26

Protecting Your Business from Cybercrime - Cybersecurity 101

Embed Size (px)

Citation preview

Page 1: Protecting Your Business from Cybercrime - Cybersecurity 101
Page 2: Protecting Your Business from Cybercrime - Cybersecurity 101
Page 3: Protecting Your Business from Cybercrime - Cybersecurity 101

93 percent of all money is digital. That’s what is at risk here. –Bill NelsonBill Nelson, Financial Services Information Sharing & Analysis Center

What is cybercrime?Cybercrime is criminal activity involving the internet, a computer system, or

computer technology.

http://news.microsoft.com/stories/cybercrime/index.html

Page 4: Protecting Your Business from Cybercrime - Cybersecurity 101

Cybercrime activity is the highest, everCybercrime is a big global business

• The cybercrime industry has evolved with

the PC/computer/mobile device

ecosystem

• Today, cybercrime is more organized and

motivated than at any time in history

Insights about one group of three

Blackhats indicted in 2015

• Stole information on 100 million people

• Breached 12 companies, including

• Concealed at least $100 million in Swiss

and other accounts

• Hackers and conspirators were in more

than a dozen countries

• One of the indicted had hundreds of

employees

http://www.bloomberg.com/news/articles/2015-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds

Page 5: Protecting Your Business from Cybercrime - Cybersecurity 101

What is Blackhat cybercrime?Blackhat cybercrime is a form of malicious online behavior motivated by profit and

a predictable ROI

• Understanding Blackhat criminal tools,

techniques, motivations, cultures, and

ecosystems are critical to defending

against current attacks and deterring

future ones

• Treating Blackhat cybercrime as a purely

technological problem makes

mitigation difficult and costly

Page 6: Protecting Your Business from Cybercrime - Cybersecurity 101

The bad actors are not a monolithic group

Tools, techniques, motivations, and business models vary by cybercriminal region

Non-Professional

• Non-professional

cybercriminals

• Use crime kits to make

spending money

• Little to no business or

technical expertise

• Even though they are not

professional, their impact

can be significant

Blackhats

• Treat cybercrime as a

business

• Business and technical

expertise

• Often work in a closed

group of other

professional

cybercriminals

• Criminal reputation is

everything

Grayhats

• They believe they are

offering legitimate

services. However, their

customers can be both

“legitimate” or criminal

• Ran as a business

Hactivists

• Individuals or groups

who hack for a social

cause, without

economic motivation

• Have both technical

people and followers

State

Sponsored

• National security and/or

economic motivation

• Technical expertise

• Work in a closed group of

other professionals

• Often use Blackhat

resources and/or

techniques to mask their

identity

Some elite Blackhats, some elite

hactivists, and most state sponsored

actors use “APT” techniques

Often defenders treat all bad actors the same

Page 7: Protecting Your Business from Cybercrime - Cybersecurity 101

The cybercrime problem is broad

• More professional cybercrime services make it easier for would-be attackers to become cybercriminals • Many cybercriminals don’t need technical abilities

when entering the world of cybercrime

• In many regions, it is socially acceptable to steal from victims on the Internet

• The line is blurring between state sponsored attackers and cybercriminals• Elite teams of attackers that have the same

resources, skills, and patience as state actors

7

and getting worse

Page 8: Protecting Your Business from Cybercrime - Cybersecurity 101

Cybercrime as a Service (CaaS)It has never been easier for new entrants into the market

Example of crimekits and services

Page 9: Protecting Your Business from Cybercrime - Cybersecurity 101

CaaS

Market for freshly infected PCs to push malware to

It has never been easier for new cybercriminals to start

Page 10: Protecting Your Business from Cybercrime - Cybersecurity 101

Market for freshly infected mobile devices to push malware to

CaaSIt has never been easier for new cybercriminals to start

Page 11: Protecting Your Business from Cybercrime - Cybersecurity 101

How kits are used

Botnets/Malware

There are many monetization strategies

RansomwarePhishing

Page 12: Protecting Your Business from Cybercrime - Cybersecurity 101

To be successful in Cyberdefense, one needs to know what are effective and

durable mitigations

Considerations when combating cybercrime

Page 13: Protecting Your Business from Cybercrime - Cybersecurity 101

Tips to keep your Business Safe

Page 14: Protecting Your Business from Cybercrime - Cybersecurity 101

Strengthen your computer’s defenses

Keep the firewall on (work, home, public networks)

Install legitimate antimalware software (http:/aka.ms/wkactd )

Keep software up to date (automatically)

1 statistics noted from Flexera software

1

Page 15: Protecting Your Business from Cybercrime - Cybersecurity 101

Don’t be tricked into downloading malware

➢ Train your users to use

malware and phishing

protection in their

browsers.

➢ Keep Antivirus on and

updated

Page 16: Protecting Your Business from Cybercrime - Cybersecurity 101

Don’t be tricked into

downloading malware

Close pop-up messages carefully

Ctrl F4

Page 17: Protecting Your Business from Cybercrime - Cybersecurity 101

Step 3Protect company

data and

financial assets

Page 18: Protecting Your Business from Cybercrime - Cybersecurity 101

Protect company data and financial assets

Encrypt confidential data

Use rights management solutions to handle sensitive data

Train your users to identify scams and fraud

Use HoneyTrap accounts in your domain. Notify on successful and unsuccessful

logins

Use HoneyTrap documents. Notify on successful and unsuccessful access

Page 19: Protecting Your Business from Cybercrime - Cybersecurity 101

How to evade scams

Look for telltale signs

Think before you click

Keep sensitive information private

Train employees to identify socially engineered attacks

www.snopes.com

Page 20: Protecting Your Business from Cybercrime - Cybersecurity 101

Step 4Create strong

passwords

Keep them private

Don’t reuse them

Page 21: Protecting Your Business from Cybercrime - Cybersecurity 101

Create strong passwords

Which passwords are strong?

WEAKSTRONG

Password106/04/79Advan!age0us!$wanR!ceRedD00r510152025MsAw3yO!D

SwanRiceRedDoorAdvantageous!My son Aiden was 3 years old in December

Page 22: Protecting Your Business from Cybercrime - Cybersecurity 101

Strong passwords are not enough

Protect your accounts and passwords

Make passwords strong (still needed)

Keep them private (don’t share among users)

Use unique passwords for different websites

Limit use of employees using corporate e-mail accounts as their identifier on third-

party website

Defend against checkers

Enable disabling accounts on too many invalid login attempts

Don’t use insure interfaces (e.g. unprotected POP/IMAP/SMTP)

Monitor for compromised account checkers

Page 23: Protecting Your Business from Cybercrime - Cybersecurity 101

Step 5Guard data and

devices when

you’re on the go

Page 24: Protecting Your Business from Cybercrime - Cybersecurity 101

Guard company data when you’re on the go

Connect securely

Save sensitive activities for trusted connections

Confirm the connection

Encrypt storage on mobile devices

Flash drives: watch out for unknowns and disable auto run

Enable features like Work Folders and cloud storage to manage work data

on mobile devices

HLTONHOTELS.NET

Page 25: Protecting Your Business from Cybercrime - Cybersecurity 101

What to do if there are problemsHave a predefined process and checklist to identify company identities, data,

services, and applications on the device

Report abuse and other problems

Immediately report phishing

Immediately report missing devices or theft of company data

Change all passwords

Wipe mobile phones

Page 26: Protecting Your Business from Cybercrime - Cybersecurity 101

Contact us for information & deployment [email protected]