am i too small to be a target
play

Am I Too Small To Be A Target? Cybersecurity Issues for Small - PowerPoint PPT Presentation

Am I Too Small To Be A Target? Cybersecurity Issues for Small Businesses A Special Presentation For <Name> Date Location Special thanks to Your Speaker Bob Weiss MCSE, A+, CEH Senior Cybersecurity Engineer at CIT


  1. Am I Too Small To Be A Target? Cybersecurity Issues for Small Businesses

  2. A Special Presentation For <Name> • Date • Location • Special thanks to

  3. Your Speaker – Bob Weiss MCSE, A+, CEH • Senior Cybersecurity Engineer at CIT • Certified Ethical Hacker – 2013 • Cybersecurity Blogger @ wyzguyscybersecurity.com and cit-net.com/tech-talk/

  4. CIT Cybersecurity Services • Cybersecurity Awareness Training • Security Audits • Vulnerability Assessments • Penetration Testing • Computer Forensics • Incident Response

  5. Agenda • Typical Exploits • Cybersecurity Preparedness • Incident Response Plan • Cost of Cybercrime • Training • Examples of SMB Crimes • Passwords • Legal Issues • Email • Compliance Issues • Banking – PCI/DSS – HIPAA • Encryption – GLBA

  6. What’s happening out there?

  7. Plan for the attack • You will be hacked (if you haven’t been already) • You may not know when it happens. • You may be informed by your customer, credit card processor or government regulator • You may be fined • You may be sued • You may end up in the news

  8. Typical Exploits • Phishing for user passwords or remote access • Hijacking a computer to use in a bot-net • Spamming to sell illegal or fraudulent products • Stealing intellectual property • Thefts from online bank and financial accounts

  9. Typical Exploits • Distribution of malware to other computers • Posting confidential information on the Internet • Holding critical information for ransom • Attacking critical network infrastructure to disrupt operations

  10. Typical Exploits • Theft of data – all data has value! – User credentials – Employee data – Customer data – Patient data – Financial data – Proprietary information

  11. Other Cyber Security Issues • Politically Motivated Attacks and Hacktivism – Anonymous, Lulz Sec • Cyber-Warfare – Stuxnet and Flame – Ukrainian electric utilities • Government Sponsored Cyber Spying – NSA – China

  12. Top Two Attack Vectors • Email – Clickable Links and Attachments – Phishing and Spear-phishing • Web Sites – Malware distributed by compromised legitimate sites. – Spoofed or cloned sites – Search redirection malware

  13. Cost of Cyber-crime • Average annual loss per employee - $1500 • In 2015, $400 billion in losses worldwide • 96% of small businesses unprepared for cyber attack (Ernst and Young 2013 Survey)

  14. Small Business Targets

  15. Small Businesses in crosshairs • SMBs targeted by cyber-criminals • More money in the bank than individuals • Less security than larger enterprise businesses. • Employees have little or no training about cyber security. • Easy to exploit

  16. NC Fuel Company Loses $800 K • 15 employee fuel distribution company. • Monthly payroll of $60,000 • Thieves gained access to bank account using compromised password • Bank had recently made changes to its security process to make online banking “easier.” • Insurance only covered a portion of the loss.

  17. CA Escrow Company loses $1.5 M • 9 person company • 3 electronic transfers of about $500k each • One in Dec 2012 and two in Jan 2013 • Bank provided two factor authentication, but it wasn’t working at the time. • Although this company had never transferred funds overseas, bank did not question large transfers – even after the first was reported! • Company in receivership.

  18. Construction Company Loses $500K • $447,000 dollars was stolen from Ferma, a California construction company. • A banking Trojan such as Zeus, downloaded from a web site. • A Ferma employee logs into their bank's on-line financial Web portal. • After authentication was confirmed, the employee begins making legitimate payments. • At the same time, the Zeus Trojan made 27 fund transfers totaling $447,000 to various bank accounts.

  19. HVAC Vendor Opens Door For Target Xmas Attack • Fazio Mechanical small HVAC contractor to Target • Phishing email installed password stealing malware • Target network credentials stolen • Over 17 days between Thanksgiving and Dec 15, cyber- thieves accessed Target’s POS system and collected credit card transaction information on 40 million customers.

  20. Slovenian Gang Target Small Business • Spoofed email sent looking like it came from a bank or a tax authority warning of late payment. • Clicking on the link in the email installed a remote access Trojan horse program • Thieves watched computer for online banking activity. • Withdrawals timed to occur on Friday or before a holiday • Group netted $2.5 million.

  21. Regulatory Compliance and Legal Issues

  22. Legal Issues • Regulatory fines • Civil suits • Cyber insurance may not cover “willful negligence” • Cybersecurity or computer use policy • Incident Response Plan

  23. PCI/DSS • Payment Card Industry Data Security Standard v3.1 – Build and maintain a secure network – Protect cardholder data – Maintain vulnerability management program – Implement strong access control measures – Regularly monitor and test networks – Maintain information security policy

  24. PCI/DSS Penalties • Non-compliant companies can be fined $5000 to $100,000 per month • $50-$90 per cardholder record compromised • Brand and reputation damage • Civil litigation

  25. HIPAA • Health Insurance Portability and Accountability Act • Regulates patient information – Access – who can read it – Transmission – how data is transferred from location to location – Storage – how and where data is stored • Business Associate – CIT employees need to be trained and certified if they have contact with patient information

  26. HIPAA Violation Penalties • Accidental - $100 per violation – annual max $25,000 • For cause - $1000 per violation – annual max $100,000 • Willful neglect - $10,000 per violation – annual max $250,000 • Uncorrected willful neglect - $50,000 per violation – annual max $1.5 million

  27. GLBA • Gramm-Leach-Bliley Act • Financial Privacy Rule – Consumers need to be informed how their information is used and may opt out of information sharing • Safeguards Rule – Consumer information security plan and implementation • Pretexting Provisions – Systems and training to defeat social engineering

  28. GLBA Penalties • The penalties for violating the GLBA are quite severe: – A financial institution can be fined up to $100,000 for each violation – The officers and directors can be fined up to $10,000 for each violation – Criminal penalties include imprisonment for up to 5 years, a fine, or both – If the GLBA is violated at the same time that another federal law is violated, or if the GLBA is violated as part of a pattern of any illegal activity involving more than $100,000 within a 12-month period, the violator's fine will be doubled and he or she will be imprisoned for up to 10 years

  29. Policy Considerations

  30. Cybersecurity Preparedness • Patch • Backup • Keep antimalware software updated • Enforce good password policy • Use two factor authentication when possible • Create alertness through training and events

  31. Incident Response Plan – Before the Breach • Plan to be attacked • Know who is in charge • Have a cybersecurity expert on retainer • Review insurance coverage • Review legal requirements and exposure • Plan for a media response

  32. Incident Response Plan – After the Breach • Find out what happened – review your logs • Remove affected devices from network • Save affected devices for forensics – do not wipe drives! • Report to the police and Internet Crime Complaint Center • Responding to media – be brief but truthful

  33. Creating a More Secure Environment

  34. Train Your Staff • Train your employees in the fundamentals of cybersecurity. • Create a data practices policy for your employees. • Even the most sophisticated security defenses cannot prevent a malware breach that is permitted when an employee clicks on a malicious link in an email.

  35. The Basics • Internet security software on every computer • Hardware firewall – blocks attacks from outside • Intrusion Detection System ( IDS ) – detects attack traffic both outside and inside the network • Security information and event management ( SIEM ) - provides real-time analysis of security alerts generated by network hardware and applications

  36. Password policy • 10 characters or longer – 8 character passwords can be cracked in under 12 hours – 10 character passwords take several centuries. • No dictionary words in any language • Use complexity rules, at least one from each group – UPPER CASE – lower case – Num63r5 – $ym%o!s* _- ! @ # $ % & *

  37. Advanced Password policy • Character substitution (p@5$w0#d) • Use passphrase (i.e. @mBwu10cPW! = “at my business we use 10 character pass words”) • Use two-factor authentication when available • Check password at Passfault (passfault.com) • Nothing will matter if you lose your plain text password to a keylogger or phishing exploit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend