• About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
Tech News, Magazine & Review
  • Home
  • Shop
  • Tech News
    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    YouTube Music can now recommend songs when you connect to earbuds

    YouTube Music can now recommend songs when you connect to earbuds

    Meta logo on a smartphone

    Meta shuts down social media post tracking tool on Facebook

    TikTok is reportedly on pace to rake in $12 billion this year

    TikTok is reportedly on pace to rake in $12 billion this year

    Windows 8.1 will soon join Internet Explorer in the tech meme graveyard

    Windows 8.1 will soon join Internet Explorer in the tech meme graveyard

    Official Intel Arc A730 and A770M benchmarks suggest RTX 3050 Ti, RTX 3060-like performance

    Official Intel Arc A730 and A770M benchmarks suggest RTX 3050 Ti, RTX 3060-like performance

    Netflix claims it will add 1,500 jobs by end of 2023, despite consistent layoffs

    Netflix claims it will add 1,500 jobs by end of 2023, despite consistent layoffs

    Intel

    Intel’s next-gen Serpent Canyon NUC leaked with Arc A770M GPU

  • Review
    Google’s Pixel 5 was the last of its kind

    Google’s Pixel 5 was the last of its kind

    Starlink RV review: the dawn of space internet to go

    Starlink RV review: the dawn of space internet to go

    Poco F4 GT

    Poco F4 GT

    Toyota bZ4X electric SUV review: mediocre at best

    Toyota bZ4X electric SUV review: mediocre at best

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    Edifier MP230

    Edifier MP230

    Amazon Basics Rechargeable AAA 800mAh

    Amazon Basics Rechargeable AAA 800mAh

    Samsung Odyssey Neo G8 (2022)

    Samsung Odyssey Neo G8 (2022)

  • Gear
    Apple TV Siri Remote hinted in iOS 16 beta

    Apple TV Siri Remote hinted in iOS 16 beta

    amazon echo

    Amazon shows off Alexa’s new in-development ability to mimic anyone dead or alive

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Apple

    Apple’s AR glasses are currently in the design development stage: report

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Sony's Walkman is making a pricey digital comeback

    Sony’s Walkman is making a pricey digital comeback

  • Gaming
    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase - ExtremeTech

    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase – ExtremeTech

    Cyberpunk 2077 is getting a board game

    Cyberpunk 2077 is getting a board game

    The best tech and gadget gifts for less than $25

    The best tech and gadget gifts for less than $25

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Microsoft Adds a Ton of New Gaming Features to Edge - ExtremeTech

    Microsoft Adds a Ton of New Gaming Features to Edge – ExtremeTech

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India to Attract Casual Gamers

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

  • Smart Phones
    article thumbnail

    Apple supports out-of-state medical after Roe vs. Wade overturn | AppleInsider

    Philips Hue light bulb in hand.

    The beginner’s guide to smart light bulbs

    huawei matepad paper on top of kindles

    Huawei’s Matepad Paper convinced me that e-ink and Android aren’t a good fit

    We just can't let Apple rumors die, even if they'll never be true

    We just can’t let Apple rumors die, even if they’ll never be true

    Website builder

    Buldix Pro helps design web pages with zero coding in no time. It’s also over 90% off.

    mdp 27 inch cinema led

    How to connect an Apple LED Cinema Display to a new MacBook

    article thumbnail

    New iOS 16 beta features, iWork Updates, Apple’s USB-C Chargers on the AppleInsider podcast | AppleInsider

    What is Twitch and how is it different from YouTube?

    What is Twitch and how is it different from YouTube?

  • More
    • Apps & Software
    • Computing
    • Security
No Result
View All Result
  • Home
  • Shop
  • Tech News
    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    YouTube Music can now recommend songs when you connect to earbuds

    YouTube Music can now recommend songs when you connect to earbuds

    Meta logo on a smartphone

    Meta shuts down social media post tracking tool on Facebook

    TikTok is reportedly on pace to rake in $12 billion this year

    TikTok is reportedly on pace to rake in $12 billion this year

    Windows 8.1 will soon join Internet Explorer in the tech meme graveyard

    Windows 8.1 will soon join Internet Explorer in the tech meme graveyard

    Official Intel Arc A730 and A770M benchmarks suggest RTX 3050 Ti, RTX 3060-like performance

    Official Intel Arc A730 and A770M benchmarks suggest RTX 3050 Ti, RTX 3060-like performance

    Netflix claims it will add 1,500 jobs by end of 2023, despite consistent layoffs

    Netflix claims it will add 1,500 jobs by end of 2023, despite consistent layoffs

    Intel

    Intel’s next-gen Serpent Canyon NUC leaked with Arc A770M GPU

  • Review
    Google’s Pixel 5 was the last of its kind

    Google’s Pixel 5 was the last of its kind

    Starlink RV review: the dawn of space internet to go

    Starlink RV review: the dawn of space internet to go

    Poco F4 GT

    Poco F4 GT

    Toyota bZ4X electric SUV review: mediocre at best

    Toyota bZ4X electric SUV review: mediocre at best

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    Edifier MP230

    Edifier MP230

    Amazon Basics Rechargeable AAA 800mAh

    Amazon Basics Rechargeable AAA 800mAh

    Samsung Odyssey Neo G8 (2022)

    Samsung Odyssey Neo G8 (2022)

  • Gear
    Apple TV Siri Remote hinted in iOS 16 beta

    Apple TV Siri Remote hinted in iOS 16 beta

    amazon echo

    Amazon shows off Alexa’s new in-development ability to mimic anyone dead or alive

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Apple

    Apple’s AR glasses are currently in the design development stage: report

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Sony's Walkman is making a pricey digital comeback

    Sony’s Walkman is making a pricey digital comeback

  • Gaming
    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase - ExtremeTech

    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase – ExtremeTech

    Cyberpunk 2077 is getting a board game

    Cyberpunk 2077 is getting a board game

    The best tech and gadget gifts for less than $25

    The best tech and gadget gifts for less than $25

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Microsoft Adds a Ton of New Gaming Features to Edge - ExtremeTech

    Microsoft Adds a Ton of New Gaming Features to Edge – ExtremeTech

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India to Attract Casual Gamers

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

  • Smart Phones
    article thumbnail

    Apple supports out-of-state medical after Roe vs. Wade overturn | AppleInsider

    Philips Hue light bulb in hand.

    The beginner’s guide to smart light bulbs

    huawei matepad paper on top of kindles

    Huawei’s Matepad Paper convinced me that e-ink and Android aren’t a good fit

    We just can't let Apple rumors die, even if they'll never be true

    We just can’t let Apple rumors die, even if they’ll never be true

    Website builder

    Buldix Pro helps design web pages with zero coding in no time. It’s also over 90% off.

    mdp 27 inch cinema led

    How to connect an Apple LED Cinema Display to a new MacBook

    article thumbnail

    New iOS 16 beta features, iWork Updates, Apple’s USB-C Chargers on the AppleInsider podcast | AppleInsider

    What is Twitch and how is it different from YouTube?

    What is Twitch and how is it different from YouTube?

  • More
    • Apps & Software
    • Computing
    • Security
No Result
View All Result
No Result
View All Result
Home Security

Why the voice network is a blind spot for security professionals [Q&A]

admin by admin
May 23, 2022
Why the voice network is a blind spot for security professionals [Q&A]
Share on FacebookShare on Twitter


We’re familiar with threats to data and data networks, but there’s another part of corporate communication that’s often overlooked yet represents an equally valid attack vector and equally high risks.

We spoke to Mutare CTO Roger Northrop to find out more about the risks voice networks present and why organizations need to take them seriously.

BN: With voice network/VOIP systems as a potential social engineering target, why are organizations not sufficiently protecting these systems from infiltration?

RN: Most security tools focus on the data network for web and email protections, but voice networks are easily infiltrated through vishing, smishing or spear-phishing attacks. Hackers can use social engineering tactics against employees as the weakest link including spoofed numbers and slick stories to trick distracted employees. Most organizations employ intrusion detection and prevention systems to protect their data networks, but this causes many organizations to wrongly assume that their firewalls are enough, while relying on their carriers and cloud providers to safeguard their voice networks.

This problem comes down to a lack of general awareness. Threat capabilities, probabilities of action, and contact frequencies are constantly evolving, so protecting voice networks is like a game of whack-a-mole. As soon as one vulnerability is discovered and patched, a new threat arrives. Even as companies invest millions in firewalls, antivirus protections, penetration tests, training, and spam filters, their telephone networks remain largely open.

BN: What are the major vulnerabilities/weak spots for an organization’s voice network?

RN: A recent report shows that voice phishing, or vishing attacks, were up over 500 percent in 2021. These attacks come in many forms, relying on the greatest weakness of human error to steal user credentials, data, and personal information, even identities.

Without proper filtering, firewalls, or phishing training, voice networks are open to threats like TDoS attacks, which make a telephone system unavailable by preventing incoming and/or outgoing calls to overwhelm the system, blocking legitimate calls for service. Also, when employees use their personal mobile devices in the workplace and click a malicious text link, ransomware can be transferred from their device to a networked system via corporate Wi-Fi.

Once criminals convince employees to share info over the phone, data/IP theft or a breach gives access to critical customer, employee, and stakeholder data, stolen company ideas, projects, inventions, and other intellectual property — including trade secrets, patents, and proprietary software.

BN: As companies remain fully remote or have hybrid work forces, how can businesses protect their employees from making serious security mistakes from Vishing and other phone scams?

RN: Remote worker security involves locking down networks, devices, applications, and protecting workers. Employees working from home expect that business devices and applications are as frictionless to use as their personal tech, but this is not always the case. It is common for employees to give up on enterprise supplied items and just use their own. It happens all the time, but the moment you engage in communication on a personal device off a locked down VPN using an unsanctioned app, you enter a highly vulnerable landscape that improves the threat capabilities of bad actors targeting your enterprise.

Also the various ‘collaboration’ applications used for both internal and external communications create an issue. Your company may use one sanctioned platform internally for video conferencing (like Zoom), but then making an external call or receiving an external call via another platform expands the threat surface.

Likewise, distracted or busy employees can open a window of opportunity for mistakes that often result in security lapses, such as a critical database login being left unattended, or someone clicking on a malicious text message link.

BN: How are perceptions changing in terms of viewing voice network threats as more nefarious rather than just a productivity drain?

RN: Market awareness is growing to block nuisance calls for the sake of staff productivity, but perceptions are now changing to also recognize nefarious calls and stop them from reaching the voice network. Robocalls can be an annoying distraction, but beyond reducing workforce productivity, the profits from vishing, smishing, and other social engineering attacks have spawned dangerous global criminal enterprises.

A range of threats can be hidden within the voice traffic that moves through your organization 24/7 365. Initial access brokers, hackers, bad actors, cyber-thieves, and terrorists may be actively infiltrating your voice network with no fear of being stopped. This is because the bulk of cybersecurity measures are meant to protect hardware and software infrastructure from compromise. Yet the calls going in and out of voice networks are often completely unchecked.

The majority of enterprise voice traffic involves valid transactional calls that enable a business to function. Typically this traffic totals 82 percent to 90 percent of overall calls, depending on the industry. The problem comes with the remaining 10 percent to 18 percent of calls, where the real risk lies. Perceptions are starting to change, but many organizations remain unaware about real threats to their voice networks.

BN: How can organizations reduce the attack surface for voice networks?

RN: The most effective approach involves automated technical security controls that identify nefarious and nuisance callers and disconnect the calls without ever ringing the employee phone. The reduction in contact frequency by nefarious callers will greatly reduce the odds of a serious security breach. Companies must strike a balance between providing a great user experience and a secure user environment.

Training employees is also essential. The pressure on contact center agents and other customer service reps to deliver ‘single call resolution’ and meet call quotas creates a perfect opportunity for vishing scams. This setting gives bad actors the upper hand to manipulate employees into revealing information they might not otherwise provide in the absence of distractions and time constraints. Training and coaching by the company — along with reasonable distraction controls and call quotas — can go a long way toward helping employees identify a scam in process and foil it before it turns into a breach or loss event for the company.

Lastly, companies should include vishing in their security penetration testing practices, both for automated technical security controls and for their people, to find and plug vulnerabilities before loss events happen.

BN: What’s the importance of policies in identifying and quarantining bad calls while still letting the right calls reach employees?

RN: Effective policies involve more than just using call block lists. Security practices should incorporate multiple layers of defense to create a robust security mesh that reduces the attack surface of the voice network. The most basic layer involves an analysis of call traffic patterns into the organization. Every organization has different traffic patterns, so that first layer is used to find unusual traffic. Another layer is used to match caller numbers against multiple databases that track suspicious calls from around the planet.

Another layer involves implementing a voice traffic filter to eliminate unwanted calls. Organizations can also set up their own custom rules for specific call numbers and geographies. In this way, they can decide which calls to let through and which ones to send to a block list.

Companies should train their employees when a bad call gets through so that red flags immediately go up, and to not give out any information and to just stop the call. Organizations need to allocate enough time and money to protect the voice side of the house and invest in training to help employees secure their company’s voice networks.

Image credit: Gajus-Images/depositphotos.com





Source link

admin

admin

Related Posts

Majority of Americans fear some form of cyberwarfare

Why we need to take the threat of cyberwarfare seriously [Q&A]

June 24, 2022
Tips for securing Windows with PowerShell... courtesy of the NSA

Tips for securing Windows with PowerShell… courtesy of the NSA

June 24, 2022
Weekend at Johnny's: McAfee's body remains at morgue one year after his death

Weekend at Johnny’s: McAfee’s body remains at morgue one year after his death

June 23, 2022
Push Fatigue: We're tired too

Push Fatigue: We’re tired too

June 23, 2022
Next Post
European Central Bank president calls crypto worthless and based on nothing

European Central Bank president calls crypto worthless and "based on nothing"

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Alienware x17 R2 (2022)

Alienware x17 R2 (2022)

June 2, 2022
Toshiba 65UK3163DB

Toshiba 65UK3163DB

April 18, 2022
article thumbnail

Compared: Amazon Fire 7 2022 vs iPad mini & 10.2-inch iPad | AppleInsider

May 22, 2022
How to deactivate your Twitter account

How to deactivate your Twitter account

April 14, 2022
Intel Arc A770 desktop GPU debuts in the Geekbench database

Intel Arc A770 desktop GPU debuts in the Geekbench database

0
New evidence supporting the existence of the Google Pixel Watch emerges

New evidence supporting the existence of the Google Pixel Watch emerges

0
Microsoft is developing an in-game advertising system for free-to-play games

Microsoft is developing an in-game advertising system for free-to-play games

0
WhatsApp testing ability to hide ‘Last Seen’ status from specific contacts on iOS

WhatsApp testing ability to hide ‘Last Seen’ status from specific contacts on iOS

0
Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

June 25, 2022
article thumbnail

Apple supports out-of-state medical after Roe vs. Wade overturn | AppleInsider

June 25, 2022
Philips Hue light bulb in hand.

The beginner’s guide to smart light bulbs

June 25, 2022
Google’s Pixel 5 was the last of its kind

Google’s Pixel 5 was the last of its kind

June 25, 2022

Don't Miss.

Sony plans in-game advertising system similar to the one Microsoft detailed

Invite-based ordering comes to Amazon, starting with game consoles

June 2, 2022
Samsung Galaxy S9 Sunrise Gold (3 of 9)

Samsung Galaxy S9 gets one last surprise update on its way to smartphone heaven

April 20, 2022
Juned Ghanchi

Why Fintech Industry Needs To Leverage Blockchain – 6 Uses Cases of Blockchain | DataDrivenInvestor

October 29, 2020
France bans 'streaming' and 'eSports' – well, sort of

France bans ‘streaming’ and ‘eSports’ – well, sort of

May 31, 2022

GIZMOZOD

Gizmozod is dedicated to providing you the latest news and other information about the tech world that you just need to know. It publishes news related to various tech fields like smartphones, computing, smart home, automotive, gaming, cybersecurity and so on.

Follow Us

Categories

  • Apps & Software
  • Computing
  • Gaming
  • Gear
  • Review
  • Security
  • Smart Phones
  • Tech News

Recent News

Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

June 25, 2022
article thumbnail

Apple supports out-of-state medical after Roe vs. Wade overturn | AppleInsider

June 25, 2022

Join Our Newsletter!


    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions

    gizmozod © 2022| All rights reserved.

    No Result
    View All Result
    • Home
    • Shop
    • Tech News
    • Review
    • Gear
    • Gaming
    • Smart Phones
    • More
      • Apps & Software
      • Computing
      • Security

    gizmozod © 2022| All rights reserved.