Todays Threat Landscape

Thieves, hackers always looking for new ways to grab information

Today’s threat landscape is constantly evolving. Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage. Despite major investments in online security, companies and individuals still face significant risk of their data being breached. In the battle for information security, cybercriminals are moving faster and more aggressively than ever before. Lost corporate data—intellectual property, financial records and employees’ identities—can result in the public relations nightmares that occupy the headlines every day.

Sophisticated malware and keyloggers can compromise HTTPS Web sessions after the data has been decrypted, stealing sensitive information or account credentials and transparently redirecting users to hostile sites and mining the session content. The browser on the endpoint continues to be the weakest part of most networks because one wrong click of the mouse can open a company’s most sensitive data to significant threats. These threats translate into substantial business risks, ranging from lost or stolen intellectual property to privacy breaches and regulatory violations to brand impairment, customer loss and legal action.

According to the 2012 State of the Endpoint report from the Ponemon Institute, on average malware incidents have nearly doubled from 27 percent in 2010 to 43 percent in 2011, with 31 percent of enterprises reporting that occurrences have significantly increased in frequency, specifically when it comes to Web-borne malware attacks. On average, respondents said they are seeing more than 50 malware attempts per month within their organizations. While all organizations in the study use antivirus/anti-malware technology, less than half (40 percent) of respondents said it is one of the top five most effective technologies.

Cybercriminals and online hacktivists know that people love social networking sites, and the trust they have in these sites presents the perfect opportunity to create socially engineered malware attacks. As organizations embrace the use of social media, the importance of data security increases substantially because users can easily introduce malware and keyloggers onto the company network from their Web-based interactions with company applications. Sensitive corporate data can remain in the Web browser cache in clear text format, where it can be easily extracted by either malware or end users, even after the Web session has ended.

Additionally, stored user names and passwords from browser sessions remain available in the authentication cache and are vulnerable to malware. Browser vulnerabilities alone present security issues for an organization of any size, but when those vulnerabilities are combined with careless or malicious user error, they can lead to significant data loss issues for organizations.

As we’ve seen with various breaches, cyber spying exponentially increases the risk of data loss. And we aren’t just talking about credit card numbers and personally identifiable information. We’re talking about the theft of extremely sensitive intellectual property relating to the status of the company, including research, business plans and technical papers. The amount of damage that can be done in a single instance of a data breach is almost unlimited and undoubtedly raises questions for many organizations about the security of some of their more sensitive information.

Corporate Data Loss: An Inside Job?

Threats to sensitive data don’t come just from outside the company. With hosted enterprise applications like CRM systems, Webmail and Microsoft SharePoint, users have the flexibility to work anytime and anywhere from any browser-enabled PC. With many of today’s CRM databases, it’s astonishingly easy to copy vast amounts of critical data, such as customer information, account numbers and other financial information, onto an external drive. In fact, many companies have lost data to unscrupulous employees who stole competitive business information and either sold it or took it with them to a new company. Data loss can also occur unintentionally by employees. Due to malicious intent or careless end-user behavior, the consequences of data loss can be devastating—ranging from reputation damage to lawsuits and financial loss.

Microsoft SharePoint facilitates the communication of employees across an enterprise, allowing them to share sensitive corporate information with one another. According to Microsoft, 67 percent of its enterprise customers have deployed SharePoint within their organization. SharePoint makes it easy to set up websites to share information, and organizations are embracing its collaborative nature. A 2010 report from the Radicati Group indicated that by 2014, SharePoint will have an installed base of 477 million, representing a 31 percent average annual growth rate.

A 2009 survey from Surety revealed that the majority of organizations are using SharePoint to store and share their most vital electronic records, such as critical intellectual property (IP) records, strategic corporate planning documents, company financials, employee records, electronic medical records (EMR) and personal health records (PHR). Forty-six percent of respondents estimated that the data housed in their SharePoint systems was valued greater than $10 million. Nearly 30 percent of survey respondents valued the electronic records housed in their Share- Point systems at more than $50 million, with nine percent indicating that their data was valued greater than $500 million.

Yet concerns remain about data breaches, compliance requirements and malware threats for sensitive corporate Web-based data—and for good reason: the average cost of a single data breach is $5.5 million. Web applications are the third-most common breach vector and account for more than one-third of data loss. The Surety survey also revealed that nearly one-quarter of respondents lack confidence that their organizations’ electronic records or other digital content are protected when they are being shared within the SharePoint environment. Of the respondents whose organizations have suffered a data breach within their SharePoint system, 67 percent indicated that the tampering was at the hands of a person with access to SharePoint from inside the organization.

A 2012 survey from Cryptzone revealed that these security breaches have only increased in the past three years. Nearly 45 percent of respondents indicated they had copied information from SharePoint to a local hard drive or flash drive to work at home or to send out via email to users without access to the system, even though 92 percent of them recognized that this was a security breach. More alarmingly, 30 percent aren’t bothered by this fact if it helps them to do their job. In addition, a third of IT administrators, or somebody they know with administrator rights, has read documents hosted in Microsoft’s collaboration server that they are not meant to read.

Many organizations are also deploying SharePoint as extranets, to share information with partners, contractors and clients. Granting access and making information available to external users can increase efficiency and productivity. At the same time, it also increases business risk to confidential information and intellectual property, not to mention compliance regulations.

Data integrity relies upon leveraging and protecting information assets. How do you protect sensitive corporate information that’s being shared by internal and external users across a platform such as SharePoint? SharePoint administrators have little, if any, visibility or control over data delivered to the browser on the endpoint, creating significant risks to sensitive information.

BYOD Threats

The consumerization of IT is increasing at an incredible rate, which is evident by the number of iPhones, Androids and iPads readily available at people’s fingertips. The increasing availability of mobile communications not only presents opportunities, it also opens the door for a variety of security challenges.

There are many advantages to allowing employees to use their personal devices for work, including increased efficiency. By granting access to the corporate network, and therefore corporate information, via mobile devices, companies enable employees to work from anywhere, at any time. It also provides cost savings to organizations, because personal-device usage means they don’t need to provide or manage mobile devices for their employees.

However, some organizations may decide the security challenges associated with the “Bring Your Own Device” (BYOD) phenomenon far outweigh the benefits. Potential unintended consequences—such as data leakage and malware—reinforce the need to enhance the security of company data. Organizations must control the data after it is delivered to the device in order to prevent accidental or intentional loss by end users.

Users are installing a variety of applications, including games and social networking apps, on their mobile devices that can potentially be malicious and put data at risk. We’re also starting to see malware written for mobile devices, mainly for the Android but also for jailbroken iPhones. With access to the corporate network through unmanaged devices, a careless or malicious employee can easily steal company trade secrets and intellectual property or leak sensitive customer information.

The smartest and safest strategy is for organizations to stop making a distinction between devices in the corporate network and devices outside of it, and instead focus on protecting their sensitive data. With BYOD, organizations need to assume that employees will connect to the corporate network to access company data from any device, at any given time, wherever they may be. As a result, organizations need to establish a strong security strategy to embrace this model in a suitable manner. This means better compartmentalizing access to sensitive information, better audit logging and log analysis and deploying security solutions that are designed to support the BYOD strategy, such as those that can control the replication of your data.

HTTPS No Match for Today’s Complex Threats

Nearly every enterprise today has a range of security technologies, such as authentication, SSL encryption, firewalls and intrusion prevention systems, designed to protect information traveling to and from the data center. Applications are delivering sensitive data through an encrypted tunnel, but what happens upon delivery and decryption of that data at the endpoint? Web server security solutions and HTTPS offer little defense to data once it has been delivered to the endpoint, and today’s most significant exposure is at the point of transaction—the end user’s browser.

Not knowing the security state of the endpoint is a critical security gap for an organization’s website or Web application owner, because they have very little visibility into the endpoint itself.

Particularly with the BYOD trend, IT professionals don’t know if antivirus software is installed or if it’s current. They can’t control the user’s choice of browser, version or the security patches and plug-ins that are installed. Worse, they can’t see if the user’s machine already contains malware such as keyloggers, frame grabbers or Trojans. Finally, they can’t see or manage stored information such as the end user’s cache, cookies, password store and browser history—all of which can be easily accessed by malware or malicious users.

Protect Your Most Sensitive Data

To protect valuable information such as intellectual property, organizations need to make data security a top priority. When it comes to sensitive information, the focus must go beyond authorized and unauthorized users to extending data protection from storage through transport to delivery on the endpoint.

Educating end users should be a top priority. Many data leaks caused by insiders are due to careless, not malicious, users. Ensure that employees understand security policies and take the proper security precautions, and secure data in the browser at the endpoint. Users often access confidential company information via the browser. Organizations need to extend and enforce security controls to end-user Web sessions, securing the data in Web applications from any endpoint to prevent unauthorized use and replication of data.

This article originally appeared in the August 2012 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3