Learning from others
by Brian Honan - CEO BH Consulting - Wednesday, 23 April 2014.
The old saying ďone manís misfortune is another manís gainĒ is eminently applicable in the information security industry. When an organization becomes the victim of a security breach, its misfortune should be viewed as an opportunity for the rest of us to learn how to improve the security of our own systems.

In the last few months, news outlets have covered a number of security breaches of some very high profile organizations such as Target, Neiman Marcus, KT Corp, and Forbes (to name but a few).

Instead of reading these reports and breathing a sigh of relief that our organization was not targeted, we should look to see what we can learn from those incidents to better prepare our defenses.

A system is made up of many components. When it comes to information security systems, technology is just one of those components. We need to look beyond the technical aspects of these attacks, and analyze the business, people and process elements that also contributed to the breach.

Here are some of the things that struck me as a good idea while reading the various media coverage of the aforementioned attacks:

1. Conduct a risk assessment for all your systems to determine how the evolving threat landscape could impact them. A lot of the attacks targeted personal information such as user names, email addresses and passwords. If any of your systems store such data, you should reassess the risk profile for those systems and implement appropriate controls.

2. A lot of the recent attacks targeted usersí email addresses, passwords and credit card details. So, have you reviewed lately how well you are securing that information? Is your password database secured? Are the permissions protecting the password file/database sufficient?

3. A number of recent attacks were the result of exploitation of application vulnerabilities (e.g. SQL Injection). How confident are you that all your systems are not vulnerable to web application attacks? Now is the time for you and your development team to become familiar with the OWASP top 10 web application vulnerabilities and to develop a program to eradicate them from your applications. You should do this as a result of your risk assessment and target the more critical systems first.

4. Some of the organizations that were breached did not know they had been successfully targeted until the attackers posted the stolen information onto the web. How confident are you that you could detect an attack against your organization? How well do you monitor and review your logs for suspicious behavior? Are you sure that your log files and audit trails are capturing all the information you need? Now would be a good time to review your log management strategy so that you could answer those questions positively.

5. Has your organization appointed someone responsible for information security and, if they have, does that person have the appropriate authority and resources to fill that role effectively?

6. Lack of communication, transparency and openness about the attacks has been the heaviest criticism leveled against some of the victims. Is your organization prepared for a breach? Would you be able to quickly identify the compromised assets and the impact the attack could have on your organization and your customers? Do you have people trained in how to communicate with the press, staff and customers in the event of a breach?

Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. Itís not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //