Connect with us

Cybersecurity

Increased Security Initiatives Essential to the Future of Telework

Published

on

Image by NSWC Crane used with permission

July 28, 2020 — Many Americans will continue to work remotely for the foreseeable future, posing major security threats to institutions that are struggling to secure their digital workforces.

In order to secure telework for the future, it is necessary for companies to boost security initiatives, said Tim Lemaster, director of systems engineering at Lookout, in a virtual conversation sponsored by the Government Executive Media Group on Monday.

Another threat facing the future of telework is a lack of internet accessibility and resiliency.

Issues like network latency and connectivity could cause problems, said Michael Geraghty, chief information security officer for the state of New Jersey.

For most organizations, the pandemic has been a major test of cybersecurity controls and policies.

A Tripwire survey of cybersecurity professionals revealed that 94 percent have become more concerned about security since transitioning to working from home.

The COVID-19 crisis has fueled the adoption of remote connections and the use of personal devices on unsecure networks, increasing cybersecurity risks.

The use of personal devices for telework makes it more difficult for employers to understand the scope of their attack surface.

Difficulties such as this led to 89 percent of cybersecurity professionals claiming that working from home made successfully executing security initiatives more difficult. Further, 64 percent reported that visibility of assets was more difficult with employees working from home.

Security threats facing telework forces also include increased ransomware attacks, the lack of security of employee home networks and phishing and social engineering attacks.

Panelists recommended increasing cybersecurity controls in response to the telework security issues raised.

They contended that increasing visibility of assets was crucial, as providers need better visibility to understand everything connected to networks in order to give sufficient review to new or personal devices being utilized.

Geraghty recommended cyber security experts build upon best practices laid out by organizations like the Cybersecurity and Infrastructure Security Agency.

Panelists agreed that user education is crucial in combating telework security issues.

Contributing Reporter Jericho Casper graduated from the University of Virginia studying media policy. She grew up in Newport News in an area heavily impacted by the digital divide and has a passion for universal access and a vendetta against anyone who stands in the way of her getting better broadband.

Cybersecurity

Large Telecoms Pitch Strike Force for Internet Traffic Security Over Global Gateway

Verizon, AT&T and Lumen warned about prescriptive rules that could diminish security.

Published

on

WASHINGTON, February 23, 2023 – Verizon, AT&T and Lumen Technologies have proposed that the Federal Communications Commission adopt and lead a strike force consisting of various industry, government and international participants to come up with policy mechanisms to secure internet traffic over the global gateway.

The proposals are particular to the border gateway protocol, which is how global traffic is routed. The problem is that there are no security features to ensure trust of the information being routed, according to the FCC, which opened a proceeding on the matter on February 28 last year asking for commentary on what to do about the issue. The concern is that without security measures, bad network actors can redirect traffic to itself instead of the intended recipient, which exposes Americans to the theft of identity, extortion, financial transactions, and state spying, the commission noted.

In the letter last week, the three telecommunications companies proposed that secure internet traffic routing practices over the border gateway protocol first focus on critical infrastructure entities in the United States and its allies to allow these telecommunications companies to protect the traffic routes via filtering.

The filtering would involve registering traffic origins and identifying where to filter traffic along the route, including at interconnection peering points and customer routers. The proposed strike force would involve Big Tech companies and cloud platforms, which the FCC asked if it should include in its original proceeding document, as they have networking equipment and BGP routers. The internet service providers, who have their own filtering practices, also floated the possibility of the Cybersecurity and Infrastructure Security Agency requiring other agencies to provide that information.

The proposal also includes “collaborative assurances” in which the ISPs would provide confidential technical briefings about the practices.

But they advise against the FCC making prescriptive rules about such practices, noting that different ISPs have different approaches by design, and that any onerous approach could jeopardize security, not bolster it.

Questions about FCC’s jurisdiction over a fundamentally global internet routing system

The trio also questioned the jurisdiction of the commission on the routing ecosystem, which is fundamentally global.

“Asserting prescriptive regulatory control over internet protocols could have cascading effects, prompting international regulators – and authoritarian regimes in general – to seek greater internet control at the global level through” the United Nation’s telecommunications regulatory, the International Telecommunication Union.

“This would create barriers to U.S. leadership in the global digital economy and U.S. national security and is directly contrary to core interests of the United States and our free market democratic allies,” they added.

The FCC’s notice came just days after Russia’s invasion of Ukraine, which resulted in reports of increased cyberattacks from the warring regions. In fact, the FCC accused Russian network operators of inexplicably routing traffic through its country, including from traffic from Google, Facebook, Apple, Microsoft and major credit card companies MasterCard and Visa.

It also came before a law was passed that requires critical infrastructure companies to report to the federal government within a certain timeframe when they have experienced a hack or breach, as the country grapples with a number of high-profile attacks since the pandemic began.

The FCC has targeted national security threats by halting license authorizations to Chinese firms and putting on a blacklist a number of companies whose equipment American telecommunications companies are expected to remove from their networks.

Continue Reading

Cybersecurity

Smaller Companies Facing Cybersecurity Insurance Headwinds: Equifax Executive

Cost of insurance for cybersecurity could be a problem for smaller companies.

Published

on

By

WASHINGTON, February 15, 2023 – Smaller companies may face increasing cybersecurity insurance costs as the market evolves, warned an executive at credit bureau company Equifax.

Cybersecurity insurance will be extraordinarily important for small-to-medium-sized businesses, said Jamil Farshchi, executive vice president and chief information security officer. But premium cybersecurity insurance coverage has increased in recent years, with many small-to-medium-sized businesses relying on that cybersecurity insurance to keep them safe.

“These are small businesses that don’t have the resources that larger organizations do,” Farshchi said. “So I worry as the insurance market evolves, the premiums and the coverage levels are getting such that is very difficult.”

Equifax was a victim of one of the country’s most infamous breaches, when in 2017 the data of 147 million Americans were stolen by hackers. The company settled for hundreds of millions of dollars with the Federal Trade Commission.

Experts have urged companies to assume that any outside program is vulnerable to hacking, a position known as “zero trust.” This way, they can take the necessary measures to address the attack.

The United States has been on heightened alert when it comes to cybersecurity issues. Over the last two years, a number of high-profile cybersecurity breaches have impacted a software company, an oil transporter, and a meat producer. Those cybersecurity problems have triggered legislation that requires that the federal government be alerted when critical industries suffer such breaches.

After Russia invaded Ukraine early last year, a number of cybersecurity hacks emerged from those countries, according to an Atlas VPN report shortly after the invasion.

Continue Reading

Cybersecurity

CES 2023: Consumers Need to Understand Personal Cybersecurity, Says White House Cyber Official

Consumers must better understand how to weigh risks and protect themselves in the digital world, said Camille Stewart Gloster.

Published

on

Photo of John Mitchell, Tobin Richardson, Amit Elazari, and Camille Stewart Gloster (left to right)

LAS VEGAS, January 7, 2023 – In addition to building a more robust cybersecurity workforce, policymakers should consider consumer education, said Camille Stewart Gloster, deputy national cyber director for technology and ecosystem for the White House, speaking Saturday at the Consumer Electronics Show.

CES 2023 has featured numerous discussions of cybersecurity in sectors ranging from transportation to Internet of Things home devices. On Thursday, an official from the Department of Homeland Security argued that manufactures should design and pre-configure devices to be secure, thus reducing the security burden on consumers.

For their own protection, consumers must better understand how to weigh risks and protect themselves in the digital world, Stewart Gloster said Saturday. “The sooner that people understand that their physical security and digital security are inextricably linked the better,” she argued. According to the panel’s moderator, Consumer Technology Association senior manager for government affairs John Mitchell, 82 percent of data breaches in 2021 involved “the human element, stolen credentials, phishing, misuse.”

Stewart Gloster’s team is working on a national cyber-workforce and education strategy, she said, which will address the federal cyber workforce, the national cyber workforce, cyber education, and “digital safety awareness.”

Stewart Gloster said workforce initiatives should promote the participation of “people of a diverse set of backgrounds who are highly skilled and multidisciplinary who can take a look at the problem space, who can apply their lived experiences, apply the things they’ve observed, apply their academic backgrounds to a challenging and ever evolving landscape.”

Continue Reading

Signup for Broadband Breakfast News



Broadband Breakfast Research Partner

Trending