Businesses failing to fight IT security threats, but the biggest problem is staff, PwC survey shows

Information technology hackers can still get the better of businesses, with companies around the world failing to keep a step ahead of information security threats, new research has found.

And it is not just anonymous external hackers that businesses need to worry about, but their staff, with the biggest internal risk to a company’s IT security identified as its people.

The PwC Global State of Information Security Survey 2014 interviewed 9600 business leaders across 215 countries. It found that 30% reported the biggest internal IT security risk was current employees. Twenty seven per cent said it was former employees, and many noted that a lack of mechanisms to respond to internal incidents was an issue.

External to the business, one third of respondents identified hackers as the most likely source of IT security threats.

The report found that despite a forecast increase of 51% in security investment, security incidents have risen by 25% in the last 12 months. The issue is costing more money, with the average financial loss associated with the security incidents has also increased by 18%.

In a worrying figure for business owners, since 2011, the number of respondents reporting losses of $10 million or more doubled.

The pharmaceutical sector was the most prominent industry reporting losses of $10 million or more, at 20%, while financial services and technology sectors were at 9% and industrial products at 8%.

PwC head of cyber services Steve Ingram said efforts to detect threats and protect data have increased in the past year.

“But the pace of digital change is fast and many organisations are still relying on yesterday’s strategies to fight today’s threats.”

Despite the threats, it found that confidence in their organisation’s security activities had improved. It reported that 74% of respondents were confident about the effectiveness of their organisation’s activities, with chief executives most confident at 84%, and chief financial officers less confident at 76%.

Cloud computing is opening businesses up to hacking exposure. While usage of cloud computing is up by 47%, the survey found less than one fifth of organisations have a policy governing its use.

In Australia, spending on IT security is forecast to increase by 46% in the next 12 months.

Ingram told SmartCompany that in many ways Australian businesses are role models for excellent IT security practices. But business owners still need to be more vigilant.

“In the old days you’d put up a firewall and you’d be OK,” he says.

“In the modern world you can’t rely on that. You can’t tackle it the old ways.”

Ingram says just like people protect their phone and passport to a greater degree than their TVs, business owners need to scrutinise the essential elements that need to be protected in their business.

For example, sensitive information could be customer data or details of mergers and acquisitions. Business owners need to understand exactly how well these elements are protected, and not to rely on simply outsourcing their IT security.

In 2014, he predicts IT security will become an increasingly front-of-mind issue for CEOs and directors, and he expects more businesses to have a security threat contingency plan put in place.

 

 

 

Reference:
Tuesday, 12 November 2013 12:13
Melinda Oliver – SmartCompany

CRITICAL WARNING VIRUS ALERT – CryptoLocker – Prevention and Clean

Please read and take note
CryptoLocker 14th October 2013

CryptoLocker is the next generation of internet virus that is currently circulating all over the world in large numbers. Once a computer becomes infected it will lock all your files plus any network files it has access to, even your server.
Once the files are locked it will give you a three day countdown to pay the ransom, usually $100 or $300. If the time expires your files are locked with no option to pay the ransom.
It is by far the worst we have experienced so far and virus protection companies are scrambling to catch up with this one, as it changes frequently to elude the virus scanners. In other words: it can affect you if you are not careful even though your firewall and virus protection is active and up-to-date.
Currently there are only two known methods to remove the infection, restoring your files from a backup or paying the ransom.
Please be aware that paying the ransom is not guaranteed to work. We don’t condone paying the ransom and supporting these cybercriminals.

Usually this occurs by these methods:
In the form of attachment, usually disguised in an email appearing to come from your bank, insurance company or courier service or scanner.
A simple safety procedure that works for the majority of email applications or online email services is to “hover” over the link, which means move the cursor to the attachment or “button” or other link in the email, but DO NOT click.  If the domain name that appears has no relation, looks suspicious, or appears as an unintelligible tangle of letters and numbers, it usually means it is not legitimate and should be deleted.
Through Trojan websites, which will ask you to download a piece of software in order to watch video clips or download songs off the internet.
Through exploit kits, specific websites with similar names to popular ones, just waiting for people to miss-type the address and think they are on their favourite website.
Advice for prevention

Do not open attachments if you are unsure of the contents or the email was unexpected.
Look for clues in the email content, usually most legitimate emails will address you by name and not something generic like ‘customer’ with vague wording.
Do not click on website links in emails until you have viewed the link location (do this by hovering over the link, this will display the link right at the bottom of Outlook). Instead of clicking the link, you are best to manually browse to the website via your web browser.
Make sure your anti-virus is updated regularly
Make sure your backups are current and working and backing up ALL critical data
If you get the virus

Stop work
Immediately disconnect any network drives
Contact us
Alert other users of the issue, as most likely any work done will be overwritten when the backup is restored.
Please do forward this email on to your staff, friends and associates.

If in doubt or have any questions, please contact Sterling IT.

WEP wireless security

View Online

Alert Services (Advisory)
7 June 2013

Australians continue to use out dated encryption

Businesses and home users are advised to avoid using the Wired Equivalent Privacy (WEP) security protocol for wireless connections.

Once commonly used, the WEP security protocol is today considered broken and should not be used.

Although most router/modem manufacturers and Internet Service Providers currently supply and support devices with higher levels of encryption, many computers and networks continue to maintain wireless connections via WEP.

If you still currently use WEP, your wireless connection is vulnerable, information you send via this method is easily accessible via sniffer tools downloaded from the Internet.

You should check your current settings and if you currently use WEP, choose an alternative security protocol for your wireless connections.

How to find your wireless security settings:

Windows
For Windows based computers, you can check the level of security being used on a wireless network by viewing Network Options in the Control Panel. From here, select your wireless network and open the Properties for that connection. The exact name and location of these options will vary between versions of Windows. A security tab or menu should offer a choice of security protocols for your device.

Apple
For Apple based computers, you can check the level of security being used on a wireless network by clicking the Network icon in the System Preferences. Select your connection on the left hand side and the security level will be listed next to the network name.

How to update your wireless security:

Updating wireless security varies depending on the make and model of your wireless device. Refer to your manual for individual product details.

Modern modems, routers and wireless devices typically offer a range of encryption protocols. Wireless encryption should be set to WPA2 if available (or WPA if not).

There can be various types of WPA2 encryption, with the simplest version being WPA2-PSK. This uses a network name and requires a password. Most computers and smartphones can connect to WPA2 networks with minimal reconfiguration.

If your wireless device does not support any encryption other than WEP, it is strongly advised to update your equipment.

More information

The information provided here is of a general nature. Everyone’s circumstances are different. If you require specific advice you should contact your local technical support provider.

Information provided by the Internet Commerce Security Laboratory, www.icsl.com.au

Disclaimer
This information has been prepared by Enex TestLab for the Department of Broadband, Communications and the Digital Economy (‘the Department’). It was accurate and up to date at the time of publishing.

This information is general information only and is intended for use by private individuals and small to medium sized businesses. If you are concerned about a specific cyber security issue you should seek professional advice.

The Commonwealth, Enex TestLab, and all other persons associated with this advisory accept no liability for any damage, loss or expense incurred as a result of the provision of this information, whether by way of negligence or otherwise.

Nothing in this information (including the listing of a person or organisation or links to other web sites) should be taken as an endorsement of a particular product or service.

Please note that third party views or recommendations included in this information do not reflect the views of the Commonwealth, or indicate its commitment to a particular course of action. The Commonwealth also cannot verify the accuracy of any third party material included in this information.
Host of subscription service
The Commonwealth has engaged Ladoo Pty Ltd to host the Stay Smart Online Alert Service. All URL links should show the domain send.ladoo.com.au at hover over. URL links related to the administration of the service (‘View online’, ‘Update your profile preferences’ and ‘unsubscribe’) should direct you to web pages hosted by Ladoo Pty Ltd.

CONTACT US
Facebook: www.facebook.com/staysmartonline
Email: staysmartonline@dbcde.gov.au
Web: www.staysmartonline.gov.au

2012 Australian Government. All rights reserved

SITBACK… and relax. Offsite online backup data solutions

SITBACK FINALSITBACK (“Sterling IT Backup”) provides our customers with a seamless, robust online data backup solution to an offsite location.
Also known as Cloud Backup.

Data loss or the exposure of sensitive data can result in huge financial losses, legal penalties, loss of reputation, brand damage, loss of intellectual property, loss of customer trust… and all this can easily lead into bankruptcy.

 

Sterling IT specialises in secure online backup and recovery. Whether you are looking for online backup of servers, distributed networks, workstations or notebooks, Sterling IT has a suitable solution and reliable technology that will scale with your business.

Sterling IT provides real-time, hassle-free, local and offsite backup protection. It offers a reliable, centrally managed backup solution that unravels complexities and makes it easier for IT managers and business owners to protect their organization’s most important asset – their data.

Both small business and enterprise solutions Sterling IT offer both allow unlimited clients. That is you can run the backup client on 1 computer/server or 100’s of computers/servers (including laptops that are in the field all the time). That’s right, NO CLIENT FEE. You can start with 1 or 2 systems and just keep installing onto more computers or servers as required. All that is required is an internet connection.

In today’s information-driven organisations, the cost of managing, keeping available and recovering data can be overwhelming.

The ever-increasing role digital information plays in our lives has increased scrutiny over how it is stored and protected.

In order to ensure company’s good name, integrity and longevity, data must be stored securely and in multiple locations; this is no more just “nice to have”, it is a necessity.

Enterprises are seeking new ways to tackle their data protection challenges. While data growth is not new, the pace of growth has become more rapid, the location of data more dispersed and the value much higher.

Sterling IT offer plans starting from $9 per month based on storage requirements. Unlimited computers! All backed up to AUSTRALIAN DATA CENTRES.

SITBACK is the easy to use, automated and affordable way to backup your irreplaceable data. At your predetermined time, your data is encrypted, compressed and sent to our secure, offsite servers.

For a limited time, Sterling IT is offering our clients a free trial and installation.
Contact us now to organise protecting your data.

sitback

Further information and terminology can be found at https://en.wikipedia.org/wiki/Remote_backup_service

Is your website infected with Malware or on a blacklist?

People trust many websites today including ticketing sites, real estate sites etc. The issue is most malware and trojans are being injected into sites we actually trust. This can include YOUR website.
If you want to be as sure as you can if your website is clean, go to Securi Sitecheck, type your URL and check for any malicious code or blacklists you may be on.

You will see results like below (Sterling IT is safe!). if you find your domain has any issues or is on a blacklist, contact Sterling IT as soon as possible. The longer you leave it, the longer it will take to reverse.

Comparitech have published a list of the best web application firewalls (WAFs) that can help protect a website from hacks and external attacks. Here’s the link – https://comparite.ch/best-waf