Ransomware: What you need to know

In this article: ransomware meaning; types of ransomware; ransomware examples; protection against ransomware.

Ransomware meaning: What is ransomware?

Ransom malware, or ransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. While some people might think ‘a virus locked my computer’, ransomware would typically be classified as a different form of malware than a virus. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. Today, ransomware authors order that payment be sent via cryptocurrency or credit card, and attackers target individuals, businesses and organisations of all kinds. Some ransomware authors sell the service to other cyber criminals, which is known as Ransomware as a Service.

How do I get ransomware?

How exactly does a criminal carry out a ransomware attack? First, they must gain access to a device or network. Having access enables them to utilise the malware needed to encrypt (or lock up) your device and data. There are several different ways that ransomware can infect your computer.

Malspam

To gain access, some threat actors use spam, where they send an email with a malicious attachment to as many people as possible, seeing who opens the attachment and ‘takes the bait’, so to speak. Malicious spam is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites.

Malvertising

Another popular infection method is malvertising, or malicious advertising, which is the use of online advertising to distribute malware with little to no user interaction required. While browsing the web – even legitimate sites – users can be directed to criminal servers without ever clicking on an ad. These servers catalogue details about victims’ computers and their locations, and then select the malware.

Spear phishing

A more targeted means to a ransomware attack is through spear phishing. An example of spear phishing would be sending emails to employees of a certain company, claiming that the CEO is asking them to take an important employee survey, or the HR department is requiring them to download and read a new policy.

The term ‘whaling’ is used to describe such methods targeted toward high-level decision makers in an organisation, such as the CEO or other executives.

Social engineering

Malspam, malvertising and spear phishing can, and often do, contain elements of social engineering.

Threat actors may use social engineering in order to trick people into opening attachments or clicking on links by appearing as legitimate – whether that’s by seeming to be from a trusted institution or a friend.

Cyber criminals use social engineering in other types of ransomware attacks, such as posing as a government agency in order to scare users into paying them a sum of money to unlock their files.

Another example of social engineering would be if a threat actor gathers information from your public social media profiles about your interests, places you visit often, your job, etc., and uses some of that information to send you a message that looks familiar to you, hoping you’ll click before you realise it’s not legitimate.

Encrypting files and demanding a ransom

Whichever method the threat actor uses, once they gain access and the ransomware software (typically activated by the victim clicking a link or opening an attachment) encrypts your files or data so you can’t access them, you’ll then see a message demanding a ransom payment to restore what they took. Often the attacker will demand payment via cryptocurrency.

Types of ransomware: Examples

Scareware

Scareware, as it turns out, is not that scary. It includes rogue security software and tech support scams.

You might receive a pop-up message claiming that malware was discovered and the only way to get rid of it is to pay up. If you do nothing, you’ll likely continue to be bombarded with pop-ups, but your files are essentially safe. A legitimate cyber security software programme would not solicit customers in this way. If you don’t already have this company’s software on your computer, then they would not be monitoring you for ransomware infection. If you do have security software, you wouldn’t need to pay to have the infection removed – you’ve already paid for the software to do that very job.

Screen lockers

Screen lockers – upgrade to terror alert orange for these guys. When lock-screen ransomware enters your computer, it means you’re frozen out entirely.

Upon starting your computer, a full-size window will appear, often accompanied by an official-looking FBI or US Department of Justice seal saying illegal activity has been detected on your computer and you must pay a fine. However, the FBI would not freeze you out of your computer or demand payment for illegal activity. If they suspected you of cyber crimes, they would go through the appropriate legal channels.

Encrypting ransomware

Encrypting ransomware – this is the truly nasty stuff. These are the guys who snatch up your files and encrypt them, demanding payment in order to decrypt and redeliver. The reason why this type of ransomware is so dangerous is because once cyber criminals get hold of your files, no security software or system restore can return them to you. Unless you pay the ransom, for the most part, they’re gone. And even if you do pay up, there’s no guarantee the cyber criminals will give you those files back.

Mobile ransomware

Mobile ransomware – it wasn’t until the height of the infamous CryptoLocker and other similar families in 2014 that ransomware was seen on a large scale on mobile devices. Mobile ransomware typically displays a message that the device has been locked due to some type of illegal activity. The message states that the phone will be unlocked after a fee is paid. Mobile ransomware is often delivered via malicious apps and requires that you boot the phone up in safe mode and delete the infected app in order to retrieve access to your mobile device.

Who do ransomware authors target?

When ransomware hit the scene, its initial victims were individual systems (aka regular people). However, cyber criminals began to realise its full potential when they rolled out ransomware to businesses. Ransomware was so successful against businesses – halting productivity and resulting in lost data and revenue – that its authors turned most of their attacks toward them.

By the end of 2016, 12.3% of threats were ransomware, while only 1.8% of consumer detections were ransomware worldwide. And by 2017, 35% of SMEs had experienced an attack.

Ransomware attacks are still focused on western markets, with the UK, US and Canada ranking as the top 3 countries targeted. As with other threat actors, ransomware authors will follow the money, so they look for areas that have both wide PC adoption and relative wealth. As emerging markets in Asia and South America ramp up on economic growth, expect to see an increase in ransomware (and other forms of malware) there as well.

How can I remove ransomware?

If an attacker encrypts your device and demands a ransom, there’s no guarantee they will unencrypt it whether or not you pay up. That is why it’s critical to be prepared before you get hit with ransomware. 2 key steps to take are:

  • Install security software before you get hit with ransomware.
  • Back up your important data (files, documents, photos, videos, etc.).

If you do find yourself with a ransomware infection, the number 1 rule is to never pay the ransom and make sure you have backed up all of your data on a remote drive. Other ways to deal with a ransomware infection include downloading a security product known for remediation and running a scan to remove the threat. You may not get your files back, but you can rest assured the infection will be cleaned up. For screen locking ransomware, a full system restore might be in order. If that doesn’t work, you can try running a scan from a bootable CD or USB drive.

How do I protect myself from ransomware?

My advice is to prevent it happening in the first place. There are methods to deal with a ransomware infection, but they are imperfect solutions at best, and often require much more technical skill than the average computer user posesses.

How to prevent ransomware

The first step in ransomware prevention is to invest in security tools – software and programmes with real-time protection that are designed to thwart advanced malware attacks such as ransomware.

In addition to using the right tools, it all comes down to training, education and awareness…. don’t click on it if it doesn’t feel right!

How ESA Risk can help

If you’ve been the victim of an attack or you’d like further advice and support on ransomware protection, please contact us at advice@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Increase your knowledge of cyber security – we offer cyber security courses, provided by the Global Cyber Academcy, from levels 2 to 5.

Internet of things (IoT) devices – cyber threats

Threats and risks continue to evolve as hackers come up with new ways to breach unsecured systems, posing a threat to the ecosystem itself. Let’s take a look at the leading threats and risks to the IoT and the associated vulnerabilities that must be secured.

What is the internet of things (IoT)?

The internet of things (IoT) is a network of intertwined devices, software, sensors and other ‘things’ which enable the world to be connected throughout physical space. This can include business software, smart home devices, care monitoring systems, mobile phones or driverless trucks, and can be as small as a thumb drive to the size of a train. All of these things communicate with each other without the need for human interaction. This web of connectivity is fascinating but poses serious danger to information security.

Exploring the IoT attack surface

A business’s attack surface is the sum of vulnerabilities that are currently present on their network, both physical and digital. This can be vulnerabilities from within their endpoint devices (computers, tablets) or from the software and hardware used to conduct business. While each device is typically protected through a security software, they are still apt to a series of added threats and vulnerabilities through their connection to the IoT. The Open Web Application Security Project (OWASP) provides a broad consensus of the current threats and vulnerabilities within the surfaces, condensed below.

IoT devices

Devices inevitably have vulnerabilities embedded within their memory systems, physical and web interface, network services, and firmware. This allows hackers to easily exploit systems within the devices’ outdated components and insecure default settings with update mechanisms. When managing vulnerabilities throughout your network’s devices, continuous monitoring is essential.

Communication channels

Attacks can originate from the channels that connect IoT devices. This presents serious threats to the security of the entire system and creates a potential for spoofing and denial of service attacks. These threats and attacks lay the foundation for an unstable network surface.

Applications and software

Each application and software presents risk, and many web applications and APIs do not protect sensitive data adequately. These data can be anything from financial intelligence to healthcare information. A breach of these types of information can result in identity theft, credit card fraud and exposure of confidential information, all because a web application isn’t properly secured or patched on a consistent basis.

7 IoT threats and vulnerabilities to be aware of

As long as the internet of things continues to expand, the number of threats will continue to increase. Being able to identify and understand the different types of threats and vulnerabilities associated with the IoT can significantly reduce the risk of a data breach at your organisation. Let’s explore the top IoT concerns:

1. Lack of physical hardening

The lack of physical hardening has always been a concern for devices within the internet of things. Since most IoT devices are remotely deployed, there is no way to properly secure devices that are constantly exposed to the broader physical attack surface. Devices without a secure location and the inability for continual surveillance allow potential attackers to gain valuable information about their network’s capabilities which can assist in future remote attacks or gaining control over the device. For example, hackers can facilitate the removal of a memory card to read its contents and access private data and information that may allow them to access other systems.

2. Insecure data storage and transfer

As more people utilise cloud-based communications and data storage, the cross-communication between smart devices and the IoT network increases. Any time data is transferred, received or stored through these networks, the potential for a breach or compromised data also increases. This is due to the lack of encryption and access controls before data is entered into the IoT ecosystem. For this reason, it is important to ensure the secure transfer and storage of data through robust network security management tools like firewalls and network access controls.

3. Lack of visibility and IoT device management

Many IoT devices remain unmonitored, untracked and improperly managed. As devices connect and disconnect from the IoT network, trying to monitor them can grow to be very difficult. Lack of device status visibility can prevent organisations from responding to, or even detecting, potential threats. These risks can become life-threatening when we look into the healthcare sector. IoT pacemakers and defibrillators have the potential to be tampered with, if not secured properly, and hackers can purposefully deplete batteries or administer incorrect pacing and shocks. Organisations need to implement device management systems to properly monitor internet of things (IoT) devices so all avenues for potential breaches are accounted for.

4. Botnets

Botnets are a series of internet-connected devices that are created to steal data, compromise networks or send spam. Botnets contain malware that allows the attacker to access an IoT device and its connection to infiltrate an organisation’s network, becoming one of the top threats for businesses. They are most prominent in appliances that were not initially manufactured securely (smart fridges, for example). These devices are continuously morphing and adapting. Therefore, monitoring their changes and threat practices is necessary to avoid attacks.

5. Weak passcodes

Although intricate passcodes can prove to be secure for most IoT devices, one weak passcode is all it takes to open the gateway to your organisation’s network. Inconsistent management of passcodes throughout the workplace enables hackers to compromise your entire business network. If just one employee does not adhere to advanced password management policies, the potential for a password-oriented attack increases. Practising good password hygiene is essential to ensure your business is covering all bases within standard security practices.

6. Insecure ecosystem interfaces

Application programming interfaces (APIs) are software intermediaries that allow 2 applications to talk to each other. With the connection of the 2 servers, APIs can introduce a new entrance for attackers to access a business’s IoT devices and breach a network’s router, web interface, server, etc. It is crucial to understand the intricacies and security policies of each device in the ecosystem before connecting them to ensure complete network security.

7. AI-based attacks

While AI attacks have been around since 2007, the threats they present within IoT are becoming increasingly more prominent. Hackers now can build AI-powered tools that are faster, easier to scale and more efficient than humans to carry out their attacks. This poses a serious threat within the IoT ecosystem. While the tactics and elements of traditional IoT threats presented by cyber attackers will look the same, the magnitude, automation and customisation of AI-powered attacks will make them increasingly hard to battle.

ESA Risk and IoT cyber security

For more advice on cyber security – including internet of things (IoT) cyber security – contact us at advice@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Sustainable investment is here to stay

The vast majority of investors believe that interest in ESG will continue to remain a high priority even when the pandemic has passed.

PwC forecast that ESG assets will make up between 27% and 42% of Europe’s asset base by 2025; a significant increase from 15% in 2020.

The move is being driven by changes in the regulatory landscape within the EU and UK, alongside the creation of the International Sustainability Standards Board (ISSB), set up to deliver a comprehensive baseline of standards that will provide investors (and others) with information about companies’ sustainability-related risks and opportunities to help them make informed decisions.

Interest in ESG will remain high primarily because clients are demanding it. Research suggests that meeting clients’ needs outweighs the need to meet increasing regulatory requirements. Of the 3 elements of ESG, the main focus for consumers is concern for the environment. Investors not only want to see a return on their investment, but they also expect their money to do some good by being invested in a way that protects the environment and does no harm.

New rules are being introduced by the EU, which the UK is set to follow with its own regulatory strategy. The EU has already set its own Sustainable Finance Disclosure Regulations in motion, for the first time requiring investors and asset management companies to provide information about their investments, the ESG risks and their impact on the planet and society. The EU action plan reflects a major shift in the way ESG factors are considered in the investment process.

In October 2021, the UK the government published Greening Finance: A Roadmap to sustainable investing, in which it sets out an ambition to make the UK the best place in the world for green and sustainable investment. The document outlines a vision for a comprehensive approach to ‘greening’ financial systems, mobilising finance for clean, resilient growth and capturing resulting opportunities for UK companies.

The roadmap will come in 3 phases:

  1. Informing – ensuring decision-useful information on sustainability is made available to decision makers.
  2. Acting – to mainstream the information to businesses and financial decisions.
  3. Shifting – financial flows across the economy to align with a net-zero and nature positive policies.

Sustainability Disclosure Requirements (SDR)

The roadmap describes the new regime as bringing together existing sustainability-related disclosure requirements under 1 framework – building on existing and future global standards and best practice. Disclosures will be consumer-focused, with companies selling investment products having to provide consumer-friendly disclosures explaining the impact, risks and opportunities of the businesses they finance on sustainability.

The roadmap flags up that any form of ‘greenwashing’ will not be tolerated. In an effort to minimise the practice within marketing activities, financial organisations will have to substantiate any ESG claims made by their products.

Other proposals include an intention to bring ratings agencies under FCA control to reflect the increase in importance of ESG ratings to investors. The FCA have just published a discussion paper, seeking views on SDR disclosure requirements for asset managers and certain FCA-regulated asset owners as well as the sustainable labelling system. The aim is to build trust in the market and enhance transparency in the interest of consumers and meet the information needs of institutional investors. The input they receive will inform policy proposals to be issued for consultation next year.

The changes announced by the government represent an ambitious and comprehensive package of measures designed to help improve the flow of investment towards financing the transition to a sustainable economy. By encouraging investors to redirect investment towards sustainable technologies and businesses the measures will be instrumental in aligning the financial system with the UK target for a net zero economy by 2050.

International action: COP26 and sustainable investing

Of course, these shifts in mindset and policy aren’t isolated to the UK and EU.

Investing in sustainable industries and commodities was 1 of the main topics of discussion at the World Leaders Summit Action on Forests and Land Use at COP26.

At the summit, more than 30 financial institutions signed a commitment to move away from portfolios that invest in high deforestation-risk supply chains. These institutions include companies with $8.7tn under management, meaning the stakes are high for non-sustainable industries once private finance pours into companies that are aligned with sustainability goals and regulations.

Tuntiak Katan, Coordinator of the Global Alliance of Territorial Communities, representing communities from the rainforests of Africa, Latin America and Indonesia, said:

”We welcome the announcement at COP of the Joint Statement on Advancing Support for Indigenous Peoples and local communities that has raised to an unprecedented level their visibility as a climate solution.

“At the same time, we will be looking for concrete evidence of a transformation in the way funds are invested. If 80% of what is proposed is directed to supporting land rights and the proposals of Indigenous and local communities, we will see a dramatic reversal in the current trend that is destroying our natural resources.”

Sustainable investment due diligence

Katan makes a key point about evidence. When it comes to investing, it is important to see the full picture. Some private companies claim to work sustainably and support ESG goals but are greenwashing. Investors must always screen potential opportunities before committing. Due diligence is a must to ensure you’re investing in a responsible, sustainable business.

Investment managers often use ESG portfolios to inspect the status of a company before they invest. However, definitions of ESG can be subjective, and it’s important to undertake independent research, rather than to always rely on the opinion of an investment manager.

How ESA Risk can help

Due diligence is an area where we possess the expertise and experience to help you and your business.

For advice on private investing or conducting due diligence, please contact Mike Wright, Risk Management and Investigations Consultant at mike.wright@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Benefits and limitations of regulatory and standards-based compliance

First, there’s compliance with standards, certifications and codes of practice that offer assurance that best practices have been followed.

Whether around products or procedures, complying with non-binding guidance can secure better deals with insurers and reassure stakeholders, as well as bolster security.

Alternatively, compliance can be about following the law, with regulations invariably relating to areas other than security, such as data protection and health and safety.

However, security professionals must convince boardrooms that bare-minimum compliance alone is not necessarily ‘job done’ when it comes to executing their obligations to protect personnel and assets.

And regulations, such as around fire safety or data privacy, must be adhered to in a way that doesn’t inadvertently undermine security measures.

Consolidated wisdom

Physical security standards and codes of practice provide a framework, developed by governments and independent bodies, for judging whether products or practices robustly protect people and property against theft, vandalism, terrorism, natural disasters and so on.

They consolidate wisdom drawn from rigorous testing, academic research and the input of experts from government, law enforcement, and the insurance, architecture and risk consultancy industries, among other sources.

These frameworks, which are refreshed periodically, effectively liberate security professionals from having to conduct due diligence and establish best practices from the ground up.

Secured by Design

For instance, Secured by Design, a police initiative, works with fire and security test houses like the Building Research Establishment (BRE) and its subsidiary, the Loss Prevention Certification Board (LPCB), in fulfilling its mission to ‘design out crime’ for homes, commercial premises and public spaces.

The Secured by Design’s product accreditation scheme, the Police Preferred Specification, makes certification contingent on demonstrating that a product has been designed with security as a priority.

Products are independently tested before being certified by the UK Accreditation Service (UKAS).

Necessary – but not sufficient

But might compliance with minimum standards potentially risk fostering complacency among security professionals and a false sense of security among stakeholders?

Having a product that is ‘secure by design’ is necessary – but not sufficient – to ensure that people and property are adequately protected.

A product’s suitability to the environment, and how it’s installed and used are vital too – and there are standards and guidance for these area, also.

Security teams should therefore find out which guidance and standards are relevant for their use case.

And they should be willing to go above and beyond minimum standards where relevant. For instance, if they’re protecting a busy public space at high risk of terror attacks and other criminality, then there’s a strong case to procure the highest calibre systems – not just the cheapest solutions that comply with baseline security standards.

Tiered security ratings

While binary standards – i.e. you either comply or you don’t – are easy to administer and understand, graded or tiered security ratings offer a more nuanced framework for choosing a system that meets your risk profile.

As such, compliance provides assurance that your system is appropriately secure for the environment in which it is installed, without being needlessly feature-rich (and thus expensive).

For example, EN 50131, a European standard outlining performance requirements for intruder alarm systems, sets out four security grades that scale up feature sets, resilience to tampering, and availability of police response, according to the likelihood of attacks and sophistication of likely attackers.

Set according to a risk assessment conducted by installers, they range from grade 1 – the lowest risk category used for domestic properties – to grade 4, assigned to high-risk premises like banks, museums or energy facilities that may be targeted by organised criminals.

Insurers will generally make conformity with the appropriate grade a prerequisite of providing cover.

LPS 1175

LPS 1175, which relates to ‘intruder resistant building components, strongpoints, security enclosures and free-standing barriers’, is also ratings-based.

Overseen by the LPCB, 1 of 7 security ratings is assigned based on how effectively a product – for example, fencing and security doors – can withstand assaults from tools such as drills, hammers or wire cutters.

Naturally, an airport will typically need perimeter fencing with a much more stringent security rating than an office carpark, for instance.

Access control regulatory compliance

According to the UK government, your access control system should be compliant with The Equality Act, Human Rights Act, Health and Safety at Work Act and General Data Protection Regulation (GDPR).

Vendors and their customers must accommodate these regulatory requirements when designing, installing and using security systems and policies, and ensure that, say, fulfilling a health and safety requirement does not undermine a security need.

For instance, to comply with UK fire safety laws your access control system should automatically unlock when a fire alarm sounds. Similarly, health and safety legislation necessitates that control rooms and other critical areas have fail-safe systems. Security teams should think about how to mitigate the security risks created by the activation of these functions.

CCTV regulatory compliance

The GDPR and – especially for local authorities and the police – the UK Surveillance Camera Code of Practice are pivotal to the appropriate specification, installation and usage of CCTV systems.

A data controller’s obligations under GDPR are broadly similar in regard to CCTV images – which count as personal data if the individual can be identified – as they are to text-based personal data like names, dates of birth or national insurance numbers.

This includes having a legitimate reason for processing personal data, protecting data during storage, transmission and processing, and keeping footage no longer than is strictly necessary.

The Surveillance Camera Code of Practice is also – rightly – focused on protecting data subjects’ privacy, and is useful in terms of bolstering both data security and physical security.

The newly revised code (pending parliamentary approval) has 12 guiding principles, including asking end users to establish:

  • the purpose of their system;
  • clear policies and procedures;
  • adherence to approved and relevant operational, technical and competency standards;
  • clearly defined rules on who has access to systems and when;
  • and that images will have evidential value if used by the criminal justice system.

Advice and support from ESA Risk

For Security advice and support, contact Liam Doherty, Security Consultant at liam.doherty@staging.esarisk.com, on +44 (0)343 515 8686 or via our contact form.

For support with regulatory compliance, contact Mike Wright, Risk Management & Investigations Consultant at mike.wright@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Black Friday 2021: Stay cyber-safe

For many, Black Friday 2021 marks the official start to the Christmas shopping season and, excitingly, many retailers announce time-limited sales that promise huge savings to consumers. But it’s also the prime time for cyber criminals to cash in, too.

Some digital threats to watch out for on Black Friday 2021

Phishing attacks

While consumers rush to grab themselves a bargain, they may get caught out in a phishing scandal. Phishing links commonly lead to fake login pages, prompting victims to authenticate themselves on their web account. For instance, victims may think they are logging into their favourite retailer account, when, really, they are handing their username and password over to an attacker, who can use it to their advantage later. Although this affects users directly, it also negatively impacts the retailer’s reputation, which can be difficult to recover.

Malware  

Malware (as the portmanteau suggests) refers to any malicious software designed to harm a computer system by tracking user activity, hijacking functionality or stealing, deleting or encrypting data. Most malware enters your systems via email (96% of it in 2020, say CSO). According to research by Deep Instinct, malware saw a year-on-year increase of 358% in 2020. There’s no indication of that proliferation slowing, so this should be seen as a high-risk Black Friday cyber threat.

Formjacking

Formjacking is a form of ‘Magecart’ where malicious code is injected into the checkout forms of a website and can go undetected for a long time. Cyber criminals then hijack web forms to steal personal and payment information from shoppers.

Ransomware  

Ransomware encrypts files, so they are made inaccessible to the owner. The cyber criminal then demands a ransom payment in return for releasing the locked files. Ransomware occurs when legitimate ads are hacked (‘malvertising’), or through phishing emails and exploit kits. This will have consequential impact on consumers and retailers/businesses.

Not being prepared enough for cyber threats is a threat

A staggering 3 in 4 IT leaders expressed a lack of confidence in their company’s IT security posture and saw room for improvement. Despite this, just 57% of companies conducted a data security risk assessment in 2020 and businesses need to up their cyber security efforts to reduce these risks and minimise the impact of an attack.

How can you reduce the risk of cyber threats on Black Friday 2021? 

The above attacks take place daily and are not specific to the holiday season or large events like Black Friday, but the volume and frequency of these attacks significantly increase during these times, as more consumers make purchases online.

Being aware of these threats is a step closer to preventing cyber attacks on Black Friday 2021 and during the holiday season to come. Businesses should balance their investments in security awareness training for employees and putting robust security measures in place that can help to scan their systems for suspicious activity. Similarly, consumers need to be better educated and made aware of potential threats.

If you find yourself the victim of a cyber incident, ESA Risk can help you with your response to the attack and to make you cyber-secure in the future, through the design and execution of a strong cyber security plan. Reach out to us at advice@esarisk.com, on +44 (0)343 515 8686 or via our contact form to find out more.

 

The most common security threats to mobile devices in 2021

However, increases in organisational mobility typically result in a higher number of mobile devices that are accessing your systems from a remote location. For your cyber security teams, this means a growing variety of endpoints and threats they need to secure to protect your organisation from a data breach.

Mobile malware has long been a common problem. As a result, businesses and individuals are usually aware of the potential threat and how to deal with it. However, as Verizon’s Mobile Security Index Report shows, new threats are constantly appearing and organisations need to consider these, as well, in order to ensure they’re protected.

Below are the most common and critical mobile security threats that organisations currently face.

4 different types of mobile phone security threats

Mobile phone security threats are commonly thought of as a single, all-encompassing threat. But, the truth is, there are 4 different types of threat that organisations need to take steps to protect themselves from:

Mobile application security threats

Application-based threats are present when people download apps that look legitimate but skim data from their device. Examples are spyware and malware that steal personal and business information without people realising it’s happening.

Web-based mobile security threats

Web-based threats are subtle and tend to go unnoticed. They happen when people visit affected sites that appear to be fine on the face of it, but automatically download malicious content onto devices.

Mobile network security threats

Network-based threats are especially common and risky because cyber criminals can steal unencrypted data while people use public Wi-Fi networks in places such as transport hubs and cafes.

Mobile device security threats

Physical threats to mobile phone security and other mobile devices most commonly refer to the loss or theft of a device. Because hackers have direct access to the hardware where private data is stored, this threat is especially dangerous to enterprises.

Mobile cyber security threat examples

Below are the most common examples of these threats, as well as steps organisations can take to protect themselves from them.

Social engineering

Social engineering attacks are when bad actors send fake emails (phishing attacks) or text messages (smishing attacks) to your employees in an effort to trick them into handing over private information like their passwords or downloading malware onto their devices. The best defence for phishing and other social engineering attacks is to teach employees how to spot phishing emails and SMS messages that look suspicious and avoid falling prey to them altogether.

Reducing the number of people who have access to sensitive data or systems can also help protect your organisation against social engineering attacks because it reduces the number of access points attackers have to gain access to critical systems or information.

Data leakage via malicious apps

Enterprises face a far greater threat from the millions of generally available apps on their employees’ devices than from mobile malware, because 85% of mobile apps today are largely unsecured.

Hackers can easily find an unprotected mobile app and use that to design larger attacks or steal data, digital wallets, backend details and other information directly from the app.

For example, when your employees visit Google Play or the App Store to download apps that look innocent enough, the apps ask for a list of permissions before people are allowed to download them. These permissions generally require access to files or folders on the mobile device, and most people just glance at the list of permissions and agree without reviewing them in detail.

However, this lack of scrutiny can leave devices and enterprises vulnerable. Even if the app works the way it’s supposed to, it still has the potential to mine corporate data and send it to a third party, such as a competitor, and expose sensitive product or business information.

The best way to protect your organisation against data leakage through malicious or unsecured applications is by using mobile application management (MAM) tools. These tools allow IT admins to manage corporate apps (wipe or control access permissions) on their employees’ devices without disrupting employees’ personal apps or data.

Unsecured public Wi-Fi

Public Wi-Fi networks are generally less secure than private networks because there’s no way to know who set the network up, how (or if) it’s secured with encryption, or who is currently accessing the network or monitoring it.

As more companies offer remote work options, the increasing number of public Wi-Fi networks your employees use to access your servers (e.g. from coffee shops or cafes) could present a risk to your organisation. Cyber criminals often set up Wi-Fi networks that look authentic (by ‘cloning’ them), but are actually a front to capture data that passes through their system (a ‘man in the middle’ attack).

The best way for you to protect your organisation against threats over public Wi-Fi networks is by requiring employees to use a VPN to access company systems or files. This will ensure that their session stays private and secure, even if they use a public network to access your systems.

End-to-end encryption gaps

An encryption gap is like a water pipe with a hole in it. While the point where the water enters the pipe (your users’ mobile devices) and the point where the water exits the pipe (your systems) might be secure, the hole in the middle lets bad actors access the water flow in between. Unencrypted public Wi-Fi networks are one of the most common examples of an encryption gap (and it’s why they’re a huge risk to organisations). Since the network isn’t secured, it leaves an opening in the connection for cyber criminals to access the information your employees are sharing between their devices and your systems.

However, Wi-Fi networks aren’t the only thing that pose a threat – any application or service that’s unencrypted could potentially provide cyber criminals with access to sensitive company information. For example, any unencrypted mobile messaging apps your employees use to discuss work information could present an access point for a bad actor.

For any sensitive work information, end-to-end encryption is a must. This includes ensuring any service providers you work with encrypt their services to prevent unauthorised access, as well as ensuring your users’ devices and your systems are encrypted, as well.

Internet of Things (IoT) devices

The types of digital device that access your organisation’s systems are branching out from laptops, mobile phones and tablets to include wearable tech (like the Apple Watch) and physical devices (like Google Home or Amazon’s Alexa). And since many of the latest IoT mobile devices have IP addresses, it means bad actors can use them to gain access to your organisation’s network over the internet, if those devices are connected to your systems.

Spyware

Spyware is used to survey or collect data and is most commonly installed on a mobile device when users click on a malicious advertisement or through scams that trick users into downloading it unintentionally. Whether your employees have an iOS or Android device, their devices are targets ripe for data mining with spyware, which could include your private corporate data, if that device is connected to your systems.

Dedicated mobile security apps can help your employees detect and eliminate spyware that might be installed on their devices and be used to access company data. Ensuring your employees keep their device operating systems (and applications) up to date also helps ensure that their devices and your data are protected against the latest spyware threats.

Poor password habits

The 20 most common passwords in 2020, according to NordPass.

Position Password Time to crack Times exposed
1 123456 Less than a second 23,597,311
2 123456789 Less than a second 7,870,694
3 picture1 (new entry on 2020’s list) 3 hours 11,190
4 password Less than a second 3,759,315
5 12345678 Less than a second 2,944,615
6 111111 Less than a second 3,124,368
7 123123 Less than a second 2,238,694
8 12345 Less than a second 2,389,787
9 1234567890 Less than a second 2,264,884
10 senha (new entry) 10 seconds 8,213
11 1234567 Less than a second 2,516,606
12 qwerty Less than a second 3,946,737
13 abc123 Less than a second 2,877,689
14 Million 2 (new entry) 3 hours 162,609
15 000000 Less than a second 1,959,780
16 1234 Less than a second 1,296,186
17 iloveyou Less than a second 1,645,337
18 aaron431 (new entry) 3 hours 30,576
19 password1 Less than a second 2,418,984
20 qqww1122 (new entry) 52 minutes 122,481

There’s not much more to say on this topic. These bad password habits present a threat to organisations whose employees use their personal devices to access company systems. Since both personal and work accounts are often accessible from the same device with the same password, it simplifies the work a bad actor has to do in order to breach your systems.

If you use any of the passwords in this list, I strongly suggest you change them now.

Lost or stolen mobile devices

Lost and stolen devices aren’t a new threat for organisations. But with more people working from home or in public places like cafes or coffee shops and accessing your systems with a wider range of devices, lost and stolen devices pose a growing risk. First and foremost, you’ll want to ensure employees know what steps to take if they lose their device. Since most devices come with remote access to delete or transfer information, that should include asking employees to make sure those services are activated.

Out-of-date operating systems

Like other operating systems, mobile security requires continuous work to find and patch vulnerabilities that bad actors use to gain unauthorised access to your systems and data. Companies like Apple and Google address a lot of these vulnerabilities with operating system updates, so updating/patching is critical.

Cyber security support from ESA Risk

For advice and support to secure your business against cyber threats – including mobile phone security – look no further than ESA Risk. From staff training to software and process recommendations, we’ll work with you to meet your cyber security needs.

Contact us at advice@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Cyber insurance: The risks of a safety net

With increased cyber crime comes higher demands and stakes, meaning there is more need for cyber insurance. Not only has the ask of ransoms skyrocketed, but the average ransomware payment has also increased by over 40% and reached over £150,000.

A ransom of this size could easily push some small and medium-sized businesses to the brink of insolvency or lead to a halt of operations that they simply cannot afford. Therefore, many businesses are turning to cyber insurance for protection against cyber risk.

Cyber insurance is typically meant for businesses that depend heavily on their IT systems to be functional 24/7. Today, that covers almost all businesses, especially healthcare, critical infrastructure, municipalities, manufacturing, and transport and logistics industries. However, some companies that purchase a full-coverage plan start to let down their guard and may simply pay out a ransom because they know the insurance company will later cover it.

The original purpose of cyber insurance was to cover the extortion losses of a business in the event of a successful ransomware attack, if the business had no other option but to pay the ransom demand for business continuity or to mitigate future losses. But a growing lack of vigilance and responsibility from some insured companies is tilting the balance of the cyber insurance market, forcing insurance companies to raise the premium price and adjust the underwriting standards to lower their own risks of loss.

The average global cyber insurance premium rate has increased by 32% year-on-year. Additionally, the insurers now require third-party IT companies to conduct a field examination on the insured company’s cyber security protocols to see if they reach a set standard. The checking process used to be mainly conducted via a self-assessment sheet; now, if the company doesn’t meet the standards, the vendor the insurers hire will tell the applicant company what they need to add, and the insurer won’t sign the contract until everything is in place.

Smaller enterprises are now faced with a dilemma: on 1 side there is the risk of rapidly growing malicious attacks, on the other side is the expensive premium packages with complex prerequisites and clauses that might not necessarily cover all their losses. If this vicious cycle continues, the only beneficiary will be the criminals.

What companies should know about cyber insurance

Every company owner should be aware of what they are looking for when it comes to cyber insurance. They should always read the fine print and understand the specifics of coverage, deductibles and exclusions. This safety net can be highly effective if the policy is correctly written, and the business is fully aware of its coverage and its likelihood of facing cyber risk.

Cyber insurance typically doesn’t cover 3 types of losses: potential future lost profits, loss of value due to the theft of intellectual property, and betterment (i.e., the cost to improve internal technology systems after the attack, such as IT upgrades after a cyber event). That said, losses other than the initial ransom are not likely to be covered by insurance.

Today, most ransomware attacks do not stop at the initial breach. Take the SolarWinds incident as an example. Instead of locking SolarWind’s IT systems, attackers planted malicious code into the company’s Orion technology platform, which is used by more than 30,000 customers, including the U.S. Department of Energy, Department of Homeland Security, and other national agencies. In this case, hackers didn’t even ask for a high amount of ransom, but the damage and potential vulnerabilities this attack caused is immeasurable and cannot possibly be covered by insurance.

Ransomware insurance alone is not enough. A well-written policy should also cover data breach liability, regulatory compliance, and other cyber risk-related threats. There are also firms that specialise in cyber insurance and understand the risks related to specific organisations. The simplest way for business owners to find an insurance plan that best fits their company is to start with the current business liability insurance provider and ask if they have experts who deal with cyber insurance.

Lastly, business owners should never let their guard down. Putting an employee cyber security training programme in place and implementing robust cyber security tools and processes should always be the priority, as this helps to mitigate the risks from the root. Conduct regular IT checks and system updates to ensure all patches are implemented, eliminating backdoors for attackers. Training, education and awareness are absolutely vital.

Conclusion

With the ever-changing cyber attack landscape, businesses should be extra cautious. While cyber insurance can be a smart move, businesses should also learn to utilise other tools to protect themselves, including a robust training regime and a fit-for-purpose policy that meets the company’s situation.

If you require advice on cyber risk or would like to know more about cyber insurance, contact us at advice@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Beyond security: How access control and CCTV video analytics can generate business intelligence

Fortunately, modern, network-connected security systems can deliver operational benefits that give security chiefs a powerful argument when it comes to pitching to the boardroom for greater funding.

Security systems are, of course, fundamentally – and historically, solely – about deterring and thwarting criminal acts in order to protect people and property.

However, today’s AI-powered video surveillance and access control software can transcend this core purpose to provide other benefits, often in concert with building management systems (BMS).

Deployed wisely, cutting-edge security systems can play a role in reducing energy use, boosting productivity and sales, enhancing work environments and delivering services more effectively.

New technologies can therefore be justified on the grounds of cutting costs and boosting the bottom line, as well as reducing insurance premiums and improving safety, security and loss prevention.

Consider how, for instance, automatic licence plate recognition (ANPR) systems can eliminate the need for ticket inspectors in carparks.

Access control efficiencies

In mediating the entry and exit of authorised individuals, meanwhile, physical access control systems build a picture of which and how many individuals occupy any given room or floor at any particular moment.

If access control reports show an office building is consistently quiet at the same time each month – say, Friday afternoons – facilities managers could decide to close certain floors to lower cleaning, maintenance, staffing and energy demands.

And integration with building management systems means lights, heating and air conditioning can be automatically switched on or off as buildings become occupied or unoccupied, thus reducing energy use.

Further efficiencies can be realised by consolidating physical and logical access control and integrating them with other services. As a result, employees could use the credential they access the office with – whether it’s a card, key or biometric authenticator – to pay for food in the canteen or enter the adjoining car park, too.

Integration with other business functions, such as HR, can streamline back-end administration, while cross-site standardisation is useful for large organisations with multiple offices.

Increasingly, access control can also be integrated with visitor management systems, making the check-in process more seamless and restricting visitors to the areas they need to access and the times they need to access them.

CCTV video analytics for retail business intelligence

Video analytics software, which uses deep learning algorithms to make sense of CCTV footage, has powerful security functions that vendors have repurposed to generate business intelligence.

It can, for instance, automatically identify and track persons of interest, highlight people or objects that fit a certain description, send alerts when pre-defined behaviors are detected, and detect suspicious packages.

In retail, similar capabilities can realise operational insights that inform decisions – on staffing, procurement and store design – that optimise the customer experience and boost sales.

Video content analysis can, for instance, measure footfall and where it is concentrated, something usefully presented in heatmaps.

The routes customers typically take around the store and where they tend to linger – measured by ‘dwell time’ – can help retailers optimise store layout, product lines and even pricing (imagine the conclusion you might draw, for instance, from a long dwell time around particular products but comparatively unremarkable sales figures).

Supported by proximity and people-counting thresholds, staffing levels can be tweaked to reflect peak periods and reduce crowding and queuing at checkout counters, fitting rooms and bathrooms.

Consider the resource efficiencies yielded by determining bathroom cleaning schedules by through-traffic rather than arbitrary intervals.

The ability to monitor shopper numbers and density also has a powerful application in relation to Covid-19 guidelines on limiting headcounts or enforcing social distancing.

Stores can learn how their customer demographics break down by age and gender, too, which can inform marketing and procurement decisions.

However, functionality that analyses individuals’ characteristics will raise understandable privacy concerns – something vendors have, thankfully, taken into consideration.

Data privacy mechanisms

Mindful of GDPR and equivalent data protection regulations in force around the world, reputable technology providers have ensured that retail-focused applications only ever convey information about shoppers as a group, not as individuals.

CCTV systems more generally should be privacy-protecting by design at every stage – capturing, storing, sharing and deleting data.

Among the most important privacy features is dynamic anonymisation, which ensures anonymity by default, with operators only unmasking individuals suspected of criminal wrongdoing.

Even more reassuring from a privacy perspective – and most relevant for non-security applications like monitoring footfall or for hazards – is permanent masking, where data subjects are anonymised with no possibility of reversing the process.

Redaction, meanwhile, is used post-hoc when individuals featuring in footage relevant to a criminal investigation are anonymised if they’re not under suspicion themselves.

Upgrade your security systems with ESA Risk

For advice on physical security or to enquire about a free security risk assessment, please contact Liam Doherty, Security Consultant at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Risk management strategy: Utilising your workforce

A positive risk management culture

All businesses should aspire to foster a positive risk management culture within their organisation, as part of risk management strategy. The issue is how do you go about creating a positive culture? There is no single solution, but there are a number of key factors that contribute towards achieving the right outcome.

Organisations with a positive culture are characterised by a process of open communication and sharing information within an environment of mutual trust that enables issues to be discussed thoroughly in order to serve the best interests of the company.

Put simply, risk management works best when employees are empowered to speak up and take action when they believe there is something they need to raise.

Employees – an asset or a liability?

Your own employees can put your organisation at risk in many ways, as security threats are not always external. The greatest risks often come from within an organisation. Even wellmeaning employees can unintentionally open an unsolicited email and with the click of a link jeopardise the security of the company’s IT system.

In an era of increasing technological complexity, the threats of hacking and cyber crime, the cost of adverse incidents and ever-greater regulatory scrutiny, the effective management of employee risk can reduce the overall risk faced by an organisation. If well managed, it can provide the business with a competitive edge.

Practical steps

There is no perfect solution, but you can follow some practical steps to instilling the right culture and strategy for risk management within your enterprise:

  • Explain the risks faced by the business to your employees and the benefits of sound risk management so that it is understood by all staff.
  • Take time to explain the idea behind any risk management initiative in straightforward terms-tell them why a companywide commitment is important.
  • Allow employees to feel safe to voice any concerns about anything that could go wrong and encourage them to come forward when they see something could be done better.
  • Develop training programmes for each part of the business – consult employees on the particular risks each set of employees is likely to face and the control measures they are expected to follow to mitigate such risk.
  • Recognise good behaviours and reward them. Spell out that bad behaviours will have consequences.
  • Encourage feedback from employees and allow sufficient time for any changes in practice to be implemented.
  • Lead from the front and by example by being seen to act when risks are reported.

Utilising your workforce as part of your risk management strategy

Your employees are at the core of your business; daily operations, customer interactions, online interactions, decision making – the list of where your workforce can make the difference is almost endless. They play an integral part in the running, reputation and, fundamentally, the success of a company. It is therefore vital that the unique knowledge that employees have of their work is effectively harnessed and exploited as part of your risk management strategy and framework.

Taking the time to engage your workforce to help create a positive risk management culture will challenge them to develop new and better ways of working and deliver measurable rewards in terms of greater productivity and profitability.

If you require advice on risk management strategy or would like to know more about creating a positive workplace culture, contact Mike Wright, Risk Management and Investigations Consultant at mike.wright@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Why small businesses need business consulting

Business consulting can remove some of the burden, enabling business owners to manage their time and energy better.

What is a business consultant?

A business consultant is both experienced and educated in business management and helps improve efficiency and the performance of the business they are working with. They can provide solutions to help strategy management, smoother running of operations and with increasing revenue. Any challenges the company is facing can be tackled in partnership with the consultant, who is fundamentally an asset to the growth of the business.

Having an objective, expert opinion can save both time and resources for a company director. Consultants aren’t as personally invested in operations in the way that managers or employees may be, so having an outside view is helpful in making improvements. A consultant’s broader knowledge in business trends, new processes and industry challenges enables them to give relevant advice. They know the best practices and can identify inefficiencies or issues quickly.

So, how do small business consulting services work?

Good consultants will customise their services to your business, rather than use a generic toolkit. Consulting should be tailored to the individual, or the company, so a consultant should first learn about your business and goals, before devising a strategy that works for you.

Consultants can:

  • Provide expertise in specific markets
  • Provide advice for financial planning or funding
  • Identify challenges and problems and offer practical and pragmatic solutions
  • Provide training
  • Strategically refocus the business to increase revenue and reduce costs
  • Expand the business into new markets or target growth in current markets
  • Reorganise the business model.

Once the consultant has learnt as much as possible about the business from the owner and employees, including the physical space, company materials and, of course, finances, they can implement and plan for any of the above changes.

Consultants should do this with empathy for the client’s situation, discretion about operations, flexibility to adapt to the company environment and openness to adapt to the situation, including what resources are available and the lengths the client is willing to go to make changes to the company.

The evaluation phase comes next, where the business consultant has reached a deeper understanding of the company and then works to identify where change is needed. Strengths, weaknesses and problems are evaluated here, alongside solutions and ideas of opportunities to increase profits and grow the business.

During this phase, the consultant should communicate with the client and employees throughout and begin to implement changes, so it is important for everyone within the company to remain open and cooperative. The client and consultant will then agree on a plan to make adjustments to, or restructure, the business. Here, the consultant may have to eliminate liabilities, for instance by making recommendations based on staff performance or disposing of old systems. They should also build on assets, expanding what already works well.

“Consultants bring their ‘best practice’, as they draw on their experience from across many companies and a number of sector specific industries in order to make the relevant changes and improvements to your business.”

Business growth consultants can help you plan for the future to achieve long-term goals, but also provide short-term solutions and advice. Consultants know effective strategies for expansion that have already been tried and tested, so in this way can effectively help your business grow.

Business consulting is like a partnership that helps business owners save money and time and reduces the stress of running all aspects of the business.

If you require small business consulting services or advice on managing company finances and improving your strategy, please contact Charlie Batho, Financial and Forensic Accounting Consultant, at charlie.batho@esarisk.com or on +44 (0)343 515 8686 or via our contact form.

Deep dive for the answers you need
Or contact us on +44 (0)343 515 8686 or at advice@esarisk.com.

Deep dive for the
answers you need

Lawyers, accountants, advisors, investors, senior
management. You name them, we help them find the answers
they need. Ready to discover how we can help you?