by

Protect Against Targeted Attacks Webinar – The Highlights

First of all, I’d like to say a big ‘thank you’ to everyone who attended Tuesday’s Mimecast webinar featuring Forrester on ‘Protecting Against Targeted Attacks’.

The interest has been huge, and we’ve made the recording of the session available here. We’ll also be focusing on key themes raised during the session over the coming weeks on this blog.

To start, we thought it would be useful to pull out and reflect on some key quotes from the session.

Recording of Mimecast webinar featuring Forrester on ‘Protecting Against Targeted Attacks’ from September 30th 2014, when practical steps to protect your business were outlined by Rick Holland.

Recording of Mimecast webinar featuring Forrester on ‘Protecting Against Targeted Attacks’ from September 30th 2014, when practical steps to protect your business were outlined by Rick Holland.

Rick Holland, Principal Analyst, Forrester Research:

- ’67% of the espionage cases in organizations involved phishing’ discussing the Verizon ‘2014 Data Breach Investigations Report‘.

- ‘There are two types of phishing vectors – one the malicious attachment…and two, URLs to malicious sites’.

- ‘The average cost of a data breach is $3.5m up 15% from 2013’ discussing the Ponemon Institute ‘2014 Cost of a Data Breach Study: Global Analysis’ sponsored by IBM. Interestingly, class action law suits of effected customers are part of the calculation and might be a rising trend for organizations to address.

- ‘As it becomes more common for remote workers to operate outside of VPNs (BYOD and BYOC), enterprises must protect the user when they actually click’. ‘Even if users could put something on their mobile device to protect them, they are hesitant from a user experience perspective.’ – this was one of the key points in the session, as traditional approaches to security only protect users on the network and corporate managed devices. It’s important to think beyond this given BYOD and remote working. Protection must be available no matter the device used to access corporate email systems, without increasing the IT overhead or adversely affecting the users’ experience. As Rick suggested, organizations must ‘protect the click’.

- ‘Sometimes the URL isn’t bad at the time of delivery’ the attacker may turn the server over from benign to malicious after the email is sent.’

- ‘URL rewriting is emerging to protect the user…I recommended it as an RFP requirement.’

- ‘Whatever the culture of the organization, use that to (tailor) security training…increasing awareness and propensity to report incidents.’

- ‘(Phishing) is only going to get more and more sophisticated.’- which is why the protection organizations put in place now must be able to stay ahead of the attackers.

Steve Malone, Security Product Manager, Mimecast:

- ‘Phishing is viewed as a technology problem…the usual approach is to add more technology. But the issue is that adding more technology is actually increasing complexity.’ Steve further explained that the most successful approach is two-fold: choosing the right technology coupled with user education.

- ‘As we’ve got better at protecting against these attacks, the attackers have moved the goal posts. We now have to assume all the links in emails are bad.’

- ‘Clean up (post-attack) is generally very difficult and time consuming and the root cause is not addressed.’

- ‘Mimecast’s Targeted Threat Protection addresses advanced attacks in email by rewriting the URLs. It means protection regardless of the device used.’

- ‘We’re building into the service a real-time education component for users.’

It’s clear from the interest and the great questions we received at the end of the presentations that this is a hot topic. The evolution of threats is forcing IT teams to rethink the planning, purchasing and management of their business security systems. In addition, it’s being recognized that in order to stay ahead of the attackers, technology alone is not the answer – the complete solution needs to account for this and train users in a new way.

Please leave a comment or @reply me at @orlando_sc if you’ve any particular areas you want us to cover in our follow up posts.

by

Top Priorities for CIOs over the next Year

We’ve come a long way on the timeline of enterprise information security. About ten years ago we’d finally become used to the idea of a second firewall upgrade and were thinking about dedicated security teams and policies that had a reach much farther than just the IT team.

Today, and into the next twelve months, the list of priorities for CIOs and CISOs is far more complex and only bears a passing resemblance to the past.

The future looks far more advanced, from a security perspective, which by right is an accurate reflection of the nature of the threats that we now face. Traditional security technologies are struggling to keep up, and in many ways have seen their day. Today’s shopping list of security tools would include Mobile Device Management (MDM) services, next generation firewalls and threat detection tools as well as new more active types of host anti-virus; altogether more complex and advanced than the types of tools we were buying just a few years ago.

Also on the agenda are the softer, more human components of information security. Compliance tools and processes have never been more important, neither, and perhaps surprisingly for some, are formal enterprise privacy agreements for users. The latter in response to growing privacy concerns driven by major data leakage and snooping scandals, and the former—your staff—being a new frontier for soft security technologies and training, that seek to secure one of the weakest lines of defense in enterprise.

So all things considered, here are my predictions for the types of projects you’ll be seeing this year:

- Cloud identity and authorization: With the rise of cloud based services in the enterprise, IT teams will need to ensure access control requirements are met across all services. Using third party identity and authorization services that integrate with the cloud and on-premise directory services will be essential to enable the use of cloud services that can match your enterprise authentication policies.

Cloud encryption: If not provided by a cloud security vendor already, more CIOs will demand their data be encrypted in the cloud with a separate cloud encryption tool. Public cloud services will be affected most to guarantee the confidentiality of data for the enterprise as CIOs seek to find ways to protect their information regardless of its storage location.

- Formal privacy programs: Privacy is critical to both customer and end user trust in your organization, with the added benefit of helping you comply with local laws and customs. CIOs will be creating privacy protection controls for their sensitive customer data and personal information that balance business enablement with business protection. This is a new concept for many, but as the line between enterprise and personal computing is increasingly unclear, CIOs will need to establish clear boundaries for data access, storage and monitoring.

- Next generation tech: The ‘next generation’ is never well defined, but we know the current generation of technologies is fast being outmoded. Security technology in particular has become easy for attackers to circumvent, so vendors are responding with next generation, more advanced, security solutions. Spear-phishing is a great example – all the most recent high profile attacks have bypassed traditional email security technologies, by the use of very well crafted malicious emails.

- Threat detection and response: Similarly, as threats change and become more stealth we need to address how we detect and respond to them, given the possibility we may not be able to prevent them all. End point and host detection will play a large role in these new projects as businesses look for ways to quickly detect the outbreak of a problem on an end point and seek to lock it down or remote wipe it as quickly as possible.

- Security governance: This has always been a growing part of a CIO’s responsibilities, and we’ll see IT GRC management and ITSM increase as rigor is brought to bear on the IT department, and the buy-in of IT initiatives by the rest of the organization becomes more normal.

- Mobile device management: BYOD has come and gone, or at least embedded itself in our everyday IT policy. Users, not satisfied with your policies being enforced on their personal devices, appear to be much happier with the containerized or compartmentalized use of business data and apps on those devices. Simply letting users bring their devices into your network is no longer acceptable as it once was, controlling the use or your data on their devices is now essential.

- Testing and training: Security training has always been part of our routine for users. Most new users are given a ‘sheep dip’ when they join, and a rare few given ongoing training thereafter. But, as the value of training is diminished by more successful attacks in the face of well trained staff, real-time testing becomes a more viable solution. There are numerous open source tools available to help you socially engineer your staff; we should expect to see these sort of activities being offered as services in the near future, and should take advantage of them – even if you’ve shied away from classic “pen-testing” in the past.

by

Forrester and Mimecast Webinar: Protecting Against Targeted Attacks

As the torrent of malicious content and spam moved away from our enterprise inboxes to more consumer and social platforms, we were perhaps lulled into a false sense that we’d finally beaten the spam problem.

But this simply isn’t the case. The risks to our enterprise inboxes and data have morphed into more harmful and effective security threats.

Forrester and Mimecast Webinar ‘Protecting Against Targeted Attacks’ - join us next Tuesday, September 30th, at 10am Eastern (1500 UK, 1600 RSA). Register free here:

Forrester and Mimecast Webinar ‘Protecting Against Targeted Attacks’ – join us next Tuesday, September 30th, at 10am Eastern (1500 UK, 1600 RSA). Register free here: http://mim.ec/Zdm7qY

Spear-phishing, or targeted attacks by email, is the next generation of threat our IT teams are scrambling to deal with. Plus, as more high profile security breaches hit the headlines, where spear-phishing is often the initial point of entry, it’s a threat that has got the attention of the C-suite.

So Mimecast is hosting another webinar in our series of ‘Expert Webinars’ to share essential advice on how to protect your business against spear-phishing and targeted attacks -  the webinar is next Tuesday, September 30th, at 1000 Eastern (1500 UK, 1600 RSA) and you can register for free here.

I’ll be joined by two industry experts; Rick Holland, the well-known Forrester Research analysts and IT security commentator, as well as Steven Malone, Mimecast’s own Security Product Manager.

Spear-phishers are specifically targeting you and your business in an effort to steal your intellectual property, customer lists, credit card databases and corporate secrets.

Whereas old style phishing was a scatter gun attack, spear-phishing is specifically targeted at a handful of individuals within a business. The attackers research their targets over many months, often using social media platforms to gain useful information about you. Like phishing, email is the main attack vector for spear-phishing, with well-crafted social engineered emails being the tool of choice.

During the webinar we’ll be discussing: the biggest threats and most dangerous attack tactics. Recent high profile case studies. The real life cost of attacks and the practical steps you can take to protect and educate your users.

Do leave a comment under this post or @reply me at @orlando_sc if you’ve any particular areas you want us to cover next week.

by

Six Email Continuity Mistakes – and How to Avoid Them

The 2014 Atlantic Hurricane season is in full swing through November, putting your organization – and mission-critical systems, like email – at sudden risk of exposure to tropical storms, floods and fires.

Ask yourself: When was the last time you tested your business continuity plan? If the answer is one year or longer, you risk significant network downtime, data leakage and financial loss. According to Gartner, depending on your industry, network downtime can typically cost $5,600 per minute or more than $300,000 per hour, on average. Don’t wait for disaster to strike. Treat email like the critical system it is, and avoid making these six mistakes that could jeopardize business continuity – and your job.

Combat downtime during hurricane season by planning ahead.

Combat downtime during hurricane season by planning ahead.

  1. Not testing your continuity solution. You’ve devised and implemented what you believe to be a solid continuity solution, but you’ve not given it a production test. Instead, you cross your fingers and hope when (and if) the time comes, the solution works as planned. There are two major problems with not testing your plan from the start. First, things get dusty over time. It’s possible the technology no longer works, or worse, maybe it was not properly configured in the first place. Plus, you might not be regularly backing up critical systems. Without testing the solution, you’ll learn the hard way that data is not being entirely backed up when you perform the restore. Second, when it comes to planning, you need a clear chain of command, should disaster strike. If your network goes down, you need to know who to call, immediately. Performing testing once simply is not enough. You need to test your solution once a year, at a minimum. Depending on the tolerance of your business, you’ll likely have to test more frequently, like quarterly or even monthly.
  2. Forgetting to test fail back. Testing the failover capabilities of your continuity solution is only half the job. Are you prepared for downtime that could last hours, days or even weeks? The ability to go from the primary data center to the secondary one – then reverting back – is critical, and this needs to be tested. You need to know that data can be restored into normal systems after downtime.
  3. Assuming you can easily engage the continuity solution. It’s common to plan for “normal” disasters like power outages and hardware failure. But in the event of something more severe, like a flood or fire, you need to know how difficult it’s to trigger a failover. Also, you need to know where you need to be. For example, can you trigger the fail over from your office or data center? It’s critical to know where the necessary tools are located and how long it’ll take you or your team to locate them. Physical access is critical. Distribute tools to multiple data centers, as well as your local environment.
  4. Excluding policy enforcement. When an outage occurs, you must still account for regulatory and policy-based requirements that impact email communications. This includes archiving, continuity and security policies. Otherwise, you risk non-compliance.
  5. Trusting agreed RTP and RPO. In reality, you’ve got to balance risk and budget. When an outage happens, will the email downtime agreed upon by the business really stick? In other words, will the CEO really be able to tolerate no access to email for two hours? And will it be acceptable for customers to be out of touch with you for one day? The cost associated with RTO and RPO could cause a gap in data restore. If you budget for a two-day email restore, be prepared that during an outage, this realistically means two days without email for the entire organization. As part of your testing methodology, you may discover that you need more or less time to back up and restore data. It’s possible that, as a result, you may need to implement more resilient technology – like moving from risky tape backup to more scalable and accessible cloud storage.
  6. Neglecting to include cloud services. Even when you implement cloud technologies to deliver key services, such as email, you still have the responsibility of planning for disruptions. Your cloud vendor will include disaster recover planning on their end to provide reliable services, but mishaps – and disasters – still happen. Mitigate this risk by stacking multi-vendor solutions wherever possible to ensure redundancy, especially for services like high availability gateways in front of cloud-based email services, or cloud backups of key data.

With the proper testing and upfront business continuity preparation, you can significantly reduce – or even prevent – email downtime, data leakage and financial loss after disaster strikes.