Bluetooth Vulnerabilities

Bluetooth Vulnerabilities
(from Schneier on Security)
 

bunch of Bluetooth vulnerabilities are being reported, some pretty nasty.

BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus. The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device, and require another step to take control of the device. With BlueBorne, attackers can gain full control right from the start. Moreover, Bluetooth offers a wider attacker surface than WiFi, almost entirely unexplored by the research community and hence contains far more vulnerabilities.

Airborne attacks, unfortunately, provide a number of opportunities for the attacker. First, spreading through the air renders the attack much more contagious, and allows it to spread with minimum effort. Second, it allows the attack to bypass current security measures and remain undetected, as traditional methods do not protect from airborne threats. Airborne attacks can also allow hackers to penetrate secure internal networks which are “air gapped,” meaning they are disconnected from any other network for protection. This can endanger industrial systems, government agencies, and critical infrastructure.

Finally, unlike traditional malware or attacks, the user does not have to click on a link or download a questionable file. No action by the user is necessary to enable the attack.

Fully patched Windows and iOS systems are protected; Linux coming soon.
 

Original Article:
https://www.schneier.com/blog/archives/2017/09/bluetooth_vulne.html
 

Call Today And Schedule
Your COMPLIMENTARY Technology Checkup!

775.473.9445

IoT for Business: Five Key Trends for 2018

IoT for Business: Five Key Trends for 2018
(Summary of Wendy Schuchart’s Channel Partners Report)
 

Recent estimates put the number of IoT connected devices at between 8 and 15 billion – more than human beings on the planet. We’re talking everything from sensors, voting machines and pacemakers to voice-activated cars, personal assistants in the home (like Alexa) and personal health trackers (like FitBit and Leaf), along with toys, security devices, and even toothbrushes and pillows. The good news for you, they’re mostly mobile, and they all need to be connected. But how do you sell customers on the idea that IoT is past trend stage?

We decided to get you the “customer-eye IoT view” with an emphasis on mobility and connectivity. We spoke with industry leaders and changemakers about the biggest sea changes on the horizon that IT exec customers must be on top of.

1. Interconnectivity Is Your Best Friend
Kevin Cooke, product director at Stratusphere Solutions for Liquidware says the most underrated IoT application is automation. Not a specific IoT device, but the interaction of multiple IoT devices in concert with other outside information. Interconnection is the way data is exchanged – machine to machine communication really can’t be kept in silos. It’s not just a data latency issue – it literally needs to flow between devices in real time. Reliable bidirectional signals are the bloodstream for the system – going back and forth between devices to collect data and talk to each other.

Action Plan: 
Interconnectivity needs to be part of the implementation strategy, not something fixed after deployment. Figure out how much interconnectivity you think your IoT applications will need and then build an architecture that can handle about 10 times that amount out of the gate with the ability to scale to 100 times that amount.

2. Got IoT? Get Security
Cybersecurity will also undermine a lot of connected devices in the near-term future, with hackable devices and data leakage becoming very real concerns. People are upset about the Equifax leak (and rightfully so!), but IoT devices have the potential to leak information that’s just as sensitive and valuable. just because an IoT device is secure doesn’t mean IoT data is secure and vice versa. Case in point, the Mirai attack allowed hackers to get to connected “things” and then from there, they went into a DDoS attack which sent so much data to websites like Twitter, Spotify and Netflix, that everything froze up. The physical weakness translated to a data weakness.

Action Plan: 
Security ain’t sexy, but it’s job one. Build in context awareness for anything you wouldn’t want the world to have access to and make sure it’s shipshape against things that go bump in the night.

3. Voice Applications for Rich Integration
In 2018, voice-controlled devices like Alexa are going to be a driving force, all powered through the magic of IoT. The most underrated IoT application in business is seamless voice control of IoT devices. Adam Fingerman, chief experience officer and co-founder of ArcTouch, says he’s “bullish” on voice applications, particularly those built for voice platforms like Alexa, Google Home, Siri and Cortana.

Action Plan: 
Voice control and natural language processing could be a way to innovate internal processes which can lead to employee satisfaction — and if you have external customers, they’re going to expect this from your service or look to your competitor to answer back.

4. IoT Data Analytics Is a Game Changer
When it comes to IoT, the linchpin is all in how you deal with the millions of new data points. With this data, teams can now see how their products are being used. “They can use this information to create the next version of product with better quality, better user interfaces, and better features all targeted to specific markets,” Chalgren says. “The dataflow (i.e., the telemetrics) coming from these devices will enable the product, quality and engineering teams of IoT companies to quickly correctly evolve their products much faster.”

Action Plan: 
Put some serious energy into your IoT data feed and analysis capability and make sure you’re arming the engineering team with that data and a data wrangler who can explain it to them.

5. Moving Fast in the IoT Landscape
The biggest trend in IoT for 2018 and beyond, however, is speed. Regulatory hurdles and adoption rates can vary widely across industries and the one challenge that impacts every IoT company is the critical need to move fast. “To ensure first mover advantage in a highly competitive industry, more and more IoT consumer electronics companies rely on a cloud-based product life cycle management (PLM) solution to innovate while accelerating time to market,” says Chalgren.“

Action Plan: 
Don’t allow analysis paralysis to set in – expect this space to heat up in the next several years and move even faster than it already has. The pump is primed – we’re going to see a huge tidal change in the next three to five years and the organizations who are positioned to take advantage of this shift will be the dominant force in the coming decade.

 

SOLUS is focused on IoT and fiber security, if you’d like to learn more please give us a call.

775.473.9445

Enterprise Mobility Management

Direct Reps = Sales Quotas = Higher Pricing

Common sense tells us that if the salesperson you are working with has a monthly sales quota and makes more money when you spend more money, they will never give you the biggest discount available as it will diminish their income. 

Our mobile technology partners are incentivized to secure the lowest pricingand manage your entire mobility platform for you as the more they save you the more they get paid. This is called alignment!


Enterprise Mobility Management
Reduce Cost, Eliminate Hassle, Increase Control, Mitigate Risk
We invite you to learn more about our award-winning enterprise mobility management solutions that help our clients evaluate, implement, optimize and manage their wireless solutions.

  • AUDIT SERVICES
  • SOURCING
  • IMPLEMENTATION
  • EXPENSE & INVENTORY MANAGEMENT
  • HELPDESK & VENDOR MANAGEMENT

Call Today And Schedule
Your COMPLIMENTARY Mobile Evaluation!

775.473.9445

Telecom Tylenol Episode 8 – “Down Hard”…Can’t Access My Cloud Applications

Joe Jonovic talks about the headache of not being able to access your cloud based services and/or applications and how to work with SOLUS to design a solution that will eliminate this headache.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

 

Contact Joe at 775.853.3335 or joe@solusns.com

Telecom Tylenol Episode 7 – One Point of Contact

Joe Jonovic talks about avoiding the headache of researching and vetting multiple vendors by taking advantage of the SOLUS single point of contact model.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches. Contact Joe at 775.853.3335 or joe@solusns.com

Telecom Tylenol Episode 6 – Finger Pointing Between Vendors

Joe Jonovic talks about avoiding the headache of finger pointing between your vendors by taking advantage of the SOLUS single point of contact model.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

Contact Joe at 775.853.3335 or joe@solusns.com

5 Reasons To Take A Fresh Look At Your Security Policy

Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.

(from CSO Online)

Today’s advanced persistent threats, new business technologies and a younger workforce have prompted security budgets to shift from breach prevention to detection and response. Those same forces have also motivated many organizations to take a fresh look at their security policies and guidelines – and for good reason.

The Golden Rules For Writing Security Policy:

  • Making sure the process is shared with all stakeholders who will be affected by it
  • Using language that everyone can understand
  • Avoiding rigid policies that might limit business growth
  • Ensuring the process is pragmatic by testing it out

Just because policies are intended to be evergreen doesn’t mean they can’t become stale, says Jay Heiser, research VP in security and privacy at Gartner. Particularly at the standards levels, one level below policy, guidance may need to be updated for different lines of business, or for jurisdictions that may be driven by different regulatory rules or geographic norms. Security and risk experts offer five reasons why companies should take a fresh look at security policies.

Learn More About The 5 Reasons You Should Take A Fresh Look At Your Security Policy By Reading The original Article Below:

1. Ransomware, DDoS and APTs
2. Cloud, IoT blockchain and other new technology
3. Changing user behavior
4. Security fatigue and lax enforcement
5. Some policy elements are obsolete
Original Article:
https://www.csoonline.com/article/3209160/security/5-reasons-to-take-a-fresh-look-at-your-security-policy.html?upd=1517938107174
Call Today And Schedule
Your COMPLIMENTARY Security Checkup!

775.473.9445

Telecom Tylenol Episode 5 – 4 Phone Calls To Solve 1 Telecom Problem

Joe Jonovic talks about avoiding the headache of having to make 4 phone calls to solve 1 telecom problem by taking advantage of the SOLUS single point of contact model.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches. Contact Joe at 775.853.3335 or joe@solusns.com

Telecom Tylenol Episode 4 – Local Phone Company Customer Service Unacceptable

Joe Jonovic talks about avoiding the headache of having to deal with your local phone company’s poor customer service when you have a billing or service related issue. Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

Telecom Tylenol Episode 3 – How Much Bandwidth Do I Need?

Joe Jonovic talks about avoiding the headache of committing to too much bandwidth. He describes how SOLUS takes a conservative approach to buying bandwidth for your business. Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.