Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Guest Blog // Selected Security Content Provided By Sophos
What's This?
4/18/2012
10:21 AM
Brian Royer
Brian Royer
Security Insights
50%
50%

The Benefits Of Top-Down Security

While enterprise-level breaches often get the attention of C-level suite executives and the members of their IT staff, industry research shows it actually falls to rank-and-file employees to apply best practices and exercise sound judgment in order to properly contain them

Since the release of Verizon's 2012 Data Breach Investigations Report, I can't help but think that in most cases it's not IT that will keep users safe -- it's a combination of management and best practices. The Verizon report revealed that 97% of data breaches evaluated by the telecom giant in 2011 were avoidable and did not require hackers to possess special skills, resources, or customization. And it found that the majority (30% of breaches, impacting 84% of records breached) was the result of stolen login credentials.

Case in point: this story in Aviation Week, which detailed how, since 2009 and continuing undetected for "around 18 months" the BAE systems' portion of the Lockheed Martin F-35 program in the U.K. had likely been subject to significant data theft, possibly by a nation state using Advanced Persistent Threat (APT).

As detailed in the article, the remedies to data thefts like the BAE breach have included the emergence of an experimental information-sharing program founded by ADS (Aerospace and Defense Trade association) known as the Virtual Task Force and, separately, a British-government backed "Cybersecurity" pilot hub involving participants from five business sectors -- defense, energy, pharmaceuticals, telecommunications, and finance.

In both cases the goal is information-sharing. As Julian Fraser, director of a classified-information disposal service and a committee member of ADS’ Cyber Protection and Assurance Group, said, "The point of the Virtual Task Force is to involve companies at boardroom level, as well as getting their technical people together to analyze attacks and discuss the solutions they find. "

Mutual cooperation. That's a start in the right direction, but the article also significantly mentions the possible weak link in the chain: getting employees to pay attention, take charge, and take responsibility.

As the author properly suggests, security will not improve if only the CEO and the information technology department know about the threat. For example, the BAE F-35 breach and a similar hack on Lockheed Martin and RSA, its digital security supplier, used "spearphishing" attacks where an individual employee was tricked into opening an email that went on to infect and compromise the network.

Spot-on commentary by Don Smith, technology director of Dell SecureWorks, drives home the point:

"The problem exists between the keyboard and the chair. The initial trigger is duping an end user, and that mechanism remains a highly successful method of penetrating organizations that have multi-layered security controls. "

"If you were to start with [educating] lower-down employees in large organizations, and you get them to appreciate the importance of information security like they appreciate the importance of green issues, then they are going to start to demand better practices of their employers," says Fraser.

A conclusion reinforced by evidence accrued in the aforementioned Verizon report and the following summation by Marc Spitler, a Verizon security analyst:

"Very often, the companies breached had no firewalls, had ports open to the Internet or used default or easily guessable passwords."

In other words, easy-to-find, easy-to-learn and easy-to-exploit weak passwords.

Additionally, according to the Verizon report, social engineering methodologies dominated the types of data breaches, including 46% taken advantage of by phone and 37% in-person. Surprisingly, breach by email came in a relatively distant third at "just" 17%. In other words, the "victim" of the breach and the hacker on the other end actually communicated with one another, either face to face or verbally by phone. In other words, employees who were quick to believe "the tale" they were being told.

Cumulatively, the findings highlight the need for companies to pay attention to security basics. "It is about going back to basic security principles. A lot of the same recommendations we have used in past years, we have recommended this year, " he added.

But what kind of reception will these security basics find among employees? A just-released Sophos-sponsored survey of global IT professionals found that 96 percent of respondents (IT professionals and IT decision makers) do not trust their own end users to make sound IT security decisions.

Additional highlights included:

• 48% of respondents fix security issues caused by end user negligence at least once a week

• 26% of respondents say senior management commits the worst IT security offenses

• 19% of respondents say that IT commits the worst IT security offenses

These results underscore the impact that a lack of understanding security policies and best practices -- in every department and at all levels of an organization -- can have on an IT infrastructure. In sum, disclosure of data breaches should not stop at the boardroom doors. Indeed, think of your organization as a microcosm, a subset of the aforementioned Virtual Task Force or British Cybersecurity hub. Apply top-down security by sharing information about breach events as they happen. Leave no one out of the loop. Consider every employee a stakeholder in the process of securing your network and its intellectual property. Conduct general security awareness training. Give employees specific instructions on how to recognize and stop breaches. And then make those same employees accountable by getting them to appreciate that it’s up to them to keep their eyes open and their suspicions about any offer, whether face-to-face, over email or by phone, hardwired to maximum setting.

That way, when Verizon releases its next report on data breaches, it won't be your company (or any of your employees) that’s counted among its casualties.

Brian Royer, a security subject matter expert, Sophos U.S., is partnering with SophosLabs to research and report on the latest trends in malware, web threats, endpoint and data protection, mobile security, cloud computing and data center virtualization.

Join Sophos for a Dark Reading sponsored webcast: 3 Steps to Securing Private Data in the Public Cloud, on Thursday, April 26, 2012 at 11:00 AM PT/ 2:00 PM EST. The webcast will include discussion on the security challenges of storing data in the cloud; limitations of a digital do-it-yourself approach; and three simple steps to protecting data in the cloud. Click here for registration and more information.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.