IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA



Similar documents
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Internet threats: steps to security for your small business

HOW SECURE IS YOUR PAYMENT CARD DATA?

Guideline on Safe BYOD Management

Secure Your Mobile Workplace

PCI Compliance Overview

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Securing mobile devices in the business environment

Security Best Practices for Mobile Devices

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Network Security & Privacy Landscape

How To Protect Yourself From Cyber Threats

BE SAFE ONLINE: Lesson Plan

10 Quick Tips to Mobile Security

Chris Boykin VP of Professional Services

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Mobile Device Management

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Five Trends to Track in E-Commerce Fraud

Security Bank of California Internet Banking Security Awareness

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

10 Smart Ideas for. Keeping Data Safe. From Hackers

Marble & MobileIron Mobile App Risk Mitigation

Cyber Security. John Leek Chief Strategist

Why Encryption is Essential to the Safety of Your Business

The Mobile Malware Problem

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

PCI Compliance: How to ensure customer cardholder data is handled with care

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Langara College PCI Awareness Training

Control Issues and Mobile Devices

Tom Schauer TrustCC cell

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

INFORMATION SECURITY FOR YOUR AGENCY

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Cybersecurity Workshop

BYOD Policy for [AGENCY]

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Hands on, field experiences with BYOD. BYOD Seminar

Protecting against Mobile Attacks

Information Security and Risk Management

If you can't beat them - secure them

Malware & Botnets. Botnets

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Don t Fall Victim to Cybercrime:

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Defending Behind The Device Mobile Application Risks

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

How To Protect Your Online Banking From Fraud

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Frequently Asked Questions

Managing Web Security in an Increasingly Challenging Threat Landscape

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Feature List for Kaspersky Security for Mobile

The Cloud App Visibility Blindspot

Cybersecurity: Protecting Your Business. March 11, 2015

Franchise Data Compromise Trends and Cardholder. December, 2010

PCI COMPLIANCE AND WHAT IT MEANS TO YOU IN ENGLISH

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

ADDING STRONGER AUTHENTICATION for VPN Access Control

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Remote Deposit Quick Start Guide

IEEE CQR 2010 A Holistic Approach to Mobile Security

E-Business, E-Commerce

Data Management & Protection: Common Definitions

Cyber liability threats, trends and pointers for the future

IBM Endpoint Manager for Mobile Devices

2012 NCSA / Symantec. National Small Business Study

Transcription:

IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions

The Mobile Explosion Mobile traffic data in 2011 was nearly 12 times the size of the entire global Internet traffic in 2000 Global mobile traffic will increase 13 fold between 2012 and 2017 By the end of 2013, the number of mobile connected devices will exceed the number of people on earth By 2017, there will be 8.6 billion handheld or personal mobile ready devices Gartner predicts that by 2014, 90% of companies will support corporate applications on personal mobile devices Source: Cisco Global Mobile Data Traffic Forecast Update, 2012 2017

Mobile Computer Sales: Tablets Lead Tablets are poised to outsell laptops by 2016 4

Mobile Technology Trends According to CTIA, as of June 2012, there were 327,577,529 active mobile devices connected to US carriers BYOD gaining acceptance in the workplace Mobile Device Sales (3Q 2012): Android 104.8 million units (68.1% market share) ios 26 million units (16.9% market share) BlackBerry 7.4 million units (4.8% market share) Symbian 6.8 million units (4.4% market share) Windows 5.4 million units (3.5% market share) The popularity of smartphones has made them the next major target for cyber criminals

BYOD: The New Frontier Employees are using their own devices in the work place and asking to connect them to the company network this trend is known as Bring Your Own Device (BYOD). According to Forrest Research, 48% of employees will buy their own device whether their organization approves or not.

BYOD: The New Frontier Benefits Employees get a choice Boosts morale and productivity. The firm avoids owning hardware and ongoing contracts Employees set up services under their own names. The equipment can go with the employee if they leave Departures are cleaner, as data is simply wiped out from the employee s device.

BYOD: The New Frontier Challenges Security is easier to manage in company owned devices Security is difficult to control when the environment and devices are not under the IT department s control. The balance between life and work is challenged The line between life and work is blurred; employees have a hard time turning off work. Policies are not keeping up with the trend Enterprises are lagging behind in creating policies that addresses the BYOD trend.

BYOD: The New Frontier Legal Challenges Can legal discovery rights of corporate information be extended to personal devices if they hold personal data? Do breaches of personal data on company owned devices leave the company liable (e.g., HIPAA information on my company owned device)? Could it support wage and hour claims for non exempt employees working off the clock? A 2010 US Supreme Court 9 0 ruling declared that employees are not entitled to privacy if they use an employer s issued device, so what level of privacy is there for BYODs?

Current Mobile Threats Malware is the single largest threat to mobile security In 2012, Kaspersky Labs discovered an average of 6,300 new Android malware samples every month, which was an increase of over eight times from 2011 Mobile malware can be divided into three separate categories: Trojans, Backdoors, Spyware Trojans are widely used in SMS attacks Backdoors allow unauthorized access to devices Spyware targets the unauthorized collection of private data

Current Mobile Threats: Android Android is more susceptible to malware than Apple Why? Lax application markets; apps can be downloaded outside of market Easy to repackage legitimate applications with malware Flawed Android security model Large security issues with jail broken and rooted phones Hacking mobile phones allows security controls to be circumvented

Current Mobile Threats: Find and Call Apple s first App Store malware: Find and Call App steals phonebook from devices and pushes data back to a command and control (C&C) server Data is then used for SMS spam campaigns

Current Mobile Threats: Ransomware Ransomware: Malware which effectively holds a user s device hostage until a fee is paid

Current Mobile Threats: SMS Botnets SMS Spam Botnet: Directs users to download malware directly on their device An SMS is received containing a URL When the users clicks on the URL, a Trojan is installed on the device with the legitimate application Trojan contacts C&C server to obtain spam message The spam message is sent to the contacts stored in the phone

Current Mobile Threats: Zitmo Banking Trojans: Zeus In The Mobile (Zitmo) Masquerades as a banking activation application and eavesdrops while looking for mobile transaction authentication numbers (mtan) in SMS messages sent by banks to customers for a second form of authentication First appeared in 2010

Cloud Computing Private Cloud Hosted for or by a single en ty on a private network; can be hosted internally or outsourced but is most often operated internally; only those within the entity share the resources Community Cloud Hosted for a limited number of entities with a common purpose; access is generally restricted; most often used in a regulated environment where entities have common requirements Hybrid Cloud Data or applica ons are portable and permit private and public clouds to connect Public Cloud Available to the general public; owned and operated by a third party service provider

Cloud Computing The institution has the ability to increase or decrease resources on demand without involving the service provider (on demand self service). Massive scalability in terms of bandwidth or storage is available to the institution. The institution can rapidly deploy or release resources. The financial institution pays only for those resources which are actually used (pay as you go pricing)

Cloud Computing One of the major concerns with cloud computing is the loss of control for physical access to systems. Depending on the type of cloud service you use, you may be sharing hardware with others. This can lead to legal (and operational) issues if the systems and/or backups are requested by a court or government agency.

Notable Payment Card Security Breaches Heartland Payment Systems 2008 Hackers attacked the system that is used to process card transactions. Up to 100 million transactions compromised. TJX Corp. 2007 Hackers compromised wireless network to steal information on approx. 94 million card transactions. HEI Hospitality (Marriott, Sheraton, Westin) March/April 2010: POS system compromised. Up to 3,400 credit card accounts compromised. PlayStation Network 2011 Hack attack. 77 million personal information acquired. Credit card information (TBD). Seattle Small Medium sized businesses April 2011 war driving hacks to steal credit card data. Stole about $750,000 worth of goods.

Payment Card Industry (PCI) Data Security Standard Overview Not a government regulation, but an industry regulation. All entities that process, store, or transmit payment card information need to comply. (PAN is the deciding factor.) The Players: Card Brands, Merchants, Service Providers, Acquirers, and Issuers Effective compliance dates varies depending on merchant level or service provider level and card brand (June 2005, Dec. 2008). Card brands have their own compliance programs and are responsible for compliance tracking, enforcement, penalties, and fees.

Why is compliance with PCI DSS important? A security breach and subsequent compromise of payment card data has far reaching consequences for affected organizations, including: 1. Regulatory notification requirements 2. Loss of reputation 3. Loss of customers 4. Potential financial liabilities (regulatory and other fees and fines) 5. Litigation

Penalties for Non Compliance Members proven to be non compliant or whose merchants or agents are non compliant may be assessed: Non compliance fine up to $500K Forensic investigation costs Issuer/Acquirer losses Unlimited liability for fraudulent transactions Potential additional issuer compensation (e.g., card replacement) Dispute resolution costs

Fraud Trends Malware Mobile Devices Social Engineering Social Media

Malware Man in the Browser is malware that infects a web browser and has the ability to modify pages, modify transaction content, or insert additional transactions. This is hidden from both the user and application. Keystroke loggers and other similar strains of malware continue to be used to collect data and user credentials to be used for fraud.

Social Engineering As financial institutions enhance their online security, the criminals are changing their avenue of attack Social engineering is used in various forms (phishing, spear phishing, or smishing)

US Bank Types Attacked Phishing

Phishing Attacks per Month

Social Media Easy way for criminals to gather intimate details about members to use in fraud Easy way to send malware or Trojans to a large group of people from a trusted friend New frontier for phishing and social engineering attacks

Internet Banking Authentication Regulators came out with guidance related to Internet banking authentication in June 2011. The guidance called out the responsibility of financial institutions to: Differentiate between retail and business transaction risk Agencies recommend that institutions offer multifactor authentication to their business customers. Continue to focus on Risk Assessment Increased emphasis on Layered Security Programs

Questions? Contact Us paul.rainbow@mossadams.com 509 714 4865