Network Access - December 2019 January 2020

Network Access - December 2019 January 2020

News December 2019 / January 2020

110 Nursing Homes Crippled in Cloud Ransomware Attack Demanding $14 Million

On Nov. 17, 2019, a Ryuk ransomware outbreak plagued a Wisconsin-based IT company, Virtual Care Provider Inc. (VCPI), according to KrebsOnSecurity, founded by journalist and investigative reporter Brian Krebs. Around 1:30 a.m. on the day of the attack, unknown hackers launched a ransomware strain known as Ryuk inside VCPI’s networks. The attackers encrypted all the data and demanded a staggering $14 million ransom in exchange for the digital key needed to unlock access to their files. This is not an uncommon request by attackers, and it often presents as a no-win situation for the victims of these deplorable crimes. According to VCPI chief executive and owner Karen Christianson, 80,000 endpoints affected VCPI, and the care facilities are unable to process critical data. This includes patient records, medication orders, email communication, billing information, and payroll. The IT company says they fear this incident will not only lead to the closure of the company but could also ultimately impact the health and care of patients. Furthermore, as hundreds of families continue to fight through life or death situations, employees are not being properly compensated for their work.

‘But right now all we’re dealing with is getting electronic medical records back up and life-threatening situations handled first.’” At Network Access, we know how valuable your data is and that the numbers and correspondence you store are so much more than data points in the computer. In the case of the VCPI data encryption, it can also be a matter of life or death. • Whose responsibility is it to protect data that is stored in the cloud by SaaS providers? Is it you, or is it your cloud provider? • How would your insurance company respond to this situation? (Find more cyber insurance information on the inside of this newsletter!) Don’t wait until it’s a matter of life or death. Our NetWatchman services offer solutions from a select few industrial-strength and enterprise-class backup and disaster recovery leaders. We would be happy to assist you in evaluating your organization’s needs. This scenario begs business owners to ask themselves the following important NetWatchman questions:

KrebsOnSecurity reports, “‘We have employees asking when we’re going to make payroll,’ Christianson said.

–Jim Barnes

1

www.NetworkAccess.com

412-931-1111

Top 5 Reasons to Take Cyber Risk Seriously

What You Should Know About Log Monitoring for Regulatory Compliance

One of the Biggest Problems Facing IT Professionals and Management Teams Alike Is That the Value of Those Security Logs Is Often Minimized, or Even Overlooked Entirely The threat from hackers and cyberattackers has never been greater, and no company is too small or large to fall victim to this danger. Whether you own a small mom-and-pop shop, a major multinational corporation, or a business that is somewhere in between, you cannot afford to leave the security of your firm and the customer information you collect to chance. That is why so many businesses are installing sophisticated software to detect security breaches, catch hacking attempts at their earliest stages, and alert the IT staff at the first sign of trouble. But simply installing that software is not enough. In order to be useful, the results those security programs generate must be carefully analyzed, and that is what log monitoring is all about. Log monitoring is more than just a good idea and much more than a way for businesses to keep their customer data safe. Careful monitoring of security logs is also the law, and there are extensive regulatory requirements governing everything from the detection of cyberattacks and hacking attempts to the way successful and unsuccessful attempts at intrusion are handled and reported. In fact, a large percentage of event management and log management activities are deployed to meet the requirements of regulatory compliance. Even so, the proscriptions regarding security practices in general, and log monitoring in particular, are often vague and confusing, making the job of the IT department that much harder and more complicated. One of the biggest problems facing IT professionals and management teams alike is that the value of those security logs is often minimized or even dismissed entirely. IT pros may recognize the value of security software and log monitoring, but convincing their bosses to allocate the required resources is often an uphill battle. IT professionals can fight back against that complacency by focusing on the regulatory necessity of log monitoring and how carefully checking the daily security logs could shield the company from legal liability in the event of a breach. Getting the management team onboard and demonstrating how log monitoring is the first line of defense is essential, and to do that, IT professionals need a basic understanding of the applicable regulatory requirements. Understanding the ins and outs of the regulatory framework is no easy task, but having a basic understanding of how these regulations work and where they fit into the big picture is essential. Log monitoring is a vital part of computer security in the digital age, and neglecting that monitoring could have disastrous consequences. By arming themselves with information and presenting their findings to the management team, IT professionals can get the support they need to keep their systems safe and secure and keep their companies out of regulatory and legal hot water.

Bah Humbug

1. The main root causes of a data breach in the U.S. are malicious/ criminal attack, human error, and system glitches. 2. Any organization that retains physical or electronic records of employees, customers, or other third parties is vulnerable and can be a victim of a cyber event. 3. 95% of businesses rely on their computer systems functioning properly for their business to operate. If systems go down due to a glitch, error, or attack, businesses can be at risk of suffering loss of income and customers. becoming more advanced with infections up 40% within the past year. Extortion events can have a significant impact on business’s operations and often require payment of ransom to regain access to data and systems. 4. Ransomware is evolving and

5. 49% of organizations with at

least one significant attack were successfully attacked again within one year.

2

412-931-1111

www.NetworkAccess.com

Understanding Cyber Risk Insurance and Protections 3. Does your organization have a process to regularly download and install patches? 4. Are your backup and recovery procedures in place for all important business and customer data? 5. Do you have an incident response plan? 6. Is there a disaster recovery plan, business continuity plan, or something equivalent to respond to a computer system disruption? 7. Do you have controls to ensure media communications and websites are lawful? 8. Are there procedures that require service providers with access to the applicant’s systems or their confidential information to demonstrate adequate network security controls? 9. Does your organization have multifactor authentication for remote access to programs that contain private or sensitive data?

ARE YOU PREPARED?

Of the 1,200 industry leaders that participated in a report completed by Travelers Insurance, 55% say they worry “some” or a “great deal” about cybersecurity attacks. The sad truth is no one is immune, but we won’t sit idly by. Network Access recently solicited some applications from insurance companies that offer cyber risk insurance and have found that the criteria for providing coverage is maturing as technology in our business progresses. Below is a list of questions found on a current Cyber Risk Insurance Application to help you prepare. Your answers to these questions can impact both your eligibility and premium for cyber risk insurance. 1. Are your firewall technologies active and up to date? 2. Is your antivirus software on all computers, networks, and mobile devices active and up to date?

Don’t just worry about cybersecurity! Talk to Network Access about prevention, protection, and solutions.

Android Shortcuts

1. Double-click power button to launch the camera app. a. Just tap, hold, and swipe the shortcut to take a quick snapshot from your locked Android device. 2. Press and hold the volume-down button to turn on Do Not Disturb mode. a. Press and hold the volume-down button. When you do, your Android phone or tablet will switch into an “alarms only” variation of Do Not Disturb mode. 3. Pull down to refresh a webpage in Chrome. 4. Screenshot. a. Press and hold the power and volume-down buttons until you hear the “click.” 5. Force a restart. a. Press its power and volume-up buttons at the same time for 10 seconds.

6. Type numbers quickly. a. Press and hold the letter that has the corresponding small number beside it (Q for 1, W for 2, and so on). 7. Say “OK Google” anytime, anywhere. a. All you have to do is say “OK Google,” and your phone or tablet will listen carefully for a command — anything from “What’s the score of the Steelers game?” to “Wake me up at 7 a.m. tomorrow morning.”

3

www.NetworkAccess.com

412-931-1111

4580 McKnight Road, Pittsburgh, PA 15237

PRST STD US POSTAGE PAID BOISE, ID PERMIT 411

SD-WAN What Is SD-WAN? It’s an application of software-defined networking (SDN) that is applied to wide area network (WAN) connections and used to connect diverse locations across geographic distances. It connects branch offices, data centers, and other business sites to a central corporate network using a software approach. This means a network admin can remotely program appliances via a central controller, reducing provisioning times and minimizing the need to manually configure traditional routers at branch locations. Ultimately, this solution aims to move more network control into the cloud. How Does SD-WAN Work? SD-WAN is an overlay technology, meaning it’s not a network in itself. Instead, it sits on top of your network and allows you to prioritize individual applications. There are two ways to deploy: One requires no devices Should You Be Worried About Cyber Risks? PAGE 3 Learn These Android Shortcuts PAGE 3 SD-WAN Info PAGE 4 Nursing Homes Crippled by Million-Dollar Attack PAGE 1 Top 5 Reasons to Take Cyber Risk Seriously PAGE 2 What You Should Know About Log Monitoring for Regulatory Compliance PAGE 2

Everything You Need to Know

Why Do You Need SD-WAN? Simply put, SD-WAN allows you to prioritize individual applications and enhance your internet connection. It calls for less time and effort spent on fixing the WAN because you can correct issues by simply logging into your controller panel, a software-as-a-service (SaaS) application that can be accessed anywhere with an internet connection. You can also manage branches remotely, turn them up and down, and reprioritize them with ease. SD-WAN allows you to remotely program network appliances through a centralized software platform, reducing provisioning times. Also, like MPLS, SD-WAN allows you to apply Quality of Service (QoS) and prioritize data that you send through your network, down to an individual application. This means you can choose to send the traffic that is most important to your business faster than other types. For instance, if clean, clear, and

reliable calling and immediate CRM access are most important to your business, you can make voice and your CRM top priorities so a greater portion of your bandwidth is dedicated to sending those apps. QoS through prioritization of data (voice, video, and apps, etc.) Cost-effective connection of over thousands of branches across a WAN Elimination of reliance on dedicated circuits, allowing for flexibility in network choices Can deploy new branches 20 times faster than MPLS deployments A future-proof solution because it adapts to how the network is being utilized Reduction of stress on management because of its reliability Remote management of branches and other business sites Works with any WAN architecture because it’s an overlay technology • • • • • • • What Are SD-WAN’S Benefits? •

at your location, and the other calls for an inexpensive box that powers SD-WAN functions pushed to it from the cloud.

4

412-931-1111

www.NetworkAccess.com

Page 1 Page 2 Page 3 Page 4

www.networkaccess.com

Made with FlippingBook Publishing Software