Cyber Defense eMagazine July Edition for 2022
Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Access-as-a-service (aka initial access brokers)<br />
a common way <strong>for</strong> criminals to gain access to an organization’s network is by relying on access-as-aservice<br />
groups, aka initial access brokers (iab).<br />
Ransomware operators depend on iabs to reduce the need <strong>for</strong> extended reconnaissance or the time to<br />
find a method <strong>for</strong> entry. Initial access brokers provide ransomware attackers with an easy way into<br />
corporate networks, paving the way <strong>for</strong> the actual damaging attacks. The access-as-a-service<br />
marketplace is the source of the disconnect between an initial corporate breach and the subsequent<br />
attacks that follow days or even months after. As a result, security professionals argue that criminals no<br />
longer break into networks or systems; they instead simply log in.<br />
Strengthen resilience against RaaS attacks<br />
Organizations can take several steps to increasing their resilience against raas attacks, including:<br />
• Deploy multi-factor authentication <strong>for</strong> all your applications and systems, <strong>for</strong> all your users<br />
• Encrypt all your data-at-rest<br />
• Keep all operating systems and software up to date.<br />
• Secure and monitor rdps and make sure they are not exposed to the internet<br />
• Implement a user training program and phishing exercises<br />
• Require all accounts with password logins to have strong, unique passwords.<br />
• Protect cloud storage by backing up to multiple locations.<br />
• Segment networks<br />
• Identify, detect, and investigate abnormal activity and potential traversal of the indicated<br />
ransomware with a network-monitoring tool.<br />
Secure identities are the foundation of a zero-trust policy<br />
The boundaries of digital enterprises cannot be confined within four walls. Identity has emerged as the<br />
frontier to defend and protect businesses against a multitude of threats, including ransomware gangs.<br />
Identity is also one of the foundational pillars of zero trust architecture, with nist and the omb<br />
memorandum highlighting the importance of securing digital identities to prevent data breaches and<br />
ransomware attacks.<br />
In this regard, two essential practices <strong>for</strong> establishing a zero trust policy include access control and<br />
network micro-segmentation.<br />
Access control is based on verifying and authorizing identities to access the right resources.<br />
Authentication gives us in<strong>for</strong>mation about who the identity is, while authorization grants access <strong>for</strong> the<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 89<br />
Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.