Top 10 Security Predictions

Top 10 Security Predictions

Security will be the focus of CSOs and CIOs in 2018

Top 10 Security Predictions
Security Manual Template addresses how to handle the Top 10 Security Predictions

Top 10 security predictions are:

  1. Executive Management will set security as a top priority
  2. Ransomware attacks will continue and increase in scope
  3. IoT is a security hack waiting to happen
  4. More attacks from hackers
  5. European Union’s General Data Protection Regulation (GDPR)  businesses must address
  6. GDPR blackmail will become the new ransomware
  7. DDoS on the rise
  8. Cloud breaches will expand in both number and scope
  9. The insider threat
  10. Complex passwords will become the standard

Read on SecurityOrder Security ManualDownload Selected Security Manual  Pages

IT Professional Mean Pay exceeds $90,000

Mean Compensation for all IT Pros in 2018 now is $90,116 up by 3.5% from 2017

IT Professional Mean Pay now is well over $90,000 in both large enterprises and Mid-Sized ones.  IT executives in large enterprised now command a mean salary of $159,748 – which is up 2.53% from last year and rising.

IT professionals are now among the highest paid staff level individuals in many organizations.

IT Professional Mean Pay

IT Professional Mean Pay
IT Professional Mean Pay

Salaries for qualified IT Pros will continue to increase as there currently is a short supply of individuals who have the skill sets necessary to work with several new and advancing technologies.

The positions in the greatest demand are for Executive and Middle Management positions with experience and working knowledge of Iop, Blockchain, and migration of applications to SmartPhones and Tablets in both the iOS and Android worlds.

IT Job in Demand

Janco released its full suite of IT Recruiting, Hiring, and Job Description suites of offerings to help HR departments and IT management teams to help them have the tools at hand as the IT job market continues to expand.

Human Resources – IT Professional Mean Pay

IT Job Descriptions

IT Job Descriptions Updated

IT Job Descriptions Updated

IT Job Descriptions
The 2018 version of the Internet and IT Job Description HandiGuide now contains 288 full job descriptions

The Internet and IT Position Description Handiguide 2018 edition has just been released.  It now has 288 full job descriptions,  They have all been reviewed and updated to include social media and blockchain development and operational considerations.

Each of the job descriptions has been reviewed and updated to meet the latest security and mandated compliance requirements.  Added to this edition is a section on sexual harassment.  In addition, the electronic version of the termination checklist has been updated  to reflect all of the mandated and security requirements that have recently come about,

The  job descriptions that have been added this year include:

    • Blockchain Developer
    • BYOD Support Supervisor
    • Information Assurance Analyst
    • IT Security Engineer
    • Manager Data Center
    • Manager Device Technology
    • Security Architect

Read Job DescriptionBuy Job DescriptionSample Job Description

Security is a pipe-dream

Security Pipe Dream for many

Security is a pipe-dream,  few enterprises are fully protected from events that have occurred in the past several months.  All one has to do is to look at the recent cyber attacks at Uber and Experian. In both of those cases, the CIO and/or  CSO were blamed and left the organization.

Not many CIOs and CSOs feel they have 100% of their security risks covered. In a recent survey that was published in NetworkWorld:

  • 55% said that was the case
  • 40% said they hope the had all of their security bases covered
  • 6% said that they did

With only 6% saying they had all of their bases covered there are many opportunities for security hackers and data breachers to attack the systems in place.

Now that we know that a security breach may occur, how sure are these same CIOs and CSOs that they will be able to react in time? The first step is detection that a hack or breach has occurred. In another survey by Janco Associates, we found that in midsized and large enterprises:

  • 35% had a detection solution in place and they automatically quarantined the server(s)
  • 43% had a detection solution in place but had to “manually” quarantine the server(s)
  • 23% had to “manually” put the server(s) offline when they found out they had a problem

When you put these two sets of data together, you conclude that less than 2% of enterprises are protected adequately enough to prevent a major security hack or breach occurs.

Disaster Recovery / Business Continuity &
Security Template Bundle

ISO 27000, Sarbanes-Oxley, and HIPAA Compliant
PCI-DSS Compliant

Order DRP BCP SecuritySample DRP Security Manual

Experts Agree You Should Update Your Plan Annually

Security is a critical concern during the recovery process

It goes without saying that every company, regardless of size, needs a concise business continuity plan in case of an emergency. If you don’t have a disaster recovery plan or haven’t updated yours recently, now is the time to take this critical step to protect your business.

At Risk e-Mail Accounts

At risk e-mail accounts are Gmail, Yahoo, and Hotmail

Security Manual Template
Security Manual Template contains all of the procedures needed to support a world class security infrastructure. Contain BIA and Threat Assessment Tools.

At risk e-mail accounts according to the University of California (Berkeley) and Google are Gmail.com, Yahoo.com and Hotmail.com.  Users who use those email  account have the highest probability of being  victims of hacking attacks. The types of attacks are credential exposure, phishing, and keylogging.

Much of the expose is due to the multitudes of “unsophisticated” users who are not well trained in how to avoid those attacks.  In addition, there is the exposue they face due to the loss of their credentials because of a lack of adequate security at hosting sites from where their credentials and personal data can be extracted.  The cases in point are the recent massive hacks at Yahoo and Experian.

The summary results of the study are:

At Risk e-mail accountsThe data does NOT reflect the victims of the Yahoo and Experian attacks.

Read on SecurityOrder Security ManualDownload Selected Security Manual Pages

 

 

Security Vulnerability Analysis Tool

Security Vulnerability Analysis Tool and BIA in Template

Security Manual Template
Security Manual Template contains all of the procedures need to support a world class security infrastructure. Contain BIA and Threat assessment tools.

Security Vulnerability Analysis Tool is not included as part of Janco’s Security Manual Template.  Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. When deploying a next-generation firewall there are many  factors to consider.

The Security Manual template now includes the latest Threat Vulnerability Analysis Tools.  They are proven and ready to use.

One of the really great features are all of the electronic forms that come with the Security Manual Template.

Read on SecurityOrder Security ManualDownload Selected Security Manual Pages

Those who violate 10 commandments of business continuity plan fail

When a business continuity plan is non-functional

Failed Business Continuity – This morning about 2:00 AM MST one of the largest providers of cloud services went down.  As I write this it is 11:30 AM MST and the service is still down.

It seems that their entire network – both the east coast and west coast is down.  I talked to their corporate office and at this time they have no idea as to when they will be back up and at the same time the person I talked to said he did not know what their business continuity plan was since this was a nation-wide failure in their network.

They should have followed the 10 commandments that we published earlier.

  1. Analyze single points of failure: A single point of failure in a critical component can disrupt well engineered redundancies and resilience in the rest of a system.
  2. Keep updated notification trees: A cohesive communication process is required to ensure the disaster recovery business continuity plan will work.
  3. Be aware of current events: Understand what is happening around the enterprise – know if there is a chance for a weather, sporting or political event that can impact the enterprise’s operations.
  4. Plan for worst-case scenarios: Downtime can have many causes, including operator error, component failure, software failure, and planned downtime as well as building- or city-level disasters. Organizations should be sure that their disaster recovery plans account for even worst-case scenarios.
  5. Clearly document recovery processes: Documentation is critical to the success of a disaster recovery program. Organizations should write and maintain clear, concise, detailed steps for failover so that secondary staff members can manage a failover should primary staff members be unavailable.
  6. Centralize information – Have a printed copy available: In a crisis situation, a timely response can be critical. Centralizing disaster recovery information in one place, such as a Microsoft Office SharePoint® system or portal or cloud, helps avoid the need to hunt for documentation, which can compound a crisis.
  7. Create test plans and scripts: Test plans and scripts should be created and followed step-by-step to help ensure accurate testing. These plans and scripts should include integration testing— silo testing alone does not accurately reflect multiple applications going down simultaneously.
  8. Retest regularly: Organizations should take advantages of opportunities for disaster recovery testing such as new releases, code changes, or upgrades. At a minimum, each application should be retested every year.
  9. Perform comprehensive recovery and business continuity test: Organizations should practice their master recovery plans, not just application failover. For example, staff members need to know where to report if a disaster occurs, critical conference bridges should be set up in advance, a command center should be identified, and secondary staff resources should be assigned in case the event stretches over multiple days. In environments with many applications, IT staff should be aware of which applications should be recovered first and in what order. The plan should not assume that there will be enough resources to bring everything back up at the same time.
  10. Defined metrics and create score cards scores: Organizations should maintain scorecards on the disaster recovery compliance of each application, as well as who is testing and when. Maintaining scorecards generally helps increase audit scores.

Order Disaster Plan TemplateDisaster Plan Sample

 

Threat and Vulnerability Tool – Best in Class according to IT Productivity Center

Threat and Vulnerability Tool – Best in Class according to IT Productivity Center

Threat Vulnerability Assessment Tool Best in class
The purpose of a Threat Risk Assessment (TRA) is to categorize enterprise assets, examine the different “threats” that may jeopardize them, and identify and correct the most immediate and obvious security concerns.

Threat and Vulnerability Tool – Best in Class award concurrent with the release of Version 4.o.  Janco is proud to announce it has recieved a Best in Class by the IT Productivity Center.  This is the third time the IT Productivity Center has issued an award to Janco for this tool.

One of the added features of version 4.0 is that it now comes not only in MS Word and PDF formats, but it also comes as an ePub (eReader) document that can easily be distributed to smartphones, tablets, and desktops.

The Tool comes with a work plan that can be used to conduct the Threat and Vulnerability Assessment as well as a definition of the components of the process including:

  • Administrative Safeguards
  • Logical Safeguards
  • Physical Safeguards

One of the additional features of this template is that it can be used as the core of an enterprises compliance program.

This tool is also included with the Disaster Recovery / Business Continuity Template and the Security Manual Template.

DR/BC Plans and Security Procedures have errors

DR/BC Plans and Security Procedures errors

DR/BC Plans and Security Procedures errors – Janco has reviewed the recovery processes of 148 enterprises that were impacted by the recent hurricanes, fires, miscellaneous business disruption events and found that 53% had some significant error(s) or omission(s) in their DR/BC Plans and/or security procedures. Many were attributed to the length of the business interruption event and the lack of supporting infrastructure such as cell communication (Puerto Rico) or shortage of fuel for back up generators.

Only 17% of enterprises that had major business disruption events in the summer and fall of 2017 had no major issues with their DR/BC plan activation process and security procedures

Janco is currently in the process of determining what were the causes for these defect.  Preliminary  findings are that as a result of the slow economy enterprise cut back on the maintenance of core infrastructure.  This included updating existing DR/BC plans Security procedures with changes, training in those areas, and people being reassigned or leaving the enterprise that were critical for these processes.

Janco’s Solution

Janco has added 17 electronic forms to alleviate this problem in DR/BC plan and its Security Manual Template. Included as a bonus is an eReader format of both templates.  The forms can be completed via tablets and smartphones and stored in a remote cloud location.  With the included security and DR/BC audit programs, it now is easier to highlight those areas of existing plans and procedures which need work to guarantee compliance with security mandates and success in the recovery process.

Security and DR - BC Read onOrder DRP BCP SecurityDownload Table of Contents Security and DRP templates

10 Reasons why Chip Readers

10 Reasons why Chip Readers used by merchants

10 Reason why Chip Readers10 Reasons why Chip Readers usage will expand.

  1. Credit card chip usage improves the security landscape
  2. Required for compliance
  3. Merchants pay a lower fee
  4. Physical card is required for in-store transactions
  5. Credit card chips reduce counterfeit card fraud: Countries that have been using chip cards for many years have seen significant reductions in counterfeit card fraud. In the UK, for example, counterfeit card losses have been reduced by 70%.
  6. An increased number of chip cards in consumers’ possession: over 600 million chip cards have been issued in the U.S. as of the end of 2016.
  7. Majority of all retail outlets now accept chip cards: almost 90% of all travel, entertainment, and high-cost retail operations accept chip cards
  8. Swipe and insert versus manually keying in card information is more accuracte
  9. Daily settlement of transactions for merchants
  10. Get accurate customer information: For online transactions validate customers’ billing and address information is entered correctly.

Read on…

Order Omni Commerce Planning ToolkitDownload Selected Pages of omni commerce strategy

10 Question Security Assessment Process

10 Question Security Assessment Process for CIOs and CSOs

10 Question Security Assessment
Everything that needs to be done in order to improve the security and compliance of the enterprise

10 Question Security Assessment Process is a way for CIOs and CSOs to quickly identify risks that they need to address.

  1. What does the enterprise need to differently today in order to stop a breach tomorrow?
  2. Does the enterprise know if the company has been breached? How does it know?
  3. What assets are protecting, what are they being protected from (i.e., theft, destruction, compromise), and who are they being protected them from (i.e. cybercriminals or insiders)?
  4. What risks does the enterprise face if it is breached (i.e., financial loss, reputation, regulatory fines, loss of competitive advantage)?
  5. Does the enterprise’s IT security implementation match the enterprise’s business-centric security policies?
  6. Are formal written policies, technical controls or both in place? Are they being followed?
  7. What is the enterprise’s security strategy for IoT?
  8. What is the enterprise’s security strategy for BYOD and “anywhere, anytime, any device” mobility?
  9. Does the enterprise have an incident response plan in place?
  10. What is the enterprise’s remediation process? Can the enterprise recover lost data and prevent a similar attack from happening again?

Supports Meaningful Use Compliant Stage Implementation – Meets HIPAA Ransomware Guidelines — Comes in eReader, MS Word, and PDF formats. Includes 24 Electronic Forms that are ready to use and User Bill of Rights for Sensitive Data and Privacy

Order Security Policies and ProceduresDownload TOC security policies

China Hidden Competitive Advantage

China Hidden Competitive Advantage – China Owns Key Technology Media  Firms

China Hidden Competitive Advantage
China may control reporting on Best Practices for IT Infrastructure

China Hidden Competitive Advantage – Should the US be concerned that key technology firms and publications are now owned by China?  In March of 2017, China Oceanwide completed its acquisition of IDG.  China Oceanwide is an international conglomerate founded by Chairman Zhiqiang Lu. Headquartered in Beijing, China and include operations in financial services, real estate, media, technology and strategic investment. Following the acquisition, China Oceanwide has nearly 20,000 employees worldwide.

Within two months of the acquisition, there were extensive layoffs in the IDG’s US staffs of both writers and editors.  It has been estimated that between 90 t0 100 seasoned professionals were laid off.

IDG was founded in 1964 and the publications that were included in this acquisition were CIO, Computerworld, PCWorld, and Macworld.  IDG also has its own international news agency, IDG News Service. It is headquartered in Boston and has bureaus in cities such as New York, Beijing, Amsterdam, and Brussels. It provides news, images, video and other editorial content to IDG’s web sites and print publications worldwide.

The insight that IDG has in the technology market is very high. With this level of access to the technology market, should US based corporations be concerned? Will China based enterprises get a competitive advantage over US based enterprises?

Order IT Infrastructure PoliciesDownload Selected Pages

Top 10 IoT skills

Top 10 IoT skills

IoT device challenges
The Internet of Things (IoT) is more than internet enabled sensors and analytics.

The top 10 IoT skills in demand are:

  1. Machine Learning algorithms that build the AI of IoT Devices
  2. AutoCAD software to allow IoT devices to make late-stage design changes quickly with minimal cost and time delays
  3. Node management via the server to manage the connected devices
  4. Security Infrastructure since everything is connected with these multiple endpoints
  5. Security engineering to design in security and block intrusions and break-ins
  6. Big Data to aggregate the data captured in both collection and analysis
  7. GPS connectivity and analysis
  8. Electrical Engineering to improve and support on-going device availability and radio frequency connectivity
  9. Circuit design to adjust for new requirements
  10. Microcontroller programming to add logic and intelligence to the devices

10 step disaster recovery clean up

10 step disaster recovery clean up

Walking into an office after an event has occurred, the facility looks to be a shamble.  There are dirt, mud, and debris all over the entire facility.  Where do you start?

Here is Janco’s 10 step disaster clean up process extracted from the Disaster Recovery Business Continuity Template. In addition to this, consult a professional conservator for further treatment.

10 step program

dr/BC template
Disaster Recovery Business Continuity Template is the industry standard. Over 3,500 enterprises world wide use this as the base fore their DR/BC plan
  1. Wet objects (electronic) – Disconnect from the power source and do not turn it on. In the case of disk drives or other electronic storage devices – inventory all of them and label them.
  2. Mobile Devices – cell phones – Small items like cell phones and mobile devices can be put in rice. The rice absorbs the moisture and after a day or two, they can be turned on. In most cases, this works.
  3. Wet objects (non-electronic) – Rinse with clear water or a fine hose spray. Clean off dry silt and debris with soft brushes or dab with damp cloths. Try not to grind debris into objects; overly energetic cleaning will cause scratching.
  4. Drying Objects – Air dry objects indoors if possible and use portable fans to move the air. Sunlight and heat may dry certain materials too quickly, causing splits, warping, and buckling. If possible, remove contents from wet objects and furniture prior to drying. Storing damp items in sealed plastic bags will cause mold to develop.
  5. Mold Prevention and Cleanup – Exposure to molds can have serious health consequences such as respiratory problems, skin and eye irritation, and infections. The use of protective gear, including a respirator with a particulate filter, disposable plastic gloves, goggles or protective eye wear, and coveralls or a lab coat, is therefore essential. In order to inhibit the growth of mold and mildew, you must reduce humidity. Increase air flow with fans, open windows, air conditioners, and dehumidifiers. Moderate light exposure (open shades, leave lights on in enclosed areas) can also reduce mold and mildew. Remove heavy deposits of mold growth from walls, baseboards, floors, and other household surfaces with commercially available disinfectants. Avoid the use of disinfectants on historic wallpapers. Follow manufacturers’ instructions, but avoid splattering or contact with objects and wallpapers as disinfectants may damage objects.
  6. Broken Objects – If objects are broken or begin to fall apart, place all broken pieces and detached parts in clearly labeled, open containers. Do not attempt to repair objects until completely dry or, in the case of important materials, until you have consulted with a professional conservator.
  7. Paper Materials – Documents, books, photographs, and works of art on paper are extremely fragile when wet; use caution when handling. Free the edges of prints and paper objects in mats and frames, if possible. These should be allowed to air dry. Rinse mud off wet photographs with clear water, but do not touch surfaces. Wet books and papers should also be air dried or kept in a refrigerator or freezer until they can be treated by a professional conservator.
  8. Office Furniture – Furniture finishes and painting surfaces may develop a white haze or bloom from contact with water and humidity. These problems do not require immediate attention; consult a professional conservator for treatment. Textiles, leather, and other “organic materials will also be severely affected by exposure to water and should be allowed to air dry. Shaped objects, such as garments or baskets, should be supported by gently padding with toweling or unlinked, uncoated paper. Renew padding when it becomes saturated with water. Dry clean or launder textiles and carpets as you normally would.
  9. Art Work – Remove wet paintings from the frame, but not the stretcher. Air dry, face up, and away from direct sunlight.
  10. Metal Objects – Rinse metal objects exposed to flood waters, mud, or silt with clear water and dry immediately with a clean, soft cloth. Allow heavy mud deposits on large metal objects, such as sculpture, to dry. Caked mud can be removed later.
Read on DRP BCP TemplateOrder Disaster Plan TemplateDownload Selected Pages Disaster Plan Template

Minimize breach response cost

Minimize breach response cost with operational strategy

Minimize breach response cost
Policies and procedures need to defined and be in place in order to minimize breach response cost

While the costs of a data breach can vary widely on a case-by-case basis, CIOs who understand the drivers behind the expense will be better positioned to take steps needed to protect their organization.

Here are 6 way to minimize breach response cost:

  1. Eliminate data you do not need.
    You can potentially dramatically reduce your exposure by destroying records of past customers.  You cannot lose data if you do not save it. In 2015 one company served 69 million customers, yet when they were breached that year, they exposed 78 million records. The extra nine million records most likely come from former customers. Each of these individuals had to be notified and offered credit monitoring, driving up costs.
  • Do not store street address if there is no real business requirement.
    When a breach occurs, companies are typically required to notify affected individual via old-fashioned, handwritten “snail mail.” But they can use alternative methods of notification, such as email or public announcement if they do not have a valid mailing address. Physical, written notifications can cost up to $2 per person, and the cost quickly adds up. It may be worth asking twice what the business need for those customer addresses is and considering not capturing these addresses to reduce the exposure to notification requirements.
  • Utilize logs to prove proof a breach or data loss did not occur.
    One industry study shows that in 44% of incidents, public notification is not required. To avoid notification, companies must prove that, even if they were attacked, no records were improperly accessed. To do so, they use systems logs. Without logs, a company may be forced to assume a breach occurred because it cannot prove otherwise.
  • Follow PCI rules and protect credit card data.
    For breaches that involve credit card data, reimbursing card companies for fraudulent transactions can amount to a staggering cost, from $3-$30 or more per card. New chip cards are designed to reduce fraud, and early data show they are having the intended effect – MasterCard reported a 54% reduction in counterfeit card fraud costs at retailers who have switched to chip cards.
  • Use experts who know the breach response landscape.
    Your breach response effort is not a good time to reinvent the wheel. Missteps happen fast and have serious consequences. Credit monitoring alone can cost $5 to $30 per person. Data breach specialists, such as PR consultants or data privacy lawyers, often have seen as many as hundreds of data breaches and are highly practiced at helping you craft a genuine story that keeps confusion – and costs – down.
  • Be prepared for additional audits and compliance reviews.
    In the wake of a breach, a company may be audited and investigated by a number of regulatory agencies. While it’s not guaranteed to occur, it is likely, and there are simple steps you can take to prevent sensational fines if it does. To start, CIOs and  CFOs should be strong advocates for the implementation of the security controls recommended by external auditors or by regulators themselves.
%d bloggers like this: