cyber attack! - O'Connor & Drew PC

0 downloads 211 Views 869KB Size Report
Network and Systems Engineer, Raytheon Company. Industry ... Your Business IS Information. Customer ... No data loss pre
O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

1

CYBER ATTACK! IS YOUR BUSINESS READY? IT Audit and Security O’Connor & Drew, P.C. www.ocd.com @ocdcpa

October 2014

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

2

Jake McAleer, CISA [email protected] Professional Profile • Senior IT Audit and Security Manager, O’Connor & Drew, P.C. • Director of Operations, Dyn • Senior IT Auditor, State Street Bank • Network and Systems Engineer, Raytheon Company Industry Expertise • Internet Services and Infrastructure (IaaS, PaaS, SaaS, Colocation, Data Center) • Financial Services • Manufacturing • Government • Not-for-Profit Organizations • Family-Owned Businesses

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

3

Cyber Attacks In The News Target • 70+ Million credit cards stolen • $61 million cost (to date), CIO resigns, CEO eventually leaves

University of Maryland • Records of more than 300,000 faculty members and students

dating back to 1998 were compromised in a data breach

meetup.com • Website was down for almost a week due to a DDoS attack

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

4

You have information they want.

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

5

Information IS Your Business Your Business IS Information Customer Data • Personally Identifiable Information (PII) – SSN, Credit Card

Numbers, Routing Numbers, License Numbers, etc • Sensitive – Address, E-mail Address, Phone Number, etc

Business Data • Sales Information • Customer Lists • Contracts • Acquisitions/Business Valuation

Employee Data • Compensation • HR Data (PII and HIPAA)

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

SMBs Are Often Easy Targets • Limited IT staff

• Less technical controls • Outdated anti-virus • Unpatched end user systems

• No data loss prevention (DLP) software • Limited or no policies (AUP, ICG, etc) • Lack of employee awareness and training

• Lack of website filtering

6

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

7

Statistics About Data Breaches • Two-thirds of the breaches took months or more to

discover. http://adage.com/article/datadriven-marketing/nrf-offensive-data-breaches/291476/

• 69% of all breaches were discovered by someone outside

the affected organization. http://adage.com/article/datadriven-marketing/nrf-offensive-data-breaches/291476/

• German and US companies had the most costly data

breaches ($199 and $188 per record, respectively) https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Ponemon-2013-Cost-of-a-Data-BreachReport_daiNA_cta72382.pdf

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

How can they get my business’ information?

8

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

9

Threats Come In Many Different Forms • External access • Insecure firewall settings; poorly patched servers and applications • Internal resources (infected with malware) • Compromised servers, laptops, desktops • 3rd party hosting/cloud providers • Compromised backups; shared resources (storage, VMs, etc) • Cloud storage accounts (Dropbox, OneDrive, Carbonite) • Disgruntled employees • Theft, disruption, use of old account credentials

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

10

Threats Come In Many Different Forms • E-mail • Accidental forwarding to 3rd parties (typos, wrong attachment, etc) • Intentional forwarding to 3rd parties (competition, personal e-mail accounts, etc) • Compromised account (weak password, insecure connection, etc) • Social Engineering • Phishing, pretexting, baiting, etc. • Assets (Thumb drives, Laptops, Cell Phones, etc) • Lost or stolen devices without PINs/passwords and encryption • Unattended unlocked devices

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

11

Malware (malicious software) is used to disrupt computer networks, gather sensitive information, or gain access to private computer systems. This software typically relies on local access and/or internal network access to gather data. Viruses, trojans, worms, and ransomware are just some examples.

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

12

Malware – A Threat To All Businesses • Malware Wants Data • Names, Date of birth (DOB), SSNs • Addresses, Phone numbers, E-mail addresses • Confidential competitor information • Malware Looks Everywhere • Company directories • Local files (Word Docs, Spreadsheets, etc) • E-mail • Network file shares (NAS, NFS) • Malware Doesn’t Care Where It Gets The Data • A computer is a computer

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

13

Attacker

Internet

Office LAN

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

14

Attacker

Internet

Office LAN

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

15

Attacker

Internet

Office LAN

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

16

Attacker

Internet

Office LAN

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

17

Attacker

Internet

Office LAN

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

18

Attacker

DATA BREACH! Internet

Office LAN

:-(

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Ever visited a website with ads?

19

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

20

Ever used one of these? CD/DVD

Public WIFI

Thumb Drive

E-Mail Attachments

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

21

We all have! Much of what you do day to day for work and personal purposes exposes you to cyber threats.

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

22

Social Engineering “Psychological manipulation of people into performing actions or divulging confidential information” -Wikipedia

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

23

Examples Of Social Engineering • Pretexting • Using some information (name, address, phone #) in an attempt to gain access to other information or account details (SSN, CC #). • Baiting • Leaving CDs, DVDs, USB drives around and waiting for employees to pick them up and plug them into work computers.

• Tailgating or Piggybacking • Following someone into a secured space who has valid access. • Name/Title Dropping • Using social media to find officers and then pretending to be working on “a special project for them” or pretending to be tech support calling to troubleshoot an issue, but needs your password first.

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

24

Examples Of Social Engineering • Confidence • “Looking the part”, “He was dressed up”, “He looked like he worked here” • Role Playing • Pretending to be maintenance or repair workers, contractor, delivery person, or law enforcement

• Buddies at work • “I locked myself out of my account and need to go! What’s your password so I can get this done and head out for the weekend?” • Phishing/Spearphishing • Attempting to gather sensitive information by posing as a trusted source or known entity (posing as bank website, Facebook, etc)

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

25

Phishing - Can You Spot the Problem?

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

26

Phishing - Can You Spot the Problem? Not sent from @verizonwireless.com

Does not actually go to verizonwireless.com when clicked

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Information Security Is Everyone’s Responsibility.

27

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

28

Ways To Minimize Risk • • • • • • • • •

Anti-virus and Anti-Malware Firewalls IDS/IPS Automatic e-mail scanning Web filtering Employee awareness and training Automated backups (preferably offsite) Only get software and equipment from reputable sources Limit what you host onsite • Consider cloud providers and 3rd party hosting Make sure they’re up to date! Support and patching are important…

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Website Outage - DDoS

29

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Outsourcing Considerations • Consulting • Outside expertise and fresh perspective • Vendor specific experience, “set it and forget it” • Staff augmentation vs. project by project • Infrastructure Hosting • E-mail • Anti-SPAM and Anti-Phishing protection • VoIP • Website • Mass e-mail lists • Backup service • Ask for a SOC 2 or 3 from infrastructure providers!

30

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

31

O’Connor & Drew’s Key IS Wins for 2014 • Patch frequently and utilize anti-virus software • Settings enforceable with a GPO in Windows • Application support is important for continued patches

• Get rid any systems running Windows XP or older • Windows XP and Office 2003 support officially ended April 2014

• Uninstall Java from all office systems;

Consider using something other than Internet Explorer (IE) • First half of 2013, Java was the most common zero-day focus for attackers.

Second half of 2013, observed a burst of Internet Explorer (IE) zero-days. http://www2.fireeye.com/rs/fireye/images/fireeye-advanced-threat-report-2013.pdf

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

32

O’Connor & Drew’s Key IS Wins for 2014 • Encrypt all assets that leave the office (laptops, thumb drives,

smartphones, etc) and ensure they have a password/PIN enabled • “UC San Francisco is alerting some individuals to a burglary involving

unencrypted desktop computers that contained some personal and health information.”1 • Secure and segregate your office WIFI • Use hardened security (e.g. WPA2 or individual certificates) and segregate

WIFI to limit access to key resources such as file shares • Utilize industry tools to scan your internal and external network • Ensure firewalls are appropriately configured, devices are patched

appropriately, and generate an inventory of what’s on your network

1

https://www.ucsf.edu/news/2014/03/112556/computer-theft-uc-san-francisco

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

33

Policies and Procedures • AUP (Acceptable Use Policy) • Users understand potentially everything they do is monitored • No outside software may be installed • Limited personal use • Consequences for not following policies • Don’t leave laptops in plain view or unlocked vehicles Example Template:

http://www.sans.org/security-resources/policies/Acceptable_Use_Policy.pdf

• Information/Data Classification Guide (IGG/DCG) • Types of data (confidential, internal use only, public, etc) • Owners, handlers • How to properly handle, store, destroy More information and examples:

http://www.giac.org/paper/gsec/736/data-classification/101635 http://www.sans.org/reading-room/whitepapers/auditing/information-classification-who-846

• Written Information Security Program - WISP • Legally required document for businesses with Massachusetts customers

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

34

SANS 20 Critical Security Controls • A list of the top 20 critical security controls (CSCs) were

agreed upon and outlined, taking risk into consideration. • Collaborative work across various governmental, public, and private organizations • U.S. Department of Homeland Security • U.S. Department of State, Office of the CISO

• MITRE Corporation • SANS Institute

• Great starting point for a SMB • Tangible, measurable, includes examples of processes and technologies to implement

http://www.sans.org/critical-security-controls

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Number 1: Inventory Devices Inventory of Authorized and Unauthorized Devices Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access. https://www.sans.org/media/critical-security-controls/fall-2014-poster.pdf

35

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Number 2: Inventory Software Inventory of Authorized and Unauthorized Devices Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. https://www.sans.org/media/critical-security-controls/fall-2014-poster.pdf

36

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Number 3: Secure Configurations Inventory of Authorized and Unauthorized Devices Establish, implement, and actively manage (track, report on, correct) the security configuration of laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings. https://www.sans.org/media/critical-security-controls/fall-2014-poster.pdf

37

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

38

Number 4: Continuous Assessments Inventory of Authorized and Unauthorized Devices Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers.

https://www.sans.org/media/critical-security-controls/fall-2014-poster.pdf

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

39

Additional Resources Cyber Security Planning Guide • http://transition.fcc.gov/cyber/cyberplanner.pdf

Ten Cybersecurity Tips For Small Businesses • http://www.dhs.gov/sites/default/files/publications/FCC%20Small%20Biz%20Tip%20Sheet_0.pdf

FCC Website For Small Businesses • http://www.fcc.gov/cyberforsmallbiz

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

Questions? O’Connor & Drew’s IT Audit and Security Team is here to help! Jake McAleer [email protected] Senior IT Security and Audit Manager O’Connor & Drew, P.C. @ocdcpa

40

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

41

Download Link • Please visit the following link to download a digital copy of

the presentation:

http://www.ocd.com/2014techconnect

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

42

IT Frameworks Frameworks help design a program that facilitates CIA There are many different frameworks and standards • Some are industry specific • North American Electric Reliability Corporation (NERC)

• Some are very high level • COBIT • Some are process specific • ITIL • Some are generic (very long, complex, and/or high level) • NIST • ISO • COSO

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

43

Regulations and Industry-Specific Rules • Different countries have specific laws covering

personal information, how it must be protected, and data breach disclosure requirements. • EU privacy protection is notoriously strict • US laws often vary by state, some federal oversight

• Different industries have specific requirements • PCI • HIPAA • BASEL II and GLBA

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

44

MA 201 CMR 17.00 - PII • PII is “a Massachusetts resident's first name and last name

or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account; provided, however, that “Personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.” http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

45

MA 201 CMR 17.00 - Requirements • Every person that owns or licenses personal information

about a resident of the Commonwealth shall develop, implement, and maintain a comprehensive information security program. [Every person…] shall include in its written, comprehensive information security program the establishment and maintenance of a security system covering its computers, including any wireless system. http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf

• MA 201 Compliance Checklist: http://www.mass.gov/ocabr/docs/idtheft/compliance-checklist.pdf

• Notification Requirement http://www.mass.gov/ocabr/data-privacy-and-security/data/requirements-for-securitybreach-notifications.html

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

46

Cyber Insurance • General liability policies often do not cover digital loss • Insurance is not a replacement for security • Not all cyber insurance policies are created equal • Coverage amounts • What they cover • How they are activated • What must be in place in order to be “covered” “Partners bought the policy in 2007 and made a claim two years after an employee left the records of 192 Massachusetts General Hospital patients on an MBTA train. The hospital paid a $1 million fine to the US Department of Health and Human Services, which was covered by the cyber insurance.”

https://www.bostonglobe.com/business/2014/02/17/more-companies-buying-insurance-against-hackers-and-privacy-breaches/9qYrvlhskcoPEs5b4ch3PP/story.html

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

47

Crisis Management – Cyber Attack • Is it clear how an employee, customer, or outside firm

reports a potential issue or concern to your business? • 69% of breaches were discovered by an outsider

• Internally • Who would take the lead on managing a crisis management plan? • Who needs to be involved/notified? Who can declare an event? • Externally • Can your firm do a mass notification (email list, social media, etc)? • Who manages external communications? • Legal • What laws/regulations is your industry held to? • Reporting requirements

O'Connor & Drew, P.C.

www.ocd.com

@ocdcpa

48

Crisis Management - Social Media “[During the Boston Marathon bombings…] Boston Police Department tweets in effect became the official source of information for everyone, including the media, especially after numerous reports by the press turned out to be false.” http://www.emergencymgmt.com/training/Bostons-Experience-Social-Media.html

• Can you blog or post on your website and keep it updated? • Who can access and help with communications? Are they

external to your organization? Are they available in an emergency?

It’s important to realize that some companies block social media such as Twitter and Facebook.