BreachExchange mailing list archives

The Veiled Bride of the Data Breach


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 7 Jul 2014 18:27:15 -0600

http://lpportal.com/editorial/columns/item/3159-the-veiled-bride-of-the-data-breach.html

How many of us know that couple where one partner just seems to spark so
much in the relationship?

The person is fun, charming, and likable; and has a certain quality that
draws others in. They make friends easily. They can lead a conversation, or
listen with real or assumed interest even when the subject is so dry and
boring that it would drive most of us insane. We find them interesting and
attractive in different ways and at different levels. We quickly trust them
and believe their sincerity. The other partner may appear cordial and
friendly, more reserved or withdrawn, or even more negative or hostile; but
this one person brings us together and makes us want to establish a
friendship.

When it comes to data security issues, the data breach has that partner–the
one that draws us in and seeks out our trust and friendship. In many ways
this intimate colleague is critical to the success of both the marriage and
the extended relationships; attracting new and unsuspecting individuals on
a daily basis. In this partnership, the veiled bride is social media.

The Power of Social Media

Social media is an ever-evolving collection of online tools, platforms and
applications that enable all of us to interact with one another and share
information. By using web-based and mobile technologies to turn
communication into interactive dialogue it creates an effective channel for
individuals and groups of people to connect, interact, create and share.

With businesses constantly positioning to make news, build their brands,
improve communications and grow their customer base, companies are using
email blasts and a plethora of platforms to include Facebook, Twitter,
LinkedIn and YouTube to market their products and services. These powerful
communication tools can have significant influence on awareness, acceptance
and behavior. They play an important role in many marketing strategies, and
are also a common vehicle used by many of our employees to network and
communication with one another. Unfortunately, these same resources are
opening doors to many of our data security issues.

Finding the Opening

“When cyber-criminals are looking for ways to breach our systems, the
starting point to penetrate our information typically has nothing to do
with the use of credit cards, even when that’s the information that they’re
attempting to obtain,” says James Foster, founder and CEO of ZeroFOX. “But
they have to get in somewhere. So what is the best way in? Attackers will
look for the weakest link and a way in that exploits or manipulates the
system at a point of vulnerability. They’ll often use tools that have mass
adoption–even if it fails a thousand times, the one time it does work gets
them in. They are looking for a more covert way to get into the system–one
where they can feed on the user’s trust and delay detection. When you put
it together, the easiest venue to leverage is social media.”

In our push to get ahead in the highly competitive world of business,
Foster commented that information technologies must reap immediate
benefits. As a result, the technology can be significantly ahead of the
controls. “Security measures can lag behind three to five years,“ he added.
“A company’s number one asset is its people. This is a common thread, and a
prime opportunity for access. Ninety percent or more of the malware is
getting in through social media”

Foster went on to describe a simple scenario as an example. If a hacker
wants to break into XYZ Company, they may create an online persona that
mirrors the brand’s logo, verbiage, and marketing style. They build the
false content using one of many social media platforms, along with a link
that says “XYZ Company Rocks.” If an employee were to open the link, it can
then open the door for the hacker to breach the company. While it may sound
like a simple strategy, hackers have become experts at disguising their
intensions–and it may only take one unsuspecting employee to be successful.
Regrettably, this is only a single, basic example of a problem with
prospects only limited by the imagination and ingenuity of the hacker. This
is the challenge, and only one of many issues that we can face.

Defense in Depth

So how do we combat these problems?

“Unfortunately, existing plans are ninety percent reactive, which is like
patching cracks in a dam with bubble gum.” he says. “There has to be a
plan, a Defense-in-Depth strategy that proactively addresses data
security.” In the information world, it’s about firewalls,
intrusion-detection systems, two-factor authentication, and encryption.
These defenses are layered to make them more resilient. But there has to be
more. Our defenses must include a plan and a partnership that effectively
creates a unified team to combat these threats. This involves a
comprehensive approach that would include:

-  A knowledgeable and educated team that communicates well and works
together

-  A diverse team that can provide different perspectives and offer
comprehensive value

-  Expert external opinions that provide guidance and will objectively
review the plan

-  An adequate budget

-  Privacy and compliance policies

-  A framework and foundation for governance

“As retailers expand their offerings and push online services, internal and
external policies, roles and synergies must be re-evaluated, and a
collaborative security strategy that includes loss prevention absolutely
must be part of the conversation,” Foster states. “The success of the
organization simply depends on it.”
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: