34
Chris Benson CEO, AlwaysOnIT www.AlwaysOnIT.com IT Security Protections EVERY Business Must Have In Place

IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Chris BensonCEO, AlwaysOnIT

www.AlwaysOnIT.com

IT Security Protections EVERY Business Must Have In Place

Page 2: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

• ID Theft – How it happens and what to do about it.

• The #1 security threat to your systems that antivirus, firewalls, and other security protocols can’t protect against.

• Protections you can put in place that will greatly reduce the risk & impact of a cybersecurity incident.

• Why traditional firewalls and antivirus software aren’t enough anymore.

• How to make sure your staff don’t become complacent and unwittingly allow your agency to become a statistic.

Today We’re Going To Cover

Page 3: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

The Evolution

Of Crime

Page 4: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

What is identity theft?

Identity theft:

• Someone steals personal information (could be yours, your employees, your clients)

• Uses it without permission

• Can damage your finances, credit history, and reputation

Page 5: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

How does identity theft happen?

• Spam / Spear Phishing Scams

• Malware

• 3rd party leaks

• Supply-chain Attacks

• Honeypots

Page 6: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place
Page 7: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Data Breach Statistics - 2017

Source: https://breachlevelindex.com/

Page 8: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Source: https://breachlevelindex.com/

Data Breach Statistics - 2017

Page 9: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place
Page 10: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Nice little organization you have there, it’d be a shame if something happened to it….

Page 11: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Trouble Ahead…• Send out spam emails

• Launch denial of service attacks (DDos)

• Commit advertising fraud

• Host phishing websites

• Distribute malware, ransomware, or spyware

• Distribute pirated content

• Download & distribute undesirable content

Key Point: This is all being done on YOUR network! When the law comes looking, who will be on the hook?

Page 12: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Recent Examples – City Of AtlantaSamSam Malware

What Happened?

- Network was infected with SamSam malware.

- Unlike many ransomware variants that spread through phishing or online scams and require an individual to inadvertently run a malicious program on a PC (which can then start a chain reaction across a network), SamSaminfiltrates by exploiting vulnerabilities or guessing weak passwords in a target's public-facing systems, and then uses mechanisms like the popular Mimikatz password discovery tool to start to gain control of a network.

- Attackers choose their targets carefully — often institutions like local governments, hospitals and health records firms, and universities that may prefer to pay the ransom than deal with the infections themselves and risk extended downtime. They set the ransoms — $50,000 in the case of Atlanta — at price points that are both potentially manageable for victim organizations and worthwhile for attackers.

- Estimated cleanup costs: $2.7 million – just for external consultants to come and assess damage, develop action plans, and review the city’s IT systems

Source: https://www.wired.com/story/atlanta-ransomware-samsam-will-strike-again/Source: https://www.wsbtv.com/news/local/atlanta/ransomware-attack-cost-city-27-million-records-show/730813530

Page 13: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place
Page 14: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place
Page 15: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

How did this happen? What could they have done to prevent it?- An unpatched server caused this hack!- The company was aware of the flaw 2 months before the hack,

but never installed the patch.

Page 16: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Supply Chain Malware Attacks

In 2017 the popular system software CCleaner suffered a massive supply-chain malware attack. Hackers compromised the company's servers for more than a month and replaced the original version of CCLeaner with a malicious one.

Between August and September, 2.3 million users were infected when they downloaded or updated the software.

First sign of attack came on March 11th – 5 months before the actual infected software was slipped in. Hackers used previously compromised credentials to access the user’s Team Viewer account, and then once access was established, installed malicious software onto the initial machine.

Using that first machine & credentials, the attackers were able to piggy-back into a second computer and the attack went on from there.

The ‘trojan’ version of CCleaner was deployed on August 2nd, and not detected until September 13th. Within 3 days of notification, the FBI was able to shut down the attack.

Source: https://thehackernews.com/2018/04/ccleaner-malware-attack.html

Page 17: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Source: https://www.abc15.com/news/let-joe-know/alert-thieves-create-fake-hotel-wi-fi-hot-spots-to-steal-your-information

Honeypot / Man-in-the-middle Attacks

• Attacker setups up a wireless hotspot with a common name like ‘Hotel WiFi’

• Inexpensive ‘high gain’ antenna guarantees his signal is the strongest in the area

• Attacker creates a mirror image of the hotel’s own wifi login page

• Anyone who uses this ‘honeypot’ wifi connection will have all their internet traffic routed thru the attacker’s computer

• Freely available software helps the attacker quickly ferret out usernames, passwords, or other sensitive data

• Security experts said in 2013 that 38% of all credit card fraud involved the hotel industry

Page 18: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

What If I Get Breached?

Source: https://tax.thomsonreuters.com/blog/organizations/accounting-firms/your-firms-been-hacked-heres-what-to-do-immediately/

- Quickly determine if you must quarantine any or all of your PCs or other devices, and your network.

- Contact your legal department- Evaluate what the scope of the breach is – what was accessed and when- Notify staff that incident is confidential until communication plan is established- Determine which clients have been impacted- Contact your insurance company- Create an incident report – this tells the story of who, what, when, etc- Contact law enforcement (FBI, state / local criminal investigation units)- Contact IRS criminal investigation unit- Contact state regulatory authorities- Develop plan for how you will notify your chain of command- Ensure all staff are on the same script for any external client interactions- Pick one person to be the external spokesperson for the firm

Page 19: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

So, How Do I Protect Myself?

• IRS Publication 4557 – Safeguarding Taxpayer Data

• NIST SP 800-53 - Safeguarding Taxpayer Data - References To Applicable Standards & Best Practice

• NIST SP 800-171 – Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

Page 20: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place
Page 21: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Two Factor Authentication (2FA)

• Something the user knows (username, password, secret, PIN)

• Something the user has (security token, smart phone, security card / badge)

• A unique physical characteristic of the user (fingerprint, retina, voice)

• Improved security – much harder for attacker to gain unauthorized access, even if the user’s password is compromised.

• Makes life easier for users – passwords don’t need to be changed frequently. Your IT department will thank you too.

Page 22: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Acceptable Use Policy & User Training

• Written & communicated policies – are personal devices allowed on the network? Can I surf Facebook or Netflix from my work computer? Can my kids do their homework on my work computer?

• Phish testing – builds ‘top of mind’ awareness for information security. Also gives leadership true picture of security awareness of staff BEFORE a breach.

• No admin rights – leaders, I’m looking at you!

• It’s your organization – time = money.

Page 23: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place
Page 24: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Email Security

• Spam – annoying & time-wasting

• Phishing – dangerous & expensive

• Malware – ransomware, viruses, launch point for intrusions

• Archiving / Compliance – enforce company or regulatory policies

• Encryption – secure confidential information

• Business Continuity – protect against outages or data loss

Page 25: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Email Attachment Blocking

1. Why block attachments?

2. But what if I need to get a file of <some type that is blocked>?

3. It’s inconvenient to block all those attachments!

4. Which attachments should I block?

"ace", "ade", "adp", "ani", "app", "asp", "bas", "bat", "cer", "chm", "cmd", "com", "cpl", "crt", "csh", "der", "dll", "docm", "dos", "exe", "fxp", "gadget", "hlp", "hta", "inf", "ins", "iso", "lsp", "lts", "jar", "js", "jse", "ksh", "lnk", "mad", "maf", "mag", "mam", "maq", "mar", "mas", "mat", "mau", "mav", "maw", "mda", "mdb", "mde", "mdt", "mdw", "mdz", "msc", "msh", "msh1", "msh1xml", "msh2", "msh2xml", "mshxml", "msi", "msp", "mst", "obj", "ops", "os2", "pcd", "pif", "plg", "prf", "prg", "ps1", "ps1xml", "ps2", "ps2xml", "psc1", "psc2", "pst", "rar", "reg", "rtf", "scf", "scr", "sct", "shb", "shs", "tmp", "url", "vb", "vbe", "vbs", "vbmacros", "vsw", "w16", "ws", "wsc", "wsf", "wsh", "xnk"

Page 26: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Business Continuity / Backups

• Keep 3 copies of any data you want to keep – the original, an onsite copy, and a copy offsite

• Determine your Recovery Time Objective & Recovery Point Objectives

• Avoid consumer-grade backup services – you get what you pay for

• Have a written business continuity plan, and test it before you need it

• RAID is not a backup!

Page 27: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

DNS Filtering & Protection

Page 28: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Intelligent Firewall (Security Appliance)

• Active Protection – antivirus / anti-malware, intrusion protection / detection

• Content Filtering – monitor and/or enforce company acceptable use policies

• SSL decryption & inspection – About 50% of internet traffic is encrypted (source: EFF.org report Feb 2017)

• Secure Remote Access – mobile workers & telecommuters

• Bandwidth management – ensure VOIP phone quality, prevent bandwidth hogs

• Visualization & Reporting – proactively identify anomalies

Page 29: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Desktop & Server Malware Protection

Page 30: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Identifying Malware Behavior

Page 31: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Desktop & Server Malware Protection

• Signature-based protection is not enough

• Behavior-based technology is advancing

• Consider application whitelisting – security vs. convenience trade-offs

• Ransomware-aware – can undo damage done by malware

• Website browsing protection

• Keep software patched and updated!

Page 32: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

What Else Can You Do?• Never open email attachment or link unless you are expecting it.

• Do not use hotel or free WIFI unless connected to VPN. Use a ‘hotspot’ from your cellular provider instead.

• Be proactive – if you see something that looks odd or unusual, don’t assume ‘it’s probably nothing’.

• Be wary of connecting any network capable device to your network (e.g. wireless devices, Amazon / Google devices, NAS storage devices).

• Encrypt laptops and mobile devices to reduce the impact of a lost or stolen device.

• Carefully inspect links in email or Google searches to avoid ‘poisoned’ links.

Page 33: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

• Sign up for e-mail or text alerts from your bank whenever a withdrawal or charge happens.

• Be aware that debit cards may not offer the same fraud protection as a credit card.

• Have a dedicated PC for online banking and DON’T use that PC for accessing any other web sites, e-mail access, social media sites or for downloading files and applications.

• Require YOUR signature for any wire transfers.

• Have your money spread out in multiple accounts to minimize the risk.

Tips For Protecting Your Finances:

Page 34: IT Security Protections · •The #1 security threat to your systems that antivirus, firewalls, and other security protocols cant protect against. •Protections you can put in place

Thank You!

https://www.alwaysonit.com503-601-4335

[email protected]

Download a copy of this presentation here:https://www.alwaysonit.com/presentation