How you got Hacked…..and why

In the past,  I’ve spent hours on the phone trying to show someone how to configure an email client.

Small business put up little fight hackers and snoopers.

Normally intelligent individuals suddenly become dummies when faced with anything “technical”.

Individuals are routinely breached because they are either

Too busy to care about basic hygiene (tech bits)

Have no password management skills

Have no trusted technical support partner

Do not monitor their set-up

…or most importantly, not bothered.

These same individuals take extreme cause with their daily online banking.

InfoSec skills – Computer Emergency Response Team (CERT)

As a Small Business or individual, If you were going to hire a Private IT Security Professional here’s what you should be looking for.

Trust me I’m a Professional – Until Dawn™

Loving this 2016 IT Security Job Description

Experience as part of an incident response team (either in-house or as a consultant).

An ability to provide technical analysis and direction for investigations.

An understanding of networking protocols and infrastructure designs; including, firewall functionality, routing, encryption, host and network intrusion detection systems, load balancing, and other network protocols.

An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security.

Willing to work out of hours and public holidays as part of a shift Rota and when on call as needed.

Inherent passion for information security and service excellence.

An ability to analyse and reverse engineer various file types including providing dynamic and static analysis of malware artefacts and binaries as well as other malicious attack files.

Be able to complete post-mortem analysis of network logs, traffic flows and other activities to identify malicious activity on a network.


No, No, No Way

Outside the InfoSec community and Paranoid conspiracy addicts, I seldom come across individuals who routinely check themselves to see how open they are to attacks.

Handy Hacker toolkits always include

Ransomware
Phishing Vulnerability
“New to YouTube" Vulnerability
Bot Infection
Browser Attack
Anonymizer Usage (hide yourself tools)
Data leakage 
(on purpose or by sheer end-user stupidity)

In the meantime, while everyone is debating the impact of leaving Europe, the Investigatory Powers Act 2016 is filtering down to individuals as it’s now a  tool for lawful interception of data.

So now you gotta look out for the bad guys, the marketing people AND Big Brother.

Solution: Encrypt EVERYTHING

Things just got Real…gonna go take my some Diphenhydramine so I can catch at least 6 hours deep sleep tonight.