Cybersecurity: New NJ Privacy Law

You may have started to read about changes that may directly affect your organization. In response to Europe’s new GDPR law.

In response to Europe’s new GDPR law, states have begun to draft and implement additional privacy laws and regulations. My home state of New Jersey is now attempting to lead the charge forward in seeing these new policies are in place.

We all know that security of credentials is critical to preventing data breaches, but now we have arrived at a point of what else defines “personal information”. States are not considering passwords and other credentials to be labeled personal information.

“The measure closest to becoming law, S-52, would force companies to disclose data breaches involving an expanded definition of “personal information.” The bipartisan bill was approved unanimously in the Legislature and now awaits a signature or veto by Governor Phil Murphy.

Current state law mandates that companies tell customers when their driver’s license numbers, Social Security numbers, account numbers or credit or debit card numbers have been compromised. The bill would expand that list to include user names, email addresses, and passwords or security questions and answers that could be used to gain access to an online account.”

For more info:


NJ Releases Annual Statistics on Cyber Breaches –

Americans and Cybersecurity –

NJ’s APP News –

Intrusion Prevention with Fail2Ban

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python programming language, it is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, for example, iptables or TCP Wrapper. Wikipedia

To assist in further locking down the exposed SSH endpoint I manage,I decided to use the tool Fail2Ban as it supports many of the services (sshd, apache, etc) that can be integrated with IPTables.

Installing Fail2Ban is simple and can be completed with a few simple steps, assuming you have su or root access to the system you are managing.

Here are steps you might follow to accomplish this:

Log into you system and issue the following command and update

sudo apt-get update
sudo apt-get upgrade -y

Next install the Fail2Ban software via apt-get

sudo apt-get install fail2ban

Edit Fail2Ban to work with your SSH configuration by opening ‘/etc/fail2ban/jail.local’ file with the following command:

sudo nano /etc/fail2ban/jail.local

Add the following to the file /etc/fail2ban/jail.local

enabled = true
port = ssh
filter = sshd
logpath = /var/log/auth.log
bantime = 900
banaction = iptables-allports
findtime = 900
maxretry = 3

Restart Fail2Ban service or reboot your host

sudo service fail2ban restart

To view banded IP’s you can use IPTables for this.
Use the following command:

sudo iptables -L -n --line

At the end of the day a secure password will always protect you as this solution will only slow the bad actor down, it doesn’t stop them.

Techshort: IP Addresses with PowerShell

Quick PowerShell Tip!

To list all of the IP addresses, both v4 and v6 on your local system, along with the associated interface name issue the following command:

Get-NetIPAddress | Select IPAddress, InterfaceAlias | Out-GridView

What you get from the above command is a grid view output which can be copied and pasted into a document.

Security News: Citrix Breach

If you haven’t heard, Citrix was breached through a compromised employee account due to password spraying.

Password spraying is an attack that that attempts to access a large number of accounts (usernames) with a few commonly used passwords. Traditional brute-force attacks attempt to gain unauthorized access to a single account by guessing the password.

The exploitation of weak passwords has become an increasing area of worry for all of us in the IT area where security is relevant. It’s been said that a compromised account was used to access and steal 6TB of sensitive data from email, file shares, and database applications.

At this point the question in your mind is or should be: What could have helped to prevented this?

My simple response is: Develop a policy of using and enforcing strong passwords, configuring proactive authentication monitoring to take the time to look for password spraying and please audit user passwords against common and aquired leaked password lists.

Citrix said it “still doesn’t know what specific data was stolen, but an initial investigation appears to show the attackers may have obtained business documents”.

While Citrix is moving as quickly as possible,  its a sad turn of events that companies are reactive only and measures to prevent such attacks are lacking.

Is this your company? Let’s hope not, because you can be next.

For more info from Citrix stop by their blog –

Techshort: What is microk8s?

microk8s is Kubernetes, installed locally! microk8s is designed to be a fast and lightweight upstream Kubernetes install isolated from your host but not via a virtual machine. This isolation is achieved by packaging all the upstream binaries for Kubernetes,, iptables, and CNI in a single appliication container

What I have learned is that if you have been a user of Docker then
Kubernetes is a lightweight variant.

Installing microk8s is simple (on Ubuntu 18.04):
Here are some quick steps to get started:

sudo snap install microk8s --classic

Once installed confirm its running with the following:

microk8s.kubectl cluster-info

You can (I have) expose the management UI – Buddy of mine say’s I shouldn’t. Do this by enabling it with the following command:

microk8s.enable dns dashboard ingress

Then expose this vis the host with the following:

microk8s.kubectl proxy --accept-hosts=.* --address= &

Now you can get to the dashboard by using the host’s IP address or host name:


Anyhow, more information can be located here: