Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/16/2016
11:00 AM
Steve Manzuik
Steve Manzuik
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Has The Security Industry Failed Its Customers?

Short answer: Not really. But the odds of staying safe from a cyberattack go way up when you follow these six tips for security hygiene.

In the modern era, IT is turned inside out. Most cyberattacks target users and their devices, making standard security practices from the past decade ineffective.

Consider this: the Verizon 2016 Data Breach Investigations Report claims that 63% of all data breaches are caused by stolen credentials. And with the advent of bring-your-own-device policies, businesses often no longer have control over the devices people use to access their corporate networks. This leads to employees, typically thought of as a company's biggest asset, becoming the biggest liability because of phishing attacks.

These days, APT might as well stand for average phishing technique instead of advanced persistent threat. Many of the high-profile breaches in the last year were due to phishing attacks, including those aimed at Target and Snapchat. Essentially, cyberattacks don't need to be that sophisticated to cause millions of dollars worth of harm to businesses. And despite the substantial amount of money spent on new security products and solutions, the number of breaches occurring each year is still rising.

This situation raises the question, "Has the security industry simply failed?"

Many consumers and organizations have the misconception that attempts to secure information and data are futile — that it's not a question of if they'll be hacked, but when. As a result, when it comes to security, IT professionals often proclaim, "There's nothing we can do. We're screwed." This industry standard of fear and defeat is ridiculous; no one should have the expectation that their information will eventually be hacked.

Back to Basics
Instead of spending a huge security budget on more appliances and other security solutions that claim to solve all your problems, organizations need to remember that the most effective way to block a breach is a simple, back-to-the-basics approach to information security. Before spending on those so-called "advanced" security solutions, make sure your organization is effectively doing the following:

  1. While we still have passwords, make them strong and unique. We get that passwords can be annoying, especially when you have to satisfy some crazy policy that was designed to encourage security but instead ends up in the form of a sticky note on a computer monitor, among other bad practices. Until we figure out a better way to authenticate users, the password is all we have. Organizations need to educate users and implement policies that are easy to follow while encouraging strong and unique passwords across all sites.
  2. Solve the password problems for your organization by providing users with an easy-to-use password manager. This helps users ensure they use both unique and strong passwords while removing the need for them to be remembered along with all the associated bad habits. Password managers, such as the one offered by LastPass, integrate with the Web browser and automatically generate and save passwords for users. This means that users only need to come up with one strong password to protect their vault. Many also offer enterprise-class options that allow for administrative account recovery and other must-have features.
  3. Use two-factor authentication. As we've already outlined, most major breaches come via compromised user credentials. It's time organizations made passwords only part of the access scenario. Raise the bar on what it takes to access enterprise resources by adding a second authentication mechanism. Note that National Institute of Standards and Technology warns users to stay away from SMS-based solutions and urges the implementation of a solution that doesn't introduce unneeded friction to the authentication process.
  4. Patch everything. Most organizations are good at keeping servers and traditional workstations patched. That said, the days of having complete control of what's connected to your network are long gone. Users will bring their own devices and connect them to work networks and applications and, in many cases, the patch level of these devices is unknown. Therefore, why not control access to sensitive data and applications and prevent the use of outdated devices and endpoints?
  5. Review your backup strategy. The recent outbreak of ransomware attacks has proven that many organizations don't have an effective data backup strategy because, if they had, recovering from a ransomware-type attack would be as simple as wiping systems and restoring data from backups. If your organization would be down for days — not hours — from a massive data loss, then your backup strategy has major gaps that need to be addressed. Consider leveraging proven cloud technologies as an easy and secure way to ensure almost constant backup of important user data.
  6. Finally, make your users paranoid. Not wearing tinfoil hats paranoid, but paranoid enough to trust but verify emails, documents, and other communications. The only effective way to combat the threat of phishing attacks is user education. I recommend that organizations routinely run internal phishing campaigns that are focused on educating, not shaming, users who fall victim. Of course, before you even think of running a phishing campaign, make sure you have covered the previous five security hygiene basics and verify there is a mechanism that users can use to report suspected phishing to security.

It's time to get real and go back to basics. Don't immediately invest in the most complex IT solutions for business. In fact, having several disjointed security layers often makes it easier for attackers to leverage outdated software and security vulnerabilities found in your security software. Businesses can protect themselves, and it starts by securing users and encouraging basic security hygiene.

Related Content:

Steve Manzuik is the Director of Security Research at Duo Security's Duo Labs. Steve has over 20 years of information security experience, having worked as Senior Manager of Security Research & Engineering at Juniper Networks, Research Manager of eEye Digital Security, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
12/26/2016 | 1:29:55 PM
Re: SMS for Two Factor Authentication
SMS typically requires cell service and for the general public cell service is freakishly expensive in the US. I'd be all over two factor authentication when there was a common implementation that makes use of other avenues, such as landline phone through automated calls. I'm one of those who cannot afford spending as much as a week's groceries on what is essentially an overpriced toy. Other countries fare much better with two factor because their cell services are not grossly overpriced. That is the key reason why the Social Security Administration ended the mandatory two factor authentication before it even was really put in place. Securing systems by providers cannot be cost-prohibitve for the users.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
12/20/2016 | 10:53:56 AM
Who is Failing Who?
I might be stepping into it with this analogy, but while the article isn't taking its title literally, I do have strong feelings about the idea the Security Industry isn't doing all it can.  I liken the role of Security in IT to parenting.  You do all you can (or all you know how to do) but ultimately your kids still have free will to not listen to you at all (yes, I'm a parent).  Some of the most innovative ideas in network tech and software coding standards erupted from talented hackers pushing boundaries and the Security Industry answering.  And like parents, no InfoSec company or individual can know everything; it's an evolutionary process - stumbling here and there and having to catch your balance again is not failure by a long shot.  Failure would be walking away and doing nothing in the face of new waves of cybercrime and the truth is, it's often the customer doing nothing, not the InfoSec community.  Business models need to catch up with modern tech and start making Security a top priority.  Like I tell my kids, after I tell you what's going to happen twice, you can't act surprised when the thurd time we talk what I said was going to happen does.  Here's to all the parents out there, and to their counterparts in InfoSec.
RogerG797
50%
50%
RogerG797,
User Rank: Apprentice
12/19/2016 | 9:22:18 PM
Two Factor Authentication is better than single factor authentication
But it also be a big problem if the 2nd factor issuer machine got hacked.

So, software with password/passphrase stealing attack detection capability is the way to go.
mschelin917
50%
50%
mschelin917,
User Rank: Apprentice
12/19/2016 | 12:28:04 PM
SMS for Two Factor Authentication
Hello Sir, As a provider of SMS in the U.S. we know that most connections to and from cell carriers are made out of band and are encripted. The 60 minutes program that showed the SS7 network being hacked was not the way a bank in the U.S. sends a pin code to it's users. It is very difficult to intercept these messages.  Please don't get me worng, I'm not saying it's impossible but really hard to do.   
mschelin917
50%
50%
mschelin917,
User Rank: Apprentice
12/19/2016 | 12:27:43 PM
SMS for Two Factor Authentication
Hello Sir, As a provider of SMS in the U.S. we know that most connections to and from cell carriers are made out of band and are encripted. The 60 minutes program that showed the SS7 network being hacked was not the way a bank in the U.S. sends a pin code to it's users. It is very difficult to intercept these messages.  Please don't get me worng, I'm not saying it's impossible but really hard to do.   
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts
Jai Vijayan, Contributing Writer,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19604
PUBLISHED: 2019-12-11
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
CVE-2019-14861
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permiss...
CVE-2019-14870
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authent...
CVE-2019-14889
PUBLISHED: 2019-12-10
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence...
CVE-2019-1484
PUBLISHED: 2019-12-10
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.