Top risky practices for your business: Cases of internet exposure that make your brand vulnerable

In today's post, we present a list of the top risky practices to watch out for to protect your brand and business during this lockdown period. These points have been observed by our team of Cyber Threat Intelligence specializing in cyber threat intelligence.
The goal? Protecting your profession by sharing our observations with you and our information to help you adopt the right reflexes by anticipating risks and reducing your attack surface.
To minimize cyber risks and vulnerabilities to your business, such as the exposure of trade secrets, confidential information, credentials, or even brand impersonation and data leaks, We recommend that you be particularly vigilant by observing the following environments as much as possible:
- Public personal directories Your employees may be required to work on professional topics on platforms such as GitHub, Trello… It is important to control the level of information shared on these platforms to avoid internal data leaks.
- Public display tools : (like Pastebin in .txt format): These are sometimes used by malicious actors to publicly release information following data leaks. This tool can also be used by collaborators to quickly share code snippets, also risking data leaks.
- Remote access : Administrators may provide remote access to different business teams, potentially leading to the unwanted exposure of sensitive servers, for example via the RDP protocol.
- Web chat/video conferencing solutions : Several security experts have proven this again in recent weeks., It is possible to join a "private" Zoom conversation simply by knowing the ID or link without needing the password.
- Social networks : During lockdown, to stay connected, many people are putting their LinkedIn, Instagram, Twitter, and other profiles at home or in a remote workspace. The little sticky note with a password or username is never far from the desk, and malicious actors will be happy to zoom in to find out what it is.
- Cloud storage (platforms like Drive/Docs/Dropbox…) : By simply obtaining a link or identifier, malicious actors can access your data. We therefore advise you to encrypt your data before sharing it or to verify that there is no possibility of unauthorized access (restrict anonymous access).
- Web-based applications for analyzing malicious files : Phishing campaigns are on the rise, and it can be tempting to upload all attachments to these types of tools. However, it's best not to upload files containing confidential information, even if you have any doubts.
- VPN Interfaces : It is possible that malicious actors could also access your VPN interfaces on the internet (if you expose them to the internet)., We therefore invite you to test the security of your VPN infrastructure beforehand to ensure that you are exposing yourself to a minimum level of risk.
- Online creation tools (presentation, visuals…) : If you need to create corporate presentations containing confidential information, use software like Microsoft Office. Using online creation tools risks exposing your internal documents.
- Link shorteners : While very convenient for everyday use, link shorteners also pose a risk to your business. Working for our clients, our teams have already collected a significant amount of data through this method. We strongly advise against using them to share confidential URLs.
Short on time? We're here for you! Our service Asset Security Monitoring aims to reduce your attack surface and thus control your online presence by monitoring the assets within your scope (known and unknown) while monitoring their evolution.
To go further, We provide daily support to companies in anticipating risks and detecting threats across multiple areas. :
- Cyber Threat Intelligence
- Threat Hunting : Searching for threats to your IT system
- Vulnerability management
- Operational security
- Cybersecurity consulting
To learn more, don't hesitate to contact us by describing your challenges to us.
[/et_pb_text][/et_pb_column] [/et_pb_row] [/et_pb_section]
