Are Your Company’s Digital Credentials for Sale? Your Digital Identity October 3, 2019 We go into the Dark Web, so you don’t have to.
Volunteers? https://haveibeenpwned.com
Top 10 Cybersecurity Tips 1) Create unique passwords and enforce multi-factor authentication for all network users. 2) Install spam-filtering solutions with anti-phishing capabilities across your network. 3) Leverage web-filtering programs that block phishy websites. 4) Prepare for cryptojacking attacks. 5) Evaluate security suites that include Dark Web monitoring. 6) Involve all stakeholders in raising cybersecurity awareness across your organization. 7) Assess your organization’s information, protection, and access regularly. 8) Ensure that all third-parties have cybersecurity protocols and policies in place. 9) Build a cybersecurity incident response plan (CIRP) and democratize key information. 10) Partner up with experts to train your employees every month.
Mike Pape Director of Sales RMM Solutions 20 years of experience in security • Application • Networking Manufacturing and IoT •
Agenda What is the Dark Web? 4 ways digital credentials are compromised What attackers can do with this information Real-world examples Layered security approach – steps you can take
The Dark Web Not indexed by search engines Accessible through Tor Recent study: 57% of sites host illicit material Commerce is flourishing ◦ Bitcoin and the Dark Web ◦ Login credentials to a BoA account: $500 ◦ $3,000 in counterfeit $20 bills for $600 ◦ Seven prepaid debit cards, each with a $2,500 balance, for $500 ◦ Usernames and passwords: sold in bulk
Cyber crime is on the rise 80% of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords 85% of businesses with <1000 employees have been hacked, and most don’t even know 4.2 BILLION email account credentials and 85 MILLION stolen PII records (drivers license, SSN, DOB, etc.) for sale on the Dark Web
Small business at great risk “… data stolen from businesses ends up on the dark web where criminals buy and sell it to commit fraud, get fake identity documents, or fund their criminal organizations.” “…information available for sale on the dark web is up to 20 times more likely to come from an entity whose breach wasn’t reported in the media. Many of these are smaller retailers, restaurant chains, medical practices, school districts, etc. In fact, most of the breaches the U.S. Secret Service investigates involve small businesses .” Federal Trade Commission, 2017
1 in 4 Law Firms Breached
The human factor is key same e or same e root ot passw sword
Data is Sold at Auction
Case Study: MyFitnessPal February 2018: MyFitnessPal breach of 150M users March 25, 2018: Breach discovered by Under Armour March 29, 2018: Under Armour issues privacy statement and information related the breach: usernames, email addresses, and hashed passwords ◦ “The company will be requiring MyFitnessPal users to change their passwords and is urging users to do so immediately.” February 2019: Data has been packaged up along with stolen credentials from 15 other websites to be sold on the Dark Web ◦ The asking price? Less than $20,000 in Bitcoin
Real World Examples in our Backyard August July June
Actionable Intelligence is Key NIST Guidelines recommend changing passwords only when a compromise occurs. How will you know there is compromise unless a data breach results in theft? Monitoring for compromised credentials on the Dark Web has historically been expensive and complicated. 1. Digital credential information 2. PII breaches 3. Personal email breaches 4. Public IP monitoring
Cyber Threat Overview Dashboard
Organizational Compromises
We Keep You Out of the Dark Web. Small Bus Small Business inesses es Need Da Need Dark W k Web Monitoring f b Monitoring for or Today’s Cybersecurity Risk. Pr Protect y otect your our busine business ss and se and secur cure y e your our ass assets. ets. Contact me after this webinar: 1. Get your free Dark Web scan 2. Get added to my weekly “This Weak in Security” blog 3. Consider a security assessment to improve your layered security approach and evaluate your overall security posture
Ques Questions? tions?
Thank you! Mike Pape Mike.pape@rmmsolutions.com 414-908-2203
Recommend
More recommend