Cloud migration is in full swing at most enterprises, fueled by the desire for a more flexible and accessible computing model as well as on-going digital transformation. Yet security practices are dangerously out of step with the shift to the cloud paradigm, organizations are clearly struggling to stay abreast of the evolving attack surface while experiencing elevated risk of exposure to new exploits.
According to Symantec’s inaugural 2019 Cloud Security Threat Report (CSTR), over half (53%) of computing workloads have shifted over to the cloud, and respondents estimate that their organizations’ use of cloud applications will grow by 22% over the next year.
With cloud adoption continuing at a fevered pitch, enterprises are having difficulty dealing with the mounting complexity of multi-cloud and hybrid cloud and on-premises environments. They are also grappling with loss of control, especially as it relates to security: The Symantec CSTR found that 54% of respondents say their organization’s cloud security maturity is simply not able to keep up with the rapid expansion of new cloud apps.
Specifically, lack of visibility over cloud workloads is a huge problem for the majority of organizations (93%) and nearly as many respondents (83%) report negative impacts due to an incomplete view of their cloud landscape. Even worse—nearly two-thirds (65%) of CSTR respondents feel that the increasing complexity of their organization’s cloud infrastructure is opening them up to a host of new threats, including lateral movements and cross-cloud attacks.
The Symantec CSTR found that 54% of respondents say their organization’s cloud security maturity is simply not able to keep up with the rapid expansion of new cloud apps.
The Perimeter is Dead
At the root of the problem is organizations’ continued reliance on the traditional, perimeter-based security model. This “castle-and-moat-style” approach employs firewalls and other technologies to authenticate and determine trust at the edges of the network; once users and devices are deemed trustworthy, they are given insider access. Yet the rise of the cloud and ubiquitous mobility lays to rest the concept of “inside” and “outside” the network and showcases the reality that threats exist everywhere, thus the requirement for a new security paradigm.
It used to be that everything inside the corporate network was considered good and should merit trust while everything that was outside on the Internet was all bad and should be distrusted. Of course, that’s no longer the case. Consider a device that picks up malware on the outside and then is allowed back on to the corporate network because it’s a trusted entity, setting off a lateral movement attack that spreads throughout the enterprise. The fact is that perimeter-based security has become a liability because it’s mushy on the inside and threats are taking advantage of that.
Instead of a dated perimeter approach to security, organizations should embrace a modern architecture built around the Zero-Trust access model to accommodate an increasingly mobile- and cloud-centric world. With Zero Trust, there is no longer a perimeter to safeguard, but rather a world in which threats come from every direction thus requiring granular protections at the data level as well as controls implemented across all points of access, including end points, cloud workloads, and corporate networks.
In a Zero Trust security architecture, users are granted least-privileged access to resources, that is the minimum they need to be productive. Assets that are not pertinent to their job function are invisible, and behavior is assessed to identify unusual behavior and respond to risks.
In addition to an integrated security platform that spans the full host of capabilities from web and email gateways to data loss prevention and cloud application security, enterprises also need to take advantage of artificial intelligence (AI) and machine learning capabilities. This allows them to automate whenever possible and assists in enforcing policies that maintain compliance across web, cloud, and email traffic.
At the same time, organizations need to bolster their security postures through embrace of other cloud security best practices, including the formation of a Cloud Center of Excellence (CCoE) and by embracing a shared responsibility model.
Cloud complexity has most security organizations scrambling to keep up, but it doesn’t have to be that way. By shifting to a Zero-Trust model supported through an integrated security platform, organizations can reap the benefit of the cloud without risking significant exposure.
Register for July 25 Webinar: Understand the Latest Cloud Security Trends
About the Author
Director of Product Management for Symantec Security Response
Kevin Haley is Director of Product Management for Symantec Security Response where he is responsible for ensuring the security content gathered from Symantec’s Global Intelligence Network is actionable for its customers.
37% of cyberattacks are discovered on servers, making them the most likely place to identify an attack in an organization. That’s one of the alarming stats taken from a recent Sophos survey of 2,700 IT managers around the world.
But why are servers such tempting targets for hackers?
1. Servers are high value
Servers often contain an organization’s most valuable data. For example, personally identifiable information (PII) such as employee and customer records could be stolen if they’re not adequately secured (for example, with encryption) on the server.
Regulations, such as the recently introduced GDPR that protects EU citizens’ data, levy significant fines for non-compliance. Attackers know this and will threaten to release sensitive data if their demands are not met.
2. Server downtime is costly
Servers are the lifeblood of organizations and are critical to their day-to-day functions. Unexpected downtime can seriously impact productivity by removing access to important files or communication tools such as Microsoft Teams or Skype. Ransomware attacks can cause organizations to grind to a halt unless a ransom is paid.
In instances where an organization is reliant on servers for commercial function (e.g. an e-commerce site) downtime can be even more severe.
3. Servers are the perfect staging ground
Servers are usually well connected in an organization’s network. They are also online and running 24/7, which makes them an ideal platform for launching further attacks and performing reconnaissance looking for weak spots to exploit across the network. If you can’t identify a compromised server, the gates to your IT kingdom could be wide open.
So what needs to be done to secure your organization’s servers? The answer is in the right combination of advanced protection, visibility with powerful tools like Endpoint Detection and Response (EDR) and server specific features such as File Integrity Monitoring.
Sophos Intercept X for Server has them all, keeping your organization secure against advanced threats including ransomware and exploits. It gives you the tools you need to hunt down evasive threats and it locks down your servers so they can’t be tampered with. Take a look at our Server Buyers Guide to see the full list of features your server protection solution needs to have.
What You Should Know About the Equifax Data Breach Settlement
Big-three credit bureau Equifax has reportedly agreed to pay at least $650 million to settle lawsuits stemming from a 2017 breach that let intruders steal personal and financial data on roughly 148 million Americans. Here’s a brief primer that attempts to break down what this settlement means for you, and what it says about the value of your identity.
Q: What happened?
A: If the terms of the settlement are approved by a court, the Federal Trade Commissionsays Equifax will be required to spend up to $425 million helping consumers who can demonstrate they were financially harmed by the breach. The company also will provide up to 10 years of free credit monitoring to those who had their data exposed.
Q: What about the rest of the money in the settlement?
A: An as-yet undisclosed amount will go to pay lawyers fees for the plaintiffs.
Q: $650 million seems like a lot. Is that some kind of record?
A: If not, it’s pretty close. The New York Times reported earlier today that it was thought to be the largest settlement ever paid by a company over a data breach, but that statement doesn’t appear anywhere in their current story.
Q: Hang on…148 million affected consumers…out of that $425 million pot that comes to just $2.87 per victim, right?
A: That’s one way of looking at it. But as always, the devil is in the details. You won’t see a penny or any other benefit unless you do something about it, and how much you end up costing the company (within certain limits) is up to you.
The Times reports that the proposed settlement assumes that only around seven million people will sign up for their credit monitoring offers. “If more do, Equifax’s costs for providing it could rise meaningfully,” the story observes.
A: In a nutshell, affected consumers are eligible to apply for one or more remedies, including:
–Free credit monitoring: At least three years of credit monitoring via all three major bureaus simultaneously, including Equifax, Experian and Trans Union. The settlement also envisions up to six more years of single bureau monitoring through Experian. Or, if you don’t want to take advantage of the credit monitoring offers, you can opt instead for a $125 cash payment. You can’t get both.
–Reimbursement: …For the time you spent remedying identity theft or misuse of your personal information caused by the breach, or purchasing credit monitoring or credit reports. This is capped at 20 total hours at $25 per hour ($500). Total cash reimbursement payment will not exceed $20,000 per consumer.
–Help with ongoing identity theft issues: Up to seven years of “free assisted identity restoration services.” Again, the existing breach settlement page is light on specifics there.
Q: Does this cover my kids/dependents, too?
A: The FTC says if you were a minor in May 2017 (when Equifax first learned of the breach), you are eligible for a total of 18 years of free credit monitoring.
Q: How do I take advantage of any of these?
A: You can’t yet. The settlement has to be approved first. The settlement Web site says to check back again later. In addition to checking the breach settlement site periodically, consumers can sign up with the FTC to receive email updates about this settlement.
The settlement site said consumers also can call 1-833-759-2982 for more information. Press #2 on your phone’s keypad if you want to skip the 1-minute preamble and get straight into the queue to speak with a real person.
KrebsOnSecurity dialed in to ask for more details on the “free assisted identity restoration services,” and the person who took my call said they’d need to have some basic information about me in order to proceed. He said they needed my name, address and phone number to proceed. I gave him a number and a name, and after checking with someone he came back and said the restoration services would be offered by Equifax, but confirmed that affected consumers would still have to apply for it.
He added that the Equifaxbreachsettlement.com site will soon include a feature that lets visitors check to see if they’re eligible, but also confirmed that just checking eligibility won’t entitle one to any of the above benefits: Consumers will still need to file a claim through the site (when it’s available to do so).
We’ll see how this unfolds, but I’ll be amazed if anything related to taking advantage of this settlement is painless. I still can’t even get a free copy of my credit report from Equifax, as I’m entitled to under the law for free each year. I’ve even requested a copy by mail, according to their instructions. So far nothing.
But let’s say for the sake of argument that our questioner is basically right — that this settlement breaks down to about $3 worth of flesh extracted from Equifax for each affected person. The thing is, this figure probably is less than what Equifax makes selling your credit history to potential creditors each year.
In a 2017 story about the Equifax breach, I quoted financial fraud expert Avivah Litan saying the credit bureaus make about $1 every time they sell your credit file to a potential creditor (or identity thief posing as you). According to recent stats from the New York Federal Reserve, there were around 145 million hard credit pulls in the fourth quarter of 2018 (it’s not known how many of those were legitimate or desired).
But there is something you can do to stop the Equifax and the other bureaus from profiting this way: Freeze your credit files with them.
A security freeze essentially blocks any potential creditors from being able to view or “pull” your credit file, unless you affirmatively unfreeze or thaw your file beforehand. With a freeze in place on your credit file, ID thieves can apply for credit in your name all they want, but they will not succeed in getting new lines of credit in your name because few if any creditors will extend that credit without first being able to gauge how risky it is to loan to you. And it’s now free for all Americans.
This post explains in detail what’s involved in freezing your files; how to place, thaw or remove a freeze; the limitations of a freeze and potential side effects; and alternatives to freezes.
What’s wrong with just using credit monitoring, you might ask? These services do not prevent thieves from using your identity to open new lines of credit, and from damaging your good name for years to come in the process. The most you can hope for is that credit monitoring services will alert you soon after an ID thief does steal your identity.
If past experience is any teacher, anyone with a freeze on their credit file will need to briefly thaw their file at Equifax before successfully signing up for the service when it’s offered. Since a law mandating free freezes across the land went into effect, all three bureaus have made it significantly easier to place and lift security freezes.
Probably too easy, in fact. Especially for people who had freezes in place before Equifax revamped its freeze portal. Those folks were issued a numeric PIN to lift, thaw or remove a freeze, but Equifax no longer lets those users do any of those things online with just the PIN.
These days, that PIN doesn’t play a role in any freeze or thaw process. To create an account at the MyEquifax portal, one need only supply name, address, Social Security number, date of birth, any phone number (all data points exposed in the Equifax breach, and in any case widely available for sale in the cybercrime underground) and answer 4 multiple-guess questions whose answers are often available in public records or on social media.
What else can you do in the meantime? Be wary of any phone calls or emails you didn’t sign up for that invoke this data breach settlement and ask you to provide personal and/or financial information.
And if you haven’t done so lately, go get a free copy of your credit report from annualcreditreport.com; by law all Americans are entitled to a free report from each of the major bureaus annually. You can opt for one report, or all three at once. Either way, make sure to read the report(s) closely and dispute anything that looks amiss.
It has long been my opinion that the big three bureaus are massively stifling innovation and offering consumers so little choice or say in the bargain that’s being made on the backs of their hard work, integrity and honesty. The real question is, if someone or something eventually serves to dis-intermediate the big three and throw the doors wide open to competition, what would the net effect for consumers?
Obviously, there is no way to know for sure, but a company that truly offered to pay consumers anywhere near what their data is actually worth would probably wipe these digital dinosaurs from the face of the earth.
That is, if the banks could get on board. After all, the banks and their various fingers are what drive the credit industry. And these giants don’t move very nimbly. They’re massively hard to turn on the simplest changes. And they’re not known for quickly warming to an entirely new model of doing business (i.e. huge cost investments).
My hometown Sen. Mark Warner (D-Va.) seems to suggest the $650 million settlement was about half what it should be.
“Americans don’t choose to have companies like Equifax collecting their data – by the nature of their business models, credit bureaus collect your personal information whether you want them to or not. In light of that, the penalties for failing to secure that data should be appropriately steep. While I’m happy to see that customers who have been harmed as a result of Equifax’s shoddy cybersecurity practices will see some compensation, we need structural reforms and increased oversight of credit reporting agencies in order to make sure that this never happens again.”
Sen. Warner sponsored a bill along with Sen. Elizabeth Warren (D-Ma.) called “The Data Breach Prevention and Compensation Act,” which calls for “robust compensation to consumers for stolen data; mandatory penalties on credit reporting agencies (CRAs) for data breaches; and giving the FTC more direct supervisory authority over data security at CRAs.
“Had the bill been in effect prior to the 2017 Equifax breach, the company would have had to pay at least $1.5 billion for their failure to protect Americans’ personal information,” Warner’s statement concludes.
Update, 4:44 pm: Added statement from Sen. Warner.