Page 25 - index
P. 25







management and leverage full-device encryption, storing important information always
encrypted and frequently backed up, then what can you expect but another successful breach

from the inside out.

I would suggest we all start writing emails as if everyone in the world can see them. Sony

Pictures executives have learned this lesson the hard way. But, again, that’s not what caused
the breach, that’s data that was stolen and used against them – that’s just throwing salt in the
wound. The real issue is that all employees need better security training.


How Do RATs Travel Behind Corporate Firewalls?

While most folks think it’s the phishing attack (through the email port – the front door) as the
only and key point of entry, you need to start assuming that most of your smartphone or tablet

apps are creepware – malware that spies on you and your online behavior – many free apps
are RATs. Do you really need them? Delete all of the apps you aren’t using that often. Replace
those apps that take advantage of too many of your privacy settings like GPS, phone & sms

logs, personal identity information, with similar apps that don’t.

If you don’t manage this bring your own device (BYOD) dilemma then expect RATs on your

portable devices to invade your corporate network.




Coca Cola Practices Counterveillance – You Should Too

How old is the Coca Cola recipe? Has it
been hacked or stolen in over 100 years?

So what is Coca Cola doing better than
everyone else?


They are doing steps a) through f) above
and frequently checking and rechecking
their security posture. If you don’t have a

plan, expect to be a victim in the Year of the RAT. If you can make the important information
“invisible” to the malware – the RAT, then they can’t steal it.








25 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   20   21   22   23   24   25   26   27   28   29   30