SlideShare a Scribd company logo
Restricting
Authenticating
Tracking
User Access?
Time Is Not
On Our Side!
Page 1 of 6
The 2015 worst password list was published recently(1). The list is only one confir-
mation that leaving password controls to the end user is not secure. Verizon’s 2015
Data Breach Investigations Report(2) revealed that most breaches resulted from
harvested credentials. And recently, a former executive for the Cardinals pleaded
guilty to accessing the Astros’ player database and email system(3). He gained access
by learning the account and password from an employee who turned in their laptop.
This type of breach has become much too commonplace.
If you haven’t already, it’s time to take action and migrate to multifactor authentica-
tion. There is a sound ROI for the investment, and VIMRO is extremely committed
to helping our clients migrate to multifactor authentication in 2016!
Why Password Don’t Work
There is no shortage of case stories presenting a strong case and confirmed ROI
for moving to multifactor controls. Here are a few examples:
• In addition to the Verizon 2015 Data Breach Investigations Report we referenced
above, Wired published an article about the breaches of 2015(4). Most of the year’s
largest hacks involved weak authentication. Multifactor controls would drastically
reduce or eliminate this threat. (see reference #6)
• When the VIMRO Cyber Security Team conducts penetration tests, we almost
always gain access to our clients’ systems via captured credentials. There are so
many attack vectors to obtain passwords! Multifactor controls would considerably
reduce or eradicate the following vulnerabilities:
o Through social engineering, in which a workforce member sends us their
passwords, tells us their passwords, or enters their passwords into a simulat
ed cybercriminal fake web site;
or
o By intercepting them when conducting man-in-the-middle attacks (in
which an attacker secretly relays, often altering, the communication between
two parties who believe they are directly communicating with each other);
or
o By gaining access to the password database/file when breaching a weakly
configured or patched system, and then cracking the records with a pass
word-cracking application, such as L0phtCrack, OphtCrack, RainbowCrack,
Cain and Abel, John the Ripper, etc.
12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191
Passwords Don’t Work: Multifactor Controls Are the Answer
Learn how to demonstrate ROI
There is a sound
ROI for the
investment of
Multifactor Controls
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 2 of 6
With the right
methodology, ROI
is easy to
Demonstrate
The VIMRO security team’s work involves traveling. We overhear a lot of phone
conversations when we’re in the airport. On many occasions we overhear support
calls. Most support calls we hear involve a traveler forgetting their password, which
is understandable given the stresses and distractions of travel. We often can gather
where the individual works, their account name, and, yes, even their password,
which they typically repeat after a support person gives it to them over the phone.
Here are a few default passwords that we have recently heard in our travels:
• Winter2015! (It would be a reasonable guess that the next one is going to
be Spring2016! or some derivative.)
• “name of company”!@#abc
• “person’s name”1234
If we were criminals, or even if we were ethically conducting a social engineering
experiment by sitting in the airport and listening to calls, we’re pretty confident that
we would be able to gain unauthorized access to the individuals’ respective organi-
zations. Once again, the solution calls for multifactor controls.
ROI for Multifactor Authentication Controls is Easy to Demonstrate
All clients need to demonstrate an ROI when they present their solution to a prob-
lem. Using passwords only is a major problem. The likelihood of a breach due to
weak authentication is high, based on the following risks/threat examples:
• phishing (attempt to acquire sensitive information by masquerading as a
trustworthy entity in an electronic communication)
• man-in-the-middle
• gaining access to the password file database
The impact of a breach can be high in terms of hard costs:
• remediation/corrective action
• breach notification letters and credit monitoring for each record
compromised
• lost sales/consumer confidence
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 3 of 6
Compare,
Contrast,
Evaluate the
Products that
Meet YOUR Needs.
In most cases, when VIMRO conducts an ROI assessment for multifactor controls,
we can demonstrate to our client that the control is less expensive than the hard
costs associated with one mere breach. And this doesn’t even include implied costs:
it’s much harder to demonstrate a breach’s effect on a company’s reputation.
Indeed, in talking with most C-level executives, we learn that their company’s repu-
tation among its customers and shareholders is one of their top concerns, and that
any crack in that reputation is, in fact, associated with a high cost.
Conduct an IT Component and Sensitive Data Inventory
Demonstrating an ROI for multifactor controls is the easiest part of the project. In
the next phase of a multifactor implementation project, identify how the solution
will be used. This involves in-depth knowledge of your environment. Most clients
utilize the CIS Critical Security Controls(5) to acquire and manage this information.
Specifically:
• CSC 1: Inventory of Authorized and Unauthorized Devices
• CSC 2: Inventory of Authorized and Unauthorized Software
The inventory should include where sensitive data resides and how authentication is
currently handled. Dataflow diagrams also help provide a detailed understanding of
all of the components involved in sensitive data transmission, processing, and
storage. This enables efficient and effective implementation of the multifactor
solution.
Once the inventory is conducted, create a list of criteria that the multifactor solu-
tion must meet. We have provided a list of common requirements among VIMRO
clients in Attachment 1.
Evaluate Products that Meet Your Needs
There are many good multifactor authentication products on the market. VIMRO is
vendor-agnostic, so we help our clients research three or four or more products that
work best for their needs, but we do not promote one product over another.
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 4 of 6
Vet the strategy
by conducting a
pilot project.
One of our methods for identifying the best candidates for our clients’ evaluation is
suggesting solutions that worked well for similar organizations. We add those
vendors to the evaluation list in Attachment 1. We also identify good solution
candidates by staying current with industry reporting on these products. Some good
resources for this are:
• Search Security: http://searchsecurity.techtarget.com/feature/The-funda
mentals-of-MFA-Comparing-the-top-multifactor-authentication-products
• Forrester: https://www.forrester.com/How+To+Get+Away+With+Mur
der+Authentication+Technologies+That+Will+Help+You+Kill+Pass
words/fulltext/-/E-res126341
• Gartner: https://www.gartner.com/doc/2930517/magic-quadrant-us
er-authentication
• SANS: https://www.sans.org/reading-room/whitepapers/authentication
• SC Magazine: http://www.scmagazine.com/two-factor-authentica
tion-smart-cards-tokens/products/83/0/
Conduct a Pilot Project
VIMRO recommends that you conduct a pilot project using the one or two high-
est-scoring solutions on your evaluation sheet. Together we will select one or two
users from each of your organization’s business units. VIMRO recommends
mixed-skill pilot groups consisting of power users, intermediate users, and users
needing more support than most. This provides you with adequate feedback to
conclude whether the solution will work for your organization.
Documentation
Thorough documentation is critical to a successful implementation and lifecycle of
the multifactor solution. Dedicate resources to documenting everything. This
includes:
• Design documents
• As-built documents
• Support documents
• User instructions
• Pilot project lessons learned
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 5 of 6
...must conduct
continuous exercises
that test the
effectiveness of
training.
Awareness Training is Still Important
Multifactor controls are critical, but it is still important to have a layered defense.
This is especially true when it comes to protecting your user. Multifactor controls
can be compromised if a user shares their verification code with an attacker
through social engineering(6). It is important to conduct cyber security awareness
training with workforce members and to conduct continued exercises that test the
effectiveness of your training program. See VIMRO’s “Strengthening the Weakest
Link”(7) paper for more information.
Conclusion
Antimalware, IDS/IPS, and firewalls have become important tools to protect
businesses over the years. Breach data and research prove that ever-increasing
threats now require the use of multifactor controls to protect our businesses,
employees, and customers.
We encourage you to contact VIMRO to discuss how we can help make multifactor
controls part of your business practices.
References.
(1) 2015 Worst Password List: http://www.theguardian.com/technology/2016/-
jan/20/123456-worst-passwords-revealed
(2) Verizon 2015 Data Breach Investigations Report: http://www.verizonenterprise.com/D-
BIR/2015/
(3) Ex-Cardinal Executive Pleads Guilty to Accessing Astros’ Database: http://espn.go.com/ml-
b/story/_/id/14531169/christopher-cor-
rea-former-st-louis-cardinals-executive-pleads-guilty-hacking-houston-astros-database
(4) Wired List of 2015 Largest Hacks: http://www.wired.com/2015/12/the-years-11-big-
gest-hacks-from-ashley-madison-to-opm/
(5) CIS Critical Security Controls: https://www.sans.org/critical-security-controls
(6) Two-Factor Authentication Social Engineering Vulnerability: http://www.homelandsecuri-
tynewswire.com/dr20160204-vulnerability-found-in-in-twofactor-authentication
(7) VIMRO Strengthening the Weakest Link Paper: https://www.vimro.com/wp-content/up-
loads/2015/12/Strengthening-the-Weakest-Link-151210_2225opt.pdf
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Passwords Don’t Work:
Multifactor Controls Are the Answer
Attachment 1 – Multifactor Authentication Evaluation Requirements
Page 6 of 6

More Related Content

What's hot

2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
Owen Bartolome
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
rsouthal2003
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
Priyanka Aash
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Distil Networks
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Distil Networks
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment
aap3 IT Recruitment
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
EMC
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
EMC
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
GFI Software
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
Δρ. Γιώργος K. Κασάπης
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
Paul Walsh
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
James Sheehan
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
Kim Jensen
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
OilPriceInformationService
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
The Lorenzi Group
 

What's hot (20)

2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 

Viewers also liked

Kevincito
KevincitoKevincito
Kevincito
Jadielvera
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
kishore rao
 
Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.
Giovanni Vicencini
 
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Marlène Pra
 
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
National Institute of Food and Agriculture
 
Redes inalambricas
Redes inalambricasRedes inalambricas
Redes inalambricas
Anthonyestyeban
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
 
Sejarah smk gajah berang
Sejarah smk gajah berangSejarah smk gajah berang
Sejarah smk gajah berangTeh onchew
 
El Periódico (13/03/2013)
El Periódico (13/03/2013)El Periódico (13/03/2013)
El Periódico (13/03/2013)
Francesc Fajula de Quintana
 
CAS State of the Project 2016
CAS State of the Project 2016CAS State of the Project 2016
CAS State of the Project 2016
Misagh Moayyed
 
Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015
are_pay
 
Derecho Concursal y Atraso
Derecho Concursal y AtrasoDerecho Concursal y Atraso
Derecho Concursal y Atraso
YessicaB1
 
Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)
Francesc Fajula de Quintana
 

Viewers also liked (13)

Kevincito
KevincitoKevincito
Kevincito
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.
 
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
 
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
 
Redes inalambricas
Redes inalambricasRedes inalambricas
Redes inalambricas
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Sejarah smk gajah berang
Sejarah smk gajah berangSejarah smk gajah berang
Sejarah smk gajah berang
 
El Periódico (13/03/2013)
El Periódico (13/03/2013)El Periódico (13/03/2013)
El Periódico (13/03/2013)
 
CAS State of the Project 2016
CAS State of the Project 2016CAS State of the Project 2016
CAS State of the Project 2016
 
Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015
 
Derecho Concursal y Atraso
Derecho Concursal y AtrasoDerecho Concursal y Atraso
Derecho Concursal y Atraso
 
Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)
 

Similar to Passwords don't work multifactor controls do!

Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
Gordon Mackay - CISSP
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
FitCEO, Inc. (FCI)
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
FitCEO, Inc. (FCI)
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
FitCEO, Inc. (FCI)
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
kamensm02
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
Bee_Ware
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Wendy Knox Everette
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
BVU
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
kamensm02
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
ssuser6c59cb
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Berezha Security Group
 

Similar to Passwords don't work multifactor controls do! (20)

Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
 

More from FitCEO, Inc. (FCI)

HIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideHIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance Guide
FitCEO, Inc. (FCI)
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
FitCEO, Inc. (FCI)
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
FitCEO, Inc. (FCI)
 
VIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyVIMRO Cyber Security Methodology
VIMRO Cyber Security Methodology
FitCEO, Inc. (FCI)
 
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
FitCEO, Inc. (FCI)
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
FitCEO, Inc. (FCI)
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
FitCEO, Inc. (FCI)
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
FitCEO, Inc. (FCI)
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
FitCEO, Inc. (FCI)
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMRO
FitCEO, Inc. (FCI)
 
IPV6 a tale of two protocols
IPV6 a tale of two protocolsIPV6 a tale of two protocols
IPV6 a tale of two protocols
FitCEO, Inc. (FCI)
 
CODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHFCODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHF
FitCEO, Inc. (FCI)
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3
FitCEO, Inc. (FCI)
 

More from FitCEO, Inc. (FCI) (13)

HIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideHIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance Guide
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
 
VIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyVIMRO Cyber Security Methodology
VIMRO Cyber Security Methodology
 
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMRO
 
IPV6 a tale of two protocols
IPV6 a tale of two protocolsIPV6 a tale of two protocols
IPV6 a tale of two protocols
 
CODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHFCODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHF
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Passwords don't work multifactor controls do!

  • 1. Restricting Authenticating Tracking User Access? Time Is Not On Our Side! Page 1 of 6 The 2015 worst password list was published recently(1). The list is only one confir- mation that leaving password controls to the end user is not secure. Verizon’s 2015 Data Breach Investigations Report(2) revealed that most breaches resulted from harvested credentials. And recently, a former executive for the Cardinals pleaded guilty to accessing the Astros’ player database and email system(3). He gained access by learning the account and password from an employee who turned in their laptop. This type of breach has become much too commonplace. If you haven’t already, it’s time to take action and migrate to multifactor authentica- tion. There is a sound ROI for the investment, and VIMRO is extremely committed to helping our clients migrate to multifactor authentication in 2016! Why Password Don’t Work There is no shortage of case stories presenting a strong case and confirmed ROI for moving to multifactor controls. Here are a few examples: • In addition to the Verizon 2015 Data Breach Investigations Report we referenced above, Wired published an article about the breaches of 2015(4). Most of the year’s largest hacks involved weak authentication. Multifactor controls would drastically reduce or eliminate this threat. (see reference #6) • When the VIMRO Cyber Security Team conducts penetration tests, we almost always gain access to our clients’ systems via captured credentials. There are so many attack vectors to obtain passwords! Multifactor controls would considerably reduce or eradicate the following vulnerabilities: o Through social engineering, in which a workforce member sends us their passwords, tells us their passwords, or enters their passwords into a simulat ed cybercriminal fake web site; or o By intercepting them when conducting man-in-the-middle attacks (in which an attacker secretly relays, often altering, the communication between two parties who believe they are directly communicating with each other); or o By gaining access to the password database/file when breaching a weakly configured or patched system, and then cracking the records with a pass word-cracking application, such as L0phtCrack, OphtCrack, RainbowCrack, Cain and Abel, John the Ripper, etc. 12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191 Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI There is a sound ROI for the investment of Multifactor Controls
  • 2. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 2 of 6 With the right methodology, ROI is easy to Demonstrate The VIMRO security team’s work involves traveling. We overhear a lot of phone conversations when we’re in the airport. On many occasions we overhear support calls. Most support calls we hear involve a traveler forgetting their password, which is understandable given the stresses and distractions of travel. We often can gather where the individual works, their account name, and, yes, even their password, which they typically repeat after a support person gives it to them over the phone. Here are a few default passwords that we have recently heard in our travels: • Winter2015! (It would be a reasonable guess that the next one is going to be Spring2016! or some derivative.) • “name of company”!@#abc • “person’s name”1234 If we were criminals, or even if we were ethically conducting a social engineering experiment by sitting in the airport and listening to calls, we’re pretty confident that we would be able to gain unauthorized access to the individuals’ respective organi- zations. Once again, the solution calls for multifactor controls. ROI for Multifactor Authentication Controls is Easy to Demonstrate All clients need to demonstrate an ROI when they present their solution to a prob- lem. Using passwords only is a major problem. The likelihood of a breach due to weak authentication is high, based on the following risks/threat examples: • phishing (attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication) • man-in-the-middle • gaining access to the password file database The impact of a breach can be high in terms of hard costs: • remediation/corrective action • breach notification letters and credit monitoring for each record compromised • lost sales/consumer confidence
  • 3. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 3 of 6 Compare, Contrast, Evaluate the Products that Meet YOUR Needs. In most cases, when VIMRO conducts an ROI assessment for multifactor controls, we can demonstrate to our client that the control is less expensive than the hard costs associated with one mere breach. And this doesn’t even include implied costs: it’s much harder to demonstrate a breach’s effect on a company’s reputation. Indeed, in talking with most C-level executives, we learn that their company’s repu- tation among its customers and shareholders is one of their top concerns, and that any crack in that reputation is, in fact, associated with a high cost. Conduct an IT Component and Sensitive Data Inventory Demonstrating an ROI for multifactor controls is the easiest part of the project. In the next phase of a multifactor implementation project, identify how the solution will be used. This involves in-depth knowledge of your environment. Most clients utilize the CIS Critical Security Controls(5) to acquire and manage this information. Specifically: • CSC 1: Inventory of Authorized and Unauthorized Devices • CSC 2: Inventory of Authorized and Unauthorized Software The inventory should include where sensitive data resides and how authentication is currently handled. Dataflow diagrams also help provide a detailed understanding of all of the components involved in sensitive data transmission, processing, and storage. This enables efficient and effective implementation of the multifactor solution. Once the inventory is conducted, create a list of criteria that the multifactor solu- tion must meet. We have provided a list of common requirements among VIMRO clients in Attachment 1. Evaluate Products that Meet Your Needs There are many good multifactor authentication products on the market. VIMRO is vendor-agnostic, so we help our clients research three or four or more products that work best for their needs, but we do not promote one product over another.
  • 4. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 4 of 6 Vet the strategy by conducting a pilot project. One of our methods for identifying the best candidates for our clients’ evaluation is suggesting solutions that worked well for similar organizations. We add those vendors to the evaluation list in Attachment 1. We also identify good solution candidates by staying current with industry reporting on these products. Some good resources for this are: • Search Security: http://searchsecurity.techtarget.com/feature/The-funda mentals-of-MFA-Comparing-the-top-multifactor-authentication-products • Forrester: https://www.forrester.com/How+To+Get+Away+With+Mur der+Authentication+Technologies+That+Will+Help+You+Kill+Pass words/fulltext/-/E-res126341 • Gartner: https://www.gartner.com/doc/2930517/magic-quadrant-us er-authentication • SANS: https://www.sans.org/reading-room/whitepapers/authentication • SC Magazine: http://www.scmagazine.com/two-factor-authentica tion-smart-cards-tokens/products/83/0/ Conduct a Pilot Project VIMRO recommends that you conduct a pilot project using the one or two high- est-scoring solutions on your evaluation sheet. Together we will select one or two users from each of your organization’s business units. VIMRO recommends mixed-skill pilot groups consisting of power users, intermediate users, and users needing more support than most. This provides you with adequate feedback to conclude whether the solution will work for your organization. Documentation Thorough documentation is critical to a successful implementation and lifecycle of the multifactor solution. Dedicate resources to documenting everything. This includes: • Design documents • As-built documents • Support documents • User instructions • Pilot project lessons learned
  • 5. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 5 of 6 ...must conduct continuous exercises that test the effectiveness of training. Awareness Training is Still Important Multifactor controls are critical, but it is still important to have a layered defense. This is especially true when it comes to protecting your user. Multifactor controls can be compromised if a user shares their verification code with an attacker through social engineering(6). It is important to conduct cyber security awareness training with workforce members and to conduct continued exercises that test the effectiveness of your training program. See VIMRO’s “Strengthening the Weakest Link”(7) paper for more information. Conclusion Antimalware, IDS/IPS, and firewalls have become important tools to protect businesses over the years. Breach data and research prove that ever-increasing threats now require the use of multifactor controls to protect our businesses, employees, and customers. We encourage you to contact VIMRO to discuss how we can help make multifactor controls part of your business practices. References. (1) 2015 Worst Password List: http://www.theguardian.com/technology/2016/- jan/20/123456-worst-passwords-revealed (2) Verizon 2015 Data Breach Investigations Report: http://www.verizonenterprise.com/D- BIR/2015/ (3) Ex-Cardinal Executive Pleads Guilty to Accessing Astros’ Database: http://espn.go.com/ml- b/story/_/id/14531169/christopher-cor- rea-former-st-louis-cardinals-executive-pleads-guilty-hacking-houston-astros-database (4) Wired List of 2015 Largest Hacks: http://www.wired.com/2015/12/the-years-11-big- gest-hacks-from-ashley-madison-to-opm/ (5) CIS Critical Security Controls: https://www.sans.org/critical-security-controls (6) Two-Factor Authentication Social Engineering Vulnerability: http://www.homelandsecuri- tynewswire.com/dr20160204-vulnerability-found-in-in-twofactor-authentication (7) VIMRO Strengthening the Weakest Link Paper: https://www.vimro.com/wp-content/up- loads/2015/12/Strengthening-the-Weakest-Link-151210_2225opt.pdf
  • 6. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Passwords Don’t Work: Multifactor Controls Are the Answer Attachment 1 – Multifactor Authentication Evaluation Requirements Page 6 of 6