Cyber Security

Computer Security Education & Awareness

Computer security education is an important element of providing a safe environment for digital assets.

CCC has provided a variety of education and awareness programs on differing aspects of computer security, these include:

  • advising on how to undertake internal investigations, the requirements for gathering evidence and the potential pitfalls that may be encountered.
  • educating employees on company policies and procedures.
  • ensuring employees understand the potential consequences of a breach, hence the reason for policies and procedures.

Get users to ‘buy into’ security…

I.T. Security Awareness

Talks and presentations should be aimed at raising staff and client awareness. We have found that a combination of question-and-answer sessions, combined with providing examples and giving demonstrations, has been the best approach.

Users with little or no technical abilities, who do not ‘buy into’ policies and procedures, looking to take shortcuts will increase the risk of compromise. Whereas those that understand the need to comply are likely to improve security. We have frequently found users circumventing or bypassing security measures simply because they were unaware of the implications or the measures were so restrictive that it prevented them from doing their work efficiently. Resulting in them looking for ways to get around those security measures.

We have also found it beneficial to break down the areas of education and awareness into the following groups.

  • Computer Security
  • Policies & Procedures
  • Malicious Programs
  • Wireless Exploitation
  • Password Security

One of the many gripes we have found employees to have are the password policies implemented by many companies, which are often poorly thought out. Resulting in users having difficulty remembering them because of their complexity or the frequency with which they are changed. It is quite possible that the reason for this is a lack of knowledge by the policymakers in relation to the real lifespan of a password, with decryption frequently cited as the main reason for policy.

Most policymakers have no experience of what is required to break a password. As a result, a ‘belt and braces’ approach is often taken, without fully understanding the impact on users or the increase in risk this may have. Forcing users to change their passwords every month can have a detrimental effect.

For example, a user may have a password that complies with policy, an example of which may be TheCanaries@01, with monthly changes resulting the password incrementally changing to TheCanaries@02, TheCanaries@03 etc.

Experience has shown that as time passes, users tend to forget the number they have reached, leading to frustration with passwords being written down. In reality,  good quality passwords can take years to decrypt even with the fastest and most sophisticated of attacks. Where, depending on circumstances, a more rational approach may be possible once company specific factors have been taken into consideration. Extending the life of a good quality password that meets company requirements has often been found to have a positive effect on users with no additional risk to the organisation.

Finally, senior management also needs to be seen to be complying with policy.

For more information email contact@ccc-ltd.com

Cyber Security - Assessment

Computer Security, I.T. Security or Cyber Security relates to the physical and nonphysical protection of electronic systems. Where tangible assets such as the hardware need to be protected from theft or damage. As well as intangible assets such as the software and data, which also need protection, to ensure the functionality of systems and the confidentiality, accuracy and availability of data. Such protection should also extend to preventing the misuse of or disruption to service.

The definition of a good hack – Nobody knows it happened…

Our lives are becoming more entwined with the digital era, to such a degree, that any significant failures in availability or loss of data can become headline news within minutes. Such is our reliance on this technology, whether banking, buying online, social media or just accessing e-mail. As a result, it is not inconceivable that in the relatively near future, we may well live in a ‘cashless’ society, giving cyber security an even greater role to play in our daily lives.

CCC can provide a comprehensive range of cyber security services, covering analysis, investigation, review and recommendation, for systems and networks alike.

Cyberspace

“Cyberspace” is a term used to describe networks and the devices attached to them which store, process and communicate information that cyber security protects.

Buzzwords for a buzzlight year!

With businesses moving on-line to keep pace with the modern day demands means that the data they need to access and manipulate these services also needs to be stored in cyberspace. With the data often becoming the target of attackers, whether to ransom or utilise in some other way. The data has value.

In today’s world, cyber security affects us all, with critical national infrastructures (CNIs), corporate networks and individual users having to rely on the availability, confidentiality and integrity of the data.

From experience, CCC knows that malicious activities aimed at human and physical aspects of our world often lead to applied security measures getting by-passed.

Some long-standing examples include:

  • Tricking individuals to open documents or links that lead to malicious code being executed.
  • Gaining employment with a company which provides physical access to systems.
  • Searching corporate waste for information that will ultimately help in gaining access to target data or systems.

‘dustbin diving’  – it still happens.

When assessing the cyber security status of an environment, the physical, personnel and digital elements all need to be evaluated as one. Assessing elements on their own is likely to lead to weaknesses that can and will be exploited by attackers.

For more information regarding this service, please email contact@ccc-ltd.com

Wireless (Wi-Fi) Security

Background

In the continuing evolution of IT technology, the vast majority of today’s devices now have built-in wireless capabilities. As a result, wireless technologies can now be found in most homes, as well as being adopted by most organisations, due to its cost effectiveness, ease of use and deployment capabilities. Making it a viable solution for corporate networks large and small, wishing to ensure cost effective connectivity with any satellite elements of their businesses.

The definition of ‘handshake’; a form of friendly greeting or a way of capturing Wi-Fi passwords!

Unfortunately, this deployment has led to a significant increase in the number of targeted attacks on systems where poor configuration or a quality assurance on updates has led to attackers identifying vulnerabilities that have allowed access to networks. Individuals at home, who may be executives associated with target corporations, need to know that wireless access points, both at home and at work, are frequently seen as a means by which attackers can gain access systems with little risk to themselves. Furthermore, by subverting either, there is a high probability that the attacker will be able to gain access to other internal elements of a target network. It should also be noted that any decent hacker who has gained access to a network using the wireless network as a point of entry will have passively monitored the network, looking to garner sufficient information about the identify authorised users and their devices so as to emulate them during an attack. Making it harder for security systems to detect their presence.

It is important to verify that wireless security measures commensurate with the environment are not only in place but also current, applied correctly and relevant.

Testing

CCC, wireless testing is undertaken by experts using a combination of in-house tools and techniques together with industry standard equipment.

Never heard of Zero-day warez? You need to?

For more information regarding this service, please email contact@ccc-ltd.com

Scroll to Top