Wednesday, April 19, 2017

Printer Wi-Fi Security - Your Network's Achilles Heel

Ben Vivoda, director of printing systems for HP, has warned that the threat to a business via a printer is more important than ever...

In 2016, over 70 percent of successful hacking events started with an endpoint device, Vivoda said, noting that endpoint devices are no longer restricted to PCs and notebooks...

"Typically, we're seeing the printer gets left out and overlooked and left exposed. Businesses can no longer afford to overlook print when it comes to their overall IT cybersecurity strategy." more

Spybuster Tip #523 - If the printer can be accessed without Wi-Fi, turn that feature off. If you need the Wi-Fi connection, turn the encryption feature on. If you can't tell if it is on or off, or you have too many printers to check one-by-one, call a TSCM specialist. They can quickly conduct a Wi-Fi Security and Compliance Analysis for you.

Tuesday, April 18, 2017

Corporate Boards Still Unprepared for Challenge of Cybersecurity

Tom Ridge, the former Homeland Security secretary and Pennsylvania governor, says the majority of corporate boards and CEOs are unprepared for the challenges posed by rising cyber risk.

In fact, 59% of directors report that their boards find it challenging to oversee cyber risk, and only 19% report that their boards possess a high level of knowledge about cybersecurity, he said, citing a study released in March by the National Association of Corporate Directors...

“Most board members don’t want to be technologists. We didn’t design these 16 hours for them to be technologists. We designed it for them to be better educated and to meet their fiduciary responsibilities,” Mr. Ridge said during a meeting with CIO Journal. "It’s top down. This is the CEO saying ‘we are changing now.'" more

Raising awareness comes not a moment too soon. The next step is integrating this into the corporate security program. Learn how, now.

Common Bugs

Spy tools are no longer esoteric, expensive and difficult to obtain. 

Some bugs are built into everyday objects - like pens, power strips and key fobs.

The result...
The average person can engage in eavesdropping and spying cheaply; doing it better than the professionals did only ten years ago - with less chance of being discovered. So they do!

Spy Trick Awareness

1. Digital audio/video recorders are very small, and absolutely silent. No moving parts. Inexpensive. Some are smartphone apps, others are built into wristwatches and key fobs.

The trick...
These devices are easily hidden on-the-body, or look like everyday objects. They can be activated by a timer, or when they hear sound, or see movement. Some devices can even stream live video.

In adversarial meetings, the other party may leave the room to make a call, or go to the restroom, and leave one of these behind in a coat, briefcase or notepad.

Assume you are being recorded. 


2. GSM bugs are designed to be bugs and nothing else. They are basically one-way, dumb cell phones. No keypad. No display. No speaker. They are available on the Internet for less than $20.

The trick...
The snoop plugs in a SIM card and hides the device. From then on, they can call-to-listen, from anywhere.

Some devices might have to be retrieved periodically to refresh the battery, or retrieve the recording. Other devices might be wired to the mains and transmit their data via LAN, Wi-Fi, light or radio waves.

Spybuster Tips: