SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Restricting
Authenticating
Tracking
User Access?
Time Is Not
On Our Side!
Page 1 of 6
The 2015 worst password list was published recently(1). The list is only one confir-
mation that leaving password controls to the end user is not secure. Verizon’s 2015
Data Breach Investigations Report(2) revealed that most breaches resulted from
harvested credentials. And recently, a former executive for the Cardinals pleaded
guilty to accessing the Astros’ player database and email system(3). He gained access
by learning the account and password from an employee who turned in their laptop.
This type of breach has become much too commonplace.
If you haven’t already, it’s time to take action and migrate to multifactor authentica-
tion. There is a sound ROI for the investment, and VIMRO is extremely committed
to helping our clients migrate to multifactor authentication in 2016!
Why Password Don’t Work
There is no shortage of case stories presenting a strong case and confirmed ROI
for moving to multifactor controls. Here are a few examples:
• In addition to the Verizon 2015 Data Breach Investigations Report we referenced
above, Wired published an article about the breaches of 2015(4). Most of the year’s
largest hacks involved weak authentication. Multifactor controls would drastically
reduce or eliminate this threat. (see reference #6)
• When the VIMRO Cyber Security Team conducts penetration tests, we almost
always gain access to our clients’ systems via captured credentials. There are so
many attack vectors to obtain passwords! Multifactor controls would considerably
reduce or eradicate the following vulnerabilities:
o Through social engineering, in which a workforce member sends us their
passwords, tells us their passwords, or enters their passwords into a simulat
ed cybercriminal fake web site;
or
o By intercepting them when conducting man-in-the-middle attacks (in
which an attacker secretly relays, often altering, the communication between
two parties who believe they are directly communicating with each other);
or
o By gaining access to the password database/file when breaching a weakly
configured or patched system, and then cracking the records with a pass
word-cracking application, such as L0phtCrack, OphtCrack, RainbowCrack,
Cain and Abel, John the Ripper, etc.
12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191
Passwords Don’t Work: Multifactor Controls Are the Answer
Learn how to demonstrate ROI
There is a sound
ROI for the
investment of
Multifactor Controls
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 2 of 6
With the right
methodology, ROI
is easy to
Demonstrate
The VIMRO security team’s work involves traveling. We overhear a lot of phone
conversations when we’re in the airport. On many occasions we overhear support
calls. Most support calls we hear involve a traveler forgetting their password, which
is understandable given the stresses and distractions of travel. We often can gather
where the individual works, their account name, and, yes, even their password,
which they typically repeat after a support person gives it to them over the phone.
Here are a few default passwords that we have recently heard in our travels:
• Winter2015! (It would be a reasonable guess that the next one is going to
be Spring2016! or some derivative.)
• “name of company”!@#abc
• “person’s name”1234
If we were criminals, or even if we were ethically conducting a social engineering
experiment by sitting in the airport and listening to calls, we’re pretty confident that
we would be able to gain unauthorized access to the individuals’ respective organi-
zations. Once again, the solution calls for multifactor controls.
ROI for Multifactor Authentication Controls is Easy to Demonstrate
All clients need to demonstrate an ROI when they present their solution to a prob-
lem. Using passwords only is a major problem. The likelihood of a breach due to
weak authentication is high, based on the following risks/threat examples:
• phishing (attempt to acquire sensitive information by masquerading as a
trustworthy entity in an electronic communication)
• man-in-the-middle
• gaining access to the password file database
The impact of a breach can be high in terms of hard costs:
• remediation/corrective action
• breach notification letters and credit monitoring for each record
compromised
• lost sales/consumer confidence
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 3 of 6
Compare,
Contrast,
Evaluate the
Products that
Meet YOUR Needs.
In most cases, when VIMRO conducts an ROI assessment for multifactor controls,
we can demonstrate to our client that the control is less expensive than the hard
costs associated with one mere breach. And this doesn’t even include implied costs:
it’s much harder to demonstrate a breach’s effect on a company’s reputation.
Indeed, in talking with most C-level executives, we learn that their company’s repu-
tation among its customers and shareholders is one of their top concerns, and that
any crack in that reputation is, in fact, associated with a high cost.
Conduct an IT Component and Sensitive Data Inventory
Demonstrating an ROI for multifactor controls is the easiest part of the project. In
the next phase of a multifactor implementation project, identify how the solution
will be used. This involves in-depth knowledge of your environment. Most clients
utilize the CIS Critical Security Controls(5) to acquire and manage this information.
Specifically:
• CSC 1: Inventory of Authorized and Unauthorized Devices
• CSC 2: Inventory of Authorized and Unauthorized Software
The inventory should include where sensitive data resides and how authentication is
currently handled. Dataflow diagrams also help provide a detailed understanding of
all of the components involved in sensitive data transmission, processing, and
storage. This enables efficient and effective implementation of the multifactor
solution.
Once the inventory is conducted, create a list of criteria that the multifactor solu-
tion must meet. We have provided a list of common requirements among VIMRO
clients in Attachment 1.
Evaluate Products that Meet Your Needs
There are many good multifactor authentication products on the market. VIMRO is
vendor-agnostic, so we help our clients research three or four or more products that
work best for their needs, but we do not promote one product over another.
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 4 of 6
Vet the strategy
by conducting a
pilot project.
One of our methods for identifying the best candidates for our clients’ evaluation is
suggesting solutions that worked well for similar organizations. We add those
vendors to the evaluation list in Attachment 1. We also identify good solution
candidates by staying current with industry reporting on these products. Some good
resources for this are:
• Search Security: http://searchsecurity.techtarget.com/feature/The-funda
mentals-of-MFA-Comparing-the-top-multifactor-authentication-products
• Forrester: https://www.forrester.com/How+To+Get+Away+With+Mur
der+Authentication+Technologies+That+Will+Help+You+Kill+Pass
words/fulltext/-/E-res126341
• Gartner: https://www.gartner.com/doc/2930517/magic-quadrant-us
er-authentication
• SANS: https://www.sans.org/reading-room/whitepapers/authentication
• SC Magazine: http://www.scmagazine.com/two-factor-authentica
tion-smart-cards-tokens/products/83/0/
Conduct a Pilot Project
VIMRO recommends that you conduct a pilot project using the one or two high-
est-scoring solutions on your evaluation sheet. Together we will select one or two
users from each of your organization’s business units. VIMRO recommends
mixed-skill pilot groups consisting of power users, intermediate users, and users
needing more support than most. This provides you with adequate feedback to
conclude whether the solution will work for your organization.
Documentation
Thorough documentation is critical to a successful implementation and lifecycle of
the multifactor solution. Dedicate resources to documenting everything. This
includes:
• Design documents
• As-built documents
• Support documents
• User instructions
• Pilot project lessons learned
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 5 of 6
...must conduct
continuous exercises
that test the
effectiveness of
training.
Awareness Training is Still Important
Multifactor controls are critical, but it is still important to have a layered defense.
This is especially true when it comes to protecting your user. Multifactor controls
can be compromised if a user shares their verification code with an attacker
through social engineering(6). It is important to conduct cyber security awareness
training with workforce members and to conduct continued exercises that test the
effectiveness of your training program. See VIMRO’s “Strengthening the Weakest
Link”(7) paper for more information.
Conclusion
Antimalware, IDS/IPS, and firewalls have become important tools to protect
businesses over the years. Breach data and research prove that ever-increasing
threats now require the use of multifactor controls to protect our businesses,
employees, and customers.
We encourage you to contact VIMRO to discuss how we can help make multifactor
controls part of your business practices.
References.
(1) 2015 Worst Password List: http://www.theguardian.com/technology/2016/-
jan/20/123456-worst-passwords-revealed
(2) Verizon 2015 Data Breach Investigations Report: http://www.verizonenterprise.com/D-
BIR/2015/
(3) Ex-Cardinal Executive Pleads Guilty to Accessing Astros’ Database: http://espn.go.com/ml-
b/story/_/id/14531169/christopher-cor-
rea-former-st-louis-cardinals-executive-pleads-guilty-hacking-houston-astros-database
(4) Wired List of 2015 Largest Hacks: http://www.wired.com/2015/12/the-years-11-big-
gest-hacks-from-ashley-madison-to-opm/
(5) CIS Critical Security Controls: https://www.sans.org/critical-security-controls
(6) Two-Factor Authentication Social Engineering Vulnerability: http://www.homelandsecuri-
tynewswire.com/dr20160204-vulnerability-found-in-in-twofactor-authentication
(7) VIMRO Strengthening the Weakest Link Paper: https://www.vimro.com/wp-content/up-
loads/2015/12/Strengthening-the-Weakest-Link-151210_2225opt.pdf
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Passwords Don’t Work:
Multifactor Controls Are the Answer
Attachment 1 – Multifactor Authentication Evaluation Requirements
Page 6 of 6

Weitere ähnliche Inhalte

Was ist angesagt?

2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity reportOwen Bartolome
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016rsouthal2003
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaPriyanka Aash
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityDistil Networks
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment aap3 IT Recruitment
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeSean Varga
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecJessica Lavery Pozerski
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out The Lorenzi Group
 

Was ist angesagt? (20)

2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 

Andere mochten auch

Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitaekishore rao
 
Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Giovanni Vicencini
 
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Marlène Pra
 
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...National Institute of Food and Agriculture
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 
Sejarah smk gajah berang
Sejarah smk gajah berangSejarah smk gajah berang
Sejarah smk gajah berangTeh onchew
 
CAS State of the Project 2016
CAS State of the Project 2016CAS State of the Project 2016
CAS State of the Project 2016Misagh Moayyed
 
Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015are_pay
 
Derecho Concursal y Atraso
Derecho Concursal y AtrasoDerecho Concursal y Atraso
Derecho Concursal y AtrasoYessicaB1
 

Andere mochten auch (13)

Kevincito
KevincitoKevincito
Kevincito
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.
 
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
 
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
 
Redes inalambricas
Redes inalambricasRedes inalambricas
Redes inalambricas
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Sejarah smk gajah berang
Sejarah smk gajah berangSejarah smk gajah berang
Sejarah smk gajah berang
 
El Periódico (13/03/2013)
El Periódico (13/03/2013)El Periódico (13/03/2013)
El Periódico (13/03/2013)
 
CAS State of the Project 2016
CAS State of the Project 2016CAS State of the Project 2016
CAS State of the Project 2016
 
Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015
 
Derecho Concursal y Atraso
Derecho Concursal y AtrasoDerecho Concursal y Atraso
Derecho Concursal y Atraso
 
Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)
 

Ähnlich wie Passwords don't work multifactor controls do!

Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016FitCEO, Inc. (FCI)
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamenskamensm02
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Berezha Security Group
 

Ähnlich wie Passwords don't work multifactor controls do! (20)

Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
 

Mehr von FitCEO, Inc. (FCI)

HIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideHIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideFitCEO, Inc. (FCI)
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15FitCEO, Inc. (FCI)
 
VIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyVIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyFitCEO, Inc. (FCI)
 
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...FitCEO, Inc. (FCI)
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.FitCEO, Inc. (FCI)
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to knowFitCEO, Inc. (FCI)
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesFitCEO, Inc. (FCI)
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROFitCEO, Inc. (FCI)
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3FitCEO, Inc. (FCI)
 

Mehr von FitCEO, Inc. (FCI) (13)

HIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideHIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance Guide
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
 
VIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyVIMRO Cyber Security Methodology
VIMRO Cyber Security Methodology
 
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMRO
 
IPV6 a tale of two protocols
IPV6 a tale of two protocolsIPV6 a tale of two protocols
IPV6 a tale of two protocols
 
CODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHFCODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHF
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3
 

Kürzlich hochgeladen

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Kürzlich hochgeladen (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Passwords don't work multifactor controls do!

  • 1. Restricting Authenticating Tracking User Access? Time Is Not On Our Side! Page 1 of 6 The 2015 worst password list was published recently(1). The list is only one confir- mation that leaving password controls to the end user is not secure. Verizon’s 2015 Data Breach Investigations Report(2) revealed that most breaches resulted from harvested credentials. And recently, a former executive for the Cardinals pleaded guilty to accessing the Astros’ player database and email system(3). He gained access by learning the account and password from an employee who turned in their laptop. This type of breach has become much too commonplace. If you haven’t already, it’s time to take action and migrate to multifactor authentica- tion. There is a sound ROI for the investment, and VIMRO is extremely committed to helping our clients migrate to multifactor authentication in 2016! Why Password Don’t Work There is no shortage of case stories presenting a strong case and confirmed ROI for moving to multifactor controls. Here are a few examples: • In addition to the Verizon 2015 Data Breach Investigations Report we referenced above, Wired published an article about the breaches of 2015(4). Most of the year’s largest hacks involved weak authentication. Multifactor controls would drastically reduce or eliminate this threat. (see reference #6) • When the VIMRO Cyber Security Team conducts penetration tests, we almost always gain access to our clients’ systems via captured credentials. There are so many attack vectors to obtain passwords! Multifactor controls would considerably reduce or eradicate the following vulnerabilities: o Through social engineering, in which a workforce member sends us their passwords, tells us their passwords, or enters their passwords into a simulat ed cybercriminal fake web site; or o By intercepting them when conducting man-in-the-middle attacks (in which an attacker secretly relays, often altering, the communication between two parties who believe they are directly communicating with each other); or o By gaining access to the password database/file when breaching a weakly configured or patched system, and then cracking the records with a pass word-cracking application, such as L0phtCrack, OphtCrack, RainbowCrack, Cain and Abel, John the Ripper, etc. 12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191 Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI There is a sound ROI for the investment of Multifactor Controls
  • 2. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 2 of 6 With the right methodology, ROI is easy to Demonstrate The VIMRO security team’s work involves traveling. We overhear a lot of phone conversations when we’re in the airport. On many occasions we overhear support calls. Most support calls we hear involve a traveler forgetting their password, which is understandable given the stresses and distractions of travel. We often can gather where the individual works, their account name, and, yes, even their password, which they typically repeat after a support person gives it to them over the phone. Here are a few default passwords that we have recently heard in our travels: • Winter2015! (It would be a reasonable guess that the next one is going to be Spring2016! or some derivative.) • “name of company”!@#abc • “person’s name”1234 If we were criminals, or even if we were ethically conducting a social engineering experiment by sitting in the airport and listening to calls, we’re pretty confident that we would be able to gain unauthorized access to the individuals’ respective organi- zations. Once again, the solution calls for multifactor controls. ROI for Multifactor Authentication Controls is Easy to Demonstrate All clients need to demonstrate an ROI when they present their solution to a prob- lem. Using passwords only is a major problem. The likelihood of a breach due to weak authentication is high, based on the following risks/threat examples: • phishing (attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication) • man-in-the-middle • gaining access to the password file database The impact of a breach can be high in terms of hard costs: • remediation/corrective action • breach notification letters and credit monitoring for each record compromised • lost sales/consumer confidence
  • 3. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 3 of 6 Compare, Contrast, Evaluate the Products that Meet YOUR Needs. In most cases, when VIMRO conducts an ROI assessment for multifactor controls, we can demonstrate to our client that the control is less expensive than the hard costs associated with one mere breach. And this doesn’t even include implied costs: it’s much harder to demonstrate a breach’s effect on a company’s reputation. Indeed, in talking with most C-level executives, we learn that their company’s repu- tation among its customers and shareholders is one of their top concerns, and that any crack in that reputation is, in fact, associated with a high cost. Conduct an IT Component and Sensitive Data Inventory Demonstrating an ROI for multifactor controls is the easiest part of the project. In the next phase of a multifactor implementation project, identify how the solution will be used. This involves in-depth knowledge of your environment. Most clients utilize the CIS Critical Security Controls(5) to acquire and manage this information. Specifically: • CSC 1: Inventory of Authorized and Unauthorized Devices • CSC 2: Inventory of Authorized and Unauthorized Software The inventory should include where sensitive data resides and how authentication is currently handled. Dataflow diagrams also help provide a detailed understanding of all of the components involved in sensitive data transmission, processing, and storage. This enables efficient and effective implementation of the multifactor solution. Once the inventory is conducted, create a list of criteria that the multifactor solu- tion must meet. We have provided a list of common requirements among VIMRO clients in Attachment 1. Evaluate Products that Meet Your Needs There are many good multifactor authentication products on the market. VIMRO is vendor-agnostic, so we help our clients research three or four or more products that work best for their needs, but we do not promote one product over another.
  • 4. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 4 of 6 Vet the strategy by conducting a pilot project. One of our methods for identifying the best candidates for our clients’ evaluation is suggesting solutions that worked well for similar organizations. We add those vendors to the evaluation list in Attachment 1. We also identify good solution candidates by staying current with industry reporting on these products. Some good resources for this are: • Search Security: http://searchsecurity.techtarget.com/feature/The-funda mentals-of-MFA-Comparing-the-top-multifactor-authentication-products • Forrester: https://www.forrester.com/How+To+Get+Away+With+Mur der+Authentication+Technologies+That+Will+Help+You+Kill+Pass words/fulltext/-/E-res126341 • Gartner: https://www.gartner.com/doc/2930517/magic-quadrant-us er-authentication • SANS: https://www.sans.org/reading-room/whitepapers/authentication • SC Magazine: http://www.scmagazine.com/two-factor-authentica tion-smart-cards-tokens/products/83/0/ Conduct a Pilot Project VIMRO recommends that you conduct a pilot project using the one or two high- est-scoring solutions on your evaluation sheet. Together we will select one or two users from each of your organization’s business units. VIMRO recommends mixed-skill pilot groups consisting of power users, intermediate users, and users needing more support than most. This provides you with adequate feedback to conclude whether the solution will work for your organization. Documentation Thorough documentation is critical to a successful implementation and lifecycle of the multifactor solution. Dedicate resources to documenting everything. This includes: • Design documents • As-built documents • Support documents • User instructions • Pilot project lessons learned
  • 5. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 5 of 6 ...must conduct continuous exercises that test the effectiveness of training. Awareness Training is Still Important Multifactor controls are critical, but it is still important to have a layered defense. This is especially true when it comes to protecting your user. Multifactor controls can be compromised if a user shares their verification code with an attacker through social engineering(6). It is important to conduct cyber security awareness training with workforce members and to conduct continued exercises that test the effectiveness of your training program. See VIMRO’s “Strengthening the Weakest Link”(7) paper for more information. Conclusion Antimalware, IDS/IPS, and firewalls have become important tools to protect businesses over the years. Breach data and research prove that ever-increasing threats now require the use of multifactor controls to protect our businesses, employees, and customers. We encourage you to contact VIMRO to discuss how we can help make multifactor controls part of your business practices. References. (1) 2015 Worst Password List: http://www.theguardian.com/technology/2016/- jan/20/123456-worst-passwords-revealed (2) Verizon 2015 Data Breach Investigations Report: http://www.verizonenterprise.com/D- BIR/2015/ (3) Ex-Cardinal Executive Pleads Guilty to Accessing Astros’ Database: http://espn.go.com/ml- b/story/_/id/14531169/christopher-cor- rea-former-st-louis-cardinals-executive-pleads-guilty-hacking-houston-astros-database (4) Wired List of 2015 Largest Hacks: http://www.wired.com/2015/12/the-years-11-big- gest-hacks-from-ashley-madison-to-opm/ (5) CIS Critical Security Controls: https://www.sans.org/critical-security-controls (6) Two-Factor Authentication Social Engineering Vulnerability: http://www.homelandsecuri- tynewswire.com/dr20160204-vulnerability-found-in-in-twofactor-authentication (7) VIMRO Strengthening the Weakest Link Paper: https://www.vimro.com/wp-content/up- loads/2015/12/Strengthening-the-Weakest-Link-151210_2225opt.pdf
  • 6. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Passwords Don’t Work: Multifactor Controls Are the Answer Attachment 1 – Multifactor Authentication Evaluation Requirements Page 6 of 6