Digital Security for the Modern, Mobile Law Firm
Transcription
Digital Security for the Modern, Mobile Law Firm
Digital Security for the Modern, Mobile Law Firm Presented by Ken Jones OM02 Friday, 10/11/2013 1:30 PM - 2:30 PM OM02 - Digital Security for the Modern, Mobile Law Firm Ken Jones Senior Technology Architect Pileum Corporation Why Do We Need to be Concerned About Electronic Security? • Changes in the way we work – Increasingly Mobile World – Blur between Business and Personal Devices • Ease of obtaining hacking tools • Regulatory/Legal Requirements – Al least 44 states have Data Breach Notification laws – HIPAA, Sarbanes-Oxley Act (SOX); Payment Card Industry Data Security Standard (PCI DSS); Gramm-Leach-Bliley Act (GLB) Act; Electronic Fund Transfer Act, Regulation E (EFTA); Customs-Trade Partnership Against Terrorism (CTPAT); Free and Secure Trade Program (FAST); Children's Online Privacy Protection Act (COPPA); Fair and Accurate Credit Transaction Act (FACTA), including Red Flags Rule; Federal Rules of Civil Procedure (FRCP) 1 Why Do We Need to be Concerned About Electronic Security? • Fines – BlueCross BlueShield of Tennessee (BCBST) is being fined $1.5 million for a 2009 data breach in which unencrypted information on some one million BlueCross members was stolen. • Remediation Costs – BCBS already spent $17 million on investigation, notification and protection • Professional Liability insurance may not be enough – Cyber Risk Insurance may needed 2 It Can’t Happen to Me – Can It? • Hackers are real and persistent – "Nearly everyone will be hacked eventually," says Jon Callas, CTO for Entrust, "The measure of a company is how they respond." • Internal employees make up a large percentage of data loss scenarios • Most attorneys are more concerned about convenient access to data than security • Law firms are a “High Value” targets 3 Missing or Poor Communication Encryption Real World Example: TJX Companies Inc, December 2006 Data transmitted between two Marshall’s stores were not encrypted properly on a wireless network in Miami, FL. 94 million credit cards exposed Missing or Poor Communication Encryption • Danger: Data transmitted can easily be intercepted and seen by 3rd parties Danger Areas Possible Solutions Remote access without VPN (Remote Require VPN for all remote access Desktop or Terminal Server sessions) Hosted E-mail (POP/IMAP) Review E-mail Provider Encryption Options E-mail transmissions without encryption Configure TLS for e-mail transmission 4 Malware and Viruses Real World Examples: Stuxnet, 2010 Attack Iran's nuclear power program, but also shows how malware could be used for real-world service disruption. ESTsoft, July-August 2011 Attackers uploaded malware to a server used to update ESTsoft's ALZip compression application. The personal information of 35 million South Koreans was exposed. Malware and Viruses • Danger: Programs can transmit information from your PC to outside sources, or use your PC to attack or gather information. Danger Areas Possible Solutions Compromised web pages that infect visiting computers Next generation firewall with deep packet inspection Infected e-mail attachments Antivirus and Malware scanners on incoming e-mail Trojan programs (be aware of “free” programs) User education and block installation of non-business programs 5 New Malware Threat – Direct Ransom Lack of Visibility/Monitoring Real World Example: VeriSign, Throughout 2010 VeriSign was attacked but never informed anyone about the attacks. The incidents did not become public until 2011, through a SEC-mandated filing. “How many times were they breached? What attack vectors were used?” Verisign’s answer: “We don't know.“ 6 Lack of Visibility/Monitoring • Danger: Your systems may be under attack and you don’t know it. Survey Time! Question: How many of your have experienced an attempted data breach in the last 12 months! Answer: You all have! but may not know it! 7 Lack of Visibility/Monitoring • Danger: Your systems may be under attack and you don’t know it. Danger Areas Possible Solutions Any servers accessible via the Intrusion Prevention Systems plus Internet (e-mail, terminal server, FTP, monitoring/alerting systems etc) Any PC with Internet access Monitor and filter Internet connections (with notification) Lack of Security Testing Real World Examples: Heartland Payment Systems, March 2008 A SQL injection security hole was used to install spyware on Heartland's data systems. 134 million credit cards exposed CardSystems Solutions, June 2005 Hackers broke into CardSystems' database using an SQL Trojan attack and sent it back through an FTP. Hackers gained access to names, accounts numbers, and verification codes to more than 40 million card holders. 8 Lack of Security Testing • Danger: Almost two-thirds of data breaches in 2012 could be attributed to negligence/ human error (35%) and system glitches (29%), according to the annual Ponemon Global Cost of a Data Breach study. Danger Areas Possible Solutions Firewalls Review and test configuration Any server that provides services via the Internet (Web pages, FTP servers, e-mail servers, etc) Perform regular security assessments to locate and remediate security problems Data Partnerships with 3rd Parties Providing Services Real World Examples: Personal Experience - Company Not Disclosed A Medical billing company works with multiple hospitals and maintained connections to the hospitals that were “secure”. We did a security assessment for one of the hospitals and discovered that we could go from one hospital to the medical billing company and then into other hospital’s networks behind their firewalls! 9 Data Partnerships with 3rd Parties Providing Services • Danger: Data connections to 3rd parties or locations might be used as a bridge Danger Areas Possible Solutions 3rd Any configuration that allows parties to connect to your network Always connect to a firewall and use DMZ zones to limit access 3rd Parties working within your office Question and get answers to any (copy center, litigation support, vendor about their security policies billing, etc) and practices No Control or Management of Mobile Devices Real World Examples: Personal Experience - Company Not Disclosed Senior attorney took iPhone on vacation to China. They lost the phone while there with an active connection to firm’s email system. Firm had no way to wipe or block phone. (and they were not even notified about it for 3 weeks until the attorney returned to work) Personal Experience - Company Not Disclosed An attorney was experiencing a highly contested divorce. His wife took his iPad and donated it for spite. Too bad it still had client data on it. Firm had no way to wipe data. 10 No Control or Management of Mobile Devices • Danger: Sensitive data is stored on devices that regularly leave your firm, possibly with no passwords, encryption, or management. Danger Areas Possible Solutions No or poor password requirement Mobile device management tool Use of public internet exposes devices to hackers Personal firewall should be enabled Lost/Stolen devices Mobile device management tool Mixing of personal and firm data Keep them separate – require different accounts 11 Bringing Unnecessary Data Out of the Office Real World Example: Department of Veterans Affairs, May 2006 A laptop with an unencrypted national database was stolen from an employee’s home. Personal information including names, dates of birth, Social Security numbers, and other information for 26.5 million veterans, active-duty military personnel and spouses was lost. The VA estimated it would cost $100 million to $500 million to prevent and cover possible losses from the theft. Good news: The thief returned the laptop Bringing Unnecessary Data Out of the Office • Danger: It is easy to take large amounts of data out of the office on devices that can easily be lost or stolen. Danger Areas Possible Solutions Laptops/Flash Drives/Hard Drives with client information taken Outside the office Encrypt all hard drives in case they are lost/stolen User Education (don’t leave them in cars overnight) Data copied to home computers Use virtual desktops or terminal servers for remote access from nonfirm computers Business Center PC’s used for client business User training 12 Deliberate or Accidental Employee Actions Real World Examples: Fidelity National Information Services, July 2007 A database administrator of a FIS subsidiary was fired. Before he left he stole 3.2 million customer records including credit card, banking and personal information. He allegedly sold the data to a data broker, who in turn sold it to various marketing firms. AOL, August 6, 2006 AOL Research mistakenly posted info on one of its websites containing 20 million search keywords for more than 650,000 users over a three-month period. Data on more than 20 million web inquiries, from more than 650,000 users, including shopping and banking data were posted publicly on a web site. Survey Time! Question: Would your employees fall for a scheme to enter their login password on a external web page? Answer: Experience says “Yes” Pileum was hired to test security at a large, technology related entity. Pileum put together a Phishing attach and had better than 40% success in obtaining user passwords from “fake” e-mails. 13 Deliberate or Accidental Employee Actions • Danger: Sensitive data can be disclosed publically. Most of the time this is accidental, but could be deliberate. Danger Areas Possible Solutions E-mailing sensitive data E-mail Data Loss Prevention systems Deliberate data theft Monitoring/Logging systems Business systems used by family members User Education Phishing and scams User Education Weak, Missing, Repetitive, or Shared Passwords Real World Examples: Gawker Media, December 2010 A group called Gnosis attempted to hack their network. Users had the same passwords for email, Twitter, and other systems. Once one password was compromised they had access to multiple systems. E-mail addresses and passwords of about 1.3 million users was disclosed plus the theft of the their custom-built content management system. 14 Weak, Missing, Repetitive, or Shared Passwords • Danger: Passwords are the basic keys to all security and must be treated accordingly. Danger Areas Possible Solutions Users share passwords with others User education Users allowed to use basic passwords Passwords should be complex and changed frequently Old Software or Missing Patches Real World Example: Google/other Silicon Valley companies, Mid-2009 The Chinese government launched a massive attack on Google, Yahoo, and dozens of other Silicon Valley companies. The Chinese hackers exploited a weakness in an old version of Internet Explorer to gain access to Google's internal network. 15 #? Vulnerability Disclosures 2002 – 2013 Microsoft Security Intelligence Report – 10 year review Special Edition (National Vulnerability Database) 16 Vulnerability Disclosures 2002 – 2011 Hardware versus Software Microsoft Security Intelligence Report – 10 year review Special Edition (National Vulnerability Database) Old Software or Missing Patches • Danger: Patches are published to address know, published exploits. If not installed it is like leaving a door unlocked Danger Areas Possible Solutions Windows Operating Systems Windows Update, WSUS End of Life software (Windows XP!) Upgrade All software Patch Management Solutions - KACE, Shavlik, etc. 17 So – Are You Scared Yet! 18 Practical Steps • Make a decision – creating a secure network does not happen by chance • Passwords, Passwords, Passwords • Patch or replace old software • Get a security checkup • Perform employee security training • Invest in security hardware/software/services My Contact Information Ken Jones PILEUM CORPORATION Senior Technology Architect [email protected] Office: 601.352.2120 Mobile: 601.214.5788 190 East Capitol Street, Suite 175 Jackson, MS 39201 19