Proactive Cyber Security Can Prevent Vote Hacking

In a heated political climate, even the appearance of vote hacking could threaten our nation’s democracy.

The most contentious issue this election season may not be immigration or minimum wage laws but cyber security; specifically, the specter of vote hacking. Shortly after the discovery that the Democratic National Convention’s email server had been hacked came news that voter databases in Illinois and Arizona had been compromised, exposing the personal information of as many as 200,000 voters.

Proactive Cyber Security Can Prevent Vote Hacking

Granted, these were state voter databases, not voting machines. However, between GOP candidate Donald Trump suggesting that the election could be “rigged” and going so far as to encourage his supporters to “monitor the polls” for vote hacking, disturbing results from recent studies on voting machine cyber security, including one by Princeton researchers that found some machines to be less secure than iPhones, and another study showing that nearly all Americans are “unsettled” about data breaches in general, the American public is understandably nervous as they prepare to go to the polls.

Vote hacking isn’t an Area 51-style conspiracy theory; it is a legitimate concern that must be addressed with proactive cyber security.

Could the election be hacked?

In theory, yes. Many states use voting machines that are more than 15 years old, run wildly outdated operating systems such as Windows 2000 and XP, and, in some cases, provide no paper audit trail. Some election officials argue that these machines are generally not connected to the internet, and are therefore secure. However, isolation from the internet does not equate to security against voting hacks; malware could be installed via an infected thumb drive inserted into a machine by an intruder, a malicious insider, or even an unwitting election volunteer who fell victim to a social engineering scheme. While the logistics of manually installing malware may appear insurmountable – after all, there are tens of thousands of voting machines across the U.S. – hackers would not have to access every voting machine in America to alter the election results. They could focus their efforts on swing states, and then zero in even further to target specific voting districts where the results are expected to be very close.

Hackers could also decide not to actually tamper with votes but simply cause enough chaos to discourage some Americans from voting and plant seeds of doubt regarding the election results. For example, hackers could breach voter databases and delete or alter voter registration records, which would prevent some voters from being able to cast ballots; launch Election Night DDoS attacks on polling places that use the internet to verify voter records; or even disable media feeds and prevent news networks from accessing exit poll information and election returns.

What can election officials do to reassure the public about vote hacking?

In an effort to address the public’s concerns, Rep. Hank Johnson (D-Ga.) recently proposed the Election Integrity Act of 2016 and the Election Infrastructure and Security Promotion Act of 2016. The first bill would impose cyber security measures on voting machines, such as prohibiting the machines from being connected to the internet and requiring that they be subject to regular audits, updated frequently, and have the ability to produce a paper audit trail. The second bill would designate voting machines as part of the nation’s critical infrastructure, which would put them under the purview of the Department of Homeland Security and ensure that voting machines are treated with the same level of seriousness as the country’s power grid and water supply.

While these bills are a good starting point to address vote hacking, more needs to be done, and since the election is only a month away, election officials need to act now. In addition to voting machines themselves, voter databases and polling places must be secured. Since election officials are not information security experts, the help of qualified cyber security professionals should be enlisted to secure voter databases and polling places and ensure that Election Night is uneventful from a cyber security perspective.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.

IoT Cyber Security Threatens Consumer Adoption of Smart Devices

If IoT cyber security concerns aren’t addressed, consumers will reject self-driving cars and other smart devices

Shortly after rideshare company Uber launched a pilot test of self-driving cars in Pittsburgh, competitor Lyft made the bold prediction that most of its cars would be self-driving within five years. While it can be argued that Lyft’s proclamation is overly optimistic, self-driving cars are no longer science fiction; rapid advances in machine learning and artificial intelligence are making it possible to turn more and more everyday gadgets and machines into smart Internet of Things (IoT) devices. However, consumers have grave concerns about the cyber security issues surrounding smart cars, smart thermostats, and other smart technology, and these concerns are not unfounded. Unless IoT manufacturers can ensure that IoT cyber security is solid, the IoT market could be severely hampered or, should a wide-scale hack occur, even grind to a halt.

If IoT cyber security concerns aren’t addressed, consumers will reject self-driving cars and other smart devices

Ransomware Possibly the Biggest Threat to IoT Cyber Security

The IoT market is booming. Verizon predicts that the global market for IoT devices will grow from just under $600 billion in 2014 to $1.3 trillion in 2019. Although self-driving cars are still in their infancy, other smart devices, from fitness wearables to smart thermostats to connected insulin pumps, are ubiquitous. However, once a device connects to the internet, it immediately becomes a potential target for hackers, and IoT devices are particularly susceptible to ransomware attacks.

Recently, researchers at Intel Security discovered a vulnerability in a connected car that made it possible to install malware on the car’s infotainment system, causing the stereo to play the same song over and over. Many consumers are concerned about hackers being able to disable a smart car’s brakes or take control of its acceleration and steering. While these scenarios are possible, a ransomware attack on a smart car, which would render the car un-drivable until the owner paid a ransom, may be even more likely. Earlier this year, Hollywood Presbyterian Hospital paid a $17,000.00 Bitcoin ransom to hackers who had locked down the facility’s electronic health records. It’s reasonable to assume that a consumer who needs their car to get to work or drive their children to school may be willing to fork over several hundred dollars to a hacker, especially since trying to fix the car’s computer may cost that much or even more. If a hacker manages to disable a commercial fleet of self-driving vehicles, the affected company may be willing to pay that much per car.

The IoT cyber security threat extends to the smart home: Hackers could use ransomware to disable thermostats, security systems, even routers. Healthcare IoT cyber security is also a grave concern as pacemakers, insulin pumps, and other lifesaving devices are connected to the internet. Yet despite the gravity of the threats to connected devices, 90% of organizations have no cyber security plan to address IoT cyber security specifically, and 68% have no testing strategy for IoT devices.

Meanwhile, 58% of consumers report being “very concerned” or “highly concerned” about IoT cyber security. Smart device security isn’t just a cyber security issue; it’s a safety issue. If consumers do not feel that smart cars, smart thermostats, and other connected devices are safe, they will refuse to buy them or patronize businesses that use them. Manufacturers cannot afford to take a lackadaisical attitude toward IoT cyber security. Devices should be subjected to a comprehensive security evaluation and testing process before they are released into the marketplace, and businesses that purchase IoT devices should refuse to buy products that haven’t been proven safe.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your enterprise IoT devices.

DNC Email Hack Highlights Need for Proactive Email Security

A Proactive Approach Could Have Prevented the DNC Email Hack

The NSA isn’t the only Washington organization being embarrassed by a data breach. The sorry state of cyber security in America has taken center stage in this year’s presidential election. In June, it was discovered that Russian cyber criminals had managed to hack the Democratic National Committee’s email server, stealing over 20,000 emails and sharing them with WikiLeaks. While most of the emails contain mundane correspondence, some of them are quite embarrassing and imply possible ethical violations on the part of DNC insiders, such as emails questioning Bernie Sanders’ religion and implying the party officers wished to derail his campaign. Shortly after the emails were released, the DNC’s chairperson, CEO, and communications director abruptly resigned. Even worse, the New York Times has revealed that the DNC email hack might be much more extensive than originally believed, involving the email accounts of over 100 individuals and groups.

DNC Email Hack Highlights Need for Proactive Email Security

The DNC email hack bears a strong resemblance to the equally scandalous email hack perpetrated on Sony Pictures two years ago, which was believed to have been carried out by North Korean nation-state hackers. That hack involved the release of 170,000 emails, many of them containing negative commentary about major Hollywood stars. Sony’s chairperson was removed, the company ended up being sued, and the emails are still live on WikiLeaks, neatly indexed and searchable.

While the Sony hack and the DNC email hack involved ethical and privacy violations, the release of corporate emails can damage an organization even if the employees in question did nothing wrong. Confidential information about new product launches, marketing strategies, and partnership negotiations are routinely discussed via email, and this information could destroy a company if it fell into the hands of a competitor.

Proactive Ways to Prevent Email Hacks

Both the Sony hack and the DNC email hack could have been prevented using proactive email security measures. Following are three things your company can do to prevent your emails from ending up on WikiLeaks – or in the hands of a competitor.

Train Your Employees How to Spot Spear Phishing

It is believed that the Sony hack and the DNC email hack happened after hackers used a spear-phishing campaign to get hold of legitimate login credentials. Spear phishing has become extremely popular among hackers as end users have become more aware of these scams and as spam filters have gotten better at recognizing and intercepting regular phishing emails. Because spear-phishing emails are sent to only a small group of targets and are carefully researched and crafted to appear legitimate, they tend to pass through spam filters. Therefore, the best defense is employee awareness. See our previous blog for more information on how to spot spear phishing emails.

Set Up Your System to Assign Employee Passwords

Regardless of how many times they are told not to do so, employees frequently choose passwords that are weak, and they tend to use the same password to access multiple systems, including their personal and work accounts. Thus, a hacker may be able to use an employee’s Dropbox password to get into their work email. For this reason, random, strong passwords should be assigned to employees, and the system should be set up to require periodic password changes.

Outsource Your Enterprise Email

In most cases, using a private email server for company email, as the DNC did, is a bad idea. The majority of companies do not have the in-house technical expertise to securely set up an email server, continuously monitor it for unusual user behavior, or maintain up-to-date spam filters. Large enterprise email providers such as Google and Yahoo do. While using one of these providers is not a guarantee that you will not be breached – especially in light of the popularity of social engineering – a third-party provider will offer a higher level of email security than you could achieve in-house.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help secure your organization’s data.