From Dale Penn, Advent IM Security Consultant..
So what did they do wrong that we can learn from and reduce the risk to our organisations?
Both Bit defender and Hacking team did not protect their passwords properly. Bit defender did not encrypt their customer usernames and passwords which is very worrying! and Hacking team used weak passwords such as “P4ssword” and “HTPassw0rd” on their servers which is unforgivable for a cyber-security firm.
DetoxRansome (the Attackers) claimed that they got control of 2 Bit defender cloud servers as they were using Amazon Elastic Web Cloud which is notorious for SSL problems.
Organisations are overinvesting in expensive technical solutions and not focusing on a holistic layered approach that cover people, policies and procedures. This in my opinion is as, if not more important, then finding the correct technical solution.
Policies and procedures are vital for the correct implementation of Information security as this is managements chance to formalise their SME’s approach and ensure it is aligned with current business strategy.
Not only do they provide direction and accountability, many specific policy elements are a requirement of specific laws, regulations, and/or standards.
- Posted by Ellie Hurst
- On 5th August 2015
- 0 Comments