top of page
  • K

It’s common to hear people say something along the lines of there’s no such thing as a 100% secure environment, that may well be true but it doesn’t mean we shouldn’t try to build environments that are as secure as reasonably possible. The problem is that there are so many areas of security to focus on and generally too few hours in the week and too few ££s in the budget to cover everything we’d like to.

This is especially true for SMEs who often have smaller teams and limited budgets, trying to do ‘less with more’ is an uphill struggle for a lot of businesses. Getting the basics right can help organisations of any size ensure that the fundamentals are in order, so where should we start?


Understand Your Assets

Understanding what assets are present within the environment is imperative, it’s very difficult to securely manage devices if nobody knows that they exist.

As a general rule, most organisations have a reasonable understanding of which laptops are provisioned as well as commonly used servers but niche devices are often forgotten about and over time can be left in a state that leaves the entire organisation at risk.


Understand Your Software

The same logic applies for software, patching has been a major problem for organisations for decades, the issue has been well addressed by Microsoft’s WSUS as well as various 3rd party patch management products however there are often still significant gaps in many patch policies in many organisations.

In practice most businesses are able to ensure that the operating systems of most devices are updated most of the time. Common software used throughout the organisation is also usually kept in good order, where things typically fall down is with niche systems and software used by specific teams.


One of the key benefits of Penetration Testing is assurance, providing an organisation with a list of vulnerabilities and misconfigurations can be extremely useful but even a report with a relatively low number of results can provide assurance that the team have things under control.


Regular penetration testing can help organisations to understand if assets and software are not being managed correctly and may constitute a threat to the organisation.


Train Users

One of the most common causes of compromise is Social Engineering(1); ensuring that users are aware of common attack techniques like phishing and having a good understanding of what a complex, targeted phishing attack can look like can help provide a secure ‘first line of defence’. One of the most difficult aspects of user training is that it is often seen as a burden, educational videos are another thing to fit into someone’s (already busy) day. Selectively training users who are more likely to be specifically targeted in spear phishing or Whaling type attacks such as directors or gate keepers can bolster the defences of the entire organisation.

Social Engineering doesn’t stop at phishing however, physical security is an important aspect of cyber defence. In the past, many organisations have dismissed physical security but these attitudes seem to be slowly changing(2).


VIP Cyber Security training of users likely to be targeted by social engineering campaigns can be a great option for helping to increase the security of the entire organisation.


Engage With Senior Management

When discussing cyber security services with customers one of the most difficult barriers to overcome is simply the internal battle within an organisation to take security seriously.

In some cases senior management still see cyber security as a ‘nice to have’ rather than a necessity of doing business in the modern world.

It can be difficult to show a clear ROI for cyber security services in general and Penetration Testing in particular however the importance cannot be understated. A US study showed that approximately 60 percent of small firms go out of business within six months of a data breach(3).

Regular penetration testing can often open up additional business opportunities, it is a common requirement for compliance and even as part of a supplier due diligence processes.







32 views0 comments
  • K

You may have seen the recent news about a man losing an entire city’s personal data including tax and banking information after a night out, presumably the data loss did not help his headache once he realised what had happened.


Vice:


BBC:


This is far from a unique incident though, Freedom of Information (FOI) requests are often made to UK Government bodies with telling results, devices go missing all the time.


National Archives:



If devices are being regularly lost and stolen from public sector entities, it is almost certain that the same is happening across the private sector. This is a major concern for several reasons, many organisations do not have a robust data loss prevention strategy meaning that a lost laptop or USB stick could lead to a significant data loss and even fines and reputational damage.


Clearly this is a problem that affects almost any organisation, thankfully there are a number of steps that can be taken to assist in securing devices and data to help ensure that, if physical devices get lost or stolen the data contained therein is kept safe and away from prying eyes.


Disallow USB Storage Devices

An important aspect of limiting risk is simply to remove features that are not necessary for the business, especially if they could pose a risk of data theft.

Removing support for USB storage devices is a simple and effective way to significantly lower the risk of data being lost or stolen.

The increased adoption of cloud-based file sharing also helps to ensure that removable media is less necessary than it was a few years ago meaning the impact to most businesses of removing access to USB sticks would be minimal.


There is an added bonus to preventing the use of USB storage too, ‘USB Drop Attacks’ are an effective social engineering technique whereby an attacker adds a malicious payload to USB sticks and drops them around the target organisation’s location in order to hopefully coerce a legitimate user to plug the device in (perhaps by adding a label like “Salary Info 2022”).

Preventing users from using USB storage devices neatly side-steps this risk (on corporate devices at least) since any malicious USB stick cannot be used.


USB Storage Encryption

Assuming it’s not possible to completely eradicate the use of removable USB storage in your organisation, at the very least it is imperative to ensure that any corporate data is encrypted using a strong encryption algorithm and, just as importantly, a strong password (read more about creating strong passwords here).


Microsoft’s Bitlocker provides an easy and effective way of encrypting removable USB media as well as FDE (Full Disk Encryption) on laptops.


One thing to note is that it will take a while for the disk to encrypt, do not remove the device during the process or any data risks being lost permanently; it is generally considered to be a good idea to back-up any data prior to implementing the encryption anyway.


Laptop Full Disk Encryption

Using FDE on all corporate devices is a must, again Bitlocker can be used for this in the same way as above or from Group Policy in a corporate environment.

The relevant GPO configuration can be found here:

Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.


Ensuring that all corporate devices are using strong encryption with good credentials could prevent sensitive data from ending up in the wrong hands if a corporate device were to go missing.

Device Hardening

As we have already discussed, ensuring that data is encrypted is absolutely essential but what if a device is powered on and decrypted when it goes missing?

In a situation like this the security of the operating system and the user’s credentials are the last line of defence.

By default, operating systems are rarely configured in their most secure state in order to allow for legacy integrations and to help keep the user experience as smooth as possible; ensuring that all corporate devices are hardened against attack helps to make sure that data is kept secure.


Backups

In addition to the threat of sensitive data being leaked there is an additional problem of simply losing access to any data stored on a lost/stolen device.

Ensuring that regular back-ups are taken or switching to a cloud-based working environment can help to ensure that, even if a device gets lost or stolen, access to any valuable data held on the device is not lost and the business can continue to operate as normal.


User Education

This is likely the most obvious but also often the most overlooked aspect of all, ensuring that staff take good care of corporate devices is key. Human factors play a major role in the vast majority of cyber security compromises and breaches. Providing training to staff members to help ensure that they understand the risks of taking corporate devices or data into a public setting can help to ensure that corporate data is kept safe.


 

How can we help?

A stolen laptop assessment or laptop build review can help organisations build a better understanding of the risks that may be present within their current environment.




37 views0 comments
  • K

Updated: Jun 9, 2022


World password day has been and gone (apparently) but passwords are here to stay, for a while longer at least. There is so much information out there about password security but how do passwords actually get cracked and what can we do about it to help ensure that our credentials are kept secure?


Password Cracking

At some point everyone on LinkedIn has seen a table like this:


These tables show up from time to time and are fairly widely shared, we're sure you’ve seen something similar many times. Based on the table a 9 character password with numbers, uppercase and lowercase characters would take 153 days to crack.


If we take the example ‘Password1’, it meets complexity requirements, has a mixture of uppercase, lowercase and numerical characters but quite clearly this is a terrible password and you shouldn’t use it!


So how does password cracking actually work?

These tables that float around from time to time aren’t necessarily wrong (aside from the slightly dubious timings) but they are incomplete, the problem is that they only tell part of the story.


The tables are only focused on a sub-set of password cracking known as a ‘brute force’ attack; this kind of password cracking technique is what most people think of when anyone talks about password cracking, essentially the idea is to just try every single combination until eventually you find the right one.


A B C AA AB

AC

AAA AAB

Etc.


It’s fairly easy to visualise how adding in extra character sets such as uppercase, lowercase, numbers and symbols can make this style of attack much slower.

The more characters there are in the set, the longer it takes to iterate through each one, if an attacker has to try every single uppercase character & every single lowercase character it will theoretically take twice as long to find the password, for this reason it's a good idea to use multiple character sets (lower, upper, numbers, symbols).


The problem is that this isn’t how password cracking works, not usually anyway.


The Problem


Fundamentally passwords are a tricky business, in order to be useful they must be memorable but memorable passwords are typically easier to guess and generally would not meet the complexity requirements that almost all organisations enforce.


This has the effect of pushing many people down a similar route.


Start with a memorable thing:

Family member’s name, favourite sports team/athlete, favourite animal etc.


Lets take an example of: wookie (the big hairy guys from Star Wars)

In order to meet the complexity requirements that word is then usually ‘mangled’ in some way.


In order to meet the character set requirements, we’ll need to add at least 1 capital letter, 1 number and 1 symbol.

Often this ends up looking something like this: Wookie1!

Wookie123!!!

Wookie0?

etc.


Alternatively, letters may be switched out for numbers or symbols like this:

Wook13 W00k!3

etc.


A huge number of passwords are derived using a process similar to this so if this seems alarmingly familiar, you’re far from alone!



If we take one of these examples, Wookie1!, we have all 4 character sets and 8 characters total so based on our table this seems like a pretty secure password.


As previously mentioned however there are a number of different ways to crack a password, one of the most common methods is to use a wordlist, generally a list of common passwords is a good place to start.

One of the most commonly used password lists is Rockyou.txt, named after a development company (called RockYou) that created widgets for various social media platforms such as MySpace and Facebook whose entire database was stolen some time in 2009. To make matters worse the entire database was stored in plaintext meaning that every single user’s password was visible.

Rockyou contains approximately 14 million unique passwords belonging to approximately 32 million users.


This statistic is also quite telling in that on average each password was used by nearly 3 people, in reality there were many people using the same few passwords and a small number of outliers with unique, secure passwords.


Wikipedia even has a list of the most common 10,000 passwords https://en.wikipedia.org/wiki/Wikipedia:10,000_most_common_passwords

These lists can then be manipulated using ‘rules’ which essentially mangle the input in similar ways to what was already discussed (changing letters to numbers/symbols) etc.


What Can We Do?

So how do we create secure passwords?

In an ideal world passwords would be long strings of completely random characters, however these are virtually impossible to remember.


Password Managers

The good news is that password managers are literally designed for this, using a password manager is generally considered to be a good idea.

There is a caveat here, if there is a weakness in the password manager, or if the ‘master password’ is compromised there is a single point of failure.

All things considered, password managers are generally considered to be a good thing.


MFA

Multi-Factor Authentication typically works using the principal of ‘something you know and something you have’.

In most cases the thing you know is your password and the thing you have is usually a mobile phone, by sending a notification or SMS to the phone we can be sure that you ‘have’ the device that has been pre-registered.


Making Secure Passwords

There are situations however when neither of these options is available so it is still important to create strong passwords, here’s a list of things that can be useful to remember:

· In most cases a [space] counts as a symbol, this means that a phrase can be used rather than just a single word, this is generally a lot harder to crack due to the length.

· Avoid dictionary words where possible

· Avoid proper nouns (names, brands etc) where possible

· Break up ‘real’ words in ways that are memorable


As a rough idea of what we mean, the password below is far more secure than the previous examples and is likely to be just as memorable: Wookookies ARE h41ry!?

· Wookookies - not a real word but is still easily memorable because it sounds funny

· Use of multiple special characters throughout ([space], !, ?)

· Use of uppercase, lower case and numbers

· Long

To be clear, please do not use this password, it’s just an example. Any password that is not a secret is no longer secure and shouldn’t be used.


Takeaways

· Use MFA where possible

· Use a password manager where possible

· Check to see if accounts have been compromised (https://haveibeenpwned.com)

· A secure password is only ‘secure’ if you keep it that way, if any password is compromised it’s no longer any good (even if you really like that password)

· Use non-dictionary ‘words’ that are unique

226 views0 comments
bottom of page