Mar 08
The Rising Threat of Ransomware: Understanding its Dangers
In today's digital age, the threat of ransomware looms larger than ever before. Ransomware attacks have become increasingly prevalent, targeting individuals, businesses, and even critical infrastructure. Understanding the dangers posed by ransomware is crucial for safeguarding against this pervasive threat.

Ransomware is a type of malicious software designed to encrypt files on a victim's computer or network, rendering them inaccessible. Once the files are encrypted, the attackers demand a ransom payment in exchange for providing the decryption key or the theft of the sensitive data. Cybercriminals may threaten to leak this data unless a ransom is paid. This form of cyber extortion has become a lucrative business for cybercriminals, with ransom payments often demanded in cryptocurrency to maintain anonymity.

The fallout from a ransomware attack can tarnish an organization's reputation and erode customer confidence.  Ransomware attacks often result in significant financial losses for individuals and businesses. Organizations may incur additional costs associated with downtime, data recovery, and cybersecurity remediation efforts.

Ransomware attacks often exploit vulnerabilities in an organization's cybersecurity defenses. These incidents serve as a wake-up call, highlighting the need for robust security measures, regular software updates, and employee training to mitigate future risks.  Prevention is key when it comes to defending against ransomware attacks. Here are some essential steps organizations and individuals can take to protect themselves.

Backup Data Regularly - Maintain regular backups of critical data and ensure they are stored securely offline. This can help mitigate the impact of a ransomware attack by allowing for the restoration of encrypted files without paying the ransom.

Implement Security Measures - Deploy robust cybersecurity solutions, including firewalls, antivirus software, and intrusion detection systems. Keep software and operating systems up to date with the latest security patches to address known vulnerabilities. 

Educate Employees - Train employees on cybersecurity best practices, such as recognizing phishing emails, avoiding suspicious links, and practicing good password hygiene. Human error remains a significant factor in ransomware attacks, making employee awareness crucial. 
Exercise Caution - Exercise caution when downloading files or clicking on links, especially from unfamiliar or suspicious sources. Be wary of unsolicited emails, messages, or attachments, as they may contain malware.  Make this part of your yearly cybersecurity training!

Develop an Incident Response Plan - Prepare an incident response plan outlining the steps to take in the event of a ransomware attack. This should include procedures for isolating infected systems, notifying relevant stakeholders, and coordinating with law enforcement and cybersecurity experts. Make this part of your continuity and BC/DR plan!

Engage in Threat Intelligence - Stay informed about the latest ransomware threats and tactics through threat intelligence sources. Understanding the evolving landscape of ransomware can help organizations better anticipate and mitigate potential risks.

The take away here is that ransomware poses a significant and evolving threat to individuals, businesses, and critical infrastructure. By understanding the dangers of ransomware and implementing proactive cybersecurity measures, organizations can better protect themselves against this pervasive threat and minimize the potential impact of attacks.

Feb 14
I Love You...
​I found myself engaged in a nostalgic conversation with a colleague about the "I Love You" Virus. Ah, those were memorable times, weren't they?

In the realm of digital romance, where bytes replace roses and algorithms whisper sweet nothings, one particular declaration of love left an indelible mark on the history of cybersecurity. Just over twenty years ago, the world was swept up in the throes of the "I Love You" bug, a malicious code masquerading as a heartfelt message, spreading like wildfire through email inboxes and bringing chaos in its wake.

It was May 5, 2000 when unsuspecting users around the world was greeted by an email with a subject "I Love You." Little did any of us know that opening this seemingly affectionate note would unleash a digital plague of epic proportions? Concealed within was a Visual Basic script that quickly proliferated by overwriting files, stealing passwords, and wreaking havoc.

In the aftermath of the chaos, the true extent of the damage became apparent. Estimates suggested that the "I Love You" bug caused billions of dollars in damages, paralyzing businesses, governments, and individual users alike. From corporate networks to personal computers, no system was immune to its charms.

Yet, amidst the chaos, lessons emerged. The "I Love You" bug served as a wake-up call, highlighting the vulnerability of interconnected systems and the importance of robust cybersecurity measures. Organizations and individuals scrambled to bolster their defenses, implementing antivirus software, firewalls, and user education programs to mitigate the risk of future attacks.

Moreover, the "I Love You" bug underscored the evolving nature of cyber threats, demonstrating that malicious actors could weaponize even the most innocuous of messages for nefarious purposes. It paved the way for greater awareness of social engineering tactics and the need for vigilance in an increasingly digitized world.

Two decades later, the legacy of the "I Love You" bug endures as a cautionary tale, a reminder of the power of love, both genuine and malicious, in the digital age. It serves as a testament to the resilience of cybersecurity professionals and the ongoing battle to stay one step ahead of cyber threats.

As we reflect on the events of May 2000, let us not forget the havoc wrought by a simple declaration of love gone awry. And let us remain ever vigilant, lest history repeat itself in a new guise, reminding us that in cyberspace, love may conquer all, but vigilance is the ultimate defense.
Feb 28
The Rise of Ransomware: A Growing Threat to Digital Security

​The rise of ransomware can be attributed to several factors. First, world conflict has certainly led to intensified cyber-attacks and the exponential growth of digital communication and storage has created a vast landscape of potential targets.

Second, the increasing sophistication of ransomware attacks, often involving social engineering techniques, has made it easier for attackers to gain access to sensitive information and the means to force payment through cryptocurrencies has made it easier for attackers to remain anonymous and avoid detection. Ransomware attacks are usually carried out through phishing emails, infected downloads, or vulnerabilities in outdated software. Once the ransomware is installed on the victim's device, it can spread to other data on the same network, making it a particularly dangerous threat to the enterprise.

Ransomware attacks can have severe consequences for victims. In addition to the loss of data, companies may face significant financial losses and reputational damage. Governments may also experience disruptions in critical infrastructure, leading to potential public safety concerns. According to the IBM and the Ponemon Institute, the average data breach cost in 2022 was 4 million dollars USD.

Preventing and mitigating ransomware attacks requires a multi-pronged approach. Companies and individuals should take steps to secure their networks and data, including implementing robust password policies, regularly backing up data, and using antivirus software. In addition, education and awareness campaigns can help to reduce the risk of falling victim to social engineering techniques used in ransomware attacks.

One of the most effective means to protect your sensitive data is to use a data at rest encryption for your storage mediums such as file servers and cloud storage locations.

In addition, using a process known as sharding can provide excellent resiliency to protect your data by dividing it into smaller parts called shards. Each shard will only contain a portion of that file/data, so that even if one shard is compromised, the entire file process provides resiliency from ransomware and data exposure by the bad guys. This process also uses encryption keys employing strong encryption algorithms such as AES-256 to encrypt the sensitive data before storing it in the storage medium thus ensuring that only authorized users can access the data.

Together, data at rest encryption and sharding can provide a high level of security for sensitive data. 

This ensures that even if the data is stolen, it will be unreadable to unauthorized users and thus personally identifiable information (PII) can't be shared to the world. This also helps organizations greatly improve their compliancy requirements for data protection laws such as GDPR, POPIA, CCPA/CPRA, etc.

STEP 1 should include the use of a technology that provides at rest encryption for your sensitive data significantly minimizing the bad guy's access to your organizations crown jewels. Coupled with a technology that provides sharding which by its nature provides point-in-time recovery; this assures productivity even in what may seem the worst of times. Make this part of your Zero Trust approach.

Feb 01
Export as CSV File (Spirion Agent)

The Spirion Agent UI allows the export of data in CSV format.  If the “Save as CSV" option is not present its necessary to alter a registry key to enable it.

  • ​HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Identity Finder\Client\Settings\Save\Disable
  • Set this key to a value of 0
    • disableFeature_SaveInClearText

Once you reopen the Spirion Agent you will see the option to save as a .csv.

You can also import the following registry to add the key for the Spirion client.​

Save as .csv Reg.reg


Jul 20
SharePoint Modern Authentication

Using the Sensitive Data Manager Agent version 11.8.2 or later provides support for SharePoint on premise and online Modern Authentication.  This is a more secure way than using Basic Authentication.  The following Microsoft guide provides guidance to setup the SharePoint app-only principal to use Modern Authentication with other technology integrations.

You will first need to grant access using SharePoint App-Only by following either the Microsoft documentation or by the following.

​Navigate to your SharePoint site using the following URL to generate the required Client Id and Client Secret -​

  • ​Click both the Generate buttons to create the Client Id and Client Secret​​
  • Add the appropriate information in the following fields.
    • Example
      SharePoint App

      App Domain:

      Redirect URI:​


  • If you receive a SharePoint permissions access error when accessing the URL then use the below URL instead.
As indicated in the below image:
  • Input the generated Client Id: into the Spirion Identity Provider Id field.
  • Input the generated Client Secret: into the Spirion Password field.
    • ​​*Note – the username is not needed and will result in error if added.
Mar 11
Defense Contracts and the CCMC

The US Department of Defense (DoD) released the Cybersecurity Maturity Model Certification (CMMC) on January 31, 2020 as a unified standard for implementing cybersecurity across the defense industrial base and includes over 300,000 companies. The CMMC is the DoD's response to the significant number of compromises of sensitive CUI data that contained defense information located on contractors' information systems. In order for contractors to be eligible for DoD contract awards they are required to have the CMMC certification.

Contractors are responsible for implementing and monitoring their information technology systems and any sensitive DoD information stored on those systems. The CMMC framework guides companies with the appropriate levels of cybersecurity practices and processes to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) within their unclassified networks.

The CMMC consists of five certification levels to best implement cybersecurity based practices.

  • CMMC Level 1. Basic best cyber hygiene practices, sensitive data management.
  • CMMC Level 2. Protect Controlled Unclassified Information (CUI)
  • CMMC Level 3. Practices to safeguard CUI, including the NIST 800-171
  • CMMC Level 4. Practices using advanced persistent threats (APT) techniques and procedures
  • CMMC Level 5. In place sophisticated capabilities to detect and respond to APTs


Controlled Unclassified information (CUI), is information that government agencies and some of their contractors are required to both mark and classify within their data stores. CUI represents a particular kind of sensitive data created by the U.S. federal government or developed on its behalf and merits special protection against exposure.

As result of the CMMC and the contractual agreements between contractors and the DoD, assessors must understand the contractors response capabilities by knowing which systems store CUI data that may not be within policy. When it comes time to prove that CMMC controls are in place, you must be able to audit your systems, generate comprehensive reports, and review audit reports in detail. To do so will require a robust and accurate vended data discovery toolset.

Avoid Loss of DoD Contracts

A typical government contract is around $250,000 and without this certification there is substantial risk losing contracts. To reduce the loss of contracts and/or potential for a data breach as they relate to data that contain CUI, DFARS 7012, NIST 800-171/172 and the CMMC, it's necessary to identify the locations which store sensitive data assets processing Controlled Unclassified Information (CUI).

Conducting regular CUI risk or breach damage assessments is time intensive and doing so manually is not attainable. It's necessary to use an industry trusted data discovery tool that provides the necessary technologies to accurately locate common types of PII and CUI. These automated tools reduce the overall time spent locating documents with common categories or markings that may be in scope of the CMMC.

The U.S. governments rule for protecting CUI includes marking documents (classifying) to indicate the protected status. The National Archives Records Administration (NARA) issued a handbook on marking best practices in 2016 and cites the proper organizational markings and categories to consider when looking for CUI.

  • Categories
  • Banner Marking: Specified Authorities
  • Category Marking
  • Organizational Index Grouping


CMMC compliance will help reduce the potential loss of contracts. Using discovery tools to accurately locate these types of data are core to the CMMC. Before the concept of CUI was introduced in 2008, documents that contained sensitive defense information such as schematics, reports, and other technical data were marked with an array of acronyms that were indicative of its protected status, such as For Official Use Only (FOUO) and Sensitive But Unclassified (SBU). However since the introduction and executive order, NARA was put in charge to better facilitate standards across the DoD.

The Right Tool for the CMMC

Maintaining a good alignment with the CMMC is about using the right set of tools; there is no one single security tool that can do it all. Spirion is one such tool that identifies both PII and CUI across structured and unstructured data by searching text and images for common PII or searching for phrases, words, and acronyms that are indicative of CUI. This toolset is fundamental to assisting the compliance with the CMMC via its data discovery and classification capabilities.

Success will be achieved through accurate and automated process's to identify and classify sensitive data as it relates to the CMMC such as CUI. By conducting regular CUI risk assessment throughout the business's information ecosystem, the implementation of data classification policy by imbedding labels into documents and files will help delineate their sensitivity and facilitate the protection of unauthorized and unintended transfers and publication of CUI.

Feb 23
PCI Compliance Makes Dollars and Sense

Protecting sensitive data is a challenging task. Between the complexities of the data itself and the legal implications surrounding an alphabet soup of data privacy regulations, too many organizations struggle to develop protection strategies. Visibility of the data is one of areas that is most difficult to accomplish, yet vital to meet compliance.

For organizations that accept credit card payments, compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a must. "Maintaining payment security is required for all entities that store, process or transmit cardholder data," the PCI Security Standards Council explained. PCI DSS "set the technical and operational requirements for organizations accepting or processing payment transactions, and for software developers and manufacturers of applications and devices used in those transactions."

The PCI Security Standards demonstrate that data discovery is foundational, core to the assessment for a PCI audit. There are twelve requirements all designed to put protection of consumer PII first. The requirements include a multitude of security controls placed on those devices storing sensitive PCI data.

The Cost of non-Compliance

PCI compliance continues to be a challenge, only 27.9% of organizations achieving 100% compliance during their interim compliance validation, according to the Verizon 2020 Payment Security Report. Compliance should not be seen as "checkbox" activity but rather an everyday activity to protect sensitive data.

The average cost of a data breach is $3.86 million, according to the IBM and Ponemon Institute Cost of a Data Breach 2020 report. When consumer PII, the very data PCI DSS is designed to protect, is compromised, it will cost a company $150 per record in the breach. Data breaches also result in a loss of reputation and consumer confidence. Consumers don't like having credit cards replaced regularly because a company failed at protecting sensitive information, and they will take their business elsewhere. According to the Deloitte Global Survey on Reputation Risk, on average 25% of a company's market value is directly attributable to its reputation, loss of revenue, and the impact of not being able to process payment card transactions.

It's not just data breaches and reputational loss as result of that cost for failing PCI compliance. Companies not meeting regulations are fined thousands of dollars each month of non-compliance. There are also legal costs to consider during the remediation processes and the inability to process payment card transactions.

PCI compliance comes at a cost. The size and scope of your organization, the overall security posture of the company, and whether or not there is dedicated staff handling PCI compliance will all factor into the cost of setting up and maintaining mechanisms for PCI standards.

Why Accurate Audits Matter

PCI audits can be costly, because they require the company having the right process and tools in place. Audits are time consuming and stressful for your security and data privacy teams, but they are vital to protecting both the company and customers. Knowledge of which devices store and process sensitive data is vital to reducing PCI costs, as well reducing the potential of breaches because your systems continuously track and "know" the location of sensitive data. Nothing is left unknown.

Accuracy matters when it comes to being able to identify where your PCI data really lives. Not being able to accurately discovery PCI data will impact your overall assessment and add costs to the process. Organizations must have the ability to demonstrate to the auditors (QSA) that data was not located on devices outside the scope of PCI. A PCI audit must validate that the perceived scope of compliance is in fact accurately defined and documented.

Organizations shouldn't view a PCI audit as a point-in-time process, but as an ongoing exercise that demonstrates governance of cardholder data throughout the entirety of the data lifecycle.

Regulations like PCI DSS are designed to protect data privacy, which in turn goes a long way in preventing data breaches. Maintaining awareness of where PCI data resides is crucial to maintaining good consumer privacy practices. While you need to invest upfront with the right data management systems and whatever security tools are needed for compliance, being PCI compliant will pay off in the long run.

Dec 19
Domain Controller Event 3041 Warning

The security of this directory server can be significantly enhanced by configuring the server to enforce validation of Channel Binding Tokens received in LDAP bind requests sent over LDAPS connections. Even if no clients are issuing LDAP bind requests over LDAPS, configuring the server to validate Channel Binding Tokens will improve the security of this server.

For more details and information on how to make this configuration change to the server, please see

How to set the client LDAP signing requirement by using a domain Group Policy Object

  1. Select Start > Run, type mmc.exe, and then select OK.
  2. Select File > Add/Remove Snap-in.
  3. In the Add or Remove Snap-ins dialog box, select Group Policy Object Editor, and then select Add.
  4. Select Browse, and then select Default Domain Policy (or the Group Policy Object for which you want to enable client LDAP signing).
  5. Select OK.
  6. Select Finish.
  7. Select Close.
  8. Select OK.
  9. Select Default Domain Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies, and then select Security Options.
  10. In the Network security: LDAP client signing requirements Properties dialog box, select Require signing in the list, and then select OK.
  11. In the Confirm Setting Change dialog box, select Yes.
Dec 08
Permanent Account Number (PAN)

PAN is a ten-digit unique alphanumeric number issued by the Income Tax Department. The primary purpose of the PAN is to bring a universal identification to all financial transactions and to prevent tax evasion by keeping track of monetary transactions, especially those of high-net-worth individuals who can impact the economy.

Structure of PAN

The PAN (or PAN number) is a ten-character long alpha-numeric unique identifier.

Example: AAAPZ1234C

  • The first three characters of the code are three letters forming a sequence of alphabets letters from AAA to ZZZ
  • The first five characters are letters in uppercase, followed by four numerals, and the last (tenth) character is a letter.
  • Fourth character [P — Individual or Person ] identifies the type of holder of the card. Each holder type is uniquely defined by a letter from the list below:
    • A — Association of persons (AOP)
    • B — Body of individuals (BOI)
    • C — Company
    • F — Firm
    • G — Government
    • H — HUF (Hindu undivided family)
    • L — Local authority
    • J — Artificial juridical person
    • P — Individual or Person
    • T — Trust (AOP)
  • The fifth character of the PAN is the first character of either:
    • Surname or last name of the person, in the case of a "personal" PAN card, where the fourth character is "P" or
    • of the name of the entity, trust, society, or organization in the case of a company/HUF/firm/AOP/trust/BOI/local authority/artificial judicial person/government, where the fourth character is "C", "H", "F", "A", "T", "B", "L", "J", "G".
  • The last (tenth) character is an alphabetic digit used as a check-sum to verify the validity of that current code.
Aug 27
Classify All Files in a Folder (Local Path)


On occasion it may not be possible to simply classify based solely on the actual content of which exists in a file. The scenario arises when all files in a folder may need to be classified as HR, Finance, etc. so that data can be tracked (tagged) back to the source location from which it originated. To persistent classify all these files in a folder the following procedures overview these steps.


This process require the following prerequisites in which to make this process possible. These include:

  • Current versions of the SDM product(s).
  • All Files "SDD".
  • "Workflow" rule.
  • Search "Policy".

Important Notes

Note that proceeding with the following "could" override the true content based classifications for any file in these respective locations.



  1. Import or create a RegEx to capture all files in a location using the expression.
  2. From within the Spirion SDM Console Admin > Senstive Data Types > Add > Select Data Type = Regular Expression > Name = Classify All Files > Expression = (\S|\s|\w|\d)*

STEP 2 (Workflow)

  1. Import or create a new workflow from within the Spirion SDM Console Admin > Classification > Add > Name = XXXX.
  2. Select optionally a color, icon, or weight.
    1. Click OK.
  3. Highlight the new Classification, from within the Spirion ribbon Select Rule > Add.
    1. Workflow Rule
      1. Provide a workflow rule name and other options
    2. Definition
      1. Select from the dropdown options the following, see the image below.
        1. "Location", "Contains", Path to folder which all files from within should be classified as XXXX.

    1. Endpoints
      1. Select the appropriate endpoint from where the local files are being searched.
    2. Actions
      1. The Classification tag will be automatically selected, if not from the drop down for "Classify results as:" select the XXXX classification name from step 3. a. i.
      2. Select from the "Execute classification rules:" "Directly on the endpoint".
    3. Click Finish
      1. Bottom right area of the page to save the new rule.

STEP 3 (Search Policies)

  1. Import or create a new workflow from within the Spirion SDM Console Admin > Policies.
  2. Create a new Policy by clicking Policy > Create.
    1. On the Policy Tab provide a name and optionally a description.
      1. For Policy Type select Scheduled Task.
      2. On the Endpoints Tab select the same endpoint chosen for the workflow created previously.
      3. On the Data Types Tab deselect all.
      4. On the Location Tab deselect all.
    2. Click Finish
  3. Select the policy name just created > expand the tree view > expand Search Locations and Select Custom Folders.
    1. Click Add from the the Ribbon
    2. In the new Folder Location field place the same Share name as done in workflow, for example (C:\Location\PoC_Test_Data).
    3. Select "Include in Search" to the right of the folder patch for the Scope.
    4. Click the green check mark to the left of the folder path to save the changes.
  4. Select the policy name just created > expand the tree view > Select Sensitive data Types.
    1. From within the resulting list select "Classify All Files" as created in this document "Step 1, 2.".
  5. Select the policy name just created > expand the tree view > Select "Scheduled Tasks" or "Search > Initiate Search" to search and classify all files from within the target folder location.


As result of the following detailed procedural steps all files from within a folder will be classified as XXXX so that data can be tracked (tagged) back to the source location from which it originated.

1 - 10Next
Copyright © | CoryRetherford, LLC | Contact MeNetwork Storage and Security Solutions, LLC, Rights Reserved.®
TLS 1.2, AES with 256 bit encryption

 ‭(Hidden)‬ Blog Tools