{"id":178070,"date":"2015-01-27T11:03:00","date_gmt":"2015-01-27T16:03:00","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/the-nsas-infosec-tips-wont-stop-you-from-being-hacked.php"},"modified":"2015-01-27T11:03:00","modified_gmt":"2015-01-27T16:03:00","slug":"the-nsas-infosec-tips-wont-stop-you-from-being-hacked","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/the-nsas-infosec-tips-wont-stop-you-from-being-hacked.php","title":{"rendered":"The NSA&#39;s infosec tips won&#39;t stop you from being hacked"},"content":{"rendered":"<p><p>    Earlier this month, the NSAs cyber security wing released its    best practice guide to defending against destructive malware    - presumably with one eye on the beleaguered Sony bosses who    continue to deal with the fallout from the companys     high profile hack.  <\/p>\n<p>    The report (PDF)    focuses on cost-effective countermeasures that can be easily    established in your organisation to make life more difficult    for the average attacker.  <\/p>\n<p>    Starting with controls such as segregation of networks,    protection and restriction of the use of administrative    privileges, and whitelisting authorised application execution    on your systems, the tips aim to circumvent the damage cyber    bad guys can do.  <\/p>\n<p>    But is the NSA's new fact sheet just wishful thinking from the    US spy agency? Would any of this information have stopped    something like the Sony attack from happening?  <\/p>\n<p>    I have scoured the content of the document in search of    anything new. I didn't find it.  <\/p>\n<p>    None of this is groundbreaking advice (and none of it should be    new to the security team at Sony).  <\/p>\n<p>    The NSA best practice controls will already be familiar to    anyone following our own Australian Signals Directorate (ASD)    guidelines on attack mitigation strategies, including its    highly regarded     Top 4 Strategies to Mitigate Targeted Cyber    Intrusions-a mandatory requirement for    government departments adhering to the Protective Security    Policy Framework (PSPF).  <\/p>\n<p>    Whitelisting, reduction of administrative privileges and a    comprehensive approach to patching feature heavily in the ASDs    top four. Its     top 35 adds even more defensive measures that can be    implemented to protect your organisation.  <\/p>\n<p>    Nearly all of the mitigations listed in the NSA document - such    as the use of Microsofts Enhanced Mitigation Experience    Toolkit (EMET) and subscribing to cloud-based reputation    services - are also covered in the ASD documentation.  <\/p>\n<p>    As a result I was rather disappointed with this latest effort    from the NSA. Realistically, the only valuable advice in this    document is a warning for organisations to prepare for the    worst.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.itnews.com.au\/BlogEntry\/399706,the-nsas-infosec-tips-wont-stop-you-from-being-hacked.aspx?utm_source=feed&utm_medium=rss&utm_campaign=iTnews+\/RK=0\/RS=tm8vt0ZpOmKPpFmUmbMPB9ZqFWY-\" title=\"The NSA&#39;s infosec tips won&#39;t stop you from being hacked\">The NSA&#39;s infosec tips won&#39;t stop you from being hacked<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Earlier this month, the NSAs cyber security wing released its best practice guide to defending against destructive malware - presumably with one eye on the beleaguered Sony bosses who continue to deal with the fallout from the companys high profile hack. The report (PDF) focuses on cost-effective countermeasures that can be easily established in your organisation to make life more difficult for the average attacker.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/the-nsas-infosec-tips-wont-stop-you-from-being-hacked.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-178070","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/178070"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=178070"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/178070\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=178070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=178070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=178070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}