The Real Cost of Cybersecurity: Avoiding Overspending While Addressing the Basics 

In today’s digital landscape, cybersecurity is a critical concern for organizations of all sizes. With an increasing number of cyber threats, companies often feel pressured to invest heavily in advanced cybersecurity tools and services. However, this rush to implement high-end solutions can lead to overspending, especially when basic cybersecurity measures are overlooked. This article explores the pitfalls of overspending on cybersecurity and emphasizes the importance of foundational security practices. 

The High cost of Cybersecurity Missteps

Statistics Highlighting the Issue 

Recent reports underline the significant time and resources required to handle cybersecurity breaches. According to the IBM / Ponemon Institute’s “Cost of a Data Breach Report 2023,” it takes organizations an average of 207 days to identify a breach and an additional 70 days to contain it, totaling 277 days (over nine months). This prolonged period can have severe financial and reputational impacts on businesses. 

Additionally, the 2024 Verizon Data Breach Investigations Report (DBIR) reveals that 68% of breaches involve human error, and 14% are due to unpatched vulnerabilities. These statistics underscore a critical issue: many breaches occur due to basic security lapses that could be mitigated with fundamental cybersecurity practices. 

The Vendor Trap 

Many organizations fall into the trap of purchasing expensive cybersecurity solutions, often influenced by vendors who promote high-end tools and services. While these solutions can be effective, they are not always necessary, especially when the basic cybersecurity measures are not in place. This misallocation of resources can lead to significant overspending without addressing the root causes of vulnerabilities. 

Essential Cybersecurity Measures 

Patching and Updates 

Regularly updating and patching software is one of the most effective ways to prevent cyber attacks. Unpatched systems are a primary target for cybercriminals, as evidenced by the surge in vulnerability exploitation noted in the Verizon DBIR. Organizations should prioritize timely updates to close security gaps. 

Two-Factor Authentication (2FA) 

Implementing two-factor authentication adds an extra layer of security, making it more difficult for attackers to gain unauthorized access. 2FA should be used for all critical systems to enhance protection. 

Regular Backups 

Maintaining and testing regular backups is crucial for data recovery in the event of a breach. Ensuring that backups are up-to-date and stored securely can help organizations quickly restore operations and minimize downtime. 

Awareness Training 

Human error is a significant factor in many breaches. Regular cybersecurity training for all employees can reduce the risk of phishing attacks and other social engineering tactics. Educating staff on best practices and potential threats is essential for creating a security-aware culture. 

Endpoint Protection 

Deploying and regularly updating antivirus and endpoint security solutions is fundamental to protecting devices from malware and other threats. Endpoint protection should be part of a comprehensive cybersecurity strategy. 

Balancing Security Investments 

While advanced cybersecurity tools and services can offer enhanced protection, they should not replace basic security measures. Organizations need to assess their specific needs and ensure that foundational practices are firmly in place before investing in high-end solutions. Here are a few steps to balance security investments: 

1. Evaluate Vendor Proposals: Scrutinize vendor offerings to ensure they meet your organization’s specific needs without unnecessary costs. 

2. Prioritize Basic Security: Focus on fundamental protections, such as patch management and employee training, before investing in advanced tools. 

3. Continuous Improvement: Regularly review and update your cybersecurity practices to adapt to evolving threats and ensure that basic measures remain effective. 

Conclusion 

Overspending on cybersecurity without addressing the basics can leave organizations vulnerable and financially strained. By prioritizing fundamental security measures and making informed decisions about advanced tools, businesses can achieve a more effective and cost-efficient cybersecurity posture. 

Ransomware Strikes Again

Greg Price

Various Federal and cybersecurity advocates have released numerous announcements this year, highlighting the increase in ransomware attacks in the United States. Many of the notices indicate that the rise in ransomware attacks is directly related to attacks on enterprises: the large targets are paying substantial amounts of money to regain access to their data. And, as a result, the cybercriminals are expanding their “business”.

While the increase in attacks is likely correct, the troubling issue is the continued increase in successful attacks. The bad guys are winning and gathering financial gain in the process.

On November 18, Louisiana found itself, once again, in a painful situation. Ransomware struck the state networks and resulted in a decision to shutter various agencies in order to reduce the spread of the ransomware. The governor’s office indicated that the Departments of Health, Children and Family Services, Motor Vehicles, Transportation and Governor John Edwards were closed as a result of the attack.

The state’s cybersecurity response team was activated and moved quickly to contain the ransomware. Based on various reports, the team isolated the malware and began an aggressive server restore process.

A statement indicated that no data loss occurred and no ransom was paid.

Several researchers revealed that the attack was similar to one on Louisiana’s public school systems in July. The ransomware was a variant of the popular Ryuk malware.

The real story here is Louisiana’s response: no ransom payment. The team was able to contain the situation, and, due to a careful eye to proper backups, restored operations. The disruption may have been annoying, perhaps inconvenient, but the message was very clear: the disaster recovery plans worked. As a result, the bad guys’ efforts were wasted. Chalk one for the good guys and adhering to good computing hygiene.

As I’ve mentioned before, sometimes the best practice is a solid, tested defense. Louisiana could have poured millions of dollars into the latest shiny object or expensive consultants. Instead, they created a method for containing cyber attacks and built a strong cyber hygiene program, all of which are predicated on two things: updating software and following a rigorous backup routine.

So, speaking of updates, the would-be bad guys are actively impersonating Microsoft.

According to online reports, a spam campaign has been launched, offering a Windows 10 update.

The malware is disguised within the fake Windows 10 update, likely the Cyborg ransomware. When installed, instead of Windows 10, you will have a locked PC and a demand for ransom.

Given that Microsoft releases patches routinely and aggressively pushes the Windows 10 platform, impersonating a Windows 10 update is a clever way to trick users.

But, here’s the thing. Microsoft never announces updates or provides downloads to its software through email links.

What should you do if you receive one of the Microsoft Windows 10 update email messages?

Delete it. Don’t forward it, don’t preview it, don’t open with your mobile device. Just delete it.

Despite the increased attacks to large enterprises, the largest volume of successful ransomware attacks continue to occur with individual users and small businesses.

So, how do you build a solid defense to ransomware?

Start with some basic computer hygiene.

Pay attention to email, avoid opening unsolicited attachments, don’t click on emailed links. Additionally, stop sharing data via fistfuls of thumb drives. There are many efficient and secure methods for sharing files: consider Microsoft’s OneDrive, Google Drive, Dropbox, as examples.

Next, avoid running pirated, or, stolen software.

If you download files via torrent sites or enjoy “borrowing” software from pirated software sites, you’re not only likely breaking many laws, but, you’re exposing yourself to untrusted software, all of which could be loaded with malware. Use licensed software or download open source tools from trusted sites.

And, of course, keep your software updated.

Backup your files frequently and properly. Most modern devices include an online backup service – enable the service for your devices and review that all of your important files are backing up correctly.

Despite all of our efforts to have a good defense and adhere to best practices, there is still a chance that we all can fall victim to a scam and end up with an infected or broken device. Having your files backed up properly is the best way to avoid losing your data or having to run the risk of paying a hefty ransom.

As the holiday season approaches, the scammers will be more vibrant than ever. Below are a few items to help you increase your awareness and hygiene to avoid the most common of email scams.

First, be cautious, even paranoid with links.

Don’t click on email links, especially if you find the content questionable or suspicious. Hover over the link and see if the link’s actual address matches its display name. Also, open a web browser and visit the site directly: type the link into the browser and avoid clicking the link completely.

Second, watch for grammar and typographical issues.

Since the beginning of phishing and scam messages, typos and grammar problems have drawn attention to the legitimacy of the messages. Old, or, dated images often suggest problems as well. Reputable companies don’t send poorly-written inquiries.

Lastly, use multi-factor authentication.

If you fall victim to an impersonation attack and offer your credentials, at least with two-factor, you will have a parachute, of sorts. If two-factor is available use it and pay close attention to the requests you receive for the second form of verification. If you receive one and you didn’t initiate the request, don’t approve it.
Pay attention to the basics and enjoy a safer computing experience.

Be safe.

Secure You

Greg Price

This article was originally published in The Tropolitan on October 16, 2019.

Held each October, National Cybersecurity Awareness Month is a collaborative effort between government and industry. The primary goal of the effort is to provide citizens access to resources to stay safe and secure online, all while strengthening the Nation’s cyber posture.

In short, we seek to raise cybersecurity awareness among the consumers of technology.

The 2019 theme is “Own IT. Secure IT. Protect IT.”

As an individual, you play a vital role in the security of not only your own information, but those of your communities. Whether at work, school, or recreation, the importance of taking proactive steps to enhance cybersecurity can’t be understated.

I’ve worked in a variety of capacities in cybersecurity for over 25 years. As a security practitioner, I’ve witnessed firsthand the incredible potential and danger of technology.

Continue reading “Secure You”

National Cyber Security Awareness Month 2019

Greg Price

Observed every October, National Cyber Security Awareness Month is committed to encouraging personal accountability, securing behaviors, and maintaining digital privacy in our ever-changing and connected world. The initiative was created as a joint effort between the US government and industry to foster access to resources that advocate methods for staying safe online, as well as securing your personal information.

For 2019, the theme will emphasize personal accountability and promote the significance of being proactive in securing your cybersecurity at home and at work. The theme for 2019 is Own IT. Secure IT. Protect IT.

“Own IT” suggests that you should understand completely your digital profile, or, your digital footprint.

Continue reading “National Cyber Security Awareness Month 2019”

Cybersecurity travel tips

Greg Price

This article was originally published in The Troy Messenger on June 28, 2019.

Now that summer is here, the sweltering heat has enveloped the South, and, of course, we begin heading to even hotter destinations: gulf coast beaches. Often, when we discuss cybersecurity protection tips, we employ those actions at work, or, at home. However, given our ever-growing use of mobile technology, it is just as important to practice safe computing practices whenever you are on the go – especially when travelling.

Our minds make things easier for us through the use of efficient thinking strategies, sometimes called “shortcuts in the brain.” These shortcuts help us make decisions very quickly, without having to stop, research, and spend a lot of time analyzing data. One of the heuristics that I find interesting is social proof.

Continue reading “Cybersecurity travel tips”