...

CYbER- SECURITY; wE ARE THE wEAkEST

by user

on
Category: Documents
15

views

Report

Comments

Transcript

CYbER- SECURITY; wE ARE THE wEAkEST
Cybersecurity;
we are the
weakest
link
Nothing is infallible – but when
it comes to cyber security, it is
people, not computers, that are
often the weakest link. There
are plenty of horror stories
circulating the internet about
identity thefts, nations waging
cyber warfare against each
other, malicious coercion at the
hands of fake authority figures
and even Nigerian funds waiting
to be transferred to the lucky
recipient’s bank account. All
have a common theme; it’s
not the technology that lets
us down, it’s ourselves. Bill
Walker, Technical Director, QA,
addresses the issues involved.
A recent survey1, carried out by YouGov,
reveals that over a quarter of those
surveyed admitted to transferring work
files to and from home. And what’s more,
half of those said they have had a virus
at some point on their machines. It is
clear that the blur between our work and
home life may be starting to affect the
security of important corporate data.
Viruses do not discriminate. Even
those people who believed themselves
technically competent have a similar
rate of infection as people who weren’t
techies (see box out). Organisations are
losing control over their security as
workers are taking files off the grid.
Nor is national security immune. Cyber
warfare tactics like the notorious Stuxnet
worm, which exploited the transfer of
files from machine to machine in order
to manipulate unconnected industrial
machines in Iran’s nuclear power plants
from across the globe, is a prime example.
60
QA.indd 60
TW E N TY: 1 3 E NH A N C E Y O U R IT S T R A TEGY
01/03/2013 09:26
learning & development
However it isn’t just blanket bombardment
by bits of malware that is a threat.
Social engineering targets the company
through the individual
‘Social engineering’ – the term given to
scammers who use specific personal
information in order to extract more
sensitive or confidential material - is ever
more prevalent. Some attacks are so well
executed that even tech-savvy and senior
people can be duped into giving away vital
details. Would you be able to spot the intent?
Take the story of the CEO of a large business
who liked expensive cars and made no
secret of it. When a glossy brochure,
addressed to his home, came through the
letterbox with pictures of lovely looking
new Jaguars in it, he did not hesitate to pick
it up. Flicking through, he found inside an
innocuous looking CD with concept cars
pictured on the front, and his interest was
piqued. After putting it into his computer
he would still be unaware that because
he used the same password at home as
he did at work, an enormous amount of
damage would be done. And it was.
Security is a major problem for
businesses and governments alike. Today,
serious and organised cyber crime is
a far cry from the lone hacker sending
out anonymous malware from their
bedroom. Nortel, the much maligned
multinational communications firm,
inadvertently leaked information for ten
years before the extent of the breach was
fully understood. According to reports,
documents including emails, technical
papers, research, development reports
and business plans were all hacked from
Chinese IP addresses; malware was left on
infected machines even after the company
had been broken up and sold to others,
meaning the threat was passed on.
But the world has moved on. Today the cost
is enormous and growing. Cybercrime costs
UK businesses an estimated £21bn a year.
Is your organisation safe?
Most companies do have an IT security policy
and are concerned enough to implement it.
Eighty six per cent of people who said that
their organisation did have a policy, felt that
they worked in a secure way. Yet the survey
revealed that, despite the policy, people were
almost as likely to share passwords with
other people as those who had no security
policy at all. That is to say, they trusted their
employer to have a copy of the password.
As for those people in places that have no
security policy, one in ten said that they had
no password on any device at all.
What can we learn from this? Think hard
about who knows your information. It seems
simple, but what’s the point of having
upper case, lower case, numbers and
characters in the most secure line of code
possible, when you’ve instructed Explorer
to remember it for you? 15,648 laptops are
lost by business travellers each week.
Beware malicious apps
It is not just desktops that are in need of
protection. The malicious app is a growing
phenomenon. Android operating systems
have seen a number of apps that mirror
real ones – often with the suffix ‘super’ –
intending to harvest data off the device.
Website DigitalTrends found ‘Imangi’s
Temple Run (the official game) only requests
permission to access the device’s full
network and to perform, read and write
operations to storage. Temple Run Super,
however, also asks for location information,
phone status and identity, access to
accounts on the device, and more.’
In the last year malware on Android was up
by 580 per cent, and a staggering 23 of the
top 500 apps on Google Play were deemed
high risk.
This might not be an immediate problem
for business users, but the trend of BYOD
(bring your own device) is a real headache
for firms.
Information assurance
All IT security policies should make sure
that only the right people have the right
level of access. In a complex system, files
should only be seen or edited by those that
have the authority to do so. The risk is too
high to allow everyone blanket access: One
in 20 office workers have taken company
information/data with them when they
have left an organisation and joined a new
one. Minimising this risk should be high on
the agenda.
Viruses don’t discriminate:
• 44% of UK office workers have had
a virus.
• 43% of competent IT people have
had a virus.
• 45% of people who are not ITcompetent have had a virus.
• All geographic regions have the
same virus rate.
• 50% of men and 49% of women
have had a virus.
The UK government recommends 10 steps
to cyber-security, backed by the Centre for
the Protection of National Infrastructure
(CPNI), the Cabinet Office and GCHQ. The
advice is based around organisations
implementing an information risk
management regime, with other policies
relating to security, protection, monitoring
and education.
Either way, the message is clear. A fully
rounded and complete approach must
be taken to prevent damage being done.
People are the problem, and we are
all responsible for the security of the
technology we use rather than relying on
the IT to do it for us.
Reference
1.QA survey carried out by YouGov polled
over 1000 office workers online.
www.qa.com/cybersecurity
Initiatives aimed at raising awareness
are being taken extremely seriously
by governments around the world. The
Australian government’s approach,
called the Australian Defence Signals
Directorate, is the ‘Catch. Patch. Match’
system. This claims to be able to prevent
the majority of targeted cyber intrusions.
Boiled down, it essentially proposes three
strategies. Catch: malicious software with a
whitelist. Patch: your operating system and
applications. Match: the right people with
the right privileges.
EN HA N CE YOUR IT STRATEGY TWENTY:13
QA.indd 63
63
01/03/2013 09:28
Fly UP