Top 10 issues in IT security for 2014.docx

7
Top 10 issues in IT security for 201 Share this article: facebook twitter linkedin google From banking hacks and malicious mobile apps to insider leaks and a serious data breach each month, 2014 promises to a challenging year CISOs Top 10 issues in IT security for 2014 From banking hacks and malicious mobile apps to insider leaks 2014 promises to a interesting but challenging year for !IS"s# $ere SC!aga"ine#$com looks at the issues coming into %iew# 1. Insider threat isn't going away Former !I& contractor 'dward Snowden may be holed up in (ussia but his influence o%er the IT security sector is still tangible casting a shaddow o%er 2014# That)s especially true in the corporate world with large organisations fearful t own employees could readily leak data to unauthorised outside sources# *!ompanies should know who they are gi%ing their data to and how it is being protected* said Tim (yan managing director and cyber in%estigations practice le +S,based risk mitigation and response firm -roll# *This re.uires technical proce and legal re%iews#* (yan suggests that the /insider threat is still %ery real and belie%es that there others like Snowden across a range of organisations#

Transcript of Top 10 issues in IT security for 2014.docx

Top 10 issues in IT security for 2014Share this article: facebook twitter linkedin googleFrom banking hacks and malicious mobile apps to insider leaks and a serious data breach each month, 2014 promises to a challenging year for CISOs.

Top 10 issues in IT security for 2014From banking hacks and malicious mobile apps to insider leaks, 2014 promises to an interesting but challenging year for CISOs. Here,SCMagazineUK.comlooks at the issues coming into view.1. Insider threat isn't going awayFormer CIA contractor Edward Snowden may be holed up in Russia but his influence over the IT security sector is still tangible, casting a shaddow over 2014.That's especially true in the corporate world, with large organisations fearful that their own employees could readily leak data to unauthorised, outside sources."Companies should know who they are giving their data to and how it is being protected," said Tim Ryan, managing director and cyber investigations practice leader at US-based risk mitigation and response firmKroll. "This requires technical, procedural and legal reviews."Ryan suggests that the insider threat is still very real and believes that there may be others like Snowden across a range of organisations.There's a tremendous amount of data compromised today where the act is never discovered or disclosed."People discount the insider threat because it doesn't make the news. The insider threat is insidious and complex. Thwarting it requires collaboration by general counsel, information security, and human resources."Malcolm Marshall, UK and global leader of theKPMGInformation Protection and Business Resilience team, added that the insider threat could, however,boost Internet privacy.Snowden's revelations have triggered a privacy debate which will continue to rage in 2014, Marshall toldSCMagazineUK.com. Expect more disclosures, more calls for greater transparency over government actions, and more efforts by the Internet giants to persuade customers that their data is secure.2. Cyber attacks, including government-sponsored,continue; education and standards prioritisedGovernment states are stepping up their cyber efforts all over the world, both for offensive and defensive purposes. As just such an example, North Korea reportedly spent some 470 million on a wave of cyber attacks against South Korea between March and June 2013.2014 will see a continuation of these kinds of efforts, especially with companies and governments increasingly understanding the full repercussions of a cyber attack. Some will even reportedly carry out state-sponsored attacks.Within the next couple of years, we will experience an increasing number of cyber attacks resulting in militaristic and economic damage, said Jarno Limnell, director of cyber security atStonesoft, when speaking toSCMagazineUK.com.As states compete to become credible world players we can expect to see further announcements by various states regarding their offensive and defensive strategies. Cyber is the new battlefield, and the fifth element of warfare. As such, it's likely that future conflicts will involve cyber battles and because of this, states will be - and already are - pouring a huge range of resources into developing defence and offence capabilities for cyber war.Limnell added that cyber security education will come into focus in 2014, while KPMG's John Marshall believes that the cyber security threat will see the introduction of voluntary compliance.As governments worry about the scale of the cyber security threat, we can expect to see more national standards emerge, and greater pressure for voluntary compliance, he said.The US NIST cyber security framework and the UK government's kitemark' are just two examples. On the back of emerging standards we will see the cyber insurance market develop and begin to provide market incentives for compliance, whether that is a willingness to insure or reduce premiums. Non-compliance will also lead to a legal debate over liability for incidents. 3. Enterprises deploy faster response and recovery solutionsKroll managing director and Cyber Investigations practice leader Tim Ryan says that companies will look for technology solutions that enable them to react to issues faster than ever before in 2014."We've seen a dramatic improvement in response technology over the last year,"says Ryan. "Companies have never had a better opportunity to enhance their existing protocols with a methodology that can mean an informed and timely response.""Companies will gain a better understanding of their actual breach risks, how the breach could actually affect their customers, and the best way to remedy those specific risks and provide better protection to affected customers," he adds.4. 'Social' the new frontier for cyber crimeCyber criminals will increasingly attack social platforms in 2014.We predict many of the cyber crime tactics that are successful when targeting social networking users will be applied in new, innovative ways within professional social networks, reads aforecast reportfrom Websense. Indeed, other studies suggest that the frequency of cyber attacks will be so common that consumers will face data breach fatigue, meaning they'll be less likely to protect themselves.Websense cited one example of a fake LinkedIn user pinpointing users for an upcoming phishing campaign, and said that attackers lure in execs by sending messages with innocuous titles like Invitation to connect on LinkedIn and Dear customer.5. DDoS attacks get evenbigger but Botnets stick aroundDistributed denial of service (DDoS) attacks were a big deal in 2013 and could be even more prominent in 2014 NASDAQ temporarily went down as a result of an attack in August, while Dutch web hosting company CyberBunker caused a global disruption of the World Wide Web with a massive DDoS attack of its own.If that wasn't bad enough, one study from Corero reveals that most organisations lack an appropriate DDoS response plan, and security experts now warn that the severity of these attacks could get worse over the next 12 months.One thing that I have noticed over the past year is that almost all successful DDoS attacks have had massive traffic volumes associated with them, Joakim Sundberg, security solution architect atF5 Networks, toldSCMagazineUK.com. However, these attacks have not been very smart and volumetric scrubbing, combined with access control, has, in most cases, solved the problems.Volume, as an attack vector itself, will become less relevant as time goes on.Instead, I see two main themes emerging. Firstly, over the next 12 months I believe we will see hackers developing more intelligent tools that are capable of adapting to and using the weaknesses in the protection systems of specific targets. Secondly, we will start to see underground organisations refining the user credentials stolen from platforms like Facebook, Gmail and Twitter. There is a huge opportunity for hackers to use stolen passwords in their attacks provided they can be put in the right context.These smarter, more targeted DDoS attacks which leverage context and refined user credentials for specific DDoS campaigns will be a lot more commonplace in 2014.Sophosglobal head of security research James Lyne believes that botnets still curry favour with cyber criminals.I know we're talking about stealthier APTs but that doesn't eradicate the threat of the old botnet adversary, he toldSCMagazineUK.com, before adding the ensuing visibility of ZeroAccess, botnet payloads and other botnets that can do everything from mining bitcoins to credit card fraud, is something that needs monitoring.In the middle of 2013, there was a dip in ZeroAccess botnets, after a sinkhole traffic effort across the whole industry, said Lyne. But after a short period of time the attacks were stronger than before the action was taken.Lyne says that hackers are now squaring up to businesses, something he puts down to greater skills and more tools.They've designed their infrastructure to make [their botnet] immune from sinkhole attacks and moved around the static [security] infrastructure.The average cyber criminal has upped their skill level or gained access to new and better tools. In 2014, there will be more players, more competition and more innovation. The quality [of attacks] is going to increase.6. Android to see amalware explosionGoogle's Android is a constant concern as far as security is concerned, but Lyne thinks that the threats will get worse in 2014.In 2013, we've seen a set of cyber trends that are now beginning to take off, he said. There are now more malware attacks, and they're actually challenging to deal with, Lyne toldSCMagazineUK.com.Now, apps are encrypted to command and control (C&C) as used in the PC world and detection is more difficult. That's actually starting now.Lyne urged businesses to put employees on awareness training, employ basic configuration to enforce encryption and restrict downloads to being only from trusted app stores, as well as forcing encryption. He added that firms should have a good hard look at anti-malware and anti-virus solutions.7. Internet of Things extends threats to 'dumb' platformsInternet of Things is a hot new term which describes how devices are interconnected via the internet, but it will be under the microscope as far as security is concerned in 2014.You can expect dumb things will get smarter in 2014,writesSymantec researcher Kevin Haley.Withmillionsof devices connected to the Internetand in many cases running an embedded operatingsystemin 2014, they will become a magnet for hackers. Security researchers have already demonstrated attacks against smart televisions, medical equipment and security cameras. Already we've seen baby monitors attacked and traffic was shut down on a major tunnel in Israel, reportedly due to hackers accessing computer systems via a security camera system.Major software vendors have figured out how to notify customers and get patches for vulnerabilities to them. The companies building gadgets that connect to the Internet don't even realise they have an oncoming security problem.He added that these systems are not just vulnerable to attacks, but also have little way of notifying consumers and businesses when they are discovered.

8. Consumer products penetrate the perimeter, boost demand forsecurity protectionThe increasing deluge of smartphones, tablets and other devices into businesses may be improving employee productivity, but they represent a very real and growing security risk.The security perimeter is a more penetrable boundary and cyber criminals can take advantage of multiple attack vectors to gain access to a company's network, said Sam Maccherola, VP of sales and general manager for EMEA atGuidance Software, in an interview withSCMagazineUK.com.These points of vulnerability-mobile devices, USB drives and Bluetooth speakers- will multiply through next year,making it difficult for organisations to keep track ofall thedifferent entry points.Just as cybercriminals will exploit the increasing consumerisation of IT, as part of the fight backwe're likely to see organisations focused on the extension of security protection to non-corporate owned devices to shore up their defences."We will see an increased volume of malware targeting hardware with cybercriminals attacking beneath the operating system. The entry route to infect the network could be mobile devices as cybercriminals use smart phones or USB devices to gain access to PCs via Wi-Fi."Banks continue to be susceptible to advanced persistent threats (APTs), as well as Man-in-the-Middle attacks which make two-step verification measures inadequate.9. Regional clouds proliferatePerhaps unsurprisingly in light of the National Security Agency (NSA) tapping data centres and cloud storage providers in the US, security analysts foresee the rise of regional cloud centres.Writing for Microsoft's officialblog, Trustworthy Computing director Jeff Jones said that this represents an opportunity for vendors.In the wake of heightened concerns about unauthorised access to data, we will see the emergence and broad promotion of regional cloud service offerings, wrote Jones.The increased sensitivity to both legal data access and intelligence monitoring will be seen as a market opportunity that will be actioned in two ways start-ups and existing providers.Regional start-ups will see a new opportunity to compete against global providers, while existing providers will develop and offer services delivered from regionally-based data centres in an effort to allay concerns and provide increased customer choice.10. Criminals prey on Windows XP vulnerabilitiesMicrosoft is dropping support for Windows XP in April 2014, and that means no more patches and probably a lot more cyber attacks.Once Microsoft halts support of [Windows] XP, companies running the OS will not only be faced with huge custom support costs, but will also expand their attack vector, becoming potential targets for new malware and vulnerabilities targeting unpatched systems,bloggedAvecto's Andrew Avenessian.The coming end of support for Windows XP combined with Java 6 (which is already out of support) and the issue of how broadly these legacy platforms are deployed means we are likely looking at the largest number of un-patched and attackable vulnerabilities in history, wrote Trend Micro's Christopher Budd on ablog post, adding that 20 percentof PCs still run the dated operating system. Just as concerning, most ATMs have yet to transition away from XP.If that doesn't describe a perfect storm, I don't know what does, concludes Budd.