Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.strothman.com. Securing Your Data and Electronic Devices Presented by Lisa Holden CIA, CISA, CISSP, CRISC, PMP Senior Manager Strothman and Company.

Similar presentations


Presentation on theme: "Www.strothman.com. Securing Your Data and Electronic Devices Presented by Lisa Holden CIA, CISA, CISSP, CRISC, PMP Senior Manager Strothman and Company."— Presentation transcript:

1 www.strothman.com

2 Securing Your Data and Electronic Devices Presented by Lisa Holden CIA, CISA, CISSP, CRISC, PMP Senior Manager Strothman and Company

3 www.strothman.com AGENDA Summary of recent breaches – Target, Neiman Marcus, Michaels Highlights of latest Verizon Data Breach Report Overview of Cloud Computing – Is My Data Safe? Highlights of new Federal Cybersecurity Framework Overview of HIPAA and PCI Compliance – Healthcare and Credit Card Data Security Issues Basic Steps for Securing Devices

4 www.strothman.com Target Attackers broke in to Target after compromising a company web server using stolen HVAC vendor credentials. Attackers moved through the network using an admin account for IT management software installed on Target servers. Attackers were able to upload the malicious BlackPOS software to store point-of-sale machines in Nov and Dec. Attackers set up a control server within Target’s internal network that served as a central repository for data obtained by all of the infected point-of-sale devices. Data was later downloaded to Russia. Over 40 million card records affected.

5 www.strothman.com Neiman Marcus Attackers used same BlackPOS software, starting in July through October, on store POS machines. Company was notified by its card processing company on December 13. Over 1 million cards affected.

6 www.strothman.com Michaels In a 2011 attack, hackers replaced some 84 PIN pads on payment-card terminals at a small number of Michaels stores, resulting in the theft of about 94,000 payment card numbers New breach being investigated in 2014. Unknown number of cards affected. Investigation is pending.

7 www.strothman.com Breach History and Reporting Sears and Sally Beauty Supply http://www.informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/ http://www.informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/ Some 77 percent of the respondents say their firms had been hit with a cyberattack in the past two years. Only about 35 percent say they share attack and threat information with other organizations in their industry, 32 percent say they do not share such intelligence, and 27 percent did not say one way or the other.

8 www.strothman.com Verizon Data Breach Report http://www.verizonenterprise.com/resources/ media/large-133994-speed-sophistication.xml http://www.verizonenterprise.com/resources/ media/large-133994-speed-sophistication.xml 2013 Highlights: Speed and Sophistication

9 www.strothman.com Cloud Computing – Is My Data Safe?

10 www.strothman.com CLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013 1. Data Breaches 2. Data Loss 3. Account Hijacking 4. Insecure APIs 5. Denial of Service 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared Technology Issues

11 www.strothman.com

12

13 Securing the Cloud…

14 NIST Federal Cybersecurity Framework In February 2013, President Obama issued Executive Order 13636: Improving Critical Infrastructure Cybersecurity. The order calls for the development of a voluntary, risk- based Cybersecurity Framework—a set of existing standards, guidelines and practices to help organizations manage cyber risks. The resulting framework, created through public-private collaboration, provides a common language to address and manage cyber risk in a cost-effective way based on business needs, without placing additional regulatory requirements on businesses.

15 www.strothman.com PCI DSS 3.0

16 www.strothman.com

17 Confidentiality (FERPA) – FERPA Pop Quiz – True or False? It is okay to post student grades by social security number. It is okay to include a student’s GPA in a letter of recommendation. Examinations and term papers are not subject to FERPA. Parents are allowed to see their child’s records. A written note made by one person as an individual observation that is not shared with anyone is subject to FERPA. Directory Information pertains only to students’ names, addresses, and phone numbers. It is okay to distribute graded papers by placing them on a table for students to pick up after class. Student representatives on committees may have access to other students’ education records during the course of that committee’s work. Faculty have a right to see education records of any student attending UMaine without giving a reason. In a divorce situation, both biological parents have equal standing in gaining access to the student’s education records even if the student is a dependent of only one parent.

18 www.strothman.com Confidentiality (FERPA) – FERPA Pop Quiz – Answers It is okay to post student grades by social security number. FALSE It is okay to include a student’s GPA in a letter of recommendation. FALSE Examinations and term papers are not subject to FERPA. FALSE Parents are allowed to see their child’s records. FALSE A written note made by one person as an individual observation that is not shared with anyone is subject to FERPA. FALSE Directory Information pertains only to students’ names, addresses, and phone numbers. FALSE It is okay to distribute graded papers by placing them on a table for students to pick up after class. FALSE Student representatives on committees may have access to other students’ education records during the course of that committee’s work. TRUE Faculty have a right to see education records of any student attending UMaine without giving a reason. FALSE In a divorce situation, both biological parents have equal standing in gaining access to the student’s education records even if the student is a dependent of only one parent. TRUE

19 www.strothman.com SANS Consensus Audit Guidelines Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 6: Application Software Security Critical Control 7: Wireless Access Control Critical Control 8: Data Recovery Capability Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

20 www.strothman.com SANS Consensus Audit Guidelines Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control Critical Control 17: Data Protection Critical Control 18: Incident Response and Management Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises

21 www.strothman.com Maintaining Desktops and Laptops Use up-to-date antivirus and antispyware software Install antivirus software (based on your operating system) on your computer, and schedule daily updates that will recognize new virus types as they emerge. Enable the automatic protection of all incoming files, and schedule weekly scans of your hard drive. Install antispyware software on your computer, since antivirus protection is not enough. Don't open files from unknown sources Carefully judge the credibility and trustworthiness of the source of a file before opening it. Email attachments and downloaded files are common sources for malicious programs. Bear in mind that some viruses and worms can mimic the identity of a familiar email correspondent. If you weren't expecting an attachment, you may want to contact the email sender to verify the attachment before opening. Keep your operating system up-to-date Updates should be downloaded and installed immediately—many contain critical fixes for security-related defects. Recent operating systems have automated the update process, though you may be prompted to approve the process.

22 www.strothman.com Maintaining Desktops and Laptops Keep your operating system up-to-date Updates should be downloaded and installed immediately—many contain critical fixes for security- related defects. Recent operating systems have automated the update process, though you may be prompted to approve the process. Keep your application software updated Check your software manufacturers' websites regularly for updates to their products. Delete Data Securely Use secure data deletion to destroy files and folders immediately and permanently in a secure manner. Backup Create a backup of your entire system periodically, and back up critical data files whenever you update them. A network user folder provides adequate backup space for most people, but files consuming large amounts of space—video or music—may require external disk drives to back them up adequately. Use Physical security Protect your system from theft by physically securing your computer. Purchase a lockup cable for your laptop to increase security in residence halls, libraries, and other places you may take your computer, and a surge protector with a circuit breaker to protect against power line surges. Verify that your home system is covered under a homeowner's or renter's insurance policy.

23 www.strothman.com Setting Up Desktops and Laptops Protect device with a strong login password Learn what constitutes a strong password, create ones you can remember, and never share your password with anyone. If you have reason to believe someone has learned one of your passwords, change it immediately. Use a password protected screen saver Configure your computer to lock the screen automatically, after a brief period of about 10- 15 minutes of inactivity, with a password-protected screensaver. This enhances security and causes you minimal inconvenience. Encrypt laptops and any critical or private data Use whole disk encryption for laptops and file or folder level encryption on network data to protect data. Use intrusion detection, data loss prevention, web filter and email filter tools Use tools to manage network traffic in and out of your network and control what goes in and out.

24 www.strothman.com Setting Up Desktops and Laptops Turn off file sharing To ensure other people cannot access your files and folders, you must disable file sharing. Turn on firewalls Firewalls can prevent hackers from making unwanted connections to your machine. The firewalls on recent Windows and Macintosh operating systems are turned on by default. Turn off or delete unneeded software features The more software packages there are on a computer, the more opportunity for hackers. Uninstall applications and turn off features you don't use. Configure properly for multiple users If multiple people use a computer, ensure that they each have their own user account.

25 www.strothman.com Smart Phones Use a password All smart phones must be protected with a password of at least four characters. Lock the phone when not active Configure your device to lock the screen automatically, after a brief period of about 10-15 minutes of inactivity, with password protection. Backup contacts and data Most carriers have a backup application to allow you to store a backup of your contacts and data. Make sure the backup runs daily. Use an anti-virus application Both iTunes and Google Play have several anti-virus applications available for install. Make sure that it works for your phone model and make sure to keep it up to date. Configure phone to allow remote wipe If your phone has corporate email, it should be configured for remote wipe by your system administrator using Microsoft Exchange Active Synch tools. You should always be prepared to have your phone wiped or need to perform a factory reset (lose data on the phone) at a moment’s notice if necessary. Know how to recover and it won’t be a problem.


Download ppt "Www.strothman.com. Securing Your Data and Electronic Devices Presented by Lisa Holden CIA, CISA, CISSP, CRISC, PMP Senior Manager Strothman and Company."

Similar presentations


Ads by Google