Learn how your business is making itself a target with cybersecurity vulnerabilities.
Did you know that over 400 million records were compromised in the USA in 2015 alone? What’s worse is all the breached businesses SecurityMetrics has investigated had preventable vulnerabilities.
The big problem is many businesses don’t even know they’re vulnerable until it’s too late. Here are the top 5 practices that make businesses vulnerable.
See also: Top Ten PCI Requirement Failures: Where is Your Business Struggling?
Did you know that according to our latest PANscan study, 67% of merchants store unencrypted card data, and 5% store magnetic stripe data? This is data that’s just waiting around to be stolen.
Why should you encrypt your card data? Well, it essentially makes it useless to hackers should it get stolen. Encrypting card data ensures it can’t be used if stolen.
See also: PCI DSS Requirement 3: What You Need to be Compliant
Some other things you can do to protect your card data include:
See also: PIIscan: Find and Secure Unencrypted Personal Data
It’s likely your business has a firewall, but do you have someone reviewing the firewall logs?
Think of reviewing logs as having a watchman on a tower. He’s pretty useless if he isn’t looking for threats and letting everyone know when there’s danger. Having your firewall is useless if you aren’t paying attention to it when it notifies you something is off.
I recommend you install log monitoring software to aide in the log review process. Log monitoring software can look through the log entries on your firewall much faster than a person can and will notify you if something fishy happens (eg. someone tries to log onto your network 300 times at 2 am.) Remember though, you still need someone review any alerts that are flagged by the system.
I would also recommend installing a file integrity monitoring software on all your critical system which will alert you when changes to important files have been made.
SecurityMetrics forensic investigators found that over 65% of breached merchants didn’t have a properly configured firewall in place. A lack of configuration often weakens and even negates the effects of a firewall.
Many businesses think they can just plug in their firewall and be done with it, but there’s more. Very rarely, if ever, do you have a firewall that comes out of the box pre-configured to your system. Most firewalls are programed by default to either not let any traffic in at all, or to let all traffic in. You will need to spend some time to determine what kind of traffic is allowed for your network and what rules need to be configured on your firewall.
Less reliable firewalls will come with factory defaults allowing most or all traffic in and out. This creates a lot of work for the user to figure out what needs to be closed, and it often leaves vulnerabilities in the firewall that can be exploited. A good firewall will be set, by default, to block most traffic. The user will then need to start opening up the firewall to start allowing specific types of traffic in and out. This is a much more controlled method of setting up a firewall as it minimizes the possibilities of leaving vulnerable paths into your network.
It’s also important to review firewall rules on a regular basis. Leaving old rules in place when systems or users have been removed can not only cause conflict with other rules but can also leave gaping holes in the security of the network.
See also: PCI Compliant Firewalls: 5 Things You’re Doing Wrong
A lot of businesses don’t have adequate password management policies in place, if they have them at all. In most cases employees use predictable usernames and simple passwords for the sake of convenience, and about half of employees are using passwords that are at least 5 years old. Unfortunately, this makes it really easy for hackers to gain access to your data through your employees.
Make sure you and your employees are using unique passwords. It’s also important to avoid using dictionary words and keyboard patterns passwords (eg. 123qwe).
Here are 10 of the most common passwords:
Additionally, many businesses don’t regularly update their software. By doing this, they’re leaving their networks open to vulnerabilities that would’ve been patched up in those updates.
See also: PCI Requirement 6: Updating Your Systems
Establish a schedule where you update your software and technology regularly. If a big patch comes out, make sure to update the affected technology within 30 days of the patches release.
Occasionally software will no longer be supported by its developer, meaning that vulnerabilities won’t ever be fixed. This is called software sunset. Any software that’s no longer supported by its developers should be replaced as soon as possible.
See also: Security Patches in Your Business: Complying with PCI Requirement 6.1
Of all the breaches investigated by SecurityMetrics last year, 29% were breached as a result of unsecured remote access. Remote access is still the #1 pathway hackers use to gain data.
While remote access can be useful to your business and convenient, it can also open up a pathway for a hacker if it’s not properly secured.
If you use remote access, you’ll need to secure it properly. Some tips to secure your remote access include:
See also: Configuring Your Remote Desktop Connection: What You’re Doing Wrong
Remember that while there are many ways your business can be vulnerable to attacks, there are many ways to prevent these attacks. Examine your business and make sure these vulnerabilities aren’t present.
Need help in securing your data? Talk with one of our consultants!