Endpoint

7/27/2018
11:30 AM
Robert Block
Robert Block
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Every Week Is Shark Week in Cyberspace

Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.

Your odds of being attacked by a shark are zero if you never venture into the ocean — which is far lower than the odds of being cyber hacked even if you never go online. After all, you could still become a victim of identity theft without ever wading unto Internet waters.

The point is this: Fear the cyber shark far more than the great white, tiger, or bull shark, whose majesty was celebrated this week during the Discovery Channel's Shark Week, as it has every year since 1987.

So, what can Shark Week teach us about cybersecurity? Here are four areas to focus on in honor of Shark Week.

1. Assume the Role of a Lifeguard
An organization's ocean is the Internet. Some if it equates to shallow waters such as internal networks, but much of is deep and uncharted via the cloud. No matter the depth of the water, you still need to assess the risks of venturing into potentially perilous territory. A CISO is a company's lifeguard, which means being aware of, adapting to, taking precautions against, and assuming control of the threats that attackers present. With threats always evolving, it's imperative to keep improving your organizational lifeguarding skills.

2. Guard Against Phishing Attacks and Save the Whales
Phishing attacks — and, specifically, mobile phishing attacks — continue to rise. In fact, the SANS 2017 Threat Landscape Survey reported that phishing remains the most significant threat to organizations, with 74% of cyberattacks beginning when a user clicked on a malicious attachment or link contained in an email.

Spearphishing attacks are also increasing, rising to 50% in the last quarter of 2017. This technique has been used to devastating, well-documented effect over the past few years. Spearphishing takes the form of an email that appears to be from the recipient's friend or colleague. The email encourages the recipient to click on what are in reality malicious links or attachments or persuades that person to reply with sensitive professional or personal information. These attacks are difficult to identify on the surface because they combine the most common attributes of successful social engineering.

Social engineering tactics are also heavily leveraged in an even more insidious method of phishing known as pretexting, business email compromise (BEC), or "whaling" attacks. These attacks create the believable pretext of a fabricated persona in which the victim — most often a C-level executive — develops a false sense of trust in the hacker. Once the relationship has been established, money-transfer fraud and/or outright data theft quickly follows.

Prevention measures for all phishing, spearphishing, and whaling attacks are widely known and essentially the same. Yet despite anti-phishing methods such as reporting suspicious emails and routinely changing passwords, attacks are still increasing. Modern authentication techniques can be great tools for preventing the repercussions of stolen credentials. Performing security audits and providing user education and training are also solid prevention methods.

2. Safeguard Your Waters with Modern Authentication Methods
Many threats are false positives; the dorsal fin of a friendly, curious dolphin can look like the dorsal fin of a shark that's circling the waters. Similarly, an access attempt might not look suspicious until it's too late. With 80% of breaches being caused by valid yet stolen or misused credentials, it is imperative to validate every access attempt — ensuring that the good guys get in (without hindering user experience and productivity) while keeping the bad guys out. Today's available solutions add intelligence and analytics to authentication methods. These risk-based solutions, available from many vendors, focus on the user's profile and tendencies. They can include techniques such as geographic analysis, device recognition, and IP address-based threat services.

3. Continually Assess Your Environments
Threats are everywhere, in the water and online. They're usually hidden. They sometimes don't appear until it's too late. But that shouldn't keep humans from swimming in the ocean or conducting activity online, especially in the age of digital transformation. Safety counts, and precautions matter.

During Shark Week, we witnessed humans taking shelter in shark cages and avoiding seal-populated areas and shark-infested waters. As organizations continue to engage in Internet activities, remember to follow identity and security best practices, keep your senses alert for phishing emails and have a remediation and response plan when an attack does occur.

Related Content:

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Register by July 27 and save $700! Click for more info

As Senior VP of Identity Strategy at SecureAuth and Core Security, Robert Block is responsible for executing strategic vision of preventing the misuse of stolen credentials. Block has over 19 years of IT experience — of which 15 years have been focused on identity and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
seanmajece
50%
50%
seanmajece,
User Rank: Apprentice
8/2/2018 | 5:46:40 AM
Cyberspace
By the way, my father is working with cyberspace. So I know a lot about it
amarre
50%
50%
amarre,
User Rank: Author
7/31/2018 | 1:58:20 PM
The danger is real
Too often, even after a risk is actualized by a real or simulated attack, people continue to ignore the threat and pretend that it is exaggerated.  This comparison to shark infested waters will perhaps make it more real.  People are irrationally afraid of low-likelihood shark attacks; we need them to be rationally afraid of these attacks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/29/2018 | 12:52:37 PM
Threats
Threats are everywhere, in the water and online. They're usually hidden. They are mainly hidden in our logs, we can find them with automation. We mainly miss real threats but deal with false positives or negatives.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/29/2018 | 12:50:17 PM
False positive
Many threats are false positives; the dorsal fin of a friendly, curious dolphin can look like the dorsal fin of a shark that's circling the waters. This is where most of our security analyst time is wasted. So we need to change it with automation.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/29/2018 | 12:47:15 PM
Human factor
Yet despite anti-phishing methods such as reporting suspicious emails and routinely changing passwords, attacks are still increasing. It is because it exploits human factor, that is what it is effective
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/29/2018 | 12:45:34 PM
Phishing
Phishing attacks and, specifically, mobile phishing attacks continue to rise. I agree, Phishing is major and effective way of executing an attack,
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/29/2018 | 12:43:19 PM
Nice analogy
An organization's ocean is the Internet. I like the analogy, effective and CISO as lifeguard, all the employees should do their part.
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3937
PUBLISHED: 2018-08-14
An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability...
CVE-2018-3938
PUBLISHED: 2018-08-14
An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST r...
CVE-2018-12537
PUBLISHED: 2018-08-14
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
CVE-2018-12539
PUBLISHED: 2018-08-14
In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows,...
CVE-2018-3615
PUBLISHED: 2018-08-14
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.