Security Roundup: BYOD, Wipro Attack, Okta-Evident ID, IoT Security
… an incident if it’s on a BYOD device and what the playbooks for those types of incidents should be, he said. They’re training some of their staff to use these new technologies and be able to integrate them across their broader security ecosystem.
Meanwhile, the number of BYOD devices at any organization is constantly shifting. So how do you keep up?
“There are a few different types of tools that help give you asset visibility into the specific devices that are in your environment or that are accessing your resources,” Bhargava said. “Fundamentally, we have invested in some different technologies that help give visibility into those assets.”
Education and technology together are critical to make progress in securing BYOD, he said. It’s important to train users on what happens if you click on an email that looks suspicious, how an attacker can compromise your environment and how they can access your data, he said.
“We’re getting more and more requests from a lot of our customers who want to educate their end users about how to become more security-proficient and security-aware,” Bhargava said.
BYOD increasingly is becoming an entry point to access any type of “crown jewels” an organization has, Bhargava said.
“If you look at the ‘kill chain‘ process, one of the things that we increasingly see is the first stage of any sophisticated attack is around reconnaissance and exploit,” he said. “And a lot of that exploit is actually at the BYOD level … they’re using BYOD as an entry point into an organization to compromise it.”
Cybersecurity Expert: Wipro Attack Lesson for MSSPs
News surfaced this week that Indian MSP Wipro is investigating reports that its IT systems have been hacked and are being used to launch attacks against some of the company’s customers.
Saryu Nayyar, founder and CEO of global cybersecurity company Gurucul, tells us this breach illustrates two important challenges for MSSPs and other security providers.
“First, managed security providers are just as vulnerable and likely targets of cyberattacks as the companies they are protecting,” she said. “Second, the risk associated with a security breach of an MSSP’s infrastructure can affect untold numbers of companies down stream. This represents a huge liability for MSSPs if their customers are victimized by a lateral supply chain breach that they are responsible for.”
This type of attack, which is essentially a supply-chain breach designed to enable the malicious hackers to easily move laterally from the MSSP’s infrastructure to compromise their customers’ networks, is becoming more and more common, Nayyar said.
“It makes a lot of sense for attackers to target one company, that if compromised, will give them unfettered access to hundreds or more companies down stream,” she said. “We can expect more of these attacks moving forward.”
Unless an organization is monitoring the entire system stack, they won’t be able to identify …