<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hackers Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/hackers/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Sat, 01 Feb 2025 03:23:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Hackers Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/hackers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stop Insider Theft &#038; USB Drive-By with Zero Trust</title>
		<link>https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Mon, 18 Nov 2024 21:02:18 +0000</pubDate>
				<category><![CDATA[Aditi Zero Trust]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[data storage control]]></category>
		<category><![CDATA[flashdrive]]></category>
		<category><![CDATA[thumb drive]]></category>
		<category><![CDATA[USB drive]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1483</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Remember Physical Data Security</h2>
<p>Just like fortified castle defenses, most electronic data security focuses on the internet.  Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords.  All are potentially exploited by data thieves.  But what about the old school theft?  What about in person physical theft of data?</p>
<p>&nbsp;</p>
<h3>Stealth Storage in a Pocket</h3>
<p>Insider theft and passers-by can too quickly pop in a USB drive and terabytes of data quickly and unnoticed.  Storage size and data transfer speed are no longer limitations for would be thieves.  Today&#8217;s reality is that even USB flash drives aka thumb drives can be found for less than $20 for 2TB of storage! </p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>USB flash drives</li>
<li>Portable 2.5&#8243; Solid State drives</li>
<li>Portable 2.5&#8243; hard disk drives</li>
<li>USB adapters for M2 SSD sticks</li>
<li>USB A, B, C</li>
<li>USB 3.0</li>
<li>mobile phones</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;"><span style="color: #333333;"><em>Gone In 60 Seconds?</em></span></h2></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="800" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg" alt="USB drive theft - gone in 60 seconds?" title="USB drive theft - gone in 60 seconds?" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1485" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>What About Our Ever Present Phones?</h3>
<p>And perhaps most stealth of all&#8230;the our ever present mobile phones!   Who would notice a cell phone connected to a computer?   Likely just a battery recharge right?   Maybe it&#8217;s more.   An iPhone can have to 1TB of storage and many Android phones have large storage AND the ability to add microSD cards for even more.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="717" src="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg" alt="transfer data between cell phones and computers" title="transfer data between cell phones and computers" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800-480x430.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1492" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;">USB Adapter for M.2 Internal SSD</h3>
<p style="text-align: center;"><strong>As high as 4TB of space, blazing fast, and small as a stick of gum!</strong></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="600" src="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg" alt="USB M.2 SSD adapter" title="m2 SSD usb adapter" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter-480x360.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1491" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What&#8217;s the Risk?  What&#8217;s At Stake?</h2>
<p>Everything valuable to you and your business.</p>
<p>HIPAA breach of protected health information (PHI).   Company proprietary secrets.   Customer private financial information, including social security numbers and other items covered by GLBA and consumer privacy laws.   Book of business &#8211; the clientele that you&#8217;ve worked so hard to build up over the years.  Embarasing photos or insinuating documents.</p>
<p>Breach of privacy laws can mean massive financial penalties by authorities, lawsuits, and potentially even jail time. And your reputation can flip from trusted authority to careless, untrustworthy people to avoid.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Stealth and Easy Use Enables Theft</h3>
<p>USB storage devices &#8211; portable drives and mobile phones, enable in-person, local theft of data if they are allowed.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>Theft happens in one of three ways:</h4>
<ol>
<li style="list-style-type: none;">
<ol>
<li>The door is left OPEN &#8211; the invitation to take unprotected things</li>
<li>An OUTSIDER breaks in &#8211; hacking and social engineering</li>
<li>Someone INSIDE is the thief &#8211; you&#8217;re given access as a team member</li>
</ol>
</li>
</ol>
<h2>Zero Trust Solution: Block USB</h2>
<p>The heavy handed IT admin&#8217;s solution is to simply block all USB ports.   No more connecting thumb drives, phones, or portable SSDs and HDDs.   Blocking USB drive storage can close an overlooked door that few choose to secure.  This follows the assumption that files copied or saved to extneral USB connected drives are suspect and not to be trusted.  This closes a real and serious security hole.  But it also can create a roadblock to work flow by denying USB connected devices that you WANT.  So, really a more nuanced and complex strategy is what most people want.  And it is what keeps IT admins from implementing it: complexity.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-300x102.png" width="300" height="102" alt="Aditi Zero Trust Protection" class="wp-image-1475 alignleft size-medium" />Let Aditi Zero Trust Do the Work</h2>
<p>A much more practical path forward to secure your data, while allowing dyanmic workplaces and convenience is with Aditi Zero Trust.   Data storage controls can regulate storage options by specific computer, workgroup, user, or even software program.  Our set of tools allows us to deal with all of the complexity of enabling software functionality and workflow that you need while locking down and blocking everything else.   Aditi Zero Trust is supported 24/7 and we are able to react to any new requests for software changes within a few minutes. So, you get the best overall security while keeping business flowing smoothly. </p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/">Contact Us Now to Learn More</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</title>
		<link>https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 20:37:06 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Month]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Starwood]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1407</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/">3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Big Company, Big Breaches, Big Settlement</h2>
<p>&nbsp;</p>
<p><strong>If you&#8217;ve ever stayed at hotel, you&#8217;ve probably stayed with Marriott.  </strong>Marriott International is the world&#8217;s largest hotel company.  Nearly 8900 properties in 141 countries and territories. Wow! That&#8217;s a lot.</p>
<p>They have another distinction:  Marriott and now subsidiary company Starwood Hotels &amp; Resorts Worldwide, LLC suffered three major cyber security breaches in the last decade affecting over 344 million guest and loyalty records.  What was it? Everything from passport numbers and personal info to payment card info and hotel stay history.</p>
<p>Now Marriott International has approved a $52 million settlement with 50 states and D.C.  The group action of 50 state attorneys general over three breaches that have plagued Marriott is just one of the penalties against the hotel giant.  It paves the way for more actions in other countries and is only the latest and largest to date for the company.</p>
<p>The Federal Trade Commission worked in parallel with the 50 states investigation and has imposed other terms.  The <strong>FTC requires Marriot</strong>t International and subsidiary Starwood Hotels &amp; Resorts Worldwide LLC<strong> to put in place &#8220;a robust information security program.</strong>&#8221; Marriott will improve data security practices &#8220;using a dynamic risk-based approach&#8221; with customer data protections, and pay $52 million to States.</p>
<p>&nbsp;</p>
<h2 style="text-align: center;">Allegations by Attorneys General</h2>
<p>&nbsp;</p>
<h4><em>Marriott violated state consumer protection laws, personal information protection laws, and breach notification laws by failing to implement reasonable data security and fix data security holes.  Particularly with integrating Starwood into Marriott systems.</em></h4>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">What Happened in Marriott Data Breaches</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 1</strong><br />Starwood Payment Card Data</h3>
<p>In June 2014 Starwood Hotels &amp; Resorts incurred a<strong> data breach of payment information of over 40,000 Starwood guests</strong>. Hackers went unnoticed for more than a year.  Starwood only told customers in November 2015, four days after the Starwood acquisition announcement.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Hackers used <strong>compromised credentials</strong> and <strong>unprotected administrative accounts</strong> to <strong>install malware</strong> and access customer information.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 2</strong><br />Starwood Guest Records</h3>
<p>From July 2014 to September 2018 <strong>hackers stole 339 million Starwood guest account records, including 5.25 million unencrypted passport numbers.</strong> This second hit on Starwood went undetected for more than four years!</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Hackers <strong>installed malware</strong> with keyloggers, remote access, and memory scrapers <strong>in more than 480 systems across 58 locations</strong> to steal 339 million personal records.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 3</strong><br />Marriott Guest Records</h3>
<p style="text-align: left;"><strong>Hackers accessed 5.2 million guest records worldwide, </strong>including data from 1.8 million Americans. Names, mailing addresses, email addresses, phone numbers, birth day and month, and loyalty account information were breached.  Network access went undetected from September 2018 until February 2020.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Attackers used <strong>compromised employee credentials</strong> to breach its network several times</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					
					<div class="et_pb_blurb_container">
						<h2 class="et_pb_module_header"><span>States Hold Marriott Accountable</span></h2>
						<div class="et_pb_blurb_description"><p><span></span></p>
<p style="text-align: left;"><span><strong>“Companies have an obligation to take reasonable measures to protect consumer data security.</strong> Marriott clearly failed to do that, resulting in the breach of the Starwood computer network and the exposure of personal information for millions of its guests. This 50-state settlement, co-led by Connecticut forces a strong system of risk-based protections to guard against ever-evolving threats to cybersecurity. We will continue to work closely with our multistate partners across the country to ensure companies are taking all reasonable precautions to protect our personal information” <br /> </span><span><em><strong><br /></strong></em></span><span><em>&#8211; Connecticut Attorney General William Tong</em><br /></span></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Settlement Requirements for Marriott</h2>
<p>&nbsp;</p>
<p>The following are requirements of the <a href="https://portal.ct.gov/ag/press-releases/2024-press-releases/multistate-settlement-with-marriott-for-data-breach-of-starwood-guest-reservation-database" target="_blank" rel="noopener" title="Marriott $52 million settlement">settlement with the States &amp; DC</a></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Pay $52 million to the U.S. states &amp; D.C. </strong>
<p><strong></strong></p>
</li>
<li><strong>Allow U.S. customers to request deletion of personal info</strong> tied to their email address or loyalty rewards account number. And they must review loyalty rewards accounts upon customer request and restore stolen loyalty points.</li>
<li><strong>Implementation of a comprehensive Information Security Program.</strong> This includes new overarching security program mandates, such as incorporating zero-trust principles, regular security reporting to the highest levels within the company, including the Chief Executive Officer, and enhanced employee training on data handling and security.</li>
<li><strong style="font-size: 14px;">Data minimization and disposal requirements</strong><span style="font-size: 14px;">, which will lead to less consumer data being collected and retained.</span></li>
<li><strong style="font-size: 14px;">Specific security requirements with respect to consumer data</strong><span style="font-size: 14px;">, including component hardening, conducting an asset inventory, encryption, segmentation to limit an intruder’s ability to move across a system, patch management to ensure that critical security patches are applied in a timely manner, intrusion detection, user access controls, and logging and monitoring to keep track of movement of files and users within the network.</span></li>
<li><strong style="font-size: 14px;">Increased vendor and franchisee oversight</strong><span style="font-size: 14px;">, with a special emphasis on risk assessments for “Critical IT Vendors,” and clearly outlined contracts with cloud providers.</span></li>
<li>In the future, if Marriott acquires another entity, it <strong style="font-size: 14px;">must timely further assess the acquired entity’s information security program</strong><span style="font-size: 14px;"> and develop plans to address identified gaps or deficiencies in security as part of the integration into Marriott’s network.</span></li>
<li>An independent <strong style="font-size: 14px;">third-party assessment of Marriott’s information security program</strong><span style="font-size: 14px;"> every two years for a period of 20 years for additional security oversight.</span></li>
<li><span style="font-size: 14px;"><strong>Offer multi-factor authentication</strong> to consumers for their loyalty rewards accounts, such as Marriott Bonvoy</span></li>
<li><strong><span style="font-size: 14px;">Review rewards accounts if there is suspicious activity.</span></strong></li>
</ul>
</li>
</ul>
<p>Additional FTC REquirements:<strong><span style="font-size: 14px;"></span></strong></p>
<p>Marriott must <strong>investigate suspicious activity within 24 hours</strong> and <strong>provide assessments</strong> and reports for future data breaches <strong>within 120 days</strong>.</p>
<p style="padding-left: 40px;"></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">What You Can Learn from Marriott</h2></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3>LOCK DOWN SYSTEMS</h3>
<p><strong>Zero Trust, Deny by Default</strong></p>
<p>This is an Aditi Group favored strategy and special leading-edge functionality that we offer our clients.  Unlike anti-malware or anti-virus programs which look for what is already running, downloaded or installed, we lock down and set computers to <strong>deny by default</strong>.  So, malware often can&#8217;t download, and can&#8217;t install or run. </p>
<p>We limit software programs that can install, run, or even be uninstalled to what we allow.  And within those programs, only expected actions are allowed.   What computer and data resources programs can use are by allow-list only. In essence, it&#8217;s the IT managers dream &#8211; lock everything down to just what is needed to do the job.  We also employ ways to limit escalation of rights from user accounts so they can&#8217;t go from being an every day user to having Administrator rights.</p>
<p><em><strong>With this approach, malware, keyloggers, memory scrapers, and remote access programs would never have been allowed to install.</strong></em></p>
<p>&nbsp;</p>
<h3></h3>
<h3>KNOW THE RISKS</h3>
<p><strong>Regular Risk Assessments</strong></p>
<p>Marriott strayed from its forward looking nature and focus on people and excellence.   While Marriott wasn&#8217;t responsible for the actions or inactions of Starwood prior to take-over, it is now ultimately responsible and should have done a deep dive into the <strong>IT Security Step 1:  RISK ASSESSMENT.</strong></p>
<p>Aditi Group, like our peers who support data privacy laws such as HIPAA and consumer protection laws know that good security begins with identifying the risks.  And that should be followed by making plans to patch holes and reduce risks.   The most comment and first item noted from all HIPAA violation settlements is <strong>Lack of Proper Risk Assessment.</strong></p>
<p>This is also an age old precept of warfare.  We must know our strengths and weaknesses and anticipate how the other side may try to exploit weak defenses and human behavior.</p>
<p><em><strong>Risk Assessments and taking action to fix gaps helps avoid breaches and penalties if problems do happen.</strong></em></p>
<p>&nbsp;</p>
<h3>DO THE BASICS</h3>
<p><strong>Encryption, Multi-factor Authentication</strong></p>
<p>A second take-away is to ensure that the basic tools and techniques are used.  Stolen data includes unencrypted passport numbers and personal contact data.  Encryption is a basic data security method that should be activated for data that can be used in personal credit fraud.  Numerous state and federal and international data privacy laws require encryption of sensitive data or de-identification of it.  This is nothing new.  It should be the norm.</p>
<p><em><strong>MFA prevents most account compromising.  Encrypted data is useless to hackers. </strong></em></p>
<p>&nbsp;</p>
<h3></h3>
<h3>KEEP ONGOING AWARENESS</h3>
<p><strong>Monitor Data Going Out, Monitor Account Logins, Malware Scans</strong></p>
<p>Each of the data breaches with Starwood and Marriott went more than a year before they were detected.  The latest happened over four years.  That&#8217;s a lifetime in the electronic data world.   This fact is a driver of the ever increasing focus of anti-virus and cyber security programs to do what is called pattern recognition or behavioral analysis.  They look for the anomolys.   Just like when your credit card company puts a lock on your card if you suddenly use it at 3am to buy $100 in gasoline 3 times in 30 minutes&#8230;&#8221;that didn&#8217;t look like you.&#8221;</p>
<p><em><strong>Monitors should have revealed issues within short time</strong></em></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Marriott History</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Marriott Brands</h3>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li>The Ritz-Carlton®</li>
<li>St. Regis®</li>
<li>JW Marriott®</li>
<li>Ritz-Carlton Reserve®</li>
<li>The Luxury Collection®</li>
<li>W Hotels®</li>
<li>EDITION®</li>
<li>Marriott Hotels®</li>
<li>Sheraton®</li>
<li>Marriott Vacation Club®</li>
<li>Delta Hotels®</li>
<li>Westin®</li>
<li>Le Méridien®</li>
<li>Renaissance Hotels®</li>
<li>Gaylord Hotels®</li>
<li>Courtyard Hotels®</li>
<li>Four Points®</li>
<li>SpringHill Suites®</li>
<li>Fairfield Inn &amp; Suites®</li>
<li>AC Hotels®</li>
<li>Aloft Hotels®</li>
<li>Moxy Hotels®</li>
<li>Protea Hotels®</li>
<li>City Express®</li>
<li>Four Points Flex by Sheraton</li>
<li>Residence Inn®</li>
<li>TownePlace Suites®</li>
<li>Element®</li>
<li>Homes &amp; Villas by Marriott Bonvoy®</li>
<li>Apartments by Marriott Bonvoy®</li>
<li>Marriott Executive Apartments®</li>
<li>Autograph Collection Hotels®</li>
<li>Design Hotels®</li>
<li>Tribute Portfolio®</li>
<li>MGM Collection with Marriott Bonvoy</li>
</ul>
</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_3 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1200" height="609" src="https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands.png" alt="Marriott Bonvoy paying $52 million settlement for cyber breaches" title="marriott-bonvoy brands" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands.png 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands-980x497.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands-480x244.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-1411" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Marriott International is the world&#8217;s largest hotel chain.   With over 30 brands, you&#8217;re familiar with them.  This dizzyingly large list covers the range of resort, boutique, luxury, business traveler, extended stay and budget economy stays.  You&#8217;ve probably stayed in many of their nearly 8900 properties in 141 countries and territories.</p>
<p>&nbsp;</p>
<h3>From Root Beer to Global Empire</h3>
<p>J.W. and Alice Marriott founded this massive global leader from humble beginnings in 1927, serving A &amp; W Root Beer in D.C. stand that grew to Hot Shoppe diners.  This grew into food service for the airline industry.  Momentum grew into cafeteria management services. </p>
<p>Thirty years after serving their first root beer, the company drifted into hotels with Twin Bridges Motor lodge. Led by Bill Marriott, Jr., this foray into hoteling grew and grew over the next 50 years into an international hotel giant.   <strong>In 2016, Marriott International acquired Starwood Hotels &amp; Resorts Worldwide creating the world’s largest hotel company</strong>.</p>
<p>The long trajectory of expansion was guided and maintained by corporate values of realizing opportunities and changing with the times.  This latest cybersecurity breach settlement for Marriott is a story of missing the mark with company values. </p>
<p>Marriott didn&#8217;t do everything they should have to protect customers like you and me after the 2016 take-over of Starwood.</p>
<p>&nbsp;</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Starwood and Marriott Fell Short of Core Values</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_20  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>J.W. and Alice Marriott built the empire on strong business and ethical core values. Have they held true on in the customer data privacy realm?   These are values Marriott highlights today:</p>
<h4 style="padding-left: 40px; text-align: center;">Put People First,  Act with Integrity,  Pursue Excellence</h4>
<h4 style="padding-left: 40px; text-align: center;">Embrace Change,  Serve Our World</h4>
<p style="padding-left: 40px;"></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<h3 style="padding-left: 40px;">Act with Integrity</h3>
<p style="padding-left: 40px;"><strong>&#8220;How we do business is as important as the business we do.  </strong>We hold ourselves to uncompromising ethical and legal standards. This extends to our day-to-day business conduct, our employee policies, our supply chain policies, our environmental programs and practices, and our commitment to human rights and social responsibility.&#8221;<strong></strong></p>
<p style="padding-left: 40px;"></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_21  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="667" src="https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000.jpg" alt="John Willard &quot;J.W.&quot; Marriott hotel founder" title="john-willard-marriott-hotel-founder-1000" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000-980x654.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-1422" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_22  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Lessons for Everyone</h2>
<p>While Marriott and Starwood can&#8217;t turn the clock back and prevent the breaches of personal data that have already happened, they can now make security a &#8220;Job One&#8221; kind of priority.  And we hope that other companies learn from Marriott&#8217;s experiences and the judgements of attorneys general and the FTC.   Apply the lessons for your organiztion and keep private data private and secure.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Need Help?</h2>
<p><em>Aditi Group, Inc provides Zero Trust security tools including deny-by-default, data encryption, multi-factor authentication, password management, account and network monitoring, and risk assessments.   Call or message us to learn more today.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/">3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How QuickBooks &#038; Lacerte can weaken security and help hackers</title>
		<link>https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 23:19:06 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[accounting]]></category>
		<category><![CDATA[Administrator]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Lacerte]]></category>
		<category><![CDATA[lock down]]></category>
		<category><![CDATA[permissions control]]></category>
		<category><![CDATA[QuickBooks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tax software]]></category>
		<category><![CDATA[Windows user privileges]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1358</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/">How QuickBooks &amp; Lacerte can weaken security and help hackers</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_23  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3></h3>
<h2>What to do when your software needs Windows Admin rights: safely using QuickBooks &amp; Lacerte</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_24  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="816" height="625" src="https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account.jpg" alt="Windows Administrator accounts and permissions" title="Administrator accounts and permissions" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account.jpg 816w, https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account-480x368.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 816px, 100vw" class="wp-image-1393" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_5 et_pb_column_25  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_28  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Overview</h3>
<p>Lacerte and QuickBooks require Administrative Windows user level permission to keep software updated.  This is different than the various QuickBooks user level accounts within QuickBooks.  <strong>Why does this matter? </strong> As we explain in other Aditi Group articles, <em><strong>a</strong><strong> key goal of hackers is to get admin rights</strong></em>.</p>
<p>Once a user has Windows admin permissions, he or she can open more doors, access more data and functions, run exploits, change user credentials, and ultimately, get to the goods &#8211; sensitive financial info.</p>
<p><strong>Aditi Group uses unique software that allows <em>programs</em> </strong><strong>to have Admin rights, without requiring <em>users</em> to be Admins</strong>.  So programs function correctly, while allowing Windows users work without Admin level rights &#8211; in a much more secure mode.  Work gets done while blocking potential hackers from greater access.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_26  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_29  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<p><strong>QuickBooks</strong> is synonymous with personal and business accounting.  Nearly every bank and online investment account allows you to export transaction history and account data in QuickBooks file format.  Even better, you can connect financial institutions directly to your QuickBooks software to sync data automatically.  It&#8217;s the most widely used accounting and bookkeeping software for small businesses.</p>
<p>Another in the Intuit portfolio is tax preparation software <strong>Lacerte</strong>.  Acquired by Intuit in 1998 for $400 million, it&#8217;s not one of the more known Intuit names, but there is a large base of CPA&#8217;s and tax preparers.  Both progams are part of the ever growing portfolio of <strong>Intuit</strong>, current owner TurboTax, Credit Karma and Mailchimp.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_27  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_6">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="581" src="https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit.png" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit.png 800w, https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1367" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_20">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_28  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_30  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Administrator Rights</h2>
<p>QuickBooks and Lacerte require Windows Admin user account credentials to run updates, which, during tax season, can be frequent.  Aditi Group has seen updates daily, and even more than once a day at times.  And tax prep offices may be running a slew of different tax years simultaneously, each one requiring different Lacerte program version.</p>
<p>These means QB and Lacerte users need to be made Windows Admin level to keep the office running with their core software.   <strong>The violates a basic principle of security: <em>only use the level of access you need right now.</em></strong></p>
<p>Don&#8217;t work in Admin mode all the time.  Use non-admin accounts for daily work.  Use Admin accounts to make changes, review issues, and access resources for special action.   See what Google recommends to administrators:</p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_1  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1200" height="1048" src="https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins.png" alt="Google Workspace Admin security recommendtions" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins.png 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins-980x856.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins-480x419.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1377" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>What Does Google Say to Admins?</span></h4>
						<div class="et_pb_blurb_description"><p><em><strong>Don&#8217;t stay logged into Admin or use Admin accounts for everyday work.  </strong></em>Google, like most sources, cautions against remaining logged in as an admin, or in the context of Google Workspace (aka Apps), as Super Admin.</p>
<p>&nbsp;</p></div>
					</div>
				</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_31  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Prime Hacker Targets</h2>
<p>Financial professionals who deal in analyzing, tracking, managing, and reporting on money are prime target for hackers.  Especially Tax Accountants and Tax Preparers.  Your valuable info, including your social security number, is the golden key that credit thieves are looking for.  Not only can fraudsters potentially create new credit accounts in your name, but they can also potentially file for tax refunds in your name, and to be collected by them.  In fact, tax return fraud is such a huge problem in recent years that the <a href="https://www.taxpayeradvocate.irs.gov/news/nta-blog/nta-blog-wheres-my-refund-has-your-tax-return-been-flagged-for-possible-identity-theft/2023/08/">IRS flags millions of returns as potentially fraudulent and requires tax user verification</a>.  An untold number of fraudulent returns make it through the system.</p>
<p>As we write this, October 15th is fast approaching and smack in the middle of national Cybersecurity Awareness month.  It&#8217;s fitting.  Hackers know that it&#8217;s &#8220;silly season&#8221; as some tax preparers call it.   They know that heavily loaded staff working long, late hours can more easily click on a phishing email link instead of a legit message from a client and accidentally let in a potential hacker.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_21">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_29  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_32  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Feeling the Pressure</h2>
<p>&nbsp;</p>
<h3>Tax Seasons Around the Year</h3>
<p>As the tax filing dates grow closer for individuals in April and October and for business with their tax filing deadlines, the pressure cooker in many tax prep offices heats up and up.  Clients (hey, that&#8217;s people like you and me) tend to wait until the deadline and then some, to get data, and I mean all the records to the tax prep offices.  And then we demand that OUR filings are submitted on time.   And hey, where&#8217;s my refund? </p>
<p>&nbsp;</p>
<h3>Monthly Close &amp; Reporting Deadlines</h3>
<p>When CPA&#8217;s and bookkeepers aren&#8217;t hustling with tax prep or filing steps, they&#8217;re keenly aware of the regular reporting that many business leaders require to pace company progress and manage the tactical and strategic plans through the year.  Like tax filing dates, these end of month, quarter and yearly points mean more work and more pressure clients to get data processed and reports done.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_30  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_7">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="401" src="https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800.jpg" alt="tax deadline April and October 15 for personal income tax" title="tax deadline April and October 15 for personal income tax" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800-480x321.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-1378" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_22">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_31  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_8">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="425" height="282" src="https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy.jpg" alt="computer security lock down privacy protection" title="computer security lock down privacy protection" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy.jpg 425w, https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy-300x199.jpg 300w" sizes="(max-width: 425px) 100vw, 425px" class="wp-image-1390" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_5 et_pb_column_32  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_33  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>&lt;&lt;   IT Managers&#8217; Dream</h2>
<p>The fantasy for many a CISO or IT manager is to fully lock down every computer.  No one gets admin rights but them.  No one else can make changes, install risky software, use weak passwords, move data with insecure ways, or otherwise erode the secure defenses our IT leaders put in place.</p>
<h2 style="text-align: right;">&gt;&gt;  IT Reality</h2>
<p style="text-align: left;">Keeping offices in forward motion and appeasing staff traditionally means <em><strong>trade-offs</strong></em>.  We vote for quick and easy over secure and thorough and secure.  The real picture is too often weak or compromised security to allow programs and people to get the job done.  Thieves pray on the security trade-offs and compromises we make for convenience.  Something to exploit!</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_23">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_33  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_34  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Elevation Control Solution</h2>
<p>Aditi Group employs a software system that allows us to exercise granularly assigned rights and privileges to both programs and people.  Those rights can be set with a variety of factors which gives IT managed service providers like us at Aditi Group, the ability to approve Lacerte and QuickBooks for Windows administrative permission, while keeping users are non-admins.  So, users, including hackers, can&#8217;t directly get to the admin privileges.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_34  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_9 et-waypoint">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="999" height="338" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000.png" alt="Aditi Zero Trust Protection
" title="Aditi-Zero-Trust-Platform-inline-blue-1000" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000.png 999w, https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-980x332.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-480x162.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 999px, 100vw" class="wp-image-1475" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_24">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_35  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_10">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="533" src="https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592.jpg" alt="have your cybersecurity cake and eat it too!" title="have your cybersecurity cake and eat it too" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1381" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_36  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_35  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Enjoy the Security &amp; Productivity Rewards</h2>
<p>We can have our cake AND eat it too.  We can now effectively and securely enable powerful software tools while reducing cybersecurity risks.  This is the not the end-all, be-all for security, but it significantly reduces risk of hacking of valuable financial data.  And that can be the difference between having a thriving accounting, bookkeeping, or tax preparation business and lawsuits and penalties for allowing hackers to get to client data.</p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_1_wrapper  et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover-off">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/" data-icon="">Contact Us to Secure Your Office</a>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_25">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_37  et_pb_css_mix_blend_mode_passthrough et_pb_column_empty">
				
				
				
				
				
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_38  et_pb_css_mix_blend_mode_passthrough et-last-child et_pb_column_empty">
				
				
				
				
				
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/">How QuickBooks &amp; Lacerte can weaken security and help hackers</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the Score? National Vulnerability Database</title>
		<link>https://aditigroup.com/whats-the-score-national-vulnerability-database/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 20:27:26 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[rating]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[severity]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1137</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_26">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_39  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_36  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Weakness Scoring System</h2>
<p>Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a <strong>National Vulnerability Databaase</strong> designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or vulnerabilities in software and hardware systems.  </p>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_11">
				
				
				
				
				<a href="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" class="et_pb_lightbox_image" title="NATIONAL VULNERABILITY DATABASE"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="2400" height="1350" src="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" alt="NATIONAL VULNERABILITY DATABASE" title="NIST-national-vulnerability-database page-2400" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png 2400w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-1280x720.png 1280w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-980x551.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-480x270.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2400px, 100vw" class="wp-image-1139" /></span></a>
			</div><div class="et_pb_module et_pb_text et_pb_text_37  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>NIST has been working with private industry and other public sector organizations to rate and maintain a catalog of IT threats.   Originally started in 1999 under another name, and as an effort between NIST, SANS institute, and othrs, under the name ICAT or Internet Category Attack Toolkit.  It evolved and even faced death by lack of budgets until rebranded as NVD in 2005 and supported more fully.  </p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_2  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1199" height="873" src="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png" alt="example NVD score 7.8" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png 1199w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-980x714.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1199px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1145" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Example: 7.8 Severity Linux Vulnerability</span></h4>
						<div class="et_pb_blurb_description"><p>This page is an excellent example of the use, and also of how technical it is.  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">https://nvd.nist.gov/vuln/detail/CVE-2021-46936</a></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Security Risks and Importance of Cybersecurity</title>
		<link>https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 15:35:11 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data hack]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[LAUSD]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=933</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_27">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_40  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_12">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg" alt="Aditi Group cybersecurity interview podcast " title="Podcast-S4E6-Cybersecurity-part-1" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-980x980.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-937" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_38  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable.  In this show we discuss hot security topics and security breaches in 2022 and 2021.  Find out what&#8217;s been happening and what you can avoid being a statistic!</p>
<p>Listen and follow the podcast series Benefits Executive Roundtable: </p>
<p><a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?">https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?</a></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E6---Data-Security-Risks-and-Importance-of-Cybersecurity--Part-1-e1p2a1k" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</title>
		<link>https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 20 May 2022 21:28:53 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[Advanced Benefit Consulting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[published articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=887</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_28">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_41  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_39  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Aditi co-founders Ted Mayeshiba and Ted Flittner</strong> are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting.  We invite you to learn more about current computer and  phone electronic data security threats and how to avoid some of them.</p>
<h3>Highlight Topics Include</h3>
<ul>
<li>Are banking apps safe?</li>
<li>Microsoft Breach by Lapsus$ Hacker Group, March 2022</li>
<li>The risks of using QR codes</li>
<li>Crypto currency</li>
<li>The need for risk assessments – an ongoing security tool</li>
</ul>
<h3>Read the article at Advanced Benefit Consulting</h3>
<p><a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</a></p>
<p><a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener"></a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_42  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_40  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank" rel="noopener">California Broker magazine, June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_13">
				
				
				
				
				<a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="781" src="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg" alt="Cal Broker magazine quotes Aditi Group on cybersecurity" title="caifornia-broker-june-2022-cyber-security-2" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2-480x625.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-904" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_43  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_41  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener">STATEment May / June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_14">
				
				
				
				
				<a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="400" height="517" src="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg 400w, https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400-232x300.jpg 232w" sizes="(max-width: 400px) 100vw, 400px" class="wp-image-891" /></span></a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</title>
		<link>https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Sat, 13 Mar 2021 19:43:50 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Coors]]></category>
		<category><![CDATA[Cyber Gurus]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[email hack]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Microsoft Exchange]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[verification]]></category>
		<category><![CDATA[wifi security]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=629</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/">S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_29">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_44  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_15">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="591" src="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft.jpg" alt="Cyber Gurus podcast Not So Happy Hour at Coors and Microsoft" title="cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft-480x473.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-650" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_42  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In this episode cyber security experts from Aditi Group tell us about why things are not Golden at Coors this week. And you&#8217;ll learn about the hack that is sweeping the planet with Microsoft Exchange. This first Friday Happy Hour edition podcast uncovers network security issues at Molsen-Golden that have had big impact on the taps and the company bottom line. We&#8217;ll talk data backups, ransomware, cyber hacks and more as we also cover the Microsoft global vulnerability that has already affected tens of thousands of servers. Join us to hear about these stories and how they relate to you and your precious electronic data.</p>
<p><strong>Press the ARROW on the player below to listen now</strong></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_1">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/cybergurus/embed/episodes/S1E1---Friday-Happy-Hour---Not-to-Happy-at-Coors-et2bln" height="102px" width="600px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/">S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Basics of Social Engineering</title>
		<link>https://aditigroup.com/the-basics-of-social-engineering/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Thu, 04 Jun 2020 00:13:47 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Health Insurance Portability and Accountability Act]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=441</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_30">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_45  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_43  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<h2 style="text-align: justify;">Where Are You Most Vulnerable?</h2>
<p style="text-align: justify;"><strong>Hackers understand that <em>employees</em> are often the weakest link in an organization’s security. That’s why 98% of cyber attacks rely on some type of social engineering, costing companies $billions every year.</strong></p>
<p>Are you familiar with these new Cyber criminal techniques that can leverage ANY connected employee to breach your security?</p>
<p><strong>As an increasing number of employees are forced to work remotely during the COVID-19 crisis</strong>, IT networks have become even more vulnerable to cyber-attack, especially when users connect over unsecure Wi-Fi and/or Home Networks with their personal devices.</p>
<p>In addition to raising awareness about new security threats for your employees, we’ve included 8 tips to help teleworkers (and any connected employees) improve security. You’ll also see recommendations on how ongoing Cyber Security Awareness Training is crucial to a strong defense.</p>
<p>While users are regularly encouraged to keep their anti-virus definitions and software up-to-date, 6% percent of users NEVER receive any type of security awareness training, while another 33% receive only once per year or when they join the company.</p>
<p>&nbsp;</p>
<h3>Key Security Lingo</h3>
<p>Every employee should also become familiar with the latest phishing and ransomware strategies to prevent becoming that weak link.</p>
<h4 style="padding-left: 30px;">Phishing (or Spear Fishing)</h4>
<h4 style="padding-left: 30px;">Vishing</h4>
<h4 style="padding-left: 30px;">Pretexting</h4>
<h4 style="padding-left: 30px;">Business E-Mail Compromise (BEC)</h4>
<h4 style="padding-left: 30px;">Baiting</h4>
<p>From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.<br /> While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust.</p>
<p>Other types of social engineering may include creating distrust, or starting conflicts by altering private or corporate communications. There are literally thousands of variations to social engineering attacks, limited only by the criminal’s imagination.</p>
<p><strong></strong></p>
<h3>Phishing (or Spear Fishing)</h3>
<p>Phishing is the most common type of social engineering attack. Hackers pose as a trusted source (a friend, boss, colleague, bank official, government agency, etc.) and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data.</p>
<p>The cybercriminal may obtain your email address from a compromised email account or web directory and then go “Phishing,” sending general emails to everyone, or go “spear fishing,” personalizing an email for just you.</p>
<p>The email will contain:</p>
<ul>
<li>A link that you just have to click on, taking you to a website that asks for your personal information and/or automatically downloads malware</li>
<li>An attachment of pictures, music, movie, document, etc., that has malicious software embedded. </li>
</ul>
<p>&nbsp;</p>
<h3>Vishing</h3>
<p>Another type of phishing, using voice instead of text. The cybercriminal recreates an IVR (Interactive Voice Response) system of a trusted company, attaches it to a toll-free number and tricks you into responding to the cell phone prompts with your personal information.</p>
<p>&nbsp;</p>
<h3>Pretexting</h3>
<p>Pretexting is a social engineering technique of presenting oneself as someone else in a fictional situation in order to obtain private information.</p>
<p>This may be another phishing exploit, or use baiting techniques, but it’s all about developing a believable story, which may include:</p>
<p><span style="text-decoration: underline;">Urgent request for help</span>. Your ’friend’ is stuck in another country and needs money to get home or to pay a fine. Or the CEO sends an email titled “URGENT!!!!!,” with a message containing spelling mistakes.</p>
<p>Ask you to donate to a fundraiser, or some other cause. Disaster relief, political campaign, or charity needs money and/or your personal information to keep you informed.</p>
<p>Notify you that you’re a ‘winner.’ This phishing attack claims to be from a lottery, or a dead relative, or the millionth person to click on their site, etc. In order to receive your “prize” you will need to provide your bank routing number along with other details to steal your identity.</p>
<p>Pose as tech support or other professional. Also considered a “Quid Pro Quo” attack, the cyber-criminal is responding to an issue, and requests information, and/or a download of a scanner (malicious software) to scan your system. The criminal may be quite helpful and provide productivity tips while stealing your identity.</p>
<p>&nbsp;</p>
<h3>Serious Business Pre Text</h3>
<p>One form of pretexting, called <strong>Business E-Mail Compromise (BEC)</strong> uses a variety of tactics to con the company into wiring funds. The cybercriminal group likely gains access through spear-phishing and/or malware, and then spends weeks or months discovering the organization’s billing process, vendor payments, and the CEO’s email style and travel schedule.<br /> Then when the CEO is out of office, the scammers send a targeted email posing as the CEO to the finance officer (bookkeeper, accountant, controller, or CFO ) requesting an immediate wire transfer. The vendor will sound familiar though the account numbers will be slightly different.</p>
<p>If undetected, the initial and subsequent requests will cost the company thousands if not hundreds of thousands of dollars.</p>
<p>&nbsp;</p>
<h3>Baiting</h3>
<p>This type of social engineering scheme dangles malicious devices inside a seemingly harmless carrier, hoping someone will “take the bait.”</p>
<p>These schemes are often found on Peer-to-Peer sites offering a recent movie, or music to download, but they’re also found on social networking sites, job posting sites, online auctions and e-commerce sites.</p>
<p><!-- /divi:paragraph --></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the harm in sharing your mobile number?</title>
		<link>https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Tue, 22 Oct 2019 14:24:31 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=310</guid>

					<description><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, if at all. It therefore, becomes a good identifier of who we are and tied with other publicly available information, becomes the key to unlock a lot of digital information. The article linked below shows the surprise findings of a tech journalist when he gave his mobile number to a security researcher. (click the picture)</p>
<p><iframe title="I Shared My Phone Number. I Learned I Shouldn’t Have." class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F08%2F15%2Ftechnology%2Fpersonaltech%2Fi-shared-my-phone-number-i-learned-i-shouldnt-have.html#?secret=3W3PhXyG4U" data-secret="3W3PhXyG4U" scrolling="no" frameborder="0"></iframe></p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>October is National Cybersecurity Awareness Month</title>
		<link>https://aditigroup.com/october-is-national-cybersecurity-awareness-month/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Wed, 16 Oct 2019 22:48:21 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=308</guid>

					<description><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently? Well, we should think about cybersecurity once in a while! The linked article is a good general deep dive into how to think about keeping your family safe in this connected world. Good advice about what to do if you think you&#8217;ve been [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently?  Well, we should think about cybersecurity once in a while!  The linked article is a good general deep dive into how to think about keeping your family safe in this connected world.  Good advice about what to do if you think you&#8217;ve been hacked (something strange pops up on one of your credit card statements for instance).  ABC&#8217;s of cybersecurity, use of VPNs, 2FA, and other good things.  One good idea, if you have a family and want to help introduce the concept of cybersecurity to children who will grow up in this cyberworld, that is to set up a family domain.  If you have questions, please ask.</p>
<p>https://www.ml.com/articles/digital-defense-keeping-your-family-safe-online.html</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
