{"id":22458,"date":"2023-07-12T16:11:01","date_gmt":"2023-07-13T00:11:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/07\/12\/news-16188\/"},"modified":"2023-07-12T16:11:01","modified_gmt":"2023-07-13T00:11:01","slug":"news-16188","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/12\/news-16188\/","title":{"rendered":"How to secure your business before going on vacation"},"content":{"rendered":"<p>For many, the summer months should be a time of peace: Maybe taking some vacation, maybe strolling across warm, soft sands as sapphire waves lap up against your feet, maybe even spending time with family (that you like).<\/p>\n<p>But for determined cybercriminals, these periods of near-universal rest and relaxation are actually moments of attack.<\/p>\n<p>In particular, ransomware gangs have&nbsp;shown a nasty habit of starting&nbsp;their attacks at the least convenient times:&nbsp;When&nbsp;computers are idle, when&nbsp;employees&nbsp;who might notice a problem&nbsp;are&nbsp;out of&nbsp;the office, and when the IT or security staff who might deal with it are shorthanded.&nbsp;<\/p>\n<p>Cybercriminals like to attack at night and at weekends, and they love holidays and special events. On the July 4 weekend in 2021, the REvil ransomware gang was likely hosting its own celebrations after pulling off an&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2021\/07\/shutdown-kaseya-vsa-servers-now-amidst-cascading-revil-attack-against-msps-clients\/\" target=\"_blank\">enormous supply-chain attack on&nbsp;Kaseya<\/a>, one of the biggest IT solutions providers&nbsp;in the US for&nbsp;managed service providers (MSPs). Threat actors&nbsp;used a&nbsp;Kaseya VSA auto-update&nbsp;to push&nbsp;ransomware&nbsp;into more than 1,000 businesses.<\/p>\n<p>But it isn&rsquo;t just holiday weekends that cybercriminals leverage for attacks. They can also likely predict when IT professionals go on vacation&mdash;the summer. &nbsp;<\/p>\n<h2><b>Why&nbsp;out-of-office&nbsp;attacks&nbsp;work<\/b><\/h2>\n<p>Ransomware works by encrypting huge numbers of files on as many of an organization&#8217;s computers as possible. Performing this kind of strong encryption&nbsp;is resource intensive&nbsp;and&nbsp;can&nbsp;take&nbsp;a long&nbsp;time, so even if an organization doesn&#8217;t spot the malware used in an attack,&nbsp;its&nbsp;tools might notice that something is amiss.&nbsp;<\/p>\n<p>&#8220;You never think you&#8217;re&nbsp;gonna&nbsp;be hit by ransomware,&#8221;&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/podcast\/2021\/07\/racing-against-a-real-life-ransomware-attack-with-ski-kacoroski-lock-and-code-s02e12\/\" target=\"_blank\">said&nbsp;Ski&nbsp;Kacoroski<\/a>, a system administrator with the&nbsp;Northshore School District in Washington state, speaking on Malwarebytes&#8217;&nbsp;Lock &amp; Code podcast. On the podcast, Kacoroski spoke&nbsp;about Northshore&rsquo;s nighttime attack:&nbsp;<\/p>\n<blockquote>\n<p>&#8220;It was an early Saturday morning. I got a text from my manager saying &#8216;something is up&#8217;&#8230;after a short while I realized that&nbsp;[a]&nbsp;server had been hit by ransomware. It took us several more hours before we realized exactly how much had been hit.&#8221;<\/p>\n<\/blockquote>\n<p>Kacaroski&nbsp;added &#8220;We had some high CPU utilizations alert the night before when they started their attack, but most of us were already asleep by midnight.&#8221;<\/p>\n<h2><b>Be prepared<\/b><b>&nbsp;<\/b><\/h2>\n<p>When REvil first attacked Kaseya in 2021, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/08\/how-to-stay-secure-from-ransomware-attacks-this-labor-day-weekend\" target=\"_blank\">Malwarebytes Labs relied on the expertise of Adam&nbsp;Kujawa, a cybersecurity evangelist<\/a>, to understand what&nbsp;steps organizations&nbsp;should take to minimize the chance that a holiday weekend could be ruined by a cyberattack. That advice is still good today&mdash;including for any&nbsp;IT or security employee going on vacation&mdash;so we&#8217;re offering it again for readers.&nbsp;<\/p>\n<h3><b>Do these&nbsp;<i>before<\/i>&nbsp;leaving for vacation<\/b>&nbsp;<\/h3>\n<ul type=\"disc\">\n<li>Run a deep scan on all endpoints, servers, and interconnected systems to ensure&nbsp;there are&nbsp;no threats&nbsp;lurking&nbsp;on&nbsp;those&nbsp;systems,&nbsp;waiting to attack!&nbsp;<\/li>\n<li>Once&nbsp;you know those&nbsp;systems are&nbsp;clean, force a password change a week or two out from the holiday or vacation time so&nbsp;any&nbsp;guessed or&nbsp;stolen credentials&nbsp;are rendered useless.&nbsp;<\/li>\n<li>Employ stricter access requirements for sensitive data, such as&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/glossary\/multi-factor-authentication-mfa\/\" target=\"_blank\">multi-factor authentication (MFA)<\/a>, Manager Authorization, and requiring a local network connection. Although this will make it a&nbsp;more&nbsp;difficult for employees (for a short amount of time), this will also make it significantly more difficult for attackers to traverse networks and gain access to unauthorized data. Once the holiday or vacation time ends, you can revert these policies since you&#8217;ll have more eyes to watch out for threats.&nbsp;<\/li>\n<li>Provide guidance to employees on not posting about vacations and\/or holiday plans on social media.&nbsp;<\/li>\n<li>Provide free&mdash;or free for a limited time&mdash;security software to employees to use on personal systems&nbsp;<\/li>\n<li>Ensure all remotely accessible&nbsp;connections (e.g., VPNs, RDP&nbsp;connections) are secured&nbsp;with MFA.&nbsp;<\/li>\n<\/ul>\n<h3><b>Schedule these&nbsp;<i>during<\/i>&nbsp;vacation<\/b>&nbsp;<\/h3>\n<ul type=\"disc\">\n<li>Ensure all non-essential systems and endpoints are shut down at the end of the day.&nbsp;<\/li>\n<li>Reduce risk by disabling or shutting down systems and\/or processes which might be&nbsp;exploitable, if&nbsp;they aren&#8217;t&nbsp;needed.&nbsp;<\/li>\n<li>Ensure there is always someone watching the network during the holiday or planned vacation,&nbsp;and make sure they are equipped to handle a sudden attack situation.&nbsp;We suggest&nbsp;creating&nbsp;a cyberattack reaction and recovery plan that includes call sheets, procedures on communicating with law enforcement&nbsp;and collecting evidence, and what systems can be isolated or shut down without seriously affecting the operations of the organization.<\/li>\n<\/ul>\n<h2><b>&#8220;The only mistake in life is a lesson not learned&#8221;<\/b><\/h2>\n<p>When&nbsp;we&nbsp;asked&nbsp;Kacaroski&nbsp;why he&nbsp;came&nbsp;forward&nbsp;to&nbsp;tell his ransomware story&nbsp;when&nbsp;many others are&nbsp;reluctant to,&nbsp;he told us: &#8220;The only mistake in life is a lesson not learned.&#8221;<\/p>\n<p>A lesson we can all learn here is that&nbsp;cybercriminals are not reluctant to ruin somebody&#8217;s vacation plans.&nbsp;So don&#8217;t wait for&nbsp;an&nbsp;attack to happen&nbsp;to&nbsp;your organization&nbsp;before&nbsp;you decide you need to be ready.&nbsp;Prepare now,&nbsp;and enjoy uninterrupted peace of mind during your vacation.<\/p>\n<p>Ready to learn more about staying safe before heading out on vacation? Read more at our &#8220;Stay on Vacation&#8221; hub:<\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\"><a href=\"https:\/\/try.malwarebytes.com\/business-mdr-ticket-to-vacation\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_cm_stay_on_vacation_168910398735\" target=\"_blank\">Stay on vacation<\/a><\/span><\/p>\n<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/how-to-secure-your-business-before-going-on-vacation\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/business\" rel=\"category tag\">Business<\/a><\/p>\n<p>Are you a critical security expert for your organization? Are you also going on vacation? Here&#8217;s how to ensure your time away from the office doesn&#8217;t get interrupted with a security incident. <\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/how-to-secure-your-business-before-going-on-vacation\" title=\"How to secure your business before going on vacation\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/07\/how-to-secure-your-business-before-going-on-vacation\">How to secure your business before going on vacation<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-22458","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22458"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22458\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22458"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}