4
1 Copyright iSecure LLC 2014 Information Security Concerns and Strategies by New York State Government Professionals A Whitepaper by Oliver S. Riley, Information Secu- rity Analyst, and Kevin Wilkins, CTO, iSecure LLC iSecure is dedicated to finding the best solutions for challenges facing the InfoSec community. iSe- cure does extensive product research and inter- acts closely with clients to develop the best recom- mendations possible, not only from the standpoint of product but also from the standpoint of strate- gy. iSecure recognizes that the perspective and needs of the state and local government is very different from that of a private organization. We sought to identify the threats and trends experienced by members of the governmental community. iSecure partnered with The Hacker Academy to conduct a survey to assess the security environ- ment experienced by state and local government community members. At the 2014 New York State Cyber Security Confer- ence we asked questions relating to the concerns and perceived security posture of the various or- ganizations represented by the event participants and received 74 responses. After reviewing the data, this report was generated with some high- lights and commentary regarding the state of I.T. Security amongst New Yorks state and local gov- ernments. The majority of people we spoke to were members of engineering and technical staff; people who work daily with the intricacies and challenges of information security. By far, the most important points raised tie around Employee Awareness and Phishing which will be the focus of this paper. We started off asking What is the greatest challenge when it comes to managing Information Security Risk in your or- ganization?, and What do you believe is the greatest Information Security risk your organization faces today? Top on the list were Accidental Insider threats and Employee Awareness, respectively. These results reflected previous stud- ies conducted amongst private organizations. Cybercriminals are persistently updating and fine-tuning the techniques they use to compromise an organization, and very often the human element is the most easily exploited. The top defense lies in training your organization s employees about the importance of Security Awareness. Once an employee learns to watch out for and perceive a potential hazard, finer-tuned dis- cretion can follow. Develop policies and procedures detailing acceptable and safe use of an organization s IT Infrastructure, then utilize a training program to educate your employees about these policies and procedures. The program should have a cycle of refreshses- sions in which changes to policy can be communicated, new threats can be explained, and the importance of IT Security aware- ness can be reinforced. Recent incidents, their causes, and corrections to behavior can also be discussed.

Information Security Concerns and ... - Home - iSecure · iSecure is dedicated to finding the best solutions ... Once an employee learns to watch out for and perceive a potential

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Security Concerns and ... - Home - iSecure · iSecure is dedicated to finding the best solutions ... Once an employee learns to watch out for and perceive a potential

1

Copyright iSecure LLC 2014

Information Security Concerns

and Strategies by New York

State Government Professionals A Whitepaper by Oliver S. Riley, Information Secu-

rity Analyst, and Kevin Wilkins, CTO, iSecure LLC

iSecure is dedicated to finding the best solutions

for challenges facing the InfoSec community. iSe-

cure does extensive product research and inter-

acts closely with clients to develop the best recom-

mendations possible, not only from the standpoint

of product but also from the standpoint of strate-

gy.

iSecure recognizes that the perspective and needs

of the state and local government is very different

from that of a private organization. We sought to

identify the threats and trends experienced by

members of the governmental community.

iSecure partnered with The Hacker Academy to

conduct a survey to assess the security environ-

ment experienced by state and local government

community members.

At the 2014 New York State Cyber Security Confer-

ence we asked questions relating to the concerns

and perceived security posture of the various or-

ganizations represented by the event participants

and received 74 responses. After reviewing the

data, this report was generated with some high-

lights and commentary regarding the state of I.T.

Security amongst New York’s state and local gov-

ernments.

The majority of people we spoke to were members

of engineering and technical staff; people who

work daily with the intricacies and challenges of

information security.

By far, the most important points raised tie around

Employee Awareness and Phishing which will be

the focus of this paper.

We started off asking “What is the greatest challenge when it comes to managing Information Security Risk in your or-

ganization?”, and “What do you believe is the greatest Information Security risk your organization faces today?”

Top on the list were Accidental Insider threats and Employee Awareness, respectively. These results reflected previous stud-

ies conducted amongst private organizations.

Cybercriminals are persistently updating and fine-tuning the techniques they use to compromise an organization, and very

often the human element is the most easily exploited. The top defense lies in training your organization’s employees about the

importance of Security Awareness. Once an employee learns to watch out for and perceive a potential hazard, finer-tuned dis-

cretion can follow.

Develop policies and procedures detailing acceptable and safe use of an organization’s IT Infrastructure, then utilize a training

program to educate your employees about these policies and procedures. The program should have a cycle of “refresh” ses-

sions in which changes to policy can be communicated, new threats can be explained, and the importance of IT Security aware-

ness can be reinforced. Recent incidents, their causes, and corrections to behavior can also be discussed.

Page 2: Information Security Concerns and ... - Home - iSecure · iSecure is dedicated to finding the best solutions ... Once an employee learns to watch out for and perceive a potential

2

Copyright iSecure LLC 2014

Many (19%) of the organizations we spoke to had

not a single breach or cybersecurity event in the last

year, where some (7%) had eight or more breaches.

The majority (54%) of people we spoke to, most of

whom work intimately with the information infra-

structure of their organization, had no idea if they

had experienced any breaches in the last year or

were unwilling to divulge such information.

The organization that got hit eight times and knows

about it is way ahead of the organization remains in

the dark.

Previous studies have indicated that Malware was far and away the most prevalent vector for an InfoSec breach, but this

survey shows that Phishing is entering a new renaissance. Phishing attempts have become more sophisticated, carefully

tailored and directed at specific weak points within an organization. iSecure itself is targeted regularly by very convinc-

ing phishing attempts, and it is only through User Awareness that we have a baseline of defense against those attacks.

When Hacked...

Most organizations endured a disruption in

productivity, but others incurred directly

detrimental consequences when hacked.

While a loss of productivity isn’t an imme-

diate blow to the bottom line, it ultimately

can be quite costly. The other potential

outcomes are more straightforward in

their damage, but by far the worst conse-

quence is ignorance of what was taken/

damaged.

Page 3: Information Security Concerns and ... - Home - iSecure · iSecure is dedicated to finding the best solutions ... Once an employee learns to watch out for and perceive a potential

3

Copyright iSecure LLC 2014

As discussed on the previous page, Phishing was the most prevalent cause of security incidents. Phishing is an email-related

exploit. Email Security Gateways can filter the inbound emails for malicious attachments, known Phishers, and links to

Phishing Sites. Email Security Gateways can also use signatures, context and heuristics to detect messages suspected of be-

ing Phishing attacks. UTM and Next Generation Firewalls with URL filtering technology can block access attempts to known

Phishing sites. Host Based Security (Antivirus) can also block malicious payloads and detect Phishing URLs.

But these technical controls are not perfect - polymorphism, zero-day exploits, and rapidly changing lists of attack sites can

overwhelm the capabilities of technologies based on signatures and blacklists.

Continuous training which improves the Users’ Awareness of what a Phishing attack looks like is necessary.

User Awareness training can also teach what information is safe to enter into a website when prompted, and when some

additional investigation is warranted. Phishers will often lure the victim into entering Username, Passwords, and other per-

sonal information into a fake site.

What attachments were sent with the email, are they actually from a trusted source, and should they actually be opened?

Another type of a Phishing attack will appear to be from a known source with a relevant attachment. The goal is to entice a

User to open the attachment and execute its malicious payload. In some ways, these tie into Installation of Trojan/Fakeware

and Malware via Application/OS Exploit. Examples might be a “Plugin” to open encrypted Emails (Trojan), an executable

disguised as a PDF, or an Office document designed to exploit an unpatched bug in Word.

Building knowledge and awareness to prevent User follow-through on Phishing attempts is critical.

In addition to periodic training exposures, timely information is also helpful. Very often your organization will be the target

of a focused Phishing campaign, with multiple similar messages circumventing technical controls and being delivered to a

number of users. As these Phishing emails are discovered, put screenshots of the messages into a memo to be sent com-

panywide.

Beyond training users in the identification of suspicious messages, training their behavior is also key. As a general rule, us-

ers should be suspicious of everything! Unless they are specifically expecting an attachment or a communication from an

outside website, they should follow through via a separate channel to confirm its legitimacy. Safe behaviors would be to call

the sender of an attachment to verify its source and content. Or, instead of directly following a possibly fake link in an email,

manually type the known and familiar URL into a browser.

Developing an Employee Awareness program which is comprehensive and frequent can reduce your organizations exposure

to this very common and serious threat.

Page 4: Information Security Concerns and ... - Home - iSecure · iSecure is dedicated to finding the best solutions ... Once an employee learns to watch out for and perceive a potential

4

Copyright iSecure LLC 2014

While technology can do a lot to stop hackers, viruses and malware, humans remain the single biggest threat. MAD Secu-rity’s research of human nature has led to the development of a unique approach that enables our clients to effectively reduce the threat against their organizations. To help ensure a holistic approach to security, MAD has created the Hacker Academy.

The Hacker Academy is a place for organizations of all sizes to educate and secure their staff; both technical and non-technical alike. Members are provided an engaging, cloud based, training environment to practice and deploy what they have learned immediately and effectively. THA's Security Awareness training is specifically targeted for each role within an organization. This helps organizations deliver meaningful and effective content.

- Megan Horner, The Hacker Academy

At iSecure we believe that User Awareness Training is the first line of defense against an ever changing litany of cyberse-

curity threats. This ethic is shared by members of the local and state government community in majority (56%), but still

too many organizations don’t train their people on the basics of how to stay safe on the internet.

Without proper understanding of what out there is dangerous, an

organization opens itself up to a barrage of potentially completely

avoidable cybersecurity threats. With an appropriate level of user

awareness, an organization can become adept at mitigating its risk

profile and managing what threats it gives an opportunity to.