Verkada disables accounts after reports its security cameras were breached
Following reports that live feeds from over 150,000 of its security cameras were exposed, including those situated in prisons, hospitals, schools, police stations, and Tesla factories, Verkada has disabled accounts to prevent further access.
According to Bloomberg, a group of hackers accessed the data collected by the Silicon Valley startup. The hackers are reported as saying they also have access to the full video archive of all Verkada customers.
Bloomberg claims to have sighted footage validating the details of the breach. Commentary provided to Bloomberg from the hackers claiming responsibility for the incident said the breach intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into.
The startup claims over 5,200 customers. It is understood customers of the startup have been made aware of the issue.
(Source: ZDNet)
2021 Cybersecurity Spring Cleaning Checklist
Spring is not just a good time for cleaning your house or apartment, it’s also a good time to clean up your technology and cyber footprint.
Throughout the year, especially around the holidays and during tax season, you extend your cyber footprint by paying bills, shopping, using social media, and many other digital activities whether for business or pleasure. Spring cleaning your space is meant to improve the air quality after having it closed up all winter, and cleaning can improve your mood and remove a year’s worth of clutter. Cleaning your technology and cyber footprint can do the same thing; it removes clutter from your life while at the same time protecting you and your loved ones.
While spring cleaning, you often make a list to ensure you don’t forget to clean the spots you don’t normally think about, like behind the sofa or on top of the fridge. To help you spring clean your technology and cyber footprint, we have developed a checklist to help you through the process. And just like spring cleaning your house, you can assign these tasks to your family.
Read the full article for the complete list of recommendations from the MS-ISAC.
(Source: Center for Internet Security)
Microsoft releases one-click mitigation tool for Exchange Server hacks
Microsoft has released a one-click mitigation tool as a stop-gap for IT admins who still need to apply security patches to protect their Exchange servers.
Released on Monday, March 15, the tool is designed to mitigate the threat posed by four actively-exploited vulnerabilities that have collectively caused havoc for organizations worldwide.
Microsoft released emergency fixes for the critical vulnerabilities on March 2. However, the company estimates that at least 82,000 internet-facing servers are still unpatched and vulnerable to attack.
The Microsoft Exchange On-Premises Mitigation Tool has been designed to help customers that might not have security or IT staff on hand to help and has been tested across Exchange Server 2013, 2016, and 2019.
(Source: ZDNet)
Basic and no-cost steps agencies can take to defend against hackers
High profile hacking incidents in recent months, as well as ransomware attacks targeting cities and other public sector entities over the past couple of years, serve as a reminder of the cybersecurity risks that state and local governments have to contend with.
For smaller-sized localities and agencies, in particular, tackling these sorts of threats can be a challenge given limited staff and tight funding. But there are some low-cost and relatively straightforward steps that state and local governments can take to protect themselves.
Multi-State Information Sharing and Analysis Center, or MS-ISAC, outlined some of these measures during an online session held as part of Govapalooza, an event for local government leaders.
- One key step governments can take to protect their networks is to frequently “patch” software and operating systems with updates meant to eliminate security gaps.
- Making sure that firewalls are up to date and that antivirus software is installed and running.
- Adopting strong password standards and potentially considering two-factor authentication,
- Backing up data.
- Testing back-ups regularly.
(Source: Route Fifty)
|