Categories
Cyber Security Lists

Identity Protection

Identity thieves can do a lot with your identity. Here are some different freezes you can apply to protect yourself from fraud. The best part? Freezes don’t cost a thing.

Click each link to go to the relevant “freeze your credit/information” page.

EquifaxOne of the three major credit bureaus
ExperianOne of the three major credit bureaus
TransUnionOne of the three major credit bureaus
InnovisAnother credit bureau
Bank Security FreezeIdentity thieves can open fraudulent bank accounts. A bank security freeze prevents this.
Utilities Security Freeze (NCTUE)Identity thieves can open utility accounts in your name, leaving you with the bill
Employment Data Freeze (E-Verify)Identity thieves can obtain employment with your ID, leaving you to pay the taxes
Employment Data Freeze (Equifax)Second database used for employment
Child Credit FreezesIdentity thieves may apply for credit using children’s identities because they are rarely monitored
Tax ID PINIdentity thieves can file your taxes for you, and get your refund. An Identity Protection PIN (IP PIN) helps prevent this.
List of places to freeze your credit/information

Additional Resources: https://www.consumerlawfirm.com/credit-reporting-agencies.htm

Categories
Cyber Security Lists

Basic Security Practices

Create a DR/BCP Plan and test it annually, including a test of your backups/restore

Create a scheduled access and privileged audit of all your critical systems every 3 or 6 months, so making sure all leavers are disabled and there are no extra admins etc

Have a solid asset database for physical assets and who owns them, serial number etc Asset list for servers including how they are backed up, physical/vm, what they are used for, services they run, are they critical etc

Digital asset list for all of the software programs that your users use, including who has admin, the type of data that they hold, if it is critical to the business etc

Make sure your user base takes cyber awareness training

Create a daily checklist of things to be checked like admin logs, alerts, emerging threats, backups, and create an escalation process. Audit to make sure it is getting done regularly.

Create a change management system

Setup a base policy set like acceptable use, BYOD, Password policy, Information Technology policy (goes over guidelines for your IT team), remote work, physical security, clear desk policy, employee handbook etc

Document physical security at your location/s for deliveries, guests, cameras, card pass logging etc

Document and check your onboarding and offboarding processes Work with HR to make sure all employees get a contract, are background checked, get trained and get a handbook etc

Get a copy of all client contracts and make sure you are compliant

Create a checklist and/or questionnaire for security reviews of vendors and new tech

Create an objectives and measures for your IT organization with 8 or so KPIs like vulnerabilities remediated in X amount of time, users with x% of phishing messages, Help Desk responding in X amount of time etc. Then measure it regularly and have a meeting with management to review every 6 months

Get a solid vulnerability remediation and management plan in place

MFA EVERYWHERE

Local Admin NOWHERE

Disk encryption EVERYWHERE

Phishing tests for all employees

Work out how to protect corporate email on BYOD phones

Talk to senior management about risk and document where they find the biggest risks to the business. Take steps to mitigate and track progress regularly

Create a “continual improvement log” that tracks security items you run across or think of and track them to remediation

Run incident response exercises with your team, so pretending something happened and see how they react etc.

Inventory all your critical business assets in a spreadsheet (i.e., what makes the money come in)

Identify what data you rely on to do business, tag them to specific systems in this spreadsheet

Work to get backups of the critical data and systems, ideally somewhere that isn’t directly networked (read: accessible to ransomware or bad actors)

Implement MFA on all remote access (email, VPN, server administration, whatever)

Make sure everyone is using passwords (kinda default with the “MFA” suggestion)

Get endpoint protection in place; anything is better than nothing, but any of the best ones are a little pricy but definitely worth it because, as a small business, your users will destroy you.

Try and get a vulnerability scan (free ones exist) and use your existing free-hand knowledge to scan ports and services to identify potential openings/risks.

Sources:

  • https://www.reddit.com/r/sysadmin/comments/13bl1iu/comment/jjcutf3/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
  • https://www.reddit.com/r/cybersecurity/comments/138iy0c/comment/jiz14fj/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
Categories
Cyber Security Lists

Recommended Privacy VPNs

Picture of a laptop secured with a VPN

When away from home, it’s especially important to use a privacy VPN when connecting to WiFi. Most privacy VPN services only cost a few dollars a month, are easy to use on your laptop or smartphone, and provide a reasonable level of security when connecting to unknown WiFi networks. Here are a few VPN services that I recommend.

Recommended VPNs:

Keep reading for a description of each of these services.

NordVPN

NordVPN is one of the biggest names in the world of privacy VPNs. They’re a trustworthy company and have an easy-to-use app for both desktop and mobile devices. I’ve been using them for several years, and they are my VPN provider of choice. Their subscription is very affordable at just a few dollars a month. You can get a discounted rate using this link.

Surfshark

In addition to being extremely affordable, Surfshark also lets you use your account on an unlimited number of devices, whereas most providers limit you to 5-10 devices per account. They have multiple subscription lengths available, including monthly and annual options. You can use this link to get a discount.

Proton VPN

Proton VPN, owned by Proton (also known for their Proton Mail email service) is a very security-conscious company that offers private email service in addition to their privacy VPN. They are definitely a company that I would trust, and I recommend their services. You can check out their VPN options here.

ExpressVPN

ExpressVPN is another well-known privacy VPN provider. They consistently receive high customer satisfaction ratings and are a reputable option. You can check out their services here.

Additional VPN options

If for some reason you don’t like any of the above options, there are alternatives available. Here’s a list of some of the other options I’m aware of.

Categories
Cyber Security Lists

Recommended Password Managers

With the ever increasing volume of data breaches, having unique, secure passwords is more important than ever. Here you’ll find my list of recommended password managers that you can use to securely store your passwords.

Recommended Password Managers:

  • KeePass (free, offline, no cloud sync)
  • LastPass (no longer recommended, too many data breaches)
Categories
Cyber Security Lists

List of NDR Tools

VendorProduct
Arista NetworksArista NDR
CiscoSecure Network AnalyticsSecure Cloud Analytics
CorelightCorelight Open NDR Platform
DarktraceDarktrace DETECT; Darktrace RESPOND
ExtraHopReveal(x)
Fidelis CybersecurityFidelis Network
GatewatcherAionIQ
GigamonGigamon ThreatINSIGHT
IronNetIronNet Collective Defense Platform
PlixerPlixer Security Intelligence Platform
ProgressFlowmon Anomaly Detection System
QI-ANXINSkyEye
SangforCyber Command
Stamus NetworksStamus Security Platform
TencentT-Sec NDR
TrellixTrellix Network Detection and Response
Trend MicroTrend Micro Deep Discovery; Trend Micro TippingPoint; Trend Micro Vision One
VectraVectra Threat Detection and Response Platform
VMwareNSX Network Detection and Response

Accedian
Allentis
aizoOn (Aramis)
Blue Hexagon (Acquired by Qualys Oct 2022)
BluVector
CloudCover
cPacket Networks
Cryptomage
CUSTOCY
CyGlass
Cynamics
Deep Instinct
Exeon
Fortinet
GREYCORTEX
Hillstone Networks
Huawei
LiveAction
LogRhythm
Lumu Technologies
MixMode
Muninn
NANO Corp
Netography
NetWitness
NextRay
Nominet
OpenText (Bricata)
Ordr
Quad Miners
Qihoo 360
Sesame IT
Stellar Cyber
TEHTRIS
ThreatBook
ThreatWarrior
Tophant
Vehere
Venustech
Verizon

Categories
Cyber Security Lists

List of Training Resources

Hands-on:

Below is a list of hands-on cyber security training resources. Most are for offensive training.

CyberSecLabs (Paid): www.cyberseclabs.co.uk

Hack The Box: www.hackthebox.eu

Offensive Security Proving Grounds: www.offensive-security.com/labs/individual

OverTheWire: overthewire.org

TryHackMe: tryhackme.com

VulnHub: www.vulnhub.com

Training Material:

https://store.7asecurity.com/#free

Categories
Cyber Security Lists

List of Wordlists

CrackStation.net: https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

RockYou: https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt

Categories
Cyber Security Lists

List of Cyber Competitions

CyberForce

Google CTF

Hivestorm

National CCDC

NCL: National Cyber League

PicoCTF

Categories
Cyber Security Lists

List of Steganography Tools

Digital Invisible Ink Toolkit

Steghide

Stegsolve

OpenStego

StegoSuite

StegExpose

StegSecret

Categories
Cyber Security Lists

InfoSec Music

NOW That’s What I Call HaXmas! https://www.rapid7.com/info/haxmas/haxmas-2017/

NOW That’s What I Call HaXmas, Volume 2! https://www.rapid7.com/info/haxmas/

Offsec Say Try Harder: https://www.offensive-security.com/offsec/say-try-harder/

The Malware Mash! https://podcasts.google.com/feed/aHR0cHM6Ly9oYWNraW5naHVtYW5zLmxpYnN5bi5jb20vcnNz/episode/NWM0MGZhNWMtMzg0Zi0xMWVjLWE5OGYtNDdhOWNhNjEzNTA0?ep=14

Tabs (In The Browser)
https://youtu.be/n241TvVUe4Y