Microsoft Azure and O.365 Multi-Factor Authentication Outage
Microsoft’s cloud environment had an outage this week for the better part of a day, worldwide. The failure stopped users who had turned on two factor authentication from logging in.
This is not a “gee, Microsoft is bad” or “gee, two factor authentication is bad” problem. All systems have failures, especially the ones that businesses run internally. Unfortunately cloud systems fail occasionally too.
The bigger question is are you prepared for that guaranteed, some time in the future, failure?
It is a really bad idea to assume cloud systems will not fail, whether they are from a particular industry specific application or a generic one like Microsoft or Google.
What is your acceptable length for an outage? How much data are you willing to lose?
More importantly, do you have a plan for what to do in case you pass those points of no return and have you recently tested those plans?
Failures usually happen when it is inconvenient and planning is critical to dealing with it. Dealing with an outage absent a well thought out and tested plan is likely to be a disaster. Source: ZDNet.
Moody’s is Going to Start Including Cyber Risk in Credit Ratings
We have said for a long time that cyber risk is a business problem. Business credit ratings represent the overall risk a business represents.
What has been missing is connecting the two.
Now Moody’s is going to do that.
While details are scarce, Moody’s says that they will soon evaluate organizations risk from a cyber attack.
Moody’s has even created a new cyber risk group.
While they haven’t said so yet, likely candidates for initial scrutiny of cyber risk are defense contractors, financial, health care and critical infrastructure.
For companies that care about their risk ratings, make sure that your cybersecurity is in order along with your finances. Source: CNBC.
British Lawmakers Seize Facebook Files
In what has got to be an interesting game, full of innuendo and intrigue, British lawmakers seized documents sealed by a U.S. court when the CEO of a company that had access to them visited England.
The short version of the back story is that the Brits are not real happy with Facebook and were looking for copies of documents that had been part of discovery in a lawsuit between app maker Six4Three and Facebook that has been going on for years.
So, when Ted Kramer, founder of the company visited England on business, the Parliament’s Sargent-at-arms literally hauled Ted into Parliament and threatened to throw him in jail if he did not produce the documents sealed by the U.S. court.
So Ted is between a rock and a hard place; the Brits have physical custody of him; the U.S. courts could hold him in contempt (I suspect they will huff and puff a lot, but not do anything) – so he turns over the documents.
Facebook has been trying to hide these documents for years. I suspect that Six4Three would be happy if they became public. Facebook said, after the fact, that the Brits should return the documents. The Brits said go stick it. You get the idea.
Did Six4Three play a part in this drama in hopes of getting these emails released? Don’t know but I would not rule that out. Source: CNBC.
Two More Hospitals Hit By Ransomware
The East Ohio Regional Hospital (EORH) and Ohio Valley Medical Center (OVMC) were both hit by a ransomware attack. The hospitals reverted to using paper patient charts and are sending ambulances to other hospitals. Of course they are saying that patient care isn’t affected, but given you have no information available to you regarding patients currently in the hospital, their diagnoses, tests or prior treatments, that seems a bit optimistic.
While most of us do not deal with life and death situations, it can take a while – weeks or longer – to recover from ransomware attacks if the organization is not prepared.
Are you prepared? In this case, likely one doctor or nurse clicked on the wrong link; that is all it takes. Source: EHR Intelligence.
Atrium Health Data Breach – Over 2 Million Customers Impacted
Atrium Health announced a breach of the personal information of over 2 million customers including Socials for about 700,000 of them.
However, while Atrium gets to pay the fine, it was actually the fault of one of their vendors, Accudoc. Accudoc does billing for them for their 44 hospitals.
Atrium says that the data was accessed but not downloaded and did not include credit card data. Of course if the bad guys “accessed” the data and then screen scraped it, it would not show as downloaded.
One more time – VENDOR CYBER RISK MANAGEMENT. It has to be a priority. Unless you don’t mind taking the rap and fines for your vendor’s errors. Source: Charlotte Observer.