Zeguro Ebook CyberSafety101
Zeguro Ebook CyberSafety101
Executive Summary
While cyber-attacks at large corporations make the headlines—including those at Target,
Marriott, Equifax, and more—cyber risks are no less prevalent for small and midsized
businesses (SMEs). But unlike large companies, SMEs are not well equipped to recover from an
attack. The statistics released from research by the National Cyber Security Alliance last year
are staggering:
● As many as 60 percent of hacked small and midsized businesses fold within six months
There are two key aspects to surviving in the increasingly cyber risky landscape: (1) prevention
(through increased education, training and policies); and (2) carrying adequate cyber
insurance in the event a breach does occur. The latest cyber security monitoring platforms work
in tandem with cyber insurance to bring the costs down—much like auto insurance goes down
for less risky driving behavior.
This eBook focuses on key terms and principals every small and midsized business leader needs
to know in order to survive and thrive in this digital era. With detailed explanations of cyber
safety terms like cryptomining, encryption, ransomware and more, you will be armed with a
deeper understanding of the unseen risks your business faces every day. Educating yourself is
the first step to keeping you and your digital business assets safe.
CHAPTER 1:
Cryptomining attacks and how to prevent them 4
CHAPTER 2:
What is encryption? 6
CHAPTER 3:
Multifactor authentication 9
CHAPTER 4:
Encryption and your data 12
CHAPTER 5:
How secure is the cloud? 14
CHAPTER 6:
What is ransomware? 16
CHAPTER 7:
What is pen testing? 18
CHAPTER 8:
Application vulnerabilities like SQL Injection and XSS 20
Cryptomining attacks
and how to prevent them
There is a good chance you have heard of crypto technologies for a
variety of reasons. That guy up the block that made, and then lost,
millions on cryptocurrency. Or you read an article about blockchain
and how it might impact your business. While these technologies may
be nascent, they affect you in ways you don’t even realize—through
malware. Cryptomining is a form of cyber attack that isn’t designed to
be disruptive, like ransomware, but it’s worthwhile to recognize, and
prevent it from affecting your business.
What is cryptomining?
Cryptomining refers to the use of computer hardware and software
to solve complex mathematical problems. When you voluntarily
use your own computer and software to solve these mathematical
puzzles and then add them to the public blockchain (similar to
a public ledger), you can earn cryptocurrency. These complex
problems require huge amounts of hardware processing power
and electricity—to the point that some hardware products (e.g.,
AMD gaming processors) and electrical grids have struggled with
the demand.
Unlike other types of malware, cryptomining doesn’t aim to disrupt the victim—in fact, it’s in the
attacker’s interest to keep infected machines working for the longest amount of time possible.
Problems caused by cryptomining attacks can be twofold:
2. Cost: Cryptomining uses power, which isn’t free. Employee workstations are unlikely to
be a huge power draw, but the additional power cost for a higher workload shouldn’t be
ignored. Even worse, improperly configured cloud services may be used for cryptomining,
in which case your cloud costs go up. Some cloud providers even ban the use of their
infrastructure for cryptomining, which could get you kicked out!
What is encryption?
Data breaches are a fact of life. Each time there’s a breach, press
releases throw around a bunch of terms, often in the spirit of damage
control. But what do they actually mean?
Keyed encryption: When you encrypt data, you run it through a system to scramble the
data and make it unreadable to people who don’t have the proper decryption key. (This is
usually done with a computer system, but if you have your Little Orphan Annie Secret Decoder
Pin handy, that counts as decryption as well.) Encrypted data is safe from casual observers, but
if an attacker steals the data and the key, they can read all of the data.
Hashes are a good way to run a comparison and make sure a message hasn’t been altered—
you compose an email, hash it, and then send both the message and hash value to your
recipient. They can run the message through a hash function and compare the value they
calculated with the one you sent; if the two don’t match, that means the message they
received isn’t authentic. Hashes are crucial for ensuring what you received is the same as
what somebody sent. Hashes are often used to prevent exposure of personally identifiable
information (PII) when working with customer data.
Salt: Salts are used in conjunction with hashes to add randomness. If you see a company’s
press release state “passwords were encrypted,” start feeling very, very nervous. Passwords
should instead be hashed, and the best practice is to both hash and salt passwords prior to
storage.
Hash functions always produce the same output with the same input—this means two users
who used “password” will have the same hashed password (side note: those users obviously
need remedial training on choosing better passwords). The more secure salt approach applies
a unique salt value to each user’s password before hashing (e.g., password12 and password
34). This makes it harder for an attacker to guess a password and get access to stolen data.
● Review your own business: Do you need to tighten up your own security? Make sure
your applications implement password hashing rather than encryption, and that you use
and support the latest version of TLS for any web apps you deploy.
● Read other company’s publications with a more critical eye: Every time
there’s a data breach, the breached company puts out a press release. Look for these
terms, and see if you can spot improper usage. Does Acme, Inc. try to reassure users by
saying that all passwords were encrypted? You now know they should
have been hashed and salted, and it looks like Acme needs to
improve their security!
Multifactor authentication
Any data that your business doesn’t share publicly needs to have
appropriate access controls in place. The best known example is the
username and password. But it’s easy to steal and guess passwords,
so what can we do to ensure that only our trusted employees log
in correctly? Two-factor authentication (2FA) and multifactor
authentication (MFA) to the rescue!
“Who in the
world am I?
Ah, that’s the
great puzzle!”
Lewis Carrol,
Alice in Wonderland
Who are you? And are you who you say you are?
Authentication is the fancy security way of saying a user can prove their identity. In the real
world, we use a photo ID like a drivers license or passport. In the digital world, passwords and
PINs are frequently used. Those passwords are easily stolen or guessed, so for higher security
applications, it important to use multiple authentication factors. From the categories below,
you can begin to understand how identities can be confirmed:
NOTE: Two forms of authentication from the same category (e.g., passwords and
PIN) don’t count as multifactor authentication—you have to choose from two different
categories for it to work.
But if you have multifactor authentication in place, the above attack will fail. The attacker has
the user’s password, but unless they also physically stole the user’s smartphone (which displays
an access code via an app), they can’t log into your systems.
At the very least, you should look at the apps your business uses and make sure data is secure
at two points: First, where it’s being stored, such as data that lives on employee laptops or in
a cloud application. Various encryption technologies can be used for this data at rest. Many
recent data breaches have been caused by improperly controlled access to cloud storage like
Amazon S3 where unencrypted data was stored. Second, you should ensure data is properly
secured when it’s moving from one place to another—usually over the Internet. Technologies
like TLS or a Virtual Private Network (VPN) can help ensure nobody snoops on your data while
it’s in motion.
The second potential drawback of encryption is loss of access. If you encrypt data and then
lose the key, you’ve just lost access to that data. Information that needs to be retained for a
long period of time needs a system to securely store keys for the lifetime of that data. If your
employees or customers manage the keys used in your encryption, you’ll probably want to
provide a way for them to securely recover key. No matter how diligent people are, they will
forget things from time to time.
For larger companies, the cloud offers key financial benefits. For example, the economies of
scale achieved by cloud providers mean reduced costs; metered payments match expenses to
revenues; and cloud services shift IT costs from capital to operating expenditures, which offers
favorable accounting benefits.
File and Data Storage: Another week, another data breach due to a
misconfigured [pick one: Amazon S3 bucket, Dropbox Folder, MongoDB]. These services
provide online data/file storage and sharing capabilities, but they must be properly configured.
MAKE SURE: all storage is set to private by default. Sharing should be done only as-needed
rather than by default, and preferably with a limited group rather than shared publicly. If broad
public access is needed, oversight should be implemented to ensure the data stored isn’t
sensitive (like credit card info).
Remote Access: Cloud services are accessible from anywhere, which is a strength and
weakness. The good news is you can get alerts when you see suspicious login locations. Is
that person logging into email from Russia a hacker, or one of your employees on vacation?
MAKE SURE: you enable appropriate access controls, like multifactor authentication (and
see chapter 3 on multifactor authentication), to reduce the risk of malicious activity. Review
employee access at least annually to ensure employees still have access to only the resources
they need.
100101110
Backup and Recovery: Cloud services were designed with high availability in
100101110
mind, but the strength of AWS’ global data center network doesn’t automatically
translate into a failure-proof app for your business.
MAKE SURE: your cloud architecture makes proper use of high availability features. All cloud
service providers offer a complex set of options for uptime like regional data centers and
defined availability zones. If you’re unsure, hire a consultant to help you identify your needs and
to architect an appropriate solution. For example, do you need to use multiple regions (more
expensive and more complex), or will multiple zones fit your needs (less complex, but more
prone to an outage)?
What is ransomware?
Centralized storage can reduce the impact of an individual machine being compromised.
Using tools like Dropbox or Google Drive, rather than storing files on user’s hard drives, can help
limit the spread of the ransomware. These services often include
built in ransomware protections, so even if a user’s laptop is
rendered useless, your files are still safe.
Pen testing can provide both proactive and reactive security benefits. If you’ve designed
an application and put appropriate security controls in place (e.g., firewalls, multifactor
authentication, and monitoring systems), the pen test can validate the controls are in place and
doing their job effectively—or identify weaknesses and misconfigurations.
For many businesses, a pen test is an annual occurrence (especially with regulatory
requirements such as PCI-DSS). Businesses with a stronger focus on security may use an
external pen testing firm for this annual requirement, and use in-house skills to perform smaller
pen tests throughout the year for additional security.
31
product is software (e.g., a SaaS platform). In this case,
aligning pen tests with major changes to software makes
sense, as new or changed functionality can introduce new
vulnerabilities. Your pen testing schedule should prioritize
finding those vulnerabilities as soon as possible.
Injection Attacks, like SQL (pronounced sequel) and Script Injections: In this type of attack,
hackers send unexpected computer code to an app, with the goal of forcing the app to run
that code and steal information.
Cross-Site Attacks, like Cross-Site Scripting (XSS) and Cross-Site Request Forgery (XSRF):
These attacks rely on malicious code being added to web pages, with the goal of tricking a
victim’s computer into performing some action. Since most of today’s apps are web-based, this
is a significant concern.
Buffer Overflows: These attacks exploit the way applications store data in memory. By
abusing this, a hacker can get access to data that they’re not normally supposed to see.
For applications that you build yourself, proper programmer training is crucial to prevent
application vulnerabilities. Programmers trained on risky coding practices can avoid them,
leading to apps with fewer vulnerabilities. Practices like code peer reviews and testing tools that
analyze code for vulnerabilities can also help prevent errors from making it into production.
What if you don’t build your own apps? Buying commercial off-the-shelf software (COTS)
reduces the effort required to get a system up and running, but it’s not without drawbacks.
Because you don’t control the team who wrote the code, you can’t guarantee proper training
or code reviews were conducted. If you need assurance that your vendor has taken proper
steps, look for one with a recognized certification like ISO 9001 or 27001, which the vendor can
use to demonstrate they’ve implemented secure development practices.