We live in an age where information is all around us. It has been considerably simpler to store, access, and distribute information since the advent of the Internet. However, with expanded access comes greater risk for enterprises in terms of data breaches and privacy violations.
All companies are obligated by law to secure their customers’ personal information, but many do not know how or have not taken the necessary efforts to educate their personnel on these rules.
With recent technological and data collecting breakthroughs, it is now more necessary than ever for businesses to consider securing both personally identifiable consumer information and the company’s sensitive information.
This blog article will examine the distinction between privacy and information security.
The Primary Distinction Between Data Privacy and Information Security
A personal data breach may have serious implications, including significant regulatory implications and a loss of consumer confidence. Therefore, we often consider how security might help us safeguard our sensitive information while retaining our privacy via encryption and other means.
One prevalent misconception is that security and privacy are synonymous.
The distinction is that privacy protects against loss of control over one’s personal identity, while security protects the confidentiality, integrity, and availability of data communications networks. It is an individual right established in most European nations’ constitutions, while information security refers to a mechanism aimed to secure data systems from illegal access or use by a specific entity—including both humans and software programs.
Let us take a deep dive into the topic now.
What Is the Role of Information Security?
Information security safeguards a company’s sensitive or proprietary information, such as customer records, trade secrets, intellectual property (IP), corporate communications, and employee and financial data. Employees who have access to sensitive information may be required to sign confidentiality agreements; physical safeguards such as firewalls, locks, and alarms; segregation of duties for processing sensitive information using dual authentication systems; and restricted access to physical locations where sensitive data is stored or processed.
Information security strikes a balance between a company’s requirement to control who may view its secret information and business demands that need simple exchange of information among personnel. These two elements are often brought into balance.
Businesses must take the necessary precautions to safeguard their information assets from threats, vulnerabilities, and dangers. The phrase “information asset” refers to any data that a corporation or organization has, such as customer lists, financial records, intellectual property (copyrights on brands), and other private information such as trade secrets.
The goal of information security is to secure the confidentiality, availability, and integrity of data throughout its lifespan. Some of the most frequent information security functions are:
Management of risks
Threat detection and monitoring
Management of identity and access
Governance and strategy
Response to an incident
Defending the assets of the organization via the implementation of security policies, processes, technology, and controls
Employees are being educated on the importance of information security.
What does data privacy Means?
Privacy is concerned with safeguarding and respecting people’s rights to manage their personal data in a broader sense. Individuals should have the right to access – if they ask for it – as well as the opportunity to modify or erase erroneous information about themselves that firms maintain in databases, according to privacy activists.
Privacy, like security, is crucial because it prevents data leaks. However, whereas security is concerned with information leaks caused by malware infections and data breaches, privacy is concerned with personal data rights in terms of how information is acquired, utilized, and maintained, as well as who has access to it.
Privacy and data security do not have to be mutually incompatible. They often go hand in hand. A company that values data privacy will also put in place safeguards to protect confidential data from unauthorized access or misuse by employees and outsiders, in accordance with government regulations on the protection of personal information as well as the organization’s own internal policies for safeguarding sensitive corporate information.
Individuals’ rights to control over how their information is gathered, utilized, and processed are protected under data privacy. Organizations that acquire personal data from an individual are required to take reasonable precautions to secure the data from unauthorized access and to comply with personal data privacy rules.
The following concepts are fundamental to data privacy:
Individuals must give consent before their data are collected, used, or shared
Data should only be processed for purposes specified by the individual at the time of collection
Personal information about individuals should not be revealed to other organizations without permission.
Organizations that violate these principles are subject to fines
These policies outline organizations’ obligations when it comes to managing business data containing personal information.
Privacy and information security are often at odds with each other. Privacy is when an individual’s personal information, habits, and other sensitive data are protected from public disclosure.
For information security, it means a company’s confidential material cannot be taken or accessed by the public or another company. Privacy must always take precedence, even over information security. Privacy is very important since it is so interconnected with our personal lives.
In the last decade, there has been an exponential increase in cyberattacks on companies all around the world. Till now no other security attack has been as serious as a Ransomware attack. This is because it denies the computer owner the ability to make further use of the computer systems. In some cases, it has resulted in the loss of life because critical medical systems were attacked and could not be brought back live on time. One of the most potent Ransomware groups is the Darkside. In this blog post, I will explore this group and the mode of operation.
What is the “Darkside” Hackers group?
The group has been called “one of the largest and most notorious” ransomware groups. Like other forms of cybercrime, its activities are fuelled by money. Its members, they claim, are not directly affiliated with any government or intelligence agency, but they rely solely on ransom payments to fund their operations.
They use a sophisticated business model know as Ransomware-as-a-Service (RaaS). This enables them to recruit other hackers to help them carry out lots of attacks. Darkside team also has an extensive network of affiliates who can distribute their malware globally through spam campaigns or targeted spear-phishing attacks.
The Ransomware-as-a-Service (RaaS) Model
Interested parties who are not necessarily hackers are recruited and given access to the hacking tools via simple, yet powerful web services to carry out their attacks in almost a point-and-click system. These new recruits are called affiliates and work for the main group. When an attack is successful and the payment is made, the loot will be shared based on the group’s revenue-sharing model.
This is a very effective business model as they even have a “free trial” of their malware to encourage easy adaptation. They also provide tutorials on how people can create and deploy ransomware themselves using the same tools they make available.
In just one month this year over $17.5 million worth of Bitcoin was deposited in a Crypto wallet linked to the hackers.
According to the group they have the following revenue sharing model:
Dynamic rate of 75% to 90%.
A stable rate of 80%.
They also have a trial and more attractive offer for new users:
90% for the first two payouts when you switch to us from any other affiliate program if you had three ransom payments in the last month; each of them needs to be over 2M (and each needs to be verified).
90% for the first two payouts when you switch to us from any other affiliate program.
The group has publicly stated that they prefer to target organizations that can afford large ransoms instead of hospitals, schools, non-profits, and governments. Ransoms demanded by the group have ranged from US$200K to US $20M. The Darkside seems to be experts in hacking oil pipelines and can bypass security measures with ransomware to extort large sums of money.
How the “Darkside” Group Works
DarkSide is believed to be based in Russia, but it is not sponsored by the government. They claimed on their website that members are not allowed to attack the computers of people in Russia, Ukraine, Georgia, or Belarus. Other computers out of reach are those from:
Healthcare (only: clinics, hospitals, and palliative care organizations, retirement homes, companies that develop COVID-19 vaccines or take part (to a significant extent, as a part of the supply chain) in supplying them).
Funeral services (morgues, crematoria, and funeral parlors).
Education (universities, schools).
Public sector (municipal services, any public agencies).
Non-profit organizations (charitable foundations and associations)
Experts state that the group is one of the many for-profit ransomware groups that have proliferated and thrived in Russia.
Darkside was first noticed in August 2020. They have a professional-looking website and tries to have a Robinhood image. The group claims that they donated some ransom money to charity, and they only target organizations that can afford large ransoms.
The Colonial Pipeline Hack
The Darkside seems to be fun of hacking oil pipelines and is able to bypass security measures with ease due to their expertise, making them a big threat for authorities worldwide. They have hit large oil pipelines at least four times from December 2020 to date. They make use of one of their most potent weapons: The Ryuk.
Ryuk is one of the most recent types of ransomware, and it has proved effective in locking down computers across the world. With Ryuk they can target large organizations with the ability to pay large some of Ransom.
Successful Activities of the “Darkside”.
DarkSide introduces its ransomware.
DarkSide donates US$20,000 stolen from victims to charity.
DarkSide establishes its RaaS model.
DarkSide launches its content delivery network (CDN) for storing and delivering compromised data.
DarkSide releases version 2.0 of their ransomware with several important updates to make it more sophisticated.
They hit the IT managed services provider CompuCom
May 2021 DarkSide launched an attack on the Colonial Pipeline. After the attack, Darkside said that they were not a political organization and would start to check where their targets are.
Darkside has a method of a quick escalation. The longer it takes a victim to comply with the demand the more troubles they get.
Step One: The Ransom Phase
This is the initial delivery phase. In this phase, the ransomware encrypts the files and leaves a ransom note behind while the attackers seat back and wait for payment.
Step two: The Double Extortion Phase.
This is the step the attackers start threatening the victim to release to the public the data it stole if the money is not paid on time. In some cases, additional money is demanded to prevent the public distribution of the stolen data.
This was what happened in the case of Toshiba Tec Corp., a unit of Toshiba Corp, more than 740 gigabytes of information were compromised, and included personal data of personnel such as copies of passports.
The group also likes to hedge their bets by shorting the shares of the companies they hack in the stock market and profiting from the temporary fall of the value of the shares.
The first published case of double extortion happened in November 2019. Allied Universal, a large American security company, was the victim. When Allied refused to pay the demand of 300 Bitcoins the attackers upped the game and threatened to release sensitive information exfiltrated from the company.
To prove they were not kidding, the attackers published some of the files they stole which included contracts, medical records, and encryption certificates.
Step Three: Triple Extortion Phase
In this phase, the victims are threatened with Distributed Denial of Service Attack (DDoS) if they do not pay the ransom. In this phase, if a victim pays up for the first time, then he or she is likely to be targeted by the hackers again and extorted of more money to keep their data safe.
This happened to the German company Brenntag this May 2021, when their systems were hit by ransomware. A DDoS attack took down their IT infrastructure and encrypted data. They ended up paying $4.4 million ransom in Bitcoin to Darkside and still suffered significant downtime.
Step Four: The Final Extortion Phase
If the victim still has not paid then they will get a further escalation. This time they will start getting calls to comply. Sometimes, the clients of the victim will be included at this point to turn up the heat.
Step Five: The Release Phase
After getting paid, hackers will release the data they encrypted by providing the victim with the encryption key to unlock the files. This stage also includes publicizing that a victim has been hacked, so victims cannot deny what happened and know how much money was extorted from them.
Ransomware is one of the most potent security attacks in history. It could result in a loss of life if it takes down critical medical systems. There have been over 2 million ransomware incidents, which means that this attack can happen to anyone! Therefore, it’s important for every company to take steps towards preventing and mitigating these types of cyberattacks as soon as possible.
If you want help with training your staff and creating awareness on these types of cyberattack please contact us via email at firstname.lastname@example.org
A CISO’s job is a challenging one. To increase effectiveness, understanding the roles and responsibilities that come with this position is crucial.
As the CISO of an organization, you are responsible for protecting and maintaining the integrity of organizational data. In this article, we will discuss what it means to be a Chief Information Security Officer (CISO) in an organization, as well as some tips on how to go about being more effective at your job.
What Is the CISO Role?
The Chief Information Security Officer (CISO) is an executive-level position, as the CIO. However, the attention of the CISO is primarily on the protection of data through the process of information and cybersecurity.
A CISO is responsible for identifying security risks to the organization’s information assets.
Protecting the data and intellectual property and reputation from both internal and external threats, as well as maintaining the integrity of organizational assets by identifying risks that could do harm to the company’s information systems.
Responsibilities of A CISO
The Chief Information Security Officer (CISO) has many responsibilities within the information security rhythms such as:
Developing and overseeing the cybersecurity strategy.
Define the organization’s security goals and objectives
Create a plan to achieve the goals and objectives
Development of information security policies and procedures to protect the organization from cybersecurity harm.
Implement the security policies, procedures, and guidelines for employees to follow.
Conduct regular risk assessments of all systems and managing the organization’s cybersecurity.
Identify resources needed for prevention strategies.
Preparing budgets for cyber-security initiatives.
Coordinating cybersecurity initiatives with other members of management.
Establishing priorities among competing needs.
Planning for security breaches and develop an incident response plan.
Develop, implement, and manage the Information Security Awareness and Training Programs.
Ensure adequate staffing is available with the necessary skills to carry out tasks related to information security management.
While the CISO has many duties, they all revolve around one key mission:
Protecting organizational data from unauthorized access, damage, or theft.
The CISO is a key member of the organization’s leadership team. The role and responsibilities that they have are very important for an organization to protect their data from cyber-attacks.
They also serve as an advisor on all things related to information security, including establishing business objectives, policies, and standards; developing new products or services while balancing risk and security requirements; and implementing tools for identifying, monitoring, or preventing threats.
Positioning of The CISO Role in An Organisation
The organizational structure of an enterprise defines where its chief information security officer (CISO) fits in. The CISO’s responsibilities and functions vary depending on the size of the organization.
Typically, a large enterprise will have an IT department with a CIO or other senior-level positions like director of information technology (IT), vice president for computing services, head of Network Operations Centre, Systems Administration.
In such an organization the CIO is the most senior-level IT position responsible for all aspects of an enterprise’s technology resources and infrastructure (including hardware, software, telecommunications networks), It oversees other senior-level positions in that organization with responsibilities for computing services like network operations center or systems administrator.
In such an organization, there could be a CISO that reports to the CIO. Lately, it is common to have a CISO that reports directly to the CEO even in an organization with a CIO. This ensures information security is getting the full attention it deserves.
Many medium-sized organizations do not have a CIO; instead, they have a CISO that reports directly to the CEO of the organization and oversee information security needs.
A chief information security officer (CISO) is responsible for protecting an enterprise’s critical business data, intellectual property, systems infrastructure, and reputation from cyberattacks by criminals, terrorists, or nation-states. The role requires a deep understanding of emerging risks.
In A Small Organisation
In a small company or start-up, for example, it may not be possible to have a full-time CISO handling security so, you often have someone handling security in combination with other managerial tasks like budgeting and strategic planning. This is not typically an ideal arrangement but can work if this person could be assisted by an external CISO or a Virtual CISO.
How Does A CISO Fulfil These Responsibilities?
The CISO also takes part in the design of a company’s security policies and procedures to protect its IT assets. This includes overseeing any disaster recovery or contingency plans that are executed, as well as serving on the team for assessing risks and vulnerabilities.
The CISO shares this information with executives so they can make sound decisions about their organization’s security measures.
This includes overseeing any disaster recovery or contingency plans that are executed, as well as serving on the team for assessing risks and vulnerabilities. He shares this information with executives so they can make sound decisions about their organization’s security measures.
To be effective a CISO must have a strong understanding of the organization’s business. The information security department is part of an organization and not independent of it, which means that they need to understand how all departments operate in order to best protect them.
The CISO should also have knowledge on what would be detrimental for the company if exposed or compromised.
The CISO also advises on how to respond in an emergency, such as a data breach or cyberattack, so that recovery is swift and effective. A well-trained cybersecurity team can minimize damage to company information assets from malicious insiders who are looking for ways to profit by selling trade secrets.
The chief security officer often has knowledge of investigations into disasters because they have access to valuable forensic evidence if it’s required in order to assess damages and losses incurred by the company due to sabotage, espionage, or terrorism.
They may be called upon during legal proceedings following any incident where IT was compromised during periods when systems were not up to date with patches or other anti-malware software
Information Security Risk Management
The CISO is responsible for performing risk assessments to identify the potential vulnerabilities that could lead to data breaches and recommend solutions in order to limit harm or damages. This includes developing policies, procedures, and standards of security operation needed by all company employees with regards to access control, identification management, and privileged user roles.
Identifying and implementing safeguards, controls, or countermeasures to protect information assets from unauthorized access. This includes identity management, data loss prevention (DLP), firewall/intrusion detection systems, and encryption technologies.
The Chief Information Security Officer is also responsible for managing the vulnerability assessment and penetration testing programs. These initiatives are designed to identify, manage risks through a set of methods such as scanning networks, reviewing codebases or performing manual tests on applications, operating systems, networks, or other IT assets.
A good CISO must be able to spot potential risks and vulnerabilities in an organization quickly. It is important that the CISO maintain his awareness of current threats and exploitations to know how best to protect the information assets. It is critical that the CISO is aware of current threats and exploitation and be informed of how best to protect the information assets in helping the organization decide on the controls to implement.
The Development of a disaster recovery plan
The CISO should understand how the business operates, to be able to provide advice on the extra protection measures needed for its valuable information assets, especially during a disaster.
The CISO is responsible for developing a disaster recovery plan to safeguard company assets in case of emergencies, such as natural disasters and hacking attacks. Oversees any disaster recovery or contingency plans that are executed, as well as serving on the team for assessing risks and vulnerabilities. Shares this information with executives so they can make sound decisions about their organization’s security measures.
Overseeing protective controls against electronic threats on enterprise networks like malware, viruses, ransomware, and DDoS attacks; monitoring online activity 24/hours per day with real-time alerts so that employees know when an attack is underway before it can do damage to computers’ systems.
Help Organisation Comply with Regulations
A chief information security officer’s (CISO) functions include ensuring adherence to both government regulations such as Health Insurance Portability and Accountability Act (HIPPA).
General Data Protection Regulation (GDPR) and industry standards such as ISO 27001:2013, Payment Card Industry Data Security Standard (PCI-DSS).
Internal and External Auditing & Review
A CISO helps the organization to coordinate internal security audits, including periodic reviews of the company’s security policy documents. The CISO may be involved in overseeing external auditors who review their compliance with industry standards such as ISO 27001 and SOC. The CISO will provide feedback to executives on any areas that need improvement or changes.
In today’s ‘world of high competition and social media, it is important to ensure proper management of the reputation of an organization online. The Chief Security Officer should have measures in place to monitors the internet and social media sites for malicious content that could negatively affect the organization.
Processes have to be put in place to use Open-Source Intelligence (OSINT) to monitor for threats, vulnerabilities, and information leaks. OSINT is the discovery and analysis of information about individuals or organizations using open sources on the internet. This can include social media, blogs, etc. It helps to discover areas that are not readily available in the public domain.
OSINT can help you to:
Understand your competition and adversary better.
Identify up-and-coming trends that could affect the security posture of your organization and customers.
Cybersecurity Training and Awareness
The CISO should ensure staff has a general awareness of the risks around cybersecurity as well as how they should respond in a crisis. The goal is for every employee to understand their role and what they can do to help protect company information.
Security awareness programs are designed to help employees identify and avoid cyber threats. These types of security programs help your employees to be situation-aware so they can react to both current and future cybersecurity threats. It is important for all members of an organization to have this knowledge to the protect organization’s assets.
Skills to be an Information Security Officer
A CISO must have strong knowledge and understanding of IT, computer security, information technology law, information systems. The ability to think strategically about the potential risks that could threaten business operations.
Superior analytical capabilities with an ability to conduct comprehensive assessments of risk levels for various vulnerabilities or threats in order to protect data from accidental damage or loss as well as an intentional intrusion by hackers into organizations’ networks, computers, and databases containing sensitive user data such as passwords or credit card numbers are required.
These cybersecurity professionals need strong social engineering prevention background because they may also be involved in training and awareness efforts to safeguard against social engineering.
Being vast in technology is also essential to implement security measures that will protect systems from intrusion, leaked data, or other breaches. A chief information security officer should possess the ability to understand how computer systems work, be able to properly assess their vulnerabilities, and know what action is required when they are under attack or compromised in some way. Have a good understanding of different technologies.
These professionals must have excellent problem-solving skills because they will constantly need a solution for whatever security challenges come up in the organization. An effective CISO needs an understanding of what constitutes sensitive information, how that can be compromised, and how one might go about fixing such a violation.
A good chief information security officer must have excellent interpersonal skills to deal with other members of the staff properly. The ability to maintain composure under pressure is another crucial requirement because he/she may have to coordinate multiple teams during an emergency situation; such situations could include software outages or cyberattacks against computer systems within the area of control.
Strong Communication Skills
A CISO needs to have strong communication skills: verbal; written; presentation and facilitation skills and interpersonal skills. Some two key people the CISO interacts with are the CEO and CFO, CIO, so they need to be able to articulate their strategic plan for security in a way that is comprehensible without jargon or acronyms.
They also need good listening skills– being able to understand not only what is being communicated to them, but also the tone of voice used.
Strong Leadership Skills
Chief Information Security Officers wear many hats daily and must act as a leader at times while still being flexible enough to handle unexpected situations; developing these qualities helps create an effective CISO in an organization.
An effective CISO needs strong leadership skills to manage and oversee a team of engineers as well as project managers.
Good People Skills
The CISO interacts with a lot of people, both internally and externally. The ability to communicate effectively can help foster goodwill among the employees. Those who are particularly skilled at this may raise trust levels in others when they speak on highly sensitive issues.
A good relationship with external partners is also important as it helps build rapport and establish a sense of confidence as to the organization’s ability to keep data safe.
Experience needed to be an effective CISO in an organization:
The Chief Information Security Officer (CISO) is an important role in any organization that deals with sensitive data and computer systems, but not all CISOs have the same responsibilities or duties. Therefore, the requirements are also different depending on the organization.
For example, some organizations require their CISO to hold a bachelor’s degree in computer science while other companies do not mandate such qualifications if they can prove five years of experience working on IT-related projects.
The most common requirement across industries is relevant to work experience and training; however, there is not much standardization when it comes to educational requirements because each company has different needs depending on its size and industry sector.
Industrial Standard Certifications:
The CISO needs to be vast in lots of topics that are not only in security but business-related. Some of the security certification programs that try to cover the technological aspect of this are:
Certified Information Systems Security Professional (CISSP): This is a globally recognized certificate for professionals in the information security arena. Although, there have been lots of questions raised as to the relevance of this certification for professionals to who demonstrate a deep technical understanding of cyber threats and how to design and implement cybersecurity solutions.
Certified information security manager: The leading credential for information security managers, the CISM is designed for people who design, build, and manage information security programs.
Certified in risk and information systems control: (CRISC) The CRISC is a credential for security management professionals and project managers responsible for information security. It covers risk identification, risk assessment, response and mitigation, and control monitoring.
Certified in the governance of enterprise IT (CGEIT) certifies your understanding of enterprise IT governance principles and practices. The CGEIT certification helps you to establish your credibility and expertise in governance, risk management, strategy formulation, compliance issues, and the latest IT innovation.
Tips to be a Successful CISO
Be a good communicator
Knowledgeable about the business side of software and hardware
Experience in managing security, IT projects, or related jobs
Familiarity with the company’s technical infrastructure. This includes networking, firewalls, databases, and operating systems.
Be proactive and understand the direction of the industry.
With so much data at stake, it is important that the CISO’s responsibilities are carried out with as much seriousness as possible. An organization cannot afford to have its sensitive information compromised because someone did not take proper precautions.
If all of this sounds intimidating and you want help enacting these principles, let us know. Our team of experts is ready and waiting to partner with you to help train and mentor you to create a stellar cybersecurity plan for your business or organization that will protect against future attacks on organizational assets by malicious actors.
Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you may end up paying for products or services that you didn’t buy and dealing with the stress and financial heartache that follows identity theft.
Your personal information exists in numerous places all over the internet. Every time you browse or purchase something online, watch a video, buy groceries, visit your doctor, or use an app on your smartphone, information about you is being collected. That information is often legally sold or shared with other companies. Even if just one of these gets hacked, the criminals can gain access to your personal information. Assume that some information about you is already available to criminals and consider what you can do to slow down or detect the use of your information for fraud.
How to detect it
Review your financial cards and other accounts regularly for any charges or payments you did not make. An easy way to do this is to sign up for email, text messages, or phone app notifications for payments and other transactions. Monitor them for fraud.
Investigate situations when merchants decline your credit or debit cards. Look into letters or phone calls from debt collectors for overdue payments for credit cards, medical bills, or loans that you know are not yours.
Pay attention to letters that inform you about unemployment or other government benefit claims for which you never applied.
If available in your area, review your credit reports at least once a year. For example, in the United States, you can request free reports from annualcreditreport.com.
What to do when it happens
Contact the organization that is involved in the fraud. For example, if a criminal opened a credit card in your name, call that credit card company to notify it about the fraud. If someone filed for a tax refund or unemployment benefits in your name, contact the corresponding government organization.
File a report with law enforcement to create an official record of identity theft. You can often do this online. For example, in the United States you can report at identitytheft.gov. Follow the site’s instructions for any additional steps you may need to take.
When responding to fraud, keep records of your interactions with your financial institutions and law enforcement, as well as the costs you incur due to identity theft in case these details will be needed later.
Notify your insurance company; you may have identity theft protection included in one of your policies.
How to defend against it
Here are some simple steps you can take to decrease the chance of identity fraud happening:
Limit how much information you share about yourself with online services and websites.
Use a unique strong password for all of your online accounts and enable two-factor authentication as additional protection for your most important accounts.
If applicable in your location, restrict who can get access to your credit reports. For example, in the United States freeze your credit score so that anyone who tries to get a credit card or loan in your name has to first temporarily unfreeze it.
Consider getting insurance coverage, either through a dedicated policy or as part of your existing insurance plan, that covers the costs of dealing with identity theft.
To create a secure home network, you need to start by securing your Wi–Fi access point (sometimes called a Wi–Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi–Fi to create a far more secure home network for you and your family.
Focus on The Basics
Often the easiest way to connect to and configure your Wi–Fi device is while connected to your home network. Point your web browser to the specific IP address documented in your device’s manual (an example of this would be https://192.168.1.1), or use a utility or mobile app provided by your Wi–Fi device vendor.
1. Change the Admin Password:
Your Wi–Fi access point was most likely shipped with a default password for the administrator account that allows you to change the device configuration. Often these default passwords are publicly known, perhaps even posted on the Internet. Be sure to change the admin password to a unique, strong password, so only you have access to it. If your device allows it, change the admin username as well.
2. Create a Network Password:
Configure your Wi–Fi network, so it has a unique, strong password as well (make sure it is different from your device admin password). This way only people and devices you trust can join your home network. Consider using a password manager to select a strong password and to keep track of all of your passwords for you.
3. Firmware Updates:
Turn on automatic updating of your Wi–Fi access point’s operating system, often called firmware. This way you ensure your device is as secure as possible with the latest security options. If automatic updating is not an option on your Wi–Fi access point, periodically log into and check your device to see if any updates are available. If your device is no longer supported by the vendor, consider buying a new one that you can update to obtain the latest security features
Use a Guest Network:
A guest network is a virtual separate network that your Wi–Fi access point can create. This means that your Wi–Fi access point actually has two networks. The primary network is the one that your trusted devices connect to, such as your computer, smartphone, or tablet devices. The guest network is what untrusted devices connect to, such as guests visiting your house or perhaps some of your personal smart home devices. When something connects to your guest network, it cannot see or communicate with any of your trusted personal devices connected to your primary network.
5. Use Secure DNS Filtering:
DNS is an internet–wide service that converts the names of websites into numeric addresses. It is what helps ensure your computer can connect to a website when you type in the website’s name. Wi–Fi access points typically use the default DNS server supplied by your internet service provider, but more secure alternatives are available for free from services such as OpenDNS, CloudFlare for Families, or Quad9that can provide extra security by blocking malicious or other undesirable websites. Log into your Wi–Fi access point and change the DNS server address to a more secure alternative.
Securing your home Wi–Fi access point is the first, and one of the most important, steps in creating a secure home network. For more information about securing your Wi–Fi access point, refer to the device’s manual, or if your internet service provider provided your Wi–Fi device, contact them for more information on security features.
Making Passwords Simple: https://www.sans.org/security–awareness–training/resources/making–passwords–simple
OUCH! Is published by SANS Security Awareness and is distributed under the Creative Commons BY–NC–ND 4.0 license. You are free to share or distribute this newsletter as long as you do not sell or modify it. Editorial Board: Walter Scrivens, Phil Hoffman, Alan Waggoner, Les Ridout, Princess Young
Guest Editor Joshua Wright
(Twitter @joswr1ght) is a senior director at Counter Hack Challenges, LLC, leading the coordination and development of cyber challenges for NetWars and the Holiday Hack Challenge. Find Josh at LinkedIn here: https://linkedin.com/in/joswr1ght.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.