Daily Archives: April 16, 2019

Federal, State Cyber Resiliency Requires Action

It is no shock that our state and local infrastructures are some of the most sought-after targets for foreign and malicious cyber attackers, but the real surprise lies in the lack of preventive measures that are able to curb them. Major attention has been drawn to the critical gaps that exist as a result of an ever-expanding attack surface, making old system architectures an increasing liability.

Recently, the city of Albany, New York became a victim of a ruthless ransomware attack, which created a series of municipal service interruptions. Residents weren’t able to use the city’s services to obtain birth certificates, death certificates or marriage licenses, and the police department’s networks were rendered inoperable for an entire day. This resulted in an enormous disruption of the city’s functionality and made clear that the threat to infrastructure is more real than ever. Bolstering state and local digital defenses should be of the utmost priority, especially as we near the 2020 presidential elections when further attacks on election infrastructure are expected. We must take the necessary precautions to mitigate cyberattack risk.

The reintroduction of the State Cyber Resiliency Act by Senators Mark Warner (D-VA) and Cory Gardner (R-CO), and Representatives Derek Kilmer (D-WA) and Michael McCaul (R-TX), does just that. The legislation demonstrates a critical bipartisan effort to ensure that state, local and tribal governments have a robust capacity to strengthen their defenses against cybersecurity threats and vulnerabilities through the Department of Homeland Security (DHS). States have made clear that they suffer from inadequate resources to deal with increasingly sophisticated attacks, but also the most basic attacks, which require proper safeguards and baseline protection. This bill works to strategically address the challenges posed by a lack of resources to deal with emerging threats.

The possibility of cyber warfare must not be taken lightly and has long gone ignored. This bill shows that the status quo of kicking the can further down the road will no longer stand as a “strategy” in today’s political and cybersecurity landscape. Action is necessary to better secure our national security and the systems upon which every sector of our economy relies, from utilities to banking to emergency first responders to hospital networks to election infrastructure. It is our responsibility to create and support the safeguards against bad actors looking for gaps in our infrastructure.

The bill makes states eligible for grants to implement comprehensive, flexible cybersecurity plans that address continuous vulnerability monitoring, protection for critical infrastructure systems and a resilient cybersecurity workforce. States would also be able to repurpose funds to various local and tribal governments. In addition, the bill would implement a 15-person committee to review the proposed plans and track the spending of state and local governments. This committee would help states and localities formulate and deliver annual reports to Congress that detail the program’s progress. The specific funding was not disclosed, but this effort showcases the timeliness of the issue and why it is such an imperative step at this stage in time.

We must take basic steps to ensure the security of our state and local systems, and enable systems to be patched, maintained and protected from outside threats. This bill is a welcomed and needed effort by lawmakers to address the existing challenges states and local governments and infrastructures are dealing with every day.  As adversaries become increasingly sophisticated and targeted in their attack strategies, we have a responsibility to best equip states and localities with the necessary tools to close gaps and mitigate gaps.

We at McAfee are committed to partnering with federal, state and local governments to equip them with the best strategies to create a better and more secure cybersecurity future.

The post Federal, State Cyber Resiliency Requires Action appeared first on McAfee Blogs.

Continuing Education On Cyber Threats And Defenses

Anyone who has been in cybersecurity for any length of time knows, the threat landscape is constantly changing and requires regularly monitoring of news, blogs, podcasts, and other ways to ensure you know what is happening today. I have tried to bring this information to the public since starting my monthly threat webinar series in July of 2015. Over the years, I’ve been able to share information about the different aspects of the threat landscape from advanced persistent threats (APT) to zero-day exploits and everything in-between. My focus with these webinars is to share information about how these threats work and the technologies available to defend against them. I regularly have experts join me on these webinars too, so you don’t have to just listen to me all the time.

However, my main goal is to help you better understand what you are up against in your fight against threat actors and their ways of attacking you, your employees, systems and networks. I also ask for requests on topics you want me to cover in the future using a survey option within our webinar platform we use. Each of the webinars is live and allows you to ask questions to be answered either during the live event or afterwards via an email. We also record each of these webinars and you can watch them on-demand, as we know your time is valuable and sometimes you cannot attend it live or you want to share with your colleagues. Note – if you sign up for any of the on-demand webinars, you will receive an email with the upcoming month’s webinar topic. The April 2019 webinar will cover Bug Bounties and How They Help and you can sign up to attend here.

Webinars are one way we can help you stay educated and up-to-date about the industry and what’s happening today, as well as what we expect to happen next. You can also follow our other blogs, like Security Intelligence or Security News, for the latest from Trend Micro Research. We also have great explanatory videos on our Trend Micro YouTube channel.

Feel free to leave a comment below if there are any topics you’d like me to cover in upcoming months or if you simply want to say hello. I look forward to seeing you on one of my next webinars.

The post Continuing Education On Cyber Threats And Defenses appeared first on .

Why choose Seqrite mSuite- we give you 5 reasons!

Estimated reading time: 2 minutes

Smartphones are no longer luxuries – in today’s day and age, they are an omnipresent reality. Mobile devices do not just offer connectivity anymore, there are used for many business functions. Business emails, document reviews, editing, and video conferencing are just some of those. To support a mobile workforce, companies issue handhelds such as smartphones, tablets, and laptops that enable them to work while traveling or while sitting at the comfort of their homes. Some companies also support the ‘Bring Your Own Device (BYOD)’ concept which permits employees to access company network from their personal handhelds.

To ensure that organizations keep their defenses secure, it is imperative that they secure their company devices with mobile devices management solution. Network administrators can consider the Seqrite mSuite solution for this purpose. This is a powerful solution to increase the productivity of an enterprise by mobilizing the workforce while ensuring that enterprise data remains absolutely secure. The solution allows network managers to get total control over all applications installed on official devices, monitor internet usage patterns, track device location and apply company policies as per the location and time, and provide support through remote device control as well as file transfer. Organizations can remain in total control of what’s happening with their data even beyond their own network.

If you’re still wondering why Seqrite mSuite is the perfect solution for your mobile device management needs, here are five reasons to convince you:

  1. Single Console Management for All Devices

Seqrite mSuite offers easy device management by offering single console management for all devices. Enrolment can be done in minutes, saving precious time with features such as remote ring, locking/unlocking, locating/tracing and wiping of devices. They can also be grouped together under one single policy applied and configured. Devices can also be tracked on a map in real time.

  1. Comprehensive security management

Enterprise administrators don’t need to worry about security with Seqrite’s built-in antivirus that keeps data safe from Viruses, Trojans, ransomware and organized cybercrime attacks. Admins can easily schedule a Quick Scan or Full Scan on any enrolled device remotely. Seqrite mSuite offers excellent web security thanks to browsing, phishing and web protection.

  1. Seamless App Management

Applications running on the enrolled devices can be easily managed and secured. Applications and updates can be pushed from server to devices with blacklisting and whitelisting offered. Users can download apps on demand through the enterprise app store which establishes control over the use of applications. The device can be transformed to use a single app through the kiosk mode feature.

  1. Easy Data Monitoring & Management

It’s easy to stay in control of all critical data with Seqrite mSuite. Digital boundaries can be defined by applying restrictions on devices with Wi-Fi, Geo, and Time fFence Data usage can be monitored through mobile and Wi-Fi networks with interactive reports provided with graphical summaries. Multiple default policies offer enhanced security which can be customized for compliance.

  1. Easy to use and customizable

Apart from the above features, Seqrite mSuite offers several features which make it easy to use and customizable. Bulk file distribution can be done from console to Android devices. The solution also includes third party SMS gateway integration for SMS notification and custom mSuite app distribution for enrolment.

The post Why choose Seqrite mSuite- we give you 5 reasons! appeared first on Seqrite Blog.

PCs fail to boot up / Freeze after receiving Microsoft Windows 9-April-2019 updates and rebooting the PC

Quick Heal and Seqrite users are reporting that PCs fails to boot up / Freeze after installing 9th April Windows Updates and Rebooting the system. Symptoms:  Users have Quick Heal or Seqrite product installed and running on their systems. The PCs fail to boot up / Freeze after installing Windows Updates of 9-April-2019 and Rebootingthe system. There are…

PCs fail to boot up/Freeze after receiving Microsoft Windows 9-April-2019 updates and rebooting the PC

Estimated reading time: 2 minutes

Summary: Quick Heal and Seqrite users are reporting that PCs fails to boot up / Freeze after installing 9th April Windows Updates and Rebooting the system.

Symptoms: 

  • Users have Quick Heal or Seqrite product installed and running on their systems.
  • The PCs fail to boot up/Freeze after installing Windows Updates of 9-April-2019 and Rebootingthe system.
  • There are also some instances reported of PCs slow-down especially on Windows 10 1809.

Affected Operating Systems: 

  • As of now we have cases reported on Windows 8.1 and below (Windows 8/Windows 7).
  • Few cases reported on Windows 10, Windows 2008, Windows 2012 as well.
  • While we have observed other AV vendors facing similar issues with Windows 2008 and 2008 R2, Windows 2012 or 2012 R2 running on their system.
  • Windows 10 – System slowness only.

Windows Updates causing the issue (Under Investigation): 

  • Windows 7: KB4493472, KB4493448
  • Windows 10: KB4493509

Information on Windows 9-April-2019 Update Release: 

For more information on Microsoft Windows 9-April-2019 release notes, click here

Workaround:

  • Those who have installed these updates but haven’t rebooted their PCs might encounter similar symptoms. As a precaution, we recommend users to uninstall the contentious Windows KB updates prior to rebooting.
  • Follow the steps listed here to uninstall the Windows KB Updates.
  • For customers affected by this issue, we recommend rebooting the PCs in Safe Mode and Uninstall the Windows KB Updates.
  • Follow the steps listed below to reboot the PCs in Safe mode and uninstall the KB Updates.
  • Windows 10 : Click here
  • Windows 8 and Below: Click here
  • Once the Windows KB is uninstalled, disable “Automatic Windows Updates” by following the steps listed here.
  • After successful un-installation of the Windows KB updates, reboot the PC in normal mode.

Note: While disabling Windows Automatic Updates is not recommended and should be used only as a temporary measure to avoid download and installation of the contentious Windows KB updates. Once the issue is addressed, please do enable Windows Automatic Updates.

IMPORTANT: 

  • It is not necessary that all users observe these symptoms as it is potentially related to a timing issue during the boot up process and not reproducible all times.
  • Quick Heal / Seqrite Engineering Team is working closely with Microsoft to get this issue addressed on high priority.
  • This KB Article will be updated with additional information on an ongoing basis and we recommend you visit this page to get the latest updates on this issue.

Please get in touch with Quick Heal/Seqrite Technical Support Team for more information or any assistance related to this issue.

The post PCs fail to boot up/Freeze after receiving Microsoft Windows 9-April-2019 updates and rebooting the PC appeared first on Seqrite Blog.