<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Monthly Security Awareness &#8211; New England Safety Partners, LLC</title>
	<atom:link href="https://www.newenglandsp.com/category/cyber-security/monthly-security-awareness/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.newenglandsp.com</link>
	<description>New England Safety Partners, LLC</description>
	<lastBuildDate>Thu, 21 Apr 2016 13:11:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Ransomware</title>
		<link>https://www.newenglandsp.com/2016/04/ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 21 Apr 2016 13:06:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Monthly Security Awareness]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=7831</guid>

					<description><![CDATA[Ransomware is a form of malware that criminals find a way to install on our systems. What &#8220;ransomware&#8221; does is encrypt the data on a hard drive and make it unavailable until you pay a fee (ransom). The ransom pays for a the key to decrypt the data. Ransomware is like many other forms of malware  and usually makes [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Ransomware is a form of malware that criminals find a way to install on our systems. What &#8220;ransomware&#8221; does is encrypt the data on a hard drive and make it unavailable until you pay a fee (ransom). The ransom pays for a the key to decrypt the data.</p>
<p>Ransomware is like many other forms of malware  and usually makes its way into our systems by downloaded files or by a vulnerability in the system or network. Ransom is most often requested by the cyber criminals in the form <a href="https://en.wikipedia.org/wiki/Bitcoin" target="_blank">bitcoin</a>, a popular and mostly untraceable internet currency. A timeline is given (usually 4 days) to make a payment and if the demands are not met in time the price increases.</p>
<p>Here are some ways to prevent Ransomware on your systems:</p>
<ul>
<li>Ransomware can be distributed in Microsoft Office documents. Do not enable macros for Microsoft Office Documents received from emails. Microsoft has just released a new tool in Office 2016 that can limit the functionality of macros by preventing you from enabling them on documents downloaded from the internet.</li>
<li>Alternatively, install <a href="https://www.microsoft.com/en-us/download/details.aspx?id=4" target="_blank">Microsoft Office Viewers</a>, these applications do not support macros and will allow you to view the files ithout actually opening them.</li>
<li>Make sure you have anti-virus software in place and make sure that this software is always up to date. Home users can <a href="https://www.sophos.com/" target="_blank">download Sophos for free. </a></li>
<li>Make sure to regularly implement security patches to all software/applications on systems at the operating system level, MS Windows and Mac OSX both have an automatic update feature that can be enabled to force this to happen on a regular schedule.</li>
<li>Do not download documents from  websites or from peer to peer applications. Stick with applications that have a good background and avoid downloading from 3rd parties.</li>
<li>Beware of <a href="https://en.wikipedia.org/wiki/Phishing" target="_blank">phishing</a> attacks. Always take caution when clicking links in email, and be sure to check the email address of the sender to make sure that the address is exactly what you expect it to be. Don&#8217;t open unsolicited attachments sent to you via email.</li>
<li>Make your best effort to keep your network secure by putting firewall, and intrusion detection systems in place. Close ports that are not necessary for systems to function.</li>
<li>Conduct recurring IT Security training for employees to reinforce these concepts.</li>
</ul>
<p>There are other things you and your company can do:</p>
<ul>
<li>Recurring backup of your data. Depending on how much you use your computer and its files, daily backups are typical in a business environment.</li>
<li>Constant network monitoring can be costly but it can mitigate these types of attacks by detecting and preventing them. Many enterprise systems are protected by firewalls and Intrusion Detection Systems that can detect and block the outgoing &#8220;phone home&#8221; that starts the ransomware encryption. Keeping an eye on these systems in real time can help detect and prevent an attack.</li>
<li>Show hidden file-extensions on your local computer if they are masked by default. This technique can help reveal files that are not supposed to be on the system. Your IT Service Desk can help you if you don&#8217;t know how to do that. Make sure the file extension matches the file type (MS Word documents end in .doc or .docx for instance)</li>
<li>Your IT department can turn off USB ports and removable storage. This will cancel out the chance of someone downloading the software to your systems via and infected USB Flash Drive.</li>
</ul>
<p>Overall you should take the same preventative precautions as you would to prevent any other virus. When in doubt, ask your IT or Information Security department for advice.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pitfalls in Access Control</title>
		<link>https://www.newenglandsp.com/2016/02/pitfalls-in-access-control/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=pitfalls-in-access-control</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 25 Feb 2016 13:51:58 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Monthly Security Awareness]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=7778</guid>

					<description><![CDATA[A primary goal of Access Control is to prevent loss, be it losses of confidentiality, information integrity or information availability.  It goes without saying that in order to protect your assets and information, you must explicitly control who and what has access.  (And sometimes when, where and how.)  Ideally, Access Control is well defined as [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A primary goal of Access Control is to prevent loss, be it losses of confidentiality, information integrity or information availability.  It goes without saying that in order to protect your assets and information, you must explicitly control who and what has access.  (And sometimes when, where and how.)  Ideally, Access Control is well defined as part of a comprehensive Security Policy, one that is clearly understood by the personnel bound by it.</p>
<p>A few pitfalls in Access Control:</p>
<ul>
<li>Not adhering to a Least Privilege strategy &#8211; Simply put, personnel and workstations are granted the least privilege necessary to perform their responsibilities and no more.  A computer at a reception desk shouldn’t have access to critical organizational information.  The same is true for a vendor who may legitimately need access to some area of an organization’s resources.  Do not allow more access than is absolutely necessary.</li>
</ul>
<ul>
<li>Excessive Privileges or Creeping Privileges – This can happen when a manager moves from one role to another and, through oversight, retains access to assets of the initial role.  Another example is where personnel have risen in an organization over time.  As one gains increased privileges within the system, it may be awkward to remove access a person no longer needs to perform regular duties.  Standing policies and regular reviews of access are good ways to reduce these vulnerabilities.</li>
</ul>
<ul>
<li>Allowing personnel to access critical information in less secure environments or on less secure devices – An organization may allow a junior executive to retain access to systems and information while on vacation in a foreign country.  In all but the rarest circumstances, disabling such access reduces the risk of compromise.  Likewise, mobile devices, by definition, aren’t always protected by an organization’s firewall.  Train your personnel in what the organization requires, on site and off.</li>
</ul>
<ul>
<li>Single Factor Authentication – An Identity which attempts to access systems and information must be Authenticated.  Authentication may be as simple as providing the right password for the Identity.  This is sometimes referred to as “something you know.”  A more secure Authentication strategy is Multifactor Authentication.  This may include a small device you carry, also referred to as “something you have.”  Also, biometrics is a growing factor in Authentication, using unique aspects of an Identity or ‘something you are.”  Multifactor Authentication provides more secure Access Control than a single factor alone.</li>
</ul>
<ul>
<li>Ensuring that accounts, keys and devices assigned to personnel leaving the organization are suspended and collected before the person leaves the premises.  If the organization uses keyless entryways, change the codes at reasonable intervals and especially when someone leaves the organization.</li>
</ul>
<p>These are but a few examples of comprehensive Access Control.  NESP can help you with your policies, procedures and training.  If you have any questions about reducing your risk from improper access, give us a call or send us email today. We are here to help!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Mobile Devices</title>
		<link>https://www.newenglandsp.com/2016/02/protecting-mobile-devices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-mobile-devices</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 04 Feb 2016 15:18:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Monthly Security Awareness]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=7673</guid>

					<description><![CDATA[For this months topic we will be discussing mobile security risks and preemptive measures to take in order to reduce the risks. Mobile devices are commonly used in remote locations (away from the office) which imposes many risks which need to be mitigated before sensitive/private data is stored or accessed. Mobile devices allow workers to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>For this months topic we will be discussing <strong>mobile security</strong> risks and preemptive measures to take in order to reduce the risks. Mobile devices are commonly used in remote locations (away from the office) which imposes many risks which need to be mitigated before sensitive/private data is stored or accessed.</p>
<p>Mobile devices allow workers to conveniently work in multiple locations which increases efficiency.  Unfortunately this convenience comes with security risks.  Mobile devices can easily be lost or stolen, connected to an unsecure network, and users may be tempted to download non secure apps that might conceal &#8220;malware&#8221; that could be used to steal confidential data. Since security is minimal for mobile devices, a thief can retrieve sensitive data directly from the device, or use the laptop, phone, or tablet to access an organization&#8217;s computer network remotely.</p>
<p><strong><u>What to do?</u></strong></p>
<p>&nbsp;</p>
<ul>
<li><strong><u>Centralized Device Management</u></strong>&#8211; Software technology that centralizes device management at the organization level to secure both agency-issued and personally owned devices. Centralized programs manage the configuration and security of mobile devices and provide secure access to an organization&#8217;s computer network. They are typically used to manage the mobile devices that many agencies issue to staff. Apple&#8217;s Find My iPhone helps with at least the device location and remote wipe.</li>
</ul>
<ul>
<li><strong><u>Information Security Awareness Training</u></strong>&#8211; Inform users who can potentially do harm to your network by visiting websites infected with malware, responding to phishing e-mails, storing their login information in an unsecured location, connecting to an unsecure location/device, or even giving out sensitive information over the phone when exposed to social engineering.</li>
</ul>
<ul>
<li><strong><u>Device Encryption and Passcodes</u></strong>&#8211; This is an easy fix to mitigate the risk of data breaches. Encryption is a reversible process which scrambles the data into cipher text (unreadable data). In order for the authorized person to access the device, the data can be reversed back to a readable format with the use of authentications i.e. password, token key (access card), fingerprint recognition etc. Additionally, mobile devices should be protected with a passcode that follows your company&#8217;s <a href="https://www.newenglandsp.com/2016/01/protect-your-passwords/">password guidelines</a> and set to lock the user out if too many attempts are made. These things will make it much less likely that your mobile device will be abused by unauthorized use.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect your passwords!</title>
		<link>https://www.newenglandsp.com/2016/01/protect-your-passwords/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-your-passwords</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 05 Jan 2016 18:19:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Monthly Security Awareness]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=7651</guid>

					<description><![CDATA[Happy New Year! This is the first in a series of monthly information security awareness posts to help our clients stay ahead of security problems by informing their employees of common security best practices, recent trends and threats, and advice of what to do if the bad guys get you! This month, Passwords. Nobody likes [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Happy New Year!</p>
<p>This is the first in a series of monthly information security awareness posts to help our clients stay ahead of security problems by informing their employees of common security best practices, recent trends and threats, and advice of what to do if the bad guys get you!</p>
<p>This month, <em><strong>Passwords.</strong></em></p>
<p>Nobody likes them, we have too many of them, and its the sort of thing that we get lazy about, which can leave both us as individuals, as well as the companies we work for, vulnerable to all sorts of bad things. Identity theft, data loss, financial loss, reputation loss. you name it, you can lose it with bad password habits.</p>
<p>What can we do?</p>
<p><strong>Strong Passwords and Passphrases</strong></p>
<p>It starts with strong passwords. Strong passwords are those that contain multiple types of characters, a letter, a number, and a symbol. Different systems may restrict the use of special characters, and most (but not all) corporate logins will enforce this rule for you. Good passwords should be:</p>
<ul>
<li>8 or more characters in length</li>
<li>Contain an upper case letter (A-Z)</li>
<li>Contain a lower case letter (a-z)</li>
<li>Contain a number (0-9)</li>
<li>Contain a special character (~!@#$%^*&amp;;?.+_)</li>
<li>Different for each system you access</li>
</ul>
<p>Never use common things like your name, or your company name, and use different passwords for different functions, and avoid mixing your personal passwords with your work identities. If you lose one password, you only have to worry about one system.</p>
<p>That&#8217;s going to be a lot of passwords, so you may want ask your IT department to install a&#8230;</p>
<p><strong>Password Management Software Package</strong></p>
<p>To manage all these, we recommend you use a password manager such as <a href="http://keepass.info/" target="_blank">Keepass</a> its free, and a decent way to keep track of all these things i just told you you needed. Of course, make sure you protect it with a strong passphrase, constructed according to the above guidelines!</p>
<p>There are lots of packages that do this, your IT department may suggest a different one. They store your passwords safely, and give you the ability to recall them and automatically paste them into web sessions. They usually can generate secure passwords for you, which takes the guesswork out of good construction.</p>
<p><strong>Keep it secret! Change them regularly!</strong></p>
<p>Finally, don&#8217;t give your passwords to <strong>ANYONE</strong>! There are very few (some may argue zero) circumstances where someone other than you needs you password. If someone claims they need it, ask, and when in doubt, escalate to a manager, IT, or your local Information Security office. Don&#8217;t rely on the &#8220;Save Password&#8221; feature in your browsers. Don;t put it in an email. Don&#8217;t give it out on the phone.</p>
<p>Good password hygiene suggests you change your password at least every <strong>60 &#8211; 90 days</strong>, and your IT department may force that change. If it doesn&#8217;t, change them every now and then. Don&#8217;t use a password that&#8217;s been around for more than a year. If you lose control of any of your passwords, change it <strong>immediately</strong>, and inform your IT department.</p>
<p>Keep it secret, keep it safe.</p>
<p>If you have any questions, ask your local IT resource, or email us. We are here to help!</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
