The security survey which FBI conducted gives a lot of insight towards the possible threats faced by companies using IT.  Now a days, the business is 100% depends on IT and we can’t even image a corporate working without the support from IT.  This makes computers as the target for attackers.  An attack on IT and IT infrastructure can cause more damage to a company than using a bomb.  And corporate being one of the back bones of any nation’s economy, the impact will be more damaging.

 

FBI did a very good job in this survey and it is an eye opener for corporate world.  This article looks in to few of the key findings of the survey and suggests some best practices.

 

This survey covered all most all the industries and one of the findings is there is threat with in an organization is very high.  In some cases the attack/incident is very much intentional and in other cases (most of the cases), employee’s lack of knowledge & the week understanding cause the damage.  An employee gets an infected file thru attachment, using chat clients and accepting files, visiting Pornography and warez sites etc invites trouble.  Most of the employees are not aware of the traps and the amount of damage they might cause to their paying masters.

 

There should be a in depth background checking before employing people as system & network administrators and their activities too should be logged and monitored.  Employees visiting non-business related sites, installing software etc can be prevented by using Group Policy and effective utilization of the existing (ie :  without spending anything more in new stuffs).  If an organization does not have any such features, there are a lot of open source solutions available (like SQUID, in which you can prevent users accessing non-business related sites.)   A very high percentage of security related incidents are due to Virus and Spyware.  Limited access to internet will take care of Spyware in a large scale. 

 

Implementing Antivirus is something almost all the organizations have done.  But the irony is, attack from a virus is the most common security incident.  There is a famous IT joke, if you want to safe guard your computer from Virus, shut it down and never switch on.  Yes….virus and anti-virus are something like a never ending story.  But with little bit of talent and interest, a system administrator can control this to a very large extent.  He/She should make sure that the anti-virus is installed on all the systems, and the signature files are updated on regular intervals.  System administrators should have the habit of visiting web sites of famous anti-virus organizations, so that their knowledge about new bread of viruses is updated.  Another best practice is to harden the OS of workstations.  This will make the system tough for the virus/attacker to get in and this can be done, without buying any extra software/hardware.

 

Majority of the organizations are on Windows platform, effective use of Group Policy will prevent user installing software and access to critical data.  Educating the employees about the possible threats will reduce the risk and this will take care of attackers using Social Engineering.  Another useful practice is enabling logging (and analyzing them periodically) for critical recourse. 

 

 

A campaign from government about effective use of existing tools and technologies will make sea difference.  Again, encouraging organizations to go for certifications like ISO 27001 (BS 7799) will bring in a lot of control and safety for IT related recourse.

 

Below table shows some of the best practices

 

 

Action

Remarks

Enforce strict group policies, which will prevent end user installing software and accessing critical,senstive recourse

Initially, this will attract some dis-statifation from the user community and over a period of time, this will be set right.

Block USB drives, CD ROMs etc

This will prevent data steeling and possibility of a virus/worm coming inside organization

This can be done by blocking them in BIOS or using software

Enforce strong & complex password, and set expiry for the passwords

This makes guessing the passwords tougher.  This can be done thru group policy

Enable URL Filter

Management can define what the employees should browse and what not.

Try open source solutions like SQUID.  Setting up of this tool is also very easy

Discourage the use of cell  phone with memory, blue tooth, infra-red,camera etc

Uh!! This is going to invite some good amount of resistance from employees

 

But there are lots of virus/worms which spreads thru blue tooth and if you have a bad elements in the organization, he can take snaps of sensitive areas or copy data to cell phone.

Make the Active X configuration and other such stuffs non-editable for user

This is just a kids play, if you have a system admin with basic knowledge.

Keep the system updated with updates and patches

Use WSUS and other tools, which are handy and effective

Enable logging of information

This will keep track of all the users who logs in

Do a detailed analyze of the logs

Ype…just by enabling logs, you can't be proactive.  You need to analyze them and take nesseary action.  Watch the logs carefully when a system admin or any person is about to quit the company

Enable firewall (software) on desktops too

If you are on Windows XP with Service Pack 2, it is much easier

Do a risk assessment for critical servers and recourse.

This will enable you to understand how vulnerable your IT assets are.

Back up the data.

Yes..it is very very important.  Due to an attack or due to some system failure or accident deletion, you may loose data.  Even though the last two are not security incidents, this will have some what same effect of an attack.  Your business is impacted.  If you have the backup, the impact can be reduced.

Keep a copy of your back up in a different location

This will reduce the impact on business if there a tsunami, 7/11, etc

After 3 failed login attempts, the account should be locked.

This will eliminate, an attacker trying different combinations in trail and error method

Any account not in used should be deleted or blocked

If there is an inactivity for more then 21 days, lock the account.

SNMP Enabled devices

New generation printers can order cartridge by itself when the toner is running out.  It is cool !!! But, these features will have some back doors (the manufactures may not have tested all the loops hopes )  So, do not expose these devices directly to the outer world.  Your printer may give a grant welcome party to an attacker!!!!

Discourage user opening attachments from strangers

We don’t what these files will do.  If you must, keep a system only for such activities.  This system should have more policies and preferably on a different sub-net.

Stop chain mails

Some mails are good…make you smile or laugh.  But there are balk sheep too.

Use CCTV in datacenter and work area

Shhh!!! Some one is watching….”    This will add a lot of safety.  Right ?

Use different  VLAN/Sub-nets

The Marketing team does not require access to the servers used by Pay Roll team.  In such scenarios, use different networks.  In other words, people see what they need to see.  Critical data of both the team will be secure and will not be visible to other team.  In case of any virus attack, only one team will be affected, not the whole office.

Analyze the nature of business and define a IT Security policy, which includes access (physical too), rights etc

If you have a policy, stick to it.  Do not allow any one to violate it.  If you think a change will do good, think again, discuss, do some testes and implement.

Finial and most important

Successful implementation of any security policy is 100% depend on the top level management.  It should flow from top to bottom.

Different Anti Virus software

If your organization can buy anti virus from two different manufactures (for example 50% system on McAfee and rest on Norton)  because, some virus will not detected by some scanners.

Make OS Hardening a must for all the Desktops and servers

If you are not using a service, turn it off.  This will reduce the risk and it will make the system work better.  More over this make your system healthier.

There are a lot of support and help from government and organizations.  Use them

To name a few : http://www.infragard.net/, http://www.cert-in.org.in/, http://www.ic3.gov/,

 

Download FBI’s survey report.

Note ::  I am yet to upload the report.  Contacted FBI for approval.  If you want a notification, when it is uploaded, please mail me.