Page 1,926«..1020..1,9251,9261,9271,928..1,9401,950..»

Cryptojacking Cases Are Rising Globally, Why So And Should This Worry You? – Outlook India

According to the internet security company Kaspersky, cryptojacking is an act of mining cryptocurrency by hacking into someone elses computer, smartphone, and other electronic devices. It is typically done by gaining unauthorised access to the hosts computer and using its resources to mine cryptocurrency without the host noticing it or before it is too late.

Since the Proof-of-Work consensus using coins like Bitcoin (BTC) requires extensive computational power to generate new coins and mining rigs consume heavy electricity besides their high cost and maintenance expenses, hackers use the cryptojacking method to mine Bitcoin and other Proof-of-Work cryptocurrencies using the hosts resources.

Researchers at the Kaspersky Labs further explain that cryptojacking can infect even Android devices even though phones have low processing power than computers. In this type of attack, hackers pool the processing power of a large number of phones to mine Proof-of-Work cryptocurrencies.

According to a report titled 2022 SonicWall Cyber Threat Report by cybersecurity firm SonicWall, cryptojacking attacks in the financial sector has risen by 269 per cent year to date, about five times more than the cyber attacks targeting the retail industry.

The report noted that the finance industry has witnessed significantly higher cryptojacking incidences than any other sector. Overall, crypto-jacking cases went up by 30 per cent to 66.7 million in the first half of 2022, SonicWall said in the report.

Despite a precipitous drop in the price of cryptocurrency, global cryptojacking volume rose to 66.7 million in the first half of 2022, up 30% over the first half of 2021. The number of attacks on the finance industry is five times greater than the second highest industry retail, which used to be at the very bottom of the list, the report noted.

SonicWall researchers noted that despite a sharp drop in Bitcoin prices since January 2022, cryptojacking cases kept increasing, showing that such cases continue irrespective of price fluctuations. Moreover, changing careers is tough even for cybercriminals; hence, they continue to illegally mine Proof-of-Work cryptocurrencies like Bitcoin. The researchers also attributed the rise to the crackdown on ransomware attacks, making cryptojacking their preferred tool for illegal mining. Bitcoin prices fell by 74 per cent from its all-time high of $68,990 last year.

After governments stepped up ransomware awareness and enforcement efforts, and ransomware attacks such as those against Colonial Pipeline and Kaseya led to high-profile busts, some ransomware operators have decided theyre ready for a quieter life, the researchers noted.

In a ransomware-type attack, they said, the attacker has to announce their presence and demand ransom by way of communicating with the victim. But in cryptojacking, the entire attack relies on discretion and without the victim ever being aware of it. And for some cybercriminals feeling the heat, the lower risk is worth sacrificing a potentially higher payday, they said.

Incidents of Attacks: SonicWall researchers observed that cryptojacking incidents rose by 30 per cent to 66.7 million attacks in the first half of 2022, compared to the same period in 2021. The researchers also spotted a trend wherein they observed that cryptojacking attack volumes were often higher in Q1 than in Q2, and it has been the case since SonicWall started tracking cryptojacking.

SonicWall researchers recorded 45.1 million cryptojacking attacks in Q1 2022, but by April, 2022, the incidents were down by half from its peak, and in May, it was even lower, resulting in a second-quarter attack volume of just 21.6 million, less than half the amount seen in the preceding three months.

While falling cryptocurrency prices may have a lot to do with this, keep in mind that what were seeing follows a well-established pattern, the researchers said.

On January 1, 2022, the price of Bitcoin (BTC) was $47,219.03, and on July 30, 2022, it fell to $23,797.00, as per Coinmarketcap data.

Most Attacked Sectors: SonicWall researchers noticed that while the overall cryptojacking incidents increased, the previously most affected sectors like the government, healthcare and education, saw cryptojacking attack volumes dropped in the first half of 2022.

This represents a long-awaited reprieve for education customers, who have gone from seeing the most cryptojacking of any industry on our list, to seeing the least.

While the cryptojacking cases rose by 269 per cent in the finance industry, the retail sector witnessed a 63 per cent rise.

Read more:
Cryptojacking Cases Are Rising Globally, Why So And Should This Worry You? - Outlook India

Read More..

Global Healthcare Cyber Security Market To Be Driven By Increasing Cases Of Internet Frauds In The Healthcare Sector During The Forecast Period Of…

The new report by Expert Market Research titled, GlobalHealthcare Cyber Security Market Size, Share, Growth, Analysis Report and Forecast 2022-2027, gives an in-depth analysis of the healthcare cyber security market, assessing the market based on its segments like type, security type, and major regions among others.

The report tracks the latest trends in the industry and studies their impact on the overall market. It also assesses the market dynamics, covering the key demand and price indicators, along with analysing the market based on the SWOT and Porters Five Forces models.

Get a Free Sample Report with Table of [emailprotected]https://bit.ly/3b4VNK9

The key highlights of the report include:

Market Overview (2017-2027)

Historical Market Size (2021):USD 9395.86 million

Forecast CAGR (2022-2027):15.40%

Forecast Market Size (2027):USD 22190.71 million

The widespread usage of digital services in the healthcare industry is what is driving the worldwide market for healthcare cyber security. This has led to a significant increase in cyber dangers including phishing scams, ransomware attacks, and other sorts of data breach attacks.

Thus, the market expansion is being driven by the increasing usage of healthcare cyber security to stop healthcare fraud. Additionally, the number of linked devices in the healthcare industry has increased because of the Internet of Things (IoT) market penetration, this provides unethical hackers more opportunities to exercise frauds hence furthering the market growth of healthcare cyber security systems.

Healthcare cyber security aids in keeping electronic data and assets from being accessed and used without authorization in the healthcare sector like clinics and hospitals.

Additionally, they help to retain health records, lower the risk of medical mistakes, increase diagnostic accuracy, and safeguard patient privacy. As a result, hospitals, ambulatory services, and surgical centres all often utilise cyber security in healthcare.

Read Full Report with Table of [emailprotected]https://bit.ly/3vf75lB

Based on type, the market can be divided into:

Service Solution

On the basis of security type, the market can be segmented into:

Application Security Cloud Security Content Security Endpoint Security Network Security Wireless Security Others

The major regional markets of the healthcare cyber security market are:

North America Asia Pacific Latin America Europe Middle East and Africa

The increasing government funding for the creation of cyber security solutions for the healthcare sector is expected to fuel growth in the global market for healthcare cyber security. Due to this, top industry players are constantly developing and updating cutting-edge solutions to reduce the risk of cyberattacks in hospitals, clinics, and other healthcare facilities, which is anticipated to fuel market expansion in the upcoming years.

Additionally, it is anticipated that the use of advanced security systems, including authentication options like two-factor and multi-factor authentication, biometric solutions like fingerprint scanners, and others, powered by advanced digital technologies like Artificial Intelligence (AI), Machine Learning (ML), and the Internet of Things (IoT), will accelerate the market growth of healthcare cyber security.

The major players in the market are:

The report covers the market shares, capacities, plant turnarounds, expansions, investments and mergers and acquisitions, among other latest developments of these market players.

About Us:

Expert Market Research(EMR) is leading market research company with clients across the globe. Through comprehensive data collection and skilful analysis and interpretation of data, the company offers its clients extensive, latest and actionable market intelligence which enables them to make informed and intelligent decisions and strengthen their position in the market. The clientele ranges from Fortune 1000 companies to small and medium scale enterprises.

EMR customises syndicated reports according to clients requirements and expectations. The company is active across over 15 prominent industry domains, including food and beverages, chemicals and materials, technology and media, consumer goods, packaging, agriculture, and pharmaceuticals, among others.

Over 3000 EMR consultants and more than 100 analysts work very hard to ensure that clients get only the most updated, relevant, accurate and actionable industry intelligence so that they may formulate informed, effective and intelligent business strategies and ensure their leadership in the market.

Media Contact:

Company Name: Claight CorporationContact Person:- Shira Ellis, Business ConsultantEmail: [emailprotected]Toll Free Number: US +1-415-325-5166 | UK +44-702-402-5790Address: 30 North Gould Street, Sheridan, WY 82801, USAWebsite: http://www.expertmarketresearch.com

Also Read:

ISO Tank Container Market: https://mbutimeline.com/news/336077/global-iso-tank-container-market-to-be-driven-by-expansion-of-maritime-trading-in-the-forecast-period-of-2021-2026/

Precision Medicine Market: https://mbutimeline.com/news/335985/global-precision-medicine-market-to-be-driven-by-growing-cases-of-cancer-in-the-forecast-period-of-2021-2026/

Empty Capsules Market: https://mbutimeline.com/news/336105/global-empty-capsules-market-is-projected-to-reach-usd-2-97-billion-in-the-forecast-period-of-2021-2026/

Point-of-Care (POC) Diagnostic Market: https://mbutimeline.com/news/336104/global-point-of-care-poc-diagnostic-market-to-be-driven-by-rising-prevalence-of-diseases-in-the-forecast-period-of-2021-2026/

Content Source @https://takeitcool.com/healthcare-cyber-security-market-size-share-trends-industry-report-key-player-major-segments-and-forecast/

Read the original:
Global Healthcare Cyber Security Market To Be Driven By Increasing Cases Of Internet Frauds In The Healthcare Sector During The Forecast Period Of...

Read More..

Cyber Week in Review: July 29, 2022 – Council on Foreign Relations

The Transportation Security Administration Issues Revised Cybersecurity Requirements for Natural Gas Pipelines

The Transportation Security Administration (TSA) revised its cybersecurity standards for owners and operators of TSA-designated critical pipelines that transport natural gas or hazardous liquids. The security requirements were revised following feedback from the private sector and focus on performance-based measures to achieve cybersecurity resiliency. The new directive outlines four areas of future action. Operators and owners should: develop network segmentation policies to ensure safe operation during an attack, create access control measures to prevent unauthorized access to cyber systems, build detection policies to search for cybersecurity threats, and reduce the exploitation of unpatched systems by applying a series of security patches and updates for critical software. The natural gas industry has faced several major cybersecurity incidents in the last year that have raised alarm, including a ransomware attack on Colonial Pipeline in May 2021 that crippled gas flows for a week on the U.S. east coast and led to the first security directive issued by TSA and a piece of malware, dubbed PIPEDREAM, designed to destroy parts of natural gas plants, likely circulated by Russian threat actors in the wake of Russias invasion of Ukraine.

The United States and Saudi Arabia Sign Bilateral Cybersecurity Agreements

Officials from Saudi Arabia and the United States signed two bilateral agreements on cybersecurity cooperation during President Bidens trip to Riyadh last week. The first agreement was between Saudi Arabias National Cybersecurity Authority and the FBI, the second one with the Cybersecurity Infrastructure Security Agency (CISA). In part. the agreements are targeted at Iran, which has launched a range of cyberattacks from website defacement and distributed denial-of-service attacks to espionage and ransomware against the two countries. Cyber agreements are being used to shore up a newly emerging regional architecture to deter and contain Iran The United States, for example, recently announcing a collaboration with Israel to combat cybercrime, and Israel and the United Arab Emirates have discussed shared cyber threats and exchanged threat intelligence on Hezbollah cyber operations.

Chinas Cybersecurity Agency Fines Didi $1.2 Billion Over Data Privacy Concerns

More on:

Technology and Innovation

Cybersecurity

China

Chinas internet regulator, the Cyberspace Administration of China, announced it had fined ride-hailing company Didi $1.2 billion over the companys data collection and security protections. The fine is the final outcome of a probe which came about after Didi pushed to list its stock on the New York Stock Exchange (NYSE) over the objections of Chinese regulators. The probe eventually led Didi to delist from the New York Stock Exchange less than a year after its debut and forced it to stop adding new users in China for over a year. Didi issued a statement apologizing for the violations and promised to improve its data collection and retention practices in the future. Didis is not alone among large Chinese technology firms in facing an investigation, as the Chinese government has flexed its regulatory muscle to crack down on technology firms over the past year.

FBI Investigation into Huawei Publicized

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.

Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.

A summary of global news developments with CFR analysis delivered to your inbox each morning.Most weekdays.

A weekly digest of the latestfrom CFR on the biggest foreign policy stories of the week, featuring briefs, opinions, and explainers. Every Friday.

The results of 2019 FBI investigation into Huawei equipment were publicized earlier this week. Counterintelligence officials reportedly found significant concerns around Huawei equipment, including the installation of unnecessary, unprofitable cell tower equipment in areas near U.S. military bases. The equipment could possibly have been used to spy on restricted Department of Defense communications. The investigation reportedly played a direct role in the Federal Communication Commissions (FCC) 2019 decision to blacklist Huawei and another Chinese firm, ZTE, to prevent them from receiving federal subsidies or being used in federal networks. The FCC has since allocated nearly $6 billion to remove and replace Huawei and ZTE equipment in the United States, although critics have argued that the program will likely take years and run over budget.

CHIPS Act Passed by the Senate and House of Representatives

The U.S. Senate and House of Representatives passed the Creating Helpful Incentives to Produce Semiconductors for AmericaPlus(CHIPS+) Act this week, a $280 billion bill aimed at strengthening Americas manufacturing and technological capacities to compete with China. The bill will provide $52 billion in subsidies to domestic semiconductor manufacturers, $200 billion for scientific research for emerging technologies, and $10 billion for the Department of Commerce to create twenty regional technology hubs across the country. These hubs would link research universities with private industry to create centers for innovation in places where such funding is lacking. The National Science Foundation will receive new funding to accelerate the development of technologies critical to U.S. security and $61 billion to fund researchers at universities. Furthermore, the Energy Departments Office of Sciences five-year authorization will increase to $50 billion to focus on clean energy, nuclear physics, and high-intensity lasers. The bill will likely be signed into law next week by President Biden, who hailed it in a statement as an historic bill.

More on:

Technology and Innovation

Cybersecurity

China

Continue reading here:
Cyber Week in Review: July 29, 2022 - Council on Foreign Relations

Read More..

India’s 5G auction kicks off today. These are the companies in the race – CNBC

The number of 5G subscribers in India is expected to grow to 500 million by 2027, according to a report. Mobile phones in the vast country have become almost indispensable even among rural Indians, with a farmer here seen taking a selfie during a protest in stock photo from 2019.

Vishal Bhatnagar | Afp | Getty Images

India's 5G auction kicks off on Tuesday and four local companies will be in the race to bid for the country's first 5G spectrum ahead of a planned rollout in 2023.

Bidders will include all the three major mobile operators in India: Reliance Jio, the market leader, Bharti Airtel and Vodafone Idea.

The surprise entry of Indian billionaire Gautam Adani as the fourth contender could still rock the boat.

5G refers tothe fifth generation of high-speed mobile internet which promises super-fast download speeds that can support technologies like driverless cars and virtual reality.

A total of 72 gigahertz of 5G spectrum will be on the block, for which winning bids will retain the rights for 20 years.

In total, the four bidders have put up $2.7 billion (218 billion Indian rupees) in earnest money, the mandatory sum required to confirm a contract. The amount of earnest money deposited provides an indication ofthe amount of spectrum a company wishes to buy.

The auction will see aggressive bidding by Reliance Industries' Jio, which has deposited 140 billion rupees of earnest money with the government the largest amount among the contenders.

Other major mobile operators include Bharti Airtel which put 55 billion rupees and Vodafone Idea which deposited 22 billion rupees of earnest money.

The Adani Group conglomerate, which operates mainly in infrastructure, put in only 1 billion Indian rupees as earnest money, which entitles it to bid for only a limited amount of spectrum.

Before the fourth bidder's identity was disclosed, there was speculation of a new competitor in the mobile network and data space, which drove up expectations of higher bidding.

However, the company moved to douse the speculation. When contacted by CNBC, the Adani Group denied plans to enter the mobile phone space.

"We are participating in the 5G spectrum auction to provide private network solutions along with enhanced cyber security in the airport, ports & logistics, power generation, transmission, distribution, and various manufacturing operations," the group said in a statement.

While the small amount of earnest money rules out a nationwide entry into the mobile space by Adani, it still leaves room to acquire enough spectrum to provide coverage in large cities such as Mumbai and New Delhi, a significant market.

In India, "5G is projected to account for almost 40 percent of mobile subscriptions 500 million by the end of 2027," according to a recent report by Ericsson, one of the leading providers of 5G equipment in the U.S.

"By then, smartphone users in the region are forecast to consume 50GB of data per month on average," the report said, adding that "there is already a good foundation for 5G uptake" in the country.

There is significant consumer interest in adopting 5G, the report said citing a recent study. It estimated that about 40 million smartphone users could take up 5G in the initial year of its availability.

See the article here:
India's 5G auction kicks off today. These are the companies in the race - CNBC

Read More..

Microsoft Warns of Internet Information Services (IIS) Malware Increase – WinBuzzer

Microsoft has issued a warning to customers over a rise in malware the company is finding in its Internet Information Services (IIS) server. Specifically, the company is seeing malware that can create backdoors in IIS and help attackers steal credentials.

According to Microsoft, the malware is hard to detect but can be found and removed:

Malicious IIS extensions are less frequently encountered in attacks against servers, with attackers often only using script web shells as the first stage payload. This leads to a relatively lower detection rate for malicious IIS extensions compared to script web shells. IIS backdoors are also harder to detect since they mostly reside in the same directories as legitimate modules used by target applications, and they follow the same code structure as clean modules.

Advertisement

The issue was first spotted by security research firm ESET. In 2021, the company found 80 unique malicious IIS modules for a group of 14 malware types. While these were previously known malware families, they were successfully being used to target Microsoft Internet Information Services.

Specifically, threat actors were creating IIS backdoors and installing injectors, info stealers, and proxies.

From March to June 2021, ESET tracked IIS backdoors that were using the Exchange ProxyLogon pre-authentication to remove code execution vulnerabilities (CVE-2021-26855,CVE-2021-26857,CVE-2021-26858, andCVE-2021-27065).

Microsoft points out that IIS extension attacks usually begin with the attacker targeting a critical flaw in hosted applications and exploiting it. They will then add the web shell before next adding the backdoor.

Once registered with the target application, the backdoor can monitor incoming and outgoing requests and perform additional tasks, such as running remote commands or dumping credentials in the background as the user authenticates to the web application, Microsoft explains.

Tip of the day: Is your system drive constantly full and you need to free up space regularly? Try Windows Disk Cleanup in extended mode which goes far beyond the standard procedure. Our tutorial also shows you how to create a desktop shortcut to run this advanced method right from the desktop.

Advertisement

Read more:
Microsoft Warns of Internet Information Services (IIS) Malware Increase - WinBuzzer

Read More..

FileWave fixes bugs that left 1,000+ orgs open to ransomware, data theft – The Register

FileWave has fixed a couple vulnerabilities in its endpoint management software that could allow a remote attacker to bypass authentication and take full control of the deployment and associated devices.

Industrial control system security firm Claroty discovered the two bugs, tracked as CVE-2022-34907 and CVE-2022-34906, and says they exposed organizations across sectors from large corporations to schools and government agencies and even small businesses to risks including ransomware infections, sensitive data theft, and even remote device control.

More than 1,100 internet-reachable FileWave management instances, each with an "unrestricted number" of managed devices, were vulnerable to attack, according to the security shop's Team82 researchers.

In an analysis about the flaws, researcher Noam Moshe also noted the "quick response time by FileWave" as "one of the positive outcomes" of the bug-hunting expedition. "Once we notified Filewave they quickly developed and deployed fixes to these issues and actively reached out to their customers," he wrote this week.

FileWave notified all affected users on April 26, and provided them with fixes for the flaws. The vulnerabilities affect all software versions prior to version 14.6.3, as well as 14.7.x versions prior to version 14.7.2. FileWave issued an update to address the bugs, and it's included in the patched software of versions 14.6.3, 14.7.2, as well as in the latest software release 14.8 and all future subsequent versions.

CVE-2022-34907 is an authentication bypass flaw that Moshe said is similar to the vulnerability that was recently identified in F5 BIG-IP WAF.

In this particular case, the scheduler service running on the mobile device management (MDM) server uses a hardcoded shared secret to authenticate to the web server, Moshe explained. However, the shared secret doesn't change between each MDM installation nor between versions.

"This means that if we know the shared secret and supply it in the request, we do not need to supply a valid user's token or know the user's username and password," Moshe wrote, adding that an attacker could exploit this flaw to access the system with the highest-available permissions.

From there, a miscreant could control every managed device exposed to the internet. "This enables us to control all of the servers' managed devices, exfiltrate all sensitive data being held by the devices, including usernames, email addresses, IP addresses, geo-location etc, and install malicious software on managed devices," Moshe noted.

And then, for fun, the researchers remotely dropped fake ransomware on each device.

The second vuln, tracked as CVE-2022-34906, exists in the hardcoded cryptographic key. A unauthenticated user could exploit this bug to decrypt and steal sensitive information in FileWave, and also send crafted requests to the devices associated with the MDM platform.

See the article here:
FileWave fixes bugs that left 1,000+ orgs open to ransomware, data theft - The Register

Read More..

The boots on the ground stomping out insurance fraud – ITIJ

Keep on reading

Phil Peart, Senior Investigations Manager (APAC), World Travel Protection, says you just need to know where to look and what to look for when it comes to unmasking fraudulent travel

Trends differ according to the part of the world in question, and looking at the impact of Covid-19, it is apparent that fraud hasnt lessened as a result of the pandemic; quite the opposite. Indeed, Simon Cook, Head of Specialist Investigation Services, Charles Taylor Technical Services, explained to ITIJ how Covid has presented new opportunities for fraudsters. One of the trends weve seen is policyholders fabricating accommodation costs when they extend stays abroad after contracting Covid and they are in fact staying for free with friends or relatives, he said. Weve also seen individuals with Covid colluding with accommodation owners or hotels to inflate the cost of extended stays. It seems that these types of fraud, facilitated by the pandemic, will continue to rise, and Cook confirmed that as global travel increases, Charles Taylor Technical Services is anticipating and prepared for a rise in both opportunistic and organised fraud. For instance, policyholders wanting to go on holiday but not being able to afford it may try to recoup some of their costs by submitting fraudulent claims for medical expenses or lost possessions, he told ITIJ.

Dan Kaine, Partner, Risk & Crisis Advisory, Inherent Risks, has also seen instances of financial hardships caused by the pandemic motivating fraudulent claims. Families want to travel and return to normality, but dont necessarily have the disposable income to do so. The fraudsters dont see it as committing a crime, more as stretching the truth. This mentality is costing the insurance industry millions per year. Inherent Risks identifies, investigates and interrupts travel insurance fraud trends in different parts of the world, particularly in lower-income regions and Kaine has observed other recent trends in light (or dark!) of the pandemic. As Covid brought the travel industry to its knees for the best part of two years, it caused a ripple effect through all of the ancillary industries that rely heavily on tourism, including hospital and clinics, private ambulance companies and helicopter rescue providers. As a result, we are already seeing a worrying trend of predatory practices to recoup lost revenues, enabling fraudulent travel insurance claims to be submitted, and enabling fraudsters to profit from insurers.

Kaine and his team have also seen, first hand, collusion between fraudsters and providers. This includes fake doctors notes, fabricated hospital admissions with elaborate medical bills, and even real police reports about incidents that never happened, he told ITIJ. These types of cases are occurring in typically less-developed countries, arguably where local micro economies created by tourism were affected the most during the worldwide lockdowns. We have seen increasing trends of various types of travel insurance fraud occurring already this year in Mexico, Guatemala, Caribbean, Turkey, Greece and Nepal.

Smith, too, is acutely aware of a range of types of fraud, including intentional inflating and a worsening of the situation due to the pandemic. Conservative estimates suggest between 10 to 20 per cent of all insurance claims submitted contain some aspect of fraud. This ranges from completely false claims to intentionally misstating or inflating claims, he told ITIJ. All indications are that the Covid-19 pandemic, and the ensuing economic impact, have fueled a rise in insurance fraud both in the US and globally.

Further underlining the severity of the issue, Smith stated that the pandemic has demonstrated that insurance fraud is no longer a national, but a global, issue. He shared some startling statistics with ITIJ: Organisations such as the United Nations have reported a 600-per-cent increase in malicious phishing attempts to secure personal data. Interpol reported cybercriminals are boosting attacks at the most alarming rate ever seen, and leaders in Spain reported fake insurance scams soared by 21 per cent in 2020 compared to 2019. All of this points to a dramatic rise in insurance fraud crimes around the globe. Smith said that many of these scams relate to stolen identities which in turn result in fraudulently secured insurance policies and submitting of bogus claims.

Concerning the processes and protocols in place for investigating travel and health claims, Phil Peart, Senior Investigations Manager (APAC), World Travel Protection, said that with easing of Covid restrictions, insurers are taking a new and strategic approach to managing claims. He provided an insight on World Travel Protections work to this end: We have established a new Special Investigation Unit (SIU), staffed by experienced ex-military personnel and claim investigation specialists. It provides an all-encompassing travel risk management solution, combining security, intelligence and investigations, all within the SIU, delivering a complete value proposition for all clients across all disciplines.

Kaine told ITIJ that a one-size-fits-all approach to investigation processes wont suffice. What works in one region, will certainly fail in another. There are many factors to consider, including the geographic location, and culture of the people where the incident (real or fake) happened. This can make a claim much more difficult to validate, especially when corrupt officials, including doctors, police, hotel and airline staff are involved in the fraud, and are profiting in some way, he said. At Inherent Risks, claims teams undergo rigorous training, as Kaine describes: Our claims teams are trained to identify key indicators in conjunction with our technology claims platform, which flags a case to be investigated further. If required, assistance from ground agents and region-specific network providers is also requested to investigate cases further, through an on-the-ground approach.

Pandemic-induced lockdowns may have brought a halt to travel, but theyve been no barrier to fraud. Sarah Watson investigates the effect of Covid-19 on travel insurance fraud trends

In line with evolving types and methods of fraud, the tools at insurers disposal are levelling up. For example, Charles Taylor has developed a new social media and open source investigation tool, as Cook explained: It uses algorithms to search over 220 open source and social media sites for impactful claims intelligence, which can then be acted on by our investigators. Its a great example of uniting IT and human expertise to protect insurers bottom lines. Importantly, by using algorithms to search for intelligence, it also removes unconscious bias from the claims validation process. The company has also invested in an automated fraud detection and machine learning business. This will help segregate fraud risk and enhance Charles Taylors claims validation toolbox, Cook told ITIJ.

World Travel Protection uses its database management application, Atlas, which delivers a total claims solution from risk analysis, claim trends and outcome reporting. Atlas utilises some of the most advanced technology for internet security available today, said Peart. All data is hosted in a secure server environment that uses a firewall and other advanced technology to prevent interference or access from outside intruders.

Inherent Risks has developed machine learning technology that uses pre-populated parameters to alert the team to potentially fraudulent cases. Kaine explains more: This technology improves its accuracy and increases its alerts based on the amount of data thats added. The best way to think of it is that the system gets smarter every time we add a new case to it. It also anonymises the traveller data, enabling us to share data securely, internally, and externally with our clients, and our network providers.

Insurance fraud is rampant and law enforcement is stretched, so are sufficient resources devoted to catching and punishing fraudsters? In the context of extremely high levels of insurance fraud, the [UK] police do well with the limited resources at their disposal, said Cook. He also highlighted the importance of the ongoing campaign for the development of a database of incidents called CUE (the Claims and Underwriting Exchange). This will enable the travel industry to share claims data and proactively prevent fraud.

Smith argues that law enforcement needs to do more and said that there is also work to be done to change perceptions of fraud, as well as improving understanding of its far-reaching impact. There is a tremendous need for local, national and international law enforcement agencies to both learn more about, and increase efforts to prevent, all forms of insurance fraud, he told ITIJ. Too often, many law enforcement agencies view insurance fraud as a victimless crime or one where only the insurance company is impacted. Such beliefs are misplaced. Insurance crimes from arson fires which dramatically rose during the pandemic to staged accidents both injure and kill innocent people. Let alone the economic damage that insurance fraud inflicts on consumers worldwide.

For several years now, Kaine has privately and publicly advocated for law enforcement to take more action against both individuals and international organisations who actively target British insurers. He told us more about this effort: This has included reaching out several times to associations who portray themselves to be targeting insurance fraud. We have offered to share data, for no fee, with the intent of targeting, and reducing insurance fraud on a global scale. However, Kaine told ITIJ, these actions have not been well received. Unfortunately, these efforts have been met not only with a lack of interest, but in some cases, their responses were in fact extremely hostile. Its a typical silo that we have experienced time and again between private [firms] and government where the attitude is that we couldnt possibly know more than them. It shouldnt be about that. Crimes are being committed and assistance companies have the evidence needed to build an intelligence picture that can lead to arrests, and sanctions. That should be seen as a valuable asset to any law enforcement organisation committed to tackling these types of crimes.

It is apparent that the Covid-19 pandemic has ushered in a new era in which financial struggles are motivating people to commit fraud without a true understanding of the severity of their actions and consequences. Additionally, the pandemic has provided new opportunities for insurance fraud, including collusion between holidaymakers and accommodation owners or hotels, and provided the setting for new demographics of fraudsters who dont necessarily view their actions as insurance fraud. In light of this, mitigation and detection optimisation strategies are more important than ever before, and companies are placing renewed emphasis on travel risk mitigation along with training and awareness for claims teams. As Cook stated: In this climate of need and greed, its especially important for travel insurers to ensure they have mitigated risks efficiently and optimised their fraud strategies, not least through enhanced training, risk assessments and awareness building for frontline claims teams.

It seems that what may have once become a national issue has now reached global status. Such a prominent issue that costs the industry so much in time and money cannot be resolved with a one-size-fits-all approach. New tools, algorithms and technologies such as machine learning are, and should continue to be, used by the industry in the fight against fraud. Unfortunately, fraud is pervasive and insidious and, in addition, there are many misconceptions on this topic. There is a clear need to improve understanding and awareness of insurance fraud and for law enforcement to take more notice and action on an issue that is not just about rising premiums, but is causing economic damage and even loss of life. With continued and enhanced efforts to mitigate and spread awareness of fraud, as well as by organisations that are exposing, building evidence and determined to stamp out this criminal practice, the insurance industry and its partners remain one step ahead.

Lauren Haigh is a writer and copy-editor for ITIJ. She writes features and articles across the company's suite of publications.She has worked in publishing for over seven years, the past three of which she has dedicated to learning the ins and outs of travel and health insurance. She likes cats.

The rest is here:
The boots on the ground stomping out insurance fraud - ITIJ

Read More..

How to prevent a data breach: 10 best practices and tactics – TechTarget

It's not difficult to convince business leaders that a data breach can cause tremendous pain. Lost proprietary knowledge, reputational damage and remediation expenses can add up to disastrous, if not catastrophic, fallout.

Ponemon Institute's 2021 "Cost of a Data Breach" report, sponsored by IBM, estimated a single breach costs $4.24 million on average. From a business continuity standpoint, however, the true impact is often far higher.

In short, the risks associated with a data breach are nearly incalculable. Not every organization can survive the financial, legal and reputational ramifications of a significant breach.

Business and IT leaders are, therefore, seeking ways to stop these attacks from occurring in the first place.

Because data breaches occur for many reasons, it is critical to use multiple technologies and processes to mitigate them. Below are 10 key best practices for preventing data breaches.

Editor's note: While incident response policies, tools and practices should also be part of an enterprise's overall security posture, the following tips focus on data breach prevention.

To protect its data, a business must first understand what and where it is -- necessitating a thorough inventory of all data sets and sensitive information locations. This inventory should be subject to regular updates and reviews to keep pace with the addition, removal and movement of data.

Even when done with the best intentions, granting privileged access to employees and contractors can get out of hand in a hurry and put data at unnecessary risk. Establish and enforce policies surrounding elevated levels of access, with regular oversight. Privileged access management tools can help facilitate and enforce these policies.

It's not difficult to convince business leaders that a data breach can cause tremendous pain.

The patching of networks and systems should be a top priority for any IT security team. The number of newly discovered zero-day exploits continues to rise, and attackers commonly take advantage of unpatched software to gain access to critical data.

Traditionally, the first line of defense against external threats is network perimeter security. This includes the use of firewalls, intrusion prevention and intrusion detection systems, access control lists and other tools designed to allow unfettered business data flows internally, while helping identify and stop known threat attempts coming from outside the organization.

The implementation of endpoint security controls, such as malware detection software, has never been more important. Users and workloads have become highly distributed and often fall outside the protection of traditional perimeter security tools. With proper implementation and management, endpoint security can deliver exceptional safeguarding against common internet-based threats, such as web-based malware.

If nefarious actors can successfully penetrate an organization's perimeter security, their next logical step in the intrusion process is to figure out what other systems they can access and potentially infiltrate. Thwart their efforts, and limit unsanctioned lateral movement with microsegmentation, which creates isolated network zones.

No matter where sensitive data is at any given moment, it should be encrypted to prevent anyone capable of accessing the data from reading it. Not only does this include encrypting data where it resides, but also when it is moving from one point to another within a corporate network.

Modern password policies should be an absolute requirement for all applications and services running on an enterprise network. Examples of password requirements and restrictions are the following:

Advanced network monitoring and threat detection tools help detect and block intrusions and prevent data breaches from occurring or spreading. Behavior-based tools that use AI, such as network detection and response platforms, detect user, network and data flow anomalies that might indicate a breach is underway. These tools alert the appropriate IT security staff, who can then conduct further investigation and mitigation.

No cybersecurity strategy is complete without ample security awareness training for all who access and interact with sensitive corporate data. It should come as no surprise that intentional and unintentional mistakes of staff, contractors and partners represent the biggest threat to data security and the most significant challenge in data breach prevention. Proper training that covers data usage guidelines, password policies and common threats, such as social engineering and phishing scams, should happen regularly.

It's important to note that, while data breach prevention should be a top concern, organizations must balance it against other, sometimes competing, priorities. Each enterprise must, therefore, find the right, tailored mixture of cybersecurity policies and tools to align with its organizational risk appetite, minimizing the likelihood of a security incident, while maximizing business productivity -- only then will the organization have a data breach prevention strategy that delivers proper levels of protection, speed and agility.

View original post here:
How to prevent a data breach: 10 best practices and tactics - TechTarget

Read More..

Security and defence dialogue between the UK and Ghana – GOV.UK

Serious and organised crime

The United Kingdom and Ghana commit to further strengthen the collaboration between our governments and law enforcement agencies to counter the threat that serious and organised crime and organised criminal gangs pose to both countries by addressing the drivers and enablers of criminality and disrupting their business models.

The United Kingdom and Ghana commit to further deepen collaboration to disrupt the SOC criminals and networks which impose highest harm, and to reduce vulnerabilities of individuals, businesses and communities to exploitation from SOC criminals and networks, including through the delivery of new UK programming aimed at tackling illicit financial flows including the management and return of criminal assets and cybercrime.

Given the prioritisation of transnational Organised Crime in Ghanas national security strategy, the United Kingdom commits to providing support to Ghana to develop its strategic framework, including through the implementation of the new asset recovery and management policy framework and narcotics master plan.

In order to increase disruptions of the trafficking of drugs, the UK will continue to support relevant Ghanaian law enforcement agencies, including NACOC. Ghana will further enhance agencies ability to operate by ensuring full access to WCO CTS and ICUMS and allowing for joint inspection rights at Tema Port.

The United Kingdom and Ghana reaffirm our shared commitment to achieving progress on shared illicit financial flow outcomes to cement Ghanas removal from the FATF grey list.

The UK commits to exploring how GoAML can be integrated more effectively across the Ghanaian law enforcement system. The United Kingdom and Ghana recognise the challenges presented by unregulated and illegal gold-mining, and the United Kingdom will start a new programme of support to build community resilience against the SOC and stability related risks presented by this.

The United Kingdom and Ghana recognise that although our countries face different border challenges, there is much to be learned from each other. We commit to maintaining our law enforcement collaboration to protect our borders and strive to mitigate the corrupt practices which undermine them.

The United Kingdom and Ghana affirm our cooperation on shared commitment to the effective management of migration and travel between our two countries. The UK will continue to work closely with Ghana immigration service including skills towards data analysis to improve border security. UK agrees to work closely with GIS on immigration matters particularly on deportation to allow GIS to prepare adequately to reintegrate Ghanaian deportees.

The United Kingdom and Ghana recognise the increasing proximity of instability to Ghanas borders and the risk this presents to Ghana particularly in the northern zone and West Africa. The United Kingdom and Ghana acknowledge the importance of civilian-led security and civil-military cooperation in maintaining stability in border areas and giving a platform for development.

The United Kingdom and Ghana agree to work together in support of Ghanas efforts to institutionalise integrated economic and human development, good governance, peacebuilding and civil-military cooperation within Ghanas planning and response, in support of Ghanas national security strategy, with a closer working relationship between the Ministry of National Security and relevant UK staff.

The United Kingdom and Ghana will increase cooperation in the areas of community policing, community conflict resolution, and support to the coordination of economic development efforts through the Northern Development Authority. The UK will continue to support large and broad ranging development assistance programmes, and will work with international partners to increase engagement with the softer interventions and human security approaches set out in the national security strategy.

The UK agrees to support Ghanas counter-terrorism initiatives by providing avenues to ensure that vulnerable communities become resilient to conflict and the causes of violent extremism.

The United Kingdom and Ghana reaffirm our commitment to work together to respond to the shared threat of violent extremism and terrorism. In support of this commitment the United Kingdom will share experience of delivering a multi-agency approach in response to terrorist incidents, including to work with Ghana to identify vulnerabilities in strategic sites and sharing best practice.

The United Kingdom will share experience on preventing radicalisation and violent extremism and taking intelligence led and evidence-based approaches. The United Kingdom will support Ghana in preventing terrorist use of the internet, and working to mitigate the risks of prisons being used for radicalisation.

The United Kingdom will share insight on terrorist financing, trans-border movements and the illegal movement of small arms and light weapons.

The UK will continue to support aviation security at Kotoka International Airport and will explore how to support increased protection of maritime architecture.

The United Kingdom and Ghana recognise the importance and opportunity to engage on cyber. The United Kingdom and Ghana commit to agreeing the scope of a cyber work programme, grounded in capability needs assessment and eco-system analysis of relevant Ghanaian bodies.

The United Kingdom will support Ghana to raise levels of cyber awareness for citizens and institutions, with a focus on areas of greatest harm to mutual interests and explore potential collaboration for developing SME toolkits. The UK and Ghana will work together to build capacity in specific agreed areas.

The United Kingdom and Ghana reaffirm the longstanding and deep relationship between our armed forces, and commit to expanding existing defence cooperation and partnership for mutually agreed critical areas.

The United Kingdom and Ghana share concern at the increase of violent incidents, attacks and insurgency in West Africa. The United Kingdom will support efforts to achieve regional solutions to these threats, recognising that instability does not recognise borders.

The United Kingdom will support Ghana to galvanise international support for regional initiatives such as the Accra Initiative, and ensure that support for such initiatives is coordinated and coherent. Ghana will work with other countries under the Accra Initiative to ensure that UK support is aligned appropriately.

The United Kingdom and Ghana commit to integrating the commitment made through this dialogue into workplans, reviewed through a working group structure meeting quarterly, and to agree future cooperation at the next security dialogue, which we will aim to hold in summer 2023. This dialogue will involve all relevant ministries, departments and agencies from both governments.

View post:
Security and defence dialogue between the UK and Ghana - GOV.UK

Read More..

[Webinar] Data Mining in Incident Response: Managing Risk and Spend through An Effective Evidence-Based Approach – August 31st, 12:00 pm – 1:00 pm ET…

Data mining has increasingly become one of the largest expenses during a cyber incident, often leaving claims professionals with blown budgets and insured clients in high-risk scenarios when assumptions about their data (and what may lurk within) dictate the operationalized response towards providing notice to affected parties after a breach.

A lack of standards amongst breach coaches, claims professionals, and the vendors who consult on and perform data mining work has resulted in an unmanageable situation for insurers, despite there being repeatable, defensible methods to stage, understand, and act on sensitive data utilizing workflows that are established in the scientific method and eDiscovery in general during litigation.

This session will highlight the risks of over and under notice of effective individuals in a cyber incident and will discuss key checkpoints ahead of and throughout the data mining process, while will giving claims professionals a new understanding of the types of levers they should be pulling internally at their organizations, and with their partners to optimize, manage, and establish repeatable processes with a special focus on the below underlying themes:

* Whether to provide individual notice under data breach law requires understanding some key facts: whose data is at issue? Where are they (in what jurisdiction)? What data is at issue? How (and to what degree) was the data compromised.

* When unstructured data is compromised, this requires identifying the who, where and what of the data through cyber review. Making assumptions about the data (even informed assumptions based on SMEs) will inevitably lead to over and under inclusive notice. PII and PHI can creep into places (and be missing from others).

* Over notice creates risk as it inflates the scope of the breach unnecessarily damaging the brand and making the incident more attractive for litigation.

* Under notice is worse as it can lead to questions about the sufficiency and completeness of the notice and remediation steps. Attacking the completeness of the notice allows plaintiff counsel to open a new front in their litigation.

Expert Panelists

Mike SarloChief Innovation Officer, President, Global Investigations and Cyber Incident Response Services, HaystackID

Mike, as Chief Innovation Officer, works closely with HaystackIDs software development and data science teams to deliver best-in-class data collection, eDiscovery, and review solutions that allow legal teams to act on data types typically not conducive to collection, review, or production in the context of eDiscovery. In his role as President of Global Investigations, Michael works closely with clients on the most challenging and complex regulatory, investigative, and civil litigation matters. Michael also oversees HaystackIDs Cyber Discovery and Incident Response Services division. He leads a cross-functional team of HaystackID experts that regularly assist insurers, breach coaches, and their corporate clients when a data breach occurs.

Susana MedeirosAssociate, Norton Rose Fulbright

Susana is an associate and a member of the Information Governance, Privacy, and Cybersecurity team. She is a Chambers-ranked attorney recognized and has represented clients both preparing for and responding to cyber incidents. Leveraging her traditional eDiscovery experience, Susana assists clients with efficiently and defensibly responding to cyber incidents to quickly identify data subjects impacted and the types of personal information impacted, and advise clients about the scope of the incident and the companys obligations to notify the appropriate authorities and the people affected by breach. She also assists with providing advice around CCPA, CPRA, and GDPR compliance from an information governance and data minimization perspective.

Kelly AthertonSenior Manager of Cyber Incident Response, Norton Rose Fulbright

Kelly is the Senior Manager of Cyber Incident Response at Norton Rose Fulbright. She leads a team of eDiscovery professionals to support the cyber review component of the firms global data breach and cyber incident response services. She has prior experience practicing complex business litigation and has held director roles with legal services providers specializing in TAR, analytics, and managed review. She is CEDS certified; a Relativity Expert; a Brainspace Certified Analyst, Specialist, and Administrator; and holds certifications in Reveal AI and Review.

Anya KorolyovVice President, Cyber Incident Response and Custom Solutions, HaystackID

Anya, the Vice President of Cyber Incident Response and Custom Solutions at HaystackID, has 17 years of experience in the legal industry as a licensed attorney, including 14 years of experience in eDiscovery, focusing on data mining, complex integrated workflows, and document review. In her role, Anya works on developing and implementing the strategic direction of Cyber Incident Response. Anya is one of the industrys leading experts on Data Breach Incident Response, Notification, and Reporting, with a solid understanding of machine learning, custom object development, regular expressions manipulation, and other technical specialties.

See more here:

[Webinar] Data Mining in Incident Response: Managing Risk and Spend through An Effective Evidence-Based Approach - August 31st, 12:00 pm - 1:00 pm ET...

Read More..