Every Minute Counts: Threat Intelligence

Every Minute Counts: Threat Intelligence

In a world where it takes only 72 minutes for a threat actor to infiltrate an organization’s private data following a phishing attack, the urgency of robust cybersecurity is undeniable. At CSP, we understand that every minute is crucial. Our commitment to early warning signs, rapid response, and proactive protection, ensures that your organization remains secure against even the most sophisticated threats.

Password attacks occur at a staggering rate of 4,000 per second—a nearly four-fold increase in just two years—the landscape of cybersecurity threats continues to evolve at an alarming pace.

The rise of large language models (LLMs) and generative AI being used by bad actors to research and plan cyber-attacks marks a pivotal moment in the ongoing battle to protect our digital world. Everyone in Australia has a role in safeguarding the nation against these relentless cyber threats. Cyber resilience demands a multifaceted approach encompassing skills, technology, infrastructure, and a cyber-smart culture. It requires extraordinary levels of collaboration.

The Need for Collaboration

Cyber threat actors have escalated their cooperation, exemplified by the rise of cybercrime-as-a-service. Threat actors are teaming up, sharing capabilities, and scaling their operations in ways never seen before. In response, defenders must create equally robust partnerships across public and private sectors to outpace these threats. The asymmetric nature of cybersecurity means threat actors only need to succeed once, while defenders must be vigilant and successful every time.

Effective Disruption through CTIS

The Australian Signals Directorate’s (ASD’s) Cyber Threat Intelligence Sharing (CTIS) is a two-way sharing platform that enables government and industry partners to receive and share information about malicious cyber activity at machine speed.

Coordinated collaboration across government, industry, and international borders has yielded significant successes in disrupting and dismantling cyber threat actors. The joint effort between CTIS and CSP underscores the value of ongoing partnerships and iterative efforts in cybersecurity.

CSP’s Role in Accelerating Collaboration

As CSP, we have seen firsthand how faster collaboration between defenders can drive broader impacts, protecting more people and organizations. Our involvement in the ASD’s CTIS program has been instrumental in several high-impact cases:

  1. Phishing Domain Disruption: When a partner reported a Microsoft Office 365 phishing domain, the ASD’s analysis led to the identification of 129 related malicious domains. The immediate dissemination of this intelligence enabled CSP to block or monitor these threats, while a domain takedown request eliminated the phishing activity within the Australian IP range for government entities.
  2. Ransomware Threat Mitigation: Ransomware remains a formidable cybercrime threat. Through the CTIS and CSP, multiple contacts reported and monitored the activities of the Ransomware Group. The timely sharing of detailed information and tailored mitigation advice by the ASD allowed our customers to deter and protect against this persistent threat effectively.

Lessons Learnt and the Path Forward

The CTIS and CSP collaboration highlights several key lessons:

  • Rapid Information Sharing: Timely and accurate dissemination of threat intelligence can significantly enhance the ability to counteract cyber threats.
  • Collaborative Defense: Partnerships between government, industry, and international entities are crucial in the fight against cybercrime.
  • Proactive Measures: Identifying and acting on threats proactively can prevent widespread damage and disruption.

 

By fostering a culture of collaboration and leveraging advanced threat intelligence sharing mechanisms, CSPs can play a vital role in enhancing the cybersecurity posture for our customers.

If you would like to learn more about CTIS Threat Intelligence for Australia or any other services then reach out to us at info@csp.global

 

Navigating the Chaos: Resources for the CrowdStrike Crash

Navigating the Chaos: Resources for the CrowdStrike Crash

I’m putting together a bunch disparate resources that might help organizations or individuals tackle their #crashstrike fire and start to consider post-fix ramifications. However, the priority before putting this together was to obviously write a limerick:

When CrowdStrike updated their drivers
There were very few global survivors
To the endpoint we go
With fixes in tow
We’re now the world’s trusted advisors

BSOD Fixes

 

22/07/24 If you need bulk rotate your Bitlocker keys see the Github script below from Ugur Koc. Good suggestion from Merill Fernando, in accordance with best practice, is not to use access tokens but switch to an interactive session…..
https://lnkd.in/gahWeVFY

21/07/24 This fix looks incredibly useful and kudos to the author. This is the first unattended option I’ve come across that works with exported Bitlocker keys and a USB-FIX dirve that can be shipped to different sites /users. Note: desperate times call for desperate measures and you will definitely want to rotate your encryption keys after this but there is a way to bulk automate this as well.  Bootable USB to Fix Crowdstrike Issue (Fully unattended with Bitlocker Support) : r/msp (reddit.com) 2. There are lots of suggestions that approx 15 restarts can fix the issue Microsoft Recommends Rebooting Your Computer 15 Times as Blue Screen of Death Strikes Worldwide (futurism.com). You can imagine the memes circulating about this particular fix. Helpdesk “have you tried turning it off and on again” User: “Of course I have” Helpdesk “16 times?”

For computers that are in a blue screen state it’s seemingly unavoidable that manual steps will be required and CrowdStrike is still the best source for identifying those steps:

support article / https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/ ) (both are being updated in real-time with additional fixes & solutions)

Here is another summary of the fixes across different systems from Morten Knudsen.

CrowdStrike issue: Workarounds – Blog by Morten Knudsen about Microsoft Security, Azure, M365 & Automation

Here is a fix developed by Adelaide University (my home city) to update the driver when you do not have the Bitlocker keys available (i.e major emergency situation)

https://www.linkedin.com/posts/a3cyber_cybersecurity-crowdstrike-incidentresponse-activity-7220346416433393665-a3UW?utm_source=share&utm_medium=member_desktop

Intune

 

If you are using Intune and wish to tackle machines that haven’t rebooted or blue screened (and worried the CS update might not apply correctly) you can look at this detection and remediation script by Mobile Jon. We haven’t test this yet but it looks like it would do the trick. He also discusses the following topics:

Using Intune Remediations to Fix the CrowdStrike Driver Bug (mobile-jon.com)

 

Bitlocker 

 

For devices that are bluescreening with Bitlocker drive encryption enabled, your life suddenly got a lot more complicated (and even more so if they weren’t backing up to Entra). There will be a need to retrieve those keys before getting your devices into safe mode so it’s worth exploring bulk export methods. Check out Nathan McNulty’s trick here:

(1) Nathan McNulty on X: “Want to d̶u̶m̶p̶ backup all BitLocker keys from Entra ID instead? 🙂 (Get-MgInformationProtectionBitlockerRecoveryKey -All) | ForEach-Object { $device = (Get-MgDevice -Filter “deviceId eq ‘$($_.DeviceId)'”).DisplayName $key = (Get-MgInformationProtectionBitlockerRecoveryKey” / X

With all this decryption activity and key retrieval underway I’d highly recommend keeping an eye on your audit logs and then rotating the keys once this saga is over. If you are using Microsoft Sentinel you should also put a detection rule in place so you can get an alert when these keys are accessed in your environment. Thanks to Jess Dodson for this:

Azure-Sentinel/Hunting Queries/AuditLogs/BitLockerKeyRetrieval.yaml at master · Azure/Azure-Sentinel · GitHub

If you are unable to retrieve your Bitlocker keys during the CrowdStrike BSOD then see this fix developed by Adelaide Uni.

https://www.linkedin.com/posts/a3cyber_cybersecurity-crowdstrike-incidentresponse-activity-7220346416433393665-a3UW?utm_source=share&utm_medium=member_desktop

 

KQL

 

Our team also wrote a simple query that will check the environment and determine where the corrupt Crowdstrike driver is location and give you some additional insight.

union DeviceFileEvents,DeviceProcessEvents,DeviceNetworkEvents
| where FolderPath == “C:\\Windows\\System32\\drivers\\CrowdStrike\\C-00000291-00000000-00000030.sys”

search “C-00000291*.sys”
| distinct  DeviceName, ActionType,FolderPath

 

Scams and Threat Intelligence

 

ACSC have reported a number of malicious websites and unofficial code being released claiming to help entities recover from the widespread outages caused by the CrowdStrike technical incident. If you have the ability to upload any URL indicators into Threat Intel library I’d recommend doing that as soon as possible or at least making people aware to use the official channels for getting information and reviewing fixes.

Widespread outages relating to CrowdStrike software update | Cyber.gov.au

Here are a list of some of those URL’s but more will obviously appear and best to remain cautious and make people aware of these scams.

Suspicious Domains Emerged After Faulty CrowdStrike Update – Daily Dark Web

 

Finally 

 

Now is definitely not the time to make any knee jerk reactions like disabling your AV or migrating to another vendor, despite the catastrophic impact this is having. At CSP, we only deliver Microsoft Defender for Endpoint and fortunately for us do not use CrowdStrike for any of our customers. However, I’ve helped some organizations over the last 24 hours that do still have the product and been impressed with CrowdStrike’s level of response and support. That said, once the dust has settled I would definitely be asking your IT team or CS directly if they support gradual roll-out (ring deployment) of updates (as Microsoft and others do). If they do not, then it might be time to reconsider your options……

Hopefully the wrong lessons are not learnt from this, such as a sudden surge in update avoidance. The benefits of keeping our systems updated still far out weigh the costs and we should have a strategic ring-based update schedule in place wherever possible. For example, we can, and should, set rings across all of the following:

-Workstation OS updates (Intune / Autopatch)

– Microsoft 365 Apps (i.e Word /Excel etc)

-Third party applications (with tools like PatchmyPC or Scappman)

-Azure Update Manager (for on-premise and cloud based servers)

-Anti-virus /EDR solutions (see links for Defender below)

 

https://cloudbrothers.info/en/gradual-rollout-process-microsoft-defender/

https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-antivirus-ring-deployment

The Future of Enablement

The Future of Enablement

What we believe sets us apart at CSP is how we consider enablement an extension of our cybersecurity services.

What is enablement? The dictionary definition provides a simple explanation: the action of making something possible. We don’t only secure your data, staff, and digital ecosystems but we also help you realize and actualize, what is possible.

We believe IT is a fundamental component of every organization which provides endless possibilities for growing and evolving, along with various risks associated with those gains. With the advent of Generative AI, Microsoft Copilot, Digital Humans and Next-gen Automation, the possibilities are growing exponentially, and organizations that realize these competitive advantages will thrive in this brave new world!

However, with the advent of software subscription models (SaaS) a significant number of solutions have been adopted over the years without much understanding of the impact and direction of travel for company data. What we call in the industry “shadow IT” – software that is not sanctioned or governed – is a growing problem that requires far more visibility from specialized tools such as Cloud App Security Brokers.

We also believe that lots of software solutions, that are most likely free with your existing Microsoft licencing investment, are often misunderstood and underutilized and the possibilities for enablement and significant cost savings are missed. Planner, Loop, Copilot, Shifts, Viva, Forms. How many of these are well known in your environment? And, what is the current investment in third-party equivalents that might have become obsolete?

Our security and enablement service delivers a comprehensive knowledge base, delivery lifecycle, and framework, which is personalized to your digital landscape and needs. We setup various Microsoft Loops within your tenancy which allow us to collaborate with the right people at the right time, and work together seamlessly on strategic vision, documentation, best practice, and future goals. Keeping our clients in the ‘loop’ and ensuring transparency is key to our long-lasting relationships.

For more information about our enablement service you can view our overview page here or reach out directly at info@csp.global

In our next post we will underscore some of the most compelling reasons for partnering with a security and enablement service provider, such as:

– on-going rapid technology enablement (suitable to your core business)

– cost efficiency by eliminating obsolete vendors

– risk management that has expertise to help with complex IT challenges

– community engagement and adoption frameworks

Is MDR becoming the new MFA for Cyber Security?

Is MDR becoming the new MFA for Cyber Security?

Certain insurance firms in the market are starting to view Managed Detection and Response (MDR) as the new checkbox equivalent of Multi-factor Authentication (MFA), offering reduced premiums and serving as compliance benchmarks for a company’s commitment to enhancing its risk management culture. Could this trend signify the next phase of evolution in business compliance? Here at CSP, we believe so!

That’s why we’ve dedicated considerable effort over the past few years, starting with the early launch of Microsoft Sentinel in 2019, to craft a tailored and cost-effective solution, designed with the SME sector in mind. The enthusiastic feedback we’ve received from many of our clients regarding the enhancements we’ve made to their cybersecurity stance, compliance adherence, and early threat detection capabilities has truly fuelled our momentum and affirmed that we’re on the right track!

In Australia, businesses are confronted with increasingly sophisticated cyber threats targeting their most valuable assets: finances, data, and reputation. Critical business components such as bank accounts, email systems, and various devices, including computers and mobile devices, are all susceptible to compromise.

The Australian Signals Directorate’s (ASD’s)Australian Cyber Security Centre (ACSC) recently released a report on the cyber security of Australian Small Businesses. Some of the stats are telling:

  • – Australian Cyber Security Centre (ACSC) receives 1 report every 10 minutes
  • – Estimated annual losses to cybersecurity are $300M
  • – 1 in 5 are unaware of the term Phishing
  • – Half of SMBs reported they spend less than $500 oncyber security per year.
  • – Only 20 percent are properly equipped with cyberinsurance.
  • – Average cost of cybercrime has risen from $39,000 to $46,000.

These statistics serve as a source of encouragement for us at CSP as we remain committed to ensuring that our Managed Detection and Response (MDR) surpasses mere detection capabilities. At the heart of our approach lies a philosophy of nurturing partnerships through knowledge sharing and elevating your security posture in a rapidly evolving landscape.

Traditionally, Security Operation Centers (SOCs) would offer recommendations, leaving IT departments, Chief Information Security Officers (CISOs), CEO’s, and IT sysadmins grappling with the implementation of complex technical changes. We frequently encounter organizations puzzled by questions such as: 

  • – What exactly is Zero Trust?
  • – How do we implement Conditional Access policies to deal with a semi-remote workforce?
  • – What does effective device management entail?
  • – How can we identify all our assets and assess associated risks?
  • – What is our risk profile?
  • – How do we consolidate disparate cybersecurity solutions that are costing us a fortune?

Recognizing the need for clarity and guidance, we have built answers to these queries into our service offerings. This approach sets us apart as a truly unique service provider.

Not only do we deploy a Microsoft Teams integrated platform that provides full visibility into our services, showcasing our incident management, early warning detection capabilities, and Threat Intelligence, but we also address digital hygiene and compliance questions that SMEs have struggled to navigate.

“Outsourcing may lead to gaps in the owner’s cybersecurity knowledge about which security measures are being implemented to protect their business. Data shows that for many SMBs opting to outsource, their outsourced provider did not necessarily implement all of the Essential Eight”

–     ACSC Small Business report

As ACSC alludes to in their report – some service providers have not followed through on their promises, especially when it comes to Essential Eight alignment, something we’ve witnessed first-hand. At CSP, we implement all eight mitigation strategies as well as present evidence in a comprehensive report, and best of all, it’s built directly into your platform. When service providers claim to align with ES8 the best proof is in the pudding. Evidence should be part of any compliance effort. You do not want to find out these controls do not exist while lodging an insurance claim. 

For additional insurance and business continuity, we’ve cultivated relationships with trusted insurance brokers who can enlighten SMEs on the benefits of cybersecurity policies in today’s landscape. By aligning with a managed cybersecurity service provider like us, which assists with technology aspects covered in insurance questionnaires, SMEs can realize significant cost savings on premiums—a testament to our commitment to going above and beyond.

This year, we’re thrilled to unveil our forthcoming interactive guided tours and our Lighthouse MXDR trial. These initiatives will empower organizations with a comprehensive understanding of their operational activities and provide actionable insights on reducing costs while maintaining a robust cybersecurity posture. We look forward to announcing the release on our website soon.

If you want to find out more book a free demo with us here.

The Evolving Landscape of Cybersecurity and CSP’s Guiding Light

The Evolving Landscape of Cybersecurity and CSP’s Guiding Light

In the dynamic and ever-evolving digital landscape, the realm of cybersecurity stands as a sentinel against an array of threats that continuously mutate and adapt. As technology advances, so do the tactics employed by cyber adversaries, creating a shifting battleground where organizations must stay ahead to protect their digital assets. In this landscape, CSP emerges not just as a cybersecurity provider but as a guiding light navigating organizations through the complexities of the modern cybersecurity terrain.

Understanding the Shift

The traditional approach to cybersecurity, characterized by perimeter defences and reactive strategies, is no longer sufficient. The digital landscape has undergone a metamorphosis with cloud computing, remote work, and interconnected systems becoming the norm. As a result, the attack surface has expanded and cyber threats have become more sophisticated.

To effectively combat these evolving threats, organizations need a proactive and comprehensive cybersecurity strategy that goes beyond traditional measures. This is where CSP steps in, bringing a strategic and forward-thinking approach to cybersecurity.

CSP’s Approach: Beyond Traditional Measures

Modern SOC – Unifying Defense

CSP embraces a Modern Security Operations Center (SOC) model, a paradigm shift from traditional approaches. The Modern SOC is not just a response unit; it’s a proactive, intelligence-driven defence mechanism. By unifying security tools and leveraging advanced technologies, CSP’s Modern SOC provides real-time threat detection, proactive threat hunting, and streamlined incident response.

Microsoft Security Copilot – A Game-Changer

At the core of CSP’s cybersecurity arsenal is the Microsoft Security Copilot, a groundbreaking innovation that transforms how organizations investigate and respond to security threats. Copilot seamlessly integrates Microsoft Sentinel and Microsoft 365 Defender, creating a unified platform for cybersecurity investigations. This integration eliminates the need for juggling multiple tools, streamlining workflows, and enhancing overall efficiency.

Zero Trust Security Model – Redefining Trust

In a world where traditional notions of trust are challenged, CSP advocates for the Zero Trust security model. This approach assumes that threats may exist both inside and outside the network. With Zero Trust, every user, device, and network flow is treated as potentially untrusted, requiring continuous verification. This model aligns with the modern landscape where traditional perimeters have dissolved, and threats can emerge from any point.

MDR for Swift Response

Managed Detection and Response (MDR) is a cornerstone of CSP’s approach. In a landscape where speed is paramount, MDR ensures swift response to emerging threats. CSP’s MDR combines advanced threat detection technologies with human expertise, providing continuous monitoring and rapid response capabilities.

Navigating Complexity with CSP

CSP serves as a guiding light for organizations navigating the complexities of the modern cybersecurity landscape. Here’s how:

Holistic Defense Strategies

Understanding that cybersecurity is not a one-size-fits-all endeavour, CSP develops holistic defence strategies tailored to each client’s unique environment. By conducting thorough risk assessments, CSP identifies vulnerabilities, designs robust security architectures, and implements defence-in-depth measures.

Proactive Threat Intelligence

Staying ahead of adversaries requires a deep understanding of emerging threats. CSP’s proactive threat intelligence services involve continuous monitoring, analysis of threat landscapes, and timely dissemination of intelligence to strengthen organizations’ cyber defences.

Continuous Training and Awareness

Human error remains a significant factor in cybersecurity incidents. CSP prioritizes continuous training and awareness programs to educate users about evolving threats, phishing tactics, and best cybersecurity practices. An informed workforce becomes an active part of the defence mechanism.

Incident Response and Recovery

Acknowledging that no defence is foolproof, CSP’s incident response and recovery strategies ensure organizations can effectively contain and recover from security incidents. This involves not only technical response but also legal and communication aspects to minimize the impact on the organization’s reputation.

As the cybersecurity landscape continues to evolve, CSP stands as a beacon of innovation, resilience, and expertise. The guiding light provided by CSP extends beyond mere protection; it encompasses empowerment. Empowering organizations to embrace the digital future with confidence, knowing that their cybersecurity partner is not just keeping up with the changes but leading the way. In this ever-changing landscape, CSP’s commitment to staying ahead ensures that its clients are not just secure but are thriving in the digital realm. Partner with CSP, where the future of cybersecurity is not a challenge but a journey of continual transformation and triumph.

Microsoft Security Copilot: Transforming Cybersecurity Investigations

Microsoft Security Copilot: Transforming Cybersecurity Investigations

In an era where cyber threats are becoming increasingly sophisticated and pervasive, organizations must continuously evolve their cybersecurity strategies to stay one step ahead of cybercriminals. Microsoft, a global technology giant, has been at the forefront of developing innovative solutions to address the ever-growing challenges of cybersecurity. One such groundbreaking tool that is transforming the landscape of cybersecurity investigations is the Microsoft Security Copilot.

The Evolution of Cybersecurity Investigations

Traditional approaches to cybersecurity investigations often involve manual processes, relying heavily on the expertise of cybersecurity analysts to detect, analyze, and respond to threats. However, with the sheer volume and complexity of modern cyber threats, these traditional methods are proving to be inadequate.

Enter Microsoft Security Copilot, a solution designed to streamline and enhance the entire cybersecurity investigation process. By leveraging advanced technologies such as artificial intelligence (AI), machine learning (ML), and automation, Microsoft has created a tool that not only accelerates investigations but also improves the accuracy of threat detection. Some of the important features of this tool are:

Automated Threat Detection:

Microsoft Security Copilot employs advanced machine learning algorithms to automatically detect potential threats in real-time. By analyzing vast amounts of data from diverse sources, the tool can identify patterns and anomalies that may indicate malicious activity. This automated threat detection significantly reduces the time it takes to identify and respond to potential security incidents.

Intelligent Analysis and Prioritization:

The copilot goes beyond mere detection by providing intelligent analysis and prioritization of threats. It assesses the severity and potential impact of each threat, enabling cybersecurity teams to focus their efforts on addressing the most critical issues first. This feature is invaluable in a world where time is of the essence in preventing and mitigating cyber attacks.

Collaborative Investigation Platform:

Collaboration is key in cybersecurity investigations, and Microsoft Security Copilot recognizes this by offering a collaborative investigation platform. Security analysts can work together seamlessly, sharing insights, findings, and recommendations in real-time. This collaborative approach not only enhances the efficiency of investigations but also ensures that all relevant stakeholders are on the same page.

Integration with Microsoft 365 Defender:

Microsoft Security Copilot seamlessly integrates with the broader Microsoft 365 Defender ecosystem. This integration enables organizations to benefit from a holistic security approach, where information from various Microsoft security products is aggregated and analyzed cohesively. This interoperability ensures that cybersecurity teams have a comprehensive view of their organization’s security posture.

Real-world Impact

The real-world impact of Microsoft Security Copilot is already evident in organizations that have adopted this transformative tool. One notable aspect is the significant reduction in the mean time to detect (MTTD) and mean time to respond (MTTR) to security incidents. By automating the initial stages of threat detection and providing intelligent prioritization, the copilot empowers cybersecurity teams to respond rapidly to emerging threats.

Moreover, the collaborative nature of the investigation platform has led to improved communication and coordination among security analysts. This not only enhances the overall effectiveness of cybersecurity teams but also contributes to a more proactive and adaptive security posture.

Addressing Challenges in Modern Cybersecurity

The cybersecurity landscape is constantly evolving, and so are the challenges that organizations face. Microsoft Security Copilot addresses some of the most pressing challenges in modern cybersecurity:

Sophisticated Threats:

As cyber threats become more sophisticated, organizations need equally advanced tools to detect and respond to these threats effectively. Microsoft Security Copilot’s use of AI and ML technologies enables it to adapt to evolving threat landscapes, staying ahead of cybercriminals.

Volume of Data:

The copilot tackles the challenge of handling vast amounts of data by automating the initial stages of threat detection. This not only accelerates the investigation process but also ensures that no potential threat goes unnoticed amidst the data deluge.

Human Resource Constraints:

Cybersecurity talent is in high demand, and organizations often face challenges in recruiting and retaining skilled professionals. Microsoft Security Copilot acts as a force multiplier, allowing existing cybersecurity teams to achieve more with their existing resources by automating repetitive tasks and augmenting human capabilities with intelligent insights.

The Road Ahead

Microsoft Security Copilot represents a significant step forward in the realm of cybersecurity investigations, but the journey doesn’t end here. Microsoft continues to invest in research and development to enhance the capabilities of the copilot, ensuring that it remains at the cutting edge of cybersecurity innovation. As cyber threats continue to evolve, organizations must remain vigilant and proactive in adopting advanced tools and strategies to protect their digital assets. Microsoft Security Copilot is a beacon of innovation in this ongoing battle, providing organizations with a powerful ally in their quest for a resilient and secure digital environment.

CSP stands at the forefront of cybersecurity excellence, leveraging state-of-the-art solutions like Microsoft Security Copilot to fortify your digital domain. Our commitment to providing innovative and integrated cybersecurity services reflects our dedication to securing your organization against evolving threats. Partner with CSP to elevate your cybersecurity posture and navigate the complexities of the digital landscape with confidence.

Fortune Favors the Prepared Mind

Fortune Favors the Prepared Mind

The Royal United Services Institute (RUSI) is the world’s oldest and the UK’s leading defence and security think tank. They recently published an extremely interesting paper which you can read in full here: ‘The Scourge of Ransomware: Victim Insights on Harms to Individuals, Organisations and Society‘.

The paper sets out a framework for understanding ransomware and the layers of harm we often overlook. 🔍 Summary of Key Findings:

  • Beyond Financial Loss: Ransomware harms extend far beyond the financial and include physical, psychological, reputational, and social impacts.
  • Downstream: The paper introduces a nuanced framework for ransomware impacts – categorized into first-order, second-order, and third-order harms, based on an existing taxonomy of cyber harms. Downstream from a ransomware attack can be even more challenging than being at the epicentre, as access to information about the attack may be much more limited.
  • Societal and National Security Impact: The effects of ransomware harms can significantly disrupt supply chains, erode public trust in services and law enforcement, and offer advantages to hostile countries that provide safe havens to cyber-criminals.
  • Organisational Risk: For organisations of all sizes, ransomware not only poses financial risks but also threatens their very survival and reputation, especially those handling sensitive data or requiring operational integrity.

These findings convey the broad and deep impacts of ransomware and urge a more surgical approach to cybersecurity.

💡 Why It Matters: As ransomware and other attacks continue to evolve, understanding the levels of harm is crucial for developing effective interventions and strategies, and boosting the resilience or ‘immunity’ of our digital estates. To combat this widespread cyber-disease we need to follow a method……

The CSP Way

 

For several years, we’ve been following our unique approach to addressing ransomware and other malicious attacks across Australia, drawing inspiration from the history of medical science. Why medicine, you might ask?

Well, there are several compelling reasons why these seemingly distinct fields are more similar than you might think: here are just a few common features:

  1. Diagnosis and analysis: detecting vulnerabilities within the ecosystem and understanding how hackers or ‘digital germs’ exploit them.
  2. Treatment and remediation: after identifying a security issue a remediation effort might be required such as isolating a system, evicting the hacker, or implementing security updates.
  3. Ongoing check-up and maintenance: security is a journey, not a destination, and requires continuous monitoring, updates, and adjustments. Depending on your unique organization or ‘cohort’, the effort and controls will also vary.

 

Equally, there are many things we can learn from medicine about how not to practice cybersecurity.

First, do no harm – Hippocrates

This principle of ‘first do no harm’, is an oath that every doctor today has to swear to uphold, but was commonly overlooked throughout much of medical history.

Consider bloodletting, a widespread yet wholly ineffective practice that was meant to remove an illness by draining the patient of several litres of blood. It’s a fact, that seeing a doctor throughout most of human history significantly lowered your chances of survival rather than increasing them.

The Latin term ‘iatrogenic’ is a concept that conveys a fundamental truth: every intervention carries potential risks. Thus, unnecessary interventions should be avoided and the costs and benefits of all others carefully weighed up. Greater observation and commitment to ‘first, do no harm’ Is the moral of the story, and a lesson we consider before recommending any cybersecurity controls or initiatives.

Fortune favors the prepared mind – Louis Pasteur

This saying became particularly relevant after the advancements following the germ theory of disease, which more accurately explained how illnesses spread and developed by microbes. This seismic shift in our understanding of medical causes underscored the importance of experimentation and humility, revealing how the medical community, especially those who practiced bloodletting, had been overly confident and extremely unobservant.

This realization highlights the value of acknowledging our limitations and the potential for error. Embedded in our culture at CSP Global are the principles of humility, preparation, and greater observation. We only recommend interventions and controls that make sense to your organization. Plus, we routinely pilot changes against a small sample size to ensure we do not cause unnecessary harm to the health of your operations and productivity.

By continuously seeking feedback and looking for errors, we inform our future strategies and processes, thereby avoiding the traps of being overzealous about one particular procedure. With this knowledge in mind, we established our guiding pillars for bolstering an organization’s immunity against cyber disease:

💰 Eliminate: Complexity and disparate solutions can make attacks harder to detect and add unnecessary inefficiencies. Bringing your capabilities under one roof with Microsoft XDR (protecting every assets i.e devices, apps, emails, servers, and data), and eliminating patchwork solutions, can increase cost savings by up to 60%

🎯 Simplify: Complexity is the enemy of effective cybersecurity. We are dedicated to simplifying the security landscape for our clients, cutting through the jargon, and delivering solutions that enable you to do more with less.

🔍 Protect: Your digital workers are at the heart of everything we do. Our robust and tailored solutions are designed to safeguard your assets and sensitive data against evolving cyber threats. We vastly expand what is detected within an organization and deliver specific playbooks for how to respond, providing you with far greater peace of mind.

If you want to find out how we can apply this method to the lifeblood of your organization, please reach out to us here and book a free cyber-health consultation. 😃