Risk
10/14/2011
01:17 PM
50%
50%

Evolving Security Threats: Is Your SMB Ready?

A mix of common sense, employee education, and security tools can help SMBs identify and prevent social engineering scams and other emerging threats.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
The bad guys keep evolving. Are your security practices keeping pace?

While indiscriminate malware and other types of untargeted security risks are nothing new for small and midsize businesses (SMBs), the notion that they wear a bullseye on their backs for social engineering scams and targeted malware attacks might come as more of a surprise. The security headlines, after all, tend to be dominated by big business and government hacks--creating the false impression that smaller organizations are too, well, small to worry about that kind of breach.

True, maybe your SMB isn't on the Anonymous hit list. But that doesn't mean it can't be a target on a different stage. For example, data from Symantec's Skeptic system found roughly 85 instances of targeted malware--as in, malware written specifically to attack a particular network or company--delivered daily via email. Not exactly a huge number, but of those firms that were targeted at least once, more than half were SMBs with fewer than 500 employees

"SMBs should not think that targeted attacks will not impact them," said Anne O'Neill, senior director of Symantec SMB and Symantec.Cloud, in an interview.

[Learn How SMBs Can Minimize Denial-of-Service Risks.]

At the same time, elements of social engineering have made untargeted threats more sophisticated. Symantec's September intelligence report, for example, noted a recent surge in email-borne malware with a social engineering component. That's intended to make the email appear to be from a trusted source such as a smart printer/scanner, a parcel delivery service, or a known contact whose account has been spoofed or taken over.

With a click and a few keystrokes, an unwitting employee can turn over network credentials, bank account access, and other vital info--as in this case, when an executive forwarded an email that appeared to be from the company's bank to the corporate controller, who in turn followed a link and entered the SMB's account info. Hackers used those credentials to lift nearly $2 million from the company's coffers.

"It is really important for SMBs to protect themselves by educating their employees on the types of attacks they should be looking for," O'Neill said.

In addition to taking basic security steps, the right combination of common sense, employee education, and tools can help mitigate risks. Enterprising crooks can and do use something as simple as an out-of-office message or information gleaned from the company website to their advantage.

Symantec's recent research shows, for example, a rise in socially engineered emails that masquerade as a smart printer scan forwarded by a colleague in the same office. In that scenario, an executable malware file is delivered as .zip attachment--but the sender's domain is spoofed to match the recipient's and may even appear to be from a fellow employee. Symantec's report points out that many smart printers with scan-to-email functions don't support .zip files--those should be a red flag. The report also noted pornography, tax debt, IRS correspondence, and company contracts as common subject headers for malware-delivery emails with social engineering components.

O'Neill recommended SMBs educate--or, at firms with strong security fundamentals, refresh--employees on best practices and the current threat landscape. There shouldn't any real impediments to good training--it doesn't have to cost much more than time.

"Education is something that is really just about dedicating yourself to doing it," O'Neill said. "It's a low-cost thing that can protect your business from a lot of damage."

-- When in doubt, throw it out. If an email or link looks odd, something's likely amiss--even if it appears to be from a "trusted" source. Don't click on suspicious links or download attachments--it's not worth the risk. You can always contact the apparent source--such as a fellow employee or vendor, to confirm the message's authenticity.

-- Phishing hasn't gone away. In general, remind employees that phishing scams--though decidedly "boring" in the current threat landscape--have not gone away. Any emails that include links, attachments, or request specific information should treated cautiously. If it's from an unknown source--delete it.

-- Don't get careless with sensitive data. The rise of social media, among other things, means there are more ways than ever for employees to unwittingly share data with the outside world. And don't forget that your physical office can be vulnerable, too: This expert advises treating your office like any other threat vector and sweeping it for vulnerabilities: Post-it notes on a desktop monitor with usernames and passwords, open LAN cables or other network connections, and so forth.

Of course, the need to underpin smart employee practices with good security tools--including, but not limited to antimalware protection, persists. O'Neill said it doesn't so much matter whether you prefer a software, hardware, or cloud approach--just that the tools update continuously to stay current with evolving threats.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7441
Published: 2015-05-29
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

CVE-2014-9727
Published: 2015-05-29
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.

CVE-2015-0200
Published: 2015-05-29
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x before 7.0.0.8 IF2 allows local users to obtain sensitive database information via unspecified vectors.

CVE-2015-0751
Published: 2015-05-29
Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800.

CVE-2015-0752
Published: 2015-05-29
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?