Modern Australian
Men's Weekly

.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

  • Written by Richard Matthews, PhD Candidate, University of Adelaide

If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates.

Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices.

On the evening of Friday the 24th of October 2008 Richard C. Schaeffer Jr, the NSA’s top computer systems protection officer was in a briefing with US President George W. Bush when an aide passed him a note. The note was brief and to the point. They had been hacked.

How did it happen? The culprit was a simple USB.

Read more: Australia's car industry needs cybersecurity rules to deal with the hacking threat

USB supply chain attacks

The attack was unexpected because classified military systems are not connected to outside networks. The source was isolated to a worm loaded onto a USB key that had been carefully set up and left in large numbers to be purchased from a local internet kiosk.

This is an example of a supply chain attack, which focuses on the least secure elements in an organisation’s supply chain.

The US military immediately moved to ban USB drives in the field. Some years later, the US would use the same tactic to breach and disrupt Iran’s nuclear weapons program in an attack that has now been dubbed Stuxnet.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it The Bushehr nuclear power plant in Iran is thought to have been infected with a malicious computer worm known as Stuxnet in 2010. ABEDIN TAHERKENAREH/AAP

The lesson is clear: if you are plugging USB drives into your systems, you need to be very sure where they came from and what’s on them.

If a supplier can get a secret payload onto a USB stick, then there is no safe period in which a USB is a good choice. For example, you can currently buy a USB stick that is secretly a small computer, and it will, on insertion, open up a window on your machine and play the Death Star march.

This is just one kind of supply chain attack. What are the other kinds?

Network supply chain attacks

Computer users have an increasing tendency to store all their information on a network, concentrating their assets in one place. In this scenario, if one computer is compromised then the entire system is open to an attacker.

Consider a conference phone used in your organisation. Suppose this network-enabled phone had a built in fault that would allow attackers to listen in on any conversations in the vicinity. This was the reality in 2012 when more than 16 versions of Cisco’s popular IP phone were affected. Cisco released a patch for their phones, which could be installed by most companies’ IT security departments.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it The basic model of a network supply chain attack shows how vulnerable interconnected systems are within an organisation. Author Supplied

In 2017, a similar issue arose when a brand of hospital grade dishwasher was affected by a built-in insecure web server. In the case of a hospital, there is a great deal of private data and specialist equipment that could be compromised by such a vulnerability. While a patch was eventually released, it required a specialised service technician to upload it.

Read more: Guarding against the possible Spectre in every machine

Supply chain attacks have recently been implicated in the disastrous failure rate of the North Korean missile program. David Kennedy, in a video for The Insider, discusses how the US has previously disrupted nuclear programs using cyber. If they still possess this capability, it’s possible they would wish to keep it covert. Should this be the case, it’s conceivable one of the numerous North Korean failures could have been a test of such a cyber weapon.

Five ways companies can protect themselves

To protect yourself against all of this you need to set up basic cyber hygiene processes that can help keep your business free from infection.

  1. Purchase and install good anti-virus software and run it in protective mode, where it scans everything on your machine. Yes, even Macs get viruses

  2. monitor who is on your network, avoid using untrusted devices such as USBs and have your administrators block autorun as a system-wide policy

  3. segregate your networks. Have critical plant infrastructure? Don’t have it on the same network as your day to day, public-facing or guest access networks

  4. update regularly. Don’t worry about the latest and greatest issues, patch the known vulnerabilities in your systems – especially that one from 1980

  5. pay for your software and labour. If you’re not paying for the product, then someone is paying for you as the product.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it By separating your critical infrastructure from the internet facing and supplier available networks it is possible to provide a level of protection. However, some attacks are able to bridge this ‘air gap’. Author Provided

Cyber awareness is crucial

Finally, you can maximise cyber resilience by training everyone in your organisation to learn new skills. But it’s vital to test whether your training is working. Use actual exercises – in conjunction with security professionals – to examine your organisation, practice those skills, and work out where you need to make improvements.

Read more: Everyone falls for fake emails: lessons from cybersecurity summer school

The price of any connection to the internet is that it’s vulnerable to attack. But as we’ve shown, not even standalone systems are safe. Deliberate practice and thoughtful approaches to security can increase the protection of your business or workplace.

Authors: Richard Matthews, PhD Candidate, University of Adelaide

Read more http://theconversation.com/how-suppliers-of-everyday-devices-make-you-vulnerable-to-cyber-attack-and-what-to-do-about-it-98254

Affordable Invisalign in Bangkok Why Australians Are Choosing Thailand

More Australians are investing in Invisalign to straighten their teeth, but the treatment in Australia can cost thousands of dollars and often takes m...

Designing a Tranquil Oasis in Your Backyard

Nothing beats a warm summer evening spent in a gorgeous backyard. The backyard is the perfect space to unwind and spend some of the most magical momen...

How a Well-Designed Gym Can Improve Your Performance

Have you ever entered a gym that just feels off and couldn’t focus on your workout? Maybe it’s the layout that was weird, or the lack of natural l...

Wellness Checkups at Work: Key to Employee Happiness and Higher Output

Employee wellness programs are reshaping how companies think about productivity and satisfaction. When people feel healthy, they perform better, sta...

Experience the Elegance of Plantation Shutter Blinds: Enhance Your Décor Today

When it comes to elevating your home’s interior, few window treatments combine sophistication and practicality as effortlessly as plantation shutter...

Common Questions Women Are Afraid to Ask Their Gynaecologist (and Honest Answers)

Visiting your gynaecologist isn’t always easy. Even though reproductive and sexual health are essential parts of overall wellbeing, many women fee...

Designing Homes for Coastal Climates – How to Handle Salt, Humidity, and Strong Winds in Building Materials

Living by the ocean is a dream for many Australians, offering breathtaking views, refreshing sea breezes, and a relaxed lifestyle that’s hard to b...

This OT Week, Australia’s occupational therapists are done staying quiet

Occupational Therapy Week is typically a time to celebrate the difference occupational therapists make in people’s lives. But this year, many sa...

Melbourne EMDR Clinic Sees Growing Interest in Patients with Depression

Depression is a common mental health condition affecting around 1 in 7 Australians. It is typically diagnosed when an individual has experienced a p...

Proactive approaches to mental wellbeing

Life gets busy quickly. For many adults, each week is a constant mix of work commitments, raising kids, managing a household, settling bills, catching...

The Power of Giving Back: How Volunteering Shapes Your Mindset

To say the least, volunteering can maximally change the way you see the world. Period. When you step into someone else’s shoes, even for a few hours...

How to Level Up Your Workouts with Simple Home Equipment

Working out at home has reached the peak of its popularity. Whether you’re short on time or simply prefer the comfort of your own space, home traini...

How to Prepare Financially for Buying a Home

Buying a house is one of the biggest and most exciting money choices you'll ever make. It means you stop giving rent money to someone else and start b...

Why Choosing Local Lawyers in Brisbane Can Make All the Difference

When it comes to legal matters, your choice of representation can influence both the outcome and overall experience. Working with local lawyers in B...

Restoring Volume and Style with Human Hair Toppers for Women

Hair plays a significant role in confidence and self-expression, but thinning hair and hair loss can affect women at any stage of life. While wigs p...

Top Qualities of a Trusted Local Aircon Installer

Choosing the right air conditioning installer can make a big difference to your comfort, safety, and long-term energy costs. A properly installed syst...

Everything You Should Know About Double Chin Treatment

A double chin, medically known as submental fat, is a common concern that affects people of all ages and body types. Thanks to modern cosmetic proce...

The Modern Role of a Dentist in Oral and Overall Health

When most people think of a dentist, they imagine routine check-ups, cleanings, or cavity fillings. While these remain vital aspects of dental care...