SlideShare a Scribd company logo
1 of 24
The #1 Cause of Data Breaches 
and 3 Ways to Avoid Them 
WEBINAR 
September 2014 
Copyright ©2014 Kaseya 1
Speakers 
Alex Brandt 
Vice President, Americas, Kaseya 
Alex Brandt is Vice President, Americas at Kaseya where he manages the national sales force and go-to-market strategies for 
Kaseya’s North American customer base. Alex’s career reflects 20 years of experience working with MSPs and IT 
organizations to more efficiently manage IT to drive the success of their businesses. 
Cynthia James 
Global Director Business Development, CISSP, Kaspersky Lab 
Cynthia James is Global Director of Business Development at Kaspersky Lab where she has spent the last 7 years. She is a 
frequent presenter and blogger on cybercrime topics for hardware and software developers like Kaseya who integrate 
Kaspersky’s anti-malware technology into their products. She obtained her CISSP in 2011. 
Copyright ©2014 Kaseya 2
Agenda 
• Threatscape level set - 
• 3 worst things going on in cybercrime today 
• Ransomware 
• Breach definition, legislation and reporting 
• The #1 cause of data breaches in 2014 
• Top 3 tactics to defeat a breach 
• Other security essentials 
• Solutions & Case Studies 
• Winner of $100 Amazon Gift Card 
• Q & A 
Copyright ©2014 Kaseya
Where are, where we’ve come from 
• 200K unique pieces of malware in 2006; 315K per DAY by Q4 2013 
• Cybercrime will NEVER stop 
(Over 
315K/day ) 
Where many end users 
think we are
Security threats in 2014 
Cybercriminals earn over $100 billion annually! 
1. No need to be technical: 
malware can be rented – it’s easier than ever 
2. Cybercrime markets extremely 
organized and sophisticated – 
anything can be sold 
3. Constant innovation and debugging 
- by us!
Ransomware 
• Cryptolocker – a encryption Trojan (Sept 2013) 
• Estimated $27M earned in first 2 months (41% vs 3% 
paid) 
• Huge issue in Russia 
• 52% of infections are in the US 
• Spread primarily thru spam & phishing 
• Goes after backup files if they are on the network 
• Can spread from home network thru VPN to corporate 
network 
• 2.0 “version” in December + CryptoDefense, etc.
Let’s talk about data breaches! 
• Definition: “an unauthorized person viewed, 
copied, transmitted, used or took possession of 
sensitive, protected or confidential data” 
1. Did they only have access or did actually view it or take 
possession of it? 
2. Is there reason to believe they misused it? 
3. How many records? 
• Why report if no one* will find out? 
• *victims, employees, customers, law enforcement, the 
press, banks, compliance agencies
The data breach reporting problem 
• Typical breach-reporting language: “when there is a 
reasonable likelihood of harm”; “tell victims in a 
timely manner” 
• Who to report to? Feds, state, agency?* 
• Three states have NO laws 
1. Breach notification is costly 
– Process, fines, loss of customers, lawsuits 
2. No one ever wants to report a breach 
3. We don’t hear about the majority of breaches! 
4. When we do hear…it’s about PII
Legislation & Compliance – it’s only 
about PII (although IP matters too) 
• Compliance (HIPAA, etc.) 
• Federal: US is working to unify breach laws – adding prison 
terms for knowingly concealing a breach 
• EU will complete that this year (2014) 
across 28 European countries – 
to apply to any company with data 
from EU citizens 
• How soon post-breach to report 
• What to report 
• How to notify customers 
• Compliance rules (security minimums, fines, etc.) 
• Up to 2% of gross revenues, breaks for SMBs 
• Canada – stronger than US law, not as strong as Europe 
• Who’s PII are you holding?
Looking at breaches: the research 
• Who is most likely to report? 
• Healthcare – due to HIPAA 
• Education – due to HIPAA (on campus healthcare) or 
“code of ethics” or transparency or liability 
• What are they reporting? 
• PII 
• How likely is it that we get full reporting? 
• Except for Healthcare: far less than 100%
University of Maryland breach 
• 287,000 records stolen 
• 78% were purged after the fact! 
• $5M allocated 
• Biggest take-away: 
• The Three Ps – 
• Purge (free) 
• Push off-line (cheap) 
• Protect (expensive: cost of layers + liability)
Biggest Breaches in Education 2014 
• College of the Desert, CA – inadvertent email, PII on all employees 
• Douglas County School District, Colorado – via stolen laptop 
• Univ of Illinois, Chicago – haven’t said yet how many 
• Orangeburg Calhoun Tech College, Orangeburg, SC – 20K via stolen laptop 
• Penn State College of Medicine - 1176 student records 
• University of California Irvine – 1.5 months of key logging student health center 
• Uxbridge School District and Milford Schools – 3K students, laptop stolen from a 3rd party billing 
provider (Multistate Billing Services) 
• Butler University, Indianapolis – 160K records hacked (informed by law enforcement) 
• Orange Public School District – teen hacked grades, is being charged 
• The University California, Washington Center – didn’t say how many 
• Riverside Community College – 35K students – emailed file to the wrong address 
• Stanford Federal Credit Union: 18K emailed to the wrong employee (destroyed?) 
• Arkansas State University College – “unauthorized access” 
• Iowa State – 30K hack 
• University Pittsburgh Medical Center – 27K (originally reported 800) 
• UMASS Memorial (May) malicious insider hack
Biggest Breaches in Healthcare 
2014 
• Community Health Systems – 4.5 million records…+IP? 
• Access Health Connecticut – employee backpack stolen w/500 patient documents 
• Rady’s Children’s Hospital, San Diego, CA – 14K patient data emailed out by mistake 
• Redwood Regional Medical Group, Santa Rosa, CA 33K patients‘ information on a stolen 
thumb drive “back up” left in a “zipped container in an unlocked locker” 
• Boulder Community Health, Boulder, CO – “friendly” hack (warning) 
• Blue Shield of California, San Francisco – “inadvertent disclosure” 
• St Vincent Breast Center, Indianapolis – “inadvertent disclosure via letters” 
• Apple Valley Christian Care Center, Apple Valley, CA – breach via “technical glitch” 
• 3K patients at Bay Area Pain Medical Associates in Sausalito, CA - stolen laptop 
• Penn Medicine – receipts stolen from unlocked office at Pennsylvania Hospital 
• Baylor Regional Medical Center, Dallas TX – phishing scam to physicians, at least partially 
successful, may have compromised database 
• Vermont Health Exchange – easily hacked because default password not changed nor was the 
list of authorized people restricted. “No customers compromised”
Characterizing breaches in 2014 
• Healthcare – records are constantly on the move (Fin Serv 
too) 
• 85% employee error 
• 15% deliberate 
• Education Breaches 2014 
• 55% based on employee error or stolen, unencrypted laptops 
• 45% deliberate hacks 
• Almost 100% of these are outside hackers: 
• Federal agencies 
→ The #1 cause is employee error!!!* 
* Doesn’t include the times employees open the door to cybercriminal attacks
Top 3 protection strategies 
1. Encrypt PII and other valuable data 
• At rest or in motion 
• Outsource if possible 
2. Practice the three Ps for all valued data 
• Purge 
• Push off-line OR 
• Protect 
3. Restrict access to only educated employees
Employee education 
• Make the case based on 
failure rates of employees 
in your business sector 
• Education should be mandated for access to PII 
• Will liability or fines be the outcome of future forensics 
investigations? (RSA’s $72M man) 
• What’s the cost of a breach compared to a 
harassment lawsuit? 
• A good goal: BEGIN fostering a sense of mutual 
accountability for security
Other security essentials! 
• Forced, automated, application patching 
• Remove unused apps (requires inventory) 
• Enforced Policies – access, compliance, passwords 
• Oversight: ensure logging, auditing, reporting 
• To meet compliance 
• Support forensics work to ascertain cause 
• Keep backups off network! 
Copyright ©2014 Kaseya
About Kaspersky Lab 
• Founded in 1997; largest private 
anti-malware company – 100% 
focused on anti-malware 
• Over $700M annual revenues 
• Presence in 27 countries: CEO is Russian; incorporated 
in the UK; new to US market in 2005 
• #1 vendor in Germany, France, Spain, Eastern Europe 
• Protecting over 300 million end points 
• Top supplier to OEMs/ISVs of anti-malware worldwide
About Kaseya 
• Founded in 2000 
• Over 10,000 customers and a presence in over 20 
countries 
• Award-winning IT systems management software offered 
both in the cloud and on-premise 
• Serving both Managed Service Providers and middle-market 
IT departments 
• Serving customers across industries including retail, 
manufacturing, healthcare, education, government, 
media, technology, finance, and more 
Copyright ©2014 Kaseya
About AuthAnvil acquisition 
• Kaseya acquired Scorpion Software in August 
• Multi-factor authentication 
• Single sign on (SSO) and web-based SSO 
• Password management 
• Secure, easy access to applications, from any device 
• Industry’s first comprehensive and integrated Security 
and IT Management as a Service solution 
Copyright ©2014 Kaseya
How Kaseya can help your security 
• Single pane of glass to manage and secure your 
systems 
• Integrated AuthAnvil 
• Integrated Kaspersky AV 
• Patch management to keep OS and software up-to-date 
and free of vulnerabilities 
• Policy management and automation to reduce human 
error and ensure compliance 
• Logging and reporting to ensure infrastructure 
compliance 
Copyright ©2014 Kaseya
Case Studies – Shield Watch 
• Cryptolocker detected 
• Ransom = 3 bitcoins per machine 
• Timeline 
• Deactivated server and workstation network cards 
• Kicked off KAV scan on each machine 
• Quarantined infected machine 
• Put others back on network 
• Restored corrupted files from VSS 
• Network restored in 1 hour, 35 minutes 
• Infected workstation restored from image 10 minutes later 
• 1 hour 45 minutes from detection to full fix 
Copyright ©2014 Kaseya
Case Studies – True North 
• Stolen laptop with PII on the hard drive 
• Timeline 
• Sent alert when laptop was booted up 
• Removed company data & PII 
• Took control, under the radar so basic functions still worked 
• Captured screenshots of the thief’s activity, including 
Facebook post: “YES got a new lap top today!!!and I’m loving 
it” 
• Obtained name and photo from Facebook and sent to police 
• Recovered laptop and restored from backup 
• 48 hours from theft alert to operational machine 
Copyright ©2014 Kaseya
Questions and Answers 
#Kaseya 
Copyright ©2014 Kaseya 24

More Related Content

What's hot

Building Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus WebinarBuilding Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus WebinarImpetus Technologies
 
Data Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation SlidesData Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation SlidesSlideTeam
 
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataIBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataPerficient, Inc.
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
 
Insurance Organizations Need Access to Good Data Before They Can Benefit from...
Insurance Organizations Need Access to Good Data Before They Can Benefit from...Insurance Organizations Need Access to Good Data Before They Can Benefit from...
Insurance Organizations Need Access to Good Data Before They Can Benefit from...Captricity
 
Unlocking Data from Paper Forms
Unlocking Data from Paper FormsUnlocking Data from Paper Forms
Unlocking Data from Paper FormsCaptricity
 
Case Study: Analytics at CMC Markets: from measuring clicks to driving business
Case Study: Analytics at CMC Markets: from measuring clicks to driving businessCase Study: Analytics at CMC Markets: from measuring clicks to driving business
Case Study: Analytics at CMC Markets: from measuring clicks to driving businessJohn Sinke
 
Data Strategy Flywheel
Data Strategy FlywheelData Strategy Flywheel
Data Strategy FlywheelAlexander Mann
 
Product Management's Role in Digital Transformation
Product Management's Role in Digital TransformationProduct Management's Role in Digital Transformation
Product Management's Role in Digital TransformationNUS-ISS
 
Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox
Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox
Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox Captricity
 
Computer Vision: Coming to a Store Near You - Brent Biddulph
Computer Vision: Coming to a Store Near You - Brent BiddulphComputer Vision: Coming to a Store Near You - Brent Biddulph
Computer Vision: Coming to a Store Near You - Brent BiddulphMolly Alexander
 
Why is Data Science still not a mainstream in corporations - Sasa Radovanovic
Why is Data Science still not a mainstream in corporations - Sasa RadovanovicWhy is Data Science still not a mainstream in corporations - Sasa Radovanovic
Why is Data Science still not a mainstream in corporations - Sasa RadovanovicInstitute of Contemporary Sciences
 
SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...
SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...
SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...Captricity
 
RSA-Iceberg Seminar: Building an effective supplier risk management program
RSA-Iceberg Seminar: Building an effective supplier risk management programRSA-Iceberg Seminar: Building an effective supplier risk management program
RSA-Iceberg Seminar: Building an effective supplier risk management programIceberg Networks Corporation
 
Teleran Briefing July 2014
Teleran Briefing July 2014Teleran Briefing July 2014
Teleran Briefing July 2014Howard Meadow
 
Ensuring Data Quality and Lineage in Cloud Migration - Dan Power
Ensuring Data Quality and Lineage in Cloud Migration - Dan PowerEnsuring Data Quality and Lineage in Cloud Migration - Dan Power
Ensuring Data Quality and Lineage in Cloud Migration - Dan PowerMolly Alexander
 

What's hot (20)

Building Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus WebinarBuilding Your Big Data Analytics Strategy- Impetus Webinar
Building Your Big Data Analytics Strategy- Impetus Webinar
 
Data Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation SlidesData Governance Program Powerpoint Presentation Slides
Data Governance Program Powerpoint Presentation Slides
 
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataIBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
Insurance Organizations Need Access to Good Data Before They Can Benefit from...
Insurance Organizations Need Access to Good Data Before They Can Benefit from...Insurance Organizations Need Access to Good Data Before They Can Benefit from...
Insurance Organizations Need Access to Good Data Before They Can Benefit from...
 
Unlocking Data from Paper Forms
Unlocking Data from Paper FormsUnlocking Data from Paper Forms
Unlocking Data from Paper Forms
 
Case Study: Analytics at CMC Markets: from measuring clicks to driving business
Case Study: Analytics at CMC Markets: from measuring clicks to driving businessCase Study: Analytics at CMC Markets: from measuring clicks to driving business
Case Study: Analytics at CMC Markets: from measuring clicks to driving business
 
Data Strategy Flywheel
Data Strategy FlywheelData Strategy Flywheel
Data Strategy Flywheel
 
Product Management's Role in Digital Transformation
Product Management's Role in Digital TransformationProduct Management's Role in Digital Transformation
Product Management's Role in Digital Transformation
 
Big Data & Analytic: The Value Proposition
Big Data & Analytic: The Value PropositionBig Data & Analytic: The Value Proposition
Big Data & Analytic: The Value Proposition
 
Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox
Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox
Captricity at Corinium Chief Data Officer Forum Keynote - Brian Cox
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Infrastructure Matters
Infrastructure MattersInfrastructure Matters
Infrastructure Matters
 
Computer Vision: Coming to a Store Near You - Brent Biddulph
Computer Vision: Coming to a Store Near You - Brent BiddulphComputer Vision: Coming to a Store Near You - Brent Biddulph
Computer Vision: Coming to a Store Near You - Brent Biddulph
 
Why is Data Science still not a mainstream in corporations - Sasa Radovanovic
Why is Data Science still not a mainstream in corporations - Sasa RadovanovicWhy is Data Science still not a mainstream in corporations - Sasa Radovanovic
Why is Data Science still not a mainstream in corporations - Sasa Radovanovic
 
Actionable Requirements
Actionable RequirementsActionable Requirements
Actionable Requirements
 
SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...
SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...
SVIA Insurance Disrupted Conference 2016 - The Disruptive Impact of Modern T...
 
RSA-Iceberg Seminar: Building an effective supplier risk management program
RSA-Iceberg Seminar: Building an effective supplier risk management programRSA-Iceberg Seminar: Building an effective supplier risk management program
RSA-Iceberg Seminar: Building an effective supplier risk management program
 
Teleran Briefing July 2014
Teleran Briefing July 2014Teleran Briefing July 2014
Teleran Briefing July 2014
 
Ensuring Data Quality and Lineage in Cloud Migration - Dan Power
Ensuring Data Quality and Lineage in Cloud Migration - Dan PowerEnsuring Data Quality and Lineage in Cloud Migration - Dan Power
Ensuring Data Quality and Lineage in Cloud Migration - Dan Power
 

Viewers also liked

Frederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual ReportFrederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual ReportSandy Wagerman
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayZivaro Inc
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1World Wide Technology
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014Nanik Tolaram
 
People as sensors - mining social media for meaningful information
People as sensors - mining social media for meaningful informationPeople as sensors - mining social media for meaningful information
People as sensors - mining social media for meaningful informationTom Raftery
 
McLister, John- Resume Updated_03.16-2
McLister, John- Resume Updated_03.16-2McLister, John- Resume Updated_03.16-2
McLister, John- Resume Updated_03.16-2John McLister
 
nextcomputing-radius-edge
nextcomputing-radius-edgenextcomputing-radius-edge
nextcomputing-radius-edgeTommy Labadini
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationDLT Solutions
 
Wesco aircraft holdings interview questions and answers
Wesco aircraft holdings interview questions and answersWesco aircraft holdings interview questions and answers
Wesco aircraft holdings interview questions and answersselinasimpson289
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015Ross McLendon
 
SOW for Ironbow ACS project
SOW for Ironbow ACS projectSOW for Ironbow ACS project
SOW for Ironbow ACS projectDoug Blagriff
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answersKeisukeHonda66
 
Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) -
Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) - Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) -
Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) - Puppet
 
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Arthit Kliangprom
 
TheLadders’ Top 200 Agency Recruiters of Q4 2012
TheLadders’ Top 200 Agency Recruiters of Q4 2012TheLadders’ Top 200 Agency Recruiters of Q4 2012
TheLadders’ Top 200 Agency Recruiters of Q4 2012TheLaddersRecruiter
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersDLT Solutions
 
ssd vs hdd infographic
ssd vs hdd infographicssd vs hdd infographic
ssd vs hdd infographicAnnie Jones
 

Viewers also liked (20)

PPT D-DataSource
PPT D-DataSourcePPT D-DataSource
PPT D-DataSource
 
Frederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual ReportFrederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual Report
 
Websphere - Introduction to jdbc
Websphere - Introduction to jdbcWebsphere - Introduction to jdbc
Websphere - Introduction to jdbc
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014
 
People as sensors - mining social media for meaningful information
People as sensors - mining social media for meaningful informationPeople as sensors - mining social media for meaningful information
People as sensors - mining social media for meaningful information
 
McLister, John- Resume Updated_03.16-2
McLister, John- Resume Updated_03.16-2McLister, John- Resume Updated_03.16-2
McLister, John- Resume Updated_03.16-2
 
nextcomputing-radius-edge
nextcomputing-radius-edgenextcomputing-radius-edge
nextcomputing-radius-edge
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data Virtualization
 
Wesco aircraft holdings interview questions and answers
Wesco aircraft holdings interview questions and answersWesco aircraft holdings interview questions and answers
Wesco aircraft holdings interview questions and answers
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
 
SOW for Ironbow ACS project
SOW for Ironbow ACS projectSOW for Ironbow ACS project
SOW for Ironbow ACS project
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
 
Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) -
Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) - Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) -
Puppet Camp Atlanta 2014: DEV Toolsets for Ops (Beginner) -
 
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
 
TheLadders’ Top 200 Agency Recruiters of Q4 2012
TheLadders’ Top 200 Agency Recruiters of Q4 2012TheLadders’ Top 200 Agency Recruiters of Q4 2012
TheLadders’ Top 200 Agency Recruiters of Q4 2012
 
Cfmc pumps
Cfmc pumpsCfmc pumps
Cfmc pumps
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
 
ssd vs hdd infographic
ssd vs hdd infographicssd vs hdd infographic
ssd vs hdd infographic
 

Similar to Kaseya Kaspersky Breaches

Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarMarty Miller
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionBlackbaud
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 

Similar to Kaseya Kaspersky Breaches (20)

Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 

More from Kaseya

Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 

More from Kaseya (20)

Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 

Kaseya Kaspersky Breaches

  • 1. The #1 Cause of Data Breaches and 3 Ways to Avoid Them WEBINAR September 2014 Copyright ©2014 Kaseya 1
  • 2. Speakers Alex Brandt Vice President, Americas, Kaseya Alex Brandt is Vice President, Americas at Kaseya where he manages the national sales force and go-to-market strategies for Kaseya’s North American customer base. Alex’s career reflects 20 years of experience working with MSPs and IT organizations to more efficiently manage IT to drive the success of their businesses. Cynthia James Global Director Business Development, CISSP, Kaspersky Lab Cynthia James is Global Director of Business Development at Kaspersky Lab where she has spent the last 7 years. She is a frequent presenter and blogger on cybercrime topics for hardware and software developers like Kaseya who integrate Kaspersky’s anti-malware technology into their products. She obtained her CISSP in 2011. Copyright ©2014 Kaseya 2
  • 3. Agenda • Threatscape level set - • 3 worst things going on in cybercrime today • Ransomware • Breach definition, legislation and reporting • The #1 cause of data breaches in 2014 • Top 3 tactics to defeat a breach • Other security essentials • Solutions & Case Studies • Winner of $100 Amazon Gift Card • Q & A Copyright ©2014 Kaseya
  • 4. Where are, where we’ve come from • 200K unique pieces of malware in 2006; 315K per DAY by Q4 2013 • Cybercrime will NEVER stop (Over 315K/day ) Where many end users think we are
  • 5. Security threats in 2014 Cybercriminals earn over $100 billion annually! 1. No need to be technical: malware can be rented – it’s easier than ever 2. Cybercrime markets extremely organized and sophisticated – anything can be sold 3. Constant innovation and debugging - by us!
  • 6. Ransomware • Cryptolocker – a encryption Trojan (Sept 2013) • Estimated $27M earned in first 2 months (41% vs 3% paid) • Huge issue in Russia • 52% of infections are in the US • Spread primarily thru spam & phishing • Goes after backup files if they are on the network • Can spread from home network thru VPN to corporate network • 2.0 “version” in December + CryptoDefense, etc.
  • 7. Let’s talk about data breaches! • Definition: “an unauthorized person viewed, copied, transmitted, used or took possession of sensitive, protected or confidential data” 1. Did they only have access or did actually view it or take possession of it? 2. Is there reason to believe they misused it? 3. How many records? • Why report if no one* will find out? • *victims, employees, customers, law enforcement, the press, banks, compliance agencies
  • 8. The data breach reporting problem • Typical breach-reporting language: “when there is a reasonable likelihood of harm”; “tell victims in a timely manner” • Who to report to? Feds, state, agency?* • Three states have NO laws 1. Breach notification is costly – Process, fines, loss of customers, lawsuits 2. No one ever wants to report a breach 3. We don’t hear about the majority of breaches! 4. When we do hear…it’s about PII
  • 9. Legislation & Compliance – it’s only about PII (although IP matters too) • Compliance (HIPAA, etc.) • Federal: US is working to unify breach laws – adding prison terms for knowingly concealing a breach • EU will complete that this year (2014) across 28 European countries – to apply to any company with data from EU citizens • How soon post-breach to report • What to report • How to notify customers • Compliance rules (security minimums, fines, etc.) • Up to 2% of gross revenues, breaks for SMBs • Canada – stronger than US law, not as strong as Europe • Who’s PII are you holding?
  • 10. Looking at breaches: the research • Who is most likely to report? • Healthcare – due to HIPAA • Education – due to HIPAA (on campus healthcare) or “code of ethics” or transparency or liability • What are they reporting? • PII • How likely is it that we get full reporting? • Except for Healthcare: far less than 100%
  • 11. University of Maryland breach • 287,000 records stolen • 78% were purged after the fact! • $5M allocated • Biggest take-away: • The Three Ps – • Purge (free) • Push off-line (cheap) • Protect (expensive: cost of layers + liability)
  • 12. Biggest Breaches in Education 2014 • College of the Desert, CA – inadvertent email, PII on all employees • Douglas County School District, Colorado – via stolen laptop • Univ of Illinois, Chicago – haven’t said yet how many • Orangeburg Calhoun Tech College, Orangeburg, SC – 20K via stolen laptop • Penn State College of Medicine - 1176 student records • University of California Irvine – 1.5 months of key logging student health center • Uxbridge School District and Milford Schools – 3K students, laptop stolen from a 3rd party billing provider (Multistate Billing Services) • Butler University, Indianapolis – 160K records hacked (informed by law enforcement) • Orange Public School District – teen hacked grades, is being charged • The University California, Washington Center – didn’t say how many • Riverside Community College – 35K students – emailed file to the wrong address • Stanford Federal Credit Union: 18K emailed to the wrong employee (destroyed?) • Arkansas State University College – “unauthorized access” • Iowa State – 30K hack • University Pittsburgh Medical Center – 27K (originally reported 800) • UMASS Memorial (May) malicious insider hack
  • 13. Biggest Breaches in Healthcare 2014 • Community Health Systems – 4.5 million records…+IP? • Access Health Connecticut – employee backpack stolen w/500 patient documents • Rady’s Children’s Hospital, San Diego, CA – 14K patient data emailed out by mistake • Redwood Regional Medical Group, Santa Rosa, CA 33K patients‘ information on a stolen thumb drive “back up” left in a “zipped container in an unlocked locker” • Boulder Community Health, Boulder, CO – “friendly” hack (warning) • Blue Shield of California, San Francisco – “inadvertent disclosure” • St Vincent Breast Center, Indianapolis – “inadvertent disclosure via letters” • Apple Valley Christian Care Center, Apple Valley, CA – breach via “technical glitch” • 3K patients at Bay Area Pain Medical Associates in Sausalito, CA - stolen laptop • Penn Medicine – receipts stolen from unlocked office at Pennsylvania Hospital • Baylor Regional Medical Center, Dallas TX – phishing scam to physicians, at least partially successful, may have compromised database • Vermont Health Exchange – easily hacked because default password not changed nor was the list of authorized people restricted. “No customers compromised”
  • 14. Characterizing breaches in 2014 • Healthcare – records are constantly on the move (Fin Serv too) • 85% employee error • 15% deliberate • Education Breaches 2014 • 55% based on employee error or stolen, unencrypted laptops • 45% deliberate hacks • Almost 100% of these are outside hackers: • Federal agencies → The #1 cause is employee error!!!* * Doesn’t include the times employees open the door to cybercriminal attacks
  • 15. Top 3 protection strategies 1. Encrypt PII and other valuable data • At rest or in motion • Outsource if possible 2. Practice the three Ps for all valued data • Purge • Push off-line OR • Protect 3. Restrict access to only educated employees
  • 16. Employee education • Make the case based on failure rates of employees in your business sector • Education should be mandated for access to PII • Will liability or fines be the outcome of future forensics investigations? (RSA’s $72M man) • What’s the cost of a breach compared to a harassment lawsuit? • A good goal: BEGIN fostering a sense of mutual accountability for security
  • 17. Other security essentials! • Forced, automated, application patching • Remove unused apps (requires inventory) • Enforced Policies – access, compliance, passwords • Oversight: ensure logging, auditing, reporting • To meet compliance • Support forensics work to ascertain cause • Keep backups off network! Copyright ©2014 Kaseya
  • 18. About Kaspersky Lab • Founded in 1997; largest private anti-malware company – 100% focused on anti-malware • Over $700M annual revenues • Presence in 27 countries: CEO is Russian; incorporated in the UK; new to US market in 2005 • #1 vendor in Germany, France, Spain, Eastern Europe • Protecting over 300 million end points • Top supplier to OEMs/ISVs of anti-malware worldwide
  • 19. About Kaseya • Founded in 2000 • Over 10,000 customers and a presence in over 20 countries • Award-winning IT systems management software offered both in the cloud and on-premise • Serving both Managed Service Providers and middle-market IT departments • Serving customers across industries including retail, manufacturing, healthcare, education, government, media, technology, finance, and more Copyright ©2014 Kaseya
  • 20. About AuthAnvil acquisition • Kaseya acquired Scorpion Software in August • Multi-factor authentication • Single sign on (SSO) and web-based SSO • Password management • Secure, easy access to applications, from any device • Industry’s first comprehensive and integrated Security and IT Management as a Service solution Copyright ©2014 Kaseya
  • 21. How Kaseya can help your security • Single pane of glass to manage and secure your systems • Integrated AuthAnvil • Integrated Kaspersky AV • Patch management to keep OS and software up-to-date and free of vulnerabilities • Policy management and automation to reduce human error and ensure compliance • Logging and reporting to ensure infrastructure compliance Copyright ©2014 Kaseya
  • 22. Case Studies – Shield Watch • Cryptolocker detected • Ransom = 3 bitcoins per machine • Timeline • Deactivated server and workstation network cards • Kicked off KAV scan on each machine • Quarantined infected machine • Put others back on network • Restored corrupted files from VSS • Network restored in 1 hour, 35 minutes • Infected workstation restored from image 10 minutes later • 1 hour 45 minutes from detection to full fix Copyright ©2014 Kaseya
  • 23. Case Studies – True North • Stolen laptop with PII on the hard drive • Timeline • Sent alert when laptop was booted up • Removed company data & PII • Took control, under the radar so basic functions still worked • Captured screenshots of the thief’s activity, including Facebook post: “YES got a new lap top today!!!and I’m loving it” • Obtained name and photo from Facebook and sent to police • Recovered laptop and restored from backup • 48 hours from theft alert to operational machine Copyright ©2014 Kaseya
  • 24. Questions and Answers #Kaseya Copyright ©2014 Kaseya 24