<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Network Security Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/category/network-security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Wed, 09 Oct 2024 22:41:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Bad Actors Compromise Air-Gapped Government Systems in Europe</title>
		<link>https://datarecovery.com/rd/bad-actors-compromise-air-gapped-government-systems-in-europe/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 17:06:29 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=8067</guid>

					<description><![CDATA[<p>Air-gapped systems are a mainstay of IT security — but even air-gapped systems can be vulnerable to sophisticated attacks. <br />
According to a <a href="https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/">report from ESET Research</a>, government agencies in Europe are learning this lesson the hard way. The GoldenJackal...</p>
<p>The post <a href="https://datarecovery.com/rd/bad-actors-compromise-air-gapped-government-systems-in-europe/">Bad Actors Compromise Air-Gapped Government Systems in Europe</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Air-gapped systems are a mainstay of IT security — but even air-gapped systems can be vulnerable to sophisticated attacks. </span></p>
<p><span style="font-weight: 400;">According to a </span><a href="https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/"><span style="font-weight: 400;">report from ESET Research</span></a><span style="font-weight: 400;">, government agencies in Europe are learning this lesson the hard way. The GoldenJackal hacking group has allegedly breached at least two air-gapped systems by using custom toolsets, primarily utilizing USB pen drives to compromise the systems.</span></p>
<p><span style="font-weight: 400;">“With the level of sophistication required, it is quite unusual that in five years, GoldenJackal managed to build and deploy not one, but two separate toolsets designed to compromise air-gapped systems,” the report notes.  </span></p>
<h2><span style="font-weight: 400;">How Air-Gapped Systems Can Be Compromised</span></h2>
<p><span style="font-weight: 400;">By definition, <a href="https://datarecovery.com/rd/what-is-an-air-gapped-data-backup/">air-gapped systems</a> aren’t connected to networks (much less the internet). Organizations typically air gap the systems that meet two criteria: One, they’re vital or valuable in some way; and two, they hold data that does not require regular access from multiple users.</span></p>
<p><span style="font-weight: 400;">In enterprise settings, air-gapped systems are often backups or archives. But in government, air-gapped systems may be even more valuable — they might hold voting data, control power grids, or serve other essential functions.</span></p>
<p><span style="font-weight: 400;">“The purpose of such attacks is always espionage, perhaps with a side of sabotage,” ESET notes. </span></p>
<p><span style="font-weight: 400;">Compromising an air-gapped system requires time, patience, and ingenuity (not to mention a few key errors on the part of the victim). GoldenJackal allegedly utilized a “new, highly modular&#8221; toolset to collect and exfiltrate files. </span></p>
<p><span style="font-weight: 400;">ESET and Kaspersky have not identified a vector for the two attacks, which impacted a South Asian embassy in Belarus and a separate European entity. However, researchers believe that executables were delivered to the target air-gapped systems via USB drives. </span></p>
<p><span style="font-weight: 400;">That component — nicknamed GoldenDealer by ESET — was accompanied by a backdoor (“GoldenHowl&#8221;) and a file collector/exfiltrator (“GoldenRobo&#8221;).</span></p>
<p>Related: <a href="https://datarecovery.com/rd/paying-a-ransomware-ransom-is-usually-illegal/">Paying a Ransomware Ransom Is (Usually) Illegal</a></p>
<h2><span style="font-weight: 400;">Enterprises Air-Gapped Systems May Be Susceptible to Other Attacks</span></h2>
<p><span style="font-weight: 400;">In general, bad actors will target networked systems when attacking enterprises, for a simple reason: It’s much, much easier than creating and delivering a set of novel tools for an air-gapped system. </span></p>
<p><span style="font-weight: 400;">But in tape backup recovery cases, we’ve seen ransomware variants that were intentionally designed to sit on systems without executing; the goal is to ensure that the malicious software infects </span><i><span style="font-weight: 400;">all </span></i><span style="font-weight: 400;">systems, including air-gapped computers, to prevent recovery efforts following said execution. </span></p>
<p><span style="font-weight: 400;">One potential solution is to create a “golden copy&#8221; backup with essential functionality that can be used following a major attack. Of course, this approach sacrifices valuable data — a robust security policy is just as necessary as a strong backup/disaster recovery plan. </span></p>
<h2><span style="font-weight: 400;">Protecting Your Air-Gapped Backups</span></h2>
<p><span style="font-weight: 400;">While air gaps are not impenetrable, they remain a valuable security layer, provided that other potential vulnerabilities (such as USB access) are properly sanitized. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Organizations can strengthen their defenses by implementing comprehensive security measures:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Security Awareness Training:</b><span style="font-weight: 400;"> Educate employees about social engineering tactics, the risks of removable media, and the importance of secure practices.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Strict Access Controls:</b><span style="font-weight: 400;"> Implement strong authentication and authorization mechanisms for both physical and logical access to air-gapped systems.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Regular Security Audits and PEN Testing:</b><span style="font-weight: 400;"> Conduct periodic security assessments and penetration (PEN) testing to identify vulnerabilities and ensure the effectiveness of security measures.  </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Endpoint Security:</b><span style="font-weight: 400;"> Deploy robust endpoint protection solutions to detect and prevent malware infections on connected devices that could potentially interact with the air-gapped systems.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Data Encryption:</b><span style="font-weight: 400;"> Encrypt sensitive data at rest and in transit to minimize the impact of a successful breach.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Incident Response Plan:</b><span style="font-weight: 400;"> Develop and regularly test an incident response plan to effectively handle security incidents and minimize data loss.</span></li>
</ul>
<p><b>If you’re building a ransomware strategy, Datarecovery.com can help. </b><span style="font-weight: 400;">With resources for disaster recovery planning, enterprise data recovery, penetration (PEN) testing, and dark web monitoring, we provide organizations with essential tools for limiting vulnerabilities — and for recovering from novel attacks.</span></p>
<p><span style="font-weight: 400;">To learn more, call 1-800-237-4200 and speak with a member of our team.</span></p>
<p>The post <a href="https://datarecovery.com/rd/bad-actors-compromise-air-gapped-government-systems-in-europe/">Bad Actors Compromise Air-Gapped Government Systems in Europe</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Leak Response: 4 Tactics for Reducing Risks</title>
		<link>https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/</link>
					<comments>https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 21 Mar 2022 21:19:27 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Services]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=7057</guid>

					<description><![CDATA[<p>According to the Identity Theft Resource Center, the number of data breaches jumped <a href="https://www.idtheftcenter.org/post/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises/">68 percent</a> in 2021 — setting a new record with a total of 1,862 events.<br />
To IT security experts, the numbers aren’t surprising. Bad actors use extremely...</p>
<p>The post <a href="https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/">Data Leak Response: 4 Tactics for Reducing Risks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-large wp-image-4348" src="https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500-1024x500.jpg" alt="security pointer icon" width="1024" height="500" srcset="https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500.jpg 1024w, https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500-300x146.jpg 300w, https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500-768x375.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>According to the Identity Theft Resource Center, the number of data breaches jumped <a href="https://www.idtheftcenter.org/post/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises/">68 percent</a> in 2021 — setting a new record with a total of 1,862 events.</p>
<p>To IT security experts, the numbers aren’t surprising. Bad actors use extremely sophisticated methods to target sensitive data, and malicious attacks have become a prominent concern over the past several years for both government and private entities.</p>
<p>In order to respond to a data leak, organizations should start with a careful assessment of the leaked data and the attack vectors that compromised your system. Here’s a quick guide.</p>
<h2>1. Audit to determine the extent of the data leak.</h2>
<p>When data breaches occur, it’s imperative to identify whether personally identifiable information (PII) was compromised — and if so, to what extent.</p>
<p>Some breaches don’t expose PII to bad actors, but unfortunately, that’s not always the case. Stolen information often ends up on the dark web, available for purchase to identity thieves. Your data leak response plan should include a thorough audit of dark web resources to determine whether your company’s data is directly available. Auditing the breach can also identify the attack vectors used to compromise the data.</p>
<p><b>Regular audits are helpful even if your company hasn’t identified an active leak. </b>Unfortunately, the vast majority of companies do not detect data breaches until the leak has been identified by third-party sources (such as news reports or law enforcement notifications). According to a <a href="https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-mtrends-2016.pdf">report from Mandiant Consulting</a>, the average time between the initial data leak to discovery is about 146 days.</p>
<p>Datarecovery.com can help your organization identify breaches by using proprietary methods to search for data on the internet and the dark web. Contact our forensic experts at 1-800-237-4200 or <a href="https://datarecovery.com/submit.php">click here to request more information.</a></p>
<h2>2. Follow your state’s reporting laws for significant data breaches.</h2>
<p>All 50 states require entities to notify affected individuals of the unauthorized acquisition of PII. In most states, notifications must be sent within a reasonable time frame — usually 30-60 days.</p>
<p>Check your state’s <a href="https://www.itgovernanceusa.com/data-breach-notification-laws">data breach notification laws</a> after fully auditing your breach. Depending on the nature of the stolen data, you may face significant civil penalties for failing to report the issue.</p>
<h2>3. Create a data leak response plan.</h2>
<p>In addition to auditing and reporting the data breach, your organization will need to form a full response plan before returning to business as normal. Some quick tips for developing a strategy:</p>
<ul>
<li aria-level="1">Designate responsibilities and set clear goal outcomes. Include managers, technicians, business partners, your legal team, forensic experts, and any other individuals who will play a role in addressing the breach.</li>
<li aria-level="1">Identify the compromised systems and set a timeline for restoration of service.</li>
<li aria-level="1">Engage in penetration testing (or pen testing). Pen testing services attempt to infiltrate your system using common vectors of attack. Datarecovery.com offers pen testing with remediation guidance for enterprise-level systems.</li>
</ul>
<p><b>Don’t access the affected systems until you’ve fully audited the breach.</b> To ensure an accurate forensic analysis, do not turn the systems off or attempt to address the issue without expert guidance.</p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-6644 size-medium" src="https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-300x218.png" alt="cyber security word cloud" width="300" height="218" srcset="https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-300x218.png 300w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-1024x744.png 1024w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-768x558.png 768w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280.png 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<h2>4. Work with forensic experts from day one.</h2>
<p>Data breaches can harm your brand, and responding to a leak can be expensive. Forensic experts can help you control the price of the project by accurately identifying weaknesses in your security controls and protocols.</p>
<p>Datarecovery.com offers essential resources for finding leaks, improving storage redundancy, and creating long-term strategies for security maintenance and disaster recovery. We work closely with your team to ensure that the threat is accurately identified, contained, and addressed — improving business outcomes and reducing your future risks.</p>
<p><b>From data leak monitoring to threat identification and penetration testing, Datarecovery.com can help your organization form a response plan. Learn more by contacting our team at 1-800-237-4200.</b></p>
<p>The post <a href="https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/">Data Leak Response: 4 Tactics for Reducing Risks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is an Air-Gapped Data Backup?</title>
		<link>https://datarecovery.com/rd/what-is-an-air-gapped-data-backup/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 21:34:47 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=6643</guid>

					<description><![CDATA[<p>With the rise of ransomware attacks, enterprises — and personal computer users — are struggling to find foolproof prevention tactics. Cybercriminals often target backup systems, and some ransomware variants stay dormant for months before activation. The criminals&#8217; goal is to...</p>
<p>The post <a href="https://datarecovery.com/rd/what-is-an-air-gapped-data-backup/">What is an Air-Gapped Data Backup?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6644" src="https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280.png" alt="cyber security word cloud" width="1280" height="930" srcset="https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280.png 1280w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-300x218.png 300w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-1024x744.png 1024w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-768x558.png 768w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></p>
<p>With the rise of ransomware attacks, enterprises — and personal computer users — are struggling to find foolproof prevention tactics. Cybercriminals often target backup systems, and some ransomware variants stay dormant for months before activation. The criminals&#8217; goal is to eliminate any chance of data recovery; if a company doesn’t have access to its backups, they’ve succeeded.</p>
<p>An air-gapped backup strategy keeps backup media isolated from other computers on the network. The air gap is, quite literally, a lack of cables or connections — since the backup is totally offline, it can’t be compromised easily.</p>
<p>For decades, air gapping has been a cornerstone of disaster recovery. It’s also a useful tactic for personal computer users: If you keep a backup of essential data on a mobile hard drive or optical media, you probably won’t be calling Datarecovery.com anytime soon.</p>
<p>However, while air gapping plays an essential role in preventing data loss, it has its own drawbacks. Here are a few considerations to keep in mind:</p>
<ul>
<li aria-level="1"><b>Since the media isn’t connected to the network, it can become outdated quickly. </b>This is an especially significant problem for servers, but it can also apply to home computers: If you need an up-to-date copy of a certain spreadsheet, a month-old or year-old version probably won’t suffice.</li>
<li aria-level="1"><b>The backup media should be redundant. </b>We frequently receive calls from clients who had excellent backup practices, with one crucial exception: They only kept a single copy of the important data. Clients may try to read the data on a compromised system, which in turn compromises the backup. More often, the same event that affects the original system also affects the backup (for instance, when fires or flooding cause data loss).
<p>We recommend keeping three physical copies of important backups at the absolute minimum. Always assume that your backup will fail — if you have three high-quality backups, that won’t be a significant problem.</li>
<li aria-level="1"><b>Peripheral devices can compromise the air gap. </b>USB drives and optical media can carry viruses and ransomware, and again, cybercriminals are intelligent; they design malicious software to target backup systems. If the backup system is frequently used with peripherals, it should be considered compromised. Enterprises can limit this risk by using USB locks and other tools.</li>
<li aria-level="1"><b>The data needs to be encrypted.</b> Many cybercriminals aren’t interested in stopping a system from running; their goal is to collect information that could be used in a wide-range systemic attack. Some users assume that since the data is air-gapped, encryption is unnecessary — but again, air-gapped media can be compromised when connected to the backup system.</li>
<li aria-level="1"><b>The backup media needs to be checked regularly.</b> All media can degrade over time. Many air-gapped backups develop issues, and they’re not readable when disaster strikes. Backup media needs to be regularly tested and checked to be considered useful.</li>
</ul>
<p>An air-gapped backup can provide important protection from ransomware attacks and other types of logical data loss. With that said, simply creating a single backup won’t do much — you’ll need to take the right approach to limit your risks.</p>
<p>If you’ve lost data, we’re ready to help. Contact our offices by using our online form or calling 1-800-237-4200.</p>
<p>The post <a href="https://datarecovery.com/rd/what-is-an-air-gapped-data-backup/">What is an Air-Gapped Data Backup?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are We Moving Toward a Future without Passwords?</title>
		<link>https://datarecovery.com/2021/07/are-we-moving-toward-a-future-without-passwords/</link>
					<comments>https://datarecovery.com/2021/07/are-we-moving-toward-a-future-without-passwords/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 15 Jul 2021 16:51:13 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6637</guid>

					<description><![CDATA[<p>Microsoft, Google, and Apple: Three of the biggest names in tech right now, and three fierce competitors. Each has their own unique approach to the world of innovative technology, each trying to deliver the best computers, tablets, mobile devices, and...</p>
<p>The post <a href="https://datarecovery.com/2021/07/are-we-moving-toward-a-future-without-passwords/">Are We Moving Toward a Future without Passwords?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6638" src="https://datarecovery.com/wp-content/uploads/2021/07/password-login_1920.jpg" alt="password login screen tablet" width="1920" height="615" srcset="https://datarecovery.com/wp-content/uploads/2021/07/password-login_1920.jpg 1920w, https://datarecovery.com/wp-content/uploads/2021/07/password-login_1920-300x96.jpg 300w, https://datarecovery.com/wp-content/uploads/2021/07/password-login_1920-1024x328.jpg 1024w, https://datarecovery.com/wp-content/uploads/2021/07/password-login_1920-768x246.jpg 768w, https://datarecovery.com/wp-content/uploads/2021/07/password-login_1920-1536x492.jpg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" />Microsoft, Google, and Apple: Three of the biggest names in tech right now, and three fierce competitors. Each has their own unique approach to the world of innovative technology, each trying to deliver the best computers, tablets, mobile devices, and online services that money can buy. As such, there’s not much overlap between the three and their individual visions of the future of technology. That’s why it’s so surprising that Microsoft, Google, and Apple are all three moving together toward a future without passwords. What will this mean for the way we log into our devices, and, perhaps more importantly, for the security of our technology going forward?</p>
<h2>How Does Eliminating Passwords Equal More Security?</h2>
<p>At first glance, the idea of eradicating passwords sounds ludicrous. How would we unlock our phones? How would we get into our social media accounts? How would our computers protect our personal info? The thought of getting rid of password protection goes so far beyond this, too: What about big companies responsible for safely and securely and privately storing our data? Or the world’s banks tasked with protecting the world’s financial info? How could a future without passwords somehow be safer? It all comes down to some tricky wording.</p>
<p>You see, getting rid of passwords doesn’t mean getting rid of protection — It actually means increasing that protection and making it more impenetrable than ever before. That’s because the movement is less about getting rid of protection and more about improving it to make it safer. This includes everything from a shift to passphrases instead of passwords, implementing two-factor or multi-factor authentication that requires additional info in order to allow users to log in, and moving toward physical security keys instead of passwords.</p>
<h2>Why WebAuthn Has Been Pushing For a Passwordless Future for Years Now</h2>
<p>While Bill Gates alluded to a passwordless future all the way back in 2004, Microsoft isn’t the one that started leading the charge as of late: WebAuthn is actually to thank for this. Formally known as Web Authentication API, WebAuthn relies on asymmetric cryptography instead of passwords to grant users access to their device or profile. Your device transmits a digital “signature” unique to you, and then WebAuthn verifies your identity — all without ever having to enter a password of any kind. Many tech companies currently use WebAuthn as a second factor, used in conjunction with a password for an added layer of super security, but it seems that the hope is for it to become much more than just an added measure sooner rather than later.</p>
<p>Thanks in part to WebAuthn’s innovation on this front, experts predict over 60% of the world’s largest and most elite companies and 90% of the world’s midsize businesses will have gone passwordless by 2022. That’s less than a year from now, which means that there’s about to be a lot of change happening in the very near future. It explains why Apple is now joining Google and Microsoft in pushing for passwordless devices across the board.</p>
<h2>Apple’s Latest Update Brings Them Up to Speed With Google and Microsoft</h2>
<p>While Google and Microsoft have already taken steps to become less reliant on passwords with their devices, Apple’s iOS 15 and macOS Monterey are expected to bring the company’s ever-popular phones and computers up to the competition’s level by embracing WebAuthn standards. It’s called Passkeys, and it’s going to remove the need to ever create a password to log into an app or a website.</p>
<p>Explaining the feature further in their latest presentation back in June, Apple engineers said that the new feature only requires a username, then can save your Face ID or Touch ID as a Passkey instead of typing in a password. This is similar to the Keychain feature that allowed users to manage their passwords with a passcode, Face ID, or Touch ID, but it takes it a step further by eliminating the password altogether and relying solely on that Face ID or Touch ID. This is comparable to Microsoft’s Authenticator app and Google’s FIDO2 (or Fast Identity Online).</p>
<h2>What’s Next for Passwords?</h2>
<p>Even with all this movement toward a passwordless future, it’s hard for some to imagine a future completely devoid of all passwords. The problems with passwords are almost universally known at this point: They’re easy to crack, they’re easy to lose, they’re easy to reuse, and they’re easy to steal. However, they’ve been the standard for decades now — comprehending a future without them is hard, and it’s no doubt going to create some resistance from users who just aren’t willing to embrace.</p>
<p>Still, when has user reluctance ever stopped a company from innovating? With such a united front at this point, it’s improbable that companies would suddenly turn away from the direction of a password-free future just because some are unwilling to go with the flow. Passwords are being phased out by tech companies whether us users are ready for it or not. It’s not going to happen overnight, but in just a few years’ time, it wouldn’t be outlandish to look back on this time in technology’s history and remember being on the brink of a passwordless existence. Think of it this way: If it results in fewer attacks, less stolen information, and increased security across the board, then it’s a change that is no doubt for the best.</p>
<p>The post <a href="https://datarecovery.com/2021/07/are-we-moving-toward-a-future-without-passwords/">Are We Moving Toward a Future without Passwords?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2021/07/are-we-moving-toward-a-future-without-passwords/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does All Ransomware Come From Russian Cybercriminal Groups?</title>
		<link>https://datarecovery.com/2021/07/does-all-ransomware-come-from-russian-cybercriminal-groups/</link>
					<comments>https://datarecovery.com/2021/07/does-all-ransomware-come-from-russian-cybercriminal-groups/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 13 Jul 2021 15:40:47 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6633</guid>

					<description><![CDATA[<p>At Datarecovery.com, we frequently work with businesses, healthcare organizations, and other enterprises that have fallen victim to ransomware. Many of these cases are recoverable — while many of the most well-known ransomware variants are well designed, some have design vulnerabilities...</p>
<p>The post <a href="https://datarecovery.com/2021/07/does-all-ransomware-come-from-russian-cybercriminal-groups/">Does All Ransomware Come From Russian Cybercriminal Groups?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6635" src="https://datarecovery.com/wp-content/uploads/2021/07/ransomware-skull-russia-flag-758x505-1.jpg" alt="Russia flag, ransomware skull" width="758" height="505" srcset="https://datarecovery.com/wp-content/uploads/2021/07/ransomware-skull-russia-flag-758x505-1.jpg 758w, https://datarecovery.com/wp-content/uploads/2021/07/ransomware-skull-russia-flag-758x505-1-300x200.jpg 300w" sizes="auto, (max-width: 758px) 100vw, 758px" />At Datarecovery.com, we frequently work with businesses, healthcare organizations, and other enterprises that have fallen victim to ransomware. Many of these cases are recoverable — while many of the most well-known ransomware variants are well designed, some have design vulnerabilities that can be exploited to restore data to its original condition without paying a ransom.</p>
<p>However, the recent wave of headline-capturing ransomware variants are exceptionally robust. In many instances, victims have no alternative but to pay the ransom. Cracking the encryption can take months — or hundreds of years, in some instances — and by definition, mission-critical systems cannot stay offline for extended lengths of time.</p>
<p>Newspapers often cite the Russian origins of major ransomware attacks, which has led to a misconception that all ransomware comes from Russia-based cybercriminal groups. This isn’t the case; ransomware can (and does) come from everywhere, but the most successful attackers often come from Russian-speaking countries.</p>
<h2>Evidence for Russian-Speaking Origins in Recent Cyberattacks</h2>
<p>In February 2017, security firm Kaspersky estimated that 75 percent of ransomware comes from Russian-speaking sources. That doesn’t necessarily mean that all of the attackers are Russian-speaking, however: The bad actors who create the ransomware are often separate from the people who carry out the attack. This second group acts as “affiliates,” distributing ransomware and collecting the ransom. There’s not enough hard data to conclude that the actual programmers are more likely to be Russian-speaking than, say, Chinese-speaking.</p>
<p>With that said, many of the most significant ransomware attacks have been traced to Russian speakers (we’ll note here that we’re using the phrase “Russian speaker&#8221; rather than “Russia&#8221; because determining language is much easier than confirming nationality — and there’s no current evidence to suggest that any nation’s government is actively involved in ransomware distribution, with the notable exception of <a href="https://www.newyorker.com/magazine/2021/04/26/the-incredible-rise-of-north-koreas-hacking-army">North Korea’s military hacker groups</a>).</p>
<p>Some newsworthy examples of ransomware attacks with Russian-speaking origins:</p>
<ul>
<li aria-level="1">On July 7, 2021, a report from Trustwave SpiderLabs <a href="https://www.nbcnews.com/politics/national-security/code-huge-ransomware-attack-written-avoid-computers-use-russian-says-n1273222">identified a ransomware attack</a> from Russian-speaking hackers REvil that was written to actively avoid systems that have default language settings from the former USSR region.</li>
<li aria-level="1">DarkSide, the Russian-speaking group that attacked the Colonial Pipeline in May, used ransomware written to avoid computers in Russia and former Soviet satellite countries.</li>
<li aria-level="1">On May 14, 2021, Ireland’s health service suffered a <a href="https://www.rte.ie/news/crime/2021/0518/1222349-ransomware-crime-group/">significant ransomware attack</a> attributed to Wizard Spider, a cybercriminal group believed to be based in St. Petersburg, Russia.</li>
</ul>
<p>Most cyberattacks don’t make the news — each of the ransomware attacks listed above falls into the “big game hunter&#8221; category. These attacks can be remarkably sophisticated. In some cases, the malware sits on a server for months in order to prevent the target from recovering from usable backups. Smaller ransomware attacks use more of a brute force method, targeting hundreds of potential victims. These types of attacks are more likely to be recoverable.</p>
<h2>Preventing Ransomware Infection (And Recovering from Ransomware)</h2>
<p>We can’t speculate as to why many major attacks come from Russian-speaking countries, but some news outlets believe that Russia’s lax enforcement of cybercrime laws has made the practice quasi-legal. It’s also possible that some malware groups mimic well-known Russian groups to hide their identities more effectively.</p>
<p>Regardless of origin, a ransomware attack can be crippling for a business. While every enterprise should enact a robust program to prevent infection, here are some quick tips for limiting vulnerabilities:</p>
<ul>
<li aria-level="1"><b>Limit peripheral access to all backup systems.</b> This includes optical media (CDs/DVDs), external hard drives, and flash drives. Consider installing USB locks to prevent unauthorized peripheral access.</li>
<li aria-level="1"><b>Keep an <a href="https://datarecovery.com/rd/what-is-an-air-gapped-data-backup/">air-gapped backup</a> of important data.</b> All mission-critical data should be duplicated and stored off-network. Wherever possible, keep mission-critical backups offsite.</li>
<li aria-level="1"><b>Educate employees.</b> Many ransomware attacks occur through email. Establish strong protocols to prevent personnel from opening compromised emails (and attachments).</li>
<li aria-level="1"><b>Isolate systems wherever possible. </b>Limiting access to important IT infrastructure is one of the most effective ways to prevent a successful attack.</li>
<li aria-level="1"><b>Check backups regularly. </b>Have a disaster recovery plan — run simulation scenarios and determine whether your current practices are robust enough for a real infection.</li>
</ul>
<p>Finally, if a cyberattack occurs, don’t panic. Shut off all affected systems immediately. Do not attempt to restore from backups if there is any possibility that the backups could be infected in the process.</p>
<p>The safest course of action is to contact an experienced ransomware recovery firm. For a free consultation, call Datarecovery.com at 1-800-237-4200 and ask to speak with a malware expert.</p>
<p>The post <a href="https://datarecovery.com/2021/07/does-all-ransomware-come-from-russian-cybercriminal-groups/">Does All Ransomware Come From Russian Cybercriminal Groups?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2021/07/does-all-ransomware-come-from-russian-cybercriminal-groups/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nearly 8.5 Billion Passwords Were Leaked Online. Here&#8217;s Why It Might Not Be as Bad As It Seems</title>
		<link>https://datarecovery.com/2021/07/nearly-8-5-billion-passwords-were-leaked-online-heres-why-it-might-not-be-as-bad-as-it-seems/</link>
					<comments>https://datarecovery.com/2021/07/nearly-8-5-billion-passwords-were-leaked-online-heres-why-it-might-not-be-as-bad-as-it-seems/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 19:14:25 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6630</guid>

					<description><![CDATA[<p>As more and more components of our daily life move from the real world to the internet, the value of security cannot be overstated. Each new innovation we embrace — from Zoom to TikTok to the latest video game system...</p>
<p>The post <a href="https://datarecovery.com/2021/07/nearly-8-5-billion-passwords-were-leaked-online-heres-why-it-might-not-be-as-bad-as-it-seems/">Nearly 8.5 Billion Passwords Were Leaked Online. Here&#8217;s Why It Might Not Be as Bad As It Seems</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6631" src="https://datarecovery.com/wp-content/uploads/2021/07/rockyou2021-password-word-cloud2.png" alt="RockYou2021 word cloud" width="914" height="545" srcset="https://datarecovery.com/wp-content/uploads/2021/07/rockyou2021-password-word-cloud2.png 914w, https://datarecovery.com/wp-content/uploads/2021/07/rockyou2021-password-word-cloud2-300x179.png 300w, https://datarecovery.com/wp-content/uploads/2021/07/rockyou2021-password-word-cloud2-768x458.png 768w" sizes="auto, (max-width: 914px) 100vw, 914px" /></p>
<p>As more and more components of our daily life move from the real world to the internet, the value of security cannot be overstated. Each new innovation we embrace — from Zoom to TikTok to the latest video game system — comes with a username and password that joins the ranks of our dozens of other usernames and passwords, and odds are, each individual login in a person’s deck of passwords probably resembles the others in at least some shape or form. It’s not necessarily a bad thing (if your password is secure, that is) — after all, common variations on the same password is how people remember their login info.</p>
<p>But, if just one of those passwords were to leak, it’s possible that every single one of a person’s passwords could be compromised as a result. Imagine the threat a leak of 8.5 billion passwords would pose. It’s our current reality, and you might not have even heard of it. Hackers called it RockYou2021, and the few who reported on it treated it like a game-changing security threat the likes of which we’ve never seen before. Is this an overreaction? Was RockYou2021 really that bad if none of us even heard about it? Let’s separate the truth from the fiction.</p>
<h2>RockYou2021: What Happened?</h2>
<p>When news of RockYou2021 first broke at the start of June, 2021, it was immediately dubbed “the largest password leak in the history of the internet,” far surpassing the earlier RockYou leak of 2009 that included over 32 million passwords. Originally, RockYou2021 was said to include 82 billion passwords — in reality, the number is about 1/10th of that: 8.459 billion passwords. To be clear, at over 250 times the size of RockYou2009, this is still a remarkable number of passwords to be leaked.</p>
<p>RockYou2021 was posted as a 100 GB text file on a very popular (unnamed) online forum for hackers. Each of the nearly 8.5 billion passwords is between 6 and 20 characters long, with all white spaces and non-ASCII characters removed from the text. Large collections like these allow for hackers and cybercriminals to do what’s known as “password spraying,” which involves trying a great many number of usernames and passwords in a very short amount of time in order to gain access to an account.</p>
<h2>How RockYou2021 Compares to Password Leaks of the Past</h2>
<p>Some of the biggest password leaks of the past include the aforementioned RockYou data breach of 2009, the Compilation of Many Breaches (COMB) of February 2021, and Breach Compilation of 2017. Passwords in the billions were leaked in each of these breaches combined, but they all share one thing in common (RockYou2021 included): They’re actually a collection of countless smaller leaks put into one large document.</p>
<p>With this, RockYou2021 is simply an enormous compilation of other leaks, COMB included — this February breach alone accounts for over 3 billion of RockYou2021’s 8.5 billion passwords. This doesn’t make it any less of a potential threat, but it definitely helps bring some context to the sheer size of these leaks: As it turns out, many of these enormous password breaches are simply reusing past information and including it in newly-named leaks in an attempt to fluff them up and make them seem more menacing. It’s all about optics, and a claim like “8.5 billion passwords” is destined to generate buzz, even if nearly half or more of those 8.5 billion have already been leaked in the past.</p>
<h2>What the Leak Actually Consists Of</h2>
<p>We know that this leak is comprised of many leaks of the past, but what about the other billions of passwords? Where did they come from? As it turns out, after some thorough investigating, the bulk of RockYou2021 is actually just a collection of many different cracking dictionaries. These cracking dictionaries consist of commonly used and easy-to-guess passwords that are used in password spraying attacks. To be clear, these aren’t necessarily passwords tied to anyone specific, but rather passwords that are commonly used by many different accounts.</p>
<p>This means that, ultimately, RockYou2021 is actually nothing new: It’s repackaged leaks of the past and cracking dictionaries under a new name in an attempt to look more threatening than it actually is. These aren’t 8.5 billion passwords taken from individuals by skilled hackers like thieves in the night, but rather a compilation of the work of other hackers and cybercriminals of the past. If it were a movie, it’d be an extended edition re-release chock full of deleted scenes.</p>
<h2>How to Keep Your Passwords From Leaking</h2>
<p>This isn’t to say that RockYou2021 shouldn’t be taken seriously, especially if one of your simple passwords is included in the text file. Thankfully, your best line of defense is also the simplest one: Change your password so that it’s impenetrable. Cracking dictionaries and the like depend on basic, easy-to-guess passwords like “Summer2021!” or “Password123!” in order for cybercriminals to gain access to any and all accounts they can get their hands on.</p>
<p>If your password is a complex and impossible-to-guess combination of letters, numbers, and symbols — like the passwords provided and stored securely by a password manager — then you probably won’t have to worry about being compromised anytime soon. Your first line of defense against hackers and cybercriminals is also the best line of defense: Change your password often, keep it complex, and store it securely in your preferred password manager.</p>
<p>The post <a href="https://datarecovery.com/2021/07/nearly-8-5-billion-passwords-were-leaked-online-heres-why-it-might-not-be-as-bad-as-it-seems/">Nearly 8.5 Billion Passwords Were Leaked Online. Here&#8217;s Why It Might Not Be as Bad As It Seems</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2021/07/nearly-8-5-billion-passwords-were-leaked-online-heres-why-it-might-not-be-as-bad-as-it-seems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Russia Launches Cyber Attacks Against US Infrastructure</title>
		<link>https://datarecovery.com/2021/06/russia-launches-cyber-attacks-against-us-infrastructure/</link>
					<comments>https://datarecovery.com/2021/06/russia-launches-cyber-attacks-against-us-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 16:30:14 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6601</guid>

					<description><![CDATA[<p>Throughout the past several years (and administrations), one country has been continually and perpetually named when discussing the global threats the United States faces on a daily basis: Russia. What distinguishes the threat of Russia from the other sorts of...</p>
<p>The post <a href="https://datarecovery.com/2021/06/russia-launches-cyber-attacks-against-us-infrastructure/">Russia Launches Cyber Attacks Against US Infrastructure</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Throughout the past several years (and administrations), one country has been continually and perpetually named when discussing the global threats the United States faces on a daily basis: Russia. What distinguishes the threat of Russia from the other sorts of threats America faces regularly is the fact that this isn’t necessarily a physical threat — it’s a digital one, consisting of cyber attacks and hacking attempts that disrupt both physical and online infrastructures alike. Some have gone as far as to call it a cyberwar.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-6606 size-large" src="https://datarecovery.com/wp-content/uploads/2021/06/russian-flag-computer-network-1920x1152-1-1024x614.jpg" alt="Russian flag computer network overlay" width="1024" height="614" srcset="https://datarecovery.com/wp-content/uploads/2021/06/russian-flag-computer-network-1920x1152-1-1024x614.jpg 1024w, https://datarecovery.com/wp-content/uploads/2021/06/russian-flag-computer-network-1920x1152-1-300x180.jpg 300w, https://datarecovery.com/wp-content/uploads/2021/06/russian-flag-computer-network-1920x1152-1-768x461.jpg 768w, https://datarecovery.com/wp-content/uploads/2021/06/russian-flag-computer-network-1920x1152-1-1536x922.jpg 1536w, https://datarecovery.com/wp-content/uploads/2021/06/russian-flag-computer-network-1920x1152-1.jpg 1920w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<h2>A History of Cold Warfare</h2>
<p>Cyberwarfare by Russia is nothing new — neither is the concept of a so-called Cold War with the country. From 1947 to 1991, the United States and the Soviet Union (now Russia) engaged in a long-winded series of verbal and geopolitical acts that continually amped up tensions between the two countries for decades. While no large-scale physical violence ever broke out, there was plenty of what’s known as “proxy war”: indirect, long-term action that stokes but never initiates a direct physical war.</p>
<p>The potential looming cyberwar between Russia and the United States bears a striking resemblance to this proxy war that defined the bulk of the 20th century between the two countries. But the breadth is much larger — after all, the U.S. isn’t the only target anymore. Russia has unleashed similar cyber attacks on countries such as France, Germany, Poland, South Korea,  Ukraine, and more.</p>
<h2>Why Cyber Attacks?</h2>
<p>Given their dependence on this sort of online warfare, it’s worth asking: Why cyber attacks? What is it about them that Russia seems to like so much? Well, the answer seems to be as simple as this: From defending to attacking to exploiting, online warfare allows the Russians to influence behavior and beliefs across the globe. Not to mention, with how much we depend on the internet in our daily lives, these cyber attacks have the potential to impact a wider area more significantly than a physical attack ever could.</p>
<p>Cyber attacks allow for the Russians to hack into all sorts of infrastructures — anything from government agencies to social media sites — and wreak havoc, all without ever having to leave home. Better yet, these attacks can bring in very real money to the Russian government through the implementation of ransomware, which demands a payment in exchange for control of the data returned to the user. Long story short, it’s all about doing the most amount of damage as far away from the location of the attack as possible.</p>
<h2>A Timeline of the Most Recent Events</h2>
<p>While one could surely trace these most recent Russian cyber attacks on America back to the 1940s (maybe even earlier), we will list a basic timeline of the most recent events below.</p>
<p><b>2015: </b>Russian hackers virtually infiltrated sensitive and confidential parts of the White House, making for what was called some of “the most sophisticated attacks ever launched against U.S. government systems” at the time. This occurred during the tail end of the Obama administration and resulted in the latter half of his second and final term as president exerting a lot of energy toward fighting back against the Russian cyber attackers.</p>
<p><b>2016:</b> The United States gained intelligence that suggested Russia was planning to create a nuclear bomb that equalled the kind of fire power the United States had within its own arsenal. This was done in an attempt for Russia to be seen as a sort of equal to the U.S. At the same time, Russia successfully hacked into the email accounts of key figures within the Democratic National Convention, setting the stage for years of questioning about Russian election interference during the Trump administration.</p>
<p><b>2018: </b>U.S. officials warned that Russia was in the process of releasing malware, phishing attempts, and gaining remote access to various entities within the energy sector. This included dozens of power plants, water processing plants, and aviation facilities in addition to several government facilities.</p>
<p><b>2019: </b>The United States hit back at Russia, unleashing their own cyber attack on the country’s electrical grid and subsequently escalating talks of an all-out cyberwar.</p>
<p><b>2020: </b>Russia breached United States Treasury, Commerce, and Energy departments as well as key nuclear research administrations. Russia presumably hoped to gain intel on internal policymaking decisions in an attempt to counter them or pre-empt them altogether.</p>
<p><b>2021: </b>Russia continues to breach key American institutions, including U.S. electric utilities, oil, gas, and other industrial firms. A U.S. report indicates that these breaches had been occurring since at least 2017, possibly earlier.</p>
<h2>How a Potential Cyber War Would Impact Both Countries</h2>
<p>It almost goes without saying that a full-scale cyber war would unleash wide-scale destruction and disruption on the most essential industries in both countries. Hits on infrastructure, transportation, revenue, and even things like social media and other internet staples would practically be a guarantee, and the chaos that would ensue as a result of these cyber attacks would far exceed what both countries have seen thus far. In other words, it would not be good, to say the least.</p>
<p>These are government-sponsored attacks by the Russians, which means that those carrying out the attacks are doing so at the request of their government officials and are often rewarded for doing so. If they’re caught, they’re given protection. If they succeed, they (and their country) benefit greatly, financially or otherwise. It’s a group effort, and this is why it’s so dangerous. Only time will tell what the next move is, but if cyber war breaks out, then both countries can expect serious damage to be inflicted on power grids, water and fuel lines, finances, communication, and even emergency services. Let’s hope it never comes to this.</p>
<p>The post <a href="https://datarecovery.com/2021/06/russia-launches-cyber-attacks-against-us-infrastructure/">Russia Launches Cyber Attacks Against US Infrastructure</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2021/06/russia-launches-cyber-attacks-against-us-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 Most Common Types of Cyber Attacks</title>
		<link>https://datarecovery.com/2021/01/10-most-common-types-of-cyber-attacks/</link>
					<comments>https://datarecovery.com/2021/01/10-most-common-types-of-cyber-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 18 Jan 2021 21:43:24 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6561</guid>

					<description><![CDATA[<p>Most everyone knows the importance of protecting your devices and your data from hackers and cybercriminals, but this is often easier said than done — especially when the many ways in which those hackers and cybercriminals can attack isn’t always...</p>
<p>The post <a href="https://datarecovery.com/2021/01/10-most-common-types-of-cyber-attacks/">10 Most Common Types of Cyber Attacks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6566" src="https://datarecovery.com/wp-content/uploads/2021/05/cyberattack-1024x683-v5.png" alt="cyber attack" width="1024" height="683" srcset="https://datarecovery.com/wp-content/uploads/2021/05/cyberattack-1024x683-v5.png 1024w, https://datarecovery.com/wp-content/uploads/2021/05/cyberattack-1024x683-v5-300x200.png 300w, https://datarecovery.com/wp-content/uploads/2021/05/cyberattack-1024x683-v5-768x512.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />Most everyone knows the importance of protecting your devices and your data from hackers and cybercriminals, but this is often easier said than done — especially when the many ways in which those hackers and cybercriminals can attack isn’t always well-known. In order to truly protect yourself, your devices, and your data, it’s essential to understand the most common types of cyber attacks.</p>
<h2>Phishing</h2>
<p>Probably the most common cyber attack in the average person’s life, phishing is the act of sending a deceptive message — whether by phone, by text, by email, or through social media —  disguised as a message from a trusted source. The goal is to get you to click a link or download a file that then wreaks havoc on your device in search of any sort of personal or financial information left out in the open.</p>
<h2>Distributed Denial-of-Service (DDoS) Attacks</h2>
<p>Just as there are many different kinds of phishing, DDoS attacks come in all sorts of shapes and sizes. The ping of death, botnets, smurf attacks, teardrop attacks… The list goes on and on, but the end goal of these DDoS attacks is always the same: to overwhelm a business’s web servers with requests in an attempt to keep users from connecting to the business’s website, leading to unexpected downtime and potentially even loss of user data and financial info.</p>
<h2>Malware</h2>
<p>Similar to phishing and DDoS attacks, malware is one word that encompasses many different types of attacks. As a portmanteau for malicious software, any kind of attack that sets out to leave behind a dastardly program with the intent to steal or damage your data can be called malware. Variations include spyware, which spies on your devices, ransomware, which demands a payment from you in order to go away, and adware, which clutters the device’s interface with unwanted advertisements.</p>
<h2>Cryptojacking</h2>
<p>As cryptocurrency continues to boom, it’s no surprise that cybercriminals and hackers would want to create a way to take advantage of this popularity — especially since crypto is a currency that exists solely on the internet. Thus enters cryptojacking, the phrase used to describe a cyber attack that uses someone else’s computer to mine cryptocurrency, either through a malicious link or an infected website of some sort.</p>
<h2>Man-in-the-Middle (MitM) Attacks</h2>
<p>Who doesn’t love a good, free, public Wi-Fi network? While this is a major convenience in today’s day and age and a great way for a business to provide for their customers, it also comes at a potential cost: cybercriminals love to take advantage of these weaker networks to steal your data. They do this through what’s known as Man-in-the-Middle (MitM) attacks, where the cybercriminal inserts themselves between the user and the network to spy on and steal info.</p>
<h2>Session Hijacking</h2>
<p>A stolen cookie is never a good thing, especially when dealing with computers and not baked goods. Session hijacking is a cyber attack that involves a hacker taking advantage of an otherwise safe computer session to steal info. While it might sound similar to Man-in-the-Middle attacks, session hijacking differs from MitM in its execution: session hijacking occurs when an HTTP cookie — a.k.a. the small piece of data a web browser stores on a device to remember the user’s info and activity — is stolen and then exploited.</p>
<h2>Password Attacks</h2>
<p>Easily as prevalent as phishing attacks, password attacks are simply when a cybercriminal attempts to steal passwords. This can happen en masse, like when a social media site or email server has a slew of login credentials stolen, or it can happen on a micro level, when a cybercriminal homes in on one individual in particular. The prevalence of these really emphasizes the importance of choosing unique, complex passwords — the more random the better.</p>
<h2>Spoofing</h2>
<p>While phishing aims to convince you to click a link or download a file under the guise of a trusted source, spoofing attacks takes this a step further by actually co-opting a trusted IP address, phone number, or other contact info to further convince you of its faux legitimacy. This can come in the form of a phone number already in your contacts, an email address you communicate with frequently, or even a website you visit often.</p>
<h2>Drive-By Attacks</h2>
<p>A big obstacle cybercriminals face when plotting their cyber attacks is conspicuousness. Often, if you’re educated on the most common types of cyber attacks, you can’t be fooled by their most obvious attempts. That’s where drive-by attacks come in: These attacks attach themselves to other programs or websites and leave malicious software on your device without you even having to intentionally click or download anything.</p>
<h2>Zero-Day Exploits</h2>
<p>There are few things more exciting than a new operating system update for your computer, phone, or tablet. Many of us download these new updates as soon as they become available so that we can enjoy the new and updated features they provide. However, there are cybercriminals who make it their mission to exploit any security flaws in the new operating systems and unleash a widespread attack on anyone who downloaded the update. The goal is to attack as many people as possible before the developer can close the dangerous security loophole.</p>
<p>The post <a href="https://datarecovery.com/2021/01/10-most-common-types-of-cyber-attacks/">10 Most Common Types of Cyber Attacks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2021/01/10-most-common-types-of-cyber-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is the Internet of Things and Why You Should be Concerned.</title>
		<link>https://datarecovery.com/2020/07/what-is-the-internet-of-things-and-why-you-should-be-concerned/</link>
					<comments>https://datarecovery.com/2020/07/what-is-the-internet-of-things-and-why-you-should-be-concerned/#respond</comments>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 14:25:18 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6288</guid>

					<description><![CDATA[<p>No matter which sector you may be doing business in, the Internet of Things has undoubtedly caused a wide variety of changes in recent years. In particular, the IoT has resulted in an array of changes in terms of maintaining...</p>
<p>The post <a href="https://datarecovery.com/2020/07/what-is-the-internet-of-things-and-why-you-should-be-concerned/">What is the Internet of Things and Why You Should be Concerned.</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>No matter which sector you may be doing business in, the Internet of Things has undoubtedly caused a wide variety of changes in recent years. In particular, the IoT has resulted in an array of changes in terms of maintaining general network security for companies and organizations of all kinds. With that in mind, the following is a closer look at the changes that IoT has brought to the workplace as well as how it has affected network security, in general.</p>
<h2>What is the Internet of Things?</h2>
<p>Before we delve into the ways in which the IoT has affected network security, let&#8217;s first look at the meaning of the Internet of Things, and how it has changed the workplace in general. First of all, the Internet of Things is an umbrella term used to describe the massive network of &#8220;things&#8221; that are connected to the internet.<img loading="lazy" decoding="async" class="size-medium wp-image-6290 alignleft" src="https://datarecovery.com/wp-content/uploads/2020/07/things213-300x176.gif" alt="" width="300" height="176" srcset="https://datarecovery.com/wp-content/uploads/2020/07/things213-300x176.gif 300w, https://datarecovery.com/wp-content/uploads/2020/07/things213-1024x602.gif 1024w, https://datarecovery.com/wp-content/uploads/2020/07/things213-768x452.gif 768w" sizes="auto, (max-width: 300px) 100vw, 300px" /> In particular, the IoT refers to items that are connected and communicate with one another with the help of the internet. These devices range from everything from sensors to wearables, computers, tablets, smartphones, and much more. Ultimately, the IoT has created a much more connected world that allows various products and devices to communicate and collaborate, spanning an array of networking types.</p>
<h2>How has it Changed the Workplace?</h2>
<p>Now that we have a better understanding of the IoT, let&#8217;s look at some of the ways it has transformed the workplace, in general.</p>
<ul>
<li><strong>Manufacturing Tracking</strong>: The Internet of Things uses things such as smart sensors, that allow companies to track and uncover any issues that unfold during the manufacturing process. Particularly, if a certain part of a machine begins to malfunction, these censors notify you so that you can quickly repair it before it causes a major issue.</li>
<li><strong>Supply Chain Improvement</strong>: Additionally, the Internet of Things has helped improve the supply chain. Using things such as smart tags and sensors, businesses are able to track and maintain full control of their inventory.</li>
<li><strong>Cybersecurity</strong>: Although the widespread use of the IoT has created computer security concerns, it has also made it possible for companies to create a more stable network.</li>
<li><strong>Remote Working</strong>: Additionally, given that essentially all remote work involves the use and connection of various devices via the internet, the IoT is one of the main things that is enabling the business sector to continue to thrive during these uncertain times.</li>
</ul>
<h2>How the IoT is Affecting Network Security in the Workplace</h2>
<p>As mentioned, although the Internet of Things can help improve cybersecurity, paradoxically, its mere existence causes an increase in computer security threats in general. Either way, the IoT is affecting network security in the following ways:</p>
<ul>
<li><strong>Greater Cybersecurity Efforts: </strong>Additionally, the IoT has caused companies to upgrade their cybersecurity efforts. Its widespread use requires all connected companies to boost and upgrade their cybersecurity so it is sufficient enough to secure the use of this complex, massive network.</li>
<li><strong>Data Democratization</strong>: One of the top ways that cybersecurity is affecting the workplace is with data democratization. In other words, the use of the IoT has made it possible for data to be more widely shared in a much shorter period of time. This leaves networks of all kinds open to vulnerabilities such as hacks, ransomware, and much more. Therefore, companies must create new risk management strategies, integrate new tools for network security evaluation, and more.</li>
<li><strong>Data Power Struggles</strong>: Additionally, given that the IoT has enabled companies to track various devices in real-time, this has created some concerns and even a power struggle between companies and consumers. Although the data can obviously be useful for businesses, consumers have expressed privacy concerns, as well as a general argument over who should be able to access this information and why.</li>
<li><strong>New Standards on the Horizon</strong>: Lastly, given that the Internet of Things creates a massive network of interconnected devices in which any company can be breached at any time. In the absence of global cybersecurity standards, businesses must cooperate in order to keep their networks as safe as possible. However, the only way to secure the IoT for the long-term is to create global cybersecurity standards that are mandatory for all parties involved.</li>
</ul>
<p>Overall, the Internet of Things has created both issues and opportunities in terms of network security in the workplace. Although the future of the workplace is very much dependent on the IoT, its mere existence will require the world to reimagine how cybersecurity is handled.</p>
<p>Sources:</p>
<p><a href="https://readwrite.com/2019/03/05/iot-and-the-transformation-of-the-modern-workplace/" target="_blank" rel="noopener noreferrer">https://readwrite.com/2019/03/05/iot-and-the-transformation-of-the-modern-workplace/</a></p>
<p><a href="https://wire19.com/7-ways-iot-technology-can-improve-your-workplace/" target="_blank" rel="noopener noreferrer">https://wire19.com/7-ways-iot-technology-can-improve-your-workplace/</a></p>
<p><a href="https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot" target="_blank" rel="noopener noreferrer">https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot</a></p>
<p><a href="https://hbr.org/2013/06/cyber-security-in-the-internet" target="_blank" rel="noopener noreferrer">https://hbr.org/2013/06/cyber-security-in-the-internet</a></p>
<p><a href="https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/cyber-risk-in-an-internet-of-things-world-emerging-trends.html" target="_blank" rel="noopener noreferrer">https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/cyber-risk-in-an-internet-of-things-world-emerging-trends.html</a></p>
<p>The post <a href="https://datarecovery.com/2020/07/what-is-the-internet-of-things-and-why-you-should-be-concerned/">What is the Internet of Things and Why You Should be Concerned.</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2020/07/what-is-the-internet-of-things-and-why-you-should-be-concerned/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 53/235 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-04 12:28:37 by W3 Total Cache
-->