CISA Releases Best Practice Guidance for Mobile Communications (www.cisa.gov)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 19 Dec 12:13
https://sh.itjust.works/post/29712034

#cybersecurity

threaded - newest

Telorand@reddthat.com on 19 Dec 14:19 next collapse

  1. Do not use a personal virtual private network (VPN). Personal VPNs simply shift residual risks from your internet service provider (ISP) to the VPN provider, often increasing the attack surface. Many free and commercial VPN providers have questionable security and privacy policies. However, if your organization requires a VPN client to access its data, that is a different use case.

Nice try, fed! We all know how trustworthy ISPs are. While I’m at it, why don’t I just install a backdoor for you? Maybe add a keylogger, as a treat?

Most of the advice is prescient, but this one is just stupid.

faebudo@infosec.pub on 21 Dec 15:33 collapse

There are so many VPN providers selling your data, being operated by the feds, operated by cybercriminals etc. it really doesn’t matter just as said in 8.

scytale@lemm.ee on 19 Dec 14:50 collapse

  1. Migrate away from Short Message Service (SMS)-based MFA

Then they should force banks and other financial institutions to actually implement it. Migrating away from SMS MFA doesn’t work if the service provider doesn’t offer it as an option in the first place.