One Article Review

Accueil - L'article:
Source kovrr.webp Kovrr
Identifiant 8393606
Date de publication 2021-04-22 00:00:00 (vue: 2023-10-10 07:25:35)
Titre Travailler à domicile: une année en revue les entreprises sont obligées de permettre à leurs employés de travailler à distance, la surface d'attaque devient plus large.
Working From Home: A Year in ReviewAs companies are obliged to allow their employees to work remotely, the attack surface becomes broader.Read More
Texte Cyber Trends, Risks and the Global PandemicAs we mark a year of working from home through the global pandemic, this is a good time to discuss and delve into the IT changes and trends in our day-to-day work environment and their implications for user privacy, corporate cyber security and cyber insurance. The 3 main categories of software and applications that saw a significant increase in usage over the past year include:Video Conferencing and online communication platformsVPNs and Remote Desktop (RDP) softwaresTwo Factor (2FA) and Multiple Factor Authentication (MFA) applicationsWorking from home has increased the usage of the aforementioned technologies as well as other similar applications, broadened the attack surface and provided new opportunities for various malicious actors as there are more external-internal connections compared to the past, meaning more types of services to keep track of and monitor. This also implies a heavier traffic load due to video streaming, database connections and more. ‍Easier communication, but at what cost?Away from our colleagues and offices, employees have had to adapt quickly to various methods of online communication and meetings in order to keep things running, whether it’s Zoom, Webex, Microsoft Teams, Google meet or any other platform, co-workers are now able to chat, share video and documents easily from computers and phones. Right from the start of the pandemic, Zoom solidified itself as the dominant platform for video conferencing with an increase of 67% in usage between January and the middle of March 2020. By April 2020 it already had more than 300 million daily Zoom meeting participants in comparison to 10 million meeting participants in December 2019.(1)Number of daily Zoom users, December 2019 - April 2020This convenience comes with significant underlying risks to users and corporate networks, as poorly implemented encryption protocols and other security measures can result in unauthorized participants access to otherwise personal or confidential calls. This sort of intrusion, commonly referred to as “Zoom Bombing”, can be at best innocent trolling and cause annoyance but at worst allow access to a malicious actor who can gather sensitive information on the company for espionage purposes(2), harvest participants\' credentials and other PII and leak the call’s content and video as well as use the meeting chat to send phishing links which could escalate to a full-blown ransomware attack on the company\'s network(3). This sort of attack can be carried out by an attacker exploiting vulnerabilities such as (or similar to) CVE-2019-13450(4) which would allow them to forcefully join a meeting. ‍Multiple Factor Authentication - double the safety but not without risks Multiple Factor Authentication (MFA) and Two Factor Authentication (2FA) have been adopted in recent years as an additional security tool to ensure the safety of one’s accounts and personal information. As previously mentioned, the migration to a remote work routine necessitated a secure and verified method for each employee to access their company’s assets online on a daily basis. This basic work necessity came with restrictions and guidelines such as remote desktop applications to create a virtual work environment and 2FA applications in an attempt to strengthen the company’s cybersecurity posture. By May 2020, around 70% of British businesses were already using some type of MFA and a VPN for better cyber security risk management of the changed work environment(5).There are numerous ways by which MFA or 2FA methods can be bypassed, either through brute force (if the requested code is between 4-6 numbers), social engineering or a conventional session management in which attackers use the password reset function. This is due to the fact that 2FA is often not implemented on the system’s login page after a password reset.VPNs and RDPs - work from anywhere and be attacked from anywhereVi
Envoyé Oui
Condensat $137 $20 000 07083 1182 13450 2019 2020 2020this 2025 2fa 300 able access according accounts accumulated actor actors adapt additional additionally adopted affect aforementioned after allow allowing almost already also and/or annoyance another any anywhere anywherevirtual applications applicationsworking april are around assets attack attacked attacker attackers attacks attempt attributed authentication average away basic basis became because becomes been beenâ  before being best better between billion blown bombing” both breach british broadened broader brute businesses but bypassed calls call’s came can carried categories cause changed changes chat claims clicked click” client code colleagues comes common commonly communication companies company company’s compared comparison compromised computer computers conclusionâ these conferencing confidential connect connections content control controls convenience conventional corporate cost could create credentials cve cyber cybersecurity daily damage data database day days december delivers delve desktop direct discuss documents does dominant don’t double due during dynamics each easily either emails employee employees encryption end endpoints engagement engineering ensure environment escalate espionage etc evident execution exfiltrate exploit exploiting exploits exposures external fact factor first flexibility foothold force forcefully frequently from full function gains gather global good google grew grow growth guidelines had harvest has have heavier higher home home: immune implemented implications implies include:video increase increased information infrastructure innocent inside insurance interaction internal intrusion itself it’s january join just kaspersky keep kinds known lead leak level links load login longer machine machines main malicious malware management march mark market may meaning measures meet meeting meetings mentioned method methods mfa microsoft middle migration million monitor months more multiple necessary necessitated necessity need network networks new not november now number numbers numerous obliged offices often once one one’s online opportunities order organization other otherwise out over page pandemic pandemicas participants password past payloads people perimeter personal phishing phones pii platform platformsvpns poorly possible posture previous previously privacy private privileges projected prominent propagate protocols provide provided purposes quickly ransomware rdp rdps read recent recorded referred rely remote remotely requested required reset resources respectively restrictions result reviewas right rise risk risks risksâ multiple roughly routine running safety said same saw secure securely security send sensitive server services session severity share shows side significant significantly similar single social software softwarestwo solidified some sort start streaming strengthen such surface suspicious system’s targeted teams technologies than them then therefore these things through throughout time timeframe timespan too tool total track traffic trends triple trolling two type types unauthorized underlying unknown unpatched unprecedented usage use used user users using usually valuable varied various verified video virtual vital volume vpn vpns vulnerabilities vulnerability vulnerable ways webex weeks well what whether which who without work workers working wormable worst would year years zoom – ‘wormable’ “zero “zoom â the â â€easier â â€multiple
Tags Ransomware Data Breach Malware Tool Vulnerability
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: