Is it Possible to Still Browse Anonymously?

Is it Possible to Still Browse Anonymously?

When it comes to cybersecurity, there are no guarantees, and the same holds true for browsing the internet. Though there are steps you can take to increase privacy and make yourself more anonymous, achieving total and complete privacy and anonymity is unlikely.

There are many reasons organizations and individuals seek to browse the internet anonymously or privately. For businesses, keeping employee internet traffic private is a matter of security: shielding employee internet traffic makes it more difficult for cybercriminals to gather the information they need for social engineering attacks or blackmail. As such, taking organizational-wide steps to improve employee privacy as well as educating employees about the importance of privacy and what steps they can take is critical for any security posture. 

To help you best safeguard your organization, we have created this handy guide outlining some tools and policies you may want to consider adopting.

Private is Not the Same as Anonymous

It takes a surprising amount of work to remain anonymous on the internet. Though many articles and organizations within the cybersecurity space use the terms “anonymity” and “privacy” interchangeably, they are not actually interchangeable. 

An encrypted message is private because only you and the recipient can read its contents, but because of metadata, you aren’t actually anonymous. Metadata is snippets of information that provide context about the message, such as who you are talking to, how long you have been exchanging messages, how many messages you have sent, the presence and size of attachments, and what medium you are using (text, email, etc.), and unlike the contents of your message, isn’t encrypted. 

Because you can’t encrypt this metadata (which can be accessed by cybercriminals and other unauthorized individuals with the right tools, technical knowledge, and motivation), you can’t actually browse the internet or send messages anonymously.

Tips & Tools to Increase Your Privacy Online

Is it Possible to Still Browse Anonymously?

Using Tor & Signal

Adopting Tor and Signal for your internet browsing and message sending needs is a good place to start. 

Tor

Tor is the largest, most comprehensive, and highly effective meta-data resistant piece of software designed to promote privacy and anonymity. Though Tor doesn’t guarantee it will keep your browsing habits private, it is the best option currently available. Tor has developed a bit of a bad reputation because it is favored by criminals looking to keep their illegal activities secret, but it has also been a critical tool for journalists looking to research stories anonymously and has even partnered with Reporters Without Borders. However, using Tor comes with some complications: browsing the internet over Tor is slower than using other search engines, and some large web services block Tor users. 

Tor is available for both desktop browsing (Linux, Mac, and Windows) and mobile browsing on both Android and iOS devices

Signal 

Signal is a popular and highly effective messaging app that allows users to send and receive encrypted text messages, voice memos, audio calls, and video calls. Its user interface is similar to other popular messaging apps, making it easy to use even for less tech-savvy individuals.

However, just because your messages are private doesn’t mean you are anonymous. Any network-level adversary can tell you are using Signal, and government agencies such as the CIA can still digitally peek over your shoulder using malware. Also, the metadata associated with Signal users is still available, so organizations such as the US government and Five Eyes are able to access Signal traffic to learn who is communicating with whom when they are communicating and how long they have been in communication. Though the developers of Signal are aware of these shortcomings, metadata-resistant communication remains an unsolved technical problem. 

In short, Signal is the best encrypted messaging app available, offering a more private communication experience, but it isn’t perfect and cannot be relied on for total or even strong anonymity. 

VPNs Are Useful, But Don’t Actually Offer Anonymity (Only Privacy)

VPNs (virtual private networks) do not actually anonymize your browsing. All they do is move trust from your ISP address (at home, at the office, at your local coffee shop) to someone else’s server. VPNs can be incredibly effective security tools (and vital for remote workers who might be logging on from less than secure networks), but they don’t offer anonymity. 

Since the VPN just shifts your traffic to their server, they can still see all of your traffic; as such, if someone you wish to hide your browsing from accesses the VPN’s servers (either through a cyber attack or via legitimate means such as a court order) they will also be able to see all your traffic. 

Is it Possible to Still Browse Anonymously?

Using Zero-Knowledge Services

Many of the tools you likely use every day, including Gmail, Office365, and DropBox, know everything you do on their respective platforms; Google reads your emails, Office365 can access everything you write, and DropBox has the ability to open and examine all files you upload. These three organizations, along with many more, are also Prism providers, which means they cooperate with mass surveillance programs and, as such, are willing to share anything you do on their platforms with the US government.

While you can protect your privacy on these platforms by encrypting everything you do, you can also choose more privacy-conscious alternatives such as SpiderOak (an alternative to DropBox) or Protonmail (as opposed to Gmail). You should carefully vet these companies for yourself before using their products, but these zero-knowledge options are certainly worth exploring further. 

Check Your App Permissions

Though Apple recently released an update designed to improve user privacy and security (including limiting photo and location access, discouraging Wi-Fi tracking, and at a future date, limiting app tracking), both Apple and Android users should still take the time to check their app permissions. Many apps request greater permissions than they need (including camera and microphone access, location data, and other information), raising security and privacy concerns. 

Be sure to periodically check your app permission settings and revoke unnecessary permissions. 

Consider Installing an Ad Blocker on Your Browser

Ads used to be targeted at wide demographics, using a one-to-many broadcasting model. However, targeted advertising now means that what ads you see while browsing the internet are specifically tailored to you to maximize your chances of clicking a link or buying a product or service. This personalization is possible because of online tracking.

Installing an ad blocker won’t completely hide your browsing activities from curious advertisers, but products such as Brave Browser, AdBlock, and the Electronic Frontier Foundation’s Privacy Badger offer better protection than nothing at all. 

Consider an Ad Blocking DNS Service 

To block ads at the network level, you may want to consider a DNS adblocker such as Pi-hole. DNS ad blockers are basically DNS (domain name system) servers that act as DNS sinkholes, blocking ad traffic by checking requests from your browser (in this case, coming from advertisers who want to serve you ads) against your client hosted DNS server, which contains a list of domains that usually serve ads. If a requester is on that list, their request is denied, blocking the ads before they even reach your computer. This approach is usually done via hardware (for example, Pi-hole requires a Raspberry Pi). 

Technically savvy readers who use Windows may want to consider checking out this handy guide on DNS-level ad Blocking from Privacy International

Fire Your Digital Assistant

Google Home, Amazon Echo, and Apple’s Siri offer convenience, but they are a privacy nightmare. In order to know when to update your grocery list, play a requested song, or call your parents, these devices need to be constantly listening for instructions. Private conversations aren’t private if you have a digital spy in the room, but even if you refuse to get an Amazon Ring for your front door, it doesn’t really matter if they are ubiquitous in your neighborhood. 

However, if you are concerned about privacy, you should still consider banning these devices from the office (and the home office) and turn off Siri voice activation.  

Use Common Sense

At its core, privacy is about autonomy: choosing which information you share and with whom. A good general rule is that you are doing something you don’t want the world to know about, it’s probably best to keep it off the internet. If your team needs to discuss a top-secret project, have them meet in person (when it’s safe to do so) or limit communication to secure devices and products only.

Depending on the nature of your business, you may want to create clear social media and internet use guidelines for employees, contractors, volunteers, and any other individuals involved in your organization.

It’s almost impossible to be truly anonymous on the internet, but that doesn’t mean there aren’t steps you can take to improve privacy (and, by extension, security) at the individual and organizational level. For more information about steps, your organization can take, please contact the Virtual Armour team today.

Terms & Phrases Used in the Managed IT & Cybersecurity Industries

Terms & Phrases Used in the Managed IT & Cybersecurity Industries

Recent cyberattacks, including the SolarWinds attack and the Microsoft Exchange attack, have renewed focus on how critical a good cybersecurity posture is. Managed IT services and cybersecurity promise to help organizations manage their IT and keep their data safe and compliant, but not everyone is clear on what exactly a managed IT provider does, what cybersecurity is, and what the various technical terms used in the industry mean. 

To help you understand what managed IT and cybersecurity are, and why they are important, we’ve created a handy little guide that explains common terms you may encounter and demonstrates how they pertain to the larger cybersecurity or managed IT picture.

Cybersecurity

What is Cybersecurity?

In the broadest sense, cybersecurity refers to techniques used by either companies or their cybersecurity services provider to protect an organization’s digital assets. Digital assets include both your digital infrastructure (networks, systems, and applications) as well as your data (such as financial records, client lists, and other records). By taking steps to protect these digital assets, organizations can better safeguard themselves against cyberattacks, where threat actors or attackers (also called hackers) attempt to gain unauthorized access to infrastructure or data for nefarious purposes. 

Types of Cybersecurity Solutions

Many of these solutions overlap, creating a “swiss cheese” model approach to cybersecurity: not every program is going to be able to catch everything, but layering multiple programs and strategies together reduces the chances that someone or something malicious is able to slip through all your defenses. 

Anti-Virus (AV)

Antivirus is a type of security software used by IT professionals to scan for, detect, block, and eliminate malware (malicious software). AV programs typically run in the background and rely on known malware signatures and behavior patterns. Though AV is useful, it is just one piece in the cybersecurity puzzle and isn’t enough to protect your digital assets on its own.

Endpoint Detection & Response (EDR)

Endpoint detection and response refers to a set of tools and solutions that are used to detect, investigate, and mitigate suspicious activities on endpoints (devices that can access the network, including computers and smartphones) and on hosts (such as networks). EDR is valuable because it can detect advanced threats that don’t have a known behavioral pattern or malware signature (like AV requires). EDR can also trigger an adaptive response (like your immune system springing into action) depending on the nature of the threat it has detected. 

Managed Detection & Response (MDR)

Managed detection and response is a piece of the SOCaaS (Security Operations Center as a Service) model that offers a comprehensive solution for continuous threat monitoring, threat detection, and incident response and is provided by a third-party vendor. Holistic, turnkey solutions like this can help provide peace of mind, giving IT professionals the information they need to prioritize incidents and improve the overall security posture of the organization.

Network Operations Center (NOC)

A network operations center refers to a central hub that allows network administrators to manage and control their network or networks and their primary server across several geographically distributed sites (such as a head office managing and observing multiple branch locations). Because network administrators need to deal with threats and headaches such as DDoS attacks (discussed later in this article), power outages, network failures, routing black holes, and other issues, it is critical that they are able to oversee the entire network and react to threats quickly and easily. 

A NOC is not a security solution, but it can help larger organizations effectively monitor their networks, endpoints, and other critical infrastructure and devices for signs of trouble and is frequently used in Managed IT.

Security Operations Center (SOC)

A security operations center is crewed by cybersecurity personnel and handles threat detection and incident response processes, all while supporting the various security technologies your security operations rely on. While larger enterprises often build and manage their SOC in-house, small and medium-sized organizations don’t typically have the personnel or bandwidth to do so. As such, SMBs (small and medium-sized businesses) frequently choose to outsource their SOC to trusted partners.

Security Information & Event Management (SIEM)

SIEM is a vital tool used to collect and aggregate security events and alerts across multiple security products. Once this information has been gathered, the SIEM software analyzes and correlates those events to look for patterns that might identify potential threats within the organization. 

SIEM is useful, but only if it is being actively managed. The aggregated data is only useful if it can be interpreted and used effectively to better improve your security posture. As such, many organizations are elevating their SIEM approaches and adopting the SOAR (Security Orchestration, Automation, and Response) model.

Vulnerability Management (VM)

Vulnerability management solutions are programs that are used to identify, track, and prioritize internal and external cybersecurity vulnerabilities. This information is used to optimize cyberattack prevention activities (such as patching known vulnerabilities, upgrading software, and fixing configuration errors). 

Patches refer to small programs released by software development companies to fix vulnerabilities they have discovered in their products. Keeping your software up to date allows your organization to take advantage of any security patches released, allowing you to better safeguard your digital assets. Unpatched software leaves your organization vulnerable since cybercriminals often target recently patched software in the hopes that not all organizations will have the patch installed.

Vulnerability Assessment (VA)

Vulnerability assessments are used to identify, classify, and prioritize vulnerabilities and can be used to assess internal, external, or host-based, third-party systems. 

Common Types of Cyberattacks

Cyberattacks are becoming increasingly common and can be devastating. A single attack can compromise your systems and your data, ruin your reputation, and even lead to legal trouble and compliance issues if it isn’t addressed and remediated swiftly.

If you have experienced, or are currently experiencing, a cybersecurity attack, please contact our team right away and consider reviewing our article “Hacked? Here’s What to Know (& What to Do Next)“.

Brute-Force Attacks

Brute force attacks are crude but frequently effective. During a brute-force attack, a cybercriminal attempts to gain unauthorized access to a system by trying all possible passwords until they guess the correct one. Though this could take centuries by hand, many criminals have software that allows them to try passwords quickly, making this a viable hacking option.

Phishing & Social Engineering

Phishing attacks involve a cybercriminal attempting to trick potential victims into revealing confidential information (such as your banking details, your credit card number, your SIN, or your password) or install malware by clicking a link or opening an infected file. Phishing attempts usually involve text-based communications such as email, text messages, or other messaging apps. Cybercriminals usually pretend to be someone you are already primed to trust, such as your boss or an employee from your bank.

We discuss phishing (and steps you can take to protect yourself) more in-depth in our article “Don’t Let Phishing Scams Catch You Unaware”.

Phishing scams are a type of attack that uses social engineering. Social engineering is when attackers use psychological manipulation to infiltrate an organization or private network by exploiting human weaknesses and tricking unsuspecting users into granting access or handing over sensitive information. This manipulation relies on the human desire to help and trust easily and may also use the fear of getting in trouble or causing an inconvenience. 

For more information about social engineering, how it works, and how to spot potential social engineering attacks, please consider reading our article “In a Remote World, Social Engineering is Even More Dangerous”.

Credential Stuffing

Credential stuffing involves using existing databases of compromised usernames and password combinations (typically collected during a previous breach and frequently purchased on the dark web) to attempt to login to a targeted account. 

The dark web refers to a part of the internet that isn’t indexed by search engines such as Google, so it can’t be accessed by simply typing in a URL (such as www.virtualarmour.com) into your browser. This secrecy has made the dark web a popular place for criminals, allowing them to buy and sell illegal items (such as credit card numbers, illegal weapons, and malware) away from the gaze of law-abiding internet users.

Cryptojacking

Cryptojacking is an attack that involves the unauthorized user of someone else’s computer to mine cryptocurrencies. Though this type of attack isn’t likely to damage data or systems, it is still concerning because it means someone has access to your digital assets without your knowledge or consent. It can also affect the performance of your system and cost you money since the attack siphons off computing power and uses electricity that your company is paying for.

For more information about cryptojacking, please consider reading our article “Cryptojacking: Because Every Currency Needs to Be Protected”. 

Data Breach

A data breach, also called a hack, refers to any event where unauthorized users are able to gain access to your systems or steal sensitive information such as PII (personally identifiable information) from an organization or individual. The goal of a data breach is usually to either use this information to gain unauthorized access to other systems (such as using your Netflix username and password to try and log into your bank account) or to sell this information to other cybercriminals.

Distributed Denial of Service (DDoS)

DDoS attacks attempt to crash a web server or other online service by flooding it with more traffic than the network can handle. This can be done either by a large group of cybercriminals working together or a single cybercriminal with a large botnet (connected computers performing repetitive tasks). By overloading the server, cybercriminals can prevent legitimate users from accessing a company’s products or services.

DNS Hijacking

DNS hijacking (also called DNS redirection or DNS poisoning) redirects queries from the intended Domain Name System (DNS) to a different website, often populated with malware, advertising, or other unwanted content. The DNS acts like a phone book for the internet, so DNS hijacking involves forcing the browser to dial the wrong number (or go to the wrong website). 

Drive-By Attack

A drive-by attack is a form of malware attack. However, unlike phishing or other forms of malware attacks, users don’t need to be tricked into downloading infected files or opening suspicious links. Instead, user devices are infected automatically when the user visits a trusted or legitimate website that has been compromised. 

Exploit 

An exploit is a malicious script (a list of commands executed by a program) or application that exploits known vulnerabilities in endpoints or other hardware, networks, or applications. The goal of exploit attacks is usually to take control of a system or device, increase access privileges, or steal data. Exploit attacks are often used as part of a larger, multi-layered attack. 

Malware

Malware refers to any form of malicious software and is often spread via email attachments or suspicious website links. The goal of malware is to infect endpoints to gain access to sensitive systems or data or collect private information such as passwords or banking details and send this information back to the attacker. 

Ransomware

Ransomware is a type of malware that prevents end-users from accessing an organization’s data or system or an individual’s data or system. Once the files or system is encrypted, and the user is locked out, the attacker promises to restore access in exchange for money, usually in the form of cryptocurrencies.

Supply Chain Attack

Supply chain attacks occur when threat actors are able to access a target’s systems by compromising a third-party resource, which is what happened with the SolarWinds attack. The reason that attack was so devastatingly effective is that the attackers were able to gain access to a SolarWinds program called Orion, which is widely used by companies and US government departments to manage IT resources. When SolarWinds sent out a routine Orion update, they didn’t realize it contained malicious code, which allowed the attackers to access client systems. 

As was the case with the SolarWinds attack, the compromised vendor is typically not the final target but instead is used as a means to an end so the attacker can gain access to their intended victim’s systems. However, the damage is not limited to the intended victim but affects any other organization that inadvertently downloaded the compromised software. 

Common Cybersecurity Compliance Regulations 

Compliance is a large part of cybersecurity for many verticals and industries, including healthcare, finance, energy, and retail. Which regulations you need to comply with depends on a variety of factors, such as your industry or vertical, what sort of PII or sensitive information you handle, who you do business with (such as the US Department of Defense), where your users or clients are located, and whether or not you process credit card payments. To find out which regulations apply to you, please speak to a qualified compliance professional. 

Healthcare 

Healthcare providers and related organizations need to comply with Health Insurance Portability & Accountability Act (HIPAA) regulations. HIPAA is responsible for establishing cybersecurity standards for healthcare providers, insurers, and all third-party service providers that medical organizations do business with. 

More information about these standards can be found here on the US Department of Health and Human Services website.

Organizations with European Users

General Data Protection Regulation (GDPR) is a European Union law that dictates how personal data on individuals residing in the EU and the greater European Economic Area is collected and processed and specifies the rights users have to access and control their data on the internet. Even if your organization is not based in Europe, if you have users in Europe, you must be compliant. 

GDPR specifies several rights users have, but the most common are:

  • Legal basis for processing
  • The right to erasure (also called the right to be forgotten)
  • The right to access
  • The right to rectification
  • The right to data portability

Details about GDPR and how to ensure compliance can be found here on the GDPR website. For more information about GDPR and how it may impact your organization, please consider reading our article “US Companies Could Get Badly Burned by GDPR – Here’s How Not To”.

Organizations that Process Payment Cards or Store Payment Card Data

The retail sector isn’t federally regulated, but any organization that processes payment cards or holds payment card data is required to follow regulations laid out by the Payment Card Industry Security Council’s Data Security Standard (PCI DSS). For more information, please visit the PCI Security Standards Council’s website.

Organizations that Do Business with the US Department of Defense

Any organization that provides a service to the US Department of Defense (DOD) is required to meet the cybersecurity requirements outlined by the Defense Federal Acquisition Regulation Supplement (DFARS) and Procedures, Guidance, and Information (PGI) guidelines. These guidelines specify what cybersecurity standards need to be met and complied with before an organization is allowed to do business with the DOD. The purpose of these regulations is to ensure that sensitive defense information is appropriately safeguarded.

For more information, please visit this page on the DOD’s website.

Energy Service Providers

Organizations that provide electricity, including electric utility companies and operators, are governed by the Federal Energy Regulatory Commission (FERC). FERC has the authority to establish cybersecurity regulations for this sector, though the standards themselves are created by the nonprofit authority called the North American Electric Reliability Corporation (NERC). The standards are referred to as the Critical Infrastructure Protection (CIP) Standards. 

More information about FERC can be found here. More information about NERC can be found here, and information about the CIP Standards is located here.

Organizations with Users in California

The California Consumer Privacy Act (CCPA) of 2018 is similar to GDPR in the sense that it is designed to give consumers more control over the personal data businesses collect about them, including:

  • The right to know what personal information is collected as well as how it is used and shared
  • The right to delete personal information collected about them (with a few exceptions)
  • The right to refuse to allow the sale of their personal information
  • The right to non-discrimination for exercising their rights under CCPA

More details about the CCPA can be found here.

Cybersecurity Training

Even the best cybersecurity policy is useless if your workers and other users don’t understand it or have the necessary training to adhere to it. 

Create a Plan

To begin, make sure you have a robust yet flexible cybersecurity incident response program in place. Cyberattacks typically unfold very quickly, so an ad hoc plan created in the heat of the moment isn’t going to cut it. By making all crucial decisions ahead of time (such as how evidence is gathered and handled, how resources are to be allocated in a crisis, and who needs to be alerted if an incident occurs) and determining who is responsible for what you can help ensure there are no gaps or deficiencies in your response. 

You should also take this time to establish cybersecurity rules, such as password standards, so you can best safeguard your digital assets.

To begin developing or updating your cybersecurity incident response program, please consider reading our article “Building a Cybersecurity Incident Response Program”. 

Invest in Employee Training

Cybersecurity is everyone’s responsibility, from the President of the company down to the summer intern. Cybersecurity training ensures your employees know what to do should they encounter a potential threat and explains why these actions, as well as all preventative steps, are important. It’s easier to get worker buy-in when they understand the “why” behind the “what”. 

Test Your Plan 

Once you have a plan and the necessary cybersecurity programs and tools in place, you need to test your response before an incident occurs. 

What is Pen Testing?

Pen (Penetration) testing is a tool used to stress-test your cybersecurity defenses. This involves hiring an ethical (or “white hat”) hacker to try and break through your security defenses and simulate a cyber attack. The ethical hacker records any and all deficiencies or gaps they were able to exploit and then summarizes and shares their findings with your team. 

By hiring someone to discover these gaps for your company, you can ensure that any shortcomings are addressed before actual criminals are able to use them to gain unauthorized access to your systems or data. Some compliance standards, such as NIST, require penetration testing to ensure compliance.

What are Tabletop Scenarios?

Tabletop scenarios are like fire drills for security. Once your team has undergone cybersecurity training, a tabletop exercise lets them put their newfound skills and knowledge to the test while they test-drive your cybersecurity incident response plan.

Tabletop scenarios present your team with a hypothetical cybersecurity incident that they need to respond to, allowing them to practice what they have learned in a zero-stakes environment. 

Managed IT

What is Managed IT?

In simplest terms, managed IT solutions, also called managed IT services allow organizations to hand off their IT operations to a trusted service provider, who then handles all IT-related work. This single point of service can free up internal IT team members for other projects, or in the case of an “IT Light” organization, allow you to access the professionals you need without having to hire internally. 

Managed IT offers a variety of benefits, including:

  • Access to an entire team of professionals, 24/7/365. 
  • Cost savings, since additional team members won’t need to be hired
  • Peace of mind, since you never need to worry about your IT or security person calling in sick or departing to pursue other opportunities and leaving you vulnerable.
  • Predictable and scalable spending

Common Types of Managed IT Solutions

There are many types of managed IT services. While some organizations only offer a handful of managed services, others take a holistic approach that handles everything. How much, or how little, you want to hand off when it comes to your IT is up to you, but make sure you carefully vet any MSSP you are considering to ensure they offer the services you need and have a reputation you can trust.

Common types of managed IT services include:

Data Backup & Disaster Recovery

Opting for a managed IT solution can help with business continuity (BC) as well as backup and disaster recovery (BDR). BC refers to the necessary planning and preparation needed to ensure your critical business operations can continue to function should a pandemic, natural disaster, power outage, cyberattack, or other crisis affect your business. A key component of BC is BDR, which refers to a combination of data backup and disaster recovery solutions that are designed to get your systems restored and fully operational again as quickly as possible should disaster strike. Having dependable backups is critical for effective disaster recovery.

Two other good terms to be familiar with are RTO (Recovery Time Objective) and RPO (Recovery Point Objective). RTO refers to how quickly data needs to be recovered to ensure business continuity after unplanned downtime or a disaster strikes. The faster your RTO, the faster your organization can get back to work. Though exactly how long your RTO needs to be will depend on a variety of factors, you should aim to have an RTO of 4 hours or less.

RPO refers to what data needs to be recovered for normal business operations to resume after disaster strikes. This metric is usually based on file age (for example, all data backed up before this morning needs to be recovered). In conjunction with RTO, RPO can help your organization determine how often you should be backing up your data. For example, if your RPO is 2 hours, then you should be backing up your data at least once every 2 hours.

Strategic Business Review (SBR)

An SPR is a structured process with two goals: unearth new business opportunities and identify how your organization’s performance can be improved using technology or other means. This living document serves as a roadmap to guide future technological investments so you can ensure your managed IT services and IT infrastructure continues to meet your needs as your company grows and evolves.

Network Monitoring & Remediation

Remote monitoring management (RMM) is critical for network monitoring and remediation and refers to a platform that managed services providers like VirtualArmour use to remotely and proactively monitor your endpoints, network, applications, and systems for suspicious activity. This data is used to identify potential cybersecurity incidents or other potential problems so that they can be addressed as quickly as possible.

Most network monitoring and remediation is done out of the NOC (Network Operations Center).

What does -aaS Mean?

The term “-aaS” is a suffix that means “as a Service” and refers to any services (IT or cybersecurity) that are delivered remotely to your organization via the cloud. Examples include HaaS (hardware as a service), SaaS (software as a service), and IaaS (infrastructure as a service). 

Not everyone is an IT or cybersecurity expert, and that is okay. The experts at Virtual Armour are here to help. We offer a wide selection of cybersecurity and managed IT services that can be tailored to meet your needs, as well as 24/7/365 network monitoring upon request.

For more information, or to get started with your cybersecurity or managed IT services, please contact our team today.

Supplemental Reading List

If you would like to learn more about managed IT and cybersecurity, please consider reading the articles listed below.

Managed Services Security Providers (MSSPs)

What is a Managed Services Security Provider (MSSP)?

Leveraging Your MSSP in an “IT Light” Environment

Cybersecurity Basics

The SMBs Guide to Getting Started with Cybersecurity

Cybersecurity Spring Cleaning: It’s Time to Review Your Security Practices

Building a Cybersecurity Incident Response Program

Beyond SIEM: Why Your Security Posture Needs to SOAR

Identity Management is Just Cybersecurity Best Practices With a Fancy (& Expensive) Name

Creating an Agile Workplace: How to Prepare for the Unexpected

Cyber Hygiene 101: Basic Steps to Keep Your Company Secure

The Ultimate Guide to Managed Threat Intelligence (2020 Edition)

What is Information Security (& How Does it Impact Your Business?)

5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)

Keeping Your Network Secure in a “Bring Your Own Device” World

Basic Website Precautions: Keep Intruders Out With These Fundamental Security Best Practices

Compliance

Security vs Compliance: What Are Their Differences?

US Companies Could Get Badly Burned by GDPR – Here’s How Not To 

The Challenge to Remain PCI & NIST Compliant During the Shift to Remote Work

Common Types of Cyberattacks

Don’t Let Phishing Scams Catch You Unaware

Cryptojacking: Because Every Currency Needs to Be Protected 

In a Remote World, Social Engineering is Even More Dangerous

How Fear Motivates People to Click on SPAM

Ransomware is Only Getting Worse: Is Your Organization Prepared to Confront it?

Everything You Need to Know About Ransomware (2019 Edition)

DNS Spoofing: What It Is & How to Protect Yourself

About Cybercriminals & Cybercrime

Hacked? Here’s What to Know (& What to Do Next)

The Modern Hacker: Who They Are, Where They Lie, & What They’re After

Hackers Are Increasingly Targeting People Through Their Phones 

Airports are a Hacker’s Best Friend (& Other Ways Users Expose Themselves to Risk)

2021 Cybersecurity Trends

Our Predictions for the 2021 Cybersecurity Environment

Cybersecurity by Vertical & Industry

Cybersecurity Basics Every College & University Needs to Have in Place

The Ultimate Guide to Cybersecurity in the Healthcare Industry

How the Financial Industry Can Strengthen Their Cybersecurity

Cybersecurity for the Manufacturing Industry, What You Need to Know Now

How Apple’s Stance on Privacy May Impact Device Security in the Near Future

How Apple’s Stance on Privacy May Impact Device Security in the Near Future

In recent months, Apple has taken steps to improve user security and privacy. In February 2020, Apple announced that they had joined the FIDO (Fast Identity Online) Alliance. The Alliance’s goal is to help augment less secure forms of identity verification (such as passwords) by pairing them with more secure forms of authentication such as security keys and biometrics. Though this is noteworthy, Apple is also one of the last large tech companies to join the Alliance, whose ranks already included Amazon, Google, Facebook, and Microsoft.

The release of iOS 14 last September brought with it improved security features, and though users have been overwhelmingly supportive of these changes, advertisers such as Google and Facebook are much less enthusiastic.

What is the FIDO Alliance?

FIDO Alliance was founded in 2012 by a group of tech companies, including PayPal and Lenovo, with a mission to create authentication standards that reduce society’s reliance on passwords by promoting the widespread adoption of multi-factor authentication U2F tokens and biometrics

The Alliance aims to replace password-only logins with more secure login experiences for both websites and apps by promoting other forms of authentication, including security keys and biometrics (such as voice authentication, fingerprint scanners, and facial recognition). 

Apple added the ability to use FIDO-compliant security keys during its 13.3 iOS update.

What New Features Does iOS 14 Bring With It & How Do They Aim to Improve Security?

iOS 14’s new security features include:

Camera & Microphone Use Alerts

Though all apps on iOS already had to explicitly ask for permission to use the camera and microphone, starting with iOS 14, you will now be alerted whenever an app is accessing your camera or microphone. This is done using a dot in the upper right-hand corner: A green dot means your camera is currently in use, and an orange dot means the app is using your microphone.

The goal of this feature is to ensure you are never recorded without your knowledge.

Limit Photo & Location Access

This update offers a more granular configuration for your photo and location settings. This allows you to specify whether an app can never access location data, always access location date, or only access this data when the app is open or when you have granted explicit permission. 

The new Precise Location toggle switch also allows you to grant an app permission to know your general location while keeping your exact GPS coordinates private.

This update also allows users to specify whether apps can access all, none, or a few select photos.

Flagging Bad Passwords

Though Apple has had the ability to sync your login credentials across various accounts on your Apple hardware via iCloud for a while now, they have now implemented a password monitoring system that will alert you if your credentials are spotted during a data breach. This helps ensure potentially compromised credentials can be changed as soon as possible.

Discouraging Wi-Fi Tracking

Whenever a device connects to the internet, it is assigned a MAC (media access control) address, which allows your local network to keep track of the device. In recent years, internet service providers and, by extension, advertisers have been using this data to determine the time and place of your device when you log in. 

To discourage this form of tracking, iPhones are now granted a new MAC address for each unique wireless network they connect to. This means your iPhone or other Apple device will have one MAC address for your home network, one for your work network, etc. 

This feature is enabled by default on every new network you connect to.

Keeping an Eye on Your Clipboard

Data grabbing apps have proliferated in recent years, snooping on your clipboard even if you haven’t given them permission to do so. iOS 14 means that you are alerted when an app accesses your clipboard: if you just copied or pasted something, that is fine, but if you haven’t, you now know the app you are using is likely gathering data without your permission for their own purposes.

Most app companies quickly re-configured their products to eliminate this form of unauthorized data collection once Apple implemented this feature during beta testing and made this behavior public, but this feature helps ensure that underhanded app companies are no longer tempted to snoop where they aren’t explicitly welcome. 

Privacy Reports from Safari

Though Apple has blocked cross-site tracking cookies in Safari for quite some time (a feature that makes it more difficult for advertisers to string together your browsing history across various websites), this feature has been improved in iOS 14 by adding the privacy report feature

This feature gives you more details regarding what effect this blocking has on your browsing by showing you how many individual trackers on each page have been blocked over the past month. The reports don’t have an interactive component but do provide helpful information.

Coming Soon – Limiting App Tracking 

Though pushback from advertisers means this feature won’t be fully implemented until sometime in 2022, there are still steps users can take now to curtail apps’ ability to track you outside of the actual app itself.

However, even if you don’t explicitly give an app permission to track you, they may still try to do so per their individual privacy policies, curtailing users’ ability to opt-out of advertising tracking until this new feature is fully implemented. 

Coming Soon – Improved Access to App Privacy Information 

Though this feature is also not yet live, Apple did announce that one iOS 14 feature that is also coming soon is app privacy cards. These cards are designed to give users a clear picture of the types of data each app collects and how that data is used.

What Does This Mean For Advertisers?

It’s become common wisdom that if a product or service is “free,” then the users (or, more specifically, the data they generate) is the real product. Apple’s approach to improved privacy and security, even with significant compromises on limiting app tracking, has the potential to severely impact the ad targeting business. While this is good news for users, advertisers are not as excited.

Facebook, in particular, has already pushed back hard, announcing that its Audience Network will no longer use IDFA (identifier for advertisers) gathered from iOS devices because they can no longer guarantee the quality of that data collected. Google has also announced that they will remove select forms of advertiser tracking technology from popular apps (including Maps and YouTube) in response to Apple’s decision. 

“When Apple’s policy goes into effect, we will no longer use information (such as IDFA) that falls under ATT [the App Tracking Transparency feature] for the handful of our iOS apps that currently use it for advertising purposes. As such, we will not show the ATT prompt on those apps, in line with Apple’s guidance.“ Google Ads’ group project manager Cristophe Combette stated in the blog post responding to Apple’s changes.

Though GDPR and CCPA opened the door for more transparency into what information is gathered and used to track users, this change from Apple could represent a turning point when it comes to data security and privacy. Having agency over what data is collected (and how) is critical for any good cybersecurity posture by helping you maintain full visibility into your infrastructure by better monitoring endpoint activity. For more information about cybersecurity, or find out how your team can better safeguard your digital assets, please contact our team today.

The Shift From Cybersecurity Being a Want to a Need Just Happened

The Shift From Cybersecurity Being a Want to a Need Just Happened

The SolarWinds attack has shaken the technology and cybersecurity spheres to their core, compromising the security of both private businesses and the US government alike. This wide-reaching attack has brought the issue of poor cybersecurity within the US government to the foreground after years of insufficient action.

This devastating attack, the full extent of which is still unknown, does offer a silver lining: demonstrating the importance of good cybersecurity. 

Remote Work Brings With it Increased Cybercrime

Remote work has come hand in hand with an increase in cybercrime as organizations adapt to employees logging on from less-secure home networks populated with various IoT and other devices, creating multiple unsecured or insufficiently secured entry points onto the network. Cybercriminals are taking advantage of these vulnerable entry points to access private data and critical systems and shifting tactics to better take advantage of unsuspecting victims as the pandemic rages on

Lessons From the SolarWinds Attack

First discovered by the cybersecurity company FireEye in December of 2020, the SolarWinds attack allowed nation-state attackers (believed to be affiliated with the Russian government) to push malicious updates to a popular network monitoring product. This attack also created a backdoor in affected systems, providing attackers with ongoing access to inject more malware.

This incident has demonstrated the power of supply chain attacks (when malicious actors infiltrate networks via an outside partner or provider with access to a company’s systems and data) and highlighted the unfortunate reality that many organizations remain unprepared to detect, prevent, and address such attacks.

Cybersecurity Shifts From a Want to a Need

The biggest lesson to learn from the SolarWinds attack is that having a robust cybersecurity posture is no longer just a nice-to-have. Remote work has also made many organizations particularly vulnerable to attacks like the one perpetrated against SolarWinds as companies grapple with keeping remote workers secure.

What Should I Do? Cybersecurity Basics to Get You Started

Creating cybersecurity policies to safeguard your digital assets may be daunting, but there are a few basic steps every organization needs to take:

Create a Cybersecurity Incident Response Program

We’ve created a comprehensive guide to help your organization craft a robust yet flexible cybersecurity response program. It involves laying the groundwork by collecting critical documents, allocating resources, conducting risk assessments, and training your employees how to identify and respond to potential threats. Having a plan ahead of time is crucial since cyberattacks tend to unfold quickly, and ad hoc responses and decision-making processes are rarely sufficient to prevent or minimize damage.

Keep Your Software Up to Date

Making sure your software is kept up to date, and that outdated and unused programs are removed from your systems is one of the easiest things you can do to improve your cybersecurity posture. When software companies discover flaws or vulnerabilities in their products, they address them by issuing patches (snippets of code that correct the issue). However, you can only take advantage of these fixes if you download the patches.

Recently patched software is a common target for cybercriminals since not all users are vigilant enough to download the patch as soon as it becomes available. This means that cybercriminals often target recently patched software in an attempt to gain access to private or sensitive information.

You should also remove any unused or out-of-date programs from your systems, particularly if the software is no longer maintained. Software that is no longer being maintained may contain unpatched vulnerabilities or flaws, leaving your entire network vulnerable. Unused programs may contain vulnerabilities that leave your network exposed, but because these programs aren’t being opened and used regularly, your team may not discover these issues until they have already been used against you.

Remove Permissions as Part of Your Offboarding Process

While most organizations have fairly robust onboarding processes, many don’t put nearly as much time and effort into creating equally comprehensive offboarding processes. To help safeguard your network, make sure that all accounts of former employees are removed so that these login credentials cannot be used. 

Even if your former employees don’t plan to access their old accounts, these unmonitored logins present a tempting possible entry point for cybercriminals. Old accounts are particularly useful to cybercriminals because no authorized users are monitoring them regularly, which means the criminal’s actions are less likely to be detected.

Stay Up to Date on Threats

You can’t defend yourself against a threat you don’t know to look for. Make sure your team is keeping up to date on the latest and most common cybersecurity threats.

Common threats include:

Review Your Current Protocols Regularly

Once you have laid the groundwork, you need to look for potential threats, investigate them thoroughly, and take remediation steps. Once a threat has been dealt with, you should take the time to evaluate how effective your response was so any shortfalls can be addressed promptly.

Even if you don’t experience an attack, your team should still be regularly auditing your current protocols and procedures to ensure they are up to date and continue to meet your needs. You may also want to consider conducting a pen (penetration) test, which involves hiring an ethical hacker to stress-test your defenses and look for vulnerabilities. Once the test is complete, your hired hacker shares their findings with your team, detailing which vulnerabilities they were able to exploit and how, and offers their professional advice for addressing these security shortcomings. These tests allow you to identify and address issues before cybercriminals can exploit them.

Invest in Employee Training

In many instances, your employees are your first line of defense. Training your employees to identify suspicious activities and ensure they know who to report their suspicions to is a critical component of any cybersecurity posture. All new hires should undergo extensive cybersecurity training, and all team members should undergo refresher training regularly.

To help your employees put their new knowledge and skills to the test, you may also want to consider running tabletop exercises. Like fire drills, tabletop exercises present your team with a hypothetical scenario which they need to address. This approach allows your team to practice their skills in a no-stakes environment and test if your current cybersecurity posture and protocols are meeting your needs. Once the exercise is complete, your team sits down to discuss what went well and what did not so that these shortcomings can be addressed as soon as possible. 

How VirtualArmour Can Help

Safeguarding your digital assets is critical, but many organizations find this task daunting. That is why the experts at VirtualArmour are here to help. Our team can help you audit your current posture for vulnerabilities and create a robust plan to address these security shortcomings. We offer a wide selection of managed and professional services, including:

To learn more about the steps your organization needs to be taking to safeguard your digital assets or to start improving your cybersecurity posture, please contact us today.

I’ve Been Hacked! What Should I Do?

If you have experienced a cybersecurity incident please contact our team right away to find out what steps you need to take to minimize damage and prevent future attacks.

Further Reading

Learn more about cybersecurity, the steps you need to take, and the threats that are out there with these select articles from the VirtualArmour blog.

Cybersecurity Basics at the Organizational Level

Building a Cybersecurity Incident Response Program

The SMBs Guide to Getting Started with Cybersecurity

The Ultimate Guide to Managed Threat Intelligence (2020 Edition)

Cyber Hygiene 101: Basic Steps to Keep Your Company Secure

Cybersecurity Spring Cleaning: It’s Time to Review Your Security Practices

Basic Website Precautions: Keep Intruders Out With These Fundamental Security Best Practices

Keeping Your Network Secure in a “Bring Your Own Device” World

19 Essential Cybersecurity Best Practices

Cybersecurity Basics at the User Level

How Fear Motivates People to Click on Spam

5 Old School Hacking Techniques That Still Work (& How to Protect Your Data)

Airports are a Hacker’s Best Friend (& Other Ways Users Expose Themselves to Risk)

Common Threats

Our Predictions for the 2021 Cybersecurity Environment

Hackers Are Increasingly Targeting People Through Their Phones

Everything You Need to Know About Ransomware (2019 Edition) 

Ransomware is Only Getting Worse: Is Your Organization Prepared to Confront It?

Don’t Let Phishing Scams Catch You Unaware

DNS Spoofing: What It Is & How to Protect Yourself

Cryptojacking: Because Every Currency Needs to Be Protected

If You Experience an Attack

Hacked? Here’s What to Know (& What to Do Next)

The SMBs Guide to Getting Started With Cybersecurity

The SMBs Guide to Getting Started With Cybersecurity

The recent SolarWinds hack is just one of many incidents that demonstrate the importance of good cybersecurity. Too many SMBs still believe they are too small to be targeted by cybercriminals, but in recent years the number of attacks on small and medium-sized organizations has continued to rise. The Ponemon Institute’s 2019 report found that two-thirds of the world’s SMBs had experienced a cyberattack as of 2019, yet at the time, 45% of those same surveyed businesses reported that their cybersecurity posture was “ineffective”.

Safeguarding your organization and its digital assets may seem like a daunting task, but in the digital age, a robust cybersecurity stance is essential. In this article, we will discuss common threats to look for, as well as concrete steps your organization can take to protect itself from cybercriminals, and ways the Virtual Armour team is here to help.

Common Cyber Threats to Watch Out For

Cybercriminals, also called hackers, use many tactics to target businesses of all sizes. However, because of the pervasive idea that SMBs are less likely to be targeted, smaller organizations are less likely to be prepared.

Social Engineering (Including Online Scams & Phishing Scams)

Social engineering, a common tactic used in phishing scams, including spam, involves manipulating unsuspecting victims into granting access to restricted systems or data or revealing private information such as usernames and passwords. 

Social engineering can take several forms. Phishing scams involve sending potential victims an email impersonating a trusted individual or organization (such as your boss or your bank) and using that previous relationship built on trust and authority to trick you into doing what the cybercriminal wants you to do. At its core, social engineering uses basic human psychology (such as our predisposition for helping others or trusting organizations we do business with) against us to manipulate our actions. 

Ransomware

Ransomware is a type of malicious software (or malware) used to prevent legitimate users from accessing their data and systems. Once the legitimate user is locked out, the cybercriminal demands a ransom and promises to restore access if the ransom is paid. 

Ransomware can easily cripple an organization of any size as daily activities grind to a halt. Even if the ransom is paid, recovery can be a challenging process. Depending on the systems or data affected, you may require the assistance of a cybersecurity expert.

While some organizations choose to take the financial hit and pay the ransom, there is no guarantee the cybercriminal responsible will hold up their end of the bargain once the money has been handed over.

The costs associated with ransomware also typically extend beyond the ransom itself. You may also:

  • Need to replace damaged data or hardware and recover any data that has been lost. 
  • Experience a loss of income due to business disruptions
  • Incur additional IT costs in the form of overtime wages, increased security costs, and the wages of any additional personnel required during the recovery phase. 
  • Need to pay for a cybersecurity investigation and forensics services (if you experienced a data breach as part of the attack)
  • Likely need to invest in further employee training to help safeguard against future incidents.

Depending on the nature and scale of the attack, your organization may also suffer reputational damage, which you may or may not be able to recover from.

DDoS Attacks

DDoS (Distributed Denial of Service) attacks can be performed by either large, coordinated groups of cybercriminals or a handful of cybercriminals controlling a large number of bot computers (computers controlled by programs that allow them to perform automated tasks on command). 

During a DDoS attack, all of the cybercriminals or their bots hammer your server with requests, overloading it and causing it to crash. This can potentially paralyze your business as business activity grinds to a halt. When the server is down, legitimate users such as employees or customers are unable to access the targeted server or any websites or applications hosted on it. 

Cybersecurity Basics

Now that you know what sort of threats are out there, what steps can you take to safeguard your organization against them?

Create a Cybersecurity Incident Response Program

The first thing you need to do is create a cybersecurity incident response program. For more information on how to do this, please read our article Building a Cybersecurity Incident Response Program

Creating a response program begins with making critical decisions (such as who is responsible for what and how resources should be allocated during a crisis) before an attack occurs. Attacks tend to unfold quickly, so an ad hoc response developed in the moment won’t be sufficient. By preparing ahead of time, you can ensure there are no gaps in your policies and procedures that could hinder your response efforts.

Next, you need to preemptively look for potential threats. You can’t respond to a threat if you don’t know it is there. This proactive approach gives you a heads up on any potential threats so you can adjust your tactics and strategy to best safeguard your digital assets.

Should an incident occur, your top priority should be to contain it before it can do any significant damage. Once the threat has been contained, then you can shift your focus to eradicating the threat so it can’t be weaponized against you again and ensure all unauthorized users are locked out of your system.

Once the threat has been dealt with, you will need to move into the recovery and remediation phase. This involves notifying any impacted external entities (such as customers and relevant governing organizations) and telling them what happened and what damages your organization has suffered. This is also the phase where you gather evidence for later review. This phase focuses on the root cause analysis, which identifies the primordial problem and lets you determine what steps you can take to effectively remedy the situation. 

Finally, when the investigation is complete, you and your team should review the efficacy of your response. Identifying any gaps or weaknesses now gives you a chance to address them before your organization is threatened again.

Review & Audit Regularly

As part of your regular operations, you should be auditing and reviewing your cybersecurity posture regularly. To help you do this, the Virtual Armour team created a handy checklist: Cybersecurity Spring Cleaning: It’s Time to Review Your Cybersecurity Best Practices.

Make sure you are regularly:

  • Reviewing your password guidelines
  • Auditing your current cybersecurity programs
  • Reviewing your endpoint protection protocols
  • Ensure all your software is up to date
  • Review your cybersecurity protocols and schedule refresher training for all employees

You may also want to consider conducting pen (penetration) tests. Pen tests involve hiring an ethical hacker to stress test your cybersecurity defenses and look for gaps that cybercriminals may be able to exploit. Once the test is complete, the ethical hacker sits down with your team to share their findings and offer expert advice on steps you can take to better fortify your network.

Invest in Employee Training

Cybersecurity is everyone’s responsibility. Even the best plan is only useful if everyone on your team knows how to implement it effectively, and even the most diligent employee can’t follow your cybersecurity best practices if they don’t know what they are.

Employees should undergo cybersecurity training as part of your onboarding process, and all employees from the CEO down should receive regular refresher training. All employees need to:

  • Understand why cybersecurity is important
  • Know what protocols are in place and why
  • Know how to identify suspicious activities
  • Know who to report suspicious activities to
  • Know what steps they need to be taking to help safeguard your organization

As part of your refresher training, you may want to consider conducting tabletop exercises. Tabletop exercises work like cybersecurity fire drills: allowing your team to respond to a hypothetical cybersecurity incident in a zero-stakes environment. Tabletop scenarios allow employees to put the information they learned in cybersecurity training to the test and try out your current protocols, so they are well-practiced should an actual incident occur.

When the exercise is finished, you can sit down with your team and review the efficacy of their response as well as the efficacy of your existing protocols. This gives you a chance to identify any deficiencies and create solutions before your organization is actually threatened and helps keep response protocols fresh in your employees’ minds. This is also an excellent way to familiarize employees with any changes or updates to your cybersecurity incident response plan.

For more information, please consider reading our article Cyber Hygiene 101: Basic Steps to Keep Your Company Secure.

What to Do if Your Organization is Hacked

If your organization has been hacked, please contact our security team straight away and consider reading our article Hacked? Here’s What to Know (& What to Do Next).

Need a Hand? Virtual Armour is Here to Help!

All of this may seem daunting. Not everyone is a cybersecurity expert, and that is okay. That’s why the experts at Virtual Armour are here to help. We can work with your organization to identify current deficiencies in your cybersecurity plan, help you create your cybersecurity incident response program, and help you respond and recover from an incident should one occur. 

We also offer a variety of managed services, including 24/7/365 network and endpoint monitoring and a guaranteed rapid response time. We have extensive experience working with a variety of industries, including finance, healthcare, retail, and energy, and we have extensive experience working with service providers.

For more information about what steps you can take to begin fortifying your cybersecurity posture or begin the fortification process, please contact our team today.

Further Reading

For more information about threats to look out for, steps you can take, and other cybersecurity news, please consider reading our blog.

Some articles and resources you may be interested in include:

Cybersecurity Basics & Best Practices

Cyber Hygiene 101: Basic Steps to Keep Your Company Secure

Cybersecurity Spring Cleaning: It’s Time to Review Your Security Practices

Common Threats & How to Safeguard Against Them

The Modern Hacker: Who They Are, Where They Live, & What They’re After

How Fear Motivates People to Click on Spam

Don’t Let Phishing Scams Catch You Unaware

5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)

Everything You Need to Know About Ransomware (2019 Edition)

Cybersecurity & Infrastructure Security Agency Ransomware Guidance and Resources

Reports & Statistics

Ponemon Institute Library

Our Predictions for the 2021 Cybersecurity Environment

Our Predictions for the 2021 Cybersecurity Environment

2020 was a rough year for all of us, particularly from a cybercrime perspective. As businesses and schools rapidly pivoted to remote work and remote learning, many cybercriminals changed their tactics and adjusted their focus to take advantage of the situation as well as user uncertainty and fear.

As working and learning from home remain the norm for many individuals and businesses around the world, cybercriminals are poised to continue aggressively targeting users specifically using a blend of online and offline tactics

Fortunately, there are many steps your organization can take to better safeguard your digital assets against cyberattacks. As cybercriminals adjust their tactics, businesses of all sizes need to remain agile and stay up-to-date on the latest cybersecurity threats.

2021 Top Cybersecurity News

The Ongoing Fallout from the SolarWinds Attack

The SolarWinds attack, which infiltrated both the US Treasury and the Department of Homeland Security as well as a number of private organizations, rocked the cybersecurity world. Uncovered last December, this wide-reaching, devastating attack is believed to be the work of the Russian Intelligence Agency’s Foreign Intelligence Service and may have been launched as early as March 2020.

This supply-chain attack used malware to infect the networks of most, if not all, of SolarWinds’ customers via a software update. However, because the Russian attackers have had access to a wide number of networks for as long as several months, security experts are still working to determine exactly how widespread the attack was and what sensitive data and systems have been compromised. 

Even once experts know the full extent of the attack, the remediation process will be long and grueling. Entire enclaves of computers, servers, and network hardware across both federal and corporate networks will need to be isolated and replaced even as security teams continue to hunt for evidence of malware, determine what information has been compromised, and create and implement strategies to mitigate loss and damage. 

Number of Cyberattacks Expected to Rise

In addition to dramatically changing how we go about our daily lives, COVID-19 has also provided a convenient cover for cybercriminals as they shift their attack vectors away from large, well-guarded corporate networks to small, potentially vulnerable home networks. One study suggested that, in 2021, a ransomware attack on a business is likely to occur every 11 seconds, up from every 40 seconds in 2016. 

INTERPOL’s assessment of the impact of COVID-19 on cybercrime has shown similar trends, with targets shifting away from major corporations, governments, and critical infrastructure in favor of small businesses and individuals. 

2021 Cyber Attack Trends

User-Targeted Attacks Expected to Rise

As workers swap their cubicles for their kitchens, cybercriminals have changed tactics accordingly. The work from home model has brought with it a rise in successful attacks, at least in part because users are more likely to use personal devices (which are often less secure) for work-related activities.

As users log in from home, they create personal islands of security: a model where each user is effectively following different (often lax) security protocols. When workers are onsite, all of their traffic is routed through your business’s network, which is likely closely monitored by a professional security team. However, without a dedicated security team watching every employee’s home network and personal device, your organization is exposed to increased risk.

Cybercriminals are taking advantage of this increased attack area to create personalized attack chains. While traditional tactics often involved a “spray and pray” approach (where cybercriminals used generalized social engineering attacks, such as the classic Nigerian prince scam, to target a large number of users in the hopes that a few would bite), recent trends have seen a rise in hyper-personalized attacks that target specific uses with privileged access to sensitive infrastructure, data, and systems. 

While this approach is more time-consuming (since attackers need to identify and profile specific individuals to create the targeted attack), this approach is more likely to yield shorter attack-cycles, making it increasingly difficult for organizations to identify and stop attacks in progress.

Another user-focused trend to watch out for is cybercriminals increasingly targeting individuals via their phones.

A Blend of Online & Offline Tactics

The work from home era has forced cybercriminals to adapt their tactics, but unfortunately, many have done so successfully. One tried-and-true cybersecurity attack, the phone scam, has seen a resurgence.  

COVID-19 Scams Continue

According to the FCC, many cybercriminals are taking advantage of the fear and uncertainty around COVID-19 to trick unsuspecting victims into revealing sensitive personal information using social engineering. These include phone calls, emails, or text messages offering “COVID-19 kits”, “Coronavirus packages”, or Medicare benefits related to the virus. Scammers use these promises of assistance to try and convince potential victims to hand over sensitive information such as bank account details, social security numbers, or medicare numbers. 

A similar but related scam involves scammers offering “relief payments” from government agencies. These calls, text messages, and emails typically follow a general format: The caller says you have been approved to receive money, either via a relief payment or a cash grant or even via a low-interest small business loan and then asking for personal information (to “verify your identity”), banking information (so they can charge you a small “processing fee”) or both. Some scammers also ask for payment via cryptocurrencies (such as bitcoin) or gift cards. 

If you are located in the United States and are targeted by scammers, please report your encounter to the FCC.

Fake Tech Support Scams on the Rise

Another twist on the phone scam is the fake tech support scam. This follows a similar format to the scams discussed above but involves cybercriminals asking users to grant access to their computers so they can “conveniently” fix a tech support problem you weren’t even aware you have. 

Criminals then use this access to install malware, add backdoors for future access, or log keystrokes (to capture usernames, passwords, banking details, and other sensitive data). 

SMBs Likely to Invest More in Cybersecurity

As cyber threats continue to rise in 2021, small and medium-sized businesses are, particularly at risk. This is because, unlike large, enterprise-level organizations, many smaller organizations still believe that they are less likely to be targeted.

According to research conducted by Analysys Mason and reviewed in Forbes 2021 cybersecurity predictions, SMBs cybersecurity spending (including services, hardware, and software) is projected to grow by 10% between 2019 and 2024, creating an $80 billion market.

Safeguarding Your Organization in 2021

The best thing you can do to safeguard your organization’s digital assets is be proactive. Make sure you are up to date on all the latest cybersecurity threats and have a well-rounded and up-to-date cybersecurity incident response program in place

You should also assess your current cybersecurity posture regularly to ensure it is continuing to meet your needs, and you may want to consider conducting pen (penetration) tests to stress-test your current defenses. You should also make sure that all new employees receive cybersecurity training as part of their onboarding process and that all workers undergo refresher training regularly. You may also want to consider conducting tabletop exercises to give your team a chance to test their cybersecurity response skills in a no-risk environment. 

Virtual Armour is Here to Help

Safeguarding your organization from cybersecurity threats can be a lot to handle, particularly if you aren’t already a cybersecurity expert. That’s why Virtual Armour is here to help. Our team of experts can review your current practices with you, help you identify weaknesses, and create a plan to strengthen your defenses. We are also able to monitor your infrastructure, firewall, and endpoints 24/7/365 for potential threats and help you mitigate or even avoid damage should an incident occur. 

We have extensive experience working with service providers as well as organizations in a variety of industries and verticals, including healthcare, finance, retail, and energy

For more information about our service offerings or to find out what you can do to safeguard your digital assets best in 2021, please contact us today.