

Publish Date
27/07/2023
Categories
Blogs Hot Topic
In today’s digital world, where data breaches and cyber attacks are on the rise, ensuring robust cybersecurity measures has become a paramount concern for businesses and individuals alike. One essential concept that plays a crucial role in securing sensitive information and safeguarding critical systems is “Least Privileged Access.”
In this article, we will delve into the meaning of least privileged access and its significance in maintaining a strong security posture for organisations.
What is Least Privileged Access?
Least Privileged Access (LPA), also known as the Principle of Least Privilege (POLP) or the Principle of Least Authority, is a security principle that advocates providing users, applications, or processes with only the minimum level of access required to perform their specific tasks and responsibilities. In simpler terms, it means granting individuals or software just enough permissions to carry out their job functions and nothing more.
The rationale behind this principle is to reduce the potential attack surface and limit the damage that malicious actors or errors can cause if a breach occurs. By adhering to the least privileged access approach, organisations can prevent unauthorised access, data leaks, and unauthorised modifications to critical systems, thereby bolstering their overall cyber security posture.
How Does Least Privileged Access Work?
Implementing least privileged access requires a thorough evaluation of user roles, access rights, and the data or resources they need to perform their duties. Here’s a step-by-step breakdown of how it works:
Benefits of Least Privileged Access
As technology continues to evolve, organisations must remain vigilant in their commitment to upholding strong security practices. Embracing least privileged access should be viewed as an essential part of a comprehensive cybersecurity strategy, ensuring that critical systems and data remain safe from harm in an ever-changing threat landscape.
If you’d like to learn more about how Cobweb can help implement a least privileged access strategy, please get in touch.
Download our free guide to find out more about how you can implement an effective backup strategy for your business.
Publish Date
22/11/2022
Categories
Blogs
We’re often told that the passwords to access our online accounts should be really strong, and not to use them anywhere else. This is especially true for the password for your email account. If you’ve used the same password across different accounts, cyber criminals only need one password to access all your accounts.
Always use a strong and separate password for your email; that is, a password that you don’t use for any of your other accounts, either at home or at work.
If you have re-used your email password across other accounts, change your email password as soon as possible. It should be strong and different to all your other accounts.
Ideally, you should use unique passwords for all your important online accounts (such as banking accounts, shopping/payment accounts and social media accounts), not just your email account. You should also provide additional protection by setting up 2-step verification (2SV) on your email account, which will prevent a criminal from accessing your email account even if they know your password.
Weak passwords can be cracked in seconds. The longer and more unusual your password is, the harder it is for a cyber criminal to crack.
The trouble is, most of us have lots of online accounts, so creating different passwords for all of them (and remembering them) is hard.
This is where a password manager can help. A password manager can store all your passwords securely, so you don’t have to worry about remembering them. This allows you to use unique, strong passwords for all your important accounts (rather than using the same password for all of them, which you should never do).
In addition, many password managers are helpful because they can:
To find out more about LastPass, Cobweb’s Password Manager Solution, get in touch with the team today!
Publish Date
21/11/2022
Categories
Blogs Hot Topic
Malware is malicious software, which – if able to run – can cause harm in many ways, including:
Ransomware is a type of malware that prevents you from accessing your computer (or the data that is stored on it). The computer itself may become locked, or the data on it might be stolen, deleted or encrypted. Some ransomware will also try to spread to other machines on the network, such as the Wannacry malware that impacted the NHS in May 2017.
Usually, you’re asked to contact the attacker via an anonymous email address or follow instructions on an anonymous web page, to make payment.
The payment is invariably demanded in a cryptocurrency such as Bitcoin, in order to unlock your computer, or access your data. However, even if you pay the ransom, there is no guarantee that you will get access to your computer, or your files.
Occasionally malware is presented as ransomware, but after the ransom is paid the files are not decrypted. This is known as wiper malware.
For these reasons, it’s essential that you always have a recent offline backup of your most important files and data.
It is essential to plan for any incident. When creating your plan consider the following points, which should help you clarify the level of security you require and the budget you will allocate:
*Contains public sector information licensed under the Open Government Licence v3.0.
Inside the guide, we cover:
Publish Date
16/11/2022
Categories
Blogs Hot Topic
Think about how much you rely on your business-critical data. Customer details, quotes, orders, and payment details. Now imagine how long you would be able to operate without them.
All businesses, regardless of size, should take regular backups of their important data, and make sure that these backups are recent and can be restored. By doing this, you’re ensuring your business can still function following the impact of flood, fire, physical damage or theft. Furthermore, if you have backups of your data that you can quickly recover, you can’t be blackmailed by ransomware attacks.
Protecting your organisation from malware Malicious software (also known as ‘malware’) is software or web content that can harm your organisation, such as the recent Uber hack.
The most well-known form of malware is viruses, which are self-copying programs that infect legitimate software.
Mobile technology is now an essential part of modern business, with more of our data being stored on tablets and smartphones. What’s more, these devices are now as powerful as traditional computers, and because they often leave the safety of the office (and home), they need even more protection than ‘desktop’ equipment.
Your laptops, computers, tablets, and smartphones will contain a lot of your own business-critical data, the personal information of your customers, and also details of the online accounts that you access.
It is essential that this data is available to you, but not available to unauthorised users. Passwords – when implemented correctly – are a free, easy, and effective way to prevent unauthorised users from accessing your devices.
In a typical phishing attack, scammers send fake emails to thousands of people, asking for sensitive information (such as bank details), or containing links to bad websites. They might try to trick you into sending money, steal your details to sell on, or they may have political or ideological motives for accessing your organisation’s information.
Phishing emails are getting harder to spot, and some will still get past even the most observant users. Whatever your business, however big or small it is, you will receive phishing attacks at some point.
If you would like help or advice about implementing these security measures fill in this form to discuss with one of our security experts.
*Contains public sector information licensed under the Open Government Licence v3.0.
Publish Date
20/09/2022
Categories
Blogs
Online taxi company Uber and the Intercontinental Hotel Group (IHG) were last week the latest victims to be hit by cyber attacks.
In the case of Uber, a teenage hacker posted several screenshots within Uber systems, and appeared to have access to many of their internal platforms.
It has transpired since that the 18-year-old hacker stole an employee’s password through social engineering and also tricked the employee into approving the push notification for Uber’s Multi-Factor Authentication, or MFA. Social engineering is the psychological manipulation of people into performing actions or divulging confidential information.
The hacker confirmed they then used the stolen credentials to send repeated push notifications to the employee. They then sent the employee a WhatsApp message, claiming to be from Uber IT, stating for the authentication notifications to stop, he must accept, which he did.
This shows a classic case of the weakest point in any cyber defence, the human element. There are two points of failure, the inability to stop the details being stolen, and the lack of education for the employee to accept the instructions given in a WhatsApp message.
In the other high-profile hack of last week, 2 Vietnamese hackers infiltrated the Intercontinental Hotel Group (IHG). Initially planning a ransomware attack, IHG cyber security moved quickly to prevent this by isolating servers, however the hackers then deleted large amounts of valuable company data in response.
They initially gained access when an employee downloaded a malicious attachment from a phishing email. They also had to bypass an additional security prompt message sent to the worker’s devices as part of a MFA system.
MFA requires at least two independent factors, either something you know such as a password or pin, or something you have such as a card reader or dongle, or something you are such as a fingerprint or facial recognition.
Once past the MFA layers of security, the two hackers were able to access the company wide (200,000 employees!) password manager using the password…..Qwerty1234, giving access to every single system.
Both the Uber and IHG incidences highlight that even with MFA there are still risks posed. Not all MFA options are created equal with some being stronger than others. The less secure include the something you know, which can be engineered, or something you have where the codes can be intercepted or stolen.
The most secure MFA today is phishing-resistant authentication. This eliminates the use of shared secrets in the login process, removing the ability to intercept and replay access credentials. Even with these processes in place, MFA can be defeated by exploiting vulnerabilities in human behavior.
If you have concerns about your security and would like to enquire about a tenant security review, email protection or would like to arrange security training for your team(s), please fill in this form.
Download our free guide to find out more about Identity & Access Management. We cover:
Publish Date
30/06/2022
Categories
Company News
Cobweb were delighted last week to be awarded Cyber Solution Provider of the Year at The Business Magazine’s South Coast Tech Awards.
Judges were impressed by our latest security offering Cobweb Secure. Available in multiple configurations, Cobweb Secure has become a one-stop security shop for our customers. Cobweb Secure offers identity protection, email protection against all cyber threats including phishing, malware and ransomware, as well as backing up all your Microsoft 365 data to a secure cloud, device protection, web security and endpoint device security.
The panel stated “A visionary tech business investing in the future, often ahead of industry developments. They have launched many global ‘firsts’ over the years. This business has a strong focus on its people and significant spend on staff training, ensuring excellent quality of service and impressive customer satisfaction.”
Michael Frisby, Cobweb’s Managing Director commented on the achievement, “Innovation is part of our core values – the IT world is one where change is constant so you have to keep innovating to stay ahead of the bad guys. The Covid-19 lockdown saw a massive transition to hybrid and home working, where our customers went from controlled office environments to remote working with employees using their own devices that we needed to help control and protect. We expanded our portfolio of services to protect customers. Ultimately, we are a people business and it is their knowledge, expertise, passion and obsession for serving our customers that makes the difference.”
Businesses have become more reliant than ever before on their email and collaboration tools to help their teams stay connected in the hybrid and remote working era.
But as we communicate more online, cybercriminals are finding new and more complex methods of targeting organisations.
In our upcoming webinar, we’re joined by cyber security expert Dr Francis Gaffney, who will be taking us through the state of email security in 2022, and what you can do to keep your business protected against the emerging threats.
Recent Comments