• Facebook
  • Twitter
  • LinkedIn
  • OUR PARTNERS
  • TESTIMONIALS
  • BLOG
Contact Us: 0207 952 8123
Cloudscape
  • Cloud
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
    • Private Cloud
  • IT Support
    • Apple Mac Support
    • Managed IT Support
    • Network Support
    • Ongoing Support
    • PC’s & Servers
  • Telecoms
    • Hosted VoIP
  • IT Services
    • IT Relocation
    • IT Projects
    • IT Consultancy
    • GDPR Services
  • Cyber Security
  • Contact
  • Menu Menu

Tag Archive for: IT Project Management

easyJet Says Details of Nine Million Customers Accessed in Data Breach

in Cyber Security, IT Tips

easyJet has revealed that the personal data of approximately nine million of its customers has been accessed following a “highly sophisticated” cyber-attack on its system. This includes credit card details of a small subset of these customers (2208), with the airline confirming it has already taken action to contact and offer support to those individuals.

For the rest of the customers affected, email addresses and travel details were accessed. Easyjet said these customers will be contacted in the next few days to and the company will “advise them of protective steps to minimize any risk of potential phishing.”

The company took immediate steps to manage the incident once it was aware of the attack and closed off the unauthorized access. It also stated that it has notified the National Cyber Security Centre and the Information Commissioner’s Office (ICO) of the breach. The firm has not given any details on the nature of the breach.

There is currently no evidence that the information accessed has been misused; however, the airline is urging its customers to stay alert to any unsolicited communications and to be “cautious of any communications purporting to come from easyJet or easyJet Holidays.”

Johan Lundgren, easyJet chief executive officer, said: “We take the cybersecurity of our systems very seriously and have robust security measures in place to protect our customers’ personal information. However, this is an evolving threat as cyber-attackers get ever more sophisticated.

“Since we became aware of the incident, it has become clear that owing to COVID-19 there is heightened concern about personal data being used for online scams. As a result, and on the recommendation of the ICO, we are contacting those customers whose travel information was accessed and we are advising them to be extra vigilant, particularly if they receive unsolicited communications.”

The incident has come a particularly bad time for easyJet, who face the possibility of a large fine under General Data Protection Regulation (GDPR) rules.

Commenting on the breach, Felix Rosbach, product manager at data security specialists comforte AG, said: “The aviation industry is struggling at present given the current pandemic so seeing another major airline succumb to a data breach is not pleasant. On first glance, easyJet has followed the correct procedures and informed all affected customers who have had their sensitive data compromised. However, this situation could have been avoided.”

Last year, British Airways (BA) was hit by a record £183m GDPR (intention to) fine after failing to prevent a digital skimming attack in 2018.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/news

https://cloudscapeit.co.uk/wp-content/uploads/2020/05/easyjet.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-20 13:47:382020-05-20 13:48:51easyJet Says Details of Nine Million Customers Accessed in Data Breach

The Fort of Cyber Security – What is Data Encryption?

in Cyber Security, IT Tips

Encrypt your data before the Hackers do it for you…

What exactly is Data Encryption?

Encryption helps protect data you send, receive and store using any device. Including text messages, emails on your desktop, phone calls, banking information and most importantly, password logs.

It works in a simple manner, by scrambling the readable text so it can only be read by the person who has the secret code or decryption key. Providing data security for personal and sensitive information.

 

Why bother encrypting your data?

Aside from securing your sensitive data, here are the three main reasons to encrypt your data:

 

Internet privacy concerns are very real – Encryption is a key part of securing outgoing and inbound data, making sure the information you send out isn’t readable let alone viewable by anyone other than the intended recipient. Encrypt every single message.

Hacking is no longer a hobby, it’s a big business – Cybercrime is a professional, global enterprise. Large-scale breaches are now demonstrated with ease, purely for the financial gain.

Regulations demand protection – Depending on the industry, certain acts and regulations now enforce encryption as compliance in securing public data & information held and distributed online.

Never underestimate the importance of securing your data; whether it’s from a backup perspective, or from the very beginning. All it takes is one intercepted email and your data could be breached within hours.

 

How do you encrypt data?

Data Encryption is the method of taking plain, readable text, like a text message or email, then scrambling it into an unreadable format — called “cypher text.” Helping protect the confidentiality of online data either stored on IT systems or transmitted over a network.

When the intended recipient acquires the message, the information is translated and reverted back to its readable form, otherwise known as decryption. Usually, in order to gain access to the message, both the sender and the receiver have to use a ‘secret encryption key’, being a collection of algorithms that scramble and unscramble data back to its original form.

There are multiple types of encryption, each designed with unique requirements and security measures in mind.

 

** Get your FREE pinpoint guide on Data Encryption below **

>Download the guide here<

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

https://cloudscapeit.co.uk/wp-content/uploads/2020/03/Encryption.jpg 295 786 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-18 07:00:492021-02-08 10:37:16The Fort of Cyber Security – What is Data Encryption?

Ransomware Costs Could Reach $70m

in Cyber Security, IT Tips

IT services giant Cognizant has admitted that a ransomware attack it suffered back in April may end up costing the company as much as $70m.

The firm announced revenue of $4.2bn for the first quarter of 2020, an increase of 2.8% year-on-year. In this context, the $50-70m hit it expects to take in Q2 from the ransomware attack will not make a huge impact on the company.

However, the big numbers involved are illustrative of the persistent financial threat posed by ransomware, not to mention the reputational impact on customers.

CEO Brian Humphries claimed on an earnings call that the company responded immediately to the threat, proactively taking systems offline after some internal assets were compromised. However, the resulting downtime and suspension of some customer accounts took their toll financially.

“Some clients opted to suspend our access to their networks,” he explained. “Billing was therefore impacted for a period of time, yet the cost of staffing these projects remained on our books.”

Remote workers were also affected as the attack hit the firm’s system for supporting its distributed workforce during the current pandemic.

It does appear, however, that on this occasion the Maze attackers were not able to steal sensitive internal data from Cognizant servers, as is usually the case with high-profile victims of the gang.

Nobody wants to be dealt with a ransomware attack,” Humphries said on the call. “I personally don’t believe anybody is truly impervious to it, but the difference is how you manage it, and we tried to manage it professionally and maturely.”

Maze was in action most recently to target a Minnesotan egg supplier, one of the country’s largest.

Victim organizations are estimated to have paid out in excess of $6bn to ransomware attackers last year, but the real cost could be many times more, according to Emsisoft.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/news

https://cloudscapeit.co.uk/wp-content/uploads/2020/05/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg 880 1100 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-11 16:58:152020-05-11 16:59:53Ransomware Costs Could Reach $70m

Data Breach Exposes Four Million Dating App Users

in Cyber Security, IT Tips

Almost four million users of a popular Android dating app have had their personal and log-in data stolen by hackers, according to Risk Based Security.

The security vendor said it found the data on a prominent hacking forum — now free for anyone to access, although it had been previously up for sale.

It’s associated with nearly 3.7 million users of MobiFriends, a Barcelona-based dating app. The information was originally posted to the forum in January of this year by a threat actor named “DonJuji,” but is attributed to a breach in January 2019.

The data includes dates of birth, gender, website activity, mobile numbers, usernames, email addresses and MD5 hashed passwords.

“The MD5 encryption algorithm is known to be less robust than other modern alternatives, potentially allowing the encrypted passwords to be decrypted into plaintext,” warned Risk Based Security.

“Moreover, the data leak contains professional email addresses related to well-known entities including: American International Group (AIG), Experian, Walmart, Virgin Media and a number of other F1000 companies. This creates a notable risk of business email compromise as well as potential spear-phishing campaigns.”

MobiFriends has yet to respond to the researchers who found the data.

The number of records exposed in data breaches soared by 273% quarter-on-quarter to reach a record 8.4 billion in Q1 2020, according to Risk Based Security. However, the number of publicly reported incidents was down by 42% during the same period.

“The increase in records compromised was driven largely by one breach; a misconfigured Elasticsearch cluster that exposed 5.1 billion records. However, even if we adjusted for this incident, the number of records still increased 48% compared to Q1 2019,” said Inga Goddijn, executive vice-president at Risk Based Security.

“Hacking exposed an average of approximately 850,000 records per breach and most breaches originated from outside the organization. We are continually finding that simply meeting regulatory standards or contractual obligations does little to actually prevent a breach from occurring.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/news

https://cloudscapeit.co.uk/wp-content/uploads/2020/05/nadine-shaabana-DRzYMtae-vA-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-11 16:56:252020-05-11 16:57:59Data Breach Exposes Four Million Dating App Users

The Fort of Cyber Security – What is Malware?

in Cyber Security, IT Tips

The existence of Malware is to cause chaos, don’t invite it into your Business

What exactly is Malware?

Malware is a contraction of malicious software. The pieces of software that are specifically designed with the intent of causing damage to devices, the aim of stealing private data or to simply cause destruction and chaos.

Often designed by a group of cybercriminals or hackers, looking to make money from either selling the software over the dark web, or by spreading the malware content themselves. Regardless of where the malware started from or who spreads it, if it ends up on your PC, it’s not good news.

 

What are the different types of Malware?

Coming in all different shapes and sizes, with a variety of forms, some types are much more harmful than others:

 

Computer Viruses – Anything that’s clean, viruses attach themselves to infect files, spreading uncontrollably damaging anything and everything in its path. Usually appearing as .exe files within your system.

Trojans – Disguised as what you think is legitimate software, or hidden with software that was once legitimate. Acts discreetly and creates back-doors within your security to let malware in.

Spyware – Spyware, as you can probably guess, is malware specifically designed to spy on you, your actions and what you get up to. tracking your browsing habits, noting passwords entered and learning all your security procedures.

Ransomware – Malware that locks down your system, encrypts your files and will threaten to erase everything until you pay a hefty ransom.

Worms – Just a wriggly, if not more with your IT Network. Worms infect entire networks of devices, either locally or across the internet by using network interfaces. Using infected machines as it goes to infect others.

Adware – Not the most malicious in nature, simply aggressive advertising software that undermines your security to serve you an obscene amount of pop-ups, which can allow other malware content to sneak in.

How do you prevent Malware?

When it comes to preventing malware, it’s more advised to follow rules to block it in the first place, instead of trying to find a cure to remove it from your IT systems after. There are a few common-sense practises to follow to avert malware from entering your infrastructure.

 

Don’t trust anyone online; Hackers have and will use social engineering to specifically target you, including strange emails, sudden alerts as well as fake profile and special offers too good to be true. If you don’t know what something is, don’t click on it.

Check your downloads; From official storefronts to dark websites that lurk in the corner of the internet, wherever you plan to download a file, be cautious that it could still be infected, regardless of where you found it.

Ad-blockers are the key; With advertising so prominent on websites, not all of them are what they seem. Hackers can use infected banners to trigger downloads once clicked, be wary to click on any that seem enticing.

Browse carefully; Sticking to trustworthy sites is always the best way forward. Malware can be found anywhere, but mostly in small, locally hosted websites with poor security standards in place, don’t run the risks.

 

Even if you follow all the steps, there’s, unfortunately, no guarantee that you’ll remain malware-free. Given the fact that worms have evolved from the depths of the ground to travel across your IT network infecting machines as it goes, no one is deemed safe.

** Get your FREE pinpoint guide on Malware below **

>Download the guide here<

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

https://cloudscapeit.co.uk/wp-content/uploads/2020/03/Malwaere.jpg 295 786 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-11 06:00:192020-03-16 16:28:15The Fort of Cyber Security – What is Malware?

Remote Workers Failing on Password Security

in Cyber Security, IT Tips

Remote workers may be exposing their personal and business accounts to the risk of takeover because of poor password security, according to new studies released on World Password Day.

The annual event exists to remind users of the importance of using strong, unique credentials – ideally in combination with multi-factor authentication (MFA) – and storing them securely.

It’s particularly important in the context of today’s highly distributed workforces, which are under lockdown at home due to the COVID-19 pandemic.

However, a global OneLogin study of 5000 remote employees from Germany, France, the UK, Ireland and the US found that nearly a fifth (17%) share their work device password with a spouse or child. Over a third (36%) admitted not having changed their home Wi-Fi password in over a year.

This figure rose to 50% in the UK, with the same number of Brits not having changed their device password since they started remote working.

Organizations will have to improve their home working policies if distributed working is more commonplace once the pandemic recedes.

“This global remote work study shines the light on the importance of ensuring the right people are accessing internal and customer data at all times,” said OneLogin CEO, Brad Brooks. “It underscores the importance of protecting employees and their entire organizations, aligning with privacy and security best practices around the world.”

On a similar theme, a CallSign study of nearly 4500 US and UK adults, found that over half (54%) have no plans to update their work logins for remote access, despite 60% having received information and tooling to do so.

On the positive side, new Centrify research has claimed that over two-thirds (70%) of UK businesses are using MFA and virtual private networks (VPNs) to improve remote working security.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/news

https://cloudscapeit.co.uk/wp-content/uploads/2020/05/victoria-heath-MAGAXAYq_NE-unsplash.jpg 658 1100 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-07 16:28:312020-05-07 16:31:40Remote Workers Failing on Password Security

Public Sector Ransomware Attacks Rage On

in Cyber Security, IT Tips

To pay or not to pay continues to be the question as ransomware targets cities, even amid COVID-19.

To pay or not to pay? That is the question many public-sector organizations must grapple with when faced with a complex ransomware attack – even while the COVID-19 pandemic rages on around them.

Ransomware attacks to municipal, local, and state government agencies are on the rise. Places as prominent as Los Angeles County and Atlanta and as small as Lake City, Fla. have all found themselves at the mercy of relentless attackers seeking extortion fees in exchange for mission-critical data.

 

In 2016, there were a reported 46 ransomware attacks perpetrated against public sector agencies. In 2018, the total came to 53 attacks. Then last year, there was a big spike to more than 140 cities and counties across the U.S. being hit with ransomware attacks. There are also likely more that have not been publicized, due to the embarrassing nature of falling prey to such crimes.

There’s no evidence of things slowing down in 2020 – even as a ransomware tactic called “double extortion” has been rapidly adopted since the beginning of the year by various cybercriminals behind the Clop, DoppelPaymer, Maze and Sodinokibi ransomware families.

 

Why Do Attackers Like the Public Sector?

Unlike state-sponsored attacks, the recent spate of attacks in the public sector doesn’t seem to be bent on stealing intellectual property. The goal is financial but still ends up having a huge impact on the operations of the target, potentially harming important services such as police and fire departments. Ransomware attacks also incur massive clean-up fees, a cost that is in part passed on to taxpayers.

But why have public-sector organizations become an attractive target?

Sadly but true, governments often do not allocate enough spending on security projects, making them easier targets for attackers: “Public sector organizations are a soft target,” said Bill Siegel of Coveware. “They’re underfunded and using hardware and software that should have long been replaced.”

To illustrate this point, a recent study found that one out of three local government CIOs report using outdated technology, making them more vulnerable to cyberattacks.

Public-sector organizations also must meet additional requirements that their corporate counterparts don’t face. For example, agencies have additional requirements about public disclosure when a cyber-event occurs. With this public disclosure comes heightened media attention, headlines and copycat attacks.

And in a worrisome trend, attackers are demanding higher payments to release the hostage data, and often, they time their attacks to hit at the most sensitive moments. For example, a spate of ransomware attacks on schools last year in Louisiana was timed perfectly to occur in mid-August, just before the beginning of the school year. In March, Albany, New York State’s capital, admitted it had been hit with ransomware on a quiet Saturday morning, with few IT people on hand to deal with the situation.

 

Paying the Attackers – What is the Right Approach?

Perhaps most significant of all, some victims are opting to pay the ransom fee to have their data restored. In July, the two hacked Florida towns, Lake City and Riviera Beach, paid $460,000 and $600,000, respectively, to attackers. This goes directly against FBI directives that victims shouldn’t pay ransom fees; the FBI notes that paying up simply emboldens attackers and proves to them that their methods work.

This tack by the FBI is fine and well – in theory. But when the operation of your city is on the line – when police officers cannot write out tickets, 911 call-centre operators cannot get location data on accident victims, and government services are taken offline for weeks – paying the ransom begins to look like a more practical option. As such, many security consultants say that payment is the fastest, least costly way to get systems back up and running.

But even paying up doesn’t guarantee that cities and states will see their data again. After all, we are dealing with criminals here. There are numerous accounts of victims who have paid ransom fees for various reasons and did not receive the decryption key they were promised to get their files back. And if they did get the key, in many cases, it didn’t work.

This was what happened in 2017’s NotPetya attack. The ransomware-like virus devastated shipping giants, drug companies and others around the world in a matter of days. Some victims opted to pay to get their precious data back – but alas, NotPetya’s creators never intended on returning any data – it was a wiper, demolishing the data it promised to restore. These unfortunate targets wound up paying for data they never got back, along with paying to have their systems restored.

And so, it goes; budgetary concerns compel government organizations to place less importance than they should on security, so they become easier prey for attackers. The amount of money spent dealing with the outcomes of that decision (i.e., remediation, recovery, compensation and ransomware payments themselves) dwarfs the costs of getting set up with a more robust security infrastructure in the first place.

 

Browser Isolation and Zero Trust

Benjamin Franklin once said, “An ounce of prevention is worth a pound of cure”; this could not be truer in security. Public-sector organizations need to ensure that threats like ransomware cannot get a foothold in their network to begin with. Much of today’s worst ransomware variants enter organizations via spam emails and infected websites.

Fortunately, there are tools that can help. Implementing tools like a remote browser isolation (RBI) software, for instance, ensures that ransomware and other web-based threats cannot make their way onto endpoints. Using RBI, all website content is rendered by a virtual browser located in a disposable container in the cloud, air-gapped from endpoints.

Meanwhile, the zero-trust concept, summarized as “trust no one, verify everything,” is revolutionizing many IT cybersecurity infrastructures. When considering their employees’ use of the web, public-sector agencies can avoid many cyber threats if they assume that no site, whether a user browses to it or connects to it via a link in an email, can be trusted as secure. Organizations must simply stop trusting and start verifying, always.

Unfortunately, ransomware is a threat that is continuously evolving and shifting gears. Therefore, it’s imperative that organizations analyze their current security strategy to safeguard against sophisticated threats and attacks. Having to make the hard call between paying up or losing data and having operations disrupted can be avoided by prioritizing some key zero-trust security investments that can keep ransomware out of your system in the first place.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://threatpost.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/05/georgia-cyberattack.jpeg 522 800 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-04 10:39:062020-05-04 10:39:06Public Sector Ransomware Attacks Rage On

Salt Bugs Allow Full RCE as Root on Cloud Servers

in Cyber Security, IT Tips

Researchers say the bugs are easy to exploit and will likely be weaponized within a day.

The open-source Salt management framework contains high-severity security vulnerabilities that allow full remote code execution as root on servers in data centres and cloud environments. And in-the-wild attacks are expected imminently.

According to F-Secure researchers, the framework, authored by the company SaltStack but also used as an open-source configuration tool to monitor and update the state of servers, has a pair of flaws within its default communications protocol, known as ZeroMQ.

A bug tracked as CVE-2020-11651 is an authentication bypass issue, while CVE-2020-11652 is a directory-traversal flaw where untrusted input (i.e. parameters in network requests) is not sanitized correctly. This, in turn, allows access to the entire filesystem of the master server, researchers found.

 

The bugs are especially dangerous given the topography of the Salt framework.

“Each server [managed by Salt] runs an agent called a ‘minion,’ which connects to a ‘master,’” explained F-Secure, in a writeup on Thursday. “[A master is a] Salt installation that collects state reports from minions and publishes update messages that minions can act on.”

These update messages are usually used to change the configuration of a selection of servers, but they can also be used to push out commands to multiple, or even all, of the managed systems, researchers said. An adversary thus can compromise the master in order to send malicious commands to all of the other servers in the cluster, all at the same time.

Lapses in Protocol

To communicate, the master uses two ZeroMQ channels. As F-Secure explained, one is a “request server” where minions can connect to report their status (or the output of commands). The other is a “publish server” where the master publishes messages that the minions can connect and subscribe to.

The authentication bypass can be achieved because the ClearFuncs class processes unauthenticated requests and unintentionally exposes the “_send_pub().” This is the method used to queue messages from the master publish server to the minions – and thus can be used to send arbitrary commands. Such messages can be used to trigger minions to run arbitrary commands as root.

Also, “the ClearFuncs class also exposes the method _prep_auth_info(), which returns the root key used to authenticate commands from the local root user on the master server. This root key can then be used to remotely call administrative commands on the master server. This unintentional exposure provides a remote unauthenticated attacker with root-equivalent access to the salt master.”

As for the directory traversal, the “wheel” module contains commands used to read and write files under specific directory paths.

“The inputs to these functions are concatenated with the target directory and the resulting path is not canonicalized, leading to an escape of the intended path restriction,” according to the writeup. “The get_token() method of the salt.tokens.localfs class (which is exposed to unauthenticated requests by the ClearFuncs class) fails to sanitize the token input parameter which is then used as a filename, allowing…the reading of files outside of the intended directory.”

The bugs together allow attackers “who can connect to the request server port to bypass all authentication and authorization controls and publish arbitrary control messages, read and write files anywhere on the master server filesystem and steal the secret key used to authenticate to the master as root,” according to the firm.

According to the National Vulnerability Database, “The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt-master and/or run arbitrary commands on salt minions.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://threatpost.com

https://cloudscapeit.co.uk/wp-content/uploads/2020/05/james-sutton-FqaybX9ZiOU-unsplash.jpg 733 1100 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-04 10:32:402020-05-04 10:36:00Salt Bugs Allow Full RCE as Root on Cloud Servers

The Fort of Cyber Security – What is good Password Security?

in Cyber Security, IT Tips

A password is a drawbridge to your entire digital world… don’t make it weak

What exactly is good Password Security?

Passwords are the digital keys to your online network of almost everything; friends, family, work and your financial accounts. If you take the risk and disregard the strength & integrity of your passwords, you’ll probably find that many other people also know what it is.

The aim is to form a memorable, yet strong password that won’t be easily broken. The two most important passwords are those for your email and social network accounts, if someone has access to your email, they can ‘forget password’ their way into all of your other accounts. Enabling them to scam your friends with dangerous links, fraudulent messages asking for money… Passwords are important, it may be the last line between you and a cybercriminal.

 

How do they attack our passwords?

There are various methods that can be used to crack passwords, below is a list forming of the multiple techniques that cybercriminals will use to break into your personal accounts:

 

Dictionary attacks – Using simple files that contain words found in the dictionary, you now understand why you shouldn’t use normal words in your passwords…

Brute force attacks – Similar style to the dictionary attacks, brute force also lets the hacker detect non-dictionary words by working through all possible alpha-numeric combinations, (e.g. aaa1 to zzz9). It’s not a fast process, but it will uncover your password eventually.
Rainbow table attacks – If rainbows were actually hashes of all possible password combinations for any given hashing algorithm, I don’t think we’d appreciate them as much. Opposed to the name, rainbow tables are huge, unwieldy things that require a lot of computer power.

Phishing – The simplest method, get the user to do it for you… just by simply asking for it. (Check out Phishing here).

Social Engineering – As the name suggests, the art of phishing, but gathering the information yourself.

Malware – Such as keyloggers, screen scrapers… pieces of malware that are hidden on your system, recording and scanning your passwords.

Guessing – You’d be surprised how easy it is to guess passwords, a high percentage of people don’t take passwords seriously and will often make passwords from pets names, foods, surnames… it doesn’t take a specialist to figure out ‘Jake1234’.

Never underestimate the importance of securing your data, having multiple, unique passwords for every account you access is vital in protecting your business.

 

How do you make a strong, secure password?

Beginning with the obvious, no dictionary words, names or facts about you, pet names or locations; a strong password is a mixture of letters, numbers, symbols and ambiguous characters. for Example, ‘D56@h]!$vVcs09yH‘. The longer the password, the harder it is to crack.

 

There are various practises that you should stick by in order to maximise security:

 

– Use Two-Factor-Authentication whenever possible

– Use a combination of Capital letters, lowercase, numbers and symbols alike the example above

– Don’t use simple, common passwords… qwerty… or Dog123456

– Make sure your passwords are at least 10 characters long

– Don’t use any speaking words, as seen by the dictionary attack, it’s too easy to crack

– Change your passwords regularly, you never know if you’ve been hacked

 

Choosing a password is entirely up to the user. The best password is one that doesn’t make any sense.

 

** Get your FREE pinpoint guide on Password Security below **

>Download the guide here<

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

https://cloudscapeit.co.uk/wp-content/uploads/2020/03/Password.jpg 295 786 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-05-04 07:00:482020-03-16 16:27:58The Fort of Cyber Security – What is good Password Security?

The Fort of Cyber Security – What is Ransomware?

in Cyber Security, IT Tips

How to protect your business against Ransomware

What exactly is Ransomware?

Ransomware is a form of malicious software. Which locks and encrypts your computer or device data, then demands a ransom to restore your access.

The cybercriminal uses your own information against you, the files are still on your computer, however, they’re all encrypted and completely out of your control. They give you a set period of time and threaten to wipe the system if you don’t pay, causing many businesses to pay the ransom almost immediately.

Nevertheless, they’re not as kind as you may think… if you pay up and demand access back to your system, it doesn’t mean they will. You’re then out of pocket, still without all your data. Worst-case, if you pay up and they do return your files, they now know you’re able to pay up, don’t be surprised if they lock you out of your data again.

 

What are the different types of Ransomware?

Coming in all different shapes and sizes, with a variety of forms, some types are much more harmful than others:

 

Crypto Malware – The most harmful form of ransomware, the ability to encrypt everything on your system, once it’s started, you no longer have any control over your files, until you pay the ransom of course.

Screen Lockers – Infects your operating system to completely lock you out of your computer or device, making it impossible to access any of your files.

Scareware – As its name states, it’s used to scare you. Fake software claiming to be an antivirus and demands money for ‘finding issues with your computer’.  Some types lock you out but others mostly flood your screen with pop-ups and persistent alerts.

Doxware – Otherwise known has leakware, hackers will gain access to and will threaten to leak all your private documents, pictures and information, most victims will pay once their files have been hijacked.

 

How do you prevent being targeted by Ransomware attacks?

Ransomware is a popular money-making market for hackers and can be hard to stop. Prevention is the most important aspect of securing sensitive data. To block cybercriminals and help safeguard yourself from a ransomware attack, keep these points in mind:

  • Use security software with Advanced Threat Protection; Install trusted security suites to protect your data, you need more than just anti-virus.
  • Keep your Security software as well as your Operating System up to date, on the latest version at all times.
  • Never open email attachments or embedded links without analysing them first, you never know what it might be. similar to Phishing, you can be easily caught out into installing malicious content without you even knowing.
  • Be cautious of emails with attachments that require you to enable macros to view its content, once you enable macros, the malware inside is activated and will enter your system.
  • Use cloud services, they’re fantastic for mitigating ransomware infections
  • Don’t pay the ransom, yes you have a time limit and they’re threatening you with your won files, but a cybercriminal can ask you to pay over and over again and still never release you files, they locked you out, they won’t be kind and let you back in.

 

** Get your FREE pinpoint guide on Ransomware below **

>Download the guide here<

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

https://cloudscapeit.co.uk/wp-content/uploads/2020/03/Ransomware.jpg 295 786 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-04-27 07:00:322020-03-16 16:27:44The Fort of Cyber Security – What is Ransomware?
Page 10 of 13«‹89101112›»

Recent Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners
  • Remote work is here to stay — but it will not be cheap or easy
  • Is remote working putting you at regulatory risk?
  • 5 Ways To Make Remote Working Your New And Better Normal
  • How hybrid work models are altering cloud strategies
  • Top metrics for effective multicloud management

Archive

Categories

Pages

  • Adapt. Evolve. Grow. Guide
  • Business Continuity Health Check
  • Cloud Services
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
  • Computer Support London
  • Free IT AUDIT
  • Home
  • IT Consultant London
  • IT Services
    • Cyber Security Services London
    • IT Consultancy NEW
    • IT Projects
    • IT Relocation
    • Make Your Business GDPR Compliant
  • IT Support
    • Apple Mac Support
    • Network Support
    • Ongoing Support
    • PC & Server Support
  • Managed IT Support for London
  • Microsoft 365 Secure Landing Page
  • Network Solutions
  • Privacy
  • Private Cloud
  • Tailored for Financial Services and Accounting
  • Thank You
  • Hosted VoIP

FREE IT Technology Audit

Get the most from your technology with a
FREE IT Support Solutions Audit – worth £300.
We‘ll produce a full network report covering 30 key areas in your business. This will give you a great idea where your IT systems need the most attention and importantly where cost savings might be achieved! There is no obligation on your part – the report is completely FREE OF CHARGE

Recent Blog Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners

IT Support for London

Cloudscape IT
47 Oxford Drive
Magdalen Street
London
SE1 2FB

0207 952 8123
Email: info@cloudscape.it

© 2025 Cloudscape IT LTD. Registered in England & Wales No. 04565979. Registered Office - 47 Oxford Drive, Magdalen Street, London, England, SE1 2FB. All rights reserved.
  • Facebook
  • Twitter
  • LinkedIn
Scroll to top