level<br />

up their sophistication, businesses need to<br />

increase their security and overall cyber<br />

hygiene to stay one step ahead. "You may<br />

not prevent the bad guys from getting in,<br />

but you can stop or limit them from getting<br />

what they want and ruining your business."<br />

THE LINUX LINK<br />

Finally, VMware has released a threat report<br />

titled 'Exposing Malware in Linux-Based<br />

Multi-Cloud Environments'. Key findings that<br />

detail how cybercriminals are using malware<br />

to target Linux-based operating systems<br />

include how ransomware is evolving to target<br />

host images used to spin workloads in<br />

virtualised environments.<br />

Ashok Sankar, ReliaQuest: the enlarged<br />

attack surface of the modern, digital<br />

enterprise, plus the interconnected<br />

supply chain, makes trying to stop<br />

ransomware complex.<br />

Ian Thornton-Trump, Cyjax: the only success<br />

story we can attribute to ransomware is<br />

publicly benchmarking its victims on the<br />

deplorable state of their organisation's<br />

security.<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

31


Log4shell<br />

LOGJAM OF CONCERNS<br />

LOG4SHELL IS A CRITICAL VULNERABILITY IN THE LOGGING TOOL LOG4J, USED BY MILLIONS OF<br />

COMPUTERS WORLDWIDE. THE FEAR IS THAT, SOME MONTHS ON, THE THREAT IT POSES IS FAR<br />

FROM OVER<br />

At the tail end of last year, a<br />

vulnerability was found in Log4j, an<br />

open-source logging library commonly<br />

used by apps and services across the internet.<br />

Log4shell is a critical vulnerability in the<br />

widely used logging tool Log4j, which is used<br />

by millions of computers worldwide running<br />

online services. A wide range of people,<br />

including organisations, governments and<br />

individuals are likely to have been affected by<br />

it.<br />

The problem is that, with time passing, the<br />

sense of threat diminishes and with it the<br />

urgency to ensure that this vulnerability has<br />

been dealt with properly. The crucial factor<br />

here is that, although fixes have been issued,<br />

they will still need to be implemented and it<br />

appears that this has been far from universal.<br />

What happens, if no action has been taken<br />

yet? "If left unfixed, attackers can break into<br />

systems, steal passwords and logins, extract<br />

data and infect networks with malicious<br />

software, the N<strong>CS</strong>C points out. "Log4j is used<br />

worldwide across software applications and<br />

online services, and the vulnerability requires<br />

very little expertise to exploit. This makes<br />

Log4shell potentially the most severe<br />

computer vulnerability in years."<br />

USED ACROSS MANY APPLICATIONS<br />

Log4j is an open-source Java logging library<br />

developed by the Apache Foundation. It is<br />

widely used in many applications and is<br />

present in many services as a dependency.<br />

This includes enterprise applications,<br />

including custom applications developed<br />

within an organisation, as well as numerous<br />

cloud services.<br />

The Log4j library is frequently used in<br />

enterprise Java software and is included in<br />

Apache frameworks, including: Apache<br />

Struts2, Apache Solr, Apache Druid, Apache<br />

Flink and Apache Swift. Other large projects<br />

including Netty, MyBatis and the Spring<br />

Framework also make use of the library.<br />

In December 2021, a number of<br />

vulnerabilities were reported in Log4j:<br />

CVE-2021-44228 - referred to as the<br />

'Log4shell' vulnerability, affects Log4j<br />

versions 2.0-beta9 to 2.14.1. It allows<br />

remote code execution and information<br />

disclosure if exploited<br />

CVE-2021-45046 - affects versions 2.0-<br />

beta9 to 2.15.0, excluding 2.12.2 and<br />

was originally reported as a Denial of<br />

Service when organisations are running a<br />

vulnerable non-standard configuration.<br />

Later research found that the same<br />

vulnerable configuration allowed a<br />

bypass of the mitigations to Log4shell,<br />

allowing remote code execution and<br />

information disclosure<br />

<br />

CVE-2021-45105 - affects Log4j versions<br />

from 2.0-beta9 to 2.16.0 - A similar<br />

denial of service issue to CVE-2021-<br />

45046 when organisations are running a<br />

vulnerable non-standard configuration.<br />

"An application is impacted by these<br />

vulnerabilities, if it consumes untrusted user<br />

input and passes this to a vulnerable version<br />

of the Log4j logging library," adds the N<strong>CS</strong>C.<br />

"Version 1 of the Log4j library is no longer<br />

supported and is affected by multiple security<br />

vulnerabilities. Developers should migrate to<br />

the latest version of Log4j."<br />

WHO IS AFFECTED BY THIS?<br />

Almost all software will have some form of<br />

ability to log (for development, operational<br />

and security purposes), and Log4j is a very<br />

common component used for this. "For<br />

individuals, Log4j is almost certainly part of<br />

the devices and services you use online every<br />

day. The best thing you can do to protect<br />

yourself is make sure your devices and apps<br />

are as up to date as possible and continue to<br />

update them regularly, particularly over the<br />

next few weeks."<br />

For organisations, it may not be<br />

immediately clear that your web servers, web<br />

applications, network devices and other<br />

software and hardware use Log4j, points out<br />

the N<strong>CS</strong>C. This makes it all the more critical<br />

32<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


Log4shell<br />

for every organisation to ensure they are not<br />

exposed to any potential threats from the<br />

logging tool and make all the necessary<br />

mitigations to ensure they do not become<br />

targeted.<br />

MASSIVE SHAKE-UP<br />

"The LogJam (or Log4Shell) debacle shook the<br />

world to its knees," says Niels Hofmans, head<br />

of security at Intigriti. "Open-source software<br />

is incorporated everywhere into the software<br />

we use on a daily basis. However, we often<br />

don't know what software 'materials', such as<br />

Log4j, are built into the code libraries and<br />

tools we operate-or even develop."<br />

The good news is that a new standard,<br />

called Software Bill of Materials (SBOMs), will<br />

hopefully bring some resolution to this<br />

problem, where a 'bill of materials' can be<br />

(securely) delivered along with packaged<br />

software releases, he adds. "This important<br />

bill will improve our supply chain security<br />

issues, at least by tenfold, since we will be<br />

able to track our software in a uniformed<br />

way. At the same time, software developers<br />

will be able to understand contents more<br />

clearly, identify all (transitive) dependencies,<br />

and match everything to any security<br />

vulnerabilities later on."<br />

At the least, companies should consume<br />

threat intelligence feeds (TI feeds) that<br />

describe the latest attacks, trends and<br />

patches so they stay on top of threats and<br />

prioritize accordingly. "And when<br />

cyberattacks do happen, a modern Web<br />

Application Firewall can stop web attacks<br />

from reaching your server; even better, if it<br />

allows you to tweak its settings to catch the<br />

latest attacks."<br />

Configuration hardening is the practice of<br />

disabling and tweaking aspects in a system to<br />

improve its security, which could have<br />

prevented this logging library from being<br />

exploited, advises Hofmans. "And, even if it's<br />

too late, endpoint detection & response<br />

should stop or alert any exploitation attempts<br />

and trigger you to go into red alert based<br />

on any abnormal system behaviour. Finally,<br />

to ensure an infected machine can only go<br />

so far, network segregation [akin to the<br />

Zero Trust Model] will limit its blast radius<br />

to only authorised peers and not the whole<br />

network."<br />

As the head of security for Intigriti and<br />

part-time bug bounty hunter; Hofmans<br />

warns that this type of creative attack<br />

certainly won't be the last. "However, there<br />

are many accessible controls software users<br />

can proactively implement now, rather<br />

than waiting for the next attack to<br />

happen."<br />

SERIOUS FLAWS MOUNT UP<br />

According to John Graham-Cumming, CTO<br />

at Cloudflare, Log4Shell is the third serious<br />

flaw that has affected a wide range of<br />

Internet services: Heartbleed in 2012,<br />

ShellShock in 2014 and now Log4Shell in<br />

2021. "The Log4Shell vulnerability allows<br />

an attacker to execute code on a remote<br />

server, a so-called Remote Code Execution<br />

(RCE). The vulnerability was particularly<br />

serious, because of the widespread use of<br />

Java and Log4j. Importantly, even non-<br />

Internet facing software that uses Java<br />

could have been exploitable as data gets<br />

passed from system to system.<br />

"When vulnerabilities like this are<br />

disclosed, it's important for companies to<br />

do two things: make sure their firewall is<br />

configured to block the attacks - and talk<br />

to their firewall vendor to see if they've<br />

rolled out a specific blocking rule - and<br />

patch the vulnerability as soon as possible."<br />

Other best practices he recommends<br />

include filtering and logging DNS queries<br />

to block queries made to known malicious<br />

destinations, securing network traffic<br />

leaving your infrastructure with an<br />

updated, and inspecting and filtering HTTP<br />

traffic, which can block attacker attempts<br />

to reach their destinations.<br />

Niels Hofmans, Intigriti: the good news is<br />

that a new standard, called Software Bill<br />

of Materials (SBOMs), will hopefully bring<br />

some resolution to this problem.<br />

DANGER ON THE HORIZON<br />

While Tim Mackey, principal security strategist<br />

at the Synopsys CyRC (Cybersecurity Research<br />

Center), recognises how Log4Shell would<br />

have impacted businesses on many levels, he<br />

emphasises most of all how any attack<br />

targeting Horizon could represent a<br />

disruptive threat to operations for those who<br />

are running VMware Horizon as part of a<br />

remote work programme. "As background,<br />

many VMware products include Apache<br />

log4j2 as their logging mechanism," he<br />

states, "and, as the evolution of the log4j2<br />

patches occurred, VMware was proactive in<br />

their patch and mitigation efforts." Patch and<br />

mitigation information has been available for<br />

Horizon since December.<br />

"From a risk management perspective,<br />

focusing attention on VMware Horizon, or<br />

any other individual product that uses log4j2,<br />

misses the real business risk associated with<br />

Log4Shell. If your patch management<br />

process missed Log4Shell or you had to<br />

manually scan each system to identify log4j2<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> computing security<br />

33


Log4shell<br />

Jude McCorry, SBRC: all organisations must<br />

consider themselves at risk of this global<br />

vulnerability until it has been confirmed that<br />

they are not.<br />

Tim Mackey, Synopsys CyRC (Cybersecurity<br />

Research Center): any attack targeting<br />

Horizon could represent a disruptive threat<br />

to operations for those who are running<br />

VMware Horizon as part of a remote work<br />

programme.<br />

usage, then that patch management process<br />

isn't really prepared for a world where open<br />

source technologies power business. That's<br />

unfortunate, as multiple reports hold that<br />

upwards of 70% of commercial software is<br />

based on open source libraries."<br />

Of course, if your team patched Horizon, or<br />

any other application using log4j2, that<br />

doesn't mean the risk is mitigated, he warns.<br />

"In the early days of a major vulnerability like<br />

Log4Shell, attackers know that they're in a<br />

race against the patch management team<br />

and will quickly be locked out of vulnerable<br />

systems as they are patched. To solve for this<br />

problem, they compromise the vulnerable<br />

systems and install software that they<br />

control. That software can take many forms,<br />

but its objective is to provide an entry point<br />

for the attackers to mount the second phase<br />

of their attack - potentially weeks or even<br />

months later."<br />

OUT OF CONTROL<br />

It is that second phase where the real<br />

damage is done and why patch<br />

management is only part of the puzzle, he<br />

adds. "Any system where the owner of the<br />

system doesn't have a complete inventory of<br />

all running and runnable software or where<br />

such an inventory does exist, but isn't<br />

validated against an approved bill of<br />

materials for the software on the system,<br />

can't claim to be in complete control of that<br />

system. Put another way, if an attacker<br />

knows more about what software is on a<br />

computer system than the owner does, then<br />

the attacker is in control."<br />

As far as VMware Horizon is concerned,<br />

one way to mitigate this risk is for all Horizon<br />

components to be provisioned from golden<br />

VM images where all patches are preapplied.<br />

"Of course, that still leaves the<br />

problem of patch management," states<br />

Mackey, "and, where open source is involved,<br />

that's a problem best solved using<br />

technology known as Software Composition<br />

Analysis, and the best tools work with both<br />

binary and source files."<br />

THE THREAT HAS NOT GONE AWAY<br />

In the immediate wake of the Log4Shell<br />

debacle, the Scottish Business Resilience<br />

Centre (SBRC) was quick to call on all<br />

organisations in Scotland to ensure their<br />

systems and devices were updated to<br />

mitigate the impact. It was just one more<br />

serious issue that organisations needed to be<br />

aware of.<br />

Speaking of the vulnerability now, Jude<br />

McCorry, CEO of SBRC, comments:<br />

"Exploitation of Log4Shell has peaked, but<br />

there will still be cases where the vulnerability<br />

may not be uncovered, due to more obscure<br />

entry points or them already being<br />

embedded in proprietary software, both of<br />

which are not as trivial to identify.<br />

"When a vulnerability of this scale is<br />

identified, organisations can't just assume<br />

that it is only work devices that are on the<br />

line - personal devices are also at risk and so<br />

must be part of the updating process. Acting<br />

quickly and looking into other services that<br />

are used - including third-party software -<br />

helps to provide peace of mind.<br />

"Log4Shell had enormous public exposure<br />

and in parallel we saw a huge volume of<br />

attempts to discover the presence of the<br />

vulnerability across infrastructure, both<br />

ethical and malicious. Given the current<br />

threat landscape, it is not enough to only<br />

remediate critical vulnerabilities when they<br />

are found," adds McCorry. "There must be a<br />

concerted effort to search for indicators of<br />

compromise to ensure that organisations<br />

have not already been breached before<br />

having a chance to patch any such<br />

vulnerability. Individuals and organisations<br />

must turn to trusted sources to keep up to<br />

date on credible threats to operations like<br />

this. The SBRC app provides push<br />

notifications within minutes of the insight<br />

being received, covering cyber threats with<br />

accurate guidance."<br />

34<br />

computing security <strong>Mar</strong>/<strong>Apr</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk


Computing<br />

Security<br />

Secure systems, secure data, secure people, secure business<br />

Product Review Service<br />

VENDORS – HAS YOUR SOLUTION BEEN<br />

REVIEWED BY COMPUTING SECURITY YET?<br />

The Computing Security review service has been praised by vendors and<br />

readers alike. Each solution is tested by an independent expert whose findings<br />

are published in the magazine along with a photo or screenshot.<br />

Hardware, software and services can all be reviewed.<br />

Many vendors organise a review to coincide with a new launch. However,<br />

please don’t feel that the service is reserved exclusively for new solutions.<br />

A review can also be a good way of introducing an established solution to<br />

a new audience. Are the readers of Computing Security as familiar with<br />

your solution(s) as you would like them to be?<br />

Contact Edward O’Connor on 01689 616000 or email<br />

edward.oconnor@btc.co.uk to make it happen.


PLAY IT<br />

SAFE WITH<br />

365 TOTAL<br />

PROTECTION!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!