Page 6 - Cyber Warnings
P. 6







Remediation
This was a serious attack with serious consequences. To work towards this not occurring any
time soon, the casino may implement employee training sessions. These would need to be
regular and applicable. If videos were to be used, these would not consist of the same bland
ones shown for the last ten years.

This attack made it rather apparent that the email system’s security was rather out of date or
just not functioning well. The filter for phishing, spam and other malware should red flag and
quarantine these. To further decrease the opportunity for this to happen again, phishing
campaigns should also be completed.

With these in place, the user will increase their awareness in the last a bit, which in certain
instances, all that is needed. This may be accomplished with training, videos being viewed, and
other methods. The business may also send emails with written training with a questionnaire at
the end of the email to verify the material was read and understood.

Attacks will come from many sources throughout the globe. At times, if the attackers know there
is a vulnerability, the business will have a rather large bulls-eye on it and attacks would only
increase.


Resources
Globalnews.ca. (2017, January 27). Security experts call grey eagle casino security breach
wake up call. Retrieved from https://reportca.net/2017/01/security-experts-call-grey-
eagle-casino-security-breach-a-wakeup-call/
Sosiak, M. (2017, January 25). Grey eagle casino employees information leaked in major
privacy breach. Retrieved from http://www.newslocker.com/en-au/region/casino/grey-
eagle-casino-employee-information-leaked-in-major-privacy-breach-globalnewsca/view/
Tighe, T. (2017, January 26). Security experts call grey eagle casino security breach a wake-up
call. Retrieved from http://globalnews.ca/news/3208546/security-experts-call-grey-eagle-
casino-security-breach-a-wake-up-call/



About The Author

Charles Parker, II began coding in the 1980’s. Presently CP is an Information Security Architect
at a Tier One supplier to the automobile industry. CP is presently completing the PhD
(Information Assurance and Security) in the dissertation stage at Capella University. CP also is
an adjunct faculty at Thomas Edison State University. CP’s interests include cryptography,
SCADA, and NFC.


He has presented at regional InfoSec conferences. Charles Parker, II may be reached at
[email protected] and InfoSecPirate (Twitter).



6 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   1   2   3   4   5   6   7   8   9   10   11