oneM2M advances worldwide interoperability agenda » Sophia Antipolis, France: At their 18th Technical Plenary meeting held in Philadelphia, PA, on 20-24... Pulse Secure signs Arrow to Distribute its Mobile ... » Twyford, UK:  Pulse Secure and Arrow in Europe have signed a distribution agreement under which Arr... Cubic upgrades P5 combat training system for inc... » SAN DIEGO: Cubic Global Defense has announced the next evolution of its P5 Combat Training System (P... Wandera partners with Three to provide mobile data... » London and Ireland: Wandera together with enterprise mobility specialist CWSI, has announced a strat... DHF to deliver powered gate safety message at C... » Vital guidance on powered gate safety is being given to local authority officials, building and cons... Secunia Quarterly Country Report: vulnerable PDF r... » Secunia has published its quarterly country report for the UK. The data shows that PDF readers conti... Circle Housing Property introduces Skyguard's 'My... » Vigilance can report that Circle Housing Property Services has introduced ‘MySOS Mandown’ personal s... Ark Data Centres awarded BT contract » Corsham, Wiltshire:  BT has selected Ark Data Centres Limited as a new UK data centre supplier and i... Wargaming reveals WG Labs » Wargaming has launched WG Labs, a lean and agile platform designed to foster innovation within the v... Criminals spying on high-value targets in Ukrain... » ESET is today issuing an analysis on Operation Potao Express, the cyberespionage group behind the Wi...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

In recent months it has been hard to avoid hearing the latest business buzz phrase of cybersecurity. Unfortunately, despite searches of popular retail sites, fully functional sonic screw drivers, as used by Doctor Who to defeat the cybermen, are not yet available. However, three key weapons that are available for cybersecurity are:

  • Information Security: Ensures that Confidentiality, Integrity and Availability are appropriately addressed;
  • Application Security: Provides assurance that the systems and applications are not vulnerable; and
  • End-User Education: Potentially the most powerful weapon to prevent an attack taking hold and causing damage.

Internet forums are littered with reports of companies who have not grasped the need for appropriate cybersecurity thereby suffering losses financially and damage to their reputation.

The types of attack can be broadly grouped into three categories:

  • Target of Opportunity - these instances are identified as having weak security but information of value to the attacker;
  • Drive by Target - these instances include phishing, encouraging employees to download harmful software by clicking on an internet link or downloading an attachment; and
  • Target of Choice - these instances may have strong security controls but the attacker is determined to obtain information or disrupt the business of the organisation. In this instance there may be multiple types of attack used to obtain the desired result.

As with all business decisions the amount of spend on protection has to be justified against the threat and cost of an attack. Current statistics show that the volume of attacks is intensifying and the attacks themselves are becoming more sophisticated.

At the forefront of the battle are employees, contractors, partners and vendors as they are the users of the systems and applications that access the company data. By developing an evolutionary awareness programme for all users the threat level can be reduced. An effective security awareness programme addresses three key areas:

  • It is regularly reviewed and updated as the social engineering attacks adapt and become increasingly sophisticated;
  • It is visible and repeated regularly, as it has been seen in experiments that despite telling people not to click on attachments the advice is forgotten quickly; and
  • Employees know who to tell when they are subjected to a social engineering attack so that the incident can be captured and lessons learnt.

Application Security was identified as the top threat to information security professionals in the 2011 (ISC)2 Global Information Security Workforce study. Therefore it is worth taking time and effort to ensure that exposure in this area is minimised. Key areas to be considered are:

  • Ensuring that applications and systems are updated with the latest patches and known vulnerabilities are addressed is a key step in ensuring that there is no easy access for a potential attacker;
  • Modifying default vendor supplied usernames and passwords on internet accessible devices; and
  • Incorporating security requirements into the software development process.

Since 1995 the British Standards Industry has published Information Security Management guidelines and these have developed into the ISO 27000 series. The series provides best practice recommendations on information security management, risks and controls. Many companies are finding that the benefits provided by alignment with the standards include:

  • A quality based methodology to evaluate, implement, maintain and manage the information security program;
  • Information Risk management which provides a mechanism to integrate information security into the companys overall risk management strategy; and
  • Improved image as it demonstrates to customers that the security of their information is paramount.

Many companies believe that it’s not a case of if they are attacked but when, therefore being prepared by having a crisis management plan is essential. This incorporates the business continuity/disaster recovery plan to recover the business service and also enables the media interest to be addressed.

There are many drivers for stealing corporate data, including both focussed and opportunist attacks and whilst the attackers are dynamic and quickly evolving some companies are languid in their response. The approach to addressing cybersecurity requires a continuous cycle involving planning, doing, checking and acting. Whilst this approach may not provide a wholly risk free cybersecurity environment it will provide the reassurance that the likelihood of reading on social media or industry web sites about how your organisation was breached will have been reduced.