Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
How Healthcare Organizations Can Combat Ransomware
Newest First  |  Oldest First  |  Threaded View
lunny
50%
50%
lunny,
User Rank: Strategist
11/5/2020 | 12:05:53 PM
Don't forget Privileged Access controls
All of the recommendations here are sound.  However, it's critical that organizations have a good Privileged Access Management (PAM) program in place.  Passwords for administrative access should be controlled in a managed password vault, where they are regularly rotated (after use, per schedule).  Session management tools help as well in abstracting the password from the user.  For example, when connecting via a session manager to a Linux server as root, the password is used by the session manager to connect to the target, but the user never sees it and it never winds up on the user workstation in memory or where a kestroke logger can capture it.  Additional tools used to more granularly control administrative access on workstations and servers are helpful as well.  Passwordless authentication at the user end point is also becoming more available, further protecting the enpoint vulnerability (the human) from exploitation.  If no password is used or known by the user, they can't give it to a phisher.  Something like 80% of intrusions are a result of password harvesting at the user workstation, which starts with a phishing event.  Once the attacker has access to the user's credentials, the journey to gain access and move  laterally until privileges are obtained is just a matter of time.

There are multiple vendor choices in the PAM space, so there are choices (features, price, company reputation, etc.).  But if an organization isn't managing privilege well, they are whistling past the graveyard.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.