header pic

Perhaps the BEST B1G Forum anywhere, here at College Football Fan Site, CFB51!!!

The 'Old' CFN/Scout Crowd- Enjoy Civil discussion, game analytics, in depth player and coaching 'takes' and discussing topics surrounding the game. You can even have your own free board, all you have to do is ask!!!

Anyone is welcomed and encouraged to join our FREE site and to take part in our community- a community with you- the user, the fan, -and the person- will be protected from intrusive actions and with a clean place to interact.


Author

Topic: In other news ...

 (Read 1013682 times)

847badgerfan

  • Administrator
  • Hall of Fame
  • *****
  • Posts: 25281
  • Liked:
Re: In other news ...
« Reply #29078 on: February 22, 2024, 04:11:32 PM »
It's absolutely an act of war.

But, how should we respond?  It's difficult to prove where an attack came from, it's highly technical, and if we publicly accuse them, they'll just deny it.

Should we respond in kind?  We don't really have any major divisions of the armed forces set up to do that, although I have zero doubt we have some secret orgs that are already doing it. That's about the most we can do, I think.

Well that, and make sure we maintain robust digital security for all sensitive infrastructure. 
You're in the tech industry, so you clearly know more than most of us here.

How do "we" accomplish this?
U RAH RAH! WIS CON SIN!

betarhoalphadelta

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 12224
  • Liked:
Re: In other news ...
« Reply #29079 on: February 22, 2024, 05:10:01 PM »
You're in the tech industry, so you clearly know more than most of us here.

How do "we" accomplish this?

Who is "we" in this case? 

Individual enterprises (companies) should have a significant incentive already to maintain security. I'm not sure there is a "we" that has to do anything. It's the responsibility of the CIO/CSO (or equivalent position in smaller companies) to figure it out. That involves both security policies and employee training. Hell, about once every month or two I get an email that's designed to mimic a phishing attack and I hit the little "report phishing" button in Outlook, and get a congratulations email from our IT department for catching it. In that case there is no "we". And last year we went to a specific two-factor authentication protocol on top of existing security measures.

Anything owned by the government, it's the government's responsibility to make sure it is appropriately secure and hardened against attack. Same thing re: security policies and employee training. In that case the "we" is obvious--the government entity is responsible. 

As it relates to anything non-government involved in government contracting, utilities, "critical infrastructure", and the like? I'd probably make sure that all of those entities have either via regulation or via their contracts with the government, adequate cybersecurity protections and training programs in place and that they're regularly audited to remain in compliance. In this case the "we" is government, but indirectly via regulation of those third parties / critical infrastructure. 

utee94

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 17718
  • Liked:
Re: In other news ...
« Reply #29080 on: February 22, 2024, 05:54:49 PM »
You're in the tech industry, so you clearly know more than most of us here.

How do "we" accomplish this?
Yeah it's really up to the government and the private companies that happen to own/maintain key infrastructure.  And the dangers aren't typically the mega-corps, they tend to have good security because it's in their best interests not to have downtime and/or lose billions of dollars.

The real security threats tend to creep up where you're not looking, or forget to look, like maybe there's a small bit player who is  a vendor to a city or maybe they contributed a piece of middleware a decade ago and it's so small that nobody thought to patch it over the years.  I'd say our local municipal power and water are the most vulnerable to attack, but even then, that's exactly what terrorist hackers are constantly trying to expose every day, anyway.  

It's not like a Russian or Chinese hacking group is waiting for some formal declaration of war to "get started."  They're already doing it.  They've been doing it for decades.

utee94

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 17718
  • Liked:
Re: In other news ...
« Reply #29081 on: February 22, 2024, 06:01:17 PM »
Who is "we" in this case?

Individual enterprises (companies) should have a significant incentive already to maintain security. I'm not sure there is a "we" that has to do anything. It's the responsibility of the CIO/CSO (or equivalent position in smaller companies) to figure it out. That involves both security policies and employee training. Hell, about once every month or two I get an email that's designed to mimic a phishing attack and I hit the little "report phishing" button in Outlook, and get a congratulations email from our IT department for catching it. In that case there is no "we". And last year we went to a specific two-factor authentication protocol on top of existing security measures.

Anything owned by the government, it's the government's responsibility to make sure it is appropriately secure and hardened against attack. Same thing re: security policies and employee training. In that case the "we" is obvious--the government entity is responsible.

As it relates to anything non-government involved in government contracting, utilities, "critical infrastructure", and the like? I'd probably make sure that all of those entities have either via regulation or via their contracts with the government, adequate cybersecurity protections and training programs in place and that they're regularly audited to remain in compliance. In this case the "we" is government, but indirectly via regulation of those third parties / critical infrastructure.

I shouldn't admit to this, it's embarrassing,  but a couple of years ago I actually got caught by one of our IT department's fake phishing emails.  It was really, REALLY well done.  But even so, I should have caught it.  Honestly our corporate filtering is so good that REAL ones never make it to me.

They warned me and said if I missed another one I'd get reported to my manager and have to go through some extended compliance training. Ugh.  Suffice to say I've never missed another one.

betarhoalphadelta

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 12224
  • Liked:
Re: In other news ...
« Reply #29082 on: February 22, 2024, 06:25:25 PM »
I shouldn't admit to this, it's embarrassing,  but a couple of years ago I actually got caught by one of our IT department's fake phishing emails.  It was really, REALLY well done.  But even so, I should have caught it.  Honestly our corporate filtering is so good that REAL ones never make it to me.

They warned me and said if I missed another one I'd get reported to my manager and have to go through some extended compliance training. Ugh.  Suffice to say I've never missed another one.
I hear you. I *almost* got caught by one. Every other time I've spotted them just from the email and report, but I actually clicked the link on one because I wasn't thinking and didn't get the heebie-jeebies until then... Didn't put in my credentials though, so it doesn't count as a fail :57:

And nobody took away any of my access, so I guess they didn't think less of me lol...

utee94

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 17718
  • Liked:
Re: In other news ...
« Reply #29083 on: February 22, 2024, 06:29:16 PM »
I hear you. I *almost* got caught by one. Every other time I've spotted them just from the email and report, but I actually clicked the link on one because I wasn't thinking and didn't get the heebie-jeebies until then... Didn't put in my credentials though, so it doesn't count as a fail :57:

And nobody took away any of my access, so I guess they didn't think less of me lol...
They had me upon first click, didn't even get to a credentialing page, just a pop-up that said:


betarhoalphadelta

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 12224
  • Liked:
Re: In other news ...
« Reply #29084 on: February 22, 2024, 06:37:22 PM »
@847badgerfan This is one of the biggest issues... Hacking security is hard. Fooling people is easy. Phishing schemes are getting more and more advanced (including becoming "spearphishing" where they're individually-targeted based on known information about the target--possibly often scraped from LinkedIn). 

It's easier to compromise people and bypass security than it is to compromise security. 

betarhoalphadelta

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 12224
  • Liked:
Re: In other news ...
« Reply #29085 on: February 22, 2024, 06:38:35 PM »
They had me upon first click, didn't even get to a credentialing page, just a pop-up that said:


LOL... They went Candace and Vanessa on your ass?

utee94

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 17718
  • Liked:
Re: In other news ...
« Reply #29086 on: February 22, 2024, 06:59:30 PM »
LOL... They went Candace and Vanessa on your ass?
Well, it's possible I added that bit of color myself, for the sake of a good story.  I'm sure it was something much more sterile and corporate.

HOWEVER

New Phineas and Ferb season coming sometime in 2024.  I'm so excited!  We're gonna throw a themed/costume party for the debut, my daughter already has a Perry onesie, and I'm sure I can find a white lab coat somewhere.

betarhoalphadelta

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 12224
  • Liked:
Re: In other news ...
« Reply #29087 on: February 22, 2024, 07:27:07 PM »
Well, it's possible I added that bit of color myself, for the sake of a good story.  I'm sure it was something much more sterile and corporate.

HOWEVER

New Phineas and Ferb season coming sometime in 2024.  I'm so excited!  We're gonna throw a themed/costume party for the debut, my daughter already has a Perry onesie, and I'm sure I can find a white lab coat somewhere.
LOL... My oldest (16) has traded in Phineas and Ferb for physics videos on YouTube. My middle child (14) is all-in on Star Wars. And the youngest (11), well, all she cares about at this point is Taylor Swift. 

I did always enjoy Phineas and Ferb perhaps more than I should have at my age when the kids were still watching it, though...

utee94

  • Global Moderator
  • Hall of Fame
  • *****
  • Posts: 17718
  • Liked:
Re: In other news ...
« Reply #29088 on: February 22, 2024, 07:35:09 PM »
Oh yeah, my kids have all kinds of new interests now, but they're still excited about a new season.  My brother and his wife are the ones that turned us on to the series, and my niece and my kids watched it together all the time (along with my brother and his wife).  We always got together especially for the movies or hour-long episodes.

Anyway, it's all kind of tongue in cheek but when we heard they were bringing it back, we decided we'd throw a theme party, for nostalgia if nothing else.

MrNubbz

  • Hall of Fame
  • *****
  • Default Avatar
  • Posts: 17168
  • Liked:
Re: In other news ...
« Reply #29089 on: February 23, 2024, 06:12:46 AM »
The real security threats tend to creep up where you're not looking, or forget to look, like maybe there's a small bit player who is  a vendor to a city or maybe they contributed a piece of middleware a decade ago and it's so small that nobody thought to patch it over the years.
Something like this happened I believe it was around here like 10-15 yrs ago. With a local Target if I'm recalling correctly.And it involved a HVAC company who getting paid from them for contract work.Turns out that company's security had been compromised and the hacks got past their clients security and grabbed a bunch of credit card info and such
Suburbia:Where they tear out the trees & then name streets after them.

bayareabadger

  • Legend
  • ****
  • Default Avatar
  • Posts: 7868
  • Liked:
Re: In other news ...
« Reply #29090 on: February 23, 2024, 07:49:24 AM »
I hear you. I *almost* got caught by one. Every other time I've spotted them just from the email and report, but I actually clicked the link on one because I wasn't thinking and didn't get the heebie-jeebies until then... Didn't put in my credentials though, so it doesn't count as a fail :57:

And nobody took away any of my access, so I guess they didn't think less of me lol...
I solved this problem by barely reading my email.

Cincydawg

  • Oracle of Piedmont Park
  • Global Moderator
  • Hall of Fame
  • *****
  • Default Avatar
  • Posts: 71633
  • Oracle of Piedmont Park
  • Liked:
Re: In other news ...
« Reply #29091 on: February 23, 2024, 07:51:16 AM »
My cousin's husband was in the computer side of a large bank here back in the day.  I recall him chatting about how folks try and break their security ~20 years ago, broadly, it was interesting.  It was a nonstop effort by their department.

The blackmail attempt apparently just hit Fulton County, it's not known if the county paid ransom or not.

 

Support the Site!
Purchase of every item listed here DIRECTLY supports the site.