Publicly Available Information Heightens Need for Cybersecurity Vigilance

For any business, “ports” that allow for communication generally need to be open (for example, ports 80 and 443 for websites, and port 500 for VPN access). While most of these ports allow you to engage in critical functions, there are often ports that remain open despite being unneeded or unused. These available ports present an attack surface that can be exploited.

A scary development in cybersecurity is that specialized skill is no longer required to hack into firms; indeed, “how-to” videos found on YouTube can be easily followed to create a breach. The point of a penetration test is to try to find vulnerabilities on your network before the bad guys do.

If you have been hacked or breached, there are certain sites on the web, such as Pastebin, where hackers post your information.

Criminal hackers search for any information that will make their jobs easier, and often search publicly available web tools for any vulnerable network devices, Cyber 51 LLC’s Martin Voelk and Ascendant’s Adam DiPaolo recently told attendees at Ascendant’s “Compliance Disruptors: Seismic Shifts of the Regulatory Landscape” conference.

Shodan.io is a vulnerability search engine that allows anyone to see internet-connected devices. “Google dorking” is another way to search for specific documents like confidential documents relating to a certain company that may have been posted online, intentionally or inadvertently.

Once you identify what’s on the network, such as type of firewall and version number, then you can search vulnerability databases for vulnerabilities relating to that device and version.

Reporting of threats should be made using the Common Vulnerability Scoring System (CVSS). Scores are calculated based on various metrics and measure from a 0 to 10 range, with 10 being the most severe. It is a great way for senior management to easily understand high, medium, and low risks.

You can have 999 non-critical vulnerabilities but if you find one critical vulnerability, that alone makes your overall risk profile critical.

Firms should engage in scanning as well as internal and external pen testing, with the testing process described in a report. Scanning is a passive enumeration of vulnerabilities and usually involves software tools that are designed to test for exposure to known vulnerabilities. A penetration test is more active in that it attempts to exploit those vulnerabilities. Using a combination of all these tests in an effort to identify vulnerabilities and their severity levels remain a key part of a vigilant cybersecurity program.

Related Content

Latest Content

SEC’s Latest Risk Alert Focuses on Electronic Communications

The SEC’s most recent risk alert, “Observations from Investment Adviser Examinations Relating to Electronic Messaging,” issued on December 14, 2019, focuses on the use and maintenance of electronic communications for business purposes. The purpose of the alert is to remind advisers of their obligations related to personal use of electronic messaging and the requirements for … Continued

SEC OCIE Issues 2019 Examination Priorities

Well ahead of the New Year, the SEC Office of Compliance Inspections and Examinations (OCIE) announced its 2019 examination priorities. In keeping with OCIE’s four “pillars” of promoting compliance, preventing fraud, identifying and monitoring risk, and informing policy, the Dec. 20 release provides a preview of key areas where OCIE intends to focus its limited … Continued

Highlights of 2018: Predictions for 2019

Our annual year-end review covers investment adviser compliance highlights from 2018, and makes 2019 predictions. We will highlight enforcement actions and SEC risk alerts for retail advisers, private fund managers, and institutional wealth managers. Using these as road markers, our predictions are designed to lead reasonable and effective compliance program development. Evaluate 2018 Compliance and … Continued

A New View of How Technology Will Change the Emerging Crytpo-Economy

From the top of the world, it’s amazing what you can see.  I recently had the opportunity to travel to the United Arab Emirates to speak in Dubai at the 7th Edition of the Alternative Investment Management Summit. While I was there, I took a few moments to ride to the top of the Burj … Continued

SEC Retail Investor Focus Turns Towards Registered Investment Companies

Earlier this year when the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) announced its 2018 examination priorities, OCIE stated that a core priority was to protect retail investors, including seniors and individuals saving for retirement. OCIE is now continuing this effort by focusing on mutual funds and exchanged-traded funds (together, the “Funds”) as the … Continued

Mailing List

Subscribe to the Ascendant Compliance email list for the latest compliance resources, conferences, ComplianceCasts™, and more.

Loading form...

Contact Us

Ascendant works together with clients to identify and assess critical needs through customized plans. If you need assistance with compliance functions, regulatory services, cybersecurity or technology tools, we’d love to speak with you.