Friday, July 17, 2020

If 123456 Is Your Password, Change It Immediately



You probably aren't familiar with the name Ata Hakcil. He's a computer engineering student who recently conducted one of the largest password security surveys currently available.

To conduct his research, he collected a number of username and password "data dumps" from the Dark Web and analyzed the passwords he found there. Hakcil was able to analyze a massive collection of more than a billion passwords, looking for trends and commonalities.

IT Security Myrtle Beach SC Professionals have long known that password security is an area of persistent weakness that leaves companies of all shapes and sizes exposed. Hakcil was able to measure and assess just how bad that problem is. What he found was depressing.

The most commonly used password in the collection he analyzed was simply '123456,' which appeared in his dataset more than seven million times. It is the most widely used password in the world. Put another way, a staggering 1 person in 142 was found to have used that simple password. As you might suspect, that is laughably easy for a hacker to guess using the simplest of techniques.

In addition to that, Hakcil discovered that the average password length is 9.48 characters, which isn't great. Given the password referenced above, is better than you might have guessed.

Other relevant and intriguing statistics culled from this study include things like:

  • Only 12 percent of passwords include a special character
  • 29 percent of the passwords reviewed used alphabet characters only
  • 13 percent used numbers only
  • Given the above, fully 42 percent of all the passwords in the dataset were vulnerable to quick "dictionary style" attacks that would allow a hacker to gain access with minimal effort.
  • The most common 1000 passwords unearthed by this research accounted for 6.607 percent of the total, which gives hackers a long list of low hanging fruit to work with.
  • With the most common 1 million passwords, the hit rate is 36.28 percent. With the most common 10 million passwords, the hit rate is 54 percent. This makes most networks incredibly easy to breach.

If you're wondering why we keep reading about so many high profile data breaches month after month, the results of this research go a long way toward explaining it, and that's unfortunate.

Call SpartanTec, Inc. now and let our team of IT professionals make sure that your computer and network are secured and protected against possible online threats.

SpartanTec, Inc.
Myrtle Beach, SC 29577
(843) 420-9760
https://www.spartantec.com/




Monday, July 13, 2020

Sophos Launches Managed Threat Response Service


Managed Threat Response

On July 14, learn about how MTR backs your organization with an elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats.

July 14th  2:00 EST
Register Here

 

New Threat Hunting, Detection and Response Offering Powered by Machine Learning and Expert Analysis to Neutralize the Most Advanced Cybersecurity Threats

Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced the availability of Sophos Managed Threat Response (MTR), a fully managed threat hunting, detection and response service. The re-sellable service provides organizations with a dedicated 24/7 security team to neutralize the most sophisticated and complex threats.

These types of threats include active attackers leveraging fileless attacks and administrator tools such as PowerShell to escalate privileges, exfiltrate data and spread laterally, as explained in the SophosLabs Uncut article on Lemon_Duck PowerShell malware. Attacks like these are difficult to detect since they involve an active adversary using legitimate tools for nefarious purposes, and Sophos MTR helps eliminate this threat.

Cybercriminals are adapting their methods and increasingly launching hybrid attacks that combine automation with interactive human ingenuity to more effectively evade detection. Once they gain a foothold, they’ll employ ‘living off the land techniques and other deceptive methods requiring human interaction to discover and disrupt their attacks,” said Joe Levy, chief technology officer at Sophos. “For the most part, other MDR services simply notify customers of potential threats and then leave it up to them to manage things from there. Sophos MTR not only augments internal teams with additional threat intelligence, unparalleled product expertise, and around-the-clock coverage, but also gives customers the option of having a highly trained team of response experts take targeted actions on their behalf to neutralize even the most sophisticated threats.”

Built on Intercept X Advanced with endpoint detection and response (EDR), Sophos MTR fuses machine learning with expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats. These innovative capabilities are based on Sophos’ acquisitions of Rook Security and DarkBytes technology, and include:

  • Expert-led threat hunting: Sophos MTR anticipates attacker behavior and identifies new indicators of attack and compromise. Sophos threat hunters proactively hunt for and validate potential threats and incidents, and investigate casual and adjacent events to discover new threats that previously couldn’t be detected
  • Advanced adversarial detection: Sophos MTR uses proven investigation techniques to differentiate legitimate behavior from the tactics, techniques and procedures (TTPs) used by attackers. Coupled with enhanced telemetry from Sophos Central, which provides a detailed, full picture of adversary activities as part of the service, the scope and severity of threats can be determined for rapid response
  • Machine-accelerated human response: A highly trained team of world-class experts generates and applies threat intelligence to confirm threats, and takes action to remotely disrupt, contain and neutralize threats with speed and precision
  • Asset discovery and prescriptive security health guidance: Sophos MTR provides valuable insights into managed and unmanaged assets, vulnerabilities for better informed impact assessments and threat hunts. Prescriptive and actionable guidance for addressing configuration and architecture weaknesses enables organizations to proactively improve their security posture with hardened defenses

Sophos MTR is customizable with different service tiers and response modes to meet the unique and evolving needs of organizations of all sizes and maturity levels. Unlike many MDR services that focus on monitoring and threat notification, Sophos MTR rapidly escalates and takes action against threats based on an organization’s preferences.

Sophos MTR is now available from registered Sophos Partners worldwide. Read more on Sophos News, and visit Sophos.com for additional information.

What our partners and industry analysts say:
“Enterprises are facing sophisticated attacks from every direction, and it’s absolutely critical that they can not only detect threats, but also respond to them quickly,” said Aaron Sherrill, information security senior analyst at 451 Research. “Many vendors claim to offer response capabilities, but in reality, few take the actions needed to eliminate threats as part of their core managed detection and response (MDR) offerings. Sophos MTR combines Sophos’ consistently top-rated endpoint protection with human expertise and troves of threat intelligence collected from SophosLabs to create an entirely new offering that meets a mounting market need.”

“The only way to protect against today’s advanced threats is to combine the best tools with the brightest human minds,” said Jeremy Weiss, cybersecurity practice lead at CDW. “Sophos Managed Threat Response is a game changer, combining machine learning with human analysis for an evolved approach to proactive security protection. The customizable offering strengthens our existing threat hunting capabilities and helps us better protect our customers.”

“Cybercrime doesn’t sleep – it’s always ‘on’ – and organizations need around-the-clock protection,” said Ken Hamilton, president and CEO at Total Tech International Inc. “With Sophos Managed Threat Response, Total Tech customers can rest assured that they’re covered even during the second and third shifts that are notoriously difficult to staff. Security health recommendations deliver additional tremendous value, empowering us to take immediate action on improving security defenses.”

Call SpartanTec, Inc. and let our team of computer security experts help set up the most effective measures to protect you against common and advanced cybersecurity threats.

SpartanTec, Inc.
Myrtle Beach, SC 29577
(843) 420-9760
https://www.spartantec.com/

Saturday, July 11, 2020

Why Does Your Enterprise Need A Network Security Firewall?

firewall-2.jpg


Managed Threat Response

On July 14, learn about how MTR backs your organization with an elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats.

July 14th  2:00 EST
Register Here

A network security firewall works as a barrier that will prevent destructive forces away from the computers on a network that’s behind the firewall. The network firewall is a lot like a physical firewall that prevents a fire from spreading from one place to another. Firewalls will protect against various security threats such as denial of service attacks, worms, viruses, and unauthorized remote logins.

 

What is network security firewall?

 

Firewalls are considered as network security systems that check and control the network traffic according to the predetermined security regulations. A firewall Myrtle Beach SC will create a barrier between untrusted external networks and trusted internal networks. Firewalls can either be host based firewalls or network firewalls. A network firewall will filter traffic between several networks and generally runs on a network hardware. Meanwhile, host-based firewalls can be operated on host computers. They work by controlling the traffic of the network both in and out of these machines.

 

Network security firewall is referred to as a security system that is created for stopping unauthorized access to sensitive network information. Firewall could e used as hardware or software and could separate a certain network as well as its data from an external network to keep the privacy of a certain network’s data. There many benefits linked with the use of a firewall in a network including its easy installation and high speed. Using a firewall for your network is relatively cost effective compared to securing every computer separately.

 

Types of Firewall Architectures

 

Circuit Level Gateways

 

A circuit level gateway is a simple type of firewall Myrtle Beach SC that is made to easily and quickly deny or approve traffic without taking up a lot of computing resources. It works by verifying the TCP or transmission control protocol handshake. This check is made to ensure that the session the packet came from is legitimate. Therefore, in case a packet will hold malware, but provided the appropriate TCP handshake, it will be approved. That’s why circuit level gateways alone may not be sufficient for protecting your business.

 

Next Generation Firewalls

 

Next generation architectures are the latest firewall products that were released. The common features include TCP handshake inspections, deep-packet inspection, as well as what they refer to as packet inspection on a surface level. Next generation network security firewalls may also include other kinds of technologies like IPS or intrusion-prevention systems that run to immediately prevent attacks on your network. However, there’s no single definition of what a next general firewall is and that is why it is crucial to check what certain capabilities like firewalls have before you purchase one.

 

Packet Filtering Firewalls

 

Packet filtering firewalls will make a checkpoint at a switch or a traffic router. Firewalls does a basic check of the data packets that comes through the router, checking data such as the destination as well as the origin of the IP address, packet type, port number as well as other surface level data without going to open up the packet to check its content. In case the information packet doesn’t pass the infection, it will be dropped. These firewalls are not resource intensive, and that is a good thing. They do not have a major effect on the performance of the system and these firewalls are simple.

The network security firewall market is increasing at a rapid pace because of different factors. Factors that promote the adoption of this industry are increasing demand for network security and privacy across the globe. Firewalls are the first line of defense and the protector against legal traffic and attacks that pass in and out of the network. Firewalls are crucial components that assist in protecting private systems of a home system, company, etc.

Call SpartanTec, Inc. and let our team of IT experts find the most effective firewall and cybersecurity measures that will protect your company against various online threats.

SpartanTec, Inc.
Myrtle Beach, SC 29577
(843) 420-9760
https://www.spartantec.com/

Thursday, July 2, 2020

Intelligent Endpoint Detection and Response



Intelligent Endpoint Detection and Response

Synchronized security allows you to layer your defenses and stop malware in its tracks, no matter where it is in your environment.

July 7th 2:00 EST
Register Here


Tens of millions of workers have been forced to work from home as the COVID-19 virus rampages around the globe.

That has naturally increased reliance on internet connectivity and disrupted a number of longstanding, well-established working routines. Some of the changes have been for the better, including not having to fight traffic during the daily commute, for example.

However, other changes have made it difficult to work effectively and efficiently. Until recently, no one has been able to study or precisely measure how those changes are impacting the legions of people currently working from home.

That is beginning to change. Recently a California-based tech firm called Fluxon published the results of a survey they conducted to get a better handle on how work behaviors have changed with so many people now working remotely. The results of the survey contain a number of surprises.

Here's a quick overview of the company's findings:

  • Nearly one quarter (23.3 percent) of survey respondents reported feeling more disciplined and almost a third (29.6 percent) report that they are more creative working from home than they were in the office.
  • Nearly three quarters (72.4 percent) of respondents reported that there have been challenges and difficulties with the transition, with the top ten problems survey respondents encountered being:
    • Technology/connectivity issues (50.6 percent)
    • Communication issues (39.6 percent)
    • Virtual Meeting issues (34.4 percent)
    • Lack of social interaction (32.5 percent)
    • Boredom (31 percent)
    • Difficulty collaborating with colleagues (29.9 percent)
    • Not enough face to face time with team members (26.3 percent)
    • Loneliness (25.1 percent)
    • Difficulty accessing company resources (19.1 percent)
    • Difficulty balancing work and home life responsibilities (18.6 percent)

Other issues included things like unproductive meetings, difficulty stopping or stepping away from work, insufficient workspace, and colleagues contacting workers outside of normal business hours. In addition to that, fully a third of survey respondents said they felt less disciplined and efficient since working from home.

The survey results are fascinating and clearly illuminate the challenges, opportunities and areas where working from home can be improved. Wise is the manager who takes these statistics to heart and uses them to make incremental improvements.

Call SpartanTec, Inc. and let our team of IT professionals set up the appropriate cybersecurity measures to protect your employees as they work from home.

SpartanTec, Inc.
Myrtle Beach, SC 29577
(843) 420-9760
https://www.spartantec.com/