<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aykira Internet Solutions</title>
	<atom:link href="https://www.aykira.com.au/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aykira.com.au</link>
	<description>Cyber Security Consultants Sydney</description>
	<lastBuildDate>Tue, 26 Nov 2024 01:26:16 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.aykira.com.au/wp-content/uploads/2014/02/cropped-favicon-16x16-32x32.png</url>
	<title>Aykira Internet Solutions</title>
	<link>https://www.aykira.com.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Open Source AuthN, AuthZ &#038; VPN</title>
		<link>https://www.aykira.com.au/2024/11/open-source-authn-authz-vpn/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 22:59:47 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[software architecture]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[authn]]></category>
		<category><![CDATA[authz]]></category>
		<category><![CDATA[sso]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3864</guid>

					<description><![CDATA[Given the historical hacking of major cloud based Authentication and Authorisation providers, like Okta and Auth0 , I think CISO&#8217;s and CTO&#8217;s need to seriously reconsider the risks they are exposing themselves to by utilising such services, and how them remaining a focus of hackers is almost certain as they keep adding on features and <a href="https://www.aykira.com.au/2024/11/open-source-authn-authz-vpn/" rel="nofollow"><span class="sr-only">Read more about Open Source AuthN, AuthZ &#038; VPN</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>Given the historical hacking of major cloud based Authentication and Authorisation providers, like <a href="https://www.darkreading.com/application-security/otka-breach-widens-entire-customer-base" data-type="link" data-id="https://www.darkreading.com/application-security/otka-breach-widens-entire-customer-base">Okta </a>and <a href="https://medium.com/@iamkushimo/how-auth0-an-authenticator-service-provider-was-hacked-and-what-it-means-for-the-future-of-648f05a483d1" data-type="link" data-id="https://medium.com/@iamkushimo/how-auth0-an-authenticator-service-provider-was-hacked-and-what-it-means-for-the-future-of-648f05a483d1">Auth0 </a>, I think CISO&#8217;s and CTO&#8217;s need to seriously reconsider the risks they are exposing themselves to by utilising such services, and how them remaining a focus of hackers is almost certain as they keep adding on features and services that keep increasing their respective security surfaces. Add to that the ongoing tendency for all businesses to grow in their own internal usage of 3rd party SaaS services (which any CISO will fully understand, a new essential &#8220;must have&#8221; service seems to crop up once a week) and you will see I&#8217;m not exaggerating in my analysis. If you don&#8217;t believe me I defy you to find a major commercial cloud Auth provider who hasn&#8217;t suffered some form of harmful breach in the last 2 years&#8230;</p>



<p>Now I know the cloud based Auth providers will say they can be trusted to be secure, but there is no getting away from the fact that you are trusting a third party who operates in the cloud with a core security function, namely authenticating people (and systems) with access to your internal services. Plus you can be using the same provider to also authenticate your own SaaS services as well. I think at the very least you need to seriously consider the risk you are placing yourself in by using one sole supplier for all your authentication needs, at the very least second sourcing arrangements need to be in place and you need to keep public and corporate focussed authentication systems separate and isolated from each other.</p>



<p>Now if you add to that the ongoing cost base, which is usually around $70 USD per month per 1000 active users and it doesn&#8217;t take long for the cost to get into 4 or 5 figures.  If you require more advanced features (such as multifactor authentication, fine grain roles, etc) then you can be looking at North of $400 USD per month per 1000 active users and costs escalate even quicker. At that point you should be seriously considering the cost/benefit ratio in this whilst also also factoring in the following:</p>



<ul class="wp-block-list">
<li><strong>Data privacy controls</strong> &#8211; where exactly does your data sit? What its lifecycle? What government regulations apply to it?</li>



<li><strong>System resilience</strong> &#8211; What is their uptime? What happens if they go down? What is the plan B?</li>



<li><strong>Supplier Dependency and second sourcing</strong> &#8211; How easy is it to change provider? Have you integrated with them in a way which allows that?</li>



<li><strong>Internal Competencies</strong> &#8211; Should your organisation have stronger in house security skills? What other risks could you manage in house?</li>
</ul>



<p>The 4th point above is perhaps the most significant, if you keep offloading critical elements of your security infrastructure to a 3rd party, you are denying yourself the ability to build internal competencies, and not just with security but with general technical development abilities as well &#8211; which could deny you competitive advantages going forwards (i.e. no ability to usefully differentiate or innovate). In effect you don&#8217;t know what you don&#8217;t know and this can be a very expensive form of ignorance.   Now add into this that Open Source is actually quite mature in this space, its no longer a question of having to hand code such services, they often come pre-packaged with extensive support and documentation.</p>



<p>You will note I have also added in VPN&#8217;s &#8211; again there are lots of commercial solutions available, which again use the per seat per month charging model. To me the security of your VPN solution is just as critical as your AuthN and AuthZ solutions, a failure here would provide unfettered access into your corporate systems. </p>



<h2 class="wp-block-heading">Open Source Solutions</h2>



<p>To prove the point I will list a few open source authentication libraries/systems that can do the job for you.</p>



<h3 class="wp-block-heading">1) Keycloak &#8211; full framework</h3>



<p><a href="https://www.keycloak.org/" data-type="link" data-id="https://www.keycloak.org/" target="_blank" rel="noreferrer noopener">Keycloak </a>is free to use and allows you to provide a Single-Sign On solution to allow authentication to multiple applications from one space. You can choose between various Identity Providers for Keycloak to access to determine ID, such as: OpenID Connect, SAML 2.0 compliant Identity providers, Kerberos or even social networks (Google, GitHub &amp; Facebook). You can even use your corporate Active Directory, LDAP or a DB.</p>



<p>Keycloak comes with extensive account management, including allowing users to set up two-factor authentication. Admins can control all features and set up fine grain policies. </p>



<p>Installation can either be direct on a server or it can be run from a container, it runs in the OpenJDK environment. This could hosted be on your local network or in your cloud environment as a completely stand-alone self-managed solution.</p>



<p>Keycloak is ideal for wrapping a Single-Sign On solution around existing apps and services that have the right hooks to allow you do so. </p>



<h3 class="wp-block-heading">2) ZITADEL &#8211; full framework</h3>



<p><a href="https://github.com/zitadel/zitadel" target="_blank" rel="noreferrer noopener">Zitadel </a>is an open-source authentication framework that supports out of the box multi-tenancy, so allowing you to use this for a SaaS application that would support multiple customers each with a set of logins they need to manage and integrate into their Single-Sign On framework. It supports OpenID Connect, OAtuh2.x, SAML2 LDAP, Passkeys/FIDO2 and OTP. Also includes JWT Profiles, Personal Access Tokens (PAT) and Client credentials for machine to machine auth. It also has an API to allow custom integrations and event propagation.</p>



<p>Can be installed to run natively on Linux, MacOS, and within containers under Docker, Knative and Kubernetes. You can also their ZITADEL cloud solution for a fee.</p>



<h3 class="wp-block-heading">3) Hanko.io &#8211; app framework</h3>



<p><a href="https://www.hanko.io/" data-type="link" data-id="https://www.hanko.io/" target="_blank" rel="noreferrer noopener">Hanko </a>is an open-source authentication framework that employs passkey-based authentication. It consists of a set of API&#8217;s and UI components that allow you to quickly build Authentication into your applications. Authentication is supported using: passkeys, passcodes, mobile biometrics, FIDO security keys, OAuth SSO and passwords.</p>



<p>You can choose to either self-host or use their Hanko Cloud offering for a fee&#8230;</p>



<h3 class="wp-block-heading">4) SuperTokens &#8211; app framework</h3>



<p><a href="https://github.com/supertokens/supertokens-core" data-type="link" data-id="https://github.com/supertokens/supertokens-core" target="_blank" rel="noreferrer noopener">SuperTokens </a>allows you to add secure login and session management to your apps. SDK&#8217;s are available in many languages and front-end frameworks; it consists of three main parts: the Frontend SDK, the Backend SDK and the SuperTokens Core, allowing flexible integrations with minimal coding.</p>



<p>SuperTokens support authentication via: Passwordless, Social, Email Password and Phone Password. Multi-Factor authentication is also supported as well as Multi Tenancy and Organizational support.</p>



<p>SuperTokens is Java based and is available as a prebuilt binary or docker image for deployment.</p>



<h3 class="wp-block-heading">5) Pritunl &#8211; OpenVPN gateway</h3>



<p><a href="https://pritunl.com/" data-type="link" data-id="https://pritunl.com/" target="_blank" rel="noreferrer noopener">Pritunl </a>is an open-source VPN gateway with lots of useful features. Its security features include TPM and Apple Secure Enclave device authentication, dynamic firewall, SELinux policies and a dual web server design.  It will work with multiple cloud providers to deliver VPC Peering.</p>



<p>You can also set up Two-Step Authentication using either Yuico PubiKey, a Duo Hardware Token, push notification to a mobile phone via an app and the Google Authenticator app.</p>



<p>Installation is via packages that available for most Unix platforms. VPN clients are available for all major OS&#8217;s.</p>



<p>Pritunl also supply <a href="https://zero.pritunl.com/" data-type="link" data-id="https://zero.pritunl.com/" target="_blank" rel="noreferrer noopener">Pritunl Zero</a>, an open source BeyondCorp server that provides zero trust security for privileged access to ssh and web applications via user public keys. Roles can then be assigned to users using either Auth0, Azure, Google, Okta, or OneLogin Sign-On. Again secondary authentication can be performed via Doe, OneLogin Push or Okta Push.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>So please, stop putting all your auth eggs in someone else&#8217;s basket, take back control of your authN and authZ. It will likely reduce costs and reduce your security surface at the same time. This also improves your inhouse technical security skills.</p>



<p>Also, did you know that if you are on Microsoft Azure or Microsoft 365 cloud subscriptions, Entra ID Free is included which provides: MFA, SSO and self-service password change. <strong>Yes for free</strong>, in fact Microsoft goes out of their way to provide wizards and documentation to make it as easy as possible to get SSO going. For a small to medium sized business this is a true gift.</p>



<p>BTW if you are on Google Workspace, you can also set up <a href="https://support.google.com/a/answer/60224?hl=en" data-type="link" data-id="https://support.google.com/a/answer/60224?hl=en&amp;ref_topic=7579248&amp;sjid=14762491153927400573-AP" target="_blank" rel="noreferrer noopener nofollow">SSO</a>.</p>



<h2 class="wp-block-heading">Addendum</h2>



<p>We should also not forget that there is a number of SaaS products that charge significantly more for just turning on SSO integration support, just have a look at the <a href="https://sso.tax/" data-type="link" data-id="https://sso.tax/" target="_blank" rel="noreferrer noopener nofollow">SSO Tax website</a>. For just having SSO turned on you get charged anywhere from 1.5 to 10 times as much as the non SSO rate. Remember, once SSO is implemented in the product code base, there is literally near zero cost to make it available to all customers, its not as if a whole new distinct code base is required to support SSO &#8211; if an application can support HTTPS without charging more it can support SSO as standard for no extra cost. I suggest you demand SSO is included as standard and vote with your feet.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fopen-source-authn-authz-vpn%2F&amp;linkname=Open%20Source%20AuthN%2C%20AuthZ%20%26%20VPN" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fopen-source-authn-authz-vpn%2F&amp;linkname=Open%20Source%20AuthN%2C%20AuthZ%20%26%20VPN" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fopen-source-authn-authz-vpn%2F&amp;linkname=Open%20Source%20AuthN%2C%20AuthZ%20%26%20VPN" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fopen-source-authn-authz-vpn%2F&amp;linkname=Open%20Source%20AuthN%2C%20AuthZ%20%26%20VPN" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fopen-source-authn-authz-vpn%2F&#038;title=Open%20Source%20AuthN%2C%20AuthZ%20%26%20VPN" data-a2a-url="https://www.aykira.com.au/2024/11/open-source-authn-authz-vpn/" data-a2a-title="Open Source AuthN, AuthZ &amp; VPN"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Risks of Using AI in Cybersecurity</title>
		<link>https://www.aykira.com.au/2024/11/the-risks-of-using-ai-in-cybersecurity/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Fri, 15 Nov 2024 00:07:25 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=4027</guid>

					<description><![CDATA[Artificial intelligence (AI) has reshaped many aspects of business and cybersecurity, promising unparalleled capabilities in threat detection, incident response, and overall risk management. Yet as AI continues to gain ground, understanding its limitations and risks becomes critical. This article explores the potential pitfalls of using AI in cybersecurity, covering risks such as over-reliance, ethical concerns, <a href="https://www.aykira.com.au/2024/11/the-risks-of-using-ai-in-cybersecurity/" rel="nofollow"><span class="sr-only">Read more about The Risks of Using AI in Cybersecurity</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>Artificial intelligence (AI) has reshaped many aspects of business and cybersecurity, promising unparalleled capabilities in threat detection, incident response, and overall risk management. Yet as AI continues to gain ground, understanding its limitations and risks becomes critical. This article explores the potential pitfalls of using AI in cybersecurity, covering risks such as over-reliance, ethical concerns, adversarial attacks, data privacy issues, and the challenge of maintaining compliance and transparency. With a balanced approach, managers can make informed decisions about the integration of AI into their cybersecurity operations.</p>



<h3 class="wp-block-heading">1. Over-reliance on AI: A Risky Dependency</h3>



<p>AI is revolutionizing cybersecurity operations. Machine learning (ML) algorithms can process large volumes of data rapidly, helping identify anomalies and patterns that human analysts might miss. However, the convenience of AI also comes with the risk of over-reliance.</p>



<p>When organizations rely too heavily on AI-based systems, they may deprioritize the role of human analysts in assessing and responding to threats. AI tools are not infallible, they are based on data patterns and can struggle to keep up with novel attack techniques or recognize subtle shifts in threat tactics. If left unchecked, over-reliance can result in:</p>



<ul class="wp-block-list">
<li><strong>Lack of manual oversight:</strong> A cyberattack could exploit a system’s AI-based vulnerabilities, and without the intervention of human analysts, the response could be delayed or mismanaged.</li>



<li><strong>Reduced accountability:</strong> When relying too heavily on automation, there may be confusion over responsibility, especially when an AI-driven system fails to detect or mitigate a significant threat.</li>



<li><strong>Lowered situational awareness:</strong> Security teams might depend too much on automated insights and alerts, potentially missing critical warning signs that fall outside the scope of AI-driven detection systems.</li>
</ul>



<h3 class="wp-block-heading">2. The “Black Box” Problem: Lack of Transparency</h3>



<p>Many AI algorithms, especially deep learning models, are often referred to as &#8220;black boxes&#8221; due to their complex and opaque decision-making processes, this lack of transparency presents significant concerns. If the AI makes an error or is attacked, understanding why it failed is challenging. Such black-box AI raises several critical issues:</p>



<ul class="wp-block-list">
<li><strong>Trust in decision-making:</strong> Without transparency, it can be difficult to trust the system’s decisions, especially when they deviate from human judgment.</li>



<li><strong>Difficulty in auditing:</strong> In cybersecurity, the ability to review and audit system decisions is critical for compliance and incident response. Black-box AI makes it challenging to trace decisions back to their origin and therefore understand the factors contributing to an incorrect output.</li>



<li><strong>Regulatory scrutiny:</strong> With regulatory bodies increasingly focusing on AI transparency, especially in industries like finance and healthcare, the black-box problem could expose organizations to compliance risks.</li>
</ul>



<h3 class="wp-block-heading">3. Vulnerabilities to Adversarial Attacks</h3>



<p>Adversarial attacks are a unique and sophisticated risk associated with AI in cybersecurity. Attackers can subtly alter input data in ways that trick the AI model into making incorrect predictions or classifications. For instance, by adding noise to an image or modifying a network packet, an attacker might deceive an AI system into misidentifying malicious activity as benign or vice versa.</p>



<p>The consequences of adversarial attacks can be severe:</p>



<ul class="wp-block-list">
<li><strong>Bypassing security controls:</strong> If attackers succeed in “fooling” the AI, they could bypass security controls undetected.</li>



<li><strong>Increasing the attack surface:</strong> Adversarial attacks can undermine confidence in AI systems and create new attack vectors that traditional security measures may not cover.</li>



<li><strong>Challenging detection and response:</strong> These attacks can be hard to identify and counteract, as they often target the nuances of the AI model itself, exploiting its inherent vulnerabilities.</li>
</ul>



<h3 class="wp-block-heading">4. Ethical and Privacy Concerns</h3>



<p>AI-driven cybersecurity often involves collecting, analysing, and interpreting large amounts of user data to identify patterns and anomalies. This data-driven approach, while effective, can raise ethical and privacy concerns that could harm an organization’s reputation and stakeholder trust.</p>



<ul class="wp-block-list">
<li><strong>Data collection risks:</strong> AI systems rely on vast datasets, often including sensitive personal or business information. If not managed properly, this data can be misused or inadequately protected.</li>



<li><strong>Privacy erosion:</strong> There is a fine line between identifying threats and infringing on privacy. For example, an AI system analyzing user behaviors could inadvertently infringe on employees&#8217; personal privacy, leading to concerns about workplace surveillance.</li>



<li><strong>Bias and discrimination:</strong> AI models can inherit biases present in the data used to train them. Biased decision-making in security systems can result in discriminatory outcomes, such as unfair targeting of certain user groups or businesses, which could lead to reputational damage and legal repercussions.</li>
</ul>



<h3 class="wp-block-heading">5. Data Quality and Integrity Risks</h3>



<p>AI models are only as effective as the data on which they are trained. In cybersecurity, ensuring that data is accurate, up-to-date, and representative of actual threat landscapes is essential. Poor data quality and compromised integrity can impact AI performance, leading to:</p>



<ul class="wp-block-list">
<li><strong>False positives and negatives:</strong> Inaccurate data can cause an AI system to flag benign activity as malicious (false positives) or miss actual threats (false negatives), undermining trust in the system.</li>



<li><strong>Degradation over time:</strong> Cybersecurity threats evolve quickly, and AI models need continual training to keep pace. A model trained on outdated data may fail to recognize new attack patterns, rendering it ineffective.</li>



<li><strong>Increased operational costs:</strong> Poor data quality and false alarms strain resources, requiring additional time and effort to investigate and resolve alerts, ultimately impacting productivity and increasing costs.</li>
</ul>



<h3 class="wp-block-heading">6. Model Drift: AI&#8217;s Short-Term Memory Problem</h3>



<p>Model drift occurs when an AI model gradually becomes less effective due to shifts in the underlying data patterns. In cybersecurity, this is particularly relevant, as threat actors constantly develop new techniques to circumvent security measures. Over time, the effectiveness of an AI system will degrade unless it&#8217;s retrained with fresh data.</p>



<p>Model drift introduces several risks:</p>



<ul class="wp-block-list">
<li><strong>Declining accuracy:</strong> Without retraining, an AI system may become inaccurate, resulting in missed detections or increased false positives.</li>



<li><strong>Ongoing maintenance:</strong> Retaining a robust AI model requires significant resources, as models must be regularly updated to keep pace with evolving threats.</li>



<li><strong>Potential blind spots:</strong> Outdated models can create blind spots where emerging threats are no longer recognized, leading to potential security vulnerabilities.</li>
</ul>



<h3 class="wp-block-heading">7. Resource Intensity and Cost</h3>



<p>Deploying AI in cybersecurity is resource-intensive, requiring specialized skills, substantial processing power, and ongoing model management. This can pose significant financial and operational challenges:</p>



<ul class="wp-block-list">
<li><strong>High cost of implementation and maintenance:</strong> Building and maintaining AI models is costly, both in terms of financial resources and human expertise.</li>



<li><strong>Skilled personnel:</strong> AI-driven cybersecurity requires a team with expertise in both machine learning and cybersecurity, which can be challenging to recruit and retain.</li>



<li><strong>Processing and storage demands:</strong> AI models often require significant computational power and data storage, increasing infrastructure costs and the organization&#8217;s environmental footprint.</li>
</ul>



<h3 class="wp-block-heading">8. Compliance and Regulatory Risks</h3>



<p>Many industries are subject to stringent regulatory requirements around data usage, privacy, and cybersecurity. AI systems, with their propensity to gather and analyze large amounts of data, can inadvertently lead to compliance issues if not carefully managed.</p>



<ul class="wp-block-list">
<li><strong>Data privacy regulations:</strong> Laws such as GDPR, CCPA, and others impose strict guidelines on data usage, storage, and processing. Failure to ensure that AI models operate within these guidelines could result in costly fines and reputational damage.</li>



<li><strong>AI transparency requirements:</strong> Some regulations require that AI-driven decisions be explainable and transparent, especially when they involve customer or employee data. Organizations that rely on opaque AI systems risk falling afoul of these requirements.</li>



<li><strong>Audit and oversight challenges:</strong> Regulators may require organizations to provide evidence of AI decision-making and risk mitigation strategies, demanding a level of visibility that black-box AI systems may not support.</li>
</ul>



<h3 class="wp-block-heading">9. Risks of Scaling AI Across Security Operations</h3>



<p>Many businesses attempt to scale AI-driven cybersecurity solutions across various departments and regions to maximize their value. However, this can lead to unintended risks, especially if the scaling process isn’t carefully managed.</p>



<ul class="wp-block-list">
<li><strong>Operational complexities:</strong> Scaling AI requires careful alignment across systems and departments, often creating integration challenges.</li>



<li><strong>Loss of centralized control:</strong> As AI tools proliferate within an organization, maintaining control over their deployment, performance, and updates becomes increasingly difficult.</li>



<li><strong>Increased attack surface:</strong> When AI systems are deployed broadly, the potential for adversarial exploitation grows, as threat actors can exploit vulnerabilities across various instances.</li>
</ul>



<h3 class="wp-block-heading">10. Erosion of Human Expertise and Decision-Making</h3>



<p>AI in cybersecurity can, paradoxically, diminish human skills over time. As organizations become more dependent on automated solutions, they may gradually deprioritize traditional cybersecurity expertise. This erosion of human decision-making capabilities has long-term implications:</p>



<ul class="wp-block-list">
<li><strong>Loss of critical thinking:</strong> Without regular practice, analysts and security experts may become less skilled in recognizing and responding to complex threats.</li>



<li><strong>Over-dependence on AI-driven decisions:</strong> If AI systems consistently make security decisions, human operators may become less capable of handling situations where AI fails.</li>



<li><strong>Knowledge gaps:</strong> As technology advances, human skills may fail to keep up, creating a knowledge gap that is difficult to address without intentional training and skill development.</li>
</ul>



<h3 class="wp-block-heading">Conclusion: A Balanced Approach to AI in Cybersecurity</h3>



<p>AI undoubtedly offers significant benefits to cybersecurity, but these advantages come with risks that should not be overlooked. Management must take a balanced, informed approach when implementing AI, ensuring that human expertise remains integral to cybersecurity operations. By recognizing the limitations of AI and establishing a robust framework for oversight, transparency, and accountability, organizations can enjoy the benefits of AI while managing its associated risks.</p>



<p>Key strategies include:</p>



<ol class="wp-block-list">
<li><strong>Encouraging a human-AI partnership</strong>: Emphasize collaboration between AI systems and human analysts rather than replacing human judgment entirely.</li>



<li><strong>Establishing rigorous oversight</strong>: Regularly audit and monitor AI-driven decisions, particularly in high-stakes cybersecurity contexts.</li>



<li><strong>Ensuring continuous model training and updates</strong>: Implement frequent retraining to keep models current and effective.</li>



<li><strong>Prioritizing transparency and ethical considerations</strong>: Choose AI models that support interpretability, and address data privacy and ethical concerns proactively.</li>
</ol>



<p>AI can be a powerful ally in cybersecurity, but only if implemented thoughtfully. Management plays a crucial role in guiding AI adoption to enhance security while safeguarding against its inherent risks. With the right approach, organizations can harness AI’s potential and achieve a resilient, forward-looking cybersecurity posture.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fthe-risks-of-using-ai-in-cybersecurity%2F&amp;linkname=The%20Risks%20of%20Using%20AI%20in%20Cybersecurity" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fthe-risks-of-using-ai-in-cybersecurity%2F&amp;linkname=The%20Risks%20of%20Using%20AI%20in%20Cybersecurity" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fthe-risks-of-using-ai-in-cybersecurity%2F&amp;linkname=The%20Risks%20of%20Using%20AI%20in%20Cybersecurity" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fthe-risks-of-using-ai-in-cybersecurity%2F&amp;linkname=The%20Risks%20of%20Using%20AI%20in%20Cybersecurity" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F11%2Fthe-risks-of-using-ai-in-cybersecurity%2F&#038;title=The%20Risks%20of%20Using%20AI%20in%20Cybersecurity" data-a2a-url="https://www.aykira.com.au/2024/11/the-risks-of-using-ai-in-cybersecurity/" data-a2a-title="The Risks of Using AI in Cybersecurity"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Trust, the Hidden Pitfalls: Challenges and Failure Points in Implementation</title>
		<link>https://www.aykira.com.au/2024/10/zero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 10:11:07 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=4019</guid>

					<description><![CDATA[Zero Trust security model adaption has accelerated over the past decade, driven by increasing cyber threats, digital transformation, and the need to secure remote workforces. Unlike traditional perimeter-based security, Zero Trust operates on the principle of &#8220;never trust, always verify,&#8221; ensuring that all access to resources—whether internal or external—is continually validated. While the theoretical benefits <a href="https://www.aykira.com.au/2024/10/zero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation/" rel="nofollow"><span class="sr-only">Read more about Zero Trust, the Hidden Pitfalls: Challenges and Failure Points in Implementation</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>Zero Trust security model adaption has accelerated over the past decade, driven by increasing cyber threats, digital transformation, and the need to secure remote workforces. Unlike traditional perimeter-based security, Zero Trust operates on the principle of &#8220;never trust, always verify,&#8221; ensuring that all access to resources—whether internal or external—is continually validated.</p>



<p>While the theoretical benefits of Zero Trust are clear, the practical realities of its implementation can be challenging. Zero Trust is not a single technology or a quick-fix solution but a strategic framework that touches every part of an organization&#8217;s infrastructure, identity management, and security policies. In practice, organizations face numerous difficulties that, if not carefully addressed, can lead to partial, ineffective, or failed implementations.</p>



<p>In this blog post, we’ll explore some of the key areas where Zero Trust implementations face challenges or can completely fail. Understanding these pitfalls are essential for organizations looking to maximize the effectiveness of their Zero Trust strategy and avoid costly mistakes.</p>



<h3 class="wp-block-heading">1. <strong>Absence of a Well-Defined Strategy</strong></h3>



<p>One of the most significant pitfalls in Zero Trust implementation is starting without a well-defined, comprehensive strategy. The Zero Trust framework is complex, requiring a coordinated approach across multiple domains such as identity, access management, network architecture, data security, and monitoring. Jumping into Zero Trust without a clear roadmap can lead to fragmented efforts, where isolated tools and processes are put in place without holistic integration.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Unclear Objectives:</strong> Without defining the specific goals and expected outcomes, organizations risk implementing Zero Trust haphazardly. This can lead to overengineering certain aspects while neglecting critical areas, making the security model ineffective.</li>



<li><strong>Lack of Leadership Buy-In:</strong> Zero Trust requires collaboration across IT, security, business units, and executive leadership. If the initiative doesn’t have clear support and understanding from leadership, it can result in insufficient resource allocation or resistance to process changes.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Start with a well-articulated Zero Trust strategy that aligns with the organization’s broader security and business objectives. Develop a phased roadmap that outlines the steps toward full Zero Trust adoption. Ensure leadership support by demonstrating the security and operational benefits, as well as the return on investment (ROI) that a Zero Trust model can provide.</p>



<h3 class="wp-block-heading">2. <strong>Inadequate Identity and Access Management (IAM)</strong></h3>



<p>Identity management is the backbone of any Zero Trust model. One of the core principles of Zero Trust is to verify the identity of users, devices, and applications continuously before allowing access to sensitive resources. Weaknesses in IAM implementation can severely undermine the entire security framework.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Weak Authentication Methods:</strong> Many organizations still rely on single-factor authentication (SFA) methods like passwords. Without strong multi-factor authentication (MFA) in place, attackers can easily exploit compromised credentials to gain unauthorized access.</li>



<li><strong>Inconsistent Identity Policies Across Platforms:</strong> Organizations often struggle to enforce uniform identity policies across cloud, on-premises, and hybrid environments. Legacy systems, in particular, may not be compatible with modern IAM solutions, leading to inconsistent enforcement.</li>



<li><strong>Overprivileged Access:</strong> Granting users or devices more access than necessary violates the principle of least privilege. This not only increases the risk of insider threats but also amplifies the potential impact of compromised accounts.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Implement first strong MFA for all users, devices, and services, and integrate Single Sign-On (SSO) to streamline the authentication process. Leverage identity federation and directory services that can provide consistent identity policies across various platforms, including cloud and on-premises environments. Finally, regularly audit access controls to ensure adherence to the principle of least privilege and remove all unnecessary access rights.</p>



<h3 class="wp-block-heading">3. <strong>Challenges with Network Segmentation and Micro-Segmentation</strong></h3>



<p>A key aspect of Zero Trust is limiting lateral movement within the network by implementing strict segmentation. This ensures that if an attacker gains access to one part of the network, they cannot easily move to other areas. However, achieving effective network segmentation and micro-segmentation often presents technical and operational challenges.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Poor Visibility into Network Traffic:</strong> If an organization lacks sufficient visibility into its network traffic and data flows, segmenting the network becomes a guessing game. Without comprehensive insights, security teams might segment incorrectly or fail to apply the necessary controls to critical assets.</li>



<li><strong>Complexity in Managing Micro-Segmentation:</strong> Micro-segmentation can involve breaking down the network into dozens or even hundreds of small, isolated zones. Managing security policies for each zone becomes increasingly complex, especially in large, dynamic environments. This complexity can result in misconfigurations or security policy inconsistencies.</li>



<li><strong>Inconsistent Segmentation Across Environments:</strong> Cloud environments, in particular, present challenges for traditional segmentation techniques. In hybrid or multi-cloud environments, inconsistencies in segmentation policies can create blind spots that attackers can exploit.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Invest in network visibility tools that provide real-time monitoring and insights into how data and workloads move across the environment. Use software-defined networking (SDN) solutions to simplify micro-segmentation and ensure that segmentation policies are uniformly enforced across cloud, on-premises, and hybrid environments. Automation tools can also help reduce the complexity of managing large-scale segmentation.</p>



<h3 class="wp-block-heading">4. <strong>Data Security and Encryption Issues</strong></h3>



<p>Zero Trust focuses heavily on protecting data at every stage of its lifecycle—whether in transit, at rest, or in use. Unfortunately, many organizations overlook or inadequately address the data security aspects of Zero Trust implementation, leaving sensitive information vulnerable to exposure.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Unencrypted Data:</strong> Failing to encrypt sensitive data, both in transit and at rest, is one of the most glaring weaknesses in many Zero Trust implementations. This can occur because organizations still rely on outdated systems that don’t support modern encryption protocols.</li>



<li><strong>Inconsistent Data Classification:</strong> Organizations often fail to classify their data effectively. Without knowing which data is sensitive or critical, it’s impossible to apply appropriate security controls. This results in either under-protecting important information or overprotecting data, leading to resource wastage.</li>



<li><strong>Poor Key Management Practices:</strong> Even when encryption is implemented, many organizations struggle with key management. Storing encryption keys in insecure locations, failing to rotate keys regularly, or using weak encryption algorithms compromises the integrity of data protection.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Implement strong encryption for all sensitive data, both in transit and at rest, and ensure that data security policies apply consistently across all environments, including cloud services. Develop a data classification framework to prioritize the protection of sensitive or mission-critical information. Invest in robust key management solutions that securely store, rotate, and manage encryption keys, ensuring that data remains protected even if keys are compromised.</p>



<h3 class="wp-block-heading">5. <strong>Incompatibility with Legacy Systems</strong></h3>



<p>Many organizations have long-standing legacy systems that are critical to their operations but are not designed to function within a Zero Trust model. These systems often lack modern security features such as MFA, encryption, or integration with IAM solutions, making them a weak link in the overall security architecture.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Difficulty Integrating Legacy Systems:</strong> Legacy systems, especially those built on outdated protocols, can be difficult or impossible to integrate into a modern Zero Trust framework. As a result, organizations may leave these systems unprotected or apply inadequate compensating controls.</li>



<li><strong>Risk of Shadow IT:</strong> When legacy systems are not properly secured or integrated into the Zero Trust model, employees may circumvent security policies by using unsanctioned tools and applications (known as shadow IT), which introduces additional risks.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Where possible, upgrade or replace legacy systems that cannot support modern security standards. For critical legacy systems that cannot be replaced, implement compensating controls such as additional layers of monitoring, isolation, and strong access controls. It’s also essential to engage in regular audits to detect any shadow IT and ensure compliance with security policies.</p>



<h3 class="wp-block-heading">6. <strong>Monitoring and Incident Response Challenges</strong></h3>



<p>One of the key components of Zero Trust is continuous monitoring. Without real-time visibility into network traffic, user behavior, and system activity, organizations will struggle to detect and respond to security incidents effectively. However, implementing robust monitoring and response mechanisms often proves challenging.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Lack of Real-Time Monitoring:</strong> Many organizations rely on periodic or after-the-fact analysis of logs rather than real-time monitoring. This creates delays in detecting and responding to threats, allowing attackers more time to move laterally within the network.</li>



<li><strong>Overwhelming Volume of Alerts:</strong> A Zero Trust model generates an increased number of security alerts due to its continuous verification nature. If not managed properly, this can lead to alert fatigue, where security teams become overwhelmed by the sheer volume of alerts and miss critical incidents.</li>



<li><strong>Inefficient Incident Response:</strong> Even with real-time monitoring, organizations often lack automation tools that can respond to security incidents quickly. Manual processes are too slow and ineffective in dealing with sophisticated, fast-moving attacks.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Invest in Security Information and Event Management (SIEM) systems that provide centralized, real-time monitoring and analytics. Use User and Entity Behavior Analytics (UEBA) to detect unusual behavior and prioritize critical alerts. To reduce alert fatigue, implement automated threat detection and response tools that can immediately isolate or remediate compromised systems. Regularly refine incident response plans to ensure that they are optimized for the unique demands of a Zero Trust environment.</p>



<h3 class="wp-block-heading">7. <strong>Overcomplication and Lack of Scalability</strong></h3>



<p>Zero Trust implementations can quickly become overcomplicated, especially when organizations try to enforce overly rigid controls or deploy too many disparate security tools without proper integration. This complexity can hinder scalability, making it difficult for organizations to adapt their Zero Trust architecture as they grow or adopt new technologies.</p>



<h4 class="wp-block-heading">Common Failures:</h4>



<ul class="wp-block-list">
<li><strong>Tool Overload:</strong> Organizations often deploy numerous security tools to cover various aspects of Zero Trust (e.g., endpoint security, IAM, data encryption). If these tools are not well-integrated or streamlined, they can introduce operational inefficiencies and create blind spots.</li>



<li><strong>Rigid Policies that Hinder Productivity:</strong> Overly strict security policies can interfere with day-to-day business operations, frustrating users and making them seek workarounds. This not only reduces productivity but also undermines the Zero Trust model by creating new security vulnerabilities.</li>



<li><strong>Difficulty Scaling:</strong> Many organizations struggle to scale their Zero Trust architecture as they expand. For example, new devices, users, or services may not be properly integrated into the existing security model, leading to gaps in protection.</li>
</ul>



<h4 class="wp-block-heading">Solution:</h4>



<p>Prioritize simplicity and integration when deploying Zero Trust tools. Look for unified platforms that offer multiple security functionalities within a single solution rather than piecing together disparate tools. Ensure that security policies are flexible enough to accommodate legitimate business needs without sacrificing security. Finally, design the Zero Trust architecture with scalability in mind, allowing for future growth and the integration of new technologies.</p>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Implementing Zero Trust is no small feat. While its benefits are clear—improved security, reduced attack surface, and better protection against modern threats—the challenges of implementing Zero Trust cannot be underestimated. From poorly defined strategies and weak identity management to legacy systems and overly complex policies, there are numerous pitfalls that can lead to failure.</p>



<p>By understanding these common failure points and implementing the right solutions, organizations can successfully adopt Zero Trust and reap its full benefits. Achieving this requires a strategic, phased approach that balances security with usability and ensures that every component of the infrastructure is continuously verified, secured, and monitored. Organizations that address these challenges head-on will be better equipped to protect their assets, data, and users in an ever-evolving threat landscape.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fzero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation%2F&amp;linkname=Zero%20Trust%2C%20the%20Hidden%20Pitfalls%3A%20Challenges%20and%20Failure%20Points%20in%20Implementation" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fzero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation%2F&amp;linkname=Zero%20Trust%2C%20the%20Hidden%20Pitfalls%3A%20Challenges%20and%20Failure%20Points%20in%20Implementation" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fzero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation%2F&amp;linkname=Zero%20Trust%2C%20the%20Hidden%20Pitfalls%3A%20Challenges%20and%20Failure%20Points%20in%20Implementation" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fzero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation%2F&amp;linkname=Zero%20Trust%2C%20the%20Hidden%20Pitfalls%3A%20Challenges%20and%20Failure%20Points%20in%20Implementation" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fzero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation%2F&#038;title=Zero%20Trust%2C%20the%20Hidden%20Pitfalls%3A%20Challenges%20and%20Failure%20Points%20in%20Implementation" data-a2a-url="https://www.aykira.com.au/2024/10/zero-trust-the-hidden-pitfalls-challenges-and-failure-points-in-implementation/" data-a2a-title="Zero Trust, the Hidden Pitfalls: Challenges and Failure Points in Implementation"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Implementing Zero Trust: Best Practices and Key Areas for Success</title>
		<link>https://www.aykira.com.au/2024/10/implementing-zero-trust-best-practices-and-key-areas-for-success/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Thu, 24 Oct 2024 23:55:43 +0000</pubDate>
				<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software architecture]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=4017</guid>

					<description><![CDATA[In an increasingly interconnected digital world, the traditional network perimeter security model is proving to be inadequate. With mobile devices, cloud services, and remote work being the norm, organizations can no longer rely on the assumption that everything within their network is inherently secure. Combine this with cybersecurity threats growing in sophistication, and the surface <a href="https://www.aykira.com.au/2024/10/implementing-zero-trust-best-practices-and-key-areas-for-success/" rel="nofollow"><span class="sr-only">Read more about Implementing Zero Trust: Best Practices and Key Areas for Success</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>In an increasingly interconnected digital world, the traditional network perimeter security model is proving to be inadequate. With mobile devices, cloud services, and remote work being the norm, organizations can no longer rely on the assumption that everything within their network is inherently secure. Combine this with cybersecurity threats growing in sophistication, and the surface for attacks continues to expand, making it clear that trust should no longer be a default assumption. Enter the Zero Trust security model.</p>



<p>Zero Trust is a modern cybersecurity approach that assumes no implicit trust inside or outside a network perimeter. Instead, <span style="text-decoration: underline;">everything</span> must be verified before granting access to <span style="text-decoration: underline;">any</span> resources. This model is being widely adopted by organizations of all sizes, driven by the need to reduce the risk of cyberattacks and protect critical assets where boundaries are constantly shifting.</p>



<p>In this blog post, we will explore the fundamentals of Zero Trust, outline the best practices for implementing it successfully, and highlight key areas that require specific attention to ensure a smooth and effective implementation.</p>



<h2 class="wp-block-heading">What Is Zero Trust?</h2>



<p>Zero Trust is a security concept based on the principle of &#8220;never trust, always verify.&#8221; This model eliminates the idea of trusted zones (such as internal networks) and untrusted zones (like external networks) and instead ensures access to systems, applications, and data is granted only after proper verification (based on strict security policies).</p>



<p>Zero Trust is not a single product or technology but rather a comprehensive strategy that includes a variety of components, such as identity and access management, endpoint security, data encryption, and monitoring. It focuses on continuously validating every interaction, regardless of where it originates, before granting access.</p>



<p>The pillars of Zero Trust can be summarized as:</p>



<ul class="wp-block-list">
<li><strong>Least Privilege Access:</strong> Ensure that users and devices have the minimum level of access required to perform their tasks, no more and no less.</li>



<li><strong>Continuous Verification:</strong> Trust is never permanent; it must be continuously verified based on context, such as user identity, device health, location, and behavior.</li>



<li><strong>Assume Breach Posture:</strong> Always operate with the assumption that a breach has already occurred, and limit the impact by segmenting access to resources.</li>
</ul>



<h2 class="wp-block-heading">Why Zero Trust Matters</h2>



<p>Organizations across industries face a growing number of cyber threats, from ransomware attacks to data breaches and insider threats. Traditional perimeter-based defences are not sufficient in protecting against these threats as they cannot account for the dynamic and decentralized nature of modern IT environments.</p>



<p>Zero Trust offers several advantages, including:</p>



<ul class="wp-block-list">
<li><strong>Improved security posture:</strong> By assuming that every request, even from within the network, is potentially malicious, Zero Trust reduces the likelihood of unauthorized access.</li>



<li><strong>Mitigation of insider threats:</strong> With continuous verification and least-privilege access, even trusted users within the organization cannot overreach their access rights.</li>



<li><strong>Minimized attack surface:</strong> Network segmentation and micro-segmentation ensure that if an attacker gains access to a system, their ability to move laterally is severely limited.</li>



<li><strong>Better visibility:</strong> The model emphasizes monitoring and logging of all user and device interactions, providing better visibility into activity across the environment.</li>



<li><strong>Support for remote work and BYOD:</strong> Zero Trust policies can apply to any device, anywhere, making it well-suited for a distributed workforce and modern cloud-based environments.</li>
</ul>



<h2 class="wp-block-heading">Key Areas to Focus on When Implementing Zero Trust</h2>



<p>Implementing Zero Trust is not a one-size-fits-all solution, and its success depends on a holistic approach that addresses multiple aspects of security architecture. Below are the key areas to focus on during implementation and why getting these right is key.</p>



<h3 class="wp-block-heading">1. Identity and Access Management (IAM)</h3>



<p>Identity is the foundation of Zero Trust. The model relies heavily on strong authentication methods to ensure that only the right people have access to the right resources at the right time. Therefore, <strong>Identity and Access Management (IAM)</strong> should be one of the first areas of focus when implementing Zero Trust.</p>



<p><strong>Best Practices for IAM in Zero Trust:</strong></p>



<ul class="wp-block-list">
<li><strong>Multi-factor Authentication (MFA):</strong> Require multiple independent forms of authentication for access to critical resources. Passwords alone are not sufficient, and MFA significantly increases security by adding additional layers of verification, such as biometrics, hardware tokens, or one-time passcodes.</li>



<li><strong>Single Sign-On (SSO):</strong> Implement SSO to streamline access management and reduce the attack surface created by multiple login credentials. When combined with MFA, SSO enhances user experience without sacrificing security.</li>



<li><strong>Identity Federation:</strong> Use identity federation to extend authentication across multiple systems, especially cloud services. This enables a seamless experience for users while enforcing consistent security policies.</li>



<li><strong>Role-Based Access Control (RBAC):</strong> Limit access based on roles within the organization, ensuring that users can only access resources required for their job. Use the principle of least privilege to restrict unnecessary access.</li>



<li><strong>Just-In-Time (JIT) Access:</strong> Instead of giving users or devices long-standing access to sensitive resources, implement JIT access that grants privileges only when needed and revokes them immediately afterwards.</li>
</ul>



<p><strong>Key Attention Areas:</strong></p>



<ul class="wp-block-list">
<li>Implement robust identity governance to monitor access rights over time, and continually reassess roles and permissions.</li>



<li>Implement conditional access policies that assess user behaviour, device health, and network context before granting access.</li>
</ul>



<h3 class="wp-block-heading">2. Device Security and Endpoint Protection</h3>



<p>In a Zero Trust environment, the security of devices connecting to the network is paramount. Whether the device is owned by the organization (corporate-owned) or the individual (BYOD), it must meet specific security criteria before it can be trusted.</p>



<p><strong>Best Practices for Device Security:</strong></p>



<ul class="wp-block-list">
<li><strong>Endpoint Detection and Response (EDR):</strong> Deploy EDR solutions to monitor and detect malicious behaviour on endpoints (such as laptops, desktops, and mobile devices). EDR can help detect threats in real-time and contain them before they spread.</li>



<li><strong>Device Compliance Checks:</strong> Implement continuous monitoring of devices to ensure compliance with security policies. This includes checking for &amp; requiring the latest security patches, endpoint protection software, and device encryption.</li>



<li><strong>Network Access Control (NAC):</strong> Use NAC solutions to enforce security policies on devices trying to access network resources. NAC can evaluate the security posture of a device and block or limit access if the device does not meet the required criteria.</li>



<li><strong>Mobile Device Management (MDM):</strong> Enforce security policies on mobile devices, including encryption, app whitelisting, and remote wipe capabilities to protect sensitive data in case a device is lost or stolen.</li>
</ul>



<p><strong>Key Attention Areas:</strong></p>



<ul class="wp-block-list">
<li>Ensure that devices are continuously monitored for compliance with security standards. A device that was secure yesterday may not be secure today.</li>



<li>Consider adopting a Zero Trust Network Access (ZTNA) solution to replace VPNs and provide secure access to resources based on the device’s security status and the user’s identity.</li>
</ul>



<h3 class="wp-block-heading">3. Network Segmentation and Micro-Segmentation</h3>



<p>Zero Trust demands that access to resources is tightly controlled and that the attack surface is minimized at all times. To achieve this, network segmentation and <strong>micro-segmentation</strong> are crucial components of the implementation.</p>



<p><strong>Best Practices for Network Segmentation:</strong></p>



<ul class="wp-block-list">
<li><strong>Micro-Segmentation:</strong> Divide your network into smaller, isolated segments and apply security controls to each one. This ensures that even if an attacker gains access to one segment, they cannot easily move laterally to other areas and are likely to be detected trying to do so.</li>



<li><strong>Software-Defined Perimeters (SDP):</strong> Use software-defined perimeters to create a virtual boundary around applications, isolating them from the rest of the network and making them invisible to unauthorized users.</li>



<li><strong>Granular Access Control Policies:</strong> Apply strict access controls on every network segment to ensure that users and devices can only access resources within their designated area.</li>
</ul>



<p><strong>Key Attention Areas:</strong></p>



<ul class="wp-block-list">
<li>Ensure that segmentation is dynamic and can adapt to changing network conditions, user behavior, and threat levels.</li>



<li>Pay close attention to managing traffic between segments to prevent unauthorized access or data exfiltration.</li>



<li>Implement in flight traffic monitoring and alerting of suspicious activity.</li>
</ul>



<h3 class="wp-block-heading">4. Data Protection and Encryption</h3>



<p>Zero Trust not only focuses on who and what can access the network but also on the protection of data. Data should be protected at all stages—at rest, in transit, in use and when destroyed.</p>



<p><strong>Best Practices for Data Protection:</strong></p>



<ul class="wp-block-list">
<li><strong>Data Encryption:</strong> Encrypt sensitive data both at rest and in transit. Encryption ensures that even if an attacker gains access to the data, they cannot read it without the decryption key.</li>



<li><strong>Data Classification:</strong> Implement a data classification system to identify and label sensitive information. This enables the organization to apply specific security controls and policies based on the sensitivity of the data.</li>



<li><strong>Data Loss Prevention (DLP):</strong> Use DLP solutions to prevent unauthorized access to sensitive data. DLP tools can monitor and control data flows, ensuring that sensitive information is not accidentally or intentionally leaked.</li>
</ul>



<p><strong>Key Attention Areas:</strong></p>



<ul class="wp-block-list">
<li>Ensure that encryption keys securely managed, with appropriate rotation policies and secure storage.</li>



<li>Implement access controls to prevent unauthorized users from accessing or modifying sensitive data.</li>
</ul>



<h3 class="wp-block-heading">5. Monitoring, Analytics, and Threat Detection</h3>



<p>Continuous monitoring and analytics play a vital role in the Zero Trust model. Since trust is never implicit, organizations must continuously verify access requests, monitor activity, and analyze behavior for any signs of compromise.</p>



<p><strong>Best Practices for Monitoring and Threat Detection:</strong></p>



<ul class="wp-block-list">
<li><strong>Security Information and Event Management (SIEM):</strong> Implement SIEM solutions to collect and analyze security logs in real-time. SIEM can help detect potential security incidents early by correlating events from multiple sources.</li>



<li><strong>User and Entity Behavior Analytics (UEBA):</strong> Use UEBA solutions to identify abnormal user and entity behavior that could indicate an insider threat or compromised account.</li>



<li><strong>Automated Threat Response:</strong> Leverage automated threat detection and response solutions that can act quickly to contain threats without requiring manual intervention.</li>
</ul>



<p><strong>Key Attention Areas:</strong></p>



<ul class="wp-block-list">
<li>Ensure that monitoring tools cover the entire environment, including cloud workloads, endpoints, and internal networks.</li>



<li>Regularly review security logs and alerts to avoid alert fatigue and ensure that critical incidents are addressed promptly.</li>
</ul>



<h2 class="wp-block-heading">Overcoming Challenges in Zero Trust Implementation</h2>



<p>Implementing Zero Trust is not without its challenges. Below are some common hurdles organizations face and strategies to overcome them:</p>



<ol class="wp-block-list">
<li><strong>Cultural Resistance:</strong> Transitioning to a Zero Trust model can face pushback from employees and IT staff who are used to more traditional security models. It&#8217;s essential to communicate the value of Zero Trust, provide adequate training, and involve key stakeholders in the process.</li>



<li><strong>Complexity:</strong> Zero Trust requires significant changes to infrastructure, identity management, and security policies. Break down the implementation into manageable steps and prioritize the most critical areas first. Utilise Pilot implementation strategies to gain experience and understand the complexities with least risk.</li>



<li><strong>Legacy Systems:</strong> Many organizations rely on legacy systems that may not be compatible with modern security practices. When possible, update or replace legacy systems, and where not possible, implement compensating controls to mitigate risks.</li>
</ol>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Implementing Zero Trust is an ongoing journey that requires a shift in mindset, architecture, and culture. By focusing on key areas such as identity management, device security, network segmentation, data protection, and monitoring, organizations can significantly enhance their security posture and reduce the risk of cyberattacks.</p>



<p>While the implementation process may seem daunting, the benefits of adopting a Zero Trust approach far outweigh the challenges. In an era where the threat landscape is constantly evolving, Zero Trust offers a scalable, flexible, and effective framework to protect critical assets and maintain trust in a world where trust is never assumed.</p>



<p>Embrace Zero Trust today to secure your organization&#8217;s future.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>This blog post covers the fundamental aspects and best practices for implementing Zero Trust in a modern environment. If you need more details or have specific questions, feel free to reach out!</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fimplementing-zero-trust-best-practices-and-key-areas-for-success%2F&amp;linkname=Implementing%20Zero%20Trust%3A%20Best%20Practices%20and%20Key%20Areas%20for%20Success" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fimplementing-zero-trust-best-practices-and-key-areas-for-success%2F&amp;linkname=Implementing%20Zero%20Trust%3A%20Best%20Practices%20and%20Key%20Areas%20for%20Success" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fimplementing-zero-trust-best-practices-and-key-areas-for-success%2F&amp;linkname=Implementing%20Zero%20Trust%3A%20Best%20Practices%20and%20Key%20Areas%20for%20Success" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fimplementing-zero-trust-best-practices-and-key-areas-for-success%2F&amp;linkname=Implementing%20Zero%20Trust%3A%20Best%20Practices%20and%20Key%20Areas%20for%20Success" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F10%2Fimplementing-zero-trust-best-practices-and-key-areas-for-success%2F&#038;title=Implementing%20Zero%20Trust%3A%20Best%20Practices%20and%20Key%20Areas%20for%20Success" data-a2a-url="https://www.aykira.com.au/2024/10/implementing-zero-trust-best-practices-and-key-areas-for-success/" data-a2a-title="Implementing Zero Trust: Best Practices and Key Areas for Success"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Strengthening username and password logins</title>
		<link>https://www.aykira.com.au/2024/09/strengthening-username-and-password-logins/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Sun, 08 Sep 2024 23:25:31 +0000</pubDate>
				<category><![CDATA[australia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3971</guid>

					<description><![CDATA[Username and password based login is often seen as the weakest link in authentication &#8211; too often people choose weak passwords, write them down or reuse them. So on their own they are an easy target for hackers. But it need not be this way, if you have the ability to implement a few additional <a href="https://www.aykira.com.au/2024/09/strengthening-username-and-password-logins/" rel="nofollow"><span class="sr-only">Read more about Strengthening username and password logins</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p><strong>Username and password based login is often seen as the weakest link in authentication &#8211; too often people choose weak passwords, write them down or reuse them. So on their own they are an easy target for hackers. But it need not be this way, if you have the ability to implement a few additional features into the login process, you can make it that much harder for a hacker, even to the extent that they will give up and go elsewhere. </strong></p>



<p><em>It should also be remembered that certain classes of users (the elderly and the disabled for instance) may not be able to use or afford modern smartphones or other devices to implement MFA (Multi Factor Authentication) &#8211; so we need to do our best to ensure username/password based login is secure and useable in such situations.</em></p>



<p>In this article we will cover a some simple techniques, along with a few advance techniques, on how you can strengthen username/password based security. You can also use this article as a checklist for when you have to integrate with a 3rd party who only offers username/password based login.</p>



<h2 class="wp-block-heading">1. Defeating password guessing</h2>



<p>Before we do anything with the core username/password authentication process, there are a few simple things that need to be done to dent or completely stop scripted dictionary password attempts. Such an attack is where the hacker either doesn&#8217;t know the username and password, or they just don&#8217;t know the password (say you allow an employee email address as a username instead). There are four key approaches to denting this attack.</p>



<p>The first is to log failed attempts to login, and record in that log the source IP and User Agent (more later) at least. Now with the source IP you can use tools like <a href="https://github.com/fail2ban/fail2ban" data-type="link" data-id="https://github.com/fail2ban/fail2ban">fail2ban </a>to implement max failed attempts per source IP, so if the hacker exceeds the limit in a given timeframe, they get banned from accessing the login service for a period of time. Using tools like fail2ban is great as usually you don&#8217;t have to modify you code and you can configure fail2ban to pick up on other failures, say mismatches on the password reset form and feed it into the same ruleset for analysis.</p>



<p>The second technique is to have a form crumb tied to the session cookie, this forces the script to be complex enough to load the whole page and cookie, then submit the username/password guess, with the crumb and cookie, in order to have a valid attempt.  In essence, when you create the form, you generate a random number, store that random number in the session record and put in an additional field in the form (say called crumb). Then when you process the form, check for the submitted crumb matching what was stored in the session record, and immediately afterwards blank the entry in the session record. You can also use the same crumb technique on the password reset form.</p>



<p>The third technique is displaying a <a href="https://en.wikipedia.org/wiki/CAPTCHA" data-type="link" data-id="https://en.wikipedia.org/wiki/CAPTCHA">captcha</a> immediately on a wrong password being entered. This avoids the need to trigger the captcha off some failed attempts counting metric, you just need to have a flag in the user record indicating &#8216;showedCaptcha&#8217;, so successful login needs both a correct password and successful captcha challenge.</p>



<p>The fourth technique involves ensuring people choose sufficiently complex passwords, avoid the old ways of wanting a mix of uppercase/lowercase with some digits and special symbols &#8211; it just encourages people to reuse passwords. Instead lean towards longer phrase based passwords, they are much more memorable and much harder to guess. Say mix up: significant places, people and objects not known to an external observer. Also, with sufficiently long unique phrases, the need to force periodic passwords changes on people can be relaxed in certain situations, again this can cause excessive password reuse and formulaic passwords.</p>



<h2 class="wp-block-heading">2. Closing the barn door</h2>



<p>The biggest problem with most username/password login systems is they are just open to everyone. Anyone on the planet can typically access a login page and be considered valid to try to login. This is just wrong, 99.9% of logins are from machines that logged in previously and we should make good use of that to improve security. Below are a few techniques which can make use of this.</p>



<p>First off is making use of the source IP (IPv4 the /24, IPv6 typically the first half) as a location tracker in effect. This way if a user keeps logging in from the same place, on additional security controls come into effect. If they try to login from a previously unseen IP, you should not allow them to login and send them an email to confirm the IP is indeed them. If they do confirm, you will then allow the login to proceed. In effect the email contains a signed link that encodes the IP and directs to the login form. The session then contains that IP as an &#8216;approved IP&#8217;, and once they login successfully, the IP is added to the allowed list. Note: The allowed IP list should expire unused IP&#8217;s after a month.</p>



<p>Secondly, make use of the browser by planting a long lived cookie on it, the cookie contains a signature created from the username and the browser User Agent at least. This way a hacker can&#8217;t just take the cookie and replay without setting up the whole browser environment as well. If a user tries to login without a valid long lived cookie, they fail to login and a similar email is sent to the one above to give them a path to verify their browser.</p>



<p>Thirdly, login form pages should not be pulling in all sorts of 3rd party dependencies. The risk here is that the 3rd party behaviour tracking or analytics code could get compromised by a hacker or it could be &#8216;noisy&#8217; and record authentication information by accident. Ideally keep 3rd party dependencies on login pages to an absolute minimum.</p>



<p>Fourthly, if you know employees should only login from a well known set of IP&#8217;s (say the corporate IP block) ensure this can be supported as a login restriction. In a SAAS context this should be able to be set up at the customer record, so all login accounts for that customer are automatically restricted.</p>



<div class="wp-block-group has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-24dd0955a8b3546150b66d5ed2b4c20e"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h3 class="wp-block-heading">Should SAAS charge more for this?</h3>



<p><strong><em>Just a little aside here, charging more for services like IP restriction is inherently evil, why? You are often forcing those customers who can least afford it to make a choice between more security or spending limited money on something else, 9 times out of 10 spending more on security will loose. Instead make it standard for the smaller customers and only charge the big end of town, or have a first 10 seats its free rule. May sound backwards but you will be helping those who are in the worst security position &amp; have the most to loose to protect themselves.</em></strong></p>
</div></div>



<h2 class="wp-block-heading">3. Limit Impact</h2>



<p>This goes for all methods of authentication (MFA or not), once a hacker obtains access into a system, the only thing reducing impact is what they are able to do with that login. Therefore you need to ensure that the permission system in the product is sufficiently fine grain and scoped that the impact is contained. Below are some techniques that can be applied.</p>



<p>First off, ensure actions mimic real world processes in terms of their permission structure. In effect , if an action required a two person sign-off in the real-world, the same MUST apply in the product. This way a hacker cannot short circuit safeguards. Its not good to enough to simply notify a manager that something is being done, approval must be required before and be blocked until approval is gained. Too many systems fall back on the sensitive operation notification model and when a hack occurs out of hours, you will find out too late to do anything. Also the notification will often not contain an ability to block the action, making it even more useless, the manager will have to track down someone in IT to look into it and stop whatever is going on. This just doesn&#8217;t work, so don&#8217;t even do it; approvals are hard gates, no other way.</p>



<p>Second, implement user behaviour tracking. This could be as simple as providing a user access log of activity, all the way through to behaviour analysis to find &#8216;out of band&#8217; actions that should be notified to management. In this way unusual out of hours access could be flagged as soon as it happens. You could also use this to implement authentication scoring, i.e. analysis the when, where and what of a login attempt and have a validity threshold to permit the login.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>We hope the above article has been informative and provides you with some pointers on improving the security of your username/password login service without inconveniencing the users. If you would like to know more, please <a href="https://www.aykira.com.au/contact/" data-type="page" data-id="32">contact us</a> or <a href="https://amzn.to/2xyQkUJ" data-type="link" data-id="https://amzn.to/2xyQkUJ">buy our book</a> .</strong></p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F09%2Fstrengthening-username-and-password-logins%2F&amp;linkname=Strengthening%20username%20and%20password%20logins" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F09%2Fstrengthening-username-and-password-logins%2F&amp;linkname=Strengthening%20username%20and%20password%20logins" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F09%2Fstrengthening-username-and-password-logins%2F&amp;linkname=Strengthening%20username%20and%20password%20logins" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F09%2Fstrengthening-username-and-password-logins%2F&amp;linkname=Strengthening%20username%20and%20password%20logins" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F09%2Fstrengthening-username-and-password-logins%2F&#038;title=Strengthening%20username%20and%20password%20logins" data-a2a-url="https://www.aykira.com.au/2024/09/strengthening-username-and-password-logins/" data-a2a-title="Strengthening username and password logins"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The CrowdStrike Outage: the view from the Grassy Knoll&#8230;</title>
		<link>https://www.aykira.com.au/2024/07/the-crowdstrike-outage-the-view-from-the-grassy-knoll/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Sat, 20 Jul 2024 02:06:43 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[software architecture]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[crowdstrike]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3983</guid>

					<description><![CDATA[In this article we look at what could be the root cause of the CrowdStrike outage and what could have been done to prevent it.]]></description>
										<content:encoded><![CDATA[
<p><strong><em>Disclaimer: This article is based an analysis of yet to be confirmed facts, therefore treat this is a &#8216;what-if&#8217; type analysis into probable events or technical sets up that could have led to the outage. The full post mortem analysis won&#8217;t be out for a few days, we wait with baited breath</em></strong>&#8230;</p>



<p>Yesterday, at around 3.30pm AEST, people started to notice that Windows PC were restarting and going into the Blue Screen of Death (BSOD) &#8211; a fatal non operating state for a Windows machine. Once in such a state it requires manual intervention to restart (more on this later). Before long, millions, if not hundreds of millions of machines were being impacted globally. <strong><em>Update</em></strong>: turns out just over 8 million machines were directly impacted, no figures yet on what was indirectly impacted, which will be higher.</p>



<h2 class="wp-block-heading">TL/DR &#8211; Root Cause</h2>



<p>It turns out the root cause, as best as we can tell at this stage, is that a virus/malware definition file was pushed out by CrowdStrike to its Falcon Sensors (software installed on their customers computers to detect and block viruses and malware) that was malformed enough to cause the receiving machines to go into a BSOD state when they tried to process the file. Rebooting the machines did not help as the update would be applied again and it would go into the BSOD state again.</p>



<h2 class="wp-block-heading">TL/DR &#8211; The fix</h2>



<p>As described on the <a href="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/" data-type="link" data-id="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/">CrowdStrike </a>site, either reboot the host to see if it will receive the updated definition file (they call it a channel file) or you need to boot the machine into Safe Mode, locate the <code>%WINDIR%\System32\drivers\CrowdStrike</code> directory and remove the file matching “<code>C-00000291*.sys</code>” and delete it, then reboot. You may need the BitLocker recovery key if the host is encrypted. Good luck!</p>



<h2 class="wp-block-heading">Suspected Root Cause</h2>



<p>Based on reports on the <a href="https://twitter.com/snicoara/status/1814184181863526504" data-type="link" data-id="https://twitter.com/snicoara/status/1814184181863526504">Internet</a>, it looks like the malformed channel file was able to cause a null pointer dereference fault or a similar level exception event, which, given the Falcon Sensor is running in a privileged kernel environment, triggers an instant kernel panic and a BSOD to halt the system. One such stack track is shown below.</p>



<figure class="wp-block-image size-large"><a href="https://www.aykira.com.au/wp-content/uploads/2024/07/crowdstrike-outage.png"><img fetchpriority="high" decoding="async" width="1024" height="720" src="https://www.aykira.com.au/wp-content/uploads/2024/07/crowdstrike-outage-1024x720.png" alt="" class="wp-image-3984" srcset="https://www.aykira.com.au/wp-content/uploads/2024/07/crowdstrike-outage-1024x720.png 1024w, https://www.aykira.com.au/wp-content/uploads/2024/07/crowdstrike-outage-300x211.png 300w, https://www.aykira.com.au/wp-content/uploads/2024/07/crowdstrike-outage-768x540.png 768w, https://www.aykira.com.au/wp-content/uploads/2024/07/crowdstrike-outage.png 1170w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>The Error text is highlighted in Red, showing an attempt to read from an address at 00000009c, but the real killer is what highlighted in Green, this shows it was using the contents of memory address 0000000000000 to then use as a pointer to read memory from another location &#8211; not good. We know this is CrowdStrike code from the Blue box, the name of the program is csagent.</p>



<p>So how did this come about? Well there have been a few <a href="https://news.ycombinator.com/item?id=41009740" data-type="link" data-id="https://news.ycombinator.com/item?id=41009740">reports </a>of the bad <code>C-00000291*.sys</code> file containing all zeros rather than data. Now given these files contain some representation of multiple signatures of new malware or viruses for the CrowdStrike engine to detect, its very likely each signature will be of a different length. So how do you read in each definition from a single file? <strong>Note</strong>: the sys extension has no significance on the format of what the file contains, it varies in usage across the system from text files, to flat databases, to system drivers. </p>



<p><strong><em>Update</em></strong>: there have also been reports of non-zero containing Channel files causing the same crash, it may well be the same zero byte at a certain place in the file is a root cause, or some other vector is at play.</p>



<h3 class="wp-block-heading">Inline variable length record handling</h3>



<p>The usual way to deal with multiple variable length records in a file is to have a block that gives the length of the following data block, so you can pick out each data block and advance to the next block where you pick up its length and the cycle continues until you get the end of the file. You end up with a file structure like that shown below.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><a href="https://www.aykira.com.au/wp-content/uploads/2024/07/variable_length_records.png"><img decoding="async" width="245" height="440" src="https://www.aykira.com.au/wp-content/uploads/2024/07/variable_length_records.png" alt="" class="wp-image-3985" style="width:224px;height:auto" srcset="https://www.aykira.com.au/wp-content/uploads/2024/07/variable_length_records.png 245w, https://www.aykira.com.au/wp-content/uploads/2024/07/variable_length_records-167x300.png 167w" sizes="(max-width: 245px) 100vw, 245px" /></a></figure></div>


<p>The Blue blocks are contain the length of the following block (which I call N), so you can read the exact length of the Data block in then jump to the end and pick up the next block. I would suspect that the Falcon Sensor code made use of the value of N to reserve memory then attempt to write the following data Block into that memory, as you would want all the signatures you are attempting to match in memory. Other things could well be going on, for example linking signatures to a table of file extensions to match against, but at the start you need to read in the data block into memory and then process it in whatever way needs to be done.</p>



<p>So what happens if you feed in a file full of zeroes into such a processing system? Well, the first block length will be read as zero length, the program will then try to reserve memory of zero length, which is an error and the underlying routine will likely just return a zero to indicate failure. The program will then try to deference this zero pointer at some point and cause an exception leading to a halt state given the Falcon sensor is operating in a privileged environment. This might not be exactly the precise causal chain, but throwing zeros into a system expecting non-zero values will cause a fence post critical error somewhere along the processing chain (if not checked for).</p>



<h3 class="wp-block-heading">So how did such a file get created?</h3>



<p>I suspect the program on the server side either encountered a storage fault, i.e. either the creation of the individual signatures was faulty or the storage of them was faulty <strong>OR</strong> the subsequent reading and construction of the channel file was faulty. Given the reports of a file containing all zeros and that it is a single file that is the root cause (from what has been discovered so far) I think its the program creating the channel files at fault. It may be the delivery mechanism that has faulted, but if that was the case I would have expected those impacted to be &#8216;patchy&#8217; (excuse the pun) in that only a subset of people would be impacted and this wouldn&#8217;t require a totally new file to be created to address the problem you just send out the old one correctly to those impacted.</p>



<h2 class="wp-block-heading">What could have been done differently?</h2>



<p>First off the Falcon sensor should not be assuming the Channel file is correctly formed, it should have been scanned first for basic integrity and correctness prior to doing any processing using it. Just checking a checksum is not enough, you need to assume the worst, especially when operating at the kernel level.</p>



<p>In a similar way the delivery stage should perform some basic checks on the file integrity before making a Channel file available for download. Now it may be the file is encrypted and signed prior to the delivery stage, if that is so, whatever was feeding the delivery stage needs to do these checks before it sends the file to the delivery stage and then confirm what the delivery stage has is what it sent to it then flag it valid for onwards delivery. In effect a passing of a baton of correctness is implemented by always verifying what was sent is what was received. </p>



<p>So the &#8216;trigger&#8217; for this was the bad file, but the &#8216;fatal error&#8217; in not handling the error case in the machine was also needed for this problem to come about, if either was not present the problem would not have arose. This may point to a lack of systematic end to end awareness of what the generating program and the reading program is responsible for or expecting from the other.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Mistakes happen, its a fact of life living in a technical world. Trouble is the wide usage of common systems creates a set of common mode failure points that if not addressed can generate wide ranging outages such as this. The solution is to have more robust coding and to perform staged rollouts that have an ability to detect the health (or not) of the end systems &#8211; if its clear there is a wave of &#8216;dead&#8217; end system states, assume you are problem and stop pushing updates. It&#8217;s likely other remote update services from other vendors have similar design weaknesses, this is something which will require urgent investigation.</p>



<p>I also don&#8217;t think the fact this occurred on a Friday is a factor, given this should be a completely automated tool chain distributing malware signatures to clients, its just bad luck it occurred on a Friday. IT teams around the world will be working over the weekend to address this and likely this won&#8217;t be fully closed out for a few weeks.</p>



<p>Also, there appears to be much discussion online about if this was a security incident or not. According to CrowdStrike, for them, it was NOT a security incident, they did not get hacked, it was just buggy data or code. As for the impacted businesses, the impact could range from zero to a full on security incident, it all depends on what the BSOD boxes were doing for the business, they might have been doing nothing critical to something utterly core to the business and its security. So we cannot generalise to any one impact statement, its individual per business.  So, for businesses impacted, they need to do &#8216;blast radius&#8217; impact discovery exercise and see if the security surface around critical services could have been impacted, then confirm for these services if everything is in a known good state (no CIA events).</p>



<h2 class="wp-block-heading">Addendum</h2>



<p>Apparently CrowdStrike have a history of pushing out broken updates, in <a href="https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/" data-type="link" data-id="https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/">April </a>they pushed updates that broke Debian and Rocky Linux installs. The same also occurred after upgrading to RockyLinux 9.4 .</p>



<p>Also it looks like this recent update ignored all the staging policy controls their customers had and went everywhere all at once. This could be due to the policy controls being implemented at the end device and not from the centre when deployed. Which would make sense, as you would not want to be globally tracking for all customers what version each device is at and then working out what updates to push according to their individual policies. Also such a model supports centralised IT deployment management of updates and local policy control. <strong><em>Correction</em></strong>: it appears versioning staging controls are only applied to the Falcon software itself and NOT to Channel Files, which are always instantly applied.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="entry-content-asset"><iframe title="CrowdStrike IT Outage Explained by a Windows Developer" width="640" height="360" src="https://www.youtube.com/embed/wAzEJxOo1ts?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div><figcaption class="wp-element-caption">Dave&#8217;s Garage Explains what happened in the CrowdStrike outage at the system level</figcaption></figure>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F07%2Fthe-crowdstrike-outage-the-view-from-the-grassy-knoll%2F&amp;linkname=The%20CrowdStrike%20Outage%3A%20the%20view%20from%20the%20Grassy%20Knoll%E2%80%A6" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F07%2Fthe-crowdstrike-outage-the-view-from-the-grassy-knoll%2F&amp;linkname=The%20CrowdStrike%20Outage%3A%20the%20view%20from%20the%20Grassy%20Knoll%E2%80%A6" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F07%2Fthe-crowdstrike-outage-the-view-from-the-grassy-knoll%2F&amp;linkname=The%20CrowdStrike%20Outage%3A%20the%20view%20from%20the%20Grassy%20Knoll%E2%80%A6" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F07%2Fthe-crowdstrike-outage-the-view-from-the-grassy-knoll%2F&amp;linkname=The%20CrowdStrike%20Outage%3A%20the%20view%20from%20the%20Grassy%20Knoll%E2%80%A6" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F07%2Fthe-crowdstrike-outage-the-view-from-the-grassy-knoll%2F&#038;title=The%20CrowdStrike%20Outage%3A%20the%20view%20from%20the%20Grassy%20Knoll%E2%80%A6" data-a2a-url="https://www.aykira.com.au/2024/07/the-crowdstrike-outage-the-view-from-the-grassy-knoll/" data-a2a-title="The CrowdStrike Outage: the view from the Grassy Knoll…"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detecting Cyber Security BS in CVs</title>
		<link>https://www.aykira.com.au/2024/06/detecting-cyber-security-bs-in-cvs/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Tue, 04 Jun 2024 00:57:54 +0000</pubDate>
				<category><![CDATA[australia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[roles]]></category>
		<category><![CDATA[sydney]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3956</guid>

					<description><![CDATA[Hiring competent people in cybersecurity is always important, as you cannot secure what you do not understand. The trouble is often those who are performing the hiring do not have an in-depth understanding of cyber security and what specific skills and experiences are required to perform a cyber security role well. Why is this so <a href="https://www.aykira.com.au/2024/06/detecting-cyber-security-bs-in-cvs/" rel="nofollow"><span class="sr-only">Read more about Detecting Cyber Security BS in CVs</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><a href="https://www.aykira.com.au/wp-content/uploads/2024/06/CV-wordcloud2-e1717462555156.jpg"><img loading="lazy" decoding="async" width="900" height="493" src="https://www.aykira.com.au/wp-content/uploads/2024/06/CV-wordcloud2-e1717462555156.jpg" alt="" class="wp-image-3960" srcset="https://www.aykira.com.au/wp-content/uploads/2024/06/CV-wordcloud2-e1717462555156.jpg 900w, https://www.aykira.com.au/wp-content/uploads/2024/06/CV-wordcloud2-e1717462555156-300x164.jpg 300w, https://www.aykira.com.au/wp-content/uploads/2024/06/CV-wordcloud2-e1717462555156-768x421.jpg 768w" sizes="auto, (max-width: 900px) 100vw, 900px" /></a></figure>



<p class="has-medium-font-size"><strong>Hiring competent people in cybersecurity is always important, as you cannot secure what you do not understand. The trouble is often those who are performing the hiring do not have an in-depth understanding of cyber security and what specific skills and experiences are required to perform a cyber security role well.</strong></p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<div class="wp-block-group has-background" style="background-color:#e8f2fa"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<div class="wp-block-group" style="font-size:18px"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<div class="wp-block-group has-medium-font-size"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading">Why is this so important?</h2>



<ol class="wp-block-list">
<li>To do cybersecurity effectively depends on a combination of experience, learnt skills and talent. The devil literally is in the details and you won&#8217;t develop a feel for evaluating risks, and in turn, the controls required to mitigate those risks without putting in the hours. In essence operating in a cybersecurity role beyond your capabilities is putting your employers business at risk and in turn is putting your long term career at risk also.</li>



<li>The &#8216;Faking it tell you make it&#8217; mindset just won&#8217;t work long term in cybersecurity, you may get away with it for a while, but in this day and age where everything you do is digitalised and available at a few mouse clicks &#8211; it can unravel very quickly. Better to spend your energies on genuine capability growth.</li>



<li>People operating outside of their zone of capability is a primary cause of a lot of cyber incidents. Bad decisions, incorrect assumptions, etc all stem from not having an innate ability to self check and confirm. Better to walk on solid ground than to run on thin ice. </li>
</ol>
</div></div>
</div></div>
</div></div>
</div></div>



<p class="has-medium-font-size">In this article, we provide some pointers and red flags to look out for that indicate a person is jumping onto the cyber security bandwagon and presenting a somewhat overly &#8216;rose tinted&#8217; view of their cyber security achievements and experiences. BTW Some &#8216;putting in the best light&#8217; is to be expected in CV&#8217;s, what we are referring to is taking that way too far and presenting a overly false impression of skills and experiences. Also covered are a few key things to look out for during the interview process that will help in separating the wheat from the chaff.</p>



<h2 class="wp-block-heading">1. The 180 degree abrupt Career Shift&#8230;</h2>



<p>This may be obvious or not in their CV but if you see a sudden dramatic change in focus to cybersecurity, especially in the last 4 years, I&#8217;d treat this as a Red Flag. Especially if they have several years under their belt doing something totally none cybersecurity work prior.  Treat as a clear sign of bandwagon following, especially if they have no prior certifications or qualifications that relate to cyber security.</p>



<p>Now for a junior role this may not be that much of an issue, but if you are hiring someone where direct cyber security ability is key and so expected to be enacted on a day to day basis, this could be a problem.</p>



<p>If they do make it interview you should be probing the transition period, why the change? Were they not succeeding in their prior career direction?</p>



<h2 class="wp-block-heading">2. Too rapid a climb&#8230;</h2>



<p>Another give away is when they climb too rapidly in roles and scope, especially a transition from technical in senior management occurring in one step. Typically you want to see at least 2 years in each role, anything less than 18 months (and especially less than 12 months) consider a Red Flag. This could indicate someone role hopping to avoid accountability for prior mistakes or a business picking up on their inability and the person jumping ship before they got pushed (or did they get pushed?). It might just be that the business did a downsize as well, so you should ask why during the interview.</p>



<h2 class="wp-block-heading">3. Excessive buzz word bingo</h2>



<p>If the CV contains more buzz words than actual substance, this can be concerning. There should be evidence of the application of cyber security techniques and outcomes alongside the buzz words, in effect a few &#8216;war stories&#8217; that can be discussed during interview that shows the skills being applied. If its all buzz words and no stories, big Red Flag.</p>



<h2 class="wp-block-heading">4. Too much timed experience</h2>



<p>Another quick check is to compare how long they have been dedicated to cyber security and the duration of cyber security experiences they claim to have. For instance, they cannot have 10 years experience in Firewalls if they have only been doing cyber security for 5 years. This would be something certainly worth questioning about during the interview.</p>



<h2 class="wp-block-heading">5. Too varied</h2>



<p>People tend to develop their areas of expertise and focus more on those over time; a CV that does not focus, or shown a progression across different areas of focus, should be a big Red Flag. This could indicate buzz word stuffing or a lack of ability on the part of the individual, they may not be able to be an expert in any cyber security field.</p>



<p>Also look out for &#8216;unsupported expertise&#8217;, for instance its very difficult to be an expert in Code Security if you do not have a programming background. Again ask about it during the interview.</p>



<h2 class="wp-block-heading">6. Certifications only</h2>



<p>If someone only has certifications and no related academic qualifications (or years of relevant experience), this could be a problem. There are a lot of security certifications out there which are not that hard to get, especially once you have one in a given area, accumulating more of the same is easier. Quite a few of them are more memory tests than actual ability. You need to check why the certification was taken, was it a role requirement? </p>



<h2 class="wp-block-heading">7. Title expansion</h2>



<p>This can be a bit harder to detect but its where a job title seems rather too &#8216;grand&#8217; for what it should be. For instance, someone could take an &#8216;IT Technician&#8217; and morph it into &#8216;IT Cybersecurity Technician&#8217;, or &#8216;Systems Analyst&#8217; morphs into &#8216;Cyber Security Analyst&#8217;. The easiest way to spot this is check the size of the business they were employed at and roles you can see on LinkedIn, if it was a medium or small sized business its very unlikely they will have such fine grain role differentiation.</p>



<h2 class="wp-block-heading">8. No &#8216;just for fun&#8217; tech</h2>



<p>Cyber security revolves around technology, therefore you want to see strong evidence that the person is actually technical and enjoys using and applying technology. They should have other interests that are based on a technology mindset. For instance hobbies that have a strong technology or theoretical basis (model aircraft, electronics, metal working, wood working, etc). A complete lack of such hobbies (or no hobbies at all) should be a small Red Flag.</p>



<h2 class="wp-block-heading">During the Interview</h2>



<p>Genuine cyber security people with solid experiences will often have &#8216;war stories&#8217; that have shaped their careers; they will be able to present these, and the outcomes and learnings, in a highly focussed form. They will be  able to clearly demonstrate their role, what they did and the outcomes. They will also have a clear understanding of how human factors come into play when doing cyber security. In effect they will have &#8216;lived&#8217; doing cyber security and have an eye for it in its many different aspects. It will have become second nature for them and they will happily talk about it all day long if given the chance.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size"><strong>We hope the above points will help you in finding good cyber security staff for your open role. These are only some of the basic techniques we have used in assessing capabilities and fit for cyber security people, either for open roles or when checking 3rd party supplier personal (to make sure they can actually keep a service secure). We can perform much more detailed assessments and provide this as a service for businesses, if you are interested, <a href="https://www.aykira.com.au/contact/" data-type="page" data-id="32">please contact us</a>.</strong></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">What if you are want to get into Cybersecurity?</h2>



<p>First off do not BS on your CV. Focus, tune and tweak, yes but do not BS.  Cyber security, at its core, is about dealing with people who use technology in businesses and making that secure. A lot of your job will be around gaining trust and having trust in others, if you BS your way into a cyber security role, what does that say about how you can be trusted? An employee would much rather have someone be honest and state what they know they are capable of, what they are training up on and where they want to go. This is SO much more powerful than a BS laden CV, it shows integrity, to shows drive and it shows honesty, all very positive qualities to have in cyber security. Also, if a potential employee likes you, they could set up training and support to help grow your career&#8230; Start off as you wish to continue and want to be treated.</p>



<p>Also remember if you do BS your way into a cyber security role, its very likely you could be putting that business at undue risk, and in turn your future career in cyber security could be a risk if they get breached as a result. Just don&#8217;t do it.</p>



<p>There are many valid paths into cyber security and everyone has something to bring to the table, just do so with integrity, you will go that much further.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fdetecting-cyber-security-bs-in-cvs%2F&amp;linkname=Detecting%20Cyber%20Security%20BS%20in%20CVs" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fdetecting-cyber-security-bs-in-cvs%2F&amp;linkname=Detecting%20Cyber%20Security%20BS%20in%20CVs" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fdetecting-cyber-security-bs-in-cvs%2F&amp;linkname=Detecting%20Cyber%20Security%20BS%20in%20CVs" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fdetecting-cyber-security-bs-in-cvs%2F&amp;linkname=Detecting%20Cyber%20Security%20BS%20in%20CVs" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fdetecting-cyber-security-bs-in-cvs%2F&#038;title=Detecting%20Cyber%20Security%20BS%20in%20CVs" data-a2a-url="https://www.aykira.com.au/2024/06/detecting-cyber-security-bs-in-cvs/" data-a2a-title="Detecting Cyber Security BS in CVs"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 3rd party security nightmare</title>
		<link>https://www.aykira.com.au/2024/06/the-3rd-party-security-nightmare/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 04:30:44 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[3rd party]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3938</guid>

					<description><![CDATA[It appears 3rd party integrations are the flavour of the month for security incidents at the moment. The latest being Ticketek Australia, where some of its customer may have had their personal details exposed, including names, date-of-birth and email; all of which was managed by a &#8220;reputable, global third-party supplier&#8221;. In other words, a global <a href="https://www.aykira.com.au/2024/06/the-3rd-party-security-nightmare/" rel="nofollow"><span class="sr-only">Read more about The 3rd party security nightmare</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>It appears 3rd party integrations are the flavour of the month for security incidents at the moment. The latest being Ticketek Australia, where some of its customer may have had their personal details exposed, including names, date-of-birth and email; all of which was managed by a &#8220;reputable, global third-party supplier&#8221;. In other words, a global SaaS or infrastructure supplier dropped the security ball and hackers ran off with customer data as a result.</p>



<p>So why does this keep on happening? Well&#8230;</p>



<h2 class="wp-block-heading">Hackers love 3rd parties&#8230;</h2>



<p>This may come as a surprise to some, but hackers will always preferentially target 3rd party integrations and associated services, for the following reasons:</p>



<ul class="wp-block-list">
<li> There is a security responsibility disconnect between those using the 3rd party and the 3rd party themselves. In other words, the integration between the customer and the 3rd party is often a point of security weaknesses as you have two parties responsible for each half of the integration. This makes it very likely that there is little meaningful security co-ordination between the two, so security coverage gaps can exist.</li>



<li>In a similar way, hackers have double the surface to probe and test; the security surface of the customer wrt to the 3rd party, and the security surface of the 3rd party wrt to the customer. They can try their hand at pretending to be the customer or the 3rd party, or play one off the other, etc. Many ways to skin the cat and find a weakness.</li>



<li>3rd party providers often provide services to many customers and sometimes the separation between each customer is weak if none existent once you get into the systems. This means for the effort of hacking one customer you could end up hacking them all, extra bonus!</li>



<li>The 3rd party integration might allow the hacker to move into other customer services or points of integration with other 3rd parties. Especially if that 3rd party is providing authentication or Single Sign-On services &#8211; in essence an &#8216;open sesame&#8217; moment for the hacker.</li>
</ul>



<figure class="wp-block-image size-large"><a href="https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk.png"><img loading="lazy" decoding="async" width="1024" height="471" src="https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk-1024x471.png" alt="" class="wp-image-3941" srcset="https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk-1024x471.png 1024w, https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk-300x138.png 300w, https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk-768x353.png 768w, https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk-1536x706.png 1536w, https://www.aykira.com.au/wp-content/uploads/2024/06/3rd_party_risk.png 1828w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>The above diagram shows these points clearly. In this case a Customer is using some 3rd party service that provides an API to integrate with their in-house system. As shown this provides at least 4 ways the hacker can interact with either system or either businesses staff to get access to the data. Note how the security surface (the blue box) for the Customer is distinct to that of the 3rd Party, neither has visibility or a tight security interaction with the other; they are, in essence, security black boxes to each other, and the hacker understands this and exploits it to the full.</p>



<h2 class="wp-block-heading">What can you do to protect yourself?</h2>



<p>Given the degree of integration modern businesses have with all sorts of cloud services it can often look impossible to improve your security position, but there are a few simple things you can do:</p>



<ul class="wp-block-list">
<li>First off, identify what is your core data and where it exists. This is the data you never want a hacker to get their hands on, it&#8217;s the data life blood of your business.</li>



<li>For each system that contains core data, check the following:
<ul class="wp-block-list">
<li>Only you and no other systems can access that data. In other words are there restrictions in place to ensure your way of access to that data only works for you. It should be impossible to use corporate credentials on the public internet to access those systems. If this cannot be implemented, move to another provider who does, this is key.</li>



<li>All backups are stored encrypted, and the encryption key is NOT stored with the backups. May sound obvious, but do not assume all is right.</li>



<li>The data must be stored on an encrypted medium (encrypted file system).</li>



<li>Check that the provider has a security policy and people in their organisation with specific security responsibilities and the associated skills (both operational and technical).</li>
</ul>
</li>



<li>Make sure your employees are only using SaaS products approved by IT, there should be no &#8216;Grey SaaS&#8217; &#8211; as there is no corporate control over the data in such services. Also there is no control over how security is implemented in such services.</li>



<li>In a similar vein, before using a 3rd party, do some form of security review of the service and check it meets your minimum security requirements first.</li>
</ul>



<p>You should also strongly consider if bringing a service back &#8216;in-house&#8217; would be a good move, this guarantees that the way it is set up will always meet your security expectations and you are not forced to compromise and share that service with anyone else. This also means the uptime of that service is completely under your control. With the advent of private clouds and cost effective virtualisation services that can run on site, this gives businesses new options in combating security risks.</p>



<p><em>Now I know some people would consider it sacrilege to consider bringing services in-house, but there are many ways of doing this that do preserve availability and are not cost prohibitive. You can combine on-site with private cloud a lot easier (and at a lower cost point) these days than was possible a few years ago.</em></p>



<p>When you are using cloud services in any form, you must always remember you are renting services from a 3rd party in a highly shared environment, which may not fit your real and evolving business risk profile. Especially if you are using many cloud services, as each is a point of exposure and weakness that a hacker can exploit.</p>



<p>The cloud, like all services, has a risk/return curve, which can be quickly exceeded as your usage grows, especially when multiple services are being employed (in effect your efficiency of usage declines with size and complexity, this is how cloud providers make their money, as most customers do not track this).</p>



<p>It must always be remembered that when you use a 3rd party to provide services that are manipulating your key business data, you in effect entrusting your &#8216;crown jewels&#8217; with a 3rd party via an often at-arms-length contractual relationship. They may even be in another country and operating under a completely different legal framework, which might void or seriously perturb your ability to obtain recompense when something does go wrong. Often contracts will contain extensive clauses limiting liability and compensation to an amount probably not worth the effort of claiming (compared to the damage caused). Ideally, all of this needs careful consideration <strong><em>prior </em></strong>to engaging with a 3rd party, its an important part of the risk management process that you need to undertake.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>If you would like to learn more about how to improve data processing security,<a href="https://amzn.to/2xyQkUJ" data-type="link" data-id="https://amzn.to/2xyQkUJ"> I suggest you read my book, available on Amazon.</a></p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fthe-3rd-party-security-nightmare%2F&amp;linkname=The%203rd%20party%20security%20nightmare" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fthe-3rd-party-security-nightmare%2F&amp;linkname=The%203rd%20party%20security%20nightmare" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fthe-3rd-party-security-nightmare%2F&amp;linkname=The%203rd%20party%20security%20nightmare" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fthe-3rd-party-security-nightmare%2F&amp;linkname=The%203rd%20party%20security%20nightmare" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F06%2Fthe-3rd-party-security-nightmare%2F&#038;title=The%203rd%20party%20security%20nightmare" data-a2a-url="https://www.aykira.com.au/2024/06/the-3rd-party-security-nightmare/" data-a2a-title="The 3rd party security nightmare"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can LLMs be constrained and secured?</title>
		<link>https://www.aykira.com.au/2024/05/can-llms-be-constrained-and-secured/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Mon, 27 May 2024 08:25:13 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3917</guid>

					<description><![CDATA[Research has been undertaken that reveals some interesting aspects of how LLMs (Large Language Models) work and how they represent knowledge. This indicates it is very difficult to successfully constrain a language model and thereby ensure that they are secure. This difficulty means it is dangerous to employee LLMs in mission critical situations where adversaries <a href="https://www.aykira.com.au/2024/05/can-llms-be-constrained-and-secured/" rel="nofollow"><span class="sr-only">Read more about Can LLMs be constrained and secured?</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>Research has been undertaken that reveals some interesting aspects of how LLMs (Large Language Models) work and how they represent knowledge. This indicates it is very difficult to successfully constrain a language model and thereby ensure that they are secure. This difficulty means it is dangerous to employee LLMs in mission critical situations where adversaries should not be able to &#8216;escape&#8217; the constraints. The video below covers the analysis the researchers undertook and what they found.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="entry-content-asset"><iframe loading="lazy" title="Mapping GPT revealed something strange..." width="640" height="360" src="https://www.youtube.com/embed/Bpgloy1dDn0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>



<h2 class="wp-block-heading">TLDR&#8230;</h2>



<ul class="wp-block-list">
<li>The researchers analyse in the <a href="https://arxiv.org/abs/2310.04444" data-type="link" data-id="https://arxiv.org/abs/2310.04444" target="_blank" rel="noreferrer noopener">paper</a> prompt engineering for LLMs using the context of a formal analysis based on control theory, and then determine how stable or predictable the model behaviour is.</li>



<li>They found that, given the large complexity of input token combinations, it is possible to &#8216;drive&#8217; or &#8216;control&#8217; the LLM to output what you require. In other words, if you want a specific output, there is a set of input tokens that will produce that required output; in effect a form of injection that can &#8220;jail break&#8221; constraints.</li>



<li>It was discussed in the video that the feedback mechanism employed in LLM&#8217;s to create chains of output tokens provides the possibility of the model going into a &#8216;corrupted state&#8217;. The implication being you could then manipulate the LLM even more.</li>



<li>They discuss that &#8216;weird prompting&#8217; (compared to magic) can often reliably steer a LLM to required outputs. Such weird prompting can be mix of gibberish and symbols, meaningless to us but significant to the LLM processing them.</li>



<li>They discovered that the degree of steering possible is quite powerful they could make the least likely output token to be the most likely token with a few input tokens. In effect trying to &#8216;tune out&#8217; undesirable output only reduces the likelihood of that output occurring, you cannot stop it completely from occurring.</li>
</ul>



<h2 class="wp-block-heading">My Thoughts</h2>



<p>Given the very high degree of complexity of LLMs and usage of feedback loops and &#8216;hidden state&#8217; to create a stream of output tokens &#8211; its no real surprise to me that LLMs can be manipulated or engineered to produce a desired output that was not intended. This research in effect formalises what has been long suspected. This means that LLMs have an exploitable &#8216;dark side&#8217; which is very difficult to guard and block access to. In effect you might think you have it well constrained and behaving as intended, but then a novel prompt is employed and the dark side is exposed. There have been numerous examples of this in the past where a carefully constructed prompt can move the LLM into a state where it voids its constraints and will start to tell you all sort of things it isn&#8217;t meant to. This paper indicates that this aspect of LLMs might be with us for quite a while yet until more rigorous and formal methods of control and constraint are possible. </p>



<h2 class="wp-block-heading">Security Aspects</h2>



<p>From a security perspective, if you are utilising LLMs you need to be very careful about what they access, and in turn, who is permitted to use them. It is very easy to make current LLM&#8217;s escape whatever &#8216;pre-prompting&#8217; controls were employed and get them do anything required, up to and including dumping databases or performing systematic attacks. What such a LLM can do when it goes rogue purely depends on what it has access to and the degree of control entrusted to it. Always employ a Least Privilege mindset and be very careful around database integrations.</p>



<p>In particular do not just depend on &#8216;pre-prompting&#8217; to set the state the LLM should be using to process inputs; this can often be very easily overcome. You need to use a mixture of techniques. if you want to know more, please <a href="https://www.aykira.com.au/contact/" data-type="page" data-id="32">get in touch</a> .</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F05%2Fcan-llms-be-constrained-and-secured%2F&amp;linkname=Can%20LLMs%20be%20constrained%20and%20secured%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F05%2Fcan-llms-be-constrained-and-secured%2F&amp;linkname=Can%20LLMs%20be%20constrained%20and%20secured%3F" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F05%2Fcan-llms-be-constrained-and-secured%2F&amp;linkname=Can%20LLMs%20be%20constrained%20and%20secured%3F" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F05%2Fcan-llms-be-constrained-and-secured%2F&amp;linkname=Can%20LLMs%20be%20constrained%20and%20secured%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F05%2Fcan-llms-be-constrained-and-secured%2F&#038;title=Can%20LLMs%20be%20constrained%20and%20secured%3F" data-a2a-url="https://www.aykira.com.au/2024/05/can-llms-be-constrained-and-secured/" data-a2a-title="Can LLMs be constrained and secured?"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Houston, we have a security problem&#8230;</title>
		<link>https://www.aykira.com.au/2024/04/houston-we-have-a-security-problem/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Mon, 15 Apr 2024 23:42:08 +0000</pubDate>
				<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[hackers]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3904</guid>

					<description><![CDATA[It seems not a day goes by without some record cybersecurity incident hitting the press, be it a data breach, a Zero Day or some malware doing its devious things&#8230; Trouble is the frequency of these events, and their scope, has been increasing significantly over the last few years and most people have not latched <a href="https://www.aykira.com.au/2024/04/houston-we-have-a-security-problem/" rel="nofollow"><span class="sr-only">Read more about Houston, we have a security problem&#8230;</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>It seems not a day goes by without some record cybersecurity incident hitting the press, be it a data breach, a Zero Day or some malware doing its devious things&#8230; Trouble is the frequency of these events, and their scope, has been increasing significantly over the last few years and most people have not latched onto how big the problem is.</p>



<p>A recent Statista Market Insights <a href="https://redirect.viglink.com/?format=go&amp;jsonp=vglnk_171315745567310&amp;key=c1c7d488bb2df8a8b659d5d41634d304&amp;libId=lv0hjrn3010023dg000ULbev3mcv2&amp;loc=https%3A%2F%2F9to5mac.com%2F2024%2F04%2F14%2Fsecurity-bite-annual-cost-of-cybercrime-to-hit-9-2-trillion-in-2024%2F&amp;ccpaConsent=1---&amp;v=1&amp;out=https%3A%2F%2Fwww.statista.com%2Fchart%2F28878%2Fexpected-cost-of-cybercrime-until-2027%2F&amp;ref=https%3A%2F%2Fwww.google.com%2F&amp;title=Security%20Bite%3A%20Annual%20cost%20of%20cybercrime%20to%20hit%C2%A0%249.2%20trillion%20in%202024%20-%209to5Mac&amp;txt=survey">survey</a> predicts that the cost of cyberattacks in 2024 could likely reach <strong>$9.2 trillion</strong> across the globe. To put it in context that is more than the 2022 <a href="https://www.worldometers.info/gdp/gdp-by-country/">GDP</a> of Japan and Germany combined. This is triple the figure of $2.95 trillion in 2020, a short 4 years ago.</p>



<figure class="wp-block-image size-medium is-resized"><a href="https://www.aykira.com.au/wp-content/uploads/2024/04/image.png"><img loading="lazy" decoding="async" width="300" height="300" src="https://www.aykira.com.au/wp-content/uploads/2024/04/image-300x300.png" alt="" class="wp-image-3905" style="width:465px;height:auto" title="Chart showing the rapid increase in cybercrime." srcset="https://www.aykira.com.au/wp-content/uploads/2024/04/image-300x300.png 300w, https://www.aykira.com.au/wp-content/uploads/2024/04/image-1024x1024.png 1024w, https://www.aykira.com.au/wp-content/uploads/2024/04/image-150x150.png 150w, https://www.aykira.com.au/wp-content/uploads/2024/04/image-768x768.png 768w, https://www.aykira.com.au/wp-content/uploads/2024/04/image-480x480.png 480w, https://www.aykira.com.au/wp-content/uploads/2024/04/image-250x250.png 250w, https://www.aykira.com.au/wp-content/uploads/2024/04/image-174x174.png 174w, https://www.aykira.com.au/wp-content/uploads/2024/04/image.png 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></figure>



<p>This is clearly outpacing the growth of the global economy, so the ability to enact profitable cybercrime at scale must be getting easier and more rewarding. There is no other way to interpret such a dramatic increase in the rewards of cybercrime, they are getting away with it more often and being well rewarded for their efforts.</p>



<h2 class="wp-block-heading">Why is this happening?</h2>



<p>There is a confluence of factors which are coming together and contributing to cybercrime growth:</p>



<ul class="wp-block-list">
<li><strong>Increased system complexities and interconnectedness</strong>: Over the last few years there has been an explosion in cloud services and connected devices, both in the home and office. Nearly every IT device you buy now comes with some &#8216;cloud&#8217; service offering &#8211; be that remote access to just simple backup services. This has created an explosion in the complexities of the associated surfaces to secure. Long gone are the days when you just needed to secure your office network, now you need to secure a smorgasbord of cloud services to operate even the smallest business; and in most cases the businesses just don&#8217;t have the time or resources to be able to do that. The same can also be said for a lot of large businesses as well &#8211; the security complexity in IT can quickly get away from you.</li>



<li><strong>Invisible dependencies</strong>: Associated with the above are &#8216;Russia Doll Dependencies&#8217;, in that a service quite often depends on another service, which depends on another service, etc, etc.. In other words what you see of a service hides a massive tree of dependencies which can end up spanning the whole globe, and most of those dependencies are beyond your awareness and control. Good luck ensuring all of that remains secure 24&#215;7.</li>



<li><strong>Fire and forget security solutions</strong>: The knee jerk reaction by most companies has been to go on a spending spree to buy off-the-shelf security solutions, set them up once and promptly forget about them. This may make them feel happy that they think they are secure, but refer back to the 2 prior points, 99.9% of the business security surface is beyond your control. Plus once this off-the-shelf security solution is forgotten about, it will often be not maintained or the licence for its operation will expire and it will silently stop working.</li>



<li><strong>Insecure default configurations</strong>: Literally everything comes with terrible security defaults, and we wonder why admin/admin is still one of the most common device logins going. Plus by default logging is often turned off or does not exist, or some remote UPnP pops into existence on a &#8216;just in case we need to get in remotely&#8217; basis. </li>



<li><strong>Its easy to hack</strong>: There is a wide range of &#8216;hacking&#8217; or &#8216;ransomware-as-a-service&#8217; toolkits out there, you don&#8217;t need to be a cyber-ninja nowadays to make hacking pay, just be willing do it. The level of technical skill is actually quite low.</li>



<li><strong>The hackers are more organised</strong>: There is a lot focus on doing hacking as a business enterprise, this creates economies of scale for all hackers and grows an underground community.</li>



<li><strong>We like hanging onto sensitive information: </strong>Businesses (and individuals) have a tendency to either keep information on a just-in-case basis or they just plain forget what information they have. Combine this with operating systems that do absolutely nothing to manage data lifecycles and files just accumulate all over the place. You would be horrified what most people have in their inboxes, documents folder or shared corporate drive. Everything from passport images upwards in sensitivity.</li>



<li><strong>Confusion over regulations and what data must be kept</strong>: businesses are often not sure what they need to keep to protect themselves or to comply with regulations within the sectors they operate in, so they often keep everything&#8230;</li>
</ul>



<p>Now, you may think one big factor in all of this has being missed, the shortage of those with cybersecurity skills, but this is becoming a bit of an excuse rather than a reason. Let me explain why:</p>



<ol class="wp-block-list">
<li> <strong>We are always going to be short of good people in cybersecurity</strong>: The simple reason being to do it well requires a certain &#8216;mindset&#8217; and depth of experience &#8211; you can&#8217;t get that straight out of Uni or TAFE. You need to be able to worry about what really matters and ignore the rest; a lot of people fret over everything and that doesn&#8217;t work. You also need to know dependable techniques that deal with human factors (which are covered in a lot of articles on this site BTW).</li>



<li><strong>Cybersecurity really is a concern for everyone</strong>: Pointing the finger at cybersecurity professionals is wrong, everyone needs to up their security game and the facilities need to be provided to allow this to happen.</li>



<li><strong>The complexity &amp; dependency super explosion</strong>: Refer back to the first 2 points on the first list, do you think throwing more manpower and technology (including AI &amp; all that implies) is going to do anything to meaningfully change the situation? When you are faced with an exponential growth in interconnectedness and complexity, no amount of manpower or technology will cover it.</li>
</ol>



<p>So what is the solution? There are multiple problems that need solving right now:</p>



<ul class="wp-block-list">
<li><strong>Reign in the interdependencies</strong>: Not only are multiple levels of dependency a security nightmare, its also a maintenance nightmare as well. Plus you could be dependent on a whole web of hidden companies and individuals to maintain and provide secure and reliable (and bug free) services. This is not a viable long term arrangement; businesses change direction or close down, people move onto other things, versions are retired, etc. <em>If you don&#8217;t manage your dependencies, they will end up managing you.</em></li>



<li><strong>Data lifecycle support baked right into the base</strong>: Its 2024 and applications engineers are still expected to code up data lifecycle support. Anything stored in a disc or database should be able to be tagged with a &#8216;delete on&#8217; timestamp and when that time arrives, its automatically removed. In essence this should be an atomic operation at the Operating System and Database level &#8211; stop putting it all on the developer to worry about this.</li>



<li><strong>Do you really need that data?</strong> As hinted at above individuals and businesses need to be a lot more wary of holding onto data; if they have no specific need for it, just delete; or even better don&#8217;t collect it in the first place. Training should be provided on this. Hackers almost depend on this tendency to accumulate data to make ransomware and data breach attacks effective; if you didn&#8217;t have valuable data, there would be nothing to gain.</li>



<li><strong>Do more with less</strong>: There is a trend developing of needing every little tool or service out there to do your work. Quite a few people have their set of favourite tools or services and want to take that set with them from job to job. Trouble is, with all the cloud connections and dependencies, this creates a management nightmare for both the IT and Security departments in a business (if you are large enough to have these to begin with). It also inefficiently consumes resources and is a distinct cost to manage. Plus everyone else will need to adapt to the differences, creating yet more inefficiency. Of course this also creates a massive security headache. The solution? Have a prescribed list of supported and approved services, anything not on that list cannot be used, this is controlled jointly by IT/finance and security. Also make sure you are not doubling up on functionality with anything on that list.</li>



<li><strong>Examine what needs to be local or remote</strong>: The usage of cloud services needs to be considered against the criticality of those services and who they are for. Customer facing services need to be in multiple deployments and isolated completely from your office, so cloud fits. But does a purely internal service or data store also need to be in that same cloud service? Could a local virtualising server run such a service? (yes, with remote secure backups of course). The world of containers and associated support frameworks makes it much easier to run local services. Yes, you need to have some hardware and its an additional machine or two for IT to support, but you retain full control; which could be ideal for certain business functions. The technology cloud providers use to scale servers is now available for local hosting functions as well, you can create a local compute cluster for quite a reasonable price. Remember the cloud providers have to extract profit from the services they provide and you get no access to depreciation or R&amp;D equipment write offs if you use them.</li>



<li><strong>Give everyone security training</strong>: Cybersecurity is not just a &#8216;geeky&#8217; thing, everyone is touched by it, so everyone should get security awareness training. Be it the front desk receptionist to the software developer &amp; CEO, everyone has a role to play in maintaining security and you cannot expect them to deliver on that without training, in exactly the same way you need training to drive a car safely.</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The drastic increase in the value of cybercrime is more a reflection of how our usage of technology is ahead of our collective security skills. We utilise more interconnected services than ever before and that leaves behind a massive data lake that we are constantly contributing to, just sitting there for criminals to plunder at our collective expense. We need to recognise this for the problem it is, rethink our approach on many levels and adapt. This may seem like a &#8216;moon shot&#8217; scale problem, but we have been able to do it once, I&#8217;m confident we can do it again.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F04%2Fhouston-we-have-a-security-problem%2F&amp;linkname=Houston%2C%20we%20have%20a%20security%20problem%E2%80%A6" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F04%2Fhouston-we-have-a-security-problem%2F&amp;linkname=Houston%2C%20we%20have%20a%20security%20problem%E2%80%A6" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F04%2Fhouston-we-have-a-security-problem%2F&amp;linkname=Houston%2C%20we%20have%20a%20security%20problem%E2%80%A6" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F04%2Fhouston-we-have-a-security-problem%2F&amp;linkname=Houston%2C%20we%20have%20a%20security%20problem%E2%80%A6" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F04%2Fhouston-we-have-a-security-problem%2F&#038;title=Houston%2C%20we%20have%20a%20security%20problem%E2%80%A6" data-a2a-url="https://www.aykira.com.au/2024/04/houston-we-have-a-security-problem/" data-a2a-title="Houston, we have a security problem…"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Conduct Effective 3rd-Party Vendor Security Reviews</title>
		<link>https://www.aykira.com.au/2024/02/how-to-conduct-effective-3rd-party-vendor-security-reviews/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Thu, 15 Feb 2024 05:13:11 +0000</pubDate>
				<category><![CDATA[australia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[security reviews]]></category>
		<category><![CDATA[vendor]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3541</guid>

					<description><![CDATA[This article aims to provide a comprehensive guide to performing effective 3rd party vendor security reviews, outlining key steps, best practices, and strategies to mitigate risks and ensure a robust security framework.]]></description>
										<content:encoded><![CDATA[
<p class="left-line has-medium-font-size">In today&#8217;s interconnected business landscape, companies often depend on third-party vendors to provide essential services, be they back-office or part of their product or service offering. While these partnerships can foster growth and efficiency, they also introduce a potent source of invisible security risks. As data breaches and cyber-attacks continue to make the headlines, it has become imperative for organizations to conduct thorough security reviews of their third-party vendors. </p>



<p class="has-medium-font-size">This article aims to provide a comprehensive guide to performing effective 3rd party vendor security reviews, outlining key steps, best practices, and strategies to mitigate risks and ensure a robust security framework.</p>



<h2 class="wp-block-heading">Understanding the Importance of Vendor Security Reviews:</h2>



<p>Before delving into the process, it is crucial to recognize the significance of third-party vendor security reviews. Third-party vendors often have access to sensitive data, networks, or systems, thereby making them potential entry points for cyber threats. Conducting comprehensive security assessments can help identify vulnerabilities, assess compliance with industry standards and regulations, and ultimately safeguard the organization&#8217;s assets and reputation.</p>



<h2 class="wp-block-heading">Key Steps for Conducting 3rd Party Vendor Security Reviews:</h2>



<ol class="wp-block-list">
<li><strong>Define Clear Objectives</strong>: Begin by outlining the specific goals and objectives of the security review. Identify the critical assets involved, the scope of the assessment, and the compliance requirements pertinent to the industry. It may be you have mandatory requirements that the 3rd party must meet.
<ul class="wp-block-list">
<li class="has-small-font-size">Scoping this correctly is key, you need to ensure you have discovered all the touch points and ways in which their offering is utilised. You well may need to do an initial discovery with your inhouse IT and developer teams first.</li>
</ul>
</li>



<li><strong>Assess Vendor Risk</strong>: Evaluate the potential risk exposure associated with the vendor. Consider the nature of the data shared, how it is transferred, and where it is stored. Then review the vendor&#8217;s security practices, their history of security incidents, and their internal security policies and procedures.</li>



<li><strong>Conduct Due Diligence</strong>: Gather comprehensive information about the vendor&#8217;s security practices. Request documentation regarding their security controls, protocols for data handling, incident response plans, and any relevant certifications or compliance reports. Be clear to inform them why you want such documentation and that it in turn will be appropriately managed and secured.</li>



<li><strong>Perform On-Site Assessments</strong>: When feasible and useful, conduct on-site visits to the vendor&#8217;s facilities to gain deeper insights into their security infrastructure. Assess physical security measures, employee training protocols, and the overall culture of security awareness within the organization. Is being secure part of their operational DNA?</li>



<li><strong>Review Contractual Agreements</strong>: Ensure that the vendor&#8217;s security commitments are clearly defined in the contractual agreements. Assess their adherence to industry standards, regulatory requirements, and specific security obligations as outlined in the contract. Look out for clauses that unduly restrict their ongoing security responsibilities.</li>



<li><strong>Conduct Vulnerability Assessments</strong>: Utilize robust security tools to perform comprehensive vulnerability assessments on the vendor&#8217;s systems, networks, and applications. Identify and prioritize potential vulnerabilities to determine the level of risk associated with the vendor&#8217;s services. Of course, only do this with their prior permission and in a way that cannot negatively impact their service.</li>



<li><strong>Implement Ongoing Monitoring</strong>: Establish protocols for continuous monitoring of the vendor&#8217;s security posture. Regularly review security reports, conduct periodic assessments, and ensure that the vendor maintains compliance with the agreed-upon security standards. This could be as simple as a half-yearly &#8216;check-in&#8217; to see how they are progressing with their security maturity.</li>



<li><strong>Develop Contingency Plans</strong>: Prepare contingency plans to address potential security breaches or incidents involving the vendor. Establish clear protocols for incident response, including communication channels, escalation procedures, and steps for mitigating the impact of any security breach.</li>
</ol>



<br/><ins class="adsbygoogle"
     style="display:block; text-align:center;"
     data-ad-layout="in-article"
     data-ad-format="fluid"
     data-ad-client="ca-pub-7841961052900293"
     data-ad-slot="8083569842"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script><br/>



<h2 class="wp-block-heading">Best Practices for Enhancing 3rd-Party Vendor Security:</h2>



<ul class="wp-block-list">
<li>Foster open communication and transparency between the organization and the vendor regarding security practices and concerns.
<ul class="wp-block-list">
<li class="has-small-font-size">Emphase that this is a two way street, in that you are willing to work with them to identify security issues and improve their security.</li>



<li class="has-small-font-size">Ideally liaise at least every 6 months, how often you meet or communicate should correlate with the criticality of their offering to the business.</li>
</ul>
</li>



<li>Establish a robust vendor management program that emphasizes security as a priority throughout the partnership lifecycle.</li>



<li>Regularly update security policies and procedures to align with evolving industry standards and emerging security threats.
<ul class="wp-block-list">
<li class="has-small-font-size">This needs to be an ongoing process and if you find a security threat, think if it could apply to one of your vendors and inform them of it. <strong><em>Do not</em></strong> demand they address the threat upfront or require confirmation that it has been resolved. Rather let them freely communicate with you around the risk and work together to cover it off.</li>
</ul>
</li>



<li>Provide comprehensive training to employees and stakeholders involved in the vendor management process, emphasizing the importance of security compliance and risk management.</li>



<li>Collaborate with legal and compliance teams to ensure that contractual agreements are enforceable and aligned with relevant regulatory requirements.</li>



<li>Implement a robust incident response plan that includes the vendor as a key stakeholder, enabling swift and coordinated responses to potential security incidents.</li>
</ul>



<h2 class="wp-block-heading">Conclusion:</h2>



<p>In an era where data breaches and cyber threats pose significant risks to businesses, conducting effective 3rd party vendor security reviews is a crucial component of a comprehensive security strategy. By following the outlined steps and best practices, organizations can proactively identify vulnerabilities, mitigate risks, and foster secure partnerships with third-party vendors, thereby safeguarding their valuable assets, data, and reputation in an increasingly interconnected business environment.</p>



<p>Incorporating these strategies will enable organizations to build resilient security frameworks that prioritize risk management, compliance, and proactive measures against potential security threats from third-party vendors. By establishing a culture of security awareness and vigilance, companies can navigate the complexities of vendor management while ensuring the integrity and security of their operations and data.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size">At Aykira we have in-depth experience performing 3rd party vendor security reviews, if you would like to know how we can assist you please fill in the form below.</p>



                <div class='gf_browser_unknown gform_wrapper' id='gform_wrapper_7' ><form method='post' enctype='multipart/form-data'  id='gform_7'  action='/feed/'>
                        <div class='gform_heading'>
                            <h3 class='gform_title'>Contacting Aykira</h3>
                            <span class='gform_description'>If you would like to arrange a call with us then please fill in the form below. We fully respect your privacy and any information given to us we treat as in confidence.</span>
                        </div>
                        <div class='gform_body'><ul id='gform_fields_7' class='gform_fields top_label form_sublabel_below description_below'><li id='field_7_1' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_1' >Your Name<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_7_1' type='text' value='' class='medium' maxlength='35' tabindex='1'   aria-required="true" aria-invalid="false" /></div></li><li id='field_7_2' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_2' >Your Telephone Number<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_text'><input name='input_2' id='input_7_2' type='text' value='' class='medium' maxlength='14' tabindex='2'   aria-required="true" aria-invalid="false" /></div></li><li id='field_7_3' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label gfield_label_before_complex' for='input_7_3' >Your Email Address<span class='gfield_required'>*</span></label><div class='ginput_complex ginput_container ginput_container_email' id='input_7_3_container'>
                                <span id='input_7_3_1_container' class='ginput_left'>
                                    <input class='' type='email' name='input_3' id='input_7_3' value='' tabindex='3'    aria-required="true" aria-invalid="false"/>
                                    <label for='input_7_3' >Enter Email</label>
                                </span>
                                <span id='input_7_3_2_container' class='ginput_right'>
                                    <input class='' type='email' name='input_3_2' id='input_7_3_2' value='' tabindex='4'   aria-required="true" aria-invalid="false"/>
                                    <label for='input_7_3_2' >Confirm Email</label>
                                </span>
                                <div class='gf_clear gf_clear_complex'></div>
                            </div></li><li id='field_7_4' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label'  >What are you contacting us about?<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_checkbox'><ul class='gfield_checkbox' id='input_7_4'><li class='gchoice_7_4_1'>
								<input name='input_4.1' type='checkbox'  value='Business Security'  id='choice_7_4_1' tabindex='5'  />
								<label for='choice_7_4_1' id='label_7_4_1'>Business Security</label>
							</li><li class='gchoice_7_4_2'>
								<input name='input_4.2' type='checkbox'  value='Securing Websites'  id='choice_7_4_2' tabindex='6'  />
								<label for='choice_7_4_2' id='label_7_4_2'>Securing Websites</label>
							</li><li class='gchoice_7_4_3'>
								<input name='input_4.3' type='checkbox'  value='Security Training &amp; Mentoring'  id='choice_7_4_3' tabindex='7'  />
								<label for='choice_7_4_3' id='label_7_4_3'>Security Training & Mentoring</label>
							</li><li class='gchoice_7_4_4'>
								<input name='input_4.4' type='checkbox'  value='Software Development'  id='choice_7_4_4' tabindex='8'  />
								<label for='choice_7_4_4' id='label_7_4_4'>Software Development</label>
							</li><li class='gchoice_7_4_5'>
								<input name='input_4.5' type='checkbox'  value='AI Security'  id='choice_7_4_5' tabindex='9'  />
								<label for='choice_7_4_5' id='label_7_4_5'>AI Security</label>
							</li><li class='gchoice_7_4_6'>
								<input name='input_4.6' type='checkbox'  value='Privacy Compliance'  id='choice_7_4_6' tabindex='10'  />
								<label for='choice_7_4_6' id='label_7_4_6'>Privacy, PII and Regulatory Compliance</label>
							</li><li class='gchoice_7_4_7'>
								<input name='input_4.7' type='checkbox'  value='Comment'  id='choice_7_4_7' tabindex='11'  />
								<label for='choice_7_4_7' id='label_7_4_7'>Leaving a Comment or Suggestion</label>
							</li></ul></div><div class='gfield_description'>Feel free to tick multiple entries that apply.</div></li><li id='field_7_5' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_5' >Your Message</label><div class='ginput_container ginput_container_textarea'><textarea name='input_5' id='input_7_5' class='textarea medium' tabindex='12'    aria-invalid="false"   rows='10' cols='50'></textarea></div><div class='gfield_description'>Please outline what you would like us to do for you, please indicate if you have an idea of budget and have a briefing or outline document for the work you would like done (for instance a systems design document or technical specification).</div></li><li id='field_7_7' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label'  >File Attachment</label><div class='ginput_container ginput_container_fileupload'><div id='gform_multifile_upload_7_7' data-settings='{&quot;runtimes&quot;:&quot;html5,flash,html4&quot;,&quot;browse_button&quot;:&quot;gform_browse_button_7_7&quot;,&quot;container&quot;:&quot;gform_multifile_upload_7_7&quot;,&quot;drop_element&quot;:&quot;gform_drag_drop_area_7_7&quot;,&quot;filelist&quot;:&quot;gform_preview_7_7&quot;,&quot;unique_names&quot;:true,&quot;file_data_name&quot;:&quot;file&quot;,&quot;url&quot;:&quot;https:\/\/www.aykira.com.au\/?gf_page=a479fbbd6194d7f&quot;,&quot;flash_swf_url&quot;:&quot;https:\/\/www.aykira.com.au\/wp-includes\/js\/plupload\/plupload.flash.swf&quot;,&quot;silverlight_xap_url&quot;:&quot;https:\/\/www.aykira.com.au\/wp-includes\/js\/plupload\/plupload.silverlight.xap&quot;,&quot;filters&quot;:{&quot;mime_types&quot;:[{&quot;title&quot;:&quot;Allowed Files&quot;,&quot;extensions&quot;:&quot;txt,pdf,jpg,gif,png&quot;}],&quot;max_file_size&quot;:&quot;2097152b&quot;},&quot;multipart&quot;:true,&quot;urlstream_upload&quot;:false,&quot;multipart_params&quot;:{&quot;form_id&quot;:7,&quot;field_id&quot;:7},&quot;gf_vars&quot;:{&quot;max_files&quot;:&quot;3&quot;,&quot;message_id&quot;:&quot;gform_multifile_messages_7_7&quot;,&quot;disallowed_extensions&quot;:[&quot;php&quot;,&quot;asp&quot;,&quot;aspx&quot;,&quot;cmd&quot;,&quot;csh&quot;,&quot;bat&quot;,&quot;html&quot;,&quot;htm&quot;,&quot;hta&quot;,&quot;jar&quot;,&quot;exe&quot;,&quot;com&quot;,&quot;js&quot;,&quot;lnk&quot;,&quot;htaccess&quot;,&quot;phtml&quot;,&quot;ps1&quot;,&quot;ps2&quot;,&quot;php3&quot;,&quot;php4&quot;,&quot;php5&quot;,&quot;php6&quot;,&quot;py&quot;,&quot;rb&quot;,&quot;tmp&quot;]}}' class='gform_fileupload_multifile'>
										<div id='gform_drag_drop_area_7_7' class='gform_drop_area'>
											<span class='gform_drop_instructions'>Drop files here or </span>
											<input id='gform_browse_button_7_7' type='button' value='Select files' class='button gform_button_select_files' aria-describedby='extensions_message' tabindex='13' />
										</div>
									</div><span id='extensions_message' class='screen-reader-text'>Accepted file types: txt, pdf, jpg, gif, png.</span><div class='validation_message'>
								<ul id='gform_multifile_messages_7_7'>
								</ul>
							</div></div><div id='gform_preview_7_7'></div><div class='gfield_description'>If you have a file you want to send us, please attach here. We only allow TXT, PDF's, GIF's, PNG and JPEGs.</div></li><li id='field_7_6' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_6' >Captcha</label><div id='input_7_6' class='ginput_container ginput_recaptcha' data-sitekey='6Ld-V-USAAAAAOLFNnOZLL1Nlfp8R94idCGlW-qX'  data-theme='light' ></div></li><li id='field_7_8' class='gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_' ><label class='gfield_label' for='input_7_8' >Email</label><div class='ginput_container'><input name='input_8' id='input_7_8' type='text' value='' autocomplete='off'/></div><div class='gfield_description'>This field is for validation purposes and should be left unchanged.</div></li>
                            </ul></div>
        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_7' class='gform_button button' value='Submit Your Enquiry' tabindex='14' onclick='if(window["gf_submitting_7"]){return false;}  if( !jQuery("#gform_7")[0].checkValidity || jQuery("#gform_7")[0].checkValidity()){window["gf_submitting_7"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window["gf_submitting_7"]){return false;} if( !jQuery("#gform_7")[0].checkValidity || jQuery("#gform_7")[0].checkValidity()){window["gf_submitting_7"]=true;}  jQuery("#gform_7").trigger("submit",[true]); }' /> 
            <input type='hidden' class='gform_hidden' name='is_submit_7' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='7' />
            
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_7' value='WyJbXSIsIjY4OGE4YzgyOWVjYWRhZDlkNjllOTliNTE5YjQ5YWQzIl0=' />
            <input type='hidden' class='gform_hidden' name='gform_target_page_number_7' id='gform_target_page_number_7' value='0' />
            <input type='hidden' class='gform_hidden' name='gform_source_page_number_7' id='gform_source_page_number_7' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            <input type='hidden' name='gform_uploaded_files' id='gform_uploaded_files_7' value='' />
        </div>
                        </form>
                        </div><script type='text/javascript'> if(typeof gf_global == 'undefined') var gf_global = {"gf_currency_config":{"name":"Australian Dollar","symbol_left":"$","symbol_right":"","symbol_padding":" ","thousand_separator":",","decimal_separator":".","decimals":2},"base_url":"https:\/\/www.aykira.com.au\/wp-content\/plugins\/gravityforms","number_formats":[],"spinnerUrl":"https:\/\/www.aykira.com.au\/wp-content\/plugins\/gravityforms\/images\/spinner.gif"};jQuery(document).bind('gform_post_render', function(event, formId, currentPage){if(formId == 7) {jQuery('#input_7_1').textareaCount(    {    'maxCharacterSize': 35,    'originalStyle': 'ginput_counter',	 'truncate': true,	 'errorStyle' : '',    'displayFormat' : '#input of #max max characters'    } );jQuery('#input_7_2').textareaCount(    {    'maxCharacterSize': 14,    'originalStyle': 'ginput_counter',	 'truncate': true,	 'errorStyle' : '',    'displayFormat' : '#input of #max max characters'    } );				jQuery( "#gform_7" ).on( 'submit', function( event ) {
					jQuery( '<input>' )
						.attr( 'type', 'hidden' )
						.attr( 'name', 'gf_zero_spam_key' )
						.attr( 'value', 'UiV9ZLB^^akWPjK5RpLXK2gcd(HDO2Ze7s7X5ef#(IxsV6qfyGqhr&amp;Xq6e3d*Cfp' )
						.attr( 'autocomplete', 'new-password' )
		.appendTo( jQuery( this ) );
				} );} } );jQuery(document).bind('gform_post_conditional_logic', function(event, formId, fields, isInit){} );</script><script type='text/javascript'> jQuery(document).ready(function(){jQuery(document).trigger('gform_post_render', [7, 1]) } ); </script>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fhow-to-conduct-effective-3rd-party-vendor-security-reviews%2F&amp;linkname=How%20to%20Conduct%20Effective%203rd-Party%20Vendor%20Security%20Reviews" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fhow-to-conduct-effective-3rd-party-vendor-security-reviews%2F&amp;linkname=How%20to%20Conduct%20Effective%203rd-Party%20Vendor%20Security%20Reviews" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fhow-to-conduct-effective-3rd-party-vendor-security-reviews%2F&amp;linkname=How%20to%20Conduct%20Effective%203rd-Party%20Vendor%20Security%20Reviews" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fhow-to-conduct-effective-3rd-party-vendor-security-reviews%2F&amp;linkname=How%20to%20Conduct%20Effective%203rd-Party%20Vendor%20Security%20Reviews" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fhow-to-conduct-effective-3rd-party-vendor-security-reviews%2F&#038;title=How%20to%20Conduct%20Effective%203rd-Party%20Vendor%20Security%20Reviews" data-a2a-url="https://www.aykira.com.au/2024/02/how-to-conduct-effective-3rd-party-vendor-security-reviews/" data-a2a-title="How to Conduct Effective 3rd-Party Vendor Security Reviews"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defence in Depth Security, it works</title>
		<link>https://www.aykira.com.au/2024/02/defence-in-depth-security-it-works/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Fri, 02 Feb 2024 02:38:33 +0000</pubDate>
				<category><![CDATA[architecture]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software architecture]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[defence in depth]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3884</guid>

					<description><![CDATA[We look at how defence in depth can reduce the risk and impact caused by human error, the #1 cause of security incidents.]]></description>
										<content:encoded><![CDATA[
<p>It seems that the longer you spend in the cyber security business the more you see change, yet you also see the same things occurring again and again. The one thing which does not ever change is that at the root of all security incidents you will find someone who did something wrong. This could be leaving a debug service open to all, or it could be forgetting to renew the licence in a bit of critical security software, or it could be a simple typo or &#8216;fat finger&#8217; event at the wrong time in the wrong place. Where ever you will find humans you will find human error, guaranteed &#8211; to err, is indeed, human.</p>



<p>To me, this begs the question: if human error is often the root of 99% of security incidents, then why is so little truly focussed on dealing with it specifically? So much of the investment in security seems to be around detection, with little in true prevention. Why not design out the ability for such errors to cause such incidents, or at least when they do happen the incident is minor instead of a business crippling level event?</p>



<p>Makes you wonder doesn&#8217;t it..</p>



<p>Now you could say this is what Q&amp;A, unit testing, code scans etc are there to guard against it, but there is a problem with this &#8211; it will only find what it has been written to find, it doesn&#8217;t understand what its testing or scanning &#8211; its looking for patterns of failure it already knows about. Trouble with human error is that it can occur anywhere, it could even be in the unit tests or code scanners you are running, they are just as much suspectable to human error as your systems are.</p>



<p>Now, it could be AI can make such checks more effective, but I have my doubts. I suspect as the checks become better, the programmers will become more lazy, given the checks are not 100% covering (even with AI), you get back to a situation where the chance of a vulnerability &#8216;going live&#8217; increases, so the net effect of employing AI is essentially unchanged wrt security risk. Call it human nature, but if you increase the safe guards, people tend to start depending on them, they get lazy.</p>



<p>What if there was a way to make darn sure where ever human error occurs it does not &#8216;blow the doors off&#8217;. Well, there is a way that I have been using for years that is effective, cheap and reliable &#8211; its called Defence in Depth design.</p>



<h2 class="wp-block-heading">Defence in Depth Design</h2>



<p>The basic idea of defence in depth design is that you acknowledge up front your security controls have a rate of failure, yet this is an individual likelihood per control &#8211; in other words the failure of one control does not imply the failure of another. So given this independence of failures, why not layer your systems so a single failure does not &#8216;punch a hole&#8217; through your defences?</p>



<p>This is a bit like the difference between a single line of defence and layered multiple lines of defences. The multiple lines of defence provide a much more difficult defence to overcome as the undefended back is that much further way. An alternative mental model is that of a castle where you have the moat, the draw bridge, the wall, the bailey, and finally the keep with numerous defensive opportunities throughout.</p>



<p>In this way you gain several other advantages over a single line of defence:</p>



<ul class="wp-block-list">
<li>Each layer can be managed in its own right, you are not forced into having to rebuild everything; with an associated &#8216;through punch&#8217; risk.</li>



<li>Inner layers can be wired up only to the next outer layer, this way its a lot harder to inject an attack around an outer layer.</li>



<li>Inner layers can be set up to monitor the health of the outer layers &#8211; so providing an early warning of compromise that&#8217;s independent of other monitoring.</li>



<li>Layers can duplicate security controls to provide operational redundancy, say SQL injection prevention. This way if an external layer fails open, you are still protected.</li>
</ul>



<h2 class="wp-block-heading">So how is this done in practice?</h2>



<p>First off, decide how many layers you want? Usually in most designs people go with 3 or 4 layers, which typically map into:</p>



<ul class="wp-block-list">
<li><strong>Network Edge</strong> &#8211; this could be an internet distributed content delivery network (like CloudFront, Akamai, Azure CDN) that can have filtering rules embedded into it to control exactly what traffic is permitted to the next layer. Some call this a WAF function but it usually doesn&#8217;t do deep inspections.</li>



<li><strong>Network router with WAF (Web Application Firewall)</strong> &#8211; this usually the service right before the application that routes and examines the data packets for unusual content and blocks if found.</li>



<li><strong>Application Web Server</strong> &#8211; the web server itself can usually be configured to perform checks on the data and block if needed. This can be quite detailed and more specific than that performed by the WAF.</li>



<li><strong>Application </strong>&#8211; the code itself can contain checks for data validity and integrity. Such stopping SQL injections, or detecting embedded html that is out of place, etc.</li>
</ul>



<p>With such a set up, you can see how it is easy to have your security controls overlapping in coverage across the layers &#8211; so if one layer fails open (or is compromised) the damage possible is greatly reduced.</p>



<h2 class="wp-block-heading">A few things you need to ensure you get right&#8230;</h2>



<p>First off, do make sure that is not possible to &#8216;jump&#8217; a layer by dint of that layer being publicly visible. In particular the Application Web Server should NEVER be directly visible to the internet in such a model, you are just asking for trouble.</p>



<p>Secondly, the same rule follows for services the Application Web Server depends upon, such as databases, key/value stores, file stores, etc &#8211; they should not be directly visible to the public internet. Putting everything in VPC (virtual private cloud) is one way of doing it, but ensure you don&#8217;t end up with one big VPC containing all your applications. Different applications should go in their own VPC&#8217;s.</p>



<p>Thirdly, logging is done remotely. A layer, and its associated controls, should not log locally alone &#8211; the logs should go to some independent logging store, and also onto a SIEM or log analysis service. So when something unexpected does occur, you both know about it and have the logs to investigate.</p>



<p>Fourthly, each layer needs to &#8216;stand alone&#8217; in terms of shared dependencies. You should not run multiple layers on the same machine or box. Even if they are virtualised. This completely removes the risk of cross talk or resource starvation being used as a mechanism to take down a service. Keeps things apart and they won&#8217;t interfere with each other.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>I hope I have convinced you that Defence in Depth in a useful system design technique to help reduce the &#8216;blast radius&#8217; and likelihood of a human caused security incident. As I said, it is one of my principal design techniques that I know just works. If you would like to know more about this security technique, and others, please first consider buying my <a href="https://www.amazon.com/Personal-Information-Security-Systems-Architecture-ebook/dp/B07HBLG3CP/" data-type="link" data-id="https://www.amazon.com/Personal-Information-Security-Systems-Architecture-ebook/dp/B07HBLG3CP/" target="_blank" rel="noreferrer noopener">book </a>, available both in hardcopy and kindle e-book. </p>



<p>If you want to follow up with me and are considering engaging me for my security and architecture services, please use the <a href="https://www.aykira.com.au/contact/" data-type="page" data-id="32">contact form</a> . Thank you.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fdefence-in-depth-security-it-works%2F&amp;linkname=Defence%20in%20Depth%20Security%2C%20it%20works" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fdefence-in-depth-security-it-works%2F&amp;linkname=Defence%20in%20Depth%20Security%2C%20it%20works" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fdefence-in-depth-security-it-works%2F&amp;linkname=Defence%20in%20Depth%20Security%2C%20it%20works" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fdefence-in-depth-security-it-works%2F&amp;linkname=Defence%20in%20Depth%20Security%2C%20it%20works" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F02%2Fdefence-in-depth-security-it-works%2F&#038;title=Defence%20in%20Depth%20Security%2C%20it%20works" data-a2a-url="https://www.aykira.com.au/2024/02/defence-in-depth-security-it-works/" data-a2a-title="Defence in Depth Security, it works"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google email changes impact small businesses</title>
		<link>https://www.aykira.com.au/2024/01/google-email-changes-impact-small-businesses/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Thu, 25 Jan 2024 22:20:28 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[email]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3877</guid>

					<description><![CDATA[As of 1st February 2024 Google will put in place several new requirements of those sending emails to Google based email accounts. In effect all businesses that send emails to Google based email accounts will have to implement these changes to ensure their emails will get through and will not either be deleted or put <a href="https://www.aykira.com.au/2024/01/google-email-changes-impact-small-businesses/" rel="nofollow"><span class="sr-only">Read more about Google email changes impact small businesses</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>As of 1st February 2024 Google will put in place several new requirements of those sending emails to Google based email accounts. In effect all businesses that send emails to Google based email accounts will have to implement these changes to ensure their emails will get through and will not either be deleted or put in the &#8216;Spam&#8217; folder.</p>



<p>Google is doing this to reduce the amount of spam being sent to their email customers and to improve general email security.</p>



<p>So what are the changes? have a look a <a href="https://apps.google.com/supportwidget/articlehome?article_url=https%3A%2F%2Fsupport.google.com%2Fa%2Fanswer%2F81126%3Fvisit_id%3D638418161338707379-2387370828&amp;assistant_id=generic-unu&amp;product_context=81126&amp;product_name=UnuFlow&amp;trigger_context=a" data-type="link" data-id="https://apps.google.com/supportwidget/articlehome?article_url=https%3A%2F%2Fsupport.google.com%2Fa%2Fanswer%2F81126%3Fvisit_id%3D638418161338707379-2387370828&amp;assistant_id=generic-unu&amp;product_context=81126&amp;product_name=UnuFlow&amp;trigger_context=a">here </a>. Below I have take a screen shot of the changes and underlined what I think is the key change.</p>



<figure class="wp-block-image size-full"><a href="https://www.aykira.com.au/wp-content/uploads/2024/01/goolge-changes.png"><img loading="lazy" decoding="async" width="784" height="586" src="https://www.aykira.com.au/wp-content/uploads/2024/01/goolge-changes.png" alt="" class="wp-image-3878" srcset="https://www.aykira.com.au/wp-content/uploads/2024/01/goolge-changes.png 784w, https://www.aykira.com.au/wp-content/uploads/2024/01/goolge-changes-300x224.png 300w, https://www.aykira.com.au/wp-content/uploads/2024/01/goolge-changes-768x574.png 768w, https://www.aykira.com.au/wp-content/uploads/2024/01/goolge-changes-285x214.png 285w" sizes="auto, (max-width: 784px) 100vw, 784px" /></a></figure>



<p>For those not in the know, SPF and DKIM email authentication are two entries added to your domain record that stop hackers pretending to be you when sending emails.  SPF lists what machines on the internet are allowed to send as emails as you. DKIM adds a digital signature to your outgoing emails, allowing a receiver to check that signature and verify that the email is indeed from you and it hasn&#8217;t been modified in flight through the internet.</p>



<p>If you want to check if your domain is set up correctly, I suggest you use <a href="https://dmarcly.com/tools/" data-type="link" data-id="https://dmarcly.com/tools/">dmarcly.com/tools/</a>  Just enter your domain (the text on the right hand side of the &#8216;@&#8217; in your email address) into the SPF Checker and the DKIM Checker. If they both come back finding valid entries, there is nothing more you need to do. But if they come back as missing, this means from February 1st your emails might fail to get through to those using Google Email &#8211; if so, please contact your IT support to get this fixed, or if you are technically minded use the SPF Record Generator and DKIM Record Generator on the dmarcyl.com site, along with knowledge of your email set up and whom can send emails as you to correctly configure this.</p>



<p>The DKIM change will require your email programs to be set up to sign all your emails, this can be quite an involved process.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F01%2Fgoogle-email-changes-impact-small-businesses%2F&amp;linkname=Google%20email%20changes%20impact%20small%20businesses" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F01%2Fgoogle-email-changes-impact-small-businesses%2F&amp;linkname=Google%20email%20changes%20impact%20small%20businesses" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F01%2Fgoogle-email-changes-impact-small-businesses%2F&amp;linkname=Google%20email%20changes%20impact%20small%20businesses" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F01%2Fgoogle-email-changes-impact-small-businesses%2F&amp;linkname=Google%20email%20changes%20impact%20small%20businesses" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2024%2F01%2Fgoogle-email-changes-impact-small-businesses%2F&#038;title=Google%20email%20changes%20impact%20small%20businesses" data-a2a-url="https://www.aykira.com.au/2024/01/google-email-changes-impact-small-businesses/" data-a2a-title="Google email changes impact small businesses"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Predictions for 2024</title>
		<link>https://www.aykira.com.au/2023/12/security-predictions-for-2024/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Fri, 22 Dec 2023 00:48:47 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[2024]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3869</guid>

					<description><![CDATA[What I think are going to be the top 5 big cyber security themes in 2024.]]></description>
										<content:encoded><![CDATA[
<p>I thought I&#8217;d write a little summary of what I think are going to be the top 5 big events of 2024 in the cyber security space, based on my security &#8216;gut&#8217; and some patterns I&#8217;m seeing evolving&#8230;</p>



<h2 class="wp-block-heading">1. More bigger &amp; audacious hacks&#8230;</h2>



<p>A pretty obvious one, but I think 2024 is going have some truly monstrous hacks and in two main areas:</p>



<ul class="wp-block-list">
<li>Highly integrated SaaS product providers &#8211; these are SaaS products that tie into a lot of other SaaS services. In effect their surface area is large, complex and constantly evolving &#8211; I&#8217;m talking about Auth providers, data/API integrators, etc &#8211; any product offered up as a SaaS that takes data from a number of systems, manipulates that data and hands it onto a number of other systems. These face numerous security challenges including: separation/isolation between customers, resource cross talk, 3rd party integrations and &#8216;varied&#8217; authN/authZ coverage&#8230;</li>



<li>Health and &#8216;old&#8217; services &#8211; basically organisations with large data sets but not the resources to keep current on their security control coverage. These used to be unofficially &#8216;off limits&#8217; to the more ethical hackers, but the need to make money is winning out against any semblance of ethics..</li>
</ul>



<p>In essence there are two drivers here: &#8216;over the horizon&#8217; complexity (in other words all the stuff you cannot control or see), and just a simple inability to keep current.</p>



<h2 class="wp-block-heading">2. The AI security love-fest will start to come to an end&#8230;</h2>



<p>ATM you can&#8217;t look at any security product without it having some sprinkling of AI in it like some magic fairy dust that solves all your security problems (I&#8217;m just waiting for my cappuccino to come with AI!). We are in the &#8216;exciting but unproven&#8217; stage, where AI is being thrown at any problem to create differentiation in the market place. This will all come to a sorry end when a hack (maybe of the monstruous variety) occurs on a system that was meant to be protected by AI solutions and everyone will have their &#8216;a ha&#8217; moment. This will happen for sure in 2024, although whether it will fully see the light of day in 2024 is another matter.</p>



<p>In essence there is no getting away from the core security control requirements, AI is something you should carefully apply to layer on additional controls over the base set, it is NO substitute for such controls. Sorry, no free lunch via AI, plus to do it right you will need additional expenditure on resources to configure and keep it in tune (otherwise it will just go rotten over time).</p>



<p>I also think people will discover LLM&#8217;s have limited applicability in areas that require precise and correct language in ill defined and evolving problem spaces; in effect the effort spent training and correcting will be greater than just doing it by hand. There will be an illusion of efficiency that hides efforts to compensate for incorrectness (I call this the shiny tool illusion, i.e. its AI it must be better right?).</p>



<h2 class="wp-block-heading">3. The security skills shortage will continue</h2>



<p>This is just a sheer product of the aggregate security surface that&#8217;s out there, its growing somewhere North of 10% per annum (this is probably quite conservative if one takes into account all the cloud integrations and interdependencies), so if we aren&#8217;t creating at least 10% more security professionals per year, the skills shortage will keep getting worse. And, no, AI will not save you, see the previous point.</p>



<p>I actually don&#8217;t think we have a skills shortage problem, we actually have more of a skills leverage problem, i.e. the problems are not getting solved correctly as classes of problem &#8211; I&#8217;ll explain this thinking some more in a later article (it will blow your mind&#8230;).</p>



<h2 class="wp-block-heading">4. A rise in &#8216;junk&#8217; security certifications</h2>



<p>I&#8217;m seeing this a lot, people piling up their profiles or CV&#8217;s with essentially &#8216;junk&#8217; certs, and this will get even worse in 2024. Myself, I do not care what LinkedIn, AWS, MSFT, etc security course video you sat through and answered a short questionnaire on to pass; I want to see you actually doing the following:</p>



<ul class="wp-block-list">
<li>Doing a proper industry recognised certification that is actually hard to get and requires money and effort to keep;</li>



<li>Doing some online challenges (say Capture the Flag);</li>



<li>Contributing to a security library;</li>



<li>Finding vulnerabilities in services and responsibly reporting them;</li>



<li>Contributing to setting security standards.</li>
</ul>



<p>When I see someone loaded up on junk certs, its an instant red flag &#8211; so just stop doing it &#8211; it impresses nobody in the know and will actually stop you getting on in the security space, real knowledge requires real effort &#8211; get used to it and do it, no short cut to the top.</p>



<h2 class="wp-block-heading">5. Governmental Oversight/Policies</h2>



<p>In 2024 a lot more governments will start demanding more security regulation and general oversight of how society critical businesses go about their security operations. This is been growing in 2023 but I think a lot of regs and policies will be rolled out globally. This is a good thing by intention, but I still have my reservations over if it will truly change the risk dynamics for the better over the long term. Reason being if these just exist to set common baselines, then the hackers will adapt to look for weaknesses above the baseline. Hackers have the opportunity to think outside the box and use a variety of techniques to achieve their objectives, where as businesses are restricted in how they can adopt security controls in a lagging fashion.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>So what do you think? Am I being too much of a Security Grinch? Feel free to write below, I&#8217;ve enabled the comments for this article.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F12%2Fsecurity-predictions-for-2024%2F&amp;linkname=Security%20Predictions%20for%202024" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F12%2Fsecurity-predictions-for-2024%2F&amp;linkname=Security%20Predictions%20for%202024" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F12%2Fsecurity-predictions-for-2024%2F&amp;linkname=Security%20Predictions%20for%202024" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F12%2Fsecurity-predictions-for-2024%2F&amp;linkname=Security%20Predictions%20for%202024" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F12%2Fsecurity-predictions-for-2024%2F&#038;title=Security%20Predictions%20for%202024" data-a2a-url="https://www.aykira.com.au/2023/12/security-predictions-for-2024/" data-a2a-title="Security Predictions for 2024"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Cashless Disaster</title>
		<link>https://www.aykira.com.au/2023/10/the-cashless-disaster/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Mon, 23 Oct 2023 21:28:33 +0000</pubDate>
				<category><![CDATA[australia]]></category>
		<category><![CDATA[banks]]></category>
		<category><![CDATA[cash]]></category>
		<category><![CDATA[cashless]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3764</guid>

					<description><![CDATA[This article explains exactly what the cashless disaster is and why we should not be going down this road, it could literally result in the end of Australian society as we know it.]]></description>
										<content:encoded><![CDATA[
<p class="has-medium-font-size">Going cashless is presented as a way of modernizing our economy, a way of putting us at the forefront of modern financial technological development. In reality, this is more about financial institutions wanting to reduce their operational costs, raise transaction fees, and gain more visibility into what you do. This article explains exactly what the cashless disaster is and why we should not be going down this road, it could literally result in the end of Australian society as we know it.</p>



<h2 class="wp-block-heading">What really is cashless?</h2>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><a href="https://www.aykira.com.au/wp-content/uploads/2023/10/cashless.png"><img loading="lazy" decoding="async" width="700" height="492" src="https://www.aykira.com.au/wp-content/uploads/2023/10/cashless.png" alt="Cashless Payment" class="wp-image-3769" style="aspect-ratio:1.4227642276422765;width:300px;height:auto"/></a><figcaption class="wp-element-caption"><strong><em>Is it really worth it?</em> <em>Who benefits?</em></strong></figcaption></figure></div>


<p>Simply put, being cashless means having no physical currency to transact, instead, you depend upon electronic payment &#8216;proxies&#8217;, typically these are credit or debit cards but can also be token cards (like public transport cards). All these proxies have to make use of a computer network to transmit, record, and ultimately settle the transaction; no physical &#8216;cash&#8217; is ever involved, hence &#8216;cashless&#8217;. You are presenting an authorized token instead of cash and it&#8217;s processed through a computer network to settle the transaction.</p>



<p>On the face of it, this seems a great thing to encourage, no more fiddling with notes and coins to settle a transaction, instead you just swipe and go. The day-to-day convenience of this is highly attractive which is totally understandable, yet going completely down this road creates more problems than it solves, let me explain.</p>



<h2 class="wp-block-heading">Cashless knows what you did and where</h2>



<p>Compared to cash, cashless is totally traceable, everything from your weekly food shop to that coffee you just bought is recorded. Now on the face of it, this seems incident enough, yet this complete transactional history of you is highly valuable and who has access to this? Yep, your financial institutions. Such information can be used to:</p>



<ul class="wp-block-list">
<li><strong>Target their services to you</strong> &#8211; such as car loans, personal loans, insurance, etc</li>



<li><strong>Target other companies&#8217; services to you</strong> &#8211; buy a lot of coffee, maybe you might be interested in a loyalty card scheme? Recently bought a baby seat, how about a special offer on discounted nappies?</li>



<li><strong>Profile you as a customer</strong> &#8211; does your transactions indicate something undesirable about you as a customer? Is there fraud going on? Should your accounts be shut down as a safeguard? Does the government consider you a risk?</li>
</ul>



<p>The first point I don&#8217;t have that much trouble with, they have been effectively doing that for years, it&#8217;s the other two I have problems with. Once your financial institutions start sharing your financial transaction details (no matter how watered down or anonymized they are) it&#8217;s all out there and essentially impossible to bring back. Your very financial essence is there for companies to buy and trade. Plus, with the more information they collect, it becomes possible to deanonymize by the sheer weight of information collected. In effect, more data points allow the filling in of the gaps, which when combined with public data sources allow complete deanonymization.</p>



<p>The last point in the list is perhaps the most immediately scary, as this closing down of bank accounts has occurred in the UK and has occurred in Canada for those who <a href="https://www2.cbn.com/news/world/canadian-pastor-flees-kenya-escape-persecution-after-govt-froze-protesters-bank-accounts" data-type="link" data-id="https://www2.cbn.com/news/world/canadian-pastor-flees-kenya-escape-persecution-after-govt-froze-protesters-bank-accounts">sponsored the truckers</a>. BTW Most banks have in their T&amp;Cs the ability to shut down accounts for no reason.</p>



<p>Something I always find odd is that people don&#8217;t realize cashless records where you are and when. Every time you pay for something via cashless it creates a record of you being there doing that transaction at that precise moment in time. Every payment point is uniquely identified, and your literal walk through life is recorded in detail as a result.</p>



<p>Also with the knowledge of how much you spend at a certain time, it becomes possible to work out what you bought. For instance, visiting Star Bucks and spending $5.50 will indicate it&#8217;s likely you bought a large coffee. Visit JB HiFi and spend $1089. That can be matched to a certain TV that was the only item in the store at that price point at that moment in time. Going to your local petrol station once a week and spending around $50, you are filling up your car.</p>



<p>Then there is the other problem of retailers who have systems to track your buying behavior by using your cashless token ID as a tracer to build behavioral purchase profiles over time. They can then use this to target you for deals, or if they get your mobile number sell that information to a third party for targeted advertising. Now you are wondering why certain retailers are offering digital invoices, just give them your mobile number, it is so easy and convenient&#8230;</p>



<h2 class="wp-block-heading">Cashless is Fragile</h2>



<p>An aspect of cashless that is not discussed is that it is inherently fragile in operation compared to physical cash. A whole network of computers run by many different businesses is required to be working 24&#215;7, reaching into every single place you could possibly transact. This is not fully reliable, there needs to be alternatives. We have had situations where the networks of financial providers have gone down for extended periods and those merchants and individuals associated with the impacted provider have been unable to transact, nothing worked. Don&#8217;t believe me, here is a recent list:</p>



<ul class="wp-block-list">
<li><strong>CBA Systems </strong>&#8211;  <a href="https://www.itnews.com.au/news/cba-banking-services-suffer-10-hour-outage-566364" data-type="link" data-id="https://www.itnews.com.au/news/cba-banking-services-suffer-10-hour-outage-566364">23 June 2021</a>, <a href="https://www.examiner.com.au/story/8247449/commonwealth-bank-services-being-restored-after-outage/" data-type="link" data-id="https://www.examiner.com.au/story/8247449/commonwealth-bank-services-being-restored-after-outage/">26 June 2023</a></li>



<li><strong>NAB  Systems</strong>&#8211; <a href="https://www.abc.net.au/news/2020-10-19/nab-outage-across-australia/12783316" data-type="link" data-id="https://www.abc.net.au/news/2020-10-19/nab-outage-across-australia/12783316">19 October 2020</a></li>



<li><strong>Westpac Systems</strong> &#8211; <a href="https://www.nzherald.co.nz/business/westpac-merchant-customers-hit-by-third-party-app-outage/QRIM2NWQAFDZ7NKNTOO4PN5Q4I/" data-type="link" data-id="https://www.nzherald.co.nz/business/westpac-merchant-customers-hit-by-third-party-app-outage/QRIM2NWQAFDZ7NKNTOO4PN5Q4I/">9 Jan 2023</a></li>



<li><strong>Telstra Network</strong> &#8211; <a href="https://www.sbs.com.au/news/article/banks-shops-bounce-back-from-atm-and-eftpos-outage-across-australia/k94wlcvn9" data-type="link" data-id="https://www.sbs.com.au/news/article/banks-shops-bounce-back-from-atm-and-eftpos-outage-across-australia/k94wlcvn9">11 July 2019</a></li>



<li><strong>Square Systems</strong> &#8211; <a href="https://www.afr.com/companies/financial-services/square-payment-outage-raises-red-flags-at-the-reserve-bank-20230911-p5e3ow" data-type="link" data-id="https://www.afr.com/companies/financial-services/square-payment-outage-raises-red-flags-at-the-reserve-bank-20230911-p5e3ow">11 Sept 2023</a></li>



<li><strong>Tyro Payment Network</strong>&#8211; <a href="https://www.afr.com/companies/financial-services/tyro-ceo-will-need-to-rebuild-trust-after-outage-20210222-p574km" data-type="link" data-id="https://www.afr.com/companies/financial-services/tyro-ceo-will-need-to-rebuild-trust-after-outage-20210222-p574km">January 2021</a> lasted 3 weeks</li>
</ul>



<p>With each of these outages, millions of people were impacted. They were &#8216;cut out&#8217; of the cashless systems, unable to either give or take payments.</p>



<p>Now, what happens if you live in an area with limited or zero mobile network coverage? Yep, if you depend upon your mobile phone to tap to pay, there is a risk it will fail. Most digital wallets have to update their token keys from time to time, so if you are unable to pick the update up, your wallet won&#8217;t work (the old token you have is not valid in the central system). Also if your merchant suffers a network outage or bad connections, they won&#8217;t be able to complete the transaction. Reminds me of taxi drivers who I try to pay at my house and they have to go up the drive waving the terminal around to get a signal&#8230;</p>



<p>Something also not discussed is the human error aspect of all these systems, the people running them do make mistakes from time to time, some of these mistakes do cause massive outages &#8211; but others can be more targeted in their impact. Member for Menzies Keith Wolahan recently encountered a form of such silliness when his cards were all declined, simply because his bank wanted to <a href="https://www.news.com.au/finance/business/banking/not-a-conspiracy-federal-mp-shares-personal-bank-nightmare-as-he-warns-of-a-digital-identity-transition/news-story/8ce52b188f25f59c9855c598937f2f5c" data-type="link" data-id="https://www.news.com.au/finance/business/banking/not-a-conspiracy-federal-mp-shares-personal-bank-nightmare-as-he-warns-of-a-digital-identity-transition/news-story/8ce52b188f25f59c9855c598937f2f5c">verify his driver&#8217;s license</a>&#8230; Why they couldn&#8217;t notify him to verify his card prior to locking him out of his account is unknown, again human error in not creating a proper process. </p>



<h2 class="wp-block-heading">Bad Actors</h2>



<p>One aspect of this that is not often discussed is say you are a state actor with evil intentions for Australia, how easy would it be to take down the cashless systems and cause a prolonged outage? I would argue that it would be relatively easy for a competent state actor to seriously perturb such systems. I won&#8217;t describe the mechanisms of how this could be done, as that would be irresponsible, but knowing how the Internet and telecoms networks are put together and how businesses utilize such networks in many different ways &#8211; bringing it all to a screaming halt is quite viable.</p>



<p>Going cashless also enables a form of surveillance that bad actors could tap into. Any business connected to the cashless financial system is a worthwhile target as pieces of information can be merged together to gain an increasingly accurate overview of someone&#8217;s activity. Plus bad actors are able to just buy activity information from information brokers by pretending to be a marketing agency. Armed with such knowledge a bad actor can create very convincing phishing emails. There have even been cases of advertising platforms used to target malware to known persons of interest.</p>



<h2 class="wp-block-heading">Cashless is not Green</h2>



<p>Hopefully, it has not escaped your notice that in order to have the convenience of Tap-to-pay, a whole network of computers and terminals need to be powered 24&#215;7 to process those payments, this is an enormous power consumption combined with physical resources consumption. Just think every time you Tap-to-pay for your coffee you could be contributing to the climate problem. Cash in comparison consumes very little and is very reusable, coins and notes are designed to be very durable.</p>



<h2 class="wp-block-heading">Cashless Won&#8217;t Stop Criminals</h2>



<p>Cashless is often presented as a mechanism to deal with the Grey or Black Economy, a way of stopping criminals from washing money and enacting fraud. In part, yes, it will help but I would argue they would then adapt to the new reality. In a way, they are already adapting by utilizing &#8216;innocent&#8217; 3rd parties to perform their transactions, and financial institutions are having a hell of a time trying to stop it.</p>



<p>What I&#8217;m referring to is the use of &#8216;mule accounts&#8217;, this is where a criminal will gain access to someone&#8217;s financial account, and then use it as a means to move money around between 3rd parties without involving themselves directly. In effect, they &#8216;wash&#8217; the money through the mule account. This is on top of scammers gaining access to financial accounts and clearing them out.</p>



<p>Also, criminals are free to associate value with other forms of exchange, such as gold, diamonds, etc. All of which are completely untraceable. So I don&#8217;t think cashless is going to have a big impact on the Grey or Black Economy, rather it will catch the stupid criminals, but the smart ones will still get away as they always do.</p>



<h2 class="wp-block-heading">What should you do?</h2>



<p>Given the above and how cashless can often fail at the most critical of times. I recommend the following:</p>



<ul class="wp-block-list">
<li>Carry on you at least enough cash to get you home from work via a taxi times 2. Why times 2? Well if there is a mass outage of cashless services, the taxi rates will likely go up. Although you will be one of the few able to pay your way, you might be able to haggle!</li>



<li>Keep enough cash at home to buy the essentials for at least 1 week, i.e. 1 food shop and 1 car fill-up. This way you will be able to keep your home fed and move around.</li>



<li>For the smaller transactions, say under $10, go back to using cash. You might also find things are a little bit cheaper as the transaction handling fees or surcharges often silently get added on when using Cashless, this can be as high as 2%, which quickly adds up.</li>



<li>Contact your local MP and point out you are not happy with the bank branch closures and this move to being exclusively Cashless.</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Cashless, like all technology solutions, has its pros and cons. Unfortunately, I think in Australia, the upswing in cashless transactions during COVID is being used as an excuse to fundamentally scale down the cash part of the economy to save operational costs for banks, whilst the same banks are getting an uptick in transaction fees (which adds up to a lot) from the cashless settlement. With the current 80%+ usage of cashless, they can see it won&#8217;t take much to push out cash. This is not being driven at all by improving your convenience, you already have that, rather it&#8217;s to improve profitability for the banks.</p>



<p> I think this wholesale move to cashless is a massive disaster waiting to happen and will make Australia an easy target for state actors (or sophisticated hackers) to perturb when they want. Add onto this the fact the legislation to support this new financial order is woefully lacking in checks and balances and you can see why I think it is a bad idea. Cash has its uses and will continue to have its uses and needs to remain an equal method of settlement as cashless.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Did you find this article interesting? If so, please consider <a href="https://www.linkedin.com/in/keithmarlow/" data-type="link" data-id="https://www.linkedin.com/in/keithmarlow/">following me on LinkedIn</a>, I often post stories relating to cybersecurity, national security, and technology. Also have a look at the <a href="https://www.aykira.com.au/blog/" data-type="page" data-id="15">blog </a>on this site, where I often post longer-form articles and stories. Thank you.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-cashless-disaster%2F&amp;linkname=The%20Cashless%20Disaster" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-cashless-disaster%2F&amp;linkname=The%20Cashless%20Disaster" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-cashless-disaster%2F&amp;linkname=The%20Cashless%20Disaster" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-cashless-disaster%2F&amp;linkname=The%20Cashless%20Disaster" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-cashless-disaster%2F&#038;title=The%20Cashless%20Disaster" data-a2a-url="https://www.aykira.com.au/2023/10/the-cashless-disaster/" data-a2a-title="The Cashless Disaster"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enhancing Security and Customer Trust: The Role of ISO 27001 in Modern Businesses</title>
		<link>https://www.aykira.com.au/2023/10/enhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Tue, 17 Oct 2023 03:53:59 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[iso 27001]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3435</guid>

					<description><![CDATA[In this article, we describe ISO27001 pivotal role in improving cybersecurity resilience within a business, and how it can build customer trust. We also explain the process of getting ISO27001 certification.]]></description>
										<content:encoded><![CDATA[
<p class="left-line has-medium-font-size">In today&#8217;s digital age, businesses rely heavily on information technology systems to store, process, and transmit all kinds of sensitive data. As a result, the need for robust cybersecurity measures has never been more critical. Customers and partners alike expect organizations to safeguard their data, and breaches can lead to financial losses, reputational damage, and even legal consequences. Given this context, the International Organization for Standardization (ISO) developed ISO 27001, a comprehensive framework for information security management systems (ISMS). </p>



<p class="has-medium-font-size">This article explores how ISO 27001 helps businesses remain secure and attract customers by instilling confidence in their cybersecurity practices.</p>



<h2 class="wp-block-heading">Understanding ISO 27001</h2>



<p>ISO 27001 is a globally recognized standard that provides a systematic approach to managing and protecting sensitive information. It is part of the ISO 27000 family, which encompasses various information security standards. ISO 27001 specifically focuses on establishing, implementing, maintaining, and continually improving an ISMS within an organization.</p>



<p>An ISMS is a structured framework that integrates people, processes, and technology to manage information security risks effectively. It helps organizations identify and mitigate vulnerabilities, safeguard sensitive data, and ensure the confidentiality, integrity, and availability of information.</p>



<h2 class="wp-block-heading">ISO 27001&#8217;s Role in Information Security</h2>



<p>ISO 27001 plays a pivotal role in enhancing information security within organizations. Here&#8217;s how it contributes to this critical aspect of business operations:</p>



<h3 class="wp-block-heading"><strong>a) Risk Assessment and Management:</strong></h3>



<p>One of the fundamental principles of ISO 27001 is risk assessment and management. It requires organizations to systematically identify and assess information security risks. By doing so, companies can prioritize threats, implement appropriate controls, and continuously monitor and review their effectiveness. This proactive approach reduces the likelihood of security breaches and data leaks.</p>



<h3 class="wp-block-heading"><strong>b) Legal and Regulatory Compliance:</strong></h3>



<p>ISO 27001 helps businesses stay compliant with various data protection and privacy laws and regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), Prudential Standard CPS 234 Information Security, and the Australian Privacy Act. Compliance with these laws &amp; policies is crucial to avoiding costly penalties and maintaining customer trust.</p>



<h3 class="wp-block-heading"><strong>c) Improved Incident Response:</strong></h3>



<p>ISO 27001 provides guidelines for developing an effective incident response plan. Organizations can use this framework to prepare for potential security incidents, respond promptly when they occur, and minimize the impact on their operations and reputation.</p>



<h3 class="wp-block-heading"><strong>d) Employee Awareness and Training:</strong></h3>



<p>ISO 27001 emphasizes the importance of educating employees about information security. A well-trained workforce is more likely to recognize and report security threats, reducing the risk of insider threats and human errors.</p>



<h3 class="wp-block-heading"><strong>e) Continual Improvement:</strong></h3>



<p>ISO 27001 encourages organizations to continually improve their ISMS. This iterative process ensures that security controls remain effective in the face of evolving threats and technologies. Hackers and bad actors never stop trying new techniques to get into systems, so ongoing security improvement is key to remaining secure.</p>



<h2 class="wp-block-heading">Building Customer Trust through ISO 27001</h2>



<p>In an era where data breaches and cyberattacks are daily news, customers are becoming increasingly cautious about whom they trust with their personal information. ISO 27001 can be a powerful tool for businesses looking to build and maintain trust among their customer base.</p>



<h3 class="wp-block-heading"><strong>a) Demonstrating Commitment to Security:</strong></h3>



<p>When an organization obtains ISO 27001 certification, it sends a clear message to its customers: &#8220;We take information security seriously.&#8221; This commitment to protecting sensitive data can reassure customers and partners, making them more comfortable doing business with the certified organization. For certain customers, like government departments or financial businesses, having a security certification like ISO 27001 is a prerequisite to being considered.</p>



<h3 class="wp-block-heading"><strong>b) Enhancing Reputation:</strong></h3>



<p>A strong reputation for cybersecurity can be a significant competitive advantage. Organizations that are ISO 27001 certified are often seen as leaders in their industry when it comes to information security. Such a reputation can attract new customers and partners and retain existing ones.</p>



<h3 class="wp-block-heading"><strong>c) Reducing Security Concerns:</strong></h3>



<p>Customers are becoming increasingly aware of the risks associated with sharing their data. ISO 27001 certification can alleviate their concerns by demonstrating that an organization has implemented rigorous security measures and controls to protect their information. This can result in higher customer confidence and loyalty.</p>



<h3 class="wp-block-heading"><strong>d) Mitigating Data Breach Costs:</strong></h3>



<p>Data breaches can be financially devastating, with costs stemming from regulatory fines, legal actions, and reputational damage. ISO 27001 can help reduce the likelihood of a breach occurring in the first place, as well as minimize the associated costs if one does occur.</p>



<h2 class="wp-block-heading">The Certification Process</h2>



<p>Obtaining ISO 27001 certification is a structured process that involves several key steps:</p>



<h3 class="wp-block-heading"><strong>a) Gap Analysis:</strong></h3>



<p>The first step is to assess the organization&#8217;s existing information security practices against the ISO 27001 standard. This identifies gaps and areas that are in need of improvement. </p>



<h3 class="wp-block-heading"><strong>b) Risk Assessment:</strong></h3>



<p>At this step, a comprehensive risk assessment is conducted to identify potential threats and vulnerabilities to the organization&#8217;s information assets. Work is then done with the business to &#8216;bootstrap&#8217; a simple security &#8216;baseline&#8217; to start the process of securing the business, now that risks are starting to be identified and understood.</p>



<h3 class="wp-block-heading"><strong>c) ISMS Development:</strong></h3>



<p>Next an ISMS is developed and implemented based on ISO 27001&#8217;s requirements. This includes defining security policies, conducting risk assessments, and implementing controls. This starts to tie together an overarching process of business security.</p>



<h3 class="wp-block-heading"><strong>d) Internal Auditing:</strong></h3>



<p>Regular internal audits are conducted to ensure compliance with ISO 27001 and the effectiveness of security controls. With the first being done before the full external audit, to demonstrate operational compliance with ISO 27001.</p>



<h3 class="wp-block-heading"><strong>e) Certification Audit:</strong></h3>



<p>Next, an accredited certification body is engaged to perform an independent audit to assess the organization&#8217;s compliance with ISO 27001. If successful, the organization will receive ISO 27001 certification.</p>



<h3 class="wp-block-heading"><strong>f) Continual Improvement:</strong></h3>



<p>ISO 27001 emphasizes the importance of continual improvement. Organizations must regularly review and update their ISMS to adapt to changing threats and technologies.</p>



<p>Once certified the final three steps are often applied in a yearly cycle, this allows sufficient time for a business to apply ISO27001 whilst being able to collect evidence for the audits whilst not perturbing business activities too much. Yes, there is an overhead to maintaining ISO27001 but that should be outweighed by the ongoing risk reductions to the business. Plus over time it becomes part of &#8216;business as usual&#8217; operations.</p>



<br/>
<ins class="adsbygoogle"
     style="display:block; text-align:center;"
     data-ad-layout="in-article"
     data-ad-format="fluid"
     data-ad-client="ca-pub-7841961052900293"
     data-ad-slot="8083569842"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br/>



<h2 class="wp-block-heading">Challenges and Considerations</h2>



<p>While ISO 27001 offers significant benefits, achieving certification is not without its challenges:</p>



<h3 class="wp-block-heading"><strong>a) Resource Investment:</strong></h3>



<p>Implementing ISO 27001 requires a commitment of time, money, and personnel. Smaller organizations may find it more challenging to allocate the necessary resources.</p>



<h3 class="wp-block-heading"><strong>b) Cultural Change:</strong></h3>



<p>Adopting ISO 27001 often necessitates a cultural shift within an organization. Employees must understand and embrace the importance of information security. A good security team can make this an engaging and informative journey for the staff.</p>



<h3 class="wp-block-heading"><strong>c) Maintenance:</strong></h3>



<p>ISO 27001 certification is not a one-time achievement; it requires ongoing maintenance and continuous improvement to remain effective. Especially with respect to the technical aspects of cyber security in a modern business.</p>



<h3 class="wp-block-heading"><strong>d) Third-Party Relationships:</strong></h3>



<p>Organizations that rely on third-party vendors or suppliers must ensure that their partners also adhere to information security best practices to prevent vulnerabilities in the supply chain. This often requires an operational and technical examination of vendors to assess their security capabilities and if these meet the risk profile of the business.</p>



<h3 class="wp-block-heading"><strong>e) Regulatory Changes:</strong></h3>



<p>Regulatory requirements that relate to data protection and cybersecurity do change over time. Organizations must stay up-to-date with these changes to maintain compliance. Failure to do so could be costly.</p>



<h2 class="wp-block-heading">ISO 27001 Scoping</h2>



<p>An aspect of ISO 27001 often overlooked is that it does not need to be applied to a whole business, rather it can be scoped to the entity, location, or business unit of prime security concern. You could be a business that operates from a central head office with a few satellite offices. Those satellite offices might not be in a specific scope if the security controls of the head office segregate out the risks. This can have a dramatic impact on the cost and effort of maintaining compliance.</p>



<p>Scoping is often done with a specific high-level security objective in mind, for instance ensuring the security of customer data at all times.</p>



<h2 class="wp-block-heading">ISO 27001 Standards</h2>



<p>ISO 27001 is in reality part of a set of (currently) 5 interconnected standards, as follows:</p>



<ul class="wp-block-list">
<li>ISO 27000 &#8211; Defines the Information Security Management Systems (ISMS) and the vocabulary used by the other standard documents below.</li>



<li>ISO 27001 &#8211; ISMS Techniques, the required areas of implementing controls, and how risk is managed.</li>



<li>ISO 27002 &#8211; A catalog of information security controls that can be managed through the ISMS with specific advice and guidance.</li>



<li>ISO 27003 &#8211; guidance on the requirements for an ISMS and the associated required processes.</li>



<li>ISO 27004 &#8211; Guidelines on evaluating information security performance and the effectiveness of the ISMS.</li>
</ul>



<p>The standards get reviewed roughly every 5 years and updates are published, the most recent updates have focussed on data retention as a concern.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>ISO 27001 is a powerful tool for businesses seeking to enhance their information security practices and build trust with customers and partners. By implementing an ISMS based on ISO 27001&#8217;s framework, organizations can systematically identify, assess, and mitigate information security risks. This proactive approach not only reduces the likelihood of data breaches but also demonstrates a commitment to security that can attract and retain customers.</p>



<p>In an age where data breaches can have severe financial and reputational consequences, ISO 27001 certification offers a competitive advantage. It instills confidence in an organization&#8217;s cybersecurity practices, enhances its reputation, and mitigates the costs associated with security incidents.</p>



<p>While achieving ISO 27001 certification may present challenges, the long-term benefits far outweigh the initial investment. By embracing ISO 27001, businesses can not only remain secure but also thrive in an increasingly data-driven and interconnected world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size">At Aykira we consider ISO 27001 a critical element in making a business secure end-to-end; it creates and maintains a security-first mindset within the business. We also consider ISO 27001 a baseline for security, depending upon the security requirements of a business, they may need additional controls to ensure security risks are being properly managed.</p>



<p class="has-medium-font-size">If you would like to know how we can help you, please fill in the contact form below and we will get in touch.</p>



                <div class='gf_browser_unknown gform_wrapper' id='gform_wrapper_7' ><form method='post' enctype='multipart/form-data'  id='gform_7'  action='/feed/'>
                        <div class='gform_heading'>
                            <h3 class='gform_title'>Contacting Aykira</h3>
                            <span class='gform_description'>If you would like to arrange a call with us then please fill in the form below. We fully respect your privacy and any information given to us we treat as in confidence.</span>
                        </div>
                        <div class='gform_body'><ul id='gform_fields_7' class='gform_fields top_label form_sublabel_below description_below'><li id='field_7_1' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_1' >Your Name<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_7_1' type='text' value='' class='medium' maxlength='35' tabindex='1'   aria-required="true" aria-invalid="false" /></div></li><li id='field_7_2' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_2' >Your Telephone Number<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_text'><input name='input_2' id='input_7_2' type='text' value='' class='medium' maxlength='14' tabindex='2'   aria-required="true" aria-invalid="false" /></div></li><li id='field_7_3' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label gfield_label_before_complex' for='input_7_3' >Your Email Address<span class='gfield_required'>*</span></label><div class='ginput_complex ginput_container ginput_container_email' id='input_7_3_container'>
                                <span id='input_7_3_1_container' class='ginput_left'>
                                    <input class='' type='email' name='input_3' id='input_7_3' value='' tabindex='3'    aria-required="true" aria-invalid="false"/>
                                    <label for='input_7_3' >Enter Email</label>
                                </span>
                                <span id='input_7_3_2_container' class='ginput_right'>
                                    <input class='' type='email' name='input_3_2' id='input_7_3_2' value='' tabindex='4'   aria-required="true" aria-invalid="false"/>
                                    <label for='input_7_3_2' >Confirm Email</label>
                                </span>
                                <div class='gf_clear gf_clear_complex'></div>
                            </div></li><li id='field_7_4' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label'  >What are you contacting us about?<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_checkbox'><ul class='gfield_checkbox' id='input_7_4'><li class='gchoice_7_4_1'>
								<input name='input_4.1' type='checkbox'  value='Business Security'  id='choice_7_4_1' tabindex='5'  />
								<label for='choice_7_4_1' id='label_7_4_1'>Business Security</label>
							</li><li class='gchoice_7_4_2'>
								<input name='input_4.2' type='checkbox'  value='Securing Websites'  id='choice_7_4_2' tabindex='6'  />
								<label for='choice_7_4_2' id='label_7_4_2'>Securing Websites</label>
							</li><li class='gchoice_7_4_3'>
								<input name='input_4.3' type='checkbox'  value='Security Training &amp; Mentoring'  id='choice_7_4_3' tabindex='7'  />
								<label for='choice_7_4_3' id='label_7_4_3'>Security Training & Mentoring</label>
							</li><li class='gchoice_7_4_4'>
								<input name='input_4.4' type='checkbox'  value='Software Development'  id='choice_7_4_4' tabindex='8'  />
								<label for='choice_7_4_4' id='label_7_4_4'>Software Development</label>
							</li><li class='gchoice_7_4_5'>
								<input name='input_4.5' type='checkbox'  value='AI Security'  id='choice_7_4_5' tabindex='9'  />
								<label for='choice_7_4_5' id='label_7_4_5'>AI Security</label>
							</li><li class='gchoice_7_4_6'>
								<input name='input_4.6' type='checkbox'  value='Privacy Compliance'  id='choice_7_4_6' tabindex='10'  />
								<label for='choice_7_4_6' id='label_7_4_6'>Privacy, PII and Regulatory Compliance</label>
							</li><li class='gchoice_7_4_7'>
								<input name='input_4.7' type='checkbox'  value='Comment'  id='choice_7_4_7' tabindex='11'  />
								<label for='choice_7_4_7' id='label_7_4_7'>Leaving a Comment or Suggestion</label>
							</li></ul></div><div class='gfield_description'>Feel free to tick multiple entries that apply.</div></li><li id='field_7_5' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_5' >Your Message</label><div class='ginput_container ginput_container_textarea'><textarea name='input_5' id='input_7_5' class='textarea medium' tabindex='12'    aria-invalid="false"   rows='10' cols='50'></textarea></div><div class='gfield_description'>Please outline what you would like us to do for you, please indicate if you have an idea of budget and have a briefing or outline document for the work you would like done (for instance a systems design document or technical specification).</div></li><li id='field_7_7' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label'  >File Attachment</label><div class='ginput_container ginput_container_fileupload'><div id='gform_multifile_upload_7_7' data-settings='{&quot;runtimes&quot;:&quot;html5,flash,html4&quot;,&quot;browse_button&quot;:&quot;gform_browse_button_7_7&quot;,&quot;container&quot;:&quot;gform_multifile_upload_7_7&quot;,&quot;drop_element&quot;:&quot;gform_drag_drop_area_7_7&quot;,&quot;filelist&quot;:&quot;gform_preview_7_7&quot;,&quot;unique_names&quot;:true,&quot;file_data_name&quot;:&quot;file&quot;,&quot;url&quot;:&quot;https:\/\/www.aykira.com.au\/?gf_page=a479fbbd6194d7f&quot;,&quot;flash_swf_url&quot;:&quot;https:\/\/www.aykira.com.au\/wp-includes\/js\/plupload\/plupload.flash.swf&quot;,&quot;silverlight_xap_url&quot;:&quot;https:\/\/www.aykira.com.au\/wp-includes\/js\/plupload\/plupload.silverlight.xap&quot;,&quot;filters&quot;:{&quot;mime_types&quot;:[{&quot;title&quot;:&quot;Allowed Files&quot;,&quot;extensions&quot;:&quot;txt,pdf,jpg,gif,png&quot;}],&quot;max_file_size&quot;:&quot;2097152b&quot;},&quot;multipart&quot;:true,&quot;urlstream_upload&quot;:false,&quot;multipart_params&quot;:{&quot;form_id&quot;:7,&quot;field_id&quot;:7},&quot;gf_vars&quot;:{&quot;max_files&quot;:&quot;3&quot;,&quot;message_id&quot;:&quot;gform_multifile_messages_7_7&quot;,&quot;disallowed_extensions&quot;:[&quot;php&quot;,&quot;asp&quot;,&quot;aspx&quot;,&quot;cmd&quot;,&quot;csh&quot;,&quot;bat&quot;,&quot;html&quot;,&quot;htm&quot;,&quot;hta&quot;,&quot;jar&quot;,&quot;exe&quot;,&quot;com&quot;,&quot;js&quot;,&quot;lnk&quot;,&quot;htaccess&quot;,&quot;phtml&quot;,&quot;ps1&quot;,&quot;ps2&quot;,&quot;php3&quot;,&quot;php4&quot;,&quot;php5&quot;,&quot;php6&quot;,&quot;py&quot;,&quot;rb&quot;,&quot;tmp&quot;]}}' class='gform_fileupload_multifile'>
										<div id='gform_drag_drop_area_7_7' class='gform_drop_area'>
											<span class='gform_drop_instructions'>Drop files here or </span>
											<input id='gform_browse_button_7_7' type='button' value='Select files' class='button gform_button_select_files' aria-describedby='extensions_message' tabindex='13' />
										</div>
									</div><span id='extensions_message' class='screen-reader-text'>Accepted file types: txt, pdf, jpg, gif, png.</span><div class='validation_message'>
								<ul id='gform_multifile_messages_7_7'>
								</ul>
							</div></div><div id='gform_preview_7_7'></div><div class='gfield_description'>If you have a file you want to send us, please attach here. We only allow TXT, PDF's, GIF's, PNG and JPEGs.</div></li><li id='field_7_6' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_6' >Captcha</label><div id='input_7_6' class='ginput_container ginput_recaptcha' data-sitekey='6Ld-V-USAAAAAOLFNnOZLL1Nlfp8R94idCGlW-qX'  data-theme='light' ></div></li><li id='field_7_8' class='gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_' ><label class='gfield_label' for='input_7_8' >Name</label><div class='ginput_container'><input name='input_8' id='input_7_8' type='text' value='' autocomplete='off'/></div><div class='gfield_description'>This field is for validation purposes and should be left unchanged.</div></li>
                            </ul></div>
        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_7' class='gform_button button' value='Submit Your Enquiry' tabindex='14' onclick='if(window["gf_submitting_7"]){return false;}  if( !jQuery("#gform_7")[0].checkValidity || jQuery("#gform_7")[0].checkValidity()){window["gf_submitting_7"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window["gf_submitting_7"]){return false;} if( !jQuery("#gform_7")[0].checkValidity || jQuery("#gform_7")[0].checkValidity()){window["gf_submitting_7"]=true;}  jQuery("#gform_7").trigger("submit",[true]); }' /> 
            <input type='hidden' class='gform_hidden' name='is_submit_7' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='7' />
            
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_7' value='WyJbXSIsIjY4OGE4YzgyOWVjYWRhZDlkNjllOTliNTE5YjQ5YWQzIl0=' />
            <input type='hidden' class='gform_hidden' name='gform_target_page_number_7' id='gform_target_page_number_7' value='0' />
            <input type='hidden' class='gform_hidden' name='gform_source_page_number_7' id='gform_source_page_number_7' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            <input type='hidden' name='gform_uploaded_files' id='gform_uploaded_files_7' value='' />
        </div>
                        </form>
                        </div><script type='text/javascript'> if(typeof gf_global == 'undefined') var gf_global = {"gf_currency_config":{"name":"Australian Dollar","symbol_left":"$","symbol_right":"","symbol_padding":" ","thousand_separator":",","decimal_separator":".","decimals":2},"base_url":"https:\/\/www.aykira.com.au\/wp-content\/plugins\/gravityforms","number_formats":[],"spinnerUrl":"https:\/\/www.aykira.com.au\/wp-content\/plugins\/gravityforms\/images\/spinner.gif"};jQuery(document).bind('gform_post_render', function(event, formId, currentPage){if(formId == 7) {jQuery('#input_7_1').textareaCount(    {    'maxCharacterSize': 35,    'originalStyle': 'ginput_counter',	 'truncate': true,	 'errorStyle' : '',    'displayFormat' : '#input of #max max characters'    } );jQuery('#input_7_2').textareaCount(    {    'maxCharacterSize': 14,    'originalStyle': 'ginput_counter',	 'truncate': true,	 'errorStyle' : '',    'displayFormat' : '#input of #max max characters'    } );				jQuery( "#gform_7" ).on( 'submit', function( event ) {
					jQuery( '<input>' )
						.attr( 'type', 'hidden' )
						.attr( 'name', 'gf_zero_spam_key' )
						.attr( 'value', 'UiV9ZLB^^akWPjK5RpLXK2gcd(HDO2Ze7s7X5ef#(IxsV6qfyGqhr&amp;Xq6e3d*Cfp' )
						.attr( 'autocomplete', 'new-password' )
		.appendTo( jQuery( this ) );
				} );} } );jQuery(document).bind('gform_post_conditional_logic', function(event, formId, fields, isInit){} );</script><script type='text/javascript'> jQuery(document).ready(function(){jQuery(document).trigger('gform_post_render', [7, 1]) } ); </script>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fenhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses%2F&amp;linkname=Enhancing%20Security%20and%20Customer%20Trust%3A%20The%20Role%20of%20ISO%2027001%20in%20Modern%20Businesses" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fenhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses%2F&amp;linkname=Enhancing%20Security%20and%20Customer%20Trust%3A%20The%20Role%20of%20ISO%2027001%20in%20Modern%20Businesses" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fenhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses%2F&amp;linkname=Enhancing%20Security%20and%20Customer%20Trust%3A%20The%20Role%20of%20ISO%2027001%20in%20Modern%20Businesses" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fenhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses%2F&amp;linkname=Enhancing%20Security%20and%20Customer%20Trust%3A%20The%20Role%20of%20ISO%2027001%20in%20Modern%20Businesses" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fenhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses%2F&#038;title=Enhancing%20Security%20and%20Customer%20Trust%3A%20The%20Role%20of%20ISO%2027001%20in%20Modern%20Businesses" data-a2a-url="https://www.aykira.com.au/2023/10/enhancing-security-and-customer-trust-the-role-of-iso-27001-in-modern-businesses/" data-a2a-title="Enhancing Security and Customer Trust: The Role of ISO 27001 in Modern Businesses"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Strengthening the Fortress: The Crucial Role of Attack Surface Management in Business</title>
		<link>https://www.aykira.com.au/2023/10/strengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Tue, 10 Oct 2023 05:15:14 +0000</pubDate>
				<category><![CDATA[australia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[techniques]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3421</guid>

					<description><![CDATA[This article delves into the importance of attack surface management, highlighting specific areas that require careful consideration to ensure the security of an organization.]]></description>
										<content:encoded><![CDATA[
<p class="left-line has-medium-font-size">In today&#8217;s digital age, businesses rely heavily on technology to operate efficiently, communicate with customers, and stay competitive. While technology brings numerous benefits, it also exposes organizations to a wide range of cyber threats. It is imperative to understand the significance of attack surface management and its role in safeguarding a business from potential threats. </p>



<p>This article delves into the importance of attack surface management, highlighting specific areas that require careful consideration to ensure the security of an organization.</p>



<h2 class="wp-block-heading">I. Understanding Attack Surface Management</h2>



<p>Attack surface management (ASM) refers to the practice of identifying, monitoring, and reducing an organization&#8217;s attack surface, which encompasses all the potential points of entry that adversaries could exploit to compromise your systems and data. By proactively managing your attack surface, you can significantly enhance your cybersecurity posture and minimize the risk of successful cyberattacks.</p>



<h3 class="wp-block-heading">Why Attack Surface Management Matters</h3>



<ol class="wp-block-list">
<li><strong>Protection Against Evolving Threats</strong></li>
</ol>



<p>Cyber threats are constantly evolving, becoming more sophisticated and adaptable. Attackers look for vulnerabilities to exploit, making it crucial for businesses to stay ahead of potential threats. ASM helps organizations identify and address vulnerabilities before malicious actors can take advantage of them, thereby reducing the risk of data breaches, financial losses, and reputational damage.</p>



<ol class="wp-block-list" start="2">
<li><strong>Regulatory Compliance</strong></li>
</ol>



<p>Compliance with data protection regulations, such as GDPR, HIPAA, or CCPA, is a legal requirement for many businesses. Failure to comply can result in severe fines and legal consequences. ASM aids in maintaining compliance by ensuring that sensitive data remains secure and is not exposed to unauthorized access.</p>



<ol class="wp-block-list" start="3">
<li><strong>Business Continuity</strong></li>
</ol>



<p>A cyberattack can disrupt business operations, causing downtime, loss of revenue, and damage brand reputation. Effective ASM helps protect your organization&#8217;s critical assets, ensuring business continuity even in the face of cyber threats.</p>



<h2 class="wp-block-heading">II. Key Areas of Focus in Attack Surface Management</h2>



<p>To implement effective attack surface management, management should be aware of the specific areas that require careful attention to enhance security. These areas include:</p>



<h3 class="wp-block-heading">A) Network Security</h3>



<ol class="wp-block-list">
<li><strong>Perimeter Security</strong></li>
</ol>



<p>Securing the network perimeter is a fundamental aspect of ASM. Ensure that firewalls, intrusion detection systems, and intrusion prevention systems are in place and regularly updated to safeguard against unauthorized access and cyberattacks. This is often your first line of defence, so it is critical this is performing well.</p>



<ol class="wp-block-list" start="2">
<li><strong>Vulnerability Scanning</strong></li>
</ol>



<p>Regular vulnerability scans are essential to identify weaknesses in the network infrastructure. These scans should be conducted on both internal and external systems to pinpoint potential entry points for attackers.</p>



<h3 class="wp-block-heading">B) Web Application Security</h3>



<ol class="wp-block-list">
<li><strong>Secure Software Development</strong></li>
</ol>



<p>Review the software development process to ensure secure coding practices are followed. Implement secure development methodologies, conduct regular code reviews, and utilize tools for static and dynamic application security testing (SAST and DAST) to detect and rectify vulnerabilities early in the development lifecycle.</p>



<ol class="wp-block-list" start="2">
<li><strong>Web Application Firewall (WAF)</strong></li>
</ol>



<p>Deploy a Web Application Firewall to protect web-facing applications from common attacks like SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Regularly update and configure the WAF to stay protected against emerging threats.</p>



<h3 class="wp-block-heading">C) Endpoint Security</h3>



<ol class="wp-block-list">
<li><strong>Endpoint Detection and Response (EDR)</strong></li>
</ol>



<p>Implement EDR solutions to monitor and respond to threats on endpoints like laptops, desktops, and mobile devices. These tools can provide real-time visibility into suspicious activities and allow for rapid incident response.</p>



<ol class="wp-block-list" start="2">
<li><strong>Patch Management</strong></li>
</ol>



<p>Regularly apply software and system updates to address vulnerabilities and keep endpoints secure. An outdated system or application can be a prime target for attackers. This is especially important when zero days and other high impact vulnerabilities appear regularly in Operating Systems and key business applications.</p>



<h3 class="wp-block-heading">D) Cloud Security</h3>



<ol class="wp-block-list">
<li><strong>Cloud Configuration</strong></li>
</ol>



<p>Ensure that your cloud infrastructure is configured securely, following best practices from cloud service providers. Misconfigured cloud resources can lead to critical data exposure and security breaches. Quite a few major data breaches have been due to simple oversights in how cloud infrastructure is configured.</p>



<ol class="wp-block-list" start="2">
<li><strong>Identity and Access Management (IAM)</strong></li>
</ol>



<p>Implement robust IAM policies and controls to manage user access to cloud services. Limit privileges based on the principle of least privilege (PoLP) to reduce the risk of unauthorized access.</p>



<h3 class="wp-block-heading">E) Employee Training and Awareness</h3>



<p>Human error is a significant factor in cyber incidents. Your attack surface includes the human element, making employee training and awareness an essential component of ASM.</p>



<ol class="wp-block-list">
<li><strong>Security Training</strong></li>
</ol>



<p>Invest in cybersecurity training for employees to raise awareness of security best practices. Educated employees are more likely to recognize and report suspicious activities, reducing the risk of social engineering attacks. This helps share some of workload in detecting security issues.</p>



<ol class="wp-block-list" start="2">
<li><strong>Phishing Awareness</strong></li>
</ol>



<p>Train employees to recognize phishing attempts and other social engineering tactics used by attackers. Conduct regular phishing simulation exercises to assess and improve the organization&#8217;s readiness.</p>



<h2 class="wp-block-heading">III. The Role of Senior Management</h2>



<p>Senior management play a crucial role in ensuring the success of attack surface management within an organization:</p>



<h3 class="wp-block-heading">A) Leadership and Support</h3>



<ol class="wp-block-list">
<li><strong>Allocate Resources</strong></li>
</ol>



<p>Provide the necessary budget and resources for ASM initiatives. Investing in cybersecurity is an investment in the organization&#8217;s long-term stability and reputation.</p>



<ol class="wp-block-list" start="2">
<li><strong>Set a Security Culture</strong></li>
</ol>



<p>Promote a culture of security throughout the organization, emphasizing its importance and making security a shared responsibility among all employees.</p>



<h3 class="wp-block-heading">B) Risk Management</h3>



<ol class="wp-block-list">
<li><strong>Risk Assessment</strong></li>
</ol>



<p>Conduct regular risk assessments to identify the most critical areas of concern within your attack surface. Prioritize remediation efforts based on the potential impact and likelihood of threats.</p>



<ol class="wp-block-list" start="2">
<li><strong>Incident Response Planning</strong></li>
</ol>



<p>Develop and maintain an incident response plan that outlines the steps to take in the event of a security breach. Test the plan periodically to ensure it is effective.</p>



<h3 class="wp-block-heading">C) Compliance and Governance</h3>



<ol class="wp-block-list">
<li><strong>Regulatory Compliance</strong></li>
</ol>



<p>Stay informed about evolving data protection regulations and ensure that your organization complies with relevant laws and standards. Failure to do so can result in legal repercussions. Compliance might even be a critical requirement to operate in certain business sectors or to supply services to large government agencies.</p>



<ol class="wp-block-list" start="2">
<li><strong>Board Reporting</strong></li>
</ol>



<p>Regularly report on the status of ASM initiatives to the board of directors, keeping them informed of the organization&#8217;s cybersecurity posture and any emerging threats.</p>



<h3 class="wp-block-heading">D) Collaboration</h3>



<ol class="wp-block-list">
<li><strong>Cross-Functional Teams</strong></li>
</ol>



<p>Foster collaboration between IT, security, legal, and other departments. A multidisciplinary approach can help identify and address attack surface vulnerabilities more effectively.</p>



<ol class="wp-block-list" start="2">
<li><strong>External Partnerships</strong></li>
</ol>



<p>Engage with external cybersecurity experts and organizations to gain insights into emerging threats and best practices. Attend industry conferences and forums to stay current.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>In an increasingly digital world, businesses face a growing array of cyber threats that can have severe consequences. Attack surface management is a critical practice for safeguarding your organization&#8217;s assets, data, and reputation. Management must recognize the importance of ASM and actively support its implementation. By focusing on network security, web application security, endpoint security, cloud security, and employee training, and by embracing a leadership role in risk management, compliance, and collaboration, management can play a pivotal role in strengthening the organization&#8217;s cybersecurity posture. In doing so, they can better protect the business from the ever-evolving landscape of cyber threats and ensure its long-term success.</p>



<p>In conclusion, attack surface management is not just a technical concern but a strategic imperative. It is the foundation upon which a resilient and secure organization is built. Management&#8217;s commitment to understanding, investing in, and leading ASM efforts can make all the difference in a world where cyber threats are a constant and evolving challenge. Through their leadership, organizations can forge a path towards a secure and prosperous future in the digital age.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fstrengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business%2F&amp;linkname=Strengthening%20the%20Fortress%3A%20The%20Crucial%20Role%20of%20Attack%20Surface%20Management%20in%20Business" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fstrengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business%2F&amp;linkname=Strengthening%20the%20Fortress%3A%20The%20Crucial%20Role%20of%20Attack%20Surface%20Management%20in%20Business" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fstrengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business%2F&amp;linkname=Strengthening%20the%20Fortress%3A%20The%20Crucial%20Role%20of%20Attack%20Surface%20Management%20in%20Business" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fstrengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business%2F&amp;linkname=Strengthening%20the%20Fortress%3A%20The%20Crucial%20Role%20of%20Attack%20Surface%20Management%20in%20Business" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fstrengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business%2F&#038;title=Strengthening%20the%20Fortress%3A%20The%20Crucial%20Role%20of%20Attack%20Surface%20Management%20in%20Business" data-a2a-url="https://www.aykira.com.au/2023/10/strengthening-the-fortress-the-crucial-role-of-attack-surface-management-in-business/" data-a2a-title="Strengthening the Fortress: The Crucial Role of Attack Surface Management in Business"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguarding the Foundations: The Crucial Role of Cybersecurity in Real Estate</title>
		<link>https://www.aykira.com.au/2023/10/safeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Tue, 10 Oct 2023 04:08:47 +0000</pubDate>
				<category><![CDATA[security]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[real estate]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3419</guid>

					<description><![CDATA[In this article, we will explore why cybersecurity is essential in the real estate sector, the specific threats it faces, and strategies to protect against them.]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction</h2>



<p class="left-line has-medium-font-size">In an era where digital technologies have revolutionized the way businesses operate, the real estate industry has not remained untouched. The adoption of technology has streamlined processes, improved customer experiences, and expanded the reach of real estate businesses. However, it has also exposed them to new and evolving threats in the form of cyberattacks. The importance of cybersecurity in a real estate business cannot be overstated. </p>



<p>In this article, we will explore why cybersecurity is essential in the real estate sector, the specific threats it faces, and strategies to protect against them.</p>



<h2 class="wp-block-heading">I. The Digital Transformation of Real Estate</h2>



<p>The real estate industry has undergone a significant transformation in recent years, largely driven by technology. Here are some key aspects of this transformation:</p>



<ol class="wp-block-list">
<li><strong>Online Property Listings</strong>: Gone are the days when potential buyers or tenants relied solely on print ads and physical visits to properties. Online listings have become the norm, allowing individuals to explore a wide range of properties from the comfort of their homes.</li>



<li><strong>Data Analytics</strong>: Real estate companies now use data analytics to make informed decisions about property investments, pricing, and market trends. This data-driven approach has become invaluable in the industry.</li>



<li><strong>Virtual Tours and Augmented Reality</strong>: Virtual reality (VR) and augmented reality (AR) have made it possible for potential buyers or renters to take virtual tours of properties. This immersive experience can help clients make quicker and more informed decisions.</li>



<li><strong>Property Management Software</strong>: Real estate firms use property management software to efficiently handle tasks such as rent collection, maintenance scheduling, and tenant communication. These tools improve operational efficiency and customer service.</li>



<li><strong>Online Transactions</strong>: Digital payment systems and electronic signatures have simplified and expedited property transactions. The entire process, from offer to closing, can now be completed online.</li>
</ol>



<h2 class="wp-block-heading">II. Cybersecurity Threats in Real Estate</h2>



<p>As real estate businesses have embraced digital technologies, they have become prime targets for cybercriminals. Here are some of the key cybersecurity threats faced by the industry:</p>



<ol class="wp-block-list">
<li><strong>Data Breaches</strong>: Real estate companies collect and store sensitive information about their clients, including personal and financial data. A data breach can result in the exposure of this confidential information, leading to financial loss and reputational damage. For instance, Real estate firm OrangeTee &amp; Tie has been <a href="https://www.hcamag.com/asia/news/general/real-estate-firm-fined-for-data-breach-compromising-employee-data/443286" data-type="link" data-id="https://www.hcamag.com/asia/news/general/real-estate-firm-fined-for-data-breach-compromising-employee-data/443286">ordered</a> to pay $37,000 following a data breach in the company that compromised the information of over 250,000 employees and customers</li>



<li><strong>Phishing Attacks</strong>: Cybercriminals often use phishing emails to trick employees into revealing sensitive information or downloading malware. Real estate professionals, who regularly communicate with clients and partners via email, are susceptible to such attacks. For instance, Real estate companies have lost more than $100,000 to <a href="https://www.news.com.au/national/crime/real-estate-scams-prompt-warning-from-antiscam-agency/news-story/2ab80e337ac8a1becc26f933c187162d" data-type="link" data-id="https://www.news.com.au/national/crime/real-estate-scams-prompt-warning-from-antiscam-agency/news-story/2ab80e337ac8a1becc26f933c187162d">phone scammers</a> pretending to be from major banks.</li>



<li><strong>Ransomware</strong>: Ransomware attacks can disrupt business operations by encrypting critical data and demanding a ransom for its release. Real estate companies that rely on digital records and transactions can be severely impacted by such incidents.</li>



<li><strong>Unauthorized Access</strong>: Unauthorized access to databases or property management systems can lead to data manipulation or theft. This can have legal and financial repercussions for both the real estate business and its clients.</li>



<li><strong>Insider Threats</strong>: Employees with access to sensitive information can pose a threat if they misuse their privileges or inadvertently expose the company to risks. Proper access controls and monitoring are essential to mitigate this threat.</li>
</ol>



<p>Such is the threat of cyberattacks to real estate businesses that Real Estate Institute of Australia (REIA) President Hayden Groves <a href="https://www.apimagazine.com.au/news/article/cybercrime-threat-to-real-estate-sector-intensifying" data-type="link" data-id="https://www.apimagazine.com.au/news/article/cybercrime-threat-to-real-estate-sector-intensifying">said</a> the risks for agents not securing their systems was enormous, to quote “With data breaches occurring frequently, REIA encourages all Australian real estate agencies to continue reviewing their cybersecurity and privacy policies, if they are not already, for their consumers and their own peace of mind”.</p>



<h2 class="wp-block-heading">III. The Consequences of Cybersecurity Incidents</h2>



<p>Understanding the potential consequences of cybersecurity incidents in the real estate industry is crucial to grasp the significance of safeguarding against them:</p>



<ol class="wp-block-list">
<li><strong>Financial Loss</strong>: Cyberattacks can result in substantial financial losses. This includes costs associated with data recovery, legal fees, and regulatory fines. Moreover, the reputational damage may lead to a loss of clients and revenue.</li>



<li><strong>Legal Consequences</strong>: Real estate companies must comply with various data protection regulations, such as the General Data Protection Regulation (GDPR) and the Australian Privacy Act 1988. Failing to protect client data can lead to legal penalties.</li>



<li><strong>Reputational Damage</strong>: Trust is paramount in the real estate industry. A data breach or cyberattack can erode trust among clients and partners, damaging the company&#8217;s reputation.</li>



<li><strong>Disruption of Operations</strong>: Cyberattacks can disrupt business operations, leading to delays in property transactions, client dissatisfaction, and loss of productivity.</li>



<li><strong>Loss of Intellectual Property</strong>: Real estate firms often have proprietary data and strategies. Cyberattacks can result in the theft of valuable intellectual property, giving competitors an unfair advantage.</li>
</ol>



<h2 class="wp-block-heading">IV. Strategies for Cybersecurity in Real Estate</h2>



<p>Given the importance of cybersecurity in the real estate sector, here are some of the strategies that businesses can implement to protect themselves:</p>



<ol class="wp-block-list">
<li><strong>Employee Training</strong>: The first line of defense against cyber threats is a well-informed and vigilant workforce. Regularly train employees on recognizing and responding to phishing attacks and other security threats.</li>



<li><strong>Strong Password Policies</strong>: Implement strong password policies that require employees to use complex passwords and change them regularly. Consider using multi-factor authentication for added security.</li>



<li><strong>Data Encryption</strong>: Encrypt sensitive data both in transit and at rest. This ensures that even if unauthorized access occurs, the data remains unreadable.</li>



<li><strong>Regular Updates and Patch Management</strong>: Keep all software, operating systems, and security solutions up to date. Cybercriminals often exploit known vulnerabilities, so timely patching is essential.</li>



<li><strong>Network Security</strong>: Employ robust firewalls, intrusion detection systems, and antivirus software to protect against external threats. Regularly audit and monitor network traffic for suspicious activity.</li>



<li><strong>Data Backups</strong>: Regularly back up critical data to secure offsite locations. In the event of a ransomware attack or data loss, having backups ensures business continuity.</li>



<li><strong>Incident Response Plan</strong>: Develop and regularly update an incident response plan that outlines the steps to take in the event of a cybersecurity incident. Test this plan through simulated drills.</li>



<li><strong>Vendor Risk Assessment</strong>: Assess the cybersecurity practices of third-party vendors and partners who have access to your data. Ensure they meet your security standards.</li>



<li><strong>Compliance with Regulations</strong>: Stay informed about and comply with relevant data protection regulations. This includes ensuring client consent for data collection and having mechanisms in place for data access requests.</li>



<li><strong>Cybersecurity Insurance</strong>: Consider investing in cybersecurity insurance to mitigate the financial risks associated with cyber incidents.</li>
</ol>



<h2 class="wp-block-heading">Conclusion</h2>



<p>In the digital age, the real estate industry&#8217;s reliance on technology makes it susceptible to cyber threats. The importance of cybersecurity to a real estate business cannot be overstressed, as the consequences of a breach can be severe. Implementing robust cybersecurity measures, along with employee training and compliance with data protection regulations, is essential to safeguarding the foundations of a real estate business. As technology continues to play a pivotal role in the industry&#8217;s growth, cybersecurity must remain a top priority to ensure trust, protect client data, and maintain operational integrity.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-medium-font-size">If you operate a real estate business, Aykira can provide you with expert guidance on how to secure your systems and keep your customers safe. If you are interested in our services, please fill in the form below and we will get back to you.</p>



                <div class='gf_browser_unknown gform_wrapper' id='gform_wrapper_7' ><form method='post' enctype='multipart/form-data'  id='gform_7'  action='/feed/'>
                        <div class='gform_heading'>
                            <h3 class='gform_title'>Contacting Aykira</h3>
                            <span class='gform_description'>If you would like to arrange a call with us then please fill in the form below. We fully respect your privacy and any information given to us we treat as in confidence.</span>
                        </div>
                        <div class='gform_body'><ul id='gform_fields_7' class='gform_fields top_label form_sublabel_below description_below'><li id='field_7_1' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_1' >Your Name<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_7_1' type='text' value='' class='medium' maxlength='35' tabindex='1'   aria-required="true" aria-invalid="false" /></div></li><li id='field_7_2' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_2' >Your Telephone Number<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_text'><input name='input_2' id='input_7_2' type='text' value='' class='medium' maxlength='14' tabindex='2'   aria-required="true" aria-invalid="false" /></div></li><li id='field_7_3' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label gfield_label_before_complex' for='input_7_3' >Your Email Address<span class='gfield_required'>*</span></label><div class='ginput_complex ginput_container ginput_container_email' id='input_7_3_container'>
                                <span id='input_7_3_1_container' class='ginput_left'>
                                    <input class='' type='email' name='input_3' id='input_7_3' value='' tabindex='3'    aria-required="true" aria-invalid="false"/>
                                    <label for='input_7_3' >Enter Email</label>
                                </span>
                                <span id='input_7_3_2_container' class='ginput_right'>
                                    <input class='' type='email' name='input_3_2' id='input_7_3_2' value='' tabindex='4'   aria-required="true" aria-invalid="false"/>
                                    <label for='input_7_3_2' >Confirm Email</label>
                                </span>
                                <div class='gf_clear gf_clear_complex'></div>
                            </div></li><li id='field_7_4' class='gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label'  >What are you contacting us about?<span class='gfield_required'>*</span></label><div class='ginput_container ginput_container_checkbox'><ul class='gfield_checkbox' id='input_7_4'><li class='gchoice_7_4_1'>
								<input name='input_4.1' type='checkbox'  value='Business Security'  id='choice_7_4_1' tabindex='5'  />
								<label for='choice_7_4_1' id='label_7_4_1'>Business Security</label>
							</li><li class='gchoice_7_4_2'>
								<input name='input_4.2' type='checkbox'  value='Securing Websites'  id='choice_7_4_2' tabindex='6'  />
								<label for='choice_7_4_2' id='label_7_4_2'>Securing Websites</label>
							</li><li class='gchoice_7_4_3'>
								<input name='input_4.3' type='checkbox'  value='Security Training &amp; Mentoring'  id='choice_7_4_3' tabindex='7'  />
								<label for='choice_7_4_3' id='label_7_4_3'>Security Training & Mentoring</label>
							</li><li class='gchoice_7_4_4'>
								<input name='input_4.4' type='checkbox'  value='Software Development'  id='choice_7_4_4' tabindex='8'  />
								<label for='choice_7_4_4' id='label_7_4_4'>Software Development</label>
							</li><li class='gchoice_7_4_5'>
								<input name='input_4.5' type='checkbox'  value='AI Security'  id='choice_7_4_5' tabindex='9'  />
								<label for='choice_7_4_5' id='label_7_4_5'>AI Security</label>
							</li><li class='gchoice_7_4_6'>
								<input name='input_4.6' type='checkbox'  value='Privacy Compliance'  id='choice_7_4_6' tabindex='10'  />
								<label for='choice_7_4_6' id='label_7_4_6'>Privacy, PII and Regulatory Compliance</label>
							</li><li class='gchoice_7_4_7'>
								<input name='input_4.7' type='checkbox'  value='Comment'  id='choice_7_4_7' tabindex='11'  />
								<label for='choice_7_4_7' id='label_7_4_7'>Leaving a Comment or Suggestion</label>
							</li></ul></div><div class='gfield_description'>Feel free to tick multiple entries that apply.</div></li><li id='field_7_5' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_5' >Your Message</label><div class='ginput_container ginput_container_textarea'><textarea name='input_5' id='input_7_5' class='textarea medium' tabindex='12'    aria-invalid="false"   rows='10' cols='50'></textarea></div><div class='gfield_description'>Please outline what you would like us to do for you, please indicate if you have an idea of budget and have a briefing or outline document for the work you would like done (for instance a systems design document or technical specification).</div></li><li id='field_7_7' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label'  >File Attachment</label><div class='ginput_container ginput_container_fileupload'><div id='gform_multifile_upload_7_7' data-settings='{&quot;runtimes&quot;:&quot;html5,flash,html4&quot;,&quot;browse_button&quot;:&quot;gform_browse_button_7_7&quot;,&quot;container&quot;:&quot;gform_multifile_upload_7_7&quot;,&quot;drop_element&quot;:&quot;gform_drag_drop_area_7_7&quot;,&quot;filelist&quot;:&quot;gform_preview_7_7&quot;,&quot;unique_names&quot;:true,&quot;file_data_name&quot;:&quot;file&quot;,&quot;url&quot;:&quot;https:\/\/www.aykira.com.au\/?gf_page=a479fbbd6194d7f&quot;,&quot;flash_swf_url&quot;:&quot;https:\/\/www.aykira.com.au\/wp-includes\/js\/plupload\/plupload.flash.swf&quot;,&quot;silverlight_xap_url&quot;:&quot;https:\/\/www.aykira.com.au\/wp-includes\/js\/plupload\/plupload.silverlight.xap&quot;,&quot;filters&quot;:{&quot;mime_types&quot;:[{&quot;title&quot;:&quot;Allowed Files&quot;,&quot;extensions&quot;:&quot;txt,pdf,jpg,gif,png&quot;}],&quot;max_file_size&quot;:&quot;2097152b&quot;},&quot;multipart&quot;:true,&quot;urlstream_upload&quot;:false,&quot;multipart_params&quot;:{&quot;form_id&quot;:7,&quot;field_id&quot;:7},&quot;gf_vars&quot;:{&quot;max_files&quot;:&quot;3&quot;,&quot;message_id&quot;:&quot;gform_multifile_messages_7_7&quot;,&quot;disallowed_extensions&quot;:[&quot;php&quot;,&quot;asp&quot;,&quot;aspx&quot;,&quot;cmd&quot;,&quot;csh&quot;,&quot;bat&quot;,&quot;html&quot;,&quot;htm&quot;,&quot;hta&quot;,&quot;jar&quot;,&quot;exe&quot;,&quot;com&quot;,&quot;js&quot;,&quot;lnk&quot;,&quot;htaccess&quot;,&quot;phtml&quot;,&quot;ps1&quot;,&quot;ps2&quot;,&quot;php3&quot;,&quot;php4&quot;,&quot;php5&quot;,&quot;php6&quot;,&quot;py&quot;,&quot;rb&quot;,&quot;tmp&quot;]}}' class='gform_fileupload_multifile'>
										<div id='gform_drag_drop_area_7_7' class='gform_drop_area'>
											<span class='gform_drop_instructions'>Drop files here or </span>
											<input id='gform_browse_button_7_7' type='button' value='Select files' class='button gform_button_select_files' aria-describedby='extensions_message' tabindex='13' />
										</div>
									</div><span id='extensions_message' class='screen-reader-text'>Accepted file types: txt, pdf, jpg, gif, png.</span><div class='validation_message'>
								<ul id='gform_multifile_messages_7_7'>
								</ul>
							</div></div><div id='gform_preview_7_7'></div><div class='gfield_description'>If you have a file you want to send us, please attach here. We only allow TXT, PDF's, GIF's, PNG and JPEGs.</div></li><li id='field_7_6' class='gfield field_sublabel_below field_description_below gfield_visibility_visible' ><label class='gfield_label' for='input_7_6' >Captcha</label><div id='input_7_6' class='ginput_container ginput_recaptcha' data-sitekey='6Ld-V-USAAAAAOLFNnOZLL1Nlfp8R94idCGlW-qX'  data-theme='light' ></div></li><li id='field_7_8' class='gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_' ><label class='gfield_label' for='input_7_8' >Name</label><div class='ginput_container'><input name='input_8' id='input_7_8' type='text' value='' autocomplete='off'/></div><div class='gfield_description'>This field is for validation purposes and should be left unchanged.</div></li>
                            </ul></div>
        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_7' class='gform_button button' value='Submit Your Enquiry' tabindex='14' onclick='if(window["gf_submitting_7"]){return false;}  if( !jQuery("#gform_7")[0].checkValidity || jQuery("#gform_7")[0].checkValidity()){window["gf_submitting_7"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window["gf_submitting_7"]){return false;} if( !jQuery("#gform_7")[0].checkValidity || jQuery("#gform_7")[0].checkValidity()){window["gf_submitting_7"]=true;}  jQuery("#gform_7").trigger("submit",[true]); }' /> 
            <input type='hidden' class='gform_hidden' name='is_submit_7' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='7' />
            
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_7' value='WyJbXSIsIjY4OGE4YzgyOWVjYWRhZDlkNjllOTliNTE5YjQ5YWQzIl0=' />
            <input type='hidden' class='gform_hidden' name='gform_target_page_number_7' id='gform_target_page_number_7' value='0' />
            <input type='hidden' class='gform_hidden' name='gform_source_page_number_7' id='gform_source_page_number_7' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            <input type='hidden' name='gform_uploaded_files' id='gform_uploaded_files_7' value='' />
        </div>
                        </form>
                        </div><script type='text/javascript'> if(typeof gf_global == 'undefined') var gf_global = {"gf_currency_config":{"name":"Australian Dollar","symbol_left":"$","symbol_right":"","symbol_padding":" ","thousand_separator":",","decimal_separator":".","decimals":2},"base_url":"https:\/\/www.aykira.com.au\/wp-content\/plugins\/gravityforms","number_formats":[],"spinnerUrl":"https:\/\/www.aykira.com.au\/wp-content\/plugins\/gravityforms\/images\/spinner.gif"};jQuery(document).bind('gform_post_render', function(event, formId, currentPage){if(formId == 7) {jQuery('#input_7_1').textareaCount(    {    'maxCharacterSize': 35,    'originalStyle': 'ginput_counter',	 'truncate': true,	 'errorStyle' : '',    'displayFormat' : '#input of #max max characters'    } );jQuery('#input_7_2').textareaCount(    {    'maxCharacterSize': 14,    'originalStyle': 'ginput_counter',	 'truncate': true,	 'errorStyle' : '',    'displayFormat' : '#input of #max max characters'    } );				jQuery( "#gform_7" ).on( 'submit', function( event ) {
					jQuery( '<input>' )
						.attr( 'type', 'hidden' )
						.attr( 'name', 'gf_zero_spam_key' )
						.attr( 'value', 'UiV9ZLB^^akWPjK5RpLXK2gcd(HDO2Ze7s7X5ef#(IxsV6qfyGqhr&amp;Xq6e3d*Cfp' )
						.attr( 'autocomplete', 'new-password' )
		.appendTo( jQuery( this ) );
				} );} } );jQuery(document).bind('gform_post_conditional_logic', function(event, formId, fields, isInit){} );</script><script type='text/javascript'> jQuery(document).ready(function(){jQuery(document).trigger('gform_post_render', [7, 1]) } ); </script>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fsafeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate%2F&amp;linkname=Safeguarding%20the%20Foundations%3A%20The%20Crucial%20Role%20of%20Cybersecurity%20in%20Real%20Estate" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fsafeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate%2F&amp;linkname=Safeguarding%20the%20Foundations%3A%20The%20Crucial%20Role%20of%20Cybersecurity%20in%20Real%20Estate" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fsafeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate%2F&amp;linkname=Safeguarding%20the%20Foundations%3A%20The%20Crucial%20Role%20of%20Cybersecurity%20in%20Real%20Estate" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fsafeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate%2F&amp;linkname=Safeguarding%20the%20Foundations%3A%20The%20Crucial%20Role%20of%20Cybersecurity%20in%20Real%20Estate" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fsafeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate%2F&#038;title=Safeguarding%20the%20Foundations%3A%20The%20Crucial%20Role%20of%20Cybersecurity%20in%20Real%20Estate" data-a2a-url="https://www.aykira.com.au/2023/10/safeguarding-the-foundations-the-crucial-role-of-cybersecurity-in-real-estate/" data-a2a-title="Safeguarding the Foundations: The Crucial Role of Cybersecurity in Real Estate"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Benefits and Risks to a Business of Using AI Language Models (LLMs)</title>
		<link>https://www.aykira.com.au/2023/10/the-benefits-and-risks-to-a-business-of-using-ai-language-models-llms/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Sun, 08 Oct 2023 03:59:37 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[pii]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3417</guid>

					<description><![CDATA[As businesses increasingly embrace LLMs, it's critical to examine the potential benefits and risks associated with their usage.]]></description>
										<content:encoded><![CDATA[
<p class="has-medium-font-size">Artificial Intelligence (AI) has made significant strides recently in transforming various industries, and one of its most noteworthy contributions is the development of AI-Language Models (LLMs). Powerful tools, such as GPT-3, have the ability to produce human-like text and have found applications in numerous sectors, including content creation, customer support, data analysis, and more. However, as businesses increasingly embrace LLMs, it&#8217;s critical to examine the potential benefits and risks associated with their usage.</p>



<h2 class="wp-block-heading">Benefits of Using AI-Language Models for Businesses</h2>



<ol class="wp-block-list">
<li><strong>Enhanced Efficiency and Productivity</strong></li>
</ol>



<p>AI LLMs can automate a wide range of tasks that require human intervention, significantly increasing efficiency and productivity. They can generate content, answer queries, analyze data, and perform other routine tasks quickly and accurately. This allows employees to focus on more strategic and creative aspects of their work, ultimately driving business growth.</p>



<ol class="wp-block-list" start="2">
<li><strong>Cost Savings</strong></li>
</ol>



<p>By automating tasks and reducing the need for human labor, businesses can experience worthwhile cost savings. Hiring, training, and maintaining a workforce can be expensive, but AI LLMs offer a cost-effective alternative. Once implemented, these systems require minimal ongoing expenses, making them a valuable asset for budget-conscious businesses.</p>



<ol class="wp-block-list" start="3">
<li><strong>Scalability</strong></li>
</ol>



<p>AI LLMs can handle a high volume of tasks simultaneously, making them ideal for businesses that experience fluctuating workloads. Whether it&#8217;s scaling up to handle increased customer inquiries or handling repetitive data analysis, LLMs can adapt to meet business demands without the need for additional manpower.</p>



<ol class="wp-block-list" start="4">
<li><strong>Improved Customer Service</strong></li>
</ol>



<p>AI LLMs can be used to create chatbots and virtual assistants that provide 24/7 customer support. These systems respond to customer inquiries in real time, offering quick and consistent assistance. This not only improves customer satisfaction but also frees up human customer service representatives to handle the more complex issues.</p>



<ol class="wp-block-list" start="5">
<li><strong>Data Analysis and Insights</strong></li>
</ol>



<p>AI LLMs excel at processing and analyzing vast amounts of data to extract valuable insights that can inform business strategies. They can identify trends, patterns, and anomalies in data sets, helping businesses make data-driven decisions and gain a competitive edge in their markets.</p>



<ol class="wp-block-list" start="6">
<li><strong>Personalized Marketing and Content</strong></li>
</ol>



<p>AI LLMs can analyze customer behavior and preferences to create personalized marketing campaigns and content. Such a level of personalization can lead to higher customer engagement and conversion rates, ultimately driving revenue growth.</p>



<ol class="wp-block-list" start="7">
<li><strong>Language Translation and Localization</strong></li>
</ol>



<p>For businesses operating on a global scale, AI LLMs can provide accurate and efficient language translation service; which is invaluable for marketing, customer support, and content localization, enabling businesses to reach a wider audience.</p>



<h2 class="wp-block-heading">Risks Associated with Using AI-Language Models for Businesses</h2>



<ol class="wp-block-list">
<li><strong>Quality and Accuracy Issues</strong></li>
</ol>



<p>While AI LLMs are powerful, they are not infallible. There is a risk of generating content that contains inaccuracies, biases, or misinformation. Businesses must carefully review and verify the output of these models to ensure it fits with their brand values and objectives.</p>



<ol class="wp-block-list" start="2">
<li><strong>Ethical and Bias Concerns</strong></li>
</ol>



<p>AI LLMs learn from vast datasets, which can contain biases. This can result in biased or offensive content generated by the models, which can damage a business&#8217;s reputation and lead to legal issues. Therefore, it is essential for businesses to implement safeguards and ethical guidelines when using LLMs.</p>



<ol class="wp-block-list" start="3">
<li><strong>Data Privacy and Security</strong></li>
</ol>



<p>The use of AI LLMs often involves sharing sensitive data with third-party providers or cloud services. This can raise serious concerns about data privacy and security. So businesses must ensure that the data shared with these models is adequately protected and compliant with relevant regulations, such as GDPR.</p>



<ol class="wp-block-list" start="4">
<li><strong>Dependence on Technology</strong></li>
</ol>



<p>Over-reliance on AI LLMs can make businesses vulnerable to disruptions in the event of technical issues or outages. It&#8217;s essential for businesses to have backup plans and human oversight in place to handle situations when the technology fails.</p>



<ol class="wp-block-list" start="5">
<li><strong>User Experience and Human Touch</strong></li>
</ol>



<p>While AI LLMs can provide efficient customer support, there is a risk of diminishing the human touch in interactions with customers. Some customers may prefer speaking to a human representative for complex or emotionally charged issues, and businesses must find the right balance between automation and human interaction.</p>



<ol class="wp-block-list" start="6">
<li><strong>Intellectual Property Concerns</strong></li>
</ol>



<p>Using AI LLMs to generate content, such as articles or marketing materials, may raise questions about intellectual property rights. It&#8217;s crucial for businesses to clarify ownership and usage rights when utilizing AI-generated content.</p>



<ol class="wp-block-list" start="7">
<li><strong>Regulatory Compliance</strong></li>
</ol>



<p>The use of AI LLMs may be subject to various regulations and industry standards, depending on the sector and location of the business. Ensuring compliance with these regulations can be complex and requires ongoing monitoring and adjustments to AI systems.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>AI Language Models offer substantial benefits to businesses in terms of efficiency, cost savings, scalability, and improved customer service. They can automate tasks, provide valuable insights, and enhance personalized marketing efforts. However, businesses must also consider the associated risks, including quality and accuracy issues, ethical concerns, data privacy, and security issues.</p>



<p>Successful implementation of AI LLMs requires a thoughtful approach that includes regular monitoring, ethical guidelines, data privacy measures, and contingency plans. By carefully balancing the benefits and risks, businesses can harness the power of AI LLMs to gain a competitive edge and drive growth while maintaining ethical and legal integrity.</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-benefits-and-risks-to-a-business-of-using-ai-language-models-llms%2F&amp;linkname=The%20Benefits%20and%20Risks%20to%20a%20Business%20of%20Using%20AI%20Language%20Models%20%28LLMs%29" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-benefits-and-risks-to-a-business-of-using-ai-language-models-llms%2F&amp;linkname=The%20Benefits%20and%20Risks%20to%20a%20Business%20of%20Using%20AI%20Language%20Models%20%28LLMs%29" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-benefits-and-risks-to-a-business-of-using-ai-language-models-llms%2F&amp;linkname=The%20Benefits%20and%20Risks%20to%20a%20Business%20of%20Using%20AI%20Language%20Models%20%28LLMs%29" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-benefits-and-risks-to-a-business-of-using-ai-language-models-llms%2F&amp;linkname=The%20Benefits%20and%20Risks%20to%20a%20Business%20of%20Using%20AI%20Language%20Models%20%28LLMs%29" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F10%2Fthe-benefits-and-risks-to-a-business-of-using-ai-language-models-llms%2F&#038;title=The%20Benefits%20and%20Risks%20to%20a%20Business%20of%20Using%20AI%20Language%20Models%20%28LLMs%29" data-a2a-url="https://www.aykira.com.au/2023/10/the-benefits-and-risks-to-a-business-of-using-ai-language-models-llms/" data-a2a-title="The Benefits and Risks to a Business of Using AI Language Models (LLMs)"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australian Cyber Security Strategy &#8211; Discussion Paper, Response Template</title>
		<link>https://www.aykira.com.au/2023/02/australian-cyber-security-strategy-discussion-paper-response-template/</link>
		
		<dc:creator><![CDATA[Keith Marlow]]></dc:creator>
		<pubDate>Mon, 27 Feb 2023 21:35:34 +0000</pubDate>
				<category><![CDATA[australia]]></category>
		<guid isPermaLink="false">https://www.aykira.com.au/?p=3384</guid>

					<description><![CDATA[To save people time in having to extract the questions from the PDF here , I have put together a Word document which you can download here. I&#8217;ve done some basic formatting and put in both the priorities and questions, as well as the Appendix A detailed questions; so you can select and answer whatever <a href="https://www.aykira.com.au/2023/02/australian-cyber-security-strategy-discussion-paper-response-template/" rel="nofollow"><span class="sr-only">Read more about Australian Cyber Security Strategy &#8211; Discussion Paper, Response Template</span>[&#8230;]</a>]]></description>
										<content:encoded><![CDATA[
<p>To save people time in having to extract the questions from the PDF <a rel="noreferrer noopener" href="https://www.homeaffairs.gov.au/reports-and-pubs/files/2023-2030_australian_cyber_security_strategy_discussion_paper.pdf" target="_blank">here</a> , I have put together a Word document which you can download <a href="https://www.aykira.com.au/wp-content/uploads/2023/02/Australian-Cyber-Security-Strategy-Discussion-Paper.docx">here</a>.  I&#8217;ve done some basic formatting and put in both the priorities and questions, as well as the Appendix A detailed questions; so you can select and answer whatever as you see fit.</p>



<p>Enjoy and happy responding!</p>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F02%2Faustralian-cyber-security-strategy-discussion-paper-response-template%2F&amp;linkname=Australian%20Cyber%20Security%20Strategy%20%E2%80%93%20Discussion%20Paper%2C%20Response%20Template" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_copy_link" href="https://www.addtoany.com/add_to/copy_link?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F02%2Faustralian-cyber-security-strategy-discussion-paper-response-template%2F&amp;linkname=Australian%20Cyber%20Security%20Strategy%20%E2%80%93%20Discussion%20Paper%2C%20Response%20Template" title="Copy Link" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F02%2Faustralian-cyber-security-strategy-discussion-paper-response-template%2F&amp;linkname=Australian%20Cyber%20Security%20Strategy%20%E2%80%93%20Discussion%20Paper%2C%20Response%20Template" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F02%2Faustralian-cyber-security-strategy-discussion-paper-response-template%2F&amp;linkname=Australian%20Cyber%20Security%20Strategy%20%E2%80%93%20Discussion%20Paper%2C%20Response%20Template" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.aykira.com.au%2F2023%2F02%2Faustralian-cyber-security-strategy-discussion-paper-response-template%2F&#038;title=Australian%20Cyber%20Security%20Strategy%20%E2%80%93%20Discussion%20Paper%2C%20Response%20Template" data-a2a-url="https://www.aykira.com.au/2023/02/australian-cyber-security-strategy-discussion-paper-response-template/" data-a2a-title="Australian Cyber Security Strategy – Discussion Paper, Response Template"></a></p><div style="padding-top:0px;	
padding-right:0px;
padding-bottom:0px;
padding-left:0px;
margin-top:0px;
margin-right:0px;
margin-bottom:0px;
margin-left:0px;"><a href="https://twitter.com/AykiraInternet" class="twitter-follow-button" 
						data-show-count="false"
						data-lang="autoLANGauto"
						data-width="250px"
						data-align="left"
						data-show-screen-name="true"
						data-size="large"
						data-dnt="false">
						Follow @AykiraInternet </a> </div>
						<script>
						!function(d,s,id) {
						  var js,fjs=d.getElementsByTagName(s)[0];
						  if(!d.getElementById(id)) {
						   js=d.createElement(s);
						   js.id=id;js.src="//platform.twitter.com/widgets.js";
						   fjs.parentNode.insertBefore(js,fjs);
						  }
						}
						(document,"script","twitter-wjs");
						</script>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Content Delivery Network via dgc7s8491dwr6.cloudfront.net
Lazy Loading (feed)
Minified using Disk
Database Caching 17/119 queries in 0.080 seconds using Memcached (Request-wide modification query)

Served from: www.aykira.com.au @ 2026-01-28 17:12:00 by W3 Total Cache
-->