Business Security

Third party systems in your pentest

Posted on 2020-05-21 by Matt Strahan in Business Security


What is in scope for a penetration test will be tested and what isn’t in scope for a penetration test won’t be tested. Simple enough, right? The problem comes when the hackers don’t follow the same scope that the penetration testers follow.

The choices that are usually made when scoping a penetration test are often made around simple practicalities and the various requirements that pop up for the organisation. Security considerations are important, but can be a secondary factor to it all.

Continue reading

The security supply tree

Posted on 2020-05-13 by Matt Strahan in Business Security


How many organisations have access to your customer data?

As software-as-a-service and cloud-based environments become more standard within organisations, this question becomes harder to answer. In the modern interconnected security world, though, it’s a question that needs to be answered for all organisations.

Continue reading

How likely is it that you’ll be hacked?

Posted on 2020-04-29 by Matt Strahan in Business Security


There I was again, staring at the report. In each security issue in our penetration testing and compliance work we have our risk assessment rating which is a pretty simple process based on ISO 31000. You identify the risk, figure out the likelihood and impact, and then use the risk matrix to give it a risk rating. Although a fair few companies now have their own risk matrix which we are happy to use in our reports for them, our standard risk matrix looks like this:

Volkis Risk Matrix

It should be a simple enough process, yet still I am left staring at the report thinking “how likely is it that this company will get hacked using this vulnerability?”

Continue reading

“We need to strike the balance between security and convenience” … but do we?

Posted on 2020-04-22 by Matt Strahan in Business Security


I often hear a common phrase from people both in the security industry and those who are now faced with dealing with cyber security in their business: “We need to strike a balance between security and convenience!”

It’s a phrase that makes it feel like we’ve got a line with convenience at one end and security at the other. We have a slider on that line, and security as an exercise is really about picking the exact right point for that slider to land on. “This is a critical environment, so let’s take 20% convenience and 80% security.”

Maybe security within organisations is actually a battle between two parties: “Security” against “Convenience”. Maybe one of the solutions could be that organisations have a “Convenience” department like the security departments they currently have. Should we have a “Chief Convenience Officer” that sits alongside the CISO when reporting to the board?

Is that really how it is? A never-ending battle between security and convenience? Is there really such a trade-off between security and convenience?

Continue reading

Are you opening a security hole for your remote workers?

Posted on 2020-04-02 by Matt Strahan in Business Security


On Tuesday Shodun showed that the number of RDP servers exposed to the internet has skyrocketed, going up by 30%. Just having RDP exposed to the internet is pretty much automatically considered a vulnerability in our penetration testing, as it’s a complex protocol that has a history of vulnerabilities (most recently BlueKeep), and exploitation can lead to administrator access to the system. Given that most RDP servers have to be connected to an Active Directory domain, often administrator access is all you need to completely compromise the network and all its data.

Clearly the rise in remote working has caused some windows to be opened in organisations’ environments. While remote working doesn’t have to be a security nightmare, it can still be surprisingly easy to open holes in your security in the name of remote working.

The two main reasons for this is a lack of a strategy and technical debt.

Continue reading

Why remote working isn’t the security nightmare you think it is

Posted on 2020-03-19 by Matt Strahan in Business Security


A couple of days ago we posted up tips and advice to deal with this period of remote working. It’s a scary time not just for our health but also for our security, with organisations suddenly needing to have everyone to stay away from the office and to work from home, safe from the coronavirus.

For today, I’d like to provide a bit of reassurance: this period of remote working probably won’t present new risk to your organisation. Don’t get me wrong – there’s still a lot of risk in cyber security, but having a whole bunch more people working remotely probably isn’t going to open you up to new threats.

Continue reading

Security precautions for remote work – Quick wins

Posted on 2020-03-17 by Alexei Doudkine in Business Security


The sad truth of the world is that there are people out there who will take advantage of the COVID-19 crisis. As more organisations shut down their offices and ask employees to work from home, those that are less geared towards remote work will be targeted by threat actors.

It is my goal to give organisations pushing for remote work the basic necessities for securing their remote workforce. Rather than long-term strategies, these are things you can do or start doing this week to protect your employees and keep the organisation safe at the same time.

Continue reading

Attacking the backups

Posted on 2020-03-13 by Matt Strahan in Business Security


There are a critical systems inside any organisation where the compromise of those systems are almost automatically business threatening. When performing penetration testing we try and think about the “crown jewels” as a bit of a target – if we get access to this the risk is pretty well self evident. Most of these systems are the obvious: financial systems, domain controller, key business process systems, safety systems, and often the web presence nowadays. One such system that is not considered nearly enough is the backup system.

Let’s first look at the obvious: to properly backup data, the backup systems have to have access to that data. This means the backup systems often have the keys to the kingdom, so to speak. If the backup systems are compromised, then all of your data should be considered compromised.

Believe it or not, though, in modern IT environments the backup systems are even more important than just having access to data.

Continue reading

Should you go for bug bounties or penetration testing?

Posted on 2020-03-03 by Matt Strahan in Business Security


At school I was taught that a good piece of writing should “say what you’re going to say, say it, then say what you’ve said”. In that vein, I’m going to talk about the advantages and disadvantages of bug bounties and penetration testing but it will all come down to this:

Why not both

Penetration testing and bug bounties tend to complement each other extremely well. The disadvantages of penetration testing tend to be the advantages of bug bounties and visa versa. Let’s go through it in more detail.

Continue reading

The Five Whys and security vulnerabilities

Posted on 2020-02-20 by Matt Strahan in Business Security


When reading about the Toyota Production System and the Lean Methodology, a remarkably simple technique was talked about called the “Five Whys”. It was used by Toyota to solve the underlying problems, not just the symptoms. The technique was made popular by books such as The Lean Startup.

When there is a production failure, outage, or problem, the “Five Whys” facilitator will bring all the relevant people into a room and ask “why” again and again to try and pull the thread of the full sequence of events that led to the issue. The Wikipedia page for Five Whys gives this example:

  • Why? – The battery is dead. (First why)
  • Why? – The alternator is not functioning. (Second why)
  • Why? – The alternator belt has broken. (Third why)
  • Why? – The alternator belt was well beyond its useful service life and not replaced. (Fourth why)
  • Why? – The vehicle was not maintained according to the recommended service schedule. (Fifth why, a root cause)

When reading about this technique, I began thinking about security vulnerabilities. How often do we talk about patching the vulnerability without thinking enough about what caused the vulnerability in the first place? And I’m not just saying “we didn’t do the patch”, I’m saying the underlying processes that people don’t even realise are there that made us end up here.

Continue reading