Lazarus Alliance Receives Accreditation as FedRAMP 3PAO

IT Cyber Security and GRC firm becomes authorized to validate Cloud Service Providers to new FedRAMP standards

Today, Lazarus Alliance Inc. announced that it has achieved accreditation as a FedRAMP (Federal Risk and Authorization Management Program) Third Party Assessment Organization (3PAO).

Lazarus Alliance Receives Accreditation as FedRAMP Third Party Assessment Organization

The FedRAMP program supports the U.S. government’s objective to enable U.S. federal agencies to use managed service providers that enable cloud computing capabilities, and Lazarus Alliance is one of the few accredited 3PAO firms in the world with this designation. With this certification, Lazarus Alliance is the only assessment firm authorized to conduct assessments for the federal government (3PAO), the Health-care industry (HIPAA, HITECH, Meaningful Use, NIST 800-66), the Payment Card Industry (Qualified Security Assessor), the Service Provider industry ((SSAE 16 (SOC 1), AT 101 (SOC 2), SysTrust / WebTrust (SOC 3)), NERC CIP, the Public sector (SOX 404), and advisors in ISO 27001, 27002, 27005 using the formidable combination of the IT Audit Machine (ITAM) and our Cybervisors.

FedRAMP provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. As a part of the FedRAMP process, cloud service providers (CSPs) must use a FedRAMP approved third party assessor to independently validate and verify that they meet the FedRAMP requirements.

“Even taking a pragmatic approach, the cloud raises a plethora of cyber security concerns for any business,” said Michael Peters, CEO at Lazarus Alliance. “For government agencies, these concerns can be even more sensitive since national security can be at risk and as the largest employer in the world, it goes way beyond that. The 3PAO accreditation further confirms Lazarus Alliance’s expertise in cloud cyber security, risk assessments and we look forward to working with CSPs around the world on their FedRAMP initiatives toward receiving an authority to operate (ATO).”

Lazarus Alliance is one of the very few organizations worldwide to obtain this classification as an inspection body to assess cloud systems for the federal government. FedRAMP is the first United States government-wide program that provides a standardized approach to security assessment, authorization and continuous monitoring for cloud-based services. In order to receive accreditation, Lazarus Alliance demonstrated an advanced level of technical proficiency and compliance experience. According to the A2LA, the “assessment process involves a rigorous evaluation of technical competence of the 3PAOs as well as an assessment of their compliance with international standards.”

Receiving the accreditation of 3PAO means Lazarus Alliance will be able to validate the security and control implementations that CSPs must provide in order to work with and provide cloud services to federal agencies. 3PAOs are critical to the FedRAMP program, as they demonstrate the independence and competency of CSPs that host the government’s most crucial data.

In addition to demonstrating the requisite technical competency in FISMA and independence and quality management to achieve 3PAO accreditation, Lazarus Alliance has diverse leadership experience in additional vital audit & compliance fields, risk assessment & management, and governance & policies. Lazarus Alliance staff members are heavily experienced in those respective industry regulations and are located across the United States.

Inquiries for FedRAMP services can be made with Lazarus Alliance at 877-896-7580 or at https://lazarusalliance.com/services/audit-compliance/fedramp/

[wp-booklet id=1442]

About Lazarus Alliance

Lazarus Alliance is a leading, independent information technology Security, Governance, Risk and Compliance (IT GRC) firm that provides IT Audit & Compliance, Risk Assessment & Management, Governance & Policies, and Cybervisor supported solutions. Founded in 2000, Lazarus Alliance is a proud veteran owned business and has been passionately on the cutting edge of IT security, risk, privacy, governance, cyberspace law and compliance leadership, innovation and services provided to the global community. With significant contributions and innovations such as the IT Audit Machine, The Policy Machine, Cybervisor, Continuum GRC, SafetyNET, the Holistic Operational Readiness Security Evaluation (HORSE Project)®, the Security Trifecta, Your Personal CXO, and other progressive initiatives, it’s no wonder that Lazarus Alliance has become a leading international name synonymous with incorruptible leadership, meaningful services, exceptional customer support and tangible innovations all specifically to prevent negative press and damage to our client’s companies, their shareholders, employees and customers. Lazarus Alliance’s primary purpose is to help organizations attain, maintain, and demonstrate compliance and information security excellence, in any jurisdiction. Contact us and learn more about Lazarus Alliance and why Lazarus Alliance is Proactive Cyber Security.

 

DNC Email Hack Highlights Need for Proactive Email Security

A Proactive Approach Could Have Prevented the DNC Email Hack

The NSA isn’t the only Washington organization being embarrassed by a data breach. The sorry state of cyber security in America has taken center stage in this year’s presidential election. In June, it was discovered that Russian cyber criminals had managed to hack the Democratic National Committee’s email server, stealing over 20,000 emails and sharing them with WikiLeaks. While most of the emails contain mundane correspondence, some of them are quite embarrassing and imply possible ethical violations on the part of DNC insiders, such as emails questioning Bernie Sanders’ religion and implying the party officers wished to derail his campaign. Shortly after the emails were released, the DNC’s chairperson, CEO, and communications director abruptly resigned. Even worse, the New York Times has revealed that the DNC email hack might be much more extensive than originally believed, involving the email accounts of over 100 individuals and groups.

DNC Email Hack Highlights Need for Proactive Email Security

The DNC email hack bears a strong resemblance to the equally scandalous email hack perpetrated on Sony Pictures two years ago, which was believed to have been carried out by North Korean nation-state hackers. That hack involved the release of 170,000 emails, many of them containing negative commentary about major Hollywood stars. Sony’s chairperson was removed, the company ended up being sued, and the emails are still live on WikiLeaks, neatly indexed and searchable.

While the Sony hack and the DNC email hack involved ethical and privacy violations, the release of corporate emails can damage an organization even if the employees in question did nothing wrong. Confidential information about new product launches, marketing strategies, and partnership negotiations are routinely discussed via email, and this information could destroy a company if it fell into the hands of a competitor.

Proactive Ways to Prevent Email Hacks

Both the Sony hack and the DNC email hack could have been prevented using proactive email security measures. Following are three things your company can do to prevent your emails from ending up on WikiLeaks – or in the hands of a competitor.

Train Your Employees How to Spot Spear Phishing

It is believed that the Sony hack and the DNC email hack happened after hackers used a spear-phishing campaign to get hold of legitimate login credentials. Spear phishing has become extremely popular among hackers as end users have become more aware of these scams and as spam filters have gotten better at recognizing and intercepting regular phishing emails. Because spear-phishing emails are sent to only a small group of targets and are carefully researched and crafted to appear legitimate, they tend to pass through spam filters. Therefore, the best defense is employee awareness. See our previous blog for more information on how to spot spear phishing emails.

Set Up Your System to Assign Employee Passwords

Regardless of how many times they are told not to do so, employees frequently choose passwords that are weak, and they tend to use the same password to access multiple systems, including their personal and work accounts. Thus, a hacker may be able to use an employee’s Dropbox password to get into their work email. For this reason, random, strong passwords should be assigned to employees, and the system should be set up to require periodic password changes.

Outsource Your Enterprise Email

In most cases, using a private email server for company email, as the DNC did, is a bad idea. The majority of companies do not have the in-house technical expertise to securely set up an email server, continuously monitor it for unusual user behavior, or maintain up-to-date spam filters. Large enterprise email providers such as Google and Yahoo do. While using one of these providers is not a guarantee that you will not be breached – especially in light of the popularity of social engineering – a third-party provider will offer a higher level of email security than you could achieve in-house.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help secure your organization’s data.

The NSA Hack: Not-So-Covert Affairs

What the NSA Hack Says About Cyber Security in America

In a Mr. Robot episode come to life, an anonymous group of hackers calling themselves the Shadow Brokers has compromised the U.S. National Security Agency (NSA). The NSA hack involved the release of elite hacking tools used by the spy agency to conduct cyber espionage. The Washington Post reports:

A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.

The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).

“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”

The NSA hack is sending shockwaves through the cyber security industry, not just because one of the most secure systems in the world just got hacked, but also because the hack didn’t just expose government secrets; it exposed significant zero-day vulnerabilities at major U.S. corporations, including companies that, ironically, sell enterprise cyber security services.

While there are rumors that the Shadow Brokers are Russian nation-state hackers, no one knows for certain. No one knows how the Shadow Brokers managed to access the NSA’s data, either. The NSA is refusing to comment on the leak. However, since nearly all data breaches are the result of hackers getting their hands on legitimate login credentials, either through carelessness or malicious intent on the part of an organizational insider, it’s reasonable to theorize that the leak originated within the NSA. It could have been as simple as an employee clicking on a phishing email or sticking an infected flash drive into a machine.

The NSA hack also begs the question, if a covert government spy agency’s data isn’t secure, what’s the state of everyone else’s information security? From a rash of ransomware attacks on the healthcare industry, to an epidemic of tax data spear phishing schemes, to the hijacking of the SWIFT Network bank messaging system, to the Wendy’s POS data breach, to an amateur managing to hack the Houston Astros database, to information security providers being caught with their pants down in the NSA breach, 2016 has been a banner year for cyber criminals – and we’ve got four more months to go.

Rather than panicking, now is the time to ask yourself, how secure are your organization’s systems? Are you approaching your cyber security proactively, or are you taking a reactive approach, scrambling to clean up the mess once a breach has occurred? Have you been trying to handle your cyber security in-house but are struggling to keep up with all of the new technological advances and cyber security threats? Do you suspect there are hackers in your system right now, either from the outside or within your organization, but you don’t know to find and deal with them, and then keep new ones from coming in?

You’re not alone. Today’s information systems are increasingly complex, and so are the attacks that hackers launch on them. Many organizations simply do not have the resources to handle all of their information security needs in-house, and they find that scrambling to do so leaves them with lax information security while taking away time and resources from their core competency.

The NSA hack should be a wakeup call to organizations in all industries and of all sizes to reevaluate their cyber security efforts and, if they have not already done so, enlist the services of a professional cyber security firm to ensure that they are fully protected.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help secure your organization’s data.