Archive for RB

What is the Most Productive Time to Start a Project

What is the Most Productive Time to Start a ProjectFall is coming. Fall means football, leaf-peeping, cider and winter is coming. The season is also time to start that big project. New data from Redbooth maker of a web-based workplace collaboration tool says that Autumn is the most productive time to start a project. The San Francisco, CA-based firm looked at 1.8 million projects and 28 million tasks over a four-year period and quantified what a lot of us already intuitively know.

Fall is the most productive time to start a project

The data found that the average person gets more work done in the fall than in any other season. The study found that people are:

  • Fall is the Most Productive Time to Start a Project20% more productive in autumn than in winter
  • 11% more productive in autumn than in spring
  • 7% more productive in autumn than summer

It should not surprise anyone who has lived through a Detroit winter that we are less productive in winter. Snow – cold – no SunSADD. It is a bit surprising to me that summer is a more productive season to start a project. We are actually more productive in summer than spring.

October is the most productive month

Redbooth monthly productivityRedbooth found that October is the most productive month followed by September and November. The least productive time to start a project is in January. People complete 9.5% of tasks in October, while in January they only do 7.2%. The researchers surmised that it could be the holiday rush that pressures people into getting more done or perhaps even adults have that refreshed, back to school feeling in the fall.

Monday is the most productive day

Redbooth daily productivityThis one is a bit more surprising. Even though don’t like Mondays, Redbooth says we work well on them. Monday is the most productive time to start a project. People reported completing the most tasks at 20.4%. Only 16.7% of tasks are completed on Fridays, making Friday nearly 20% less productive than Monday.

The author speculates that given the relatively low completion levels on the latter days of the week, it’s likely that Monday is the “catch up” day at work. Studies have shown that as many as 81% of workers get the “Sunday Blues” — or an impending feeling of dread over the work week ahead. It’s possible that this dread pushes us to work harder earlier in the week.

11 AM is the most productive time

Redbooth hourly productivityWe work best just before Lunch. Productivity peaks at 11 AM with 9.7% of tasks completed. After that, the effects of food set in, and a slump tends to occur after 1 PM.  After 1 PM, productivity never quite returns to its peak, due to the “post-lunch dip.”

rb-

So the data says you should start your most critical projects on a Monday at 11 AM in October.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

$2.9M Per Minute Lost to Cybercriminals

Updated 10/27/2019 – On October 22, 2019, the FBI issued a warning about cybercriminals running e-skimming attacks, also known as Magecart attacks. These attacks have been happening since 2016, but have intensified during 2018 and 2019. These attacks started out by exploiting vulnerabilities in open-source e-shopping platforms. However, over the past two years, attackers evolved their attack methodology, and any online store is now susceptible to attacks, regardless if it runs on top of an open-source platform or a cloud-hosted service.

$2.9M Per Minute Lost to CybercriminalsCybercriminals cost the global economy $2.9 million every minute of 2018. This shocking statistic comes from RiskIQ‘s latest Evil Minute report. RiskIQ specializes in online attack surface management, providing threat discovery, intelligence, and mitigation. The San Francisco, CA-based firm figured that a total of $1.5 trillion was lost to cyber-criminals in 2018. Some of the more ominous info-bits they presented include:

  • RiskIQ logo$25 per minute, the cost to top companies due to security breaches.
  • $17,700: lost from phishing attacks per minute
  • $22,184: the projected by-the-minute cost of global ransomware events in 2019

Other statistics include:

  • 8,100: identifier records compromised every minute
  • 2.4: phish traversing the internet per minute
  • 0.32: blacklisted apps by-the-minute
  • 0.21: Magecart attacks detected every minute

Lou Manousos, CEO of RiskIQ said in the presser, “As the scale of the internet continues to proliferate, so does the threat landscape.

Magecart hacks

Magento .logoThe report specifically calls out attacks that target e-commerce. They focus on the Magecart hacks. Magecart hacks have increased by 20% in the last year. By some estimates, the Magecart supply chain attacks have resulted in the theft of more credit card information than more infamous breaches at Home Depot and Target. According to reports, Magecart was behind the 2018 cyber-attacks on British Airways and Ticketmaster which together compromised the info of over 425,000 of the firm’s customers.

Magecart attack is a credit card skimmer that intercepts card numbers and information when a payment card is swiped at the point of sale. Unlike gas card or ATM skimmers, there is almost no way for a consumer to determine that Magecart skimming is about to take place. There is no physical manifestation of Magecart and it is not always easy to catch, because it takes advantage of universal code and other applications not typically related to payments.

ecommerace

Magecart is a consortium of at least six different hacking groups that target flaws in online shopping cart systems. The attackers like Magento to steal customer payment card information. Magento, an open-source e-commerce platform written in open-source PHP. At least initially attackers exploited a PHP Object Injection flaw (CVE-2016-4010) in the popular online shopping cart.

In order to run this compromise, the Magecart attacker substitutes a piece of Javascript code, either by altering the Magento source code or by redirecting the shopping cart using an injection to a website that hosts the malware to steal the credit card and user information.

Trend Micro Mirrorthief attack chainRiskIQ CEO Manousos warns;

Without greater awareness and an increased effort to implement necessary security controls, there will be more attacks using an ever-expanding range of technologies and strategies.

 

RiskIQ infographic

rb-

Firms that fall victim to attacks don’t just lose card info. They also lose time and productivity. Restoring hacked data and systems takes time and resources. The damage to a company’s reputation can cost it new and existing customers. Then there are the legal penalties from PCI, HIPAA, and the courts that come with mishandling customer information.

Like I keep saying – time to go back to the cash economy.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Are You Middle Class This Labor Day

Are You Middle Class This Labor Day

It is Labor Day in the U.S. Organized labor created the U.S. middle class. Now the middle class is being squeezed out of existence. Considerable reports that the Pew Research Center has concluded that 52% of Americans qualify as middle class. 29% in lower-income households and 19% in upper-income households.

Middle class squeezeThe researchers found that today, roughly half of American households fall into the middle class, over time the middle class has been shrinking. In 1971, 61% of adults lived in middle-class households. During this time both upper and lower-income segments of the population have been growing at the expense of the middle class. Plus, the upper class has seen bigger income gains, widening the income gap.

Pew found that the highest concentrations of middle-class Americans reside in the Midwest and Northeast. Sheboygan, WI has the largest percentage of middle-class adults in the U.S., others are:

  1. Sheboygan, WI – 65.2%
  2. Elkhart-Goshen, IN – 64.4%
  3. East Stroudsburg, PA – 63.7%
  4. Ogden-Clearfield, UT – 63.1%

The areas with the highest concentration of upper-class households should not surprise anyone.

  1. San Jose-Sunnyvale-Santa Clara, CA – 31.6%
  2. Washington-Arlington-Alexandria, DC-VA-MD-WV – 30.6%
  3. San Francisco-Oakland-Hayward, CA – 30.4%
  4. Bridgeport-Stamford-Norwalk, CT – 30.2%

The national average middle-class household income is $78,442 according to the Pew data. The Michigan middle-class benchmark is just over $79,000 and is placed in the middle at the 27th place nationally, between New Mexico and Maine. The Michigan middle-class household earns on average $600 more than the national average.

As for metro regions, the highest income to be middle class in the U.S. belongs to:

  1. Iowa City, IA  $90,158
  2. Auburn-Opelika, AL $87,363
  3. Monroe, MI $87,330
  4. Washington-Arlington-Alexandria, DC-VA-MD-WV  $86,645

Being middle class requires the least income in:

  1. El Centro, CA $69,338
  2. Merced, CA $71,319
  3. Lewiston-Auburn, ME $71,612
  4. Coeur d’Alene, ID $71,726

The Pew data says that in order to be middle class in Michigan the major metro-areas a household needs to have the following incomes.

  1. Muskegon, MI $76,699
  2. Saginaw, MI $77,731
  3. Lansing-East Lansing, MI $79,522
  4. Detroit-Warren-Dearborn, MI $80,159
  5. Grand Rapids-Wyoming, MI $80,166
  6. Niles-Benton Harbor, MI $80,302
  7. Ann Arbor, MI $80,907
  8. Kalamazoo-Portage, MI $81,003
  9. Jackson, MI $81,710
  10. Monroe, MI $87,330

In the table below, you’ll find the median incomes for each U.S. state for a three-person middle-class household, adjusted for the cost of living in the states. The amounts vary because Pew adjusts the data to reflect the cost of living around the country. Keep in mind the this is based on 2016 income, but since inflation has been modest in recent years the exact number probably won’t have changed much.

 

How much income it takes to be middle class

RankStateIncome
1District of Columbia$88,579
2Rhode Island$84,413
3Maryland$84,372
4Alaska$84,015
5Massachusetts$83,923
6North Dakota$83,494
7Connecticut$82,747
8Minnesota$82,173
9New Jersey$81,950
10South Dakota$81,334
11Virginia$81,309
12Colorado$81,234
13Iowa$81,167
14Wisconsin$81,053
15Illinois$81,010
16New Hampshire$80,656
17Washington$80,615
18Wyoming$80,217
19Hawaii$80,168
20Ohio$80,033
21Delaware$79,959
22Pennsylvania$79,717
23Nebraska$79,549
24Kentucky$79,216
25Missouri$79,189
26Maine$79,060
27Michigan$79,042
28New Mexico$79,012
29Kansas$78,971
30Georgia$78,961
31Vermont$78,877
32Texas$78,866
33Montana$78,854
34Alabama$78,624
35North Carolina$78,624
36Oregon$78,550
37Nevada$78,461
38New York$78,412
39South Carolina$78,016
40Indiana$77,941
41California$77,806
42Oklahoma$77,658
43Utah$77,575
44Tennessee$77,495
45Louisiana$77,351
46Arizona$76,860
47Idaho$76,849
48Mississippi$76,666
49West Virginia$76,629
50Arkansas$76,569
51Florida$75,414
In 2016 dollars, reflects three-person household, and adjusted for cost of living in the states. Source: Pew Research Center analysis of 2016 American Community Survey (IPUMS)

 

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Are Your VPNs – Virtual Pwnd Networks

Updated October 21, 2019 – The U.S. and U.K. spy agencies have issued separate cybersecurity advisories on 10/21/2019 urging users to patch and mitigate the VPN holes discussed below. The NSA advisory (PDF) warns that “multiple nation-states advanced persistent threat (APT) actors have weaponized” the flaws. The U.K.’s National Cyber Security Centre (NCSC) advisory is here.

Updated September 29, 2019 – SafeBreach Labs discovered a vulnerability in Forcepoint’s VPN client software. The flaw will give attackers unfettered access to its users’ Windows computers.

In its article detailing the bug, Forcepoint explained The flaw enables an attacker to insert their own executable which will run with administrative privileges, giving the attackers administrative access to the system. Forcepoint gave the bug a CVE number of 2019-6145 and a base severity score of 6.7. According to a  Forcepoint knowledge base article, the flaw is patched in version 6.6.1 of the Forcepoint VPN Client for Windows.

Updated September 10, 2019 –  ZDNet is reporting that the Chinese state-sponsored hacker group APT5 is targeting enterprise VPN servers from Fortinet and Pulse Secure since the security flaws discussed below became public knowledge last month. FireEye reports (PDF) that APT5 has been active since 2007 and has targeted multiple industries.

APT5 was reportedly one of the first to start scanning the internet and then later attempt to exploit vulnerabilities in the Fortinet and Pulse Secure VPN servers. The attackers sought to steal files storing password information or VPN session data from the affected products. These files would have allowed attackers to take over vulnerable devices.

Are Your VPNs - Virtual Pwnd NetworksEverybody loves their virtual private networks. SSL VPNs provide a convenient way for business users to connect to corporate networks while out of the office. A recent study by FlexJobs found 30% of workers have left a job because it did not offer flexible work options like remote work. Further, the report said, that 80% of staff would be more loyal to their employers if they had flexible work options and 52% of workers have tried to negotiate flexible work arrangements with their employer.

Great firewall of ChinaHackers love VPNs too

Last month VPNpro found that the majority of VPN services have close ties to China. CSO Online points out that if you are running a VPN that is developed and owned in China, then there is a serious chance that your information is not as private as you think. Every technology company that operates within China, including ISPs, are required to comply with any Chinese governmental request for data. That includes your data. The Chinese government has a long and well-documented history of hacking, favoring, and helping local businesses at the expense of foreign companies.

VPNpro also found that some Chinese firms own different VPNs split among different subsidiaries. For example, the Chinese company Innovative Connecting owns three separate businesses that produce VPN apps: Autumn Breeze 2018, Lemon Cove, and All Connected. In total, Innovative Connecting produces 10 seemingly unconnected VPN products, the study shows.

VPN attacksChina is not the only concern

VPNpro also found that seven of the top VPN services are owned by Gaditek, based in Pakistan. This means the Pakistani government can legally access any data without a warrant and data can also be freely handed over to foreign institutions, according to VPNpro.

VPNpro identified a further four companies: Super VPN & Free Proxy, Giga Studios, Sarah Hawken, and Fifa VPN, which together own 10 VPN services – where the parent company, and therefore the company of origin, is completely hidden.

If that is not scary enough – There are new reports that attackers are now targeting the devices used to attach VPNs to the network. Help Net Security reports that attackers are exploiting known flaws in Pulse Connect Secure SSL VPN and Fortigate SSL VPN installations.

Flaws VPN installations

These attacks could allow attackers to steal passwords and gain full, remote access to an organization’s networks. Attackers have been targeting two vulnerabilities:

  • CVE-2019-11510, an arbitrary file reading vulnerability in Pulse Connect Secure
  • CVE-2018-13379, a path traversal flaw in the FortiOS SSL VPN web portal.

Researchers Meh Chang and Orange Tsai at Taipei City, Taiwan-based consultancy Devcore reported the flaws to Fortinet on Dec. 11, 2018, and to Pulse Secure on March 22, 2019.

In an August 9, 2019 blog post the Devcore researchers recapped their Black Hat 2019 demonstration. Tsai told TechCrunch in an email, “The SSL VPN is the most convenient way to connect to corporate networks … it’s also the shortest path to compromise their intranet.

Pulse Secure VPNs

Pulse Secure logoPrivately held California-based Pulse Secure released an update on April 24, 2019, to address these flaws and urged customers to upgrade all affected products “as soon as possible.” The vendor warned that aside from patching, no workaround would protect systems, “Multiple vulnerabilities were discovered and have been resolved in Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS).

Cyber threat intelligence firm Bad Packets has warned about activity aimed at vulnerable Pulse Connect Secure endpoints. So far they have found nearly 15,000 Pulse Secure VPN endpoints vulnerable to CVE-2019-11510 across all sectors of the U.S. This includes:

  • U.S. military networks,
  • Hospitals,
  • Electric utilities,
  • Financial institutions, and
  • Fortune 500 companies.

Fortinet VPNs

Fortinet logo

Fortinet (FTNT) released a security advisory on May 24, 2019, to address these flaws and urged customers to update their firmware to safeguard themselves. In a blog post, the Devcore researchers wrote about the flaws they’d found in Fortinet devices, “In the login page, we found a special parameter called magic. Once the parameter meets a hardcoded string, we can modify any user’s password.”

Independent British security researcher Kevin Beaumont told BankInfoSecurity he was tracking attacks against Fortigate servers. Beaumont reported seeing “the Fortigate SSL VPN backdoor being used in the wild” against one of his honeypots.

ZDNet claims the number of vulnerable FortiGate VPNs is believed to be in the hundreds of thousands, although we don’t have an exact stat about the number of unpatched systems that are still vulnerable to attacks.

rb-

This isn’t the first time that serious flaws have been found and patched in enterprise-grade networking gear. In 2016 researchers found a vulnerability in Fortinet’s FortiGate OS – that functioned as an SSH backdoor and researchers found an authentication bypass flaw in Juniper Networks (JNPR) ScreenOS firmware.

Patch your systemsIn April 2019, U.S. Homeland Security issued a warning about vulnerabilities in many major corporate VPN applications. The VPN apps from — Cisco (CSCO), Palo Alto Networks (PANW), Pulse Secure, and F5 Networks (FFIV)— improperly store authentication tokens and session cookies on a user’s computer.

Obviously, there is no time to waste: firms should update their vulnerable Pulse Connect Secure SSL VPN and Fortigate SSL VPN installations as soon as possible.

Security researcher Kevin Beaumont told BankInfoSecurity:

Lots of companies have the basics around patching Windows and Linux down, as they have vulnerability management platforms and agents … Those don’t extend to FortiOS and Pulse Secure. So they just don’t patch as they never see [vulnerabilities].

Maybe firms should get their VPN devices on a regular update schedule before they become Virtual Pwnd Networks.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

8,200,000,000 Data Breaches

8,200,000,000 Data Breaches2019 is on pace to be the worst year ever for data breaches. If things continue at the same pace 8.2 billion records will be exposed by the end of 2019. The threat intelligence firm Risk Based Security reports that during the first half of 2019 over 4.19 billion records were exposed in 3,813 reported breaches between January and July 2019.

Risk Based Security logoThose numbers work out to more than 20 data breaches a day. Eight mega-breaches that exposed more than 100 million records were reported. These web-based breaches were primarily the result of leaving databases accessible to third parties and failing to protect them. Forbes reports that these misconfigured databases and services accounted for 149 of the 3,813 incidents reported this year. According to Forbes, the mega-breaches exposed over 3.2 billion records and accounting for 78.6% of the total records exposed in the first half of 2019.

Largest data breaches

The 10 largest data breaches for the first half of 2019 are:

  1. Verifications.io (982 million),
  2. First American Financial (885 million),
  3. Cultura Colectiva (540 million),
  4. unknown organization in India  (275 million),
  5. unknown organization in China (202 million),
  6. Dubsmash (161 million),
  7. Canva (138 million),
  8. Justdial (100 million),
  9. Mobile Drip (80 million), and
  10. Unknown U.S. firm (80 million).

The Verifications.io, First American Financial, and Cultura Colectiva breaches are ranked among the top 10 breaches of all time based on the number of records exposed.

Database securityConsumer Affairs says the Verifications.io, an email marketing company whose misconfigured database exposed 982,864,972 names, addresses, and Facebook, LinkedIn, and Instagram accounts. The information associated with the breach includes email addresses, dates of birth, phone numbers, fax numbers, genders, IP addresses, and personal mortgage amounts. As a result of the incident, Verifications.io has ceased operations.

If you’ve bought a house, particularly in California, another breach may impact you. First American Financial Corporation exposed 885,000,000 records. Consumer Affairs writes that exposed data included real estate closing transaction records that contained names, Social Security numbers, phone numbers, email and physical addresses, driver’s license images, banking details, and mortgage lender names and loan numbers.

Other interesting data breach infobits

  • The number of breaches also reached a new high during the first half of 2019.
  • The average number of records lost per leak was just 230.
  • The majority of breaches had a moderate to low severity score and exposed 10,000 records or less.

Thankfully RBS says more critical data was less commonly stolen during attacks.

  • Electronic recordsSocial Security numbers were stolen in 11% of attacks,
  • Addresses were stolen in 11% of attacks,
  • Account numbers were stolen in 10% of attacks,
  • Birth dates were stolen in 6% of attacks,

The sectors impacted

  • Healthcare 224 breaches,
  • Retail 199 breaches,
  • Finance and insurance 183 breaches,
  • Government and information 160 breaches each, and
  • Education 99 breaches..

Inga Goddijn, executive vice-president at Risk Based Security told ComputerWeekly.com,

It is hard to be optimistic about the outlook for the year … The number of breaches is up and the number of records exposed remains stubbornly high. Despite best efforts and awareness among business leaders and defenders, data breaches continue to take place at an alarming rate.

Phishing

Phishing

Phishing is a tried and tested first step for gaining access to systems and services, the report said. The phished data can be used to perpetuate attach. The most frequently stolen data are email addresses and passwords. These credentials are valuable to attackers because they can be used across multiple domains (because we know users don’t use unique IDs for each account) for credential stuffing. These credentials can also be changed by the attacker (or the Owner). The report points out that 70% of the known breaches included email addresses and 65% included passwords.

Phishing can also lead to other critical but less monetized data. The report said phishing can lead to the exposure of unusual or unexpected types of data, including electronic signatures, calendars, marriage certificates, and company-issued employee ID numbers, all valuable for social engineering or spear-phishing attacks.

rb-

Script babyBusinesses need to get their security act together – they were responsible for over 2/3’s of the breaches by RBS. The garden variety cyber-criminal is a script-kiddie who will run automated scripts looking for unsecured databases in order to scrape up any data they can. The big breaches make the headlines, but the everyday incidents make the money for most attackers.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.