ISA, a Toronto-based cyber security firm with over 20 years of experience helping organizations of all sizes solve complex challenges relating to IT security, today launched its new standalone
Incident Response Readiness Service designed to help Canadian organizations respond to cyberattacks in hours rather than days. The expanded service is the result of positive customer feedback from ISA’s years of experience providing incident response as well as the need for this type of offering due to the evolving cyberattack landscape. It takes a proactive approach to cyber security and helps customers cope with ever more sophisticated attacks.
A proactive approach is key because attacks are becoming more sophisticated. For example, cybercriminals are increasingly using file-sharing to distribute their malware payloads, according to recent data from ISA’s
Cybersecurity Intelligence and Operations Centre (CIOC).
It’s easier to carry out an attack by moving within an organization rather than relying on e-mail attachments, Pollitt explained. According to customer network data gathered from the ISA CIOC, there was a 500 per cent increase in a file sharing exploit known as Samba, between Q2 and Q4 2017.
Learning the Samba (exploit)
A good example of the Samba exploit is “EternalBlue” because it was the underlying vulnerability in Windows that was exploited by the WannaCry ransomware to spread from network to network. Samba is an open source implementation of the Server Message Block networking protocol, which allows Linux systems to share file and print services with Windows machines. There were other separate flaws in Samba’s implementation of SMB not related to EternalBlue that could potentially lead to attacks as well.
Ransomware attacks that spread through exploits like Samba are, by their nature, extremely difficult to defend against and require a proactive security approach. The main reason is that in order for any business to go about its day-to-day activities, people need to share files. It would be unrealistic and ultimately detrimental to an organization’s survival to shut that file-sharing capability down.
Better to be prepared than sorry
It’s no secret that cyberattacks are on the rise. Recently an organization contacted ISA to help with a malware incident. The organization’s servers had gone offline and were rebooting. There was no patch management and the internal team was unprepared to deal with the threat.
ISA’s security team was able to identify a complex, multi-stage, zero-day threat for which there was no protection available and contain it before the malware reached its second stage. If the malware had deployed fully, it would have used the organization’s servers to mine virtual currency.
Taking action with Incident Response
ISA’s Incident Response Readiness Service provides an initial triage within 30 minutes of an attack, 24 hours a day, seven days a week through access to ISA’s CIOC. Without the Incident Response service, recovering after an attack can take days compared with hours.
ISA recommends implementing a documented Incident Response Plan based on a six-stage approach that ensures readiness throughout the Incident Response lifecycle.
-
Preparation – Review of existing security infrastructure, preparing identification and response plans, and implementation of incident response tools and processes.
-
Identification and Assessment – Timely detection of security incidents and determination of their nature and potential impact.
-
Containment – Immediate action, using documented processes, to limit damage and prevent any further loss or impairment.
-
Eradication – Evaluation of systems to ensure the security incident is fully remediated.
-
Recovery – Restoration of data and network availability, as well as confidentiality and ongoing integrity.
-
Lessons Learned – Review and assessment of the events and processes that have taken place, and application of improvements to the plan.
ISA recently published a whitepaper on its six-step plan, which can be downloaded here.
Amazon Music Now Available on BluOS
Posted in Commentary with tags Bluesound on December 14, 2017 by itnerdLenbrook International, the Canada-based developers of the BluOS music operating system, today announced that Amazon Music is available on all BluOS Enabled devices from Bluesound and NAD Electronics. BluOS customers in the US, UK, Germany, France, Italy and Spain can now enjoy millions of songs with simple hassle-free controls and instant access to Amazon’s exclusive library of curated playlists in any room of the house, from streaming services Amazon Music Unlimited and Prime Music. Streamed music from Amazon Music and Prime Music can also be streamed to multiple BluOS Enabled devices simultaneously in the home, making for an even richer multi-room audio experience.
With Amazon Music, customers can now easily stream music through a home Wi-Fi network to any BluOS Enabled stereo component, speaker, or home theater, with the simple and intuitive controls of the BluOS Controller app for smartphone, tablet and desktop. Additionally, BluOS offers Amazon Music customers the option to build and create playlists in the BluOS app, which can be accessed at any time without having to switch or run multiple apps on their control device.
Customers can start streaming on BluOS today by upgrading their BluOS Enabled devices to software version 2.14.2 or higher and download the latest BluOS apps, version 2.14.0 or higher, for smartphone, tablet, and desktop.
To learn more about Amazon Music and its availability, visit www.amazon.com/amazonmusic.
Leave a comment »