×
[searchandfilter taxonomies="search"]

CYBERSECURITY PRIORITIES SHIFT TO INSIDER THREATS

By Chris Heller • January 7, 2015

The Sony breach – and virally every other recent high profile breach – has finally driven home what GreyHeller has been saying for some time – that the insider threat vector is as dangerous as the perimeter threat vector.

This survey of Federal IT managers in both civilian and defense sectors supports our view: Survey Cybersecurity priorities-shift insider threats

Security concerns from the survey:

  • Cyber hygiene
  • Phishing
  • Malware
  • Spam tactics

Interestingly, data breaches and cyber espionage were further down the list. Really??!! We couldn’t agree less – data breach (leakage, unintentional disclosure, spillage) – is as serious a threat vector as any.

Finding ways to mitigate and remediate after a breach have got to be on the top of any organization’s cybersecurity priority list.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Cybersecurity Tipping Point? Absolutely.

By Chris Heller • January 6, 2015

We’ve been talking about this tipping point for some time now.

Supporting our view…

  • The Cybersecurity Tipping Point – from TechCrunch
    1. Assume you are always under attack
    2. Security must be dynamic and software-defined
    3. Information sharing is critical to security

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

GreyHeller January Security Webinar Series

By Chris Heller • January 6, 2015

January 5, 2015 – San Ramon, CA – GreyHeller today announced an Insider Threat Security Webinar Series focused on helping organizations protect their ERP sensitive data from malicious and inadvertent insider threats.

The Insider Threat Series will use recent, high profile breaches at Sony and higher education institutions as examples of what could have been done to prevent insider threat attacks.

“Cyber security priorities have shifted in recent years to insider threats as the top attack vector,” said Greg Wendt, GreyHeller’s Executive Director of Security Solutions. “These types of breaches can be mitigated with rigorous ERP system Credentials Management, strict employee training and implementing two-factor authentication, logging and analytics.”

The Insider Threat Security Webinar Series is part of GreyHeller’s commitment to educate users of major ERP systems on how to fight cyber crime and prevent their organizations from becoming the next news headline.

GreyHeller will deep dive into:

  • Two-Factor Authentication
  • REN-ISEC Recommendations for HCM
  • Logging and Analysis
  • Data Masking
  • Location Based Security

Each webinar is an hour long and begins at 11:00am PST. For more information and to register, click here.

Insider Threat Security Webinar Series

About GreyHeller

GreyHeller’s software solutions help nearly 100 global organizations secure their ERP sensitive data from cyber crime. For more information about GreyHeller, please visit www.greyheller.com.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

January 2015 Security Webinar

By Chris Heller • December 31, 2014
Join us for a Series of Informative and Timely Security Webinars hosted by Larry Grey, President, and Greg Wendt, Executive Director, Security Solutions & Services.

Examine Proven Steps to Protect your Organization from Cyber Attack.
No organization is safe from cyber attack Whether the threat vector is a phishing attack or privileged user compromise, there are proven steps you can take to protect your PeopleSoft sensitive data.
This webinar series will examine recent security breaches at major commercial organizations and higher education institutions and what could have been done to protect against these attack.
Larry and Greg willdeep dive into: Two - Factor Authentication, REN-ISEC Recommendations for HCM, Logging & Analysis, Data Masking, Location - Based Security
January 7th – Secure PeopleSoft – Higher Ed
+
Universities are being targeted by cyber criminals who have learned that student, faculty and employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help your institution detect and/or prevent breaches to your PeopleSoft systems. We will examine the following Use Cases:
Admissions
Financial Aid
Custom applications: health forms and
legal documents
Faculty Access to info: Grades and Rosters

Click to Register

January 14th – Secure PeopleSoft – Human Resources
+
PeopleSoft HCM customers are being targeted by cyber criminals who have learned that employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help protect your HR sensitive data. We will examine the following Use Cases:
Employee Self-Service
SSN; Direct Deposit; Benefits;
Personal Information; etc.
Manager Self-Service
Approvals; Workflow

Click to Register

January 21st – GreyHeller and Duo: Delivering Two-Factor Authentication
+
This co-sponsored webinar will demonstrate how GreyHeller and Duo Security have partnered to bring rigorous two-factor authentication to PeopleSoft systems. This demo-intensive session will show how to implement and manage an effective 2FA system for all PeopleSoft systems, including HCM and Campus Solutions. We will discuss best practices to provisioning and managing users.

Click to Register

We look forward to you and your team joining us in any or all of our series of timely security seminars. If you have any questions contact or email Kelly Jones at (925) 415-5127 or kelly.jones@devappsian.wpengine.com.
GreyHeller

Join us for a Series of Informative and Timely Security Webinars hosted by Larry Grey, President, and Greg Wendt, Executive Director, Security Solutions & Services.

Examine Proven Steps to Protect your Organization from Cyber Attack.
No organization is safe from cyber attack Whether the threat vector is a phishing attack or privileged user compromise, there are proven steps you can take to protect your PeopleSoft sensitive data.
This webinar series will examine recent security breaches at major commercial organizations and higher education institutions and what could have been done to protect against these attack.
Larry and Greg willdeep dive into: Two - Factor Authentication, REN-ISEC Recommendations for HCM, Logging & Analysis, Data Masking, Location - Based Security
January 7th – Secure PeopleSoft – Higher Ed
+
Universities are being targeted by cyber criminals who have learned that student, faculty and employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help your institution detect and/or prevent breaches to your PeopleSoft systems. We will examine the following Use Cases:
Admissions
Financial Aid
Custom applications: health forms and
legal documents
Faculty Access to info: Grades and Rosters

Click to Register

January 14th – Secure PeopleSoft – Human Resources
+
PeopleSoft HCM customers are being targeted by cyber criminals who have learned that employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help protect your HR sensitive data. We will examine the following Use Cases:
Employee Self-Service
SSN; Direct Deposit; Benefits;
Personal Information; etc.
Manager Self-Service
Approvals; Workflow

Click to Register

January 21st – GreyHeller and Duo: Delivering Two-Factor Authentication
+
This co-sponsored webinar will demonstrate how GreyHeller and Duo Security have partnered to bring rigorous two-factor authentication to PeopleSoft systems. This demo-intensive session will show how to implement and manage an effective 2FA system for all PeopleSoft systems, including HCM and Campus Solutions. We will discuss best practices to provisioning and managing users.

Click to Register

We look forward to you and your team joining us in any or all of our series of timely security seminars. If you have any questions contact or email Kelly Jones at (925) 415-5127 or kelly.jones@devappsian.wpengine.com.
GreyHeller

-->

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Top Breaches of 2014 – Infographic

By Chris Heller • December 30, 2014
DBT TopBreaches 123014

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

The Upside to Breach Fatigue

By Chris Heller • December 22, 2014

Smart consumers – pounded by the relentless onslaught of breaches affecting them directly (my household had new credit cards issued because of the Target and Home Depot breaches) – will eventually demand transparency from their vendors on their security protocols.

If that happens, smart vendors will ‘sell” their security profile as a benefit to their customers. ‘Do business with us. We’ll keep you safe.’ 

Boeing is arguably the dominant manufacturer of civilian aircraft in the world. But this was not always the case. Coming out of WWII, Douglas Aircraft dominated. Boeing’s very clever consumer targeted marketing campaigns helped make Boeing what it is today. (One of their campaign slogans was ‘If it ain’t Boeing, I ain’t going.’) Boeing’s customers were airlines, not consumers; but by selling to consumers Boeing created a reason for airlines to buy from them – the safety and comfort of their customers.

Boeing 1960's Ad

Fast forward to now, _______ (retailer name, fill in the blank) could re-establish its consumer trust with a security focused marketing campaign that has nothing to do with the products it sells and everything to do with understanding consumers want their vendors to prove they are focused on their digital safety.

Eventually, there will be a Security version of the UL (Underwriters Labs) or Good Housekeeping Seal of Approval. Consumer Reports might grade organizations on their Security protocols.

The Upside of Breach Fatigue.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Breach fatigue

By Chris Heller • December 18, 2014

I heard a term yesterday that frightened me – Breach Fatigue (being in the Security business can make one paranoid).

As a leader in Security technology solutions for ERP, we’ve talked to thousands of organizations about their Security protocols. Many get it and are fully committed to implementing technology and best practices to protect from internal and external breach.

I said ‘many’….unfortunately, I can’t say ‘most.’

A consistent position we observe at organizations purportedly interested in adopting new technology can be characterized as – complacent. Earlier this year we met with a large higher education institution’s Associate CIO who told us – I’m paraphrasing – “we’re going to get hacked no matter what so why should we spend lots of money when it won’t stop the inevitable.”

Wow! Textbook on how to snatch defeat from the jaws of victory.

While there’s lots of press and gnashing of teeth over well-publicized breaches, we still don’t see widespread adoption of Two-Factor Authentication and/or Logging for ERP, two amazingly simple and cost effective technologies to implement and manage.

Breach fatigue will serve to distract people. The movie ‘The Interview’ was pulled from release. At what cost? Does anybody really care? 500+ million digital identities have been compromised. FBI Director Comey warned there are 2 types of companies in the US – those that have been breached and those that don’t know they’ve been breached.

Breach fatigue. Complacency. Frightening.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

OHUG Interview With GreyHeller CEO Hendrix H. Bodden

By Chris Heller • December 18, 2014
Hendrix H Bodden
Data Magnifed

The year has been full of cyber attacks that have left sensitive information ranging from bank accounts to social security numbers exposed and vulnerable.

From data breaches at eBay and Michaels to the recent and devastating attack on Sony, no business is safe from cybercrime though many fail to realize the seriousness of the situation.

And it’s a problem that will only grow in severity. The value of cybercrime is expected to exceed $1 trillion by 2020, and the current market for security technology is more than $40 billion, according to Hendrix H. Bodden, chief executive officer of GreyHeller. Graphic 01“It is more frightening than anybody actually realizes that isn’t in this business,”Bodden said in an interview. “I think that 2014 has seen so many high profile breaches, even JPMorgan Chase has been breached. They were able to index virtually every node, “virtually every terminal, every Web server on the JPMorgan network. JPMorgan’s CEO Jamie Dimon said they’re at least doubling their cyber-security budget, and I do think that companies are taking it more seriously.I think boards of directors, shareholders, and customers are starting to ask, ‘What are you doing to protect your valuable assets?”
Hr Arrow 01

There Are a Wide Variety of Cyber Criminals

The make-up of cyber criminals is diverse — representatives of foreign governments, international organized crime rings, individuals working alone, and hacking collectives are all trawling the Web for a window of opportunity. It is estimated that 97 percent of U.S. companies have been hacked or will be hacked. Oftentimes businesses aren’t even aware that they’ve been compromised. “The cybercrime environment is multi-layered, it’s incredibly active, it’s 24-7,” Bodden said. “If you believe that the bad guys are always one step ahead, in this case they really are.” Consumers can protect their information by creating secure passwords and using two-step authentication whenever available. They also should be wary of email-based phishing attacks, which can be protected against with a careful eye. Some signs that an email may be fraudulent include poor grammar and punctuation or bizarre phrasing.
Graphic 02 “What happens is I’ll click on a link and that link will actually take me to what appears to be a legitimate site and I’ll enter information,” Bodden said. “Once I’ve entered that information, the bad guy’s site will then forward me on to the legitimate site and you’ll never know that there was that intermediate step in between. A lot of this happens and people don’t even know it. The only time they find out is when somebody has bought their credit card number on the black market and all of a sudden they’re seeing purchases at electronic stores or gift cards, which are two of the most favorite ways that cyber criminals monetize stolen identities.”
Hr Arrow 01

Mobile Device Management Increasingly Being Used for Protection

Mobile device management is an up-and-coming area of cybersecurity. For example, some systems allow for remote data wipes when a mobile device is lost or permit the company to download updates. GreyHeller’s ERP Firewall protects users by implementing two-factor authentication at the field level. Data masking, logging and analysis, and location-based security also are rising trends in the industry. GreyHeller will kick off the new year with a series of cybersecurity webinars. The first will debut on Jan. 7 and focus on Oracle PeopleSoft security for higher education. These systems often host the same information banks do, making them an attractive target for cyber criminals.
Graphic 03 “Higher education is especially challenged by cyber criminals because they have by definition very open networks,” Bodden said. “They’re not behind a firewall, so higher education institutions have to have all of their web applications out and accessible in the wild and on the internet. The bad guys know this and so higher education is one of the top industries that is actually targeted by cyber criminals.”
Hr Arrow 01

January Webinar to Focus on PeopleSoft HR Systems

The Jan. 14 webinar centers on PeopleSoft human resources systems, which also typically contain sensitive information vulnerable and valuable to hackers.

“Before the human resources systems were mobilized, they could pretty well contain them behind the corporate firewall,” Bodden said. “But now that a lot of these systems have been mobilized so you can access your paycheck, you can change your benefits, you can do a lot of employee self-service and manager self-service from your mobile device, that exposes those systems to the internet and the bad guys know that so they’re going after them.”

The third and final webinar on Jan. 21 will be presented alongside Duo and discuss two-factor authentication.

Graphic 04 Graphic 05
 

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Scary UK cybercrime data

By Chris Heller • December 17, 2014

Companies, higher education institutions, healthcare organizations are not only fighting organized cybercrime rings (makes the Mafia look like a cottage industry by comparison) but also nation states with virtually unlimited funding.

Data from the UK government’s recently published cybercrime report shows the bad guys are 24×7 omnipresent:

  • HMRC (Revenue & Customs) has responded to more than 75,000 phishing reports and taken down more than 4,000 illegal websites
  • Worst breaches cost between £65,000 and £115,000 on average and for large organisations between £600,000 and £1.15m

But this is perhaps the scariest: Both of the two top areas for UK cybersecurity spending are a response to an “ongoing hacking epidemic, much of it with either the explicit backing or tacit approval of a nation state”.

Read the article in ZDNet: Cybersecurity Spending: Where the Money Goes

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Request a Demo

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands