Originally posted in Cybersecuritynj.com
Unfortunately a day does not go by at this juncture without all of us hearing of a new major security breach. For example, in 2014 about half-a-billion customer records were hacked in the U.S., and a billion records worldwide were compromised. Companies such as Target, Neiman Marcus, eBay, P.F. Chang, UPS, Home Depot, JPMorgan Chase, KMart, Sony, Staples, Chick-Fil-A, and Anthem, to list just a few, were penetrated. The private information of a typical suburban customer may thus have been compromised several times, in over just one year. How does a Small and Medium Business (SMB) protect itself and the identity and records of its customers?
Know the attach arsenal
The first thing is to understand the mechanism used by hackers, who have turned into true criminals seeking to appropriate records and re-sell them on the black market. A short list includes the following:
Malware. A software module that may easily end-up on the SMB’s computer that is designed to cause damage to a user’s computer, server, or network. Malware includes viruses, worms, and trojans.
- Virus. Malware that replicates itself from one systems to another. It may infect other files in the computer, to facilitate the execution of the malware code when these, perhaps more common files are accessed.
- Worm. Malware that spreads by autonomously propagating copies of itself through e-mail, instant messaging (IM), or peer-to-peer (P2P) applications.
- A self-contained program that takes malicious actions on the computer, possibly facilitating additional penetrations at a later time.
- Trojan Downloader/Dropper. A form of trojan that installs other malicious files to a computer of the SMB that it has infected, either by downloading these files from a remote computer or by extracting them directly from a copy contained in its own code.
- Exploit. Malicious code that takes advantage of operating system or application software vulnerabilities that were unwittingly created by developers (perhaps because of insufficient testing) to infect a computer or perform some harmful activity.
- Spyware. Software that may end-up on the SMB’s computer that surreptitiously collects information, such as the websites a user visits or other critical data. Installation typically occurs without the user’s knowledge.
- Keylogger. A program that surreptitiously sends keystrokes or screen shots to an attacker.
- Phishing. A popular method of credential theft (for example user IDs, passwords, PINs, credit card numbers and so on) that tricks users into revealing this information. Phishers utilize phony websites or deceptive e-mail messages that mimic some trusted business by the targeted user in order to appropriate the credentials and then make nefarious use. This may involve web links or attachments embedded in the deceiving e-mails. A program that displays advertisements. Adware may display advertisements without user’s consent and/or it can infect the SMB’s computer with malware, for example if rouge sites are visited.
- Social Engineering. A set of techniques that frustrate security mechanisms by exploiting human nature. For example, this may entail receiving a phone call from someone posing as a representative from one’s credit card company, or a vendor, or a government agency; or, it may entail e-mail messages that ask the recipient to click the attachment which in turn results in malware being installed on the SMB’s system. The goal of a social engineering attack is to get the targeted user to perform an action of the attacker’s choice.
- Monitoring tool. Software that monitors activity of the SMB’s computer user, typically by capturing keystrokes or screen images.
- Password Stealer. Malware that works in conjunction with a keylogger and is specifically designed to copy and transmit personal information, such as user names and passwords.
- Rogue Security Software. Software that is advertised to be a security free-ware but that may attempt to socially engineer the user into participating in a fraudulent transaction, or may, of its own, spawn other undesirable system-level activities.
- Spam. Unsolicited e-mail sent to a large distribution, often to upload malware, either by attaching the malware to e-mail messages or by sending a message containing a link to the malware.
- Finally, in this abridged list of infraction tools, SMBs need to be cognizant of Operating System, Browser and Application Vulnerabilities.
- Develop security awareness, and stay informed. Be aware of the threat landscape around you.
- Use strong passwords for your laptop, applications, and online accounts, and keep passwords and personal identification numbers (PINs) secret.
- Password reuse across multiple computers creates some of the greatest risk from folks that use rainbow tables to recover the user’s password, especially if it is less than eight-to-twelve characters and it does not include special characters;
- Do not click links or call phone numbers from e-mails received from financial institutions, but to instead call the numbers that you have on file. Financial institutions typically print customer service phone numbers on the backs of credit cards / bank statements, and it is these numbers that users should call.
- Always use the latest version of the browsers since these incorporate the latest security safeguards and employ the best protection protocol, for example Transport Layer Security Version 1.2.
- Malware can be transmitted through instant messages on both computers and mobile devices.
- (At home) Users (SMB employees) should install and use an e-mail client that actively blocks active content and the automatic opening of attachments.
- Users who think they may have been a victim of an attack, or who suspect something unusual on your network, should immediately contact the IT department for assistance.
- Be extremely careful of using Hotspots in airports, hotels, coffee shops, etc.