Sei sulla pagina 1di 47

Cyber Security Seminar - 2014

Presenter: Tim Lenhoff, Chief Technology Officer


Agenda

 Introductions and Logistics


 How Safe Are You?
 A Year in Review
 Cyber Security - 2014
 Top 10 Cyber Attack Methods
 Security Counter Measures
 Columbia Bank - Managing Risk

2
How Safe Are You?

3
How Safe Are You?
Data Breaches by Sector in 2012-2013

3% 3%
4%

5%
Healthcare
6% 36% Education
Government
Accounting
6% Computer Software
Financial
Information Technology
9% Telecom
Computer Hardware
Community/Non Profit

13%
16%

4
Source: Symantec Internet Security Threat Report April 2013
How Safe Are You?

Adobe Systems (Photo Shop and Acrobat products)


On October 3, 2013, Adobe faced two attacks from cyber
criminals who stole credit card data of 2.9 million customers.
Its security team had discovered the sophisticated attacks
involving illegal access of customer information and source
code of many Adobe products.
After further investigation, it was confirmed that the
attackers obtained access to Adobe IDs and what were at the
time valid, encrypted passwords for approximately 38
million active users.

5
How Safe Are You?
Facebook, Gmail and Twitter Breach
November 2013, hackers stole usernames and
passwords for nearly two million accounts at
Facebook, Google, Twitter, Yahoo and ADP.
The massive data breach was a result of key logging
software maliciously installed on an untold number of
computers around the world. The virus captured log-in
credentials for key websites and sending those
usernames and passwords to a server controlled by the
hackers. Approximate numbers of accounts:
•318,000 Facebook •70,000 Gmail, Google+ and
YouTube •60,000 Yahoo •22,000 Twitter •8,000 ADP
•8,000 LinkedIn
6
How Safe Are You?
Target Data Breach
December 2013, credit and debit card information of as many
as 70 million customers was compromised over three weeks
of the holiday shopping season —one of the largest breaches
ever of American consumer data.
Target said that the information compromised included
customer names, card numbers, expiration dates and the
short verification codes known as CVVs.
It is believed that hackers broke into the retailer's network
using login credentials stolen from a heating, ventilation and
air conditioning company that does work for Target at a
number of locations.
7
How Safe Are You?
Blue Cross Blue Shield Breach
December 2013, a pair of laptops containing
unencrypted patient data was stolen from Horizon
Blue Cross Blue Shield of New Jersey’s Newark
headquarters. The Apple MacBook Pros held
information from almost 840,000 Horizon BCBSNJ
members.
It is believed that the laptops, which were cable-
locked to workstations, contained information
including names, addresses, dates of birth, clinical
information, and Social Security numbers.

8
How Safe Are You?
NSA Surveillance Program Breach
Edward Snowden, the high-profile Booz Allan government
contractor, received widespread headlines for releasing
data on the National Security Agency's surveillance
program as part of its counter terrorism activities.
This security breach is an example of the internal threats
posed to organizations.
Snowden was with Booz Allan for only three months,
assigned to a team in Hawaii. Snowden had access to top-
secret data and over time used a thumb drive to take
thousands of confidential documents, damaging to the
NSA.
9
A Year in Review

10
The Cost of Cyber Crime Services
Service for Sale Cost of Service

Trojan for bank account stealing $1,300

Trojan for web page data replacement in a browser $850

Hiring a DDoS attack $30 - $70/day, $1,200 / month

Email Spamming $10 / 1 million emails

Email Spamming using customer database $50 - $500 / 50,000 – 1 mil

SMS Spamming $3 - $150 / 100-10,000 texts

Windows Rootkit $292

Ransom ware $8 - $20

Fake Websites $5 - $50

Zues source code $200 - $500

Hacking Facebook or Twitter account $130

Hacking Gmail account $162


Hacking corporate mailbox $500 11
*Source: TrendMicro Research paper 2012 – Russian Underground 101
A Year in Review
Information Exposed in Breaches in 2013

70% Real Names

40% Social Security Numbers

40% Birth Dates

36% Home Address

31% Medical Records

12
*Source: Symantec Internet Security Threat Report – December 2013
A Year in Review
Top 5 Social Media Attacks, 2013
Fake Offering – Invites users to join a fake event
81% Fake Offering or group with incentives such as free gift cards.
Joining often requires users to share credentials
or send a text to a premium rate number.
7% Likejacking
Likejacking – Using fake “Like” buttons to install
malware.
6% Fake Plug-in Fake Plug-in Scams – Tricked into downloading
fake browser extensions on their machines.

2% Fake Apps Fake Apps– Applications provided by attackers


that appear to be legitimate apps; however, they
contain a malicious payload. The attackers often
take legitimate apps, bundle malware with them,
2% Manual Sharing and then re-release it as a free version of the
app.

Manual Sharing – Rely on victims to share


videos, fake offers or messages they share with
their friends.
*Source: Symantec Internet Security Threat Report – December 2013 13
Cyber Security - 2014

14
Cyber Security - 2014
Priorities and Concerns for 2014
• Social Media Will Continue to Grow
• As they go mobile and add payment mechanisms, they will attract even more attention
from online criminals with malware, phishing, spam and scams.
• Criminals will target teenagers, young adults and other people who may be less guarded
about their personal data and insufficiently security-minded to protect their devices and
avoid scams.

• Websites Will Become More Difficult to Manage / Navigate


• Criminals will increasingly infect websites with Malware and attack kits. Software vendors
will become pressured to “fix” vulnerabilities quicker.
• Users and companies that employ them will need to become more proactive about
maintaining privacy and security.

• Growing Risk of Unpatched Systems


• As of April 8, 2014 no new security patches are available for Windows XP and Office 2003
making home computer systems, specialized markets such as point of sale and medical
equipment extremely vulnerable……Heartbleed….. 15
Cyber Security - 2014
Priorities and Concerns for 2014
• Phishing
• Identities are valuable. Phishing attacks will continue to get smarter and more
sophisticated.
• Phishing will become more regional and specific.
• Social Media websites and trusted messaging platforms will become bigger targets.

• Managing Mobile Malware


• Mobile Phones and Tablets are becoming the new hardware platform. Prepare for
Ransom ware and website infections on these new devices.
• Consider this security risk when allowing employees to bring their own devices into
the workplace.

16
Anatomy of a Hacked Mobile Device:
How a hacker can profit from your smartphone

17
Top 10 Cyber Attack Methods

18
Top 10 Cyber Attack Methods

1. E-mail Attachments 2. Portable Media


• Common method of distribution • Any device that can store
of malicious code. information. (CD, DVD, HD-DVD,
• E-mail is inherently insecure. Blu-Ray, etc.), tapes, external
hard drives, USB drives, and
• The source of an e-mail address memory cards.
can be easily spoofed as
someone that you trust. • Any storage device can support
both benign and malicious
• Avoid using attachments as a content.
means to exchange files.
Instead, use a third-party file • Be cautious about connecting
exchange system devices it to your system.

19
Top 10 Cyber Attack Methods

3. Malicious Web Sites 4. Downloading Files


• The primary tool used to interact • Files, also includes: plug-ins,
with the Internet. movies, audio files, etc., as well
• Any site can be the victim of an as mobile code, such as ActiveX,
attack. Java, JavaScript, Flash, etc.
• Always be cautious about • Any code that comes from an
following Web links to domain outside source puts you and your
names you don’t generally computer system at risk.
recognize. • Seek out only those locations
that are known to be safe and
trustworthy.

20
Top 10 Cyber Attack Methods

5. P2P File Sharing Services 6. Instant Messaging Clients


• Malicious content grows when • Malware can be seen as a form
that code is obtained through a of parasite that attaches itself to
peer file-sharing system. any popular communication
• The risk is greater not because medium.
the content becomes malicious • User can accept an offered file
when it is exchanged outside of from an unknown source or
ethical channels, but because follow an offered hyperlink to a
the providers of the content often malicious Web site.
include malicious code • Allow remote hackers to upload
intentionally. and/or download files through
holes in IM client software.

21
Top 10 Cyber Attack Methods

7. New Device or Peripheral 8. Social Networking Sites


• Vendors often outsource the • Proliferation of message posting
actual construction and pre- and exchange services.
production of their products to • Trick users into accepting
external manufacturers and fraudulent information that could
assemblers. compromise an account or the
• Mobile phones, digital photo security of a computer.
frames, and even media players • Some in-site applications, written
have been compromised during by malicious entities, attempt to
manufacturing. hijack accounts or distribute
• Don’t be an early adapter. malicious code.

22
Top 10 Cyber Attack Methods

9. Social Engineering 10. Not Following Security


• Phishing is the most popular Guidelines and Policies
• Web - Fake AV • People tend to care less about
• USB Flash Drives company data, then they would
• Be aware that attackers are trying their own.
to trick you into doing things like • Security Awareness Training
following hyperlinks and • Communicate regularly
downloading files. throughout the year.
• Stay current with new security
trends – Be aware that it can
happen to YOU.

23
Security Counter Measures

24
Why do we care about this?…

• Financial Loss
• Customer or personal Data Loss
• Business Disruption
• Closing Accounts
• Reregistering Accounts
• Reputational Business Risks

25
Apply Business Security Policies

Provide a uniform security policy enforced across the business


Admin Rights – network and local
Control Access Based on the Need to Know
Policies and procedures for the following service elements:
End-User Security
Removable Device Security
Network Communications Security
Remote Desktop Security
Software Updates
Uniform Security Settings

26
System Patching

Workstations and Servers


Versions Upgrades
Critical Updates
Operating Systems
Windows Applications
3rd Party Applications
Heartbleed Vulnerability
April 8, 2014
No New Updates are available for Windows XP & Office 2003
Continuous Patching

27
Know your Business Partners

Manage the business’s you do business with


Do the have access to confidential information?
Review them on a recurring basis

28
Cloud Email Anti-SPAM & Anti-Virus

Safeguarding your email with anti-virus, anti-spyware, anti-


spam technology and Phishing Defense.
Stop in the cloud before it reaches your servers or
workstation.
Protection Against Zero-Day

29
Wireless Device Control

Wireless devices are a convenient vector for attackers


Attackers gain wireless access to organizations from outside the
building, bypassing organizations' security by connecting wirelessly to
access points inside the organization.
Wireless mobile devices can be infected during air travel or in cyber
cafes and are then used as back doors when reconnected to your
internal network.
Restrict Access to authorized users only
Scan for Rouge devices
Disable Wireless Access on devices that do not need it

30
Protection on Your Devices and Systems

24/7 Management and Monitoring


Definition file updates
Version updates
Forgotten systems or devices
Reporting/Tracking

Anti-Virus
Anti-Malware
Host Intrusion Prevention
HIPS
Content Filtering
SPAM Filtering
Network Access Control
Application Control 31
Columbia Bank - Managing Risks

32
Managing the Risk
Best Practice # 1 – Separation of Duties

33
Managing the Risk
Best Practice # 2 – Stronger Password

34
Managing the Risk

Best Practice # 3 – Dual Administrative Control

35
Managing the Risk
Best Practice # 4 – Dual Transaction Control

36
Managing the Risk
Best Practice # 5 – Dual Transaction Control Plus

37
Managing the Risk
Best Practice # 6 - Education

• Educate staff on risk and fraud prevention (key)


• Set strong internal control criteria (policy)
• Educate staff on internet browsing risks
• Educate staff on Email Risks

38
Managing the Risk
Best Practice # 7 – Protection

• Email filtering software/service


• Internet browser filtering software/service
• External device (USB) (DVD) control
• Mobile Device Management
• Segregation of workstation for financial transactions
• Insurance – Cyber related

39
Managing the Risk

Best Practice # 8 – Monitoring

• Monitor activity daily


• Utilize Balance Alerts - think fraud protection and prevention
• Limit / Eliminate email and internet on business workstations
• Use a layered security approach – solutions - vendors

40
Managing the Risk
Key solutions for better protection…
• Enhanced Multifactor Authentication (MFA)
• Method for security code delivery

• Tokens
• Protection for ACH and Wire transactions
• Wire procedures
• ACH profile controls

41
Managing the Risk
Key solutions for better protection…
• Browser Security for Columbia Bank Access
• Secures and Encrypts the session
• Alerts of possible issues
• Back End Monitoring Tools
• Advanced activity monitoring
• Based on patterns of behavior
• Alerts of possible issues
• Communication
42
In Summary…

• Review, identify and know your risks


• Put a plan in place to close gaps
• Review Email and Internet browsing habits
• Patching-Operating systems and virus software
• Windows XP and Office Suite sunset

43
In Summary…

• Utilize various layers of protection


• Stay current…news…reports….information
• Regularly review your own security practices
• If it looks, feels or sound strange….it is…
• Money spent now will save you later

44
You can’t do everything….
But don’t do nothing!

45
What Questions do we have?

46
Thank you for your business!
Thank you for attending !

47

Potrebbero piacerti anche