Page 11 - GS161102
P. 11

News

cybercriminals use a combination of techniques to break           US-CERT strives for a safer, stronger Internet for all
into ecommerce sites and steal identity and payment card          Americans by responding to major incidents, analyzing
data.                                                             threats and exchanging critical cybersecurity information
                                                                  with trusted partners around the world, according to its
ChargebackGurus has seen an increase in "friendly                 website.
fraud"; its analysts are working with payment card brands
to evaluate this trend. Some consumers have bragged               Following are the seven elements to address as part of US-
about friendly fraud on social media, claiming to have            CERT's protection plan:
received free goods by disputing charges, according to
recent reports. Overall chargeback volumes in 2015 were                   1. Accurate hardware inventory
30 percent friendly fraud and 70 percent true fraud; these
numbers reversed in 2016 to 70 percent friendly fraud and                 2. Accurate software inventory
30 percent true fraud, the company stated.
                                                                          3. Continuous configuration management and hard-
Tripwire, Verizon                                                         ening
advocate
cyber-readiness                                                           4. Comprehensive vulnerability management

T he National Retail Federation projected a 3.6                           5. Patch management
              percent increase in 2016 retail holiday sales, and
              leading security firms are warning companies                6. Log management
              to protect their data. Recently published reports
by Tripwire Inc. and Verizon Inc. suggest retailers can do                7. Identity and access management
more to safeguard physical stores and ecommerce sites.
The Tripwire study, published Oct. 10, 2016, surveyed             Tripwire cited the following data as evidence of the need
763 information technology (IT) professionals, 100 of             for early, automated threat detection:
whom were in the retail sector. Verizon's 2016 Data Breach
Investigations Report analyzed over 100,000 incidents that            •	 84 percent of respondents were confident they
occurred in 2015, including 3,141 confirmed data breaches.                could detect intrusions on their networks, but only
                                                                          51 percent knew exactly how long the detection
Tim Erlin, Senior Director of IT Security and Risk Strategy at            process would take.
Tripwire, cautioned IT professionals against complacency.
"The increased scrutiny of retail cyber security in the               •	 43 percent of respondents knew how long it would
wake of major breaches has forced organizations to focus                  take their vulnerability scanning systems to
on securing their environments, yet these survey results                  generate an alert after detecting unauthorized entry
show that there's still a lot of room for improvement," he                on the network; 81 percent believed it would happen
said.                                                                     within hours.

Verizon's study found that 99 percent of reported cyber               •	 51 percent of respondents believed their automated
attacks in 2015 occurred within a period of hours but went                tools do not detect all necessary information, such
undetected for weeks, sharply down from response times                    as locations and departments, needed to identify
in 2014. "There is a dramatic decline in internal discovery               unauthorized configuration changes to endpoint
and a corresponding increase in discovery by fraud                        devices.
detection in our dataset this year," the authors wrote.
                                                                      •	 36 percent of respondents said less than 80 percent
Seven-point protection plan                                               of patches succeed in a typical patch cycle.

Tripwire analysts recommend protecting physical and               Advanced tools, surveillance
digital infrastructures with a seven-point plan established
by the United States Computer Emergency Readiness Team            Verizon and Tripwire advise IT professionals to use
(US-CERT). "When implemented across an organization,              advanced security tools to protect against increasingly
these controls deliver specific, actionable information           cunning cybercriminals. Verizon cited phishing as a
necessary to defend against the most pervasive and                dominant cyberattack method. As multilayered protections
dangerous cyberattacks," the company stated.                      against phishing scams, the company proposed spam
                                                                  protection, list blocking, email header/attachment/URL
                                                                  analysis and reporting of suspicious emails.

                                                                  The Verizon report encouraged companies to authenticate,
                                                                  segment, and monitor all devices, apps and personnel
                                                                  connected to their networks. Report authors also gently
                                                                  poked fun at the idea of enforcing best practices within a
                                                                  security department. "One can't really say 'don't screw up
                                                                  again', or 'pay attention to what you are doing, for Pete's
                                                                  sake,'" they wrote. "Nevertheless, there are some common
                                                                  sense practices that can be implemented to help keep
                                                                  errors to a minimum."

                                                                  11
   6   7   8   9   10   11   12   13   14   15   16