Information Security for Small Business

58
INFORMATION SECURITY FOR SMALL BUSINESS by Julius Clark Sr., MBA, CISSP, CISA

description

 

Transcript of Information Security for Small Business

Page 1: Information Security for Small Business

INFORMATION SECURITY

FOR SMALL BUSINESS

by Julius Clark Sr., MBA, CISSP, CISA

Page 2: Information Security for Small Business

About Me

• BDPA History• 2010-2012 Charlotte President

• 2010-2012 National BDPA CISO

• 2007-2009 Charlotte President-Elect

• 2006-2004 VP of SITES (Education)

• 2001-2003 Charlotte HSCC Coordinator

• Education• MBA in Information Security

Salem International University, Salem, WV

• MSIS in Information SecurityUniversity of Fairfax, Fairfax, VA

• BS in Electronic EngineeringWentworth Institute of Technology, Boston, MA

• Certifications• Certified Information Systems Security

Professional (CISSP)

• Certified Information Systems Auditor (CISA)

• Microsoft Certified System Engineer (MSCE).

• Julius Clark Sr.• Location: Charlotte, NC

• Current home, been residing in Charlotte, NC for over 10 years

• Hometown

• Boston, Ma

• Profession

• Information Security Professional.

2

Page 3: Information Security for Small Business

Agenda Information Security for Small Business

IT Security & Business Wholeness

What Is Information Security?

Components of

Information Security Architecture

Cyber Crime in the News

3

Page 4: Information Security for Small Business

Agenda (Continued)

Information Security for Small Business

Business Continuity &

Disaster Recovery Planning

Indentifying Business Critical Assets

Safeguarding Critical Assets

Highly Recommended IT Security Practices

4

Page 5: Information Security for Small Business

IT SECURITY &

BUSINESS WHOLENESS

5

Page 6: Information Security for Small Business

Maslow’s Hierarchy of Needs

• Being aware of one’s Wholeness keeps bad things from happening. A solid foundation must be built to advance. Understanding your environment, your health and activities helps one to continually perform a risk assessments and move to the next level.

• Self – Actualization – Being All You Can Be

• Esteem - Recognition for Good Work

• Love - Acceptance

• Safety & Security – Stability

• Needs – Air , Food, Water, Shelter

6

Page 7: Information Security for Small Business

Maslow’s Business Comparison

• Maslow’s Hierarchy of Needs can be applied to building a successful business. IT Security is a foundation that businesses must build upon to lower IT Security risks, which can help your business gain a competitive edge.

• Self – Actualization – Meeting the Mission Statement

• Esteem - Recognition in Market Place

• Love - Acceptance by Clients or Customers

• Safety & Security – IT Security & Insurance

• Needs – Capital & People

7

Page 8: Information Security for Small Business

Importance of Small Businesses

• Statistic:• There are over 26

million small businesses

in the U.S.Source: NIST

8

Page 9: Information Security for Small Business

What Is At Stake?

• Your Business!• Your business is at risk of being

damaged due to:

• Financial loss

• Lawsuits

• Reputation loss

• loss of market share

• Theft of its technology , resources

and products

• Denial of service attacks

• Blackmail

9

Page 10: Information Security for Small Business

WHAT IS

INFORMATION SECURITY?

10

Page 11: Information Security for Small Business

What Is Information Security?

• Protecting your information, technology, property, products and people, thus protecting your business.

• The Information Security Triad is the foundation for Information Security and is based on concepts and principles known as CIA.

• Confidentiality

• Integrity

• Availability

11

Page 12: Information Security for Small Business

What Is Information Security?

• Confidentiality• Concept of protecting

information from improper disclosure and protecting the secrecy and privacy of sensitive data so that the intellectual property and reputation of an organization is not damaged and that data related to individuals is not released in violation of regulations or the privacy policy of the organization.

- From the CISSP® CBK®

12

Page 13: Information Security for Small Business

What Is Information Security?

• Integrity• Addresses two objects, which

are protecting data and

processes from improper

modification, and ensuring the

operations of the information is

reliable and performing as

expected.

- From the CISSP® CBK®

13

Page 14: Information Security for Small Business

What Is Information Security?

• Availability• The concept of ensuring

that the systems and data can be accessed when required. Availability is impacted by human error, cabling problems, software bug, hardware failures, loss of skilled staff, malicious code, and the many other threats that can render a system un-usable or unreliable.

- From the CISSP® CBK®:

14

Page 15: Information Security for Small Business

COMPONENTS OF

INFORMATION SECURITY

ARCHITECTURE

15

Page 16: Information Security for Small Business

Components of Information

Security Architecture

• The process of instituting a complete information security solution to the architecture of a business, ensuring the security of business information at every point in the architecture.

• People

• Processes

• Technology

16

People

TechnologyProcesses

Page 17: Information Security for Small Business

Components of Information

Security Architecture

• People• People are the weakest

link of a business’ process.

• You all know why!

17

Page 18: Information Security for Small Business

Components of Information

Security Architecture

• Processes• The operational aspects of

small business.

Safeguards can be

automated or manual.

18

Page 19: Information Security for Small Business

Components of Information

Security Architecture

• Technology• All of the tools, applications,

software, and infrastructure that allows a business process to work and perform efficiently. Thus as a business owner you must ensure that you have adequate logical controls in place to help you stay on track with your business’ mission or purpose.

19

Page 20: Information Security for Small Business

CYBER CRIME

IN THE NEWS

20

Page 21: Information Security for Small Business

Who Are The Actors?

• Their Roles:• Experimenters

• Hacktivists

• Cyber criminals

• Information Warriors

• Employees

• Dumpster divers

• Natural disasters

• Terrorist activities

21

Page 22: Information Security for Small Business

Who Are The Actors?

• Malicious Code!• Key loggers – Stealing

your keystrokes

• Viruses

• Denial of service

• Turning your computer

into a zombie aka “Bot”

22

Page 23: Information Security for Small Business

Cyber Crime In the News

23

Page 24: Information Security for Small Business

•Insider threats are responsible for over 80% of small business issues.

•There are over 70,000 active viruses ; and exponentially growing

•Information Security threats can damage or destroy small business

•33% businesses with 100 employees or less had a computer incident

Source: NIST

24

Cyber Crime Statistics!

Page 25: Information Security for Small Business

Small Business Cyber Crime Report•42 % of businesses has a Laptop theft

•44% of businesses suffered from Insider Abuse

•21% of businesses reported Denial of Service

•50% of businesses detected a viruses

•20% of business systems became a “Bot”Source: Computer Security Institute Survey

25

Cyber Crime Statistics!

Page 26: Information Security for Small Business

Reported Data Breaches•2007 - there were 445 data breaches reported

•2008 – there were 656 data breaches reported

•2009 – approx. 392 data breaches reported.

Source: October 9, 2009 USAToday

26

Cyber Crime Statistics!

Page 27: Information Security for Small Business

27

Chronology of Data Breacheswww.privacyrights.org

Page 28: Information Security for Small Business

28

Chronology of Data Breacheswww.privacyrights.org

The 354,537,108 indicates the total number of records

compromised

Page 29: Information Security for Small Business

BUSINESS CONTINUITY AND

DISASTER RECOVERY PLANNING

29

Page 30: Information Security for Small Business

Contingency and Disaster Recover planning considerations

• What happens if there is a disaster (flood, fire, tornado, etc) or a contingency (power outage,

sewer backup, accidental sprinkler activation, etc)? Do you have a plan for restoring business

operations during or after a disaster or a contingency? Since we all experience power outages or

brownouts from time to time, do you have Uninterruptible Power Supplies (UPS) on each of your

computers and critical network components? They allow you to work through short power outages

and to save your data when the electricity goes off.

• Conduct an inventory of all information used in running your business.

• Do you know where each type of information is located (on which computer or server)?

• Have you prioritized your business information so that you know which type of information is most

critical to the operation of your business – and, therefore, which type of information must be

restored first in order to run your most critical operations?

• If you have never (or not recently) done a full inventory of your important business information,

now is the time. For a very small business, this shouldn’t take longer than a few hours. For a

larger small business, this might take from a day to a week or so.

• While you are doing this inventory, ensure that the information is prioritized relative to importance

for the entire business, not necessarily for a single part of the business. When you have your

prioritized information inventory (on an electronic spreadsheet), add three columns to address the

kind of protection that each type of information needs. Some information will need protection for

confidentiality, some for integrity, and some for availability.

30

Business Continuity & Disaster Recovery Planning

NIST IT Security Fundamentals For Small Business

Page 31: Information Security for Small Business

IDENTIFYING BUSINESS

CRITICAL ASSETS

31

Page 32: Information Security for Small Business

Identifying Business Critical Assets

32

Page 33: Information Security for Small Business

Identifying Business Critical Assets

33

Page 34: Information Security for Small Business

Identifying Business Critical Assets

34

Page 35: Information Security for Small Business

Actions for The Business Owner To Take

35

• Identify what threats are a danger to your business? Many threats

are found in a specific geographic area – what is a common threat

in your area?

• As you read/research your trade/professional publications, take

note of the data security issues covered in these publications. Ask

yourself “Is my business vulnerable to something like this? If so,

what have others done that I could copy to protect my business?”

• As you network with your peers, talk cyber security issues. Give

and get advice, hints, tips, etc.

• Make every effort to stay in touch with and on top of every threat or

incident that does or could affect your business.

• Join InfraGard to get critical information about current threats in

your local area (and to act as eyes and ears to help protect our

nation!).

• (www.infragard.net - membership application form is online –

membership is free in most areas of our nation)

Page 36: Information Security for Small Business

SAFEGUARDING

CRITICAL ASSETS

36

Page 37: Information Security for Small Business

Safeguarding Critical Assets

• The “Absolutely Necessary” actions that a small business should take to protect its information, systems, and networks.

• People

• Processes

• Technology

37

Page 38: Information Security for Small Business

Safeguarding Critical Assets

• People• People are the weakest link of the three

components of Information Security!

38

Page 39: Information Security for Small Business

Safeguarding Critical Assets

• People1. Control physical access to your computers

and network hardware

• Do not allow unauthorized persons to have physical access to any of your business PCs.

• Lock up laptops when they are not in use.

• Control who has access to your systems and networks, this includes cleaning crews. No one should be able to walk into your office space without being challenged by an employee.

• Vendors and service persons should provide appropriate identification.

2. Limit employee access to data and information, and limit authority to install software.

• Employees should not install unauthorized software .

• Do not provide access to all data to any employee,

• Only give employee enough access privileges necessary to perform job.

• Do not allow a single individual to both initiate and approve a transaction (financial or otherwise).

39

Page 40: Information Security for Small Business

Safeguarding Critical Assets

• Processes• The operational aspects of small business;

needs checks and balances aka controls.

40

Page 41: Information Security for Small Business

Safeguarding Critical Assets

• Processes1. Backup important business data and

information.• Recommended to be done automatically.

• Backup can be done inexpensively if copied to another hard drive that can hold 52 weeks of backups; 500GB should be sufficient for most businesses.

• Backups should be performed at a minimum weekly, but better if done daily.

• A full backup should be performed once a month and taken off site incase of a fire, flood, theft or other disaster.

• Portable USB Drive is recommended ; 1000GB.

• Regularly test your backup data.

2. Train your employees on basic security principles• Employees using any programs containing sensitive

information should be trained on how to properly protect it.

• Employees should review computer usage policies on the 1st day of work.

• Train them about expectations concerning limited use of telephones, printers and other business resources.

• After training they should sign a a statement that they understand these policies and the penalties for violation of business policies.

41

Page 42: Information Security for Small Business

Safeguarding Critical Assets

• Processes3. Requires individual user accounts for each

employee on business computers and for business applications.

• Create an account for all individual users and require strong passwords consisting of 8-10 characters in length, made up of random letters, numbers and special characters.

• To protect information and systems, employees should not operate computers with administrative privileges.

• Malicious code will gain the same privileges and install itself on a system if the user is using an account with administrative privileges.

• Password should never be shared and changed every 3 months.

4. Train your employees on basic security principles• Employees using any programs containing sensitive

information should be trained on how to properly protect it.

• Employees should review computer usage policies on the 1st day of work..

• Train them about expectations concerning limited use of telephones, printers and other business resources.

• After training they should sign a a statement that they understand these policies and the penalties for violation of business policies.

42

Page 43: Information Security for Small Business

Safeguarding Critical Assets

• Technology1. Protect information, systems, networks

from damage by viruses, spyware, and other malicious code

• Install anti-virus software & anti-spyware software on all computer systems.

• It is recommended to have the anti-virus software, spyware and malicious code software to update automatically; frequently.

• Obtain copies for employees home computers.

2. Provide security for your internet connection(s)

• Install operational firewall between your internal network and the Internet.

• Ensure that your employees home PCs have a firewall installed between your/ their systems(s) and the Internet.

• Change the administrative password upon installation and regularly thereafter.

2. Good idea to change the administrator name too.

43

Page 44: Information Security for Small Business

Safeguarding Critical Assets

• Technology3. Secure your wireless access points

and networks.

• Change default administrator password.

• Set wireless device to not broadcast its

Service Set Identifier (SSID).

• Recommended encryption is WiFi Protected

Access 2 (WPA-2) using Advanced Encryption

Standard (AES).

• NOTE: WEP (Wired-Equivalent Privacy) is not

a good wireless security protocol.

• It is recommended to configure Desktop /

Server Operating systems to update

automatically.

44

Page 45: Information Security for Small Business

Safeguarding Critical Assets

• Technology4. Install and activate software firewalls on

all of your business systems.• If you use Microsoft Windows XP or higher it will

have a firewall included.

• Make sure that the firewall is turned on.

• Ensure that your employees home PCs have a firewall and turned on as well.

5. Patch your operating systems and applications.

• Microsoft releases new patches on the second Tuesday of each month; sooner for serious threats.

• It is recommended to configure systems to update automatically.

• Ensure employees home PCs are configured to update automatically as well.

• If you have many systems consider purchasing a product that can manage the process for your business.

• Update Microsoft Office regularly.

45

Page 46: Information Security for Small Business

HIGHLY RECOMMENDED

IT SECURITY PRACTICES

46

Page 47: Information Security for Small Business

47

Every business needs written policies to identify acceptable

practices and expectations for business operations.

•Some policies will be related to human resources.

•Some will relate to expected employee practices for using business

resources, such as telephones, computers, printers, fax machines, and

Internet access.

•Legal and regulatory requirements may also require certain policies to be

put in place and enforced.

•Policies for information, computer, network, and Internet security, should

communicate clearly to employees the expectations that the business

management has for appropriate use.

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 48: Information Security for Small Business

48

•These policies should identify those information and other resources which

are important to management and should clearly describe how

management expects those resources to be used and protected by all

employees.

•Policies should be communicated clearly to each employee and all

employees should sign a statement agreeing that they have read the

policies, that they will follow the policies, and that they understand the

possible penalties for violating those policies.

•This will help management to hold employees accountable for violation of

the businesses policies.

•There should be penalties for disregarding business policies. And, those

penalties should be enforced fairly and consistently for everyone in the

business that violates the policies of the business.

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 49: Information Security for Small Business

• Security emails requesting sensitive information.

Security concerns about email attachments and emails requesting sensitive

information.

• Do not open email attachments unless you are expecting the email with the

attachment and you trust the sender. If you are not sure why someone sent you and

email with attachments or links. Call them or email them back asking questions.

• Be cautious of emails asking for sensitive personal or financial information –

regardless of who the email appears to be from. No responsible business will ask for

sensitive information in an email.

Security concerns about web links in email, instant messages, social media, or

other means.

• Do not click on links in email messages. Recently, scams are in the form of

embedded links in emails. Once a recipient clicks on the link, malicious software (for

example, key stroke logging software) is installed on the user’s computer. Don’t do it

unless you know what the web link connects to and you trust the person who sent the

email to you.

49

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 50: Information Security for Small Business

Security concerns about popup windows and other hacker tricks. • When connected to and using the Internet, do not respond to popup windows requesting that you

to click “ok” for anything.

• If a window pops up on your screen informing you that you have a virus or spyware and

suggesting that you download an antivirus or antispyware program to take care of it, close the

popup window by selecting the X in the upper right corner of the popup window.

• Hackers are known to scatter infected USB drives with provocative labels in public places where

their target business’s employees hang out, knowing that curious individuals will pick them up and

take them back to their office system to “see what’s on them.” What is on them is generally

malicious code which installs a spy program or remote control program on the computer. Teach

your employees to not bring USB drives into the office and plug them into your business

computers (or take them home and plug into their home systems). It is a good idea to disable the

“AutoRun” feature for the USB ports on your business computers to help prevent such malicious

programs from running.

50

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 51: Information Security for Small Business

Security considerations for web surfing.

• No one should surf the web using a user account which has administrative privileges.

• It is best to set up a special account with “guest” (limited) privileges to avoid this vulnerability.

Issues in downloading software from the Internet.

• Do not download software from any unknown web page.

• Only those web pages belonging to businesses with which you have a trusted business relationship should be considered reasonably safe for downloading software. Such trusted sites would include the Microsoft Update web page where you would get patches and updates for various versions of the Windows operating system and Microsoft Office or other similar software. Most other web pages should be viewed with suspicion.

• Be very careful if you decide to use freeware or shareware from a source on the web. Most of these do not come with technical support and some are deliberately crippled so that you do not have the full functionality you might be led to believe will be provided.

51

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 52: Information Security for Small Business

Doing online business or banking more securely.

• Online business/commerce/banking should only be done using a secure browser connection. This will normally be indicated by a small lock visible in the lower right corner of your web browser window.

• After any online commerce or banking session, erase your web browser cache, temporary internet files, cookies, and history so that if your system is compromised, that information will not be on your system to be stolen by the individual hacker or malware program.

Recommended personnel practices in hiring employees.

• When hiring new employees, conduct a comprehensive background check before making a job offer.

• Ensure that you do criminal background checks on all prospective new employees.

• If possible, it is a good idea to do a credit check on prospective employees. This is especially true if they will be handling your business funds. Do your homework – call their references and former employers.

• Note: It is also an excellent idea for you the business owner to do a background check of yourself. Many people become aware that they are victims of identity theft only after they do a background check on themselves and find arrest records and unusual previous addresses where they never lived.

52

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 53: Information Security for Small Business

• How to protect against Social Engineering.• Social engineering is a personal or electronic attempt to obtain unauthorized information or

access to systems/facilities or sensitive areas by manipulating people.

• The social engineer researches the organization to learn names, titles, responsibilities, and publically available personal identification information. Then the social engineer usually calls the organization’s receptionist or help desk with a believable, but made-up story designed to convince the person that the social engineer is someone in, or associated with, the organization and needs information or system access which the organization’s employee can provide and will feel obligated to provide.

• Train employees to protect against social engineering techniques, employees must be taught to be helpful, but vigilant when someone calls in for help and asks for information or special system access. The employee must first authenticate the caller by asking for identification information that only the person who is in or associated with the organization would know.

• If the individual is not able to provide such information, then the employee should politely, but firmly refuse to provide what has been requested by the social engineer.

• The employee should then notify management of the attempt to obtain information or system access.

53

Highly Recommended IT Security Practices!

Business Policies Should Be In Place

Page 54: Information Security for Small Business

How to dispose of old computers and media.

• When disposing of old business computers, remove the hard disks and destroy

them. The destruction can be done by taking apart the disk and beating the hard disk

platters with a hammer.

• It is very common for small businesses to discard old computers and media without

destroying the computers’ hard disks or the media. Sensitive business and personal

information is regularly found on computers purchased on Ebay, thrift shops,

Goodwill, etc, much to the embarrassment of the small businesses involved (and

much to the annoyance of customers or employees whose sensitive data is

compromised).

• Consider Using Full Disk Encryption if you handle sensitive data and information.

54

Highly Recommended IT Security Practices!NIST IT Security Fundamentals For Small Business

Page 55: Information Security for Small Business

Small Business Information Security : The Fundamentals (Security Guide for Small Business)

http://csrc.nist.gov/publications/drafts/ir-7621/draft-nistir-7621.pdf

Small Business Center Documents

http://csrc.nist.gov/groups/SMA/sbc/library.html

InfraGard – FBI Sponsored Cyber Security Program

http://www.infragard.net

Protecting Personal information

www.ftc.gov/infosecurity

Computer Security Training, Network Research & Resources

www.SANS.org

On Guard Online - Protect Your Personal Information

http://www.onguardonline.gov/

55

Information Security Resources for Small Business

Page 56: Information Security for Small Business

Closing Remarks

• Remember the IT Security Triad!

• The Information Security Triad is the foundation for Information Security and is based on concepts and principles known as CIA.

• Confidentiality

• Integrity

• Availability

56

Page 57: Information Security for Small Business

References

57

Surviving Security—How to Integrate People, Process and Technology, 2nd Edition

http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=27320&TEMPLATE=/ContentMan

agement/ContentDisplay.cfm

Introduction to the Business Model for Information Security , 2009 ISACA

http://www.isaca.org

Small Business Information Security : The Fundamentals (Security Guide for Small

Business)

http://www.nist.gov/cgi-bin//get_pdf.cgi?pub_id=903080

Small Business Center Documents

http://csrc.nist.gov/groups/SMA/sbc/library.html

InterHack,- Information Security: Friend or Foe, 2002

http://web.interhack.com/publications/whatis-security.pdf

Page 58: Information Security for Small Business

58

Contact Information

Julius Clark

Email: [email protected]

Tel: 704-953-379

Blog:

www.clarkthoughtleadership.blogspot.com