Insider Threats nov

54
Managing Insider Threats 4 Risks You Need To Mitigate

description

managing insider computer threats

Transcript of Insider Threats nov

Page 1: Insider Threats  nov

Managing Insider Threats 4 Risks You Need To Mitigate

Page 2: Insider Threats  nov

Agenda

The state of cybercrime – what’s changed and why?

How likely is an attack?

The biggest threat & 4 serious internal risks

The cost of malware

Why Anti-Virus alone is not enough

What you can do to protect your networks

Page 3: Insider Threats  nov

Short History of Cybercrime

Virus writers were hackers and nerds having fun making a

name for themselves

Then

Malware is now a tool of international organized crime

Now

Page 4: Insider Threats  nov

The Cybercrime Economy

Credit Card Information: $0.85 - $30.00

Page 5: Insider Threats  nov

The Cybercrime Economy

Bank Account Credentials: $15 - $850

Page 6: Insider Threats  nov

The Cybercrime Economy

Full Identity: $0.70 – $20.00

Page 7: Insider Threats  nov

Cybercrime Today

Agile, global, organized & outsourced

Cybercriminals want:

Money

Shares in the Business

Challenges

Non 9-5 Work Environment

Page 8: Insider Threats  nov

Cybercrime Today

$114bn

Money

stolen/spent

on resolving

Cybercrime

Victims valued time

they lost to

Cybercrime

$274bn

Norton Cybercrime Report 2011

Page 9: Insider Threats  nov

How Likely Is an Attack?

Threats are increasing exponentially

Page 10: Insider Threats  nov

How Likely Is An Attack?

431 million adults

24 countries

141 US victims/minute

Norton Cybercrime Report 2011

Page 11: Insider Threats  nov

How Likely Is An Attack?

Cybercriminals use malware to harvest personal data:

Viruses

Worms

Trojans

Page 12: Insider Threats  nov

Data breaches are on the rise

91% reported at least 1 breach in the last year

59% reported 2 or more breaches

50% reported lost data

How Likely Is An Attack?

Page 13: Insider Threats  nov

How Likely Is An Attack?

Size doesn’t matter

Small companies & big companies

Industry leaders are falling prey

How robust is your IT infrastructure?

Page 14: Insider Threats  nov

The Most Serious Security Threat

Lives inside your organization: Human Nature

Page 15: Insider Threats  nov

The Most Serious Security Threat

Shifting targets narrowed to individuals within organizations

Sophisticated criminals exploit the weakest link

Access to your network is easily gained by exploiting human nature

Page 16: Insider Threats  nov

Insider Threats: 4 Serious Internal Risks

1. Spear Phishing Email Attacks

2. Social Media

3. The Infected USB Device

4. Unapproved Applications

Page 17: Insider Threats  nov

Insider Threats: Spear Phishing The Evolution

Spam:

Unsolicited commercial email

Unsolicited bulk email

Phishing:

Sender appears to be a trustworthy entity

Bulk

Spear Phishing:

Customized

Page 18: Insider Threats  nov

Insider Threats: Spear Phishing Proof

Page 19: Insider Threats  nov

Insider Threats: Spear Phishing Advanced Persistent

Threats

Spear Phishing

Highly targeted to a person/organization

Objective is to get victim to click a link or download file

Malware infects the victim’s PC and opens back door for hackers to access company data

Page 20: Insider Threats  nov

Insider Threats: Spear Phishing Google Breach

Page 21: Insider Threats  nov

Insider Threats: Spear Phishing

100M

Page 22: Insider Threats  nov

Insider Threats: Social Media

SOCIAL

MEDIA

Page 23: Insider Threats  nov

Insider Threats: Social Media

Twitter now a source for links to poisoned websites

Page 24: Insider Threats  nov

Insider Threats: Social Media

Facebook scams continue

Page 25: Insider Threats  nov

Insider Threats: Social Media

Facebook scams continue

Page 26: Insider Threats  nov

Insider Threats: Social Media

Social Media is now a legitimate business tool

Web-filters are barriers to productivity and burden IT

Cannot keep up with known malicious URLs

Page 27: Insider Threats  nov

Insider Threats: The Infected USB Device

Opens the door to malware propagating in the network

Bypasses other layers of defense such as gateway firewall protection

25% of all new worms are designed to spread through portable storage devices

Page 28: Insider Threats  nov

Insider Threats: The Infected USB Device

Device “read only” partition can host malware

In 2006, Secure Network Inc tested a credit union’s security

Distributed trojan infected USB drives

15 out of 20 were installed

Page 29: Insider Threats  nov

Insider Threats: The Infected USB Device

2008 marks the biggest military breach to date

Caused by an infected USB flash drive

Over 100 foreign intelligence agencies are trying to capture US data

Page 30: Insider Threats  nov

Insider Threats: Unauthorized Applications

Potentially unwanted applications

Instant messaging

Social networking sites

Peer to peer, games

Unacceptable security risk

System performance concern

License compliance issue

Page 31: Insider Threats  nov

Insider Threats: Unauthorized Applications

Downloading unauthorized programs that can contain malware

In 2010 a credit union employee downloaded a coupon program

Laced with malware

License compliance issue

Page 32: Insider Threats  nov

Internal Threats: Recap

Shifting Targets – exploiting human nature

Spear Phishing on the upswing

Social Media – business tool or security threat?

USB Keys pose bypass traditional security

Unauthorized applications are untrusted

73,000+ highly sophisticated new threats per DAY!

Page 33: Insider Threats  nov

The Cost of Malware

$7.2 Million = the cost of a data breach (2010)

$214 = avg cost of compromised record (2010)

$318 = avg cost of

compromised record due to criminal attack (2010)

Source: Ponemon Institute's "2010 Annual Study: U.S. Cost of a Data Breach"

Page 34: Insider Threats  nov

$7,969,330 scammed

44 days

1 email

The Cost of Malware

Page 35: Insider Threats  nov

The Cost of Malware

Over 360,000 credit cards

Customer names

Customer email addresses

$2.7M stolen

Over 90,000 credit cards

Customer names

Customer email addresses

Phone #s, gender, DOB

Page 36: Insider Threats  nov

The Cost of Malware

Threats continue to increase with hefty fines

Page 37: Insider Threats  nov

The Cost of Malware

Page 38: Insider Threats  nov

The Cost of Malware

Page 39: Insider Threats  nov

"The first time anyone anywhere in the world noticed this new virus was on [March 15] and then it hit us on the 16th,”

"We've got multiple levels of protection and firewalls, but nothing recognizes this,"

"The cost of just one day without computer access is going to cost thousands,"

The Cost of Malware

Page 40: Insider Threats  nov

What Does Successful Security Look Like?

Layers, layers and more layers

Page 41: Insider Threats  nov

Desktop Security

System Restore – quick recovery but no protection against malware or data leakage

User Account Control – to be effective is too restrictive for many users. Frustrating to manage for IT

Anti-Virus – not entirely effective alone

Requires constant updating

Can be drain on system resources

Only protects against known threats

Page 42: Insider Threats  nov

Why Anti-Virus Alone is Not Enough

1700+ confirmed malware files analyzed

13 top AV vendors

Average detection rate: 19%

Average time to catch up to new malware: 11.6 days

Source: Malware Detection Rates for Leading AV Solutions

A Cyveillance Analysis, August 2010

Page 43: Insider Threats  nov

The Faronics Solution

Page 44: Insider Threats  nov

Application Whitelisting

Concept:

Ignore the bad applications that you never want to run

Only identify the good applications you do want to run

Any unknown executables simply not allowed to run!

Benefits:

Not having to worry about updates

Not having to worry about unknown malware

Page 45: Insider Threats  nov

Application Whitelisting

Benefits Beyond Security:

Protecting Resource Usage

Lower Help Desk Costs

Prevent Distractive Applications

Prevent Unlicensed or Illegal Applications

Page 46: Insider Threats  nov

Application Whitelisting: With Anti-Virus

Anti-Virus

Heuristics still help identify and catch:

Malware that targets unpatched OS and applications

Malware that is carried as data and run as macros

Faronics AV runs suspected malware in a mini-VM

Application Whitelisting

Zero-Day attacks

Mutating Malware

Targeted Attacks

Potentially Unwanted Programs

Page 47: Insider Threats  nov

Introducing Faronics Anti-Executable

Only approved applications can install or execute

Protects against attacks that bypass AV

Protects data from exposure to malware such as key loggers

Helps maintain system integrity by blocking installation of unauthorized applications

Enforces license compliance by specifying programs and versions that are allowed to be installed

Not dependent on signature updates

Page 48: Insider Threats  nov

Why Anti-Executable?

Reduce IT costs associated with infections and troubleshooting time Avoid costly IT audits/legal risks Prevent loss and corruption of sensitive data Protect workstations from unknown, future system vulnerabilities Maximize system performance

Page 49: Insider Threats  nov

Faronics Layered Security

Changing the way

the world thinks

about security.

Page 51: Insider Threats  nov

About Faronics

Intelligent software solutions for ABSOLUTE control

In business since 1996

Over 8 million licenses deployed

Over 30,000 customers in over 150 countries

Offices in USA, Canada & UK

Affiliations

Awards

Page 52: Insider Threats  nov

Next Steps

Try Faronics Anti-Executable at: www.faronics.com

Contact Faronics

Via email: [email protected]

Via phone:800-943-6422

Page 53: Insider Threats  nov

Q&A

Page 54: Insider Threats  nov

Thank You

Presenter:

Samantha Shah Product Marketing Manager

T: 800-943-6422 E: [email protected]