Network Security News | Ingalls Information Security

Articles of interest from the week of January 20, 2020

Written by John Frasier | Jan 20, 2020 5:00:00 AM

ConnectWise Control Security Issues Are Tip Of Iceberg For MSPs Using RMM Tools

The ConnectWise Control security vulnerabilities disclosed this week by security researcher Bishop Fox are the tip of the iceberg for MSPs using Remote Monitoring and Management (RMM) tools, according to MSPs. (By O'Ryan Johnson and Steven Burke, CRN) Ingalls: Even MSPs are at risk of exposing themselves and their clients to a disastrous data breach. Having proper security controls is vital to keeping data safe, such as enabling MFA, properly managing and preventing Powershell executions, and deploying next-generation anti-virus. Read more about how to properly secure your RMM usage here.

 

Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users

Software firm is "aware of limited targeted attacks" exploiting a scripting issue vulnerability in Internet Explorer 9, 10, and 11 that previously has not been disclosed. (By Robert Lemos, Dark ReadingIngalls: Our MDR (Managed Detection and Response) services offer layered cybersecurity controls for effective risk management and rapid response. It was designed to be a method of proactive prevention against security threats to your environment, especially zero-day threats, making it one of the industry's leading cybersecurity tools. MDR is critical when it comes to staying ahead of all kinds of threats, detecting and stopping them before they become breaches.

 

Travelex Recovering from Ransomware, but More Firms at Risk of VPN Exploit

Beleaguered foreign currency exchange company Travelex confirmed on Friday that the first of its U.K.-based customer-facing systems were back up and running after the New Year’s Eve discovery of Sodinokibi ransomware on its network prompted a shutdown of key systems. (By Bradly Barth, SCMagazine) Ingalls: Enhancing your patch management process to include vulnerability scanning, a robust remediation workflow, and metrics-based decision support from data collection can do a lot more for your risk management than simply plugging holes whenever a software vendor produces a patch. In our downloadable “8 Effective Cybersecurity Controls For SMBs” guide we discuss how to do more with patch management, and the benefits of a mature Vulnerability Lifecycle Management program. If your business or a client needs expert cybersecurity risk management that includes Vulnerability Lifecycle Management, please contact us today to schedule an engagement with Ingalls Information Security!

 

3 Lessons From the Incident Response Tabletops

Within the field of incident response, planning and testing are key elements of a good security posture. The importance of training and methods of developing tests both feature highly on security professionals’ priority lists. Here are a few lessons I’ve learned about incident response from having run tabletop exercises within IBM and alongside our clients. (By Robert Calvert, Security Intelligence) Ingalls: All organizations are at risk for a data breach, no matter the size. The way you respond to the breach can be just as important as your security defenses. A thorough Incident Response Plan, created before a breach ever happens, can significantly reduce the negative impact of the breach. Read more about how to properly respond to a data breach here.

 

Infiltrating Networks: Easier Than Ever Due to Evil Markets

Attackers don't always need to breach the networks of their victims themselves to plant malware as there are plenty of professional intruders offering their services on underground markets. (By Ionut Ilascu, Bleeping Computer) Ingalls: There's no way of knowing that all hosts within a network are protected without Managed Detection & Response. The threat landscape is constantly changing, and it's critical that any gaps in your endpoint security is detected and resolved quickly. The traditional methods of network monitoring and Intrusion Detection Systems (IDS) may no longer be a valid security control. Read more about Ingalls' next-generation Network Intrustion Detection here.