STOP Cybercriminals and. security attacks ControlNow TM Whitepaper



Similar documents
management Patch ControlNow TM Whitepaper Fixing vulnerabilities before they are exploited.

Protect your business. with web security ControlNow TM Whitepaper

continuity. Safeguard communications 24/7. Control TM Whitepaper

MAX Insight. HIPAA Hardening & Configuration Guide for MSP s

Managed Online Backup Compliance

The giant s advantage. ControlNow TM Whitepaper Why cloud computing levels the playing field for SMBs.

SPEAR PHISHING AN ENTRY POINT FOR APTS

Make life simple and make more money the easy way.

strategies For boosting your practice s information immunity Control TM Whitepaper

MAster the cloud. IT Admins. and boost your career. ControlNow TM Whitepaper

GFI White Paper. How Web Reputation increases your online protection

MAX Insight. Workstations: Disaster Recovery s untouched opportunity. Whitepaper. By Nick Cavalancia

1 Using GFI MailEssentials

Survey: Web filtering in Small and Medium-sized Enterprises (SMEs)

Network Security Report:

Think antivirus is enough? ControlNow TM Whitepaper. Your business needs more than antivirus to stay protected.

GFI MAX MailArchive Quick Start Guide for customers

Netsweeper Whitepaper

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0

Users Beware: 10 Security Tips to Share with Your Users

Don t Fall Victim to Cybercrime:

Internet threats: steps to security for your small business

GFI Product Guide. GFI MailArchiver Archive Restrictions and Licensing Guide

SOLUTION CARD WHITE PAPER

10 Quick Tips to Mobile Security

Types of cyber-attacks. And how to prevent them

GFI MailEssentials 2014 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

Social networking at work: Thanks, but no thanks?

WEB ATTACKS AND COUNTERMEASURES

An Effective MSP Approach Towards HIPAA Compliance

GFI Product Guide. How to create a new SQL Server Instance in Microsoft SQL Server 2012 and SQL Server Express

Patch management with GFI LanGuard and Microsoft WSUS

Malware & Botnets. Botnets

Basic Security Considerations for and Web Browsing

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

GFI White Paper. security: The performance, protection and choice SMBs deserve

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

Buyers Guide to Web Protection

The Key to Secure Online Financial Transactions

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Managing Security Risks in Modern IT Networks

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

Open an attachment and bring down your network?

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Cyber Security. Maintaining Your Identity on the Net

isheriff CLOUD SECURITY

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

GFI MAX RemoteManagement Building Blocks to Managed services

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Towards a comprehensive Internet security strategy for SMEs

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Cyber Security. Securing Your Mobile and Online Banking Transactions

WHITE PAPER. Understanding How File Size Affects Malware Detection

Streamlining Web and Security

Advanced Persistent Threats

Introduction (Contd )

security in small and medium-sized businesses

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Security Guide

I ve been breached! Now what?

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM ENTERPRISES

Common Cyber Threats. Common cyber threats include:

Quick Start Guide for administrators

Phishing Scams Security Update Best Practices for General User

GFI Product Manual. Outlook Connector User Manual

MALWARE TOOLS FOR SALE ON THE OPEN WEB

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

GFI White Paper. Vulnerability scanning Your company s personal virtual security consultant

2012 Bit9 Cyber Security Research Report

43% Figure 1: Targeted Attack Campaign Diagram

Fighting Advanced Threats

BE SAFE ONLINE: Lesson Plan

Five Trends to Track in E-Commerce Fraud

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

GFI Product Comparison. GFI LanGuard 2011 vs Retina Network Security Scanner

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

How To Set Up A Journaling Mailbox In Microsoft Office 365 And Gfi Mailarchiver

GFI MailSecurity deployment strategies

GFI Product Comparison. GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2

Five Tips to Reduce Risk From Modern Web Threats

Securing Endpoints without a Security Expert

The SMB Cyber Security Survival Guide

GFI White Paper. 10 steps to effective web security

Spear Phishing Attacks Why They are Successful and How to Stop Them

Finding Security in the Cloud

GFI Product Manual. Version 6.0. Getting Started Guide

Course Content: Session 1. Ethics & Hacking

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Innovations in Network Security

of firms with remote users say Web-borne attacks impacted company financials.

Online Cash Manager Security Guide

Endpoint Security and the Case For Automated Sandboxing

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

GFI Product Manual. Administration and Configuration Manual

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Transcription:

STOP Cybercriminals and security attacks ControlNow TM Whitepaper

Table of Contents Introduction 3 What the headlines don t tell you 4 The malware (r)evolution 5 Spear phishing scams 5 Poisoned searches 5 Keylogging 5 Flash drives and USB sticks 6 Protect your business with layered security 7 FOLLOW US & SHARE Stop cybercriminals and security attacks 2

Introduction Malware attacks have become increasingly prevalent with close to three million unique malware samples uncovered each month. As these threats continue to rise, businesses are starting to question the capabilities of their security infrastructures. FOLLOW US & SHARE Stop cybercriminals and security attacks 3

What the headlines don t tell you Unlike the widespread news coverage of security breaches at large corporations such as Citigroup Inc., Sony Corp., Nintendo, PBS and the CIA, many cybercrimes go unreported, often in an effort to maintain customer confidence and, in the case of publicly traded companies, to protect shareholder value. Although most headline-making hacks involve enterprises, cybercrime is a very real and steadily growing threat to businesses of all sizes. Cybercriminals target businesses for several reasons, including monetary gain, to access sensitive data or files, to exploit security weaknesses or just for fun. Cyber-attacks are more sophisticated and more targeted than ever. So are the hackers and malware writers getting smarter? Or are anti-malware and endpoint security solutions falling short? It s a little bit of both. Although most headlinemaking hacks involve enterprises, cybercrime is a very real and steadily growing threat to businesses of all sizes FOLLOW US & SHARE Stop cybercriminals and security attacks 4

The malware (r)evolution Traditional viruses represent only a fraction of the current threat landscape. Today, the top security risks are: Spear phishing scams Spear phishing scams are targeted email attacks where cybercriminals send fake emails that appear surprisingly authentic. These emails often mimic the look and/or style of communications sent by banks or credit card companies and phish for personal information. Frequently, spear phishing emails link to malicious websites, where login credentials are stolen, or include malicious attachments, that install malware on end-user machines. Between July and December 2010, the Anti-Phishing Working Group (APWG) identified 67,677 phishing attacks. Based on this, the analysis of cybercriminal activities including the development of unique malicious websites and the financial benefits afforded spear phishing scams, the APWG reports these types of threats will continue to grow exponentially. As the number of malicious email scams increase, network security measures must also. Traditional spam and virus filters are often ineffective in catching spear phishing attempts. With today s threat landscape, it s imperative to choose an antivirus solution that accurately identifies and strips malicious attachments from emails, blocks dangerous URLs and protects users from visiting phishing sites Employee education is also critical. Poisoned searches An estimated 300+ million people conduct Google searches each day. So it s no surprise that malware writers have begun to capitalize on search engine results, using current, popular searches to propagate malware. These poisoned searches push bogus URLs to the top of SEO rankings, sending users to sites that host malicious code. SEO poisoning is a popular attack vector that capitalizes on high-searched phrases, such as free porn, and high-profile events, such as 9/11. According to a 2010 report, 22.4 percent of the top 100 Google searches resulted in poisoned URLs, up from 13.7 percent in Q2 of 2009. 1 Since poisoned searches have the potential to infect machines or even take down a network, user education is key. Reminding employees to only rely on trusted news sources, to type URLs directly into web browsers and to be leery of download prompts may save future headaches. Keylogging Commercial keylogging programs serve valid purposes, such as tracking kids computer-related activities or assessing employees site visits and online traffic. However, malicious keyloggers do not operating in stealth mode to grab screenshots, log user activity and gain passwords, financial data and other personal information from machines. 1 Websense 2010 Threat Report, www.websense.com/content/threat-report-2010-introduction.aspx FOLLOW US & SHARE Stop cybercriminals and security attacks 5

The malware (r)evolution The legality of keylogging and other PC monitoring tools is hotly debated. Regardless, keyloggers and monitoring apps should never be installed on the network without express permission from authorized personnel as they can expose the organization to unnecessary risk. Flash drives and USB sticks Flash drives and USB sticks allow employees to transfer documents, data and files to work from home or another offsite location. And while doing so may increase employee productivity, it also puts network security at risk. In a July 2011 report from the Ponemon Institute, 2 70 percent of companies traced the loss of confidential data to USB sticks. Of that, 55 percent were related to malware attacks. The 2010 Stuxnet worm outbreak is a haunting example of the dangers of USB sticks. This spyware worm spread undetected via infected memory sticks to thousands of machines in the U.S., India, Indonesia and other countries. So how can the convenience of working remotely be achieved while still keeping the network secure? The answer is simple: choose an antivirus solution that scans self-running media, such as USB drives, for malware when a removable device is inserted. 2 Second Annual Cost of Cyber Crime Study, July 2011, Ponemon Institute FOLLOW US & SHARE Stop cybercriminals and security attacks 6

Protect your business with layered security To ensure that the latest malware doesn t wreak havoc on your business, draining user productivity or monopolizing network resources, you must be prepared with a strong security strategy. This should include a small-footprint business antivirus that s easy to set up and manage and automatically scans for threats in real time without false positives or strains on network performance and employee education, as cybercriminals use social engineering techniques to prey on the good, trusting nature of individuals, getting them to click on poisonous URLs and malicious attachments. FOLLOW US & SHARE Stop cybercriminals and security attacks 7

USA, Canada, Central and South America 4309 Emperor Blvd, Suite 400, Durham, NC 27703. USA Europe and United Kingdom Vision Building, Greenmarket, Dundee, DD1 4QB, UK Australia and New Zealand 2/148 Greenhill Road, Parkside, SA 5063 www.controlnow.com/contact Disclaimer 2014. LogicNow. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. LogicNow is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, LogicNow makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information, or errors. LogicNow makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.