RSS

Monthly Archives: July 2017

Into The Cloud 9

 

Dear All,

I’ll be presenting a life inspired webcast series – Into The Cloud 9 where I will share my life experiences and present my journey through the various phases of my life where I did things further than the customary to leave a mark. The webcasts will walk through my phases in life where I lead charge and drove beyond the usual being an author, a speaker, an evangelist, and an artisan at work; breaking the traditional notions and creating a wealth of information. These webinars are crux of life turning events that I went through; creating opportunities for myself and leading others on a path to leave their legacy – as I would leave one; beyond my existence.

Most people feel (if not say) that they wish to leave some sort of legacy in life. The interesting part is that, even if they don’t say it; there is usually some sort of desire – almost always. Its human nature that we all want to be remembered because being remembered means that our lives had meaning and significance to someone other than ourselves.

People such as authors, speakers, musicians, artists, inventors, and such leave legacies through their bodies of work. But it’s only those who push the bounds beyond the ordinary and challenge the traditions, confines, and status quo of their respective fields of work or their industry; are usually not forgotten because of their boldness and innovation. I’ve pushed the bounds, and I know what it is like to be on the top of a summit.

I love spreading my knowledge about my industry to the masses by my blog, my posts on social media, and most importantly, by my books. How many people you run into have written articles; let apart books? How many would ever want to because it consumes social and personal life to be dedicated to such a noble cause? In the end, those who do or even wish to, I help them wherever possible; in all ways I can.

I am who I am, and I can only change for myself and those around me for betterment of our life because, it’s my passion to guide people into things that are not comfortable however, bear the sweetest fruit when endured. When I speak, I don’t sugar coat things and tell my audience the truth, whether they like it or not it’s their choice. And, by doing it as I gain the respect of thousands of people every year, so can you!

I take risks whenever I can because I know, without risks – there are no rewards. Everyone thinks differently and I admire people who decide that they need to step out and get it done because; they are the ones who make a mark and leave a legacy.

It’s all about leaving a legacy for without one – you were just one of 6 billion people on this planet, who would live and die without being known for anything apart from living a normal life. Your legacy may not be all weighed in coins; but in what you did at large to impact the society; especially the people in your genre, line of business, or community. Be remembered for something, beyond being recognized for being someone!

If you think this is of value to you or someone you know please join me in my journey and realize the untapped potential and lead a life extraordinaire!

The webcasts are being hosted by http://experience4live.com and you can register (or refer others to) at  http://experience4live.com/product/into-the-cloud/

With Regards,

Akhil Behl

Advertisements
 
Leave a comment

Posted by on July 2, 2017 in Events

 

Don’t be ‘Petyafied’!

Image result for petya check point

Just when the world was recovering from the crisis caused by wannacry – there’s yet another bump in the wire and this time its far more serious than its predecessor. Yes, its’ PETYA.

** By predecessor it’s implied a ransomware although there’s minimal to no relation between these two

First things first – Petya looks like an attempt in all muscle and power to bring down ‘Ukraine’. There’s already mounting evidence that Petya’s focus on Ukraine was deliberate. The initial attacks were limited to just a few specific infections, all of which seem to have been targeted at Ukraine. The highest-profile one was a Ukrainian accounting program called MeDoc, which sent out a suspicious software update Tuesday morning that many researchers blame for the initial Petya infections. Attackers also planted malware on the homepage of a prominent Ukraine-based news outlet, according to one researcher at Kaspersky.

Underline is – The attackers had complete control over where they planted Petya (at least initially) and they chose to plant it in some of the most central institutions in Ukraine.

Now, let’s get to the nuts and bolts of this new kid on the block.

How Petya commences and proceeds?

Petya takes over computers of its victims and demands $300, in Bitcoin. It spreads rapidly across an organization once a computer (first in the organization – known as patient zero) is infected using the EternalBlue vulnerability in Microsoft Windows (Microsoft has released a patch, but not everyone will have installed it) or through two Windows administrative tools. The malware tries one option and if it doesn’t work, it tries the next one. “It has a better mechanism for spreading itself than WannaCry,” said Ryan Kalember, of cybersecurity company Proofpoint. However, unlike WannaCry, ‘Petya’ tries to spread internally within networks, but not seed itself externally.

How to temporarily and permanently stop the infection?

The ransomware infects computers and then waits for about an hour before rebooting the machine. While the machine is rebooting, you can switch the computer off to prevent the files from being encrypted and try and rescue the files from the machine. This is a temporary and corrective measure. For a permanent and preventive approach, make sure the Windows OS is patched with latest patches from Microsoft and you AV/HIPS or host firewall software are updated to protect against this threat.

What if my system is already infected and encrypted?

If your system reboots with the ransom note, please don’t pay the ransom – the attacker’s email address has been shut down by the email provider so there’s no way to get the decryption key to unlock your files anyway. The best way to move forward is to disconnect your computer from the Internet, reformat the hard drive and restore your files from a backup.

** Backing up your files regularly and keep your anti-virus software up to date are highly recommended.

What software can I use to protect against Petya?

One of the post popular host firewall and AV solutions is Zonealram https://www.zonealarm.com/

If you already have any AV software make sure to update. Windows updates as mentioned earlier will help prevent the infection.

It’s one thing about individual PC’s however, what can I do to protect my Enterprise wide network?

Well, there are a couple of ways to offer preventive defense. One is, to segment your network (normal subnet based or micro segmentation using SDN) so to protect critical systems from other user facing systems. This also offers capability to protect between the layers of network, storage, compute and so on within your private DC or your cloud ecosystem. Checkout Check Point’s vSEC solution https://www.checkpoint.com/products/vsec-virtual-edition/

The other approach is to have your existing or new firewall gateways to offer Advanced Threat Protection (ATP) as well as endpoint agents offer advanced Sandboxing and on the host defense capabilities. Checkout https://www.checkpoint.com/products-solutions/zero-day-protection/ and https://www.checkpoint.com/products-solutions/threat-intelligence/

Hope this article helps you be protected from nasty threats and conduct business as usual.

 
Leave a comment

Posted by on July 1, 2017 in Cyber Security

 

Tags: , , ,