How Good Privacy Practices Help Protect Your Company Brand

Follow these five guidelines to keep your organization's data protected.

Your brand can be one of your company's most valuable assets. It can command premium prices, customer loyalty, a faster sales cycle, and an overall healthier bottom line. But unfortunately, even the strongest brands can have difficulty withstanding the impact of a data breach.

Consider that the average cost of a single data breach is $3.62 million. On top of this, data breach incidents reportedly cause 65% of individuals to lose trustin the organization experiencing it. This loss of customer trust may take years to recover, if it even can do that at all.

 

1. Understand what constitutes a data breach. A data breach is an incident in which sensitive, protected, or confidential personal data potentially has been viewed, stolen, or used by an individual unauthorized to do so. This can include sensitive information discussed in a doctor's office, viewed on someone's laptop screen, hacked from a computer, or perhaps left on the printer. It could involve thousands of records, or just one. Depending on the regulation, it could involve identifiers, such as a name or identification number. Or it could be images of individuals, in photos or videos. It also could be data revealing racial or ethnic origin, political opinions, religion, trade-union membership, genetic data, health information, personal preferences, and so on.

2. Be aware of your surroundings. Workers should be trained to always be aware of their surroundings. Employees frequently use mobile devices to access and share data, often in full view of others. There's increased risk of data exposure inside the office too. Open-office floor plans remove physical barriers that in the past helped shield computer screens. Those who work in public spaces and in heavy-traffic areas like emergency departments, public lobbies, government offices, and guest-service desks should know to look for suspicious behaviors, such as identifying a visitor who is pointing a smartphone toward a computer screen.

3. Deploy layers of protection to avoid breaches. Add layers of protection as part of a defense-in-depth security approach. This often involves perimeter technologies, such as firewalls, data encryption, and two-factor authentication. Using privacy filters can help protect sensitive data displayed on computer and device screens by blocking unauthorized side views. Other important protection measures include implementing clean-desk policies, using password-protected screensavers, and requiring that sensitive information be printed and stored in locked areas, and then finely shredded when disposed. Regular assessments can help identify vulnerabilities in these areas, as well as other gaps, such as poorly trained employees.

4. Collect only what you need. In the spirit of improving the buying experience, many organizations are collecting an increasing amount of personal information about their customers. They are asking for birthdays, ages of children, etc. Collecting this level of information requires organizations to be aware of privacy laws, such as the GDPR, that are very stringent in how personal information is used. As a best practice, organizations should proactively identify and collect only the personal information necessary for their intended purposes, for a period strictly necessary (minimization principle), and they should ensure that personal data will not be made accessible to an indefinite number of people.

5. Be ready to respond quickly. Have a documented breach response plan that details roles, responsibilities, and processes. Schedule regular training exercises to help ensure your organization's incident response and breach notification policies and plans will work. Conduct tests to see if employees know who to alert if their device is compromised or they become aware of a data breach. Make sure you have the forensics in place so you can quickly communicate what happened and what the company is going to do about it.

Together, these five tips can help safeguard data privacy, build customer trust, and protect your company's brand.

More than 460 HP Laptop Models Found with Pre-Installed Keylogger

Keylogger found in HP Notebook models

Earlier this year, it was reported how the audio driver pre-installed on several Hewlett-Packard (HP) laptops contained a built-in keylogger code that recorded all of a user’s keystrokes and stored the information such as usernames and passwords, personal information in a human-readable file. In order to rectify this, HP then rolled out patches to remove the keylogger, which also deleted the log file containing the keystrokes.

Now, a security researcher named ‘ZwClose’ has claimed of discovering similar built-in keylogger issue in several HP laptops that allows hackers to record every keystroke of the user and steal sensitive data, including passwords, account information, and credit card details.

More than 460 HP Notebook models were reported to have been exposed for exploit to hackers due to the keylogger found present in the SynTP.sys file, which is a part of the Synaptics Touchpad driver that ships with some HP notebook models.

Even though the keylogger component is disabled by default, it could be enabled “by setting a registry value” by utilizing open source tools available for evading User Account Control (UAC).

Given below is the location of the registry key:

HKLM\Software\Synaptics\%ProductName%

HKLM\Software\Synaptics\%ProductName%\Default

HP was notified regarding the presence of keylogger component by the researcher last month, which was confirmed by the company who said that it was basically “a debug trace” that was left unintentionally and has now been removed.

In its advisory, HP called the keylogger as a potential, local loss of confidentiality. “A potential security vulnerability has been identified with certain versions of Synaptics touchpad drivers that impact all Synaptics OEM partners.

“A party would need administrative privileges in order to take advantage of the vulnerability. Neither Synaptics nor HP has access to customer data as a result of this issue.”

The company has released a Driver update to remove debugging code for all the affected HP Notebook models. Click here to see the entire list of affected HP laptops and their patches.

ZwClose also published a technical analysis of the SynTP.sys file and the keylogger code for security researchers and software developers.

How to Secure Your Bitcoin Wallet

Like in real life, your wallet must be secured. Bitcoin makes it possible to transfer value anywhere in a very easy way and it allows you to be in control of your money. Such great features also come with great security concerns. At the same time, Bitcoin can provide very high levels of security if used correctly. Always remember that it is your responsibility to adopt good practices in order to protect your money.

warning Be careful with online services

You should be wary of any service designed to store your money online. Many exchanges and online wallets suffered from security breaches in the past and such services generally still do not provide enough insurance and security to be used to store money like a bank. Accordingly, you might want to use other types of Bitcoin wallets. Otherwise, you should choose such services very carefully. Additionally, using two-factor authentication is recommended.

Small amounts for everyday uses

A Bitcoin wallet is like a wallet with cash. If you wouldn't keep a thousand dollars in your pocket, you might want to have the same consideration for your Bitcoin wallet. In general, it is a good practice to keep only small amounts of bitcoins on your computer, mobile, or server for everyday uses and to keep the remaining part of your funds in a safer environment.

Backup your wallet

Stored in a safe place, a backup of your wallet can protect you against computer failures and many human mistakes. It can also allow you to recover your wallet after your mobile or computer was stolen if you keep your wallet encrypted.

Backup your entire wallet

Some wallets use many hidden private keys internally. If you only have a backup of the private keys for your visible Bitcoin addresses, you might not be able to recover a great part of your funds with your backup.

Encrypt online backups

Any backup that is stored online is highly vulnerable to theft. Even a computer that is connected to the Internet is vulnerable to malicious software. As such, encrypting any backup that is exposed to the network is a good security practice.

Use many secure locations

Single points of failure are bad for security. If your backup is not dependent of a single location, it is less likely that any bad event will prevent you to recover your wallet. You might also want to consider using different medias like USB keys, papers and CDs.

Make regular backups

You need to backup your wallet on a regular basis to make sure that all recent Bitcoin change addresses and all new Bitcoin addresses you created are included in your backup. However, all applications will be soon using wallets that only need to be backed up once.

Encrypt your wallet

Encrypting your wallet or your smartphone allows you to set a password for anyone trying to withdraw any funds. This helps protect against thieves, though it cannot protect against keylogging hardware or software.

Never forget your password

You should make sure you never forget the password or your funds will be permanently lost. Unlike your bank, there are very limited password recovery options with Bitcoin. In fact, you should be able to remember your password even after many years without using it. In doubt, you might want to keep a paper copy of your password in a safe place like a vault.

Use a strong password

Any password that contains only letters or recognizable words can be considered very weak and easy to break. A strong password must contain letters, numbers, punctuation marks and must be at least 16 characters long. The most secure passwords are those generated by programs designed specifically for that purpose. Strong passwords are usually harder to remember, so you should take care in memorizing it.

Offline wallet for savings

An offline wallet, also known as cold storage, provides the highest level of security for savings. It involves storing a wallet in a secured place that is not connected to the network. When done properly, it can offer a very good protection against computer vulnerabilities. Using an offline wallet in conjunction with backups and encryption is also a good practice. Here is an overview of some approaches.

Offline transaction signing This approach involves having two computers sharing some parts of the same wallet. The first one must be disconnected from any network. It is the only one that holds the entire wallet and is able to sign transactions. The second computer is connected to the network and only has a watching wallet that can only create unsigned transactions. This way, you can securely issue new transactions with the following steps.

  1. Create a new transaction on the online computer and save it on an USB key.
  2. Sign the transaction with the offline computer.
  3. Send the signed transaction with the online computer.

Because the computer that is connected to the network cannot sign transactions, it cannot be used to withdraw any funds if it is compromised. Armory can be used to do offline transaction signature.

Hardware wallets Hardware wallets are the best balance between very high security and ease of use. These are little devices that are designed from the root to be a wallet and nothing else. No software can be installed on them, making them very secure against computer vulnerabilities and online thieves. Because they can allow backup, you can recover your funds if you lose the device.

Keep your software up to date

Using the latest version of your Bitcoin software allows you to receive important stability and security fixes. Updates can prevent problems of various severity, include new useful features and help keep your wallet safe. Installing updates for all other software on your computer or mobile is also important to keep your wallet environment safer.

Multi-signature to protect against theft

Bitcoin includes a multi-signature feature that allows a transaction to require multiple independent approvals to be spent. This can be used by an organization to give its members access to its treasury while only allowing a withdrawal if 3 of 5 members sign the transaction. Some web wallets also provide multi-signature wallets, allowing the user to keep control over their money while preventing a thief from stealing funds by compromising a single device or server.

Think about your testament

Your bitcoins can be lost forever if you don't have a backup plan for your peers and family. If the location of your wallets or your passwords are not known by anyone when you are gone, there is no hope that your funds will ever be recovered. Taking a bit of time on these matters can make a huge difference.

How Cryptocurrency Mining Works: Bitcoin vs. Monero

Ever wondered why websites that are mining in the background don’t mine for the immensely hot Bitcoin, but for Monero instead? We can explain that. As there are different types of cryptocurrencies, there are also different types of mining. After providing you with some background information about blockchain, and cryptocurrency, we’ll explain how the mining aspect of Bitcoin works. And how others differ.

Proof-of-Work mining

Cryptocurrency miners are in a race to solve a mathematical puzzle, and the first one to solve it (and get it approved by the nodes) gets the reward. This method of mining is called the Proof-of-Work method. But what exactly is this mathematical puzzle? And what does the Proof-of-Work method involve? To explain this, we need to show you which stages are involved in the mining process:

  1. Verify if transactions are valid. Transactions contain the following information: source, amount, destination, and signature.
  2. Bundle the valid transactions in a block.
  3. Get the hash that was assigned to the previous block.
  4. Solve the Proof-of-Work problem (see below for details).

The Proof-of-Work problem is as follows: the miners look for a SHA 256 hash that has to match a certain format (target value). The hash will be based on:

  • The block number they are currently mining.
  • The content of the block, which in Bitcoin is the set of valid transactions that were not in any of the former blocks.
  • The hash of the previous block.
  • The nonce, which is the variable part of the puzzle. The miners try different nonces to find one that results in a hash under the target value.

So, based on the information gathered and provided, the miners race against each other to try and find a nonce that results in a hash that matches the prescribed format. The target value is designed so that the estimated time for someone to mine a block successfully is around 10 minutes (at the moment).

If you look at BlockExplorer.com, for example, you will notice that every BlockHash is 256 hexadecimal digits long and starts with 18 zeroes. For example the BlockHash for Block #497542 equals 00000000000000000088cece59872a04457d0b613fe1d119d9467062e57987f1. At the time of writing, this is the target—the value of the hash has to be so low that the first 18 digits are zeroes. So, basically, miners have some fixed input and start trying different nonces (which must be an integer), and then calculate whether the resulting hash is under the target value.

Monero

How is Monero different?

Browser mining and other methods of using your system’s resources for other people’s gain is usually done using other cryptocurrencies besides Bitcoin, and Monero is the most common one. In essence, Monero mining is not all that different from Bitcoin. It also uses the Proof-of-Work method. Yet, Monero is a popular cryptocurrency to those that mine behind the scenes, and we’ll explain why.

Anonymity

The most notable difference between Bitcoin and Monero mining is anonymity. Where you will hear people say that Bitcoins are anonymous, you should realize that this is not by design. If you look at a site like BlockExplorer, you can search for every block, transaction, and address. So if you have sent or received Bitcoin to or from an address, you can look at every transaction ever made to and from that address.

Therefore we call Bitcoin “pseudononymous.” This means you may or may not know the name of that person, but you can track every payment to and from his address if you want. There are ways to obfuscate your traffic, but they are difficult, costly, and time-consuming.

Monero however, has always-on privacy features applied to its transactions. When someone sends you Monero, you can’t tell who sent it to you. And when you send Monero to someone else, the recipient won’t know it was you unless you tell them. And because you don’t know their wallet address and you can’t backtrack their transactions, you can’t find out how “rich” they are.

list of transactions

                                                                                      Transactions inside a Bitcoin block are an open book.

Mining

Monero mining does not depend on heavily specialized, application-specific integrated circuits (ASICs), but can be done with any CPU or GPU. Without ASICs, it is almost pointless for an ordinary computer to participate in the mining process for Bitcoin. The Monero mining algorithm does not favor ASICs, because it was designed to attract more “little” nodes rather than rely on a few farms and mining pools.

There are more differences that lend themselves to Monero’s popularity among behind-the-scenes miners, like the adaptable block size, which means your transactions do not have to wait until they fit into a later block. The Bitcoin main-stream blockchain has a 1 MB block cap, where Monero blocks do not have a size limit. So Bitcoin transactions will sometimes have to wait longer, especially when the transaction fees are low.

The advantages of Monero over Bitcoin for threat actors or website owners are mainly that:

  • It’s untraceable.
  • It can make faster transactions (especially when they are small).
  • It can use “normal” computers effectively for mining

Links

For those of you looking for more information on the technical aspects of this subject, we recommend:

Bitcoin block hashing algorithm

The Blockchain Informer

Blockchain Info

How Bitcoin mining works

How does Monero privacy work

Does Your Computer Have a Virus? 10 Signs It Might!

The symptoms of your latest illness could be indicative of a number of different health issues. Similarly, a computer virus can throw up symptoms which could be indicative of a range of different problems. While each symptom on its own may not trigger any red flags, a handful of unexpected behaviors may set off alarm bells — if you know what to look out for. Here are some telltale signs that your PC has a computer virus. If you have any doubts, contact our experts for a free consultation!

1. Your Browser Starts Misbehaving

Popups were the scourge of the mid-2000s. The incredibly irritating screen hogs were often associated with internet Explorer, and became synonymous with malware lurking on your computer. Of course, these days a popup may just be a particularly annoying advert. However, if you are getting popups even when your browser isn’t open, then it might be a sign that all is not well. Many of these malicious popups will be for fake antivirus software or alerts that your machine is infected.

https://twitter.com/pcrisk/status/844897831576055808

Popups aren’t the only indicator of concealed malware. If you find unexpected toolbars cluttering your browser, that’s often evidence something’s amiss. Most browsers allow you to search from the address bar, and it often defaults to Google. If your search provider has suddenly changed, or your Google search results look unusual, then you can be fairly certain you have an unwelcome intruder.

2. Your Antivirus Is Disabled

If someone wanted to break into your home, then one of the best ways of entering undetected would be to deactivate your home security system. The same is true of a computer virus. Some forms of malware are able to disable your antivirus software’s service, giving it unfettered access to your device. If the service is disabled, or your preferred antivirus software is unable to update, then it’s time to start battling the infection.

3. Your PC Has Slowed to a Crawl

There are many reasons why your PC’s performance may slip over time. You should eliminate all the main suspects — including memory hogs like Chrome — and check that all your hardware is in good working order. If you find everything to be functioning as expected, but your device is still slowing down, then it’s a good indicator of a malware infection. Malware can run applications and services in the background that clog up your computer, and can have an incredibly detrimental affect on your computer’s performance.

4. Your Files Are Disappearing

In recent years, one of the most devastating trends has been the rise of ransomware. This infection encrypts all your files, putting them beyond reach. The only way to unlock them is to pay the ransom, often in Bitcoin, but without a guarantee that they will be unlocked. The time between infection and encryption is often short, so the best defense is backing up your files regularly.

The best advice if you become infected with ransomware is to not pay the ransom. Other forms of malware can also lead to your files going errant. This can often be harder to detect, as you probably only notice once you need to open the file. However, if large chunks of data are missing then you should start scanning for a computer virus.

5. You Have Trouble Connecting to the Internet

If you suffer from poor network connectivity, then errors connecting to the internet are probably a regular occurrence for you. However, if they start fairly suddenly, or in conjunction with any other unusual behavior, then it may well be a symptom of a viral infection. You may think it seems strange that the virus would want to block your connection to the internet.

https://twitter.com/brnnbrn/status/385576492551258112

However, some malware changes your network settings to add a proxy and block your access to the internet to prevent you downloading tools to remove the infection. The best way to tackle this type of attack is to download a malware removal tool like Malwarebytes on another computer and transfer it to the infected machine via USB.

6. Programs Are Crashing All the Time

Programs can crash for a whole host of reasons which often have nothing to do with malware. Fortunately, there are plenty of ways that you can close the offending app and get back to enjoying your day. If the regular troubleshooting steps don’t make an impact, then there’s a high probability that malware has something to do with it. If you have been experiencing the Blue Screen of Death (BSOD) with alarming frequency, then make note of the error code. Sometimes, Windows freezes up and hangs without much of an explanation.

Often the BSOD can be caused by hardware issues, but if investigation comes up empty, then there’s a good chance that a computer virus may be to blame.

7. New Programs Appear Unexpectedly

While flicking through your installed programs, you unearth a few that you really can’t remember having installed. There’s a chance that these came from dubious but legitimate installers. However, if they have suddenly appeared and you are confident you didn’t install them by mistake, then it could indicate an infection. Your antivirus normally identifies these as Potentially Unwanted Programs (PUPs) and will alert you to them. If you haven’t seen a notification from your security software, consider running a manual scan Clicking "next" repeatedly is the quickest way of installing apps on Windows - until you find you installed other programs on your computer without realizing it, thanks to OpenCandy. 

If nothing is found, then perform an internet search to see if anyone else has reported that application as a PUP.

8. You Can’t Access Windows Utilities

When something goes awry on our Windows computer, the first thing we reach for is Ctrl + Alt + Del — only this time, you find that nothing happens. You attempt to right click on the taskbar to open Task Manager instead. Still nothing. Maybe opening it from the start menu will help? No luck there either.

You try to open Control Panel, and even Command Prompt to no avail. It’s almost as if there is something preventing you from opening these Windows utilities — and it’s quite likely there is.

9. Your Hard Drive Is Out of Control

https://twitter.com/twainrichardson/status/923699506469781504

Last week you had a sizable 30 percent free space on your hard drive. Now, you have less than 5 percent. You haven’t downloaded any large files, or installed any new software, so where is this data coming from? The most likely answer is that malware is downloading files and storing them on your hard drive. Another indicator is excessive hard drive activity.

Alarm bells should be ringing if you aren’t running any programs, or accessing files and your hard drive is showing a lot of activity and getting a little on the warm side.

10. Your Accounts Are Sending Spam

If you’ve received an accusatory message from a friend asking why you would recommend them weight loss pills, you should be on high alert. Odd messages like these indicate the presence of malware — so long as you didn’t send these messages as a form of misguided advice. Viruses are designed to spread, and one incredibly effective way is to bombarded your friends and contacts.

https://twitter.com/Oakleef1/status/927152687354990592

Most people are now accustomed to ignoring messages about magical pills and surprise inheritances, however, the viruses are maturing. Phishing is more commonplace than these overt examples of spam, where the recipient is tricked into opening a malicious link or attachment. This is a very effective means of spreading the computer virus as people are often more trusting of messages and emails from people they know. Catching a phishing email is tough! Scammers pose as PayPal or Amazon, trying to steal your password and credit card information, are their deception is almost perfect. 

It’s Oh So Quiet

Everything we’ve described so far has been a visible symptom of an infection. However, not all malware, particularly sophisticated variants, will intentionally disguise themselves. This makes detection almost impossible. As the saying goes: “absence of evidence is not evidence of absence.”

Unfortunately all our digital devices misbehave from time to time. This means random app crashes or unexpected behaviour can be entirely unrelated to a malware outbreak. However, if after following common troubleshooting steps you still come up empty, then these symptoms can be a sign that you may have been infected:

  • Browser malfunctions and misbehaviours
  • Problems with your antivirus or security software
  • Sudden or unexpected device slowdown
  • Missing files
  • Internet connectivity issues
  • Frequent and unexplained program crashes
  • Potentially unwanted programs (PUPs)
  • Inability to access common Windows utilities
  • Unexplained hard drive activity
  • Spam originating from your email or social accounts

Viruses and other forms of malware are almost unavoidable these days. While Windows has traditionally been platform of choice for malware, Mac users beware: you are at risk too. The best you can do is be prepared and take sensible precautions.

Always run an antivirus — even on your smartphone. Maintain regular backups so that if the infection is too hard to remove you can start over with minimal impact. Downloading apps from free software sites can be a dangerous game, so be sure to stick to reputable sites. The internet is full of incredible content, but it pays to know what’s behind the link before you make that click.