Nov 05 2024

From Cartels to Crypto: The digitalisation of money laundering

Category: Cryptodisc7 @ 1:06 pm

In this podcast episode, Geoff White and ISF CEO Steve Durbin explore the shift in cybercrime, specifically how digitalization has transformed money laundering. White discusses how nation-states have learned from cybercriminals, weaponizing stolen information for influence and disruption. They touch on artificial intelligence’s role in both enabling and combating cybercrime and the growing intersections between organized crime, cryptocurrency, and laundering. Technology’s rapid evolution challenges law enforcement’s ability to keep up, highlighting the need for advanced, coordinated defenses. For a deeper dive, listen to the episode here.

…they’ve learned the damage that a leak can do…nation-states are now extremely astute at getting in, stealing information, and then weaponising that information to change people’s attitudes, to influences world events. Nation-states have got both feet in this cyber crime game…

Money laundering in cryptocurrency typically involves several methods to hide the origins of funds. Common techniques include mixing services (or “tumblers”) that combine various transactions to obscure their source, chain-hopping by converting funds across multiple cryptocurrencies, and using privacy coins like Monero or Zcash, which have enhanced anonymity features. Launderers may also move funds through decentralized exchanges or peer-to-peer platforms that lack stringent identification requirements. These practices make it challenging to trace funds, requiring specialized blockchain analysis to uncover.

The Crypto Launderers: Crime and Cryptocurrencies from the Dark Web to DeFi and Beyond

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: money laundering


Nov 05 2024

How can ISO 27001 help SaaS companies?

Category: Information Security,ISO 27kdisc7 @ 12:13 pm

ISO 27001 certification is essential for SaaS companies to ensure data protection and strengthen customer trust by securing their cloud environments. As SaaS providers often handle sensitive customer data, ISO 27001 offers a structured approach to manage security risks, covering areas such as access control, encryption, and operational security. This certification not only boosts credibility but also aligns with regulatory standards, enhancing competitive advantage.

The implementation process involves defining an Information Security Management System (ISMS) tailored to the company’s operations, identifying risks, and applying suitable security controls. Although achieving certification can be challenging, particularly for smaller businesses, ISO 27001’s framework helps SaaS companies standardize security practices and demonstrate compliance.

To maintain certification, SaaS providers must continuously monitor, audit, and update their ISMS to address emerging threats. Regular internal and external audits assess compliance and ensure the ISMS’s effectiveness in a constantly evolving security landscape. By following ISO 27001’s guidance, SaaS companies gain a proactive approach to security and data privacy, making them more resilient against breaches and other cybersecurity risks.

Moreover, ISO 27001 certification can be a decisive factor for clients evaluating SaaS providers, as it shows commitment to security and regulatory compliance. For many SaaS businesses, certification can streamline client acquisition and retention by addressing data privacy concerns proactively.

Ultimately, ISO 27001 provides SaaS companies with a competitive edge, instilling confidence in clients and partners. This certification reflects a company’s dedication to safeguarding customer data, thereby contributing to long-term growth and stability in the competitive SaaS market. For more information, you can visit the full article here.

Need expert guidance? Book a free 30-minute consultation with a ISO27k expert.

The Risk Assessment Process and the tool that supports it

What is the significance of ISO 27001 certification for your business?

ISO 27k Chat bot

Pragmatic ISO 27001 Risk Assessments

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

ISO 27001/2 latest titles

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: iso 27001, saas


Nov 05 2024

Fast-track your ISO 27001 certification with ITG all-inclusive ISO 27001:2022 toolkit!

Category: ISO 27k,Security Toolsdisc7 @ 9:50 am

ITG expertly curated ISO 27001 documentation toolkit provides ready-to-use templates, saving you the effort of building everything from scratch. Developed by experienced ISO 27001 consultants and subject matter experts, this toolkit has a strong track record of guiding organizations to certification. Join the thousands of organizations that trust our toolkit for a reliable path to ISO 27001 compliance.

Easily handle ISMS (Information Security Management System) documentation with our streamlined templates and tools, designed to simplify the creation and management of critical documents, making ISO 27001 compliance straightforward and efficient.

For organizations dedicated to safeguarding sensitive data, our ISO 27001 Toolkit is an invaluable resource, helping you navigate ISO 27001 requirements with ease and confidence.

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

The Risk Assessment Process and the tool that supports it

What is the significance of ISO 27001 certification for your business?

ISO 27k Chat bot

Pragmatic ISO 27001 Risk Assessments

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

ISO 27001/2 latest titles

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: ISO 27001:2022 toolkit


Nov 05 2024

ISO 27001 clauses 6.1.2 and 6.1.3 on information security risk assessment should be relocated to clause 8

Category: ISO 27k,Risk Assessment,Security Risk Assessmentdisc7 @ 9:03 am

Clause 6.1.1 is often misunderstood and frequently overlooked. It requires organizations to assess risks and opportunities specifically related to the Information Security Management System (ISMS)—focusing not on information security itself, but on the ISMS’s effectiveness. This is distinct from the information security risk assessment activities outlined in 6.1.2 and 6.1.3, which require different methods and considerations.

In practice, it’s rare for organizations to assess ISMS-specific risks and opportunities (per 6.1.1), and certification auditors seldom address this requirement.

To clarify, it’s proposed that the information security risk assessment activities (6.1.2 and 6.1.3) be moved to clause 8. This aligns with the structure of other management system standards (e.g., ISO 22301 for Business Continuity Planning). Additionally, a note similar to ISO 22301’s should be included:

“Risks in this sub clause relate to information security, while risks and opportunities related to the effectiveness of the management system are addressed in 6.1.1.”

Need expert guidance? Book a free 30-minute consultation with a ISO27k expert.

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

The Risk Assessment Process and the tool that supports it

What is the significance of ISO 27001 certification for your business?

ISO 27k Chat bot

Pragmatic ISO 27001 Risk Assessments

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

ISO 27001/2 latest titles

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: clauses 6.1.2, clauses 6.1.3


Nov 04 2024

The Risk Assessment Process and the tool that supports it

Category: ISO 27k,Risk Assessment,Security Risk Assessmentdisc7 @ 12:00 pm

The “Risk Assessment analysis” covers key areas of risk assessment in information security:

  1. Risk Assessment Process: The core steps include identifying assets, analyzing risks, and evaluating the value and impact of each risk. This process helps determine necessary controls and treatments to mitigate or accept risks.
  2. Types of Risk:
    • Asset-Based Risk: Focuses on assessing risks to tangible assets like data or hardware.
    • Scenario-Based Risk: Evaluates hypothetical risk scenarios, such as potential data breaches.
  3. Risk Analysis:
    • Impact Analysis: Measures the financial, operational, and reputational impact of risks, assigning scores from 1 (very low) to 5 (very high).
    • Likelihood Analysis: Assesses how likely a risk event is to occur, also on a scale from 1 to 5.
  4. Risk Response Options:
    • Tolerate (accept risk),
    • Treat (mitigate risk),
    • Transfer (share risk, e.g., via insurance),
    • Terminate (avoid risk by ceasing the risky activity).
  5. Residual Risk and Risk Appetite: After treatments are applied, residual risk remains. Organizations determine their acceptable level of risk, known as risk appetite, to guide their response strategies.

These structured steps ensure consistent, repeatable risk management across information assets, aligning with standards like ISO 27001.

The Risk Assessment Process involves systematically identifying and evaluating potential risks to assets. This includes:

  • Identifying Assets: Recognizing valuable information assets, such as data or physical equipment.
  • Risk Analysis: Analyzing the potential threats and vulnerabilities related to these assets to assess the level of risk they pose.
  • Evaluating Impact and Likelihood: Measuring the potential impact of each risk and estimating how likely each risk is to occur.
  • Implementing Controls: Deciding on control measures to mitigate, transfer, accept, or avoid each risk, based on organizational risk tolerance.

To streamline this process, organizations often use risk assessment tools. These tools assist by automating data collection, calculating risk levels, and supporting decision-making on risk treatments, ultimately making the assessment more consistent, thorough, and efficient.

CyberComply makes compliance with cybersecurity requirements and data privacy laws simple and affordable.

  • Manage all your cybersecurity and data privacy obligations
  • Accelerate certification and supercharge project effectiveness
  • Get immediate visibility of critical data and key performance indicators
  • Stay ahead of regulatory changes with our scalable compliance solution
  • Reduce errors and improve completeness of risk management processes
  • Identify and treat data security risks before they become critical concerns

Reduce data security risks with agility and efficiency

  • Quickly identify and treat data security risks before they become critical concerns with the intuitive, easy-to-use risk manager tool
  • Keep track of data security compliance requirements and the security controls you have in place in conjunction with critical laws and information security frameworks
  • Demonstrate compliance with ISO 27001, the leading information security management standard, with powerful built-in reports
  • The software includes control sets from ISO 27001, ISO 27017, ISO 27018, ISO 22301, ISO 27032, NIST, CSA CCM, the PCI DSS, SOC 2, and the CPRA

Need expert guidance? Book a free 30-minute consultation with a Risk assessment specialist.

What is the significance of ISO 27001 certification for your business?

ISO 27k Chat bot

Pragmatic ISO 27001 Risk Assessments

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

ISO 27001/2 latest titles

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Risk Assessment analysis, Risk Assessment Process


Oct 30 2024

A step-by-step guide to risk management following ISO 27001 and ISO 27005 standards

Category: ISO 27k,Risk Assessment,Security Risk Assessmentdisc7 @ 9:44 am

The ISO 27001 risk management guide provides a structured methodology for managing information security risks aligned with ISO standards. It first covers setting risk criteria, helping organizations define their risk appetite and identify high-priority assets and vulnerabilities. Risk assessment follows, where risks are quantified based on their likelihood and impact, allowing for prioritization.

The guide emphasizes the importance of treatment planning, advising on risk responses: avoidance, transfer, mitigation, or acceptance, with decisions documented for compliance. Documentation ensures transparency and traceability, forming a record of risk decisions.

A key component is regular review, where organizations reassess risks as threats change, supporting ISO 27001’s principle of continuous improvement. This cyclical approach helps keep the risk management framework adaptable and responsive to evolving security needs.

Additionally, the guide underscores the role of management, recommending their involvement in review and support of risk processes. Management buy-in ensures that security efforts align with strategic goals, encouraging organization-wide commitment.

In summary, the guide helps organizations maintain a robust, adaptive risk management system that meets ISO 27001 standards, enabling proactive risk control. For more detail, you can access the document here.

some commonly adopted approaches:

What is the significance of ISO 27001 certification for your business?

ISO 27k Chat bot

Pragmatic ISO 27001 Risk Assessments

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

ISO 27001/2 latest titles

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: guide to risk management, iso 27001, iso 27005


Oct 29 2024

How Professional Service Providers Can Add vCISO Service

Category: vCISOdisc7 @ 10:42 am

Cynomi’s guide details how service providers can integrate virtual Chief Information Security Officer (vCISO) services to meet growing demand among small and mid-sized businesses (SMBs) for cybersecurity leadership. It explores the role and responsibilities of a vCISO, including creating security policies, managing compliance, and responding to incidents—key for SMBs that lack internal expertise.

The guide suggests ways to structure vCISO offerings, such as customizable packages with risk assessments, security strategy development, and compliance support tailored to specific business needs. These packages help providers offer scalable, ongoing security programs, addressing both immediate and strategic security needs for clients.

In terms of implementation, the guide discusses leveraging existing tools, augmenting them with vCISO expertise to deliver consistent, effective security management. It highlights technology use for proactive threat intelligence, policy enforcement, and monitoring, helping service providers deliver high-value, cost-effective solutions.

Lastly, the guide outlines the business benefits for service providers, including revenue growth, competitive advantage, and stronger client relationships. By adding vCISO services, providers can meet the increased demand for cybersecurity leadership, reinforcing client trust and supporting long-term security. This approach positions providers as key partners in clients’ cybersecurity resilience.

For the full guide, you can review it here.

Why Choose vCISO Services?

Enhance Your Security Framework with DISC LLC

5 key tasks for a vCISO to accomplish in the first three months

Expertise in Virtual CISO (vCISO) Services

In what situations would a vCISO or CISOaaS service be appropriate?

The Elemental Truth of vCISO Services: vCISO Guide for Small & Mid Sized Businesses

The Phantom CISO: Time to step out of the shadow

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot


Oct 18 2024

What is the significance of ISO 27001 certification for your business?

Category: ISO 27kdisc7 @ 10:46 am

ISO 27001 certification is more than just a standard; it’s a powerful statement that transforms how your customers perceive your company. This certification represents an unwavering commitment to data security, acting as a digital shield for your business. By safeguarding your most valuable asset—your data—you build unshakeable trust with your customers, showing them that their information is safe in your hands.

Achieving ISO 27001 means your business isn’t just adhering to standards; it’s setting itself apart as a leader in data protection. This certification opens doors to new opportunities, enabling your business to thrive in an increasingly digital world. It’s about ensuring your business’s long-term sustainability and demonstrating a serious commitment to information security.

ISO 27001 is more than a quality seal; it sends a clear message to the world. It shows that your company prioritizes data protection, adheres to the best practices of information security, and reduces the risk of cyber incidents. It also signals that your business is trustworthy, boosting confidence among customers, suppliers, and business partners. This trust gives you a competitive edge, setting you apart from the competition and attracting new business opportunities.

In essence, ISO 27001 is an investment in the future of your business. It not only helps in improving risk management by identifying and mitigating information security risks but also strengthens your business’s foundation. By demonstrating a strong commitment to data security, you can ensure the longevity and success of your company in today’s digital age.

Overall benefits of ISO 27001 certification for businesses include:

  1. Enhanced Data Security: ISO 27001 provides a systematic approach to managing sensitive company information, ensuring that data is protected from unauthorized access, breaches, and other security threats.
  2. Increased Customer Trust: Achieving this certification demonstrates a commitment to data security, building trust among customers, partners, and stakeholders. It shows that your organization takes information security seriously.
  3. Regulatory Compliance: ISO 27001 helps businesses comply with legal and regulatory requirements related to data protection, which can vary across different industries and regions. This reduces the risk of legal penalties and compliance-related issues.
  4. Competitive Advantage: Companies with ISO 27001 certification can differentiate themselves from competitors. It acts as a quality seal, giving you an edge in the market and attracting new clients who prioritize data security.
  5. Improved Risk Management: The certification process involves identifying, assessing, and managing information security risks. This proactive approach helps businesses to mitigate potential threats and vulnerabilities effectively.
  6. Operational Efficiency: Implementing ISO 27001 often leads to streamlined processes and better resource management, as businesses adopt consistent and structured approaches to handling data security.
  7. Global Recognition: ISO 27001 is an internationally recognized standard, which means your business can gain credibility and access to new markets around the world. It assures clients globally that your security practices meet high standards.
  8. Business Continuity: By focusing on risk assessment and management, ISO 27001 helps ensure that your business can continue to operate even in the face of security incidents or disruptions. This resilience is critical for long-term success.

In summary, ISO 27001 certification not only strengthens your data security framework but also boosts your reputation, enhances compliance, and gives you a competitive edge, making it a valuable investment for any business.

ISO 27k Chat bot

Pragmatic ISO 27001 Risk Assessments

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

ISO 27001/2 latest titles

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: iso 27001, iso 27001 certification


Oct 16 2024

Not all information security risks translate directly to business risks

There is a misconception among security professionals: the belief that all information security risks will result in significant business risks. This perspective is misleading because not every information security incident has a severe impact on an organization’s bottom line. Business decision-makers can become desensitized to security alerts if they are inundated with generalized statements, leading them to ignore real risks. Thus, it is essential for security experts to present nuanced, precise analyses that distinguish between minor and significant threats to maintain credibility and ensure their assessments are taken seriously.

There are two types of risks:

  1. Information Security Risk: This occurs when a threat (e.g., a virus) encounters a vulnerability (e.g., lack of antivirus protection), potentially compromising confidentiality, availability, or integrity of information. Depending on the severity, it can range from a minor issue, like a temporary power outage, to a critical breach, such as theft of sensitive data.
  2. Business Risk: This affects the organization’s financial stability, compelling decision-makers to act. It can manifest as lost revenue, increased costs (e.g., penalties), or reputational damage, especially if regulatory fines are involved.

Not all information security risks translate directly to business risks. For example, ISO27001 emphasizes calculating the Annual Loss Expectation (ALE) and suggests that risks should only be addressed if their ALE exceeds the organization’s acceptable threshold.

Example:

Small Business Data Breach: A small Apple repair company faced internal sabotage when a disgruntled employee reformatted all administrative systems, erasing customer records. The company managed to recover by restoring data from backups and keeping customer communication open. Despite the breach’s severity, the company retained its customers, and the incident was contained. This case underscores the importance of adequate data management and disaster recovery planning.

Several factors to consider when assessing the relationship between information security and business risk:

  • Business Model: Certain businesses can withstand breaches with minimal financial impact, while others (e.g., payment processors) face more significant risks.
  • Legal Impact: Fines and legal costs can sometimes outweigh the direct costs of a breach. Organizations must assess regulatory requirements and contractual obligations to understand potential legal implications.
  • Direct Financial Impact: While breaches can lead to financial loss, this is sometimes treated as a routine cost of doing business, akin to paying for regular IT services.
  • Affected Stakeholders: It is crucial to identify which parties will bear the brunt of the damage. In some cases, third parties, like investors, may suffer more than the organization experiencing the breach.

Ultimately, information security risks must be evaluated within the broader business context. A comprehensive understanding of the company’s environment, stakeholders, and industry will help in prioritizing actions and reducing overall breach costs.

Information Risk Management: A practitioner’s guide

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: business risks, Information Risk Management: A practitioner's guide


Oct 15 2024

The IBM 2024 Data Breach Report reveals a troubling trend

Category: Data Breachdisc7 @ 10:03 am

The IBM 2024 Data Breach Report reveals a troubling trend: the average cost of a data breach has reached a record high of $4.88 million, a 10% increase from the previous year. This rise is attributed to several factors, including the increasing complexity of attacks, the growing volume of sensitive data, and the rising costs of responding to and recovering from breaches. The report also highlights the significant disruption that data breaches can cause to businesses, with 70% of breached organizations reporting significant or very significant disruption.

One of the key findings of the report is that data breaches are becoming more costly over time. Breaches that take longer to detect and contain have significantly higher costs than those that are quickly identified and addressed. In fact, breaches with a lifecycle exceeding 200 days have an average cost of $5.46 million, compared to $4.54 million for breaches with a lifecycle of less than 200 days. This suggests that investing in early detection and response capabilities can be a valuable strategy for mitigating the costs of data breaches.

The report also emphasizes the importance of effective incident response planning and execution. Organizations that have well-developed incident response plans and can execute them effectively are better equipped to minimize the impact of data breaches and reduce their overall costs. This includes having a clear understanding of the incident response process, identifying and training key personnel, and having the necessary tools and technologies in place.

Approximately 40% of all data breaches involved information stored in multiple environments. Breaches that included public clouds were especially expensive, with an average cost of $5.17 million per incident, representing a 13.1% increase from the previous year.

Shadow data was a factor in 35% of data breaches, resulting in an average cost increase of 16%. Additionally, breaches that involved shadow data took 26.2% longer to detect and 20.2% longer to contain than those without shadow data.

For the 14th consecutive year, healthcare has faced the most expensive data breaches, averaging $9.77 million per incident. Although there was a slight decline from 2023, the healthcare, financial services, and energy sectors continue to be significant targets for cybercriminals.

Fifty-three percent of organizations reported notable shortages in their security workforce, leading to heightened breach-related costs—an additional $1.76 million compared to those with sufficient staffing. Conversely, organizations that utilized AI and automation tools achieved an average savings of $2.2 million in breach-related expenses.

Additionally, the report highlights the growing threat of ransomware attacks. Ransomware attacks are becoming increasingly sophisticated and costly, with average breach costs reaching $4.91 million in 2024. This emphasizes the importance of implementing strong security measures to protect against ransomware attacks, including regular backups, security awareness training, and patching vulnerabilities.

For more details, visit Cost of a Data Breach Report 2024

Data Breaches: Crisis and Opportunity

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: IBM 2024 Data Breach Report


Oct 15 2024

Scammers can easily place fake QR codes over legitimate ones

Category: Cybercrime,Security Awarenessdisc7 @ 8:53 am

QR codes have become a popular, convenient way to make payments, but they also open the door to scams. This was seen in a recent incident where someone lost €1,000 after scanning a QR code for parking, which redirected to a fraudulent payment page.

Scammers can easily place fake QR codes over legitimate ones, tricking users into entering sensitive information or making unauthorized payments.

It is advisable to always double-check the URL after scanning; if it appears suspicious, do not proceed.

QR code scams are fraudulent schemes where scammers use QR codes to trick people into providing personal information, installing malware, or making unauthorized payments. Here are some common types of QR code scams and how they work:

1. Phishing via QR Codes

  • How it works: Scammers create QR codes that redirect to fake websites designed to look like legitimate sites. Once scanned, users may be prompted to enter sensitive information like login credentials, credit card details, or personal information.
  • Example: A QR code on a poster claims to offer a discount on a popular brand. When scanned, it takes the user to a fake website that asks for payment details.

2. Malware Distribution

  • How it works: Scanning the QR code triggers the download of malicious software onto the user’s device. This malware can steal data, monitor activities, or even lock the device and demand a ransom.
  • Example: A QR code is advertised as a link to a free app download, but instead, it installs malware on the user’s phone.

3. Payment Scams

  • How it works: Scammers replace legitimate QR codes with their own, redirecting payments to their accounts instead of the intended recipient. This is often seen in places where QR codes are used for payments, such as restaurants or parking meters.
  • Example: A restaurant’s QR code on a menu for paying the bill is swapped with a fraudulent one, and payments go directly to the scammer.

4. Fake Customer Support or Verification

  • How it works: Scammers may place fake QR codes on receipts, invoices, or emails that claim to provide customer support or verify your account. When scanned, it may lead to phishing websites or prompt users to provide sensitive information.
  • Example: A QR code on an invoice claims to be for verifying a payment, but it leads to a fake customer service page that asks for bank account details.

5. Social Media and Giveaway Scams

  • How it works: Scammers promote QR codes on social media, claiming they lead to exclusive content, discounts, or giveaway entries. Users who scan the code may end up on a phishing site or be tricked into providing personal information.
  • Example: A social media post advertises a giveaway; the QR code leads to a site asking for personal details or a small fee to “claim the prize.”

How to Protect Yourself

  1. Be cautious of QR codes in public spaces: Verify the source before scanning, especially if it’s printed on posters, flyers, or business cards.
  2. Check for tampering: Look closely to see if the QR code has been pasted over another one.
  3. Use a QR code scanner with safety features: Some apps can check URLs before opening them, alerting users if they lead to suspicious sites.
  4. Enable app permissions carefully: Be wary of QR codes that prompt you to download apps or enable permissions.
  5. Verify URLs before providing information: If you’re redirected to a website, double-check the URL for signs of phishing.

QR code scams exploit the trust users place in the convenience of quick access. It’s essential to stay vigilant and cautious when scanning codes from unverified sources.

In an age where convenience reigns supreme, QR codes have seamlessly integrated into our daily lives, offering quick access to information, promotions, and transactions with a simple scan. But beware – lurking behind those pixelated patterns lies a world of potential scams and security threats. In “BEFORE YOU SCAN ANOTHER QR CODE, READ THIS,” we unshade the dark side of QR codes and empower you with the right knowledge and tools to protect yourself in the ever evolving digital world.

Look into the intricacies of QR code technology, this comprehensive handbook equips you with the understanding needed to navigate the treacherous waters of QR code scams. From phishing attacks and malware distribution to social engineering tactics and technical vulnerabilities, we uncover the myriad ways scammers exploit QR codes for malicious purposes.

READ THIS BEFORE YOU SCAN ANOTHER QR CODE: A Comprehensive Handbook to Understanding Scam and Healthy Precaution

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: QR codes


Oct 11 2024

To fight AI-generated malware, focus on cybersecurity fundamentals

Category: AIdisc7 @ 8:08 am

AI-powered malware is increasingly adopting AI capabilities to improve traditional cyberattack techniques. Malware such as BlackMamba and EyeSpy leverage AI for activities like evading detection and conducting more sophisticated phishing attacks. These innovations are not entirely new but represent a refinement of existing malware strategies.

While AI enhances these attacks, its greatest danger lies in the automation of simple, widespread threats, potentially increasing the volume of attacks. To combat this, businesses need strong cybersecurity practices, including regular updates, training, and the integration of AI in defense systems for faster threat detection and response.

As with the future of AI-powered threats, AI’s impact on cybersecurity practitioners is likely to be more of a gradual change than an explosive upheaval. Rather than getting swept up in the hype or carried away by the doomsayers, security teams are better off doing what they’ve always done: keeping an eye on the future with both feet planted firmly in the present.

For more details, visit the IBM article.

Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps

ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills

Previous DISC InfoSec posts on AI

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Adversarial AI Attacks, AI-generated malware, ChatGPT for Cybersecurity


Oct 10 2024

This Hacker Toolkit Can Breach Any Air-Gapped System – Here’s How It Works

Category: Data Breach,Security Breachdisc7 @ 11:47 am

The article discusses a newly developed hacker toolkit designed to compromise air-gapped systems, which are typically isolated from external networks for security purposes. This toolkit exploits electromagnetic waves and ultrasonic sound to covertly transmit data between air-gapped machines and attacker-controlled devices nearby, bypassing the lack of direct network connections.

The toolkit specifically targets vulnerabilities in hardware components, such as CPUs, which emit electromagnetic radiation during operation. Hackers can capture and manipulate these emissions to extract sensitive information like encryption keys and passwords without direct access to the system.

It also highlights how the toolkit leverages ultrasonic waves for data transmission. These inaudible sound waves can travel through the air to communicate with nearby devices, enabling a two-way exchange of information between an isolated system and the hacker’s equipment. This sophisticated method of attack can operate without needing to install traditional malware on the air-gapped machine.

The article emphasizes the significance of this emerging threat, as it poses risks to organizations that rely heavily on air-gapped systems for critical infrastructure protection. Even advanced security measures may not fully mitigate the risk from such unconventional attack vectors, underscoring the need for continuous adaptation in cybersecurity defenses.

For more details, visit Security Newspaper.

European govt air-gapped systems breached using custom malware

Mind The Gap: Can Air-Gaps Keep Your Private Data Secure?

The Black Box Hacker’s Toolkit: Techniques for Successful Pen Testing

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Air-Gapped System, Hacker Toolkit


Oct 09 2024

Pragmatic ISO 27001 Risk Assessments

Category: ISO 27k,Risk Assessment,Security Risk Assessmentdisc7 @ 1:33 pm

Andrew Pattison, a seasoned expert with over 30 years in information security and risk management, emphasizes the pragmatic nature of ISO 27001 in this interview. He explains that ISO 27001 is often misunderstood as a rigid framework when, in fact, it takes a flexible, risk-based approach. This misconception arises because many implementers prioritize certification, leading them to adopt a “you must do X” attitude, which gives the impression that the standard’s clauses are more rigid than they are. Pattison stresses that organizations can tailor controls based on risk, selecting or excluding controls as needed, provided they can justify these decisions.

He explains that a true risk-based approach to ISO 27001 involves understanding risk as the combination of a vulnerability, a threat to that vulnerability, and the likelihood of that threat being exploited. Organizations often focus on sensationalized, niche technical risks rather than practical issues like staff awareness training, which can be addressed easily and cost-effectively. Pattison advises focusing on risks that have a real-world impact, rather than obscure ones that are less likely to materialize.

To keep risk assessments manageable, Pattison advocates for simplicity. He favors straightforward risk matrices and encourages organizations to focus on what truly matters. According to him, risk management should answer two questions: “What do I need to worry about?” and “How do I address those worries?” Complicated risk assessments, often bogged down by mathematical models, fail to provide clear, actionable insights. The key is to maintain focus on where the real risks lie and avoid unnecessary complexity.

Pattison also believes in actively involving clients in the risk assessment process, rather than conducting it on their behalf. By guiding clients through the process, he helps them develop a deeper understanding of their own risks, linking these risks to their business objectives and justifying the necessary controls. This collaborative approach ensures that clients are better equipped to manage their risks in a meaningful and practical way, rather than relying on third parties to do the work for them.

For more information on Andrew Pattison interview, you can visit here

ISO 27k Chat bot

ISO/IEC 27001:2022 – Mastering Risk Assessment and the Statement of Applicability

Risk Register Templates: Asset and risk register template system for cybersecurity and information security management suitable for ISO 27001 and NIST

ISO 27001 implementation ISO 27002 ISO 27701 ISO 27017 ISO27k

How to Address AI Security Risks With ISO 27001

How to Conduct an ISO 27001 Internal Audit

4 Benefits of ISO 27001 Certification

How to Check If a Company Is ISO 27001 Certified

How to Implement ISO 27001: A 9-Step Guide

ISO 27001 Standard, Risk Assessment and Gap Assessment

ISO 27001 standards and training

What is ISO 27002:2022

Previous posts on ISO 27k

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: iso 27001, ISO 27001 Risk Assessment, ISO27k


Oct 08 2024

American Water shut down some of its systems following a cyberattack

Category: Cyber Attack,OT/ICSdisc7 @ 11:29 am

American Water, the largest water and wastewater utility company in the U.S., experienced a cyberattack that prompted the shutdown of specific systems. The company took immediate action to secure its infrastructure, and an investigation is ongoing to determine the extent of the breach. The attack has raised concerns about the vulnerability of critical infrastructure to cyber threats.

While the affected systems were isolated to mitigate damage, it is unclear if any customer or operational data was compromised. American Water has stated that service to customers was not disrupted during the incident.

The breach highlights the growing risks faced by essential services and critical infrastructure sectors. This event underscores the importance of robust cybersecurity measures, particularly for utilities that deliver essential public services like water and power.

Homeland Security and Critical Infrastructure Protection

OT, ICS & SCADA Security

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: critical infrastructure protection, ICS & SCADA Security, OT


Oct 07 2024

The ripple effects of regulatory actions on CISO reporting

Category: CISOdisc7 @ 10:19 am

The article discusses how recent regulatory actions, such as those by the FTC and SEC, are reshaping the reporting responsibilities of Chief Information Security Officers (CISOs). These regulations, alongside high-profile legal cases like SolarWinds, have heightened CISO accountability. A YL Ventures report, based on 50 interviews with cybersecurity executives across various industries, highlights increased scrutiny from boards of directors on cybersecurity leadership. CISOs are now more frequently held personally accountable for their company’s cybersecurity posture, leading to more rigorous reporting and oversight requirements.

For more, you can view the full article here.

CISO COMPASS

Chief Information Security Officer

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: CISO COMPASS, CISO reporting


Oct 06 2024

Enhance Your Security Framework with DISC LLC

Category: vCISOdisc7 @ 10:08 am

Why Choose Our vCISO Services?

At DISC LLC, we understand the complexities of navigating today’s digital landscape. Our vCISO services are designed to build a robust security program that not only detects but effectively mitigates risks. Our expert consultants are dedicated to helping your organization maintain a comprehensive security posture.

Comprehensive Solutions for Security Challenges

  • ISO 27001: Achieve compliance with the international standard for information security management. Our team is adept at guiding organizations through the intricacies of ISO 27001 certification.
  • ISMS Development: Develop an Information Security Management System (ISMS) tailored to your organization’s unique needs. Streamline your security processes with a structured approach.
  • Security Risk Assessment: Identify and address potential vulnerabilities with our thorough security risk assessment services. Bolster your defenses by taking a proactive approach to risk management.

Contact DISC LLC Today

Reach out to us to harness the full potential of our expertise in enhancing your organization’s security measures. Our aim is to provide tailored solutions for contemporary security challenges.

Email: info@deurainfosec.com

Phone: +17079985164

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: vCISO services


Oct 05 2024

Pager attacks will trigger tighter security at airports, schools, and even hospitals

Category: Cyber Attack,Security Incidentdisc7 @ 10:54 pm

The Cybernews article discusses a groundbreaking cyberattack orchestrated by Israel’s Mossad using analog devices, such as pagers and walkie-talkies, to target Hezbollah members in Lebanon and Syria. The attacks occurred on September 17-18, 2024, resulting in over 4,000 injuries and nearly two dozen deaths. The devices were reportedly rigged with explosives and detonated remotely, marking the first time such devices were weaponized in a cyberattack. Hezbollah had previously switched to analog communication methods after Israel had infiltrated their mobile networks, but Mossad exploited this by using a supply chain strategy to distribute compromised devices through a fake company.

Mossad’s complex plan involved creating a shell company that supplied pagers and other devices to Hezbollah, which were secretly manufactured with explosives. The devices were later activated remotely, demonstrating the vulnerability of even low-tech solutions in modern warfare. This supply chain attack highlighted the risks of relying on unverified communication devices and prompted immediate security changes in Lebanon, such as a ban on pagers and walkie-talkies on flights. Iran’s Revolutionary Guard also stopped using communication devices in response to the incident.

Security experts predict that this attack will have far-reaching implications for global security, particularly in the West. The use of handheld devices as weapons could lead to stricter scrutiny of all electronic devices with batteries and communication links, especially in industries like healthcare, where pagers are still in use. Manufacturers are expected to strengthen their supply chain security to prevent such vulnerabilities from being exploited again. There is also concern that security measures in airports, government buildings, and other sensitive locations will be tightened, possibly leading to longer lines and more stringent screening processes.

The implications for security are profound, as this incident demonstrates the potential for even basic technology to be weaponized. Security systems and detection technologies may need to be enhanced to catch these types of attacks in the future. The use of analog devices in high-security environments, such as hospitals and government facilities, may also come under review, with industries either moving away from these tools or enforcing stricter security protocols. This attack underscores the evolving nature of cyber threats and the importance of securing both digital and physical supply chains to prevent similar incidents.

For more information, you can visit here

Image by Justin Sullivan | Shutterstock

How will the TSA respond to exploding pagers

What the Exploding Pager Attack Means for Air Travel

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Pager attacks


Oct 04 2024

4 ways AI is transforming audit, risk and compliance

Category: AI,Risk Assessment,Security Compliancedisc7 @ 9:11 am

AI is revolutionizing audit, risk, and compliance by streamlining processes through automation. Tasks like data collection, control testing, and risk assessments, which were once time-consuming, are now being done faster and with more precision. This allows teams to focus on more critical strategic decisions.

In auditing, AI identifies anomalies and uncovers patterns in real-time, enhancing both the depth and accuracy of audits. AI’s ability to process large datasets also helps maintain compliance with evolving regulations like the EU’s AI Act, while mitigating human error.

Beyond audits, AI supports risk management by providing dynamic insights that adapt to changing threat landscapes. This enables continuous risk monitoring rather than periodic reviews, making organizations more responsive to emerging risks, including cybersecurity threats.

AI also plays a crucial role in bridging the gap between cybersecurity, compliance, and ESG (Environmental, Social, Governance) goals. It integrates these areas into a single strategy, allowing businesses to track and manage risks while aligning with sustainability initiatives and regulatory requirements.

For more details, visit here

Credit: Adobe Stock Images

AI Security risk assessment quiz

Trust Me – AI Risk Management

AI Management System Certification According to the ISO/IEC 42001 Standard

Responsible AI in the Enterprise: Practical AI risk management for explainable, auditable, and safe models with hyperscalers and Azure OpenAI

Previous posts on AI

Implementing BS ISO/IEC 42001 will demonstrate that you’re developing AI responsibly

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: AI audit, AI compliance, AI risk assessment, AI Risk Management


Oct 03 2024

AI security bubble already springing leaks

Category: AIdisc7 @ 1:17 pm

AI security bubble already springing leaks

The article highlights how the AI boom, especially in cybersecurity, is already showing signs of strain. Many AI startups, despite initial hype, are facing financial challenges, as they lack the funds to develop large language models (LLMs) independently. Larger companies are taking advantage by acquiring or licensing the technologies from these smaller firms at a bargain.

AI is just one piece of the broader cybersecurity puzzle, but it isn’t a silver bullet. Issues like system updates and cloud vulnerabilities remain critical, and AI-only security solutions may struggle without more comprehensive approaches.

Some efforts to set benchmarks for LLMs, like NIST, are underway, helping to establish standards in areas such as automated exploits and offensive security. However, AI startups face increasing difficulty competing with big players who have the resources to scale.

For more information, you can visit here

Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps

Could APIs be the undoing of AI?

Previous posts on AI

AI Security risk assessment quiz

Implementing BS ISO/IEC 42001 will demonstrate that you’re developing AI responsibly

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Adversarial AI Attacks, AI security


« Previous PageNext Page »