04.07.2022 Views

Cyber Defense eMagazine July Edition for 2022

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Access-as-a-service (aka initial access brokers)<br />

a common way <strong>for</strong> criminals to gain access to an organization’s network is by relying on access-as-aservice<br />

groups, aka initial access brokers (iab).<br />

Ransomware operators depend on iabs to reduce the need <strong>for</strong> extended reconnaissance or the time to<br />

find a method <strong>for</strong> entry. Initial access brokers provide ransomware attackers with an easy way into<br />

corporate networks, paving the way <strong>for</strong> the actual damaging attacks. The access-as-a-service<br />

marketplace is the source of the disconnect between an initial corporate breach and the subsequent<br />

attacks that follow days or even months after. As a result, security professionals argue that criminals no<br />

longer break into networks or systems; they instead simply log in.<br />

Strengthen resilience against RaaS attacks<br />

Organizations can take several steps to increasing their resilience against raas attacks, including:<br />

• Deploy multi-factor authentication <strong>for</strong> all your applications and systems, <strong>for</strong> all your users<br />

• Encrypt all your data-at-rest<br />

• Keep all operating systems and software up to date.<br />

• Secure and monitor rdps and make sure they are not exposed to the internet<br />

• Implement a user training program and phishing exercises<br />

• Require all accounts with password logins to have strong, unique passwords.<br />

• Protect cloud storage by backing up to multiple locations.<br />

• Segment networks<br />

• Identify, detect, and investigate abnormal activity and potential traversal of the indicated<br />

ransomware with a network-monitoring tool.<br />

Secure identities are the foundation of a zero-trust policy<br />

The boundaries of digital enterprises cannot be confined within four walls. Identity has emerged as the<br />

frontier to defend and protect businesses against a multitude of threats, including ransomware gangs.<br />

Identity is also one of the foundational pillars of zero trust architecture, with nist and the omb<br />

memorandum highlighting the importance of securing digital identities to prevent data breaches and<br />

ransomware attacks.<br />

In this regard, two essential practices <strong>for</strong> establishing a zero trust policy include access control and<br />

network micro-segmentation.<br />

Access control is based on verifying and authorizing identities to access the right resources.<br />

Authentication gives us in<strong>for</strong>mation about who the identity is, while authorization grants access <strong>for</strong> the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!