A MESSAGE FROM THE PRESIDENT AND CEO OF THE SALT LAKE CHAMBER The Salt Lake Chamber is Utah’s voice of business. We represent the state’s 63,000-plus employers, all of which have something in common—they are all at risk of falling victim to a cyber attack. Utah is a state for innovation. Our tech community has been a major component of economic growth and development in our communities, heightening our quality of life and garnering national recognition. However, with this impressive level of innovation also comes risk. In adapting to our high-tech society we tend to embrace the convenience of technology at the expense of security. At an ever-increasing rate, criminals are targeting our computer networks and critical infrastructure, stealing proprietary information from our businesses, and violating the privacy of internet users. Ultimately, cyber attacks have the potential to disable air traffic controls, railroads, power grids, oil refineries, water supplies, internet and telephone service, financial and health records, police protection, and the list goes on. The business community needs to be wary of the potential dangers they will inevitably face. No matter the size of the organization, cyber attacks hurt. The financial burden, loss of customer trust and hassle of data recovery are bad for any business. More and more small and medium-size businesses are targeted because they lack the resources to adequately defend themselves. Cybersecurity is no longer just an IT problem, it’s an organizational problem that needs to be addressed by CEO’s across the state, in every industry, and companies of all sizes. Our government also needs to be proactive when it comes to cybersecurity. The state has made impressive efforts through the Department of Public Safety to curb cyber crime, and the state’s Department of Technology has enhanced security protocols. However, there will always be a need for more innovative solutions and improvements within our cybersecurity frameworks, regulations and information sharing protocol. In our increasingly digital society, we must all be continuously vigilant of cyber threats. Our cybersecurity posture involves not only the technology used to combat threats, but also the people and processes that keep our systems safe. The internet has always served as a channel for economic growth, but its potential vulnerabilities could lead to economic paralysis. The cybersecurity of businesses, governments and individuals alike is a shared risk and ultimately a shared responsibility. Sincerely,
Lane Beattie President & CEO
CYBERSECURITY CHECKLIST Use strong passwords and enable two-step authentication where possible. Long passwords are typically better than shorter, complex ones. Avoid using the same password on more than one website. Keep your software updated. For user devices, enable automatic updates to ensure you get the latest security patches as soon as possible. For other services, make sure your administrators monitor vulnerabilities and patch regularly. Educate your employees about cybersecurity through workshops and monthly email updates. Incorporate a section about information security in your employee handbook. Be skeptical about urgent emails requesting money, even from colleagues. Verify over the phone or via another channel in case their email account has been compromised. Do not open attachments that you are not expecting. If you have to regularly receive attachments from outside parties, consider using a separate computer to download and scan them. Disable macros on your Microsoft Office products. This additional functionality is often involved in malware and other attacks. Keep good backups of your data in multiple places. Make sure that your backups are protected from malware that may infect your computer. Create a data breach response plan and know how to report the incident to the Statewide Information & Analysis Center (SIAC). Familiarize yourself with available resources from reputable organizations including the Salt Lake Chamber’s cybersecurity toolkit at slchamber.com/cyber
CYBERSECURITY LEADERSHIP COUNCIL This document was commissioned by the Salt Lake Chamber’s Cybersecurity Leadership Council in an effort to provide an educational resource to the business community. The Council is composed of both public and private partners with a vested interest in building a more secure economy.
TABLE OF CONTENTS
01
CYBERSECURITY FOR UTAH’S BUSINESS COMMUNITY
03
BEST PRACTICES TIMELY PATCHING DATA BACKUP BEWARE OF SOCIAL ENGINEERING EDUCATE YOUR EMPLOYEES DEVELOP A DATA BREACH RESPONSE PLAN
07
DIRECTORY OF KEY STAKEHOLDERS STATE CYBER RESOURCES CYBER INSURANCE PROVIDERS CYBER LEGAL CONSULTANTS CYBERSECURITY SERVICE PROVIDERS
CYBERSECURITY FOR UTAH’S BUSINESS COMMUNITY Cybersecurity is on many people’s minds today. Almost every week, we hear about a new breach. A massive breach at Equifax exposed 143 million people’s confidential information to cyber criminals. That was followed by revelations that the Security and Exchange Commission’s system was compromised in 2016. And before that, the WannaCry ransomeware infected hundreds of thousands of computers across the globe. It’s likely threats such as these are only going to grow in frequency and sophistication. It is important that every business and every individual recognizes that Utah is not immune to these attacks. We have a large number of technology companies and many small and medium-sized businesses that make for attractive targets. While Utah-based businesses have mostly escaped large-scale data breaches, many Utah business and residents have been victims of cyber attacks and fraud, even Sundance had its box office shut down in 2017 in a cyber attack. Unfortunately, many businesses do not report cyber attacks, either because they are not sure of how to do it or or they are simply too embarrassed that they were hacked. This makes Utah-specific statistics hard to come by. To improve Utah’s capacity for analytics and law enforcement, please report any cyber attack you experience to the Statewide Information & Analysis Center which allows businesses to make complaints about cyber attacks for review. They will not open a criminal complaint or use your personally identifying information without your consent. While you may choose not to pursue criminal charges after reporting to the SIAC, it is important that you make the initial effort to report any incident so that trained professionals can track and protect other Utahns from experiencing the same attack. Information sharing is key to annihilating the threat. Learn more at https://siac.utah.gov/. The FBI’s Internet Crime Complaint Center (IC3) reports that in 2016 alone, 2,295 complaints came from Utah residents. The greatest loss came from what is known as business email compromise (BEC) scams. BEC scams involve attackers sending an email, typically from a CEO or another executive, to someone in accounts payable or anyone else with the authority to wire money. There are two common methods used to create these emails. The first is creating a fake email that appears to be from the person in question. For example, if the Chamber were a target and the attackers wanted to impersonate John Smith at the Chamber, they might register a domain that looks similar to the one used for emails. Instead of coming from jsmith@slchamber.org, the email comes from jsmith@s1chamber.org or jsmith@slcchamber.org. Without a keen eye, these emails look close enough to fool many people. Businesses along the Wasatch Front experience many BEC scams. Many of these incidents involve either phishing or infected documents where an email containing a link to a phishing site or an infected document is sent to the target. The target is prompted to enter their email username and password. Upon hitting submit, the credentials are sent to the attackers, who use the victim’s own email system to send the messages. In some cases, the attackers have been known to read emails to find the most opportune time to send their message.
1
The message sent to accounts payable typically has some sense of urgency and is often tied to current activities in the company. The email may look something like this:
From: jsmith@slcchamber.org To: accountspayable@slchamber.org
Subject: Urgent! Need funds wired for US Chamber dues! I am in DC at the US Chamber event and was just informed that our membership will be suspended tomorrow if we aren’t current with our dues. I’m not sure what happened, but this needs to be resolved now. Wire $15,000 to ABA 123456789, account 9876654321 ASAP. I’ll be in meetings for the next four hours, but will call after my meetings to confirm this is taken care of. Thanks for your prompt attention! John -John Smith Executive Director SL Chamber
In 2016, Utahns reported 133 BEC scams. Forty-three of these scams were successful, causing losses of $2,657,372. Braintrace has investigated BEC scams from industries as diverse as legal firms and financial services, to construction and manufacturing. Including all the associated costs with remediation, these businesses incurred losses averaging around $200,000. Utah businesses are not alone in being attacked. Utah’s SIAC reports that the Utah state government’s network sees an average of five million attacks each month. Last year, the Salt Lake City Police Department reported that there was an unsuccessful attack against their network. The group claiming credit said it was in response to an officer-involved shooting. Utah is working hard to develop the workforce to address these cyber attacks, and cybersecurity remains a fast growing career path. According to the Department of Workforce Services, the cybersecurity analyst job compound annual growth rate was measured at 13.39%, over four times the projected rate. In July 2017 alone, there were 49 unique new job postings in Utah. In response, higher education is creating new career pathway programs, including the Master of Science in Cybersecurity at Utah Valley University.
2
BEST PRACTICES Timely Patching Let’s take a look at the breach that has been on everyone’s mind: Equifax.
MARCH Apache Struts, a web application framework used by thousands of companies, reveals a security flaw and issues a patch. Organizations are encouraged to apply this critical update.
MAY 13
JULY 29
JULY 30
Attackers compromise Equifax’s network using this known Apache Struts vulnerability.
Equifax detects suspicious traffic.
Equifax takes the website offline to patch the vulnerability.
AUGUST 2
SEPTEMBER 7
SEPTEMBER 8
Equifax hires Mandiant, an incident response company, to investigate.
Equifax announces the breach to the public and reveals 143 million records were stolen.
Equifax’s stock drops from $142 to $123 per share.
SEPTEMBER 15
SEPTEMBER 26
The Chief Information Officer and Chief Security Officer for Equifax both announce retirement. Stock drops to $93 per share.
CEO Richard Smith announces retirement.
While an organization like Equifax has many moving parts, the takeaway from this breach is simple. Equifax failed to update publicly facing software that had a known critical vulnerability. This vulnerability cost three executives their jobs, exposed 143 million people to identify theft, and will cost Equifax millions in remediation. All of this occurred because a patch was not applied. This was not an obscure vulnerability known only to a few select hackers and security pros. The announcement of this flaw and the associated patch resulted in headlines in technology publications declaring “Hackers exploit Apache Struts vulnerability to compromise corporate web servers” and “Apache Struts 2 needs patching, without delay. It’s under attack now.” These warnings were issued in early March, more than three months before the breach was detected and the patch was applied. Businesses need to keep an active inventory of software and systems in use. It is also vital to know when critical security updates are available and how to apply them in a speedy manner. 3
Data Back-Up Ransomware is an increasingly common threat to businesses large and small. Recently, an anti-malware vendor released a report showing the growing number of attacks on small businesses. One of their conclusions was that smaller businesses are even more at risk, simply because they don’t have the IT resources to deal with ransomware. A business continuity provider reporting that between Q2 2016 and Q2 2017, small and medium-businesses paid $301 million in ransoms for data. Ransomware encrypts your data, offering to decrypt it for a fee. The interesting thing about ransomware is that the only real threat they have is to not give you back your data. If your organization has current backups of the data, ransomware is a nuisance, but should have no lasting effects. On the other hand, if you don’t have good backups, you may experience what happened to a police department in Cockrell Hill, Texas. In December of 2016, one of their servers was infected with ransomware. At after consulting with the FBI, they did not pay the ransom. This resulted in the loss of files, bodycam video, and other evidence dating back to 2009. Having a secure backup could have prevented this mission-critical data from being lost.
• Identify all information that is critical to your business operations as well as any potentially sensitive information. • Copy your data onto an external drive, network drive, or onto the cloud. • For extra data security, back up your information in several different locations. • Remember to regularly update and test your backups.
BACK UP SYSTEM
CLOUD STORAGE
NETWORK DATABASE
4
Beware of Social Engineering The Business Email Compromise (BEC) attacks described earlier in this document are a great example of social engineering. These attacks do not focus on exploiting a flaw in software; they take advantage of human nature. Recent high-profile attacks include a British “email prankster” impersonating Mr. Trump’s advisor and son-in-law Jared Kushner, well-known politician Jon Huntsman Jr., and former White House Chief of Staff Reince Priebus. The victims, including then White House Director of Communications Anthony Scaramucci and Homeland Security Advisor Tom Bossert, responded to the emails in a very candid manner, seemingly fooled by the well-crafted phishing lures. Even more damaging was the successful phishing attack against John Podesta, Hillary Clinton’s campaign chairman. Reports allege that a hacking group associated with a Russian intelligence agency compromised Podesta’s email account by simply getting him to type his password into a fake Gmail security alert. This social engineering attack resulted in thousands of emails being published on WikiLeaks. Detecting and avoiding social engineering can be difficult. It is important to be skeptical of email messages, especially when they are unexpected and indicate of a sense of urgency. Avoid clicking links in emails, particularly for sites that require authentication. If an email seems out of the ordinary, such as a sudden wire transfer request, verify the request via a channel other than email. Likewise, remember that many of these rely on either fear or greed. If an email is threatening or promises something too good to be true, be extra cautious.
Educate Your Employees Education and cybersecurity awareness are key to the success of any cybersecurity program. While technical controls are important, people often provide the opening that attackers use. You may be required to do training annually for compliance reasons, but that may not be enough. Consider having additional reminders throughout the year. Monthly emails with tips and relevant, recent examples will keep cybersecurity on people’s minds. It can be difficult for non-technical employees to feel empowered to do anything to improve the cybersecurity posture of the company. Stress the importance of strong authentication, being aware of phishing emails, and not opening unexpected attachments. It is important to make sure it is relevant to these employees. Too much technical jargon tends to detract from the message. Vague admonishments are not nearly as effective as concrete examples of how cybersecurity is essential in our connected business environment. Information technology personnel in smaller businesses may feel overwhelmed with the added responsibility of securing systems as well as keeping these systems running. Show an interest in helping them secure the systems. Ask them if they have signed up for security alerts for the software products in use. Provide cybersecurity training for the employees. There are affordable cybersecurity conferences that take place right here in Utah. Sending employees to these conferences will not only provide them with some of the latest information, but will also help establish professional networks. Finally, those in charge need special training to identify threats that will target them. Spear phishing attacks and business email compromise attacks are among those that specifically target business owners and executives. Educating the leaders fosters a culture of cybersecurity in the organization. 5
Develop a Data Breach Response Plan Unfortunately, despite best efforts, a data breach may still happen. It is crucial that businesses have a plan for how to respond to a breach. This plan should be a dynamic document that is reviewed and updated at least yearly. In many cases, a plan is developed for compliance reasons and is then left in a binder on a shelf, gathering dust. As a business grows over time, employee roles change and information systems are implemented, upgraded, and retired. All of these changes should be reflected in a data breach response plan. Internal resources need to be identified. If a breach is suspected, who should be contacted within the company? Who makes the decision when to contact remediation services or law enforcement? Who drafts the messaging to customers? Identify the people who will be back-ups in case any of these individuals are not available. These are all questions that need to be answered. Keep a list of external resources available and updated. Ideally, these relationships are established long before the plan is ever needed. Have contact information for legal representation, law enforcement, public relations firms, and incident response companies readily accessible. As part of the review process, run through a tabletop simulation to evaluate the processes. As shown in the NIST Cybersecurity Framework below, responding with a plan is an essential step in securing your business operations:
A ST
H RT
ER
E
IDENTIFY
YOUR ASSETS
PROTECT
YOUR ASSETS
RECOVER
NORMAL OPERATIONS
NIST 5-STEP APPROACH DETECT
INCIDENTS
RESPOND
WITH A PLAN
6
DIRECTORY OF KEY STAKEHOLDERS
7
CYBER INSURANCE PROVIDERS
?
ARE YOU THE NEXT
TARGET
Insurance Solutions
Protect your business with data breach insurance. Your Partner In Breach Prevention and Response You have the unique opportunity to purchase data breach insurance through Univantage Insurance Solutions. Policies cost as little as $25 a month. Coverage includes: · Legal assistance · Notification costs · Credit monitoring
· Fraud resolution · Risk-management research · Loss-prevention software
To obtain details, contact your WCF representative or
Univantage at 888.864.8268.
www.univantage.com
Cyber Security
It’s Not Just a Matter For Your IT Department Moreton & Company’s Executive Risk team can help you find an insurance plan to protect against lost or stolen personal information, forensics and notification costs, and data restoration. Coverage can also be structured for network extortion or other first party cyber related exposures. • Economic security and national security are linked • Business leaders need to be committed to managing cyber risk • To protect themselves, businesses should have: Ź An incident response plan Ź A practice data breach session Ź Proper procedures and protections in place Ź An insurance policy
www.moreton.com
8
CYBER LEGAL CONSULTANTS
PROUD TO SUPPORT THE SALT LAKE CHAMBER OF COMMERCE
CYBERSECURITY & PRIVACY PRACTICE OUR MISSION: RQN’S CYBERSECURITY TEAM HELPS ASSESS AND MANAGE DATA SECURITY RISK AND RESPOND TO DATA COMPROMISES
RQN CYBERSECURITY PROFESSIONALS:
WHAT WE DO: Pre-breach, breach, post-breach services, including: CREATE INFORMATION SECURITY POLICIES PREPARE DATA BREACH RESPONSE PLANS RESPOND TO DATA BREACHES PROVIDE EMPLOYEE TRAINING
JOHN A. ADAMS (801) 323-3301 jadams@rqn.com
ELAINA M. MARAGAKIS (801) 323-3315 emaragakis@rqn.com
ASSESS THIRD PARTY VENDOR CONTRACTS CONSULT ON PRIVACY NOTICES
MR. ADAMS AND MS. MARAGAKIS ARE CERTIFIED INFORMATION PRIVACY PROFESSIONALS/US
SALT LAKE CITY | PROVO
www.RQN.com
Parsons Behle & Latimer’s cybersecurity team provides clients with tailored solutions for their cyber and privacy needs including: • Incident response ° Compliance with state and federal laws ° Notification requirements • Interfacing with regulators • Employee training • Internal policy review • Vendor contract review and negotiations
NATIONAL EXPERTISE. REGIONAL LAW FIRM. BOISE | IDAHO FALLS | RENO | SALT LAKE CITY | WASHINGTON, D.C.
201 South Main Street, Suite 1800 | Salt Lake City, Utah 84111 | 801.532.1234 | parsonsbehle.com 9
CYBERSECURITY SERVICE PROVIDERS
Securing the cyber landscape Now more than ever, businesses of all sizes as well as federal, state and local government need to evolve security practices to help keep their information safe from cyber attacks.
Security is at the core of our networks and central to everything we do.
Š 2018 AT&T Intellectual Property. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
10
Your Data Your Business Partnering to Protect What’s Most Important •
No one can afford to ignore information safety, especially when it involves documents.
The Competitive Edge Office Systems, a Xerox Partner, can work with you to insure your document and compliance processes are secure.
•
The stakes for Small & Medium Sized Business are even higher than for large corporations.
•
The average total cost of a data breach increased 23% over two years to $3.79 million.1
Don’t underestimate what’s at risk! The security of your document domain can’t be taken for granted. There are Simple and Cost Effective Solutions to Secure Your Documents.
2015 Cost of Data Breach Study: Global Analysis, IBM and Ponemon Institute, May 2015. 1
Learn how the networked imaging systems in your enterprise can become allies instead of risks. Call Today for a Document Security & Compliance Analysis.
The Competitive Edge Office Systems Inc . 307 West 200 South . Salt Lake City . Utah . 84101 385.359.0917 . www.xcompedge.com . larry@xcompedge.com
UNPARALLELED SECURITY COST EFFECTIVE WHITE GLOVE SERVICE Offsite Digital Storage
Unparalleled Security
The Perpetual Storage vault has remained one of the world’s most trusted and safest facilities offering maximum security off-site storage of digital records since 1968.
Cost Effective
Have peace of mind knowing your is data stored inside an impenetrable solid granite mountain vault. We offer competitive pricing. A simple pricing structure with no hidden fees. White Glove Service
Granite Cloud, enhanced cloud storage Data resiliency is at your fingertips with Granite Cloud. It offers simple, cost-effective cloud storage services, with unparalleled security and all-inclusive pricing.
11
We value our clients which is why we are expeditious and responsive.
SCHEDULE A TOUR OF THE UNIQUE FACILITY PerpetualStorage.com
800.753.2200
Microsoft’s Go-To Partner in Utah • Cybersecurity • Digital Rights Management • Mobile Device Management • Data Loss Prevention
• Data Classification / Labeling • Disaster Recovery - Azure • Office 365 Consultants • Single Sign On
801.565.9199 journeyteam.com
• Business Risk Alignment via Secuvant Cyber7™ • Managed Detection & Response 24-7 • Cyber Risk Program Management-as-a-Service • PCI | HIPAA | SOC2 Compliance Readiness
Call For a Free Consultation (855) 732 8826 info@secuvant.com 12
To schedule a free Cyber Threat & Network Assessment
801.947.7100
www.strongconnexions.com
connecting & securing technology for business
Cyber Security
Network Engineering Policies & Governance
IT Support 13
Managed Services
Vulnerability & Penetration Testing Penetration testing attempts to exploit vulnerabilities to determine whether unauthorized access or other malicious activity is possible. We take steps to help close those vulnerabilities and safeguard your business.
Threat Intelligence
Recognize and respond to threats with actionable cyber threat intelligence.
Digital Forensics
Forensically certified digital data collection, recovery and analysis.
Incident Response
Our managed incident response solutions help stop an attack, assess the damage, and mitigate the impact to your business.
NOT SURE HOW TO APPROACH CYBERSECURITY? No matter what your organization does, the first step is to realize you have cybersecurity responsibilities. Haight Bey & Associates is here to help you meet your responsibilities. First, we listen to you. Then, we offer sound advice, and commonsense, cost-effective solutions to meet your organization’s cyber security needs and help you realize a return on investment. CALL FOR A FREE CONSULTATION (888) 379-0509 www.haightbey.com
For Banking built to keep up with life, Zions Bank is for you. Zions Bank is proud to sponsor the Salt Lake Chamber Cybersecurity Conference.
A division of ZB, N.A. Member FDIC
14 1803-EP1026 SL Chamber Cybersecurity Conference Ad.indd 1
3/5/18 5:09 PM
Authored by Robert Jorgensen, Cybersecurity Program Director Utah Valley University uvu.edu/cybersecurity
Book provided by Presto Print
Book presented by The Salt Lake Chamber