<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Security</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/topics/security/rss" /><link>https://www.ivanti.com/en-au/blog/topics/security</link><item><guid isPermaLink="false">c641a17e-53ec-4081-9348-b34fc5d8661b</guid><link>https://www.ivanti.com/en-au/blog/the-secure-by-design-pledge-a-commitment-to-creating-a-safer-digital-future</link><atom:author><atom:name>Jeff Abbott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/jeffery-abbott</atom:uri></atom:author><category>Security</category><category>Ivanti News</category><title>The Secure-by-Design Pledge: A Commitment to Creating a Safer Digital Future</title><description>&lt;p&gt;The exciting benefits of digital transformation and automation — global interconnectedness, efficient operations, greater business outcomes — have come with an equal measure of concern over digital safety. It has become clear that to safely realize the &lt;em&gt;benefits&lt;/em&gt; of digital acceleration, as an industry we must take bold steps toward securing the digital landscape and mitigating cybersecurity threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At Ivanti this evolution is already under way — and we are committed to being at the very front of the movement. As a company, we have always believed that our customers’ interests – including security –&amp;nbsp;should be a cornerstone of software development. With the threat landscape rapidly evolving, and tactics becoming increasingly aggressive and sophisticated, the imperative to put security &lt;em&gt;first&lt;/em&gt; has never been greater. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;That is why last month I &lt;a href="https://www.ivanti.com/en-au/blog/our-commitment-to-security-an-open-letter-from-ivanti-ceo-jeff-abbott"&gt;outlined a bold plan&lt;/a&gt; for Ivanti to meet the new reality we are all facing. Our efforts are rooted in Secure by Design principles, weaving security into every stage of our software development lifecycles. Given this commitment, it makes sense that we’re among the first to sign the Cybersecurity and Infrastructure Security Agency’s (CISA) Secure by Design pledge, which they unveiled on May 7, 2024 at the RSA Conference in San Francisco.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The concept of Secure by Design is not new, but it has never been more relevant. It ensures that products are built with security embedded from the ground up, reducing the risk of vulnerabilities and making it more difficult for malicious actors to exploit them. That is why this pledge is so meaningful at this moment in time, and why companies like Ivanti are answering the call.&amp;nbsp; We see this as a meaningful step forward in the industry’s commitment and collaboration around security, and we look forward to setting a new standard for the broader ecosystem. &amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;A bold new level of security&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;By signing the Secure by Design pledge, we are committing to a set of principles, standards, and actions that will help us further elevate the security of our products and better protect our customers. This includes implementing multi-factor authentication, reducing the use of default passwords, mitigating entire classes of vulnerabilities, increasing the adoption of security patches, establishing a vulnerability disclosure policy and improving our customers' ability to gather evidence of cybersecurity intrusions. I’m pleased that our products and our organization already meet many of these Secure by Design principles, and we are looking closely at opportunities to enhance and accelerate our efforts and practices throughout our organization and product development lifecycle.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For Ivanti, these commitments are far from simply words on paper or empty promises. By signing this pledge, we are making a public commitment to raise the bar and that we will be accountable for delivering. We will work diligently over the coming year to make measurable progress toward each of these goals, and we will update our customers and the wider security community on our progress. We believe that transparency is essential in building trust and fostering a broader culture of security.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Stronger together&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;We’ve taken a big step by acting as early signers to this pledge. Still, we recognize that we cannot achieve a safer digital future alone. It is crucial that other vendors in the industry also embrace the principles of Secure by Design and take similar steps to prioritize security in their products. We strongly encourage our peers to join us in signing the CISA Secure by Design pledge and to work collaboratively toward our shared goal of protecting our customers and the broader digital ecosystem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It's good business, and it’s the right thing to do for employees, partners, customers and the communities we serve.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our recent experience at RSA has only reinforced our belief in the importance of the security community coming together to tackle the challenges we collectively face. Our conversations with customers and partners were invaluable, and they highlighted the need for a collective effort around software security. By sharing knowledge and best practices and holding each other accountable, we can make significant strides toward a stronger and more secure future. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti is committed to being a leader in this effort, and we look forward to engaging with our customers and the wider community to make Secure by Design the new reality.&lt;/p&gt;
</description><pubDate>Wed, 08 May 2024 22:06:03 Z</pubDate></item><item><guid isPermaLink="false">5a409b72-808b-4c7b-a71d-b96530e339a6</guid><link>https://www.ivanti.com/en-au/blog/what-is-irap-assessment-what-to-know-about-ivanti-neurons-and-irap</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/david-pickering</atom:uri></atom:author><category>Security</category><title>What is IRAP Assessment? What to Know About the Latest Compliance for Ivanti Neurons</title><description>&lt;p&gt;The Australian Information Security Registered Assessors Program (IRAP) assessment is an essential tool for organisations looking to ensure their security posture meets the highest standards.&lt;/p&gt;

&lt;p&gt;This assessment, which&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-itsm"&gt;Ivanti Neurons for IT Service Management (ITSM)&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/it-asset-management"&gt;Ivanti Neurons for IT Asset Management (ITAM)&lt;/a&gt;&amp;nbsp;went through, is one of the most stringent security assessments available.&lt;/p&gt;

&lt;h2&gt;The IRAP assessment process&lt;/h2&gt;

&lt;p&gt;The IRAP program is administered by the Australian Cyber Security Centre (ACSC), a division of the Australian Signals Directorate. The ACSC is responsible for the security of the Australian government’s information and IT systems, and the IRAP assessment process.&lt;/p&gt;

&lt;p&gt;The rigorous assessment process conducted by an approved IRAP assessor includes assessing existing policies and procedures, conducting vulnerability scans, and reviewing security measures.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons’ IRAP assessment&lt;/h2&gt;

&lt;p&gt;Under the IRAP assessment, conducted by Aegis9 during the period February to May 2023, using the June 2022 version of the Australian Information Security Manual (ISM) and in line with the ACSC’s Cloud Security Guidance, Ivanti Neurons for ITSM and ITAM were assessed against the requirements to hold, process and communicate Australian government information classified up to and including “PROTECTED.”&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for ITSM and ITAM has been assessed in the following areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Protection of government and citizen data&lt;/strong&gt;.&amp;nbsp;Ivanti provides a secure platform for the storage and retrieval of personal and sensitive data.&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Secure access to systems&lt;/strong&gt;.&amp;nbsp;Ivanti uses strong authentication methods and access control measures to ensure that only authorised users can access the system.&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Network and system protection&lt;/strong&gt;.&amp;nbsp;Ivanti provides a robust system for protecting networks and systems from malicious attacks and intrusions.&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Security monitoring&lt;/strong&gt;.&amp;nbsp;Ivanti is equipped with advanced security monitoring capabilities, allowing organisations to monitor their systems and networks for any suspicious activity.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In addition to IRAP assessment,&amp;nbsp;Ivanti Neurons also holds certifications&amp;nbsp;from several other leading organisations, including ISO/IEC 27001:2013, GDPR compliance, SOC 2 Type II, HIPAA Compliance, and FedRAMP Certification.&lt;/p&gt;

&lt;h2&gt;What Ivanti’s IRAP assessment means for government agencies and public-sector organisations&lt;/h2&gt;

&lt;p&gt;Federal departments, state agencies&amp;nbsp;and critical infrastructure providers require the highest security standards.&amp;nbsp;The IRAP assessment demonstrates&amp;nbsp;the strong commitment Ivanti has to meeting those strict standards.&lt;/p&gt;

&lt;p&gt;Government agencies are continually striving to increase efficiency and reduce costs. To achieve this, they are frequently turning to cloud computing technologies such as SaaS to provide them with a modern platform that will enhance operational efficiency and reduce IT costs.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for ITSM/ITAM is an advanced IT Service Management platform and enables government agencies to improve their Service Delivery across 11 ITIL practices, optimise their assets by understanding what they have, and improve the employee experience through the self-service portal and digital experience management.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, using the same IRAP assessment platform, agencies can expand across to other areas such HR, Facilities, Governance Risk and Compliance, Project and Portfolio Management and Security Operations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By using Ivanti Neurons for ITSM/ITAM, organisations&amp;nbsp;can achieve their goals faster, improve employee experience&amp;nbsp;and reduce their risk profile. The comprehensive suite of features offered includes automated processes and analytics capabilities that help minimise manual tasks associated with ensuring service quality.&lt;/p&gt;

&lt;p&gt;This frees up customers to focus on providing superior customer experiences instead of managing complex back-end operations.&lt;/p&gt;

&lt;p&gt;Furthermore, Ivanti Neurons for ITSM is designed to be easily deployable across multiple devices, providing customers with peace of mind that they are using a secure solution from start to finish.&amp;nbsp;Ivanti is committed to assessing more solutions against the IRAP program. Ivanti Neurons for MDM (Mobile Device Management) is currently under IRAP assessment and Ivanti looks forward to sharing the results when complete.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Need additional information? Head over to the &lt;a href="https://www.ivanti.com/en-au/solutions"&gt;Ivanti&amp;nbsp;IRAP page&lt;/a&gt; to learn more.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Sun, 18 Feb 2024 09:24:30 Z</pubDate></item><item><guid isPermaLink="false">2bd150d5-caf2-45e5-a897-557016003c81</guid><link>https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries</link><category>Security</category><title>International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries</title><description>&lt;p&gt;&lt;em&gt;Part three of a four-part series covering Ivanti’s latest research. Get the full series:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;Which Gen Is More Tech-Savvy? A Workforce Dilemma&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;Red Flag Reluctance: The Risk to Cybersecurity &lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;Taking a Real Look at Hidden Risk&lt;/a&gt; &lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An organization’s culture and training programs have a significant influence on security preparedness, but our research shows both are inconsistent at the country-to-country level.&lt;/p&gt;

&lt;p&gt;As we’ve seen in the previous posts in this series, &lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;employee demographics&lt;/a&gt; and their &lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;willingness to report security risks&lt;/a&gt; are hidden threats to your cybersecurity posture.&lt;/p&gt;

&lt;p&gt;But &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new research&lt;/a&gt; from Ivanti shows us there are notable variations between countries in employee beliefs and behaviors regarding cybersecurity. This poses a unique hidden threat to organizations operating in multiple regions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Get the report&lt;/strong&gt;:&lt;/em&gt; &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;&lt;em&gt;Hidden Threats: How workforce demographics impact your security posture&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Security cultures by country&lt;/h2&gt;

&lt;p&gt;Our research shows important differences in security culture at the country level — both in terms of training provided by the organization and employee-level attitudes. Some examples:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;In Germany, 83% said they would feel safe reporting their mistake to the security team, compared to 61% of employees in Japan.&lt;/li&gt;
	&lt;li&gt;In India, 55% said they believe they have an impact on the company’s cybersecurity efforts, while just 7% said the same in China and 16% said so in France.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="440" id="datawrapper-chart-5EKwX" scrolling="no" src="https://datawrapper.dwcdn.net/5EKwX/1/" title="How safe employees feel about reporting security mistakes by country"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="430" id="datawrapper-chart-vd63r" scrolling="no" src="https://datawrapper.dwcdn.net/vd63r/1/" title="Belief that individual employees have a security impact"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“These country-level differences are an interesting lens through which to study preparedness. It’s easy — and common — for a security team to judge security based on what’s taking place in their largest or nearest office. Our latest research shows how important it is to explore more granular data and uncover security procedures at every location — whether at headquarters, R&amp;amp;D facilities, supply chain outposts or manufacturing locations.”&lt;/p&gt;

&lt;p&gt;Daren Goesen, SVP, Product Management, Ivanti&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;How local culture interacts with global security programs&lt;/h2&gt;

&lt;p&gt;Culture can influence how organizations defend their assets and people, as well as how they respond to an attack. These challenges include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Employee discomfort with training that was developed at the global level (e.g., poor translation of teaching materials into local language and culture).&lt;/li&gt;
	&lt;li&gt;Employee unease with new standards or rules that have not been “socialized” at the local level.&lt;/li&gt;
	&lt;li&gt;A top-down local office culture that leaves little room for individuals to report errors or concerns.&lt;/li&gt;
	&lt;li&gt;Substandard security support for local offices; for example, employees with questions or concerns must contact a security team member in a different country — and endure language and cultural barriers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All these issues can make it easier for malicious actors to disrupt day-to-day operations.&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="413" id="datawrapper-chart-XRezN" scrolling="no" src="https://datawrapper.dwcdn.net/XRezN/1/" title="International inconsistencies in security training"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h2&gt;Why it matters&lt;/h2&gt;

&lt;p&gt;Many organizations have a top-down approach to training and security culture, but the research shows it’s critical to understand local security culture — and even local culture — to put together a coherent plan.&lt;/p&gt;

&lt;p&gt;No matter where they're from, every new hire introduces their own unique vulnerabilities to the organization, intentionally or not. Undertrained employees risk diluting the strength of the overall organization's preparedness.&lt;/p&gt;

&lt;p&gt;To minimize this risk, organizations &lt;em&gt;must invest in strong onboarding and ongoing security training programs&lt;/em&gt; at global and regional levels.&lt;/p&gt;

&lt;p&gt;In our &lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;next post in this series&lt;/a&gt;, we’ll detail this and other effective measures an organization can take to address the hidden threats we’ve explored.&lt;/p&gt;
</description><pubDate>Tue, 03 Oct 2023 04:02:00 Z</pubDate></item><item><guid isPermaLink="false">4385fda4-67d7-403a-afef-3ff7a208578a</guid><link>https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk</link><category>Security</category><title>Taking a Real Look at Hidden Risk</title><description>&lt;p&gt;&lt;em&gt;Part four of a four-part series covering Ivanti’s latest research. Get the full series: &lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;Which Gen Is More Tech-Savvy? A Workforce Dilemma&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;Red Flag Reluctance: The Risk to Cybersecurity&lt;/a&gt; &lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries &lt;/a&gt; &lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Big-picture excellence can hide pockets of risk. It’s time to explore security risk in detail — drilling down to look at vulnerabilities hidden in the data and by taking preventative action.&lt;/p&gt;

&lt;p&gt;As the previous posts in this series have shown, &lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;employee demographics&lt;/a&gt;, their &lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;willingness to report security risks&lt;/a&gt; and &lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;country-to-country security culture&lt;/a&gt; differences pose hidden threats to your company’s cybersecurity efforts. They’re threats that have been uncovered in &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new research&lt;/a&gt; from Ivanti.&lt;/p&gt;

&lt;p&gt;It’s up to an organization to take concrete steps to mitigate these threats. What are some of the key measures you can take?&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Get the report&lt;/strong&gt;:&lt;/em&gt; &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;&lt;em&gt;Hidden Threats: How workforce demographics impact your security posture&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Survey your employees to uncover demographic propensities&lt;/h2&gt;

&lt;p&gt;Use an anonymous survey to surface insights about your employee base — paying close attention to demographic differences.&lt;/p&gt;

&lt;p&gt;Are there unexpected findings? Conclusions that run counter to expectations? Use the findings to step up your training and outreach efforts, matching solutions to the segments of your employee base that need additional support.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Sample questions for an anonymous study of employee attitudes&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Can you identify a phishing attempt?&lt;/li&gt;
	&lt;li&gt;Have you been given resources and/or tools to identify a phishing attempt?&lt;/li&gt;
	&lt;li&gt;Do you feel comfortable asking the security team a question?&lt;/li&gt;
	&lt;li&gt;Do you feel safe reporting an error to the security team?&lt;/li&gt;
	&lt;li&gt;Do you think your actions have an impact on the organization’s security?&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Challenge stereotypes about digital savviness and safety&lt;/h2&gt;

&lt;p&gt;Have your security team complete an anonymous survey that examines their assumptions about different employee groups. Do they believe older employees act less safely? How do those results compare to your general employee survey findings?&lt;/p&gt;

&lt;p&gt;Try to shed light on assumptions that are not only unfair but untrue — and on how stereotypes might affect your security readiness.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Part of understanding chronic repeat [phishing] clickers should involve a bit of investigation. In an organization of 5,000 people, it could be that there are certain roles that naturally encourage people to click even when your awareness program and other training discourages it. I’m thinking about departments that are constantly understaffed, departments whose job it is to process large amounts of email (e.g., recruiting), etc. Before anyone blames the end user, an organization should try to see if they are accidentally putting certain sets of users in no-win situations.”&lt;/p&gt;

&lt;p&gt;- &lt;a href="https://www.reddit.com/r/cybersecurity/comments/10g4688/comment/j55k4cn/" rel="noopener" target="_blank"&gt;Reddit comment&lt;/a&gt; on why some employees are more likely to fall for phishing emails&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Understand how global security culture is translated into local languages and culture&lt;/h2&gt;

&lt;p&gt;When developing any new training and guidelines or deploying new security technology, make certain to consult with local divisions to gain their input and buy-in. Simply translating educational materials and communications is not enough.&lt;/p&gt;

&lt;p&gt;Solicit feedback from local offices about how well these programs “translate” to regional offices and the challenges they may encounter. Where possible, design materials that are culturally sensitive and appropriate for local offices.&lt;/p&gt;

&lt;h2&gt;Design the tech stack to minimize pockets of nonconformity and inconsistency&lt;/h2&gt;

&lt;p&gt;Rather than relying on individual users to conform to security protocols, build stronger back-end automation that is effectively hidden from end users — interventions that make compliance frictionless. For example:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Just-in-time software updates&lt;/em&gt;: Most employees don’t relish shutting down their computers and rebooting for software updates, so they tend to postpone the process indefinitely. Instead, use a system that forces a restart within 72 hours; this way, employees have some control over when the reboot takes place, even while enforcing needed updates.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;No-stress password hygiene&lt;/em&gt;: Instead of asking employees to update passwords on a regular schedule, implement a technology that allows users to access two-factor password apps — no remembering or sticky notes needed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Address how to build an open and welcoming security culture&lt;/h2&gt;

&lt;p&gt;It should be a culture in which there are no barriers to contacting security professionals, no matter how small the question or concern or how foolish the mistake is.&lt;/p&gt;

&lt;p&gt;What are the key tenets of a strong security culture?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Open&lt;/em&gt;: Employees feel safe reporting an incident and are rewarded for their honesty and transparency. They feel comfortable approaching the security team no matter how trivial their question or concern may seem.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Iterative:&lt;/em&gt; The organization provides frequent, iterative training that’s compelling to employees. In between formal sessions, IT uses various tactics to keep security top of mind – from gamified security contests to lunchtime workshops.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Designed&lt;/em&gt;: Employee behavior is sharpened by tech-driven behavioral interventions. They are designed so well that they eliminate dreaded workarounds and non-compliance. As one security expert explained,&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;“Repeat clickers aren’t really the problem, or more accurately, they’re a relatively predictable problem. If you know someone has a hard time detecting deception, they need guardrails, not punitive measures or more ineffective training.”&lt;/p&gt;

&lt;p&gt;Comment from the &lt;a href="https://www.reddit.com/r/cybersecurity/comments/13csxs0/what_does_your_policytraining_look_like_for/" rel="noopener" target="_blank"&gt;r/cybersecurity Reddit forum&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Integrated&lt;/em&gt;: The responsibility for security is shared by all, and your employees are invested in keeping the organization safe.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 03 Oct 2023 04:01:02 Z</pubDate></item><item><guid isPermaLink="false">7ee84b27-916e-435d-a2db-52525c9bfb38</guid><link>https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma</link><category>Security</category><title>Which Gen Is Most Tech-Savvy? A Workforce Dilemma</title><description>&lt;p&gt;&lt;em&gt;Part one of a four-part series covering Ivanti’s latest research. Get the full series:&lt;/em&gt;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;Red Flag Reluctance: The Risk to Cybersecurity&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;Taking a Real Look at Hidden Risk&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;According to new cybersecurity research by Ivanti, the employees who are the most tech-savvy aren’t necessarily the ones we’d presume, demographically speaking. Why is that? And what are the issues it creates for an enterprise?&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For a &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new report&lt;/a&gt;, Ivanti surveyed 6,500 executive leaders, cybersecurity professionals and office workers across the globe to get a better understanding of:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Employees’ attitudes toward cybersecurity and their perceived role in defending organizations.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Security professionals’ diagnoses of key challenges and vulnerabilities.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Leaders’ tech behaviors, as well as their level of buy-in to cybersecurity strategy.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some of the results were, in a word, surprising. And that starts with what we’ll examine in this first article in a four-part series about the hidden threats facing even those organizations that have solid cybersecurity programs in place.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Get the report:&lt;/em&gt;&lt;/strong&gt; &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;&lt;em&gt;Hidden Threats: How workforce demographics impact your security posture&amp;nbsp;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;The opposite of expectations&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Many assume older employees are less tech savvy — and therefore more likely to engage in risky behaviors. In fact, our research found that the opposite is true.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Younger professionals (those under 40) are significantly more likely to disregard important security guidelines compared to Gen X and older. This is true about performing password hygiene, clicking on phishing links and sharing devices with family and friends.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Split Bars" data-external="1" frameborder="0" height="162" id="datawrapper-chart-Q3hMH" scrolling="no" src="https://datawrapper.dwcdn.net/Q3hMH/2/" title="Younger workers display riskier behaviors"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Grouped Bars" data-external="1" frameborder="0" height="426" id="datawrapper-chart-YVJ54" scrolling="no" src="https://datawrapper.dwcdn.net/YVJ54/2/" title="Younger workers are more likely to use unsafe password practices"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h2&gt;Why it matters&lt;/h2&gt;

&lt;p&gt;These oversights, lapses and shortcuts add up to significantly higher security vulnerabilities with&amp;nbsp;younger employees.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Stereotypes about age-based tech savviness may be leading organizations astray. And the problem isn't only related to cyberhygiene (e.g., password habits, sharing devices); the research shows younger professionals are also less likely to report red flags when they encounter them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Among those 40 and under, 77% said they reported the last phishing email or message they received, compared to 88% of those over 40. The most common reason for not reporting? “I didn’t think reporting was important.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Multiple Donuts" data-external="1" frameborder="0" height="399" id="datawrapper-chart-EBG5m" scrolling="no" src="https://datawrapper.dwcdn.net/EBG5m/1/" title="Reported their last phishing email/message to the security team"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;Stereotypes about older workers are particularly insidious because tech workers skew younger — and so may be more likely to believe their older colleagues are uninformed or vulnerable.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For example, &lt;a href="https://www.cwjobs.co.uk/advice/ageism-in-tech-press-release" rel="noopener" target="_blank"&gt;a&amp;nbsp;study of 2,250 professionals in the UK&lt;/a&gt;&amp;nbsp;found tech workers viewed colleagues as “over the hill” and “too old for their job” when they reached 38 years old.&amp;nbsp;(Keep in mind, this is in relation to their tech industry peers, not average employees, who are less likely to be tech savvy.)&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Solution? Automate cybersecurity “savvy”&lt;/h2&gt;

&lt;p&gt;These&amp;nbsp;findings&amp;nbsp;underline&amp;nbsp;why&amp;nbsp;organizations&amp;nbsp;need&amp;nbsp;to&amp;nbsp;rely&amp;nbsp;less&amp;nbsp;on&amp;nbsp;employees’&amp;nbsp;individual judgment and more on&amp;nbsp;tech&amp;nbsp;interventions that&amp;nbsp;make&amp;nbsp;rule-following&amp;nbsp;effortless.&lt;/p&gt;

&lt;p&gt;Even better: deploy automations that run behind the scenes such that your end users aren’t even aware they exist.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Assuming that younger employees are more security-conscious and tech-savvy is outdated and even dangerous. Organizations should road test these assumptions by conducting internal research that captures their own employees' attitudes about security risk and their part in managing it.”&lt;/p&gt;

&lt;p&gt;Daniel Spicer, Chief Security Officer,&amp;nbsp;Ivanti&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;next post in this series&lt;/a&gt;, we’ll examine the hidden threat that comes from employee reluctance to raise red flags about cybersecurity dangers.&lt;/p&gt;
</description><pubDate>Tue, 03 Oct 2023 04:01:01 Z</pubDate></item><item><guid isPermaLink="false">bf4a175a-1041-4701-b76a-9f46903440c5</guid><link>https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity</link><category>Security</category><title>Red Flag Reluctance: The Risk to Cybersecurity</title><description>&lt;p&gt;&lt;em&gt;Part two of a four-part series covering Ivanti’s latest research. Get the full series:&lt;/em&gt; &amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;Which Gen Is Most Tech-Savvy? A Workforce Dilemma&lt;/a&gt;&amp;nbsp;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;&lt;em&gt;International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries &lt;/em&gt;&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;Taking a Real Look at Hidden Risk&lt;/a&gt;&amp;nbsp;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Keeping an organization safe means getting near-real-time information about security incidents or breaches.&amp;nbsp; But new research shows some employees are less inclined than others to report red ﬂags, which puts your business at risk.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Will your employees get in touch quickly if they have a security concern? Again, it’s dangerous to assume they’ll take action even when they understand the potential risk to their organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the &lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;first post in this series&lt;/a&gt;, we looked at the hidden cybersecurity threat created by employee demographics and dangerous presumptions companies make about them.&amp;nbsp;In this article, we’ll see what &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new research&lt;/a&gt; from Ivanti reveals about the reluctance of some workers to raise red flags, even about very critical threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Get the report&lt;/strong&gt;: &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;Hidden Threats: How workforce demographics impact your security posture&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;What groups are less likely to raise alarms?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti’s research, involving a survey of 6,500 executive leaders, cybersecurity professionals&amp;nbsp;and office workers worldwide, shows specific segments of your employee base may hesitate to reach out to alert your cybersecurity team about issues.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is something any organization should be aware of as it develops outreach and training programs for its employees. So what are the groups that are more likely and less likely to raise red flags?&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Seniority&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The biggest swing variable in reporting issues is seniority. Seventy-two percent of leaders we surveyed say they’ve contacted a cybersecurity employee with a question or concern, compared to just 28% of office workers.&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Did you know?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Executives are twice as likely to report security interactions as "awkward" or "embarrassing" than office workers. These more frequent, yet negative security interactions may accelerate executives' use of external, non-approved tech support – reportedly at four times the rate of office workers.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;Gender&lt;/h3&gt;

&lt;p&gt;Women are less likely than men to do the same. Twenty-eight percent have contacted a cybersecurity employee with a question or concern, compared to 36% of men.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Bar Chart" data-external="1" frameborder="0" height="216" id="datawrapper-chart-By4dQ" scrolling="no" src="https://datawrapper.dwcdn.net/By4dQ/1/" title="Willingness to contact security varies by gender and seniority"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h3&gt;Region&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Willingness to contact security varies greatly by country. For example, nearly half of office workers in China have contacted the security team with a question or concern, compared to just 20% in Australia.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="396" id="datawrapper-chart-XBqBs" scrolling="no" src="https://datawrapper.dwcdn.net/XBqBs/1/" title="Willingness to contact security varies greatly by country."&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h2&gt;Why it matters&lt;/h2&gt;

&lt;p&gt;Your security position depends on hundreds or thousands of employees playing defense. Do your employees know they’re valuable members of the extended security team?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our security preparedness study asked security professionals about their biggest industry-wide vulnerabilities. Ransomware and phishing ranked number one and two.&amp;nbsp; And these threats are becoming more dangerous with each passing year due to advances in &lt;a href="https://www.wsj.com/articles/ai-is-generating-security-risks-faster-than-companies-can-keep-up-a2bdedd4" rel="noopener" target="_blank"&gt;generative AI&lt;/a&gt;, which make phishing harder to spot.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Stacked Bars" data-external="1" frameborder="0" height="245" id="datawrapper-chart-DOuP3" scrolling="no" src="https://datawrapper.dwcdn.net/DOuP3/1/" title="Ransomware and phishing are the top two biggest security threats, according to security professionals"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;All this means your employees &lt;em&gt;need to feel&lt;/em&gt; comfortable approaching IT and security — even if the only “proof” they have of an incoming attack is a nagging doubt. (Some examples: an atypical wire transfer request, a suspicious invoice reminder, or an unsolicited password reset link.) During an active security incident, speed is the single most important factor in defending against an attack.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When employers conduct sentiment surveys to understand employee attitudes, they should drill down to investigate demographic patterns and vulnerabilities. These insights are key to improving overall security preparedness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“We’ve experienced a few advanced phishing attempts, and the employees were totally unaware they were being targeted. These types of attacks have become so much more sophisticated in the last two years — even our most experienced staff are falling for it..”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;— Ivanti survey respondent&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In our &lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;next post in this series&lt;/a&gt;, we’ll dig into the matter of geography. For a large or multinational organization, it’s vital to understand how employee cybersecurity beliefs and behaviors vary – sometimes considerably – by country.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 03 Oct 2023 04:01:01 Z</pubDate></item><item><guid isPermaLink="false">9c753f4a-e211-48e7-b266-4b6b926ddfa9</guid><link>https://www.ivanti.com/en-au/blog/september-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>September 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/YAaxvXFaWZw" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;September 2023 Patch Tuesday has a lot of activity. The theme this month:&amp;nbsp;"Everyone has a zero-day release!"&lt;/p&gt;

&lt;p&gt;Microsoft has resolved 63 total vulnerabilities including two exploited zero-days (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank" title="https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-36761"&gt;CVE-2023-36761&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank" title="https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-36802"&gt;CVE-2023-36802&lt;/a&gt;). Google Chrome resolved one zero-day vulnerability (&lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank" title="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"&gt;CVE-2023-4863&lt;/a&gt;) on September 11, which is also included in the Microsoft Edge Chromium release. Adobe resolved a zero-day vulnerability in Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html" rel="noopener" target="_blank" title="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html"&gt;APSB23-34 CVE-2023-26369&lt;/a&gt;) on September 12. Apple resolved two zero-days on September 7 (&lt;a href="https://support.apple.com/en-us/106361" rel="noopener" target="_blank" title="https://support.apple.com/en-us/ht213905"&gt;CVE-2023-41064 and CVE-2023-41061&lt;/a&gt;). There aren’t any recent zero-day vulnerabilities on the Linux side, but there are three recent vulnerabilities that are affecting some core capabilities in the Linux Kernel that warrant some attention.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a total of 63 vulnerabilities this month, including two exploited vulnerabilities. The zero-day vulnerabilities are in Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank"&gt;CVE-2023-36761&lt;/a&gt;) and the Windows OS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank"&gt;CVE-2023-36802&lt;/a&gt;). Microsoft Edge (Chromium) should be releasing shortly and will include a fix for the Chrome zero-day &lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank"&gt;CVE-2023-4863&lt;/a&gt;. &amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft has resolved an Information Disclosure vulnerability in Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank"&gt;CVE-2023-36761&lt;/a&gt;) that has been exploited in the wild. The vulnerability is only rated as Important by Microsoft and has a CVSSv3.1 score of 6.2, but the confirmed exploitation should raise this on your priority list. The Preview Pane can also be used as an attack vector, making it easier to target users to exploit the vulnerability. If exploited, the attacker could gain access to NTLM hashes.&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved an Elevation of Privilege vulnerability in the Microsoft Streaming Service Proxy (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank"&gt;CVE-2023-36802&lt;/a&gt;). The vulnerability is only rated as Important by Microsoft and has a CVSSv3.1 score of 7.8, but the confirmed exploitation should raise this on your priority list. If exploited the attacker could gain SYSTEM privileges on the target system.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party update&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Google has resolved a Critical heap buffer overflow vulnerability in the Chrome browser (&lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank"&gt;CVE-2023-4863&lt;/a&gt;). Google is aware that an exploit for CVE-2023-4863 exists in the wild. Windows instances should update to 116.0.5845.187/.188 and for MacOS and Linux 116.0.5845.187.&lt;/li&gt;
	&lt;li&gt;Adobe Acrobat and Reader released &lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html" rel="noopener" target="_blank"&gt;APSB23-34&lt;/a&gt;, resolving one critical vulnerability (CVE-2023-26369) that is confirmed to be exploited in the wild. The vulnerability is an out-of-bounds write vulnerability that could allow an attacker to execute arbitrary code.&lt;/li&gt;
	&lt;li&gt;Mozilla has released updates for Firefox and Firefox ESR. No zero-days, just a decent lineup of CVEs resolved.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Linux update&lt;/h2&gt;

&lt;p&gt;There are three CVEs of note on the Linux platforms:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-3111 is a use after free vulnerability in btrfs in the Linux Kernel affecting all versions of Linux. A use after free vulnerability could allow an attacker to leak data from memory, overwrite critical information, execute arbitrary code and bypass Address Space Layout Randomization (ASLR).&lt;/li&gt;
	&lt;li&gt;CVE-2023-3390 is a vulnerability in the Linux Kernel’s nftables API in the netfilter subsystem that could allow privilege escalation. The vulnerability affects Debian and Ubuntu.&lt;/li&gt;
	&lt;li&gt;CVE-2023-35001 is an out of bounds read\write vulnerability in nftables. These types of vulnerabilities can cause a crash, data corruption, code execution, or allow attackers to read sensitive information from other memory locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The changes affect two commonly used components in the Linux Kernel. These components are also used by a variety of solutions from Firewalls to SANs and could affect foundational capabilities.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Btrfs is the filesystem utilized by most Enterprise Linux distributions (Ubuntu, Debian, Redhat, etc.).&lt;/li&gt;
	&lt;li&gt;Nftables is used by any modern firewall solution. Regardless of distribution, it will either be built in through the system itself or third-party applications it will use. The component provides high-performance packet inspection and routing. &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of the vulnerabilities are currently exploited so there is time, but you should take advantage to ensure you are testing the changes across your environment adequately.&lt;/p&gt;

&lt;p&gt;Linux vulnerabilities can have a long tail from publishing of the CVE to patches being made available by Linux distributions. To monitor the latest Linux CVEs,&amp;nbsp;&lt;a href="https://cve.tuxcare.com/els/cve" rel="noopener" target="_blank"&gt;check out TuxCare’s detailed CVE Tracker&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Apple update&lt;/h2&gt;

&lt;p&gt;Apple released updates resolving two exploited vulnerabilities on September 7. The updates affect iOS, iPadOS and macOS. The two CVEs have confirmed exploits in the wild and &lt;a href="https://www.cisa.gov/news-events/alerts/2023/09/11/cisa-adds-two-known-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA has updated the KEV list&lt;/a&gt; adding these two vulnerabilities.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/en-us/106361" rel="noopener" target="_blank"&gt;CVE-2023-41061&lt;/a&gt; is a vulnerability in Apple Wallet affecting iPhone and iPad. The vulnerability allows an attacker to create a specially crafted attachment which could allow them to execute arbitrary code.&lt;/li&gt;
	&lt;li&gt;CVE-2023-41064 is a vulnerability in Apple ImageIO affecting iPhone, iPad and macOS. The vulnerability could be used to craft a malicious image which would allow an attacker to execute arbitrary code when processed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Update priorities for September&lt;/h2&gt;

&lt;p&gt;Windows OS, macOS, iPhone, iPad, all browsers and Adobe Acrobat and Reader. Which pretty much feels like everything.&lt;/p&gt;
</description><pubDate>Tue, 12 Sep 2023 21:17:26 Z</pubDate></item><item><guid isPermaLink="false">50a3a2b2-3514-408b-94de-4bce208c27ad</guid><link>https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time</title><description>&lt;p&gt;In a previous blog post, I discussed the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;two main areas to audit&lt;/a&gt;&amp;nbsp;before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would:&lt;/p&gt;

&lt;p&gt;Identify your gaps with the NIS2 directive’s requirements now.&lt;/p&gt;

&lt;p&gt;Review your current supply chain security flaws.&lt;/p&gt;

&lt;p&gt;Now that we’ve discovered these security flaws, we must fix them —&amp;nbsp;before&amp;nbsp;time runs out in October 2024.&lt;/p&gt;

&lt;p&gt;So, in this post, I’ll walk you through how to resolve your weakest security issues before the NIS2 Directive deadline hits by addressing these three key areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Inform&amp;nbsp;management about your cybersecurity gaps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Correctly implementing new organisation and technical security measures&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Find time to train all of your employees&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;1. Inform management about your gaps – and get budget to remediate them&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3312-80-1" rel="noopener" target="_blank"&gt;imposes significant obligations&lt;/a&gt;&amp;nbsp;on organisations that fall under its scope, which may entail substantial costs and resources.&amp;nbsp;The Directive also introduces hefty fines and sanctions for non-compliance, up to a maximum of €10 million or 2% of an organisation's global annual revenue&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e4350-80-1" rel="noopener" target="_blank"&gt;Article 34&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;On top of this,&amp;nbsp;the new directive can extend liability&amp;nbsp;from entities to their individual representatives in certain situations. Moreover, when certain conditions are met, persons in management positions could be temporarily suspended (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3949-80-1" rel="noopener" target="_blank"&gt;Article 32-5b&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Therefore, following the NIS2 Directive is&amp;nbsp;a &lt;strong&gt;legal necessity&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;a &lt;strong&gt;strategic priority&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To be in compliance, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Inform your management&amp;nbsp;&lt;/strong&gt;about its implications and benefits and convince them to allocate sufficient budget and resources for implementing compliance.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Present a clear business case&lt;/strong&gt;&amp;nbsp;that outlines the risks of non-compliance, the opportunities of compliance and the return on investment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demonstrate how compliance&lt;/strong&gt; will enhance&amp;nbsp;your organisation's reputation, trustworthiness, competitiveness and resilience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Informing management and getting a budget is a challenging task, requiring a persuasive and evidence-based argument that showcases the value of cybersecurity for your organisation.&lt;/p&gt;

&lt;p&gt;The sooner you start this process, the more time you’ll have to secure buy-in and support from management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible business case benefits for NIS2 compliance&lt;/h3&gt;

&lt;p&gt;Some possible benefits that you can highlight in your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&amp;nbsp;&lt;/strong&gt;by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Innovating&lt;/strong&gt;&amp;nbsp;by adopting new technologies, developing new products or services, creating new markets and more.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Following other cybersecurity regulations or standards&amp;nbsp;beyond NIS2&lt;/strong&gt;&amp;nbsp;– such as&amp;nbsp;&lt;a href="https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en" rel="noopener" target="_blank"&gt;GDPR&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO 27001&lt;/a&gt;,&amp;nbsp;&lt;a href="https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf" rel="noopener" target="_blank"&gt;PCI DSS&lt;/a&gt;&amp;nbsp;and others&amp;nbsp;&amp;nbsp;– since global frameworks often have a high overlap with the compliance requirements of NIS2.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential information sources for justifying your NIS2 compliance business case&lt;/h3&gt;

&lt;p&gt;Some sources you can use to support your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Statistics or facts&lt;/strong&gt;&amp;nbsp;showing the prevalence, impact or cost of cyberattacks in your sector or region.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Case studies or examples&lt;/strong&gt;&amp;nbsp;illustrating how other organisations have benefited from complying with the NIS2 Directive or similar regulations. For example, the&amp;nbsp;Enisa NIS Investments 2022 report&amp;nbsp;shows that for 62% of the organisations implementing the older NIS directive, such implementations helped them detect security incidents; for 21%, implementations helped during security incident recovery.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Testimonials or feedback&lt;/strong&gt;&amp;nbsp;from customers, partners, regulators or experts who endorse or recommend complying with the NIS2 Directive or similar regulations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Benchmarks or indicators&lt;/strong&gt;&amp;nbsp;revealing your current or projected cybersecurity performance or progress in relation to the NIS2 Directive or your competitors.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/resources/v/doc/ivi/2702/fa749d5d96a9"&gt;Ivanti’s 2023 Cyberstrategy Tool Kit for Internal Buy-In&lt;/a&gt;&amp;nbsp;is also a great resource that explains time-to-functionality and cost, how a solution helps defend against certain types of cyberattacks, and how to react to and overcome common objections.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;General business benefits of NIS2 Directive compliance&lt;/h3&gt;

&lt;p&gt;Some of the benefits of complying with the NIS2 Directive include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&lt;/strong&gt; by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits, et cetera. &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;According to a report by IBM&lt;/a&gt;, the average cost of a data breach in 2022 was US$4.82 million for critical infrastructure organisations and the average time to identify and contain a breach was 277 days. If you are taking measures to comply with the NIS2 Directive, the average time spent identifying and containing a breach will be much shorter, and costs of the attack will be lower.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality and similar factors. According to&amp;nbsp;&lt;a href="https://www.fisglobal.com/-/media/fisglobal/worldpay/docs/insights/consumer-intelligence-series-protectme.pdf" rel="noopener" target="_blank"&gt;a survey by PwC&lt;/a&gt;, 87% of consumers say they will take their business elsewhere if they don't trust a company's data practices, and 71% of consumers say they would stop using a company's products or services if they found out it was sharing their data without their permission, which could happen with a data leak.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors and so on.&amp;nbsp;&lt;a href="https://www.accenture.com/us-en/insights/security/state-cybersecurity" rel="noopener" target="_blank"&gt;Accenture&lt;/a&gt; has found that&amp;nbsp;companies that adopt advanced security technologies can reduce the cost of cybercrime by up to 48%.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Complying with other regulations or standards&lt;/strong&gt;&amp;nbsp;that require cybersecurity, such as GDPR, ISO 27001, PCI DSS or others.&amp;nbsp;&lt;a href="https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf" rel="noopener" target="_blank"&gt;Cisco&lt;/a&gt;&amp;nbsp;points out that 97% of organisations that follow GDPR see benefits such as gaining competitive advantage, achieving operational efficiency and reducing sales delays.&amp;nbsp;Similar results are probably achievable by following NIS2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When it comes to budgeting,&amp;nbsp;the proposal for a directive by the European Commission&amp;nbsp;(&lt;a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12475-Cybersecurity-review-of-EU-rules-on-the-security-of-network-and-information-systems_en" rel="noopener" target="_blank"&gt;Anex 7 - 1.4.3&lt;/a&gt;)&amp;nbsp;mentions that for&amp;nbsp;companies&amp;nbsp;falling under the scope of the NIS2 framework, it’s estimated they would need an increase of a maximum 22% of their current ICT security spending for the first years following the introduction of the NIS2 framework.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, the proposal also mentions that this average increase of ICT security spending would lead to&amp;nbsp;a &lt;strong&gt;proportionate benefit&amp;nbsp;&lt;/strong&gt;from such investments, notably due to a considerable reduction in cost of cybersecurity incidents.&lt;/p&gt;

&lt;h2 id="two"&gt;2. Correctly implement new organisational and technical security measures&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;After researching the gaps and obtaining a budget, it’s time to close those gaps. The NIS2 Directive requires companies to implement appropriate organisational and technical measures to manage their cybersecurity risks and ensure a high level of security across their networks and information systems.&lt;/p&gt;

&lt;p&gt;These measures include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Adopting policies and procedures&lt;/strong&gt;&amp;nbsp;for risk management, incident response, business continuity, data protection, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establishing roles and responsibilities&lt;/strong&gt;&amp;nbsp;for cybersecurity governance, oversight, coordination and other areas.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Providing training and awareness programs&lt;/strong&gt; for staff, management, customers, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing basic cyber hygiene&lt;/strong&gt;&amp;nbsp;such as encryption, authentication (MFA), firewalls, antivirus software, patching, zero trust access and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting&lt;/strong&gt;&amp;nbsp;regular testing, monitoring, auditing and other measures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Implementing those organisational and technical measures isn't a one-off or static task. It requires&amp;nbsp;&lt;strong&gt;establishing a continuous and dynamic process&lt;/strong&gt;&amp;nbsp;that adapts to changing threats, technologies, regulations and business needs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, the same advice applies for this process as for the other points we’ve already covered: the sooner you start, the more time you'll have to implement the necessary measures and ensure their effectiveness and efficiency.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;I would advise starting implementation&amp;nbsp;at least&amp;nbsp;in January 2024, so you’re ready before the summer holidays.&lt;/p&gt;

&lt;h3&gt;Next steps for NIS2 Directive implementations&lt;/h3&gt;

&lt;p&gt;Some possible steps that you can take to implement organisational and technical measures are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Developing and implementing&lt;/strong&gt; &lt;strong&gt;a risk-based management process&lt;/strong&gt;&amp;nbsp;that defines your objectives, scope, roles, responsibilities, resources, timelines and metrics for managing your cybersecurity risks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a security policy&lt;/strong&gt;&amp;nbsp;that establishes your principles, guidelines, standards and procedures for ensuring the security of your network and information systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting risk assessments&lt;/strong&gt; to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks; and prioritising your actions based on your risk appetite and tolerance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing security controls&lt;/strong&gt;&amp;nbsp;that protect your network and information systems from unauthorised access, use, disclosure, modification or destruction. These controls can be classified into three categories: preventive (e.g., encryption); detective, detective&amp;nbsp;&amp;nbsp;(e.g., monitoring), and corrective (e.g., backup).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing an incident response&lt;/strong&gt; &lt;strong&gt;plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for responding to cyberincidents effectively and efficiently.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a business continuity plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for maintaining or restoring your critical business processes during a cyber-related disruption or disaster.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a review and improvement plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for regularly evaluating, reporting and enhancing your cybersecurity measures.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing the technical controls&lt;/strong&gt; for asset management and &lt;strong&gt;basic cyber hygiene&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Directive’s reference to ‘basic cyberhygiene’ is a bit vague in&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;, so we’ll dive into this in another blog post. For now, think about basic security measures such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;MFA.&lt;/li&gt;
	&lt;li&gt;Patching your OS and applications as quickly as possible.&lt;/li&gt;
	&lt;li&gt;Securing network connections on public networks.&lt;/li&gt;
	&lt;li&gt;Encryption of all drives (especially removable ones.)&lt;/li&gt;
	&lt;li&gt;Privilege management and education of all employees.&lt;/li&gt;
	&lt;li&gt;Subscribing to channels that give you information about the latest patches and priorities, like&amp;nbsp;Ivanti’s Patch Tuesday webinars.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="three"&gt;3. Fix the weakest link: find time to train every employee&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive recognises that human factors are crucial for cybersecurity and that employees are often&amp;nbsp;the &lt;strong&gt;weakest link&lt;/strong&gt;&amp;nbsp;— as well as the first line of defense – in preventing or detecting cyberattacks.&lt;/p&gt;

&lt;p&gt;The Directive requires organisations to &lt;strong&gt;provide&amp;nbsp;adequate training and awareness programs&lt;/strong&gt;&amp;nbsp;for their employees, users of digital services and other stakeholders on cybersecurity issues.&lt;/p&gt;

&lt;p&gt;Training all your employees is not a sporadic or optional task. It requires a regular and comprehensive program that covers topics such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Basic cybersecurity concepts and terminology.&lt;/li&gt;
	&lt;li&gt;Common cyberthreats and attack vectors.&lt;/li&gt;
	&lt;li&gt;Best practices and tips for cyberhygiene.&lt;/li&gt;
	&lt;li&gt;Cybersecurity policies and procedures, made relevant and simplified for end users.&lt;/li&gt;
	&lt;li&gt;Every user’s role and responsibilities for organisational cybersecurity.&lt;/li&gt;
	&lt;li&gt;How to report and respond to incidents.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is important to note that this training&amp;nbsp;&lt;strong&gt;should be received by everyone&lt;/strong&gt;&amp;nbsp;within the company, not only by IT employees. Even management should undergo this training.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A survey conducted for Ivanti&amp;nbsp;shows that a lot of employees are not even aware of mandatory cybersecurity training.&amp;nbsp;Just 27% of them feel “very prepared” to recognise and report threats like malware and phishing at work. 6% of them feel “very prepared” to recognize and report threats like malware and phishing at work.&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.enisa.europa.eu/publications/nis-investments-2022" rel="noopener" target="_blank"&gt;Enisa’s NIS Investments 2022 report&lt;/a&gt;, Enisa mentions that&amp;nbsp;40% of the surveyed OES (Operators of Essential Services) have no security awareness program for non-IT staff.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It is important to monitor who has&amp;nbsp;not&amp;nbsp;been trained yet and act on it. Training all your employees is not only beneficial for compliance but also for productivity, quality, innovation and customer satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The best NIS2 advice we can give&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive is landmark legislation that aims to enhance the cybersecurity of critical sectors in the EU. It imposes significant obligations on organisations that fall under its scope, along with hefty fines and sanctions for non-compliance.&lt;/p&gt;

&lt;p&gt;Following the NIS2 Directive is a complex task. It demands&amp;nbsp;&lt;strong&gt;a proactive and comprehensive approach&lt;/strong&gt;&amp;nbsp;involving multiple steps,&amp;nbsp;stakeholders&amp;nbsp;and resources.&lt;/p&gt;

&lt;p&gt;The sooner you start preparing for it, the better prepared you will be when it becomes effective in October 2024.&lt;/p&gt;

&lt;p&gt;The best advice we can offer?&amp;nbsp;&lt;strong&gt;Do&amp;nbsp;not&amp;nbsp;wait till then: start&lt;/strong&gt;&amp;nbsp;preparing for the NIS2 Directive now!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 28 Aug 2023 17:43:02 Z</pubDate></item><item><guid isPermaLink="false">b7ea2db2-2ac1-4d6e-b11d-c540c6dfa52f</guid><link>https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time</title><description>&lt;p&gt;You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But you might be tempted to think that October 2024 is far away, right?&amp;nbsp;Think twice.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After all, how can you know if you have plenty of time to prepare&amp;nbsp;if you don’t know how well you currently comply&amp;nbsp;with the projected regulations?&lt;/p&gt;

&lt;p&gt;So, between now and October 2024, you must audit your current cybersecurity status. Specifically:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Identify gaps in meeting the NIS2 directive’s requirements, starting now&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Review your current supply chain security flaws&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the second part of this series, I’ll review&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas you’ll need to address to fix&amp;nbsp;the gaps your audits uncover&lt;/a&gt;&lt;/em&gt;&amp;nbsp;— including how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Implement new organizational and technical security measures correctly.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. Identify gaps in meeting the NIS2 Directive's requirements, starting now&lt;/h2&gt;

&lt;p&gt;The&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555" rel="noopener" target="_blank"&gt;NIS2 Directive&lt;/a&gt; is the EU-wide legislation on cybersecurity that provides legal measures to boost the overall level of cybersecurity in the EU. It modernises the existing legal framework to keep up with increased digitization and an evolving cybersecurity threat landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;&lt;a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333" rel="noopener" target="_blank"&gt;expands the scope of the cybersecurity rules&lt;/a&gt;&amp;nbsp;to new sectors and entities, improving the resilience and incident response capacities of public and private entities, competent authorities and the entire EU.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The NIS2 directive outlines increased measures for resilience against cyberattacks to minimize vulnerabilities and improve cyberdefense.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To comply with the NIS2 Directive, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Assess&amp;nbsp;&lt;/strong&gt;your cybersecurity posture&amp;nbsp;and identify any gaps or weaknesses that may expose you to cyber risks.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Map&lt;/strong&gt;&amp;nbsp;your existing policies, procedures and controls to the directive's requirements and see where to improve or update them.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evaluate&lt;/strong&gt;&amp;nbsp;your incident response capabilities and reporting mechanisms and ensure they align with the directive's standards.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A big problem with the NIS2 is that it tells you what you&amp;nbsp;should&amp;nbsp;do, but not&amp;nbsp;how&amp;nbsp;you should do it. Luckily, multiple frameworks can help you with the how, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener" target="_blank"&gt;NIST CSF (Cybersecurity Framework)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;The&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO27001&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.iso.org/standard/75652.html" rel="noopener" target="_blank"&gt;ISO27002&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" rel="noopener" target="_blank"&gt;IEC 62443&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Belgium, the&amp;nbsp;&lt;a href="https://ccb.belgium.be/en/cyberfundamentals-framework" rel="noopener" target="_blank"&gt;CCB has created a Cyberfundamentals Framework&lt;/a&gt;&amp;nbsp;based on multiple frameworks with references to how the different parts of the frameworks relate to the GDPR and NIS2.&lt;/p&gt;

&lt;p&gt;After selecting the framework,&amp;nbsp;&lt;strong&gt;you must identify gaps&lt;/strong&gt;&amp;nbsp;in relation to the chosen framework and the directive's requirements. Identifying gaps is not a simple or quick task; it requires a thorough and systematic analysis of your organization's cybersecurity maturity and readiness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You not only need to check your cybersecurity strategy and policies, but you also need to do a risk analysis to find the most critical assets and the cybersecurity risks they present, then consider security controls to bring down the risk score of those vital assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The sooner you start this process, the more time you’ll have&lt;/strong&gt;&amp;nbsp;to obtain the budget needed to address any issues and implement any necessary changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible NIS2 environment gaps&lt;/h3&gt;

&lt;p&gt;Some possible gaps that you may encounter in your environment are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a comprehensive cybersecurity strategy or policy&lt;/strong&gt;&amp;nbsp;that covers all aspects of risk management, incident response, business continuity, data protection, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a dedicated cybersecurity team or function&lt;/strong&gt;&amp;nbsp;that oversees, coordinates and monitors all cybersecurity activities and initiatives across the organization.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of adequate security controls or measures&lt;/strong&gt;&amp;nbsp;for protecting your network and information systems from unauthorized access, use, disclosure, modification or destruction.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of regular testing or auditing&lt;/strong&gt;&amp;nbsp;of your security controls or measures to ensure their effectiveness and compliance with the directive's requirements.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of proper training or awareness programs&lt;/strong&gt;&amp;nbsp;for your staff, management, other employees or other stakeholders on cybersecurity issues and best practices.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of clear communication or reporting channels&lt;/strong&gt;&amp;nbsp;for notifying relevant authorities or parties of any incidents or breaches that affect your services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential security solutions for your environment to comply with NIS2&lt;/h3&gt;

&lt;p&gt;To identify and fix these security gaps, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run gap analysis frameworks or models&lt;/strong&gt;&amp;nbsp;that help you compare your current state with your desired state and identify areas for improvement.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement cybersecurity maturity models or standards&lt;/strong&gt;&amp;nbsp;that help you measure your level of cybersecurity performance and progress.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct a risk assessment&lt;/strong&gt;&amp;nbsp;to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Request external audits or assessments&lt;/strong&gt;&amp;nbsp;that help you validate your compliance status and identify any weaknesses or deficiencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="two"&gt;2. Review current supply chain security flaws with enough time to coordinate action with suppliers&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive also&amp;nbsp;introduces new provisions on supply&amp;nbsp;chain security&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e40-80-1" rel="noopener" target="_blank"&gt;chapter 0, point 54, 56&lt;/a&gt;), recognizing that cyber threats can originate from third-party providers or subcontractors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;requires organizations to ensure that their suppliers follow&amp;nbsp;appropriate security standards and practices&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21-2d&lt;/a&gt;) and regularly monitor their performance and compliance (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21–3&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This isn't without reason.&amp;nbsp;&lt;strong&gt;Supply chain attacks are on the rise&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/blackberry-commissioned-research-reveals-four-in-five-software-supply-chains-exposed-to-cyberattack-in-the-last-12-months" rel="noopener" target="_blank"&gt;BlackBerry research&lt;/a&gt;&amp;nbsp;with over 1500 IT decision-makers in 2022, four-fifths of respondents said they had been notified of an attack or vulnerability in their supply chain within the year. Seventy-seven percent said they uncovered hidden participants in their software supply chain that they weren't previously aware of.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pd" rel="noopener" target="_blank"&gt;Accenture research&lt;/a&gt;&amp;nbsp;also reveals&amp;nbsp;40% of security breaches are indirect, occurring through the supply chain.&lt;/p&gt;

&lt;p&gt;Therefore,&amp;nbsp;&lt;strong&gt;securing your supply chain is essential&lt;/strong&gt;&amp;nbsp;for ensuring business continuity, resilience, reputation and trust.&lt;/p&gt;

&lt;p&gt;But in Ivanti’s&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2732/7b4205775465"&gt;&lt;em&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;we found that&amp;nbsp;only 42%&amp;nbsp;of the over 1,300 executive leaders and security professionals surveyed said they're prepared to safeguard against supply chain threats, even though 46% call it a high-level threat.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Supply chain threats not only come via attacks&amp;nbsp;on solution providers like&amp;nbsp;&lt;a href="https://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group" rel="noopener" target="_blank"&gt;Okta&lt;/a&gt;,&amp;nbsp;&lt;a href="https://techcrunch.com/2021/07/05/kaseya-hack-flood-ransomware/" rel="noopener" target="_blank"&gt;Kaseya&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know" rel="noopener" target="_blank"&gt;SolarWinds&lt;/a&gt;, but also through partners either directly connected to your IT infrastructure or who can log into it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And don’t forget about attacks on your resource suppliers that may cripple them so they're unable to deliver certain resources you need for your own operations. You have to be prepared and&amp;nbsp;&lt;strong&gt;have backup vendors available&lt;/strong&gt;&amp;nbsp;who can supply those resources if your primary supplier is out of action due to a cyberattack or other cause.&lt;/p&gt;

&lt;p&gt;Supply chain security is a complex and challenging issue involving multiple actors, dependencies and interconnections — and cannot be achieved overnight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You need to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear and transparent communication channels&lt;/strong&gt;&amp;nbsp;with your suppliers and define your expectations and obligations regarding cybersecurity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct regular audits and assessments&lt;/strong&gt;&amp;nbsp;of your suppliers' security practices and verify that they meet the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish contingency plans and backup solutions&lt;/strong&gt;&amp;nbsp;in case of a disruption or compromise of your supply chain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Furthermore, you must start engaging with your suppliers&amp;nbsp;&lt;strong&gt;as soon as possible&lt;/strong&gt;&amp;nbsp;and work together with them to ensure your supply chain is secure and resilient.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Supply chain security challenges for NIS2&lt;/h3&gt;

&lt;p&gt;Some possible challenges that you may face in securing your supply chain are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of visibility or transparency&lt;/strong&gt;&amp;nbsp;into your suppliers' security practices, policies, or incidents.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of trust or cooperation&lt;/strong&gt;&amp;nbsp;among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of consistency or alignment&lt;/strong&gt;&amp;nbsp;in security standards, requirements, or expectations across your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of resources or capabilities&lt;/strong&gt;&amp;nbsp;to monitor, audit or verify your suppliers' security performance or compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of contingency plans or backup solutions&lt;/strong&gt;&amp;nbsp;to mitigate or recover from any disruptions or compromises of your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of information&lt;/strong&gt;&amp;nbsp;as to what you expect from your supplier’s security practices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Supply chain security solutions for NIS2&lt;/h3&gt;

&lt;p&gt;To overcome these supply chain security challenges, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear contracts or agreements&lt;/strong&gt;&amp;nbsp;with your suppliers that specify their security obligations, responsibilities and liabilities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Develop common security criteria, guidelines or frameworks&lt;/strong&gt;&amp;nbsp;that apply to all suppliers in your supply chain and align with the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement security controls, measures or tools&lt;/strong&gt;&amp;nbsp;that enable you to track, monitor or verify your suppliers' security activities, incidents or compliance status.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Create joint security teams, committees or forums&lt;/strong&gt;&amp;nbsp;that facilitate information sharing, collaboration and coordination among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Build trust and mutual understanding&lt;/strong&gt;&amp;nbsp;with your suppliers through regular communication, feedback&amp;nbsp;and recognition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;When your NIS2 Directive audits are complete, now what?&lt;/h2&gt;

&lt;p&gt;Now that you’ve determined where you currently stand in relation to the NIS2 Directive, it’s time to implement critical changes to ensure compliance by October 2024. I’m certain that addressing the gaps that your audits identified will require all the time you have — and then some! – before the regulations are officially implemented in your country.&lt;/p&gt;

&lt;p&gt;But how can you systematically address these gaps in a timely fashion? We discuss&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas of security changes you’ll need for NIS2&lt;/a&gt;&lt;/em&gt; in our next blog post, as we examine how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Correctly implement new organization and technical security measures.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Mon, 28 Aug 2023 17:14:55 Z</pubDate></item><item><guid isPermaLink="false">4c628da9-8b78-4b7a-b305-ba4827288147</guid><link>https://www.ivanti.com/en-au/blog/july-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>July 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/rgltOAO2Sn4" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday updates for July 2023 showing 10 bulletins, 7 critical, and 3 important Microsoft vulnerabilities and 2 Mozilla bulletins" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/07/patchtues-page-blog_july2023.jpg"&gt;&lt;/p&gt;

&lt;p&gt;This month is going to be a painful one, with:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#Microsoft"&gt;Multiple zero-day exploits being resolved by Microsoft&lt;/a&gt;,&lt;/li&gt;
	&lt;li&gt;&lt;a href="#Kerberos-Netlogon"&gt;Some operational changes for Kerberos and Netlogon vulnerability resolutions&lt;/a&gt;, and&lt;/li&gt;
	&lt;li&gt;&lt;a href="#Post-Tuesday-Updates"&gt;A large lineup of third-party updates releasing on and after July’s Patch Tuesday&lt;/a&gt; – including Oracle's quarterly CPU and Java updates.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="Kerberos-Netlogon"&gt;&lt;strong&gt;Kerberos and Netlogon Vulnerability Changes&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;July is going to be a big month from an operational perspective.&lt;/p&gt;

&lt;p&gt;A number of changes are going into effect regarding two previously resolved CVEs:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;An Elevation of Privilege vulnerability resolution in Kerberos (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;), and&lt;/li&gt;
	&lt;li&gt;An Elevation of Privilege vulnerability in Netlogon RPC (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Both CVEs were resolved in 2022, but the code change alone did not resolve the vulnerabilities.&lt;/p&gt;

&lt;h3&gt;What to expect in July 2023’s updates for Kerberos and Netlogon vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft outlined a phased rollout of enforcement for both vulnerabilities, due to the fact that they are changing some core behaviors in two commonly used authentication mechanisms.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://support.microsoft.com/en-us/topic/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb" rel="noopener" target="_blank"&gt;KB5020805&lt;/a&gt; outlines the timing of changes for the Kerberos vulnerability&lt;/strong&gt; (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;). For July, Microsoft is stepping up to initial enforcement. The earlier changes have been to add the capabilities to address the security bypass and audit logging to show if organizations had systems that needed attention to prepare for the change.

	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;This July 2023&amp;nbsp;OS update will default the behavior to Enforcement mode&lt;/strong&gt;, but still allow an Administrator to override and set Audit mode explicitly.&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;The future October 10, 2023&lt;/strong&gt;, update will remove the Admin override and default to full enforcement.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25" rel="noopener" target="_blank"&gt;KB5021130&lt;/a&gt; outlines the timing of changes for the Netlogon vulnerability&lt;/strong&gt; (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;). For July, Microsoft is stepping up to full enforcement. The earlier changes have been to add the capabilities to address the security bypass and audit logging to show if organizations had systems that needed attention to prepare for the change.
	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;This July 2023&amp;nbsp;update will remove the ability &lt;/strong&gt;to override enforcement and allow compatibility mode for RPC Sealing.&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;After deploying the July update&lt;/strong&gt;, Netlogon will fully enforce RPC Sealing.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="Microsoft"&gt;&lt;strong&gt;Multiple Zero Days and Public Disclosures from Microsoft for July 2023&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved 130 net new vulnerabilities this month, and there are updates to 9 previously released CVEs. Six CVEs and one Advisory have confirmed exploits.&lt;/p&gt;

&lt;p&gt;One of the six exploited vulnerabilities &lt;a href="https://www.ivanti.com/en-au/blog/may-2023-patch-tuesday" target="_blank"&gt;released originally in May&lt;/a&gt;, and has been updated this month to address all versions of Microsoft Windows.&lt;/p&gt;

&lt;p&gt;This month, I'd specifically like to highlight:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#CVE-24932"&gt;&lt;strong&gt;CVE-2023-24932&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - Secure Boot): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36871"&gt;&lt;strong&gt;CVE-2023-36871 &lt;/strong&gt;&lt;/a&gt;(Security Feature Bypass - AD): Functional Code Maturity&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-35311"&gt;&lt;strong&gt;CVE-2023-35311&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - Outlook): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36884"&gt;&lt;strong&gt;CVE-2023-36884&lt;/strong&gt;&lt;/a&gt; (Remote Code Execution - Office and Windows HTML): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36874"&gt;&lt;strong&gt;CVE-2023-36874&lt;/strong&gt;&lt;/a&gt; (Privilege Escalation - Windows Error Reporting): Reported Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-32049"&gt;&lt;strong&gt;CVE-2023-32049&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - SmartScreen): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-32046"&gt;&lt;strong&gt;CVE-2023-32046&lt;/strong&gt;&lt;/a&gt; (Privilege Escalation - MSHTML): Important Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#ADV23001"&gt;&lt;strong&gt;Microsoft Advisory ADV23001&lt;/strong&gt;&lt;/a&gt; - Malicious Signed Drivers&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id="CVE-24932"&gt;&lt;strong&gt;Microsoft CVE-2023-24932&lt;/strong&gt; (Security Feature Bypass - Secure Boot): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has updated &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;, which is a Security Feature Bypass in Secure Boot.&lt;/p&gt;

&lt;p&gt;The CVE was originally resolved in May 2023, but Microsoft has expanded the affected OS versions, and is recommending customers update to the July update on all affected Windows OS version this month. The vulnerability has confirmed exploits in the wild.&lt;/p&gt;

&lt;p&gt;The CVSS v3.1 base score is 6.7 and it is rated as Important by Microsoft. However,&amp;nbsp;with confirmed exploits and publicly disclosed functional code, this vulnerability should be treated as Critical.&lt;/p&gt;

&lt;h3 id="CVE-36871"&gt;&lt;strong&gt;Microsoft CVE-2023-36871 &lt;/strong&gt;(Security Feature Bypass - AD): Functional Code Maturity&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Azure Active Directory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36871" rel="noopener" target="_blank"&gt;CVE-2023-36871&lt;/a&gt;). The CVE is rated as Important and has a CVSS v3.1 base score of 6.5, but the temporal metrics list code maturity as functional.&lt;/p&gt;

&lt;p&gt;An attacker would require a low privileged session on the user’s device to obtain a JSON web token. The token could thenbe used to create a long-lived assertion using the Windows Hello for Business Key from the victim’s device.&lt;/p&gt;

&lt;p&gt;In this case, the fix is to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Update to the July update&lt;/strong&gt; on all AD FS servers.&lt;/li&gt;
	&lt;li&gt;Then, &lt;strong&gt;enable the setting&lt;/strong&gt; required to turn on the EnforceNonceInJWT setting.
	&lt;ul&gt;
		&lt;li&gt;The PowerShell command to enable this setting is provided in the CVE article.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id="CVE-35311"&gt;&lt;strong&gt;Microsoft CVE-2023-35311&lt;/strong&gt;&amp;nbsp;(Security Feature Bypass - Outlook): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Outlook (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311" rel="noopener" target="_blank"&gt;CVE-2023-35311&lt;/a&gt;). This vulnerability has confirmed exploitation.&lt;/p&gt;

&lt;p&gt;The attacker could send a user a specially crafted URL to bypass the Microsoft Outlook Security Notice prompt. The Preview Pane is an attack vector for this vulnerability, but user interaction is required.&lt;/p&gt;

&lt;p&gt;Given the fact that &lt;a href="https://www.ivanti.com/en-au/webinars/2023/phishing-2-0-how-to-stop-cyberattacks-even-pros-can-t-catch" target="_blank"&gt;phishing a user is a statistical challenge&lt;/a&gt;, the priority for getting this fix rolled out is Critical, even though Microsoft’s severity rating is only Important.&lt;/p&gt;

&lt;h3 id="CVE-36884"&gt;&lt;strong&gt;Microsoft CVE-2023-36884&lt;/strong&gt; (Remote Code Execution - Office and Windows HTML): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Office and Windows HTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;). The CVE is rated as Important, but has confirmed reports of exploitation in the wild and functional code has been publicly disclosed for this vulnerability.&lt;/p&gt;

&lt;p&gt;An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft has not yet released an update to fix this issue,&lt;/strong&gt; but has provided a configuration level mitigation to block Office applications from creating child processes. Running as least privileged could also help to mitigate the attack and require the attacker to execute additional exploits to elevate their privilege level.&lt;/p&gt;

&lt;p&gt;Microsoft has released a &lt;a href="https://aka.ms/Storm-0978" rel="noopener" target="_blank"&gt;blog entry&lt;/a&gt; describing steps that can be taken to protect systems until a fix becomes available.&lt;/p&gt;

&lt;h3 id="CVE-36874"&gt;&lt;strong&gt;Microsoft CVE-2023-36874&lt;/strong&gt;&amp;nbsp;(Privilege Escalation - Windows Error Reporting): Reported Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Error Reporting (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874" rel="noopener" target="_blank"&gt;CVE-2023-36874&lt;/a&gt;). The CVE is rated as important but has reported cases of exploitation. An attacker – with local access to the target machine with permission to create folders and performance traces on the machine&amp;nbsp;– could gain administrator privileges.&lt;/p&gt;

&lt;h3 id="CVE-32049"&gt;&lt;strong&gt;Microsoft CVE-2023-32049&lt;/strong&gt; (Security Feature Bypass - SmartScreen): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32049" rel="noopener" target="_blank"&gt;CVE-2023-32049&lt;/a&gt;). The CVE is rated as Important, but Microsoft has confirmed reports of exploitation for this vulnerability increasing the urgency to Critical.&lt;/p&gt;

&lt;p&gt;The attacker can send a user a specially crafted URL that could allow the "Open File – Security Warning" prompt to be bypassed, opening additional opportunities to further compromise the target system.&lt;/p&gt;

&lt;h3 id="CVE-32046"&gt;&lt;strong&gt;Microsoft CVE-2023-32046&lt;/strong&gt; (Privilege Escalation - MSHTML): Important Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows MSHTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046" rel="noopener" target="_blank"&gt;CVE-2023-32046&lt;/a&gt;). Microsoft has rated the CVE as Important and has reports of exploitation in the wild.&lt;/p&gt;

&lt;p&gt;An attacker could target a user in a variety of ways, including email- and web-based attack scenarios. If exploited, the attacker would gain the rights of the user that is running the affected application. So,&amp;nbsp;running least privilege would help to mitigate the impact of this vulnerability, forcing&amp;nbsp;the attacker to take additional steps to take full control of the target system.&lt;/p&gt;

&lt;p&gt;While IE 11 has been retired, you will see a reference to IE Cumulative updates listed for Windows Server 2008, 2008 R2, 2012&amp;nbsp;and 2012 R2 due to the MSHTML, EdgeHTML&amp;nbsp;and scripting platforms still being supported.&lt;/p&gt;

&lt;p&gt;If you are installing the Security Only updates on these platforms, Microsoft is recommending running the IE Cumulative update as well to fully resolve the CVE.&lt;/p&gt;

&lt;h3 id="ADV23001"&gt;&lt;strong&gt;Microsoft Advisory ADV23001&lt;/strong&gt; - Malicious Signed Drivers&lt;/h3&gt;

&lt;p&gt;Microsoft has released an Advisory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230001" rel="noopener" target="_blank"&gt;ADV23001&lt;/a&gt;) providing guidance on Microsoft Signed Drivers being used maliciously.&lt;/p&gt;

&lt;p&gt;Several developer accounts for the Microsoft Partner Center (MPC) were engaged in submitting malicious drivers to obtain a Microsoft signature.&lt;/p&gt;

&lt;p&gt;Microsoft has released Window Security updates (see their &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230001" rel="noopener" target="_blank"&gt;"Security Updates" table&lt;/a&gt;) that untrust drivers and driver signing certificates for the impacted files, and has suspended the partners' seller accounts.&amp;nbsp;All the developer accounts involved in this incident were immediately suspended.&lt;/p&gt;

&lt;p&gt;Additionally, Microsoft has implemented blocking detections (Microsoft Defender 1.391.3822.0 and newer) to help protect customers from legitimately signed drivers that have been used maliciously in post-exploit activity.&lt;/p&gt;

&lt;p&gt;For more information about how the Windows Code Integrity feature protects Microsoft customers from revoked certificates, see Microsoft Support's "&lt;a href="https://support.microsoft.com/en-us/topic/kb5029033-notice-of-additions-to-the-windows-driver-stl-revocation-list-d330efa5-3fb7-4903-9f0b-3230d31fca38" rel="noopener" target="_blank"&gt;Notice of additions to the Windows Driver.STL revocation list&lt;/a&gt;".&amp;nbsp;&lt;/p&gt;

&lt;h2 id="Post-Tuesday-Updates"&gt;Third-Party Updates for July 2023&amp;nbsp;– Including Java Updates from Oracle&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Mozilla &lt;/strong&gt;has released updates for Firefox and Firefox ESR.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Adobe &lt;/strong&gt;Acrobat and Reader has an update that appears to be non-security related, but has released updates for Adobe InDesign and ColdFusion.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Google Chrome&lt;/strong&gt; is likely to update on July 11&lt;sup&gt;th&lt;/sup&gt; or shortly after.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/" rel="noopener" target="_blank"&gt;&lt;strong&gt;Oracle&lt;/strong&gt;’s quarterly CPU (Critical Patch Update)&lt;/a&gt; is due to release on July 18&lt;span&gt;,&amp;nbsp;&lt;/span&gt;with updates for the lineup of Oracle products&amp;nbsp;– including Java.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As you begin your maintenance this cycle, keep in mind that – after the Oracle Java release – there is a stream of additional updates that will occur, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;RedHat OpenJDK,&lt;/li&gt;
	&lt;li&gt;Amazon Corretto,&lt;/li&gt;
	&lt;li&gt;Azul Zulu,&lt;/li&gt;
	&lt;li&gt;Eclipse Adoptium,&lt;/li&gt;
	&lt;li&gt;Adopt OpenJDK, and&lt;/li&gt;
	&lt;li&gt;Other Java frameworks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Jul 2023 22:31:12 Z</pubDate></item><item><guid isPermaLink="false">7898dd6f-8bb7-4482-9384-8ae833a32e1e</guid><link>https://www.ivanti.com/en-au/blog/how-implementing-risk-based-patch-management-prioritizes-active-exploits</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><title>How Implementing Risk-Based Patch Management Prioritises Active Exploits</title><description>&lt;p&gt;Resistance to change is always present, especially if you think the processes you have in place are efficient and effective. Many organisations feel this way about their software management procedures until they have a security breach or incident and are left wondering where they went wrong.&lt;/p&gt;

&lt;p&gt;The reality is that most patch management programs are built on assumptions and recommendations, rather than facts about actively exploited vulnerabilities.&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-patch-management?utm_source=google&amp;amp;utm_medium=cpc&amp;amp;utm_campaign=esg-brand-na-search-evergreen&amp;amp;utm_adgroup=ivanti-patch-management&amp;amp;utm_content=&amp;amp;utm_term=ivanti patch management&amp;amp;elqCampaignId=2103&amp;amp;gad=1&amp;amp;gclid=EAIaIQobChMInpnkhbmg_wIVmufjBx2fgwGREAAYAyAAEgKBWPD_BwE"&gt;Risk-based patch management&lt;/a&gt;&amp;nbsp;is the answer to this issue.&lt;/p&gt;

&lt;p&gt;In this article, find:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;What’s wrong with keeping typical prioritisations.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;What risk-based patch management is.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Why it’s the perfect time to adopt risk-based patch management.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2 id="one"&gt;The problems with typical prioritisation&lt;/h2&gt;

&lt;p&gt;Software feature updates, security fixes, bug fixes, performance enhancements and many other types of software releases have existed since the software industry started. Vendors often assign a severity rating or other score to each of these to let customers know what they think is most important.&lt;/p&gt;

&lt;p&gt;Unfortunately, there’s no industry standard associated with these ratings, so we are left to compare and prioritise releases for deployment on our systems based on recommendations. On top of that, such ratings are rarely updated to account for active threat context even as vulnerabilities change.&lt;/p&gt;

&lt;h3&gt;Overlooking an actively exploited vulnerability&lt;/h3&gt;

&lt;p&gt;While better than nothing at all, vendor severity ratings often come up short.&amp;nbsp;Consider the Follina vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190" rel="noopener" target="_blank"&gt;CVE-2022-30190)&lt;/a&gt;&amp;nbsp;published in May of 2022. This vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) allows for remote code execution.&lt;/p&gt;

&lt;p&gt;Follina was under attack for several months before Microsoft finally responded with several updates. Alarmingly, Microsoft only assigned this vulnerability a Common Vulnerability Scoring System (CVSS) v3 rating of 7.8 and severity of Important. If you’re only patching based on Critical severity,&amp;nbsp;you'd&amp;nbsp;have missed this one, leaving a significant gap in your attack surface.&lt;/p&gt;

&lt;p&gt;Worse yet, Follina’s CVSS score remained at 7.8 even after it was revealed the vulnerability was being&amp;nbsp;&lt;a href="https://www.fortinet.com/blog/threat-research/ransomware-roundup-bisamware-and-chile-locker" rel="noopener" target="_blank"&gt;actively exploited to distribute Bisamware ransomware&lt;/a&gt;, exposing organisations that had overlooked the vulnerability to even more risk.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Ivanti Neurons for Vuln KB" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/bisamware-ransomware-intel.png"&gt;
&lt;figcaption&gt;Intelligence on the ransomware threat associated with CVE-2022-30190 displayed in Ivanti Neurons for VULN KB&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h3&gt;CVSS shortcomings&lt;/h3&gt;

&lt;p&gt;Severity ratings are ‘augmented’ with CVSS scores from&amp;nbsp;&lt;a href="https://www.first.org/cvss/" rel="noopener" target="_blank"&gt;FIRST&lt;/a&gt;. Each CVE is assigned a CVSS number, such as the 7.8 given to CVE-2022-30190 in the example above.&lt;/p&gt;

&lt;p&gt;One of the major objectives behind&amp;nbsp;calculating&amp;nbsp;the actual CVSS number is to ensure standardisation so all CVEs are scored consistently and can be accurately compared. The higher the CVSS score for a vulnerability and the associated patch, the more critical it is to deploy in most environments.&lt;/p&gt;

&lt;p&gt;For software updates that address multiple CVEs, the highest CVSS value is usually considered for prioritisation. But is this value even accurate?&lt;/p&gt;

&lt;p&gt;The results of an analysis of CVSS scores in a&amp;nbsp;&lt;a href="https://www.darkreading.com/application-security/discrepancies-discovered-in-vulnerability-severity-ratings" rel="noopener" target="_blank"&gt;recent article&lt;/a&gt; showed&amp;nbsp;there's&amp;nbsp;a discrepancy for nearly 20% of CVSS scores (25,000). This analysis was based on a comparison of the scores reported in the NIST National Vulnerability Database (NVD) and those reported directly by the vendors themselves.&lt;/p&gt;

&lt;h3&gt;Vendor severity inconsistencies&lt;/h3&gt;

&lt;p&gt;One important point to keep in mind is vendors have historically assigned their own terminology to severity (e.g., critical, important).&amp;nbsp;Using&amp;nbsp;vendor severity scoring as a priority mechanism may work well when comparing all patches by a given&amp;nbsp;vendor,&amp;nbsp;but&amp;nbsp;doesn't&amp;nbsp;always provide an accurate comparison of patches between vendors. In fact, many use different terminology entirely.&lt;/p&gt;

&lt;p&gt;Likewise, vendor severity&amp;nbsp;isn't&amp;nbsp;always a positive indicator. Many zero-day vulnerabilities are only rated Important by Microsoft but have high CVSS numbers. You can see how patching using severity and CVSS for prioritisation is using assumptions and recommendations and can result in a vulnerable environment.&lt;/p&gt;

&lt;h3&gt;Why prioritise active exploits over any other prioritisation method?&lt;/h3&gt;

&lt;p&gt;According to the US&amp;nbsp;Cybersecurity and Infrastructure Security Agency (CISA), an&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;actively exploited vulnerability&lt;/a&gt;&amp;nbsp;is “one for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner.” In layman’s terms, a vulnerability under active exploitation is one&amp;nbsp;that's been used by a threat actor to launch a cyberattack.&lt;/p&gt;

&lt;p&gt;Thus, to minimise the risk of an attack on your organisation, you must prioritise actively exploited vulnerabilities above all others. This is good news as most vulnerabilities aren't being actively exploited and thus pose little to no risk to your organisation. You can identify those that have been exploited through risk-based patch management.&lt;/p&gt;

&lt;h2 id="two"&gt;What's&amp;nbsp;risk-based patch management?&lt;/h2&gt;

&lt;p&gt;According to the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/resources/v/doc/ivi/2705/11190ce11e80"&gt;Ultimate Guide to Risk-Based Patch Management&lt;/a&gt;:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Risk-based patch management goes beyond vendor severity and basic CVSS scores to identify and qualify the specific vulnerabilities that pose the most significant risk to an organisation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As an extension of risk-based vulnerability management, it brings real-world risk context into the patch management process by incorporating updates with known exploited vulnerabilities that matter most to an organisation’s security posture.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;How can my organisation adopt risk-based patch management?&lt;/h3&gt;

&lt;p&gt;For organisations ready to adopt a risk-based approach to patch management, a good place to start is the CISA&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;Known Exploited Vulnerabilities&lt;/a&gt; (KEV)&amp;nbsp;catalog. CISA took a major step forward to help prioritise vulnerabilities when it introduced&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities" rel="noopener" target="_blank"&gt;Binding Operational Directive 22–01&lt;/a&gt;&amp;nbsp;along with its KEV&amp;nbsp;catalog.&amp;nbsp;When originally released, the catalog contained some 200 actively exploited vulnerabilities. It has since grown to almost 900.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;CISA builds the list with the knowledge the vulnerabilities it contains are being exploited in the wild by active threats.&amp;nbsp;However, the list does have its shortcomings, as it currently excludes&amp;nbsp;&lt;a href="https://www.securin.io/ransomware/" rel="noopener" target="_blank"&gt;131 vulnerabilities associated with ransomware&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Is the CISA KEV catalog the only resource available for risk-based patch management?&lt;/h3&gt;

&lt;p&gt;Organisations with more mature risk-based patch management practices leverage advanced risk scoring methodologies in place of or in addition to CVSS. These methodologies assign scores to every vulnerability identified in an organisation’s environment, allowing those organisations to expand their risk-based approach beyond the CISA KEV.&lt;/p&gt;

&lt;p&gt;Many vendors in the risk-based vulnerability management space have developed proprietary scoring methodologies that represent the true risk posed by a vulnerability. They do so by delivering dynamic risk ratings that give extra weight to actively exploited vulnerabilities.&lt;/p&gt;

&lt;p&gt;For example, Ivanti’s&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2683/cbe60d387c0b"&gt;Vulnerability Risk Rating&lt;/a&gt; (VRR)&amp;nbsp;has assigned Follina a score of 10, a score that more accurately represents the risk posed by that vulnerability than its CVSS score of 7.8.&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Ivanti's VRR rating of Follina." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/follina-cvss-vs-vrr.png"&gt;
&lt;figcaption&gt;The difference between the VRR and CVSS v3 scores and severity levels for CVE-2022-30190 as shown in Ivanti Neurons for VULN KB&amp;nbsp;&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h2 id="three"&gt;Why it’s the perfect time to adopt risk-based patch management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;If you feel you’ve fallen behind on system updates or are overwhelmed by new systems and applications in your company, now is the perfect time to adopt risk-based patch management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even if you feel you have a solid program in place based on severity ratings and CVSS scores, it’s time to remove the resistance to change and start a new process before your business is devastated by a data breach stemming from an exploited vulnerability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Start by using the CISA KEV to prioritise your updates and&amp;nbsp;earmark&amp;nbsp;a budget&amp;nbsp;for a risk-based vulnerability and patch management solution. With the proper tools in&amp;nbsp;place,&amp;nbsp;you can quickly identify the highest risk systems to patch first and work down the list to ensure your systems are secure.&lt;/p&gt;

&lt;p&gt;Looking to take the first step? Dive into this eBook for&amp;nbsp;a one-stop guide for&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/resources/v/doc/ivi/2705/11190ce11e80"&gt;implementing a modern risk-based patch management program&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Tue, 20 Jun 2023 15:01:46 Z</pubDate></item><item><guid isPermaLink="false">064fce58-4e14-408d-bb4d-2a9ed519b26e</guid><link>https://www.ivanti.com/en-au/blog/three-reasons-endpoint-security-can-t-stop-with-just-patching-or-antivirus</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Three Reasons Endpoint Security Can’t Stop With Just Patching</title><description>&lt;p&gt;With remote work now commonplace, having a good cyber hygiene program is crucial for organisations who want to survive in today’s&amp;nbsp;threat&amp;nbsp;landscape. This includes promoting a culture of individual cybersecurity awareness and deploying the right security tools, which are both critical to the program’s success.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Some of these tools include endpoint patching, endpoint detection and response (EDR) solutions and antivirus software. But considering recent cybersecurity reports,&amp;nbsp;they're&amp;nbsp;no longer enough to reduce your organisation’s external attack surface.&lt;/p&gt;

&lt;p&gt;Here are three solid&amp;nbsp;reasons,&amp;nbsp;and real-world situations, that happened to organisations that&amp;nbsp;didn't&amp;nbsp;take this threat seriously.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;AI generated polymorphic exploits can bypass leading security tools&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Patching failures and patching fatigue are stifling security teams&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Endpoint patching only works for known devices and apps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#four"&gt;How can organisations reduce their external attack surface?&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. AI generated polymorphic exploits can bypass leading security tools&lt;/h2&gt;

&lt;p&gt;Recently,&amp;nbsp;AI-generated&amp;nbsp;polymorphic malware has been developed to bypass EDR and antivirus, leaving security teams with blind spots into threats and vulnerabilities.&lt;/p&gt;

&lt;h3&gt;Real-world example: ChatGPT Polymorphic Malware Evades “Leading” EDR and Antivirus Solutions&lt;/h3&gt;

&lt;p&gt;In one report, researchers created&amp;nbsp;&lt;a href="https://www.hackread.com" rel="noopener" target="_blank"&gt;polymorphic malware by abusing ChatGPT&lt;/a&gt; prompts&amp;nbsp;that&amp;nbsp;evaded&amp;nbsp;detection by antivirus software. In a similar report, researchers created a&amp;nbsp;&lt;a href="https://www.darkreading.com/endpoint-security/ai-blackmamba-keylogging-edr-security" rel="noopener" target="_blank"&gt;polymorphic keylogging malware that bypassed an industry-leading&amp;nbsp;automated EDR solution&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;These exploits achieved this by mutating its code slightly with every iteration and encrypting its malicious code without a command-and-control (C2) communications channel.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This mutation is not detectable by traditional signature-based and low-level heuristics detection engines. This means that security time gaps are created for a patch to be developed and released, for the patch to be tested for effectiveness, for the security team to prioritise vulnerabilities and&amp;nbsp;for the IT (Information Technology) team to rollout the patches onto affected systems.&lt;/p&gt;

&lt;p&gt;In all, this could mean several weeks or months where an organisation will need to rely on other security tools to help them protect critical assets until the patching process is completed successfully.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;2. Patching failures and patching fatigue are stifling security teams&lt;/h2&gt;

&lt;p&gt;Unfortunately, updates&amp;nbsp;breaking&amp;nbsp;systems because patches&amp;nbsp;haven't&amp;nbsp;been rigorously tested occur frequently. Also, some updates&amp;nbsp;don't&amp;nbsp;completely fix all weaknesses, leaving systems vulnerable to more attacks and requiring additional patches to completely fix.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Real-world example: Suffolk County’s ransomware attack&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://therecord.media/suffolk-county-new-york-ransomware-investigation" rel="noopener" target="_blank"&gt;The Suffolk County government in New York&lt;/a&gt;&amp;nbsp;recently released their findings from the forensic investigation of the data breach and ransomware&amp;nbsp;attack,&amp;nbsp;where the Log4j vulnerability was the threat actor’s entry point to breach their systems. The attack started back in December&amp;nbsp;2021,&amp;nbsp;which was the same time&amp;nbsp;&lt;a href="https://logging.apache.org/log4j/2.x/security.html" rel="noopener" target="_blank"&gt;Apache released security patches&lt;/a&gt; for these vulnerabilities.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Even with updates available, patching never took&amp;nbsp;place,&amp;nbsp;resulting in 400 gigabytes of data being stolen including thousands of social security numbers and an initial ransom demand of $2.5 million.&lt;/p&gt;

&lt;p&gt;The ransom was never paid but the loss of personal data and employee productivity and subsequent investigation outweighed the cost of updated cyber hygiene appliances and tools and a final ransom demand of $500,000. The county is still trying to recover and restore all&amp;nbsp;their&amp;nbsp;systems today, having already spent $5.5 million.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Real world example: An errant Windows server update&amp;nbsp;caused me to work 24-hours straight&lt;/p&gt;

&lt;p&gt;From personal experience, I once worked 24 hours straight because one Patch Tuesday, a Microsoft Windows server update was automatically downloaded, installed which promptly broke authentication services between the IoT (Internet of Things) clients and the AAA (authentication, authorisation and accounting) servers grinding production to a screeching halt.&lt;br&gt;
&lt;br&gt;
Our company’s internal customer reference network that was implemented by our largest customers deployed Microsoft servers for Active Directory Certificate Services (ADCS) and Network Policy Servers (NPS) used for 802.1x EAP-TLS authentication for our IoT network devices managed over the air.&lt;/p&gt;

&lt;p&gt;This happened a decade ago, but similar recurrences have also occurred over the next several years, including this&amp;nbsp;update from July 2017, where NPS authentication broke for wireless clients and&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/kb5014986-authentication-failures-occur-after-the-may-10-2022-update-is-installed-on-domain-controllers-running-windows-server-2012-r2-367a686a-f976-4170-9fdb-919a069689bd" rel="noopener" target="_blank"&gt;was repeated in May of last year&lt;/a&gt;.&lt;br&gt;
&lt;br&gt;
At that time, an immediate fix for the errant patch&amp;nbsp;wasn't&amp;nbsp;available, so I spent the next 22 hours rebuilding the Microsoft servers for the company’s enterprise public key infrastructure (PKI) and AAA services to restore normal operations. The&amp;nbsp;saving grace&amp;nbsp;was we took the original root certificate authority offline, and the server&amp;nbsp;wasn't affected by the bad update.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, we ended up having to revoke all the identity certificates issued by the subordinate certificate authorities to thousands of devices including routers, switches, firewalls&amp;nbsp;and&amp;nbsp;access points and re-enroll them back into the AAA service with new identity certificates.&lt;/p&gt;

&lt;p&gt;Learning from this experience, we disabled automatic updates for all Windows servers and took more frequent backups of critical services and data.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2 id="three"&gt;3. Endpoint patching only works for known devices and apps&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;With the pandemic came the shift to&amp;nbsp;Everywhere Work, where employees worked from&amp;nbsp;home,&amp;nbsp;often connecting their personal devices to their organisation’s network. This left security teams with a blind spot to&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html" rel="noopener" target="_blank"&gt;shadow IT&lt;/a&gt;. With shadow IT, assets go unmanaged, are potentially out-of-date and cause insecure personal devices and leaky applications.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The resurgence of bring your own device (BYOD) policies and the lack of company-sanctioned secure remote access quickly expanded the organisation’s external attack surface, exposing other attack vectors for threat actors to exploit.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Real-world example:&amp;nbsp;LastPass'&amp;nbsp;recent breach&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;LastPass is&amp;nbsp;a very popular&amp;nbsp;password manager that stores your passwords in an online vault. It has more than&amp;nbsp;25 million users&amp;nbsp;and 100,000 businesses. Last year,&amp;nbsp;LastPass &lt;a href="https://blog.lastpass.com/2023/03/security-incident-update-recommended-actions/" rel="noopener" target="_blank"&gt;experienced a massive data breach involving two security incidents&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br&gt;
&lt;br&gt;
The second incident &lt;a href="https://thehackernews.com/2023/03/lastpass-hack-engineers-failure-to.html" rel="noopener" target="_blank"&gt;leveraged data stolen during the first breach&lt;/a&gt;&amp;nbsp;to target four DevOps engineers, specifically, their home computers. One senior software developer used their personal Windows desktop to access the corporate development sandbox. The desktop also had an unpatched version of Plex Media Server (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5741" rel="noopener" target="_blank"&gt;CVE-2020-5741&lt;/a&gt;) installed.&lt;/p&gt;

&lt;p&gt;Plex provided a patch for this vulnerability three years ago. Threat actors used this vulnerability to deliver malware, perform privilege escalation (PE), then a remote code execution (RCE) to access LastPass cloud-based storage and steal DevOps secrets and multi-factor (MFA) and Federation databases.&lt;br&gt;
&lt;br&gt;
"Unfortunately, the LastPass employee never upgraded their software to activate the patch," Plex said in a statement. "For reference, the version that addressed this exploit was roughly 75 versions ago."&lt;/p&gt;

&lt;h2 id="four"&gt;If patching isn’t enough, how can organisations reduce their external attack surface?&lt;/h2&gt;

&lt;h3&gt;Cyber hygiene&lt;/h3&gt;

&lt;p&gt;Employees are the weakest link to an organisation’s cyber hygiene program. Inevitably,&amp;nbsp;they'll&amp;nbsp;forget to update their personal devices, re-use the same weak password to different internet websites, install leaky applications, and click or tap on phishing links contained within an email, attachment, or text message.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Combat this by promoting a company culture of cybersecurity awareness and practice vigilance that includes:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Ensuring the latest software updates are installed on their personal and corporate devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Recognising social engineering attack techniques including the several types of phishing attacks.&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Using multi-factor authentication whenever possible.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Installing and automatically updating the databases on antivirus software for desktops and mobile threat defense for mobile devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Continuing education is key to promoting great cyber hygiene within your organisation, especially for&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/phishing-in-the-everywhere-workplace"&gt;anti-phishing&lt;/a&gt; campaigns. &amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Cyber hygiene tool recomendations&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;In&amp;nbsp;cybersecurity, the saying goes, “You can’t protect what you can’t see!” Having&amp;nbsp;a complete&amp;nbsp;discovery and accurate inventory of all network-connected hardware, software&amp;nbsp;and&amp;nbsp;data,&amp;nbsp;including shadow IT assets, is the important first step to assessing an organisation’s vulnerability risk profile. The asset data should feed into an enterprise&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-patch-management"&gt;endpoint patch management&amp;nbsp;system&lt;/a&gt;.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Also, consider implementing a&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/en-au/en-au/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt;&amp;nbsp;approach to&amp;nbsp;prioritsse&amp;nbsp;the overwhelming number of vulnerabilities to only those that pose the greatest risk to your organisation.&amp;nbsp;Often included with risk-based vulnerability management solutions is a&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-vulnerability-knowledge-base"&gt;threat intelligence&lt;/a&gt;&amp;nbsp;feed into the &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-patch-management"&gt;patch management system&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Threat intelligence is information about known or potential threats to an organisation. These threats can come from a variety of sources, like security researchers, government agencies, infrastructure vulnerability and application security scanners, internal and external penetration testing results and even threat actors themselves.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This information, including specific patch failures and reliability reported from various crowdsourced feeds, can help organisations remove internal patch testing requirements and reduce the time gap to patch deployments to critical assets.&lt;br&gt;
&lt;br&gt;
A&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/en-au/en-au/autonomous-endpoint-management/unified-endpoint-management"&gt;unified endpoint management&lt;/a&gt;&amp;nbsp;(UEM) platform is necessary to remotely manage and provide endpoint security to mobile devices including shadow IT and BYOD assets.&lt;/p&gt;

&lt;p&gt;The solution can enforce patching to the latest mobile operating system (OS) and applications, provision email and secure remote access profiles including identity credentials and multi-factor authentication (MFA) methods like biometrics, smart cards, security keys, certificate-based or token-based authentication.&lt;/p&gt;

&lt;p&gt;The UEM solution should also integrate an AI machine learning-based mobile threat defense (MTD) solution for mobile devices, while desktops require next-generation antivirus (NGAV) with robust heuristics to detect and remediate device, network, and app threats with real-time anti-phishing protection.&lt;br&gt;
&lt;br&gt;
And finally, to level the playing field against AI-generated malware,&amp;nbsp;cyber hygiene tools will have to evolve quickly by leveraging AI guidance to keep up with the more sophisticated polymorphic attacks that are on the horison.&lt;/p&gt;

&lt;p&gt;Adding the solutions described above will help deter cyberattacks by putting impediments in front of threat actors to frustrate them and seek out easier targets to victimise.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Wed, 14 Jun 2023 20:56:25 Z</pubDate></item><item><guid isPermaLink="false">2457c016-d5b9-446d-98e1-7eb042e3fca3</guid><link>https://www.ivanti.com/en-au/blog/why-it-asset-discovery-is-the-foundation-of-a-risk-based-vulnerability-management-program</link><category>Security</category><title>Why IT Asset Discovery Is the Foundation of a Risk-Based Vulnerability Management Program</title><description>&lt;p&gt;With over 236,000 total vulnerabilities currently known – and an average 61 new vulnerabilities added every day to the NVD – it’s impossible to remediate every single CVE or threat vector that appears. So, how do everyday organisations handle the continuously growing threats to their organisation’s end users, customers and data – especially across an increasingly hybrid and remote Everywhere Workplace?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;First and foremost, it’s critical to map out your risk surface by understanding what assets are connected to your network at all times. We asked two experts - John J. Masserini, Senior Security Analyst at TAG Cyber, and Chris Goettl, Ivanti’s Vice President of Security Product Management, how to figure out organisation’s unique cyberrisk factors for vulnerability prioritisation. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Check out part of their conversation below and if you’d like to listen to the full discussion, where they share more best practices from real‑world RBVM programs – go to &lt;a href="https://www.ivanti.com/en-au/webinars/2022/vulnerability-management-irl-5-best-practices-from-real-world-rbvm-programs" target="_blank"&gt;the webinar recording&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Discover every (also the unknown)&amp;nbsp;endpoint on your network &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="3g87KhCvzSA"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chris Goettl:&lt;/strong&gt; I think everybody's got security frameworks that they rely on to help them understand and develop their cybersecurity roadmap. If you look at all of the major cybersecurity frameworks, whether it's NIST, CIS, pick your regional, you know, the cyber essentials, you know the ASD top 20, all of these will have an element in there around discovery and asset management. The reason for this is if we don't know what's in our environment, we cannot secure it. So, discovery is a foundational piece of any security program - active, passive, the ability to connect to multiple data sources and really aggregate a lot of information around your environment. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti has a lot of capabilities around discovery, and what we have found through engagement with customers and some security surveys that we've done is most organisations have between a 20-30% gap in their understanding of all devices that are actually being managed in their environment. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, if you take six or seven data points throughout your environment - look at the endpoint management solution, the asset management solution, your endpoint protection - whether it's EDR or threat protection platform of some type - each of those are going to have a set of managed machines. Match that up with your procurement team and I guarantee you, between those different data sources, you're going to start to see double digit percentages of machines that are managed in one, not in another. So that upwards of 30% of my environment is blind to me from any one data source. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;One of the most important reasons for this to be in, you know, the base and the foundation of these cybersecurity frameworks is because we need to get a view on that upwards of 30% of our blind spots in our environment because if we don't, threat actors will.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why unknown IoT devices can pose a threat to your IT environment&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="xIDKMjAOtzU"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chris Goettl: &lt;/strong&gt;A couple of things that could be a concern. One, if there's a vulnerability on that device - I mean, we've seen light bulbs used in widespread DDoS attacks. That's just one example of how a simple IoT device that no one would ever expect could be a threat could become part of a much larger scale attack.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There's a possibility that if there's a flaw on that device, could somebody remotely force that device into a state where the heating elements are turned on and left on and could it start a fire. There's a variety of ways that devices like that could be used against us. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;There was a recent medical related kind of IoT device. These robots are in hospitals and they're able to move around and assist the staff in doing a variety of things, whether it's, you know, bringing the things they need to work with a patient or delivering something to a lab or something along those lines. A set of vulnerabilities were discovered in those that made it so that somebody could listen to the conversations that that device was in proximity of. Those devices could be forced to stop. They were large enough where they could block a doorway. In a medical facility, blocking a critical doorway and forcing that device to basically lock itself up and be a barrier could be detrimental at times as well. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Each of those types of devices, no matter how benign it may seem, pose potential risks to the environment. And that's where discovery in this case found a device that should be there but could be segmented out because it's something that is not manageable from a - can you patch it? Well, not really. It might have some firmware updates, but it's something that you're not going to take that level of management on. Segment those away, but make sure that you understand what's in your environment and what can be used against you.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How asset information helps prioritise patching &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="JCN7dpKtuSY"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;John Masserini: &lt;/strong&gt;Understanding what's there is kind of like the foundation of building a vulnerability management program. I would argue, though, the next step is really understanding the criticality of those devices to, you know, fundamentally the revenue streams of the organisation. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;When we look at what we're patching, how we were patching it, regardless of the program, it really all was around what outages could we afford, what was a level of revenue that was being generated by that device or that stream of devices, and how were we going to manage the outage and or who was going to accept the risk if we chose not to close the vulnerabilities? So really getting that understanding of how critical the devices are to the business lines, I think is a major driver in any kind of risk metric. When we're talking about risk-based vulnerability management, understanding how we can leverage those risks around individual devices, individual workstreams is critical. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;I always leveraged a BCP program to provide that. Doing a business impact analysis, which is critical for a business continuity program, is equally as valuable to a vulnerability management program when you're trying to understand the risk of whether it's an application or an environment, whatever. When you do a business impact analysis, it's incredibly enlightening for the business as well as valuable for the IT side of the house. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Every time you walk into a business, you're going to say: ‘We want instant response time. We never want to go down and we want to guarantee customer satisfaction.’ All this kind of stuff. And you go: ‘Okay, well here's the price tag for that.’ And they go, ‘Whoa, whoa, whoa, we don't have that kind of money!’ So, you very quickly get into this discussion about, what is the minimal, acceptable standard for this? How much are you willing to say...we can afford a two-hour outage window from 2 to 4 am every other Friday or something along those lines. And really understanding that this drives 80% of the revenue of the company, so we have to be very sensitive about that. Maybe we roll patches quarterly, but we certainly do a different level of testing on those patches for environments like that compared to some internal site that we use just share memes, or whatever. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;There's just fundamentally different criticality around different devices in our infrastructure that really should be evaluated and measured to make sure that we're performing the risk analysis correctly. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;A lot of those things are, believe it or not, a lot of legacy things. Whether you're running old mainframes, whether you're running AS/400s, whether you're running brand new devices, but the vulnerability has to be a new firmware flash, rather than just rolling out a patch to a library. They're very different models, very different pieces of very different risk analysis. Patching an application - if you have to patch Chrome on a Windows laptop is a very different risk profile than saying: ‘Okay, I'm going to go out to this critical router and flash the firmware overnight.’ They're just completely different risks. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, understanding how all of that plays together, I think really is between the asset discovery and the risk analytics that come out of BIA, I think the two of them, really are a phenomenal foundation on building any kind of long-term strategy around risk-based vulnerability management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Knowing what’s on your network is the first step to understanding how to prioritise your security efforts. Taking a risk-based approach to your vulnerability management ensures you focus on your weakest links – and with asset discovery, you can identify all of them, even the hidden ones. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Continue exploring best practices from real‑world RBVM programs by&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/webinars/2022/vulnerability-management-irl-5-best-practices-from-real-world-rbvm-programs" target="_blank"&gt;watching the rest of this discussion&lt;/a&gt;. &amp;nbsp;&lt;/p&gt;
</description><pubDate>Wed, 14 Jun 2023 14:15:04 Z</pubDate></item><item><guid isPermaLink="false">637d8457-8c32-4e4f-9b35-ff01ec7def10</guid><link>https://www.ivanti.com/en-au/blog/february-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>February 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/5kFXBNKuMcU" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;February 2023 Patch Tuesday includes fixes for 76 CVEs from Microsoft affecting Microsoft Windows, .NET Framework, Microsoft Office, SQL Server, Exchange Server, several Azure services, HoloLens &lt;a href="https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb" rel="noopener" target="_blank"&gt;and more&lt;/a&gt;. Nine CVEs are rated as Critical, 67 as Important and three CVEs have known exploits in the wild. The three zero-day vulnerabilities are all rated as Important and have CVSS ratings of 7.8 or less. Organizations are urged to expand their prioritization beyond just vendor severity and CVSS score alone, as many exploited vulnerabilities will be less than Critical or CVSS 8.0, which emphasizes the urgent need to utilize risk-based prioritization methods in your vulnerability management program.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Remote Code Execution vulnerability in Windows Graphics Component (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823" rel="noopener" target="_blank"&gt;CVE-2023-21823&lt;/a&gt;), which has been exploited in the wild. The CVE was rated as Important and affects Windows 10 and Server 2008 and later Windows editions. The vulnerability also affects Microsoft Office for iOS, Android and Universal. If exploited, the vulnerability in the Windows OS could allow the attacker to gain SYSTSEM privileges. For the apps, the exploit could lead to Remote Code Execution. Windows customers are urged to update to the latest OS version. For the app updates, Microsoft included additional notes regarding how to update through the Microsoft Store or Play Store.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Security Feature Bypass in Microsoft Publisher (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715" rel="noopener" target="_blank"&gt;CVE-2023-21715&lt;/a&gt;). The CVE was rated as Important and affects Microsoft 365 Apps for Enterprise and has been exploited in the wild. Microsoft noted that, “The attack itself is carried out locally by a user with authentication to the targeted system. An authenticated attacker could exploit the vulnerability by convincing a victim, through social engineering, to download and open a specially crafted file from a website which could lead to a local attack on the victim computer.” The exploit can bypass Office macro policies used to block untrusted or malicious files.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376" rel="noopener" target="_blank"&gt;CVE-2023-23376&lt;/a&gt;), which has been exploited in the wild. The CVE was rated as Important and affects Windows 10 and Server 2008 and later Windows editions. If exploited, the attacker could gain SYSTEM privileges. A privilege escalation vulnerability like this would be used in combination with other vulnerabilities in an attack chain.&lt;/p&gt;

&lt;p&gt;The Microsoft SQL Server update resolves six CVEs, one of which is rated Critical. This is the most security fixes released in a single update for SQL Server in many years.&lt;/p&gt;

&lt;p&gt;The Microsoft Exchange Server update resolves four CVEs, all of which are rated as Important. No public disclosures or known exploits have been included in this update yet, but Exchange has been targeted by sophisticated threat actors in the past couple of years. All four of these are Remote Code Execution vulnerabilities. They shouldn't be left too long.&lt;/p&gt;

&lt;h2&gt;Third-party update round-up&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR, resolving 19 and 14 CVEs, respectively.&lt;/p&gt;

&lt;p&gt;Google Chrome released updates for Windows and MacOS editions on February 7th resolving 10 CVEs.&lt;/p&gt;

&lt;p&gt;Microsoft Edge (Chromium) released an update on February 9th resolving 11 CVEs.&lt;/p&gt;

&lt;p&gt;Apple released updates for MacOS BigSur (8 CVEs), Monterey (18 CVEs), and Safari (3 CVEs) in late January.&lt;/p&gt;

&lt;p&gt;Oracle’s quarterly CPU released on January 17th and included an update for Java (4 CVEs). This event triggers the release of many Java frameworks in quick succession. There have been updates for Corretto, Azul Zulu, Node.JS and other Java frameworks since the CPU release.&lt;/p&gt;
</description><pubDate>Tue, 14 Feb 2023 21:12:53 Z</pubDate></item><item><guid isPermaLink="false">744073e1-c97e-45d6-a4ae-a354d50e02a9</guid><link>https://www.ivanti.com/en-au/blog/january-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>January 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/P91LOzehmcE" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;Microsoft has released updates resolving 101 total vulnerabilities (CVEs), 98 new and 3 revisions to CVEs from November and December of 2022. 11 CVEs are rated as Critical this month. The most urgent of these are one known exploited vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674" rel="noopener" target="_blank"&gt;CVE-2023-21674&lt;/a&gt;), one publicly disclosed vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21549" rel="noopener" target="_blank"&gt;CVE-2023-21549&lt;/a&gt;) and an update to an advisory from December 2022 (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV220005" rel="noopener" target="_blank"&gt;ADV220005&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Advisory 220005 (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV220005" rel="noopener" target="_blank"&gt;ADV220005&lt;/a&gt;) provides “Guidance on Microsoft Signed Drivers Being Used Maliciously”. Microsoft has included a block list in the January 10, 2023, OS updates which blocks the signing certificates that were compromised. Microsoft recommends all customers update to the January 10, 2023 update to ensure they have the most up-to-date block list.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a known exploited vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674" rel="noopener" target="_blank"&gt;CVE-2023-21674&lt;/a&gt;) in Windows Advanced Local Procedure Call (ALPC) which could allow an Elevation of Privileges. The vulnerability is rated as Important and affects all Windows OS versions. The vulnerability could allow a browser sandbox escape and the attacker could gain SYSTEM privileges.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a publicly disclosed vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21549" rel="noopener" target="_blank"&gt;CVE-2023-21549&lt;/a&gt;) in Windows SMB Witness Service which could allow an Elevation of Privileges. To exploit the vulnerability an attacker could execute a specially crated malicious script which executes an RPC call to an RPC host.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This could result in elevation of privilege on the server. The vulnerability is rated as Important and can be exploited over the network without need for user interaction. Public disclosure means enough information regarding this vulnerability has been disclosed publicly giving attackers a head start on reverse engineering the vulnerability to attempt to exploit it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For January 10, 2023, Patch Tuesday the majority of the risk is in the Windows OS update across all current versions. It is recommended to prioritize the Windows OS updates as a high priority this month.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released updates for Adobe Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-01.html" rel="noopener" target="_blank"&gt;APSB23-01&lt;/a&gt;) that resolve a total of 15 CVEs, 8 of which are rated as Critical. The udpate is a Priority 3, which according to Adobe’s rating system means “This update resolves vulnerabilities in a product that has historically not been a target for attackers. Adobe recommends administrators install the update at their discretion.”&lt;/p&gt;

&lt;p&gt;Oracle’s quarterly CPU will be releasing on Tuesday, January 17. Be prepared for updates for all your favorite Oracle products, but more importantly expect updates for Java and additional updates for Java alternatives like Corretto, AdoptOpenJDK, RedHat OpenJDK, Azul Zulu JDK and others. Oracle’s quarterly CPU starts a domino update effect across the Java solutions.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday summary Jan 2023" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/09/patchtues-page-blog_jan2023.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Windows lifecycle update&lt;/h2&gt;

&lt;p&gt;January 2023 Patch Tuesday is the final extended support update (ESU) for Windows 7, Server 2008 and 2008 R2. Microsoft will be continuing one additional year of ESU support for Server 2008 and Server 2008 R2, but only if it is running in Azure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;January 2023 Patch Tuesday is also the last security update for Windows 8.1.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Windows Server 2012 and 2012 R2 will reach its end date on October 10, 2023. Microsoft will offer ESU support for three years starting from October 11, 2023. More details, including migration guidance and a lifecycle FAQ, can be found on the&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/lifecycle/products/windows-server-2012-r2" rel="noopener" target="_blank"&gt;Server 2012 R2 lifecycle page&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Guidance for Exchange customers about ProxyNotShell and OWASSRF exploits with the recent Play Ransomware attack against Rackspace customers&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft responded to the initial ProxyNotShell exploit with two recommendations. A “URL Rewrite rule” and “Disable Remote Powershell for non-admins”. Microsoft is still recommending the latter disabling of powershell for non-admins as general guidance. The URL Rewrite rule was modified many times between initial release and November 7th. On November 8th, 2022 when the update for Exchange Server was released,&lt;a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/customer-guidance-for-reported-zero-day-vulnerabilities-in/bc-p/3646787" rel="noopener" target="_blank"&gt;&amp;nbsp;Microsoft’s guidance was updated&lt;/a&gt;:&lt;/p&gt;

&lt;h3&gt;Update 11/8/2022&lt;/h3&gt;

&lt;p&gt;We have now released&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/released-november-2022-exchange-server-security-updates/ba-p/3669045" rel="noopener" target="_blank"&gt;November 2022 Security Updates for Exchange Server&lt;/a&gt;. Please install those (or newer) updates to address vulnerabilities mentioned in this post. Mitigations are no longer recommended.&lt;/p&gt;

&lt;p&gt;Rackspace stated the Nov 8th&amp;nbsp;patch had caused performance issues for their hosted Exchange services, so they decided to continue to run with the mitigation. There is a lot of gray area for interpretation of what was the best or right answer, but this event brings up two critical points that I think all organizations should keep in mind.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Mitigations are not permanent fixes. In any case where there is a mitigation option it is meant as a short-term solution but will come with some tradeoffs. Log4J’s mitigation could still be protecting you today if you implemented the guidance specific to solutions in your environment. This would come at the cost of some logging features not being available, but the mitigation would still be effective.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;PrintNightmare was a different story. You needed to turn off the print spooler and have no printing ability until the patch was released. In the case of ProxyNotShell and OWASSRF the original mitigation was intended to stop the initial steps used in the ProxyNotShell attack.&lt;/p&gt;

&lt;p&gt;It did not account for other exploit methods that could bypass the URL Rewrite Rule mitigations created to mitigate ProxyNotShell, so it was very narrow in scope to prevent the original attack specifically.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the case of the Play Ransomware attack the mitigations were never intended to stop OWASSRF’s attack method. Be careful how much long-term trust you put into mitigations as they were never intended to be permanent fixes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Products and technologies have a shelf life. At some point a vendor does need to move beyond a solution as the cost of completely revamping said solution to meet more modern use cases and needs becomes very difficult. Exchange Server is a good example of the dangers of holding onto a technology too long.&lt;/p&gt;

&lt;p&gt;Security researchers have stressed some fundamental risks with running Exchange Server. The complexities and difficulties of running an Exchange Server implementation with the level of security that Microsoft can deliver through O365 is really the key tradeoff.&lt;/p&gt;

&lt;p&gt;OWASSRF and ProxyNotShell are the most recent, but the 2021 ProxyShell and HAFNIUM exploits were additional examples of high risk of continuing to invest in Exchange Server.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Can an organization run a secure Exchange server instance? Arguably yes, but a sophisticated threat actor with more intimate knowledge of Exchange Server than your organization will continue to find a way to circumvent how effectively you can secure your email services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To properly assess this risk, you must assume you are competing with the concerted efforts of very knowledgeable adversaries. If you have not accounted for this in your risk assessment, chances are your organization is continuing to run Exchange Server under false assumptions.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 10 Jan 2023 21:58:12 Z</pubDate></item><item><guid isPermaLink="false">296e03d1-2a66-43f9-a572-394d40a5e397</guid><link>https://www.ivanti.com/en-au/blog/implementing-the-acsc-essential-8-top-considerations</link><atom:author><atom:name>James Ley</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-ley</atom:uri></atom:author><category>Security</category><title>Implementing the ACSC Essential 8: Top Considerations</title><description>&lt;p&gt;2022 saw the number of cyber incidents and their scale and impact grow exponentially.&lt;/p&gt;

&lt;p&gt;After a two-year pandemic where many businesses have suffered to some degree, with looming financial uncertainty, maximising return on investment is a key driver for many on their security journey.&lt;/p&gt;

&lt;p&gt;We all know skilled resources are hard to find, hard to hold on to and hard to budget for, so supporting their work through automation is a key strategy to do more with less.&lt;/p&gt;

&lt;p&gt;Enter the ACSC Essential 8 –&amp;nbsp;a security framework when implemented appropriately and using the correct tooling,&amp;nbsp;can have three major outcomes:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Improving your security posture by protecting against 86% of targeted threats.&lt;/li&gt;
	&lt;li&gt;Reducing&amp;nbsp;manual effort to complete common cyber hygiene related work.&lt;/li&gt;
	&lt;li&gt;Minimising&amp;nbsp;the impact of security measures on user experience and productivity.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="ACSC Essential 8" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/07/asset-discovery-and-risk-assessment-levels.png"&gt;
&lt;figcaption&gt;Ivanti provides solutions to help organisations perform asset discovery/management, and 7 of the Essential 8 controls&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Understanding what you are protecting&lt;/h2&gt;

&lt;p&gt;Each organisation looking to adopt the ACSC Essential 8 needs to &lt;a href="https://www.ivanti.com.au/products/ivanti-neurons-discovery"&gt;understand what they are trying to protect&lt;/a&gt;; from the applications that exist in their environment to the devices they are trying to secure. Maintaining a full &lt;a href="https://www.ivanti.com.au/products/ivanti-neurons-itam"&gt;real time asset inventory&lt;/a&gt; and performing a risk assessment of those assets is a key step to implementing the framework.&lt;/p&gt;

&lt;p&gt;Understanding the level of maturity you are aiming for, the controls you need to implement and ensuring they are a good fit for your organisation, is fundamental to your planning.&lt;/p&gt;

&lt;p&gt;Many basic tools used to complete patch management or application allow-listing come as part of the Microsoft toolset and enable customers to achieve a basic level of maturity for select controls. However,&amp;nbsp;customers&amp;nbsp;typically tell us these tools come with a large management overhead and associated operating costs.&lt;/p&gt;

&lt;p&gt;When you need a more advanced level&amp;nbsp;of maturity or to reduce workforce effort and operational costs when implementing and maintaining ACSC Essential 8 compliance, Ivanti can help.&lt;/p&gt;

&lt;p&gt;Our solutions are designed from the ground up to automate, simplify and provide great user experiences, and reduce operational costs, all while driving higher compliance and maturity.&lt;/p&gt;

&lt;h2&gt;Which controls and how to implement?&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents" rel="noopener" target="_blank"&gt;The ACSC recommend&lt;/a&gt;&lt;a href="https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents" rel="noopener" target="_blank"&gt;s&lt;/a&gt; that when deciding how to implement the controls organisations should consider the threat that concerns them most. We will look at two common ones here:&lt;/p&gt;

&lt;h3&gt;Targeted cyber intrusion&lt;/h3&gt;

&lt;p&gt;When&amp;nbsp;an organisation is targeted due to the sector they operate in, the IP they hold or the sensitivity of the information they work with, preventing malware delivery and execution while limiting the extent of any incident is a key strategy.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="A picture containing text, indoor, personDescription automatically generated" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/07/image.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti helps our customers &lt;a href="https://www.ivanti.com.au/products/application-control"&gt;implement Application Control&lt;/a&gt; to ensure only approved applications, scripts and binaries can execute on machines, reducing the chances of malware and macro attacks.&lt;/p&gt;

&lt;p&gt;For over 20 years,&amp;nbsp;Ivanti’s solution has reduced implementation and ongoing maintenance workload for thousands of organisations.&lt;/p&gt;

&lt;p&gt;This is done with a focus on reducing the manual effort to manage lists of approved items, providing flexible and contextual policies&amp;nbsp;and empowering users by providing simple exemption workflows when required.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com.au/products/ivanti-neurons-for-patch-management"&gt;Patching applications&lt;/a&gt; is key to limiting many targeted attacks that use known vulnerabilities, especially in commonly used third-party applications. Adversaries know these applications exist on many machines but are not routinely updated or patched to the same cadence as Microsoft and other operating systems.&lt;/p&gt;

&lt;p&gt;Ivanti provides a full catalogue of third-party application updates, allowing you to patch hundreds of applications with almost no manual steps, reducing the cost and&amp;nbsp;time to deploy, and has been securing assets for nearly two decades –&amp;nbsp;assisting&amp;nbsp;thousands of customers and OEM partners worldwide.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h3&gt;Ransomware&lt;/h3&gt;

&lt;p&gt;For many the fear of a ransomware attack is very real. We all have stories of ransomware attacks etched in our memories. Ransomware is an attack vector that not only disrupts but destroys and sometimes leaves an organisation crippled with months of work to rebuild their business.&lt;/p&gt;

&lt;p&gt;The recent collapse of a &lt;a href="https://www.businessnewsaustralia.com/articles/melbourne-homebuilder-langford-jones-homes-enters-liquidation-owing--10m-to-creditors.html" rel="noopener" target="_blank"&gt;local housing development company&lt;/a&gt; listed a cyber-attack as one of the key triggers behind their demise.&lt;/p&gt;

&lt;p&gt;Ivanti helps protect you by ensuring only approved applications can run and users only have the &lt;a href="https://www.ivanti.com.au/products/application-control"&gt;privileges they need to complete their job&lt;/a&gt;. So, whether ransomware is introduced by email, download, macros or external devices those executions are denied with no excessive privileges available for compromise.&lt;/p&gt;

&lt;p&gt;Many ransomware attacks use known vulnerabilities to attack and later, to move laterally. Protecting against this through regular patching is another key strategy.&lt;/p&gt;

&lt;p&gt;Do you know which CVEs are associated with ransomware? Do you know if and where those CVEs are exposed in your environment?&lt;/p&gt;

&lt;p&gt;Ivanti’s unique &lt;a href="https://www.ivanti.com.au/products/ivanti-neurons-for-patch-management"&gt;risk-based approach&lt;/a&gt; to patching OS and third-party apps shows you where to focus first to protect your most important assets from the biggest risks. Reducing your attack surface by prioritising your team’s focus to achieve quick wins means a better security posture with effort optimised.&lt;/p&gt;

&lt;p&gt;Our platform provides visibility of patches that close ransomware exploits and where they need to be applied, leaving your team to automate remediation with a few clicks.&lt;/p&gt;

&lt;h2&gt;Why Ivanti for the ACSC Essential 8?&lt;/h2&gt;

&lt;p&gt;If you would like to know more on how Ivanti can help you to implement 7 of the ACSC Essential 8 all from one vendor and help you gain real time visibility to the assets on your network,&amp;nbsp;please have a look at our &lt;a href="https://www.ivanti.com.au/acsc"&gt;ACSC compliance site&lt;/a&gt; and check out our videos, case studies and testimonials.&lt;/p&gt;

&lt;p&gt;You’ll find information on:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reducing cyber exposure against common threats.&lt;/li&gt;
	&lt;li&gt;Limiting and reducing manual effort of implementation and operational overhead.&lt;/li&gt;
	&lt;li&gt;Reducing user impact.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Wed, 03 Aug 2022 20:29:14 Z</pubDate></item><item><guid isPermaLink="false">a502b80e-6ff0-48d3-9f99-903f3d483fda</guid><link>https://www.ivanti.com/en-au/blog/managing-security-threats-using-a-risk-based-approach</link><atom:author><atom:name>James Ley</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-ley</atom:uri></atom:author><category>Security</category><title>Managing Security Threats Using a Risk-Based Approach</title><description>&lt;p&gt;Since the pandemic began its felt like life has been viewed through the lens of continual risk management, “Should I go to the store/pub/shops/cinema”. What’s the risk? What’s the value of taking the risk, how do I mitigate as much of the risk as possible?&lt;/p&gt;

&lt;p&gt;With the covid rules relaxing in Australia live in-person conferences are now rolling out so it was with excited anticipation I recently attended the CISO Sydney event to talk about risk!&lt;/p&gt;

&lt;p&gt;The topic was not covid risk unsurprisingly but rather: ‘Gain Compliance Using a Risk-Based Approach with Less Effort’. In this blog I’m going to detail how you can achieve this.&lt;/p&gt;

&lt;h2&gt;Addressing the Skills Shortage with Automation&lt;/h2&gt;

&lt;p&gt;We have a massive shortage of cyber security professionals in Australia, it’s estimated &lt;a href="https://www.austcyber.com/resources/sector-competitiveness-plan-2019/chapter3" rel="noopener" target="_blank"&gt;&lt;u&gt;we need 18,000 in the next four years&lt;/u&gt;&lt;/a&gt;! For those looking it’s tough to find new hires, it’s also a competitive market so holding onto the skills you have is a challenge, plus they are expensive resources so most organisations can’t afford nearly as many as they need.&lt;/p&gt;

&lt;p&gt;So, the logical approach is to &lt;strong&gt;&lt;em&gt;do more with less&lt;/em&gt;&lt;/strong&gt;, a topic that really resonated with the conference attendees as we discussed how to prioritise their vulnerability management (VM) programs.&lt;/p&gt;

&lt;p&gt;Most of the CISO’s in the audience advised they used one or more VM scanners to identify all the weaknesses in their environment, the challenge came in trying to respond to what was found. The common story being the list gets longer every month and the team can’t keep up, and the work is not that rewarding. It’s a common theme resulting from the impact of covid on the workforce, that unhappy workers tend to find interesting work elsewhere if you can’t satisfy their needs.&lt;/p&gt;

&lt;h2&gt;What’s the Vulnerability Challenge?&lt;/h2&gt;

&lt;p&gt;There are 250k vulnerabilities in the National Vulnerability Database (NVD). What’s actually important is how these can be exploited:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Less than 20% of those are actually weaponised and could be used to breach your organisation.&lt;/li&gt;
	&lt;li&gt;Less than 3% use&amp;nbsp;remote code execution&amp;nbsp;(RCE) and&amp;nbsp;privilege escalation&amp;nbsp;(PE) exploits which are the really dangerous ones, 80% of all breaches use these types of attacks.&lt;/li&gt;
	&lt;li&gt;If ransomware is your biggest fear only 255 CVEs relate to its use, are you sure you know which they are?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So what’s the takeaway from all these facts and figures?&lt;/p&gt;

&lt;p&gt;Well, the problem is if you don’t focus in the right area, you can spend a lot of time, resources and money remediating vulnerabilities that your organisation is very unlikely to be breached by, and you &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;won’t reduce your attack surface significantly&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/05/risk-based-approach-1.png" /&gt;&lt;/p&gt;

&lt;h2&gt;Apply a Risk-Based Lens to the Problem&lt;/h2&gt;

&lt;p&gt;Risk Based Vulnerability Management (RBVM) was the number two security project for 2021 based on &lt;a href="https://www.gartner.com/smarterwithgartner/gartner-top-security-projects-for-2020-2021" rel="noopener" target="_blank"&gt;&lt;u&gt;Gartner insights&lt;/u&gt;&lt;/a&gt;, with the point being to “focus on vulnerabilities that are actually exploitable”.&lt;/p&gt;

&lt;p&gt;Below I have included some data from a customer we’ve recently worked with.&lt;/p&gt;

&lt;p&gt;The top analysis shows data that comes from their VM scanner, it illustrates that they had over 27,000 &lt;em&gt;Critical&lt;/em&gt; and &lt;em&gt;High&lt;/em&gt; severity items to resolve, an insurmountable task for their security team, the reports to the Senior Executives were worse every month and people were burnt out with no progress being made.&lt;/p&gt;

&lt;p&gt;Compare this to the results when they used a risk-based approach to prioritise based on those that were weaponised, had RCE/PE exploits, were trending, or, had ransomware exposure. The customer could focus on the &lt;em&gt;Critical&lt;/em&gt; and &lt;em&gt;High&lt;/em&gt; &amp;nbsp;6,240 items that were their biggest risk. This meant a huge 75% reduction in their workload, so they could focus on reducing the actual attack surface of the organisation which made a significant impact.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/05/risk-based-approach-2.png" /&gt;&lt;/p&gt;

&lt;h2&gt;Is Ransomware our Biggest Threat?&lt;/h2&gt;

&lt;p&gt;At the CISO conference one of the topics spoken about by the Minister for Home Affairs Karen Andrews and the head of the Australian Cyber Security Centre (ACSC) was the threat ransomware poses. This was detailed in a report available on the ACSC website: &lt;a href="https://www.cyber.gov.au/sites/default/files/2022-02/Advisory_2021_Trends_Show_Increased_Globalized_Threat_of_Ransomware.pdf" rel="noopener" target="_blank" title="2021 Trends show increased globalised threat of Ransomware"&gt;&lt;u&gt;2021 Trends show increased globalised threat of Ransomware&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you look at your VM data through this risk-based lens and you can prioritise based on threat, you can gain visibility into exactly where you are vulnerable to ransomware attacks and should focus effort to improve your security posture.&lt;/p&gt;

&lt;p&gt;In this example the security team can provide visibility to their executive team to illustrate the limited exposure they have to ransomware attacks. Of the 10,000 vulnerabilities in the environment across 7,000 devices, only 206 devices and 21 vulnerabilities need attention. It’s also possible to see in green the stats the team achieved to improve protection against ransomware.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/05/risk-based-approach-3.png" /&gt;&lt;/p&gt;

&lt;h2&gt;Our Prioritisation Offer to You&lt;/h2&gt;

&lt;p&gt;If you are struggling in a world of too many vulnerabilities and prioritisation with an ability to automate workflows, assignment and service ticket integration doesn’t meet your requirements while your attack surface continues to expand then please get in touch. The only solution isn’t to increase the size of your security team.&lt;/p&gt;

&lt;p&gt;Ivanti has proven with customers worldwide that we can help reduce cyber risks with less manual effort.&lt;/p&gt;

&lt;p&gt;Provide the Ivanti team an output from any vulnerability management tool and within a few hours we can show you how we can prioritise it, giving you three key outcomes:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Reduce your workload by up to 80% by focusing on risk&lt;/li&gt;
	&lt;li&gt;Reduce the cost to deliver your vulnerability management program through risk-based prioritisation&lt;/li&gt;
	&lt;li&gt;Reduce your attack surface faster to reduce the risk of breaches and ransomware infections&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Reach out via email to &lt;a href="mailto:contact-anz@ivanti.com"&gt;contact-anz@ivanti.com&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 19 May 2022 09:23:07 Z</pubDate></item><item><guid isPermaLink="false">b53fab6a-a46c-4039-b071-5a3c6d38c482</guid><link>https://www.ivanti.com/en-au/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense-part-2</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2</title><description>&lt;p&gt;&lt;em&gt;Within the &lt;/em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense"&gt;initial blog in this series&lt;/a&gt;&lt;em&gt;, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses potential ransomware exploits and their remediation on iOS, iPadOS mobile devices and macOS desktops.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;iOS and iPadOS Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;The quickest method to check for the presence of malware on your iPhone, iPad or macOS devices is to look for the presence of an unknown configuration profile within the Settings &amp;gt; General &amp;gt; VPN &amp;amp; Device Management settings. Malicious third-party apps commonly sideloaded from non-sanctioned internet websites, or from an infected personal computer, or downloaded from package managers like Cydia or Sileo along with unofficial app stores like TweakDoor (formerly TweakBox) or TutuApp, will add their own configuration profile into the Device Management settings. Package managers, commonly installed after performing a jailbreak of your iOS or iPadOS device, and unofficial app stores that do not require a jailbreak, are repositories for alternative apps, tweaks, and software tools to customize your Apple iDevice. Often these third-party apps have not been rigorously tested for vulnerabilities and can contain malware and malicious exploits that can then take complete control of your device without you knowing.&lt;/p&gt;

&lt;p&gt;Apple’s mobile device management (MDM) enables your company’s IT department to remotely enroll and deploy corporate and personally owned iOS, iPadOS or macOS devices over-the-air using a unified endpoint management (UEM) platform like &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for UEM&lt;/a&gt; by deploying a root MDM profile within the same Device Management settings. UEM then fully manages, distributes applications and content, and enforces restrictions and security configurations to these managed devices.&lt;/p&gt;

&lt;p&gt;A configuration profile can contain many payloads that store key value pair settings for MDM, with a partial list below. &lt;a href="https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf" target="_blank" rel="noopener"&gt;The link to the full itemized list is located here&lt;/a&gt;. The good news is as of iOS version 12.2 and later, the profile must be manually installed and then trusted by the user as additional security steps to explicitly approve its installation within the Device Management settings. The partial list includes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Restrictions on device features&lt;/li&gt;
	&lt;li&gt;Credentials like identity and chain of trust certificates, secrets, and keys&lt;/li&gt;
	&lt;li&gt;Wi-Fi profiles&lt;/li&gt;
	&lt;li&gt;VPN profiles&lt;/li&gt;
	&lt;li&gt;Email server and Exchange settings&lt;/li&gt;
	&lt;li&gt;LDAP directory service settings&lt;/li&gt;
	&lt;li&gt;CalDAV calendar service settings&lt;/li&gt;
	&lt;li&gt;Web clips.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The other good news is these suspicious or untrusted configuration profiles, malware, and other malicious exploits including the Pegasus spyware will be detected by &lt;a href="https://www.ivanti.com/en-au/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense (MTD)&lt;/a&gt; and trigger compliance actions like block access to corporate resources or quarantine actions on the device. Ironically, another indication of the presence of a threat on your mobile device is as part of a quarantine compliance action, UEM provisioned managed apps and their content are removed from an iOS or iPadOS device to prevent data loss. After the threats are removed, the managed apps are restored to allow the user to continue to be productive. (See video below that demonstrates this capability.)&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="601397097"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;macOS Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Apple macOS desktop devices are also not immune from malicious exploits as evidenced by the list of high severity arbitrary and remote code execution vulnerabilities within the &lt;a href="https://www.cvedetails.com/vulnerability-list/vendor_id-49/product_id-156/Apple-Mac-Os-X.html" target="_blank" rel="noopener"&gt;Common Vulnerabilities and Exposures&lt;/a&gt; details database. Fortunately, &lt;a href="https://support.apple.com/en-us/HT201222" target="_blank" rel="noopener"&gt;security updates&lt;/a&gt; exist for these known and former zero-day vulnerabilities.&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploits1.png"&gt;&lt;/p&gt;

&lt;p&gt;More recently, a new variant of the AdLoad malware has been detected out in the wild and been able to evade Apple’s built-in malware XProtect scanner. Adload is a&amp;nbsp;&lt;a href="https://heimdalsecurity.com/glossary#trojan-horse" target="_blank" rel="noopener"&gt;trojan&lt;/a&gt;, specifically targeting macOS platforms and is currently used to push malicious payloads like adware, bundleware, and&amp;nbsp;&lt;a href="https://heimdalsecurity.com/glossary#potentially-unwanted-application" target="_blank" rel="noopener"&gt;Potentially Unwanted Applications (PUAs)&lt;/a&gt;. It is capable of&amp;nbsp;harvesting system information&amp;nbsp;that can then be deployed to the infected remote web servers under the control of these malicious threat actors. Other macOS malware strains have been able to bypass XProtect as well and infect macOS devices with chained malicious payloads that exploited zero-day vulnerabilities to evade Apple’s File Quarantine, Gatekeeper, and Notarization security checks. Future versions of AdLoad can also evolve into dropping exploit kits that can harvest your personal information, perform lateral movement onto the network, and potentially ransomware.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;iCloud Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Back in June of 2014, an iCloud ransomware attack succeeded with victims in Australia, New Zealand, and the United States.&lt;/p&gt;

&lt;p&gt;On infected iOS, iPadOS devices and macOS laptops, their lock screens were overlaid with a demand for payment message to unlock them. How did the malicious threat actors pull this off? Personal user account information was harvested using sophisticated phishing tactics and brute-force password cracking techniques from vulnerable iCloud accounts.&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploit2.png"&gt;&lt;/p&gt;

&lt;p&gt;These threat actors used the Find My iPhone, Find My iPad, Find My Mac, or Find My iPod services within iCloud that allow the owner to try to locate their lost device from any web browser. If the lost device were still connected to the internet, the rightful owner could display a message on the screen instructing the person in possession of the device to contact them, remotely set a locking PIN (Personal Identification Number) or wipe the contents of the device.&lt;br&gt;
&lt;br&gt;
Once the threat actors obtained the victim’s iCloud account credentials, they remotely changed the PIN and locked the device from the rightful owner. They could then display a ransom message demanding the $100 payment to unlock the device.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploit3.png"&gt;Other similar exploits include fake antivirus support pop-up messages that inform the user to call a telephone number to remove the malware. Victims would then be coerced to pay money to remove the malware from their devices or laptops. The simple solution was to restore from a Time Machine backup.&lt;/p&gt;

&lt;p&gt;The good news is &lt;a href="https://www.cvedetails.com/product/34308/Apple-Icloud.html?vendor_id=49" target="_blank" rel="noopener"&gt;iCloud exploits&lt;/a&gt; have decreased in severity and total count in recent years. Although, credential theft and ransomware attacks, some leveraging the same machine learning (ML) artificial intelligence tactics and techniques applied by reputable security researchers, are now used by nation-state backed advanced persistent threat (APT) actors to evade detection and cover their tracks after a successful data breach, have gone up dramatically in the Everywhere Workplace. According to the &lt;a href="https://www.verizon.com/business/resources/infographics/2021/2021-msi-executive-summary-infographic.pdf" target="_blank" rel="noopener"&gt;Verizon 2021 Mobile Security Index&lt;/a&gt;, there was an increase of 364% in phishing attempts in 2020 versus 2019. That is mind blowing! What will the outcome for 2021 reveal?&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Additional iOS, iPadOS and macOS Remediation&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;These settings are applicable within the iOS, iPadOS and macOS device:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Apple devices require a 6-digit, 4-digit, or random length alphanumeric passcode as the entropy source to initiate the Data Protection mechanism that leverages file-based encryption on iOS and iPadOS devices, and disk volume encryption for macOS desktops. The stronger the user passcode, the stronger the encryption key and lessening the likelihood of a successful brute force attack by malicious threat actors. Unified endpoint management platforms like Ivanti Neurons for UEM and &lt;a href="https://www.ivanti.com/en-au/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; (MTD) can enforce strong and complex passcodes onto the managed device.&lt;/p&gt;

&lt;p&gt;Only download apps from the iOS or Mac App Stores.&lt;/p&gt;

&lt;p&gt;If your company employs a UEM platform and deploys an enterprise app store, download apps from the company app store only, as well.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;These settings are configured within Ivanti UEM Neurons for UEM or MobileIron Core:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Create a Software Updates configuration to automatically update to the latest available iOS, iPadOS or macOS version for the device.&amp;nbsp;For iOS and iPadOS only, Ivanti MTD can also enforce that the latest OS version is running on the device and if not, alert the user and UEM administrator that the device is running a vulnerable OS version and apply compliance actions like block or quarantine until the device is updated.&lt;/li&gt;
	&lt;li&gt;For macOS desktops, create a FileVault 2 configuration to enable volume-based encryption.&lt;/li&gt;
	&lt;li&gt;For iOS and iPadOS devices, enable Ivanti MTD on-device (using MTD Local Actions) and cloud-based to provide multiple layers of protection for phishing (Anti-phishing Protection) and device, network, and app level threats (using the Threat Response Matrix within the MTD management console).&lt;/li&gt;
	&lt;li&gt;For macOS desktops, augment the built-in malware scanner by also installing a reputable antivirus agent that updates its detection signatures and engine regularly.&lt;/li&gt;
	&lt;li&gt;For BYOD (Bring Your Own Device) deployments, create a deny list of disallowed apps on the device. For company-owned devices, create a allow list of allowed apps that can be installed on the device.&lt;/li&gt;
	&lt;li&gt;Backup data automatically onto a cloud storage provider like iCloud, Google Drive, OneDrive, Box or Dropbox. Make secondary and tertiary copies of backups using two or more of these personal storage providers since some offer free storage. Also, backup personal data onto a local hard drive that is encrypted, password-protected and disconnected from the device and network.&lt;/li&gt;
	&lt;li&gt;Create a Wi-Fi configuration that enables WPA3 Enterprise for your wireless connection when you are back in the office. At home, enable WPA3 Personal on your home router to secure your wireless connections from eavesdroppers.&lt;/li&gt;
	&lt;li&gt;Create a Web Content Filter configuration to limit access to adult content and specific websites prescribed by your company’s security and acceptable use policies. Ivanti UEM and MTD also provide a robust and multi-layered anti-phishing protection that updates the on-device engine’s database every 8 hours and is augmented by the cloud-based lookup engine’s database, which is updated every hour.&lt;/li&gt;
	&lt;li&gt;Create an Encrypted DNS (Domain Name System) configuration setting that enables DNS over HTTPS (DoH) or DNS over TLS (Transport Layer Security) (DoT) to encrypt and secure your DNS queries.&lt;/li&gt;
	&lt;li&gt;Configure a VPN client on a device like MobileIron Tunnel,&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/connect-secure-vpn"&gt;Ivanti Secure Connect&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-zero-trust-access"&gt;Zero Trust Access&lt;/a&gt;&amp;nbsp;to protect sensitive data-in-motion between the mobile device and MobileIron Sentry or Connect Secure or ZTA gateways.&lt;/li&gt;
	&lt;li&gt;Enable&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on" target="_blank" rel="noopener"&gt;Ivanti Zero Sign-On&lt;/a&gt;&amp;nbsp;(ZSO) for conditional access rules like trusted user, trusted device, and trusted app authentication to critical work resources on-premises, at the data center, or up in the cloud. Also, enable MFA (Multi Factor Authentication) using the stronger inherence (biometrics) and possession (device-as-identity or security key) authentication factors. Passwords and PINs can be phished, guessed or brute forced.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;In the third blog in this series, we will discuss ransomware attacks and remediation of Windows 10 laptops and desktops. Stay tuned.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 10 Sep 2021 01:24:36 Z</pubDate></item><item><guid isPermaLink="false">17420cd5-178a-4a21-980d-f26fcf237b04</guid><link>https://www.ivanti.com/en-au/blog/a-question-of-when-vs-if-the-need-for-your-security-incident-management-plan</link><atom:author><atom:name>David Martinez</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/david-martinez</atom:uri></atom:author><category>Service Management</category><category>Security</category><title>A Question of When vs If: The Need for Your Security Incident Management Plan</title><description>&lt;p&gt;Should all incidents be treated the same? Seems like a simple question, but the answer can have big implications.&lt;/p&gt;

&lt;p&gt;Think about an employee who contacts the service desk, complaining they can’t log onto their email. If the issue is due to a ‘stale’ password, dropped connection or configuration issue after an update for the email server, then the impact on the organization can be quantified to the lost productivity for the impacted employee or employees. But if the outage is due to some malicious activity and the email outage is the first indicator of a larger security breach potentially affecting more mission critical applications, data or infrastructure, then the impact to the organization can be very far reaching.&lt;/p&gt;

&lt;h2&gt;The Service Desk as IT’s Front Line for Security Incident Responses&lt;/h2&gt;

&lt;p&gt;For most service management teams, incident management is focused on resolving incidents quickly and getting employees back up and running again. That practice works for most incidents, but as with the above security breech example, security-related incidents should be handled differently because of the higher potential risks and impacts. Even with dedicated security teams, the service desk will be IT’s face to the organization’s employees and the front line when a security incident occurs, so it needs to be an integral part of a coordinated response. Throw in the fact that service teams often act as the hub for communication and coordination during major incidents and the case becomes even stronger.&lt;/p&gt;

&lt;p&gt;Since the worst time to plan for how to deal with a major security incident is in the middle of one, service teams need to proactively plan and prepare for how to handle security incidents. Otherwise, as one IT director said, “You’re trying to build the airplane while on final approach.” Given the increasing frequency and threat of security-related attacks, for most organizations it’s a question of “when” the next major security incident will occur, versus the question of “if.”&lt;/p&gt;

&lt;h2&gt;Your Security Incident Management Plan&lt;/h2&gt;

&lt;p&gt;One suggestion for service teams developing their Security Incident Management (SIM) plan is to do so in coordination with not just other IT teams, but ideally also with other departments that may potentially need to be involved. Why? Because a major security incident may have business impacts well beyond the scope of the immediate IT issues, such as legal responsibilities, privacy risks, and governance questions. That’s not to say everyone should be involved with each security incident, but a response plan should be comprehensive in dealing with and mitigating risks from a wide range of potential impacts.&lt;/p&gt;

&lt;p&gt;When you start developing your SIM plan with your extended team, define the roles and responsibilities for involved team members. Think about leveraging models like RACI (Responsible, Accountable, Consulted, Informed) to help map out these roles and responsibilities based on type and scope of security incidents. Find and agree on the touch points for each team, not just for the Security team. Don’t wait until a breach occurs to determine who needs to approve specific actions; make it part of your SIM plan, along with response times and alternative approvers so requests don’t “hang” during critical moments and are instead automatically routed for timely approvals.&lt;/p&gt;

&lt;p&gt;Also think about what data and information you need to capture during an incident. This can help in the moment when trying to figure out the incident scope and response, but also afterwards when things settle down and you’d like to evaluate and improve your response.&lt;/p&gt;

&lt;p&gt;Similar to pilots preparing for a flight, one tactic IT teams use are checklists for what needs to be done, including for operational tasks like isolation, shutdown, recovery, and testing for different types of services, applications, devices, assets, and CIs. They also leverage automation tools as much as possible to remove as many manual steps, checks, notices, and approvals as they can, reducing the risk of things “falling through the cracks” when in the middle of a security response, as well as ensure additional levels of governance.&lt;/p&gt;

&lt;p&gt;Once you complete your SIM plan, train and regularly practice the plan with your staff. Train them to quickly identify and confirm possible security incidents. Use practice runs to check the thoroughness and effectiveness of your procedures, including mitigation and recovery, looking for areas to improve.&lt;/p&gt;

&lt;h2&gt;SIMilar Position as Your Disaster Recovery Plan&lt;/h2&gt;

&lt;p&gt;One IT directory thinks of their SIM plan similar to their Disaster Recovery (DR) plan—"it’s good to have it ready but you hope you don’t need to use it.” But should you encounter a major security incident and need to activate your SIM plan, be sure to invest time soon after the incident to determine how you would improve your response. Plan to review the incident before memories fade, and gather the data and information collected during the incident.&lt;/p&gt;

&lt;p&gt;During a review with the response team, investigate and determine the background for the incident. Answer the “news reporter’s” questions of “Who, What, When, Where, How and Why” for the incident. Keep in mind some of the answers and information may be needed for future legal proceedings.&lt;/p&gt;

&lt;p&gt;Also evaluate your organization’s overall response. Analyze and grade how quickly threat identification, mitigation, and recovery happened. Gauge the effectiveness of current defenses and training, look for areas to improve, and apply lessons learned to be better prepared for the next threat.&lt;/p&gt;

&lt;p&gt;For major incidents, prepare a report for the executive team along the lines of an “After Action” report used in the military. Summarize some of the key findings from your review, including an analysis of the speed and effectiveness of the response. Don’t forget to include possible financial and legal implications your extended team can provide.&lt;/p&gt;

&lt;h2&gt;Sample Questions to Begin Your Post-Incident Review&lt;/h2&gt;

&lt;p&gt;Here are some sample questions you may want to consider asking in your review. There are more questions you may have, but these are meant to help you get started as you work to improve your response to security incidents:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What type of incident was it?&lt;/li&gt;
	&lt;li&gt;How was the incident first detected?&lt;/li&gt;
	&lt;li&gt;Was the severity initially gauged correctly?&lt;/li&gt;
	&lt;li&gt;How well did the response plan work? Any steps not followed? What steps helped? What steps didn’t help?&lt;/li&gt;
	&lt;li&gt;Was response leadership clear? Was it effective and timely? Does anything need to change?&lt;/li&gt;
	&lt;li&gt;Any data or insights that could have helped?&lt;/li&gt;
	&lt;li&gt;How well did the security infrastructure work? Are there improvement opportunities in vulnerability management?&lt;/li&gt;
	&lt;li&gt;Was communication among teams effective and timely? What worked well? What didn’t work well?&lt;/li&gt;
	&lt;li&gt;Any other teams who should have been included? At what stage?&lt;/li&gt;
	&lt;li&gt;What could be improved to handle the next incident? For all types of possible security threats?&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Forewarned is Forearmed&lt;/h2&gt;

&lt;p&gt;Security breaches and incidents, or at least attempted ones, are bound to occur given today’s changing threat landscape. But being forewarned is forearmed. IT service teams—along with the rest of IT and the larger organization—can be better protected and prepared, with well-documented plans for a coordinated team that’s ready to respond to and mitigate the risks from future security incidents.&lt;/p&gt;
</description><pubDate>Wed, 08 Sep 2021 22:11:07 Z</pubDate></item></channel></rss>