http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor Thu, 02 May 2024 13:26:09 -0700 Joomla! - Open Source Content Management en-gb SamSam Ransomware http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/30-samsam-ransomware http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/30-samsam-ransomware

The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the Federal Bureau of Investigation (FBI) are issuing this activity alert to inform computer network defenders about SamSam ransomware, also known as MSIL/Samas.A. Specifically, this product shares analysis of vulnerabilities that cyber actors exploited to deploy this ransomware. In addition, this report provides recommendations for prevention and mitigation.

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Sun, 17 Nov 2019 22:03:51 -0800
Microsoft Operating Systems BlueKeep Vulnerability http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/29-microsoft-operating-systems-bluekeep-vulnerability http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/29-microsoft-operating-systems-bluekeep-vulnerability

Please note, a vulnerability, known as “BlueKeep,” that exists in the following Microsoft Windows Operating Systems (OSs), including both 32- and 64-bit versions, as well as all Service Pack versions:

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Sun, 17 Nov 2019 21:58:47 -0800
Microsoft Ending Support for Windows 7 and Windows Server 2008 R2 http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/28-microsoft-ending-support-for-windows-7-and-windows-server-2008-r2 http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/28-microsoft-ending-support-for-windows-7-and-windows-server-2008-r2

On January 14, 2020, Microsoft will end extended support for their Windows 7 and Windows Server 2008 R2 operating systems.[1] After this date, these products will no longer receive free technical support, or software and security updates. Organizations that have regulatory obligations may find that they are unable to satisfy compliance requirements while running Windows 7 and Windows Server 2008 R2.

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Sun, 17 Nov 2019 21:53:19 -0800
Inventory of Authorized and Unauthorized Devices http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/27-inventory-of-authorized-and-unauthorized-devices http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/27-inventory-of-authorized-and-unauthorized-devices

How do attackers exploit the absence of this control?

Many criminal groups and nation-states deploy systems that continuously scan address spaces of target organizations, waiting for new and unprotected systems to be attached to the network. The attackers also look for laptops not up to date with patches because they are not frequently connected to the network. One common attack takes advantage of new hardware that is installed on the network one evening and not configured and patched with appropriate security updates until the following day.

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Fri, 05 Apr 2013 00:02:07 -0700
Malware Defenses http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/26-malware-defenses http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/26-malware-defenses

How do attackers exploit the absence of this control?

Malicious software is an integral and dangerous aspect of Internet threats, targeting end-users and organizations via web browsing, e-mail attachments, mobile devices, the cloud, and other vectors. Malicious code may tamper with the system's contents, capture sensitive data, and spread to other systems. Modern malware aims to avoid signature-based and behavioral detection, and may disable anti-virus tools running on the targeted system. Anti-virus and anti-spyware software, collectively referred to as anti-malware tools, help defend against these threats by attempting to detect malware and block its execution.

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Fri, 05 Apr 2013 00:00:56 -0700
Beware of Clicking the Web Translator Hyperlink http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/25-beware-of-clicking-the-web-translator-hyperlink http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/25-beware-of-clicking-the-web-translator-hyperlink

Foreign languages are no longer as difficult to understand as they once were, thanks to improvements in web translation services, which instantly translate words and web pages. The website translator plug-in can expand your global world with an amazing and effortless approach by automatically recognizing foreign-language identifiers.

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Thu, 04 Apr 2013 23:52:11 -0700
New Hire / New Hardware http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/24-new-hire-new-hardware http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/24-new-hire-new-hardware

A common challenge for an effective security awareness program is continuously reaching out to employees/staff in a fun and engaging manner. Training people once a year may keep auditors happy but will not change behavior. As such, you always want to be thinking of different ways you can reach out to people. The new hire process is a great place to start. While "new hire" training is the first thing that comes to mind, there are other options to consider.

]]>
mickey@ssnetworks.net (mickeydata) SecurityAdvisor Thu, 04 Apr 2013 23:45:44 -0700
Use a password in only one place. http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/2-use-a-password-in-only-one-place http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/2-use-a-password-in-only-one-place

Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure system, keep in mind that all of those computers, accounts, websites and secure systems will be only as secure as the least secure system on which you have used that password. Don't enter your password on untrusted systems. One lost key could let a thief unlock all the doors. Remember: Change your passwords on a schedule to keep them fresh.

]]>
conticreative@gmail.com (conticreative) SecurityAdvisor Thu, 03 Jun 2010 14:48:36 -0700
Be Skeptical When You Read Your Email http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/3-be-skeptical-when-you-read-your-email http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/3-be-skeptical-when-you-read-your-email

Keep asking Why should I believe that? It is important to remember that you can't trust the "from" address on e-mail from outside the organization, as it is often faked by fraudsters and viruses. If you didn't expect a message, link, or attachment from someone, ask yourself why you should trust that it really came from the apparent sender, and that it's safe. When in doubt, it's a good idea to call and verify that they sent you the message.

]]>
conticreative@gmail.com (conticreative) SecurityAdvisor Thu, 03 Jun 2010 14:47:48 -0700
Shh! Don't say it out loud. The cubes have ears http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/4-shh-don-t-say-it-out-loud-the-cubes-have-ears http://www.ssnetworks.net/network-solutions-ft/8-securityadvisor/4-shh-don-t-say-it-out-loud-the-cubes-have-ears

Office workspaces seem to be smaller and smaller. It is therefore harder to keep secrets when everyone is within earshot. When necessary use handwritten notes for transferring confidential information, and then shred the papers when done.

]]>
conticreative@gmail.com (conticreative) SecurityAdvisor Thu, 03 Jun 2010 14:47:16 -0700