Cyber Tactics / Cyber Security News

How to Develop Cyber Security for SMEs

The cyber intrusion headlines may focus on the Fortune 100 being hacked, but they’re not the only victims.

The cyber intrusion headlines may focus on the Fortune 100 being hacked, but they’re not the only victims. Not by a long shot. Naturally, since 99.9 percent of all U.S. businesses have fewer than 500 employees, and few of those retain dedicated information security staff, cyber criminals find small and medium enterprises to be attractive targets. Surprising to many, however, is that foreign intelligence services also are interested in SMEs. After all, they produce 16.5 percent times more patents per employee than large patenting firms, and are far more likely to develop emerging technologies than large firms. Making matters worse, targeted attacks against SMEs appear to be increasing dramatically. Perhaps this is because, as third-party vendors, SMEs also tend to be softer targets than the larger businesses they serve. The facts bear out this hypothesis. Smaller businesses are significantly more likely to be running spyware and keystroke loggers than large companies. They also are getting hacked twice as often through brute force attacks, reflecting that SMEs are more likely to permit the use of default user credentials, easily guessable credentials, or weak credentials that cannot withstand the onslaught of an automated dictionary attack.

The good news is that SMEs can significantly reduce their cyber risk against the greatest potential harms even without a large IT budget. The first step is, and always will be, to prioritize what truly needs to be protected. Consider engaging your managers in worst-case-scenario planning. Explore real-world events that, if they happened to your business, would compromise confidentiality, integrity and/or availability of (1) your information systems, especially keeping in mind those with unique or hard-to-recreate functions such as proprietary software applications or industrial capabilities; or, (2) the information processed, stored and transmitted on your network. Would the event cause your operations, assets, or people to suffer limited, serious, or severe harm? By first evaluating the impact of a compromise without dismissing low-likelihood scenarios, you will ensure that your team remains on heightened alert to protect those specific assets should the nature of the threat increase over time. It is at this point, having identified your greatest potential losses, that you should prioritize your risks by factoring in their probability.

Armed with your cyber security priorities, consider next how you might enhance their protection. The National Institute of Standards and Technology recommends a veritable laundry list of considerations to lower cyber risk, covering 17 different areas. The easiest way to approach so many possible controls may be to start by isolating your most critical systems and data. For example, about four years ago SMEs were facing a rash of high-value losses due to fraudulent Automated Clearing House transactions (a fancy term for online banking). Even companies that were using hardware-based two-factor authentication to log in to their banks were part of a growing list of victims that, combined, lost hundreds of millions of dollars. Some went bankrupt, and the problem gained media attention.  How was the problem solved?  Easily. Commercial banking customers were advised to carry out their online banking activities from an isolated stand-alone computer. The trick was to have the cultural discipline to prohibit – from that one machine – all e-mail and Web browsing, those being the most likely paths for malware infection. The results? Remarkable. I was told that those who followed the advice never fell victim to this massive fraud. All for a security price tag less than $1,000.

The concept of isolation plays out as well for critical data and services that must be shared. Consider consolidating and monitoring the path from, and the “escape route” to, the Internet. Numerous logs should all be stored in a protected centralized system that is time synchronized and easily searchable. But the first step is to ensure they are simply turned on, which will allow an incident response team or law enforcement to step in and more quickly identify, isolate and remediate the source of a breach. The Federal government implemented this process under its Trusted Internet Connection (“TIC”) initiative, which likely “TIC-ked” off a lot of would-be hackers. Simply put, the fewer egress points to monitor, the better it is to focus your resources and detect malicious activity. When you visit a hospital nursery, there is only one door in and out, it is locked and there are cameras. There’s a reason for that; it works.

Finally, big cyber security wins across SMEs can be achieved by focusing on account monitoring and controls (restricting Administrator privileges, requiring strong passwords, monitoring and deactivating accounts), deploying end-to-end encryption solutions (data may be stolen, but it can’t be used), patching and updating operating systems and third-party applications (enable auto-updating features) and adopting meaningful back-up strategies (preferably off-site and either offline or on write-once media for the most critical data).

There may be no getting around the fact that the average SME outspends larger companies on IT security per employee and as a percentage of revenue. Still, IT efficiency is improving, allowing SMEs to get more value for their security dollar. And, in terms of emerging technology, there is no doubt that SMEs are and will continue to be at the forefront of developing highly anticipated, game-changing cyber security solutions.    

 

About the Author:

 Steven Chabinsky is Chief Risk Officer and Senior Vice President of Legal Affairs for the cyber security technology firm CrowdStrike, where he advises the company and its clients on CrowdStrike’s incident response services, cyber intelligence products, and intrusion detection and attribution platform. He previously served as Deputy Assistant Director of the FBI’s Cyber Division. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

April 2015 security magazine cover

2015 April

In this April 2015 issue of Security, find out how to keep your enterprise resilient after a disaster in 2015. Also discover how to strike a balance between design basis threats and active shooter threats and see what's in store for the 2015 RSA Conference.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.