Cyber Security Trends A quick guide

Similar documents
What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Data Sheet The PCI DSS

Best Practices in Securing a Multicloud World

HOSTED SECURITY SERVICES

Background FAST FACTS

Security Awareness Training Courses

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

to Enhance Your Cyber Security Needs

CYBER RESILIENCE & INCIDENT RESPONSE

DIGITAL TRUST Making digital work by making digital secure

Table of Contents EXECUTIVE SUMMARY AND MAJOR FINDINGS...3 INTRODUCTION...8 THE EXPANSION OF THE ATTACK SURFACE...10 ATTACKER BEHAVIOR...

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

6 Vulnerabilities of the Retail Payment Ecosystem

Governance Ideas Exchange

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Device Discovery for Vulnerability Assessment: Automating the Handoff

Building a Resilient Security Posture for Effective Breach Prevention

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

mhealth SECURITY: STATS AND SOLUTIONS

Cybersecurity The Evolving Landscape

IoT & SCADA Cyber Security Services

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

BHConsulting. Your trusted cybersecurity partner

with Advanced Protection

Understanding the Changing Cybersecurity Problem

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

THALES DATA THREAT REPORT

Cyber Security. Building and assuring defence in depth

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Ingram Micro Cyber Security Portfolio

Industrial control systems

2017 Annual Meeting of Members and Board of Directors Meeting

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

THALES DATA THREAT REPORT

THE CYBERSECURITY LITERACY CONFIDENCE GAP

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Cyber Resilience - Protecting your Business 1

What is ISO ISMS? Business Beam

Gujarat Forensic Sciences University

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

THE ACCENTURE CYBER DEFENSE SOLUTION

Cyber Security Incident Response Fighting Fire with Fire

align security instill confidence

Evolution of IT in the Finance Industry. Europe

CYBER SECURITY TRAINING

Panda Security 2010 Page 1

locuz.com SOC Services

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017

Cloud Communications for Healthcare

SIEMLESS THREAT MANAGEMENT

Cognizant Cloud Security Solution

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

BHConsulting. Your trusted cybersecurity partner

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

CyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET

The Value of Automated Penetration Testing White Paper

Cyber Risks in the Boardroom Conference

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Combating Cyber Risk in the Supply Chain

The Top 6 WAF Essentials to Achieve Application Security Efficacy

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Integrated Access Management Solutions. Access Televentures

Security-as-a-Service: The Future of Security Management

Emerging Technologies The risks they pose to your organisations

74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Cybersecurity in Higher Ed

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Business continuity management and cyber resiliency

REPORT. proofpoint.com

EMPLOYEE SKILLS TRAINING PLATFORM. On-access skills training and measurement for all employees

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

FOR FINANCIAL SERVICES ORGANIZATIONS

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

External Supplier Control Obligations. Cyber Security

DeMystifying Data Breaches and Information Security Compliance

A Guide to Closing All Potential VDI Security Gaps

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Microsoft 365 Business FAQs

Run the business. Not the risks.

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

The 2017 State of Endpoint Security Risk

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Transcription:

Cyber Security Trends A quick guide

This year, in an effort to drive awareness of cyber risks, we ve created this short guide to explain the latest findings in cyber security. Continue reading to learn about key threats, leading causes of data leakage and more. Cyber criminals have a varied and growing portfolio of techniques for gaining access to organisational resources and for obtaining control of systems. Their strategies include, but are by no means limited to, the following: Manipulating personnel with social engineering techniques Exploiting potential vulnerabilities in websites and web applications Attacking network technologies and anything with a connection to a network In order to meet these challenges, organisations need to develop an integrated approach to managing their technology, processes and people. To be proactive, organisations must understand the vulnerabilities that leave their infrastructure and applications exposed, as well as the measures necessary to close any gaps in their security. 2

Top findings about cyber risks Page 4 - Organisations are failing to cover the cyber security basics. Page 5 - Exploit kits continue to threaten organisations defences. Page 6 - People are the weakest link when it comes to cyber security. Page 7 - Phishing costs businesses. Page 8 - The ransomware business is still booming. Page 9 - The risk from OAuth connections is growing amid an app explosion. Page 10 - Shadow IT is a threat to security. Page 11 - Using the Cloud expands an organisation s security perimeter. Page 12 - The supply chain represents a risk to cyber security. Page 13 - Budgets are the biggest obstacle to security. Page 14 - Security professionals are forced to ignore security alerts. 3

Organisations are failing to cover the cyber security basics. THE TOP 10 EXTERNAL VULNERABILITIES ACCOUNTED FOR NEARLY 52% OF ALL IDENTIFIED EXTERNAL VULNERABILITIES. THOUSANDS OF VULNERABILITIES ACCOUNT FOR THE OTHER 48%. The prevalence of common vulnerabilities highlights that many organisations lack basic cyber security measures. Hackers can exploit these vulnerabilities to attack the majority of organisations and their systems. Criminals have a long list of attack methods to choose from. However, some types of attack are more common, and knowing which ones they are can make it easier to prioritise your cyber defences. Something as simple as applying available updates for operating systems and applications such as browsers, plugins and desktop apps could prevent these basic vulnerabilities. These updates include both security and feature patches, and are meant to fix or improve the software you use. (source: 2016 NTT Group Global Threat Intelligence Report) 4

Exploit kits continue to threaten organisations defences. EXPLOIT KITS ACCOUNT FOR 40% OF THE MOST COMMONLY ENCOUNTERED EXPLOITS. (source: Microsoft Security Intelligence Report, Volume 16) Hackers have a monetary incentive to improve results and efficiencies. This makes exploit kits particularly attractive to attackers. 2016 saw dramatic changes in the exploit kit environment. At the start of the year, Angler, Nuclear, Neutrino and RIG were the leading exploit kits. By November, RIG was the only one from that group still active. Now that three of the most dominant exploit kits have left the field, smaller players and new entrants can expand their market share. Cisco advised that exploit kits that appeared poised for growth in late 2016 were Sundown, Sweet Orange and Magnitude. These kits, as well as RIG, are known to target Flash, Silverlight and Internet Explorer vulnerabilities (Cisco 2017 Annual Cyber Security Report). 5

People are the weakest link when it comes to cyber security. Privilege abuse is the leading cause for data leakage determined by malicious insiders. Privilege abuse accessing information for unsanctioned uses is the leading way in which data is leaked by malicious insiders. Organisations need to monitor authorised daily activity, especially that of individuals with access to sensitive data. You also can t effectively protect your data if you don t know where it resides. Ensure that you re aware of exactly where your data is, and be careful who you give privileges to and to what degree. (source: Verizon, 2016 Data Breach Investigations Report) 6

Phishing costs businesses. 85% of organisations have suffered phishing attacks. Two-thirds of organisations reported experiencing attacks that were targeted and personalised (spear phishing), up 22% from the year before. (source: Wombat Security Technologies, The State of the Phish 2017) In 2015, Ponemon Institute reported that lost employee productivity is the largest cost associated with phishing, at roughly $1.8M for a 10,000-person company (Ponemon Institute, Cost of Phishing and the Value of Employee Training). Cyber criminals are focusing on more sophisticated endeavours that can provide higher rewards, like spear-phishing attacks. It is estimated that the profit from a spear-phishing attack can be more than ten times that of a mass attack (Cisco 2017 Annual Cyber Security Report). Phishing plays on human vulnerabilities and that s why any comprehensive plan to combat phishing must start by educating employees about the role they play in the organisation s overall information security posture. The best defence against phishing is a continual, hands-on training programme. 7

The ransomware business is still booming. NEARLY 50% OF ORGANISATIONS HAVE BEEN HIT BY RANSOMWARE. According to a June 2016 survey from Osterman Research, almost one out of every two participants indicated their organisation had suffered at least one ransomware attack in the past 12 months. Of the IT professionals surveyed by Barkly who had experienced a ransomware attack, only 42% reported being able to successfully recover all their data from backup. Emails with malicious links and malicious attachments account for 59% of ransomware infections. According to the Osterman Research report, users are more than twice as likely to be infected by clicking something in an email than by visiting an infected website directly. (source: Osterman Research, Understanding the Depth of the Global Ransomware Problem, 2016) 8

The risk from OAuth connections is growing amid an app explosion. 27% of connected third-party Cloud applications introduced by employees into enterprise environments in 2016 posed a high-security risk. (source: Cisco 2017 Annual Cyber Security Report) Applications create a risk for enterprises. They connect with the corporate infrastructure and can communicate freely with the corporate Cloud and software-as-aservice (SaaS) platforms at the point that users grant access through open authentication. Growth is explosive. There were about 129,000 unique applications observed at the beginning of 2016. By the end of October that year, the number had grown to 222,000. CloudLock categorised the risk level of 222,000 applications used by 900 organisations. Of those total applications, 27% were deemed to be high risk, while the majority fell into the medium-risk category (Cisco 2017 Annual Cyber Security Report). Netskope found that 66.3% of all Cloud service providers lack the proper security, privacy controls and industry certificates to comply with the General Data Protection Data Regulation (GDPR). 9

Shadow IT is a threat to security. 80% of end users use software not cleared by IT. Company personnel are increasingly introducing new risks with workarounds for legacy IT solutions. In small and large enterprises, personnel gravitate towards the simplest solutions. Legacy methods can be slow and may not work as well for employees on the go. Why waste effort finding and requesting a worksanctioned application when your mobile or tablet is sitting on the table? Shadow IT presents a serious risk to businesses. Each additional unsanctioned device or application increases the organisation s attack surface and increases the likelihood of information mismanagement. (source: Cisco, The Shadow IT Dilemma) 10

Using the Cloud expands an organisation s security perimeter. The average number of Cloudbased applications in use has nearly tripled in the past three years, from 545 in Q3 of 2013 to 1,427 in Q3 of 2016. (source: Skyhigh, Cloud Adoption & Risk Report) Security professionals who participated in Cisco s third annual Security Capabilities Benchmark Study cited mobile devices, public Cloud, Cloud infrastructure and user behaviour as top sources of concern when they think about their organisation s risk of exposure to a cyber attack. This is understandable. The proliferation of mobile devices creates more endpoints to protect. The Cloud is expanding the security perimeter. And users are, and always will be, a weak link in the security chain. Organisations must: Integrate their security technology Simplify their security operations Rely more on automation This approach will help reduce operational expenses, ease the burden on security personnel and deliver better security outcomes. 11

The supply chain presents a risk to cyber security. On average, only 35-57% of partners were vetted, placing most enterprises at considerable risk. Despite a majority of enterprises either currently vetting or planning to vet ecosystem partners for cyber security capabilities, enough gaps exist to be of major concern. To highlight the scale of the risk, 63% of breaches can be traced to third-party vendors, according to Soha System s survey on third-party risk management. Security professionals must convince executive management that improved vetting of partners is essential by reviewing third parties data safeguards, security policies and procedures, and determining whether their security posture is sufficient to respond to a data breach or cyber attack. (source: Accenture: The State of Cybersecurity and Digital Trust 2016) 12

Budgets are the biggest obstacle to security. 35% of security professionals said that budget was their biggest obstacle. (source: Cisco 2017 Annual Cyber Security Report) In 2016, 35% of security professionals said that budget was their biggest obstacle to adopting advanced security processes and technology. However, budgetary constraints are only a contributing factor. Compatibility issues highlight the problems of disconnected systems that don t integrate, and concerns about the lack of trained personnel highlight the problem of having the necessary tools but not the skills to understand what is happening and how to react. Security professionals will have to evidence the need for better cyber security. For example, when it comes to finance, security teams must compete against many other corporate priorities. If they can t secure funds for more tools, then the budget they do have must work harder. For example, automation can be used to offset limited manpower. 13

Security professionals are forced to ignore security alerts. 54% of legitimate alerts are not remediated. Maybe because of the reasons stated previously such as a lack of tools or resources organisations are reporting that they can only respond to half the security alerts they receive in a given day. To investigate and understand a greater percentage of the identified alerts, organisations need to rely on automation as well as invest in appropriate tools. Automation can help free up resources and remove the burden of detection and investigation from the security team. (source: Cisco 2017 Annual Cyber Security Report) 14

Conclusion: an expanding attack surface requires an integrated approach. Defenders must take a more proactive stance to stay ahead of basic attack tactics. Security teams should be: Conducting regular staff training and awareness programs Gathering information about the latest threats and vulnerabilities Ensuring they are controlling access to their networks Limiting their organisation s exposure Managing configurations Developing consistent response practices and procedures By following this approach, security professionals will be able to take the necessary preventive measures to reduce the threat of attacks, and to inform senior management about possible exposures and vulnerabilities. 15

Our technical services CYBER ESSENTIALS CONSULTANCY AND CERTIFICATION PENETRATION TESTING PCI DSS CONSULTANCY AND COMPLIANCE IT HEALTH CHECK TRAINING AND KNOWLEDGE TRANSFER Prove that you take security seriously. IT Governance s fixedprice solutions can help you achieve certification to either Cyber Essentials or Cyber Essentials Plus at a pace and budget that suits you. Forewarned is forearmed. Test your defences with our penetration testing services. By simulating an attack, we can detect your businesscritical vulnerabilities and work with you to protect your systems. We cover the entire range of payment card compliance services. As an authorised QSA company, we will assess your needs, explain the PCI compliance requirements, and provide solutions that will suit your budget. IT Health Checks are designed to provide you with a complete view of your system s strengths and vulnerabilities from an unbiased, expert perspective. Our health checks can be customised to your needs. Training courses for all staff, IT practitioners and lead implementers seeking to implement various standards, including ISO 27001 and the PCI DSS, as well as professional certifications like CEH and CISSP. Find out more Find out more Find out more Find out more Find out more 16

Our company IT Governance is the world s leading global provider of IT governance, risk management and compliance solutions. Our comprehensive range of products and services, combined with flexible and cost-effective delivery options, provide a unique, integrated alternative to the traditional consultancy firm, publishing house, penetration tester or training provider. Speak to an expert Please contact us for further information or to speak to an expert. T: +44 (0)845 070 1750 E: servicecentre@itgovernance.co.uk 17