Los Angeles Times

Cybersecur­ity consultant­s to the stars

Boutique firms work to protect celebritie­s from hackers.

- By Paresh Dave

The celebrity entourage has a new member.

Now joining the ranks of hairdresse­rs, nannies, brand managers and personal chefs are computer seThe curity experts, entrusted by the rich and the famous to stave off threats to social media accounts, smartphone­s and home networks.

Cybersecur­ity consultant­s to the stars are paid to spare their clients the type of trauma experience­d by actress Jennifer Lawrence when hackers stole her nude photos or then-Sony Pictures Entertainm­ent cochair Amy Pascal after her emails were made public.

job isn’t easy, as all Internet users run the risk of being targeted by hackers looking to make a buck — or a statement. But boutique security firms, which now count cybersecur­ity work for millionair­es as their fastestgro­wing offering, say their clients’ wealth and prominence make them particular­ly appealing to hackers. And their large entourages offer criminals more digital doors to pry open.

Potential consequenc­es of poor security go beyond embarrassm­ent, embezzleme­nt or identity theft. Many celebritie­s and executives fear stalkers and ransomseek­ing kidnappers could access schedules or other personal details.

These concerns mean it’s no longer enough for security firms such as K2 Intelligen­ce, Hillard Heintze and Guidepost Solutions to outfit homes and offices with cameras and alarms or serve as old-school private investigat­ors. They must now offer robust cybersecur­ity services for high-profile clients.

Computer security vendors that generally serve corporate clients, such as Synack, and wealth managers including T3 Risk Management have also jumped in with digital tools for the rich.

It was the disseminat­ion

of private photos that led one actress to sign up with K2 Intelligen­ce, said Jordan Arnold, the firm’s senior managing director. The star had been among the 100 celebritie­s caught up two years ago in the so-called Celebgate — a widespread intrusion into email and Apple iCloud accounts that resulted in the leak of libraries of private photos.

Soon after the attack, the actress, a family member and several personal assistants took seats in her living room. Each clasped a smartphone, while external hard drives, tablets and laptops covered furniture. Arnold and a colleague walked the group through settings menus across devices and apps, erecting new barriers for intruders.

“You’re helping them feel secure again,” said Arnold, whose firm recently opened an office in downtown Los Angeles because of Hollywood demand. “It was really an effort to bring a level of comfort and confidence at a very fraught time.”

Over the last two years, such cyberhygie­ne lessons have been held at the homes of hundreds of celebritie­s, athletes and current and former executives worldwide, according to security experts.

High-profile data breaches have brought a flurry of calls to security firms. The News of the World phone hacking scandal in Britain rattled European nerves. The release of names of users of extramarit­al dating website Ashley Madison and the emails of Sony Pictures Entertainm­ent employees sparked interest in the U.S.

Because authoritie­s said Sony’s distributi­on of the controvers­ial movie “The Interview” prompted the cyberattac­k, its directors Seth Rogen and Evan Goldberg worked with the firm Kroll to tighten their digital security, according to a person familiar with matter who was not authorized to speak publicly about the consultati­on.

Such services are not cheap. Around-the-clock advice and monitoring can run thousands of dollars per month, with a single Cyber HouseCall — as K2 Intelligen­ce dubs it — priced at $3,600.

Consider it a cost of fame: The wealthy must be extra cautious because they are more likely to face the most sophistica­ted attacks.

Someone could steal data from ritzy homes in BelAir by driving around and looking for unsecured Wi-Fi networks.

Phishing attacks — in which opening a document emailed by a hacker creates a door for thieves — can be frightenin­gly personaliz­ed because details of celebritie­s’ lives are well publicized.

This also makes it easy for thieves to trail public figures on a night out in hopes of snatching their smartphone­s. Hillard Heintze shows clients how it can unlock their phones by analyzing the location of finger grease on the screens — reminding them to choose stronger pass codes, adjust them often or invest in a cleaning wipe.

Consultant­s try to guard against these vulnerabil­ities. K2 Intelligen­ce starts with a visual sweep of a client’s home, said Joseph Lawlor, associate managing director for computer-related incidents. One by one, all electronic devices get tested for vulnerabil­ities.

At the Celebgate victim’s house, specialist­s created a guest Wi-Fi network to make it harder for a nosy visitor to snoop around. At another house, a personal assistant had installed a wireless extender to improve coverage without securing it with a password.

“It wasn’t malicious, but it’s a problem,” Lawlor said.

His team helps clients enable two-factor authentica­tion, so no one can log into Gmail or Twitter accounts without also entering a unique code that gets sent to their smartphone. They’ll set up a password management app, so clients can employ more complex log-ins without needing to memorize them.

K2 Intelligen­ce installs tracking software on devices to automatica­lly detect abnormal behavior. It’s the online equivalent of a security camera, sending an alert to K2 Intelligen­ce’s monitoring center when, for instance, a device is communicat­ing with someone from China for the first time.

Other firms provide monitoring by attaching a firewall device to home routers or setting up a proprietar­y online locker for families to store sensitive files.

Consultant­s urge some clients to buy new phones every few months — even for their maids and butlers. Making sure that the household has insurance coverage for cyberattac­ks is another suggestion.

The experts steer people away from apps known for security flaws and toward services like virtual private networks, or apps including Signal, that make data unreadable to most hackers. People who handle the client’s private affairs, including lawyers and financial planners, get the same advice.

Children, whose views on privacy and security may be more liberal than their parents’, can pose a problem. But K2 Intelligen­ce hopes a new, one-day Family Security Summit education program will send the message through cautionary tales.

“They need to hear what happens, the narratives, for the security risks to really resonate,” Lawlor said.

K2 intelligen­ce shares details about attacks with law enforcemen­t when clients allow, Arnold said. He declined to comment about specific cases.

It’s hard to measure whether it’s worth the potential six-figure cost of bringing to the home security practices that are becoming the norm at corporatio­ns. Consultant­s say they primarily provide peace of mind, which usually is good enough. But they also note that criminals are quick to move on when they meet any kind of resistance because so many people have close to zero defense.

“Just by putting a wall up as a high as we do, it deflects just about everything,” said Tom Anderson, chief executive of Private Client Cyber Security.

Though breaches could cost sometimes 10 times more than protection, K2 Intelligen­ce said more often than not that it first hears from prospectiv­e clients after something goes wrong. The firm recently stepped in to resolve several ransomware incidents, in which hackers lock data on a computer until clients pay a bribe.

Frances Dewing, chief operating officer for security company Concentric Advisors, relayed the story of a wealthy East Coast businessma­n who only sought counsel months after an executive assistant had been duped into transferri­ng money to a hacker.

Dewing’s team, which charges $500 to $3,000 a month for cybersecur­ity support, improved his passwords and provided ongoing intrusion detection.

In other cases, paranoia brings clients. A retired executive who sits on the board of a publicly traded company thought someone was breaking into his Yahoo email account to view undisclose­d financial results, according to an account provided by Maryland firm Private Client Cyber Security. The consultanc­y said it helped him switch to an encrypted email service and get cybersecur­ity software for his homes.

Publicists for several celebritie­s, including Rogen, Goldberg and Celebgate headliner Lawrence, didn’t make them available to speak about security measures.

But one group has been forthcomin­g. Filmmaker Oliver Stone, actor Joseph Gordon-Levitt, actress Shailene Woodley and others involved in the production of upcoming thriller “Snowden” opted to use a secure chat-and-file-sharing program developed by Hollywood-focused cybersecur­ity company RED-E Digital.

Hackers are eager for an early glance of the biopic about Edward Snowden, who leaked bombshell documents detailing secretive National Security Agency surveillan­ce programs.

RED-E’s Ralph Echemendia, a technical advisor for the film, had people touching the script or video buttress defenses on personal devices and systems to augment his company’s software. “They are keeping up with it too,” he said. “A great majority of the crew is more secure because of ‘Snowden.’ ”

But cybersecur­ity consultant­s’ influence only goes so far. “Snowden” DVDs have been sitting unsecured in mailboxes across Los Angeles in recent days after distributo­r Open Road Film sent them to guild and academy members for review, Echemendia said.

Sometimes, physical locks and keys still do the trick.

 ?? Andres Hernandez ?? RALPH ECHEMENDIA, a technical advisor on the film “Snowden,” provided its cast and crew with training and software in an attempt to better secure online files and conversati­ons related to the production.
Andres Hernandez RALPH ECHEMENDIA, a technical advisor on the film “Snowden,” provided its cast and crew with training and software in an attempt to better secure online files and conversati­ons related to the production.

Newspapers in English

Newspapers from United States