an essential guide from thawte® about top 10 website securitymyths

9
® Top 10 Website Security Myths Revealed An essential guide from Thawte WHITE PAPER 2014

Upload: biswanath-swain

Post on 17-Jul-2015

49 views

Category:

Internet


2 download

TRANSCRIPT

®

Top 10 Website Security Myths Revealed

An essential guide from Thawte

WHITE PAPER 2014

Contents:

Introduction 3

Myth #1: “Hacking? It won’t happen to me!” 3

Myth #2: “Security risks can be quantified” 4

Myth #3: “Looking after security practices? That’s the CISO’s job” 4

Myth #4: “SSL is broken” 5

Myth #5: “I don’t store credit card data, so I don’t need SSL” 5

Myth #6: “All types of certificates issued by a CA are the same, aren’t they?” 6

Myth #7: “Only shady-looking websites are really dangerous. Mine’s safe and secure” 6

Myth #8: “I don’t need SSL on all my web pages” 7

Myth #9: “I have great anti-virus software on my network, so my systems are safe” 7

Myth #10: “We use a firewall, so we’re well protected against attacks” 8

Living in the Real World 8

More Information 9

About Thawte 9

Top 10 Website Security Myths Revealed

2

®

Top 10 Website Security Myths Revealed

3

®

Top 10 Website Security Myths Revealed IntroductionProtecting your website from hackers is no easy task. There are no days off. The battle is a never-ending one where

one false move, one careless decision or indecision, could mean your website is compromised and breached. And

the upshot of such an invasion? Best case: disruptions to your business while you remove the threats and try to

figure out what went wrong – and how to prevent it happening again. Worst case? That your business is seriously

damaged and even put out of action. That is such a startling prospect that surely no one would fail to shore up their

defences to the max, would they? Sadly, they would – and do.

In fact, many companies fail to put in place the most fundamental protections to keep themselves safe, often be-

cause of the misconceptions and security myths that still prevail around security. Either they believe the most basic

defences are sufficient to keep the enemy outside the gates; or they imagine that they do not have to worry about

hackers. Why? Because the thinking goes like this: “No one would go after me! I’ve got nothing of value and my busi-

ness is just too small. It’s the big guys the cyber gangs always target. And even if someone did attack my website,

I’ve got the best anti-virus there is running on my system – and pretty impressive BYOD policies in place, too. I’ll be

fine.”

The problem is that many businesses, while aware of online threats, have steeped themselves in the mythology that

surrounds website security and simply bury their heads when it comes to the dangers that EVERY business faces.

To be truly safe, they need to move from ‘myth’ to ‘reality’, shoring up their defences, corporate policies, practices

and procedures to the point where they can honestly say: “There is no more I can do” – and then look again and do

even more.

So, let’s take a look at those myths and where they fall down.

Myth #1: “Hacking? It won’t happen to me!”Many people believe their website is such a small fish in the Internet Ocean that no respectable hackers would lower

themselves even to take a look. The problem is that they are now casting their net very wide indeed. If you assume

that your website is always being probed by hackers using scripts, you will be close to the truth.

Perhaps your website really doesn’t have any value – or maybe the underlying SQL database on your server is fertile

ground for identity theft information. The far more subtle risk to any website hack is the undetected changes the

hacker might make to your site without your knowledge.

Another line of attack that online criminals are now executing is ‘spear phishing’ where they seek to gain unau-

thorised access to sensitive data, using faked, but highly credible, emails impersonating a colleague or a bank, for

instance, in order to trick their targets into sharing not only personal data, but also corporate and highly sensitive

information.

But whatever you do, do not believe the size of your business makes a difference to the hackers. The sharks have

you on their radar, however big – or small – you might be.

Top 10 Website Security Myths Revealed

4

®

Myth #2: “Security risks can be quantified”This is the ‘rule of thumb’ myth. You wet your digit, stick it in the air and hope to work out which way the security wind is

blowing. In other words, trying to quantify such risks is all but impossible. How, for example, can you know how much it

might cost you, if your website was to be hacked or your network badly infected? What price would you put upon sensitive

corporate or customer data falling into the wrong hands? How can you measure what the impact will be on your business

and how long it will be before you are back up on your feet after an incident? And what long-term price would anyone set

against a breach that leaves their customers disaffected and taking their business elsewhere?

Imagining you can quantify the impact of the risk to which your organisation is exposed will always be a ‘guesstimate’ and

often wide of the mark. Moreover, knowing how secure you are can be something of a ‘Catch 22’: your security program can

only really be put to the test when a major attack takes place, yet this is something that the program has been designed to

prevent in the first place.

Any business needs some measure of how secure it is, of course, and the best approach is to build your security programs

from the ground up, so you have a comprehensive view of your ‘estate’, enabling the business to identify the security strate-

gies and systems most suited to deliver the levels of protection it needs. From these solid foundations, all else can flow.

Myth #3: “Looking after security practices? That’s the CISO’s job”It’s true that the Chief Information Security Officer (CISO) should be the senior-level executive within an organisation

responsible for establishing and maintaining the enterprise vision, strategy and program to ensure information assets

and technologies are adequately protected. But should it be his or her sole responsibility to define and enforce security

practices?

Unloading this responsibility onto one person is not a good idea. Instead, a company should build an information secu-

rity strategy and process around the specific needs of the business – and that means involving a multitude of people

and departments across the organisation.

In the early days of large-scale corporate use of the Internet, many basic technical precautions were not being taken

and the sheer scale of the work to be undertaken in IT seemed to require that Information Security specialisations

existed solely within IT.

However, Information Security is no longer solely a technical problem, but encompasses management of people, pro-

cess, legal affairs, risk management, public relations, physical security, organisational change and many other areas,

alongside technical management of the threat.

It is also now clear that, with such a complex threat landscape, a risk-managed approach to Information Security is criti-

cal. The assessment of such risk requires the involvement of many stakeholders right across the business and, critically,

an individual to manage this process, who might well be the CISO.

Top 10 Website Security Myths Revealed

5

®

Myth #4: “SSL is broken”The argument that has been going around in some quarters, for some time now, is that the Transport Layer Security

(TLS) or Secure Sockets Layer (SSL) system is indeed broken and past salvaging. That it has ‘run its course’, ‘had its

day’; simply outlived its usefulness. Many of the anti-SSL camp believe the time has come to replace SSL with a new

system that takes over the mantel of authenticating identities online. In fact, some have even argued that the use of

Certification Authorities (CAs) themselves should be done away with.

Yet this is surely a rush to judgement and rides roughshod over all of the benefits that SSL has delivered for so long.

SSL certificates are widely acknowledged as the world’s most dependable and scalable cryptographic system, so why

are the daggers suddenly out? Yes, there have been high-profile security failures involving SSL of late. But why did

these happen? The easiest scapegoat to point the finger at is SSL, whereas the reality is that these breakdowns were

often due to a lack of appropriate internal security controls at the end-entity level, rather than a system-wide failure.

The real failure to be considered here is the one that might happen if you haven’t ensured that the right SSL certificate

is taking care of your website. Then it certainly would be broken. They have proved to be a major factor in Internet

security for the best part of two decades and are still by far the most proven, reliable and scalable method to

protect web transactions.

The reality is that SSL is not broken, but very much a key part of any defence strategy.

Myth #5: “I don’t store credit card data, so I don’t need SSL” So your business doesn’t store credit card data. That of itself is a good thing, bearing in mind the levels of credit card

fraud that now take place and how often this is linked to identity theft. However, that doesn’t automatically make you or

your customers safe. Not storing sensitive financial information might make you feel as though you are better protected

from cyber-attacks, but that is only one aspect of what keeps you secure online.

There are many other ways that cyber attackers can wreak damage on your organisation and its reputation, other than

by stealing financial data, and you need to have the highest levels of protection in place to keep them firmly at bay.

That means having safe and trusted areas for your customers where they know they are out of harm’s way, as well

as operating the highest levels of security for log-ins and passwords.

• Secure areas: these are interactive and personalised ‘portals’ on a website that provide customers with online

access to sensitive information in a secure and confidential environment. Moreover, this can be restricted to users

with electronic certificates, enforcing another powerful layer of security

• Log-ins/Passwords: anyone logging in to your site should be using passwords that are at least 10 characters long

and contain multiple character types, including lowercase, uppercase, numbers and special characters. The harder

a password is to guess or crack with a brute force attack, the safer those customers will be. Login information,

including passwords, should always be unique and never reused across multiple web sites; once such details have

been compromised on one site, other accounts may also be hit – and that could be the slippery path to financial loss

and identity theft.

• Personal details: such as names, email addresses, contact numbers and mailing addresses. If you collect enough

personal data, identity theft may become a plausible threat to your customers. Take the necessary precautions;

otherwise it can be devastating to your customer and the reputation of your business. More and more customers

are educated online shoppers nowadays and won’t buy from you if you don’t have an SSL certificate installed on

your website.

Remember: Even if you don’t sell online, your customers will appreciate the care you take to protect their personal

data – especially where you operate a secure access area on your site.

Top 10 Website Security Myths Revealed

6

®

Myth #6: “All types of certificates issued by a CA are the same, aren’t they?”No, they are not. There are several types of certificate on offer – and not all can be trusted to the same degree.

Here are the main ones:

Domain Validated (DV) – The lowest cost means of securing a website, this does not provide authentication or

validation of the business behind the website.

Organisation Validation (OV) – These certificates include full business and company validation from a certificate

authority using currently established and accepted manual vetting processes, but are still not validated to the highest

standards set by the CA/B Forum*.

Extended Validation (EV) – EV certificates are fully validated to the meticulous guiding principles set by the CA/B

Forum, providing the highest levels of security and trust to end users.

Always opt for an SSL (Secure Socket Layer) certificate with EV from a globally recognised certificate authority, such as

Thawte. The entire address bar will turn green (for ‘safe’), if you are on a site using EV certification. These certificates

guarantee the business is legitimate, whereas many other types are only validated with respect to the domain, but not

the owners and operators of the domain.

With EV, you will know you’ve made a safe, secure connection to a website when the beginning of the URL changes

from HTTP to HTTPS (with the ‘S’ standing for ‘Secure’). Also, a padlock will be displayed to the left of the address bar

(which will have turned green), showing your customers that the page is using an EV SSL certificate to encrypt all

communications between them and your website.

Trust marks/seals are another important means retailers use to reassure customers that it is safe to shop on your site,

demonstrating they have passed various security and privacy tests. The Thawte Trusted Site Seal, for example, gives

your web site instant credibility in the online world by visually reassuring customers that your site’s identity has been

verified and that it is secured with SSL.

* CA/B Forum, an independent standards body that requires in-depth verification of the legality and probity of a company before it is issued with a certificate

Myth #7: “Only shady-looking websites are really dangerous. Mine’s safe and secure”It’s a given that, however much money, time and technology you have, your website will never be 100% secure.

Don’t imagine what looks okay is okay. It’s all about what lies beneath. Hackers are constantly seeking out and

discovering security flaws in systems that were once thought all but impregnable. The time between these discoveries

and the required patch software will make you highly susceptible to a full-on assault. One thing you need to be aware

of is that hackers have already probed your systems, checked out your software and are ready to take advantage of any

zero-day vulnerabilities that might open you up.

Even the simplest websites rely on software - and software is inherently flawed and contains errors or bugs. You should

know the components your website relies on to operate and keep tabs on the known issues, and releases of updates

and patches.

It’s common practice to harden, or lock down, access to only the resources that need to be accessed. This should

include the operating system, web server and web application itself. And use strong passwords!

Even though total website security is a myth, the goal should always be to make yours as secure as possible. Attackers

are opportunists, seeking out the ‘path of least resistance’, and the harder you make it for them, the more likely they will

move on and find a site that is not as robust as yours is.

Top 10 Website Security Myths Revealed

7

®

Myth #8: “I don’t need SSL on all my web pages.” Many organisations use the SSL/TLS (Secure Socket Layer/ Transport Layer Security) protocol to encrypt the

authentication process when users log in to a website – but then fail to encrypt subsequent pages during the user’s

session. This is not good practice, because intermittent use of SSL protection won’t keep users safe in the face of

today’s burgeoning online threats.

With the rise of Web 2.0 and social networking, people are spending more and more time online and logged in,

communicating much more than just their credit card numbers. This has seen a surge in cybercriminals targeting

consumers using an attack method called ‘sidejacking’ that takes advantage of consumers visiting unencrypted HTTP

web pages after they have logged in to a site. Sidejacking allows hackers to intercept cookies (typically used to retain

user specific information such as username, password and session data) where they are transmitted without the

continuous protection of SSL encryption.

If trust is the foundation of the Internet economy, then you need end-to-end security that can help protect every web

page your users visit, not just login pages and shopping carts. ‘Always On SSL’ is a fundamental, cost-effective security

measure for websites that helps protect the entire user experience from start to finish, making it safer to search,

share and shop online. It is supported as best practice by leading industry players such as Google, Microsoft, PayPal,

Symantec, Facebook and Twitter.

Any company that is serious about protecting their customers and their business reputation will follow their lead and

implement Always On SSL, with SSL certificates from a trusted Certificate Authority.

Myth #9: “I have great anti-virus software on my network, so my systems are safe.”Your anti-virus software may well be excellent of itself – but that isn’t enough of itself. Anyone who thinks AV is still all

they need is, quite bluntly, living in the past. The world has changed and attackers (and malware threats) have moved

on apace, with far too many variants now flying around for traditional signature-based anti-virus products to cope.

As always, while security vendors, IT administrators and end users adapt new measures to block security threats,

attackers are constantly creating new, sophisticated ways to get through their defences. However good your AV might

be, they will target a weakness in the system, network – or indeed end users themselves – in their mission to break

through.

With ‘brute force’ threats designed to target different weaknesses on different systems, never using the same technique

twice, it’s no surprise that AV products, used as the sole or main means of defence, are increasingly failing, causing

costly downtime, clean-up efforts and data loss.

A successful attack can now be the passport to significant revenue streams, and the resources and skills employed to

undermine security defences are formidable, so you can be certain that the tenacity and guile of the cybercriminals will

only increase, too.

For all of these reasons, AV-only is not enough. Companies need comprehensive attack prevention that integrates the

full range of security technologies.

Top 10 Website Security Myths Revealed

8

®

Myth #10: “We use a firewall, so we’re well protected against attacks.”This is a myth still rife across many corporations and seems to be based more on some ‘feel good’ fantasy than fact.

Firewalls are of real value and positioned in front of a web server will certainly control traffic to that server. But that

server will need to see web requests, so these cannot be filtered. Equally, web application firewalls can assist in

protecting known vulnerabilities and unusual traffic, but they cannot normally provide protection against business logic

vulnerabilities, custom code vulnerabilities, valid use that corrupts data and zero day attacks. And while they can be

useful in temporarily filtering traffic when a vulnerability is discovered, they need to be thought of as a temporary fix,

rather than a permanent repair.

Take SQL injections, for example: one the most potent threats to computer security and notoriously hard to detect. They

are popular with hackers, as they can be used to exploit weak security measures in database applications or software,

inputting rogue commands that can tell the application to do something it shouldn’t. The most effective of these

injections can wreak havoc on website security, because they can bypass typical login firewalls and send SQL queries

to formerly protected databases.

What’s the answer? Organisations need to utilise more comprehensive security measures that can offer support from

data leaks – and awareness, where a threat or system breach occurs. In fact, beyond singular reliance on a firewall,

technologies for perimeter protection are essential to deliver an effective layered defence strategy around security

management.

Living in the Real WorldWhy do we believe in these myths? Mainly because they make us feel comfortable and are the easy option. ‘No hacker

would bother with little us’, ‘Our AV is all we need’, ‘Nobody gets past our firewall!’ is how the thinking goes. But the

false sense of security this rose-tinted view of the world affords is a dangerous thing, as believing in the myth means

taking little – or even no – further action to shore up your defences, leaving your systems wide open to cyber-attack.

Against the myths, you must set the reality. For example:

In 2013, the personal information of one of every 13 people in the world – 552 million – was exposed in cyber-attacks (using 7.16 billion as current world population estimate – Symantec ‘Internet Security Threat Report’ Vol. 19). Stealing data is big business and protection requires layered security.

Mega Data Breaches - where more than 10 million identities were exposed - went from 1 in 2012 to 8 in 2013 – this marks a shift in behaviour from years past

Targeted attacks increased by 91% from 2012.

Meanwhile, the security steps that might once have kept you safe from online threats no longer offer the same levels

of protection. The cybercriminals have moved on at staggering speed. The attack systems they employ are highly

refined and potentially devastating. You need to update your defences as often as the criminals update their attack

mechanisms, because this is a battle for supremacy that can never be won. You can only keep the enemy at bay one

day at a time.

Protect data in transit with an SSL certificate from Thawte today.

Not All SSL Is the SameWe make SSL our business in order to protect

yours. Thawte online security is trusted by

millions of people around the world. Here are

just a few reasons to switch to Thawte:

• High- assurance digital certificates

• Global reputation for uncompromised reliability

• Up to 256-bit SSL encryption

• World-class, multilingual support

• New, lower prices that are within your

security budget

• Thawte Trusted Site seal

Protect your data, safeguard your business,

and translate trust to your customers with

high-assurance, digital certificates from Thawte.

More Information If you have further questions,

or would like to speak with a Sales Advisor,

please feel free to contact us:

Via phoneUS toll-free: +1 888 484 2983

UK: +44 203 450 5486

South Africa: +27 21 819 2800

Germany: +49 69 3807 89081

France: +33 1 57 32 42 68

[email protected]

Visit our website at https://www.thawte.com/ssl

© 2014 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or

unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks

are property of their respective owners.

Protect your business and translate trust to your customers with high-assurance digital certificates from Thawte, the world’s first international

specialist in online security. Backed by a 17-year track record of stability and reliability, a proven infrastructure, and world-class customer support,

Thawte is the international partner of choice for businesses worldwide.

BUY TRY LEARN MORE