<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/phil-richards/rss" /><link>https://www.ivanti.com/blog/authors/phil-richards</link><item><guid isPermaLink="false">4ceaf306-c83c-4022-b4d3-a9c30b1ec4c3</guid><link>https://www.ivanti.com/blog/why-we-re-embracing-password-3-0-and-you-should-too</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Why We’re Embracing Password 3.0…And You Should Too</title><description>&lt;p&gt;Password 1.0 was your cat’s name and your birth year and you used it across every endpoint for a decade. We see you, Sprinkles1979.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Password 2.0 was SSO and MFA and WTF because literally everyone used &lt;em&gt;Facebook &lt;/em&gt;for authentication. We all saw how well &lt;em&gt;that &lt;/em&gt;went.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It’s time for Password 3.0&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We’ve always operated at the leading edge of innovation, and this is no exception. While the industry gets bogged down in sending texts to confirm authorization, we’re moving forward.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;To be precise, we’re moving back to move forward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Passwords are back.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;And we’re going to give you what you’ve always wanted:&lt;/p&gt;

&lt;p&gt;When you forget your password, we’ll tell you which letter it started with, whether or not it’s capitalized, and whether this is the version that requires a special character.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;We know you have different versions for different websites and it’s SO frustrating when you can’t remember which one you used, and then you have to start all over again.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;We call it the Authentication Framework, or AF for short.&lt;/p&gt;

&lt;p&gt;So instead of “Your password is incorrect,” you’ll see &lt;em&gt;exactly &lt;/em&gt;what you need to do to get it right without locking yourself out.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Because when we’re locked out, we can’t do what we do best.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The new Authentication Framework launches today. Join us on social to tell us you’re ready to LOVE passwords with hashtag #PasswordsForever.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;….or maybe you could use the hashtag #AF. Not for Authentication Framework, but for April Fool’s.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Phew. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;We’re sweating just TYPING the previous paragraphs. Can you imagine the chaos and hacking?!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;It wouldn’t even be hacking. It would be gifting. You would be gifting your valuable information to anyone who was even mildly curious.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Plus, you’d still have to deal with remembering, protecting and resetting passwords and jumping through complex authentication hoops.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Of course, Facebook SSO – and a lot of SSO and MFA solutions – leave a lot to be desired. We’re not settling. At Ivanti, we are delivering a truly &lt;a href="https://www.ivanti.com/company/press-releases/2021/mobile-devices-have-become-the-focal-point-of-ciso-cybersecurity-strategies"&gt;passwordless future&lt;/a&gt; to ensure that the right people have access to the right information at the right time (and &lt;em&gt;no one else does&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Our zero trust framework elevates passwordless authentication with &lt;a href="https://www.ivanti.com/blog/imagine-a-passwordless-world-is-it-possible"&gt;zero sign-on and FIDO2&lt;/a&gt; for more secure access with fewer hoops. This framework automatically validates every user, device, app, network and threats before greenlighting access — all without requiring a password.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The goal: #killthepassword.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Learn more about the passwordless future now.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Sorry, Sprinkles. We’ll find another way to remember you.&lt;/p&gt;
</description><pubDate>Thu, 01 Apr 2021 14:00:00 Z</pubDate></item><item><guid isPermaLink="false">2dfbaebf-029d-4066-ad7e-d55a2617c28f</guid><link>https://www.ivanti.com/blog/statement-on-qualys-data-breach</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Statement on Qualys Data Breach</title><description>&lt;p&gt;&lt;em&gt;This week Ivanti became aware of a breach impacting Qualys customers. At this time, we are not aware of any impact to Ivanti’s customers or systems due to the &lt;/em&gt;&lt;a href="https://blog.qualys.com/vulnerabilities-threat-research/2021/04/02/qualys-update-on-accellion-fta-security-incident" target="_blank" rel="noopener"&gt;&lt;em&gt;Qualys data breach&lt;/em&gt;&lt;/a&gt;&lt;em&gt;. A previously disclosed vulnerability in Accellion’s File Transfer Appliance has been identified as the vector for the Qualys data breach&lt;font color="#0782c1"&gt;.&lt;/font&gt;&amp;nbsp;We do not use Accellion’s File Transfer Appliance anywhere within Ivanti’s operations. While we do leverage some of Qualys’ capabilities in our FedRAMP environments, there is no indication that the Qualys data breach has impacted our FedRAMP operations or that there was any exposure of client data. We have escalated our monitoring of FedRAMP platforms to ensure the security of all our customers’ data and operations.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Should you have further questions or concerns on this matter, please contact your sales representative. We will continue to monitor and communicate any updates that may affect our customers.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Fri, 05 Mar 2021 23:03:20 Z</pubDate></item><item><guid isPermaLink="false">bc413967-d0cf-4991-a57b-94ef1e3eb7dd</guid><link>https://www.ivanti.com/blog/official-statement-on-solarwinds-and-fireeye-security-incidents</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Official Statement on SolarWinds and FireEye Security Incidents</title><description>&lt;p&gt;Ivanti SolarWinds Security Advisory&lt;/p&gt;

&lt;p&gt;At this time Ivanti, including the &lt;u&gt;&lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-acquires-mobileiron-and-pulse-secure" target="_blank" title="https://www.ivanti.com/company/press-releases/2020/ivanti-acquires-mobileiron-and-pulse-secure"&gt;recently acquired&lt;/a&gt;&lt;/u&gt; MobileIron and Pulse Secure, has no known negative impact, compromise, or breach from recent SolarWinds nor FireEye incidents.&lt;/p&gt;

&lt;p&gt;Beginning December 13&lt;sup&gt;th&lt;/sup&gt;, Ivanti’s Information Technology and Security Teams have been actively engaged in ensuring that any SolarWinds products are either shut down &lt;u&gt;&lt;a href="https://cyber.dhs.gov/ed/21-01/" target="_blank" title="https://cyber.dhs.gov/ed/21-01/" rel="noopener"&gt;as recommended&lt;/a&gt;&lt;/u&gt; by US Department of Homeland Security, or not impacted by these recent critical attacks. Teams continue to monitor environments for Indicators of Compromise (IOCs) and remain abreast of new developments via several intelligence sources. As additional information becomes known we continue to update our alerts and monitoring, including checking historic logs with any updated IOCs.&lt;/p&gt;

&lt;p&gt;For more information regarding Ivanti’s Security and Compliance programs, see &lt;u&gt;&lt;a href="https://www.ivanti.com/resources/security-compliance" target="_blank" title="https://www.ivanti.com/resources/security-compliance"&gt;https://www.ivanti.com/resources/security-compliance&lt;/a&gt;&lt;/u&gt;.&lt;/p&gt;

&lt;p&gt;Regards,&lt;/p&gt;

&lt;p&gt;Ivanti Information Security Team&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Wed, 16 Dec 2020 21:26:05 Z</pubDate></item><item><guid isPermaLink="false">1e023448-b42d-40e5-a965-84aaee864d94</guid><link>https://www.ivanti.com/blog/threat-thursday-haunted-breaches</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Threat Thursday: Haunted by Breaches</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;October is National Cybersecurity Awareness Month, a global initiative to promote better security hygiene and raise awareness on the growing problem that is cyber threats. We at Ivanti are proud to support this mission with dedicated IT security events and content.&lt;/p&gt;

&lt;p&gt;Ivanti, along with our partners, held the first-ever &lt;a href="https://www.ivanti.com/webinars" target="_blank"&gt;Cybersecurity Virtual Event&lt;/a&gt; on October 23. Click the link to view seven on-demand sessions from Forrester, CrowdStrike, Morphisec, Kenna Security, Lynx and Ivanti. These are free insights designed to help you better your security posture, understand your level of risk, and work more efficiently.&lt;/p&gt;

&lt;p&gt;I was happy to participate in a panel with fellow CISOs from Sirius Computer Systems and LifeScan, along with the CEO of Secuvant. We shared our knowledge on the current state of IT security, what the future will hold for global IT teams, and the areas you should start investing in to prepare for the next wave of cyberattacks.&lt;/p&gt;

&lt;p&gt;Now onto the real meat of this post. Let’s start with the breaches and threats we're tracking this October.&lt;/p&gt;

&lt;h2&gt;A Hotel Breach that Could Haunt You&lt;/h2&gt;

&lt;p&gt;I couldn’t make it through this post without dropping a Halloween-related pun. But, I might not be too far off. Best Western and other hotels are dealing with the aftermath of a data breach affecting guests at some of their properties.&lt;/p&gt;

&lt;p&gt;According to &lt;a href="https://siliconangle.com/2019/10/21/customer-data-best-western-hotels-exposed-massive-data-breach/" target="_blank" rel="noopener"&gt;siliconangle.com&lt;/a&gt;, hackers exposed a database containing names, DOBs, addresses, phone numbers and more, owned by Best Western International Inc. Among the victims are high ranking U.S. military officials. Researchers point to misconfigured security settings and a complete lack of data security related to the cloud-hosted database.&lt;/p&gt;

&lt;h2&gt;Gamers Beware&lt;/h2&gt;

&lt;p&gt;Remember Collection #1 and Collection #2? These two data dumps made headlines early in 2019. The mastermind behind those breaches is &lt;a href="https://www.forbes.com/sites/daveywinder/2019/09/30/data-breach-warning-for-200-million-android-and-ios-gamers/#28e8e051db35" target="_blank" rel="noopener"&gt;claiming responsibility&lt;/a&gt; for hacking into more than 200 million Zynga accounts belonging to Android and iOS users.&lt;/p&gt;

&lt;p&gt;This again appears to be the work of Gnosticplayers, the same hacker who, according to ZDnet, is shopping the personal data of 932 million users, from more than 30 companies.&lt;/p&gt;

&lt;p&gt;Now, Forbes.com reports that Gnosticplayers claims to have accessed the Words With Friends database, stealing names, email addresses, login IDs, hashed (SHA1 with salt) passwords, reset tokens, phone numbers, account IDs and Facebook IDs.&lt;/p&gt;

&lt;p&gt;The breach affects those who registered accounts before September 3, 2019. Forbes reports that players of Draw Something and OMGPOP may also be victims of this breach. &amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Breaches and Brand Loyalty&lt;/h2&gt;

&lt;p&gt;So how likely are you to keep playing Words With Friends or stay at a Best Western International property? The data says these breaches don’t really mean much to the long-term financial health of the organizations who fall victim to these attacks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.businesswire.com/news/home/20191022005072/en/" target="_blank" rel="noopener"&gt;The Ping Identity 2019 Consumer Survey: Trust and Accountability in the Era of Breaches and Data Misuse&lt;/a&gt;, paints this picture:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;81% of respondents say they would stop engaging with a brand online after a data breach&lt;/li&gt;
	&lt;li&gt;63% expect companies to protect their data&lt;/li&gt;
	&lt;li&gt;27% say a data breach would deter them from using that brand’s products&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ok, pretty standard stuff. But according to &lt;a href="https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices" target="_blank" rel="noopener"&gt;statistics published in the Harvard Business Review&lt;/a&gt;, major retailers and consumer organizations don’t feel the fallout.&lt;/p&gt;

&lt;p&gt;Take the Home Depot data breach for example: 65 million credit and debit accounts breached. Home Depot stock slipped slightly after the news, but investors saw earnings increase by 21% in Q3 of 2014.&lt;/p&gt;

&lt;p&gt;Target’s 2013 data breach hit right around the holidays. Their stock dipped by 10%, but then went on to experience the highest percentage regain in five years.&lt;/p&gt;

&lt;p&gt;While we aren’t thrilled when these companies are hacked, or are careless with our data, consumers apparently aren’t phased enough to take their dollars elsewhere.&lt;/p&gt;

&lt;h2&gt;My Way or the Huawei&lt;/h2&gt;

&lt;p&gt;In another case of users going to &lt;a href="https://arstechnica.com/gadgets/2019/10/the-internets-horrifying-new-method-for-installing-google-apps-on-huawei-phones/" target="_blank" rel="noopener"&gt;great lengths&lt;/a&gt; to get what they want, it appears that owners of Huawei’s new handset are giving up access to their devices to a random Chinese website just so they can download some popular Google apps.&lt;/p&gt;

&lt;p&gt;American companies are currently prohibited from doing business with Huawei – all part of a continued trade war between the White House and the Chinese Government. That means that apps usually preloaded on Android phones aren’t on newer Huawei devices.&lt;/p&gt;

&lt;p&gt;According to an article on &lt;a href="https://arstechnica.com/gadgets/2019/10/the-internets-horrifying-new-method-for-installing-google-apps-on-huawei-phones/" target="_blank" rel="noopener"&gt;Ars Technica&lt;/a&gt;, some Huawei Mate 30 Pro users are utilizing workarounds to get apps like Play Store, Google Maps, Gmail, Chrome, YouTube and more. Some are even granting a Chinese website unrestricted remote access to their devices to a Chinese website in exchange for system-level permissions needed to install the apps. But little is known about the website in question, the owners of the site, or what their future plans might be with all these devices they now have an established backdoor into.&lt;/p&gt;

&lt;h2&gt;My Phone is Broken, So I Need a Day Off&lt;/h2&gt;

&lt;p&gt;Sticking with mobile trends, a new survey reveals just how big a problem mobile productivity issues are to the bottom line of your business.&lt;/p&gt;

&lt;p&gt;The details are published in &lt;a href="https://www.computerworld.com/article/3442750/survey-half-of-us-workers-face-one-or-more-serious-mobile-issues-monthly.html" target="_blank" rel="noopener"&gt;ComputerWorld&lt;/a&gt;. Here are a few stats:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;37% of users who had mobile issues reported taking at least one day off due to the stress of not being able to do their job, up from 16% last year&lt;/li&gt;
	&lt;li&gt;63% of those surveyed said it took between 30-180 minutes to resolve their mobile issue&lt;/li&gt;
	&lt;li&gt;96% of IT workers surveyed say they have MDM/EMM tools in place&lt;/li&gt;
	&lt;li&gt;But only 2% of those say they have all the analytics needed to effectively manage those devices&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Think about that. 180 minutes. Three hours of time wasted. With 51% of workers reporting one or more serious mobile issues monthly, that’s a lot of lost productivity.&lt;/p&gt;

&lt;p&gt;Also, did you see the first point of that survey? Mobile issues are apparently so frustrating and stressful to workers, that they’re taking time off to recover. Wild!&lt;/p&gt;

&lt;p&gt;All this adds up to employers. My takeaway is to step up your MDM/EMM and offer more support to users dealing with issues on their devices. You might save the company some serious time and money.&lt;/p&gt;

&lt;p&gt;Be sure to register for our monthly &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank"&gt;Threat Thursday webinar series&lt;/a&gt;, where I and Director of Product Management for Security, Chris Goettl, go in-depth into the threats impacting global IT teams and offer our recommendations to stay protected.&lt;/p&gt;</description><pubDate>Thu, 24 Oct 2019 22:19:52 Z</pubDate></item><item><guid isPermaLink="false">d7237bc7-5461-471f-90b6-e764f7ef0bd9</guid><link>https://www.ivanti.com/blog/6-tips-to-help-curb-school-cyber-attacks</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>6 Tips to Help Curb University Cyber Attacks</title><description>&lt;p&gt;&lt;span&gt;&lt;em&gt;This post originally appeared on the &lt;a href="https://www.ivanti.com/en-gb/blog/6-tips-to-help-curb-school-cyber-attacks" target="_blank" rel="noopener"&gt;Ivanti UK blog&lt;/a&gt;.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Universities have become popular hacking targets, joining the ranks of other top targets like finance (Capital One, Equifax), retail (Target), manufacturing and transportation.&lt;/p&gt;

&lt;p&gt;Hackers are demanding ransomware payments, crippling entire education computer operations and capturing extensive personal data, violating the privacy of students and staff.&lt;/p&gt;

&lt;p&gt;The issue of education sector cyberattacks moved further up in the international consciousness recently when Louisiana Gov. John Bel Edwards declared a state of emergency in response to three school districts crippled by malware attacks, which shut down phone systems and locked data.&lt;/p&gt;

&lt;p&gt;The motivation for these attacks range from ransoming the normal workflow of a university to selling hijacked student identities. Regardless of the motivation, like other public sectors, education is now, more than ever, on cybercriminals’ radar and will continue to be one of the popular targets.&lt;/p&gt;

&lt;h2&gt;Stepping Up Cyber Attack Defences&lt;/h2&gt;

&lt;p&gt;Just keeping up with the myriad attack versions and new threats coming every day&amp;nbsp;burdens universities who are already struggling to keep pace with rapidly changing technology advancements, let alone cybercriminals. In crafting a more effective defence, educational institutions have a dual challenge: executing all the risk mitigation defences that any organisation must-have in today’s cyber environment and then layering the unique aspect of student populations with their own set of user expectations.&lt;/p&gt;

&lt;p&gt;Here are practices that can help reduce risk yet maintain a productive user experience for students and staff alike.&lt;/p&gt;

&lt;h3&gt;1. Tighten up on administrative privileges.&lt;/h3&gt;

&lt;p&gt;Cybercriminals love penetrating networks in which administrator privileges are used everywhere. Effective malware and ransomware defence demand privileges are granted only to staff that truly require them to do their job.&lt;/p&gt;

&lt;p&gt;A university, for example, can remove full admin rights and then selectively elevate just the privileges a user needs to do their job. Ideally, an educational institution would implement technology that not only centrally manages credentials and grants granular rights, but enables staff to self-serve access as needed, based on their work function.&lt;/p&gt;

&lt;h3&gt;2. Educate employees on constant vigilance.&lt;/h3&gt;

&lt;p&gt;Some of the most costly ransomware attacks are caused by simple acts of opening email or clicking on a website. Cybercriminals are adept at employing social engineering tools that look non-threatening and encourage students and/or staff to click through links in fraudulent emails. Even tech-savvy users can fall prey, no one is exempt from too quickly opening a potentially dangerous email.&lt;/p&gt;

&lt;p&gt;Unfortunately, basic education will not suffice to fight cybercriminals. IT staff needs to put a continuing education program in place that accomplishes two objectives: keep staff and students up to date on new cyber attack trends and introduce new employees to the universities approach to fighting cyber attacks. In addition to education, all staff and students can take phishing tests, or drills in which they click on links and receive feedback as to whether they just clicked through to a potential malware occurrence.&lt;/p&gt;

&lt;h3&gt;3.&amp;nbsp;Engage students to become part of the cyber defence team.&lt;/h3&gt;

&lt;p&gt;The current generation of students is the most mobile-device friendly ever. Whether using a phone, iPad or traditional laptop, worrying about the university’s security is rarely top of mind for them. Just as IT can help train and encourage staff to be more cyber-diligent, IT can work with teachers and administrators to help students understand data breaches can affect them personally and can cause great harm to their peers and their university.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Secondly, administrators are already using social media platforms like Facebook and Twitter to regularly communicate about university news and events. Reminders about tactics like pop-ups linking to dangerous websites, or opening texts that are not from recognised senders, can be posted for students. This gives universities two key communication channels for furthering threat prevention.&lt;/p&gt;

&lt;h3&gt;4. Stay current on all application updates.&lt;/h3&gt;

&lt;p&gt;Executing critical patches and updates is essential to prevent new attacks. It should be a top priority of IT staff and cover third party applications as well as operating systems. Microsoft regularly publishes patch updates. IT needs to flag the ones of critical nature and ensure they are accomplished.&lt;/p&gt;

&lt;h3&gt;5.&amp;nbsp;Be diligent about third-party vendor risk.&lt;/h3&gt;

&lt;p&gt;If your vendors and sub-contractors have less than optimum security protocols in place, they expose the university itself, and the student population to considerable risk. Third-party risk assessments must be done for suppliers that have access to university and student data to make certain their operations meet the standards of good threat prevention.&lt;/p&gt;

&lt;h3&gt;6.&amp;nbsp;Consider specific cyber insurance.&lt;/h3&gt;

&lt;p&gt;Educational organisations are increasingly adding cyber-attack coverage to their insurance policies, driven by the trend toward ransomware. Administrators and finance staff need to examine the costs of this type of coverage, weighing it against the cost of restoring operations from a system lockdown and/or privacy breach, and determine what is the appropriate level.&lt;/p&gt;

&lt;p&gt;Keeping the issue of cyber-attacks in front of all parties – admin, IT, staff and students – is an essential step in helping to prevent costly disruption to university operations and strengthen defences against a data privacy breach.&lt;/p&gt;

&lt;p&gt;Combining better engagement with improved security practices will help to minimise a universities threat landscape. Being aware of third-party suppliers’ approach to data security is an important part of a complete data protection strategy. Within the university’s infrastructure, consistent, up-to-date patching and tighter access controls are a relatively economical means of adding more layers of data protection, compared to the millions of dollars of potential recovery costs after an attack.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Wed, 02 Oct 2019 20:43:00 Z</pubDate></item><item><guid isPermaLink="false">e472bae3-f5c3-4250-a6d7-2db05a34c645</guid><link>https://www.ivanti.com/blog/threat-thursday-breaches-attacks-and-exploits</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Threat Thursday: Breaches, Attacks, and Exploits</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;If you’ve ever worn a hospital gown, endured an unwanted trip to the dentist, or made an unwise investment, then you’ll commiserate with this month’s Threat Thursday update.&lt;/p&gt;

&lt;p&gt;What is &lt;a href="https://www.ivanti.com/webinars/2019/september-threat-thursday" target="_blank"&gt;Threat Thursday&lt;/a&gt;, you ask? The last Thursday of every month, my colleague Chris Goettl and I get together for 45 minutes of pure, unfiltered security chit-chat. We talk about active cyberattacks and data breaches, how to best defend yourself, security strategy, and more. It’s all lighthearted, loosely formatted, and a lot of fun.&lt;/p&gt;

&lt;p&gt;But don’t get us wrong. We understand IT security is a serious business – that’s why we spend most of the time ensuring you have the right measures in place to stay protected and take plenty of time of to answer any questions you might have.&lt;/p&gt;

&lt;p&gt;Here’s what we’ve got on tap for Thursday, September 26:&lt;/p&gt;

&lt;h3&gt;It’s Drafty Down There: Healthcare Exposures&lt;/h3&gt;

&lt;p&gt;In August, patient data had more exposure than a hospital gown. &lt;a href="https://www.modernhealthcare.com/cybersecurity/august-reported-healthcare-breaches-exposed-700000-peoples-data" target="_blank" rel="noopener"&gt;More than 700,000 records were leaked in 44 separate data breaches&lt;/a&gt;. It wasn’t a backdoor attack (sorry, another gown joke), instead threat actors successfully used phishing attacks to target vendors serving healthcare systems and healthcare systems directly.&lt;/p&gt;

&lt;p&gt;Why healthcare? Medical records are among the most valuable PHI and PII available on the dark web. According to &lt;a href="https://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/" target="_blank" rel="noopener"&gt;Experian&lt;/a&gt;, individual medical records can be worth up to $1,000 depending on the information they contain. In contrast, the average credit card record usually fetches anywhere from $1 - $10.&lt;/p&gt;

&lt;h3&gt;It’s About to Get Expensive&lt;/h3&gt;

&lt;p&gt;Recovering from these breaches is insanely expensive. According to figures from &lt;a href="https://healthitsecurity.com/news/healthcare-data-breach-costs-remain-highest-among-industries" target="_blank" rel="noopener"&gt;IBM and Ponemon&lt;/a&gt;, it costs providers $408 per medical record to recover from a data breach. That’s the highest among verticals and nearly double what it costs for organizations doing business in the financial industry – the next closest group on the list.&lt;/p&gt;

&lt;p&gt;Furthermore, organizations can cost themselves more money with misplaced security initiatives. According to IBM and the Ponemon Institute, in their &lt;a href="https://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/" target="_blank" rel="noopener"&gt;2019 Cost of a Data Breach report&lt;/a&gt;, third-party breaches, compliance failures, and extensive cloud migration all add at least $300,000k on to the average cost of a data breach, which in the US is roughly $3.92 million.&lt;/p&gt;

&lt;h3&gt;Our Expert Security Recommendations&lt;/h3&gt;

&lt;p&gt;Chris and I suggest doing the following to combat these attacks:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Phishing training – or, if you’re already doing this, perhaps educating your users on how hackers are gaining access to these records&lt;/li&gt;
	&lt;li&gt;Vendor risk management – remember, these attacks normally begin at the vendor level&lt;/li&gt;
	&lt;li&gt;Privilege management – what level of access do you vendors and users have to your system?&lt;/li&gt;
	&lt;li&gt;Email security – we’ve seen a lot of these attacks in the form of an email that looks like it’s from a manager or a boss&lt;/li&gt;
	&lt;li&gt;Two-factor authentication – a second layer of defense is a must&lt;/li&gt;
	&lt;li&gt;Incident response planning – referencing the IBM/Ponemon chart, there’s a lot to be said about how this one initiative can offset the total cost of a data breach&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Perhaps the one silver lining to these data breaches is the actual data from the fallout. Risk managers can now more accurately predict what an attack could cost their organization. Something to keep in mind considering that all organizations can expect to suffer a data breach once every ten years.&lt;/p&gt;

&lt;h3&gt;What’s Worse Than a Root Canal&lt;/h3&gt;

&lt;p&gt;What’s the best time to go to the dentist? Tooth-hurty. Ok, sorry about that, but I couldn’t resist. What’s worse than that joke? Perhaps a root canal. What’s worse is having the root canal AND learning that you’re the victim of a data breach.&lt;/p&gt;

&lt;p&gt;We briefly touched on this in the last &lt;a href="https://www.ivanti.com/webinars/2019/september-threat-thursday" target="_blank"&gt;Threat Thursday&lt;/a&gt;, but we’re continuing to see &lt;a href="https://krebsonsecurity.com/2019/08/ransomware-bites-dental-data-backup-firm/" target="_blank" rel="noopener"&gt;ransomware attacks targeting dental service providers&lt;/a&gt;. This is boutique ransomware, too. Highly customized, not some simple kit you can buy on the dark net.&lt;/p&gt;

&lt;p&gt;We know that at least 400 dentist offices nationwide were locked out of their systems and prompted to pay up or risk losing all their data. It’s pretty smart considering that individual attacks on dental offices would take a lot of work. So why not go after the same software used in hundreds of dental offices, on thousands of devices.&lt;/p&gt;

&lt;p&gt;Here’s our advice:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Don’t pay the ransom – seriously, there’s no guarantee the threat actors are going to free your data&lt;/li&gt;
	&lt;li&gt;Backup and recovery&lt;/li&gt;
	&lt;li&gt;Patch vulnerabilities&lt;/li&gt;
	&lt;li&gt;Restrict admin privileges&lt;/li&gt;
	&lt;li&gt;Vendor risk management&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;What’s on Our Radar&lt;/h3&gt;

&lt;p&gt;There are some other newsmakers out there. Check out some of the stories we’re following as we head in October:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://techcrunch.com/2019/09/24/microsoft-emergency-patch-windows/" target="_blank" rel="noopener"&gt;Microsoft urges Windows users to install emergency security patch&lt;/a&gt; – TechCrunch&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.express.co.uk/entertainment/gaming/1175468/WoW-Classic-DOWN-Blizzard-WoW-Classic-DDoS-attack-servers-status" target="_blank" rel="noopener"&gt;World of Warcraft DDoS attacks&lt;/a&gt; – The Express&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.reuters.com/article/us-usa-cyber-election-exclusive/exclusive-us-officials-fear-ransomware-attack-against-2020-election-idUSKCN1VG222" target="_blank" rel="noopener"&gt;Fear of election hacking in 2020&lt;/a&gt; – Reuters&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.miamiherald.com/news/nation-world/world/americas/article235137087.html" target="_blank" rel="noopener"&gt;Nearly every single Ecuadorian had their data hacked&lt;/a&gt; – Miami Herald&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Never a slow day in security. Be sure to join us on this week’s &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank"&gt;Threat Thursday&lt;/a&gt; webinar and &lt;a href="https://www.ivanti.com/resources/patch-tuesday" target="_blank"&gt;register for future live episodes.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also, get more insights from me, Chris and our colleagues at Forrester, Crowdstrike, Kenna Security and Morphisec. Register for the FREE, &lt;a href="https://www.ivanti.com/" target="_blank"&gt;Cybersecurity Virtual Event&lt;/a&gt; on October 23, 2019.&lt;/p&gt;</description><pubDate>Thu, 26 Sep 2019 18:24:38 Z</pubDate></item><item><guid isPermaLink="false">621d26ea-9f19-4da6-b718-bd15e102d6c8</guid><link>https://www.ivanti.com/blog/ransomware-in-the-public-sector</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Threat Thursday: Ransomware in the Public Sector</title><description>&lt;p&gt;Welcome to our new Threat Thursday blog series! Once a month, my colleague, Director of Product Management&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/chris-goettl" target="_blank"&gt;Chris Goettl&lt;/a&gt;&amp;nbsp;and I&amp;nbsp;will share information about some of the largest security threats and recent attacks we’re seeing hit worldwide. This month, ransomware in the public sector is stealing the stage.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As I look out my office window, I see a construction crew ripping up the blacktop parking lot. Apparently, there are foundational issues which need to be addressed and the only solution is to rip it all out and start over. This may be a very apt metaphor for what is happening in cybersecurity over the past several weeks. It seems criminals have identified a new set of targets, which represent some of society’s core institutions. I’m referring specifically to the recent flurry of ransomware attacks on federal, state, local and education government entities.&lt;/p&gt;

&lt;h3&gt;&lt;a href="https://www.ivanti.com/blog/cyber-attacks-lead-to-statewide-emergency" target="_blank"&gt;Louisiana State of Emergency&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;School’s out…forever? That’s what it may have seemed like when outbound communications cutoff in four Louisiana school districts, causing the governor to declare a state of emergency and call out the National Guard. This is the first time in Louisiana’s history that a cyber-attack is being treated like a natural disaster. If you are interested in learning more about this attack, watch my webinar that is available on &lt;a href="https://www.ivanti.com/webinars/2019/live-updates-on-the-cybersecurity-state-of-emergency?from=blog" target="_blank"&gt;demand&lt;/a&gt; here.&lt;/p&gt;

&lt;h3&gt;&lt;a href="https://www.zdnet.com/article/at-least-20-texas-local-governments-hit-in-coordinated-ransomware-attack/" target="_blank" rel="noopener"&gt;23 local Texas Government Agencies Suffer Ransomware Attack&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Somebody messed with Texas and it may take a while to recover. Twenty-three local government agencies were hit in a coordinated ransomware attack and all systems were taken offline. According to a source from ZDNet, the attack came from the well-known Sodinokibi (REvil) ransomware strain. I’ll be discussing this attack more in detail in an &lt;a href="https://www.ivanti.com/webinars/2019/september-threat-thursday" target="_blank"&gt;upcoming &lt;/a&gt;&lt;a href="https://www.ivanti.com/webinars"&gt;webinar&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;While these two notable attacks seem a bit suspicious, it’s even more revealing when you look at a list of other attacks on state and local government in the past year, curated mostly by &lt;a href="https://www.msspalert.com/news/attack-list-cities-government-agencies" target="_blank" rel="noopener"&gt;MSSP Alert&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;August 19, 2019: 22 local Texas government agencies suffer ransomware attack,&lt;/li&gt;
	&lt;li&gt;July 25, 2019: State of Louisiana declares State of Emergency&lt;/li&gt;
	&lt;li&gt;July 25, 2019: City Power, the electric utility for Johannesburg, South Africa,&amp;nbsp;&lt;a href="https://www.msspalert.com/news/city-power-johannesburg-south-africa" target="_blank" rel="noopener"&gt;discloses ransomware attack&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;June 26, 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/lake-city-florida-pays-hackers" target="_blank" rel="noopener"&gt;Lake City, Florida agrees to pay ransomware&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;June 20, 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/riviera-beach-florida-malware-attack" target="_blank" rel="noopener"&gt;Riviera Beach, Florida, discloses ransomware attack and payment&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;May 7, 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/ransomware-attack-hits-baltimore-city-servers" target="_blank" rel="noopener"&gt;City of Baltimore&lt;/a&gt;&amp;nbsp;hit with ransomware attack.&lt;/li&gt;
	&lt;li&gt;April 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/cleveland-airport-attack-update" target="_blank" rel="noopener"&gt;Cleveland Hopkins International Airport&lt;/a&gt;&amp;nbsp;suffered a ransomware attack.&lt;/li&gt;
	&lt;li&gt;April 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/augusta-maine-malware-attack" target="_blank" rel="noopener"&gt;Augusta, Maine&lt;/a&gt;, suffered a highly targeted malware attack that froze the city’s entire network and forced the city center to close.&lt;/li&gt;
	&lt;li&gt;April 2019: Hackers stole roughly $498,000 from the&amp;nbsp;&lt;a href="https://www.msspalert.com/news/hackers-steal-498000-from-tallahassee-florida" target="_blank" rel="noopener"&gt;city of Tallahassee&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;March 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/albany-ny-malware" target="_blank" rel="noopener"&gt;Albany, New York&lt;/a&gt;, suffered a ransomware attack.&lt;/li&gt;
	&lt;li&gt;March 2019:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/georgia-county-pays-400000" target="_blank" rel="noopener"&gt;Jackson County, Georgia&lt;/a&gt;&amp;nbsp;officials paid cybercriminals $400,000 after a cyberattack shut down the county’s computer systems.&lt;/li&gt;
	&lt;li&gt;March 2018:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/atlanta-ransomware-update-city-refuses-cyber-kidnappers-demands-still-assessing-damage" target="_blank" rel="noopener"&gt;Atlanta, Georgia&lt;/a&gt;&amp;nbsp;suffered a major ransomware attack.&lt;/li&gt;
	&lt;li&gt;February 2018:&amp;nbsp;&lt;a href="https://www.msspalert.com/news/colorado-dot-suffers-samsam-ransomware-attack-shuts-down-2k-computers" target="_blank" rel="noopener"&gt;Colorado Department of Transportation&lt;/a&gt;&amp;nbsp;(CDOT) employee computers temporarily were shut down due to a SamSam ransomware virus cyberattack.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What’s particularly interesting to me, is what these new attacks have in common:&lt;/p&gt;

&lt;h3&gt;Higher ransoms&lt;/h3&gt;

&lt;p&gt;These aren’t opportunistic attacks from years gone by. Criminals are demanding higher ransoms of these government entities. They are targeting victims specifically, striking with greater precision and timing, and demanding large sums as ransom. The Louisiana school district attack is a great example.&amp;nbsp; The timing of that attack (mid-August) was designed to inflict the most panic as it occurred just weeks before schools open for the fall.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Ransoms being paid&lt;/h3&gt;

&lt;p&gt;While not the case in Louisiana, a few government groups around the country have paid ransoms, some in excess of $500,000, to get their files back. The restoration rate is about 25% among those who pay ransoms. Often, these ransoms are funded by cyber insurance.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;What does this mean?&lt;/h3&gt;

&lt;p&gt;By paying ransoms, government entities are guaranteeing that more criminals will attack government groups. In July, the US Conference of Mayors unanimously adopted a resolution to not pay ransoms associated with cyber-attacks. The &lt;a href="http://legacy.usmayors.org/resolutions/87th_Conference/proposedcommittee-preview.asp?committee=Criminal%20and%20Social%20Justice" target="_blank" rel="noopener"&gt;resolution&lt;/a&gt; reads, “Paying ransomware attackers encourages continued attacks on other government systems, as perpetrators financially benefit.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As you can imagine, it’s very tempting to “just pay the ransom” -- organizations hope to restore operations in a matter of hours, rather than days or weeks. The challenge with ransomware is that even with file backups, it still takes a very long time to complete all restorations. The massive restoration work is also a reason why government entities might call in the National Guard. Troops from the National Guard are usually part-time. On the cyber defense side, these troops are often security engineers or analysts in the private sector, with great skills that help with ransomware cleanup and file restoration.&lt;/p&gt;

&lt;h3&gt;What else is there?&lt;/h3&gt;

&lt;p&gt;Ransomware is highly customizable. Nation states can build specific ransomware as a method to infect and shut down enemies. We saw this with the Not Petya attack in 2018 against Ukraine. There is discussion that ransomware attacks could be used to disrupt free and fair elections by infecting voter ballot systems. A nation’s ability to withstand ransomware attacks must be considered a national defense initiative. If we are seeing state, local and education entities that are vulnerable to ransomware attacks, those might be the metaphorical cracks in the blacktop that indicate foundational issues deep below the surface.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here are a few other major ransomware attacks we’ve seen this month:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://healthitsecurity.com/news/hackers-demand-1m-in-grays-harbor-ransomware-attack" target="_blank" rel="noopener"&gt;Ransomware attack demands $1M from Grays Harbor&lt;/a&gt;

	&lt;ul&gt;
		&lt;li&gt;The cyberattack infected the computer systems with ransomware nearly two months ago, when an employee clicked on a bad link in a phishing email. The attack also happened when Grays Harbor IT staff was limited – on the weekend. Grays Harbor does have cyber insurance with a $1 million cap, and officials have not determined whether the missing records are permanently gone.&amp;nbsp;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://futurism.com/the-byte/ransomware-crypto-fortnite-players" target="_blank" rel="noopener"&gt;Fortnite Players Hit with Ransomware&lt;/a&gt;
	&lt;ul&gt;
		&lt;li&gt;The ransomware threatens to delete Fortnite players files on their computers unless they pay the hijackers in cryptocurrency. The ransomware, Syrk, is disguised as a software that can help players cheat at Fortnite.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;But ransomware isn’t the only type of security threat in play this month. Here are a few other breaches and attacks you may also have seen in the news&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.cnn.com/2019/07/29/business/capital-one-data-breach/index.html" target="_blank" rel="noopener"&gt;Capital One Data Breach&lt;/a&gt;

	&lt;ul&gt;
		&lt;li&gt;The personal information of more than 100 million individuals in the United States and approximately 6 million in Canada was compromised. Paige A. Thompson, 33, a former software engineer, stole the data by using scanning software that allowed her to identify customers who had misconfigured their firewalls. She also used stolen computer power to mine cryptocurrency (cryptojacking).&amp;nbsp; Capital One has confirmed that 140,000 social security numbers and 80,0000 bank account numbers were obtained in the breach.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://techcrunch.com/2019/08/20/moviepass-thousands-data-exposed-leak/" target="_blank" rel="noopener"&gt;MoviePass exposed thousands of customer card numbers&lt;/a&gt;
	&lt;ul&gt;
		&lt;li&gt;MoviePass has exposed thousands of customer card numbers and personal credit cards because a critical server was not protected with a password. The breach was discovered by Mossab Hussein, a security researcher at SpiderSilk, a cybersecurity firm in Dubai.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.digitaltrends.com/mobile/bluetooth-security-flaw-knob-attack/" target="_blank" rel="noopener"&gt;Major new security flaw in Bluetooth&lt;/a&gt;
	&lt;ul&gt;
		&lt;li&gt;The vulnerability allows an attacker to interfere when two devices try to connect, essentially letting a hacker to “break” Bluetooth security. The exploit has been named KNOB – Key Negotiation of Bluetooth – since it can occur when two devices are “negotiating” a secure connection. The best thing to do here is to patch! Make sure your software and firmware are up to date, as that will protect you from hacks.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.zdnet.com/article/hackers-mount-attacks-on-webmin-servers-pulse-secure-and-fortinet-vpns/" target="_blank" rel="noopener"&gt;Fortinet Zero Day&lt;/a&gt;
	&lt;ul&gt;
		&lt;li&gt;Not surprising, but hackers are now exploiting vulnerabilities that were made public earlier this year. Attacks have targeted VP products like Fortinet’s FortiGate, Fortinet released a patch to fix this vulnerability back in May, but if users didn’t take advantage, they could be at risk.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Disclaimer: &lt;/strong&gt;Due to the length of time where breaches go undiscovered (often months or years), even after forensic analysis, approximately 55% of organizations are never able to definitively uncover the cause of a breach. These assumptions are based in part on similar incidents in other organizations and industry best practices for preventing these types of attacks.&amp;nbsp;Ivanti assumes no liability or responsibility for any errors or omissions in the content of this webinar [or blog posting].&amp;nbsp;The information contained herein is provided on an “as is” basis with no guarantees of accuracy, completeness, timeliness or usefulness and without any warranties or conditions of any kind, express or implied.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Thu, 29 Aug 2019 17:10:04 Z</pubDate></item><item><guid isPermaLink="false">78537de5-242e-4f82-9880-2af51b2c889a</guid><link>https://www.ivanti.com/blog/cyber-attacks-lead-to-statewide-emergency</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Ivanti News</category><category>Security</category><title>Cyber Attacks Cause Statewide Emergency in Louisiana: Ivanti CISO Phil Richards Responds</title><description>&lt;p&gt;As the state of Louisiana grapples with the fallout from a coordinated &lt;a href="https://statescoop.com/louisiana-declares-emergency-over-cyberattacks-targeting-schools/" target="_blank" rel="noopener"&gt;cyber attack against three school districts&lt;/a&gt;, we're given an opportunity to review practices to prepare for, prevent, and mitigate this type of cyber attack.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Louisiana Governor&amp;nbsp;John Edwards said:&amp;nbsp;“The state was made aware of a malware attack on a few north Louisiana school systems and we have been coordinating a response ever since.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The cyber attacks targeted schools in Morehouse, Ouachita, and Sabine parishes.&amp;nbsp;Details of the type of attacks have not been made public.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Governor Edwards declared a statewide emergency in order to access additional staff and resources from the Louisiana National Guard, Louisiana State Police, and the State’s Office of Technology Services.&amp;nbsp;This is the first time in Louisiana’s history that a cyber attack is being treated like a natural disaster.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For state governments, IT infrastructure has become so important that the National Governor’s Association now advises states to develop response plans that place cyber attacks on the same level of urgency as natural disasters or acts of terrorism.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, let’s take a look at how to identify, prepare for, and respond to cyber attacks.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What can we do&amp;nbsp;to prepare for and prevent cyber&amp;nbsp;attacks?&amp;nbsp;&lt;/h2&gt;

&lt;h3&gt;1. Patching&lt;/h3&gt;

&lt;p&gt;For most organizations, &lt;a href="https://www.ivanti.com/products/security-controls" target="_blank"&gt;patching&lt;/a&gt; should be the first line of defense against cyber attacks.&amp;nbsp;Ensuring that operating systems and third-party applications are up to date will limit or even prevent cyber attacks. Special effort should be made to ensure that all critical patches and updates for applications such as Adobe Flash, Java, Web browsers, and Microsoft applications are kept current.&lt;/p&gt;

&lt;p&gt;Patches should be prioritized based on criticality and policy&amp;nbsp;and applied so that they don’t disrupt users or operations.&lt;/p&gt;

&lt;p&gt;Many organizations fear that comprehensive, timely, and consistent patching is too complex, or that it may break critical systems. However, using the latest patch management tools to scan for missing patches and deploy them to workstations or servers is a straightforward task in even&amp;nbsp;the most complicated environments.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;2. User Education on Phishing/Spam Emails&lt;/h3&gt;

&lt;p&gt;Most ransomware is spread using phishing or spam emails. As an example, users in the US House of Representatives fell victim to a &lt;a href="https://www.computerworld.com/article/3068623/ransomware-attacks-on-house-of-representatives-gets-yahoo-mail-blocked.html" target="_blank" rel="noopener"&gt;ransomware campaign&lt;/a&gt; reportedly designed to trick users into opening an attachment sent to their Yahoo Mail accounts.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Training users to be savvy email consumers and careful web clickers is an important part of combating cyber crime.&amp;nbsp;Criminals use many professional marketing and social engineering tools to improve their abilities, to trick users into opening fraudulent emails, and to increase their chances of success. It is likely that even the most educated user will be tricked.&amp;nbsp;Education isn’t enough.&amp;nbsp;Users need to receive periodic drills of phishing email campaigns&amp;nbsp;that provide immediate feedback when they click on a link.&amp;nbsp;When users see themselves getting “caught” is when they begin to change their behavior.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. Privilege Management&lt;/h3&gt;

&lt;p&gt;Minimizing privileges is an important tactic to mitigate the damage caused by many types of malware, including ransomware. For example, the &lt;a href="https://www.ivanti.com/blog/petya-weaponized-malware-ransomware-new-ddos-attack" target="_blank"&gt;Petya ransomware&lt;/a&gt; requires administrator privileges to run, and will do nothing if the user does not grant those privileges. Removing administrator rights is easy, but balancing privileged access, user productivity, and enterprise security is not.&lt;/p&gt;

&lt;p&gt;Effective access control protects organizations against &lt;a href="https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them" target="_blank"&gt;malware and ransomware&lt;/a&gt;.&amp;nbsp;Access control that focuses primarily or exclusively on &lt;em&gt;privileged&lt;/em&gt; user access rights will likely prove less than effective.&amp;nbsp;Generalized access control can be highly beneficial for protecting files located in on shared drives. Users have legitimate needs to access and modify files on shared drives. After all, those files are document files created by legitimate users. As a result of this generalized access, a ransomware attack that successfully infects the system of a user with legitimate access rights can encrypt and hold hostage all the files on all connected, shared drives and folders.&lt;/p&gt;

&lt;h3&gt;Check out &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Ivanti's Security Solutions&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;In short, the recommendations of patching, user education, and privilege management are critical practices to implement when&amp;nbsp;preparing&amp;nbsp;for and preventing attacks.&amp;nbsp;Doing these things across a large organization may be somewhat trickier than the words imply.&amp;nbsp;For example, patching a phone system means that phones might not be available, vendors may not support patched components, and products might fail.&amp;nbsp;When implementing patch management, end-user training and/or privilege management programs, the use of best-in-class software solutions may be needed to make these implementations practical and comprehensive.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti has some great tools to help in the areas of patch and privilege management, and we will discuss these tools and how they address these problems in a follow-up&amp;nbsp;post.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.2.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Fri, 26 Jul 2019 22:01:33 Z</pubDate></item><item><guid isPermaLink="false">5b0c65dd-bff6-416b-9d9b-6be9a891218d</guid><link>https://www.ivanti.com/blog/why-asset-management-is-the-most-important-security-control</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>Why Asset Management Is the Most Important Security Control</title><description>&lt;p&gt;The &lt;a href="https://www.cisecurity.org/controls/cis-controls-list" target="_blank" rel="noopener"&gt;first five controls in the CIS Top 20&lt;/a&gt; identify &lt;em&gt;two&lt;/em&gt;&amp;nbsp;controls relating to &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;asset management&lt;/a&gt;.&amp;nbsp;Numbers one and two&amp;nbsp;talk about managing hardware and software assets.&amp;nbsp;The question comes up pretty frequently: Why would managing assets be the single most important thing a company can do to improve security?&amp;nbsp;It seems counterintuitive, like perhaps antivirus software or strong passwords would be more important.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Well, first off,&amp;nbsp;it's important to remember that this list is based on the experience and opinion of industry experts.&amp;nbsp;That means it is opinion-based, so their conclusions might not be yours, but there is a strong case to be made for asset management being the most important security control you can implement at your workplace.&amp;nbsp;To help explain this, I want to share an experience.&lt;/p&gt;

&lt;h2&gt;The Necessity of ITAM&lt;/h2&gt;

&lt;p&gt;When I was working as CISO for a financial services company, we were being interviewed by the FFIEC (think bank examiners).&amp;nbsp;They started the discussion with a simple question:&amp;nbsp;“Are you patching your servers and workstations?”&lt;/p&gt;

&lt;p&gt;I was able to answer that with a single word:&amp;nbsp;“Yes.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Their next question took several hours to fully answer.&amp;nbsp;They asked, “How do you know?”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The meaning and depth of that question dawned on me over the next few hours, and prompted even more questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;How do I know that I am patching all the servers and workstations?&lt;/li&gt;
	&lt;li&gt;How do I know I haven’t missed any laptops that move around?&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;How do I know that I am patching all the software products on these systems?&lt;/li&gt;
	&lt;li&gt;How do I know I’m capturing the virtual systems that are coming up and going down several times during the week?&lt;/li&gt;
	&lt;li&gt;How am I capturing software and hardware assets in the cloud?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In order to answer these questions, I needed an accurate inventory of my software and hardware assets.&amp;nbsp;Not only that, but because these assets move, change, and get deleted frequently, I needed to have a process for collecting new information in the environment.&amp;nbsp;Long gone are the days when I could ask purchasing for a list of servers, workstations, and software products in order to track my inventory.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Components of Effective ITAM&lt;/h2&gt;

&lt;p&gt;Effective asset management today requires multiple components.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Discovery&lt;/h3&gt;

&lt;p&gt;The first is a discovery process.&amp;nbsp;Discovery is the act&amp;nbsp;of collecting new software and hardware in your environment in real-time.&amp;nbsp;This requires you to be actively monitoring the environment for the addition of new assets through a variety of techniques, from network to business application intelligence.&amp;nbsp;Several asset discovery modules perform a ping scan to discover new assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While this is a good step, in today’s network, this will often not yield the true asset inventory by itself.&amp;nbsp;Many servers and workstation configurations do not respond to ping, so if that is the only way your asset management system is discovering new systems, it might not be adequate or accurate.&amp;nbsp;Modern network-based asset discovery includes multiple active and passive scan and discovery modules including ping, tcp syn scans, arp, dhcp, wifi and other techniques that will hep discover the most bashful systems on your network.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Inventory&lt;/h3&gt;

&lt;p&gt;After discovery comes inventory.&amp;nbsp;This can be more challenging than it seems at first.&amp;nbsp;Systems move around or&amp;nbsp;they might change network configuration, software is added and removed, and management responsibility changes.&amp;nbsp;All this needs to be accounted for, and the change process needs to be as automated as possible. Managing a dynamic software, hardware, and virtualized asset inventory requires automation, a great storage design and workflow that maps to your organization’s requirements.&amp;nbsp;Without these components, the best asset inventory in the world will quickly become stagnant and useless.&lt;/p&gt;

&lt;h2&gt;Managing Software Assets&lt;/h2&gt;

&lt;p&gt;Managing software assets can be even more challenging than managing hardware assets.&amp;nbsp;Long gone are the days when your company ran exclusively on Microsoft operating systems and applications.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most environments are a hodge-podge of operating systems from Microsoft, Apple and various flavors of Linux, with applications from dozens of vendors, open source, and a huge variety of license configurations.&amp;nbsp;Licenses might be managed by several different groups and departments, as well as some being centrally managed.&amp;nbsp;Legacy systems might have older software that cannot be upgraded.&amp;nbsp;Some software is free, so there is no financial&amp;nbsp;record of it.&amp;nbsp;You need a way to coral all these different licenses and automatically capture what new software appears on the endpoints, and accurately interpret the license terms so you know if the company is in or out of compliance.&lt;/p&gt;

&lt;h2&gt;How Ivanti Can Help&lt;/h2&gt;

&lt;p&gt;If this all sounds like a daunting task, that’s because it is!&amp;nbsp;It is also the linchpin of all other security components in your environment.&amp;nbsp;You cannot know about the effectiveness of patching, log management, risk management, antivirus, license violations and physical theft without these inventories.&amp;nbsp;Fortunately, Ivanti offers software that takes on these very tall hurdles.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At Ivanti, the powerful combination of &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank"&gt;Ivanti Service Manager (ISM)&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;Asset Manager&lt;/a&gt;, and &lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;Ivanti License Optimizer (ILO)&lt;/a&gt; can put a very effective process around the exercise of inventory, discovery, storage, management and workflow of your hardware and software assets.&amp;nbsp;Talk to a sales professional today about how Ivanti can help make short work of the most important component of your security framework!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Compliance Tips and Best Practices graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/04/ivanti-compliance-cta-bnr-728x90.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 09 Apr 2019 17:45:32 Z</pubDate></item><item><guid isPermaLink="false">de9fb277-01d3-4dd2-84ec-cf6dd137ea03</guid><link>https://www.ivanti.com/blog/are-we-secure-critical-insights-from-ivanti-ciso-phil-richards</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>"Are We Secure?" Critical Insights From Ivanti CISO Phil Richards</title><description>&lt;p&gt;The question “Are we secure?” strikes fear and dread into the heart of every CISO, whose initial gut reaction is to respond, “Well, that’s a complicated question.” The reason it’s complicated is because security is never really “done.”&lt;/p&gt;

&lt;p&gt;Unlike many other professions, a Security Officer doesn’t really know what “done” is. If you talk to a baker and ask, “Is the cake done?”, the answer is fairly straightforward—either the cake is ready to ship out or it isn’t.&lt;/p&gt;

&lt;p&gt;For software developers, the answer is a little more complicated, because you have to define what “done” means, but there can also be a bar or level that defines “done.” For security, even if you define or establish a bar that indicates security is “done,” that bar continues to move because the bad guys are always coming up with new ways to get in—which must be responded to. For most security officers, “done” borders on a false sense of safety, which is dangerous.&lt;/p&gt;

&lt;h2&gt;How Do You Respond?&lt;/h2&gt;

&lt;p&gt;So, with all that, how do you respond to the executive who asks, “Are we secure?” without appearing like you’ve never thought about it?&lt;/p&gt;

&lt;p&gt;Most senior executives are aware that security is a process and adherence to a set of standards. Many executives are also aware that these standards change over time, with constant adjusting, addressing issues, and chasing down incidents. Because of that, most times it’s okay to respond with something more complex than a yes or no answer.&lt;/p&gt;

&lt;p&gt;When I’m asked such a question, I like to speak to the improvements. For me, the big three indicators of a security program’s overall health boil down to risk management, incident management, and vulnerability management.&lt;/p&gt;

&lt;h2&gt;Risk Management:&lt;/h2&gt;

&lt;ol&gt;
	&lt;li&gt;Has the organization adequately identified the key cyber-security risks?&lt;/li&gt;
	&lt;li&gt;Is the organization actively managing these risks?&lt;/li&gt;
	&lt;li&gt;Is there an active pipeline of risk mitigation plans/activities that will be completed over the next 6 to 18 months to improve the overall risk management profile?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For me, these questions—when answered in the affirmative—define a risk program that’s under control.&lt;/p&gt;

&lt;h2&gt;Incident Management:&lt;/h2&gt;

&lt;ol&gt;
	&lt;li&gt;Do we have an incident response (IR) team that includes all major departments within the organization?&lt;/li&gt;
	&lt;li&gt;Do we have an incident response plan that is understood and works?&lt;/li&gt;
	&lt;li&gt;Does the IR team practice incident response?&lt;/li&gt;
	&lt;li&gt;Does the IR team have experience handling real-world incidents? Can that team be trusted if/when a major incident occurs?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These are the key indicators of an effective incident response program that can enable action when the time comes.&lt;/p&gt;

&lt;h2&gt;Vulnerability Management:&lt;/h2&gt;

&lt;ol&gt;
	&lt;li&gt;Do we have an accurate hardware and software inventory?&lt;/li&gt;
	&lt;li&gt;Do we perform vulnerability scans/assessments across our server and workstation domains?&lt;/li&gt;
	&lt;li&gt;Do we actively patch servers and workstations?&lt;/li&gt;
	&lt;li&gt;Do we actively adjust configurations to account for drift?&lt;/li&gt;
	&lt;li&gt;Do we have service-level requirements for addressing vulnerability scan deficiencies?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These are the keys to a functional vulnerability management program.&lt;/p&gt;

&lt;h2&gt;Progression, Not Perfection&lt;/h2&gt;

&lt;p&gt;You’ll note that these programs do not indicate perfection within the organization. Rather, they indicate that the organization is on a trajectory of continuous improvement. There is and always will be risk, but these metrics focus on how the organization is oriented. To the question, “Are we secure?” these metrics also permit you to say, “We are better than we’ve been before and we have the right processes in place so that we will continue to improve over time,” which I think is a much more satisfying response.&lt;/p&gt;

&lt;p&gt;Ivanti offers &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;proven endpoint security solutions&lt;/a&gt; that provide the foundational, layered protection from malware and other threats global experts agree create the highest barriers to real-world attacks. Invest some time to learn more about them. You can also request a &lt;a href="https://www.ivanti.com/lp/security/demos/endpoint-security-solutions" target="_blank"&gt;free demo&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Phil Richards is Ivanti’s Chief Security Officer, with 20 years of hands-on experience as CSO, senior program manager, director of release engineering, and director of architecture. He graduated from Brigham Young University in Information Management and holds an MBA in Finance from the University of Utah. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="National Cybersecurity Month: How to be Prepared" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/sm-copy-of-cybersec-month_ppc-bnr-1200x628.jpg"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 03 Oct 2018 21:30:47 Z</pubDate></item><item><guid isPermaLink="false">1c300f1d-4a8e-480e-be26-da26b4dc4319</guid><link>https://www.ivanti.com/blog/global-ransomware-attack-based-on-a-petya-variant-threatens-repeat-of-wannacry</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Global Ransomware Attack Based on a Petya Variant Threatens Repeat of WannaCry</title><description>&lt;h6&gt;UPDATE:&amp;nbsp;June 27, 2017&amp;nbsp;&lt;span class="s1"&gt;—&lt;/span&gt;&amp;nbsp;Chris Goettl&lt;/h6&gt;
&lt;p&gt;&lt;strong&gt;Petya Ransomware Attack: What Should Companies Be Doing Right Now?&lt;/strong&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Several critical vulnerabilities with known exploits or proof-of-concept code should be the focus of everyone’s attention. The SMB exploits (EternalBlue and its siblings) resolved in Microsoft’s March Patch Tuesday update are just the start.&amp;nbsp;Reportedly these are the same vulnerabilities the latest Petya variant uses.&amp;nbsp;And we shouldn’t rely on a kill switch to save the day.&amp;nbsp; &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;In addition, two more updates for known vulnerabilities, released on June Patch Tuesday, warrant attention.&amp;nbsp; &lt;/span&gt;&lt;/p&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s2"&gt;&lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8543" target="_blank" rel="noopener"&gt;&lt;span class="s3"&gt;CVE-2017-8543&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="s1"&gt; – A vulnerability in Windows Search could allow an attacker to take complete control of the system.&amp;nbsp;It could also be exploited over the network without authentication through SMB. It was flagged as “Exploited” when Microsoft released the update on June Patch Tuesday.&amp;nbsp; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s2"&gt;&lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8464" target="_blank" rel="noopener"&gt;&lt;span class="s3"&gt;CVE-2017-8464&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="s1"&gt; –&lt;/span&gt;&lt;span class="s4"&gt;&amp;nbsp; &lt;/span&gt;&lt;span class="s1"&gt;A vulnerability in Microsoft Windows could allow remote code execution if an LNK file is processed. An attacker could craft a shortcut icon that provides the same rights as the local user. It’s a perfect USB drop scenario. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Microsoft went a step further, given recent attacks, and &lt;a href="https://support.microsoft.com/en-us/topic/microsoft-security-advisory-4025685-guidance-for-older-platforms-june-13-2017-05151e8a-bd7f-f769-43df-38d2c24f96cd" target="_blank" rel="noopener"&gt;&lt;span class="s5"&gt;released updates for XP, Vista, and 2003 &lt;/span&gt;&lt;/a&gt; –&lt;/span&gt;&lt;span class="s4"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="s1"&gt;The updates go as far back as MS08-067, which plugged the vulnerability Conficker used to infect more than 15 million machines back in 2008.&amp;nbsp; &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Make sure you have the latest cumulative Security updates for Windows 7 and Server 2008 R2 up through Windows 10 and Server 2016 in place.&amp;nbsp;This covers the Eternal family of vulnerabilities and the two latest known exploited vulnerabilities. &amp;nbsp;Any of the cumulative updates from March through June will suffice for the EternalBlue exploit, but June provides the best coverage including news exploited vulnerabilities.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Windows 7\Server 2008 R2&lt;br&gt;
&lt;/b&gt;March: KB4012215&amp;nbsp;&lt;/span&gt;&lt;span class="s1"&gt;&lt;br&gt;
April: KB4015549&lt;br&gt;
May: KB4019264&lt;br&gt;
June: KB4022719&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;span class="s1"&gt;&lt;span class="s1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Windows Server 2012&lt;/b&gt;&lt;br&gt;
March: KB4012217&lt;br&gt;
April: KB4015551&lt;br&gt;
May: KB4019216&lt;br&gt;
June: KB4022724&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;b&gt;Windows 8.1\Server 2012 R2&lt;br&gt;
&lt;/b&gt;March:&amp;nbsp;KB4012216&lt;br&gt;
April: KB4015550&lt;br&gt;
May: KB4019215&lt;br&gt;
June: &amp;nbsp;KB4022726&lt;/li&gt;
&lt;li class="li1"&gt;&lt;strong&gt;Windows 10\Server 2016&lt;br&gt;
&lt;/strong&gt;March: KB4012606 (1507), KB4013198 (1511), KB4013429 (1607)&lt;br&gt;
April: KB4015221 (1507), KB4015219 (1511), KB4015217 (1607), KB4015583 (1703)&lt;br&gt;
May: KB4019474 (1507), KB4019473 (1511), KB4019472 (1607), KB4016871 (1703)&lt;br&gt;
June: KB4022727 (1507), KB4022714 (1511), KB4022715 (1607), KB4022725 (1703)&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;If you are using the Security Only bundle instead of the Monthly Cumulative Rollup, you need the Security Only bundle from March to resolve the original SMBv1 vulnerabilities. You also need the June Security Only bundle to resolve the two latest exploits, including the new SMB vulnerability.&amp;nbsp;By OS you should have the following KBs applied:&lt;/span&gt;&lt;/p&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Windows 7\Server 2008 R2&lt;br&gt;
&lt;/b&gt;March: KB4012212&lt;br&gt;
June: KB4022722&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Windows Server 2012&lt;/b&gt;&lt;br&gt;
March: KB4012214&lt;br&gt;
June: KB4022718&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Windows 8.1\Server 2012 R2&lt;/b&gt;&lt;br&gt;
March: KB4012213&lt;br&gt;
June: KB4022717&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;For those of you still running Windows XP, Vista, 8, or Server 2003, we recommend you have all the Bulletins and KBs described in the document in place on your systems. All are publicly downloadable, even those released after end of life for each operating system.&amp;nbsp; &lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;Finally, if you haven’t yet, here are some additional security controls you should implement to defend against attacks like this: &lt;/span&gt;&lt;/p&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Application control&lt;/b&gt; – Whitelisting can help you defend against untrusted payloads and is one of the most effective security measures to defend against ransomware. Patching plugs the holes attackers use to get onto a system, but in the case of zero days and fileless attacks, whitelisting can block the payload trying to execute (in this case, the ransomware and propagation to other systems).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Threat protection&lt;/b&gt; – Antivirus (AV) can’t be considered a first line of defense. In most cases, the latest attack could hit several systems before AV catches up to defend against it.&amp;nbsp;Attacks like WannaCry and Petya can spread so quickly that AV can’t stop them before the damage is done.&amp;nbsp;That said, though? AV is still a necessary layer of defense that can limit propagation and stop attacks in their tracks.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;HIPS (host intrusion prevention system)&lt;/b&gt; – While often more difficult to tune, making them harder to implement, HIPS or IPS systems are a great line of defense against attacks such as this.&amp;nbsp; The SMB exploits follow reference implementations a HIPS system could identify, report on, and shut down before the attack hits the system.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;User education\training – &lt;/b&gt;With WannaCry and Petya, exploiting SMB was likely not the first entry point into environments. It was more likely user-targeted attacks (phishing, drive-by downloads, watering hole attacks, etc.), or possibly systems attackers already controlled using CnC infections they put in place earlier.&amp;nbsp;From there the malware used the SMB vulnerabilities to spread rapidly.&amp;nbsp;Any one entry point is enough, if you have not patched those vulnerabilities, so user awareness is important.&amp;nbsp; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Backup and restore&lt;/b&gt; – With ransomware so commonplace, it’s even more important to have backup software at critical endpoints. With WannaCry, and so far with Petya, the number of ransoms paid was very small. Having a recent backup allows companies to re-provision and restore user data quickly to get back up and running. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Provisioning&lt;/b&gt; – Having a Unified Endpoint Management (UEM) solution seems like an operational issue: it enables the team to manage systems in a heterogenous environment. But there are Response capabilities in that UEM platform that are essential to combat cyber threats today. Any credible security practitioner will say that paying the ransom is a bad idea, and that having good backups and re-provisioning the system and restoring the data is the more efficient way to recover from a ransomware attack.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h6&gt;UPDATE: June 27, 2017&amp;nbsp;&lt;span class="s1"&gt;—&lt;/span&gt;&amp;nbsp;CISO Phil Richards&lt;/h6&gt;
&lt;p&gt;&lt;strong&gt;Petwrap, Based on Petya Variant&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;New ransomware is attacking global computing systems worldwide as of June 26, 2017. The ransomware, called Petwrap, is based on an older Petya variant, originating from the GoldenEye malware in December 2016. The new ransomware variant also includes the SMB exploit known as EternalBlue that was created by the United States National Security Administration, and leaked by the Shadow Brokers hacker group in April 2017.&lt;/p&gt;
&lt;p&gt;This malware appears to have been targeted to Ukraine infrastructure groups such as government workstations, power companies, banks, ATMs, state-run television stations, postal services, airports, and aircraft manufacturers. Since the initial infection it has spread to other markets, and beyond the Ukraine borders. The actual malware is ransomware, requesting a ransom equivalent to $300 USD in bitcoins.&lt;/p&gt;
&lt;p&gt;The Petya component includes many features that enable the malware to remain viable on infected systems, including attacking the Master Boot Record. The EternalBlue component enables it to proliferate through an organization that doesn’t have the correct patches or antivirus/antimalware software. This is a great example of two malware components coming together to generate more pernicious and resilient malware.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-16563 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/07/cta-blogbanner-security.jpg" alt="ransomware attack"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 27 Jun 2017 17:17:09 Z</pubDate></item><item><guid isPermaLink="false">8fb53354-81e0-45b3-a7df-7d944f91c166</guid><link>https://www.ivanti.com/blog/ransomware-pay-ransom</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Ransomware: Should You Pay the Ransom?</title><description>&lt;p&gt;Security professionals dread the day when they get the call that ransomware has infiltrated their network and has already started encrypting files, drives and network shares. After the initial shock has worn off and the ransomware is no longer encrypting new files, the decision quickly turns to whether to pay the ransom in order to (maybe) recover the files.&lt;/p&gt;
&lt;ul&gt;
&lt;li class="p1"&gt;&lt;strong&gt;Related:&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;&lt;a href="https://www.ivanti.com/blog/breaking-large-scale-cyber-attack" target="_blank" rel="noopener noreferrer"&gt;Breaking: WannaCry Ransomware Exploding Across the Globe&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Noticeably absent from this article is the actual answer to that question. That is because there are lots of issues and questions that go into this decision.&amp;nbsp;I want to highlight some of the issues you will face and help work through the answers.&lt;/p&gt;
&lt;h6&gt;1. Can you live without the files?&lt;/h6&gt;
&lt;p&gt;Files encrypted by ransomware are locked and cannot be viewed or accessed by anyone in the organization. It is important to catalog the extent of the loss.&amp;nbsp;Files can be grouped based on how critical they are to the organization.&lt;/p&gt;
&lt;h6&gt;2. Do you have backups, and if so, how recent?&lt;/h6&gt;
&lt;p&gt;The existence of backups for encrypted files gives you &lt;em&gt;options. &lt;/em&gt;You might have the ability to recover encrypted files through your own backups. The existence of backup varies by company and by type of system that has been compromised.&lt;/p&gt;
&lt;h6&gt;3. Recovery&lt;/h6&gt;
&lt;p&gt;If you have backups of the encrypted files, how quickly can you recover from backup? Companies have varying strategies for backup/storage and retrieval. Recovery can take multiple days. When that happens, paying the ransom may be a viable alternative to restore files more quickly.&lt;/p&gt;
&lt;h6&gt;4. Do you have an obligation to outside parties?&lt;/h6&gt;
&lt;p&gt;File availability requirements may impact your decision-making.&amp;nbsp;If you need to have files available quickly, that may tilt the balance in favor of paying the ransom for the &lt;em&gt;possibility&lt;/em&gt;&amp;nbsp;of recovering them quickly. Obligations may be to customers, suppliers, regulatory organizations, legal entities and many others.&lt;/p&gt;
&lt;h6&gt;5. Is it possible to decrypt the files without paying the ransom?&lt;/h6&gt;
&lt;p&gt;Some ransomware is not well written.&amp;nbsp;If you are lucky enough to have become infected with a weaker variant of encryption, it is possible to use a recovery pack. &amp;nbsp;A good resource for identifying and remediating some types of ransomware can be found in this list of &lt;a href="https://www.thewindowsclub.com/list-ransomware-decryptor-tools" target="_blank" rel="noopener noreferrer"&gt;decryptor tools&lt;/a&gt;.&lt;/p&gt;
&lt;h6&gt;6. Assess the likelihood of getting the encryption key after paying the ransom&lt;/h6&gt;
&lt;p&gt;Not all ransomware organizations are trustworthy (big surprise). Some will take your money and not provide you with the decryption keys.&lt;/p&gt;
&lt;p&gt;On May 20, 2016, &lt;a href="https://www.csoonline.com/article/556275/kansas-heart-hospital-hit-with-ransomware-paid-but-attackers-demanded-2nd-ransom.html" target="_blank" rel="noopener noreferrer"&gt;Kansas Heart Hospital paid a ransomware&lt;/a&gt; organization an undisclosed amount, only to have the organization extort them for a second time for additional money. The hospital refused to pay the second ransom, stating:&amp;nbsp;“The policy of the Kansas Heart Hospital in conjunction with our consultants, felt no longer was this a wise maneuver or strategy.”&lt;/p&gt;
&lt;h6&gt;7. Other risk factors&lt;/h6&gt;
&lt;p&gt;You need to consider reputation, regulatory and financial risk when deciding whether to pay or not pay the extortionists. Make sure you’re considering all angles.&lt;/p&gt;
&lt;p&gt;The recommendation from the FBI and several non-government organizations is to never pay a ransom. Some reasons to not pay the ransom include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a possibility that you will not get the files recovered after you pay.&lt;/li&gt;
&lt;li&gt;It encourages bad actors to continue developing ransomware.&lt;/li&gt;
&lt;li&gt;You fuel a perception that you are weak by giving in to the bandits.&lt;/li&gt;
&lt;li&gt;You fuel a perception that you are inept if you don’t know how to prevent/resolve security breaches.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In the real world there are other issues that need to be evaluated when deciding to pay the bad guys.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Locked files are critical to your business or represent a significant investment.&lt;/li&gt;
&lt;li&gt;Operations are compromised because of the locked files.&lt;/li&gt;
&lt;li&gt;There is no backup, so the files would be lost forever.&lt;/li&gt;
&lt;li&gt;Restoration of the files will take a significant amount of time and will impact business.&lt;/li&gt;
&lt;li&gt;Need to divulge lost files to customers.&lt;/li&gt;
&lt;li&gt;Regulatory consequences for the lost files.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So while it is easy to say, “Never pay the ransom,” sometimes there are practical considerations that need to be evaluated. Clearly, this is a situation that is best avoided altogether.&lt;/p&gt;
&lt;p&gt;Ivanti&amp;nbsp;ensures your user environment is stable and secure,&amp;nbsp;helping you to reduce risk and extend protection and control.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-16563 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/07/cta-blogbanner-security.jpg" alt="Layered Security is the Whole Endpoint full report"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Wed, 17 May 2017 01:28:57 Z</pubDate></item><item><guid isPermaLink="false">5408f4b3-5a9d-4a46-bfb2-e6d4ae66190c</guid><link>https://www.ivanti.com/blog/why-we-partner-hint-so-you-can-benefit</link><atom:author><atom:name>Phil Richards</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-richards</atom:uri></atom:author><category>Security</category><title>Why We Partner (Hint: So You Can Benefit)</title><description>&lt;p&gt;Endpoint protection has evolved substantially over the past few years. At one time an endpoint protection platform was defined as antivirus software and a centralized console for keeping AV rules and definitions up to date. Now, even the oldest antivirus companies recognize that traditional antivirus systems are not very effective at protecting endpoints. The industry has evolved to incorporate many other aspects of endpoint protection.&lt;/p&gt;
&lt;p&gt;That said, Gartner still takes a particularly narrow view of endpoint protection, defining the landscape as anti-malware, personal firewall, and port and &lt;a href="https://www.ivanti.com/products/device-control"&gt;device control&lt;/a&gt;. That stands in opposition to the definition of malware defense the Center for Internet Security provides (abbreviated below):&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Critical Security Control (CSC) 8: Malware Defenses&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;8.1. Automated continuous monitoring&lt;/li&gt;
&lt;li&gt;8.2. Centralized infrastructure&lt;/li&gt;
&lt;li&gt;8.3. Limit use of external media&lt;/li&gt;
&lt;li&gt;8.4. Enable anti-exploitation features&lt;/li&gt;
&lt;li&gt;8.5. Enable behavior-based malware detection&lt;/li&gt;
&lt;li&gt;8.6. Enable DNS query logging&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Currently, Ivanti outsources 8.1 and 8.5 in the above malware defenses list to trusted partners Invincea and Kaspersky Lab. Both provide traditional signature-based antivirus defense and newer behavior-based and adaptive anti-malware technologies—a combo that offers extensive protection traditional AV software can’t hope to replicate. And we couple these solutions with a rich, robust, and thorough endpoint protection solution that exceeds the capabilities of any other solution in the industry.&lt;/p&gt;
&lt;p&gt;Gartner’s narrow view of malware defense limits what providers develop for their customers (so they can check those boxes Gartner defines and qualify for inclusion). We have chosen to integrate more capabilities and augment with partner technology to provide complete coverage.&lt;/p&gt;
&lt;p&gt;One of the potential outcomes of meeting Gartner’s narrow definition of endpoint protection is to undervalue innovation in the category. At Ivanti, we have chosen not to do that.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-15110 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/03/cta-blogbanner-security.jpg" alt="Layered security is the whole endpoint"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Wed, 22 Feb 2017 18:20:25 Z</pubDate></item></channel></rss>