Tag Archives: security

Why URL link defense is so important

Why URL link defense is so important

Receiving phising emails is scary enough. Is it actually a genuine email? Is that link pointing to something to something that actually does what the email tells me?

Unexpected emails may show up at any given moment in time. The timing itself is often an indicator of something fishy. (pun intended).

I received an email from a Chinese shipping company telling me that I have 6 outstanding emails which I need to review on their portal. That already is very peculiar as I’ve never dealt with that company but given the fact I had ordered something on Ebay from a chinese seller it could’ve been a genuine request.

My emails go via Proofpoint and they already flagged the message a potentially malicious and kept it quarantined for me to review first. I released the email on purpose so it ended up in my mail box. The links that are created in those emails are modified by Proofpoint so that clicks on those links will be checked and if found malicious, the access will be blocked.

I used a separate, isolated, computer to click on that link and see what happened. As expected, the url defense mechanism of Proofpoint successfully blocked the page.

This also works a-synchronously. What do I mean by that??
If an email is sent and goes through the Proofpoint system, it may be that this site has not been checked yet or has been checked as being a non-problematic site. Many malicious actors use this technique to bypass the training algorithms of existing spam checkers and security solutions. Only after a while, they will load malicious software on these sites. As any email will not have been classified as spam or malicious, they will then still sit in your inbox with that same link that has now become a dangerous gateway to hackers and scammers.

As Proofpoint has changed the link to first pass their systems, they can always flag the site as malicious and still block it, as happened in my case above, even though it did not block or quarantine the email in the first place.

This is a very powerful security mechanism to have in place and I would recommend this to enable at all times.

Contact us for more info.

Kind regards

Erwin van Londen

Enhancing Credential Management Across Enterprises: EvL Consulting Partners with Keeper

Keeper

In an age of escalating cyber threats, safeguarding your organization’s sensitive data is no longer optional—it’s imperative. We’re thrilled to unveil an extraordinary partnership that marries unbeatable affordability with top-tier security. EvL Consulting has joined forces with Keeper, a trailblazer in password and identity management, to introduce a game-changing Managed Service Provider (MSP) solution. This collaboration empowers businesses to bolster their credential management practices without breaking the bank, all while ensuring unyielding data security.

Keeper

A Budget-Friendly Approach to Credential Management

At EvL Consulting, we understand that every business, regardless of size, deserves access to premium cybersecurity solutions. Our partnership with Keeper reflects this commitment by delivering enterprise-level security that remains accessible to organizations of all scales.

Balancing Security and Affordability

Here’s why enterprises should seize the opportunity to enhance their credential management practices through the EvL Consulting and Keeper partnership:

  1. Cost-Efficient Solutions: The cornerstone of this partnership lies in providing cost-efficient yet powerful security solutions. EvL Consulting and Keeper have collaborated to offer budget-friendly packages that cater to your organization’s financial constraints without compromising on the effectiveness of the security measures.
  2. Cutting-Edge Encryption Without the Premium Price Tag: Keeper’s cutting-edge zero-knowledge security architecture, renowned for its efficacy, is now available at a price point that doesn’t strain your budget. This robust encryption ensures that sensitive data remains inaccessible to unauthorized users, safeguarding your organization’s integrity.
  3. Affordable Multi-Factor Authentication (MFA): The integration of MFA, a potent defense against unauthorized access, is seamlessly woven into the credential management process. This additional layer of security ensures that your organization remains protected without incurring exorbitant costs.
  4. Streamlined Implementation: Keeper’s user-friendly interface and straightforward implementation process reduce the need for extensive training and support, saving both time and money.
  5. Scalable Solutions: As your organization grows, the partnership offers scalable solutions that evolve with you. This flexibility ensures that your security measures remain robust and aligned with your changing needs.

Empowering Your Organization Responsibly

As stewards of your organization’s digital well-being, EvL Consulting and Keeper recognize the need for a balanced approach. The EvL Consulting and Keeper partnership empowers businesses to fortify their credential management practices responsibly, ensuring that security remains paramount while staying mindful of your financial realities.

In an era where data breaches can have dire consequences, it’s time to take a pragmatic and budget-conscious approach to security. Elevate your organization’s credential management with the winning combination of EvL Consulting’s expertise and Keeper’s advanced technology, all within a budget that makes sense for you. Safeguard your digital assets, protect your reputation, and secure your future without sacrificing your bottom line. Partner with us today and embrace a more secure and affordable tomorrow.

Contact us for more info.

The Anatomy of a Strong Password: Fortifying Your Digital Security

Introduction:
In an increasingly interconnected world, safeguarding our digital lives has become paramount. One of the fundamental pillars of online security is the strength of our passwords. In this article, we will explore the characteristics of a robust password, the importance of techniques such as PBKDF2, hashing, and salt, and the advantages of using a password manager to enhance our digital defense.

Keeper
  1. Length and Complexity:
    A strong password should be long and complex, combining uppercase and lowercase letters, numbers, and special characters. Longer passwords are harder to crack through brute-force attacks, as the number of possible combinations increases exponentially.
  2. Unique and Random:
    Avoid using common or predictable passwords, such as “123456” or “password.” These passwords are easily guessed and can be cracked in seconds. Instead, create unique and random combinations that are unrelated to personal information, such as birthdays or pet names.
  3. Avoid Dictionary Words:
    Password-cracking algorithms often include dictionary attacks that try thousands of common words. Using dictionary words makes it easier for attackers to guess your password. Instead, consider using passphrases – a series of random words – that are easy for you to remember but difficult for others to guess.
  4. Password-Based Key Derivation Function 2 (PBKDF2):
    PBKDF2 is a cryptographic algorithm designed to protect passwords against brute-force attacks. It uses a process called key stretching, which slows down the password hashing process, making it more time-consuming for attackers. PBKDF2 incorporates multiple iterations, increasing the computational cost of each attempt.
  5. Hashing:
    When you create an account or set a password, websites and applications do not store the actual password but rather its hash value. Hashing is a one-way process that converts your password into an unreadable string of characters. This way, even if a data breach occurs, attackers won’t have direct access to your password.
  6. Salt:
    To further strengthen password security, a salt is added before hashing. A salt is a random value that is unique for each user, making the same password appear differently in the database. Salting adds an additional layer of complexity, thwarting precomputed hash tables or rainbow tables used by attackers.
  7. Two-Factor (or Multifactor) Authentication (2FA/MFA):
    While not directly related to passwords, enabling 2FA adds an extra layer of security to your accounts. It requires a second verification method, such as a temporary code sent to your mobile device, in addition to your password. This ensures that even if your password is compromised, an attacker still needs physical access to your secondary authentication method.

Benefits of Using a Password Manager:

  1. Enhanced Security:
    Password managers generate and store complex, unique passwords for each of your accounts. This eliminates the need to remember multiple passwords, reducing the likelihood of weak or reused passwords. By having a strong master password for the password manager itself, you only need to remember one secure passphrase.
  2. Convenience and Efficiency:
    Password managers streamline the login process by automatically filling in your credentials across websites and applications. This saves time and effort, especially when managing numerous accounts. You no longer need to struggle with forgotten passwords or resort to less secure practices like writing them down.
  3. Encrypted Storage:
    Password managers encrypt your passwords and store them in a secure vault. This means that even if an attacker gains access to your password manager’s data, they would still need the master password to decrypt and access your credentials.
  4. Cross-Device Synchronization:
    Modern password managers offer synchronization across multiple devices, such as smartphones, tablets, and computers. This ensures that your passwords are readily available wherever you need them, without compromising security.

Conclusion:
In an era of increasing cybersecurity threats, protecting our digital identities and accounts is of utmost importance. By adhering to the characteristics of a strong password, leveraging techniques like PBKDF2, hashing, and salt, and embracing the use of a password manager, we can fortify our defenses and minimize the risks associated with online security breaches. Remember, a strong password is the first line of defense in safeguarding your valuable digital assets.

Multifactor Authentication Demystified

Multifactor Authentication Demystified

Multifactor authentication (MFA) is an essential security measure that adds another layer of protection to user accounts and systems. There are several methods used for MFA, including SMS, push notifications, phone apps, and hardware tokens. Each of these methods has its own set of pros and cons. However, hardware tokens offer distinct security benefits over the other options.

SMS-based MFA involves sending a one-time password (OTP) to a user’s mobile phone. One advantage of this method is its simplicity and widespread availability, as most people have mobile phones capable of receiving text messages. However, SMS-based MFA has drawbacks. It relies on the security of the mobile network and can be vulnerable to SIM swapping attacks or interception of SMS messages.

Push notifications leverage smartphone applications to deliver authentication prompts. This method offers convenience, as users can simply tap a button on their device to approve or deny access. Push notifications are generally more secure than SMS, as they are not reliant on the phone number or SMS infrastructure. However, they may be susceptible to device compromise, such as malware or phishing attacks. As with SMS, push notifications can become subject to abuse as a result of malicious actors sending an SMS or push notification storm. That would lead to notification fatigue, and it would only take a single mistake, tapping OK instead of Deny, for a malicious actor obtaining access to the account.

Phone apps, such as authenticator apps, generate OTPs that are time-based and tied to a specific user account. They provide a higher level of security compared to SMS or push notifications, as they are not susceptible to interception. However, phone apps still rely on the security of the user’s smartphone. If the device is lost, stolen, or compromised, the security of the MFA method may be compromised as well.

Hardware tokens are physical devices, often in the form of a key fob or a smart card, that generate OTPs or have built-in cryptographic capabilities. Hardware tokens offer the highest level of security among the mentioned options. They are not dependent on the security of a mobile phone or computer, making them immune to malware or phishing attacks targeting these devices. Additionally, hardware tokens are typically resistant to tampering or cloning attempts, providing a high level of assurance. However, hardware tokens can be more costly to deploy and manage compared to other methods.

In summary, while each MFA method has its own advantages and disadvantages, hardware tokens offer distinct security benefits. They provide an extra layer of protection by removing reliance on potentially compromised devices and are resistant to various attack vectors. However, the choice of MFA method should consider factors such as cost, user convenience, and the specific security requirements of the system being protected.

Kind regards
Erwin

Cybersecurity is Virtual Combat but very real

Cybersecurity is Virtual Combat but very real

I’ve spent 6 years in the army, and the most important thing any soldier relies on is training. Be drilled to the core of your bones ensures that in highly stressful situations, and you do not get more stressful than in combat, you do not act impulsively or irrationally. As it is instinctively ingrained into your brain, you can very quickly draw on your knowledge to make correct decisions. It also ensures that you can rely on your mates and they can rely on you so that the whole of the organisation runs effectively with the least chance of casualties.

Cyber defence is not much different from an operational perspective. Although we’re not talking of immediate life and death here, the survival of a company could well rely on your responses of a cyberattack. Not being prepared is the most stressing issue for any CISO (Chief Information Security Officer) in any organisation.

Continue reading

Avoid endangering your customers?

Getting emails which contain all sorts of malware, viruses and other nasty content is bad enough as it is. It significantly hinders productivity, can infect many parts of the organisation and will, in most cases, be a very costly exercise to recover from, both financially and from a reputational aspect.

Now imagine that this has a flow-on effect on your customers, where malware is propagating itself via email to your customers by harvesting contact details from various parts of your infrastructure. Whether this is a contact list in your Outlook, a spreadsheet that got exported from your CRM solution or any other source this software can get its hands on.

Continue reading

Cyber Hacks – Prevention Versus Cure

Getting sick is a really nasty experience. Being forced to stay in bed because you cannot move an arm and a leg, your nose dripping constantly and a headache bouncing in your skull all day is the opposite of a pleasant experience. When you then take into account, you could’ve prevented this by just taking out a flu-shot at the beginning of autumn, you still wonder why you didn’t. No time? Did not want to fork out $30,00 as cost of living is hard enough?
Not being able to work and missing opportunities for your business is far more costly, and regaining customer confidence when it comes to business continuity can be a real challenge.

Extrapolate this to a cyber hack where your customer data is threatened to be exposed to the outside world and criminals are able to reach into the deepest of pockets of your customers by extortion methods, identity theft etc.

Continue reading

Microsoft Identifies 38% Increase in BEC

Living proof of scam prevention

The sheer number of emails that currently travel the globe is astounding. Billions of emails are underway every single day and, I must add, the majority are simply legitimate ones. Herein lies the problem from a security perspective, psychological conditioning. Basically meaning that the brain is acting based on experience from previous engagements. Whenever you see an email arriving in your inbox, there is some sort of automatic response and the “look and feel” of an email triggers a certain behaviour.

Continue reading