Cloud computing: Why a major cyber-attack could be as costly as a hurricane

Cloud computing: Why a major cyber-attack could be as costly as a hurricane

The economic damage of a successful major cyber-attack against a large cloud services provider could be similar in scale to the financial impact of a destructive hurricane.

The destructive tropical cyclone hurricane Katrina hit the US in 2005, causing $108bn in damage — but that could be exceeded by the cost of a major cyber-attack, according to one expert.

Read more at https://www.zdnet.com/article/cloud-computing-why-a-major-cyber-attack-could-be-as-costly-as-a-hurricane/

Ontario hospital exposed thousands of unused IP addresses

Ontario hospital exposed thousands of unused IP addresses

An Ontario hospital last fall accounted for over three quarters of the exposed and unusued IP addresses or connected devices among medical institutions around the globe, according to research conducted by two security vendors.

Read more at https://www.itworldcanada.com/article/ontario-hospitals-exposure-of-tens-of-thousands-of-unused-ip-addresses-was-risky-says-study/403606

Ontario hospital exposed thousands of unused IP addresses

Medical Devices Are the Next Security Nightmare

HACKED MEDICAL DEVICES make for scary headlines. Dick Cheney ordered changes to his pacemaker to better protect it from hackers. Johnson & Johnson warned customers about a security bug in one of its insulin pumps last fall. And St. Jude has spent months dealing with the fallout of vulnerabilities in some of the company’s defibrillators, pacemakers, and other medical electronics. You’d think by now medical device companies would have learned something about security reform. Experts warn they haven’t.

Read more at https://www.wired.com/2017/03/medical-devices-next-security-nightmare/

#IoT #DDoS loophole? Do You Still Trust The Internet?

#IoT #DDoS loophole? Do You Still Trust The Internet?

Cyber-warfare – Yesterday a massive DDoS attack took down a large portion of the Internet leaving sites offline or at dial-up speed. At first it was thought that the issue was neutralized, however as midday approached another massive attack rendered major sites unavailable. The attack was targeted at a major domain DNS server provider, however the ramifications to the attack were seen to be much more substantial. Sites like Twitter, Netflix, Reddit, PayPal, Kijiji, Pinterest and even the entire PlayStation Network were down or struggling. This was only a small portion of the list. At the moment we still do not know who initiated the attack, however it’s thought that IoT (Internet of Things) devices may actually be the an accessory to the crime. With so many providers affected we now need to take time analyze how this may affect online EMR providers in the future. Can IoT malware attacks and other types render cloud based applications offline? How does this affect patient care?

To read more about the attack that shutdown a large portion of the Internet click on the links below:

https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/

https://threatpost.com/mirai-fueled-iot-botnet-behind-ddos-attacks-on-dns-providers/121475/

Protecting Your Organization From Ransomware

Protecting Your Organization From Ransomware

Ransomware is one of the fastest growing areas of cyber crime. The intended target is often small and medium sized businesses, because they have fewer resources compared with larger organizations. Historically, the root word ransom refers to a criminal demanding a payment in exchange for releasing someone or something that has been taken.

Read more at http://www.huffingtonpost.ca/matthew-held/5-ways-to-protect-from-ransomware_b_9872320.html

Cloud computing: Why a major cyber-attack could be as costly as a hurricane

Where Cloud Security Falls Short

Although many enterprises have user access security measures in place, both on-premises and in the cloud, they may not have enough, warned the Cloud Security Alliance in a new report.

The report, “Identity Solutions: Security Beyond the Perimeter,” was released April 21. It’s based on 325 online interviews conducted worldwide by the CSA. The findings revealed “no significant differences in security solutions used” between respondents who reported a breach and those who didn’t, according to the report, which was sponsored by Centrify, maker of identity security tools for the enterprise.

When asked in the CSA survey if their company had ever reported a data breach, 17% of respondents said yes, 26% said they were unsure, and 57% said no. Of those who said their company had reported a breach, 22% said the breach was caused by compromised credentials.

Read more at http://www.informationweek.com/cloud/identity-management-where-cloud-security-falls-short/d/d-id/1325238