Computer Security, It Is All About Connections!
Cyber Snake Infiltrates Ukraine Networks
By Nick Ashton, Founder, CEO,
Tracometry Group of Companies.
You can
have the most sophisticated software in the world, but if the lock on your
front and back doors is either cheap, flimsy or non-existent, the opportunist are inside and doing
anything they want!
Cyber-Terrorists
love doors that are left ajar.
It is all
about battening down the hatches in the storm of hacking, phishing and man in
the middle brutal attacks. You have got
to be water-tight, in fact better than a duck’s rear end!
Sam Jones, Defense
and Security Editor, The Financial Times reports:
“An aggressive cyber weapon called Snake
has infected dozens of Ukrainian computer networks including government systems
in one of the most sophisticated attacks of recent years.
Also known as Ouroboros, after the
serpent of Greek mythology that swallowed its own tail, experts say it is
comparable in its complexity with Stuxnet, the malware that was found to
have disrupted Iran’s uranium enrichment programme in 2010.
The cyber weapon has been deployed most
aggressively since the start of last year ahead of protests that climaxed two
weeks ago with the overthrow of Viktor Yanukovich’s government.
Ouroboros gives its operators unfettered
access to networks for surveillance purposes. But it can also act as a highly
advanced “digital beachhead” that could destroy computer networks with
wide-ranging repercussions for the public.
Cyber warfare experts have long warned
that digital weapons could shut off civilian power or water supplies, cripple
banks or even blow up industrial sites that depend on computer-controlled
safety programmes.
The malware has infected networks run by
the Kiev government and systemically important organisations. Lithuanian
systems have also been disproportionately hit by it.”
“Ukraine is top of the list [of
infections] and increasing,” said Dave Garfield, managing director for cyber
security at BAE, who added that the instances were almost certainly “the tip of
the iceberg”.
All IT Departments have software to detect these types of attacks, sadly
it is after they have got into the system and infected the data servers.
Yes, RE-ACTIVELY the work starts, a little late!
PROACTIVE measures must be in place, you must
slam the door shut!
Meaning you have to
have a secure connection and only allow those approved through the your door.
Immediately you are thinking PASSWORDS.
Wrong!
A password is an insecure human element that is the hands of the most accident
prone individuals. Forgotten, stolen and
used over and over again for a myriad of reasons. Firstly, access to more than one
account.
Why? It is because we are lazy and take short cuts
and thieves like that!
Hackers and Phishers are looking for turmoil, distractions and that low
hanging fruit to attack and make your life and those connected to you a misery.
KEYTALK will stop that!
We lock the door and throw away the key, well the demand to use a
password that is.
Although a password
can still be used, it is not really the key that will open the door. It is the creation of a bomb-proof tube that
connects end to end and all information now travels in a totally secure environment.
That Data in Motion is the most vulnerable as that unsecured open
door allows in all types of miscreants with tools to take down your systems and
spread harm to all you come in contact with via the Internet.
Remember we are all connected!
To explain and also inform, you can bring any device to KEYTALK,
all are protected.
A user may have
several devices, Desktop PC/Mac, Laptop, Tablet and Smart Mobile Phone, each
and every one will have a secure connection.
When the device is trusted, a password is not needed anymore.
KeyTalk
takes a DNA overview from your device based on a minimum of 10 and up to 17 components.
When the device is known a key, a (short lived certificate) is sent to your
device automatically when needed to complete the transaction or to stay on-line
with your enterprise data transaction. With the certificate, KeyTalk
creates a 2 way SSL connection excluding the man in the middle attacks.
Many organizations use KeyTalk to connect to the device in
just a few minutes and to the enterprise, using a Single Sign On as a bonus.
Management and installation of the systems is simplistic. When we have a massive volume of users and devices,
with KeyTalk corporate integration are completed in a far shorter period compared with
any other security change.
We mean far shorter!
For more information email us, we will send you a link to see this in
action.
WE are in the NOW and
KEEP YOU; in the KNOW…
Worldwide Call: +1 (317)
426.0110
Key Talk –
Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key
Talking… KEYTALK!
Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry
Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex
CM18 7jF
Copyright 2014