Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
Website hacked by Anonymous Puckett & Faraj Rep. Marine accused of 24 civilian deaths in Haditha, Iraq 2005 Website hacked by Anonymous Feb 2012 Hacked Gmail
Hacked Website
Default Accounts & Passwords 80% of data breaches involve stolen, weak, default or easily guessable passwords … and the list goes on … https://spiessblog.wordpress.com/2016/04/26/first-blog-post/
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
Dated Software & Patch Exploits Number of CVEs exploited in 2015 by the CVE publication date Common Vulnerabilities and Exposures (CVEs) as named by Verizon 2016 Data Breach Investigations Report Includes dated software exploits, and patches
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
Adv. Persistent Threats & Zero-Day Zero-Day Exploit Multiple attack vectors continuously over time Not just one attack one time Include several complex phases Any exploit plus continuous access Software vulnerability, unknown Exploited by hackers, before developers are aware Once known, “zero days” to patch, fix, and protect All exploits were once zero-day exploits May 2013 Zero-day attack against US Dept. of Labor website via Internet Explorer 8 vulnerability April 2014 Heartbleed, a zero-day vulnerability in the Transport Layer Security protocol, was published
Top Best Practices User training & awareness Segregate data & privileges Password management Update patches and software Security hardware & software Removable media policy Data destruction policy Periodic pen testing Encrypt data Monitoring
Password Management Create strong passwords Change often Min. 12 characters Phrase Change often Remove defaults Hardware & software Remove old employee accounts Don’t keep “password” files or folders Don’t share passwords Don’t reuse passwords
Encryption Whole disk Encryption BIOS password A phrase works well Encrypt thumb drives Encrypt data in transit to cloud Encrypt Backups
What is the #1 source of data compromise ?
What is the #1 source?
Comments & Questions Steven Konecny | CFE, CIRA, CEH, CRISC steve.konecny@eisneramper.com (916) 563-7790 (213) 482-0669 Let’s Take Flight