Risk
10/14/2011
01:17 PM
50%
50%

Evolving Security Threats: Is Your SMB Ready?

A mix of common sense, employee education, and security tools can help SMBs identify and prevent social engineering scams and other emerging threats.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
The bad guys keep evolving. Are your security practices keeping pace?

While indiscriminate malware and other types of untargeted security risks are nothing new for small and midsize businesses (SMBs), the notion that they wear a bullseye on their backs for social engineering scams and targeted malware attacks might come as more of a surprise. The security headlines, after all, tend to be dominated by big business and government hacks--creating the false impression that smaller organizations are too, well, small to worry about that kind of breach.

True, maybe your SMB isn't on the Anonymous hit list. But that doesn't mean it can't be a target on a different stage. For example, data from Symantec's Skeptic system found roughly 85 instances of targeted malware--as in, malware written specifically to attack a particular network or company--delivered daily via email. Not exactly a huge number, but of those firms that were targeted at least once, more than half were SMBs with fewer than 500 employees

"SMBs should not think that targeted attacks will not impact them," said Anne O'Neill, senior director of Symantec SMB and Symantec.Cloud, in an interview.

[Learn How SMBs Can Minimize Denial-of-Service Risks.]

At the same time, elements of social engineering have made untargeted threats more sophisticated. Symantec's September intelligence report, for example, noted a recent surge in email-borne malware with a social engineering component. That's intended to make the email appear to be from a trusted source such as a smart printer/scanner, a parcel delivery service, or a known contact whose account has been spoofed or taken over.

With a click and a few keystrokes, an unwitting employee can turn over network credentials, bank account access, and other vital info--as in this case, when an executive forwarded an email that appeared to be from the company's bank to the corporate controller, who in turn followed a link and entered the SMB's account info. Hackers used those credentials to lift nearly $2 million from the company's coffers.

"It is really important for SMBs to protect themselves by educating their employees on the types of attacks they should be looking for," O'Neill said.

In addition to taking basic security steps, the right combination of common sense, employee education, and tools can help mitigate risks. Enterprising crooks can and do use something as simple as an out-of-office message or information gleaned from the company website to their advantage.

Symantec's recent research shows, for example, a rise in socially engineered emails that masquerade as a smart printer scan forwarded by a colleague in the same office. In that scenario, an executable malware file is delivered as .zip attachment--but the sender's domain is spoofed to match the recipient's and may even appear to be from a fellow employee. Symantec's report points out that many smart printers with scan-to-email functions don't support .zip files--those should be a red flag. The report also noted pornography, tax debt, IRS correspondence, and company contracts as common subject headers for malware-delivery emails with social engineering components.

O'Neill recommended SMBs educate--or, at firms with strong security fundamentals, refresh--employees on best practices and the current threat landscape. There shouldn't any real impediments to good training--it doesn't have to cost much more than time.

"Education is something that is really just about dedicating yourself to doing it," O'Neill said. "It's a low-cost thing that can protect your business from a lot of damage."

-- When in doubt, throw it out. If an email or link looks odd, something's likely amiss--even if it appears to be from a "trusted" source. Don't click on suspicious links or download attachments--it's not worth the risk. You can always contact the apparent source--such as a fellow employee or vendor, to confirm the message's authenticity.

-- Phishing hasn't gone away. In general, remind employees that phishing scams--though decidedly "boring" in the current threat landscape--have not gone away. Any emails that include links, attachments, or request specific information should treated cautiously. If it's from an unknown source--delete it.

-- Don't get careless with sensitive data. The rise of social media, among other things, means there are more ways than ever for employees to unwittingly share data with the outside world. And don't forget that your physical office can be vulnerable, too: This expert advises treating your office like any other threat vector and sweeping it for vulnerabilities: Post-it notes on a desktop monitor with usernames and passwords, open LAN cables or other network connections, and so forth.

Of course, the need to underpin smart employee practices with good security tools--including, but not limited to antimalware protection, persists. O'Neill said it doesn't so much matter whether you prefer a software, hardware, or cloud approach--just that the tools update continuously to stay current with evolving threats.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jamie, the darn Unicorn is back."
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.