Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Protecting Your Business from Cybercrime - Cybersecurity 101

501 views

Published on

Cybercrime impacts a lot of users every year.
Indirectly (compromised merchant – credit card)
Directly (compromised login credentials)

Cybercrime’s impact can be financial and reputation to your company

Impacts 1 in 5 small businesses every year
Cybercrime is a global business
The Internet allows attackers to be anywhere in the world and attacking victims anywhere in the world

Today more organized and motivated than any time in history

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Protecting Your Business from Cybercrime - Cybersecurity 101

  1. 1. 93 percent of all money is digital. That’s what is at risk here. –Bill Nelson Bill Nelson, Financial Services Information Sharing & Analysis Center What is cybercrime? Cybercrime is criminal activity involving the internet, a computer system, or computer technology. http://news.microsoft.com/stories/cybercrime/index.html
  2. 2. Cybercrime activity is the highest, ever Cybercrime is a big global business • The cybercrime industry has evolved with the PC/computer/mobile device ecosystem • Today, cybercrime is more organized and motivated than at any time in history Insights about one group of three Blackhats indicted in 2015 • Stole information on 100 million people • Breached 12 companies, including • Concealed at least $100 million in Swiss and other accounts • Hackers and conspirators were in more than a dozen countries • One of the indicted had hundreds of employees http://www.bloomberg.com/news/articles/2015-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds
  3. 3. What is Blackhat cybercrime? Blackhat cybercrime is a form of malicious online behavior motivated by profit and a predictable ROI • Understanding Blackhat criminal tools, techniques, motivations, cultures, and ecosystems are critical to defending against current attacks and deterring future ones • Treating Blackhat cybercrime as a purely technological problem makes mitigation difficult and costly
  4. 4. The bad actors are not a monolithic group Tools, techniques, motivations, and business models vary by cybercriminal region Non-Professional • Non-professional cybercriminals • Use crime kits to make spending money • Little to no business or technical expertise • Even though they are not professional, their impact can be significant Blackhats • Treatcybercrimeasa business • Businessandtechnical expertise • Oftenworkinaclosed groupofother professional cybercriminals • Criminalreputationis everything Grayhats • Theybelievetheyare offeringlegitimate services. However,their customerscanbeboth “legitimate”orcriminal • Ranasabusiness Hactivists • Individualsorgroups whohackforasocial cause,without economicmotivation • Havebothtechnical peopleandfollowers State Sponsored • Nationalsecurityand/or economicmotivation • Technicalexpertise • Workinaclosedgroupof otherprofessionals • OftenuseBlackhat resourcesand/or techniquestomasktheir identity Some elite Blackhats, some elite hactivists, and most state sponsored actors use “APT” techniques Often defenders treat all bad actors the same
  5. 5. The cybercrime problem is broad • More professional cybercrime services make it easier for would-be attackers to become cybercriminals • Many cybercriminals don’t need technical abilities when entering the world of cybercrime • In many regions, it is socially acceptable to steal from victims on the Internet • The line is blurring between state sponsored attackers and cybercriminals • Elite teams of attackers that have the same resources, skills, and patience as state actors 7 and getting worse
  6. 6. Cybercrime as a Service (CaaS) It has never been easier for new entrants into the market Example of crimekits and services
  7. 7. CaaS Market for freshly infected PCs to push malware to It has never been easier for new cybercriminals to start
  8. 8. Market for freshly infected mobile devices to push malware to CaaS It has never been easier for new cybercriminals to start
  9. 9. How kits are used Botnets/Malware There are many monetization strategies RansomwarePhishing
  10. 10. To be successful in Cyberdefense, one needs to know what are effective and durable mitigations Considerations when combating cybercrime
  11. 11. Tips to keep your Business Safe
  12. 12. Strengthen your computer’s defenses Keep the firewall on (work, home, public networks) Install legitimate antimalware software (http:/aka.ms/wkactd ) Keep software up to date (automatically) 1 statistics noted from Flexera software 1
  13. 13. Don’t be tricked into downloading malware ➢ Train your users to use malware and phishing protection in their browsers. ➢ Keep Antivirus on and updated
  14. 14. Don’t be tricked into downloading malware Close pop-up messages carefully Ctrl F4
  15. 15. Step 3 Protect company data and financial assets
  16. 16. Protect company data and financial assets Encrypt confidential data Use rights management solutions to handle sensitive data Train your users to identify scams and fraud Use HoneyTrap accounts in your domain. Notify on successful and unsuccessful logins Use HoneyTrap documents. Notify on successful and unsuccessful access
  17. 17. How to evade scams Look for telltale signs Think before you click Keep sensitive information private Train employees to identify socially engineered attacks www.snopes.com
  18. 18. Step 4 Create strong passwords Keep them private Don’t reuse them
  19. 19. Create strong passwords Which passwords are strong? WEAKSTRONG Password106/04/79Advan!age0us!$wanR!ceRedD00r510152025MsAw3yO!D SwanRiceRedDoorAdvantageous!My son Aiden was 3 years old in December
  20. 20. Strong passwords are not enough Protect your accounts and passwords Make passwords strong (still needed) Keep them private (don’t share among users) Use unique passwords for different websites Limit use of employees using corporate e-mail accounts as their identifier on third- party website Defend against checkers Enable disabling accounts on too many invalid login attempts Don’t use insure interfaces (e.g. unprotected POP/IMAP/SMTP) Monitor for compromised account checkers
  21. 21. Step 5 Guard data and devices when you’re on the go
  22. 22. Guard company data when you’re on the go Connect securely Save sensitive activities for trusted connections Confirm the connection Encrypt storage on mobile devices Flash drives: watch out for unknowns and disable auto run Enable features like Work Folders and cloud storage to manage work data on mobile devices HLTONHOTELS.NET
  23. 23. What to do if there are problems Have a predefined process and checklist to identify company identities, data, services, and applications on the device Report abuse and other problems Immediately report phishing Immediately report missing devices or theft of company data Change all passwords Wipe mobile phones
  24. 24. Contact us for information & deployment offers David.Rosenthal@razor-tech.com

×