Advertisment

Security Risks in the New Economy

author-image
PCQ Bureau
New Update

Increasing cases of identity and data theft are becoming a major cause for
concern across organizations and individuals alike. They're causing
financial loss, data loss, and not to mention loss of credibility and
reputation. We surveyed 80+ CIOs across India to find out how seriously they
tackle Information Security threats. We also believe that securing data is
everyone's responsibility and tell you how to go about doing it.

Advertisment

Before devising a plan to secure your information, you need to understand the
current security landscape and the risks it involves. So in order to understand
what's currently happening, we surveyed 80+ CIOs from across the country to find
out their understanding of the subject, and what they were doing about it. The
results we got were pretty interesting. Here's the first one:

65%

Of the CIOs felt that security
threats have become more dangerous than ever before.

30%

Felt that security threats are
just a nuisance, and not really dangerous.

The surprising element in the above is the 30% CIOs, who feel that security
threats are still a nuisance. Had that been the case, then cyber crime would not
have been a multi-billion dollar industry. Clearly, cyber crime is on the rise
because there are monetary gains involved. According to various research reports
from key security vendors, most cyber crimes today are targeted at stealing
critical data for financial gain. This trend is only expected to grow, and the
sooner we accept this fact, the better it will be as we would then be in a
better position to combat it.

Advertisment

42%

Of the CIOs had less than 10% of
their IT budgets devoted to information security.

19%

Had 10-20% of their budgets
devoted to information security.

25%

Didn't have a separate budget
for information security.

The good thing though is that the level of seriousness amongst Indian CIOs
with respect to information security is pretty high. Even the top management in
most organizations understands the possible security risks and what kind of an
impact they can have on the organization. However, this doesn't directly
translate into allocating a significant part of the IT budget on information
security. The data on that suggests the following:

The rest of the CIOs didn't give a clear indication about their information
security budgets. There was another key trend that we observed from the survey,
which is even more interesting:

Advertisment

94%

Of the CIOs had deployed
anti-virus software in their enterprise.

47%

Spent most of their time in
combating virus attacks.

The above clearly indicates that anti-virus software is not completely
effective in combating security threats. Despite having it deployed, viruses
manage to creep in and cause havoc. It's important therefore, to understand how
viruses still manage to creep into the system, despite having so many solutions
in place.

So now, we'll focus on some of the key security risks that are heating up.

Advertisment

Entry Points for security threats

There are a larger number of channels through which malicious code can
enter.

Security threats can come from anywhere, be it outside or inside the network.
information can be stolen from anywhere, be it your network, desktops, servers,
Internet portal, wireless network. Therefore, you need to first identify the
possible channels from where information can be stolen-USB ports, remote access
to systems, wireless networks, VoIP, laptops, smartphones, etc. Information can
be stolen from most of these channels. Here's the state of affairs as far as
Indian enterprises are concerned:

Advertisment

The above graph is quite interesting. It shows that 61% organizations use
secure wireless networks. What this means is that the remaining 41% either don't
have wireless networks or use wireless networks that are not secure. Likewise,
if 40% organizations allow open usage of flash drives, then they are obviously
in danger of information theft. And if 56% of the CIOs provide remote access for
their organization's employees, there is a chance of information theft. The real
interesting ones are open access to public IMs and open usage of USB drives.
Free access to public IMs means employees can send whatever information they
want to anybody. Let's analyze this in more detail.

How vulnerable are USB ports?

USB ports have become the default interface for just about every device you
plug into a PC or laptop today. While they've increased the convenience, they've
also increased the security risk. USB flash drives for instance, are commonly
used to carry/share data. This has also made them the most common cause of
spreading virus infections. The Conficker worm, which has been in the limelight
for quite some time now, spreads itself through USB drives, among other channels
of course. The University of Utah recently reported that 800 machines on its
network were infected by the worm, all because somebody brought a USB drive
infected with Conficker, into the network. Even if you can prevent virus
infections on USB drives by keeping anti-virus software updated on all systems,
how will you prevent somebody from walking away with important information on a
USB drive?

Advertisment

Besides flash drives, USB ports can also be used to connect devices like
Internet data cards. While this makes it easy for your mobile workforce to
connect to the corporate network, or use the Internet when on the move to check
important mail, it also makes it easy to leak information. Given that the
current economic slowdown is causing a lot of employee lay-offs, USB ports could
be considered as a security threat.



Emerging Security Threats


Data Security Isn't Enough, Let's Get Physical


Donning the GLOVes of An Investigator

Does this mean that you should block all USB ports on all machines in your
organization? There are solutions to do that, but before you do that, it's
important to understand the implications. While you prevent information theft or
virus infection, you're also taking away the convenience that most employees
have enjoyed. This could therefore reduce employee productivity.

Advertisment

So if you do plan to block all USB ports, first look for alternatives.
Revisit all access control rights and be more stringent on who has access to
what resources. Ensure that the common network location for file sharing amongst
employees is cleaned up more regularly than before.

Security incidents over past few years

Users are a key asset for every organization, but they're also the most
vulnerable point of entry. It's easier to cajole a user into delving important
information than breaking through a firewall. This makes educating users of
various security threats extremely important. However, it's not as easy as it
sounds. Have a look at the following result from our information security
survey:

You'll notice that laptop thefts are at the top of the security incidents
list. This obviously means that users have to be more careful and stronger focus
needs to be put in training users on how to protect their laptops. The second
one is about theft of confidential information. This could be caused by weak
passwords or authentication, but they could also be caused by disgruntled
employees walking away with confidential data on USB drives. The fourth one is
another direct link to users-identity theft.

Is User Training the Answer?

If educating your users could resolve the problem of incoming security
threats, then no organization would be combating so many security threats today
and facing major financial losses. It would be the end of security threats and
everyone would be sleeping peacefully at night. But unfortunately that's not the
case. The thing to observe here is how much to really expect from your users? Do
you seriously expect them to remember long, complicated passwords without
writing them down somewhere? Or do you expect them not to open an attachment
that pretends to come from their

boss? Or click on an email that comes from a bank where they don't have an
account?

Every single user today has dozens of passwords, and it's impossible for them
to keep track of all of them without writing them down somewhere. Using the same
password for all applications is anyways a bad idea, because if it gets hacked,
then the hacker gains entry into all of the user's apps. So obviously every user
today is expected to remember multiple passwords. Now, if you make the passwords
too complex so that they're difficult to hack, then you're also making them
difficult to remember. So a user would obviously have to write them down
somewhere. You could teach the user to store his/her passwords in a 'password
protected' document or implement other mechanisms like fingerprint scanning,
card scanners, etc.

44%

CIOs faced less than 5 serious
security breaches over the past few years.

15%

Faced 5-10 serious security
breaches/incidents

7%

Suffered from 20 to 100

25%

Of the CIOs said that their
organizations had suffered from financial loss due to a serious security
incident over the past few years.

Likewise, you can't expect every user in your organization to go through your
security policy every time they want to check an email or access a website on
the Internet. Nor can you expect the user to remember the dozens of points
you've written there. So you obviously need to strike a balance between user
expectations and your security policy. If there are too many mail attachments
floating around, which could be a potential security hazard, then implement a
software that removes them from all incoming emails, delete the obviously
suspicious ones like those with .exe extension, and then put the rest in a
folder on the network. The user could then get the email with a link to this
attachment or if it was a potentially dangerous one, then get the message
indicating so. This way, you've removed the hazard of leaving it to the user to
figure out whether the attachment is legitimate or not. Or should we say, you've
no longer left it to chance. In fact, long time ago, PCQuest had given the
prestigious Best IT Implementation award to ICICI Bank for implementing such a
mail attachment stripping solution.

Before you implement a security solution

The answer to this is of course to first identify what kinds of security
threats are you fighting the most? Where are you spending most of your time?
Only then, can you identify the right solutions to deploy.

So, as per the above, organizations are spending most of their time combating
virus attacks, despite having anti-virus software in place. This obviously
indicates the need to train users on how to identify suspicious activity that
could be linked to a virus attack. Likewise, they have to be trained to identify
spam, because that's the next biggest threat that CIOs spending most of their
time fighting.

69%

Of the CIOs had a documented
security policy.

21%

Didn't have a documented
security policy.

Besides identifying the areas where most of the time is going, it's equally
important to identify the major security incidents that have happened in your
organization and their financial implications. For instance, this is what our
survey says:

As you can imagine, organizations are facing serious security breaches, which
require attention because they involve financial loss. This loss can be quite
severe. In fact, 8% of the CIOs admitted to having suffered losses to the tune
of several Lakhs of Rupees, while another 13% admitted to having faced loss of
reputation and credibility. However, the more unfortunate part was that 24% of
the respondents had no concrete method of measuring losses caused by security
incidents. This is obviously not an easy job. One way of doing it could be to
measure the amount of downtime you've experienced and the productivity lost as a
result of that. This could be equated with the salary of employees that have
been affected and then the total loss could be calculated. The way to measure
loss would be different in case data gets stolen. That would be more difficult
to calculate.

Importance of documentation and Standards

However, security solutions alone aren't enough. You also need
well-documented security policies, and moreover you need to conduct regular
formal assessments of your network. Our survey revealed the following facts
about the documentation of security policies:

Having a written policy is always a good idea and we can't stress enough on
its importance. But even more important than that is to visit it regularly and
keep updating the same. For instance, suppose that despite having a documented
policy, you keep getting recurring security threats. In such a case, you need to
find a solution to that threat, and update your security policy on how you
combated it. We already gave the example of email attachments when we discussed
the importance of user training.

Besides documentation, you also need to conduct regular assessments of the
security of your network. Since your IT infrastructure isn't static, how can
your security remain the same? Security threats are increasing, and so is your
IT infrastructure. Beyond a certain point, even policies and re-assessments may
not work. That's where you would need to start exploring security standards.
Today, two key security standards exist for information security. These are
BS7799 and ISO27000 series. There are quite a few organizations that haven't
deployed these standards. Amongst the two, the ISO standard seems to be more
popular.

Which Solutions to deploy?

There's a whole range of security solutions available, which you can deploy
to combat information security threats.

The current state of affairs amongst Indian enterprises is that 94% have
anti-virus software and firewalls. It's surprising that 13% of our survey's
respondents didn't have anti-spam solutions in place. Email security seems to be
surprisingly high at 79%, and same goes for Intrusion Prevention Solutions at
69%. The remaining information security solutions, which would become extremely
relevant in the times to come have low levels of deployment. Hard Disk
encryption for instance, is there only across 15% of the enterprises we
surveyed. This is extremely useful in preventing your data from getting mis-used
should your laptops get stolen.

Protecting Sensitive Data
From Loss with DLP Solutions
Information no longer resides
inside the four walls of an organization given the business outsourcing
scenario. Any leakage of information can cause you to lose not only money
but also credibility. So, apart from securing PCs from viruses, spyware, etc
what seems very important for an organization is defending data against all
vulnerable ends. And this is now becoming a big concern for many
enterprises. A couple of months ago, there was news around a BPO employee
who stole some sensitive data of the client and as a result, the
organization lost its credibility and so the clients.

Data loss protection or DLP is the term that is
used to describe the theft of sensitive or critical data from an
organization. However, there are number of ways you can solve this issue.
But before that, you first need to figure out what is the data your
organization wants to protect. This might comprise of an organization's
strategies, clients confidential data, etc. Such data can get stolen only if
someone tries to copy the same to a portable media or send it via Internet
to any third person. Here, to steal data one needs the proper right to
access those data. The other way of stealing data is by hacking the system.
The most common solution to this sort of issue is to stop the users to carry
any portable media inside the organization. The other measure an
organization can opt for is blocking all the ports on the user system. The
second method seems to be pretty practical, because even if someone gets
inside the premise of your organization with the intention of stealing data,
he will not be able to connect to the system. Then the third option is mail
server configuration. The IT guy who manages the mail server can configure
it in such a way that no mail will be processed which comes with an
attachment.

The issues are endless when it comes to DLP.
Even if you block the port and scan all the emails that go out of the
organization, one can use a third party email service provider, for example
Gmail. This brings you to block the Internet itself. This sound good but is
only possible for the organizations that work mostly offline. So what kind
of solution to opt for? There are couple of vendors in the market who
basically offer solutions for such kind of organizations.

They provide them solutions which exactly
match their requirement. Such solutions can be broadly classified in three
different categories: network based, host based and data based DLP.

The network based DLP systems comprise
hardware appliances which are typically placed at the gateway level of the
organization to monitor traffic that flows through it, such as IM, HTTP,
secure HTTP and so on. It checks every piece of information that flows, and
check for unauthorized and unauthenticated data. The host based DLP system
provides two way protection option to safe guard the data. The first is the
internal communication which basically deals with the data that is
transferred through portable drives among different user groups. And the
second is the external communication which that happens via mails or IMs.
Here, you have the option of controlling application. This helps mostly
mobile users where the user can use any third party tool to hack the system
for getting the confidential data. Data based DLP system identifies the data
that is being transferred, stored, or in use by any user is confidential or
not. It uses number of predefined methods to judge if content is
confidential or not. The criteria are basically keywords, regular
expressions, matching of documents, etc. This varies for every organization
and hence this method requires time to actually meet the expectation of
CEOs. As it first needs to know what are the keywords, do they change after
particular time, and so on. But apart from all these security measures, what
if an authorized user opens up confidential documents in an authorized
application, writes down the information on a piece of paper and walks away.

An analysis of the CIOs' plans on what to deploy in information security gave
us hopes for the new solutions. 41% of the respondents were planning to deploy
hard disk encryption for instance, while another 49% were planning to implement
data loss prevention solutions. We've given a detailed overview of this new
technology elsewhere in this story. Here's the rest of the solutions that CIOs
are planning to deploy:

How to choose the right solution

Sometimes the solution may not lie in a fancy, expensive piece of security
solution at all. So before you go all out to deploy every new security product
or technology, wait and watch. Wait for some time to see whether the product or
solution has managed to withstand the test of time. During this period, watch
who all are deploying it. After that, ask the vendor to give you some customer
references, and then decide whether it's really worth deploying or not. It's
very easy to get taken away by fancy words that are published in research
reports of well-known agencies or get caught in the glossy brochures of vendors
who claim that their product or solution is the best thing that happened to
mankind since brown bread. While it's important to go through them, they should
not form your basis for purchase decision making. Before you decide to invest a
huge amount in a security solution, ask around. Find some experts with hands-on
experience. Determine what kinds of challenges did they face while deploying it,
and whether the experience was pleasant or otherwise.

Anil Chopra,Anindya Roy, Rakesh Sharma, Swapnil Aroa and Varun Jaitly

Advertisment

Stay connected with us through our social media channels for the latest updates and news!

Follow us: