<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Mike Moran, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/mike/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/mike/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 26 Jun 2019 19:13:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Mike Moran, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/mike/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>BYOD – Do You Know What’s on Your Network?</title>
		<link>https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/</link>
		
		<dc:creator><![CDATA[Mike Moran]]></dc:creator>
		<pubDate>Sun, 20 May 2018 19:18:45 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Bring Your Own Device]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[network discovery scan]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5623</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/">BYOD – Do You Know What’s on Your Network?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="wp-image-5632 size-medium alignleft" style="margin-top: 10px; margin-right: 10px; margin-bottom: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_10348_01642.jpg?resize=300%2C200&#038;ssl=1" alt="BYOD | Bring Your Own Device | Cyber Risk Management" width="300" height="200" /></p>
<p>Is your company allowing employees to <em><strong>bring their own devices</strong></em> and use them to log onto the corporate network? If so, do you know what is happening on your network as well as how many devices are on your network?</p>
<p>Recently, I ran a network discovery at a company and found some interesting things. First, I ran the discovery during the &#8220;off hours,&#8221; meaning there should have been no one in the facility and only the automation and security systems operating.  Instead, the scan showed 70 computers, instruments, and printers running on the network.</p>
<p>Next, I ran the same scan during business hours ― full production and full staff &#8211; resulting in 120 devices being found on the network.  What were the additional devices?  Some of the devices were corporate workstations which get turned off overnight, and the remainder of the ‘new’ devices were <strong><em>personal cell phones.</em></strong></p>
<p>Now, depending on how your networks are configured, that might not be a problem. In a properly segmented network, company-owned devices would have their own segment, and employees&#8217; personal cell phones, laptops, and tablets would be on one or more additional segments. In this case, however, the staff members&#8217; devices were also on the production network, introducing significant risk for the organization. Phones are susceptible to all the same types of malware and viruses as computers. Yet, phones and tablets are much less likely to be running anti-anything (e.g., anti-virus, -malware, or -spyware).</p>
<p>Additionally, a lot of cell phones support tethering, which would allow the user to exfiltrate data via the cell phone to another computer, server, or cloud repository without the company being able to detect it.  This would be done by connecting the device to the internal network and then tethering the device to the external network.  Once connected, data can flow both directions, e.g.: Good data (company confidential data) going out and Bad data (viruses, malware, spyware) coming in.  Or worse yet, someone else could establish a presence, which would allow them to attack other companies while disguised as your company or establish a server from which they transmit spam and porn from your network.</p>
<p>The lesson to learn is that things are never as easy or as secure as you think they are. Be diligent about policies, processes, and knowing <em><strong>what</strong></em> should be flowing <em><strong>where</strong></em> on your network.</p>
<p>If you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Building a Cyber Confident</strong>℠<strong> World</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/">BYOD – Do You Know What’s on Your Network?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5623</post-id>	</item>
		<item>
		<title>NIST Makes Passwords a Little Easier</title>
		<link>https://thirdrock.com/blog/2018/04/12/nist-makes-passwords-a-little-easier/</link>
		
		<dc:creator><![CDATA[Mike Moran]]></dc:creator>
		<pubDate>Thu, 12 Apr 2018 14:00:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[become cyber confident]]></category>
		<category><![CDATA[cyber secure]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NIST recommendations]]></category>
		<category><![CDATA[password vaults]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5413</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/04/12/nist-makes-passwords-a-little-easier/">NIST Makes Passwords a Little Easier</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="alignright wp-image-5415 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Password-in-white-on-blue-key.jpg?resize=300%2C200&#038;ssl=1" alt="Password" width="300" height="200" /></p>
<p>After much research, the National Institute of Standards and Technology (NIST) has determined that we have been doing passwords all wrong!</p>
<p>Traditionally, best practice for password use has been a minimum of 6 characters composed of a combination of letters, numbers and symbols, which had to be rotated periodically. To make things more complex, companies typically added rules about how frequently a password could be reused &#8211; or prohibited reuse completely.</p>
<p>What NIST&#8217;s research showed is that all the rules simply pushed more people into predictable password patterns. Patterns like  Jan18!, Feb18!, Mar18!, which satisfies the no reuse rule, the minimum length rule and the content rule. However, it is completely deducible with only a small amount of social engineering or programming.</p>
<p>So, based on this behavior, what did NIST recommend?</p>
<ul>
<li>Minimum length of 8 characters</li>
<li>Maximum length of 64 characters</li>
<li>Mandatory change based on enforced minimum length</li>
<li>Check against dictionary of known bad passwords</li>
<li>No composition rules</li>
<li>No recovery hints</li>
</ul>
<p>Now that we know what is to be done on the server or application side, how does the end user make use of the new best practices?</p>
<p>The <strong>best solution</strong> is to use a password vault with generation capabilities, which gets you down to a single password for access to the vault.  Password vaults are programs that securely store large numbers of passwords protected by a password. For Windows, some of the popular ones are LastPass, Dashlane, KeePassX and Sticky Password. For MacOS, some of the popular ones are 1Password, KeePass, LastPass, and SplashID Safe.</p>
<p>If you are new to password vaults, then your next step is to visit all the websites you use and use the password vault to generate a new password for each one.</p>
<p><strong>Alternatively</strong>, picking phrases that strike a chord with you from songs, movies, plays or books make good passwords, but make sure they are as long as you can remember – 20, 30&#8230;64 characters, with a minimum of 16 characters.</p>
<p>Once you have password habits that are cyber secure, it is time to secure your whole environment so you can become cyber confident.</p>
<p>If you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong></strong></h3>
<h3 style="text-align: center;"><strong>Building a Cyber Confident</strong>℠<strong> World</strong></h3>
<h3></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/04/12/nist-makes-passwords-a-little-easier/">NIST Makes Passwords a Little Easier</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5413</post-id>	</item>
	</channel>
</rss>
