am i too small to be a target
play

Am I Too Small To Be A Target? Cybersecurity Issues for Small - PowerPoint PPT Presentation

Am I Too Small To Be A Target? Cybersecurity Issues for Small Businesses A Special Presentation For <Name> Date Location Special thanks to Your Speaker Bob Weiss MCSE, A+, CEH Senior Cybersecurity Engineer at CIT


  1. Am I Too Small To Be A Target? Cybersecurity Issues for Small Businesses

  2. A Special Presentation For <Name> • Date • Location • Special thanks to

  3. Your Speaker – Bob Weiss MCSE, A+, CEH • Senior Cybersecurity Engineer at CIT • Certified Ethical Hacker – 2013 • Cybersecurity Blogger @ wyzguyscybersecurity.com and cit-net.com/tech-talk/

  4. CIT Cybersecurity Services • Cybersecurity Awareness Training • Security Audits • Vulnerability Assessments • Penetration Testing • Computer Forensics • Incident Response

  5. Agenda • Typical Exploits • Cybersecurity Preparedness • Incident Response Plan • Cost of Cybercrime • Training • Examples of SMB Crimes • Passwords • Legal Issues • Email • Compliance Issues • Banking – PCI/DSS – HIPAA • Encryption – GLBA

  6. What’s happening out there?

  7. Plan for the attack • You will be hacked (if you haven’t been already) • You may not know when it happens. • You may be informed by your customer, credit card processor or government regulator • You may be fined • You may be sued • You may end up in the news

  8. Typical Exploits • Phishing for user passwords or remote access • Hijacking a computer to use in a bot-net • Spamming to sell illegal or fraudulent products • Stealing intellectual property • Thefts from online bank and financial accounts

  9. Typical Exploits • Distribution of malware to other computers • Posting confidential information on the Internet • Holding critical information for ransom • Attacking critical network infrastructure to disrupt operations

  10. Typical Exploits • Theft of data – all data has value! – User credentials – Employee data – Customer data – Patient data – Financial data – Proprietary information

  11. Other Cyber Security Issues • Politically Motivated Attacks and Hacktivism – Anonymous, Lulz Sec • Cyber-Warfare – Stuxnet and Flame – Ukrainian electric utilities • Government Sponsored Cyber Spying – NSA – China

  12. Top Two Attack Vectors • Email – Clickable Links and Attachments – Phishing and Spear-phishing • Web Sites – Malware distributed by compromised legitimate sites. – Spoofed or cloned sites – Search redirection malware

  13. Cost of Cyber-crime • Average annual loss per employee - $1500 • In 2015, $400 billion in losses worldwide • 96% of small businesses unprepared for cyber attack (Ernst and Young 2013 Survey)

  14. Small Business Targets

  15. Small Businesses in crosshairs • SMBs targeted by cyber-criminals • More money in the bank than individuals • Less security than larger enterprise businesses. • Employees have little or no training about cyber security. • Easy to exploit

  16. NC Fuel Company Loses $800 K • 15 employee fuel distribution company. • Monthly payroll of $60,000 • Thieves gained access to bank account using compromised password • Bank had recently made changes to its security process to make online banking “easier.” • Insurance only covered a portion of the loss.

  17. CA Escrow Company loses $1.5 M • 9 person company • 3 electronic transfers of about $500k each • One in Dec 2012 and two in Jan 2013 • Bank provided two factor authentication, but it wasn’t working at the time. • Although this company had never transferred funds overseas, bank did not question large transfers – even after the first was reported! • Company in receivership.

  18. Construction Company Loses $500K • $447,000 dollars was stolen from Ferma, a California construction company. • A banking Trojan such as Zeus, downloaded from a web site. • A Ferma employee logs into their bank's on-line financial Web portal. • After authentication was confirmed, the employee begins making legitimate payments. • At the same time, the Zeus Trojan made 27 fund transfers totaling $447,000 to various bank accounts.

  19. HVAC Vendor Opens Door For Target Xmas Attack • Fazio Mechanical small HVAC contractor to Target • Phishing email installed password stealing malware • Target network credentials stolen • Over 17 days between Thanksgiving and Dec 15, cyber- thieves accessed Target’s POS system and collected credit card transaction information on 40 million customers.

  20. Slovenian Gang Target Small Business • Spoofed email sent looking like it came from a bank or a tax authority warning of late payment. • Clicking on the link in the email installed a remote access Trojan horse program • Thieves watched computer for online banking activity. • Withdrawals timed to occur on Friday or before a holiday • Group netted $2.5 million.

  21. Regulatory Compliance and Legal Issues

  22. Legal Issues • Regulatory fines • Civil suits • Cyber insurance may not cover “willful negligence” • Cybersecurity or computer use policy • Incident Response Plan

  23. PCI/DSS • Payment Card Industry Data Security Standard v3.1 – Build and maintain a secure network – Protect cardholder data – Maintain vulnerability management program – Implement strong access control measures – Regularly monitor and test networks – Maintain information security policy

  24. PCI/DSS Penalties • Non-compliant companies can be fined $5000 to $100,000 per month • $50-$90 per cardholder record compromised • Brand and reputation damage • Civil litigation

  25. HIPAA • Health Insurance Portability and Accountability Act • Regulates patient information – Access – who can read it – Transmission – how data is transferred from location to location – Storage – how and where data is stored • Business Associate – CIT employees need to be trained and certified if they have contact with patient information

  26. HIPAA Violation Penalties • Accidental - $100 per violation – annual max $25,000 • For cause - $1000 per violation – annual max $100,000 • Willful neglect - $10,000 per violation – annual max $250,000 • Uncorrected willful neglect - $50,000 per violation – annual max $1.5 million

  27. GLBA • Gramm-Leach-Bliley Act • Financial Privacy Rule – Consumers need to be informed how their information is used and may opt out of information sharing • Safeguards Rule – Consumer information security plan and implementation • Pretexting Provisions – Systems and training to defeat social engineering

  28. GLBA Penalties • The penalties for violating the GLBA are quite severe: – A financial institution can be fined up to $100,000 for each violation – The officers and directors can be fined up to $10,000 for each violation – Criminal penalties include imprisonment for up to 5 years, a fine, or both – If the GLBA is violated at the same time that another federal law is violated, or if the GLBA is violated as part of a pattern of any illegal activity involving more than $100,000 within a 12-month period, the violator's fine will be doubled and he or she will be imprisoned for up to 10 years

  29. Policy Considerations

  30. Cybersecurity Preparedness • Patch • Backup • Keep antimalware software updated • Enforce good password policy • Use two factor authentication when possible • Create alertness through training and events

  31. Incident Response Plan – Before the Breach • Plan to be attacked • Know who is in charge • Have a cybersecurity expert on retainer • Review insurance coverage • Review legal requirements and exposure • Plan for a media response

  32. Incident Response Plan – After the Breach • Find out what happened – review your logs • Remove affected devices from network • Save affected devices for forensics – do not wipe drives! • Report to the police and Internet Crime Complaint Center • Responding to media – be brief but truthful

  33. Creating a More Secure Environment

  34. Train Your Staff • Train your employees in the fundamentals of cybersecurity. • Create a data practices policy for your employees. • Even the most sophisticated security defenses cannot prevent a malware breach that is permitted when an employee clicks on a malicious link in an email.

  35. The Basics • Internet security software on every computer • Hardware firewall – blocks attacks from outside • Intrusion Detection System ( IDS ) – detects attack traffic both outside and inside the network • Security information and event management ( SIEM ) - provides real-time analysis of security alerts generated by network hardware and applications

  36. Password policy • 10 characters or longer – 8 character passwords can be cracked in under 12 hours – 10 character passwords take several centuries. • No dictionary words in any language • Use complexity rules, at least one from each group – UPPER CASE – lower case – Num63r5 – $ym%o!s* _- ! @ # $ % & *

  37. Advanced Password policy • Character substitution (p@5$w0#d) • Use passphrase (i.e. @mBwu10cPW! = “at my business we use 10 character pass words”) • Use two-factor authentication when available • Check password at Passfault (passfault.com) • Nothing will matter if you lose your plain text password to a keylogger or phishing exploit

Recommend


More recommend