GoDaddy Breach – What You Should Know. What You Should Do.

According to a statement by GoDaddy, a major web hosting company, it has experienced a breach in which unidentified attackers accessed its cPanel shared hosting environment, resulting in the theft of source code and the installation of malware on its servers. The attack spanned multiple years, but GoDaddy only became aware of the breach in early December 2022 after receiving reports from customers that their websites were being redirected to unfamiliar domains. "Based on our investigation, we believe these incidents are part of a multi-year campaign by a sophisticated threat actor group that, among other things, installed malware on our systems and obtained pieces of code related to some services within GoDaddy," the hosting firm said in an SEC filing. According to the company, the recent multi-year campaign responsible for the latest breach is also connected to previous breaches that were disclosed in November 2021 and March 2020. In November 2021,…

0 Comments

The Importance of a Secure Configuration
of Enterprise Assets and Software to EMCs

In our recent posts, we covered Controls One, Two, and Three. Here, we are going to discuss Control Four, the importance of a Secure Configuration of Enterprise Assets and Software to Electric Membership Cooperatives (EMCs). First, the definition of Enterprise Assets under this control are end-user devices (such as laptops, work pads, or mobile phones); network devices; non-computing/IoT devices (such as Wi-Fi access points); and servers. And Enterprise Software is defined as operating systems and application software. So, why is this control so important for EMCs and organizations of all types and sizes? It is quite simple, without following Control Four's policies, procedures, and safeguards, your organization could face the worst day in its history and quite frankly, it brings corporate survival into the equation. For ease of distribution and cost savings, manufacturers and third-party resellers sell equipment in a state that makes installation and deployment easiest. They do this…

0 Comments

Authenticated and Anonymous File Share Links – Know The Difference. Know The Risk.

In today's digital age, file sharing has become an essential part of our daily lives. Whether it is sharing documents for work, photos with family and friends, or downloading files from the internet, we all rely on file sharing. However, with the convenience of file sharing comes the risk of unauthorized access to sensitive information. That's where authenticated file share links come in. Authenticated file share links provide better security compared to anonymous links because they require the user to authenticate their identity before accessing the shared file. This authentication process can be in the form of a login or a password, which ensures that only authorized individuals can access the file. In contrast, anonymous links do not require authentication, and anyone with the link can access the file. The authentication process for file share links provides several security benefits. First, it ensures that only authorized individuals can access the…

0 Comments

The Importance of Change Management – Don’t Ask For Forgiveness, Later. Get Permission, Now.

IT Change Management is a critical process that helps organizations to manage and control changes to their IT infrastructure, applications, and services. By implementing a structured and controlled approach to managing changes, IT Change Management helps to reduce disruptions and minimize the risk of errors or failures. This, in turn, leads to improved system stability and reliability, which enhances the overall productivity and efficiency of the organization. By reducing disruptions and ensuring that changes are made in a controlled and structured manner, IT Change Management helps organizations to minimize the impact of changes on business operations, reducing downtime and the associated costs. This improves the organization's ability to deliver services to its customers and improves customer satisfaction. In addition to reducing disruptions, IT Change Management also helps organizations to create more alignment with regulatory compliance. Many regulatory compliance frameworks require organizations to have a formal change management process in place…

0 Comments