- Managed Cyber Security Services
- Cyber Security Services
- Cyber Security Incident Response Services
- CONTACT US
- 1300 931 727
A few years ago, I provided an IT manager with the very first Intrusion Prevention System report they had ever encountered. This IT manager didn’t think too much of it at the time, but come 9:00 PM on Friday, he finally sat down and digested it. Shortly after we received dozens of panicked phone calls requesting urgent assistance with the tens of thousands of attempted attacks on their infrastructure.
This sounds like a horror scenario or gross negligence, but you would be incorrect. This is in fact business as usual for almost every company that has an internet connection. To most people, the wider internet is a relatively friendly place. A multitude of useful information, services, etc. We seldom consider who might be connecting to us. To the average user at home with no webcams or IoT devices, it is not much of a concern. They are not hosting services that others can connect to. However, for businesses, this is a very different story.
The fact of the matter is that there are hundreds and thousands of servers, bots, scripts, and services that are systematically scanning and attacking the wider internet. One of my favourite services that scans and catalogues information, Shodan, provides this in a searchable manner.
Consider for a moment the image stream below:
This is 20 of 1,410,084 webcams and remote desktop logins. Some are servers, office desktops, home PC’s, home surveillance, and even some small business surveillance. There are two things in common here. One, they are all internet-connected devices. Two, no “hacking” was performed here. These devices are all just sitting there to either be logged into or viewed. In some cases, there are exploits available to them.
So, this is a bit scary but as a business, it is necessary to provide services to your customers and staff. Your business needs VPNs, remote desktop, and websites, yet the problem can quickly get out of hand. No typical IT staff will remember the now insecure web server they spun up 6 years ago. Conversely, the Internet will not only remember, but make it searchable.
Below is a map that Shodan has generated using their scan data of Australian IP ranges:
A lot of this is no doubt legitimate, however, 7.3 million ports are open. So, what does this mean exactly? This is 7.3 million programs running on security cameras, servers, desktops, network equipment, IoT devices. They are all running on Australian networks that will accept connections from the wider internet. 1,591 of these are industrial control systems. Think traffic lights, power grids, sewage treatment, and industrial machinery. 443 of these devices are vulnerable to Eternal Blue, the same exploit that allowed WannaCry and Petya to remotely install ransomware on hundreds of thousands of machines just like these. Another 1,084 are vulnerable to BlueKeep, a similar attack that allows an attacker to run code on these machines from anywhere in the world.
Most importantly though, a handful of these ports are your organisation’s webservers, its remote logins, its VPN, and whatever else you are presenting.
So, what can you do as an organisation to make this a little more secure?
So, what can we do to help your organisation to make this a little more secure from a cyber attack?
The big take away here is that your infrastructure is constantly being poked and prodded, and the only difference between a service that is secure and one that is not is whether an exploit comes out next month or not.
Send us your requirements, and we’ll be in touch soon!
1300 931 727