2016 Cybersecurity Playbook PDF
2016 Cybersecurity Playbook PDF
CYBERSECURITY
PLAYBOOK
CONTENTS
Contents
03
04
10
17
22
Part 4: Overtime
A list of handy additional resources and
security experts to follow.
INTRO
In 2015...
140 million new malware
If there was a bright side to 2015, it was that cybersecurity continued its rise to the forefront
as a serious issue and top business priority. But if were going to transform that growing
awareness into action and measurable progress in 2016, its going to take more than simply
advocating for more.
We need to make sure were working not just harder but smarter, and that our efforts
are actually aligned with our top needs. This playbook is designed to help you determine
what those are for your organization, and to develop a winning game plan for getting
more secure.
Phishing
Ransomware
Malvertising
Software vulnerabilities
Drive-by downloads
SQL injection
Password attacks
Scareware
Phishing
What It Is:
A malicious attempt to acquire sensitive information by mascquerading as a trustworthy
source via email, text, pop-up message, etc.
For as complicated and state-of-the-art as the world of cybersecurity seems, the fact
is if your company gets hacked, it will most likely be because one of your employees
clicks something they shouldn't. Hackers know your employees are the weakest link,
and they've gotten incredibly good at creating phishing messages that not only look
legitimate, but also appear to come from sources you know and trust. For an example of a
phishing attempt in action, see this email that was sent to our CEO.
Malvertising
What It Is:
An attack campaign that delivers a payload of malware by disguising itself as an ad.
When thinking about malvertising it's a good idea to remember that online threats aren't
confined to sketchy websites. As a recent attack that infected up to 27,000 Yahoo visitors
per hour shows, malvertising can appear on legitimate sites and look like any other ad.
Ransomware
What It Is:
Malware that encrypts and threatens to destroy, permanently remove access to, or publicly
post data unless a victim makes payment.
Ransomware has been a fixture in cybersecurity headlines, becoming an increasingly
popular and incredibly lucrative way for attackers to monetize their exploits on systems.
The FBI estimates that CryptoWall, one of the most notorious examples of ransomware,
has cost U.S. businesses and consumers at least $18 million this past year alone.
Software Vulnerabilities
What It Is:
Flaws, glitches, or weaknesses discovered in software that can lead to security concerns
and exploits.
New software vulnerabilities are discovered all the time (just ask the Adobe Flash Player folks),
and left unaddressed they can become easy gateways for cyber attacks and infection.
Drive-by Downloads
What It Is:
An attack that installs malware on a user's machine as soon as they visit an infected website.
Unfortunately, not all malware requires much if any user interaction to be deployed. In
the case of drive by downloads, users can be infected automatically simply by visiting
the wrong site. As with malvertising, the site doesn't have to look suspicious to be
infected criminals are also able to perpetrate drive-by downloads by compromising
legitimate, hi-trafficked sites.
SQL Injection
What It Is:
A type of security exploit where an attacker inserts structured query language (SQL) code
into an input box or entry form for execution.
As an example, an attacker could utlize a user sign-in form to send a request to the database
rather than entering in a username or password. If successful, the attack could grant the
attacker unauthorized access to the entire database.
Password Attack
What It Is:
Attempt to crack passwords.
Attackers can also try gaining access to your systems a more old-fashioned way by
attempting to guess your passwords. But while the technique may be an old one, the
tools hackers now have at their disposal are cutting edge. Using software and brute force
attacks, hackers can crack simple passwords in minutes (check how long it would take
to crack a password like your own here).
Scareware
What It Is:
Malicious software that misleads users into believing they've been infected and convinces
them to download a fake malware removal tool that acutally does infect them.
Scareware is rogue security software that preys on users' fears by displaying pop-up
warnings that may look like legitimate alerts. Once the user follows the instructions and
downloads the software, however, their system is now infected.
Firewall(s)
A good firewall will help you shore up your perimeter by adding a protective layer between
your internal network and any potential attackers attempting to gain unauthorized access.
Endpoint protection
With the majority of infections starting on user systems and quickly spreading from there,
endpoint protection is one of the most important layers of your defense. Rather than rely on
outdated signature-based anti-virus, your best bet is to invest in a solution that identifies
malware based on its behavior.
Data backup
No security initiative would be complete without a solid backup and recovery strategy. In
addition to simply being good practice, it can be an effective defense against encryption
and extortion attacks like ransomware.
Whitelisting
Application whitelisting can help you reduce the opportunity for infection by limiting the
applications and files you allow to be executed. The potential downside is introducing
limitations that can negatively impact user and business functionality.
Patch management
The moment a software vulnerability is discovered and a patch is released, its a race to
evaluate and deploy it before the vulnerability can be exploited. Finding a solution that can
help you automate patch management tasks can be key to staying up to speed.
to secure?)
your industry
Firewall(s)
Intrusion prevention system (IPS) and/or united threat management (UTM) that
combines firewall, content filtering, virtual private network (VPN), and intrusion
detection technologies
Whitelisting
Patch management
Month 2: Get the help you need and conduct quick wins
Determine if you need to hire someone to manage security or if you need
to reduce noise
2.
3.
4.
5.
2.
Your leadership team doesnt have to understand how exactly security works (chances
are it will make their heads spin), but they do need to understand why youre doing
what youre doing, and be on board with what youre ultimately trying to achieve.
The sooner you get them involved in the conversation, the sooner you can a) come
to a universal agreement on priorities, goals, and objectives; and b) leverage their
help in achieving them.
Of course, gaining executive buy-in will be much easier once you understand and
accept that leaderships primary concern is running a successful business. If a new
security initiative youre proposing can help them do that, fantastic they will be
much more receptive to supporting it if you lead off by explaining how it aligns
with primary business goals.
For more advice, see How to Get Executive Buy-in for Your Security Budget.
3.
4.
5.
Part 4: Overtime
Where can I find more info?
This guide was developed to help you jump-start your security efforts its by no means
comprehensive. In this section, youll discover a variety of additional expert resources for
diving deeper and determining where to go from here.
PART 4: OVERTIME
Additional Resources
Starting at the Endpoint | The Barkly Blog
Okay, yes, were tooting our own horn, but our blog really is a great place to grab the
latest infosec news and best practices (all in plain English).
The Open Web Application Security Project (OWASP)
A mother lode of information and materials for individuals and organizations looking to
make better informed decisions about security risks.
InfoSec Institute
Chock-full of articles, guides, and hands-on tutorials on a variety of security topics.
Security Awareness
SANS Securing the Human
A great collection of free tools and resources to help you develop and maintain an
effective awareness program, including planning kits, presentations, and more.
KnowBe4 More free tools and tips for addressing social engineering and transforming
employee behavior.
PART 4: OVERTIME
Experts to Follow
Troy Hunt @troyhunt
What to follow Troy for: In-depth analysis of high-profile data breaches (ex: see his
breakdowns of the VTech breach) and other real-world examples of hacking in action.
PART 4: OVERTIME
What to follow Violet for: Strong points of view on privacy and security along with
practical advice.
SecuriTay @SwiftOnSecurity
What to follow SecuriTay for: Biting infosec wit and sarcasm from the mouth of
America's sweetheart. Not only are these tweets hilarious, they're also surprisingly
effective entries into infosec news and issues.
Learn More