wemakeyousoundb
hopefully not gimboid
!'l\/l l/l07 5h4r1ng D47Thanks I feel foolish now perhaps someone could be employed to produce one perfect password that we could all use from now on.
sorry, a bit tipsy leaning on pissed here
!'l\/l l/l07 5h4r1ng D47Thanks I feel foolish now perhaps someone could be employed to produce one perfect password that we could all use from now on.
Don't talk such arrant toshMy two cents on this is, they are asking for more budget. Amplify the threat ( which admittedly should already be high on this but with the current administration, imbeciles they are, you really have to make a noise).
I know this to be fact because I know which things we had to keep out of the news and which things we had to “jazz” up. Nothing is given to you as news without it being vetoed and approved. Anything that affects the share price is tantamount to treason.
Because it's utter bollocksWhy do you call it tosh?
On the one hand he is right that everything in the news has been approved by someone somewhere, generally an editor of some sort. That's obvious. You advert the military doing 'this sort of thing' to get more money. Do they really? They're not that successful at it then, given eg the way there's been an aircraft carrier without aircraft for years. Not to mention their day to day budget declining https://commonslibrary.parliament.uk/research-briefings/cbp-8175/doesnt seem that unreasonable to me.......boris is just speculating....the military does this kind of thing all the time, talking up existing events to get more money in the budget...fact is we can't say either way
Let me just point you to your talk about stories that affect the share price being seen as treason. Is it really? What about a) profit warnings being issued or b) stories that lead to the share price rising? Are they seen as treason? You make much of your experience in information security - millions of pms of support - but say nothing of your knowledge of pr or journalismIf you read the article, it talks about a LinkedIn social engineering attempt. That is very different to being hacked. It’s the first step on the NIST attack phase. No one got hacked. They are being targeted for potential exploitation. By making a noise about it, they can get a bigger budget.
We did it every year. I mean, all the business world is for is to justify your existence.
I’m sure Pickman's model with all his years in Information Security can correct me if I’m wrong.
Yeah. There was a tape back up but it was never needed until it was and the responsible person had stopped bothering to change the tape.Just the one server?
It was Hackney Community Transport. A bigger company than it sounds.Yeah. There was a tape back up but it was never needed until it was and the responsible person had stopped bothering to change the tape.
They had no idea who owed them money. The inland revenue hammered them.
It depends on how mature the company is and how large their IT estate is and what line of business you are in if you feel you have to seek out expensive solutions.Making an existing company reasonably well protected against ransomware is actually pretty expensive to do well without breaking the business while you do it.
You need expensive tools, like an EDR ( crowdstrike, sentinel1, etc ) with the MDR option ( eg falcon overwatch ), you need a good MFA deployment which needs to cover things like your VPN, email and anything else important, you need to make sure Active Directory is well setup, you need immutable backups plus some decent staff to run this.
None of this is cheap, and many companies are finding out the hard way they were badly protected.
If you’ve been doing IT on the cheap, you might get totally fucked over and it’ll probably be a surprise.
Alex
It depends on how mature the company is and how large their IT estate is and what line of business you are in if you feel you have to seek out expensive solutions.
If its a large corporation with a lot of M&A activity, multinational with a lot of geopolitical concerns. By all means address these risks with a follow the sun modeled Security analyst and incident response team. However, this is very expensive.
From a personal perspective, I always preferred open source solutions. IR and security incident reporting need to be place in order to find the actual real world applicable risks that you need to address with your budget. Having a big bucks solution is waste of money if you have no clue as to the current state of your network. You need to educate your end users as to how to detect and avoid risks that may apply to them and how to report anomalous behavior. Particularly since it became more and more apparent when speaking with major vendors security teams, that it was far more efficient to in-house the knowledge required to build your own regex expressions and (later) yara files than wait for getting a virus sample Mcafee or whoever to rebuild their pattern recognition and then push to 120,000+ hosts. Conficker was a great one to have on a network with very lax file share permissions. We were trialling Norman Sandbox at the time which made disassembly easy and we were able to assist the AV vendor in getting that to their recognition files. However, the issues came with managing such a global network and various vendors, resources and time zones.
The big bucks solutions are nothing but a waste of money if your other stuff is not in order.
I gather the British Library had a back up system which was also destroyed. Sounds like it's going to cost over £6 million to put right which is getting on for 50% of it's reserves. What a pointless waste and at a time when it's undergoing a massive expansion.
i read they were ransomed for 600k but chose not to pay it and going to down this route instead...an interesting choice!I gather the British Library had a back up system which was also destroyed. Sounds like it's going to cost over £6 million to put right which is getting on for 50% of it's reserves. What a pointless waste and at a time when it's undergoing a massive expansion.
That would be giving in to these people forever and a day. I think it's UK policy not to pay ransoms and quite right to.i read they were ransomed for 600k but chose not to pay it and going to down this route instead...an interesting choice!
FWIW I was told by one of the BL reading room security guards a few days after the attack had happened that they didn't have a backup system in place.That’s not a backup system!
Also at risk is anyone and the companies they work for who have exchanged emails with anyone at BL.FWIW I was told by one of the BL reading room security guards a few days after the attack had happened that they didn't have a backup system in place.
I've also heard (FWIW again) that those at risk aren't the BL's 'customers', but their staff.
'Customer' details held on their system - from what I recall - are names and addresses, but no financial data; last time I remember going there paying for photocopies / scans, it was via card dispenser machines that took cash or credit cards.
But the BL's staff bank details, tax codes etc will have been on the HR payroll system ... If true, I hope their unions are pushing hard on this.
The above is all rumour however, since, as has been rightly pointed out by others, the BL management have told their staff to say nothing to anyone.
15 January FFS! It's a national disgrace.