340 likes | 479 Views
Targeted Attacks and the Small Business. Stephen Ferrero Consultant, Xantrion. Xantrion. Founded in 2000 by Anne Bisagno and Tom Snyder Wanted to bring big company IT to small and midsized organizations Among the top 50 worldwide MSPs (1) 45 person technical team 70 core clients
E N D
Targeted Attacks and the Small Business Stephen Ferrero Consultant, Xantrion
Xantrion Founded in 2000 by Anne Bisagno and Tom Snyder Wanted to bring big company IT to small and midsized organizations Among the top 50 worldwide MSPs (1) 45 person technical team 70 core clients 3000 end users supported 600 servers managed (1) MSP Mentor worldwide survey results.
Agenda The current SMB security paradigm Why we need to evolve our thinking Targeted attack methods The new SMB security paradigm
Protect against Opportunistic Attacks Your Company Attacker
Security mindset “Be more secure than the other guy” “I’m too small to be a target”
Typical security layers Hardware Firewall Email Filter Web Filter Antivirus / Antimalware OS Security Patches User Rights Assignment Policies, and Awareness User
Targeted Attack Your Company Attacker
Targeted attacks in 2012 (Symantec, 2013)
More targeted attacks on SMB Attackers have more and better resources SMBs are typically less secure SMBs make good launch points
Process of A Typical Attack 3 2 1 4 5 6
Spear Phishing, Waterholing, etc. Hardware Firewall Email Filter Web Filter Antivirus / Antimalware OS Security Patches User Rights Assignment User
Protect against Targeted Attacks Your Company Attacker
Security mindset “I have important data and assets to protect” Assume you are a target
Typical SMB security layers Hardware Firewall Email Filter Web Filter Antivirus / Antimalware OS Security Patches User Rights Assignment Policies, and Awareness User
Add more layers Educate employees Review hiring and firing policies Aggressive patching of OS and Apps • Acrobat, Flash, QuickTime, Java Get off End of Life software • Windows XP • Office 2003 End of Support - April, 2014
Additional security layers Hardware Firewall Email Filter Web Filter Antivirus / Antimalware OS Security Patches App Security Patches User Rights Assignment User User Awareness and Training HR and Security Policies
Identify your valuable assets Customer Data Customer Relationships Intellectual Property Bank Account Info
Identify your special risks Internal threats Liability Unmanaged mobile devices Physical security
Practice secure banking Use Two-Factor authentication Require “Dual-Control” or separation of duties Require one control be completed on a dedicated PC Require out-of-band confirmation from your bank for large transactions
Protect mobile devices Be aware of the increase in mobile malware Stream data to mobile devices instead of storing it there Separate personal and work data Track devices Have remote-wipe capability Enforce password policies
Regularly re-evaluate your security Use the Top 20 security controls as a framework for frequent security policy updates. www.sans.org Remind users of proper security best practices
References cybersecurity. (n.d.). In Merriam-Webster’s online dictionary. Retrieved from http://www.Merriam- webster.com/dictionary/cybersecurity Small and midsize businesses. (n.d.). In Gartner IT Glossary. Retrieved from http://www.gartner.com/it- glossary/smbs-small-and-midsize-businesses/ Symantec Inc. (2013, April). Internet Security Threat Report. Retrieved from http://www.symantec.com/security_response/publications/threatreport.jsp Verizon. (2012). Data Breach Investigations Report. Retrieved from http://www.verizonenterprise.com/products/security/dbir/?CMP=DMC- SMB_Z_ZZ_ZZ_Z_TV_N_Z041 Mandiant. (2013) M-Trends 2013: Attack the Security Gap. Retrieved from https://www.mandiant.com/resources/m-trends/
Top 10 Threat Actions Keylogger / Form-Grabber / Spyware Exploitation of default or guessable passwords Use of stolen login credentials Send data to external site/entity Brute force and dictionary attacks Backdoor (Allows remote access / control) Exploitation of Backdoor or CnC Channel Disable or interfere with security controls Tampering Exploitation of insufficient authentication (no login required)
Advanced Persistent Threats Long-term attacks Focused on large organizations Organized Crime or State Sponsored