Fortscale Insider Blog

2016 year of ransomware

02 May 2016—The Year of Ransomware

Earlier last month, several police departments in Lincoln County Maine was attacked with Ransomware. That’s pretty bold since law enforcement generally does not pay ransom. They are the guys that are supposed to stop folks from having to pay extortion money. Ransomware has been around since 2005, but we’ve seen a significant escalation in recent years, starting in 2012 and continuing through...

Read More
Fort Friday Security Clips

29 Apr Fort Friday Security Clips— Hackers Paradise & Rule 41

This week in Hacker's paradise—Motherboard reports 7 Million Minecraft Community "Lifeboat" user accounts was hacked.  Though Lifeboat had been aware of the breach for quite some time, they did not feel it was important enough to alert their user base. Instead, they chose to quietly force a password reset. I have family members that are avid Lifeboat players, and I'm not...

Read More
security vendors new government program

28 Apr U.S. Government Now Engages with New Security Vendors in Days, not Years

I just returned from a fascinating couple of days in Silicon Valley at the IT Security Entrepreneur’s Forum. The event was packed with information about how security providers can better fill security needs, work together, and become more effective. But perhaps the most important thing I heard at the event was from Dr. Douglas Maughan of DHS when he explained a...

Read More
insider threat

27 Apr Insider Threats versus Insider Threat Intelligence

Earlier today, I was exposed to a great piece of technology.  In the interest of this not looking like an advertorial, let’s just call it the Acme Project (AP).  So many technologies are advancing today that advise they provide insider threat protection.  Regardless if you are creating policies or leveraging algorithms that look for anomalous behavior, you have some really...

Read More
insider threat security gates

26 Apr Insider Threat Security Gates—Wide Open

Lacking insider threat security? When an employee departs—will she or he have the ability to use prior credentials after termination? Recently, A U.S. federal court in Wisconsin ordered Indian IT provider: Tata Consultancies (TCS), to pay Epic Systems $940 million in damages. Why? Because an employee was using credentials from a previous contracting job to access Epic's Web portal, whereby this portal contained...

Read More
hacking team hacked

25 Apr Short-end security – How Hacking Team got Hacked

Recently, a hacker claiming responsibility for the July 2015 data breach of a firm called “Hacking Team”. Hacking Team is a European company based in Milan with subsidiary branches in Washington D.C. and Singapore. The company sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations. The company’s product monitors the communications of internet users, deciphers their...

Read More
insider threat is like a volcano

25 Apr The Honest Truth to Insider Threat Security

Nobody wants to think they have an insider threat problem. But in any group you have at least one person that's bound to drag you all down with them. Whether by accident, on purpose, through ignorance, or just bad luck—they will cause some sort of trouble that ends in bad things effecting you all. If you don't see that in your...

Read More
Fort Friday Security Clips

22 Apr Fort Friday Security Clips—Cheap switches & C-suite Whaling

Bank heist that stole SWIFT credentials Reuters reported yesterday Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers (connected to the SWIFT global payment network). Reuters said "after the hack had taken place," the bank was advised to upgrade the $10 switches. Needless to say, security basics should always...

Read More
Cybercrime groups dangerous

21 Apr Cybercrime Groups More Damaging than Hackers

When you think of a hacker, one typically imagines a brilliant but sordid loner that lacks sustained motivation and is totally void of the discipline necessary to hold down a structured job. Certainly there are cyber crooks that fit that description. But lately there’s been an organizational shift among many top cybercriminals. The cybercrime industry, if I can call it that,...

Read More
insider threats

20 Apr Insider Threats – Is it really as intentional as we think?

A couple of years ago I was at RSA and I was being interviewed about insider threats. So when we think about the term “insider threat” we tend to think of someone with a malicious agenda. But when we weigh the percentages of security incidents that result in a breach due to insider malicious activity versus an individual simply making...

Read More