{"id":16536,"date":"2019-10-08T09:00:34","date_gmt":"2019-10-08T17:00:34","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/10\/08\/news-10275\/"},"modified":"2019-10-08T09:00:34","modified_gmt":"2019-10-08T17:00:34","slug":"news-10275","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/08\/news-10275\/","title":{"rendered":"How to avoid getting caught in a \u201cGroundhog Day\u201d loop of security issues"},"content":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Tue, 08 Oct 2019 16:00:58 +0000<\/strong><\/p>\n<p>It\u2019s Cyber Security Awareness Month and it made me think about one of my favorite movies, called <em>Groundhog Day<\/em>. Have you ever seen it? Bill Murray is the cynical weatherman, Phil Connors, who gets stuck in an endless loop where he repeats the same day over and over again until he \u201cparticipates in his own rescue\u201d by becoming a better person.<\/p>\n<p>Sometimes it can feel like we\u2019re caught in our own repetitious loops in cybersecurity\u2014I even did a <a href=\"https:\/\/www.youtube.com\/watch?v=B7o7oTcMQnM\" target=\"_blank\" rel=\"noopener\">keynote at RSA APJ<\/a> on this very topic a few years ago. The good news is that we can get out of the loop. By learning lessons from the past and bringing them forward and applying them to today\u2019s technologies, outcomes can be changed\u2014with \u201cchange\u201d being the operative word.<\/p>\n<p>If companies continue to do things the same way\u2014in insecure ways\u2014attackers will come along and BOOM you\u2019re in trouble. You may resolve that breach, but that won\u2019t help in the long run. Unless the source of the problem is determined and changed, just like Phil Connors, you\u2019ll wake up one day and BOOM\u2014you\u2019re attacked again.<\/p>\n<h3>How security experts can help organizations protect against cybercrime<\/h3>\n<p><strong>We can learn from past mistakes.<\/strong> And to prove it, I\u2019d like to cite a heartening statistic. Ransomware encounters <a href=\"https:\/\/www.microsoft.com\/securityinsights\" target=\"_blank\" rel=\"noopener\">decreased by 60 percent between March 2017 and December 2018<\/a>. While attackers don\u2019t share the specifics about their choice of approach, when one approach isn\u2019t working, they move to another. After all, it\u2019s a business\u2014in fact it\u2019s a successful (and criminal) business\u2014bringing in nearly $200 billion in profits each year.<sup>1<\/sup> We do know that ransomware has less of chance of spreading on fully patched and well-segmented networks and companies are less likely to pay ransoms when they have up-to-date, clean backups to restore from. In other words, it\u2019s very likely that robust cybersecurity hygiene is an important contributor to the decrease in ransomware encounters. (See <strong>Lesson 1:<\/strong> <strong>Practice good cybersecurity hygiene<\/strong> below.)<\/p>\n<p>The bad news of course is that attackers began to shift their efforts to crimes like cryptocurrency mining, which hijacks victims\u2019 computing resources to make digital money for the attackers.<sup>1<\/sup> But that\u2019s because cybercriminals are opportunists and they\u2019re always searching for the weakest link.<\/p>\n<p><strong>One of the best ways to thwart cybercrime is to involve security experts before deploying new products and\/or services. <\/strong>A decade ago, this wasn\u2019t typically done in many organizations. But with the rise of security awareness as part of the overall corporate risk posture, we\u2019re seeing security involved early on in deployments of modern architectures, container deployments, digital transformations, and DevOps.<\/p>\n<p>When security experts connect the wisdom of the past\u2014such as the importance of protecting data in transit with encryption\u2014to the technology rollouts of today, they can help organizations anticipate what could go wrong. This helps you bake controls and processes into your products and services before deployment. The people who have already learned the lessons you need to know can help so you don\u2019t wake up to the same problems every (well, almost) day. When security experts carry those lessons forward, they can help end your Groundhog Day.<\/p>\n<p>In addition, involving security experts early on doesn\u2019t have to slow things down. They can actually help speed things up and prevent backtracking later in the product development cycle to fix problems missed the first time around.<\/p>\n<p><strong>Security can help anticipate problems and produce solutions before they occur. <\/strong>When Wi-Fi networking was first being deployed in the late 1990s, communications were protected with Wired Equivalent Privacy (WEP). But WEP suffered from <a href=\"https:\/\/www.dummies.com\/programming\/networking\/understanding-wep-weaknesses\/\" target=\"_blank\" rel=\"noopener\">significant design problems<\/a> such as the initialization vector (IV) being part of the RC4 encryption key that were already known issues in the cryptographic community. The result was a lot of <a href=\"https:\/\/lifehacker.com\/how-to-crack-a-wi-fi-networks-wep-password-with-backtra-5305094\" target=\"_blank\" rel=\"noopener\">WEP crackers<\/a> and the rapid development of the stronger <a href=\"https:\/\/www.wi-fi.org\/news-events\/newsroom\/wi-fi-alliance-announces-first-products-certified-for-wi-fi-protected-access\" target=\"_blank\" rel=\"noopener\">Wi-Fi Protected Access<\/a> (WPA) set of protocols. If designers had worked with crypto experts, who already had designed a solution free of known issues, time, money, and privacy could have been saved.<\/p>\n<p>Traditional technology thinks about \u201cuse\u201d cases. Security thinks about \u201cmisuse\u201d cases. Product people focus on the business and social benefits of a solution. Security people think about the risks and vulnerabilities by asking these questions:<\/p>\n<ul>\n<li>What happens if the solutions are attacked or used improperly?<\/li>\n<li>How is this product or workload going to behave in a non-perfect environment?<\/li>\n<li>Where is your system vulnerable and what happens when it comes under attack?<\/li>\n<\/ul>\n<p>Security also remembers lessons learned while creating threat models to head off common mistakes at the past.<\/p>\n<blockquote>\n<p><strong>Rita:<\/strong> I didn\u2019t know you could play like that.<\/p>\n<p><strong>Phil:<\/strong> I\u2019m versatile.<\/p>\n<p><em><strong>Groundhog Day <\/strong><\/em>(1993) starring Bill Murray as Phil and Andie McDowell as Rita. Sony Pictures<sup>\u00a9<\/sup><\/p>\n<\/blockquote>\n<p><strong>Example: Think about designing a car. <\/strong>Cars are cool because they can go fast\u2014<em>really fast<\/em>. But if you had some security folks on the team, they\u2019d be thinking about the fact that while going fast can be thrilling\u2014you\u2019re going to have to stop at some point.<\/p>\n<p>Security are the kind of thinkers who would probably suggest brakes. And they would make sure that those brakes worked in the rain, snow, and on ice just as well as they worked on dry pavement. Furthermore\u2014because security is obsessed (in a good way) with safety\u2014they would be the ones to plan for contingencies, like having a spare tire and jack in the car in case you get a flat tire.<\/p>\n<p>Learning from and planning for known past issues, like the network equivalent of flat tires, is a very important part of secure cyber design. Machine learning can provide intelligence to help avoid repeats of major attacks. For example, machine learning is very useful in detecting and dismantling fileless malware that lives \u201coff the land\u201d like the recent <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/08\/dismantling-a-fileless-campaign-microsoft-defender-atp-next-gen-protection-exposes-astaroth-attack\/\" target=\"_blank\" rel=\"noopener\">Astaroth campaign<\/a>.<\/p>\n<h3>Top practices inspired by lessons learned by helping organizations be more secure<\/h3>\n<p>Thinking about and modeling for the types of problems that have occurred in the past helps keep systems more secure in the future. For example, we take off our shoes in the airport because someone <a href=\"https:\/\/www.cnn.com\/2013\/03\/25\/us\/richard-reid-fast-facts\/index.html\" target=\"_blank\" rel=\"noopener\">smuggled explosives<\/a> onto a plane by hiding it in their footwear.<\/p>\n<p>How DO you stop someone who wants to steal, manipulate, or damage the integrity of your data? What can you do to stop them from trying to monetize it and put your company and customers in jeopardy of losing their privacy? I\u2019m glad you asked\u2014here are four lessons that can help your organization be more secure:<\/p>\n<p><strong>Lesson 1:<\/strong> <strong>Practice good cybersecurity hygiene<\/strong>\u2014It may not be shiny and new, but cybersecurity hygiene really matters. This is perhaps the most important lesson we can learn from the past\u2014taking steps to ensure the basics are covered can go a very long way for security. That 60 percent decrease in ransomware encounters globally mentioned earlier is most likely due to better cybersecurity hygiene.<\/p>\n<p><strong>Lesson 2: Schedule regular backups<\/strong>\u2014With regular backups (especially cold backups, held offline), you always have an uncompromised version of your data.<\/p>\n<p><strong>Lesson 3: Use licensed software<\/strong>\u2014Licensed software decreases the likelihood that bugs, worms, and other bad things won\u2019t be infiltrating your infrastructure. Deploying necessary <strong>patching<\/strong> that makes systems less vulnerable to exploit is part of keeping the integrity of your licensed software intact.<\/p>\n<p><strong>Lesson 4: Lean into humans \u201cbeing human\u201d<\/strong> <strong>while leveraging technological advances<\/strong>\u2014For example, acknowledge that humans aren&#8217;t great at remembering strong passwords, especially when they change frequently. Rather than berating people for their very human brains, focus on developing solutions, such as password wallets and passwordless solutions, which acknowledge how hard strong passwords are to remember without sacrificing security.<\/p>\n<blockquote>\n<p><a href=\"https:\/\/www.imdb.com\/name\/nm0000510\/?ref_=tt_trv_qu\" target=\"_blank\" rel=\"noopener\"><strong>Rita<\/strong><\/a>: Do you ever have d\u00e9j\u00e0 vu?<\/p>\n<p><a href=\"https:\/\/www.imdb.com\/name\/nm0000195\/?ref_=tt_trv_qu\" target=\"_blank\" rel=\"noopener\"><strong>Phil<\/strong><\/a>: Didn&#8217;t you just ask me that?<\/p>\n<p><em><strong>Groundhog Day<\/strong><\/em> (1993) Sony Pictures<sup>\u00a9<\/sup><\/p>\n<\/blockquote>\n<p>Admittedly, we can\u2019t promise there won\u2019t be some share of Groundhog Day repeats. But the point is progress, not perfection. And we are making significant progress in our approach to cybersecurity and resilience. Above are just a couple of examples.<\/p>\n<p>I\u2019d love to hear more from you about examples you may have to share, too! Reach out to me on <a href=\"https:\/\/www.linkedin.com\/in\/dianakelleysecuritycurve\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> or <a href=\"https:\/\/twitter.com\/dianakelley14\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>, <a href=\"https:\/\/twitter.com\/dianakelley14?lang=en\" target=\"_blank\" rel=\"noopener\">@DianaKelley14<\/a>. Also, bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a> to keep up with our expert coverage on security matters.<\/p>\n<p><em><sup>1<\/sup><\/em><a href=\"https:\/\/securityintelligence.com\/news\/cybercrime-profits-total-nearly-200-billion-each-year-study-reveals\/\" target=\"_blank\" rel=\"noopener\"><em>Cybercrime Profits Total nearly $200 Billion Each Year, Study Reveals<\/em><\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/08\/how-to-avoid-groundhog-day-loop-security-issues\/\">How to avoid getting caught in a \u201cGroundhog Day\u201d loop of security issues<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/08\/how-to-avoid-groundhog-day-loop-security-issues\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Tue, 08 Oct 2019 16:00:58 +0000<\/strong><\/p>\n<p>One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/08\/how-to-avoid-groundhog-day-loop-security-issues\/\">How to avoid getting caught in a \u201cGroundhog Day\u201d loop of security issues<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21493,21983,23154,22073],"class_list":["post-16536","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-ai-and-machine-learning","tag-ciso-series","tag-cybersecurity-deployment","tag-data-governance"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16536"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16536\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16536"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}