You May Already Have Been Breached and Don’t Know It!
You May Already Have Been Breached and Don’t Know It!

 

Data breaches are becoming increasingly common, and you can’t go a week without hearing about another. Statistics show that cybercriminals steal or compromise 68 records every second. If your organization isn’t already a victim of a data breach, chances are you will eventually be, especially if you don’t have proper security measures in place. 

A cyber-attack can happen to anyone. When it happens, companies find the initial attack occurred weeks before it was realized. In 2022, identifying a data breach took an average of 207 days. This fact stresses the importance of having a thorough security plan and architecting your systems to prevent and detect breaches.

 

Last year, we were with a customer on a security assessment. We became concerned that the business may already have been compromised during the sales process. The customer signed up for an evaluation but wanted to wait to start it for several weeks.  

We were concerned and discussed some of the tell-tale warning signs we uncovered within the sales process. Listed below are just a few:

  1. Reliance on Software Only solutions such as Webroot, Trend, and CrowdStrike
  2. Reliance on a single firewall at each location a no-patch methodology or monitoring in place
  3. Out of Compliance Windows Servers
  4. Reliance on VPN for Connectivity remotely
  5. Use of RDS for Remote connectivity with no security and controls
  6. No Password policy for reset or shared passwords
  7. No modern email anti-spam, anti-malware
  8. No Procedures in IT and a reliance on a department of 2 people for all Security and IT
  9. Dated IT Architecture in network and data center design

We strongly urged the customer to allow our DG365 endpoint protection to be installed before we even performed the full security assessment. The customer was very hesitant, and senior management wanted to avoid allowing us to install it because they genuinely thought the IT department was securing the business.

We felt strongly and offered a 60-day trial with a money-back guarantee if they did not want to go with any ICG Security products. 

They agreed, and thank goodness they did. 

Within hours of deploying the endpoint protection, the ICG Security Operations Center Team began to detect anomalies and threats throughout the workstations and several servers. In addition to our DG365 Endpoint Protection, we left the customer's anti-malware software on the system, which never detected anything. DG365 Endpoint protection, combined with our toolset of custom algorithms and active SOC monitoring, detected all the compromised endpoints, and we were able to thwart the attack and ensure that the customer was safe.

The story's moral is don't trust the name brand software, only vendors or vendor solutions that truly do not have your business' security interest at heart. ICG's Security Team is focused, and we deliver using the best tool, but above all, it's our service and responsiveness to our customers lead the way!

Cyber Security planning and implementation can be stressful for the business owners and IT staff. No matter the size of your business having a Cybersecurity support organization to assist plan, and implement a strategy that protects the business. If you're concerned your business is under threat, or you want to make sure you are protected before it happens, Innovative Consulting Group is here to help. 

 

Signs that could indicate a breach:

Email Account Hacking: What Method May Have Been Used:
  • Your password has changed without you changing it
  • You notice strange email inbox activity
  • You’ve received password reset emails from other sites
  • Your account was accessed from a different IP
  • Your email contacts have let you know they have received strange emails from you
  • A password hack has occurred
  • Social engineering
  • Phishing email

 

 System Account Details Compromise: What Method May Have Been Used:
  • Your computer speed has been noticeably slower
  • Your security software has been disabled or compromised
  • Software or browser add-ons appear that you don’t recognize
  • Random shutdowns and restarts occur
  • Your account access is lost
  • Your email was hacked/compromised.
  • Phishing
  • Password hack
  • Unpatched Software

 

Online Storage Account(s) Compromise: What Method May Have Been Used:

Examples: dropbox, google drive, cloud,

  • There is content on your site that shouldn’t be there
  • You cannot access your account
  • Files are missing/altered
  • There’s unusual outbound network traffic
  • You’re being notified of unexpected access locations and logins
  • Many requests for the same object/file have been received
  • Suspicious admin activity
  • Excessive read operations (someone is trying to gather data)
  • Contacts are receiving emails with files/links to open
  • System account was compromised.
  • Phishing
  • Social engineering cyber-attack.

 

Network Attack What Method May Have Been Used:
  • Your files and/or server have been encrypted
  • Your Network becomes very sluggish/slow
  • Your data usage is unusually high
  • Programs are continually crashing
  • You received a ransomware message
  • Computers are functioning without local input
  • Ransomware
  • Malware attack via phishing
  • Rogue software
  • Physical access
  • Social engineering

 

 

How to Avoid Data Breaches?

To avoid a data breach on a company level, we at ICG suggest identifying all of your organization's IT assets, creating an Incident Response Team / Plan (IRT/IRP), adding an Intrusion Detection System, and running frequent penetration tests. 

A cyber attack is a stressful event, no matter the size of your business. If you’re concerned your business is under threat, or you want to ensure you are protected before it happens, Innovative Consulting Group is here to help. Contact us today!