Perimeter
Guest Blog // Selected Security Content Provided By Sophos
What's This?
4/18/2012
10:21 AM
Brian Royer
Brian Royer
Security Insights
50%
50%

The Benefits Of Top-Down Security

While enterprise-level breaches often get the attention of C-level suite executives and the members of their IT staff, industry research shows it actually falls to rank-and-file employees to apply best practices and exercise sound judgment in order to properly contain them

Since the release of Verizon's 2012 Data Breach Investigations Report, I can't help but think that in most cases it's not IT that will keep users safe -- it's a combination of management and best practices. The Verizon report revealed that 97% of data breaches evaluated by the telecom giant in 2011 were avoidable and did not require hackers to possess special skills, resources, or customization. And it found that the majority (30% of breaches, impacting 84% of records breached) was the result of stolen login credentials.

Case in point: this story in Aviation Week, which detailed how, since 2009 and continuing undetected for "around 18 months" the BAE systems' portion of the Lockheed Martin F-35 program in the U.K. had likely been subject to significant data theft, possibly by a nation state using Advanced Persistent Threat (APT).

As detailed in the article, the remedies to data thefts like the BAE breach have included the emergence of an experimental information-sharing program founded by ADS (Aerospace and Defense Trade association) known as the Virtual Task Force and, separately, a British-government backed "Cybersecurity" pilot hub involving participants from five business sectors -- defense, energy, pharmaceuticals, telecommunications, and finance.

In both cases the goal is information-sharing. As Julian Fraser, director of a classified-information disposal service and a committee member of ADS’ Cyber Protection and Assurance Group, said, "The point of the Virtual Task Force is to involve companies at boardroom level, as well as getting their technical people together to analyze attacks and discuss the solutions they find. "

Mutual cooperation. That's a start in the right direction, but the article also significantly mentions the possible weak link in the chain: getting employees to pay attention, take charge, and take responsibility.

As the author properly suggests, security will not improve if only the CEO and the information technology department know about the threat. For example, the BAE F-35 breach and a similar hack on Lockheed Martin and RSA, its digital security supplier, used "spearphishing" attacks where an individual employee was tricked into opening an email that went on to infect and compromise the network.

Spot-on commentary by Don Smith, technology director of Dell SecureWorks, drives home the point:

"The problem exists between the keyboard and the chair. The initial trigger is duping an end user, and that mechanism remains a highly successful method of penetrating organizations that have multi-layered security controls. "

"If you were to start with [educating] lower-down employees in large organizations, and you get them to appreciate the importance of information security like they appreciate the importance of green issues, then they are going to start to demand better practices of their employers," says Fraser.

A conclusion reinforced by evidence accrued in the aforementioned Verizon report and the following summation by Marc Spitler, a Verizon security analyst:

"Very often, the companies breached had no firewalls, had ports open to the Internet or used default or easily guessable passwords."

In other words, easy-to-find, easy-to-learn and easy-to-exploit weak passwords.

Additionally, according to the Verizon report, social engineering methodologies dominated the types of data breaches, including 46% taken advantage of by phone and 37% in-person. Surprisingly, breach by email came in a relatively distant third at "just" 17%. In other words, the "victim" of the breach and the hacker on the other end actually communicated with one another, either face to face or verbally by phone. In other words, employees who were quick to believe "the tale" they were being told.

Cumulatively, the findings highlight the need for companies to pay attention to security basics. "It is about going back to basic security principles. A lot of the same recommendations we have used in past years, we have recommended this year, " he added.

But what kind of reception will these security basics find among employees? A just-released Sophos-sponsored survey of global IT professionals found that 96 percent of respondents (IT professionals and IT decision makers) do not trust their own end users to make sound IT security decisions.

Additional highlights included:

• 48% of respondents fix security issues caused by end user negligence at least once a week

• 26% of respondents say senior management commits the worst IT security offenses

• 19% of respondents say that IT commits the worst IT security offenses

These results underscore the impact that a lack of understanding security policies and best practices -- in every department and at all levels of an organization -- can have on an IT infrastructure. In sum, disclosure of data breaches should not stop at the boardroom doors. Indeed, think of your organization as a microcosm, a subset of the aforementioned Virtual Task Force or British Cybersecurity hub. Apply top-down security by sharing information about breach events as they happen. Leave no one out of the loop. Consider every employee a stakeholder in the process of securing your network and its intellectual property. Conduct general security awareness training. Give employees specific instructions on how to recognize and stop breaches. And then make those same employees accountable by getting them to appreciate that it’s up to them to keep their eyes open and their suspicions about any offer, whether face-to-face, over email or by phone, hardwired to maximum setting.

That way, when Verizon releases its next report on data breaches, it won't be your company (or any of your employees) that’s counted among its casualties.

Brian Royer, a security subject matter expert, Sophos U.S., is partnering with SophosLabs to research and report on the latest trends in malware, web threats, endpoint and data protection, mobile security, cloud computing and data center virtualization.

Join Sophos for a Dark Reading sponsored webcast: 3 Steps to Securing Private Data in the Public Cloud, on Thursday, April 26, 2012 at 11:00 AM PT/ 2:00 PM EST. The webcast will include discussion on the security challenges of storing data in the cloud; limitations of a digital do-it-yourself approach; and three simple steps to protecting data in the cloud. Click here for registration and more information.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.