Wednesday, 5 August 2015

Data Theft And Data Attack Protection-White Paper


Abstract

This white paper would help you to understand how unsafe internet surfing and malicious insiders fetch data security risks. Employees are unaware of online dangers stirring from their usual web surfing at work and hackers/outsiders gamely wait for web users to click the malicious links set up by them on various websites, this helps them to infect users PC and gain and allow them to access users PC and take over the control. Another threat we have talked about is Insider threat, which is even more dangerous because the data is accessible to them, to which they misuse or steal for personal gains or grudges. The outsider and insider attack eventually put the companies into financial losses, sensitive information loss, and image damaging media attention.


Contents




Data attacks and data theft protection


The internet is one of the world's greatest inventions with the great amount of information and knowledge available with just a few taps on the keyboard. Website surfing is not only accumulating information for you, but it’s also accumulating threats, malware, Virus and other web threats every time you inappropriate content and website. These malicious websites may infect your PC and get you into problems.
As per an Internet Data Corp. survey, 30-40% of employees spend an average of 5.9 hours per week surfing non work related websites. This means the web based dangers at work can put the company’s information security at risk. A virus attack happens when a user clicks a website link to explore, with a simple click of the mouse malware, phishing attack and many other web based dangerous attacks can accomplish their task.
It’s critical to stop the online damages caused by intentional and unintentional insider threats. Employers need to block non-work related websites and content. This would help them to keep the PC safe from hackers and infectious worms.


The reports and surveys amass the data on employees surfing internet at work and spending valuable productive time on surfing non-work related websites. Online threats due to cyber loafing have increased the number of incidences of network and password hacking, virus, malware and malicious software infected user’s computer.
Surfing the internet has become more of an addiction, as per Websense report. We can see the most online activities observed are online news reading 81%, personal mails 61%,  online banking 58% , travel 56%  and shopping 52%. The malicious intenders gimmick users with catchy titles, flashes, flyers, attracting them to open a link or download PDF. Users get trapped by these tricks and to their curiosity they visit these sites and click links to explore and unknowingly they end up giving control to the hackers of their computer. Compromising with the data security is the most dangerous thing.
Companies have employees to carry their work and they accomplish tasks using a PC, hence computers or laptops are the most critical part of the organization. All confidential, sensitive, restricted information is stored on these systems. Cybercriminal have ample reason to attempt to hijack the information, including monetary damages, identity theft, loss of confidential information and data, damaged brand or reputation, and theft of network resources.
The malicious techniques developed by cybercriminals to trick web users have compromised the security systems of the company. Clickjacking, Likejacking and Cursorjacking are a few techniques in which user performs undesired actions by clicking or moving the cursor on a hidden link. As a result, it risks confidential information or gives access to control their computer while hitting it off on deceptively safe and secure web pages.


There is a world of web threats which can damage individuals or organizations. Web threats are malware programs that take place while using surfing internet. Cybercriminals get the benefits by stealing information and infecting the PC.
The steadily increasing websites are occurring due to ever increasing web users all over the world. In 2005 there were roughly 66 million websites. By 2008, that number increased to 165 million, a jump of 250%, as per a Netcraft Web Server Survey data. In 2012, the internet worldwide had more than 2 billion users, which is 34% of the population. Where in 2005, there were 928 million users worldwide, around 14% of the world population at the time reports ‘the Internet World Statistics’.
Internet World Statistics has given data on internet users across the world in 2012 Quarter 2.

  
So we can see how internet users across the world are increasing and the penetration rates by each world region. With the increase of internet users, the number of websites has also increased which brings up the inexperienced web-developers in the market and malicious intenders to gain profits by their treacherous ways.


Cyber strolling at work can cost huge financial and data loss, which can put an organization into legal complications down the line. Out of all time wasting activities at work, employees spend the most time on internet surfing. Every day numbers of cyber crimes and attacks are increasing and taking place in bulk. Kaspersky Lab data shows the number of browser-based attacks in 2012 was 1,595,587,670. Internet users visit malicious websites without realizing that they are inviting risks to their computer and data security.


Social networking sites are like second nature when it comes to communication and expressing feeling. Sharing photos, videos, and important information on social networking accounts are the best. Are your photos and personal information safe? Employees at work, surf social networking sites quite often. In 2013, 87% of the web user population had used Social networking. 66% of users access it from their PC and the other 34% access it from their mobile devices.
Hackers working on social networking sites trick users by sending Spam, malicious links, phishing and social engineering to get their passwords or to infect their PC to steal data including personal photos, videos and private messages. They may put not only your information at risk, but may put your friends’ information at risk as well. In 2008, a worm hit a famous social networking site by tricking users with social engineering. The worm puts up the comment on sites along with a link which directs to fake websites, where users were asked to update or install Flash Player. This gets completed with the installation of malware rather than the installation of the Flash Player. The malware further downloads a fake anti-spyware application that is actually a virus.

Clickjacking


Clickjacking is a combination of two words - Click and Hijack, which it meant by mere clicking, access to control a computer gets into the hands of hackers. Users are tricked by clickjackers with a link is installed on to the website, which looks authentic and once the user click the link, the malicious activities start and it gets into the user’s PC to take control of PC. This allows to remotely access computer files which can be misused by hacker for personal gains. Social networking sites, online shopping websites, and online news sites are targeted by hackers to post links to share, update or to get freebies.

Software Download


In 2012, 3782 vulnerabilities were discovered out of which 1290 were high risk per the National Institute of Standards and Technology, National Vulnerability Database. One of the biggest threats to security is the application and software download at operating systems. Opening malicious websites or downloading PDF or suggested software such as Flash drive, Adobe reader or Flash or Oracle Java are some of the software to exploit user PCs. Employees visit websites at work and end up visiting malicious websites or pages unintentionally or follow instructions to download software or click PDF to open.

Malware-Hosting Sites


As per a report, pornography downloaded at work has been reported by 80% of companies. 70% of all Internet porn traffic occur during the 9-5pm work day. Therefore, employees at work, visit porn websites the most. Malware-hosting sites use porn to lure and direct users to download code or software to view the videos, which in reality is a piece of malware disguised as a code. Once the video codecs are installed, the concealed malware succeeds in entering into the user’s computer to infect with malware.


Employees without realizing the danger of opening mail and clicking mentioned links in the email from the unknown sender. Phishing attacks are made to get sensitive information like bank credentials, passwords, and usernames. Phishing attacks are performed by hacker by sending mail which looks trustworthy and genuine, which suggests to them to click links or download attachments and later asks for usernames and passwords to proceed further. Sometimes fake mails stating ‘make money’,’ lottery won’ or information required for security reasons. Such mails trick innocent and unaware users to release confidential information.

Risks of Web Threats


Employees surfing the internet at work put company security into risk. Symantec and the Ponemon Institute conducted a survey which revealed 53% employees don’t believe their web surfing can risk company data security. Internet surfing at work not only drains productive hours, but put company’s security into danger. In 2013, 253 data breach incidences were reported by Norton and a total number of incidences exposed 552,018,539 breaches.

Data breach can cost huge amounts, it not only cost money but brings negative media attention, which directly impacts customers' and clients' trust. It risks the business efficiency and effects the position in business competition. The average cost of data breach incidences cost on average $130-136 per incidence. Data breach incidences attract litigation against the company for not keeping data safe. The market value of the organization goes at stake. Companies have extremely confidential information of client’s customers, including bank details, financial information, social security information etc. such data theft may put the company into a bankrupt state.

Data security is the top priority and most critical to safeguard, in fact the existence of a company relies on keeping their own and customers’ data safe and secure. Employees surfing the internet and visiting sites, clicking links, downloading documents or PDF are major loopholes in the data security. Employees unknowingly give PC access to hackers. Dangerous virus and malwares infect the computers and take all the stored information. Later this data is misused for their personal gain and profit.

Insiders play major roles in data attack activities. Intentional and unintentional Insider threats are very important to take under control. These insiders are employees, and employees have access to client information as well as to the company’s confidential information. As per CERT, data theft by insiders is carried for their personal gains, trade secrets, personal identification information and customer information. Now cloud based storage services are provided online accounts to migrate corporate data into their personal accounts. In a few seconds employees can move their hard drive information into their personal cloud accounts, IT teams find it difficult to stop this ongoing data theft.

Data theft and data attack are the top priority of organizations, but how do they combat these serious offenses? Dealing with insiders and outsiders is very important and urgent requirement. There are many anti-virus, anti-spyware, anti-malware, and firewall protection, but these can’t stop data theft by insiders, their personal cloud folders and personal emails allow them to transfer company confidential information. Data theft and attack can be controlled by blocking websites and filtering content. This prohibits unwanted surfing of the internet, where hackers wait for their prey to conduct fraud and infect a PC to steal information for their personal benefits. Data theft can be controlled by employee PC Monitoring, which allows recording activities and viewing in-depth PC activities.

Data Theft: A serious security risk


Data theft at organizations is a grave issue and a major security risk as per several IT professionals. In a recent study by Verizon Data Breach Investigations Report 2014, states Local area network (LAN) access as the top form of insider threats/misuse (71%). An insider threat is defined as a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally misused that access to negatively affect confidentiality, integrity, or availability of the organization's information or information systems as per CERT.
RSA Conference 2008 submits a report on insider threats, in which the reason behind thefts, business loss and the ways data is stolen, is explained. The malicious insider is who misuse or steals the data for personal gains or to sabotage the organization. There are specific types of insider threats experienced by various organizations:
·         Unauthorized access.
·         Theft of IP.
·         Theft of other information.
·         Fraud.
The information theft or modification is done by insiders for many other reasons such as financial gains. For financial gains insiders steal customer information, personally identifiable information and trade tricks, the act is performed during working hours using unauthorized access. These employees download Information or data into their personal accounts, emails, via malicious code, or take printouts.
Unintentional Insider Threats

As per CERT, unintentional insider threats to data security are at 40%, which means employees unknowingly put the company's security at risk. Unintentional insider threat is defined as a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and through action or inaction without malicious intent unwittingly cause harm to the confidentiality, integrity, or availability of the organization's information or information systems.

A total of 11,698 incidences were reported, the motive of insiders behind data theft is financial (72%), Espionage (18%), Grudge (10%), Convenience (4%) and Fun (3%). As per The Recover Report, Mishcon de Reya, the two most common scenarios involve insiders taking data are 1) To start their own competing company (30%), 2) To help secure employment with a rival (65%). The CERT Insider Threat Center has brought to notice that more than 70% of IP theft is carried out by insiders within 30 days of announcing their resignation.

Desktops are the most important and valuable asset and most regularly compromised asset as well. Insiders attack desktops because it has the stored data and information of clients, organizations, copying data by using removable disks or copying data to their cloud accounts. Desktops are the most affected asset within insider misuse 26% of data theft by insiders is carried via computers.


Cloud based services are file hosting services that allow sharing files and storing data on an online server. Some popular services are Dropbox, Box, SkyDrive, Google Drive and Octopus. Employees download and install these services and store confidential data which can be accessed from anywhere and anytime. IT professionals believe cloud based storage services are the biggest threat to security. If employees intentionally or unintentionally store data in their personal accounts, they could fall under the data breach or security breach activity. Sharing files with cloud based services is very easy, one just needs to share a link and that can be accessed from any browser. 

Content Filtering and User PC monitoring: the Solution


Content filter is very important to companies because malicious websites and unwanted content surfing bring threats to data security. Companies provide unrestricted internet to their employees, this encourages employees to access for their personal reasons. The non-work related internet surfing during working hours not only kills productivity, but also weakens the information security system of the organization. Malware and virus writers put up malicious links on social networking websites or torrents to download, which brings up the virus, malware and damages the company network. Data attacks by internet based threats are growing rapidly year by year.

It’s critical to halt the intrusion of malware, virus, scareware and many other issues occurring due to non-work related surfing at work. Content filtering is a tool to blacklist unwanted websites and inappropriate content for the process or organization, now next time when an employee tries to visit the blacklisted websites, content filtering tool will deny the access. The risk of web threats can be mitigated by the increased adoption of content filtering solutions at work.

Risks attached to application downloads can now be minimized by smart and modern content filtering applications. Application Filters permit users to block unwanted applications. This would help in curtailing data attacks due to malware or virus infecting PC.

Social Network Filtering is crucial at work as well. Hackers, malware and virus writers are rigorously working to enter organizations point of network to steal information. For this they are phishing employees by updating comments and links on social networking sites and allure them to like or share the link. The hidden virus in the simple link gives access to the hackers to take control of the PC which has sensitive information. Therefore, it’s important to prohibit social networking sites at work. 

User PC Monitoring: An advanced Solution


Monitoring employee PC activities is an effective way to control the ongoing data theft and data attacks to network security. User PC monitoring allows to view the activities performed on user PC, which means employers can view websites visited, view chat conversation, downloads, and documents saved. Employees can remotely record the monitor and capture screens. By viewing employees' PCs one can keep data attacks and data theft incidences under control.


Tech savvy employees have ways to visit even restricted websites covertly without leaving trails behind to be caught by their managers. Even after filtering websites and denying the access, still employees can visit unauthorized websites by using web proxies. The proxy makes content available on the internet secretly, therefore employees can go to websites which many harm network or computer. Data in such cases is not safe and secure. Content filtering is not the standalone solution to prevent data theft and data attack risks. 

Cloud Services


There are numerous cloud services, so if famous and popular services are even blocked employees have several other cloud services in the market for free cloud accounts. As we have discussed 70% of employees have personal accounts at work to store official data. Many unintentional insider threats also store data into cloud based storage services and fall prey to hackers, scammers and insider threat. These unaware acts of data breach by non malicious insider also pose the same threat to the information security which malicious intenders’ pose. Hence it becomes important to know your employees’ desktops.

Unblocked Website Surfing


By blocking various categories, which may risk security, leaves employees with an option to surf unblocked and unfiltered websites to suffice their internet addiction. Employees surf available websites and content on the internet without realizing that these websites can also bring cyber threats and risks to security. There are many innocent websites which are targeted by hackers. The simple and genuine looking links, button, or PDF’s have hidden virus encrypted codes to infect the users PC which allows fetching data stored from the employee desktop. The data breach cost per incidence bring huge financial loss and attracts lawsuits files against company for data breach compensation. Hence network security is the most important and critical part of the business.

Monitor Employee PC activities


Employees are the interface of the company, a very important and critical source who carry their work using assets such as desktops, laptops and more. Sensitive and confidential data are available to them; therefore data security becomes vulnerable. Increasing web based threats have obscured IT data breach preventions. Content Filter and web blocking are a good attempt to halt the invasion of virus or malware from malicious websites into PCs, but they are unable to protect the information security internally. Yes, the insider threat of data theft by removable disk or cloud services. Many safe and unblocked websites have malicious links, which prompt users to click or download genuine software like Adobe Flash or PFD downloads, but the hidden malicious viruses or malware enters the PC and take control of a user's PC to hack data.

Employee LAN Monitoring tools assist in viewing the employees' PC, and completely broadcast the employees’ PC activities. Standing over shoulders or auditing employees PC activity everyday to view PC activities and software downloads is not possible or a good idea. Therefore, it’s advised to enable user PC activity monitoring; this allows employers to view activities of all the employees.

Employee PC activity monitoring tools help employers in knowing how much time employees are spending on work related activities. What all websites they are surfing, employers can view the live screen of employees PC, in case the employer or manager suspect employee’s action, the freeze mouse option gives power to freeze employee’s mouse instantly to avoid security risk and threats.

Application and software download check employees PC to avoid the data theft incidences by insider threats, such software and downloads are threat to data security. The employer can remotely access employees PC and uninstall unwanted and unsafe downloads and applications. Monitoring tool gives insight of all activity such as log in/log out from the PC, documents saved, web pages, websites visited, temporary history, Open ports, email activities, IM/Chat conversation and more.

The activity logs provide the in-depth details of various activities, gives base data to prepare reports to identify data theft and data attack activities in the company. This helps in identifying the holes in network security and helps in building policies and awareness programs for employees.

Conclusion


To safeguard the company network and data security is the most important factor to stop data attacks and data thefts by internal and external threats. Employees hold critical information of clients and organizations in their desktops or laptops, but the vulnerabilities are wrecking the data security system. Content filter and website blocking is required to protect the data and PC from data attacks by malicious links, software and downloads. To stop data theft, it’s important to monitor employees' PC activities to view user PC activities to control the emerging and existing insider threats. Monitoring tools help in identifying the ambiguities of the process and help to give definite solutions to fight data security risks and threats. The employee monitoring tool is the best option to secure data from attacks and thefts.

No comments:

Post a Comment