Fraud Prevention
Cybersecurity News - February 2022
Fraud Prevention
Cybersecurity News - February 2022
Systemic risks: threatening both the organization and third parties
The focus on protecting the “crown jewels” is no longer enough. Today, the parts of complex systems that are interconnected within an organization and outside with third parties are now targeted by hackers.
Addressing systemic risks begins with understanding the systems end-to-end—including the parts within them and the third-parties that are interconnected. This includes mapping and understanding the impact if a critical part of a system fails or is corrupted on the larger system. Then it’s a matter of mitigating systemic risk through steps like network segmentation and the isolation of credentials.
Systemic failures and cyberinsurance
Organizations need to recognize that cyberinsurance generally only covers a small part of cyber risk, particularly in cases of a large-scale systemic failure. Learn more about systemic risk by visiting our Insights page at: https://www.mufgamericas.com/insights-and-experience/trending-topics/some-vital-lessons-in-how-systemic-risk-changing-in-cybersecurity.
Source: Zukis, Bob. Some Vital Lessons In How Systemic Risk Is Changing Cybersecurity. Originally published by Forbes. September 2, 2021. https://www.mufgamericas.com/insights-and-experience/trending-topics/some-vital-lessons-in-how-systemic-risk-changing-in-cybersecurity.
Collaborate with third-party vendors to protect the organization and supply chain
Cyberattackers actively exploit environments reliant on third-party support. This means CIOs and CISOs need to account for the third-party elements of their own IT environments. Consider the following measures and actions to reduce third-party cyber risk:
Source: Al Issa, Ayman; Bailey, Tucker; Boehm, Jim; and Weinstein, David. Enterprise cybersecurity: Aligning third parties and supply chains. McKinsey & Company. May 12, 2021. https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/enterprise-cybersecurity-aligning-third-parties-and-supply-chains.
What is systemic risk?
The author of the Some Vital Lessons In How Systemic Risk Is Changing Cybersecurity article, Bob Zukis, explains systemic risk:
“Systemic risk in cybersecurity is the inherent risk that exists within complex digital business systems. It’s the threat of risk spreading into a business from connected third-parties or out of your business into others. It’s also the threat of one part of a digital business system going down, which then cascades and has a much larger negative impact on the extended system.”
Source: Zukis, Bob. Some Vital Lessons In How Systemic Risk Is Changing Cybersecurity. Originally published by Forbes. September 2, 2021. https://www.mufgamericas.com/insights-and-experience/trending-topics/some-vital-lessons-in-how-systemic-risk-changing-in-cybersecurity.
Choosing and hardening virtual private network (VPN) solutions
Virtual private networks (VPNs) enable remote users access to internal services with the protections offered to onsite users. These remote access VPN servers are entry points into protected networks, so they are targets for cyber attacks.
Nation-state Advanced Persistent Threat (APT) actors exploit public Common Vulnerabilities and Exposures (CVEs) to compromise vulnerable VPN devices. Some exploit code is freely available online, which enables malicious actors to perform: credential harvesting, remote code execution of arbitrary code on the VPN device, cryptographic weakening of encrypted traffic sessions, hijacking of encrypted traffic sessions, and arbitrary reads of sensitive data (e.g., configurations, credentials, keys). These actions typically lead to further malicious access through the VPN, resulting in large-scale compromise of the corporate network or identity infrastructure and sometimes of separate services.
To help organizations select and harden VPNs, the U.S. National Security Agency (NSA) and U.S. Cybersecurity and Infrastructure Security Agency (CISA) developed the Selecting and Hardening Remote Access VPN Solutions information sheet. Highlights:
Source: National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA). Selecting and Hardening Remote Access VPN Solutions. NSA and CISA. September 2021. https://media.defense.gov/2021/Sep/28/2002863184/-1/-1/0/CSI_SELECTING-HARDENING-REMOTE-ACCESS-VPNS-20210928.PDF.
Virtual Private Network (VPN)
Allows users to remotely connect to a corporate network via a secure tunnel.
Advanced Persistent Threat (APT)
An adversary with sophisticated levels of expertise and significant resources that uses multiple attack vectors (e.g., cyber, physical, and deception).
Common Vulnerabilities and Exposures (CVE)
A list of publicly disclosed computer security flaws, each of which is assigned a CVE ID number. Security advisories typically mention at least one CVE ID.
The CISO and CIO share cybersecurity ownership
The CIO and CISO both have cybersecurity responsibilities within most organizations. The CISO looks at security and is protecting the enterprise from cyber threats. Meanwhile, the CIO builds security into the broader technologies and ongoing digital transformation projects. These roles can be closely aligned and interconnected, despite the fact that the roles have different objectives.
These roles will further evolve alongside cybersecurity and in managing third-party connectivity as well as mergers and acquisitions. Learn more from various industry professionals about the CISO/CIO dynamic by visiting our Insights page at: https://www.mufgamericas.com/insights-and-experience/trending-topics/how-cisos-and-cios-should-share-cybersecurity-ownership.
Source: Hill, Michael. How CISOs and CIOs Should Share Cybersecurity Ownership. Originally published by CSO Magazine. September 16, 2021. https://www.mufgamericas.com/insights-and-experience/trending-topics/how-cisos-and-cios-should-share-cybersecurity-ownership.
The information above is provided as a convenience, without warranties of any kind and MUFG Union Bank, N.A. disclaims all warranties, express and implied, with respect to the information. You are solely responsible for securing your systems, networks, and data. You should engage a qualified security expert to advise on your specific needs and requirements.