Founder, Patrick Kelley, interviewed by NBC/11Alive

"My initial reaction was: 'they're doomed,'" cybersecurity expert Patrick Kelley, founder of Critical Path Security, said. Kelley said he was surprised to see funding for Atlanta Information Management drop since the 2018 ransomware attack, based on a report shared with the city's finance committee on March 30. "Most cybersecurity plans are built on a five-year maturity model," Kelley said. "We're not even four years after the recovery of the ransomware event that cost the city millions of dollars." Given limited resources, Kelley said local governments are already at a disadvantage compared to large corporations when it comes to technology funding. "They have to operate with the lowest amount of money that they can possibly get," Kelley said of the challenges, "And have to do the most that they can with it." Yet, he said resources and response time are critical. According to Kelley, it only takes five to six minutes…

Comments Off on Founder, Patrick Kelley, interviewed by NBC/11Alive

The Okta Breach: What You Should Be Doing

On March 22, 2022, the threat group LAPSUS$ announced the compromise of Okta. Okta is an enterprise-grade Multi-Factor and Identity and Access Management (IAM). Recently, the LAPSUS$ group has made statements of breaching high-value targets, but has provided very little evidence of being successful into those attacks. It is now known that the attack on Okta was successful and approximately 366 customers were impacted. Though the details of the attack are still quite limited, what we know is that this attack was likely successful due to phishing or the acquisition of credentials through the bribing of an internal employee. Regardless of the method, based on the screenshots shared by the attacker, it appears that a third-party support engineer's laptop was compromised and legitimate access was used. At this time, we recommend the following actions: Review Okta System logs for unusual "Reset Multifactor" events. Review Okta system logs for unusual "Reset…

Comments Off on The Okta Breach: What You Should Be Doing

Founder, Patrick Kelley, speaks at Ohio’s Electric Cooperative’s Winter Conference!

"Do not store The Business Continuity Plan and Disaster Recovery Plan on the server. If you are only reviewing the plan annually, you are already behind. Things move too quickly for annual review." Build Your Defenses Operations: Establish baseline and target security maturity. Establish baseline and target security posture. Review personnel capabilities and determine skill paths. Develop and provide standards and guidelines for secure application development and infrastructure requirements. Emerging Threats: Develop risk and threat models. Determine available tools in use or to be acquired. Threat Intelligence: Learn how to integrate and contribute. Vulnerability Management: Develop automation for the detection and remediation of new vulnerabilities. Incident Response: Review current IR procedures and update if needed. Define internal and external communication protocols and guidelines.

0 Comments

Advice – Cyber Attacks Increase As Tensions Rise In Ukraine

As the events have been unfolding in Ukraine, there has been an amplification of cyberattacks around the world. These attacks are beginning to impact organizations around the United States. It should be stated that Russia has sophisticated cyber capabilities with a track record of wreaking havoc on organizations around the world. The SVR, Russia's foreign intelligence service, has been linked to a several of espionage campaigns and data breaches, from the widespread SolarWinds breach in 2020 to stealing information related to COVID-19 vaccines. Critical Path Security, along with our trusted partners in the U.S. Intelligence Community, Law Enforcement, and Global Intelligence Allies are continuing to monitor this situation around the clock to isolate legitimate and direct threats against our customers and national interests. CISA recommends that organizations, regardless of size, adopt a cybersecurity program that embraces the following recommendations: Reduce the likelihood of a damaging cyber intrusion Validate that all…

Comments Off on Advice – Cyber Attacks Increase As Tensions Rise In Ukraine