Why you need to know all the cloud services that your organisation uses

by | May 29, 2021 | News, Security

If you don’t where it is, you can’t protect it.

Do you know where ALL your organisation’s data is – not physically, but on which web and cloud services?

Here’s the problem.  If you don’t where it is, then you can’t protect it. The secondary problem is finding out, because not everyone in your organisation will be onboard.  It is common for people to sign up to web services because they offer something useful that helps them do their job.

They sign up using their email address and creating a password.   There is the first headache – how does anyone track what has been signed up to across your organisation, let alone who has access to it? If that person leaves, no one will change the account credentials if they don’t know about it, but your ex-colleague still has access.

Secondly, what data do they upload?  Is that data that you have a legal or moral responsibility for?

 

There’s nothing noble about Nobelium.

This isn’t theory – it’s real.    USAID is a pretty important US organisation – promoting democracy and human rights around the world.  Turns out, someone there was using a well-known email database tool called Constant Contact.  But their account wasn’t well protected. Worse still, their account had a huge mailing set up, and of course, it had all the official USAID templates.

So, these Nobelium people, allegedly a Russian state-sponsored hacker group, compromised the Constant Contact account and sent a bulletin out.  The bulletin contained malware that allowed the hackers to take command and control over victims computers.  Ironically the fake email alleged interference in the US federal elections.

So, what can you do?

The first step is knowing what SaaS tools your people are using.  We call this SHADOW IT and it is inevitable.  Rather than stopping it, the job IT has is to identify it and manage it.  The second step is to secure those platforms.  That’s why our KARE for Security S2 plan contains a useful tool to help you identify what services your people are using.

Refer : What We Know About The Apparent Russian Hack Exploiting USAID : NPR

Zero-Trust IT Security

Zero-Trust IT Security

'Zero-Trust' is a tough headline. Zero-trust in a world where we trust people all the time is an unpleasant concept. We trust that when we order a package online, that the vendor will take our order and not just our money, that our product will be passed to a courier...

HAFNIUM Microsoft Email Attack

HAFNIUM Microsoft Email Attack

Over the last few days, you may have read about a zero-day attack impacting Microsoft Exchange Servers. We became aware of this vulnerability on Wednesday last week (it was discovered on the 2nd in the USA so we were on to it immediately, allowing for time-zones) . ...

5 simple steps to stay cloud-cyber-secure

5 simple steps to stay cloud-cyber-secure

We’ve posted repeatedly about cyber-security and the need to be more vigilant and more careful, and we’ve shared real-world stories to reinforce the concern. It’s a concern then that we still see a number of organisations that remain reluctant to increase their...

The Worst Hack in US History

The Worst Hack in US History

In the last week, we’ve seen two major successful attacks on critical US IT management and Cyber security tools. The first we learned about was on FireEye which is one of the leading and most trusted cyber security tools, used by much of the Fortune 500. ...

Look out for more ransomware in 2021

2020 saw a crazy amount of ransomware attacks.  We've warned repeatedly of the increasing sophistication and organisation of these bad actors.  Names like RangarLocker and Dharma are cyber-businesses or do it yourself cyber-crime kitsets designed to cause havoc for...

Keeping our Security tools up to speed

Keeping our Security tools up to speed

Cyber-crime is estimated to earn criminals US$7 Trillion a year That sort of money buys cyber criminals a lot of resources.  It’s no surprise then that cybercrime has its own support industries. You don’t need to access the "Darknet" to purchase hacker tools.  Many...