GISEC 2021 Update: Experts discuss hacker threats to working from home

Share
3 min read
Share

 

  • Disabling of firewalls, reuse of passwords, installation of over-simple passwords biggest mistakes when working from home

  • Companies need to set up a negotiating team to deal with hostage-takers, says expert

The new work-from-home culture has made life easy for hackers, thanks to common mistakes everybody from big corporations to individuals make while using the Internet.

This was stated by IT security experts at the ongoing Gulf Information Security Expo & Conference (GISEC) 2021, the Middle East and Africa’s most influential and connected cybersecurity event, Emirates News Agency (WAM) reported. The event will run at the Dubai World Trade Centre (DWTC) until June 2.

Paula Januszkiewicz, CEO of CQURE, the cybersecurity firm that works in partnership with Microsoft, delivered a keynote address on day two titled ‘Hacker’s Paradise – Top 10 Biggest Threats When Working from Home’, in which she discussed how the shift to remote working has played into the hands of hackers, WAM reported.

The IT security expert highlighted the disabling of firewalls and reuse of passwords, or installation of over-simple passwords, as the biggest mistakes made when working from home, with systems becoming easy targets for cybercriminals.

Januszkiewicz pinpointed how a lack of server message block signing, trusting solutions without having the knowledge to break them, misusing service or privileged accounts and falling for “hipster tools”, means hackers can make quick money in the remote working era.

“Firewalls are often misconfigured, there’s no need-to-know process or protection,” she said. “Passwords are almost always re-used, or easy to guess; they invariably include the company name and a number,” she added while giving a live demonstration of how easy hackers can pose as a colleague to access a system and company network.

“Phishing is the main means of transportation of malware, ransomware. It is fast and it is easy. The average income of someone who runs a malware or ransomware scheme is about $90,000. It’s good money.”

While education and awareness are key, Januszkiewicz added hackers have become a “little lazy” in the pursuit of quick money and with the right approach it is possible to limit their impact.

Matthias Schranner, a former FBI hostage negotiator and now CEO of the Schranner Negotiation Institute set out five key steps for organizations to negotiate with cybercriminals at the GISEC Main Stage.

He said he had been in a lot of difficult hostage negotiations, worked for six years dealing with various criminal organizations and been part of some high-value illegal transactions.

“One of the main things you come across with hostage-takers is high demand, no cooperation. ‘If I don’t get my getaway car, I will kill the hostage’, ‘if I don’t get the money, I will not restore your system,’ ” he said.

“Do not waste time trying to solve the problem yourself. Companies underestimate the danger and believe that their IT teams will be able to solve the problem. Every hour that passes while they try to figure out a solution will cost the business money,” he added.

Companies should consider setting up a negotiating team and establishing proof of life, according to Schranner. The team should comprise an internal commander and an external expert who is not emotionally invested in the company.

“If the chief negotiator is emotionally involved, he or she will make mistakes; any thoughts about injustice and morality need to be set aside,” he said.

He said ransom is mostly paid in cryptocurrencies such as bitcoin and a business first needs to be able to pay if it wants to pay the ransom.

“But it is not possible to buy huge amounts of bitcoin instantly, it can take two or three days. We recommend companies have a contingency fund for this. The negotiator will agree to the payment details,”

 

SPEEDREAD


MORE FROM THE POST