Archive for May 22, 2024

Epson Says That This Father’s Day, Don’t Make Dad An “Afterthought”

Posted in Commentary with tags on May 22, 2024 by itnerd

When it comes to gifting, it’s truly the thought that counts. But according to a 2023 study from Retail Council, 50% of Canadians will tack on finding a Father’s Day gift to an existing shopping trip. 

As you prepare Father’s Day, consider that dad should never be treated as an afterthought – he’s a priority! Whether he’s reaping the rewards of a life of hard work, or he’s still out there hustling, dad deserves something special this year that shows he’s truly appreciated.

ET-4850 Wireless Colour All-in-One Cartridge-Free Supertank Printer (MSRP: $599.99 CAD)

With 20% of Canadians currently involved in owning a side business, and one in four considering or planning to start their own business in the next year (Angus Reid), the need for a proper home office setup has never been higher. If the grind never stops for Dad, then neither should his printer ink. The Epson ET-4850 comes with up to 2 years of ink in the box, also helping dad do one of his favourite things – save money. If Dad has a side hustle or his own small business, families can deck his home office out with this printer and watch him maximize his productivity with its high-capacity ink tanks and robust paper handling.

Where to Buy:

ET-2850 Wireless Colour All-in-One Cartridge-Free Supertank Printer (MSRP: $299.99 CAD)

Even if dad doesn’t have his own business or side hustle, he still needs a printer to help keep up with day-to-day printing tasks. The ET-2850 will make these tasks easier with auto-duplex printing, a high-resolution flatbed scanner and convenient colour display. Plus, this product provides impressive print quality and offers up to a 90% savings with replacement ink bottles vs. ink cartridges, so dad can happily print away alongside the family without having to worry about running out for refills.

Where to Buy:

EpiqVision Mini EF12 Smart Streaming Laser Projector (MSRP: $1,299.99 CAD)

If Dad is hard to shop for because it seems like he has everything, the Epson EpiqVision Mini EF12 is an awesome pick. This projector is perfect for the dad looking to upgrade his home theatre, living room or outdoor entertaining space. This product offers stunning picture quality up to 150″ and has built-in Android TV, so Dad can steam his favourite shows, movies and sporting events. Plus, it’s portable, making it easy for Dad to stream bright images from virtually anywhere in the home, or even outside for a luxurious cottage weekend!

Where to Buy:

New Research From Scalable Software Finds That Bad Tech Is Costing Millions Of Workers Almost 4 Hours Per Week

Posted in Commentary with tags on May 22, 2024 by itnerd

New research from Scalable Software has revealed that IT departments are struggling to evolve and adapt to the new hybrid digital workplace, leading to significant loss of productivity for millions of workers. The survey of 400 US and UK IT decision makers (ITDMs) found that, on average, employees lose nearly four hours a week (3.78) because of digital employee experience (DEX) failings. Despite being aware of the impact poor digital experiences and digital friction have on productivity, IT teams lack the data to identify problems and optimize experiences.

An overwhelming majority (90%) of ITDMs in both the US and UK say their organization suffers from “productivity paranoia” over hybrid working. Yet, the research finds many businesses still use traditional productivity measures which are not relevant in hybrid digital workplaces – so in reality are unable to accurately assess productivity or identify where blockers occur. For instance, businesses are relying on insufficient metrics such as work output (67%), line manager assessments (56%), time tracking software (51%), and employee self-assessment (48%). The risk of relying on such limited and subjective methods is conflating an output or being present online with being productive.

Previous research from Scalable Software found that 43% of knowledge workers say poor digital employee experience (DEX) has reduced their job satisfaction, while 29% say it has made them want to quit. Moreover, ITDMs and knowledge workers both identify the same top three causes of poor DEX; having to toggle between applications repeatedly to complete a task, applications that repeatedly freeze, crash or load slowly, and too many communication channels to manage resulting in “notification overload”. However, while there is a common understanding between workers and ITDMs of the major challenges, IT departments are still largely using reactive metrics to analyze DEX, including volume of IT support tickets/requests (67%), service desk performance (60%) and employee self-assessment (48%).

To successfully analyze productivity through improved DEX, organizations need to deploy platforms that can collate and distill data from every endpoint so that IT departments can accurately measure and analyze all workflows across the enterprise, regardless of whether staff work from home or in the office. These capabilities enable IT departments to proactively deliver exceptional digital experiences that help keep all employees productive and engaged.

To download the full report, The evolution of the IT department: From break/fix to the backbone of the modern enterprise, please visit: https://www.scalable.com/2024-digital-employee-experience-new-research

Methodology:

The research was commissioned by Scalable Software and conducted by independent research company, Sapio Research. Fieldwork was conducted in March and April 2024. Respondents consisted of 400 senior IT decision makers in organizations with more than 1,000 employees across the UK and the US.

Nuspire Launches New Incident Response Readiness Service

Posted in Commentary on May 22, 2024 by itnerd

Nuspire today announced the launch of its new Incident Response Readiness Service. The service equips organizations with the tools and expert-led training necessary to effectively handle and mitigate cybersecurity threats through realistic simulations and scenario-based training.

The newly launched Incident Response Readiness Service provides a dynamic and interactive environment where organizational teams can test and enhance their incident response strategies. By engaging in tailored cybersecurity scenarios that reflect the specific risks faced by each organization, teams are better prepared to tackle potential security breaches.

Key features of Nuspire’s Incident Response Readiness Service include:

  • Scenario-Based Preparation: Custom scenarios mirror the unique risks each organization faces, helping teams practice and refine their response to cyber threats.
  • Tabletop Exercise Integration: This method utilizes tabletop-style exercises to provide interactive incident response simulations, testing teams’ decision-making, communication and policy application skills in a controlled environment.
  • Comprehensive Analysis and Reporting: Insightful post-exercise debriefs offer detailed analysis of team responses, highlighting strengths and pinpointing critical areas for improvement.
  • Continuous Improvement and Alignment: The service promotes a unified approach to cybersecurity, engaging key stakeholders across various departments to ensure a cohesive and robust defense strategy.

Learn more about Nuspire’s new Incident Response Readiness Service.

Microsoft Recall Is A Privacy Nightmare

Posted in Commentary with tags on May 22, 2024 by itnerd

Microsoft recently had a bunch of major announcements at Build 2024. The one that we’re going to talk about today is a new feature called Recall. The feature operates in the background and takes screenshots of what you’re doing on your PC while you use it. Whenever you perform a search with Recall, it pulls from all these screenshots to find relevant moments in your PC activity history that might be what you’re looking for, stitching them together into a scrollable timeline. That way you can look through that timeline to find something that you’re looking for. This feature runs on Microsoft’s new PCs that have dumped Intel processors for ARM processors. Like this one or this one, or a new Surface device for example.

Here’s where things get sketchy. While Recall apparently encrypts everything that it is taking a picture of, Recall with the default settings is taking pictures of everything. So if you do online banking, enter your SIN number online, or do anything else that is sensitive, Recall will likely know about it. Think of the fun a threat actor could have if they somehow managed to pwn the PC and got access to that data. And don’t think that threat actors aren’t thinking about giving that a shot as they know that it’s a potential gold mine of information that they can sell on the dark web. Never mind use against you. Now at this point a threat actor would likely have to have physical access to the device as this info is stored locally. But the one thing that I have learned over the years is that threat actors are creative and crafty individuals. So if there’s another attack vector out there that will allow them to grab this data, they will find it. And exploit it.

So it’s not all sunshine and roses for Recall. And the news gets worse for Microsoft as Recall has already gotten the attention of the UK government who are looking into it:

The UK data watchdog says it is “making enquiries with Microsoft” over a new feature that can take screenshots of your laptop every few seconds.

Microsoft says Recall, which will store encrypted snapshots locally on your computer, is exclusive to its forthcoming Copilot+ PCs.

But the Information Commissioner’s Office (ICO) says it is contacting Microsoft for more information on the safety of the product, which privacy campaigners have called a potential “privacy nightmare”.

Microsoft says Recall is an “optional experience” and it is committed to privacy and security.

According to its website, users “can limit which snapshots Recall collects”.

“Recall data is only stored locally and not accessed by Microsoft or anyone who does not have device access,” the firm said in a statement.

And it said a would-be hacker would need to gain physical access to your device, unlock it and sign in before they could access saved screenshots.

But an ICO spokesperson said firms must “rigorously assess and mitigate risks to peoples’ rights and freedoms” before bringing any new products to market.

“We are making enquiries with Microsoft to understand the safeguards in place to protect user privacy,” they said.

If the UK is making these enquiries, then it’s a safe bet that the EU won’t be far behind. Microsoft is already in a bit of a fight with them over not responding to a request for information related to their generative AI features. Thus having Recall pop up on their radar screens would likely be a bad thing for Microsoft. And you have to wonder how many others are going to be knocking on Microsoft’s door in regards to Recall.

My personal thoughts go something like this. This is a feature that I would instantly turn off the second that I got one of these new Microsoft PCs. I simply don’t want something actively recording anything and everything that I do in the background as I simply could not trust it to not pick up something that I don’t want recorded. And while I could tweak settings to try and mitigate what Recall does, I still wouldn’t trust it. Microsoft in my opinion needs to rethink Recall. While it is something that does sound kind of cool on the surface (pun intended), it is also concerning at best because of the privacy implications. And until Microsoft demonstrates that this feature is safe for uses, it’s a feature that I will be avoiding. And you should as well.

Beyond Identity Launches Industry’s First Secure Access Platform 

Posted in Commentary with tags on May 22, 2024 by itnerd

Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, today announced the release of its Secure Access Platform, a secure-by-design solution engineered to protect organizations from the sophisticated and evolving landscape of credential and access-based attacks. This announcement comes at a critical time when industry-trusted Single-Sign-On (SSO) and Identity and Access Management (IAM) tools are increasingly compromised, as evidenced by recent high-profile breaches involving major players like Okta and Microsoft. 

Beyond Identity’s Secure Access Platform is a game-changer, crafted to be a standalone alternative to legacy SSO/IAMs or an integrated platform built to harden the security posture of existing SSO/IAMs. It addresses urgent security needs by combining passwordless, phish-resistant MFA with innovative SSO and risk detection capabilities, ensuring thorough management and mitigation of access risks with a platform that can make security guarantees. 

Innovative Features Addressing Modern Security Needs

  • Secure Single Sign-On (SSO): Optimized for zero-trust architectures, providing a secure by design, simple to administer, and easy-to-use passwordless user experience.
  • Continuous Authentication: Validate user and device security compliance before authentication and continuously, even during active sessions, to account for risk over time, setting a new standard in access security.
  • Passwordless, Phish-Resistant MFA: Eliminate phishing as a threat to organizations even if users and admins click on malicious links. 
  • Device Posture Assurance: Gain visibility and control over security compliance across all devices, including unmanaged devices, providing comprehensive defenses against external threats
  • Robust Integration Ecosystem: Get more out of your security stack investments by using all risk signals to make risk-based access decisions. Shift security left by not only adding detection and response capabilities to prevention. 

Discover the power of Beyond Identity’s Secure Access Platform by signing up at https://www.beyondidentity.com/products/secure-workforce. Join them for live demonstrations at the Gartner Security & Risk Management Summit 2024, booth #843, from June 3 – 5 in National Harbor, MD.

EPA Issues Enforcement Alert For Water Systems In The US

Posted in Commentary with tags on May 22, 2024 by itnerd

On Monday, the EPA released an enforcement alert encouraging water systems to take immediate action to protect the nation’s drinking water as cyberattacks against water utilities across the country are escalating in frequency and severity:

This Enforcement Alert provides community water systems (CWSs) with information on immediate steps they can take to ensure compliance with SDWA Section 1433 and to reduce cybersecurity vulnerabilities.

Cyberattacks against CWSs are increasing in frequency and severity across the country. Based on actual incidents we know that a cyberattack on a vulnerable water system may allow an adversary to manipulate operational technology, which could cause significant adverse consequences for both the utility and drinking water consumers. Possible impacts include disrupting the treatment, distribution, and storage of water for the community, damaging pumps and valves, and altering the levels of chemicals to hazardous amounts.

Implementing basic cyber hygiene practices can help your utility prevent, detect, respond to, and recover from cyber incidents. Because water utilities often rely on computer software to operate their treatment plants and distribution systems, protecting information technology and process control systems from cyberattacks is vital. Small water systems are not immune from cyberattacks. Recently, disruptive cyberattacks from adversarial nation states have impacted water systems of all sizes, including many small systems. As a result of these increased threats, EPA is increasing its enforcement activity to protect our nation’s drinking water.

Here’s some insights from Tom Marsland, VP of Technology, Cloud Range, and Board Chairman of VetSec that I got in my inbox on Tuesday:

“Yesterday, the EPA issued an enforcement alert due to the increase in attacks on United States critical infrastructure. The EPA outlined the existing rules and regulations governing drinking water systems and cyber security and effectively put operators on notice that they are increasing inspections and enforcement. This alert is simply that – an alert, to the rules and regulations that are already in place. While it is a step in the right direction, it does not go far enough to secure our nation’s critical infrastructure. While cyber domain borders are ambiguous due to the very infrastructure the internet is built on, there must be a clear line drawn with defending critical infrastructure, and the government must make clear that attacks on a drinking water system operator are attacks on the United States.

Not only should the EPA enforce the existing rules on the books, but until the punishments of ignoring the rules outweigh the cost of actually hiring cybersecurity professionals to work on these systems, these clear lapses in cyber hygiene will continue. In many cases, smaller operators simply do not have the budget or the education to secure their networks. The federal, state, and local governments must provide more resources, and quickly, to enable private operators to secure our cyber borders before we do see damage to equipment and harm come to the people consuming water from these systems.”

Threat actors will always go for the soft target and it looks like drinking water systems are on the list. That’s not good as a well placed attack will harm a lot of people. Hopefully the people who run these systems are paying attention so that this critical infrastructure is properly secured.

CISA Issues Urgent Warning Regarding Mirth Connect

Posted in Commentary with tags on May 22, 2024 by itnerd

CISA has added a critical security flaw impacting NextGen Healthcare’s Mirth Connect to its Known Exploited Vulnerabilities (KEV) catalog. This flaw, identified as CVE-2023-43208, has been actively exploited in the wild.

Mirth Connect is an open-source data integration platform extensively used in the healthcare industry to facilitate standardized data exchange between various systems. It handles over a billion transactions daily across thirty countries. 

The vulnerability allows unauthenticated remote code execution and stems from an incomplete patch for another significant flaw, CVE-2023-37679, which carries a CVSS score of 9.8. Details of CVE-2023-43208 were first disclosed by Horizon3.ai in late October 2023, with additional technical information and a proof-of-concept exploit released in January 2024. 

According to security researcher Naveen Sunkavally, CVE-2023-43208 is linked to the insecure use of the Java XStream library for unmarshalling XML payloads, making it easily exploitable.

CISA has not released details regarding the specific nature of the attacks exploiting this flaw or the entities responsible for weaponizing it. The timing of these exploitations also remains unclear. However, federal agencies are mandated to update to a patched version of the software, specifically Mirth Connect version 4.4.1 or later, by June 10, 2024.

The aforementioned Naveen Sunkavally, Chief Architect, Horizon3.ai had this to say: 

   “It’s not surprising that CVE-2023-43208 was added to the CISA KEV catalog. Back in April, Microsoft threat intelligence reported that CVE-2023-43208 was being exploited by China-based threat actor Storm-1175 for initial access. And there have been reports of exploitation prior to that.

   “We work with a lot of healthcare companies. While Mirth Connect may not be a familiar name, the data we have backs up the fact that it is a widely adopted technology. Our data is what led us to research Mirth Connect for vulnerabilities in the first place last summer. Our own pentesting product, NodeZero, routinely exploits CVE-2023-43208 in client environments, both for initial access and lateral movement.

   “The inclusion of CVE-2023-43208 in the CISA KEV catalog is a reminder that attackers are inherently opportunistic and will exploit anything that seems valuable – not just VPNs, Microsoft Exchange, and Confluence. We highly encourage companies to check for Mirth Connect in their environments and patch to the latest version.”

While patching all the things isn’t a guarantee that it will keep the bad guys from pwning you, it’s a great start as vulnerabilities that have patches available are low hanging fruit for threat actors.