Introduction to Cyber Security

NordVPN has issued the most important online security resolutions for the new year   January 7, 2020. “New Year, New
Why Aren't Authorities Capable of Protecting Your Data? More and more governments around the world are discussing encryption backdoors to
By Ofer Elzam   Artificial intelligence (AI) has connotations that it’s poised to do many magical things and improving enterprise
Email is now the weapon of choice for cyber criminals--and we’re all prize targets. Let’s face it, most of us
The business case for data security due diligence during mergers and acquisitions By Brian Vecci, Field CTO, Varonis The Marriott
By Danielle vanZandt, Industry Analyst - Security, Aerospace, Defense, & Security, Frost & Sullivan The United States Department of Commerce’s
From NordVPN: Digital privacy expert discusses how easy it is to hack into voting machines   October 29, 2019. With

Introduction to Cyber Security

What is cyber security? This introduction to cyber security offers a brief overview of an immense, sprawling subject. Indeed, quite a few books have been written on this subject. It’s impossible to capture it all in a single web page. However, we thought it would be useful to provide a high-level introduction to this topic.

Cyber security is a field of endeavor that spans professions, technologies, processes, laws, law enforcement and national security. At its root, cyber security is about protecting digital assets from harm, theft or malicious, unauthorized use. A digital asset could be a database, a piece of technology like a computer or smartphone, a website, an e-commerce business and so forth.

An introduction to cyber security needs to reference its predecessor. The cyber security field is not new, though it used to be called by (and still is, to some extent) different names. It was known as “information security” (InfoSec). The legal side of it was known as “computer crimes.” The word “cyber” has come into nearly universal use today due to several major shifts that have occurred in the field.

Introduction to Cyber SecurityCyberspace, a concept popularized in science fiction, posits that we (the human users of technology) imagine the invisible, abstract “space” existing between us, our computers, and other computers and their users, as a physical place. It’s fake, but real. Got it? The cyber space has become real enough that it’s a very useful metaphor to describe criminal or malicious acts taking place between people and entities (e.g. governments, corporations) using computers.

We talk about cyber security because life in the modern world has become highly digital. As so many of our interactions and fundamental life processes rely on computers, then crime and malfeasance take place in cyberspace. Hackers are doing much more than affecting InfoSec. They’re affecting people’s lives, in some cases literally, through “cyber physical” acts like hacking connected cars and so forth.

 

Photo by Engin Akyurt from Pexels

From NordVPN: Make 2020 the most secure year ever: cybersecurity resolutions worth sticking to

NordVPN has issued the most important online security resolutions for the new year

 

January 7, 2020. “New Year, New Me” – everyone is familiar with the desire to change for the better as the New Year comes. And although about 80% of New Year’s resolutions fail by mid-February, some are worth keeping. In the digital age, those are the ones related to cybersecurity and online lives.

 

2019 saw a massive increase in cyberattacks; in fact, 4 billion records have been breached so far. “Even the biggest corporations are vulnerable, and we never know when our data is going to end up in the wrong hands,” says Daniel Markuson, the digital privacy expert at NordVPN. “We have no control over when the next company or even government institution is hacked. But even if we can’t prevent all cyber threats, there are things we can do to make our digital life safer.”

 

Promise to stay safe during 2020 and make some resolutions that will stick:

 

  1. ‘I will use stronger passwords.’

 

According to recent findings, most people still make the same mistake and use unimaginative passwords. To make it worse, a lot of people recycle their passwords. While recycling is an excellent initiative for the environment, reusing your passwords is a terrible cyber hygiene practice. This means that if one of your accounts gets hacked, others will too. Security experts advise using password managers, such as NordPass, to create a complex password. It is also a good idea to use two-factor authentication for extra protection.

 

  1. ‘I will stop oversharing on social media’

 

Of course, we all love to boast about our exotic vacations and weekend city breaks. However, whenever you announce you are leaving for a trip on social media, you practically invite a burglar to your house. A good idea is to post those pictures afterward, when you are there to protect your home.

 

  1. ‘I will be careful with public Wi-Fi.’

 

We all love something free, and in this digital age, free Wi-Fi is something we assume every public place will provide. However, public Wi-Fi is a real gold mine for cybercriminals. They have their methods to intercept your internet connection and collect your sensitive information: credit card details, passwords, phone numbers, addresses, and so on. So be vigilant when using public Wi-Fi, use a firewall, and install a VPN, like NordVPN, which encrypts your online data.

 

  1. ‘I won’t click on every link.’

 

Clicking on a malicious link is the easiest way to catch a virus. How do you know which link is malicious and which one is not? Hover over the link or banner and check if the destination site looks legitimate. Also, always check the sender’s details.

 

  1. ‘I will stop postponing software updates.’

 

We’ve all done it – we’re doing something so important and don’t have time to stop for 10 mins to install that software or app update. However, these updates usually contain essential security patches that protect your system from threats. Skipping these updates means that you are leaving your device open to vulnerabilities. Also, make sure you download all updates from verified legitimate sources.

 

  1. ‘I will shop on secure websites only.’

 

Before even thinking about making a transaction, you should check whether your e-shop is secure or not. All you need to do is pay attention to the beginning of your website URL and see if it starts with ‘http’ or ‘https.’ The letter ‘s’ means that the connection is made through a secure protocol, and you can trust the site with your payment. Also, be vigilant and pay attention to how much information the website requires. If it’s asking for more details than usual, it might be a fraudulent site.

 

ABOUT NORDVPN

 

NordVPN is the world’s most advanced VPN service provider, used by over 12 million internet users worldwide. NordVPN provides double VPN encryption, malware blocking, and Onion Over VPN. The product is very user-friendly, offers one of the best prices on the market, has over 5,000 servers in 60 countries worldwide, and is P2P friendly. One of the key features of NordVPN is the zero-log policy. For more information: nordvpn.com.

 

From NordVPN: Governmental Institutions Around the World Fail to Protect Their Citizens’ Data

Why Aren’t Authorities Capable of Protecting Your Data?

More and more governments around the world are discussing encryption backdoors to help them fight various criminal activities. However, the data breaches, hacks, and cyberattacks, which we hear about every day, affect not just private companies. Governmental institutions suffer from them too. Due to various software system flaws, millions of unsuspecting citizens have been affected only this year.

Daniel Markuson, the digital privacy expert at NordVPN, says that some governmental institutions believe they are too small and insignificant for hackers to attack them. However, recent events in Baltimore, Florida, and Texas defy this belief. In May, Baltimore struggled with a cyberattack that froze thousands of computers and disrupted real estate sales, water bills, health alerts, and many other services. A few Florida municipalities had to pay hackers a ransom of $1.1 million after municipal employees were locked out of their email accounts and important files. Just recently, in August a ransomware attack hit local governments in Texas, affecting up to 23 entities.

“Out-of-date software used by some governments and a variety of contractors make them an easy target. That’s the most common reason why these institutions get hacked. Updating a digital security system and making it immune to cyberattacks require millions of dollars and high-level skills,” explains Daniel Markuson, the digital privacy expert at NordVPN. “Slow internal processes and complicated procurement procedures add up to the reasons why some organizations are still using unsafe security software. However, data breaches are expensive, and the security of people’s sensitive data should be considered priceless.”

Here are just a few examples of the governmental data breaches that happened this year. They became infamous for the scope and the numbers of citizens affected.

  • This May, Ivan Begtin, a co-founder of a Russian NGO called Informational Culture, discovered and documented several leaks from Russian government sites. The personal information and passport details of 2.25 million citizens, including high-profile politicians and government officials, were exposed online and available for download.
  • In June, five million of Bulgaria’s seven million citizens had their personal data compromised in an attack on the country’s national revenue agency. Both private and social security information on every adult in Bulgaria was exposed – perfect for identity theft or attacking lucrative targets. Half of the leaked database was posted on several public forums.
  • In the late spring of this year, an unknown hacker attacked a US Customs and Border Protection subcontractor and put much of its internal data on the open web for download. The exposed database included photos of travelers’ faces and license plates, surveillance equipment schematics, and sensitive contracting documents. Now, the border surveillance company – the longtime contractor named Perceptics – is suspended from carrying out business with the federal government. However, over 400 GB of data was stolen and 100,000 people were reportedly affected.

Human error is one of the biggest sources of data breaches, according to NordVPN’s Daniel Markuson. Using weak passwords and falling for phishing scams can hurt an organization immensely. The digital privacy professional explains that it is quite easy to leak email and password information when an employee clicks on a virus link, reveals user credentials, or downloads malware attachments. “Just one click can compromise the entire database of an institution,” says digital privacy expert.

Daniel Markuson, the digital security expert at NordVPN, says that we can’t control what information authorities have about us and how they handle it. However, you should take some measures once you hear a company or an institution relevant to you has been hacked. Find out what information has been leaked and act accordingly:

  • If the leaked information included your login details, you should change them immediately. Start using a password generator for creating strong passwords. Set up 2-factor-authentication, which requires a second password or PIN, usually sent to your smartphone.
  • If your payment details were stolen, you should contact your bank as soon as possible and freeze your card. Check your recent statements for any suspicious activity. Set up a fraud alert with the credit bureau that would notify you if someone tries to open new accounts or take out loans using your card.
  • If your ID, passport, or social security number were leaked, inform authorities right away. Prove your identity before anyone else did, issue a fraud alert, and review your Social Security statement and credit reports for any illegal activities or suspicious charges.

Remember, everyone can become a data breach victim. Even governmental institutions that handle our most sensitive information are vulnerable as their cybersecurity is sometimes lacking. Just stay alert and notify authorities whenever there is a need in order to minimize the damage. Hopefully, the authorities learn from the mistakes others endured and start investing more in cybersecurity.

 

Is AI a Magic Wand for Security?

By Ofer Elzam

 

Artificial intelligence (AI) has connotations that it’s poised to do many magical things and improving enterprise security posture is one of them. The truth, however, is more pragmatic, and AI will still need the human touch to enable automation that ensures robust protection against threats.

The basic promise of AI is that it will augment—even replace—actual teams of people to operate at a large scale beyond human abilities or available resources by seeing what people can’t do and reduce the effort, burnout and churn rates common to today’s security teams.

But AI is an overloaded term. It isn’t magic and it still needs people to be effectively designed and applied. In simplest terms, AI is a computing function which performs a cognitive operation typically done by humans. Applied to cybersecurity, it decides what needs to be done based on information that does not perfectly match any previous criteria, situations, or pre-existing rules.

Further, you can’t talk about AI without mentioning machine learning, a technique used to train a computer program to effectively identify patterns in large sets of data without having an exact match to existing data, or deep learning, a technique used by computer systems to make deductions based on multiple, abstracted and semantic concepts typically derived by machine learning.

AI can’t just be bought off the shelf and installed. Like any security solution, it needs to be properly configured, and while it can enhance automation of security rules and tasks, it’s not required.

 

There’s a Person Behind the AI Curtain

Many organizations are looking at AI to bolster their cybersecurity posture. According to a CapGemini survey released earlier this year, nearly two thirds of respondents think AI will help identify critical threats, while 69 percent believe AI will be necessary to respond to cyberattacks. The pace of adopting AI in cybersecurity is also picking up, according to the survey, with nearly one in five organizations reporting use of AI prior to 2019 with almost two out of three organizations planning to employ AI by 2020.

However, applying AI to improve cybersecurity isn’t as simple as flipping a switch. Specialized AI capabilities are a combination of accumulated knowledge, human training by a vendor, adversarial computer versus computer training, and combining layers of security correlation. All this is necessary for AI to be effectively applied within functional security areas.

The available data also determines the efficacy of AI when applied to security, whether it’s the diversity of sources, scale of data or biases, among other factors. Applying AI to payload data is a lot different than configuration and policy data, and let’s not forget that a human security expert pays a critical role in how well AI can be used to enhance security.

Payload data comes from a wide range of sources, including email content, web site content, application data and network traffic data. It’s a generous stream of attack data that’s easily identified and understood. Patterns of attack can be derived by looking at payload data. The CapGemini survey noted that more than one third of executives make extensive use of AI for predicting cyber threats by scanning through vast amounts of data of various types to make predictions based on how the system has been trained. Preemptive actions can then be taken to avoid attacks. But there are also patterns of defense, which is all the configurations and policies already available. Just as important as understanding attack patterns is analyzing these configurations and policies and understanding if they are in fact secure. If so, can they be applied elsewhere? If not, how do we correct the user or server affected?

While anti-virus and anti-spam tools are comparing what they’re seeing now to previous attacks, when it comes to policy you need to have a safe configuration for baseline comparison so the right update recommendations can be made based on new data. Compliance requirements can help as it can identify areas that are over-exposed and are a significant threat surface—you should always have the least exposure you can afford without hampering business operations.  But as a data source, compliance plays a critical role in automatically bolstering your guardrails and applying your rules whenever the environment changes.

While applying policy rules and updating them automatically based on new and existing data when the environment changes is automation, it’s not necessarily AI.

 

AI if Necessary, but Not Necessarily AI

Just because a decision was made automatically, doesn’t mean AI, machine learning or deep learning was necessarily involved.

Automation is essential for supporting quick, nimble decisions that update configurations, but these decisions are still rooted in human intelligence—security experts who see new threat surfaces and reconfigure security solutions and update policies accordingly. These manual changes might guide automation in the future, but there’s always a need for people to be involved. Automation that doesn’t even fall under the umbrella of AI is augmenting the work of humans, who remain best suited to manage large, complex environments with multiple security solutions and firewalls from multiple vendors.

Many capabilities within solutions are dependent on automation, but while machines may be doing things on their own, it’s not necessarily AI, and not all technology currently available that can respond autonomously to changing situations. Human knowledge in the form of a security expert is still critical alongside automation to provide necessary risk analysis, understanding of compliance pressures, rule recommendation, and policy cleanup.

 

People must power automation

A system that can make changes independently could be considered a flavor of AI, but security automation does require decisions based on rules created and optimized by people.

In the long term, AI has a lot of potential to automate enterprise security to complement the work people still need to do, but remember:

  • You can’t effectively apply AI to cybersecurity without skilled people
  • AI also requires machine learning and deep learning if it’s to be applied to security
  • Automation can still do a lot to improve security posture without AI

Like any emerging technology, AI is not a magic wand for solving all cybersecurity challenges. Ultimately, it’s another option in the toolbox that complements other tools and the security professionals who use them.

About the Author

Ofer Elzam is responsible for the continued development of FireMon GPC, the industry’s first and only solution to deliver persistent policy enforcement for complex, hybrid network environments. Before joining FireMon, Elzam was VP of product at Dome9 Security. Under his headship, Dome9 became the leader in securing multi-cloud deployments, which led to its acquisition by Check Point Software. Prior to Dome9, Elzam was the director of Sophos’ network security product line, where he led the company’s transition to the next-generation XG Firewall platform. Earlier, Elzam worked at Cisco serving as both a strategic architect of security technologies and executive director of product management, where he led ScanSafe, which was acquired by Cisco in December 2009. Elzam also spent 10 years serving in a variety of product leadership positions, including as CTO at Gemalto.

Photo by fotografierende from Pexels

Guest Post: Don’t be the Phish:  One Click Could Destroy Your Business 

Email is now the weapon of choice for cyber criminals–and we’re all prize targets. Let’s face it, most of us have been the “phish” on the email hook, baited by cybercrooks who’ve found ways to lure us into dangerous waters. Far too many of us have clicked on links we shouldn’t have. As a result, bank accounts have been emptied and companies left widely exposed by electronic thieves, leading to debilitating financial losses. There’s also reputational damage.  Experts say one in three consumers no longer does business with a company that’s had a security breach.

According to Michael Hiskey, Chief Strategy Officer at Avanan, a cloud security company that concluded its clients’ biggest cyberthreats arrive in employees’ inboxes, more than ninety percent of security breaches start with an email.  That includes the headliners you hear about on the news.  “The number one problem that results in a breach is email-based phishing attacks,” says Hiskey’s colleague, VP Don Byrne. Hiskey adds that email, the all-too familiar way we communicate, “is a front door to your infrastructure.” What’s often viewed as a minor annoyance is suddenly deadly serious.

At its most basic, phishing means you get an email from someone impersonating someone they’re not.  Sleepwalking through your unread messages, you fall for the scam and whatever its urgent instructions are–i.e. click on this link.  By doing so, you might have been duped into paying a fake invoice–or perhaps worse, you unleashed toxic software known as malware on to your network granting open access to a thief. Once in, the perpetrator will work unseen, undetected, sometimes over a period of weeks to access your system administrator passwords, download email, determine critical servers, key files, client data, designs and more; akin to grabbing the combination to your safe deposit box, or that of your employer.

Often, thieves are lurking behind the spoofed logo of a well-known, trusted brand, like Amazon, PayPal, FedEx or a bank.  In cases of so-called ‘spear-phishing,’ they could be posing as your supervisor or boss.  Of course, you always do what the boss says – and that email sure looks like it came from his office.  It even sounds like him!  Unfortunately, that command from on high you see in your inbox is not really from the C-suite. But it’s too late, you’ve been played.  Preying on your fears, the phisher just tricked you into giving him the equivalent of your crown jewels such as online banking information.

This kind of crime is now more prevalent because of cloud-based computing. “The fact that email has moved to the cloud has changed the game considerably,” says Hiskey. Your data isn’t simply stored in a server in the privacy of your basement anymore. It’s sitting in the cloud, maybe in Dropbox, where any number of cyber anglers can insert their hooks.  What’s more, Avanan says cyberthieves are often more knowledgeable than your company’s system administrator (and better paid), not to mention the fact that the entry code for so many things is now tied to your email address, something we all have. Your inbox is the proverbial weak link in the chain.

According to research conducted by Avanan, which specializes in protecting against phishing, one in every ninety-nine emails is a phishing attack. In a five-day work week, that amounts to almost one a day, per employee. What’s more, one in every twenty-five branded emails (the ones that look like they come from your bank) is phishing. These figures are based on the 55 million emails Avanan sifted through over a four-month period in 2018, determining which ones got caught by the cyber netting already put in place by cloud providers Microsoft and Google.

Of course, the cyberthieves are always one step ahead. There’s not just phishing, via email.  Now there’s smishing, via texts.  And vishing, via phone calls. Plus, angler-phishing, via social media. Practically every day, there’s a new fraudulent scheme; a so-called “zero day” attack, courtesy of ever-creative cyber villains.  According to Starport’s co-founder and chief technology officer Brian Everest, these have “never been seen in the wild”, meaning they’re even new to cybersecurity experts. Old fashioned grifters pointed snub-nosed revolvers at bank tellers or knew how to crack a safe. While crooks of the past also conned people, today’s robbers are full-fledged social engineers, using psychology to profit from our ever-so-human weaknesses.

“How can I design an attack in a way that feels natural to the person being attacked?” a hacker might ask himself.  Hiskey says hackers “are evolving by getting way more patient,” and are able to hide their tracks eerily well. Far too often, they get past the default online protection already constructed by Office 365 (in 30 percent of the cases, according to Avanan research).  Hackers also target people at vulnerable times; on weekends, holidays, during natural disasters and periods when their guard is down. Take “Flo in accounting,” for example, who clicks on a random email on her iPhone on a Saturday morning and logs in with her credentials (email and password), which opens the door and eventually allows the whole company’s infrastructure to be exposed, copied and used against it.

Aside from financial services companies, the automotive and manufacturing sectors are high-value phishing targets for corporate espionage, often pinpointed by nation states looking for trade secrets.  Universities are also particularly vulnerable.  Email addresses ending in “.edu” are especially valuable because of their implied credibility and potentially lead to a trove of intellectual property.

Avanan’s patented advantage, Hiskey says, is its invisibility, sitting behind existing security–it’s there without you and the thieves knowing it.  Most importantly, the company secures the cloud from within, capturing your email before it lands in your inbox, creating a perimeter of security so phishing emails never arrive.  The software also scans all internal email before a criminal takes over an employee’s email account. For the rare, nefarious email that slips through the protective sheath, Avanan’s software then searches for it and destroys it along with any copies.

Meanwhile, in keeping with our times, artificial intelligence has become a crucial component of the company’s toolbox. Avanan’s software learns from past breaches and new threats, then uses that data to predict what might happen next.  At present, there are some 300-plus phishing indicators (and growing) in emails, not apparent to users but visible to the company’s software. It scrutinizes those hundreds of elements, scoring each email as either phishing, suspicious or clean.

According to the 2019 Verizon Data Breach Investigations Report, C-Level executives were many times more likely to be targeted because they are higher impact, meaning closer to key information and money. The report also underlines the risk posed by mobile users who are more likely to click on phishing emails and therefore more susceptible to successful attacks.

Employers everywhere are now trying to educate their workers in cyber hygiene, because all it takes is one ill-advised click to corrupt an organization’s network, and in a worst-case scenario, destroy the business.  On average, it takes one minute and forty-seconds–the amount of time to read a phishing email.  Then it’s about another two minutes to make the fateful mistake of clicking on that dreaded link thereby allowing a nasty digital infection to spread throughout your company’s computer system.

User education, while worthwhile, isn’t enough. Tone comes from the top, as they say. Lots of executives don’t want the hassle associated with protection, which by definition makes system access more difficult. Starport’s co-founder and president David Poulson says many business leaders still see cybersecurity as an obstacle – a bother – even after they’ve been hacked. Astonishingly, some want their spam filters disabled so they don’t miss emails, including ones that have been quarantined as high risk.

“We’re trying to change the all-to-often laissez-faire attitudes of senior officials towards what should be seen as suspicious email,” Poulson says. “We’re trying to help people, at all levels, to protect against their biggest off-balance-sheet risk, the threat of cyber theft”.

The mid-sized company – five-hundred or fewer employees–is particularly vulnerable because it doesn’t view itself as a target.  And Avanan executives argue that if companies are using the ever more popular Slack, they have crossed “the next frontier of phishing attacks.”

Cyber risk brings to mind the fate of Titanic. A sufficient number of lifeboats was viewed by the ship’s owners as excessive, unnecessary ballast that would slow down the world’s greatest ship and newest technology of the era. More than a century later, icebergs still pose threats to ships.  But after such a preventable tragedy, vessels now carry lifeboats for everyone on board.  In designing a shield against cyber theft, it’s worth assessing whether your cloud infrastructure has the modern-day equivalent of enough lifeboats.

 

Photo Credit: Lettie Bellic Flickr via Compfight cc

Guest Post: Learn Marriott’s Lesson: Before an M&A, Don’t Forget the “S” for Security

The business case for data security due diligence during mergers and acquisitions

By Brian Vecci, Field CTO, Varonis

The Marriott breach put data risk around M&A activity on the map. Executives and boards must understand the depth and breadth of the risk they assume when they acquire another company’s data. In Marriott’s case, when they added Starwood’s systems and data to their network, it became a costly oversight.

Brian Vecci, Field CTO of Varonis

When it comes to mergers and acquisitions, companies typically overlook their data. When you acquire a company, you also acquire all of their security and data risk. M&A activity often means taking on thousands or even millions of files. These files typically haven’t been checked for digital risk: sensitive PII on employees and customers, financial information, intellectual property and more. Consider that at the average company, about one out of every five files is open to everyone in the organization. Sensitive data open to everyone is what leads to significant breaches and other incidents. When exposure is high, the door is left wide open to a data breach.

Not knowing where sensitive information resides (both on-premises and in the cloud) or who has access to it can land companies in trouble with regulators. Ignorance isn’t a defense and won’t hold water when modern privacy regulations like the GDPR and CCPA apply. Finger-pointing won’t help companies escape multimillion-dollar fines: Marriott could not claim that it was Starwood’s fault that the breach happened.

Organizations are going to have to onboard the systems and data of acquisition targets, and it’s critical that they are able to fully evaluate and quantify the risk. It’s difficult, to be sure, but not impossible. If you make sure that systems and data are locked down and monitored before bringing them into your network as part of a merger, you’re going to be much better off. Simply assessing risk —knowing what data is out there and where it’s exposed—is a great first step.

Consider the case of this healthcare company: after a merger, they prepared to move their data to the cloud. What they didn’t expect to find was six million folders open to everyone in the company, and nearly 30,000 files containing sensitive data, including PII protected under HIPAA. Not to mention  thousands of stale, but still active, user accounts.

The good news is that data privacy regulations like CCPA and GDPR have real teeth and are forcing companies to put better (or at least some) controls around PII. Companies are taking what happened to Marriott seriously. Data-focused risk assessments are becoming far more common as part of the due diligence process for M&A activity.

Marriott got hit twice in the headlines: once, when the breach was disclosed, and again, when they were fined under the GDPR for the privacy violation. While I hope other organizations will learn the lesson Marriott did, we will almost certainly witness a similar attack in the coming year. There’s too much data open to too many people—it’s just a matter of time.

Photo: https://www.pexels.com/@gratisography

Analyst Insight – US Blacklist of Chinese Surveillance Companies Creates Supply Chain Confusion

By Danielle vanZandt, Industry Analyst – Security, Aerospace, Defense, & Security, Frost & Sullivan

The United States Department of Commerce’s decision to blacklist 28 Chinese public safety organizations and commercial entities hit at some of China’s most dominant vendors within the security industry. Of the eight commercial entities added to the blacklist, six of them are some of China’s most successful digital forensics, facial recognition, and AI companies. However, the two surveillance manufacturers who made this blacklist could have a significant impact on the global market at large—Dahua and Hikvision.

Putting geopolitics aside, Dahua’s and Hikvision’s positions within the overall global digital surveillance market makes their blacklisting somewhat of a shock, with the immediate effects touching off significant questions among U.S. partners, end users, and supply chain partners.

Frost & Sullivan’s research finds that, currently, Hikvision and Dahua rank second and third in total global sales among the $20.48 billion global surveillance market but are fast-tracking to become the top two vendors among IP surveillance camera manufacturers. Their insurgent rise among IP surveillance camera providers came about due to both companies’ aggressive growth pipelines, significant product libraries of high-quality surveillance cameras and new imaging technologies, and low-cost pricing models that provide customers with higher levels of affordability.

This is also not the first time that these two vendors have found themselves in the crosshairs of the U.S. government. In 2018, the U.S. initiated a ban on the sale and use of Hikvision and Dahua camera equipment within government-owned facilities, including the Department of Defense, military bases, and government-owned buildings. However, the vague language of the ban made it difficult for end users to determine whether they were just banned from new purchases of Dahua or Hikvision cameras or if they needed to completely rip-and-replace existing equipment with another brand. Systems integrators, distributors, and even technology partners themselves remained unsure of how they should handle the ban’s implications, only serving to sow confusion among U.S. customers.

In addition to confusion over how end users in the government space were to proceed regarding their Hikvision and Dahua equipment came the realization that both companies held significant customer share among commercial companies throughout the U.S. market—so where was the ban’s line being drawn for these entities? Were they to comply or not? If so, how? Again, these questions have remained unanswered since 2018.

Hikvision and Dahua each have built a strong presence within the U.S. market, despite the 2018 ban. Both companies are seen as regular participants in industry tradeshows and events, and remain active among industry partners throughout the surveillance ecosystem. Both companies have also attempted to work with the U.S. government to alleviate security concerns and draw clearer guidelines for their sales and distribution partners throughout the country. They even established regional operations centers and headquarters in the country.

While blacklisting does send a clearer message to end users, integrators, and distributors—for sales and usage of these companies’ technologies—remedies for future actions still remain unclear. When it comes to legacy Hikvision and Dahua cameras, the onus appears to be on end users and integrators to decide whether rip-and-replace strategies are the best way to comply with government rulings or to just leave the solutions in place and hope for the best.

As far as broader global impacts of this action, these will remain to be seen. While the 2018 ban did bring about talks of similar bans in other regions, none of these bans ever materialized. Dahua and Hikvision maintained their strong market positioning, even achieving higher-than-average growth rates in the past year. Blacklisting does send a stronger message to global regulators though, so market participants outside the U.S. will just have to adopt a wait-and-see posture to see how, if at all, they may need to prepare their own surveillance equipment supply chains for changes to come.

Guest Post: How hard is it to hack the US election?

From NordVPN:

Digital privacy expert discusses how easy it is to hack into voting machines

 

October 29, 2019. With the looming 2020 election, it’s more important than ever to see if the US election can be hacked. Many security researchers have looked into the voting system and have found countless loopholes.

“Many of the hacks could be prevented by employing cybersecurity measures, replacing old voting machines with more secure ones, using paper ballots, or conducting security audits,” says Daniel Markuson, a digital privacy expert at NordVPN. However, according to him, most of these changes cannot be made without extra funding or new legislation, which does not seem to be forthcoming in the US.

 

How easy is it to hack into voting machines?

Different states use different voting machines – optical voting machines, that uses paper ballots, and direct recording electronic (DRE) machines. This means the whole system can’t be hacked at once, but it also means hackers can find the states with the weakest cybersecurity and strike there.

“22 states have chosen to use paper ballots only for security reasons. Their machines may be hackable, but they have paper ballots to compare their results with. The remaining states use either both Optical and DRE machines or only DRE machines,” explains NordVPN’s Daniel Markuson. “Most of these machines are more than 10 years old. They were designed at a time when no one considered the need for cybersecurity. They are so outdated that their software providers, including Microsoft, stopped issuing software updates a long time ago.”

Using a mixture of Optical and DRE machines leaves more than half of the country vulnerable. To make matters worse, there are 5 states (Delaware, Georgia, Louisiana, New Jersey, South Carolina) that use DRE machines only.

 

So what can hackers do with the voting machines?

  • Physically tamper with the device’s hardware. This hack is probably the least likely to happen as it may be difficult to access the device without anyone noticing. It would also be hard to infect enough machines to sway an election. However, this is far from impossible. Voting machines have been thoroughly studied and exploited at hacking events such as DEFCON.
  • Design multiple-use election cards for DRE machines. Normally, one election card equals one vote. However, hackers can create fake ones that could be used an infinite amount of times (as long as the election observers don’t notice anything). This hack is possible and isn’t too difficult to implement. The hardest part would be to mobilize enough people and resources to actually have any major impact.
  • Remotely access the machines. This may not be feasible as most machines are not connected to the internet for security reasons. However, some are. And it doesn’t help if the voting machine maker left remote-access software on it. These machines can easily be exploited by inserting malicious code to alter the results.
  • Connect to the same Wi-Fi network and access the machines. Public Wi-Fi isn’t safe – that applies to the election too. Most voting machines have no firewalls or security measures in place. It would be enough for a hacker to sit in the same room, connect to the same network, and run a targeted attack to take over the device.

 

“Hacking voting machines is possible, but that would require a lot of resources and might not be practical. To have a national effect, hackers have to think big. That means using various techniques to infect the voting process before voters even reach the booth,” says expert.

 

How to target the voting process

This is what hackers might try to do to achieve a sufficient scale to sway an election. The scary thing is that none of the hacks below are out of the ordinary or impossible to achieve.

  • Use baiting to install malicious ballot program. Voting machines need to be set up for the election with a special ballot program. Most of the machines that are not connected to the internet will need an external device like a memory stick with a pre-loaded program. A hacker could easily use baiting techniques or replace legitimate devices with the hacker’s infected device.
  • Infect an election official’s device and tamper with election programs. Many election officials’ details are easily accessible on the internet. The hacker could use a phishing technique to infect an official’s device, gain remote access, and change election program code. This would have an even bigger effect than baiting as this ballot program could now be installed all over the county or a state.
  • Create fake election management systems that are already infected or are set up to vote for the hacker’s preferred candidate. It’s not uncommon for states/counties to hire small companies to provide them with election management systems. They might think they are buying a legitimate service, but how do they know that the service or software providers aren’t hackers or haven’t been breached themselves?
  • Hack into voter registration systems and send phishing emails to voters. A hacker could also send false emails informing voters about long queues, a change in their voting center, or that their voting center is closed.

 

Can they hack your brain?

Hacking a voter’s brain is the worst hack of all. The Cambridge Analytica scandal that some say influenced the 2016 election showed the powerful new tools being used to shape public opinion without accountability. Even without concrete evidence on how many votes may have been swayed, it still planted a seed of doubt – “Is my vote worth a thing?”

“Americans are proud of their freedom of choice, so they rely heavily on media to gather information and form their opinions. Hackers or organizations can turn that against them by hacking social media with fake ads, fake profiles and disinformation,” says Daniel Markuson. “Such attacks are particularly dangerous as they can be governmental or state sponsored. This means a foreign government could try to interfere with the US election.”

 

ABOUT NORDVPN

NordVPN is the world’s most advanced VPN service provider, used by over 12 million internet users worldwide. NordVPN provides double VPN encryption, malware blocking, and Onion Over VPN. The product is very user-friendly, offers one of the best prices on the market, has over 5,000 servers in 60 countries worldwide, and is P2P friendly. One of the key features of NordVPN is zero-log policy. For more information: nordvpn.com.