About cmcwplgnomg404

This author has not yet filled in any details.
So far cmcwplgnomg404 has created 116 blog entries.

Why Data Retention Policies Are Becoming a Regulatory Priority

Regulators are increasingly focused not just on what data companies collect—but how long they keep it.

Data Hoarding Carries Risk
Many organizations default to keeping everything: emails, customer records, internal files, and application logs. But retaining unnecessary or outdated data creates liability. It expands the scope of compliance obligations, increases the potential impact of a breach, and complicates legal discovery.

As cybersecurity threats evolve and regulations tighten, regulators are scrutinizing whether businesses have clear, defensible data retention policies in place—and whether they’re actually following them.

Growing Pressure Across Regulated Industries
Healthcare, finance, education, and legal services all face heightened expectations to enforce structured retention periods. HIPAA, GLBA, and state-level privacy laws increasingly require companies to dispose of personal information once it is no longer needed for the purpose it was collected.

Auditors and regulators are asking not just “What data do you have?” but “Why do you still have it?”

Elements of a Modern Data Retention Policy
An effective retention policy balances compliance, legal, and business needs. Core components typically include:

  • Defined retention periods for each category of data

  • Secure deletion protocols with audit trails

  • Clear roles and responsibilities for enforcement

  • Documentation of exceptions and review processes

These policies are not set-it-and-forget-it. They must evolve with changing laws, business operations, and technology platforms. Failure to maintain current policies—let alone follow them—can increase exposure during audits, investigations, or litigation.

A Compliance Priority, Not Just a Technical Task
Retention planning is often treated as an IT issue, but regulators view it as a compliance and governance obligation. The consequences of over-retention can be significant: higher discovery costs in legal disputes, larger breach notification lists, and more regulatory scrutiny.

Even small businesses are now expected to show that they are limiting data exposure through active retention management—not just good intentions.

Schedule Your Free Consultation Today
Want to make sure your retention policy stands up to regulatory expectations? Schedule a free consultation with our Compliance+ team.

2025-05-29T17:50:35-05:00May 29, 2025|

Why Compliance Starts Outside Your Organization

In today’s regulatory environment, your business is only as secure as the vendors you trust.

Regulatory Pressure Is Increasing—And So Are Third-Party Expectations
For many companies, compliance used to be an internal concern. But that’s no longer the case. Regulators now expect businesses to evaluate the cybersecurity posture, privacy practices, and operational resilience of every third-party vendor they work with—especially those with access to sensitive data or business-critical systems.

Whether it’s a cloud provider, software vendor, payment processor, or outsourced IT support team, the risks are real. According to the Ponemon Institute, 51% of data breaches in the last year involved a third party.

Federal and state regulations—from HIPAA and GLBA to the FTC Safeguards Rule—have updated requirements that make vendor risk management a formal part of compliance. It’s not enough to have a signed contract or a SOC 2 report on file. Companies must demonstrate they’ve done due diligence, implemented appropriate controls, and continue to monitor third-party performance over time.

Key Elements of a Vendor Risk Management Program
A mature vendor risk management (VRM) program includes several core components:

  • Initial Risk Assessments: Evaluating each vendor’s access, data handling practices, and security controls.

  • Contractual Protections: Ensuring contracts contain security obligations, breach notification timelines, and audit rights.

  • Ongoing Monitoring: Reviewing vendors annually, tracking compliance, and documenting any incidents.

  • Offboarding Procedures: Ensuring secure data return or destruction when a relationship ends.

Too often, businesses rely on outdated spreadsheets or informal processes that can’t scale—or survive an audit. And without a clear framework, even well-meaning companies can miss warning signs that a vendor poses a growing risk.

Compliance+ Helps You Build a Defensible Program
At Cost+, our Compliance+ service is designed to help you implement and maintain a vendor risk management program that meets regulatory expectations and reduces business exposure.

We assist with vendor classification, policy creation, risk assessments, and documentation—ensuring your program aligns with today’s compliance standards.

For companies without internal compliance teams, or those needing to modernize outdated processes, we provide the tools and expertise to close the gap and protect your business from third-party fallout.

Schedule Your Free Consultation Today
Learn how Cost+ can help you build a stronger vendor risk program—book your free consultation with our Compliance+ team today.

2025-05-29T17:44:00-05:00May 29, 2025|

Nation-State-Linked Attack Targets Thousands of ASUS Routers with Persistent Backdoor

A sophisticated cyber campaign is silently compromising thousands of ASUS home and small office routers, installing a stealthy backdoor that grants attackers persistent access—even after reboots or firmware updates. The operation is believed to be carried out by a nation-state or similarly well-funded adversary.

How the Attack Works

Researchers from security firm GreyNoise discovered that the attackers are exploiting multiple router vulnerabilities—some of which were never assigned a CVE (Common Vulnerabilities and Exposures) identifier. Once inside, they install a public SSH key, granting them full administrative access through port 53282. Anyone in possession of the corresponding private key can log in undetected with elevated privileges.

This method gives attackers long-term control without traditional malware and leaves almost no obvious trace. The backdoor survives reboots and firmware updates by chaining authentication bypasses with configuration abuse.

asus router exploits being patched by IT technical support

Scale and Intent

So far, approximately 9,000 routers have been identified as compromised, and that number is growing. There’s no indication yet that the devices are being actively used in attacks—but this appears to be part of a broader effort to quietly build a base of infected systems, possibly for future operations like botnets, espionage, or supply chain attacks.

The campaign was first observed in mid-March and overlaps with a similar incident reported by Sekoia, which linked the activity to a threat group tracked as ViciousTrap. Public scanning data suggests as many as 9,500 ASUS routers may be affected globally with more being detected daily.

Key Technical Details

  • Exploited CVE: CVE-2023-39780 (command injection flaw), among others.

  • SSH Port Used: 53282

  • Persistent Key: Begins with ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVF...

  • Suspicious IPs:

    • 101.99.91[.]151

    • 101.99.94[.]173

    • 79.141.163[.]179

    • 111.90.146[.]237

What Users Should Do

If you’re using an ASUS router—or any internet-facing router—take the following steps immediately:

  • Inspect your SSH configuration for unauthorized keys or non-standard ports.

  • Check system logs for suspicious access from the IPs listed above.

  • Update firmware to the latest version available from ASUS.

  • Remove any unrecognized SSH keys and restore default port settings.

For small businesses relying on consumer-grade networking gear, this is a wake-up call: you may be exposed without even knowing it. At Cost+, we recommend regular firmware patching, network monitoring, and migrating to business-class network appliances with managed security support.

Schedule Your Free Security Check Today

If you’re unsure whether your routers are secure—or need help evaluating your network for hidden vulnerabilities—schedule a free cybersecurity assessment with our team today.

2025-06-22T15:57:08-05:00May 29, 2025|

Attackers Are Exploiting Microsoft Teams for Internal Phishing

A new tactic is turning trusted collaboration tools into delivery channels for malicious links and impersonation attempts.

The threat is coming from inside the organization

Microsoft Teams has become a core communication platform for businesses, replacing much of what used to take place over email. But attackers are now using this trust to their advantage—sending phishing links and malicious files from inside Teams itself.

In these attacks, cybercriminals gain access to a legitimate Microsoft 365 account—often through credential theft or infostealer malware—and then use that account to message coworkers through Teams. Because the message comes from a trusted internal user, the link is often clicked without hesitation.

man getting phished by microsoft teams

Why these attacks are harder to detect

Unlike email, Teams messages are not subject to the same filtering or inspection by traditional security gateways. Most organizations trust internal Teams traffic by default. That makes it easier for attackers to deliver malicious payloads or redirect users to fake login pages without triggering alerts.

These messages are often simple: “Can you review this doc?” or “Is this invoice correct?” They rely on speed, familiarity, and the casual tone of chat communication to lower defenses.

What businesses can do right now

Start by treating Micrisoft Teams as an extension of your threat surface. If your organization uses Microsoft 365, verify that Teams is included in your security monitoring stack and that audit logging is enabled.

Security policies should be updated to include messaging platforms—not just email. Users should be trained to question unexpected links or file shares, even if they come from colleagues. Where possible, use conditional access policies to limit risky login behavior, and enable multifactor authentication across all accounts.

While Teams offers productivity benefits, it also creates a pathway for lateral movement once an attacker is inside your environment. Treating chat traffic as inherently trustworthy is no longer a safe assumption.

By Thomas McDonald
Vice President

2025-06-22T16:16:38-05:00May 26, 2025|

QR Code Phishing Is Spreading Across Physical and Digital Channels

A look at how cybercriminals are turning QR codes into credential traps (qr code phishing)—and what businesses can do to reduce exposure.

A familiar tool is being weaponized

QR codes have become a routine part of daily business. They’re used for contactless check-ins, payment processing, document access, and marketing materials. But the convenience that makes QR codes so widely adopted also makes them exploitable.

Threat actors are now embedding malicious links in QR codes—both in emails and in physical materials like posters, mailers, and fake notices. The goal is simple: direct users to a spoofed login page that captures their credentials, often under the guise of document sharing, payment confirmation, or identity verification.

two people scanning qr codes for qr code phishing

What makes QR-based phishing effective

Unlike traditional phishing emails, QR code attacks don’t contain visible links or attachments. Users scan them with personal mobile devices, which often lack corporate security tools. This bypasses many of the protections in place on company-managed desktops and laptops.

Attackers rely on urgency, familiarity, and poor verification habits. A code may appear in a building lobby, a parking ticket, a service renewal notice, or even as a response to a job application. These tactics exploit environments where people are least likely to question what they’re scanning.

How businesses can reduce risk

Organizations should begin by educating staff on QR-related risks. Employees should be taught to avoid scanning codes from unfamiliar or unverified sources, especially those urging immediate action.

IT teams can take further steps by restricting access to personal devices on the corporate network and reviewing how QR codes are used in internal processes, signage, and customer-facing materials.

In environments with mobile device management (MDM), policies can be configured to scan or isolate web activity initiated from QR codes. For highly targeted industries—legal, healthcare, finance—physical security and visual signage policies should be reviewed, especially in shared or public-facing spaces.

The threat is low-tech in appearance but high-impact in execution. Training and operational vigilance are key.

Have questions? Contact us. We’re happy to help.

By Thomas McDonald
Vice President

2025-06-22T15:50:14-05:00May 26, 2025|
Go to Top