Navigating the Cyber Breach: A Security Tale
Scott Huxley
?? Driving Business Value by Reducing Technical Debt | LinkedIn Humorist ????
Last week I had the pleasure of speaking with someone who had been hacked.
If you have been in this industry for some time, you’ve likely built a lens that often goes to the obvious reasons why.
Upon further investigation, none of those things were true. To be fair, they had been set up correctly, and at face value, this type of attack appeared very sophisticated, especially given that they are a small organization.
Additionally, they were working with a large MSP with a focus on cybersecurity.
How?
While the facts may be a little hard to come by, further discussion suggests that they had connected to some possibly sketchy Wi-Fi over the last 30 days.
They had witnessed some ‘weirdness’ that they disregarded. Could this have been the source? It appears this person was a victim of session theft.
It would appear they were a victim of session theft. This can occur in a few different ways:
领英推荐
Once the user was compromised, it did what they do, they compromised the email account of the victim and started sending weaponized emails to all of their contacts. Let's try to find answers to improve YOUR security.
Answers
First of all, put SecurityFIRST. Ensure that your IT partner is giving you critical advice on how to protect yourself and the people you interact with.
We can all do better. Whether you are currently using an IT company, standards need to be improved so that you are not the next victim."
I hope this helps! If you need further assistance, feel free to ask. ??
Securely yours,
Scott