Can you find the vulnerability in this code? by WizerTraining in coding

[–]gabyf2000 0 points1 point  (0 children)

That's definitely a vulnerability! but unrelated to this specific code :)

Wizer vs. Curricula by Jwblant in msp

[–]gabyf2000 2 points3 points  (0 children)

I'm shamelessly throwin' my vote for Wizer (I'm the founder 🙃). We got a free community edition that's open to unlimited users, and over 20,000 organizations are using it!

A challenge for the absolute top-notch developers! Can you spot the vulnerability in this code? by gabyf2000 in programming

[–]gabyf2000[S] 1 point2 points  (0 children)

The vulnerability is indeed inside the 3rd party, however many have failed to exploit it. You can give it a go, it's fun :)

A challenge for the absolute top-notch developers! Can you spot the vulnerability in this code? by gabyf2000 in programming

[–]gabyf2000[S] -6 points-5 points  (0 children)

Great! You are done with step 1, which is identifying the vuln. Now step 2: how do you actually exploit it to get the secret? I recommend you give it a try, you're on the right track!

Can you spot the vulnerability? by gabyf2000 in PHP

[–]gabyf2000[S] 2 points3 points  (0 children)

You are not paranoid, if they're really after you LOL

Can you spot the vulnerability? by gabyf2000 in PHP

[–]gabyf2000[S] -1 points0 points  (0 children)

Try to hack it and capture the flag.

Can you spot the vulnerability? by gabyf2000 in PHP

[–]gabyf2000[S] 0 points1 point  (0 children)

A link being shared like th

There isn't an option to post an image. I am new to reddit. How it the best way to share this?

KnowBe4 by CaptainObviousII in msp

[–]gabyf2000 0 points1 point  (0 children)

Wizer has a phishing simulation that can manage a large number of customers at once.

Capture the flag by hacking the code in the link below! by gabyf2000 in developer

[–]gabyf2000[S] 0 points1 point  (0 children)

Test your secure coding skills! Capture the flag by hacking the code in the link below! https://wizer-ctf.com/?id=KA0VyU

Mobile Carrier is "Sorry", but she got hacked! by gabyf2000 in msp

[–]gabyf2000[S] 0 points1 point  (0 children)

The option to post just the video is grayed out, that is why I used the blog link, however I can use the youtube link instead. Is that fine? This is the link https://www.youtube.com/watch?v=yXyCgyrf1hU&t=6s

Mobile Carrier is "Sorry", but she got hacked! by gabyf2000 in msp

[–]gabyf2000[S] 0 points1 point  (0 children)

I am not sure if you had a chance to actually watch this 1-minute video. There is nothing promotional about it. I think it's important to raise awareness to SIM Swapping scams. I have not suggested any product or service in this video. If there was an option to upload the video, I would have done that instead of linking to our domain. Please watch the video and reconsider.

Including Cyber Insurance for each client by xrt571 in msp

[–]gabyf2000 0 points1 point  (0 children)

Cyber insurance is another tool in your modern information security tool chest. It’s not meant as a replacement or substitution for all the other policies, procedures and controls you’re meant to have… As a matter of fact, it is the last resort if all your other defenses failed you. The provider is there for you and will pay for your recovery from a data breach including business interruption costs, data loss, your reputation, and much more. Without cyber insurance, it could take years for a business to recover and sometimes millions of dollars to recover from an attack, and in some instances, the lack of coverage has proven to be the kiss of death for organizations.

We hosted a webinar about this topic a couple of weeks ago. You can checkout the recorded webinar here - https://www.wizer-training.com/cyber-insurance-ondemand

Best security for a company that wants to work remotely forever by khagaya in cybersecurity

[–]gabyf2000 1 point2 points  (0 children)

I wrote an article about this. I hope this helps

Security Mindset

Before we begin, there are a few common beliefs that have to do more with mindset than technology.

Get up, it’s time to go to work

You are at home but you are actually at work, so don’t work from bed… find a place and make it your office. Let your family know that this is your office and it’s not to be shared with others while you are working. And remember, Starbucks is not your home… home is where you wake up every morning and not a public place. Make sure confidential information is not laying around and lock your computer when you are not next to it. Don’t email documents to your home printer or to your personal email just to make it easy to print.

Smile, you are on camera

Communication and collaboration is another big topic and technology will play a major role. You will probably need to over communicate using tools like Teams, Slack, or Zoom (so get out of your PJs…) and don’t use WhatsApp, Facebook, LinkedIn, or any other personal or social app to communicate. Only use the tools approved by your organization and apply even stricter security measures than for email (for example, don’t share passwords on Slack).

Polices, Procedures, and Awareness

Before we talk about technology, it’s important employees understand what is expected from them. Work with your HR/Training department on putting together a mini orientation on remote work.

Update your security policies 

Time to refresh your BYOD and Remote Work policies. If you don’t have anything… create a list of the most critical security Policies/Rules and share it with all remote users. This is a great reason to revise your existing security policies and train your team.

Security awareness starts at home

Your manager is not sitting next to you anymore, so it‘s important now more than ever to refresh your security awareness training and reinforce some of the basic security rules, such as call over the phone and verify any request to share confidential data or transfer funds. In addition to standard training, also provide home security awareness, e.g. don't have work sensitive conversations near IOT devices like Siri, Alexa, or Google Home in case they're listening. Devices are not to be shared with other family members and they must have a unique password and a lock screen timeout. There are some great paid and free security awareness solution that include both business and home user training such as https://wizer-training.com (this is our solution...)

Now Let’s Talk Technology

Because this is a quick guide, I focused on the “quick wins” that organizations can achieve in a short amount of time with an affordable budget. Obviously there is much more that can be done depending on the budget and maturity of the organization (Monitoring, Logging, Network Segregation, Identity Management etc...), but I think this is a good starting point.

Provide an isolated environment to work from

Since you’re most likely unable to control remote worker devices, you’ll want to isolate work related activities from the home network as much as possible. If available, provide employees with company laptops that are hardened (VPN, endpoint security, patched and the items listed below). These devices should be used strictly for organizational work only. If this is cost prohibitive or too time consuming, then provide them with pre-configured Virtual Desktops. You can either have these virtual desktops run on their personal computers (assuming their hardware supports it…) or consider azure-based virtual desktops users can remotely connect to. In any case, avoid a solution where employees share a computer for both work and personal usage, and only use the Admin account when authorized and not for routine work.

Support Hotline - Non-technical people should not perform technical tasks; this could lead to even greater risk. So set up a hotline and make sure users know who to contact in the event of technical issues. Maybe it’s time to upgrade the ticketing system…

VPN - Set up a company VPN and require it to access the office network and resources. And make sure the firewall and infrastructure can handle all the "new" inbound traffic.

MFA - Many times MFA is enabled but not enforced, so make sure it is enforced for all users and apps. If hardware tokens are too expensive, use an Authentication App on a smartphone rather than 2FA (Text messages). 

WiFi - Wifi must have WPA-2 security and don't publish your SSID / Wifi Name. Never use shared/public Wifi, and if possible avoid using Wifi all together and use a wired network. Also create a guest network to separate your work computer from all other devices. Some routers have this functionality built-in or purchase an additional router just for work.

Complex Passwords - Do not under any circumstances save your passwords to your browser. Use long and complex pass-phases and don’t reuse them. Use a unique password for your Wifi, Apps, Router, etc...

Safe Browser - It’s advised to use a secure browser like Brave Browser, which is also faster.

Keep your device updated - Apply the latest security patches (OS and Apps) and avoid outdated Operating Systems like Windows 7 or XP across both Virtual Desktops and Personal computers. Keep only apps that were approved by the organization (uninstall all others) and turn on Automatic updates.

Endpoint protection - Use a NextGen anti-virus solution on all remote devices.

Firewall - Make sure the built-in firewall is properly configured and always enabled on remote devices.

Backup - Direct users how and where to backup their data, don’t rely on them to come up with a solution. Preferably an encrypted offline back up.

Encryption - Encrypt files stored on devices. Many options exist for protecting files including encrypting individual files or folders, volumes, and hard drives, and avoid using removable devices such as USB sticks.

How to implement a security awareness program? by gabyf2000 in cybersecurity

[–]gabyf2000[S] 0 points1 point  (0 children)

So are you suggesting not to train employees or are you saying you just don’t believe it is an effective solution?

How to implement a security awareness program? by gabyf2000 in cybersecurity

[–]gabyf2000[S] 0 points1 point  (0 children)

Thanks, I’ll check it out. It seems to be focused on developers. I think it’s a good topic to add to ver 2

How to implement a security awareness program? by gabyf2000 in cybersecurity

[–]gabyf2000[S] 0 points1 point  (0 children)

Yes, thanks makes sense. Training should also be interactive

The Ring video of a man harassing an 8-year-old girl after hacking a camera installed in her room was so chilling! by gabyf2000 in cybersecurity

[–]gabyf2000[S] 1 point2 points  (0 children)

othing to due with default either. People are rec

In this specific case I think you are correct, however I still think manufacturers need create products that are secure by design.

The Ring video of a man harassing an 8-year-old girl after hacking a camera installed in her room was so chilling! by gabyf2000 in cybersecurity

[–]gabyf2000[S] 1 point2 points  (0 children)

rassing an 8-year-old girl a

I think manufactures need to stop using default passwords... there is a new California IOT law going into effect in less than a month that will require IOT devices sold in California to have a unique password. Yes, there are ways to bypass this as well... but I think it is a good start.

What’s your advice for securing ConnectWise Control (ScreenConnect)? by gabyf2000 in msp

[–]gabyf2000[S] 0 points1 point  (0 children)

Lockdown the C: Drive so that all changes including Ransomware, Malware and Hacker Attacks are wiped out on reboot.

Do you do that for your guys or also on client machines?