Monthly Archives: December 2014

Charles Leaver – The City Of Chicago Is More Prone To Data Breaches Than Any Other City

Published by:

From the desk of Charles Leaver CEO Ziften Technologies

If you live in Chicago or run a business or work there, you should focus on a report that divulges that Chicago is one of the most susceptible cities in the U.S.A for cyber attacks. The National Consumers League, who are Washington D.C. based group who focus on consumer assistance, published the report as specified by The Chicago Sun-Times. The report exposed some worrying findings and among these was the discovery that 43% of the city’s population reported that their information was stolen and that their information was utilized to make purchases on the Internet. This supposes that cyber lawbreakers are being more forward thinking when it concerns taking individual data.

So if you suffer a cyber attack on your business you should expect the stolen data to be used for harmful functions. The National Consumers League vice president of public policy, John Breyault, said “Chicago residents who get a data-breach alert needs to pay specific focus on purchases made online (in their name).”.

The residents of Chicago are not being inactive and just dismissing this important report. The Illinois state Attorney General Lisa Madigan, is leading the efforts to develop a federal group who will have the duty of examining data security events, so state CBS Chicago. Madigan’s office are examining the attacks on Neiman Marcus and Target as well as others and Madigan feels that with the current severity of attacks the government needs to take responsibility and deal with the problem.

Madigan stated “It simply makes sense that someone has to take the responsibility in this day and age for putting in place security standards for our personal monetary info, because otherwise you have disturbance and a significant effect, potentially, to the general market.” The time frame for establishing this group is unclear at present. Making things occur at the federal level can be extremely slow.

Endpoint Threat Detection And Response System Will Offer Protection.

If you run a company in Chicago (or elsewhere) then there is no requirement for you to wait on this federal group to be established to protect your company’s network. It is recommended that you enact endpoint detection and response software because this will provide significant security for your network and make it essentially cyber attack proof. If you fail to make the most of robust endpoint threat and detection systems then you are leaving the door wide open for cyber bad guys to enter your network and cause you a lot of trouble.


Charles Leaver – Norway Bank Attacks Underline The Need For Endpoint Security

Published by:

Written by Charles Leaver Ziften CEO

The world of global hacking consists of so many cyber wrongdoers that it would be impossible to call all of them. However, there are some hacking cooperatives that make their voices heard louder than the others, and a fine example of this is the Anonymous group. Primarily developed to be a hacking group that was loosely put together, on occasions the Anonymous group will carry out high profile attacks by utilizing the hacking proficiency of its members to make life hard for governments and big corporations. Digital Journal has revealed that Norway banks have ended up being a target of the Anonymous group.

Anonymous Make All Of Their Attacks Simultaneously As A Display Of Force

Through making use of cyber attacks Anonymous is a group that wants to show the world the power that is has. It surprised nobody that the Norwegian part of Anonymous made the decision that they would attack a number of the country’s banks, the decision was also made to infiltrate all the banks at the same time. On a particular time on the very same day, eight of Norway’s biggest banks were hacked by the group, and this caused the electronic banking facilities of the 8 banks being seriously interfered with.

Supervisor of the Evry security team, Sverre Olesen, said “the degree of the attack is not the greatest we have actually seen, but it is the very first time that such an attack has hit a lot of central agencies in the monetary sector in Norway”.

Besides demonstrating the power that the Anonymous group has, the fact that all the attacks took place at the same time shows that cyber crime is becoming more of a collaborative effort with hackers teaming up to compare notes and offering a united force against selected targets. Any organization is prone to this.

They Enjoy Remaining in The Spotlight

Most of the cyber criminals are not trying to find any publicity, they just want to take cash quickly. They just wish to get in and out quick. But the Anonymous group delights in remaining in the limelight even though there is no public connection to any specific person.

According to allvoices, after the cyber attack on the Norwegian banks had actually taken place Anonymous did not lose any time taking credit for this in public. The cyber attacks on the banks not only interfered with the online pay platforms but likewise produced severe troubles for consumers of the banks.

This attack by Anonymous highlights the need for all companies to enable endpoint threat detection and response systems that will safeguard them from the same disastrous incidents happening to them.


Charles Leaver – The Use Of Layered Security Would Have Helped The Banks That Were Attacked

Published by:

Charles Leaver CEO Ziften writes

There have been a variety of cyber attacks on ATMs which have permitted wrongdoers to steal millions of dollars. In order to combat this threat, financial businesses have to comprehend the different aspects of cyber security and the reasons behind their utilization. Financial data will always be highly desirable to cyber wrongdoers as most wish to generate income quick which means that consumer financial records and ATMs are both at risk. To carry out the best security measures, financial companies have to know the layers that they require to keep the bad guys away.

Sadly, unlike mythological monsters of legend, there isn’t a single weapon in the security system toolbox that can safeguard a server from being hacked. There are no cure-all applications to stop hacking. The very best method to safeguard online servers of ATMs and banks, the financial companies will have to use a variety of various methods to keep their details safeguarded. According to PC World, the hackers that infiltrated the ATMs did so by utilizing malware that was really hard to discover. Banks truly need to utilize endpoint security as cyber crooks can try to infiltrate systems by developing hacking tools that are a threat to bank security through using computers that are utilized by bank tellers. This will provide a lot of choices to permeate the network of ATMs.

A Human Eye Is Needed With Contemporary Security

The days have actually now gone where firewalls and automated services were enough to keep hackers at bay. Banks should be utilizing endpoint threat detection and response systems to keep out the cyber crooks. There was a post on about United States bank accounts being penetrated by cyber crooks from Russia and this shows the destructive impact that hackers can have on banks that are not effectively secured. Making use of security workers 24/7 with items supplied by security companies is one method to make sure that a network is not compromised, but this is only one piece of the security puzzle that has to be applied.

There needs to be a change in the company culture so that using strong passwords is adopted, a policy that values security introduced that avoids individuals bringing USB drives, and other computer devices, to the office without permission are actually essential. This and other policies that will prevent malicious aspects from infiltrating a server are all crucial. A malware attack can be prevented earlier with the use of endpoint security. Using more powerful locks so that the criminals might not break through and set up the harmful software application would likewise have actually assisted.

The use of different security layers to prevent cyber crooks accessing networks an organization will purchase time for humans to recognize and stop the hazards before any damage is triggered. A passive security system that responds far too late is not sufficient to offer the high levels of security that organizations need to keep their data safe.