Page 25 - index
P. 25
management and leverage full-device encryption, storing important information always
encrypted and frequently backed up, then what can you expect but another successful breach
from the inside out.
I would suggest we all start writing emails as if everyone in the world can see them. Sony
Pictures executives have learned this lesson the hard way. But, again, that’s not what caused
the breach, that’s data that was stolen and used against them – that’s just throwing salt in the
wound. The real issue is that all employees need better security training.
How Do RATs Travel Behind Corporate Firewalls?
While most folks think it’s the phishing attack (through the email port – the front door) as the
only and key point of entry, you need to start assuming that most of your smartphone or tablet
apps are creepware – malware that spies on you and your online behavior – many free apps
are RATs. Do you really need them? Delete all of the apps you aren’t using that often. Replace
those apps that take advantage of too many of your privacy settings like GPS, phone & sms
logs, personal identity information, with similar apps that don’t.
If you don’t manage this bring your own device (BYOD) dilemma then expect RATs on your
portable devices to invade your corporate network.
Coca Cola Practices Counterveillance – You Should Too
How old is the Coca Cola recipe? Has it
been hacked or stolen in over 100 years?
So what is Coca Cola doing better than
everyone else?
They are doing steps a) through f) above
and frequently checking and rechecking
their security posture. If you don’t have a
plan, expect to be a victim in the Year of the RAT. If you can make the important information
“invisible” to the malware – the RAT, then they can’t steal it.
25 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide