Share this
3 Security Tips From an Ex-NSA Hacker
by Josh Lamb on Dec 5, 2019 12:00:00 AM
This year, a key theme at the annual ITNATION conference was cybersecurity for Managed Services Providers (MSPs) and IT departments. A growing trend in 2019 is criminal organizations gaining access to important system management tools, and using them to compromise several organizations at once.
Criminal organizations are realizing that if they can gain access to important system management tools, they are able to multiply the effectiveness of ransomware and phishing attacks. By hitting one organization, they can gain access to several more.
Today we’re bringing you 3 tips to mitigate these attacks from cybersecurity experts Chris Inglis (Former Deputy Director of the NSA, current member of the Blackpoint Cyber Board of Directors) and Jonathan Murchison (former NSA and now CEO of Blackpoint Cyber).
During a Q&A of the conference, Murchison was asked “What tactical strategies can help mitigate against these attacks?” Here’s the three pieces of advice he gave:
1. Implement Two-Factor Authentication (2FA)
Two-factor authentication (2FA) involves adding an additional credential to gain access to a system. Typically this is implemented as a PIN code which frequently changes. This additional layer means that simply having the correct username and password is not enough. The attackers job has now become much more difficult. 2FA also helps curb the threat of password reuse. If a password was used on multiple systems, 2FA can still deny an attacker access.
2. Restrict Outside Access
The move to cloud-based applications has also touched the IT management world. It is increasingly common for organizations to have cloud-based Remote Management and Monitoring (RMM) tools. This opens up the risk of an attacker logging in remotely and deploying malicious software to potentially thousands of computers. Murchison recommended that administrators should incorporate two safety measures to restrict access to their RMM.
- Restrict access to their RMM based on source IP. Only allow access from your authorized places of business.
- Require users to use a VPN into the office in order to use the RMM
By creating these restrictions, an outside attacker must go through several more layers before he is able to gain access to such a critical system.
3. Carefully Store Script Secrets
While many organizations rely heavily on IT management systems, it is common to also employ home-brewed scripts to fill in areas of automation where the existing tools lack a capability.
However, Murchison cautioned that IT providers can become careless with using administrator level credentials in these scripts. The result is that these passwords can show up in places like Windows event viewer. An attacker that has access to any computer using the script can obtain these unencrypted passwords and use them to cause havoc.
DNSFilter is committed to helping organizations secure their network by using A.I. to detect and deny access to internet threats. Our full support of industry standards like two-factor authentication and DNS-over-TLS give you total control over your organization’s DNS. Start a free trial today and enjoy the speed and security of DNSFilter.
Share this
Categories
- Featured (266)
- Protective DNS (23)
- IT (15)
- IndyCar (9)
- Content Filtering (8)
- Cybersecurity Brief (7)
- IT Challenges (7)
- Public Wi-Fi (7)
- AI (6)
- Deep Dive (6)
- Malware (4)
- Roaming Client (4)
- Team (4)
- Compare (3)
- MSP (3)
- Phishing (3)
- Tech (3)
- Anycast (2)
- Events (2)
- Machine Learning (2)
- Ransomware (2)
- Tech Stack (2)
- Secure Web Gateway (1)
Every year at DNSFilter, we like to do our best to predict the future when it comes to cybersecurity. You might know this already if you’ve read the blog by our CTO, TK Keanini, about his 2025 cybersecurity predictions. We also like to review our predictions to see how well we did overall- it’s nice to keep score.
You lock your doors at night, secure your office, and ensure sensitive information is under strict control. But what if the biggest vulnerability in your business wasn't locked away at all? For most companies, their Domain Name System (DNS) is the gateway attackers are waiting for. It's a fundamental part of the internet's infrastructure, yet it's often ignored when it comes to security. Hackers know this, and they're taking advantage.
Earlier this month I joined Mikey Pruitt, our Global Partner Evangelist, on the DNSFilter podcast dnsUNFILTERED to discuss my 2025 cybersecurity predictions. We had a lot of fun and covered all of the points I’ll outline here, but I wanted to go deeper. My 30 years of cybersecurity experience have given me a strong sense of where we’re heading as an industry—the shift to the cloud in many ways is a precursor in the adoption of AI and the future...