I agree with Bruce Schneier that the ransomware attacks are more intense and sophisticated , the requested fee in 2018 was $5000 and in 2020 it went up to $200,000. The criminal attackers are doing research and going after larger targets. And the ransom might not only be computers and the data it may be information that the hacker will unload to the public unless you pay them.
It behooves everyone to start dotting the i's and crossing the t's because the hackers are not staying still. Maybe you were not targeted in 2020 or in 2019, but that may not be the same in 2021 or 2022. It is nigh time to make sure and make things as difficult as possible for the hacker attackers.
I am putting the finishing touches on a book in 2021 that will help small businesses manage cybersecurity.
The Image is trying to make a point that governance includes PCI compliance and can be a basis of making proper IT decisions with the future in mind. Where the focus of compliance and regulations efforts are on specific actions and data, governance can be all encompassing and most important create an environment where proper decisions are made with the right people in the room. Nothing is missed, whereas the compliance efforts are only doing what they have to.
Is it important to focus on Security? How much should we pay attention to Computer Security? Can we relegate Computer Security or as some coin the phrase 'Cybersecurity' to an afterthought? Or at least a small line item in the plan for 2019!
Your company could have a serious problem if circumstances cause problems to cascade to a dangerous level.
So 'IF' there is a ransomware attack on the most important data that we use, and we cannot recover the data(for whatever reason) is that important enough to pay more attention?
As the image above notes in six months we could be out of business if we did not prepare properly setting up backups for our data. Sometimes ransomware just destroys data and it cannot be recovered.
Contact us to get someone to review your backup plans and more to make sure that your business will be viable even after a ransomware attack.
I went on Radio63119.org again on the 16th with the Inside and Out show with Dr. Stan Fine https://www.facebook.com/Radio63119/videos/828354904257304/ is the link to the livestream - which is online at the Radio63119 page on Facebook. Or tune your FM radio to K W R H - 92.9FM within 10-20 miles of Zip code 63119 (Webster Grove)
The main theme was Cybersecurity and how one can defend against Cyberattacks.
CrowdCyber – Use your voice to contact businesses to help them survive a Cyber catastrophe.
Will your favorite business go out of business in 6 months
after a ransomware attack? Or will they bounce back?
Check oversitesentry.com to help your local businesses defend against Cybersecurity attacks.
The show goes over the following 6 questions:
What is worst that can happen in cybersecurity?
2. How is psychology of security harming some small
businesses?
3. how to prevent a disaster in cybersecurity?
4. how can anyone with concern for small businesses help
the businesses.
5. What is crowdCyber?
6. How much time and effort should be spent on
cybersecurity?
Thursday the 2nd of January https://www.radio63119.org/thursday At 10:30am I will be on the Dr. Stan Fine Show of "Business Inside and Out with Dr. Stan Fine"
As I wrote in my blogsite www.oversitesentry.com PCI compliance is a good way to get started if you have not yet done so on the path of creating good Cybersecurity in your organization.
IF you are accepting credit cards, then you _should_ be PCI compliance standard capable. So it is a lot to take on if you have nothing, but it can be easier if you do not develop computer code so that you accept credit cards.
My slightly simplified headings:
First inventory all your systems (software and hardware).
Firewall maintenance (set up proper procedures to edit the ACL - Access Control List)
Change your default passwords (and create a password policy)
Protect stored cardholder data (if you are not developing software or have a website that you are developing - this may not be necessary)
Encrypt Cardholder data - i.e. use devices that encrypt cardholder data (or develop this properly)
Protect all systems against malware (using anti-virus software)
Develop and maintain secure applications (only if you are developing software)
Restrict access to cardholder data (if developing authenticate before giving access)
Identify and authenticate access to system components
Authentication physical access (only qualified people should access credit card systems)
Track and monitor all access to network resources and cardholder data (log systems)
regularly test security systems and procedures
Maintain a policy that addresses security information for all personnel
12 parts of PCI compliance
So from this point one can remove step 6 if there is no computer code helping you accept credit cards.
Step 4 should be handled by the credit card processor devices
Step 3,7,8, and 9 is easier with no coding.
Now all you have to focus on is 1,2,3,5,10,11, and 12 which you should be doing already, maybe you have no documentation, but it is being done (or should be).
If you ask me, 1,2,5,10,11,12 should be done no matter whether you have credit card processing or not. Someone should be accumulating bits and pieces until you have a proper security policy.
THAT is what we do!! We can help you with creating a security policy from scratch. Contact Us
NSA insights video(7/18/18) gives an overview of what is happening in their Cybersecurity Threat Operations Center.
The presentation explained when the Equifax hack happened due to a strut vulnerability the nation state actors were attacking US government networks looking for this vulnerability within 24 hours of release.
Interesting to note Dave Hogue technical director, National Security Agency(NSA) said that there is still a faulty thinking, as 1/3 of respondents to a survey think that there is a better chance of getting struck by lightning than getting cyberattacked. This thinking is clearly wrong, but the perception is there.
I agree with this assessment - there is clearly a faulty thinking in many places.
Make no mistake the regulations in America will also change (towards Cyber privacy). As self-regulation has not worked for the industry.
You may have needed a security policy for PCI(Payment Card Industry) compliance in the past, but you will likely need a way to write down what your policies are, hence the need for a security policy for many regulations today and tomorrow.
Good news on that front - At Fixvirus.com we have a spring cleaning special April - through May we will offer our Alpha scan at half price.
If you are in need to just discuss some Cybersecurity first - contact us and the half off - still stands. Half off consulting time and material up to 10 hours.
There are many projects we are involved in, but we have a strict policy of not discussing our projects with the world. For the right project, we are willing to make monetary concessions so that we can use your project as an example on our marketing efforts. We would never divulge details just general items such as:
Company ABC has improved security policy - performed Alpha scan due diligence.