Knowledge

Newsletters

5/9/2017 Newsletters

May 2017 – Vulnerabilities in Consumer Devices

More and more, security organizations report cyber security vulnerabilities in devices that are not exactly computers. Those devices may include routers, video cameras, and other “internet of things” gadgets. 

It is critically important to know that your home devices with access to the internet are secured. Some of these weaknesses could be related to well-known default user ID and password combinations or whereas, some devices do not even have patching capabilities making people permanently vulnerable. 

Digital Edge is monitoring known vulnerabilities in consumer devices and notifying our friends and colleagues about such cases. 

Click here to see recent vulnerable devices.
 

5/5/2017 Newsletters

Digital Edge ISO/IEC 27001:2013 Certification Success

As of May 1, 2017, Digital Edge is proud to announce its official certification of the International Standards Organization (ISO) 27001 framework for Information Security Management, a specification for an information security management system (ISMS). ISO is an independent, non-governmental international organization with a membership of 163 national standard bodies. ISO is credited for publishing more than 2100 international standards, covering almost every industry, from technology, to food safety, to aviation and healthcare. By adopting the ISO 27001 framework, Digital Edge will protect businesses from threats, including internet fraud, hacking, overseeing of transactions and other cyber security threats.

Undergoing the process of getting certified by ISO is vital to Digital Edge because these standards evaluate process effectiveness and better structures company management and growth. Digital Edge’s clients will always be insured with quality services with the core value of “Stability, Security, Efficiency, and Compliance”. Digital Edge received this certification with minor and no major non-conformities, proving once again that our security processes are constant. 

Receiving the ISO 27001 certification, proves that Digital Edge’s processes meet the best quality and security standards for our clients. Digital Edge guarantees our clients and partners are receiving outstanding services, demonstrating our serious commitment to these security controls.

5/1/2017 Newsletters

Digital Edge Assists in Handling Cyber Security: How to Deal with Identity Theft

The Federal Trade Commission (FTC) has announced a new web site – a single point to report Identity Theft - https://identitytheft.gov/

In many cases, reports from this site will be accepted as an official police report. 

Please see how Digital Edge’s Log Management Service can be utilized as an SIEM (Security Information and Event Management) Dashboard.

5/1/2017 Newsletters

Cisco ISE Implementation for Corporate BYOD Policy

Digital Edge was engaged by a US based hardware manufacturer to implement Cisco Identity Manager and BYOD Policies. The client infrastructure is deployed in US Based headquarters, 2 offshore development offices, 2 datacenters, and AWS web services.

The project was successfully delivered and accepted in April 2017. 

 

4/3/2017 Newsletters

Hard Reminder to Upgrade Windows 2003 Servers: Microsoft Will Not Fix New Vulnerability

New remote execution vulnerability (CVE-2017-7269) was recorded in the National Vulnerability Database for Windows 2003 R2 IIS6 last week. Exploitation of this vulnerability allows a remote attacker to execute code on the vulnerable web server. 

Thus, potentially allowing hackers to take over the whole system, install remote control systems and propagate within local network conducting local attacks. Results of the exploitation might be catastrophic for organizations. Microsoft will not provide a patch for this vulnerability, as OS is not officially supported. 

Read the Digital Edge Security Team analysis and mitigation mechanisms here.

3/16/2017 Newsletters

Cutting Through the Noise – WikiLeaks, CIA, Hacking, and Digital Edge

WikiLeaks has recently exposed that the CIA possessed the capability to hack into nearly every device you own. With all that we have learned from these leaks,  Digital Edge wants to take the time to focus on is the “zero days” concept – which can be simply put as a weakness/hole in a system that allows a hacker to breach it before anyone even knows about this vulnerability. The act of reporting the vulnerability is known as “zero days”.

Once a hole in the system is found, it should be reported immediately, so it can be patched up before it’s exploited.

Read more about this here.

3/9/2017 Newsletters

Amazon Outage – The Reality of 99.95% Uptime

As many have heard, according to Amazon’s blog post, it was due to a “human error” that on Tuesday, February 28th, that Amazon and over 100,000 of its clients experienced about 4 hours of downtime.  It is no secret the tremendous impact that 4 hours of downtime can have on a company, but today, we at Digital Edge want to focus on industry’s uptime standards, quality of the provided services, and some practical suggestions to clients and colleagues. 

Amazon promises a 99.95% SLA which, by definition, means that they’re promising an allowed downtime of 4.38 hours a year for clients. There are several issues with this promise. Normally, everything is fine when those 4.38 hours are split in multiple smaller outages. Such long single outage feels painful for everyone.  

Digital Edge believes that there much better offers on the market for the same price. 

Click here for the full article.

2/22/2017 Newsletters

Digital Edge’s Log Management Service and DHS Analysis of GRIZZLY STEPPE Activities

On February 10, 2017, the Department of Homeland Security issued the Enhanced Analysis of GRIZZLY STEPPE Activities. 
 
One of the first detection and prevention recommendations is directly related to Digital Edge’s Log Management Service. Please click here to see DHS recommendation and reference to the full DHS analysis. 

1/13/2017 Newsletters

Shining Light on the Political Hacking Crisis

Digital Edge felt it was crucial to comment on the recent news regarding the political hacking crisis. Our Security Team wanted to make the efforts of acknowledging the ways of hacking. Hackers that continue to practice have not changed their ways. They use the same methods, techniques and tricks except now everyone knows how to use them. Actual hacking isn’t composed of an actual professional anymore; a child can access codes and hack someone. Whereas, real hackers develop tools, simplify them and sell them to regular people; they don’t actually hack anymore, making the person hacking not the real criminal at hand. It has become nearly impossible to figure out who the hacker is on a technological standpoint nowadays. 

However, information securities methods have drastically improved, developed, and are now more advance than ever before. Not only is it easy to identify when someone is trying to hack you, but now it is easy to prevent someone from trying to steal your information. Digital Edge has put in its greatest efforts to create a security system that will protect our clients from any hackers and now we want you to know how to spot and avoid a hacker yourself!

Be aware of hackers with these tips and check out our website for more about Digital Edge!

12/20/2016 Newsletters

Yahoo Account Data Breach

Following a 500 million user account data breach in September, Yahoo has just announced that they have once again suffered another breach of an estimated one billion accounts. Yahoo disclosed in November, that the company was provided with data files from law enforcement claiming to be Yahoo user data. Outside forensic experts, in conjunction with Yahoo, have determined that it is in fact Yahoo user data, that was obtained by an unauthorized third party in August of 2013. The party responsible for the intrusion has not yet been able to be identified. This incident has been diagnosed to be separate from the incident in September 2016. 

Yahoo believes that the information that was stolen consists of full names, email addresses, dates of birth, phone numbers, hashed passwords, and possibly security questions and answers as well. Luckily, Yahoo does not store credit card or any other payment information in the system that was affected.

Currently, Yahoo is identifying and notifying potentially affected users and instructing them to change passwords immediately. Additionally, Yahoo is removing all unencrypted security questions and answers from affected users so that hackers cannot use those answers to break into users accounts. 

As 2016 comes to a close, it seems to appear to be the “Year of the Breach” with reports of eight major breaches involving well-known companies. Obtaining large amounts of data is key for these hackers, so companies most vulnerable are those which hold a large amount of personal data on their customers, including Social Security numbers, birthdates, home addresses and even medical records. 

Digital Edge’s Security Operation Center (SOC) protects your organization’s intellectual property and sensitive data. Digital security threats are real and it is better to be able to detect and respond to them as quickly as possible. It is difficult for organizations without a comprehensive incident-handling capability to create a proactive SOC team. These capabilities have to include tools and processes that enable centralized security threat visibility, instant alerting, and efficient troubleshooting. Digital Edge’s SOC is ready to deliver those capabilities and provide security coverage for your organization today. 

For more information on this new Yahoo hack, and tips to help keep your password safe and secure, please click here.