Archive | Security Updates RSS feed for this section

Rapid Setup in Remote Locations

I stopped to have a sandwich in an airport recently, and it brought a smile to my face to see a familiar WatchGuard red appliance behind the counter just below the cash register. Worldwide regulations like the Payment Card Industry Data Security Standard (PCI-DSS) have increased the demand for security appliances in even the smallest retail locations, including kiosks in shopping malls, small hotels, and franchise restaurants. Additionally, Healthcare and privacy regulations like the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the data privacy directive in the European Union have driven the need for security. Seeing the red box, I knew that my credit card information was in good hands.

WatchGuard appliances are now running in places like dentists, doctors’ offices, and small clinics. Although these are wildly different industry environments, one thing these locations all have in common is that they don’t have dedicated IT staff on site. Security and network configuration is provided by a Managed Security Service Provider (MSSP) or the central IT staff for the distributed enterprise, clinic group or retail chain.

At WatchGuard, our mission is to provide solutions that are easy to deploy, easy to manage, and generally accessible to companies of all sizes. To succeed in these environments, we need to provide solutions that can be setup securely without sending a technician out every time, especially for companies that are managing hundreds of locations. All of WatchGuard’s Unified Threat Management (UTM) appliances, including our new WatchGuard Firebox T30 and T50 models include access to the company’s unique RapidDeploy feature that enables centralized IT teams to pre-configure appliances for quick and non-technical installation at distributed remote sites.

Here’s a common challenge we see. When installing a new appliance in a remote location, someone needs to unpack and set up the IT equipment. This will often be the store manager or an employee who may lack technical skills. They may have a computer at home, but no technical responsibilities in the workplace. They do not know much about IT other than how to start their laptop, browse the Internet, watch Netflix, and use Microsoft Word, etc. Therefore, no matter how clear the corporate instructions are, they still seem like a foreign language.

With Rapid Deploy, the local staff just needs to plug in the Firebox’s power and Internet cables. It then establishes a connection, and pulls the appropriate configuration file from either the WatchGuard cloud or the central management server. This even works in cases where the IP address is assigned statically and not via DHCP. It also works in environments where the local site needs to connect back to the corporate management server through a third party device with NAT implemented. Such scenarios are common in shopping malls, airports, and healthcare campuses.

Does this sound like a challenge you’ve been facing? Find out more about how WatchGuard can help, here.

 

iOS KeyRaider – Daily Security Byte EP.135

The bad news is a new iOS malware variant has stolen the iCloud credentials of 225,000 users. The good news is it only affects jailbroken iOS users. Watch today’s video to learn more about this new threat, and how to avoid it.

(Episode Runtime: 2:07)

Direct YouTube Link: https://www.youtube.com/watch?v=WgouWbav3jA

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Cyber Espionage Sanctions – Daily Security Byte EP.134

According to unnamed sources in the Obama administration, the US government is developing sanction against foreign attackers who leverage cyber espionage to steal intellectual property. While these sorts of deterrents may be necessary to discourage cyber attacks in the age we live, they could certainly change the information security landscape. Watch today’s episode to learn more about these possible sanctions.

(Episode Runtime: 2:30)

Direct YouTube Link: https://www.youtube.com/watch?v=NBzoyZP43x0

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

EFF Watering Hole Attack – Daily Security Byte EP.133

Today, the EFF warned the world that advanced attackers have been using their name in vain. A targeted spear phishing email is linking to a fake version of the EFF site, which forces malware via a recent cross-platform Java exploit. Learn more about this attack and how to protect yourself by watching the video below.

(Episode Runtime: 2:07)

Direct YouTube Link: https://www.youtube.com/watch?v=ZQXOgjC3gTg

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Backdoor in Multiple DSL Routers – Daily Security Byte EP.132

A few months ago, researchers found a backdoor in an LTE consumer router. Today, we learned that his hole exists in a number of DSL routers, including ones given to customers by ISPs. Watch the video to learn about this secret admin account, and what you can do to mitigate access to it.

(Episode Runtime: 2:25)

Direct YouTube Link: https://www.youtube.com/watch?v=7RCigiLt8gI

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Yosemite 0day – Daily Security Byte EP.130

It’s pretty impressive to know an 18 year old Italian teenager is already finding vulnerabilities in OS X. However, I hope he learns to disclose them responsibly, and starts informing vendors first. This week, news surfaced of a zero day privileges escalation flaw in the latest version of OS X Yosemite. Click play below to learn all about it.

(Episode Runtime: 1:30)

Direct YouTube Link: https://www.youtube.com/watch?v=6WmdmY9kHks

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Ashley Madison Hemorrhaging Data – Daily Security Byte EP.129

As if yesterday’s Ashley Madison data dump wasn’t bad enough, the attackers have released new stolen data. Learn what new information is at stake, and what you can do to protect your data in today’s video.

(Episode Runtime: 1:39)

Direct YouTube Link: https://www.youtube.com/watch?v=4Yk7OOST1ag

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

IE 0day & AM Hack Update – Daily Security Byte EP.128

I missed yesterday’s daily video due to an offsite meeting, so today’s episode contains two important stories; an emergency update to fix a zero day vulnerability in Internet Explorer (IE) and the latest update to the Ashley Madison breach. If you run a Microsoft network, or you know anyone that had an account on Ashley Madison, you’ll want to watch the video below to learn what you can do to protect yourself from attackers.

(Episode Runtime: 2:18)

Direct YouTube Link: https://www.youtube.com/watch?v=w9CI3Fk5NiE

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Global Mobile Hack – Daily Security Byte EP.127

The Australian 60 Minutes unveiled a piece on how attackers can track and intercept the calls from any mobile, as long as they know its number. However, others say the researchers demonstrating this attack had special access to carrier networks. Watch today’s video to learn how real this threat is, and whether or not you can do something about it.

(Episode Runtime: 3:34)

Direct YouTube Link: https://www.youtube.com/watch?v=G63kB987kyg

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Follow

Get every new post delivered to your Inbox.

Join 8,241 other followers

%d bloggers like this: