IT | Security

Absolutely Clickable: 10 Links Worth Reading in September

By: Absolute Editorial Team | 9/22/2020 | 4 min read

 

Welcome to the first edition of Absolutely Clickable a weekly roundup of posts on endpoint protection, cybersecurity, compliance, and anything related to keeping your networks protected from threats. 

 

From the Absolute Blog

Absolute has launched a device reclamation service for schools in the U.S. and Canada. No more excuses like my dog ate my Chromebook or “iPad? What iPad?”. Absolute can manage the entire process of getting devices back at the end of the school year. Learn more on the Absolute Blog: Absolute Launches Device Reclamation-as-a-Service.

If you’re challenged to keep up with compliance and security—especially now with more people working from home—Absolute has expanded its capabilities to report on, track, monitor, and repair devices. Learn more in the full announcement post: Absolute Announces New Capabilities with its Latest Platform Release to Ensure Secure, Compliant Endpoints.

 

Elsewhere on the web

Louis Columbus from Forbes spoke with Absolute’s Steven Spadaccini about the toughest issues facing CIOs and CISOs today. It’s a good read to learn about the newest problems IT is facing and, better still, how to solve them. Answers To Today’s Toughest Endpoint Security Questions In The Enterprise

From the “work smarter not harder” department, are some ways to get off the hamster wheel of chasing after threats and adapting to never-ending change. Some of the tips may seem daunting, but accepting we live in an overwhelmingly complex world and re-evaluating your accepted processes are two great ways to start. If we know there aren’t easy answers anymore, and we stop looking for them, we can move onto asking ourselves "is that really the best way to do things. 5 Ways for Cybersecurity Teams to Work Smarter, Not Harder

Finally finished watching Space Force on Netflix, and part of the premise is being able to defend scientific satellites and research from countries who don’t want to play nice in the sandbox. While Space Force is both real and fiction, threats to space systems are real and the U.S. has released directives on how to protect systems from cyber attacks. Imagine if the satellites that help predict the weather or monitor pollution or track missile launches were compromised and sending false (or corrupted) data? I think we have enough on our Disasters in 2020 bingo cards, let’s protect the satellites, thank you. White House publishes a cyber-security rulebook for space systems

One of Chile’s biggest banks was hit with malware recently. A terribly scary, terribly real, and terribly common thing at companies across industries. According to ZDNet, a malicious Office file was the culprit. This makes it a good time to remind people to a) stop opening random documents you receive by email and b) keep your anti-virus and malware software up to date. Chilean bank shuts down all branches following ransomware attack

Related to keeping anti-virus/malware software up to date is a paper on how people deal with exactly this issue. When faced with “stop what you’re doing and update the anti-virus now” and “this needs to be do, can we do later”, people respond to better to the choice of doing things later. If you force people to stop their task, they often will stop the update, but if you give people an option to delay until a future time, people comply. Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security

But on the plus side machine learning is helping identify malware threats faster than people are able to report them—The rise of machine learning for detection and classification of malware: Research developments, trends and challenges. This is important because malware and threats are changing faster and faster and the typical system to finding, identifying, and reporting used by, well everyone, can’t keep up. Machine learning looks like a good way to help see what’s coming and developing before it becomes a massive problem.

Back to the bad news, The Hacker News reports a new Bluetooth flaw that could be used to intercept data or part of a MITM attack. The flaw comes into play when a device is in pairing mode. Nothing has been reported in the wild, but now that it’s out there it won’t be long before something pops up to exploit it. New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices

 

Something to read or listen to

Cory Doctorow has a Kickstarter campaign going to fund an audiobook version of Attack Surface the third in the Little Brother series—Kickstarter. Recently a new edition with both Little Brother and Homeland was released with a new introduction by Edward Snowden (Boing Boing). It’s worth noting Homeland was on Snowden’s nightstand as he fled Hong Kong to Russia seven years ago. An excerpt of the introduction was posted on Wired and is worth a read.