SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
SECURITY
NATION
JULY/ AUG
2016
28
Ransomware, Data Breaches, and Reputable
Hackers: A Conversation with Matthew Meade
Matthew H. Meade
is a name you should
know by now, and
if you don’t, write it
down. I’ll wait.
Matthew Meade is a partner
at Buchanan Ingersoll &
Rooney PC where he chairs
the Cybersecurity and Data
Protection Group and provides
counsel to clients on data
security, data breach notification
laws at both the state and
federal level, records and
digital governance including
the associated risks. Meade
has piloted training programs,
policies for the management
of sensitive information, and
document retention best
practices. And if that’s not
enough to get you to take note of
this cybersecurity experts’ name,
his over 13 years of experience
on hundreds of data breaches
will easily sway you to break out
those Post-it©
notes and slap one
on this page (and with the veil
of cybersecurity that is about to
be lifted, you may never return to
digital notes again).
CONTINUED ON P. 30 →
By Samantha Park
SECURITY
NATION
JULY/ AUG
2016
30
Meade made a splash in the world of cybersecurity
and data breaches in late 2003 where he successfully
managed a significant data breach for a Fortune
100 based in New York City. In August of 2004 he
moved to Pittsburgh, PA, joined Buchanan Ingersoll
& Rooney PC and never looked back. His expertise
in proactive data security training and notification
laws coupled with his ability to cater to any specific
industry keeps him in The Best Lawyers in America®
list for commercial litigation. It also made him an
ideal speaker at the 2016 ESA Leadership Summit
and the 2016 Electronic Security Expo (ESX). It was
easy to grasp from our conversation that Matthew
works to make this subject relatable to all of his
varied audiences. He promotes realistic approaches
in preventing and handling a threat or breach of
sensitive information based on years and years of real
world application. So, whether words like Tescrypt
or Cryptowall are used in your daily vocabulary or
not, Meade can shed light on matters related to data
use, storage, privacy, and security in a manner that is
applicable to a particular company.
Matthew was one of over forty highly sought after
education session speakers at the 2016 ESX in Fort
Worth, TX. His session, Risky Business: Cyber
Threats For Real was a seminar offered under the
Rethink the Future education track. Rethink the
Future was designed by Track Chair Robert Few, to
provide a “broad perspective of what lies ahead and
how to prepare yourself for fast-paced, business-
changing breakthroughs.” This session was the
opportunity for electronic security and life safety
industry leaders and decision makers to absorb the
next and arguably most menacing bully making its
way into any business. And I mean ANY business;
hackers don’t discriminate. Your business could
easily be listed in the same category as some of
the largest and most well-known companies in the
United States. I’m talking about corporations that
frequent the Fortune lists like Home Depot and
Anthem; businesses whose brands are synonymous
with their industry on a global scale such as Adobe
and Starbucks. You could even join the ranks of
popular government entities such as the Internal
Revenue Service, U.S. Department of Veteran Affairs,
and the U.S. Office of Personnel Management.
What would you say if I told you this high level of
notoriety could be yours by the time you are done
reading this article? Great, right?
No. Each of these companies and hundreds more
have suffered a cybersecurity data breach resulting
in a minimum of 30,000 records lost each with
multiple surpassing 100,000 records and one even
being breached twice (hint: it was a government
entity). A data breach is the unauthorized access
and use of personal information such as credit card
information, passwords, social security numbers,
employment information, date of birth, address, the
list goes on. Digital governance and cybersecurity
is a concept significantly gaining momentum in
today’s ever-connected world, primarily in our
RISKY BUSINESS / CON’T.
own electronic security and life safety industry. With the
growth and integration of advancing technology (think
interactive security, mobile surveillance apps, DIY) many
factors contribute to the current increasing concerns with
cybersecurity and digital governance. The uptake in the
adoption of public cloud accounts means more and more
data is available for nefarious purposes. It has steadily
become easier and easier for employees to self-publish
and self-broadcast sensitive data, both intentionally and
accidentally. Apprehension of cybersecurity breaches
are also on the rise due to the irreparable damage it can
have on a brands reputation and business operations.
This digital weakness is alarming to end users who trust
businesses with private information. How likely are you
to return to a company where an employee boosted your
credit card number to go on a shopping spree on Amazon?
The concerns over important information making its
way into the hands of disreputable individuals is further
exasperated by the ‘not if but when’ mentality. This
attitude is recognition of the flaws in digital governance
and document management as they pertain to data
breaches and accepting them. Matthew Meade fights this
with proactive training for employees, implementing best
practices, and rescuing businesses in the midst of data
breaches.
What Data and Why
Hackers Want It
The days of social security numbers attracting top dollar
on the data black market are long gone. Even credit card
numbers aren’t worth the hassle to this group of hungry
data harvesters. These numbers that mean so much to our
lives, that protect our future retirement plans and help
us keep up with the Joneses, amount to a value of roughly
$1 per record on the data black market, says Meade. It’s a
weird feeling to be both flabbergasted and disappointed
that the hackers don’t care about these things that can
make or break our existence. The reasoning behind the
low worth associated with this type of information is in
thanks to the flexibility and quick accessibility credit card
holders have to reporting, freezing, and canceling these
cards. In many cases, all one would have to do is open an
app on their smartphone and tap ‘freeze card’ to instantly
prevent any unauthorized purchases. Stolen social security
numbers are reported to both your local police department
and the FTC where an alert can be set up to notify you
when someone tries to extend credit under your name and
social security number making it ‘monitorable.’
Meade explains that the data that brings the big bucks in
the underground world of data sales in the black market is
medical data. This info sells for a whopping $50 per record
and gives the hacker or buyer “access to drugs, healthcare,
and access to additional peoples’ data.” For example, a
college student who is on his parents’ health insurance
plan could be a gateway to parental data. Hackers can
also do significant damage with building information
such as layouts, blueprints, and security vulnerability
reports. This information can be used for further criminal
activity, namely theft of physical product (think Tyco ADT
warehouse heist).
The Hackers’ Tool That Helps 	
Build Their ‘Business’
Ransomware is the ever present instrument in a hackers’
toolbox. This malware can leach its way into any PC
regardless of its intended use. Business computers,
government computers, and public use computers have equal
opportunity to be hacked as a home computer. A user can
“unknowingly open an email or download something that
infects [their] PC and locks [them] out” explains Meade, “you
would have to pay anywhere between $25 and $600 within
a time period – usually 24 hours – to get access back or
CONTINUED ON P. 32 →
SECURITY
NATION
JULY/ AUG
2016
32
lose everything.” Ransomware is essentially ransoming
everything you keep on your computer back to you but
in these situations, there is no real guarantee that you
will get your access back. How much trust should you
put in a digital criminal who is holding your laptop
captive? According to Microsoft, the top ten ransomware
families in the global market share from December
2015 to May 2016 are Tescrypt (42 percent), Crowti (17
percent), Fakebsod (15 percent), Brolo (9 percent), Locky
(7 percent), Teerac (4 percent), Critroni (2 percent),
Reveton (2 percent), Cerber (1 percent), and Exxroute (1
percent). In this same time period, Microsoft notes the
United States accounted for 50 percent of total global
exposures of ransomware. But apparently hackers have
a ‘code of honor’ they abide by as “many reported the
hackers making good on their word, which ended up
encouraging people to pay up rather
than any other option.” The reputation
and word-of-mouth of doing what they
said they would do, returning access to
the PC user after the ransom has been
paid, is actually convincing other hacked
individuals to go ahead and succumb to
the threat. In essence, living up to their
word is increasing their revenue.
Every Good Leader 		
Prepares For Battle
While reacting to a breach can often be the only course
of action available, Meade promotes a proactive approach
to cybersecurity. Buyers, clients, customers, and even
employees want to know you are already working to
protect their private information you have been trusted
with. Meade shared a set of proactive data security best
practices to implement into any business structure.
First, do not assume the IT guy will handle it, “to be
effective it needs to be a companywide engagement;
the first line of defense is employees.” This practice
can take on many forms such as department meetings
or adding data security policies to your onboarding
process. Next, develop an incident response plan, “such
as a table top exercise of what to do when a laptop is
stolen” and battle-test it! Put that plan into action and
make the necessary adjustments to make it fool-proof.
Testing your plan will allow any discrepancies or issues
to come up and give you the opportunity to fix them.
No data security best practice plan would be complete
without addressing passwords. Meade stresses this topic
because it’s one of those ‘it won’t happen to me’ things…
until it does. Passwords should never be less than eight
characters and contain both letters and symbols. A self-
proclaimed ‘hacktivist’ named Jeremy Hammond was
sentenced to 10 years in prison for successfully hacking
various government websites and releasing confidential
information. This elite member of the hacking network
called ‘Anonymous’ was on the FBI’s Most Wanted
list for his cybercriminal activities. Hammond was a
notorious computer mastermind taken down by a weak
password consisting of his cats’ name, Chewy, followed
by a sequence of numbers every three-year-old knows,
1-2-3. Rather than being known for his ‘hacktivist’ efforts
as he would have liked, Hammond will be known as
the cybercriminal who used ‘Chewy123’ as his laptop
password. So, while you may be thinking it’s obvious to
have a unique password with the number ‘0’ in place of
the letter ‘O’ or using the ‘@’ symbol to substitute for ‘A’,
not everyone in your organization may be aware of how
far they need to go to ensure their password is strong.
The Data Lifecycle Doesn’t 	
Include Cutting Corners
There are three main steps in the lifecycle of data, each
equally important. The data lifecycle begins with how
it comes into your business; was it an email attachment
originating with a coworker or was it sent from someone
you don’t know? Did you download a PDF from a
reputable website or was it more reputable…ish? The next
stage in the cycle is how this data is stored and accessed.
Here, this can be servers, public cloud accounts, even flash
drives. Does every single person in your company have
access to the servers or do you prioritize access? This topic
is especially of concern when dealing with VPN access and
remote employees whose cybersecurity efforts become
lax in the perceived safety of their home. To conclude the
data lifecycle is how to get rid of it. Is it truly deleted from
a hard drive or is it living in your digital recycle bin and
easily reinstated? Was the security vulnerability report
you printed for the executive meeting thrown in the
office trash can where a dumpster diver can find it or the
wind blow it away right into the hands of the next Jeremy
Hammond? Shredding paper documents and completing
full electronic wipes are a necessary step in protecting
your company. The Federal Trade Commission has the
authority to “take legal action against organizations that
violate consumers’ privacy rights, or misled them by
failing to maintain security for sensitive information.”
While 47 states have state-level data breach regulations
and procedures, there is currently no federally mandated
notification law specifically for the electronic security
and life safety industry. Often businesses with customers
in states they don’t have a physical location in will not
follow that states’ procedures. For example, your business
is located in Paris, Texas but your client is in Maine where
data breach notification laws differ; a responsible business
owner would be aware of both states’ directed procedures.
Matthew Meades’ expertise in proper security measures,
employee training, and both reactive and proactive
procedures make him an asset to the electronic security
industry as we continue to evolve and incorporate more
and more technological innovations. Paying attention
to cybersecurity is a practice that every business can
benefit from. Don’t let your brand notoriety be for the
wrong reasons. 
RISKY BUSINESS / CON’T.
the United States accounted
for 50 percent of total global
exposures of ransomware

Contenu connexe

Tendances

Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018Sanjana Khound
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
12 security predictions for 2012
12 security predictions for 2012 12 security predictions for 2012
12 security predictions for 2012 tech world
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 

Tendances (19)

Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
12 security predictions for 2012
12 security predictions for 2012 12 security predictions for 2012
12 security predictions for 2012
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 

En vedette

нирм индивид план - нюргуяна иванова (1)
нирм   индивид план - нюргуяна иванова (1)нирм   индивид план - нюргуяна иванова (1)
нирм индивид план - нюргуяна иванова (1)Нюргуяна Иванова
 
Yoobi in vogelvlucht
Yoobi in vogelvluchtYoobi in vogelvlucht
Yoobi in vogelvluchtSarah Kocken
 
Grob screw jacks goes theatres
Grob screw jacks goes theatresGrob screw jacks goes theatres
Grob screw jacks goes theatresMöschle Thomas
 
Designing The Listening Experience
Designing The Listening ExperienceDesigning The Listening Experience
Designing The Listening ExperienceKaytee Nesmith
 
Abeer sterilization
Abeer sterilizationAbeer sterilization
Abeer sterilizationmstfa mgdy
 
Primary 4th level students presentation
Primary 4th level students presentationPrimary 4th level students presentation
Primary 4th level students presentationallendesalazar
 
watermark_c1xl0ex1_1adugopu
watermark_c1xl0ex1_1adugopuwatermark_c1xl0ex1_1adugopu
watermark_c1xl0ex1_1adugopuTiffany Dhani
 
Data penduduk
Data pendudukData penduduk
Data pendudukRistiyana
 
Dh2015 Gravitate-presentation
Dh2015 Gravitate-presentationDh2015 Gravitate-presentation
Dh2015 Gravitate-presentationaavgoustinos
 
Betriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/en
Betriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/enBetriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/en
Betriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/enMöschle Thomas
 

En vedette (18)

Flyer Schubkette
Flyer SchubketteFlyer Schubkette
Flyer Schubkette
 
нирм индивид план - нюргуяна иванова (1)
нирм   индивид план - нюргуяна иванова (1)нирм   индивид план - нюргуяна иванова (1)
нирм индивид план - нюргуяна иванова (1)
 
Soil
SoilSoil
Soil
 
Yoobi in vogelvlucht
Yoobi in vogelvluchtYoobi in vogelvlucht
Yoobi in vogelvlucht
 
I5 sk 1403_deen
I5 sk 1403_deenI5 sk 1403_deen
I5 sk 1403_deen
 
Hovedopgaven -Terapeutisk Kompetence i Basic Body Awareness Therapy
Hovedopgaven -Terapeutisk Kompetence i Basic Body Awareness TherapyHovedopgaven -Terapeutisk Kompetence i Basic Body Awareness Therapy
Hovedopgaven -Terapeutisk Kompetence i Basic Body Awareness Therapy
 
innova train_en
 innova train_en innova train_en
innova train_en
 
Grob screw jacks goes theatres
Grob screw jacks goes theatresGrob screw jacks goes theatres
Grob screw jacks goes theatres
 
Designing The Listening Experience
Designing The Listening ExperienceDesigning The Listening Experience
Designing The Listening Experience
 
Abeer sterilization
Abeer sterilizationAbeer sterilization
Abeer sterilization
 
PRS4799_Dissertation_M00510169_Final
PRS4799_Dissertation_M00510169_FinalPRS4799_Dissertation_M00510169_Final
PRS4799_Dissertation_M00510169_Final
 
Primary 4th level students presentation
Primary 4th level students presentationPrimary 4th level students presentation
Primary 4th level students presentation
 
watermark_c1xl0ex1_1adugopu
watermark_c1xl0ex1_1adugopuwatermark_c1xl0ex1_1adugopu
watermark_c1xl0ex1_1adugopu
 
Stellantrieb de/en
Stellantrieb de/enStellantrieb de/en
Stellantrieb de/en
 
Data penduduk
Data pendudukData penduduk
Data penduduk
 
AS BSE Publication
AS BSE PublicationAS BSE Publication
AS BSE Publication
 
Dh2015 Gravitate-presentation
Dh2015 Gravitate-presentationDh2015 Gravitate-presentation
Dh2015 Gravitate-presentation
 
Betriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/en
Betriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/enBetriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/en
Betriebs- und Wartungsanleitung HMC-Serie Gurundausführung de/en
 

Similaire à Risky Business

Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docxhealdkathaleen
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
Social engineering
Social engineeringSocial engineering
Social engineeringBola Oduyale
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 

Similaire à Risky Business (20)

Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 

Risky Business

  • 2. Ransomware, Data Breaches, and Reputable Hackers: A Conversation with Matthew Meade Matthew H. Meade is a name you should know by now, and if you don’t, write it down. I’ll wait. Matthew Meade is a partner at Buchanan Ingersoll & Rooney PC where he chairs the Cybersecurity and Data Protection Group and provides counsel to clients on data security, data breach notification laws at both the state and federal level, records and digital governance including the associated risks. Meade has piloted training programs, policies for the management of sensitive information, and document retention best practices. And if that’s not enough to get you to take note of this cybersecurity experts’ name, his over 13 years of experience on hundreds of data breaches will easily sway you to break out those Post-it© notes and slap one on this page (and with the veil of cybersecurity that is about to be lifted, you may never return to digital notes again). CONTINUED ON P. 30 → By Samantha Park
  • 3. SECURITY NATION JULY/ AUG 2016 30 Meade made a splash in the world of cybersecurity and data breaches in late 2003 where he successfully managed a significant data breach for a Fortune 100 based in New York City. In August of 2004 he moved to Pittsburgh, PA, joined Buchanan Ingersoll & Rooney PC and never looked back. His expertise in proactive data security training and notification laws coupled with his ability to cater to any specific industry keeps him in The Best Lawyers in America® list for commercial litigation. It also made him an ideal speaker at the 2016 ESA Leadership Summit and the 2016 Electronic Security Expo (ESX). It was easy to grasp from our conversation that Matthew works to make this subject relatable to all of his varied audiences. He promotes realistic approaches in preventing and handling a threat or breach of sensitive information based on years and years of real world application. So, whether words like Tescrypt or Cryptowall are used in your daily vocabulary or not, Meade can shed light on matters related to data use, storage, privacy, and security in a manner that is applicable to a particular company. Matthew was one of over forty highly sought after education session speakers at the 2016 ESX in Fort Worth, TX. His session, Risky Business: Cyber Threats For Real was a seminar offered under the Rethink the Future education track. Rethink the Future was designed by Track Chair Robert Few, to provide a “broad perspective of what lies ahead and how to prepare yourself for fast-paced, business- changing breakthroughs.” This session was the opportunity for electronic security and life safety industry leaders and decision makers to absorb the next and arguably most menacing bully making its way into any business. And I mean ANY business; hackers don’t discriminate. Your business could easily be listed in the same category as some of the largest and most well-known companies in the United States. I’m talking about corporations that frequent the Fortune lists like Home Depot and Anthem; businesses whose brands are synonymous with their industry on a global scale such as Adobe and Starbucks. You could even join the ranks of popular government entities such as the Internal Revenue Service, U.S. Department of Veteran Affairs, and the U.S. Office of Personnel Management. What would you say if I told you this high level of notoriety could be yours by the time you are done reading this article? Great, right? No. Each of these companies and hundreds more have suffered a cybersecurity data breach resulting in a minimum of 30,000 records lost each with multiple surpassing 100,000 records and one even being breached twice (hint: it was a government entity). A data breach is the unauthorized access and use of personal information such as credit card information, passwords, social security numbers, employment information, date of birth, address, the list goes on. Digital governance and cybersecurity is a concept significantly gaining momentum in today’s ever-connected world, primarily in our RISKY BUSINESS / CON’T.
  • 4. own electronic security and life safety industry. With the growth and integration of advancing technology (think interactive security, mobile surveillance apps, DIY) many factors contribute to the current increasing concerns with cybersecurity and digital governance. The uptake in the adoption of public cloud accounts means more and more data is available for nefarious purposes. It has steadily become easier and easier for employees to self-publish and self-broadcast sensitive data, both intentionally and accidentally. Apprehension of cybersecurity breaches are also on the rise due to the irreparable damage it can have on a brands reputation and business operations. This digital weakness is alarming to end users who trust businesses with private information. How likely are you to return to a company where an employee boosted your credit card number to go on a shopping spree on Amazon? The concerns over important information making its way into the hands of disreputable individuals is further exasperated by the ‘not if but when’ mentality. This attitude is recognition of the flaws in digital governance and document management as they pertain to data breaches and accepting them. Matthew Meade fights this with proactive training for employees, implementing best practices, and rescuing businesses in the midst of data breaches. What Data and Why Hackers Want It The days of social security numbers attracting top dollar on the data black market are long gone. Even credit card numbers aren’t worth the hassle to this group of hungry data harvesters. These numbers that mean so much to our lives, that protect our future retirement plans and help us keep up with the Joneses, amount to a value of roughly $1 per record on the data black market, says Meade. It’s a weird feeling to be both flabbergasted and disappointed that the hackers don’t care about these things that can make or break our existence. The reasoning behind the low worth associated with this type of information is in thanks to the flexibility and quick accessibility credit card holders have to reporting, freezing, and canceling these cards. In many cases, all one would have to do is open an app on their smartphone and tap ‘freeze card’ to instantly prevent any unauthorized purchases. Stolen social security numbers are reported to both your local police department and the FTC where an alert can be set up to notify you when someone tries to extend credit under your name and social security number making it ‘monitorable.’ Meade explains that the data that brings the big bucks in the underground world of data sales in the black market is medical data. This info sells for a whopping $50 per record and gives the hacker or buyer “access to drugs, healthcare, and access to additional peoples’ data.” For example, a college student who is on his parents’ health insurance plan could be a gateway to parental data. Hackers can also do significant damage with building information such as layouts, blueprints, and security vulnerability reports. This information can be used for further criminal activity, namely theft of physical product (think Tyco ADT warehouse heist). The Hackers’ Tool That Helps Build Their ‘Business’ Ransomware is the ever present instrument in a hackers’ toolbox. This malware can leach its way into any PC regardless of its intended use. Business computers, government computers, and public use computers have equal opportunity to be hacked as a home computer. A user can “unknowingly open an email or download something that infects [their] PC and locks [them] out” explains Meade, “you would have to pay anywhere between $25 and $600 within a time period – usually 24 hours – to get access back or CONTINUED ON P. 32 →
  • 5. SECURITY NATION JULY/ AUG 2016 32 lose everything.” Ransomware is essentially ransoming everything you keep on your computer back to you but in these situations, there is no real guarantee that you will get your access back. How much trust should you put in a digital criminal who is holding your laptop captive? According to Microsoft, the top ten ransomware families in the global market share from December 2015 to May 2016 are Tescrypt (42 percent), Crowti (17 percent), Fakebsod (15 percent), Brolo (9 percent), Locky (7 percent), Teerac (4 percent), Critroni (2 percent), Reveton (2 percent), Cerber (1 percent), and Exxroute (1 percent). In this same time period, Microsoft notes the United States accounted for 50 percent of total global exposures of ransomware. But apparently hackers have a ‘code of honor’ they abide by as “many reported the hackers making good on their word, which ended up encouraging people to pay up rather than any other option.” The reputation and word-of-mouth of doing what they said they would do, returning access to the PC user after the ransom has been paid, is actually convincing other hacked individuals to go ahead and succumb to the threat. In essence, living up to their word is increasing their revenue. Every Good Leader Prepares For Battle While reacting to a breach can often be the only course of action available, Meade promotes a proactive approach to cybersecurity. Buyers, clients, customers, and even employees want to know you are already working to protect their private information you have been trusted with. Meade shared a set of proactive data security best practices to implement into any business structure. First, do not assume the IT guy will handle it, “to be effective it needs to be a companywide engagement; the first line of defense is employees.” This practice can take on many forms such as department meetings or adding data security policies to your onboarding process. Next, develop an incident response plan, “such as a table top exercise of what to do when a laptop is stolen” and battle-test it! Put that plan into action and make the necessary adjustments to make it fool-proof. Testing your plan will allow any discrepancies or issues to come up and give you the opportunity to fix them. No data security best practice plan would be complete without addressing passwords. Meade stresses this topic because it’s one of those ‘it won’t happen to me’ things… until it does. Passwords should never be less than eight characters and contain both letters and symbols. A self- proclaimed ‘hacktivist’ named Jeremy Hammond was sentenced to 10 years in prison for successfully hacking various government websites and releasing confidential information. This elite member of the hacking network called ‘Anonymous’ was on the FBI’s Most Wanted list for his cybercriminal activities. Hammond was a notorious computer mastermind taken down by a weak password consisting of his cats’ name, Chewy, followed by a sequence of numbers every three-year-old knows, 1-2-3. Rather than being known for his ‘hacktivist’ efforts as he would have liked, Hammond will be known as the cybercriminal who used ‘Chewy123’ as his laptop password. So, while you may be thinking it’s obvious to have a unique password with the number ‘0’ in place of the letter ‘O’ or using the ‘@’ symbol to substitute for ‘A’, not everyone in your organization may be aware of how far they need to go to ensure their password is strong. The Data Lifecycle Doesn’t Include Cutting Corners There are three main steps in the lifecycle of data, each equally important. The data lifecycle begins with how it comes into your business; was it an email attachment originating with a coworker or was it sent from someone you don’t know? Did you download a PDF from a reputable website or was it more reputable…ish? The next stage in the cycle is how this data is stored and accessed. Here, this can be servers, public cloud accounts, even flash drives. Does every single person in your company have access to the servers or do you prioritize access? This topic is especially of concern when dealing with VPN access and remote employees whose cybersecurity efforts become lax in the perceived safety of their home. To conclude the data lifecycle is how to get rid of it. Is it truly deleted from a hard drive or is it living in your digital recycle bin and easily reinstated? Was the security vulnerability report you printed for the executive meeting thrown in the office trash can where a dumpster diver can find it or the wind blow it away right into the hands of the next Jeremy Hammond? Shredding paper documents and completing full electronic wipes are a necessary step in protecting your company. The Federal Trade Commission has the authority to “take legal action against organizations that violate consumers’ privacy rights, or misled them by failing to maintain security for sensitive information.” While 47 states have state-level data breach regulations and procedures, there is currently no federally mandated notification law specifically for the electronic security and life safety industry. Often businesses with customers in states they don’t have a physical location in will not follow that states’ procedures. For example, your business is located in Paris, Texas but your client is in Maine where data breach notification laws differ; a responsible business owner would be aware of both states’ directed procedures. Matthew Meades’ expertise in proper security measures, employee training, and both reactive and proactive procedures make him an asset to the electronic security industry as we continue to evolve and incorporate more and more technological innovations. Paying attention to cybersecurity is a practice that every business can benefit from. Don’t let your brand notoriety be for the wrong reasons.  RISKY BUSINESS / CON’T. the United States accounted for 50 percent of total global exposures of ransomware