fb

Cybersecurity Awareness & Education

Strengthen the security of your website and implement staff education and training to effectively combat online attacks.

Keep your data and reputation safe

As a full-service digital marketing firm, we cannot stress the importance of good cyber security practices. We care about our clients’ infrastructure, data, and reputation. You should do the same! We can help secure and harden your website and services as well as provide staff education and training to help prevent Phishing and other hacks.

Avoid Common Phishing Scams

“Phishing” is the fraudulent practice of sending emails claiming to be from a reputable person or business in order to get them to reveal personal information, such as passwords, credit card numbers, and other information that could be used to steal your identity, banking information, and credit.

Utilize Strong Passwords

All passwords should be between 12-16 characters long, and include upper-case and lower-case characters as well as numbers and special characters. Think of using a “passphrase” to help you remember it, or consider using a service like LastPass.

Could your Data be held for Ransom?

“Ransomware” is encryption software a malicious hacker uses to encrypt your files. Effectively locking you out of your device and service. Then ransoms are demanded in the form of cryptocurrency. The average ransom payment in 2020 for businesses was $170,000. 

What is Cyber Security?

As more companies rely on computers, the internet, and cloud-based technology for everyday business services, more and more threats to these systems emerge

Cyber security is the body of policies, processes, and technologies designed to protect networks, devices, programs, and your data from attack, damage, or unauthorized access.

The CIA triangle is a tool that helps us understand and prioritize the security of our data and systems.

 

The CIA Triangle?

The CIA Triangle is a widely used cyber security model that helps businesses and organizations develop policies and procedures to keep their data secure, and available to authorized users.

Confidentiality: Only authorized users are able to access or modify the data.

Integrity: The data is verified correct and cannot be changed accidentally or maliciously.

Availability: The data is available to authorized users whenever they need it.

As we can see the CIA triangle is straight and to the point. We want access to our data, but we want to ensure that others are not able to access or change that data.

Why is Cyber Security Important?

Security may not seem that important at first glance, but depending on the industry you are in, it may have major consequences if your network or systems are breached.
Generally, the government, military, corporate, financial and medical organizations, hold data the malicious actors would like for themselves or to sell to others on the “dark web”. In the last year though, traditional targets have been expanded upon as society is now being affected by mass misinformation campaigns, ransomware attacks and botnets.

Information and data bad actors look for can include:

  • Embarrassing information that could damage the company’s reputation
  • Digital services you and your company use
  • Emails, passwords, account names, phone numbers
  • Donor information, client lists, board information
  • Financial Corporate Data
  • Proprietary information
  • Access to your hardware to do criminal activities or mine bitcoin on your systems
  • Personally Identifiable Information (PII)
    • Credit cards, bank account info, addresses – fraud and identity theft
    • Medical records, SSN, insurance, etc

 

What can I do?

If you have particular questions about cyber security for your business, J-3 Media is here to help. Feel free to contact us for a free consultation.

If you are looking for some tips to get you started check out the notes below.

People Are the Weakest Link in Security:

Unfortunately at the end of the day, your staff, coworkers, or supervisor is the most likely way your company will be compromised. Sixty percent of successful attacks on bussinesses are carried out by not attacking the hardware or software, but the social infrastructure of businesses. That’s the people.

There are many types of attacks in which scammers impersonate a company member or a boss trying to get some one (one word) to disclose information about the business, passwords, or Personally Identifiable Information (PII) on clients, customers, board members etc…

These attacks are wildly imaginative and generally contain some exigence or reason to hurry, getting the targeted person to overlook strange signs or “flags” regarding the encounter.

Common tactics used to accomplish this are called “email spoofing” or “URL spoofing”.

Proper Hardware & Network Configuration:

Before we can secure a system, we need to know the components of that system. The foundation of network security is knowing and maintaining an inventory of all the hardware that is on the network. This includes the endpoints (desktop computers, laptops, mobile phones, sensors, cameras switches routers, databases) that are on your network.

It can also be helpful to draw a “Network Diagram” showing how all the “end-points” or individual devices on your network are linked together and where your security controls are placed.

 

Quick Network Security Tips:

  • Inventory everything in your network
  • Keep all operating systems up to date and all software and services up to date
  • Implement Network Access Controls (NAC) to keep unauthorized devices off the network
  • Implement an Intrusion Detection System (IDS) to alert you of suspicious activity
  • Maintain an antivirus/malware scanner
  • Subscribe to newsletters for the services you use (they will let you know about vulnerabilities)

Policies and Procedures:

  • Create a Policy around securely backing up your data (daily, weekly, monthly, quarterly, annually?)
  • Have a policy for testing the integrity of data backups.
  • Create a policy for updating all hardware, and software, apps, and services on all endpoints
  • Phishing Awareness – Have all of your staff and company members including owners, upper management, and board go through Phishing Awareness Training on a regular basis
    • How does Phishing hurt businesses?
    • How to identify suspicious-looking emails?
    • What to do and not do with suspicious-looking emails?
    • How do you respond out of channel?
    • What is the policy and procedure for reporting emails to IT and management, to alert other staff?

Defense in Depth

Employing just one defensive strategy in the complex environment of the internet would not be that helpful. Thus, the cyber security industry prefers a “defense in depth” approach, which employs “layering” security controls on top of each other.

That way, if a malicious actor does breach or attempt to breach part of your network there are additional hurdles and alarms set in place to limit, detect and deter them.

Below are some examples when all implemented together constitute a defense in depth strategy:

  • Utilizing a Web Application Firewall to block and detect attacks towards internet-facing infrastructure
  • Utilizing an Intrusion Detection System (IDS) to be alerted about vulnerabilities and attacks or anomalous behavior
  • Malware scanner on your host network computers
  • Maintaining and updating all end-point operating systems and software
  • Utilize a SIEM or log management system
  • Ensure you have full backups of your system that have been tested
  • Network Access Controls – to ensure devices not authorized are not able to access the network
  • Having a strong password policy and passwords are updated every 90 days
  • Enable Multi-Factor Authentication (MFA)

These are just some tips and security controls that can be put into place to help enhance your business’s security posture. This is not an exhaustive list and should be customized and adapted based on the systems your company uses and the needs of your business.

If you have more questions feel free to reach out to us.

What is an Admin?

When considering computers and network apps like websites, it’s important to consider the idea that not everybody should have the same capabilities for editing and managing a system. Some people just need to interact with the software, like a customer buying a product online. Thus, in networking, we segment the user types by role, and the permissions they need to accomplish certain tasks. We wouldn’t want a customer to be able to see valuable company information like sales reports on your website, would we?

One of the most important roles to remember and manage appropriately is the Administrator or Admin role.

The Admin of a computer or a website is the highest privileged “role” designated giving that user the ability to make changes on to that system.

Admins can change security settings, install hardware and software, access all the data and files on a system and add or delete other user accounts of lesser privilege and capability on the network.

Below is the list from most to least privileged user types commonly found:
1 Admin – Most Privileged
2 Shop Manager
3 SEO Manager
4 Editor
5 Author
6 Customer
7 Subscriber – Least Privileged

Ok, why Should I care who is Admin

Since the Admin has the capability to add and delete users, view, change, or delete all the data on a system it is imperative to have the Admin account locked down and managed. Gaining access to the Admin account is the first thing a nefarious actor would do, to steal information from your business or ransom your hard drives.

The Admin should be in charge of security and updates and understand how to create less privileged users to accomplish tasks. I.e. the Shop Manager role would be appropriate for someone who manages orders and inventory on an ecommerce store. The shop manager should not have the capability to update plugins, possibly breaking the site or leaving it vulnerable to exploitation. The goal is to clearly separate the account permissions based on the needs of the user.

 

How Many Admins should there be?

Ideally, there should only be one or two Admins on any given system, and the rest should be users of different roles. Separation of roles and privileges is what we want. In a restaurant, a waiter doesn’t need access to the deposit box, or the bank accounts – they need access to the till to make change.

 

The Most Dangerous – Default Admin Accounts

Most devices you buy these days have a default Admin user set up to run the software. This is included in cameras, smart TVs, wifi routers, home surveillance cameras, cell phones, your car engine, and any piece of technology in it that has a processor, and also has an associated Admin account.

This gets terribly dangerous when new owners of these devices do not change the default Admin and password credentials. This is how people can sneak into your home from the other side of the world and watch your kids play on your security camera or, hack your tv, microwave, phone or camera to be used in numerous ways.

Make sure that all devices in your home have had the default Admin user and password changed. We recommend starting with your router.

What is Ransomware?

A malicious actor may not be satisfied with just entering, and stealing information from your company’s network or your private network. Ransomware is encryption software a malicious hacker uses to encrypt your files. Effectively locking you out of your device.

Once all of the files on your computer are locked, you are notified that you must pay a fee, usually in Bitcoin or some other cryptocurrency, to have your hard-drive unlocked/decrypted. Ransoms in 2020 were measured in the $10’s of Millions of dollars as institutions were brought to their knees by these state sponsored bad actors. Ransomware is increasingly being used across all sectors including the medical sector.

Like with email Phishing campaigns these scams can be very imaginative and generally all have some either “too good to be true” story line (one word) like a, “$500 refund from Microsoft”, or some type of threat, like pursuing legal action if an invoice isn’t paid immediately.

Sadly, if you do not have relevant backups of your data and systems, there is generally nothing that can be done, to either unlock these devices or get ransom money back.

Who is Targeted by Ransomware?

Generally, no one is immune to being ransomed for their device or data.

Institutions like municipal police departments, libraries, schools, universities, and hospitals are being targeted more and more by domestic and foreign actors. If the ransom is not paid, generally these bad actors will start disclosing Personally Identifiable Information they harvested on the open internet, until the ransom is paid. Or, they will inhibit the systems from being used.

Along with municipalities and other institutions, the “grid” of infrastructure that manages our towns and cities, electrical, oil & gas, hydro-logic, and energy generating infrastructure are vulnerable as well. Most infrastructure in the US was designed for all analog systems. These systems have been adapted to communicate with computers and thus “hack-able” and vulnerable to external manipulation. The consequences of ransoms like this could cripple entire states and economies, as seen with the Colonial Pipeline Attack in 2021.

Lastly, people who are not privy to online safety, may be taken advantage of. Generally, the elderly population in the U.S. is targeted by phone scammers saying they can provide a refund for a product or service, the person never bought and says yes. The scam generally includes the scammer being allowed access to the victim’s computer under the guise of helping. Then the attacker downloads encryption software, encrypts the victim’s computer and retains the keys, and will not unlock the computer until the ransom is paid. It is common for these scammers to be very pushy and rude to people, forcing them to cave emotionally and pay the ransom to end the interaction.

Password Management

Password management is an essential part of developing a more advanced security posture. With current computer technology, a six character password can be “brute forced” in a matter of minutes or seconds. Requiring passwords that are 12-16 characters long and that use special characters and upper and lower case can increase the time needed to crack these passwords to ~250 years.

So, requiring your customers, staff, and faculty to have strong passwords significantly hardens the attack surface that malicious users have access to.

Strong Password Tips:

  • Try to think of a “passphrase” to make your password longer and easy to remember
    • waterMakesmeh@ppy
    • Mountains0verR!vers
    • Fun/<ySnowd@nce
  • Don’t ever use the same password for multiple services, if one is compromised, they all could be.
  • Don’t like remembering long passwords? Use Lastpass the industry standard for password management, check them out here: https://www.lastpass.com/
  • Rotate your passwords every 90 days
  • Enable Multi Factor Authentication (MFA)
  • Use the “have I been pwned” service to see if your email and password information was breached in the past: https://haveibeenpwned.com/
  • If your information is on the haveibeenpwned.com site, be sure to update all associated information with those accounts or other accounts with the same passwords.

Updates and Security Implications

We all see those pop-ups on our Mac or Windows operating system, or mobile device telling us it’s time to update the software or operating system.

It may seem convenient to do it later, but the reality, by leaving your device or service out of date, your personally identifying data are vulnerable to being sold and/or ransomed.

The sooner you update the more secure your data will be and your device. You will have more peace of mind and better functionality as well.

Note – PCI Compliance: Businesses that process transactions or personally identifiable information online are required to update and patch systems within one month of critical release.

What do Software Update Do?

There are plenty of benefits to updating your software. These include, filling holes in the infrastructure for security reasons, updating functionality, and removing bugs. Since there are so many users now, big companies like Microsoft and Apple get lots of data on user feedback and experience so in general the software is getting better, more user-friendly, and more secure.

How do Updates Help Patch Security Flaws?

Just like any criminal, a hacker is looking for flaws in your security system. Bad actors can take advantage of the “gaps” in your security and do many things. They can download malware, or back doors into your systems allowing complete access and stealing the information, possibly selling it, or locking you out of your own system and ransoming the information back to you.

The community of software engineers and beneficial hackers helps find these errors in security in different applications and they are reported and “patched” in the next update. In some cases, there can be major flaws not seen upon initial release, that are discovered in the wild, and then multiple critical patches can be pushed out in one subsequent update. If you haven’t updated in a year, there could be multiple critical known vulnerabilities on your system.

It’s also important to note that some software is so old it is no longer supported or deprecated. A good example of this is Windows 7. Windows 7 is a highly vulnerable operating system used in teaching the next generation of hackers how to hack. It should not be used in the business environment.

How do Software Updates Protect my Data?

We all keep lots of important documents on our computers and mobile devices. We keep copies of things like our taxes, passports, all of our account login information, photographs, and videos. These documents hold important details about our lives.

It’s called Personally Identifying Information, with this data, people commit identity theft and fraud. They can take out loans in your name, guess your security questions, and possibly ruin your credit, which can take years to fix.

Think of the Community

The internet is a community of devices that delicately interacts to perform all the tasks we ask of it. We ask it for information, products and media, and data constantly. In summary, we recommend updating your systems after being notified of critical vulnerabilities, or quarterly, every 90 days. The longer you wait, the more vulnerable your systems are. Also, waiting too long may mean your software licenses have expired or that other services you use may not be compatible with the updated software. So update often to avoid being hacked or having your system fall apart because it’s not supported any longer.

Tips for Securing Your Home Office

Just because you are working from home does not make your data safer. In 2020 there was a major spike in Phishing scams averaging to 1,185 phishing attacks per month per organization. Malicious actors are capitalizing on the global pandemic crisis to get people to give up personal information online or click a link that downloads malware to your computer.

Due to the fact that people are working and studying from home and using new services, the hardware that you use, companies may have less control over, and may not be maintained as consistently. This environment is ripe with opportunities for malicious actors to steal your personal information, identity, and possibly ransom your data or allocate your hardware to a bot-net used for criminal activity or mining Bitcoin and other cryptocurrencies.

Watch out for Phishing Scams: Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in an email, text, or phone call. Never click on links or attachments in emails that look suspicious and especially if you don’t know the sender.

Scammers may try to impersonate email addresses or URL addresses you may recognize.

Be on the watch for misspelled names and email addresses. If you are in doubt, reach out to the person “out of channel”.This means, if they sent an email that looks suspicious, call them on the phone.

Also, never respond to unsolicited emails. If it is a suspicious email from a person you know, never “reply”. Start a new email using your address book and start a new thread notifying them.

Remove Unnecessary and Risky Applications: If you don’t need an application or service it should be removed. Also remember that your favorite free game, free font, or free service you need may also be set up on your computer or phone as part of a botnet and be mining cryptocurrency for someone else, or they could be committing crimes using your servers.

Antivirus and Malware: Antivirus and Malware scanners are a great tool for discovering if known malware, adware or viruses are on your systems. The limitation is that they don’t always catch “new” exploits or viruses that are released.

Enable your Firewall: A firewall is a list of rules that allow or deny traffic through your network. Enabling your firewall will allow it to reject network information that could be malicious or seems anomalous.

Updates and Software Patches: Updating your host machine’s operating system and keeping all software up to date and patched is an important part of your home office cyber security posture. Updates fix bugs and vulnerabilities and retire old code so that your machine can run more efficiently and securely.

Keep your Network Secure: Maintaining a strong password on your home network and changing it annually is a good start. If you have lots of guests using the network, you could set up a separate network for guests, so they wouldn’t have access to any tools like cameras that would be connected to your network. Your network’s name or SSID can also be hidden.

Regularly Schedule Backups: Backups are an essential part of a home office. Make sure you have on site, or cloud-based backups and that you’ve tested them.

Switch off voice controlled smart devices at your home workstation and cover the webcam when you’re not using it: Personal Privacy in the digital age is a huge issue and now more so with people working remotely from home. Cameras and microphones in smart devices can be attacked and your data could be stolen. Ie. Pictures of the inside of your home office and audio recordings in your home.

Public WIFI? Use a VPN: All the traffic that goes through the router at your favorite coffee shop is available for others to see. Before you log into your bank account, remember that, and make sure you are using a secure HTTPS connection and ideally using a Virtual Private Network (VPN) to both encrypt the data you’re sending and hide your physical location.

Log off and secure devices when not using them: Even if you’re only walking away for a second, log off from your machine so that it is not accessible during your absence. And, when you are done working log out and put all of your devices and hard drives in a secure location. This is imperative not only from the malicious actor standpoint, but also accidents happen… Water or a pet could damage your computer or hard drive.

Get in Contact With J3media

Partner with the team that cares about your success, your growth and your story! 

Calliway Levin

Lead Designer

Calliway is a Graphic Designer and outdoor adventurer, originally from Moab, Utah. She works to inspire, uplift, and motivate all people while making the world a better place through innovative client-specific design. Her studies in Fine Arts at the University of Utah eventually led her to specialize in Brand Identity and UX/UI design. Inspired by her passion for creative exploration and her love affair with travel, she founded Calliway Creative LLC in 2021. While working with incredible businesses and entrepreneurs, she pushes the boundaries of what is possible for remote freelancers. In her free time, Calliway is on the road, climbing the nearest mountain, or planning her next international adventure.

calliwayl@j-3media.com
970-375-1578

Harrison McInnis

Graphic Designer / Web Developer

Harrison joined J3media in 2012 as a Graphic Designer and Web Developer and worked alongside the team for several years gaining knowledge and experience in the industry. In late 2016 Harrison took over the role as owner and has since been growing and transforming J3media into competitive web development, graphic design, and creative consulting company with clients all over the Southwest region.

Practical and forward thinking, Harrison takes a project management lead at J3. His helpful demeanor has enabled him to nurture multiple long term relationships with clients, including True Western Roundup, Tico Time, Carver Brewing Co, and Fuzziwig’s Candy Factory to name a few.

Recognizing the exciting and fast moving developments in today’s technologies, Harrison maintains regular contact with the web development and graphic design industry. He particularly enjoys efficient, creative problem solving and appreciates learning new ways to address challenges.

harrisonm@j-3media.com
970-375-1578

Jennaye Derge

Web Developer

Jennaye is a writer, photographer and a marketing and communications specialist. She has been working in the newspaper industry as a photographer and writer since 2013 and has been the communications and marketing director for several nonprofits and small businesses in the Four Corners region. She went on to run her own web-design firm where she designed, created content, and worked with marketing avenues to help entrepreneurial individuals and small businesses grow in their industry.

She is a frequent writer for various magazines, and the author of her first book, How to Cry on Your Bicycle (Casa Urraca Press 2022).

When she isn't writing, taking photos, or creating other content, she is most definitely riding her bicycle around town or in the mountains, advocating for bicycle commuting, hanging out with her dog, or reading a book.

jennayed@j-3media.com
970-375-1578

Charlie Henry

Graphic Designer

Charlie specializes in high quality logo and branding work throughout the Southwest. Charlie is an artist turned graphic designer and excels in artistic design such as logos, posters, album covers, labels and packaging. He’s got a very involved brainstorming and design process that will either incorporate your concept into a clean and functional design or take the reins to deliver the great visuals you didn’t know you needed.

charlieh@j-3media.com
970-375-1578