Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

4 Security Lessons From the White House Network Breach

By Armond Caglar
cyber 1 feat
May 26, 2015

When a major hack hits the news, enterprise IT teams scramble to prepare for the fallout. Any organization directly affected by a breach is bound to come under fire, along with the effectiveness of existing security deployments that were unable to protect them. However, every significant data exposure also causes companies to wonder when a similar event might happen to them.  The recent news about the White House and State Department hacks, now attributed to malware created by Russian hacking group CozyDuke, should serve as another reminder to organizations of the evolving sophistication in remote access attacks and to prepare accordingly. Unfortunately, however, the reality is that many organizations will continue to think that such an event can never happen to them, or if they do, will either ignore the threat completely or overcompensate by investing limited security resources into traditional IT defenses at the expense of more subliminal sources of infection.

Legacy endpoint and perimeter deployments such as firewalls and intrusion detection serve as essential defense-in-depth safeguards for data security, but cybersecurity is more than just vendor sensors and total security is impossible.  If the White House is susceptible to a sophisticated cyber attack or the National Security Agency vulnerable to a cataclysmic insider threat, other organizations with smaller security budgets and comparatively less manpower and expertise will be no different.  The next time you sit down with your team to evaluate your enterprise risk landscape, take a lesson from the CozyDuke attack or from any number of previously victimized entities and consider the following steps.

1. Start with a plan.

The least effective approach to security is a reactionary one. If you’re not thinking clearly or fully evaluating your organization’s risks and needs, you’re likely to focus too heavily on one area of exposure.  Instead, your team should aim to develop a tailored and panoramic understanding of the threats to your industry and company, to include the sensitive data you are obligated to protect like corporate trade secrets or customer privacy data such as health and payment card information.  Such a plan would seek to prioritize data based on its risk sensitivity and criticality to corporate innovation, execution, and reputation, as well as understand when it might be most imperiled based on the multitude of ways a creative adversary might target it.  If you adhere to the philosophy that the data you have is worth stealing, you can then contemplate some inventive scenarios where potential threats to it are most severe.  Use this to align security investments and resources against these potential problem areas. 

2. Spread out your resources.

As CozyDuke proved, phishing attacks should be one of your company’s top security concerns. In 2013, Kaspersky Lab reported that the number of Internet users hit by phishing attacks had increased by 87 percent since the previous year. However, these numbers are no reason to forget that various other breach tactics and potential security risks are growing at equally alarming rates. While your employees should be properly educated on tips for safe computing and awareness of the increasing professionalism and credibility of phishers like CozyDuke, your risk management budget should also include accommodation for less-technically focused areas. This includes education on the behavioral precursors exhibited by malicious insiders, the litany of human engineering techniques practiced by determined competitors or adversaries, and ensuring internal policies and procedures for data security are matured through consistent application and enforcement. 

3. Consider your industry and audience.

Depending on your industry and the stakeholders you serve, certain risks won’t apply to your business – while others may increase tenfold.  In highly regulated industries such as healthcare, it is no secret that covered entities must comply with stringent guidelines covering information assurance of protected health information.  For those companies operating globally within competitive industries such as high-tech or manufacturing, similar standards should be rigorously followed as well but instead with a focus on compliance to those best practices addressing threat exposure from foreign travel, including danger from nation-states known for prolific industrial espionage and competitive intelligence adversaries alike.

4. Prepare for continuity.

Once your holistic security vulnerabilities have been identified and solutions put in place to remediate them, your security posture will be considerably improved but your work isn’t over.  An effective risk management plan is founded on the adoption of mature security practices, continuously assessing risk, and ensuring the resiliency of your organization should a cyber event occur.

If your enterprise is breached, every team, employee and transaction will be affected. The CozyDuke hack, among many other recent attacks, makes it clear that some of the most malicious security infections in today’s IT landscape only require an end user to be tricked a single time. From that initial compromise, hackers can establish a foothold within a network and start the standard attack cycle – where recovery can take months or even years.  As you update security strategies and build out new initiatives, remember that a holistic understanding of your cybersecurity risk should be your primary goal. When today’s threats are putting all organizations at risk, remember that while attacks may be inevitable, the extent of your victimhood will always be a function of preparedness. It starts with a tailored understanding of your enterprise posture relative to risk, the maturity of the cybersecurity culture you implement, and your plans for business continuity when a devastating attack or breach does occur.

KEYWORDS: data breach White House cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Armond Caglar is a director and senior threat specialist at TSC Advantage and has over 10 years of experience consulting on international security, intellectual property protection, and risk management solutions for both the private and public sector.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • lessons-ideas-freepik1170x658.jpg

    3 security lessons we haven’t learned from the Kaseya breach

    See More
  • Shaking hands

    Lessons from the Snowflake breach: SaaS security needs collaboration

    See More
  • cyber security lock

    Cybersecurity lessons from the red team: How to prevent a data breach

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • Career Network (60 days)

  • Career Network (30 days)

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing