CS1901

13.02.2019 Views

Computing Security Secure systems, secure data, secure people, secure business EYE ON THE FUTURE What challenges await in 2019? NEWS OPINION INDUSTRY COMMENT CASE STUDIES PRODUCT REVIEWS THORNY ISSUES Not everything is rosy on the passwords front HEALTH WARNING Sports and leisure clubs come under attack FLIGHTS OF FANCY Hackers seize BA client data Computing Security January/February 2019

Computing<br />

Security<br />

Secure systems, secure data, secure people, secure business<br />

EYE ON THE FUTURE<br />

What challenges await in 2019?<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

THORNY ISSUES<br />

Not everything is rosy<br />

on the passwords front<br />

HEALTH WARNING<br />

Sports and leisure clubs<br />

come under attack<br />

FLIGHTS OF FANCY<br />

Hackers seize<br />

BA client data<br />

Computing Security January/February 2019


Dates for your diary<br />

CDL will be exhibiting<br />

at the following events<br />

20-21 Feb ‘19<br />

5th Mar ‘19<br />

21 Mar ‘19<br />

in 2019...<br />

Come along and see<br />

3-4 Apr ‘19<br />

16 May ‘19<br />

4-6 Jun ‘19<br />

what we can do for<br />

your business.<br />

19-20 Jun ‘19<br />

11-12 Sep ‘19<br />

9-10 Oct ‘19<br />

Secure IT Disposal<br />

from an award winning service provider<br />

• Secure disposal of IT and WEEE<br />

• Data sanitised to the highest<br />

recognised standards<br />

• Collections using only CDL vehicles and<br />

drivers<br />

• ISO 9001, 14001, 18001 & 27001<br />

• ADISA accredited with distinction<br />

• On site media destruction<br />

• EU GDPR compliant service<br />

• Full UK coverage<br />

CDL House, Davy Road, Runcorn, Cheshire, WA7 1PZ.<br />

www.computerdisposals.com<br />

T: 01925 730033


comment<br />

HACKERS EXPLOITING SIMPLE OVERSIGHT<br />

Security web scans and analysis on over 80,000 European Magento websites - the most<br />

popular e-commerce platform globally - reveal 80% are at risk from cyber criminals. That<br />

is a startling and worrying figure, and should leave those at the sharp edge deeply<br />

concerned for their own safety.<br />

Recent research by global cybersecurity experts Foregenix examined more than 170,000<br />

Magento websites in total, revealing that 1.5% of these (2,548) were infected with malware.<br />

Some 1,591 were compromised by credit/debit card stealing malware, actively harvesting their<br />

customers' sensitive data for subsequent sale and/or fraud<br />

A further 2.3% of all websites were found to be susceptible to Magento Shoplift. What is<br />

particularly concerning is that this vulnerability was disclosed, and patches made available, way<br />

back in January 2015. Effectively, Magento Shoplift allows hackers to completely administer<br />

the website remotely, steal sensitive data and even order items for free through a single exploit<br />

command - something that is publicly available.<br />

The cybersecurity company, which is renowned globally for its work on payment security, has<br />

an active threat intelligence team researching and analysing attack trends, with a strong focus<br />

on the e-commerce sector.<br />

Unveiling the research, Foregenix's CEO Andrew Henwood said: "The issues highlighted are<br />

a truly global problem, which threatens to undermine confidence in e-commerce, especially<br />

in markets leading the way in online sales, such as the UK. Repercussions as a result of<br />

compromises are heavy penalties by card providers and these put many smaller traders at risk.<br />

Magento and other e-commerce platforms release regular software updates in response to<br />

vulnerabilities. These security patches, if not used, can leave websites highly vulnerable to<br />

hacking and loss of sensitive data."<br />

Online businesses often assume web developers, agencies and hosting providers take care of<br />

security, he adds, cautioning. "Design agencies are great at producing beautiful, transactional<br />

websites that sell their wares, but their expertise on security issues generally isn't as well<br />

developed. Agencies and their clients need to be aware of e-commerce security issues, as<br />

even a single breach can be devastating for a small business."<br />

The simple fact is that simple precautions can make a real difference to reducing a company's<br />

risk from criminals, such as regularly patching, changing default settings on the administration<br />

interface and using stronger passwords with multi-factor authentication.<br />

"Risk can never be entirely eliminated," concedes Henwood, "so companies should also<br />

consider investing in a partnership with a cybersecurity specialist organisation and cyber<br />

insurance policy."<br />

Brian Wall<br />

Editor<br />

Computing Security<br />

brian.wall@btc.co.uk<br />

EDITOR: Brian Wall<br />

(brian.wall@btc.co.uk)<br />

PRODUCTION: Abby Penn<br />

(abby.penn@btc.co.uk)<br />

LAYOUT/DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk)<br />

SALES:<br />

Edward O’Connor<br />

(edward.oconnor@btc.co.uk)<br />

+ 44 (0)1689 616 000<br />

Louise Hollingdale<br />

(louise.hollingdale@btc.co.uk)<br />

+ 44 (0)1689 616 000<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexions Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK: £35/year, £60/two years,<br />

£80/three years;<br />

Europe: £48/year, £85/two years,<br />

£127/three years<br />

R.O.W:£62/year, £115/two years,<br />

£168/three years<br />

Single copies can be bought for<br />

£8.50 (includes postage & packaging).<br />

Published 6 times a year.<br />

© 2018 Barrow & Thompkins<br />

Connexions Ltd. All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent,<br />

in writing, from the publisher.<br />

www.computingsecurity.co.uk Jan/Feb 2019 computing security<br />

@CSMagAndAwards<br />

3


Secure systems, secure data, secure people, secure business<br />

Computing Security January/February 2019<br />

contents<br />

CONTENTS<br />

Computing<br />

Security<br />

EYE ON THE FUTURE<br />

What challenges await in 2019?<br />

HEALTH WARNING<br />

Sports and leisure clubs<br />

come under attack<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

THORNY ISSUES<br />

Not everything is rosy<br />

on the passwords front<br />

FLIGHTS OF FANCY<br />

Hackers seize<br />

BA client data<br />

COMMENT 3<br />

Hackers exploiting simple oversight<br />

EDITOR’S FOCUS 6-7<br />

Is it possible that Cloud is sinking down<br />

2019: WHAT MAY LIE AHEAD 12<br />

the popularity charts and losing its grip?<br />

Computing Security asked those in the<br />

ARTICLES<br />

know to do some future-gazing and give<br />

us their top predictions for cybersecurity in<br />

TRACKING DOWN THE WEAK LINKS 8<br />

2019. Here's what they had to say<br />

Sometimes it's just basic human error<br />

that can result in a costly breach<br />

DRIVING UP THE MARKET 10<br />

Mergers and acquisitions are on the up,<br />

much of it driven by security issues<br />

POWERFUL ALLIANCE 18<br />

CYJAX has been working closely for some<br />

THE LURKING THREAT 20<br />

time now with Oxford University and<br />

Quantum computing's ability to work<br />

the Centre for Doctoral Training in Cyber<br />

outside the linear processes that we are<br />

so familiar with can also pose a threat<br />

Security - and these 'Deep Dive Days' are<br />

really paying off for all involved<br />

MASTERCLASS 22<br />

Cloud can still be the most secure<br />

environment for business, argue Nigel<br />

Hawthorn, data privacy expert at McAfee,<br />

DO NOT PASS GO! 24<br />

and Charlotte Gurney, marketing manager<br />

at Brookcourt Solutions<br />

Passwords are a never-ending headache for<br />

most organisations and a boon for hackers<br />

SPORTING CHANCE 23<br />

looking for easy access to someone's data.<br />

On-line attacks on volunteer-run sports<br />

and leisure clubs appear to be soaring<br />

THE CYBER KILL CHAIN MODEL 29<br />

BROUGHT DOWN TO EARTH 26<br />

Advanced Persistent Threats (APTs) have<br />

been wreaking serious damage. But how<br />

Cybercriminals who carried out a hack on<br />

do you detect and prevent them?<br />

British Airways compromised the data of<br />

around 380,000 passengers, seizing billing<br />

TIPS FOR MANUFACTURERS 30<br />

details and addresses, bank and credit card<br />

Here are three top tips for manufacturers<br />

numbers, and CVV codes.<br />

that will help to keep their sensitive data<br />

out of grasping hands<br />

INCIDENT RESPONSE PLANNING 31<br />

Why do organisations use processes and<br />

procedures for incident response<br />

PRINTER HACKING IN IOT AGE 32<br />

planning? So that everyone knows exactly<br />

Analyst and research firm Quocirca have<br />

what to do and when to do that<br />

released findings that show more than<br />

60% of organisations have experienced at<br />

PRODUCT REVIEW 17<br />

least one data breach, due to insecure<br />

AlienVault USM Anywhere<br />

printing practices<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk<br />

4


Brookcourt sell leading high-end technology and services within<br />

the Security, Monitoring, Network Management and Compliance<br />

marketplace for leading Fortune 500 companies – including the<br />

largest telecommunications providers within the UK, high street<br />

banks, global retail enterprises and the largest oil companies<br />

across the world.<br />

Brookcourt can help defend your business against todays<br />

advisories and cyber threats whilst helping you with your data<br />

protection and control. Our leading-edge cyber threat intelligence<br />

technologies are provided to leading global institutions as well<br />

as smaller enterprises as a complete managed service.<br />

Get in touch today: contact@brookcourtsolutions.com<br />

C y b e r S u r v e i l l a n c e • S e c u r i t y • N e t w o r k i n g • C o n s u l t a n c y • M a n a g e d S e r v i c e s<br />

Multi Award Winning<br />

Trusted Partner of the Cyber Defence<br />

Alliance (CDA). Working collaboratively<br />

to fight cyber threats and crime<br />

ISO 9001 • ISO 14001 • ISO 22301 • ISO 27001 • OHSAS 18001<br />

For more information contact Brookcourt Solutions t: +44 (0) 1737 886 111 www.brookcourtsolutions.com


editor's focus<br />

CLOUD SINKS LOWER<br />

'CLOUD' HAS BEEN ALL THE RAGE FOR SOME TIME NOW, BUT ITS PREDOMINANCE HAS<br />

BEEN CHALLENGED OF LATE. MIGHT ITS STATUS HAVE TO BE RE-EVALUATED SOMEWHAT?<br />

"To meet increased demand and evolving<br />

expectations of citizens for effective and<br />

efficient services, government must continue<br />

to enhance its digital maturity," Howard<br />

states. "Government CIOs clearly recognise<br />

the potential of digital government and have<br />

started developing new digital services, but<br />

now need to take digital beyond a vision to<br />

execution through digital leadership."<br />

Data analytics and cybersecurity pushed<br />

cloud out of the top spot for increased<br />

technology investment by government<br />

CIOs in 2019, according to a survey from<br />

global research organisation Gartner. This<br />

increased focus on data reflects CIOs'<br />

acknowledgment that artificial intelligence<br />

(AI) and data analytics will be the top "gamechanging"<br />

technologies for government in<br />

2019.<br />

Gartner's 2019 CIO Agenda Survey gathered<br />

data from a total of 3,102 CIO respondents<br />

in 89 countries and across major industries,<br />

including 528 government CIOs. Government<br />

respondents are segmented into national or<br />

federal; state or province (regional); local; and<br />

defence and intelligence, to identify trends<br />

specific to each tier.<br />

"Taking advantage of data is at the heart of<br />

digital government - it's the central asset to<br />

all that government oversees and provides,"<br />

says Rick Howard, VP analyst at Gartner.<br />

"The ability to leverage that data strategically<br />

in real time will significantly improve<br />

government's ability to seamlessly deliver<br />

services, despite increased strain on finite<br />

resources."<br />

DIGITAL MATURITY ADVANCING<br />

When it comes to strategic business priorities,<br />

the survey found that 18% of CIOs across all<br />

levels of government have prioritised digital<br />

initiatives again this year as key to achieving<br />

mission outcomes, compared with 23% from<br />

all other industries. The next three business<br />

priorities for government are industry-specific<br />

goals (13%), operational excellence (13%)<br />

and cost optimisation/reduction (8%).<br />

The survey data indicates that governments<br />

are making deliberate progress toward<br />

designing and delivering digital services,<br />

achieving comparable maturity to other<br />

industries overall. When asked what stage<br />

their digital initiative was at, 29% of<br />

government respondents say their<br />

organisations are scaling and refining their<br />

digital initiatives - the tipping point at which<br />

a digital initiative is considered mature. This is<br />

up from 15% in the 2018 survey. However,<br />

government is still lagging other industries<br />

(33% overall) in scaling and refining digital<br />

initiatives. The gap is particularly marked in<br />

defence and intelligence, where just nine<br />

percent of respondents have scaled digital<br />

initiatives.<br />

Despite the focus on digital, only 17% of<br />

government CIOs plan to increase their<br />

investment in digital business initiatives,<br />

compared with 34% of CIOs in other<br />

industries. While government CIOs<br />

demonstrate clear vision in the potential<br />

for digital government and its emerging<br />

technologies, 45% report they lack the IT<br />

and business resources required to execute.<br />

AI JUMPS AHEAD<br />

AI has taken the lead as the top gamechanging<br />

technology for government CIOs<br />

for 2019. AI (27%) is followed by data<br />

analytics (22%) and cloud technologies<br />

(19%). Cloud dropped from first across all<br />

levels of government last year, to third overall<br />

in this year's survey. "AI introduces new<br />

insights and delivery channels that will enable<br />

governments to scale in magnitudes not<br />

previously possible," Howard adds. "This<br />

will allow reallocation of valuable human<br />

resources to more complex processes and<br />

decisions."<br />

Among government respondents, 10% have<br />

already deployed an AI solution, 39% intend<br />

to deploy in the next one to two years, and<br />

an additional 36% intend to deploy an AI<br />

solution within the next two to three years.<br />

Among all levels of government, business<br />

intelligence (BI) and data analytics (43%),<br />

06<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


editor's focus<br />

cyber/information security (also 43%)<br />

and cloud services/solutions (39%)<br />

are the most common technology<br />

areas for increased technology<br />

investment in 2019. Cloud dropped<br />

from first place last year to second<br />

overall for 2019.<br />

According to Howard, the fact that<br />

cybersecurity remains an area of<br />

projected increased spending reflects<br />

government's recognition of its role<br />

as the steward of public data, with<br />

secure transactions now table stakes for<br />

governments in a digital world.<br />

"In today's digital world, cyberattacks are<br />

highly visible, increasingly malicious and<br />

costly, and they erode the public's trust," he<br />

states. "Government CIOs have steadily<br />

increased their prioritisation of cybersecurity<br />

over the years and have gained executive<br />

commitment to vigilance in ensuring that<br />

ever-evolving malicious attacks and threats<br />

are mitigated to the greatest extent possible."<br />

According to McAfee: "Cloud computing<br />

presents many unique security issues and<br />

challenges. In the cloud, data is stored with<br />

a third-party provider and accessed over the<br />

internet. This means visibility and control over<br />

that data is limited. It also raises the question<br />

of how it can be properly secured. It is<br />

imperative everyone understands their<br />

respective role and the security issues<br />

inherent in cloud computing.<br />

SHARED RESPONSIBILITY<br />

Cloud service providers treat cloud security<br />

risks as a shared responsibility, it points out.<br />

"In this model, the cloud service provider<br />

covers security of the cloud itself and the<br />

customer covers security of what they put in<br />

it. In every cloud service - from software-as-aservice<br />

(SaaS) like Microsoft Office 365 to<br />

infrastructure-as-a-service (IaaS) like Amazon<br />

Web Services (AWS) - the cloud computing<br />

customer is always responsible for protecting<br />

their data from security threats and<br />

controlling access to it."<br />

Most cloud computing security risks are<br />

related to data security. Whether a lack of<br />

visibility to data, inability to control data, or<br />

theft of data in the cloud, most issues come<br />

back to the data customers put in the cloud.<br />

Taking software-as-a-service (SaaS) as just one<br />

instance, McAfee offers 10 cloud security<br />

issues:<br />

Lack of visibility into what data is within<br />

cloud applications<br />

Theft of data from a cloud application by<br />

malicious actor<br />

Incomplete control over who can access<br />

sensitive data<br />

Inability to monitor data in transit to and<br />

from cloud applications<br />

Cloud applications being provisioned<br />

outside of IT visibility (eg, shadow IT)<br />

Lack of staff with the skills to manage<br />

security for cloud applications<br />

Inability to prevent malicious insider theft<br />

or misuse of data<br />

Advanced threats and attacks against the<br />

cloud application provider<br />

Inability to assess the security of the cloud<br />

application provider's operations<br />

Inability to maintain regulatory<br />

compliance.<br />

GARTNER DATA & ANALYTICS SUMMIT<br />

As McAfee goes on to conclude:<br />

"Developments such as the rise of<br />

XcodeGhost and GoldenEye<br />

ransomware emphasise that<br />

attackers recognise the value of<br />

software and cloud providers as a<br />

vector to attack larger assets.<br />

“As a result, attackers have been<br />

increasing their focus on this<br />

potential vulnerability. To protect<br />

your organisation and its data,<br />

make sure you scrutinise your cloud<br />

provider's security programs,” it advises. “Set<br />

the expectation to have predictable thirdparty<br />

auditing with shared reports and insist<br />

on breach reporting terms to complement<br />

technology solutions."<br />

Rick Howard, Gartner: Government CIOs<br />

now need to take digital beyond a vision<br />

to execution through digital leadership.<br />

Gartner analysts will provide additional analysis on data and analytics trends at the<br />

Gartner Data & Analytics Summit 2019, taking place 18-19 February in Sydney, 4-6<br />

March in London, 18-21 March in Orlando, 29-30 May in Sao Paulo, 10-11 June in<br />

Mumbai, 11-12 September in Mexico City and 19-20 November in Frankfurt.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

07


cardwave<br />

ARE YOUR EMPLOYEES THE WEAKEST LINK<br />

WHEN IT COMES TO YOUR DATA SECURITY?<br />

By Emma Charlton -<br />

Security & Authentication<br />

Division Lead<br />

Cardwave Services Ltd<br />

Data security has always been a hot<br />

topic, but things got even hotter<br />

last year thanks to the GDPR.<br />

Despite new legislation and hefty fines,<br />

breaches continue to be a daily<br />

occurrence. Businesses invest significant<br />

time and money implementing<br />

sophisticated security measures, but<br />

sometimes it's basic human error that<br />

can result in a costly breach.<br />

We all know the importance of creating<br />

and protecting complex passwords, but<br />

with the average person needing to<br />

remember around 20 account passwords<br />

per day, it's no surprise that corners get<br />

cut and mistakes are made.<br />

Passwords get written down, shared,<br />

simplified. Workstations get left<br />

unlocked when someone just 'nips' to<br />

the photocopier to grab something, only<br />

to be abducted into an impromptu<br />

meeting. Our intentions are good, and<br />

we don't mean to put valuable company<br />

information at risk, but it happens and<br />

the ramifications of a data breach go<br />

beyond a monetary fine. Business<br />

disruption, reputational damage, staff<br />

and customer churn…<br />

PROXIMITY-BASED IDENTITY AND<br />

ACCESS MANAGEMENT TO<br />

MITIGATE INSIDE SECURITY THREATS<br />

Cardwave launches GateKeeper<br />

Enterprise to the UK market<br />

Break free from insecure practices and<br />

move beyond passwords with<br />

GateKeeper Enterprise<br />

GateKeeper Enterprise brings security<br />

and convenience to employees by using<br />

wireless keys to simplify the login<br />

8<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


cardwave<br />

process, remove the need to remember<br />

complex passwords, and enable access to<br />

computers and websites based on their<br />

physical presence.<br />

Furthermore, the GateKeeper Enterprise<br />

wireless authentication system allows<br />

organisations to enhance workflow and<br />

achieve higher levels of security without<br />

inconveniencing the user.<br />

From five workstations to 5,000,<br />

GateKeeper Enterprise provides pain-free,<br />

centralised management of every person,<br />

password and computer on your<br />

network.<br />

Wireless auto lock and unlock<br />

2-factor authentication<br />

Military grade AES-256 encryption<br />

Centralised password management<br />

Eliminates internal breaches<br />

Easy installation and support<br />

Audit logs and reporting<br />

Increase user productivity<br />

We've all experienced the frustration of<br />

needing to quickly access a document<br />

or some data, only to be scuppered by<br />

a bout of 'fat-finger' syndrome or an<br />

inability to remember a password that<br />

you've entered a million times already.<br />

And if you're really unlucky after<br />

numerous failed password attempts,<br />

you'll be locked out of the system and<br />

end up in a queue waiting for assistance<br />

from IT support. With GateKeeper<br />

Enterprise your workstation automatically<br />

unlocks as you approach, and locks again<br />

as you move out of range.<br />

All GateKeeper Enterprise users can be<br />

managed via the Enterprise Hub, through<br />

which security policies can be deployed,<br />

access rights managed, and usage<br />

tracked and audited.<br />

To find out more or to become<br />

a reseller, please contact Emma at<br />

sales@cardwave.com / 01380 738395<br />

or visit www.safetogosolutions.com<br />

Emma Charlton - Security &<br />

Authentication Division Lead<br />

Cardwave Services Ltd<br />

Interesting facts:<br />

On average, a user spends 6-8 hours<br />

a year typing passwords at different<br />

places.<br />

Gatekeeper Enterprise eliminates<br />

the need to remember complex<br />

passwords and allows employees to<br />

work without interruption.<br />

81% of office employees have access<br />

to sensitive workplace information<br />

through unlocked computers.<br />

Gatekeeper Enterprise prevents<br />

workstations from being left unlocked<br />

when unattended.<br />

80% of IT support requests stem from<br />

passwords. The average business<br />

employee must keep track of<br />

191 passwords.<br />

Gatekeeper Enterprise eradicates the<br />

requirements to remember any<br />

passwords - even domain access -<br />

freeing up valuable IT resources.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

9


mergers & acquisitions<br />

WAGING WAR AGAINST CYBERATTACKS<br />

IDENTITY AND ACCESS MANAGEMENT, ANTI-MALWARE SOFTWARE, NETWORK AND MOBILE SECURITY, IT<br />

SECURITY SERVICES AND FINANCIAL TRANSACTION SECURITY - THESE ARE ALL DRIVING SECTOR<br />

GROWTH<br />

The Cybersecurity M&A Market<br />

Report from international<br />

technology mergers and acquisitions<br />

advisors Hampleton Partners outlines<br />

how high-profile hacks, the global<br />

digitisation of business and new<br />

regulations are driving record transaction<br />

volumes and valuations, with 141<br />

completed transactions by October this<br />

year, surpassing 2016 and 2017 levels.<br />

"2018 saw nine big ticket deals in excess<br />

of $500m from buyers such as Thoma<br />

Bravo, Cisco, RELX, AT&T and Francisco<br />

Partners, which have generated attention<br />

to the sector, helping overall market<br />

valuations reach a new record of 5.6x<br />

sales (trailing 30-month median)," states<br />

Hampleton Partners. "There have been<br />

426 acquisitions in the cybersecurity<br />

sector since 2016. Of the top 40<br />

transactions since 2016, 27% were<br />

made by private equity buyers. A median<br />

consensus of industry analysts forecasts<br />

that the overall cybersecurity market will<br />

grow from $132 billion in 2018 to £212<br />

billion by 2022."<br />

Identity and access management<br />

continues to grow and remains the<br />

cybersecurity subsector with the highest<br />

total disclosed deal value, says the firm.<br />

"One key example of this was Cisco<br />

Systems' big bet on the two-factor<br />

authentication provider Duo Security<br />

for $2.35b at 18.8x sales. As the threat<br />

of security breach through weak user<br />

passwords continues to grow, Cisco sees<br />

a user-friendly dual authentication<br />

solution as a growth opportunity.<br />

"As for the anti-malware sector, we see<br />

that government and defence agencies<br />

tend to fall victim to phishing scams, as<br />

they are highly valuable targets. They<br />

also make attractive clients for companies<br />

like Watchguard Technologies, which<br />

acquired Percipient Networks, to increase<br />

its expertise in preventing email phishing<br />

attacks through DNS."<br />

Henrik Jeberg, director, Hampleton<br />

Partners, further comments: "Hacking<br />

is the newest form of warfare against<br />

businesses, as well as nation states. The<br />

average cost of a single data breach is<br />

now 3 million, up by six per cent in<br />

a year, plus the reputational damage,<br />

which can be catastrophic. Given the<br />

increasing market demand for<br />

cybersecurity solutions due to regulation,<br />

digitisation, high-profile hacks and new<br />

technologies requiring security, we are<br />

not surprised to see a highly active M&A<br />

market for cybersecurity assets at high<br />

valuations. I expect cybersecurity to<br />

remain a hot topic in M&A, even if we<br />

go into a period of more volatile financial<br />

markets."<br />

RANSOMWARE ATTACK<br />

In one high-profile example that is cited<br />

of a cyberattack, container shipping<br />

company Maersk was forced to reinstall<br />

4,000 servers and 45,000 computers<br />

after a 'NotPetya' ransomware attack.<br />

The company reported an indirect cost<br />

through profit loss of over 300 million.<br />

When it comes to the prospects for<br />

cybersecurity in the days ahead, Jeberg<br />

has this to say: "Game-changing<br />

cybersecurity technology is now entering<br />

newer verticals, such as connected and<br />

autonomous vehicles, cryptocurrencies<br />

and digital payment services, presenting<br />

new challenges and major opportunities<br />

for start-ups and scale-ups that can help<br />

businesses protect their valuable IP and<br />

customer data."<br />

10<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


04-06 JUNE 2019<br />

THE LEADING EVENT<br />

IN EUROPE FOR INFORMATION<br />

AND CYBER SECURITY<br />

SECURE YOUR PASS NOW<br />

“Walking through the halls<br />

of innovation to shape<br />

what I do for the next year,<br />

amazing! If you work in<br />

tech and you weren’t<br />

there, you missed out”<br />

Infosecurity Europe 2018<br />

Visitor<br />

KEEP IN TOUCH WITH<br />

EVERYTHING INFOSECURITY<br />

@Infosecurity #infosec19


2019 predictions<br />

THE CERTAINTY OF UNCERTAIN TIMES AHEAD<br />

COMPUTING SECURITY ASKS THOSE IN THE KNOW TO DO SOME FUTURE-GAZING AND GIVE US<br />

THEIR TOP PREDICTIONS FOR CYBERSECURITY IN 2019. HERE'S WHAT THEY HAVE TO SAY<br />

Most of us start a new year with a<br />

number of resolutions - maybe to<br />

drink less, be healthier, go to the<br />

gym more often, be nicer to our fellow<br />

beings etc. For many, those good intentions<br />

have already been abandoned by the end<br />

of January. But at least some kind of effort<br />

has been made, hopefully, before that<br />

happens. We also tend to wonder what the<br />

next 12 months might hold in store for us.<br />

In the world of security, similar thoughts<br />

have probably been going through the<br />

minds of those whose goal is to protect<br />

their organisations from the ravages of the<br />

attackers, as they seek to breach their<br />

defences and steal their most precious<br />

data. The big question to which everyone<br />

will want an answer is: "Will I be hit by<br />

a damaging attack in the months ahead?"<br />

The truth is that far too many organisations<br />

suffered a harmful event in 2018 - see page<br />

26 - and the prospect of even more cyberattacks<br />

in 2019 is in the minds of most<br />

businesses. Here are the thoughts of a<br />

number of people whom we asked to<br />

pinpoint what the threat landscape might<br />

look like as we weave our way warily<br />

through the coming months.<br />

NUVIAS GROUP<br />

GDPR - the pain still to come. The GDPR<br />

deadline has come and gone, with many<br />

organisations breathing a sigh of relief that<br />

it was fairly painless. "They've put security<br />

processes in progress and can say that they<br />

are en route to a secure situation - so<br />

everything is okay?" queries Ian Kilpatrick,<br />

EVP Cyber Security, Nuvias. "We are still<br />

awaiting the first big GDPR penalty. When<br />

it arrives, organisations are suddenly going<br />

to start looking seriously at what they really<br />

need to do. So GDPR will still have a big<br />

impact in 2019."<br />

Cloud insecurity - it's your head on the<br />

block. "Cloud insecurity grew in 2018 and,<br />

unfortunately, will grow even further in<br />

2019," says Kilpatrick. "Increasing amounts<br />

of data are being deployed from disparate<br />

parts of organisations, with more and more<br />

of that data ending up unsecured. Despite<br />

the continual publicity around repeated<br />

breaches, the majority of organisations do<br />

12<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


2019 predictions<br />

not have good housekeeping deployed and<br />

enforced across their whole data estate in<br />

the cloud."<br />

Single factor passwords - the dark ages.<br />

Single-factor passwords are one of the<br />

simplest possible keys to the kingdom and<br />

are the key tool for attack vectors, from<br />

novice hackers right the way up to nationstate<br />

players, he comments. "And yet they<br />

still remain the go-to security protection for<br />

the majority of organisations, despite the<br />

low cost and ease of deployment of multifactor<br />

authentication solutions. Sadly,<br />

password theft and password-based<br />

breaches will persist as a daily occurrence in<br />

2019."<br />

IOT - an increasing challenge. "The<br />

technology is being increasingly deployed<br />

by organisations, with minimal thought by<br />

many as to the security risks and potential<br />

consequences," Kilpatrick points out.<br />

"Because some IoT deployments are well<br />

away from the main network areas, they<br />

have slipped in under the radar. IoT will<br />

continue to be deployed, creating insecurity<br />

in areas that were previously secure. For the<br />

greatest percentage of IoT deployments, it<br />

is incredibly difficult or impossible to<br />

backfit security."<br />

CYJAX<br />

One of the key developments in 2018 was<br />

the ascendance of cryptomining malware<br />

to the top of the threat tree. Numerous<br />

security researchers believed that it all but<br />

heralded the end of the road for<br />

ransomware. "However, as we noted in a<br />

blog post earlier in 2018, this was not the<br />

case," states Cyjax. "Instead, the emergence<br />

of cryptomining malware merely<br />

precipitated a recalibration of the malware<br />

environment, in which ransomware was<br />

still a prominent threat. A good example<br />

of this is the GandCrab ransomware which,<br />

over the course of 2018, evolved at least<br />

five times to ensure it could stay ahead of<br />

cybersecurity defences.<br />

Cryptominers are arguably the story of<br />

2018. In January, a series of pool-based<br />

miners emerged, many of which had<br />

botnets of millions of infected systems<br />

that could have been used to generate<br />

many millions of dollars a year. While an<br />

organisation hit by cryptomining malware<br />

would not lose any precious data, they<br />

would nonetheless be at risk from<br />

significantly decreased computing power.<br />

"Perhaps the other most significant trend<br />

in the malware landscape has been the rise<br />

of mobile malware," adds Cyjax. "This threat<br />

has grown, as more and more consumers<br />

have turned to their mobile devices, instead<br />

of desktops, for shopping, email and other<br />

tasks. In most cases, threat actors have<br />

looked to distribute malicious apps, with<br />

a focus on stealing data from banking apps<br />

or retail apps. The Google Play Store has<br />

been plagued by these fake apps, which<br />

users download believing them to be<br />

legitimate."<br />

This year will see significant developments<br />

in the mobile malware sphere, Cyjax<br />

believes - a 'professionalisation' of the kind<br />

that was seen a decade ago in PC malware.<br />

"This will see the threats become more<br />

sophisticated as defences improve and<br />

greater targeting is made necessary.<br />

Cryptominers will continue to plague users<br />

around the world, though their meteoric<br />

rise will not be matched in 2019. And more<br />

traditional malware, such as ransomware<br />

and banking Trojans, while appearing to<br />

have been eclipsed by cryptomining threats<br />

in 2018, will nonetheless remain a serious<br />

issue for the foreseeable future."<br />

WEBROOT<br />

As we prepare for what may lie ahead,<br />

Webroot has been taking a look back at the<br />

worst instances of malware and payloads<br />

that hit users in 2018. "Botnets and<br />

banking Trojans are the most commonly<br />

seen type of malware, with Emotet being<br />

the most prevalent and persistent seen to<br />

date," says the company, before going on<br />

to list the "three nastiest":<br />

Emotet is this year's nastiest botnet that<br />

delivers banking Trojans, states<br />

Webroot. "It aspires to increase the<br />

number of zombies in its spam botnet,<br />

with a concentration on credential<br />

gathering. Threat actors have recently<br />

developed a universal plug and play<br />

(UPnP) module that allows Emotet to<br />

turn victims' routers into potential proxy<br />

nodes for their command-and-control<br />

infrastructure."<br />

Trickbot follows a similar attack plan,<br />

"but contains additional modules (with<br />

more added each day) and has even<br />

been seen dropping ransomware.<br />

Imagine all of the machines in your<br />

network being encrypted at once!"<br />

Zeus Panda has similar functionality to<br />

Trickbot, "but has more interesting<br />

distribution methods including macroenabled<br />

Word documents, exploit kits<br />

and even compromised remote<br />

monitoring and management services".<br />

Webroot also cites cryptomining and<br />

cryptojacking, saying that criminals are<br />

quickly moving to these for faster, less risky,<br />

ways of netting cryptocurrency. "However,<br />

what some may call a victimless crime has<br />

a significant impact for businesses and<br />

consumers alike." The three nastiest it<br />

highlights:<br />

"GhostMiner's distribution method is the<br />

scariest part for its victims, because they<br />

don't know its entry point, similar to a scary<br />

movie where you know someone's in the<br />

house, but you don't know where.<br />

GhostMiner is most commonly seen being<br />

distributed via an exploit in Oracle<br />

WebLogic (CVE-2018-2628).<br />

"WannaMine's Windows management<br />

instrumentation (WMI) persistence<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

13


2019 predictions<br />

Jeremy Rowley, DigiCert: an area that is<br />

likely to see more adoption is encryption.<br />

Scott Gordon, Pulse Secure: a major change<br />

for 2019 onwards is focused on the bigger<br />

picture issue of trust.<br />

technique is extremely nasty, allowing it to<br />

remain stealthy and difficult to find and<br />

remove.<br />

"Coinhive, initially innocent, was quickly<br />

added to the standard toolkit for attackers<br />

compromising websites. Even legitimate<br />

website owners are using Coinhive without<br />

knowing the impact it will have on their<br />

visitors. If your computer processing power<br />

(CPU) spikes to 100 percent when simply<br />

visiting a website, it might be Coinhive."<br />

Ransomware, meanwhile, has taken a<br />

backseat to the top threats in 2018, due<br />

to the rise of cryptomining. "However,<br />

ransomware has become a more targeted<br />

business model for cybercriminals, with<br />

unsecured remote desktop protocol (RDP)<br />

connections becoming the focal point of<br />

weakness in organisations and a favourite<br />

port of entry for ransomware campaigns,"<br />

adds Webroot.<br />

Tyler Moffitt, senior threat research<br />

analyst, Webroot, concludes: "In 2018, we<br />

saw cyberattacks changing faster than ever,<br />

evading traditional defences and wreaking<br />

havoc on businesses and everyday internet<br />

users alike. From gaping security holes,<br />

such as unsecured RDP, to tried-and-true<br />

tactics like phishing and exploits, to<br />

stealing crypto in the form of CPU power,<br />

cybercriminals are exploiting vulnerabilities<br />

in increasingly malicious ways. Businesses<br />

and individuals must be vigilant, stay<br />

informed and focus on improving their<br />

overall cyber hygiene to avoid the<br />

devastating effects of these attacks."<br />

GEMALTO<br />

"2019 will see the emergence of the future<br />

of security - crypto-agility," states Jason<br />

Hart, CTO, Data Protection at Gemalto.<br />

"As computing power increases, so does<br />

the threat to current security protocols.<br />

But one notable example is encryption, the<br />

static algorithms of which could be broken<br />

by the increased power. Crypto-agility will<br />

enable businesses to employ flexible<br />

algorithms that can be changed, without<br />

significantly changing the system<br />

infrastructure, should the original<br />

encryption fail. It means businesses can<br />

protect their data from future threats<br />

including quantum computing, which is<br />

still years away, without having to tear up<br />

their systems each year as computing<br />

power grows."<br />

When it comes to AI, Hart has this to say:<br />

"Up until now, the use of AI has been<br />

limited, but as the computing power<br />

grows, so too do the capabilities of AI<br />

itself. In turn this means that next year will<br />

see the first AI-orchestrated attack take<br />

down a FTSE100 company. Creating a new<br />

breed of AI powered malware, hackers will<br />

infect an organisations system using the<br />

malware and sit undetected gathering<br />

information about users' behaviours, and<br />

organisations systems.<br />

"Adapting to its surroundings, the<br />

malware will unleash a series of bespoke<br />

attacks targeted to take down a company<br />

from the inside out. The sophistication of<br />

this attack will be like none seen before,<br />

and organisations must prepare themselves<br />

by embracing the technology itself as a<br />

method of hitting back and fight fire with<br />

fire."<br />

Adds Gary Marsden, Cloud Security<br />

Solutions, Data Protection at Gemalto:<br />

"As organisations embrace digital<br />

transformation, the process of migrating<br />

to the cloud has never been under more<br />

scrutiny; from business leaders looking to<br />

minimise any downtime and gain positive<br />

impact on the bottom line, to hackers<br />

looking to breach systems and wreak<br />

havoc. As such, 2019 will see the rise of<br />

a new role for the channel - the Cloud<br />

Migration Security Specialist.<br />

“As companies move across, there is an<br />

assumption that they're automatically<br />

14<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


2019 predictions<br />

protected as they transition workloads to<br />

the cloud. The channel has a role to play<br />

in educating companies that this isn't<br />

necessarily the case and they'll need help<br />

protecting themselves from threats. It's<br />

these new roles that'll ensure the channel<br />

continues to thrive."<br />

INVINSEC<br />

As many of us look ahead into 2019,<br />

identifying what developments may<br />

impact our personal and business<br />

security, and how we can best prepare<br />

for them, is essential, says CEO of<br />

Invinsec, Andy Samsonoff, as he<br />

pinpoints some key areas to keep a close<br />

watch on:<br />

Cloud application and<br />

data centre attacks<br />

"The ability of having faster and more<br />

reliable internet connections has allowed<br />

for the growth and expansion of cloud<br />

applications and cloud data centres,"<br />

states Samsonoff. "With every new<br />

application that moves to the cloud, it<br />

requires you to trust another vendor, their<br />

software and their security to protect<br />

your information. The inherent risk is that<br />

users can access applications, as well as<br />

your data from almost anywhere, as long<br />

as they have the user's credentials. It<br />

becomes a bigger risk when those users<br />

connect to free or public wi-fi."<br />

Shadow IT applications<br />

"We are going to see an increase in<br />

shadow IT applications being used.<br />

We can see that over the next few years<br />

these applications are going to cause<br />

serious damage. Industry professionals<br />

sometimes refer to them as renegade<br />

applications, where employees download<br />

non-corporate-approved (and potentially<br />

insecure) applications to the same devices<br />

used to access company data. Companies<br />

should consider whitelisting applications<br />

and restricting the ability to download<br />

new software."<br />

And one for 2020: AI<br />

"Predicted security trends for 2019/20<br />

show that AI is poised to help forecast,<br />

classify and potentially block or mitigate<br />

cyber threats and attacks," adds<br />

Samsonoff. "One fundamental idea to AI<br />

is machine learning. Over the past few<br />

years it is being incorporated into many<br />

security applications. Machines will<br />

battle machines in an automatic and<br />

continuous learning response cycle and<br />

this is will continue to enhance security<br />

postures."<br />

PULSE SECURE<br />

"Although we are at a point where new<br />

technologies such as AI and ML are<br />

grabbing a lot of the headlines, a major<br />

change for 2019 onwards is focused on<br />

the bigger picture issue of trust," advises<br />

Scott Gordon, (CISSP), CMO for Pulse<br />

Secure. "While there has been an<br />

ongoing shift towards the acceptance<br />

of a Zero Trust model becoming the de<br />

facto standard for security architecture,<br />

the next 24 months will see it accelerate<br />

into the practice of many more<br />

organisations."<br />

Zero Trust moves away from the<br />

traditional perimeter-based architecture<br />

that assumed that anybody inside or<br />

getting remote access to the internal<br />

corporate network were trusted. "With the<br />

rise of hybrid IT, employees, privileged<br />

users, partners, guests and even customers<br />

can and will be requesting access to<br />

applications and resources that can be in<br />

the data centre and/or the cloud," he adds.<br />

"As such, the conventional perimeter<br />

defence is more limiting, in terms of<br />

ensuring protected access, as well as more<br />

complex to provision and manage. Getting<br />

a perimeter approach wrong can cause<br />

frustration for users or leave potential gaps<br />

in defences that attackers can exploit."<br />

Zero Trust works on the principle of 'never<br />

trust, always verify'. "With this method,<br />

David Peters, ANSecurity: 2019 may well<br />

bring another Wannacry-scale attack.<br />

Jason Hart, Gemalto: 2019 will see the<br />

emergence of the future of security -<br />

crypto-agility.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

15


2019 predictions<br />

organisations can dynamically establish<br />

secure connectivity and compliant access<br />

between the users, devices and the<br />

targeted resource and applications, using<br />

a least-privileged security strategy," says<br />

Gordon. "In this approach, access is granted<br />

based on satisfying pre- and post-connect<br />

policy associated with user, device and<br />

security state. By adding microsegmentation,<br />

one can further limit<br />

unauthorised means to discover and exploit<br />

resources."<br />

DIGICERT<br />

One area that is likely to worsen is phishing<br />

attacks, predicts Jeremy Rowley, chief of<br />

product at DigiCert. "In 2016, less than five<br />

per cent of phishing websites were found<br />

on HTTPS. One year later, nearly one third<br />

of phishing attacks were hosted on<br />

websites with HTTPS and almost twenty per<br />

cent were found on HTTPS-protected<br />

domains. There are a couple of reasons<br />

for the change in the way phishers host<br />

their malicious content. First, there are<br />

many more HTTPS websites, which means<br />

there are more websites that can be<br />

compromised. Secondly, browser security<br />

messaging is ambiguous, and now there<br />

are a significant number of HTTPS websites<br />

hosted on domains registered by phishers.<br />

"Hackers are also taking advantage of the<br />

HTTPS designation, because the perception<br />

is that the website is legitimate. While<br />

standards groups, like the anti-phishing<br />

working group, have acknowledged the<br />

problem, they're not coming up with new<br />

solutions to combat the issue. It's a case of<br />

dodgeball, while the problem continues to<br />

grow," he continues.<br />

Another area that will see improvement<br />

in some regions and decline in others is<br />

privacy, Rowley suggests. "Some of the<br />

factors that have led to improvement are<br />

the EU's GDPR, which imposes fines of up<br />

to 20 million euros, and the fact that there<br />

is a strong recognition of the problem<br />

among other countries. The United States<br />

is considering similar laws. Some of the<br />

factors that contribute to the worsening<br />

conditions for privacy have to do with the<br />

value of search data.<br />

"Companies are willing to expose<br />

themselves to fines, because the profit for<br />

this data is worth much more than the<br />

fines. For example, Google has a ninety<br />

per cent share in the search market and<br />

over 50 million user accounts. Google<br />

discovered a flaw in its Google+ API,<br />

with the potential to expose the private<br />

information of hundreds of thousands<br />

of users. Yet the company chose not to<br />

disclose the vulnerability to its users or the<br />

public. It's hard to solve a problem when<br />

the problem itself is so profitable."<br />

However, an area that is likely to see more<br />

adoption is encryption, he adds. "There are<br />

several reasons behind this prediction,<br />

such as Google now requiring HTTPS<br />

everywhere and the industry's commitment<br />

to developing better post-quantum crypto<br />

algorithms. NIST, Microsoft and the IETF<br />

are all coming out with better encryption<br />

technologies, and there are new regulatory<br />

compliance requirements on the horizon.<br />

The rapid increase in the adoption of<br />

encryption is having a positive impact, with<br />

approximately eighty per cent of all traffic<br />

and half of all websites now encrypted,<br />

with further growth expected during 2019."<br />

ANSECURITY<br />

"There is often a sense of déjà vu in the<br />

world of cyber security and 2019 may well<br />

bring another Wannacry-scale attack,"<br />

warns David Peters, technical director,<br />

ANSecurity. "Maybe not ransomware, but<br />

a self-propagating malware that escalates<br />

exponentially. In terms of attack vector, a<br />

possible route could be via Remote Desktop<br />

Protocol, as too many organisations still<br />

expose Remote Desktop Services direct to<br />

the internet, which are still commonly hit<br />

with password stuffing and brute force<br />

attacks that may become a surface area<br />

to be exploited more efficiently with a<br />

network worm."<br />

Peters also feels that this year could be<br />

the point where regulators or class action<br />

lawsuits start to hit companies with<br />

massive legal penalties, which may force<br />

a wake-up call that will prompt more<br />

investment in security technologies, human<br />

resources and training. "Speaking of<br />

which,” he adds, “user security awareness<br />

training will need to become the norm for<br />

most organisations; phishing simulation<br />

and evaluation solutions have seen massive<br />

growth in recent years, with great success<br />

in educating users to evaluate email links<br />

and attachments independently from IT<br />

and security teams."<br />

Microsoft's 14-hour outage within its<br />

Multi-Factor Authentication (MFA) service<br />

highlights the challenges major cloud<br />

providers appear to be having with security<br />

availability, he points out. "Although<br />

multiple factors of authentication will<br />

continue to grow, uptake is still a very low<br />

percentage," he says. "As a result, 2019 will<br />

see more vendors incentivising customers<br />

to enable MFA by offering discounts.<br />

Universal 2nd Factor (U2F) or FIDO2 may be<br />

a popular choice, but issues still arise with<br />

legacy apps and operating systems that<br />

won't support SAML or other federated<br />

authentication methods."<br />

Botnets will continue to be a threat this<br />

year, as the deployment of IoT increases,<br />

making it a major challenge for information<br />

security professionals. "IoT is becoming<br />

a huge surface area for attack and 'hijack'<br />

by attackers and we'll see lots of new<br />

vulnerabilities being exploited to<br />

compromise IoT devices," Peters concludes.<br />

"Thankfully, traditional network segregation<br />

for most enterprises limits compromise and<br />

lateral movement, but this may not be a<br />

scalable solution and is still not widely<br />

deployed in the consumer space."<br />

16<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


product review<br />

ALIENVAULT USM ANYWHERE<br />

Organisations that want their threat<br />

detection, incident response and<br />

compliance management centralised<br />

in one place need look no further than<br />

AlienVault, an AT&T company. Deployed as<br />

a SaaS (software as a service) solution, its<br />

USM Anywhere delivers everything they<br />

could possibly need, all easily accessible<br />

from a single web portal.<br />

USM Anywhere provides a wealth of<br />

security measures, including automatic asset<br />

discovery, IDS, vulnerability assessment, event<br />

correlation, endpoint detection and response<br />

(EDR), compliance reporting and much more.<br />

Its scalable, distributed architecture is built<br />

around on-premises and cloud sensors, so<br />

no network is beyond its reach, and it can<br />

continuously monitor Amazon Web Services<br />

(AWS) and Microsoft Azure cloud<br />

environments.<br />

AlienVault provides purpose-built sensors<br />

for Hyper-V, VMware, AWS and Azure.<br />

These collect data from on-premises and<br />

cloud environments, and securely pass it to<br />

the USM Anywhere cloud-hosted service,<br />

which provides a centralised collection and<br />

management point.<br />

Deployment is simple, as we tested the<br />

Hyper-V version and had our sensor VM<br />

ready for action inside 30 minutes. The VM<br />

requires five virtual network interfaces, with<br />

the first used for management and internet<br />

access, while the other four are assigned to<br />

dedicated vSwitches, so they can passively<br />

monitor network traffic from mirrored switch<br />

ports to perform IDS.<br />

An installation wizard quickly sorted out<br />

the sensor connection to our secure cloud<br />

account, created our first network scan for<br />

asset discovery and offered to scan our<br />

Active Directory server. It presented a status<br />

view of the VM network ports to confirm<br />

they were operational and provided details<br />

for Syslog-enabled devices to send logs to<br />

the sensor.<br />

In under an hour, we were logged in to<br />

our cloud portal and viewing all discovered<br />

assets. Identification is accurate, as the scans<br />

correctly surmised we were running<br />

Windows Server 2012 R2 and Server 2016<br />

hosts, had HPE ProCurve networking<br />

switches and multiple storage devices<br />

running various flavours of Linux.<br />

USM Anywhere's dashboard puts everything at<br />

your fingertips, with a default set of graphs<br />

and charts organised neatly into sections for<br />

SIEM alarms and events, asset discovery and<br />

vulnerability assessment. These team up to<br />

provide an instant readout on your security<br />

posture and you can create multiple custom<br />

dashboards from a big list of widgets.<br />

The service runs scheduled standard and<br />

authenticated asset scans where the former<br />

probes network services, looking for<br />

vulnerabilities. Authenticated scans require<br />

administrative access to assets and provide<br />

more accurate information about running<br />

software and its configuration.<br />

The AlienVault Agent can be deployed on<br />

selected assets to gather more detail and<br />

we used the predefined PowerShell script<br />

to download the Windows agent to our<br />

Server 2016 hosts. This also enabled the<br />

EDR feature for continuous asset security<br />

monitoring and compliance, plus file<br />

integrity monitoring.<br />

Alert fatigue is avoided, as rules analyse all<br />

events for behavioural patterns and issue<br />

alarms when the correlation engine has<br />

established patterns, such as cyber-attacks.<br />

Alarms provide a wealth of information<br />

about associated events and the portal also<br />

offers sage advice on remedial action.<br />

USM Anywhere's correlation rules are written<br />

and updated by AlienVault Labs Security Research<br />

Team: through the crowd-sourced Open Threat<br />

Exchange (OTX) community, according to<br />

emerging and evolving threats they see in the<br />

wild, and they use machine learning and human<br />

intelligence to analyse and expand threat<br />

scenarios. Along with extensive alerting facilities,<br />

USM Anywhere provides great reporting features,<br />

including templates for the PCI, HIPAA, NIST and<br />

ISO 27001 security standards.<br />

AlienVault's USM Anywhere is one of the<br />

most complete security solutions on the<br />

market, which we found surprisingly easy to<br />

deploy and use. This all-in-one SaaS platform<br />

presents all the information you need to<br />

pinpoint cyber-threats or asset vulnerabilities<br />

and represents excellent value for businesses<br />

of all sizes.<br />

Product: USM Anywhere<br />

Supplier: AlienVault<br />

Telephone: 353 21 206 3716<br />

Web site: www.alienvault.com<br />

Price: From £832 per month (ex VAT)<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

17


deep dive days<br />

Students at the Centre for Doctoral<br />

Training, Oxford University.<br />

POWERFUL ALLIANCE<br />

CYJAX HAS BEEN WORKING CLOSELY FOR SOME TIME NOW WITH OXFORD UNIVERSITY AND THE CENTRE<br />

FOR DOCTORAL TRAINING IN CYBER SECURITY - AND THESE 'DEEP DIVE DAYS' ARE REALLY PAYING OFF<br />

Mark Pearce, CYJAX: Deep Dive Days<br />

breathe life into the real-world challenges<br />

that students will be facing.<br />

Over the last seven years, CYJAX<br />

has been at the forefront of the<br />

Cyber Threat Intelligence sector,<br />

innovating and developing highly<br />

advanced technology that serves to<br />

protect governments and enterprise<br />

alike. More recently, the CYJAX team's<br />

association with Oxford University and<br />

the Centre for Doctoral Training (CDT) in<br />

Cyber Security has been proving a highly<br />

regarded relationship on both sides.<br />

Indeed, the programme that has<br />

emerged during the last three years<br />

has seen CYJAX take an active role,<br />

alongside major industry players, in<br />

shaping the future curriculum and<br />

influencing the direction of those<br />

studying for their PhDs. This is now<br />

producing some of the world's leading<br />

talents, as well as addressing the skills<br />

gaps in one of the most important<br />

facets of cyber security.<br />

REAL-WORLD CHALLENGES<br />

"Working closely with the University, CYJAX<br />

has been able to produce a series of Deep<br />

Dive Days, which breathe life into the realworld<br />

challenges the students will be<br />

facing," confirms Mark Pearce, chief<br />

marketing officer, CYJAX. "The sessions have<br />

evolved into highly proactive knowledge<br />

exchanges and see students pitched into live<br />

situations where they get the opportunity<br />

not only to apply their own intellects, but<br />

also 'flex the tech', utilising the most<br />

advanced cyber threat intelligence tools<br />

from CYJAX."<br />

The sessions also bring together case<br />

studies from major UK businesses and give<br />

leading cyber security practitioners the<br />

opportunity to share their experiences in<br />

dealing with what is now an all too<br />

common occurrence. As Pearce points out:<br />

"The sessions throw away the text books and<br />

get students to really apply what they know,<br />

18<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


deep dive days<br />

CYJAX Deep Dive Day in progress at Oxford University.<br />

Katherine Fletcher, entering the Robert<br />

Hooke Building, Oxford University.<br />

and to think about creative solutions, rather<br />

than just theories or some vague hypothesis.<br />

"The whole idea of these sessions is to<br />

get humans thinking about how they can<br />

combine high intellect with advanced<br />

technological tools to address what will<br />

be facing them in the coming years."<br />

As these sessions continue to evolve, the<br />

need for innovation and the need for greater,<br />

more cohesive, skills sets will see CYJAX and<br />

the academic world striving to match the<br />

pace and continue the battle against the<br />

next generation of nefarious threat actors.<br />

MULTIPLE BENEFITS<br />

Katherine Fletcher, CDT industry liaison<br />

officer at Oxford University, adds that<br />

interaction with firms like CYJAX are hugely<br />

important for the CDT, for several reasons.<br />

"First and foremost, it helps us ensure that<br />

our students are learning about the current<br />

state of the field, from experts working<br />

at the cutting edge. But there are other<br />

benefits: helping our academics and<br />

students build up networks of contacts,<br />

building trust between the university and<br />

the companies, which may turn into future<br />

research projects, and generally keeping us<br />

up to date.<br />

"We integrate industrial connections into<br />

our CDT course with a number of Deep Dive<br />

days each year, as well as research seminars<br />

given by industry practitioners. Some of<br />

these develop into mini projects (short<br />

standalone projects, undertaken in the first<br />

year of the programme) or even a full thesis<br />

project, and, in the case of CYJAX, it has also<br />

led to several of our students doing freelance<br />

work as analysts."<br />

Every firm has different things to offer, but<br />

CYJAX is always a highlight, she states. "They<br />

make a real effort to tailor their Deep Dive<br />

day to be useful for our students - including,<br />

for example, an open discussion of career<br />

progression and life as a CISO. They have<br />

even taken the step of bringing along their<br />

collaborators and customers to discuss their<br />

perspectives, which is a real show of trust<br />

and adds value to the discussion for all<br />

participants."<br />

INNOVATIVE TECHNIQUES<br />

Often, it is the unguarded, off-the-record,<br />

conversations that are most interesting,<br />

she comments. Why is that? "Because this<br />

is where we come across the tacit<br />

knowledge about how the world works:<br />

we can teach ourselves the innovative<br />

techniques and latest systems; what we<br />

really need is the understanding of how<br />

real collaborations run and why X is<br />

favoured over Y in the real world.<br />

"The most successful Deep Dives happen<br />

when the discussion goes both ways: our<br />

students learn from the practitioners and<br />

are also able to give something back.<br />

One of my favourite examples of this was<br />

at the 2017 CYJAX Deep Dive, where the<br />

students were given some sample<br />

exercises to learn how to conduct an<br />

investigation. The cohort went through<br />

the examples so quickly that the CYJAX<br />

team decided to give them a live puzzle<br />

to work on, which their own analysts had<br />

not yet had time to crack, and the<br />

students managed to find the answer<br />

within a few minutes."<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

19


critical response<br />

THE QUANTUM THREAT TO CYBERSECURITY<br />

BY RODNEY JOFFE, SVP AND FELLOW, NEUSTAR, AND CHAIRMAN OF THE NEUSTAR INTERNATIONAL<br />

SECURITY COUNCIL (NISC)<br />

Jeremy Rowley, DigiCert: an area that is<br />

likely to see more adoption is encryption.<br />

Imagine being handed a phonebook<br />

with 10 million entries and a slip of<br />

paper with one phone number on it.<br />

How long would it take you to match the<br />

number on the slip to the entry in the<br />

phonebook? For a human being - as for a<br />

classical search algorithm on a traditional<br />

computer - it would take an average of 5<br />

million attempts to find the right entry. A<br />

traditional computer, of course, can make<br />

each attempt much faster than a person<br />

could, but a search algorithm on a<br />

quantum computer (which can hold vastly<br />

more information at one time) could<br />

perform the same feat 5,000 times faster<br />

than a traditional computer, in just 1,000<br />

operations.<br />

This ability to work with huge datasets at<br />

unheard-of speeds is why quantum<br />

computing has long been held as a major<br />

stepping stone for all kinds of sectors.<br />

Medical breakthroughs, new frontiers in<br />

chemistry and manufacturing innovations<br />

might all be leveraged through the ability<br />

to work with lots of information, all at<br />

once - and the race is on to build the<br />

machine capable of the task. In the last<br />

budget, Chancellor Philip Hammond<br />

announced £325 million of funding for<br />

quantum computing research, contributing<br />

to a global budget of billions coming from<br />

governments and private industry.<br />

However, amidst the excitement,<br />

quantum computing's ability to work<br />

outside the linear processes we are familiar<br />

with also poses a key threat to the<br />

cryptographic tools we rely on for our IT<br />

security: in short, if it can find a phone<br />

number, it can find a password.<br />

THE POST-QUANTUM THREAT<br />

At the moment, we rely on encryption,<br />

which is possible to crack in theory, but<br />

impossible to crack in practice, precisely<br />

because it would take so long to do so,<br />

over timescales of trillions or even<br />

quadrillions of years. Without the<br />

protective shield of encryption, a quantum<br />

computer in the hands of a malicious actor<br />

could launch a cyberattack unlike anything<br />

previously seen.<br />

Of course, a fully functioning and<br />

practical quantum computer capable of<br />

that kind of operation does not yet exist -<br />

and there is no consensus over how long it<br />

will be before it does. Nonetheless, we<br />

have already started to see small-scale<br />

quantum attacks in the wild, being used in<br />

conjunction with more traditional attack<br />

vectors, botnets and ports.<br />

On a typical contemporary system, being<br />

used by a company to run various<br />

applications in the cloud, a traffic anomaly<br />

of 300 Mbps would probably not be<br />

noticed and therefore would not trigger<br />

cloud failover. Clever attacks might exploit<br />

this fact to open a window to the system,<br />

bypassing security endpoints, without<br />

triggering the system's mitigation<br />

methods.<br />

PLAN FOR TOMORROW'S QUANTUM<br />

TODAY<br />

For both today's small-scale threats and the<br />

major attacks looming on the horizon, it is<br />

vital that IT professionals begin responding<br />

to quantum immediately. The security<br />

community has already launched a<br />

research effort into quantum-proof<br />

cryptography, but information<br />

professionals at every organisation holding<br />

sensitive data should have quantum on<br />

their radar.<br />

As ever, an up-to-date security strategy is<br />

key: systems must be updated and any<br />

unnecessary services operating in the<br />

infrastructure could provide a window for<br />

quantum attacks and so should be<br />

removed.<br />

Beyond this, quantum computing's ability<br />

to solve our great scientific and<br />

technological challenges will also be its<br />

ability to disrupt everything we know<br />

about computer security. IT experts of<br />

every stripe will need to work to rebuild<br />

the algorithms, strategies, and systems<br />

that form our approach to cybersecurity.<br />

20<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


over 150 providers offering leading<br />

covering key topics and meet<br />

www.cloudsecurityexpo.com/ComputingSecurity1<br />

and solutions at the UK’s largest cloud<br />

cloud and cyber security services<br />

200 expert speakers<br />

Hear from over<br />

and cyber security event.<br />

Register for your free ticket today:<br />

SECURING<br />

DIGITAL<br />

TRANSFORMATION<br />

Security is not just for the IT team: it now impacts everyone, and is an imperative<br />

consideration for the entire business. Join us on 12-13 March 2019 to gain<br />

knowledge and insight from industry leading security experts on emerging<br />

trends, tech deep dives, lessons learned and market forecasts.<br />

Our 2019 speakers include:<br />

JOHN<br />

MEAKIN<br />

Group Chief<br />

Information<br />

Security Officer<br />

GSK<br />

CHI<br />

ONWURAH<br />

Shadow Minister<br />

of Industrial<br />

Strategy, Science<br />

and Innovation<br />

UK<br />

Parliament<br />

JON<br />

TOWNSEND<br />

CIO<br />

National<br />

Trust<br />

DAVID<br />

DEIGHTON<br />

Chief Architect<br />

and CISO<br />

University of<br />

Birmingham<br />

EMERIC<br />

MISZTI<br />

CISO<br />

Motor<br />

Insurers<br />

Bureau<br />

RAZVAN<br />

TUDOR<br />

Chapter Lead<br />

ING<br />

For more information contact<br />

the team today on +44 (0)207 013 4997<br />

CO-LOCATED<br />

WITH:


masterclass<br />

CLOUD ADOPTION: A BLESSING, NOT A CURSE, FOR IT SECURITY<br />

NIGEL HAWTHORN, DATA PRIVACY EXPERT AT MCAFEE, AND CHARLOTTE GURNEY, MARKETING MANAGER AT<br />

BROOKCOURT SOLUTIONS, CONSIDER HOW CLOUD CAN BE THE MOST SECURE ENVIRONMENT FOR<br />

BUSINESS, DESPITE INCREASINGLY SOPHISTICATED THREATS AND GROWING CYBERCRIMINAL INTEREST<br />

Charlotte Gurney, Marketing Manager,<br />

Brookcourt Solutions.<br />

Modern IT architecture is rapidly<br />

evolving, with the cloud and a<br />

range of connected devices<br />

becoming the new anchors for enterprise<br />

data. Organisations are recognising that<br />

moving to Office 365 enables rapid<br />

collaboration, while the likes of Amazon Web<br />

Services (AWS) and Microsoft Azure can help<br />

their IT infrastructure become more<br />

responsive and flexible to drive further<br />

innovation. However, theft of data or an<br />

attacker gaining entry to corporate cloud<br />

infrastructure can stop innovation in its<br />

tracks.<br />

VALUABLE DATA IN THE CLOUD<br />

McAfee's recent Cloud Adoption and Risk<br />

Report found that 21% of data stored in the<br />

cloud is sensitive, such as intellectual property<br />

or customer data. Today, cybercriminals are<br />

turning their attention to this valuable data.<br />

Possible threat scenarios include password<br />

reuse from consumer to business cloud<br />

services, cloud-native attacks targeting weak<br />

APIs, hunting for poor cloud security<br />

configurations, and using the cloud as a<br />

springboard for cloud-native man-in-themiddle<br />

attacks to launch cryptojacking<br />

malware.<br />

With the increased adoption of services like<br />

Office 365, McAfee has pinpointed a surge of<br />

attacks on the service - especially attempts to<br />

compromise email. As just one example,<br />

McAfee uncovered the KnockKnock botnet,<br />

designed to target system accounts that<br />

typically do not have multifactor<br />

authentication.<br />

We have also seen many high-profile data<br />

breaches attributed to misconfigured<br />

Amazon S3 buckets. This is clearly not the<br />

fault of AWS. Based on the shared<br />

responsibility model, the onus is on the<br />

customer to configure IaaS/PaaS<br />

infrastructure properly. However, many of<br />

these misconfigured buckets are owned by<br />

vendors in their supply chains, not the target<br />

enterprises. This complicates matters for them<br />

and makes it simple for bad actors to find<br />

easy pickings amongst the thousands of<br />

available open buckets.<br />

Happily, the cloud can be managed and<br />

controlled, and many policies, in place for<br />

years on endpoints and on-premises servers<br />

for example, can be migrated to the cloud, so<br />

functions such as DLP, user behaviour<br />

analytics, access control, integration with<br />

global authentication systems can all be put<br />

in place. The difficulty for organisations is that<br />

this is not delivered by the security systems<br />

already installed - a new computing system<br />

needs new security tools, such as CASB<br />

(Cloud Access Security Brokers). In addition,<br />

cloud brings in new functionalities that need<br />

managing - the ease of collaborating in the<br />

cloud with external 3rd parties and cloud-tocloud<br />

traffic. These can also be addressed but<br />

not with the old-school network-based<br />

security systems we have relied on in the past.<br />

SECURING THE CLOUD<br />

For organisations to adopt the cloud with<br />

peace of mind, they not only need visibility<br />

into data and applications, but consistent<br />

data and threat protection policies across<br />

their data and applications wherever they<br />

reside. When managed correctly, the cloud<br />

can be the most secure environment for<br />

business.<br />

Brookcourt Solutions delivers products and<br />

professional services based around McAfee<br />

MVISION cloud-native solutions - designed to<br />

protect data, detect threats and correct any<br />

new vulnerabilities quickly. With McAfee's<br />

MVISION portfolio, the enterprise can mount<br />

a powerful threat and data-centric defence,<br />

spanning from device to the cloud. In this<br />

way, IT security teams can unify threat<br />

defence and data protection as well as<br />

eliminating the silos that inhibit their ability to<br />

manage and adjust security controls in<br />

response to a changing operating<br />

environment.<br />

Security concerns should not be a barrier to<br />

cloud adoption. Together with the native<br />

security delivered by cloud providers such as<br />

AWS, Microsoft Azure and Microsoft Office<br />

365, McAfee aims to make cloud as secure or<br />

more secure than on-premises alternatives.<br />

With McAfee, organisations can securely<br />

harness the power of the cloud to accelerate<br />

business, drive innovation and gain a<br />

competitive edge.<br />

22<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


sports and leisure<br />

SPORTING CHANCE<br />

RECENT FIGURES SUGGEST THAT OVER THE LAST YEAR THERE HAS BEEN A 50% INCREASE<br />

IN ONLINE ATTACKS ON VOLUNTEER-RUN SPORTS AND LEISURE CLUBS<br />

Aspate of recent targeted attacks on<br />

line against sports and leisure clubs<br />

has put the industry on red alert.<br />

The cyber-crimes are said to have cost the<br />

clubs an average of £10,000 each.<br />

Why have they been singled out? Sports<br />

and leisure clubs hold a high volume of<br />

data and are often too small to have a<br />

dedicated team in place to look after their<br />

online security. That makes them an ideal<br />

target for hackers. According to cyber<br />

security specialists DeCyber, cyber-security<br />

products currently available on the market<br />

tend to be structured in a way that large<br />

organisations can adopt and afford, but to<br />

smaller businesses, such as sports clubs,<br />

are not as accessible.<br />

The level of risk these organisations face is<br />

what prompted DeCyber to partner with<br />

international product innovation business<br />

CPP Group UK, a leading cyber training<br />

provider, CybSafe, and Lloyd's of London<br />

(for the provision of cyber insurance) to<br />

launch a suite of products that aims to<br />

transform how clubs manage their online<br />

security and that adapts to their needs.<br />

BESPOKE SOLUTIONS<br />

Given their limited IT infrastructure and<br />

lack of specialist resource, clubs need<br />

software packages that are easy to install<br />

and manage, as well as being inexpensive,<br />

they point out. For its part, DeCyber creates<br />

bespoke packages to suit the requirements<br />

of such organisations.<br />

The partnership between DeCyber and<br />

CPP Group UK has resulted in three new<br />

products that are aimed specifically at<br />

sports and leisure clubs:<br />

Checking for online cyber risks often<br />

involves users having to give specialists<br />

access to their networks and systems.<br />

With KYND, cyber risks can be checked<br />

via a domain name and the results are<br />

said to be instant, saving users valuable<br />

time. A universal traffic light system of<br />

red, amber and green is also a useful<br />

quality to help monitor and explain<br />

cyber risk through an easy-tounderstand<br />

method<br />

OwlDetect scans the web (including the<br />

dark web) to detect if information<br />

appears in places it shouldn't, as well as<br />

highlighting the level of risk it poses<br />

and advising next steps to ensure the<br />

information isn't compromised<br />

The third product, WardWiz, is<br />

described as a comprehensive anti-virus<br />

software, providing real-time<br />

protection from online threats. As well<br />

as detecting and removing threats from<br />

a device, it can repair any damage<br />

caused and mitigates against future<br />

risks.<br />

All three products can be packaged with<br />

cyber insurance and training to provide<br />

a complete solution, it is stated. DeCyber<br />

was in the process of enabling the online<br />

purchase of these products through its<br />

health check process as Computing<br />

Security went to press.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

23


inside view<br />

DON'T PASS GO!<br />

PASSWORDS ARE A NEVER-ENDING HEADACHE FOR ORGANISATIONS EVERYWHERE - AND A BOON FOR<br />

HACKERS LOOKING FOR EASY ACCESS TO SOMEONE'S DATA. SAMANTHA HUMPHRIES OF RAPID7 OFFERS<br />

HER INSIGHTS INTO THIS THORNY TOPIC<br />

Samantha Humphries: we should be<br />

using unique passwords/phrases across<br />

the accounts that have the most risk<br />

associated with them.<br />

Last summer, as part of a company 'give<br />

back' initiative, a group of us went into<br />

a local secondary school to run a STEM<br />

day. The room I helped with focused on<br />

phishing - we took the students through a<br />

game of phish spotting, which they were<br />

unsurprisingly great at, given that schools<br />

are teaching cybersecurity pretty early on<br />

these days. Every single group scored a false<br />

positive, though, picking up on Facebook's<br />

head office address as a red flag. Ironies<br />

aside, it was a fun day, and very pleasing to<br />

see how switched-on the groups were when<br />

it came to staying safe online.<br />

Mostly for purposes of getting a cheap<br />

laugh, I'd brought along a prop: security<br />

underpants (https://amzn.to/2H2G8uX) to<br />

help thematically cover recommendations<br />

around passwords: don't share them, don't<br />

leave them lying around, change them<br />

frequently. We then got into the<br />

conversation about re-use, which did go a<br />

little sideways from an underpants analogy<br />

standpoint, but we hit on something that is<br />

true the world over. We asked the students<br />

to put their hands up if they ever re-used<br />

their passwords across different websites.<br />

There was a lot of looking around the room,<br />

to check if their friends were going to admit<br />

to it. Slowly, hands started to go up, until a<br />

full house was reached. Every. Single. Time.<br />

Including the teachers. Followed by some<br />

nervous giggling, some embarrassed faces,<br />

and then something of a relieved silence<br />

when everyone realised 'It Wasn't Just Them'.<br />

Everybody does it. And I'll say it out loud<br />

right now, I do it, and I've been in the<br />

security industry longer than some of our<br />

current interns have been alive. We all know<br />

the rules, we hopefully all know the risks,<br />

but we do it anyway. Why? Humans are,<br />

well, human. It's pretty much impossible to<br />

remember unique passwords for each<br />

individual online account. At the very least,<br />

24<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


inside view<br />

we should be using unique<br />

passwords/phrases across the accounts that<br />

have the most risk associated with them:<br />

banking, health info, work accounts, gmail,<br />

social media, password managers etc.<br />

Ideally combined with two-factor<br />

authentication where it's available.<br />

Some of us devise systems to help us<br />

remember all the things. Horror story alert: I<br />

recall once hearing a senior security<br />

executive proudly announce that they<br />

prepend their password with the name of<br />

the website, eg: haveibeenpwnedpassword.<br />

Guess what, Donald, this really isn't a great<br />

system, if your credentials are harvested<br />

from a breach, it doesn't take a '1337<br />

h4ck3r' to determine what your gmail<br />

password is, and every other account you<br />

have for that matter, plus I would hazard a<br />

guess that 2FA hasn't made it to your radar<br />

just yet either. This is the physical security<br />

equivalent of having identical locks for every<br />

door in your house, your office, your car<br />

and your safe, but using a different<br />

coloured keyfob for each one. Please don't<br />

do this.<br />

So, let's assume you like your job enough<br />

to use a unique password at work and your<br />

IT/Security folks are enforcing some sort of<br />

password policy. For a lot of organisations,<br />

it goes like this: change your password every<br />

90 days, passwords must include one<br />

uppercase character, one lowercase<br />

character, four numbers, one special<br />

character, minimum password length of ten<br />

characters, don't reuse the last sixteen or so<br />

passwords. There are possibly rules around<br />

not using repeated characters, or passwords<br />

similar to previous ones, and ideally lasers<br />

come out of the ceiling, if you include the<br />

actual word 'password'. Sound familiar?<br />

Okay, maybe not the lasers part, but I expect<br />

at least some of the above is true for your<br />

organisation. And I can guarantee you this:<br />

some users have developed a system for<br />

this, too, and it's not as foolproof as they'd<br />

hope.<br />

Arguably, the biggest problem lies with<br />

one of the underpants rules - change them<br />

regularly. I'm not saying this is a bad thing<br />

per se, but where the policy often falls<br />

down is around the 90-day part, because<br />

it tends to drive a particular behaviour. In<br />

many parts of the world, the seasons<br />

change four times a year, so when pushed<br />

to think up a new password at change<br />

time, users pretty frequently include the<br />

season, combine it with the current year<br />

and everyone's favourite special character:<br />

the exclamation mark! Ending up with a<br />

variation on a theme of this: Spring2019!<br />

You may just have experienced the horror<br />

of reading your password in an article. If<br />

that's you, please make sure to include a<br />

password change on your to-do list today.<br />

But don't feel too bad. I promise you that<br />

you aren't alone. Many other people have<br />

come up with the exact same system.<br />

Despite what my kids sometimes think,<br />

Sam isn't psychic, so how does she know<br />

this truth exists?<br />

Every year, Rapid7 produces a research<br />

report on our learnings from the hundreds<br />

of penetration testing engagements, the<br />

wonderfully named 'Under The Hoodie'<br />

https://www.rapid7.com/info/under-thehoodie.<br />

It's a great read, whether you're on<br />

the hook for security or not, and includes<br />

some fascinating real-life stories from the<br />

field.<br />

Compromised credentials are an<br />

attacker's favourite, used to gain access to<br />

systems and to move around networks<br />

undetected, therefore it's often that we're<br />

SAMANTHA HUMPHRIES<br />

asked to try and harvest credentials during<br />

an engagement. We use various methods<br />

to harvest passwords, one of which is the<br />

very quick and very dirty option of<br />

guessing. Not-shockingly, the dreaded "P"<br />

word comes up a lot, sometimes with<br />

numbers at the end, sometimes with a<br />

zero instead of an o, but not exactly rocket<br />

science either way. Variations of the<br />

company name with the same devilish<br />

trickery are fairly common too<br />

(C0mpanyname1234). And time and time<br />

again, when we're hunting around for user<br />

accounts, we find they've set their<br />

password to SeasonYear!<br />

How to be (even!) better at passwords:<br />

Include a rule in the password policy<br />

disallowing the format of SeasonYear!<br />

because it's all too commonplace. Get<br />

creative about formatting and periodic<br />

changes too<br />

Implement a corporate identity<br />

manager / single sign-on tool in your<br />

organisation. There are plenty of good<br />

ones available on the market - they<br />

make life simpler for the users whilst<br />

improving your security posture.<br />

Password managers, although not<br />

necessarily complete security nirvana, are<br />

good practice in real life. They'll help you<br />

avoid being 'Donald', with the horrible<br />

websitepassword combo.<br />

Also, please do check out the Under The<br />

Hoodie videos at the bottom of the<br />

research website to learn more about<br />

what goes on in the world of pen testing.<br />

Samantha Humphries is the senior product marketing manager for Global<br />

Consulting Services at Rapid7. She has nearly 20 years' experience in infosec and<br />

has worked in a plethora of areas, including product management, threat research<br />

and incident response. She has helped hundreds of organisations of all shapes,<br />

sizes and geographies recover and learn from cyberattacks.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

25


airline attack<br />

BROUGHT DOWN TO EARTH<br />

CYBERCRIMINALS WHO CARRIED OUT A HACK ON BRITISH AIRWAYS COMPROMISED THE DATA OF AROUND<br />

380,000 PASSENGERS<br />

The recent major hack on British<br />

Airways' website and mobile<br />

applications, putting at grave risk the<br />

personal information and bank and/or credit<br />

card data of some 380,000 passengers,<br />

netted a haul that included passengers'<br />

names, billing addresses, email addresses,<br />

bank card numbers, credit card numbers,<br />

expiration dates and CVV codes.<br />

As Armor's Threat Research Unit (TRU)<br />

team revealed in their 6 September Threat<br />

Report, stolen credit cards are one of the<br />

most highly sought-after products in the<br />

underground hacker markets. Armor was<br />

quick to track down nine separate hackers,<br />

on both English-speaking and Russianspeaking<br />

markets, who are selling the<br />

credentials for hundreds of stolen credit<br />

cards from the UK, Europe and the US.<br />

And the price at which these are being sold<br />

off might come as a shock to the BA victims<br />

whose personal details were compromised<br />

by a company in whom they had placed<br />

such trust.<br />

BATTERED AND BARTERED<br />

"Current prices for UK credit cards (Visa,<br />

Mastercard and American Express), with<br />

corresponding CVV data and expiration<br />

dates (similar to the data compromised at<br />

BA), runs at $35 each, $30 for a European<br />

Visa, Mastercard or American Express card,<br />

and $15 for a single US Visa or Mastercard<br />

and $18 for an American Express card,"<br />

reveals Armor. Such are the bare statistics<br />

to which personal, highly sensitive data is<br />

reduced.<br />

British Airways' boss Alex Cruz was quick<br />

to apologise in the wake of the attack -<br />

which took place between 21 August and<br />

5 September last year - for what he said was<br />

a "sophisticated breach" of the firm's security<br />

systems. "We are 100% committed to<br />

compensate them, period," Cruz told the<br />

BBC's Today programme. "We are committed<br />

to working with any customer who may have<br />

been financially affected by this attack and<br />

we will compensate them for any financial<br />

hardship that they may have suffered."<br />

Of course, apologies are one thing - being<br />

hacked in the first place is really the problem.<br />

It's all very well to refer to the hack as a<br />

"sophisticated breach" of the firm's security<br />

systems, but the difficulty with that statement<br />

is, consciously or unconsciously, it could be<br />

taken to harbour some underlying implication<br />

that this level of complexity made the breach,<br />

if not excusable, hard to defend against.<br />

If that is true, what hope is there for<br />

organisations when it comes to protecting<br />

themselves? Was BA's security technology up<br />

to the task? Ultimately, is there any solution<br />

out there that can defend against ALL attacks,<br />

known and unknown?<br />

THE BOTTOM LINE<br />

In some instances, breaches occur because<br />

defences are lax and/or inadequate - although<br />

this is in no way to suggest BA's defences<br />

were not robust. In other instances, the<br />

breached business believes that it had every<br />

reason to assume it will not, even cannot, be<br />

breached. Which begs the question: have we<br />

all but reached the point where no one is safe<br />

26<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


airline attack<br />

and no solution can stop successful attacks<br />

by the most determined and best armed?<br />

These are issues that the industry - and<br />

those who use their solutions - must be<br />

pondering, openly or behind closed doors;<br />

which is actually the right thing to do. It<br />

has become the mantra of every solutions<br />

provider to warn enterprises that a breach is a<br />

matter of when, not if, but can they do more<br />

than make a potential hacker look elsewhere<br />

for easier prey? In which case, it is true that<br />

no one is safe; just 'relatively' safe.<br />

"It is inconceivable that British Airways did<br />

not have significant cyber security systems in<br />

place, and certainly they would have spent<br />

a substantial amount of money to stop such<br />

incidents occurring," insists Phil Beckett,<br />

managing director at consulting firm Alvarez<br />

and Marsal. "However, due to the increased<br />

sophistication of attacks, traditional<br />

approaches to cybersecurity have been found<br />

wanting and, as a result, even the biggest<br />

and most sophisticated of organisations can<br />

be hit.<br />

"As seen in this case, and many others<br />

before it, the risks for organisations go well<br />

beyond the fines regulators might issue.<br />

Nonetheless, these fines could be hefty -<br />

up to 4% of annual global revenue - under<br />

the new GDPR regime. It is imperative that<br />

cybersecurity is seen as a strategic business<br />

priority and something no CEO can ignore,"<br />

Beckett adds.<br />

STEPPING UP<br />

Mark Adams, regional vice president of UK<br />

& Ireland, Veeam, credits British Airways for<br />

reporting the breach so quickly, saying that<br />

many others could learn from the handling of<br />

this. "Unfortunately, breaches can happen to<br />

any business and, while BA remain on the<br />

backfoot to ensure this doesn't happen again,<br />

it's important to highlight why all businesses<br />

need to be far more proactive in managing<br />

data and systems, and getting security and<br />

monitoring of data right up front.<br />

"To reduce the chances of breach complaints<br />

and payment of heavy fines, businesses have<br />

several steps they can take. First and<br />

foremost, work to deliver a company-wide<br />

employee training programme on data<br />

protection and phishing attacks. Human-led<br />

errors are still the weakest link in the security<br />

chain for a business. No matter who you are<br />

or who you work for, this must be right.<br />

When the stakes are so high, employees have<br />

to be more aware of their actions.<br />

“From a technology standpoint,” Adams<br />

points out, “implementing intelligent data<br />

management tools that can monitor,<br />

automatically spot irregularities and act<br />

accordingly is critical, he adds. "Data collected<br />

by an organisation the scale of an airline is<br />

vast; and they are a prime example of the<br />

type of business that needs to move from<br />

a policy-based mindset of security and data<br />

management to an automated, behaviour-led<br />

approach that scan spot inaccuracies and<br />

obscure patterns in data usage.<br />

"For organisations of any scale, the old<br />

school way of manually checking and<br />

monitoring is no longer sufficient, especially<br />

not for businesses of this size," cautions<br />

Adams. "And, while it's near impossible to<br />

prevent all data leakage and data thefts,<br />

an intelligent data management approach,<br />

combined with a strong and versatile incident<br />

response process, can help significantly<br />

reduce the complaints that naturally would<br />

follow."<br />

TOTAL VISIBILITY<br />

The bigger the company name, the louder<br />

the howls of protest after a breach, of course.<br />

They are the ones expected to invest more<br />

time, money and strategic thinking into<br />

ensuring they keep our precious data out of<br />

the hands of hackers. Yet too many are failing<br />

in this regard.<br />

"Large-scale data breaches seem to be<br />

becoming all-regular-occurrence, and British<br />

Airways is just the latest in the long line of<br />

Randy Abrams, Webroot: mobile access<br />

from a 'trusted' device, from an expected<br />

location, can defeat certain types of<br />

heuristics that otherwise would have<br />

raised alarm.<br />

Mark Adams, Veeam: businesses need to<br />

be far more proactive in managing data<br />

and systems, and getting security and<br />

monitoring of data right up front.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

27


airline attack<br />

Simon Cuthbert, 8MAN by Protected<br />

Networks: personally affected, he has<br />

issues with how the airline handled the<br />

initial response to customers.<br />

British organisations to fall victim," say Adams.<br />

"As sophisticated and well-funded threat<br />

actors adapt quickly to new security<br />

measures, trying to protect customer data has<br />

become an exhausting process. But the best<br />

defence in cybersecurity is a proactive one. It's<br />

simply not acceptable that any organisation,<br />

especially one of this size, was not protecting<br />

all of its data, so that it was secured against<br />

any kind of attack, even one via third party<br />

software.<br />

"To protect customers, and their valuable<br />

personal data, businesses must have<br />

complete visibility and control over exactly<br />

where their data resides, and adopt an<br />

encrypt-everything approach, particularly in<br />

this case when precious financial information<br />

was involved. Data that is fully encrypted is<br />

useless to hackers, after all."<br />

With the GDPR in full force, he adds, it's no<br />

longer just a lack of customer trust and a<br />

tarnished reputation that organisations need<br />

to be worried about. "…the risk of weighty<br />

financial penalties means the perils of a data<br />

breach have got a lot more serious."<br />

NOT THE ONLY ONE<br />

While British Airways has taken most of the<br />

recent flak, this, as Randy Abrams, senior<br />

security analyst, Webroot, points out, is not<br />

the whole story. "Air Canada was hacked and,<br />

between August 22 and August 24,<br />

customer's passport details may have been<br />

compromised. The overlapping dates are<br />

probably a blessing, as the odds are small<br />

that the same customers booked both airlines<br />

in the two-day window of overlap."<br />

He goes on to reveal: "In the case of Air<br />

Canada's breach, customer's data, potentially<br />

including passport numbers and expiry date,<br />

passport country of issuance, NEXUS<br />

numbers for trusted travelers, gender, dates<br />

of birth, nationality and country of residence,<br />

may have been compromised. In both cases,<br />

this is data that now may be available to<br />

cybercriminals to aggregate and correlate to<br />

build significantly comprehensive profiles."<br />

A commonality of the breaches is that they<br />

both affected mobile app users. "While no<br />

mention was made of iOS or Android, the<br />

security of mobile apps financial, especially on<br />

Android is questionable at best. Although<br />

great efforts are made to secure the mobile<br />

apps, credential theft is not uncommon,"<br />

adds Abrams.<br />

"In this case, mobile access from a 'trusted'<br />

device from an expected location can defeat<br />

certain types of heuristics that otherwise<br />

would have raised alarm. The wisdom of<br />

conducting financial transactions on an<br />

Android device, in particular, is of question.<br />

Mobile security products can be used to help<br />

prevent malicious apps from compromising<br />

devices. If a consumer chooses to conduct<br />

financial transactions on a mobile device, the<br />

additional security is effectively mandatory."<br />

While BA notified affected customers, he<br />

warns that the estimated number of affected<br />

individuals may grow over time. "It is probably<br />

best for all of the customers who booked<br />

during this timeframe to talk to their banks<br />

and set up 2-factor authentication."<br />

TRUSTED BRANDS<br />

Undoubtedly, the British Airways attack will<br />

have been causing serious problems for many<br />

affected customers, including damage to<br />

their finances and credit ratings. "This<br />

incident, the latest in an ever-growing string<br />

of breaches of trusted brands, is likely to add<br />

to a feeling that consumers are losing control<br />

of their personal data," states Gerald Beuchelt,<br />

CISO, LogMeIn. "Customers should also<br />

mitigate any damage by changing their<br />

passwords to something unique across all<br />

accounts and turning on multi-factor<br />

authentication where possible. Individuals<br />

and businesses should also be extra vigilant to<br />

phishing emails, as attacks like this provide<br />

the perfect opportunity for scammers to use it<br />

to their advantage."<br />

However, there is another view of BA's<br />

handling of the breach, other than<br />

acknowledgement of its swift action in<br />

revealing that it had been discovered. Simon<br />

Cuthbert, head of international, 8MAN by<br />

Protected Networks, was one of those BA<br />

customers personally affected and he has<br />

issues with how the airline handled the initial<br />

response to its customers.<br />

"The email received [from BA] was not well<br />

written, nor did it give me as a customer any<br />

comfort in the actions they claim to have<br />

taken. I am sure I am not alone in reading the<br />

email as 'Oops, someone broke in and stole<br />

your personal information, but oh well, we<br />

will try to stop it happening again. Go and<br />

speak to your bank, they know what to do!'<br />

Adds Cuthbert: “This should be seen as a<br />

warning that no business, large or small, is<br />

exempt from being a target to hackers and<br />

they should ensure they have the necessary<br />

strategies in place, not just to protect from<br />

the risk of a breach, but also in how to handle<br />

one, should it occur."<br />

28<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


targeted attacks<br />

UNDERSTANDING CYBER KILL CHAIN MODEL<br />

TO STOP ADVANCED PERSISTENT THREATS<br />

ALTUG ASIK, SENIOR SOFTWARE SPECIALIST, ICTERRA INFORMATION AND COMMUNICATION TECHNOLOGIES,<br />

LOOKS AT APTS AND HOW TO DETECT AND PREVENT THEM<br />

Altug Asik: automation and speed are of<br />

the essence.<br />

The term 'Advanced Persistent Threat'<br />

(APT) was used to describe statesponsored<br />

cyberattacks designed to steal<br />

data and exploit infrastructures. Today, the<br />

term is used to describe the attacks targeted<br />

at organisations for monetary gain or<br />

espionage.<br />

Advanced Persistent Threat is a sophisticated<br />

attack with the following characteristics:<br />

Advanced: The techniques used to conduct<br />

the stealthy attack require advanced skills and<br />

knowledge in order to exploit the<br />

vulnerabilities of victim organisation's systems.<br />

Social engineering techniques are frequently<br />

used to attack and infiltrate the organisation.<br />

Persistent: Duration of the attack is rather<br />

long (up to months), whereas the attack<br />

involves an external command and control<br />

server that monitors and extracts data from<br />

the victim organisation.<br />

Threat: The process is managed by people<br />

rather than automated code. Organised and<br />

well-funded attackers have specific objectives<br />

and motives.<br />

CYBER KILL-CHAIN<br />

The attackers execute the following steps to<br />

carry out their vicious plans:<br />

Reconnaissance: Information is gathered<br />

studying targets through their public<br />

websites, following their employees on social<br />

media and using other OSINT (Open Source<br />

Intelligence) techniques.<br />

Weaponisation: Attackers analyse the<br />

information they have gathered and<br />

determine their attack methods.<br />

Delivery: Delivery is accomplished through<br />

drive-by download from a website, targeted<br />

phishing attack or infection through an<br />

employee-owned device through a secure<br />

VPN.<br />

Exploitation: Once delivered, the malicious<br />

code is triggered to start exploiting<br />

organisation's systems.<br />

Installation: Once a single system is infected,<br />

the malicious activity has the potential to<br />

spread rapidly and hide its existence from<br />

security devices through a variety of methods,<br />

including tampering with security processes.<br />

Command and Control (C&C): To<br />

communicate and pass data back and forth,<br />

attackers set up command and control<br />

channels between infected devices and<br />

themselves.<br />

Exfiltration: Captured information is sent to<br />

attacker's home base for analysis, further<br />

exploitation or fraud.<br />

THE PROBLEM<br />

The attack should be detected and prevented<br />

before spreading over the whole<br />

organisation. Starting with the initial<br />

infection, attackers tend to leave tracks at<br />

every single step, such as malicious<br />

documents and executable files, which can<br />

be found in the filesystem or several other<br />

tracks in memory and registry in case of<br />

fileless malware attacks. Anomalies in<br />

network traffic can be detected while the<br />

attackers are communicating with their C&C<br />

servers as well. Following these tracks during<br />

the attack and employing effective<br />

protection, various attack methods can be<br />

blocked. The key is using fast, machine<br />

learning based security platforms that is<br />

trained with parameters like these trails, as<br />

early as possible in the cyber kill chain.<br />

The problem here is to integrate detection,<br />

prevention and removal phases of the attack.<br />

The detection process can be achieved by<br />

machine learning based platforms. However,<br />

these platforms are not smart enough to<br />

accomplish prevention and full removal of<br />

the damage yet. Experienced human security<br />

professionals are still needed for incident<br />

response and recovery.<br />

Automation and speed are required to cope<br />

up with APT attacks. Therefore, security<br />

systems are required which are not only<br />

capable of detecting attack information in<br />

automated fashion, but also capable of using<br />

this intelligence to generate the right<br />

response to stop malicious actions before<br />

they cause substantial damage. Fully<br />

integrated automation for detection and<br />

handling is essential to enhance defence<br />

against advanced persistent threats.<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

29


industry insights<br />

THREE CYBERSECURITY TIPS FOR MANUFACTURERS<br />

ADRIAN JONES, CEO OF SWIVEL SECURE, OFFERS THREE ESSENTIAL TIPS FOR MANUFACTURERS THAT<br />

WILL HELP TO KEEP THEIR SENSITIVE DATA OUT OF GRASPING HANDS<br />

Adrian Jones, Swivel Secure:<br />

unauthorised access could have<br />

catastrophic consequences.<br />

The last few decades have seen<br />

numerous incidents where access<br />

controls to sensitive data have been<br />

compromised. Stolen consumer data has<br />

been used by hackers for crimes ranging<br />

from credit theft through to fraud and<br />

blackmail and is well reported. However, the<br />

scale and depth of corporate hacking activity<br />

in manufacturing is less documented.<br />

Here are three tips for manufacturers that<br />

could make the difference between<br />

protecting intellectual property and<br />

unwittingly inviting unauthorised access that<br />

could have catastrophic consequences.<br />

1. Use a jump host<br />

Due to the connected nature of<br />

manufacturing supply chains, manufacturers<br />

need to include security points to prevent<br />

hackers gaining access to multiple systems.<br />

For example, PLCs (programmable logic<br />

controllers), which control hardware for<br />

manufacturing, such as pick-and-place<br />

machines and other automated machines in<br />

manufacturing including computer<br />

numerical control (CNC) machines, can easily<br />

be hacked, if they aren't protected on the<br />

network. PLCs need to be protected from<br />

unauthorised access. A Jump Box or Jump<br />

Server can help protect them from external<br />

threats. This uses a computer on an<br />

insulated network, which allows the PLC to<br />

be accessed by authorised personnel. The<br />

PLC and computer are linked externally when<br />

it needs updating, but is protected at all<br />

other times - closing the connection to<br />

attackers.<br />

The insulated network could also be<br />

secured with multifactor authentication<br />

(MFA). In addition, if your PLCs also support<br />

RADIUS protocol, adding 2FA or MFA to the<br />

RADIUS authentication can further protect<br />

all the PLCs from cyberattacks.<br />

2. Apply single sign-on to access your<br />

separate networks<br />

An infrastructure where hardware such as<br />

PLCs sit on insulated networks, and are<br />

separate to any external facing networks,<br />

will help to prevent hackers gaining access<br />

to the whole network.<br />

But manufacturers may regularly need to<br />

access systems seamlessly and without<br />

compromising security. With so many<br />

systems to keep separate, employees may<br />

require separate log-ins for each, meaning<br />

there's a multitude of usernames and<br />

passwords to remember. This can slow<br />

down or complicate working processes.<br />

Although single sign-on (SSO) can provide<br />

greater efficiency, giving employees access to<br />

all platforms and systems (even if they are<br />

on different networks), it's imperative that<br />

risk-based authentication is utilised with SSO<br />

functionality to ensure continued security.<br />

3. Use multi-factor authentication<br />

But it's not just enough to have a password<br />

for SSO. All the applications, systems and<br />

more on your network could also be secured<br />

with multi-factor authentication (MFA). This<br />

asks the user for a few pieces of evidence,<br />

like a password and a numerical code,<br />

before giving them access to the network.<br />

Choose your MFA supplier wisely and be<br />

aware that some two-factor authentication<br />

applications can be prone to credentials<br />

theft - they only update the code every 40<br />

seconds, during which time a hacker can use<br />

the code to access the network.<br />

Dedicated MFA platforms offer more<br />

secure authentication and are updated<br />

frequently to stay one-step ahead of cyber<br />

criminals, such as delivering a new security<br />

string for each access request. Ensuring the<br />

MFA solution integrates with hundreds of<br />

applications will provide the flexibility for the<br />

fluidity required in architecture to evolve and<br />

grow, while staying protected.<br />

Demanding a comprehensive range of<br />

authentication factors will provide maximum<br />

adoption throughout the organisation and is<br />

a realistic request from any established MFA<br />

provider in 2019.<br />

30<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


incident response<br />

THE IMPORTANCE OF EFFECTIVE INCIDENT<br />

RESPONSE PLANNING<br />

BY DAVID GRAY, SENIOR MANAGER INCIDENT RESPONSE PRACTICE LEAD EMEA, NTT SECURITY<br />

David Gray, NTT Security.<br />

Planning for Incident Response…. why<br />

do we use processes and procedures? In<br />

short, so that all our staff know what to<br />

do, and when. Let's begin with an example.<br />

John Volanthen famously and successfully led<br />

the cave rescue of a Thai boys' football team<br />

in July 2018. He recently gave a keynote at<br />

NTT Security's ISW2018 conference in<br />

London. He talked at length about the<br />

importance of having procedures in place to<br />

ensure that all of his team knew what it was<br />

doing and to ensure that safety, which was of<br />

the highest importance here, was achieved.<br />

An example of just how effective prior<br />

planning was in this situation can be seen in<br />

the picture on this page, which shows all<br />

John's personal dive equipment at Heathrow,<br />

waiting to be boarded onto the aircraft. He<br />

and the team received just two hours' notice<br />

before leaving for the airport! Without<br />

planning what would be required (including<br />

equipment and permissions for gas tanks<br />

etc), a two-hour turnaround would have<br />

been impossible. This, albeit in a less dramatic<br />

fashion, directly relates to what incident<br />

response (IR) staff must do on a daily basis.<br />

In information security, an incident response<br />

plan is the high-level schedule that dictates<br />

the actions to be taken, should an<br />

information security incident occur. The NTT<br />

Security 2018 Risk:Value Report highlighted<br />

the lack of preparedness we continue to see<br />

from companies across the board in<br />

developing incident response plans, with less<br />

than half (49%) saying that they had<br />

implemented such a programme. An IR plan<br />

should comprise, at a minimum, the<br />

following:<br />

Workflows - these are typically swim lanes<br />

showing areas of responsibilities and decision<br />

points for escalation, involving external<br />

agencies, declaring breaches, gathering<br />

intelligence and closing down completed<br />

incidents.<br />

Communication - quite simply, who to talk<br />

to when something happens. This can be to<br />

other members of the Security Operations<br />

Centre (SOC) team, but more typically<br />

involves IT operations (server team, gateway<br />

team, architects etc), physical security, human<br />

resources, the media team and, via the SOC<br />

manager, senior management. There is<br />

nothing worse than being in the middle of a<br />

major incident and not knowing who to talk<br />

to!<br />

Sharing - any security team is going to be<br />

constrained by the nature of the information<br />

it is protecting, especially in the new world of<br />

GDPR, so it is important that decisions are<br />

made about what information (if any) the<br />

response team wants to share with peer<br />

groups, national agencies or other<br />

organisations. Defining what information can<br />

be shared and who is authorised to do so<br />

ahead of time removes the risk of leaking<br />

confidential data.<br />

Incident response procedures (IRP) - when a<br />

security incident happens, the response staff<br />

have to know what to do at each point of an<br />

investigation. An appropriate IRP gives the<br />

analyst guidance for what steps they should<br />

be taking to ensure that nothing is missed,<br />

actions are taken rapidly, and all containment<br />

and remediation activities are followed for a<br />

given threat.<br />

In addition, the IR team has to consider<br />

additional components as well - related to<br />

the deployment of equipment, visas, flights,<br />

SLAs, site plans for customer<br />

environment/network and, from a managerial<br />

perspective, ensuring that enough staff are<br />

located in geographical positions to support<br />

ongoing IR activities.<br />

So, stop and look to your processes. Do you<br />

have everything covered? And do you have a<br />

plan in place should an incident happen? If<br />

not - what are you waiting for?<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

31


analyst insights<br />

PRINTER HACKING IN THE AGE OF THE IOT<br />

PRINT AND BE DAMNED? IF THE RIGHT SECURITY MEASURES AREN'T IN PLACE,<br />

THAT COULD WELL BE AN ORGANISATION'S FATE<br />

Louella Fernandes, Quocirca: while<br />

connected printers and MFPs bring<br />

convenience and productivity, they<br />

also bring potential security risks.<br />

Analyst and research firm Quocirca<br />

released findings last year that showed<br />

over 60% of organisations had<br />

experienced at least one data breach, due<br />

to insecure printing practices. Over the past<br />

few years, there have been some widely<br />

publicised network printer hacks, usually<br />

pranks and in themselves not particularly<br />

harmful, but they underline the potential<br />

vulnerability of networked printers in the<br />

age of the IoT.<br />

It comes as no surprise, therefore, that 95%<br />

of businesses surveyed by Quocirca reported<br />

that print security was an important element<br />

of their overall information security strategy<br />

(55% said it was very important, while 40%<br />

rated it fairly important). However, only 25%<br />

reported that they are completely confident<br />

that their print infrastructure is protected<br />

from threats.<br />

"While connected printers and MFPs bring<br />

convenience and productivity, they also<br />

bring potential security risks," says Louella<br />

Fernandes, director, Quocirca. "These devices<br />

capture, process, store and output<br />

information, and run embedded software.<br />

Information is therefore susceptible at a<br />

device, document and network level. As well<br />

as putting confidential or sensitive data at risk<br />

of being accessible by unauthorised users,<br />

network connectivity makes vulnerable print<br />

devices potential entry points to the<br />

corporate network."<br />

Open network ports present a security risk,<br />

enabling the MFP to be hacked remotely via<br />

an internet connection, she adds. "Printers<br />

can therefore be prime targets for DDoS<br />

attacks. Hackers may install malware on<br />

poorly protected printers and use them as<br />

ingress points for broader network access or<br />

recruit them to botnets." Indeed, when asked<br />

what aspects about printers as IoT devices<br />

concerned them most, the businesses<br />

surveyed by Quocirca found that external<br />

hacker threats came out top (52% said a<br />

critical or big concern), followed by DDoS<br />

attacks to print devices (44%). Internal<br />

hacker, firmware updates and third-party<br />

collection of data tied for third place (41%).<br />

LONG LIVE PRINT<br />

Nor is use of printers going away any time<br />

soon," insists Fernandes. "Quocirca's<br />

Print2025 study found that 64% of<br />

32<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


analyst insights<br />

businesses surveyed across France, Germany,<br />

The Netherlands, the US and the UK expect<br />

printing to still be important in 2025. That<br />

number rises to approximately three-quarters<br />

of millennials who expect it to be more<br />

important than it is today (that may say<br />

something about the current resurgence of<br />

printed books over ebooks and reflect how<br />

millennials' attitudes differ from their<br />

predecessors in the workplace).<br />

"While printing volumes will ultimately<br />

decline, there are also some 'sweet spots' in<br />

printer growth, most notably mobile printing.<br />

Over half of the companies surveyed expect<br />

mobile printing to increase by 2025 and over<br />

40% have already implemented mobile<br />

printing to one extent or another."<br />

Clearly, as networked print devices continue<br />

to be central to the way most organisations<br />

operate, they need to have robust security<br />

protection. "While more printer<br />

manufacturers are embedding security in<br />

their new devices, it only takes one rogue,<br />

unsecured device to weaken security," she<br />

points out. "Most businesses using printers<br />

have a mixed fleet of printing devices - old<br />

and new - and from different manufacturers.<br />

This is why businesses need to include<br />

printers within their wider enterprise-wide<br />

security strategies, integrated into an overall<br />

security policies and procedures, using a<br />

proactive and multifaceted approach."<br />

How can you step up your printer security?<br />

Quocirca offers these seven steps:<br />

A unified security policy for all printers -<br />

should a date breach occur, an<br />

organisation needs to be able to<br />

demonstrate that appropriate measures<br />

were taken to protect all networked<br />

devices, so it is important to be able to<br />

monitor, manage and report on the<br />

entire printer fleet, regardless of age,<br />

brand or model<br />

Secure printer-network access - multifunctions,<br />

like any other device connected<br />

to the network, need controls that limit<br />

access, manage the use of network<br />

protocols and ports, plus take steps to<br />

prevent potential viruses and malware<br />

Secure the device itself - to secure data,<br />

whether actively in use, sitting idle or<br />

used by the device in a previous job, use<br />

hard disk encryption as an extra security<br />

layer. When the printer is moved or<br />

reaches end-of-life, data overwrite kits<br />

make sure that all scan, print, copy and<br />

fax data stored on the hard disk drive is<br />

destroyed<br />

Secure who can do what - in common<br />

with many other forms of Infosecurity,<br />

user authentication helps to eliminate<br />

the risk of unclaimed output being left<br />

in trays. 'Pull printing' makes sure that<br />

documents are only released physically at<br />

the printer to the authorised recipient<br />

Secure the document itself - digital rights<br />

management (DRM) discourages<br />

unauthorised copying or transmission<br />

of sensitive or confidential information,<br />

using features such as secure<br />

watermarking, digital signatures and<br />

PDF encryption.<br />

Monitor and manage print security ongoing<br />

- organisations need a centralised<br />

and flexible way to monitor usage across<br />

all print devices, at document and user<br />

level, which can be achieved using either<br />

MFP audit log data or third-party tools.<br />

These provide a full audit trail that logs<br />

the identity of each user, the time of use<br />

and details of the specific functions that<br />

were performed<br />

Seek expert guidance - security<br />

assessment services are something that<br />

managed print service (MSP) providers<br />

offer as part of the customer<br />

relationship. Not all are equal. Obviously,<br />

it makes sense to ensure that the risk<br />

assessor has the credentials and<br />

capabilities to fully evaluate the security<br />

risks across device, data and users.<br />

In addition, the most sophisticated<br />

security assessments not only make<br />

recommendations for device<br />

replacement and optimisation, but also<br />

offer ongoing and proactive monitoring<br />

of devices to identify potential malicious<br />

behaviour.<br />

"The bottom line is that printers are no<br />

longer dumb devices, but sophisticated<br />

ingress and egress points in a connected,<br />

increasingly IoT-centric world," Fernandes<br />

concludes. "Businesses clearly need to<br />

incorporate print into their overall security<br />

strategies, help users to use printers safely<br />

and also to work with their printer service<br />

providers. After all, print will continue to<br />

be part of the workplace for some time to<br />

come and, while just one element of a multifaceted<br />

threat landscape, print is an area of<br />

risk that deserves more focus."<br />

www.computingsecurity.co.uk @CSMagAndAwards Jan/Feb 2019 computing security<br />

33


fingerprint recognition<br />

BIOMETRIC BREAKTHROUGH<br />

BANK OF CYPRUS CUSTOMERS ARE SET TO BE FIRST TO ENJOY BIOMETRIC CONVENIENCE ON<br />

A CONTACTLESS PAYMENT CARD, WHILE PROTECTING USERS’ DATA PRIVACY AT THE SAME TIME<br />

biometrics for contactless payments is a<br />

natural move, as it fits in naturally with the<br />

gesture used to pay. It allows a better user<br />

experience, enabling higher transaction<br />

amounts without entering a PIN, while<br />

benefiting from the convenience of<br />

contactless."<br />

Adds Stelios Trachonitis, card centre<br />

manager from Bank of Cyprus: "In order to<br />

bring seamless authentication to the<br />

banking sector, Gemalto has leveraged its<br />

extensive expertise from secure government<br />

documents and leadership in biometric<br />

applications. Our customers will benefit<br />

from this innovative payment solution with<br />

the peace of mind that their biometric data<br />

never leaves their hands."<br />

Gemalto has been selected by Bank of<br />

Cyprus to supply what is said to be<br />

the world's first EMV biometric dual<br />

interface payment card for both chip and<br />

contactless payments.<br />

Using fingerprint recognition, instead of a<br />

PIN code, to authenticate the cardholder,<br />

the card is said to be compatible with existing<br />

payment terminals that are already installed<br />

in the country. When customers place their<br />

fingerprint on the sensor, a comparison is<br />

performed between the scanned fingerprint<br />

and the reference biometric data securely<br />

stored in the card.<br />

The biometric sensor card is powered by the<br />

payment terminal and does not require an<br />

embedded battery; this means there is no<br />

limit from battery life nor on the number of<br />

transactions.<br />

Gemalto's bionic sensor payment card is<br />

based on the principle that biometric data<br />

should always remain in the hands of end<br />

users. Bank of Cyprus' customers will<br />

complete the swift enrolment process at the<br />

bank's branches, using Gemalto's tablet<br />

designed for the solution. The biometric<br />

personalisation and card activation process<br />

has been designed to avoid transmission<br />

of biometric data over the air to ensure<br />

that users' data privacy is protected. The<br />

fingerprint template captured during the<br />

enrolment process is stored only on the card.<br />

"Bank of Cyprus customers will be first in<br />

the world to enjoy biometric convenience<br />

on a contactless payment card. Gemalto's<br />

biometric sensor payment card is designed to<br />

provide maximum security and data privacy,"<br />

claims Bertrand Knopf, Gemalto's executive<br />

vice president Banking and Payment. "Using<br />

Biometrics, such as fingerprints verification<br />

or facial recognition, are massively used<br />

today by government bodies; for electronic<br />

ID and ePassport border control, for<br />

example. Biometrics sources such as DNA<br />

are also used for criminal investigations,<br />

as they allow accurate identification and<br />

can't be forged. Since 2013, with the<br />

introduction of the first iPhone 5 with<br />

TouchID fingerprint verification, commercial<br />

biometrics entered into a new dimension,<br />

with hundreds of millions of smartphones<br />

equipped with fingerprint sensors.<br />

The very first use case for fingerprint<br />

technology was to unlock the phone. It is<br />

also used to log in onto mobile apps and<br />

perform mobile NFC payment at the store.<br />

"Thanks to biometric CVM, contactless can<br />

cover the full payments amount range and<br />

offer an identical customer experience for<br />

contact, contactless, for all amounts,"<br />

comments Gemalto.<br />

34<br />

computing security Jan/Feb 2019 @CSMagAndAwards www.computingsecurity.co.uk


ster<br />

REGISTER<br />

FREE<br />

ipexpomanchester.com<br />

manchester<br />

3-4 April 2019,<br />

Manchester Central<br />

CO LOCATED AT<br />

DIGITALTRANSFORMATIONE PO<br />

INCORPORATING<br />

CYBER SECURITY<br />

AI-ANALYTICS<br />

ster<br />

manchester 120+<br />

SPEAKERS<br />

CO LOCATED AT<br />

DIGITALTRANSFORMATIONE PO<br />

10<br />

THEATRES<br />

100+<br />

EXHIBITORS<br />

LIVE<br />

DEMOS<br />

The North’s number ONE Enterprise IT event<br />

> Stay up to date with trends & future predictions.<br />

> Explore & experience new & emerging tech.<br />

> Expand your professional network.<br />

> Save time & meet with your existing & new suppliers all in one day.<br />

Register FREE and find out more at ipexpomanchester.com


Lorem ipsum<br />

or contact us<br />

+44 (0)1784 448 444<br />

Euroinfo@neustar.biz

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!