Security

What You Should Know About the LastPass Breach

As you may have recently heard, LastPass (a popular password management software used by millions and recommended by KiteTech) was the recent target of a data breach involving customer data. This news release contains more information about what happened.

Virtually all businesses these days have some digital footprint, so any of them, especially those who deal directly with sensitive personal data, could potentially be targeted for data compromise. That said, KiteTech takes very seriously the trust our customers put in us and the importance of your personal data, and we want to make sure you are fully informed about what happened and what you should do about it.

What happened?

A threat actor was able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data. These encrypted fields remain secured with 256-bit AES encryption and can only be decrypted with a unique encryption key derived from each user’s master password. The master password is never known to LastPass and is not stored or maintained by LastPass. The encryption and decryption of data is performed only on the local LastPass client.

Out of an abundance of caution, LastPass is still requiring all users to reset their master passwords.

LastPass has provided the following instructions for resetting your master password:

“To reset your master password, please visit https://lastpass.com/ and click on “I forgot my password”. You will be guided through the process of resetting your master password, which will require you to verify your account using either your email address or a recovery one-time password.”

What should you do about it?

  1. The first thing we recommend is that you immediately change your Master Password in LastPass. While the Master Passwords were not compromised, all LastPass encryption is derived from the Master Password. Changing the Master Password will “re-key” the Password Vault with new encryption.
  2. Equally important, make sure that Multi-Factor Authentication (MFA) is enabled on your LastPass account. We recommend that you enable MFA on all of your accounts anyway, but if you do not have MFA enabled on your LastPass account you are at extreme risk for your passwords being compromised.
  3. We also recommend you change the passwords of each account you have stored in LastPass. Again, it appears that passwords were not fully compromised in unencrypted form, but it is prudent to be abundantly cautious and change your passwords (after you have changed your Master Password). LastPass is advising that the likelihood of the threat actor decrypting this data is slim, but we do think it is in your best interest. We understand this can be a time-consuming task. We would recommend prioritizing any credentials that protect financial data (banks, insurance, etc). For accounts that do not protect sensitive data, you may choose to change those as you access them during the normal course of use.
  4. Lastly, be on the lookout for phishing attempts related to this compromise. With LastPass not storing the Master Password, the only source of that password is you. It is important to remember that LastPass will never call, email, text, or send you a link requesting your Master Password.

Conclusion

While data breaches are always a worrisome subject in the realm of cyber security, the steps listed above will help you remain secure. By using a strong, unique master password and utilizing multi-factor authentication, you are doing your part in staying protected.

As always, if you have any questions or further concerns, KiteTech is here to help. If you’re already a current client, feel free to reach out to your account manager for further discussion. If you’re not currently working with Kite Technology and would like to learn more about how our Managed IT and Security Services can help you operate more effectively and secure your business, please contact us to schedule a conversation. We’re here to help!

Dillon Fornaro

Dillon Fornaro

Security Engineer
Kite Technology Group

Tips for Staying Safe from Cyber Attacks

As the world around us becomes increasingly digital, it has never been more crucial to know the cyber threats that we face and how to avoid them. Threat actors are continuously looking for any vulnerabilities in our systems that they can exploit. Make sure that you are staying aware of the dangers out there and taking steps to strengthen your security posture. Here are 4 tips that you can leverage for staying safe from cyber attacks.

Tip #1: Avoid Being Tricked by MFA Fatigue

MFA fatigue is when a threat actor persistently attempts to log into an end user’s account using legitimate credentials until the user approves the MFA request on their phone or authenticator app. The constant request to approve the login is used as a tactic to annoy the end user and trick them into approving the login to stop the requests.

If you aren’t currently attempting to log into the service where the request is coming from, always choose to deny and change your password to stop the requests.

Tip #2: HTTPS Does Not Mean the Website is Safe

HTTP is an internet protocol that is used to communicate to a webserver from your browser. When you browse to a website using HTTP, all of the data requests that are used to communicate to the webserver are in plain text. HTTPS is the secured version of that protocol. This means that the network traffic from your local browser to the website is encrypted and cannot be deciphered without the appropriate key.

However, the big takeaway is just because the traffic to a website is secured by HTTPS, does not mean that the website is safe. Always confirm by double checking the URL and be sure to research the legitimacy of the website before entering any credentials.

Tip #3: Keep your Operating Systems up to Date

Whether it’s Windows, Mac, or mobile device, keeping the operating system up to date is one of the most important steps you can take to protect your data. These updates contain security patches for your device, which are used to fix the vulnerabilities in the operating system that are commonly exploited by threat actors.

It’s understandable that updating can cause some hinderance during your workday. To combat this, be sure to schedule these updates during your off hours so that it doesn’t cause any interruption and you can ensure the device is secured.

Tip #4: Implement a Call-back Procedure for Financial Transactions

Whether it’s a wire transfer or a credit card transaction, handling this type of data can be scary. You want to confirm that when you are processing these types of transactions, the money is coming and going from the correct place and person. This is why it’s important to have a call-back procedure in place to confirm the person is who they say they are, and that the communication is legitimate before moving forward.

Conclusion

These are just a few of the many steps that you can take to stay safe from cyber threats. While, the threats that endanger our security will never be eliminated, there are fortunately many strategies that you can use to mitigate them. Taking the time to stay informed on the latest security best practices will go a long way in protecting you and your business. 

If you’re not currently working with Kite Technology and would like to learn more about how our Managed IT and Security Services can help you operate more effectively and secure your business, please contact us to schedule a conversation. We’re here to help!

Dillon Fornaro

Dillon Fornaro

Security Engineer
Kite Technology Group

Cyber Liability Policy Resources

Cyber Liability Policy Requirements
are Changing.
Is Your Business Prepared?

What your business needs to know About New Cyber Insurance Requirements

Cyber crime is now one of the largest industries worldwide, costing companies a combined $100-billion or more each year. Small and midsized businesses are preferred targets because these attacks are automated, allowing criminals to easily infiltrate them with viruses and ransomware.

As a result, insurance carriers are leading the charge in security measures and have significantly increased the underwriting requirements of cyber liability coverage. Though requirements vary somewhat depending on the carrier, we know that they are all beyond what’s currently required under NAIC and various statewide regulations. New policy and existing policy renewals for cyber liability coverage will be impacted and meeting these requirements will likely include changes in process and the addition of new technology tools and management.

Examples of changes being requested by many cyber liability carriers include:

Watch the video to hear from Ryan Emerick, Client Experience Manager at Kite Technology on the latest regarding the changing cyber liability requirements. It is vital that you take the time to ensure that your organization is prepared to comply with the changing regulations. 

How Kite Technology can help

Kite Technology’s security offering utilizes a comprehensive, multi-layered approach that ensures your business is protected, in line with best practices and meeting regulatory compliance. Our Cybersecurity Services are designed to provide organizations 24×7 cybersecurity threat detection and compliance reporting. 

Our security engineers and client experience managers work closely with our clients to ensure that we are staying on top of their cyber liability carrier’s requirements and in compliance with any state or federal regulations they are subject to.

To learn more about how Kite Technology can help your business operate more securely and achieve compliance, please complete the form. A member of our team will reach out to schedule a complimentary consultation.

Contact Us

 

CompTIA Security Trustmark+Kite Technology has earned the CompTIA Security Trustmark+ certification. The CompTIA Security Trustmark+ is the highest level of recognition for IT service providers that consistently follow security best practices, demonstrate a commitment to industry recognized security standards and adhere to prescribed security compliance measures.

Earning the CompTIA Security Trustmark+ offers our clients peace of mind–knowing that we employ industry best practices and tools to keep their business systems and data safe and secure. It also confirms our commitment to quality, assuring our clients that we have what it takes to help them meet their industry and government compliance obligations.

Security Resources

Download our resources to get started evaluating your organization's cyber security practices and identify gaps.

Cybersecurity Checklist

Protecting your business from modern threats requires a layered strategy.  Are you missing critical components? Download our comprehensive checklist to learn how your organization is doing when it comes to security.

Managed Security Services Flyer

Learn more about Kite Technology’s Managed Security Services. Experience the peace-of-mind that comes with knowing Kite Technology is using industry best practices and tools to keep your business systems and data safe and secure and compliant.

Download Cyber Checklist

 

Download Security Flyer

 

Webinar Recording: Navigating the Changing Cyber Liability Landscape

The dynamic threat landscape has resulted in cyber insurance carriers to alter their underwriting standards, with many carriers increasing rates, limiting coverage, and limiting capacity for certain risks. Business technology requirements that need to be met in order to even qualify for coverage have also increased substantially.

Watch the webinar to learn more about the current cyber threat landscape and to get a stronger understanding of the technology requirements you and your clients will need to meet in order to purchase or renew your cyber liability policies going forward.

Kite Technology's Services

Growing Your Insurance Agency with Microsoft 365 Webinar Recording

You can watch the on-demand webinar below at any time
Play Video about Insurance Microsoft 365 Webinar

Kite Technology’s Managed IT and Technical Consulting Services are designed to help independent insurance agencies across the country operate at a high level. Our team of insurance technology professionals is passionate about helping agencies like yours leverage technology to meet business objectives and grow. To get the conversation started, please select one of the following divisions below and schedule a complimentary consultation. We look forward to talking with you!

Technology professionals looking at computer monitors

Managed it services
appointment

Learn how our Managed IT Services can benefit your organization. We can help you improve business performance, operate more securely and better support your remote workforce. We are eager to help you meet your technology goals.

Technical consultant meeting

technical consulting
appointment

A well-planned cloud adoption strategy is more important than ever. Our Technical Consulting team can help you develop and execute a a strategy that meets your business objectives and enables your team to work better and faster from anywhere.

business meeting with consultant

applied epic consulting appointment

Our Agency Consulting team is eager to help your team get the most from your Applied Epic investment. Schedule an appointment to learn how we can help your agency optimize your system, improve utilization and maximize your overall efficiency.

Cybersecurity Bulletin – Microsoft Vulnerability CVE-2021-40444

Microsoft has made us aware of a new threat against Windows operating systems and Office products. Known as CVE-2021-40444 this vulnerability is being actively exploited so it’s crucial that you stay informed and take the necessary measures to minimize your risk.

What's Happening

CVE-2021-40444 is a vulnerability that could allow a bad actor to take control of a system using malicious files or websites. Bad actors are sending out malicious emails and documents (Word, etc.) that leverage this vulnerability. An example of such a malicious document can be found below.

Example of Malicious Document
Example of a Malicious Document

While antivirus has been proven to respond to some of these threats, out of an abundance of caution for our clients, KiteTech is taking the extra steps of disabling the features that rely on the underlying MSHTML engine that’s being exploited. This may impact some carrier websites and advanced features in certain Word/Excel documents that you use.

How to Minimize Your Risk

We’re learning from our security partners that while Microsoft’s recommendations help a great deal, they do not completely mitigate the threat. There are still ways this exploit can be used.

Be sure to consult with your IT provider or internal IT team to ensure that you are well protected. As always, be extra skeptical of any emails, files, or web links that you weren’t expecting. If you do receive a document via email that you weren’t expecting, please don’t open it. If you have any questions, reach out to your IT Provider.

KiteTech is Here to Help

For additional information on this vulnerability, check out this article by KiteTech partner, Huntress: https://www.huntress.com/blog/cybersecurity-advisory-hackers-are-exploiting-cve-2021-40444. The Kite Technology team is also here to help. If you’d like to learn more about how our Managed IT and Security Services can help your organization operate more securely, don’t hesitate to reach out. We are here to help!

Jason Gobbel

Jason Gobbel

Chief Solutions Officer
Kite Technology Group

Why you Should Always Install Microsoft Updates

We’ve all been there. You sit down at your computer to get some work done when you receive a notification alerting you that Microsoft updates need to be installed. You think to yourself- “Didn’t we just do this 2 weeks ago?” So you hit Later and get started on your work.  

If this sounds like you, you’re not alone. We find that lots of people tend to put off or completely ignore Microsoft updates. Usually, the reasons fall into one of these categories: 

  1. Too Busy- I just turned on my device to get work done and don’t have time to do this now. I tell myself I’ll do it later when I’m not so busy. The problem is that I’m always busy!
  2. Not Needed- I don’t think I need that update; the system is working just fine. 
  3. Too Soon- I just did an update last week, so I question the necessity of installing another update so soon.

Can you relate?

The Bottom Line - Don't Ignore Microsoft Updates!

Microsoft updates should always be installed promptly. As inconvenient as they feel, Microsoft updates help shield you from hackers looking to exploit vulnerabilities they uncover in the Microsoft operating system. There is a great deal of personal and business data that can be compromised if a hacker gains access to your files. They could steal personal information like bank login credentials, personal pictures, as well as keystrokes to local and online accounts. They could also gain access to business files that include client and financial data, putting your business and clients at significant risk.

Businesses today, no matter the industry or size, are constantly being targeted by cybercriminals. Just a quick search will provide numerous statistics to scare even the most daredevil of a business owner. But don’t take my word for it. I would suggest searching “Hacking Statistics 2020” in your favorite browser just to get a snapshot of how Cyber Crime is an ever-increasing, growing threat. Many businesses falsely believe that they are not big enough or important enough to be a target. Cybercriminals are glad they think that way and are eager to take advantage of any opportunity they find.

Security reasons aside, installing your Microsoft Updates also ensures that you’ll have access to the latest and greatest features developed with your productivity in mind.

Additional Cybersecurity Considerations

Being diligent about installing your Microsoft updates is just one layer in the complete cocoon of safety we need to wrap ourselves in to protect our data. Some additional steps you can take to protect yourself and your business from cybercrime include:

1. Use MFA (Multi-Factor Authentication) wherever possible. MFA adds an extra layer of security by requiring you to verify your identity via SMS, phone call, or an app.  

2. Regularly update all applications that you use on your various devices like tablets and cell phones. These updates add valuable security features, enable your device to operate better, and give you access to new and improved functionality. Microsoft Office is an example of applications that will prompt you to update.

3. Do not open or click on unexpected emails or texts. Criminals will often hack email accounts and then use the victim’s account to send phishing emails to their acquaintances and friends. The intention is to trick the recipients to click on links or open attachments that will infect their system and compromise their data.

How a Managed IT Service Provider can Help

If your business is working with a Managed IT Service Provider or you have an internal IT department, it is likely that they can or already have automated the Microsoft update process for you. For example, here at KiteTech, we manage all Microsoft updates for our clients. To ensure this happens seamlessly, we recommend that each day users save the documents they were working on and log off or reboot their computer, leaving it powered on. We install updates overnight and reboot covered devices automatically to ensure they are secure. Users can then get right back to work the next day without delay. If you’re not working with an IT Provider, I would urge you to take the time and always install Microsoft updates promptly to protect yourself.

I hope you have found the information I shared today helpful and are convinced of the importance of installing Microsoft updates. Be sure to check out my article next month on what you need to know before purchasing business-class device warranties. If you have questions about KiteTech’s IT services and would like to learn how we can help your business operate more effectively, please contact us.

Tom Brooks

Tom Brooks is the VP of Business Development at Kite Technology Group.  KiteTech provides Managed IT Services and Consulting to professional organizations and independent insurance agencies across the country.  KiteTech is proud to be to have earned the CompTIA Security Trustmark, certifying that KiteTech meets or exceeds security best practices. 

Top 3 Security Threats Related to a Remote Workforce

With so many businesses still having a distributed workforce, it is important to prioritize computer and network security.  While there are various security threats associated with employees working remotely, today, I will be focusing on the top 3 threats that you should be aware of and address to ensure that your employees and business are secure.

Home Networks

One of the main security risks of a remote workforce is the possibility of unsecured home networks. Did you know that according to PC Magazine, in a study of 2000 US residents, 23% of people reported that they are using default credentials on their router/modem, and 11% were not even sure of what their credentials are? That is very concerning with the number of cyber threats that are out there. Most home networks are set up by a local ISP and use a modem/router to provide WiFi. These home networks are often set up by a technician whose focus is function, but not necessarily security. Therefore, your network traffic may be open for anyone to snoop on without your knowledge. The best way to protect that data is to encrypt all non-public information you and your company send over the wire. This would require the use of a VPN (virtual private network). With the proper configuration of a VPN, your data will be encrypted in transit and unreadable to those who may be listening. To make sure you have a secure home connection, you will want to make sure that:

  1. You have encryption set up with a VPN to protect corporate data.
  2. Your WiFi has a secure password associated with it.
  3. Default credentials on all network devices are changed.

These three steps go a long way to ensure you have a secure home connection better defended from hackers with malicious intent.

Personal Computer Equipment

When the rapid shift to remote work took place last year, many employees started using their home PC to access company data and perform their business functions. While it is crucial to ensure that the devices in an environment that allow data to flow through the network are locked down, the machine that holds all your data- the PC, will be a hacker’s biggest target. According to Forbes.com, in a recent study, “56% of people were unable to bring equipment from their employer to work from home” and “a third admit to personally purchasing equipment to help them work remotely during COVID-19.”  That is an extremely high number of personal devices, considering how many people are still working remotely.  Furthermore, home PCs are often shared with children or significant others, further increasing your cyber risk. It is vital to your company’s security that remote employees use company-managed PCs or laptops. It takes the management out of the users’ hands and provides a higher level of security while handling the company’s data.

Cell phones and mobile devices are another component that need security when being used for company email and accessing files. Make sure your infrastructure management includes a plan for keeping these devices protected.

Security Updates

According to bleepingcomputer.com, “based on a sample size of 163 million computers, 55% of all programs installed on personal computers running Windows are outdated.” Whether it is a firmware update for your hardware or a software update for your line-of-business application, this is something that the typical end-user often does not take the time to do. What can you do about it? Turn on automatic updates. This can go a long way in ensuring that updates are installed, and personal devices remain secure. While many of the software companies’ releases may be feature updates, you will also get vital security updates that help prevent exploitation of vulnerabilities in the system. This brings me back to having company-provided hardware.  When your company provides and manages home devices, your IT department can manage, audit and ensure that updates are promptly and correctly installed, which will go a long way in protecting your company’s data. Keep your devices up to date!

These are just a few of the security risks associated with a remote workforce. Unfortunately, there are many more threats to consider as malicious actors continuously search for opportunities to access your company’s data. It is essential to keep security top of mind and continue strengthening your security posture. There are many resources out there that can help you evaluate your current environment and provide recommendations for improving your security standards. We at Kite Technology can be that resource and can help you identify vulnerabilities and provide the tools, like cloud solutions, you need to eliminate them. Contact us today to learn more.

https://www.pcmag.com/news/survey-shows-many-home-networks-are-insecure

https://www.forbes.com/sites/chriswestfall/2020/08/25/statistics-show-remote-workers-are-frustrated-many-still-unprepared-for-working-from-home/?sh=403987c848b3

https://www.bleepingcomputer.com/news/security/outdated-software-exposes-pc-users-to-security-risks-says-report/ 

A Message from our CEO: KiteTech Achieves The CompTIA Security Trustmark+™

CompTIA Trustmark CertificationAt KiteTech, we have always taken our responsibility for the security of our clients’ data seriously. But the stakes have continued to grow. As the challenges of data protection and compliance have multiplied and the impact of security threats have escalated, we felt we needed to take our security posture to a whole new level. We wanted to be sure that the services we were providing were unquestionably delivered with excellence. So, we decided to find a third-party expert who could vouch for the quality of our security systems and processes. That led us to CompTIA’s Security Trustmark+ Certification.

The Security Trustmark+ Certification checks all the boxes. First, the certification process is firmly based on the NIST Cybersecurity Framework which is the national standard for managing and responding to cybersecurity risks. Second, it provides tons of guidance and templates for us to standardize our security documentation and processes based on best practices. Finally, it includes a review by an independent third-party cybersecurity expert.

We kicked off a project last February to obtain our certification. No sooner than we got started, we had to put the whole project on hold as the pandemic rearranged our priorities. COVID restrictions resulted in urgent requests from our clients who needed us to help get their staff up and working productively from home. Once that emergency was addressed and we settled into “a new normal”, we were able to turn our attention back to obtaining the certification. A lot of the effort consisted of confirming practices that were already in line with the NIST standards. But in other cases, we found that we needed to improve or even rewrite processes to comply with Security Trustmark+ requirements. The effort left us in even better position to advise our clients on security best practices.

Like many of our clients, we have been evolving from local infrastructure to cloud infrastructure over the last several years. One of the most profound insights we had during the certification process was that the benefits of having local systems and data in our main office were outweighed by the risks of maintaining local systems and data. A thorough risk assessment revealed that we were better off “cutting the cord” and moving ALL our systems and data to cloud environments. And so we did. We no longer are saddled with managing the risk of safeguarding local systems and data. It’s kind of like moving the bank vault out of the bank. Robbers might still find their way in, but they will be disappointed to find that the money is elsewhere. The process of moving all our technology infrastructure to the cloud positions us perfectly to help our clients do the same.

Earlier this month, all our efforts paid off. We were notified by CompTIA that we had achieved the CompTIA Security Trustmark+. We are now one of only 2 IT providers in Maryland and 30 IT providers in the country that can boast of achieving this prestigious certification.

The end result is not just the piece of paper, it’s the confidence that we have industry-leading security practices. Consequently, firms who partner with us can be confident that their security needs are being addressed by a technology expert using best in class security practices.

Greg DiDio

Greg DiDio

CEO
Kite Technology Group

adam atwell

Adam Atwell

Cloud solutions architect

Adam is passionate about consulting with organizations across the country to help them develop and execute a cloud adoption strategy that meets their business needs and future objectives. Adam oversees and manages our company strategy for Microsoft 365 adoption and is responsible for future growth and development inside Microsoft 365 and other cloud technologies.