October 17, 2011
Other Links of Interest
Contributors
Monday, October 17, 2011
Important Alert About SEC Cybersecurity Disclosure Guidance
October 17, 2011
Friday, September 30, 2011
LEADING ALONG THE EDGE: HOW TRANSFORMATIONAL LEADERS CREATE SAFE, PRODUCTIVE WORKPLACES
Organizer: Social Media Today, Speaker: Robin Carey, Sustainable Business Forum, Dupont Sustainable solutions
Webinar 9/29/2011, will be available on demand within a couple of days
Notes taken by: Brittany Box, Fortalice, LLC.
• Panel: Norman Marks (VP of Governance, RIsk, and Compliance at SAP), Elaine, Cohen (CSR Consultant and sustainability reporter at Beyond Bus. Ltd., author of CSR for HR), Simon Herriott (Dupont), Robin Carey (CEO of Social Media Today)
SAFETY
• often has its own structure within a company- individualized culture
• much mandated by law in countries and states, compliance
• based on size:
⁃ larger- more structured, separated from sustainability mgmt., etc.
⁃ smaller- lack structure, may not be formal at all, HR, Operations manager responsibility, no written policy **concern because this is where growth is
• value of security and safety must be clarified to executives and key stakeholders in order to be addressed adequately-- putting a value on safety that translates
• Is technology security being used appropriately?
⁃ need to communicate and demonstrate effectiveness (ie. with tangible milestones of progress) in regards to business goals
⁃ should be a process vs. one quick fix
⁃ members at all levels must have some level of understanding and concern
• Risks: reputation risk is much higher now than ever
⁃ even if its just a PERCEPTION and not a fact, this is enough to take down an enterprise
⁃ real time reliable information must be delivered across all levels
• Virtual Commute now for companies: How do we keep this safe?
⁃ risk prevention is necessary, need to be proactive, but difficult because it must be adapted according to forming trends
⁃ analytics to predict behavior
• What are companies doing to monitor computers in the home office without violating privacy?
⁃ difficult to monitor in remote offices
⁃ a BIG problem, particularly if a global enterprise, that is not being addressed
⁃ lack of tools to actually assess in a real sense what is happening in these locations-- HUGE opportunity for tool development here
⁃ SAP compliance software? Consideration for at home safety?--more for protecting electronic devices in the home
⁃ provide as much education and awareness as possible
• OSHA now requiring annual report from agencies- what social media they're using and how?
• US govt. requires self-certification that home office is safe
• Need for best practices regarding home office regulation and monitoring of private environment
• 3rd party safety practices? Many companies fail to address this dimension
⁃ need to carry safety regulations through all levels of chain in extended enterprise
• Cost of being safe far outweighs the potential cost of not being safe**
• Problem: Maybe companies don't know how far to go?
Friday, September 23, 2011
Beware of Fake Testimonials!!
Notes taken by: Theresa Payton, Fortalice, LLC.
Also featured on WBTV's Protecting Your Cyberturf with Kristen Miranda and Theresa Payton
We all have learned to count on reviews from ordinary people before we purchase a product, try a new service, or eat at a restaurant. But what if you based your decision on reading opinions that were not what they seem to be? Your hard earned money might go right down the drain if you are not aware of this latest issue.
It’s a new site called FIVERR and even though the site is still in test mode – beta – there are lots of people hanging out there. The allure? It’s the place where people share the things they will do for $5! Including, writing testimonials for businesses, even if they don’t know a thing about the business.
1 TIP ON HOW TO SPOT A POTENTIAL REVIEW FAKE:
If you see a big burst of reviews, all positive or all negative and within hours or a few days, you might have a scam. Look for similar patterns to the positive or negative feedback.
TIPS TO USE WHEN RESEARCHING A PRODUCT OR SERVICE
If the reviews seem to good to be true, go to multiple review and opinion pages to see what you can find
Go out to Facebook or Twitter and ask your social network for input
Check Consumer Reports
Check in with the Business Bureau where that product or service is located to see if the reviews are consistent with the online ratings
WEB RESOURCES:
If you want to see how others use Gogo or other Wi-Fi services on airplanes look at Mashable’s infographic:
http://mashable.com/2011/08/31/inflight-wifi-infographic/
There are many sites that allow people to post opinions. We have listed some options for you on three sites.
EPINION.COM: Sites like epinion.com try to set up a trusted network of opinion givers to avoid scams but they can still get through. If you see a problem on their site, go to: http://www.epinions.com/help/
YELP.COM: Yelp.com lets you report questionable material at their site: http://www.yelp.com/contact
AMAZON.COM: You can see Amazon.com’s guidelines and report a problem at: http://www.amazon.com/gp/community-help/customer-reviews-guidelines
Quiet Bad Guys Behind the QR code
We told you about these a year ago, those funny looking bar codes called “QR” codes. They are popping up on TV screens, coupon
flyers and around in stores. They are fun to scan and get special information. But we’re learning now that they may not be safe
to scan. QR codes, the “QR” stands for Quick Response. Marketers love them because they can store a lot of information right
to a customer’s smart phone with a quick scan. The tag can redirect a phone to a photo, website or even a movie clip. The same
thing that makes them fast and convenient can also make them unsafe.
We have told you before not to click on links from people you do not know. Well, this can be the same thing!
If you click on a QR code that has been manipulated or tampered with, it’s the equivalent on clicking on a bad link on an email and –
boom – your smart phone is infected!
3 SAFE SCANNING QR TIPS:
1. Wary: Be wary of QR codes
2. Watch: If a QR code tries to install something on your phone, turn the phone off
3. Protect: your personal information and passwords:
If a QR code leads you to a website that asks for personal information or passwords, think twice before inputting information
or go to the site another method
WEB RESOURCES:
The Better Business Bureau posted a warning about QR codes at:
http://sandiego.bbb.org/article/consumer-alert-qr-code-safety-28037
If you are concerned about your smart phone security, there are mobile security tools. For a recent review, check out PC Magazine’s
write up at: http://www.pcmag.com/article2/0,2817,2385361,00.asp
Fast Company has a summary about QR codes and how to use them for your business:
http://www.fastcompany.com/1720193/13-creative-ways-to-use-qr-codes-for-marketing
Tuesday, September 13, 2011
9/11 Social Media Impact
Notes taken from: Talking points with Theresa Payton, Fortalice, LLC. and Kristen Miranda, also covered in WBTV's segment, Protecting Your Cyberturf
What's different? 9-11-2011:
Lumension Webinar 9/7/2011
It’s Your Move: The Changing Game of Endpoint Security Webinar 9/7/2011
Hosted by: Lumension
Notes by: Brittany Box, Fortalice, LLC.
Executive Summary: The changing landscape of threats and more mobile workforce create a higher need for more thorough network security.
Panel: Paul Henry( security and forensic analyst) , Paul Zimski (Lumension), Doug Walls, Jason Brown
1. How have the Bad Guys changed the Rules
-there are no rules for them, defenders follow rules
-attacks on all ports
-Current recipe for disaster:
1. Bait an end user with spear phishing
2. Exploit a vulnerability
3. Download a back door
4. Est. back channel
5. Explore & steal
6. Select another victim
7. Repeat (ie. FB friending)
-Flaw Remediation is missing the target* still taking advantage of the same vulnerabilities
-neglect our endpoints, traditional AV can no longer keep up, focused on gateway only
-more than 73,000 new malware instances daily- can’t be matched without constant signature monitoring
-14 victims of malware every single second!!
-focused on blocking the delivery of malware-not preventing its execution…definition of insanity: repeating the same thing multiple times and expecting different results
- we need to make a definitive change in our defenses or we will procure the same results
-next generation malware has arrived: FLUX- is a new Trojan spreading covertly through the internet, instead of the infected machine waiting for a connection to be made from the outside, the infected machine makes the connection itself, write code—need to recognize, nearly invisible to current anti-malware software, circumvents most desktop firewalls
-Polled audience: What is your top IT security challenge- Advanced Persistent threats/ targeted attacks 21%, patching critical vulnerabilities 15%, data encryption 4%, malware viruses 20%, reducing agents and consoles 1%, educating users 38%
2. Key Moves we can make to regain control
1. Implement Defense-in-Depth Endpoint Security: more operational & security approach at a core level, risk mitigation, define a trusted environment from in the inside-out
2. Shift from threat-centric to Trust-based security
-stop malware payloads
-what is the end goal of that attack?
-antivirus will provide some protection against known payloads, provides a good layer in ultimate security defenses
-application whitelisting: what should be trusted and what should occur, look inwards on own environment unlike traditional AV, can limit use of unauthorized applications
-Trusted updater: authorizes select systems mgt. solutions to “update” software, patches, and remediations, while automatically updating the whitelist
-trusted publisher: authorizes apps. Based on the vendor that “published” them thru the digital signing certificate
-trusted path: authorizes apps to run based on their location
-local authorization—limit local admin usage, monitor and control existing local admins
3. Focus on operational basics
-Assess, Prioritize, Remediate, Repeat
-vulnerability management
“the top security priority is patching client-side software”-SANS institute, heterogeneous patch maker in place
-immediate and simple risk mitigation
4. Manage those devices ie. Compromised Flash drives? Keyboards? Anything with memory
-enforce access policy
-enforce encryption policy
-monitor, manage, report
3. Real world IT Security Experience
-EM solutions, Arlington VA: insider threat and data spill, huge focus on auditing transportable media
-protect dedicated network
-Lumension Endpoint Management and Security Suite: snapshots all endpoints
4. Q&A
-need to integrate all security systems
-need to build integrity check into defenses
Friday, September 2, 2011
Fortalice Cyber-Security Survey!
http://www.surveymonkey.com/s/5MZ22W6
We will be publishing the results on here some time within the next 2 weeks! Your help with our research would be very much appreciated!
Have a great and safe Labor Day weekend!
Brittany