Endpoint
12/5/2012
03:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Don't Bring Cybercrime Home For The Holidays

Here are a few strategies for keeping the cyber-grinches out

PORTLAND, Ore., Dec. 5, 2012 /PRNewswire/ -- Cybercrime is on the rise, the holidays being no exception. In fact, this holiday season may prove to be the biggest ever for cybertheft. Hackers observe no holidays, instead using them as yet another theme to entice and trick computer users into letting them into their networks. Compounding this, many retailers and other businesses conduct more transactions and process more credit cards during the holidays than at any other time of the year, which makes breaking into any company's networks all that more lucrative and enticing, regardless of size.

Here are a few strategies for keeping the cyber-grinches out:

Know what is happening on your network. With good security monitoring architecture in place, if a network incident occurs, you would be able to go back and trace when and how the breach happened and detect if any sensitive data was stolen. Network recording devices, such as full packet capture appliances, quickly establish the facts and timeline of any incidents and provide the forensic evidence necessary to pursue prosecution.

Beware of holiday e-cards, even if received from a trusted sender. Unbeknownst to the sender, holiday-themed screensavers, e-cards and other free digital content from the Internet may contain malicious spyware, malware and trojans. Downloading these digital "freebies" onto your office computers can open your network up to intrusion and exploitation by cybercriminals – who have no intent of spreading holiday cheer.

Encourage employees to keep their holiday internet shopping activities at home. Seemingly benign and legitimate retail sites may be fronts for disseminating malware, compromising both computers and networks. Hackers are fully aware that even a short-lived exploit on a busy website can bring high exposure. Hackers even go so far as to hide their malicious payloads in paid-for advertisements. Remember: a firewall cannot keep malicious programs out if an insider invites them in.

Review what your business liability insurance covers and what to expect from lapses in PCI and other regulatory compliance. Standard business insurance does not cover the costs and liabilities resulting from data theft and a breach of your credit card processing system can result in suspension of your merchant account.

The reality is that business losses from cybercrime overtook losses due to physical theft for the first time in 2010. 2012 stands as no exception, with a growing list of breach victims in all industries. Cybercrime is on an upward trend and the question now is not whether an intrusion will happen, but when you will need to respond to a cyber-event. Businesses cannot afford to put cybersecurity off until the new year.

IPCopper wishes you a happy and safe holiday season!

About IPCopper: IPCopper, Inc. manufactures off-the-shelf and custom solutions for network forensics, security monitoring and encrypted data storage. Its line of standalone packet capture appliances leads the market in performance, capacity and price. Headquartered in Portland, Oregon, IPCopper, Inc. designs and manufactures its products in the USA.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Listen Now Incident Response War Gaming: Practicing the Post-Breach Panicking
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?