April 2024 – Newsletter Update Part 2

We recognise that staying on top of changes to legislation and advice can be difficult. Here are some articles and alerts we’ve seen lately that we think you should be aware of, or might be interested in.

Please note that we’ve included links below to external websites. PCML consultants are not responsible for the content of any external websites.

We’ve collated the below from alerts and bulletins that we receive from UK Government agencies and others. You can find links to those sources and others on our website. We’ve linked to that page on our website at the end of this email.

Due to the volume of information to share relating to the recent quarter, we are splitting this issue of our newsletter into two parts:

  • Part 1 – Legislative changes covering Information Security, Environment, Health & Safety and Quality

  • Part 2 – Security threat and vulnerability intelligence, support for awareness raising and other information security news

Information Security

Security threat and vulnerability intelligence

This update covers the period from 1st January to 31st March 2024, but we have included any relevant information for the period to 26th April 2024.

If you are an IT professional; these articles may be directly of use to you. If you are a manager with responsibility for information security and an in-house or outsourced IT function, you may wish to check that they are aware of this advice.

Microsoft

SANS Internet Storm Centre published the following summaries of Q1’s patch Tuesday releases from :-

 Apple

Details of Key apple updates and security fixes can be found on Apple’s security updates page

 Linux, Android, Google

  • Linux xz-utils backdoor – A malicious back door was found in the data compression software library xz (versions 5.6.0 & 5.6.1). It arose from a supply-cain attack years in the making. Luckily it was found by random chance very soon after release and before it made its way in to most Distros but it may have found its way in to some distros of Fedora Linux 40 and Fedora Rawhide developer distribution. It was given the highest (10/10) CVSS severity score. Users should check to see which version of xz they have and take appropriate steps to apply an unaffected version

  • AWS Fixes Service Takeover Vulnerability

Roundup of recent posts by the National Cyber Security Centre (NCSC) and partner agencies

We missed a number of posts from Q4 2023, so this update summarises the NCSC’s last six month’s-worth of blog posts that may be of use or interest. We have attempted to categorised them by topic.

Categories

Posts (Click to view)

AI

Revolutionising identity services using AI

AI

AI and cyber security: what you need to know

AI

The near-term impact of AI on the cyber threat

AI

Introducing the guidelines for secure AI

Awareness Raising

NCSC’s cyber security training for staff now available

Cyber Essentials

Pathways: exploring a new way to achieve Cyber Essentials certification

Cyber Essentials

Cyber Essentials: are there any alternative standards?

Governance/Guidance/General Information

Cyber security governance: the role of the board

Governance/Guidance/General Information

NCSC for Startups: Playing cyber criminals at their own game

Governance/Guidance/General Information

New guidance to help small organisations use online services more securely

Governance/Guidance/General Information

What is an antivirus product? Do I need one?

Governance/Guidance/General Information

The logic behind three random words

Governance/Guidance/General Information

Penetration testing

Governance/Guidance/General Information

Migrating to post-quantum cryptography

Governance/Guidance/General Information

AIT fraud: what you need to know

Governance/Guidance/General Information

Business communications – SMS and telephone best practice

Governance/Guidance/General Information

Logging Made Easy with CISA

Governance/Guidance/General Information

NCSC to retire Logging Made Easy

Governance/Guidance/General Information

Our new principles to help make cloud backups more resilient

Governance/Guidance/General Information

Principles for ransomware-resistant cloud backups

Governance/Guidance/General Information

Mapping your supply chain

Governance/Guidance/General Information

Ransomware and the cyber crime ecosystem

Governance/Guidance/General Information

Cyber Assessment Framework 3.2

Governance/Guidance/General Information

‘NCSC Cyber Series’ podcast now available on Spotify

Governance/Guidance/General Information

QR Codes – what’s the real risk?

Governance/Guidance/General Information

Scam ‘missed parcel’ SMS messages: advice on avoiding malware

Incident Management

Responding to a cyber incident – a guide for CEOs

Incident Management

Getting started with cyber incident management

Supply Chain Management

New cyber security training packages launched to manage supply chain risk

Supply Chain Management

Mastering your supply chain

Technical/Configuration Advice

Interactive administration in the cloud: managing the risks

Technical/Configuration Advice

Check your email security, and protect your customers

Technical/Configuration Advice

New ‘Connected Places’ infographic published

Technical/Configuration Advice

Products on your perimeter considered harmful (until proven otherwise)

Technical/Configuration Advice

Protecting PBX from cyber attacks

Technical/Configuration Advice

Private Branch Exchange (PBX) best practice

Technical/Configuration Advice

Unleashing the power of cloud with containerisation

Technical/Configuration Advice

Phishing attacks: defending your organisation

Technical/Configuration Advice

Reducing data exfiltration by malicious insiders

Technical/Configuration Advice

Setting up 2-Step Verification (2SV)

Technical/Configuration Advice

Secure sanitisation of storage media

Technical/Configuration Advice

New cloud guidance: how to ‘lift and shift’ successfully

Technical/Configuration Advice

Macro Security for Microsoft Office

Technical/Configuration Advice

Securing Office 365 with better configuration

Technical/Configuration Advice

Securing your devices

 Information from the Information Commissioner’s Office and partner agencies

 Noteworthy cyber incident and breach news in the quarter

This information is provided to raise awareness of the causes of incidents and breaches, so preventative action can be taken to prevent similar breaches in your organisations. It may also be helpful to keep your awareness-raising materials up to date and build business cases for information security investment

 Highlights of new and emerging malware, techniques and other vulnerabilities in the quarter

This is not intended to be a comprehensive summary. Readers are strongly recommended to sign up for some of the more regular vulnerability news feeds available from SANS and other providers to stay abreast of emerging vulnerabilities in general and particularly those that may affect systems they use

 Other infosec news

If you would like to discuss any of the topics we have covered in this newsletter, or would like to know more about how PCML Consultants can help you with your Security, Quality, Environment, H&S and Business Continuity objectives, then please don’t hesitate to get in touch

Here are some more helpful links which may be of use