2020 corporate customer training · minutes. 11 examples examples. 12 examples examples ......

31
1 Corporate Customer Training Cybersecurity & CATO

Upload: others

Post on 06-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

1

Corporate Customer TrainingCybersecurity & CATO

Page 2: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

2

Circa 2009

Today….

Page 3: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

3

2020 Breaches

January 2020

• Customer support database unprotected

• 280 million customer records

• Emails, IP addresses, support case details

• No other personal information compromised

Page 4: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

4

• Former employee responsible for breach

• ”Undisclosed number of customers”

• Name, SSN, drivers license info, address, DOB, account numbers, etc.

February 2020

February 2020

• Third-party vendor

• Employee laptop theft

• 654k members personal and medical info exposed

Page 5: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

5

February 2020

• 10.6 million customer records published to hacking forum

• Personal info and contact details for tourists, travelers, celebrities, CEOs, government officials, etc.

• Security incident uncovered in summer 2019

March 2020

• Employee and customer information accessed

• Compromised employee email

• Names, addresses, SSN

• Passport and drivers license numbers

• Credit card and account information

Page 6: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

6

March 2020

• Employee email account compromised

• Third-party email vendor

• Unknown amount of personal information

• Name, addresses, SSN

• Drivers license numbers, billing information

March 2020

• Third-party application breach

• 5.2 million guest records impacted

• Names, emails, phone numbers

• Linked loyalty programs

• 2nd known breach in 2 years

Page 7: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

7

Time to Act

Criminal Objectives

• Access or manipulate data

• Destruction of data

• Extortion or ransom

• Disruption

Page 8: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

8

Page 9: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

9

Page 10: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

10

Phishing Objectives

• Install malware

• Steal credentials

• Obtain information

• Perform a task

2019 Verizon Data Breach Investigation Report

• 3% of users will click on any phishing campaign

• Average 16 minutes until the first click on a phishing campaign

• First report from a savvy user will arrive after an average of 28 minutes

Page 11: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

11

Examples

Examples

Page 12: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

12

Examples

Examples

• Posing as vendor to change bank account information

• Use similar domain name

[email protected]

[email protected]

• aliiedconsulting.com

Page 13: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

13

Examples

Examples

Page 14: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

14

Examples

Examples

Page 15: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

15

Examples

Examples

Page 16: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

16

Examples

Examples

Page 17: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

17

Examples

One click… that’s all it takes!

Page 18: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

18

Malware Evolution

Page 19: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

19

Fileless Malware

• More prevalent in 2019 than ransomware

• Exploit vulnerabilities in browsers and associated programs or via phishing attack

• Code runs and calls on programs already installed on the system, rather than installing its own

Page 20: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

20

Corporate Account Takeover (CATO)

Corporate Account Takeover (CATO)

• Criminals gain access to bank account

• Obtain user credentials

• Phishing email

• Keylogger malware

• Obtain access

• Physical

• Remote

Page 21: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

21

Corporate Account Takeover (CATO)

• System access dangers

• Logged into Internet banking

• Password management auto-populates passwords

• Sends code to text or email on system

• Guess answers to knowledge-base questions via social networking research

CATO Damages

• Add new user accounts

• Initiate transfers

• ACH

• Wires

• Other external transfer options

• Access to confidential data for additional attacks

Page 22: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

22

CATO Protection & Prevention

• Banking Controls

• Multi-factor authentication

• New user alerts

• Device authentication/restriction

• Enhanced high risk transaction controls

Page 23: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

23

Phishing Attempts

• Inspect for typos

• Check email address and domain name

• Click correctly

• Hover over link

• Right click and copy

• Visit website manually

Phishing Attempts

• It doesn’t feel right

• Tone is off

• Urgent/threatening

• Unfamiliar or unexpected

Page 24: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

24

Malware & Patch Management

Malware & Patch Management

• Servers

• Workstations

• Laptops

• Mobile devices

• Peripheral devices

• IoT

Page 25: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

25

Malware & Patch Management

• Centralized system

• All devices present

• Receive latest updates or definition files

• Remediate issues

• Limit users’ rights

• Downloaded apps from Internet

• Browser add-ons

Wi-Fi Networks

• Ubiquitous access

• Risks

• Malware can spread

• Traffic sniffing

• Vulnerability scanning

Page 26: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

26

Wi-Fi Networks

• Be wary of public Wi-Fi

• Use HTTPS

• Turn off file sharing

• Use VPN

Password Security

Page 27: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

27

Password Security

• Numbers, characters, symbols

• Avoid common words

• >12 characters

• Unique and private passwords

• Business vs personal

• Layered security

Web Surfing

• Avoid questionable websites

• Cautious downloads

• Current browser

• Inspect URL

• Malvertising

Page 28: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

28

Data Storage

• Save files to appropriate location

• Beware

• External drives

• Mobile devices

• Rogue cloud storage and sharing

Vendor Management

• New vendor relationships

• Procedures for evaluating vendors

• Risk assessment

• Contract review

• Approval procedures

• Existing vendor relationships

• Periodic oversight procedures

Page 29: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

29

Social Networking

• Impersonation

• Phishing & Vishing

• ID Theft

• Pretexting

• Security questions & answers

• Data is not always private

Mobile Devices

• Automatic lockout

• Biometric/PIN

• Inactivity

• Encryption

• Remote wipe

• Data storage

• Patches & updates

Page 30: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

30

Email

• Easily spoofed

• Not all services are encrypted

• Accounts easily hacked

• Be careful what you send in email

Training

• Training methods vary

• Seminar, emails, newsletters

• Anyone can teach!

• Training should be completed

• Upon hire

• Annually

• Continuously

Page 31: 2020 Corporate Customer Training · minutes. 11 Examples Examples. 12 Examples Examples ... •Downloaded apps from Internet •Browser add-ons Wi-Fi Networks •Ubiquitous access

31

Important Takeaways

• Be vigilant of phishing attempts

• Practice top tips

• Train employees

• Work proactively with partners

• Trust your instincts

© 2020 Capin Technology LLC

Thanks!

Thomas L. Tyler, Jr.Cybersecurity Advisor

[email protected]

505.50.CAPIN x2009