Insights

Insights

Subscribe to Monthly Top of Mind Educational Content

By Rob Kleeger 14 Mar, 2024
Cyber Security Review has informed Digital4nx Group, Ltd., after their extensive evaluation by their team, that Digital4nx Group is featured as one of the “Top 10 Security Advisory Service Companies 2023”. In addition to the award, Enterprise Security featured Digital4nx Group and their founder Rob Kleeger in their publication online .
01 Apr, 2022
Digital4nx was recently retained in a post-incident response investigation of a highly targeted spear phishing email attack. Based upon the available evidence and confirming with LifeScienceCo (“LSC”), the attack began on or around January 25, 2022. The victims targeted were between the LSC’s Assistant Controller and the accounting supervisor of their Client.  The attack succeeded in having Client divert an approximate $730,000 payment of legitimate invoices to a fraudulent bank account. The attacker appeared to have used a common BEC – Business Email Compromise techniques possibly executing a carefully planned man-in-the-middle (MITM) attack. The attackers use of the lookalike domains technique, present a severe threat. Not only to the originally attacked organization but also to the third-parties with whom they communicated using the lookalike domain. Typically, the attack scheme works by sending phishing emails to high profile individuals in the target organization to gain control of the account and carry out extensive reconnaissance to understand the nature of business and the key roles inside the company.
30 Mar, 2022
Enterprise Security has informed Digital4nx Group, Ltd., after their extensive evaluation by their team, that Digital4nx Group was going to be featured as one of the “Top 10 Digital Forensics Service Companies 2022”. In addition to the award, Enterprise Security featured Digital4nx Group and their founder Rob Kleeger in their publication in print and online .
11 Mar, 2019
I am sure that most people today are simply tired with the consistent news about hacking the election, a financial services firm who has been compromised, or worse your PII (Personally Identifiable Information) and PHI (Protected Health information) is being sold on the Dark Web.  A majority of computer users suffer from “security fatigue” — a weariness of or reluctance to engage with Cyber Security — that leads them into risky behavior online, according to a new study by scientists from NIST (The National Institute for Standards and Technology). In short, they found that users’ weariness led to feelings of “resignation, loss of control, fatalism, risk minimization, and decision avoidance, all characteristics of security fatigue.” In turn, that made them prone to “avoiding decisions, choosing the easiest option among alternatives, making decisions influenced by immediate motivations, behaving impulsively, and failing to follow security rules” both at work and in their personal online activities including banking and shopping. The report’s authors write, “Users are tired of being overwhelmed by the need to be constantly on alert, tired of all the measures they are asked to adopt to keep themselves safe, and tired of trying to understand the ins and outs of online security. All of this leads to security fatigue, which causes a sense of resignation and a loss of control.” These findings have direct implications for businesses that are legally required to protect personal and financial data, including retailers, financial and healthcare businesses, law and other professional marketing services. Cybercrime activities like phishing, spear phishing, business email compromise and social engineering all rely on innocent but unwary employees being led to do the cyber criminal’s dirty work. IF THE US GOVERNMENT, FORTUNE 500 COMPANIES, HIGH TECH FIRMS, FINANCIAL INSTITUTIONS, HEALTH CARE ORGANIZATIONS AND UNIVERSITIES WITH ALL OF THEIR RESOURCES WERE UNABLE TO STOP THE ATTACKS… WHAT POSSIBLE CHANCE CAN A SMALL/MEDIUM BUSINESS HAVE? The answer is: more than you would think. Digital4nx Group, Ltd. recognizes that the greatest vulnerability in most organizations comes from their own people. We have been providing fixed fee “ethical hacking” Security assessments, which we define as, a service where we attack your network and computer systems using real-world tools and techniques in order to find security weaknesses. The goal of an ethical hack security exercise is not to reveal deficiencies in the performance of your IT team, but rather to support them. We often find that IT teams are pressured to make things easy-to-use and functional, maintain software updates and patches, and keep the users up and running. Our ethical hacking assessment aids the IT team, giving them a road-map for making their networks much more secure, identify the sensitive information which the organization maintains, and improve the best reasonable security measures for that organization. Having an independent team of experts audit your security is a valuable tool that is guaranteed to uncover vulnerabilities and greatly increase your level of security. Even small businesses can interrupt this chain of events at several points, making it much more difficult for a cybercriminals to gain a foothold. We commonly find that we gain some of the initial access to a companies systems by tricking users into providing their passwords. Once we have those passwords, we can leverage them to gain additional access to other systems. The below techniques are simple and inexpensive: Make sure everyone in your company understands phishing schemes and how to recognize them. A phishing scam is an attempt to trick someone into providing username and password information to a hacker. Spearphishing is a phishing attack customized to a particular individual. Do not allow people to have administrative privileges on their computers. This prevents them (or viruses acting under their credentials) from installing hacking tools on a computer. Change passwords regularly and use different passwords for different accounts. In other words, the password to your work computer should be different from the one you use on, say, your Yahoo account. Password manager software (such as LastPass, KeePass, Dashlane,…) makes it easy to track and change passwords. Ensure your computers install security updates from Microsoft, Apple, and Adobe automatically. Install antivirus software on your computers Install a firewall if you don’t have one, and review your firewall to tighten it up as much as possible. A firewall is a device that stands between your network and the rest of the world, blocking unauthorized access. Configure spam filters to be as restrictive as possible and use Sender Policy Framework (SPF) records to reduce the likelihood of phishing messages. Confirm backups run regularly and periodically test those backups.
Share by: