240 likes | 437 Views
Cyber Issues for Design Professionals. Drew Seaman Straub, Seaman & Allen, PC 269.982.7711. Cyber Issues Are Real. 2015 – Symantech Internet Security Threat Report Over Half a Billion Personal Records Were Stolen or Lost Spear-Phishing Campaigns Targeting Employees Increased 55%
E N D
Cyber Issues for Design Professionals Drew Seaman Straub, Seaman & Allen, PC 269.982.7711
Cyber Issues Are Real 2015 – Symantech Internet Security Threat Report • Over Half a Billion Personal Records Were Stolen or Lost • Spear-Phishing Campaigns Targeting Employees Increased 55% • 43 percent of all attacks targeted at small businesses – 1 in 220 emails - Phish • Major Security Vulnerabilities in Three Quarters of Popular Websites Put Us All at Risk – 75% of sites have unpatched vunerabilities • Ransomware Increased 35% - 992 per day – 350,000+ • New Malware variations 431 Million
Targets • Individual Computers • Laptops • Unsecured Networks • Remote connections to Networks • Cloud Storage • Cell Phones • Tablets
How and What • Tech Support Scams • MalAdvertising • Websites • Email SPAM – Construction Industry 54% of email is SPAM • 1 in 220 emails has Malicious File Attachment • Ransomware • DDoS – Distributed Denial of Service
Risks • Australian Secret Intelligence Service building plans stolen – 2013 • Seehotel Jaegerwirt hotel in Austria – key card system hijacked • Water treatment plant hacked, chemical mix changed for tap supplies - KemuriWater Company • Michigan State – information on 400,000 students, staff, etc. • Princeton University – database wiped - ransomed • San Francisco Mass Transit hacked – ride for free
What’s at Risk • Project Files • Destruction of Records • Loss of Confidential Information • Disruption of Projects • Safety of Systems after Completion • Shut Down Pump Systems • Control Traffic Lights • Control Building Systems
Georgia Institute of Technology • Developed malware that can take over Water Plant • Operation • Poison the Water • Takes over PLCs and SCADA • Identified 1500 PLCs online susceptible to this approach • Issue with routers used to send PLC info??
Considerations • addressing modern cybersecurity challenges has as much to do with culture and organizational structures as with technology • Create a Corporate Structure where everyone is responsible for Cyber Security • Prohibit use of Public Wi-Fi • Change passwords • Be alert to emails • Encrypt remote systems
Additional Thoughts #1 Laptops and remote access #2 Email Control and Isolation #3 Network Isolation – personnel and client information #4 Project Isolation #5 Encryption #6 Data Replication and Back Up #7 Employee Negligence – Intentional Disruption
Laptops, Tablets, Cell Phones, etc. • These are point of contact and accessible • Access to Office, Projects, General Network • Often not encrypted • Passwords bypassed for easy access • Survey Equipment?
Project Sharing • It’s not you it’s someone else • Dyn - Dyn offers Domain Name System (DNS) services, essentially acting as an address book for the Internet – DDoS attack October 2016 • Took down Twitter, Spotify, Etsy, Pinterest, Netflix • Target – Mechanical Contractor had access – came in through email • Same approach can take down project sites • Who controls network • Procore, BIM 360, Newforma, etc.
What’s it to You • Theft of funds or unauthorized fund transfer • data loss or damage to your company or to a third-party • cost to replicate any data that was lost and not properly backed up • forensic investigation fees to determine the extent of the attack and whether a data breach occurred • attorney or consultant fees to determine whether any notification requirements apply • credit monitoring fees if personal information was compromised • business interruption, lost productivity, and damage to reputation • Claims, lawsuits, or regulatory complaints – project delay, etc.
What Can You Do • Manage your IT Vendors • Conduct Due Diligence Analysis of Vendor • Review Results of Security Assessment • Review Written Security Policies of Vendor • Written Agreement • Require Cyber Insurance and Indemnification • WATCH OUT – Standard Agreement is adverse to you
What Can You Do • Limit Access to Data and Systems • Limit who has Remote Access and to what Level Access is Allowed • Always Require Dual Factor Authentication • Separate servers for off-site projects • Require different passwords for different projects and access levels • Consider requiring Encryption of all transmissions • Back up and Replicate your information • Off-Site Remote Backups through encrypted process
What Can You Do • Educate Employees and Managers • Email Protocol – Majority of Ransomware and Phish Attacks from Emails • Don’t automatically open an attachment • Think about who it is from and circumstances of receipt • Passwords Protocols • Security Solution on Each Device • Limit access through public Wi-Fi • What is on Laptop, Tablet, or Cell Phone? • Last years financials, project financials, employee contact info, etc.
NIST FRAMEWORK • National Institute of Standards and Technology • Framework for Improving Critical Infrastructure Cybersecurity • https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf • Or just type NIST Framework
Identify Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. • The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs. • Examples of outcome Categories within this Function include: Asset Management; Business Environment; Governance; Risk Assessment; and Risk Management Strategy.
Protect • Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. • The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. • Examples of outcome Categories within this Function include: Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology.
Detect • Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. • The Detect Function enables timely discovery of cybersecurity events. • Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes.
Respond • Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. • The Respond Function supports the ability to contain the impact of a potential cybersecurity event. • Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements.
Recover • Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. • The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity event. • Examples of outcome Categories within this Function include: Recovery Planning; Improvements; and Communications.
Regular IT updates and reviews • Cyber Insurance • Make Managers Responsible • Listen to Your IT Professional • Require updates on attacks and system status • Cloud vs. On-Site Networks
Process Control System Security Guidance for the Water Sector • AWWA - http://www.awwa.org/Portals/0/files/legreg/documents/AWWACybersecurityguide.pdf • Homeland Security • Industrial Control Systems Emergency Response Team • https://ics-cert.us-cert.gov/content/overview-cyber-vulnerabilities#under