Podbean logo
  • Discover
  • Podcast Features

    Your all-in-one podcasting solution.

    Podcast App

    The best podcast player & podcast app.

  • Livestream

    High-performing audio live, without limits.

    Podcast Studio

    Easy-to-use audio recorder app.

  • PodAds

    Dynamic Ad Insertion for podcasts.

  • Premium

    Convert listeners into buyers anywhere, anytime
    with the convenience of Podbean Premium.

    Patron

    The seamless way for fans to support you directly
    from your podcast.

  • Ads Marketplace

    Join Ads Marketplace to earn money
    through sponsorship on your podcast.

  •  
  • All Arts Business Comedy Education
  • Fiction Government Health & Fitness History Kids & Family
  • Leisure Music News Religion & Spirituality Science
  • Society & Culture Sports Technology True Crime TV & Film
  • Live
  • Log in
  • Start your podcast for free
  • Podcasting
    • Podcast Features
    • Live Stream
    • PodAds
    • Podcast App
    • Podcast Studio
  • Monetization
    • Premium
    • Patron
    • Ads Marketplace
  • Enterprise
  • Pricing
  • Discover
  • Log in
    Sign up free
Quality Plus Consulting - Breakfast Bytes

Quality Plus Consulting - Breakfast Bytes

Technology

Business Email Compromise

Business Email Compromise

2022-09-29
Download

Ken Dwight is “The Virus Doctor” – Business consultant and advisor to IT service providers and internal IT at many businesses who have come to him for his training, has his own direct clients. Ken conducts a monthly community meetings for alumni. He provides a list of curated items of current interest for discussion and resources, and has a featured topic which often includes another speaker to provide breadth of perspective. He has been doing this community service for 83 months!

I asked Ken to cover with me some topics that from his perspective don’t get talked about enough.

Business Email Compromise

Also known as CEO fraud. Impersonating a CEO for purposes of wire fraud. We are focused on the technological solutions. There is no technological solution for eliminating BEC.

CEOs must be part of the solution.

Example: Subcontractor to Airbus. Used to dealing with multi-million-dollar wire transfers.

BEC is a large Fortune 500 issue, it scales down to one user environments.

Title companies are a big target.

Retention policies and standards for WHERE to store what kinds of data to make sure that email is not a file server thereby increasing the risk of what data is compromised as part of BEC.

Perfect example of the beginning of an incident response plan or a tabletop exercise. Orgs must define the cost of compromise. That plan needs to be in place long before. It makes a recovery so much more straightforward.

Attackers analyze their victims in tiers. Potential victims $10 - $50mm revenue organizations. Reputational damage, but not big enough to have an adequate cybersecurity budget.

ShadowIT is a problem, which is why you must address it with a CFO-enforced procurement policy.

Proactive management of M365 tenant security configuration is so critical

The security of your tenant is not included in the fee for biz premium or the overall licensing.

How much activity there is, changes, products, services, vendors. Ideal stack, layers, point solutions within that. Revisit that in a period of time like a year.

This is a nice resource for M365 security and BEC.

https://www.blumira.com/office-365-security-issues

Direct advice from Ken

One topic I believe falls directly into this category is the issue of Business Email Compromise, as opposed to actual malware / hacking / ransomware attacks. As you know, the losses to BEC still represent a greater dollar value than ransomware, according to the FBI statistics. But BEC isn’t even a technology problem, it’s pure social engineering – and no additional layers of hardware or software “solutions” will prevent it or reduce the cost to its victims. In my opinion, that’s why you hear so little on the subject from the cybersecurity vendors.

Another topic I find interesting, but haven’t really heard any vendors or industry pundits talk about, is the whole new ecosystem and infrastructure produced by modern threat actors. The whole business model of these sophisticated criminals has created occupations, titles, and job descriptions that didn’t exist a few years ago. Some of these are a result of the specialization, compartmentalization, and outsourcing by these organizations; here are a few that come to mind:

  • Breach attorney
  • Ransomware Negotiator
  • Initial Access Broker
  • Cloud Access Security Broker
  • Multiple “As-a-Service” offerings:
  • Ransomware as a Service
  • Phishing as a Service
  • C2 as a Service

Another area that is mentioned fairly frequently, but typically fueled by more heat than light – and raised as a point of frustration by MSPs and IT Solution Providers in general – is the users who still believe they don’t have to worry about cybersecurity, hackers, malware, or ransomware, because they “don’t have anything the criminals would want,” or words to that effect. I believe those users need to comprehend how real and serious the threats are to their business.

By defining the multiple tiers of threat actors, the threat vectors they may employ, their potential victims, the assets owned and managed by those victims, and the attacker’s strategy for monetizing those assets, I believe it becomes obvious that every organization and every individual is the intended target of some subset of those threat actors.

Visit this resource for help making argumentation. Ken is working on some additional materials for end user cybersecurity awareness training.

https://qpcsecurity.podbean.com/e/the-real-reason-you-cannot-afford-to-have-a-cybersecurity-incident/

 

view more

More Episodes

Implications of poor design on security - an example
2023-02-03 28
Dark web monitoring and avoiding FUD decisions
2023-01-11 60
The relationship between proper data handling and real risk reduction
2023-01-04 41
Understanding vCISO services and why you need them
2022-11-30 47
What you must do in order to prepare for a breach
2022-11-19 147
Information Security, Cybersecurity, and Everyone’s Responsibility
2022-10-28 60
Ripping apart cybersecurity insurance
2022-10-12 96
CISO Workflows
2022-09-30 74
Vulnerability management with Felicia and Dan - Part 2
2022-09-21 51
File integrity checks (hashing) versus communications or data encryption
2022-09-21 58
Vulnerability management that every business decision maker needs to know about - Part 1
2022-09-13 87
Signs of insufficient networking knowledge
2022-07-17 99
About Password Managers
2022-07-16 145
Requirements for premise hosted assets; cybersecurity, BCDR, and more
2022-07-01 71
Virtual Patching, Telecom Fraud, Running VM Server on NAS
2022-06-03 43
Video management system appliance analysis
2022-06-03 35
Why real server hardware is usually the most cost-effective option
2022-06-03 35
Resources for job candidates in cybersecurity - What you need to do to be employable
2022-06-01 53
Right-sized software
2022-05-17 47
  • ←
  • 1
  • 2
  • 3
  • →
01234567910111213141516171819

Get this podcast on your
phone, FREE

Download Podbean app on App Store Download Podbean app on Google Play

Create your
podcast in
minutes

  • Full-featured podcast site
  • Unlimited storage and bandwidth
  • Comprehensive podcast stats
  • Integrate with iTunes and Google
    store
  • Make money with your podcast
Get started

It is Free

  • Podcast Services

    • Podcast Features
    • Pricing
    • Enterprise Solution
    • Private Podcast
    • The Podcast App
    • Live Stream
    • Audio Recorder
    • Remote Recording
  •  
    • Create a Podcast
    • Video Podcast
    • Start Podcasting
    • Start Radio Talk Show
    • Education Podcast
    • Switch to Podbean
    • Submit Your Podcast
    • Podbean Plugins
  •  
    • Church Podcast
    • Nonprofit Podcast
    • Get Sermons Online
    • Free Audiobooks
    • How to Start a Podcast
    • How to Start a Live Podcast
    • How to Monetize a podcast
    • How to Promote Your Podcast
    • How to Use Group Recording
  • MONETIZATION

    • Premium Podcast
    • Podcast Advertising
    • Patron Program
  • Support

    • Contact Us
    • Support Center
    • Developers
    • Resources
    • Free Webinars
    • Podcast Events
    • Podbean Academy
    • Podcasting Smarter
    • Podbean in the Media
  • Podbean

    • About Us
    • Careers
    • Affiliate Program
    • Badges
    • Terms of Use
    • Privacy Policy
    • Podbean Blog
    • Podbean New Features

Copyright © 2006-2023 Podbean.com