Am I Too Small To Be A Target? Cybersecurity Issues for Small - - PowerPoint PPT Presentation

am i too small to be a target
SMART_READER_LITE
LIVE PREVIEW

Am I Too Small To Be A Target? Cybersecurity Issues for Small - - PowerPoint PPT Presentation

Am I Too Small To Be A Target? Cybersecurity Issues for Small Businesses A Special Presentation For <Name> Date Location Special thanks to Your Speaker Bob Weiss MCSE, A+, CEH Senior Cybersecurity Engineer at CIT


slide-1
SLIDE 1
slide-2
SLIDE 2
slide-3
SLIDE 3

Am I Too Small To Be A Target?

Cybersecurity Issues for Small Businesses

slide-4
SLIDE 4

A Special Presentation For <Name>

  • Date
  • Location
  • Special thanks to
slide-5
SLIDE 5
  • Senior Cybersecurity

Engineer at CIT

  • Certified Ethical Hacker –

2013

  • Cybersecurity Blogger @

wyzguyscybersecurity.com and cit-net.com/tech-talk/

Your Speaker – Bob Weiss MCSE, A+, CEH

slide-6
SLIDE 6

CIT Cybersecurity Services

  • Cybersecurity Awareness Training
  • Security Audits
  • Vulnerability Assessments
  • Penetration Testing
  • Computer Forensics
  • Incident Response
slide-7
SLIDE 7
  • Typical Exploits
  • Cost of Cybercrime
  • Examples of SMB Crimes
  • Legal Issues
  • Compliance Issues

– PCI/DSS – HIPAA – GLBA

  • Cybersecurity Preparedness
  • Incident Response Plan
  • Training
  • Passwords
  • Email
  • Banking
  • Encryption

Agenda

slide-8
SLIDE 8

What’s happening out there?

slide-9
SLIDE 9

Plan for the attack

  • You will be hacked (if you haven’t been already)
  • You may not know when it happens.
  • You may be informed by your customer, credit card

processor or government regulator

  • You may be fined
  • You may be sued
  • You may end up in the news
slide-10
SLIDE 10

Typical Exploits

  • Phishing for user passwords or remote access
  • Hijacking a computer to use in a bot-net
  • Spamming to sell illegal or fraudulent products
  • Stealing intellectual property
  • Thefts from online bank and financial accounts
slide-11
SLIDE 11

Typical Exploits

  • Distribution of malware to other computers
  • Posting confidential information on the Internet
  • Holding critical information for ransom
  • Attacking critical network infrastructure to disrupt
  • perations
slide-12
SLIDE 12

Typical Exploits

  • Theft of data – all data has value!

– User credentials – Employee data – Customer data – Patient data – Financial data – Proprietary information

slide-13
SLIDE 13

Other Cyber Security Issues

  • Politically Motivated Attacks and Hacktivism

– Anonymous, Lulz Sec

  • Cyber-Warfare

– Stuxnet and Flame – Ukrainian electric utilities

  • Government Sponsored Cyber Spying

– NSA – China

slide-14
SLIDE 14

Top Two Attack Vectors

  • Email

– Clickable Links and Attachments – Phishing and Spear-phishing

  • Web Sites

– Malware distributed by compromised legitimate sites. – Spoofed or cloned sites – Search redirection malware

slide-15
SLIDE 15

Cost of Cyber-crime

  • Average annual loss per employee - $1500
  • In 2015, $400 billion in losses worldwide
  • 96% of small businesses unprepared for cyber attack

(Ernst and Young 2013 Survey)

slide-16
SLIDE 16

Small Business Targets

slide-17
SLIDE 17

Small Businesses in crosshairs

  • SMBs targeted by cyber-criminals
  • More money in the bank than individuals
  • Less security than larger enterprise businesses.
  • Employees have little or no training about cyber

security.

  • Easy to exploit
slide-18
SLIDE 18

NC Fuel Company Loses $800 K

  • 15 employee fuel distribution company.
  • Monthly payroll of $60,000
  • Thieves gained access to bank account using

compromised password

  • Bank had recently made changes to its security process

to make online banking “easier.”

  • Insurance only covered a portion of the loss.
slide-19
SLIDE 19

CA Escrow Company loses $1.5 M

  • 9 person company
  • 3 electronic transfers of about $500k each
  • One in Dec 2012 and two in Jan 2013
  • Bank provided two factor authentication, but it wasn’t

working at the time.

  • Although this company had never transferred funds
  • verseas, bank did not question large transfers – even after

the first was reported!

  • Company in receivership.
slide-20
SLIDE 20

Construction Company Loses $500K

  • $447,000 dollars was stolen from Ferma, a California

construction company.

  • A banking Trojan such as Zeus, downloaded from a web site.
  • A Ferma employee logs into their bank's on-line financial

Web portal.

  • After authentication was confirmed, the employee begins

making legitimate payments.

  • At the same time, the Zeus Trojan made 27 fund transfers

totaling $447,000 to various bank accounts.

slide-21
SLIDE 21

HVAC Vendor Opens Door For Target Xmas Attack

  • Fazio Mechanical small HVAC contractor to Target
  • Phishing email installed password stealing malware
  • Target network credentials stolen
  • Over 17 days between Thanksgiving and Dec 15, cyber-

thieves accessed Target’s POS system and collected credit card transaction information on 40 million customers.

slide-22
SLIDE 22

Slovenian Gang Target Small Business

  • Spoofed email sent looking like it came from a bank or a

tax authority warning of late payment.

  • Clicking on the link in the email installed a remote

access Trojan horse program

  • Thieves watched computer for online banking activity.
  • Withdrawals timed to occur on Friday or before a

holiday

  • Group netted $2.5 million.
slide-23
SLIDE 23

Regulatory Compliance and Legal Issues

slide-24
SLIDE 24

Legal Issues

  • Regulatory fines
  • Civil suits
  • Cyber insurance may not cover “willful negligence”
  • Cybersecurity or computer use policy
  • Incident Response Plan
slide-25
SLIDE 25

PCI/DSS

  • Payment Card Industry Data Security Standard v3.1

– Build and maintain a secure network – Protect cardholder data – Maintain vulnerability management program – Implement strong access control measures – Regularly monitor and test networks – Maintain information security policy

slide-26
SLIDE 26

PCI/DSS Penalties

  • Non-compliant companies can be fined $5000 to

$100,000 per month

  • $50-$90 per cardholder record compromised
  • Brand and reputation damage
  • Civil litigation
slide-27
SLIDE 27

HIPAA

  • Health Insurance Portability and Accountability Act
  • Regulates patient information

– Access – who can read it – Transmission – how data is transferred from location to location – Storage – how and where data is stored

  • Business Associate

– CIT employees need to be trained and certified if they have contact with patient information

slide-28
SLIDE 28

HIPAA Violation Penalties

  • Accidental - $100 per violation

– annual max $25,000

  • For cause - $1000 per violation

– annual max $100,000

  • Willful neglect - $10,000 per violation

– annual max $250,000

  • Uncorrected willful neglect - $50,000 per violation

– annual max $1.5 million

slide-29
SLIDE 29

GLBA

  • Gramm-Leach-Bliley Act
  • Financial Privacy Rule

– Consumers need to be informed how their information is used and may

  • pt out of information sharing
  • Safeguards Rule

– Consumer information security plan and implementation

  • Pretexting Provisions

– Systems and training to defeat social engineering

slide-30
SLIDE 30

GLBA Penalties

  • The penalties for violating the GLBA are quite severe:

– A financial institution can be fined up to $100,000 for each violation – The officers and directors can be fined up to $10,000 for each violation – Criminal penalties include imprisonment for up to 5 years, a fine, or both – If the GLBA is violated at the same time that another federal law is violated, or if the GLBA is violated as part of a pattern of any illegal activity involving more than $100,000 within a 12-month period, the violator's fine will be doubled and he or she will be imprisoned for up to 10 years

slide-31
SLIDE 31

Policy Considerations

slide-32
SLIDE 32

Cybersecurity Preparedness

  • Patch
  • Backup
  • Keep antimalware software updated
  • Enforce good password policy
  • Use two factor authentication when possible
  • Create alertness through training and events
slide-33
SLIDE 33

Incident Response Plan – Before the Breach

  • Plan to be attacked
  • Know who is in charge
  • Have a cybersecurity expert on retainer
  • Review insurance coverage
  • Review legal requirements and exposure
  • Plan for a media response
slide-34
SLIDE 34

Incident Response Plan – After the Breach

  • Find out what happened – review your logs
  • Remove affected devices from network
  • Save affected devices for forensics – do not wipe drives!
  • Report to the police and Internet Crime Complaint

Center

  • Responding to media – be brief but truthful
slide-35
SLIDE 35

Creating a More Secure Environment

slide-36
SLIDE 36

Train Your Staff

  • Train your employees in the fundamentals of

cybersecurity.

  • Create a data practices policy for your employees.
  • Even the most sophisticated security defenses cannot

prevent a malware breach that is permitted when an employee clicks on a malicious link in an email.

slide-37
SLIDE 37

The Basics

  • Internet security software on every computer
  • Hardware firewall – blocks attacks from outside
  • Intrusion Detection System (IDS) – detects attack traffic

both outside and inside the network

  • Security information and event management (SIEM) -

provides real-time analysis of security alerts generated by network hardware and applications

slide-38
SLIDE 38

Password policy

  • 10 characters or longer

– 8 character passwords can be cracked in under 12 hours – 10 character passwords take several centuries.

  • No dictionary words in any language
  • Use complexity rules, at least one from each group

– UPPER CASE – lower case – Num63r5 – $ym%o!s* _- ! @ # $ % & *

slide-39
SLIDE 39

Advanced Password policy

  • Character substitution (p@5$w0#d)
  • Use passphrase (i.e. @mBwu10cPW! = “at my business

we use 10 character pass words”)

  • Use two-factor authentication when available
  • Check password at Passfault (passfault.com)
  • Nothing will matter if you lose your plain text password to

a keylogger or phishing exploit

slide-40
SLIDE 40
slide-41
SLIDE 41

Physical Security

  • Server in locked server room or closet
  • Beware unescorted visitors or vendors
  • Mobile employees and laptop users should put laptop in

trunk not on the seat.

  • Intellectual property often leaves the building on a flash

drive.

  • Use data encryption to protect against loss or theft of

computers.

slide-42
SLIDE 42

Email Security

  • Never click on a link in an email, its always safer to type

in the address manually.

  • Never open an email attachment until you confirm who

sent it and why they sent it.

  • Use email encryption if your provider supports it.
slide-43
SLIDE 43

Avoid Phishing Emails

  • Fake but realistic looking emails
  • Attachments, often in .zip format will install exploit code,

such as CryptoWall ransomware.

  • Malicious links take you to fake websites.
  • Trojan horse malware is downloaded.
  • Personal information is surrendered via a web form.
slide-44
SLIDE 44

How To Catch a Phish

slide-45
SLIDE 45
slide-46
SLIDE 46

Web Security

  • Use the most up to date web browser versions

– Internet Explorer 11 – Firefox 26 – Chrome 31 – Safari 7

  • Be wary of changes to your home page or search

provider

slide-47
SLIDE 47

Banking

  • On-line banking – are you using all the security tools your

bank provides?

– Two factor authentication? – Treasury management?

  • Find out what security features are provided by your

bank.

  • Will your bank alert you if there unusual transactions?
  • Whose responsible for unauthorized transactions?
slide-48
SLIDE 48

Zeus and Neverquest Bank Trojans

  • Zeus – 2009
  • Neverquest – 2013
  • Dyre Wolf - 2015

– Multiple installation avenues – Automatically looks for vulnerable computers – Works like a botnet – Keylogger watches for banking activity – Captures your banking logon credentials – Allows remote attacker to transfer money from your bank account using your

  • wn computer.

– Also watches for logon info for other accounts.

slide-49
SLIDE 49

Protect against Banking Trojans

  • Use a bootable LiveCD

– OS and apps on a CD cannot be changed – Linux based OS

  • Use a dedicated computer system for all banking and

financial transactions

– Linux is better than Windows – Google Chromebook

slide-50
SLIDE 50

Encryption

  • Use encryption whenever possible

– HTTPS websites – VPN for mobile workers or traveling employees – Full disk encryption for laptops – Encryption for employee and client records, proprietary data – Encrypted email solutions like Zix

slide-51
SLIDE 51

Where Do I Begin?

slide-52
SLIDE 52

CIT Cybersecurity Services

  • Cybersecurity Awareness Training
  • Security Audits
  • Vulnerability Assessments
  • Penetration Testing
  • Computer Forensics
  • Incident Response Management
slide-53
SLIDE 53

More CIT Cybersecurity Services

  • Zix secure email
  • Data backup and recovery solutions
  • Computer Use and Cybersecurity Policy development
  • Business Continuity and Disaster Recovery
  • Incident Response Planning
slide-54
SLIDE 54

Thank You!

Any questions?

slide-55
SLIDE 55

Thanks

  • Please take a business card
  • Contact me for a security review or on-site training for

your employees.

– bob.weiss@cit-net.com – 651 387-1668