Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
James Smith
Principal Security Consultant and Head of Penetration Testing feature_status*/ ?>
Bridewell Consulting

Comments Dotted : 3
January 25, 2021

Cyber Criminals Publish More Than 4,000 Stolen Sepa Files

Any company that finds itself victim to ransomware is in a difficult situation.

Any company that finds itself victim to ransomware is in a difficult situation. If they pay, in theory, they regain access to their data and systems and business can continue. If they don’t pay, they run the risk of details being shared online.

 

However, even if they do pay there’s no guarantee they’ll actually get access restored. More often than not, making a payment won’t do anything at all, and instead just leave companies out of pocket and with more malware infections to deal with.

.....Read More

Any company that finds itself victim to ransomware is in a difficult situation. If they pay, in theory, they regain access to their data and systems and business can continue. If they don’t pay, they run the risk of details being shared online.

 

However, even if they do pay there’s no guarantee they’ll actually get access restored. More often than not, making a payment won’t do anything at all, and instead just leave companies out of pocket and with more malware infections to deal with. There’s also no guarantee the data hasn’t been stolen already, before it was encrypted. This is happening more and more and the likelihood that the data will be sold or stored by the hacker is great. Then of course there are the wider ethical considerations about paying attackers who could use the money to fund other criminal enterprises.

 

The only way to avoid these scenarios is to have the right security measures in place to stop them occurring, such as replicating data, having off-site backups and segregated networks. Then the likelihood of having to answer the “pay or not pay” question is greatly reduced.

  Read Less
Like(0)  (0)

Linkedin Message

@James Smith, Principal Security Consultant and Head of Penetration Testing , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Any company that finds itself victim to ransomware is in a difficult situation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-criminals-publish-more-than-4000-stolen-sepa-files

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@James Smith, Principal Security Consultant and Head of Penetration Testing , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Any company that finds itself victim to ransomware is in a difficult situation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-criminals-publish-more-than-4000-stolen-sepa-files

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
May 20, 2020

UK airline easyJet data breach impacts 9M customers – expert commentary

Transparency is key in maintaining customer trust, especially for firms like EasyJet in the travel industry.
At this stage, it’s not clear how the hackers managed to gain access to EasyJet’s systems. However, with the disruption caused by COVID-19, we have seen a notable increase in attackers targeting all sectors, including travel, to take advantage of the reduced resources and focus on cyber security. Despite the current climate, technical defence is still paramount, and in particular, regular penetration testing is vital, particularly in the current remote environment many business are.....Read More
At this stage, it’s not clear how the hackers managed to gain access to EasyJet’s systems. However, with the disruption caused by COVID-19, we have seen a notable increase in attackers targeting all sectors, including travel, to take advantage of the reduced resources and focus on cyber security. Despite the current climate, technical defence is still paramount, and in particular, regular penetration testing is vital, particularly in the current remote environment many business are operating in. All organisations must take steps to protect their systems and ultimately customer data. This means taking basic steps such as putting in place regular security assessments, a strong patching and password policy, and enforcement of multi-factor authentication on every public facing system. These are not silver bullets but can go a long way to improving security. Transparency is key in maintaining customer trust, especially for firms like EasyJet in the travel industry. The company needs to inform customers about the breach and implications quickly, even if no data has been misused. This is especially important in light of the current COVID-19 situation where security concerns are particularly heightened.  Read Less
Like(0)  (0)

Linkedin Message

@James Smith, Principal Security Consultant and Head of Penetration Testing , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Transparency is key in maintaining customer trust, especially for firms like EasyJet in the travel industry. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@James Smith, Principal Security Consultant and Head of Penetration Testing , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Transparency is key in maintaining customer trust, especially for firms like EasyJet in the travel industry. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 09, 2020

Response Comment: Travelex Foreign Currency Website STILL Down After 4 Days Following Cyber Attack

There’s also no guarantee that the data hasn’t been stolen already, before it was encrypted.
Transparency is key in maintaining customer trust, especially for firms like Travelex in the financial services industry. Travelex has taken a long time to inform customers about what’s taken place, and placing a press statement on the website days after the event simply isn’t enough. Financial services firms like Travelex have a responsibility to their customers to keep them informed even if no data has been lost. This is especially important in light of the 2018 breach the company.....Read More
Transparency is key in maintaining customer trust, especially for firms like Travelex in the financial services industry. Travelex has taken a long time to inform customers about what’s taken place, and placing a press statement on the website days after the event simply isn’t enough. Financial services firms like Travelex have a responsibility to their customers to keep them informed even if no data has been lost. This is especially important in light of the 2018 breach the company suffered in which the personal details of 17,000 customers were exposed. It’s important to learn from past incidents and build those learnings into a cyber response / resilience plan. Having the right processes in place are critical in being prepared for an attack. This includes technical aspects like replicating data, off-site backups, network segregation, firmware updates and even regular penetration testing. It also covers response — not just in fixing the issue, but in informing the wider business, the media, and most importantly customers. The first thing to learn from this is that all organisations are at risk because everyone has something of value to lose. Whether that’s access to systems, intellectual property or customer data. The second thing to learn is that having a plan in place to mitigate risk is essential. Prevent, detect, respond. Those are three key elements to live by and should cover everything from the business impact of an attack, technical considerations on how to prevent them, as well as how you’d respond to stakeholders in the event of an attack, customers, staff, the ICO, etc. Whether companies should pay the ransom always sparks debate — but the negatives always outweigh the positives. If you pay, in theory, you regain access to your data and systems and business can continue. However, there’s no guarantee you’ll actually get access restored. There’s also no guarantee that the data hasn’t been stolen already, before it was encrypted. This is happening more and more in the industry and the likelihood that the data will be sold or stored by the hacker is great. Then of course there are the wider ethical considerations about paying attackers who could use the money to fund other criminal enterprises. If organisations have the right plans in place, such as replicating their data, having off-site backups and segregated networks, for example, the likelihood of having to answer the “pay or not pay” question is greatly reduced.  Read Less
Like(16)  (0)

Linkedin Message

@James Smith, Principal Security Consultant and Head of Penetration Testing , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"There’s also no guarantee that the data hasn’t been stolen already, before it was encrypted. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/response-comment-travelex-foreign-currency-website-still-down-after-4-days-following-cyber-attack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@James Smith, Principal Security Consultant and Head of Penetration Testing , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"There’s also no guarantee that the data hasn’t been stolen already, before it was encrypted. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/response-comment-travelex-foreign-currency-website-still-down-after-4-days-following-cyber-attack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel