Connect with us

Features

Managing Ransomware

Yuri Kogan (left) and Zev Cohen

By YURI KOGAN and ZEV COHEN of Ergo Oriens Crisis Management 

In the ‘All Connected World’ ransomware attacks gain traction. Criminals constantly improve at monetizing their access to your network & data. They target an organization, lock up the data, and then demand money hundreds of thousands of dollars or more – in exchange for releasing it to be paid in untraceable crypto- currency. Sometimes, restoration of data from backups is possible. Bypassing the encryption is also an option, but in many cases the bad guys find and destroy backups and use state-of-the-art encryption. The attackers often create backdoors to allow future infiltrations easier, so this may not be the last time you hear from them. 

 

 

 

 

What can be done? What should be done? Should you pay? And what happens when the ransom is paid? What are the guarantees the perpetrators intend to hold up their end of the deal? And how do you know that whoever just propelled your business into the stone age can actually bring it back? 

Ransomware attacks are automated but certainly NOT automatic. Humans stand behind these attacks, and as this is the issue professional crisis managers and negotiators, together with an experienced technological incident response team (IRT) can minimize loss and expedite the safe return of the organization to normal operations. 

Ransomware negotiations are similar to business negotiations. Similar but not the same. Timing is crucial and simply playing for time may mean the attacker will stop responding and turn to the next, more responsive, victim, leaving you with your system beyond reach. Having said that doesn’t mean the victim should rush forward and immediately pay the ransom. Time is of the essence and should be skillfully used to explore possible ways to communicate with the perpetrator. In parallel the IRT carefully assesses the situation from a technological point of view, bringing into account possibilities of overcoming the attack and resuming operations by using technological means alone. 

A professional multi-disciplinary ransomware management team will navigate to the most suitable alternative, gain knowledge on the perpetrators and bring you back to safety while minimizing your losses. Using tested and proven after-action- 

debriefing techniques the team will significantly improve the victim’s defenses and heighten the odds this will not happen to you again. 

Are there preset protocols to follow? A list of Do’s and Don’ts? Well, ransomware attacks differ, but there are some rules of the thumb to follow. 

The first and foremost advise would be – BE PREPARED. This means businesses should follow best practice protocols to defend and preserve their IT environment. Backing up data, constantly monitoring the system and the threat environment either by in-house (less likely to be done by small and medium businesses) or outsourced experts, conducting drills, penetration tests and generally educating the employees to the cyber-threat and the ways to mitigate it. Purchasing a cyber- incident insurance plan is a prudent step to take. 

As all hell breaks loose, an internal assessment of the situation and checking for existing backup files and their integrity should be the first thing to do. Unfortunately, many businesses do not follow best practice methods and therefore are more vulnerable to increased damage. The possibility of the attack being internally motivated should also be looked into, but this should not be the focus of the victim’s attention. Some of these processes could be performed by an internal IT team, but the best option would be to contact an experienced cyber-incident response team (IRT). For most businesses running an internal IRT team is an expensive and mostly unnecessary function. It is worth mentioning that the internal IT team will usually specialize in the routine maintenance and operation of the IT environment while a seasoned IRT continuously monitors, researches and deals with ransomware attacks. 

The next point would be to establish a communications route to the attackers. Often the attackers give an anonymized communication line to the victims over which to guide them in the process of ransom payment, as this requires crypto- currency knowledge, that most people do not routinely have. 

Once communications are established, the ransom negotiator will try to verify the attacker’s ability to make the highjacked data available again. This is crucial, as experience shows that some attacks are initiated by inexperienced attackers using questionable tools and scripts capable of hijacking the data but not of bringing it back. 

Next, the negotiator will initiate a communications exchange with the attacker, aiming to reduce the ransom price. This should be done in sync with the IRT experts, using the time to explore every alley, street and avenue to restoring system functionality without actually paying the ransom. 

The decision of whether to pay the ransom or not should be made by top level management, taking into account not only the ability to independently restore the IT environment but also the time it would take, as for most businesses having their IT systems inoperable means financial bleeding that should be minimized. Not least of all, senior management can consider the impact of ransom payment on the financial soundness of the company. This would be also be the place to mention that in some jurisdictions paying ransom to stop a ransomware attack could be considered illegal, or at the least regulated by the authorities. An experienced legal counsel should be consulted about navigating this issue. 

When the victim’s IT environment is brought back to a functional state and the incident declared closed, it would be high time to conduct an after-action-review. When conducted by experienced professionals as a transparent process aimed at minimizing the chance of future attacks and improving robustness. Rather than punishing stake holders for past mistakes, the review highlights organizational strengths to preserve, and vulnerabilities to mend, resulting in improved means and processes that protect against, and when necessary, minimize future losses to cyber incidents. 

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Features

The Magic of DNA

By GERRY POSNER This is my story, but it just as easily could have been yours. Even at my older age, a new relative popped into the family. This was unexpected to me and the whole family and indeed the new family member as well.

Put the blame on or credit to DNA. What transpired I suspect is happening all over the world these days. That is, there is now a new first cousin in the family. Call her KBP. It seems that KBP took a test through ancestry.com not that long ago, just as I had done years ago. When you take the test, you end up receiving messages from Ancestry from time to time identifying people who have similar genetic markers to you, some closer than others. I have looked at these messages and have identified people I know to be my cousins just from the initials. However, most of the initials listed are completely unknown to me. These lists of relatives go on for pages and pages. I struggle with the value of trying to reach these distant relatives because, even if I can connect with any of them, no one can figure out just how we are related. What would we even talk about should we ever meet? Often, I just ignore the lists as there seem to be too many names to contemplate a possible contact.

As it turned out, KBP also took the same test with the same company, ancestry.com. But she also failed to notice a connection between her and anyone else. This story would have ended there but for the intervention of another cousin who also had taken the DNA spit test with Ancestry. This cousin spotted the relationship and alerted me. Once that occurred, we established a connection and then the rest of this story developed.

What took place some almost seventy years ago was the cause of this new relationship. Recall ( and this is particularly relevant to young readers) the decade of the 1950s was an era when abortion, though present, was in back lanes or in the shadows. Most of the time a child born out of wedlock was put up for adoption. In this case, an uncle and his then non-Jewish partner elected to put the child up for adoption and she was adopted into a family located in Alberta where she grew up. That would have been the end of the story – but for DNA.

My new cousin was ecstatic to find out about the whole new family she was now a part of and whose history was now hers. Even though she is now a Mormon, she was eager to explore her Jewish origins and indeed even came with me and my wife to synagogue at the Beth Tzedec Synagogue in Calgary not that long ago. She had much in common with the family. Most of all, she was so happy to delve into a past previously unknown. On the other hand, her birth mother, still alive at 93, rejected meeting her daughter from so long ago. KBP respects that view and has made peace with just her new association with Dad’s family.

Of course, what made this secret such a well kept secret for so long is that the uncle died young and never told anyone. Who then could have known? The truth is out and I, for one, am glad it is now out there. Not everyone in my family agrees with me, but the main protagonist in this tale, KBP, was supportive of my writing this article. Of course, the real test now is to see if and how this new relationship with KBP unfolds, if at all.

As I said in the beginning, this is not an isolated story. You can bet there are hundreds, maybe thousands of such stories out there waiting to be unearthed and told. It is all about DNA.

Continue Reading

Features

Kevin Leach and the Sabre Training Advisory Group: Providing training assistance to the Ukrainian military

Kevin Leach, founder of Sabre Advisory Assistance, in Ukraine

By MARTIN ZEILIG As a private citizen, Kevin Leach is following the example of the Government of Canada by providing much needed assistance to our democratic ally, Ukraine, in its fight against the unprovoked war of aggression launched by Russia on February 24, 2022.
Mr. Leach, who grew up in Palgrave, Ontario and lived in Toronto before moving to Ukraine, is the founder of the Sabre Training Advisory Group, a not-for-profit organization geared towards providing training assistance Ukraine’s military. He is a 10-year veteran of the Canadian Armed Forces, and served as an OSCE ceasefire observer in Ukraine from 2018 until the full-scale invasion in February 2022.
He founded the STAG in November 2022.
“Since the beginning of 2022, Canada has committed $4 billion in military assistance to Ukraine,” says the Government of Canada website.
“This funding will allow Canada to deliver military assistance to Ukraine through to 2029. We deeply admire the bravery and courage of Ukrainians who are fighting to defend their independence and freedom, and we will continue to work closely with our Allies and partners to help Ukraine defend its sovereignty and security Canada and Ukraine are close partners with a long-standing defence relationship.”

Ukrainian military personnel at a training session in Ukraine


As well, Operation (Op) UNIFIER, the Canadian Armed Forces (CAF) military training and capacity building mission in Ukraine, “was launched in 2015 at the request of the Ukrainian government,” and in 2023, was expanded and extended until March 2026.
“Since the start of Op UNIFIER, the CAF has trained approximately 41,000 Ukrainian military and security personnel in battlefield tactics and advanced military skills,” says the online information.

Ukrainian military personnel with a member of Sabre Training Advisory Group


“As the mission progressed, much of the direct training undertaken by CAF members transitioned to members of the Armed Forces of Ukraine, with Canadians acting as advisors and mentors as well as assisting in the development of courses.”
“Ukraine’s fight is a fight for international law, for the United Nations Charter, and for innocent civilians, including children, who deserve to live in peace,” Prime Minister Justin Trudeau says on his website.
Besides military aid and training, Canada has also provided significant economic support, and humanitarian assistance to Ukraine, and has welcomed tens of thousands Ukrainian refugees fleeing the war into our country.

A Canadian instructor training Ukrainian military personnel
in battlefield first aid techniques-1


Mr. Leach, who is a frequent guest on the Mriya Report, a 24/7 site on X that provides in-depth information on the war, agreed to an email interview with this reporter.
Q: What was your motivation in forming STAG?
KL: Sabre is a professional military training non-profit. Our aim is to give Ukrainian defenders the skills to come home alive. We are building the capacity for Ukraine to defend itself against Russian aggression.
Sabre Training Advisory Group grew out of the frustrations its founding members had with the chaotic and unprofessional way that many foreign instructors were attempting to train Ukrainian soldiers in the NATO and Allied style of warfare.
Q: Who else works with you in the STAG?

KL: We have a team of volunteers from all over the world. They are former soldiers from Canada, the US, UK, and even Australia, plus our local Ukrainian volunteers. Our executive staff, besides myself, are two former officers from the British Army and US Marine Corps, respectively.

Q: Do you work closely with the Government of Ukraine or Ukraine’s military and/or the Canadian Armed Forces?

KL: We don’t work closely at this time with any civilian government, but we have an official partnership with the 4th Rapid Reaction Brigade “Rubizh”. As we’re still a relatively small organization, we don’t warrant much attention from governments.

Q: What else that you would like the public to know about your work?

KL: Training inside of Ukraine is vital. It is far more efficient than moving large numbers of Ukrainian troops around Europe, and being here puts us closer to the action, and allows us to adjust faster to lessons learned on the battlefield. We also need support! It is hard to fund a program like ours, as it’s quite unique. Typically the role we are filling would be performed by private military contractors, which are illegal in Ukraine and carry severe political risk due to public perception of these companies.

We set out to establish a high standard, using proper training techniques and taking a systematic approach to instruction. In just a few short months we were able to secure a high-quality training area, and a team of excellent instructors who draw on decades of collected military experience. We have successfully trained over 3000 Ukrainian warriors and medics, equipping them with essential skills and knowledge to excel on the battlefield. Our track record of tangible results demonstrates our commitment to the mission and the decisive impact on Ukrainian defenders.

For further information, visit the STAG website: www.sabretag.org

Continue Reading

Features

Exploring 8 Innovative New Services in In-Home Care

In-home care has evolved significantly in recent years, driven by advancements in technology, changing demographics, and an increased focus on personalized care. These innovative services are transforming the way support is delivered, enhancing the quality of life for seniors and individuals with disabilities. Here are some of the most exciting and groundbreaking innovations that families can depend on when it comes to their space and the best practices to ensure comfort and safety.

Telehealth and Telemedicine

Telehealth and telemedicine have revolutionized health care by providing remote access to services. Through video consultations, seniors and caregivers can communicate with doctors, nurses, and specialists without leaving their homes. This reduces the need for frequent visits to health facilities, which can be challenging for those with mobility issues. Telehealth also enables continuous monitoring of chronic conditions, allowing providers to adjust treatments promptly and prevent complications.

Remote Monitoring and Wearable Devices

Wearable devices and remote monitoring systems are becoming essential tools. These devices can track vital signs such as heart rate, blood pressure, and oxygen levels, providing real-time data to caregivers and health professionals. Advanced systems can detect falls, monitor medication adherence, and even predict health issues before they become severe. This proactive approach allows for timely interventions, improving outcomes and enhancing the safety of in-home recipients.

Virtual Companionship and Social Engagement

Loneliness and social isolation are significant concerns for seniors living at home. Virtual companionship services, such as those provided by robots or virtual assistants, offer interaction and engagement to mitigate these issues. These technologies can remind individuals to take their medications, guide them through exercises, and provide cognitive stimulation through games and conversations. Additionally, platforms that facilitate virtual social gatherings and activities help seniors stay connected with family and friends, promoting mental and emotional well-being.

Personalized Care Plans and Artificial Intelligence

Artificial intelligence (AI) is playing a crucial role in developing personalized plans. AI algorithms can analyze data from various sources, including health records, lifestyle habits, and genetic information, to create customized strategies. These plans are tailored to the unique needs and preferences of each individual, ensuring they receive the most appropriate and effective solutions. AI can also assist caregivers by predicting potential health issues and suggesting preventive measures, thereby enhancing the overall quality of support.

Smart Home Technology

Smart technology is making it easier for seniors to live independently. Voice-activated assistants like Amazon’s Alexa and Google Home can control lights, thermostats, and appliances, reducing the physical effort required for daily tasks. Smart systems can also include sensors that detect movement, alerting caregivers if there is unusual activity or inactivity. This technology not only improves safety but also provides peace of mind for both the recipients and their families.

On-Demand and Flexible Care Services

The gig economy has introduced on-demand services to the in-home care industry. Platforms like Honor and CareLinx allow families to find and hire support quickly, providing flexibility and convenience. These services offer a wide range of options, from a few hours of assistance to round-the-clock support, accommodating the varying needs of individuals. The ability to schedule help on short notice ensures that support is available when it’s needed most. This includes teams like the one at Parners for Home Care; more on their services and support options can be found on their website: https://partnersforhomecare.ca/

Integrative Health and Wellness Programs

Holistic approaches to health and wellness are gaining traction – and for good reason. Integrative health programs combine traditional medical care with complementary therapies such as yoga, meditation, nutrition counseling, and physical therapy. These programs focus on the overall well-being of the individual, addressing physical, mental, and emotional health. As a result of promoting a balanced and healthy lifestyle, integrative health services can enhance the quality of life and prevent the onset of chronic conditions.

Enhanced Training and Support for Caregivers

Innovative training programs for caregivers are crucial in improving the quality of in-home care. Virtual reality (VR) and augmented reality (AR) technologies provide immersive training experiences, allowing support workers to practice and develop their skills in realistic scenarios. Additionally, online platforms offer ongoing education and support, helping individuals stay updated on best practices and new developments in the field. Enhanced training ensures that everyone is well-prepared to meet the diverse needs of their clients.

The Future of In-Home Care Services

The way we grow and age in comfort is rapidly changing, thanks to these innovative services and technologies. Telehealth, remote monitoring, virtual companionship, AI-driven plans, smart technology, on-demand services, integrative health programs, and enhanced training are all contributing to more personalized, efficient, and effective support. As these innovations continue to evolve, they hold the promise of significantly improving the lives of those who rely on in-home care, allowing them to age gracefully and independently in the comfort of their own spaces.

Continue Reading

Copyright © 2017 - 2023 Jewish Post & News