December 2, 2016 | Author: Anonymous 1eZNBWqpB | Category: N/A
Simplifying IT Security Kaspersky Lab Limited Edition
Simplifying IT Security Kaspersky Lab Limited Edition By Georgina Gilmore and Peter Beardmore
Simplifying IT Security For Dummies®, Kaspersky Lab Limited Edition Published by John Wiley & Sons, Ltd The Atrium Southern Gate Chichester West Sussex PO19 8SQ England For details on how to create a custom For Dummies book for your business or organisation, contact
[email protected]. For information about licensing the For Dummies brand for products or services, contact
[email protected]. Visit our Home Page on www.customdummies.com Copyright © 2014 by John Wiley & Sons Ltd, Chichester, West Sussex, England All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, England, or emailed to
[email protected], or faxed to (44) 1243 770620. Trademarks: Wiley, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER, THE AUTHOR, AND ANYONE ELSE INVOLVED IN PREPARING THIS WORK MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. ISBN 978-1-118-84041-2 (pbk); ISBN 978-1-118-84822-7 (ebk) Printed and bound in Great Britain by Page Bros, Norwich
Introduction
W
elcome to Simplifying IT Security For Dummies – your guide to some of the information security challenges that all sizes of business face in today’s Internet-connected world. With valuable tips and pointers, this book aims to help your business ensure that sensitive information remains secure – so you’re less likely to incur regulatory / legal penalties or suffer damage to your business reputation. Although the computing breakthroughs of the past decade have helped business owners to cut costs, boost efficiency and deliver even better levels of customer service, those same new technologies have created opportunities for hackers to attack innocent businesses. More than ever before, all businesses – even those that think they’ve got no confidential information that they need to protect – should be aware of the risks and how to avoid them . . . so that’s why we’ve written this book.
About This Book Although it’s small, this book is crammed full of information to help growing businesses work out how best to protect confidential information – including sensitive information about their customers – and how to secure their computers and mobile devices against viruses, malicious attacks and more.
2 From the smallest businesses to the largest corporations, every organisation is at risk from the sophisticated methods that hackers use to access confidential information and steal money from business bank accounts. Whereas large multinationals can afford to employ teams of IT security specialists, smaller businesses are less likely to have in-house IT security expertise. Simplifying IT Security For Dummies sets out to help businesses by raising awareness of: ✓ Why virtually all businesses have sensitive information that they need to protect. ✓ The range and nature of today’s information security risks. ✓ The simple, ‘no-cost’ measures that help businesses to protect confidential information. ✓ The easy-to-use products that can greatly improve information security.
Foolish Assumptions To help ensure this book provides the information you need, we’ve made a few assumptions about you: ✓ The business that you own, manage or work for uses laptops, desktops and / or mobile devices. ✓ You need to make sure your business doesn’t fall foul of any information security regulations. ✓ You’re keen to ensure your business’s confidential information remains confidential. ✓ You’d like to learn how to prevent hacker attacks affecting your business’s day-to-day activities.
3 ✓ You may be considering storing some of your business information in ‘the cloud’. ✓ You’d welcome some tips on how to choose IT security software that fits your business.
How This Book Is Organised Simplifying IT Security For Dummies is divided into six concise, information-packed chapters: ✓ Chapter 1: Why All Businesses Need to Protect Sensitive Information. We explain the pitfalls of having a false sense of security. ✓ Chapter 2: Working Out What Your Business Needs. Even though all businesses need security, this chapter considers how security requirements can vary. ✓ Chapter 3: Discovering the Truth About Security Threats. Learn why today’s IT is more complex and the threats to businesses more dangerous. ✓ Chapter 4: Planning for Better Information Security. Assess the risks – then make sure your business knows how to avoid them. We also give you some points to consider for securely storing information in ‘the cloud’. ✓ Chapter 5: Choosing Security Software to Suit Your Business. With so many products on the market, we explain the factors that can help you make the right selection. ✓ Chapter 6: Ten Questions to Help Identify How to Protect Your Business. Use these questions as a useful checklist when considering what you need to protect your business.
4
Icons Used in This Book To make it even easier for you to find the information you need, we use these icons to highlight key text: This target icon draws your attention to top-notch advice. The knotted string highlights important information to bear in mind. Watch out for these potential pitfalls!
Where to Go from Here This book is a quick and easy read. You can dip in and out of the text as you wish, or you can read the book from cover to cover. Whichever way you choose, we’re sure you’ll find it packed with great advice on how to protect your customers’ information and the other valuable data that your business stores and processes.
Chapter 1
Why All Businesses Need to Protect Sensitive Information In This Chapter ▶ Assessing the extra burdens on smaller businesses ▶ Securing precious business information ▶ Avoiding the perils of a false sense of security ▶ Understanding why cybercriminals target all sizes of
business
I
n this first chapter, we look at some of the reasons why businesses are subject to information security risks – and why it’s unwise to try to sweep those security issues under the carpet.
Businesses Are Under Attack In the information age, knowledge is power. The information your business holds – about its specialist know-how, its products and its customers – is vital to your ongoing success. If you were no longer able to access some of that precious information, it could affect the day-to-day running of your business. Even worse, what would be the consequences if that
6 information fell into the wrong hands – a criminal’s hands? Furthermore, what if a criminal could gain access to your computers and steal your business’s online bank account details? Yikes! Unfortunately, companies of all sizes are attacked by cybercriminals who use a wide range of methods to disrupt business operations, access confidential information and steal money. In many cases, the victim company may be totally unaware of the attack . . . until it’s too late.
Cybercrime and cybercriminals Criminals have always been good at spotting new opportunities to exploit a weakness and make some money – at someone else’s expense. Whether it’s a flimsy lock on an office window or a burglar alarm that’s easy to overcome, criminals seize any chance to exploit any weakness. However, in today’s Internet-enabled age, a new breed of criminal has emerged from the murky depths . . . the cybercriminal. Cybercrime covers a vast range of criminal activities that are carried out via IT systems and / or the Internet. It’s too easy to dismiss the threat of cybercrime – and that’s one way that businesses help to make it even easier for cybercriminals to profit. Cybercriminals are highly organised and very skilled in developing sophisticated ways to attack business computers, access confidential information and steal money. Often, the financial rewards are considerable . . . while the cost of launching an attack can be very low. This brings a rate of return that many other types of criminal can only dream of! So, the volume of cybercrime continues to increase.
7
Smaller Businesses – Bigger Pressures In many ways, smaller businesses face virtually all of the general, day-to-day issues that large businesses have to tackle . . . plus a whole host of additional challenges. All businesses have to keep finding ways to deal with changing market conditions and to respond to competitors’ activities, while also staying one step ahead of changes in their customers’ needs and preferences. However, at the same time as coping with all of these factors, most growing businesses also have to deal with a wide range of other issues that keep on arising as a result of the company’s ongoing growth. These additional challenges can include: ✓ Finding ways to cope with an increasing number of customers – and larger revenues. ✓ Regularly recruiting and training additional staff to handle increasing demands. ✓ Finding larger premises and organising the move, without disrupting day-to-day operations. ✓ Securing additional funding to grow the business. ✓ Adding new office locations. ✓ Finding time to consider the things large businesses take in their stride – such as how to keep customers’ information secure. All of these tasks are necessary to make sure the business keeps running efficiently and is ready for the next steps in its growth.
8
That’s not my job! Then there’s the range of responsibilities that founders and employees have to cover. From the outset, as just a one man (or woman) band or a small group of highly motivated individuals, working in a smaller business usually means ‘all hands to the pumps’ – with everyone having to take care of a much wider variety of tasks than they may have experienced in their previous employment. Usually, there are no HR teams, legal departments or specialist IT personnel to fall back on. If your business is going to succeed, everyone has to achieve more than just being a jack of all trades. You and your colleagues all know that you have to master everything that goes into running the business. Yes, specialist skills can be hired in by the hour, but that costs precious cash. Every dollar, pound, Euro or yen spent on non-core business activities limits investment in other vital areas and can even slow down your business growth.
What’s the big deal with IT? For most businesses, the idea of trying to function without even basic IT – such as laptops – is almost unthinkable. Even if IT is just a means to an end, it’s a key enabling tool that helps to boost business efficiency and improve interaction with customers, employees and suppliers. However, IT has to serve the business – and that means it needs to be easy to set up and manage. Similarly, any security software that protects the business’s computers and confidential information has to be easy to use.
9
It’s a jungle out there . . . so go armed! Businesses that regard computing as a necessary evil are likely to have a very similar view when it comes to keeping the information stored on those computers secure. That view is totally understandable if IT isn’t your strong point. However, the sad fact is that the security of business information has never been more important – for all sizes of business. With today’s high levels of threats – and cybercriminals regularly using Internet connections to hack into business computers – no company can afford to ignore security. Even if your business only implements a few simple protective measures, those precautions could be enough to save you a lot of heartache and a significant amount of money. It’s perfectly okay to regard IT security and data security as necessary evils . . . provided you place strong emphasis on the word ‘necessary’! Then the ‘evil’ part is just a reminder of the sort of cybercriminals that launch attacks against innocent businesses. A retailer wouldn’t dream of leaving its cash register wide open for any passing felon to grab a handful of money. Similarly, any business that uses computers, mobile devices or the Internet needs to make sure their IT isn’t wide open to attack. It’s simply too easy to become the unwitting victim of a cybercriminal who attacks the hidden security vulnerabilities in your laptops, tablets and smartphones. So you need to do all you can to ensure cybercriminals can’t steal sensitive information or steal from your online bank accounts.
10 A little security can go a long way The difference between doing nothing and undertaking some simple security measures can be massive. At first, if you only implement a few basic security measures those could be enough to ensure the average cybercriminal finds it easier to pick on some other business . . . and leave your business alone. In the graph, you see how a little investment in security can dramatically reduce the likelihood of malware launching a successful attack.
11
Security shouldn’t slow your business Time is money! There, we’ve said it. Of course it’s a cliché, but it’s true. Any non-core activity that takes you away from your business’s main revenue-generating activities costs you time, opportunities and money. Being nimble and focused is what gave you the opportunity to establish your business in the first place. So the last thing you need is IT security that gets in the way of your entrepreneurial spirit – no matter how important IT security may be. Anything that slows you down could mean you’re spending less time on the key activities that give you an edge over your competitors and help to propel your business forward. With the wrong approach to information security and unsuitable protection technologies, you could find your business hampered by the very things that are meant to be helping to defend it.
The low-hanging fruit for cybercriminals With concerns about complexity and performance, it’s no wonder so many smaller businesses turn a blind eye to IT security. However, even though start-ups and small businesses could just about get away with that approach a few years ago, today’s levels of cybercrime mean this is a very ill-advised strategy. Add in the fact that some cybercriminals regard small businesses as the low-hanging fruit that’s easier to attack than larger organisations, and it’s clear that effective IT security is no longer optional.
12 The good news is that your business can do many simple things to help protect sensitive information. Furthermore, some of the latest security software products have been specifically developed to help time-poor, smaller companies protect their systems and information. These security products mean you don’t have to compromise on protection or waste time on trying to run complex security software that’s difficult to manage. Even massive organisations may not have the necessary scale and resources to recover from a damaging security breach. So smaller companies may find it impossible to carry on trading after a security incident.
False Sense of Security? Some businesses lull themselves into a false sense of security, with the mistaken belief that the cybercriminals are only after the bigger fish. ‘Yes, that’s it,’ says the business owner. ‘Who’d want to attack a small company like mine, when bigger, richer targets are out there? We’re simply not on any cybercriminal’s radar.’ Well, it’s true that radar isn’t going to help a cybercriminal to identify their next business victim. However, cybercriminals do use all sorts of other scanning tools to find vulnerable companies – and they can do it all via the Internet. With these clever scanning tools, the cybercriminals can identify businesses that have security gaps within their computers. In virtually no time, the scanners can find the cybercriminals’ next business victim – and point out how the business is vulnerable to attack.
13 This may sound like some elaborate science fiction plot, but it’s true. Every day, these and other sophisticated methods are used to attack small businesses. On an average day, Kaspersky Lab identifies approximately 12,000 malware (malicious software) attacks – and that number keeps growing.
Smaller businesses can be easier targets for crime Generally, most cybercriminals are looking to maximise the financial returns from their illegal activities and minimise the effort and time taken to generate those returns. So, although tapping into a multinational’s finances could be very lucrative, it’s a fair bet that the cybercriminal would have to work quite hard to overcome the sophisticated security defences that such a company is likely to have in place. As an alternative, the cybercriminal could choose to target a bunch of small companies. Yes, the proceeds from each individual attack may be much less valuable but, if the smaller companies have poor or non-existent defences, it could be very easy money for the cybercriminal. Launching attacks on ten or twenty small companies could generate as much money as a single attack on one larger business – and be much easier to achieve. Because many smaller businesses can find it difficult to set aside any time to think about security, some cybercriminals deliberately focus on the easy pickings from smaller businesses. Don’t let your business be among their next batch of victims.
14
Cybercriminals can use smaller businesses as a stepping stone Cybercriminals recognise that smaller businesses are often suppliers to large companies – and that’s another reason for attacks against smaller businesses. An attack on such a business can help the cybercriminal to steal information that may prove to be useful in enabling a subsequent attack against a large corporation. The cybercriminal may deliberately pick on the business because of its relationships with larger corporations. On the other hand, an opportunist cybercriminal may simply spot the potential while they’re stealing customer information from the smaller business. Needless to say, if the subsequent attack on the large organisation is successful and the small business’s role in the attack becomes apparent, that can result in severe difficulties for the small business. Even though the smaller business was innocent of any direct wrongdoing, its inadequate security allowed its own systems to be infiltrated – and that helped to enable an attack against the corporate-sized client. If the small business’s role in the compromise becomes known, this is likely to have repercussions – such as legal action, compensation, fines, the loss of customers and damage to the small business’s reputation.
15 Losing out . . . at both ends of the business Imagine the case of a small company that buys raw materials from a large corporate supplier and then sells its finished products to a multinational business. In the interests of efficiency, the supplier may expect its customers – including the small company – to interact with and place orders via its own online systems. Similarly, the multinational customer may expect the small company to submit electronic invoices directly into its own internal accounts systems. This means the small company has direct electronic links with its corporate supplier’s computer systems and its multinational customer’s computer systems. If a cybercriminal infiltrates the small company’s computers, the cybercriminal could gather information that helps it to attack both the company’s supplier and customer. Even if the subsequent attacks are unsuccessful, the small company could have a lot of explaining to do . . . and may be blocked from electronically interacting with its suppliers and customers. That could adversely affect the small company’s efficiency and profit margins – especially if its competitors are benefiting from closer interaction with the same suppliers and customers.
16
Chapter 2
Working Out What Your Business Needs In This Chapter ▶ Knowing your legal and regulatory obligations ▶ Assessing what’s expected in your industry ▶ Realising today’s threats are more dangerous
than ever ▶ Considering how security needs can vary
I
n this chapter, we take a closer look at how some security requirements can be similar for different businesses . . . and also how they can vary.
Some Security Needs Apply to All Sizes of Business Many businesses fall into the trap of thinking that they have no information that could be of any value to a cybercriminal. Furthermore, the founder may believe that an information loss incident wouldn’t cause any major harm to their company. Unfortunately, for any size of business, these beliefs are rarely true.
18 Even a simple database of customer contact details has value to a wide range of different people – from cybercriminals looking to use those details as part of identity theft scams, through to competitors trying to steal your clients.
Legal obligations to secure information In many countries, businesses are subject to strict regulations on how they should handle information about individuals. Failure to comply can result in large fines for the business. In some cases, the business’s directors or owners can be subject to prosecution – with some offences even carrying prison sentences. For some nations, the legislation and compliance regulations about how personally identifiable information is processed and stored may place more onerous obligations on larger organisations. However, even if the relevant authorities demand that large corporations implement much more sophisticated security measures, the law still expects smaller businesses to act responsibly and to take reasonable steps to secure all relevant information. If a business fails to adopt measures that could reasonably be expected to be undertaken by that size and type of company, the business could find itself in serious trouble.
Even greater security expectations Many jurisdictions compel all companies to exercise a higher degree of caution in how they handle any particularly sensitive material or any other information that could cause significant harm to a third party if that data was leaked.
19 Furthermore, specific industries and market sectors may be subject to much more stringent information security requirements than other industries. For example, companies operating in the healthcare and legal sectors are likely to have to take greater care over the information that they use, store and process. However, even if none of these ‘extended expectations’ apply to your business, the loss of confidential information can have dire consequences.
A confidentiality cat-astrophe? Could there be a less IT-intensive business than running a cat boarding kennel or cattery? Would IT security really be necessary for such an operation? Well, yes! Just consider the information the business holds on the names and addresses of its clients – plus the business’s electronic diary of when the furry felines will be staying at the facility. What if that information fell into the wrong hands? It’s fairly obvious that no one’s going to be home to look after little Tiddles and Tiger – and that’s valuable information for burglars. With that inside knowledge about when the home owner is going to be away – and how long they’re away for – burglars could enjoy the luxury of being able to take their time removing valuables from the cat owner’s property.
20
Different Levels of Understanding and Resources Despite the similarities in some of the security obligations that are placed on all sizes of business, there are also some clear variations in how different size organisations view and tackle security issues.
Things ain’t what they used to be The sophistication and relentless nature of modern IT security attacks means today’s threats are several orders of magnitude more dangerous than the threats of just a few years ago. Failure to realise this can leave businesses vulnerable. When it comes to information security, large companies can afford to employ full-time IT security experts. However, smaller business owners don’t have that luxury.
Is size important? Availability of resources is obviously a factor that differentiates smaller businesses from larger corporations. Large businesses have the in-house experts to make informed decisions about which defence technologies to invest in. They also have the necessary finances and support resources to roll out their chosen solution. Furthermore, their in-house team is experienced in how to develop and constantly refine the company’s security plans and security policies, so that the business remains one step ahead of the cybercriminals and no gaping holes are left in the organisation’s defences.
21 By contrast, smaller businesses may lack any in-house security expertise. In addition, for a growing business, a host of competing demands clamours for any cash that’s going spare (hmm, spare cash is an interesting concept, but not one the authors can recall ever experiencing). So computer security has to take its place in the queue and fully justify the necessary expenditure.
Understanding Different Security Requirements Even though there’s a lot of common ground, different types of business are likely to have some differences in their IT security requirements . . . and can also have differing views on what level of security is necessary. In addition, as a business grows, its information security needs can change. Do you recognise any of the following business profiles and their views on IT security?
The start-up business At the age of 36, ‘Start-up Serge’ is leaving a large, city-based operation and setting up a new firm of lawyers with two of his colleagues. How the business plans to use IT: ✓ Serge and his colleagues are heavily dependent on the laptops, tablets and smartphones that give them the flexibility to work almost anywhere. ✓ The team will make heavy use of email to communicate with clients and will use its computers for generating letters, proposals and notes.
22 The business’s attitude to security: ✓ The highly confidential nature of the client information that will be handled – including financial data – means the protection of all sensitive information is vitally important. ✓ Any information leak or loss would be hugely embarrassing and could have big repercussions in terms of Serge’s personal reputation and the firm’s reputation. It could even result in Serge being sued. ✓ Safeguarding the business is vitally important and Serge understands that standard antivirus software doesn’t offer adequate protection. Serge says: ‘We’ve got to buy new IT kit and set it all up. At the same time, we need to be able to start generating revenues as soon as possible – so the security software that we choose has to provide the right level of protection, while also being easy to set up, manage and maintain. Furthermore, the security software supplier has to provide the support we need, when we need it – so we can concentrate on serving our clients. Then, as our business grows, our security solution must be capable of adapting to meet new demands.’
The expanding business ‘Ambitious Ahmed’ has achieved a lot in his 48 years. He’s the owner of a chain of men’s tailors that employs eighteen people – and the business is expanding. How the business plans to use IT: ✓ As well as opening another new shop, the business is venturing into online retailing – selling suits via its website.
23 ✓ With the expansion, the business has to buy a lot more technology – including more Point of Sale (PoS) terminals, more PCs, Wi-Fi networking routers and a new server. ✓ Although Ahmed isn’t focused on IT, he finds his new smartphone useful for accessing his emails. The business’s attitude to security: ✓ The business uses an antivirus software product that Ahmed’s ‘technology-savvy’ nephew purchased from the high street PC store. However, Ahmed knows this product isn’t enough to keep his business’s information safe – especially as the business is expanding so rapidly. Ahmed would hate to see his local competitor getting hold of Ahmed’s regular client list and pricing model. ✓ Owing to Payment Card Industry (PCI) Data Security Standard compliance requirements, Ahmed knows the business needs to deploy security software and keep it up-to-date in order to manage vulnerabilities. Ahmed says: ‘Tailoring – and not IT – is my passion. However, it’s the right time to invest in some more professional IT security software – if only for my own peace of mind. We need IT security that gives us the protection we need, but is easy to install and manage. I’m looking for a package that gets on with its job and leaves me to get on with mine. Since I took over the business from my father, we’ve achieved impressive growth. We’re about to open our fifth shop and we’re building our web-based sales – so we need an IT security solution that can grow with us.’
24
The business that’s switching its security Dr ‘Irritated Ivana’, 40, is a Senior Partner in a local medical practice that includes two other doctors, a physiotherapist and three part-time receptionist / administration staff. How the business plans to use IT: ✓ Each doctor has a desktop PC and a PC is in the room that the physiotherapist uses. Two other PCs are at the reception desk and one more is in the administration office. ✓ The Internet and the PCs have changed the way the practice works – making it far easier to keep track of patient records, find out about new medicines and procedures and generally keep up to date. The practice’s attitude to security: ✓ Given the practice’s reliance on IT and the sensitive nature of the files and information that are handled, Dr Ivana has never hesitated to buy IT security software. ✓ However, the current security software is irritating all of the staff. The PCs take ages to start up – and then, when the security software scans for malware, the PCs seem to grind to a halt. Dr Ivana says: ‘Patient confidentiality is of paramount importance. That’s why we never hesitated to install security software. However, our current software has had a noticeable and very negative effect on the performance of our PCs. With the licence up for renewal, now’s the perfect time to move to a security software product that doesn’t affect the performance
25 of our computers, so we can be more efficient in how we deal with patients. We just want something that secures highly sensitive information without getting in the way of our efforts to deliver the best in patient care.’
The business that’s had its fingers burnt ‘Suffering Suzie’ is the 32-year-old owner of a successful marketing agency that employs 22 people. Suzie’s business has grown rapidly; her sales and marketing skills have ensured that she’s easily won new clients. How the business plans to use IT: ✓ Suzie’s core team is based in the office. However, many of her account managers visit client sites. ✓ Although her design team runs Apple Macs, the rest of the business uses a combination of desktop and laptop PCs, plus smartphones. ✓ Many of the team also use tablets. Because the tablets are owned by the staff, they’re not official work kit. However, Suzie’s happy for the staff to use the devices – especially as she thinks it makes the agency look cutting-edge. The business’s attitude to security: ✓ Unfortunately, the agency recently suffered a major security incident. After a meeting with a client, one of Suzie’s account directors took their laptop to a bar and the laptop was stolen. The laptop had some very sensitive files on it – including confidential plans for a new product launch that would give the client a real edge in the market.
26 ✓ Suzie had to inform the client, who was extremely angry. The incident has been escalated to the client’s legal team. It also looks like the client is going to sever the relationship with the agency. So Suzie’s agency is about to lose a significant piece of business . . . and there could also be legal implications. Suzie says: ‘We’re still adding up the cost of that security incident. Now my first priority is to make sure there’s absolutely no chance of that sort of security headache happening again. We need to get a comprehensive protection solution in place as soon as possible. However, we also need to make sure it’s simple to manage – so that one of our designers, who has an amazing talent for all things technical, can manage and maintain it.’
The business that keeps its fingers crossed ‘Risky Raul’ is 53 and owns a five-person accountancy firm. It’s an established business that has never taken security threats seriously. Raul has always hoped that ‘it won’t happen to me’. How the business plans to use IT: ✓ Raul and two other accountancy advisors spend a lot of time with clients. Using laptops gives the advisors the flexibility to work offsite. ✓ The business’s two administration staff use desktop PCs. ✓ The business also has a file server that runs its customer relationship management (CRM) software.
27 The business’s attitude to security: ✓ Raul recently read an article, in a trade magazine, about a rival firm that suffered a very serious IT security breach. An administrator had downloaded a file attachment which contained some malware that accessed confidential client files. The security breach was only discovered when a client found their own confidential data being sold on the Internet. ✓ The news article made Raul extremely nervous about his own firm’s IT security. Raul now recognises that the free security software that the firm has been using is probably inadequate. Raul says: ‘The industry has changed a lot in recent years. There’s a lot more regulation now. At the same time, the nature of the security threats that are lying in wait means we have to implement much more robust IT security.’
Diverse needs call for diverse solutions Even though all of the businesses we reference in this chapter are in different markets and each has different expectations for its IT, they all have one thing in common: the need to protect precious information. However, with each business having different levels of computer systems and IT expertise, they have different security needs. The example companies are obviously based on generalisations about how a few different types of business can have varying IT security needs. However, just as the variations in business models and sizes of business are virtually endless, so too are the variations in IT requirements.
28 It’s perfectly possible for a small company – with, say, three to five people – to run massively compute-intensive processes. In such cases, the business is likely to have a much more extensive and diverse IT network than other businesses of a similar size. So this type of business requires a security solution that can cover all of the complexities of their IT environment – including Internet gateways, proxy servers and virtual systems.
Chapter 3
Discovering the Truth About Security Threats In This Chapter ▶ Understanding how IT complexity adds new burdens ▶ Knowing why antivirus protection isn’t enough ▶ Learning about the online threats ▶ Protecting your online banking transactions
I
n this chapter, we consider how the growing complexity of typical business computing solutions and the sophistication of computer viruses, malware and cybercrime attacks are making life that much more difficult for all businesses.
IT’s All Got More Complex Only a few years ago, any business leader could simply reach out and touch every IT device that needed to be protected within their organisation. It was also simple to think about drawing an imaginary ring around the business’s computing network. If you wrapped a firewall around everything within that ring – and made
30 sure you had suitable security software running on all computers – you were untouchable. But that was back in the days of limited mobility and not being able to access business information whenever you were away from the office. It was also long before business became so heavily reliant on IT.
Business can’t do without IT Today, could you even consider running a company without all those vital business applications and without mobile, ‘anywhere access’ to essential business information? Well, no . . . because your competitors would be laughing all the way to the bank. However, these technological advances have had consequences. The convenience of anywhere access has greatly increased IT complexity. If you and your employees are going to be accessing information by using laptops, smartphones and tablets, where’s that imaginary ring within which you have to apply your security measures?
BYOD adds another layer of complexity To make things even more complex, Bring Your Own Device (BYOD) initiatives – that let employees use their own devices to access business information and systems – are adding to the complexity. With BYOD, your security now has to cope with ‘anywhere – from any device – access’. Businesses have been quick to recognise the potential cost and operational benefits that a BYOD initiative can offer. However, BYOD also means you’re faced with applying security across an almost limitless range of mobile devices – including a vast array of Android,
31 iPhone, BlackBerry, Symbian, Windows Mobile and Windows Phone devices that may not even belong to the business. Fortunately, some security suppliers have recognised that increasingly complex IT adds to security nightmares. So they’ve kindly developed innovative new security solutions that greatly simplify the task of securing complex IT – including mobile devices and BYOD. For more information on mobile security issues and solutions, Mobile Security & BYOD For Dummies is available at all good booksellers. Well, actually, it’s not in any shops, but you can get a free copy at www.kaspersky.com/ business.
Antivirus or anti-malware? Some businesses fall into the trap of thinking viruses and malware are the same thing – and that leads them to believe there’s no difference between antivirus and anti-malware products. However, that’s simply not true, and in fact it’s a mistake that could prove to be costly. Most people are familiar with the types of computer viruses that can spread from computer to computer. However, malware – which is short for malicious software – is the name given to a much wider range of hostile software. Malware includes computer viruses, worms, Trojan horses, ransomware, keyloggers, spyware and many other threats. So a software product that offers anti-malware capabilities protects your computers and information from much more than just viruses.
32
Today’s Threats Are Increasingly Dangerous Virtually everyone has some level of understanding of computer viruses. Most people have been either subject to a nasty virus infection (we mean on your PC – we’re not getting personal) or know someone who’s suffered such an attack in the past. However, much of this experience – and the anecdotes that friends and family recall – may date from the era of cyber vandalism, when malware development was for fun. Today, cybercriminals use malware for financial gain.
The low-risk years are over Years ago, cyber vandals were often students and school children looking to show off their computing and hacking skills. They created and distributed viruses that caused a level of disruption on infected machines. Perhaps the virus would delete a few files or make the victim’s computer ‘hang up’. Even though it was largely a matter of mischief-making on the part of the virus developers, their programs could cause some inconvenience. However, these viruses rarely caused significant ongoing issues for businesses and they didn’t try to steal funds from individuals’ or businesses’ bank accounts. In addition, basic antivirus software was often enough to repel most of these attacks.
33
Simple vandalism makes way for serious cybercrime In recent years, young computer geeks have turned their attention to online games that give them an opportunity to show off their prowess. At the same time – and more importantly – with the relentless rise in the use of Internet-based business processes and online financial transactions, we’re all a lot more dependent on the Internet and e-commerce. This has attracted the attention of criminals. The age of relatively innocent cyber vandalism has passed and a much more menacing presence lurks on the Internet. Cybercriminals have been quick to recognise the opportunities to develop malware and Internet-based scams that do much more harm than old-fashioned viruses. Instead, these new attacks are focused on stealing information, money and anything else of value to the cybercriminal. Make no mistake, these are no mere amateurs. Cybercriminals with considerable technical skills are constantly developing new methods of attacking businesses. In most cases, they’re motivated by financial gain – either directly stealing money from a business’s bank account, stealing sensitive business data to sell on the black market, or extorting payments from the company through other means. In addition, by ‘harvesting’ personal information from a company’s laptops, servers and mobile devices, cybercriminals can perform identity theft scams and steal money from individuals associated with the business.
34 Our dependence on computers has also made it easier for attackers to disrupt business systems, as a form of social or political protest (so-called ‘hacktivism’).
Know the Enemy and Know Their Methods Malware and IT security threats can have a damaging effect on any business’s bottom line. For smaller businesses, the results can be terminal. While the following isn’t an exhaustive list of all types of threats, this section gives an indication of some of the security risks that businesses have to tackle . . .
Viruses, worms and Trojans Computer viruses and worms are malicious programs that can self-replicate on computers without the victim being aware that their device has become infected. Trojans perform malicious actions that haven’t been authorised by the user. Trojans are unable to selfreplicate, but the connectivity provided by the Internet has made it easy for cybercriminals to spread them. If these malicious programs attack your network, they can delete, modify or block access to data, disrupt the performance of your computers and steal confidential information.
Backdoor Trojans Backdoors are used by cybercriminals for remotely controlling machines that they’ve infected. Typically, compromised computers become part of a malicious network – known as a botnet – that can be used for a wide variety of cybercriminal purposes.
35
Keyloggers Keyloggers are malicious programs that record the keys that you press on your computer keyboard. Cybercriminals use keyloggers to capture confidential data – including passwords, bank account numbers and access codes, credit card details and more. Keyloggers often work in tandem with backdoor Trojans.
Spam At its least harmful, spam is simply an electronic version of junk mail. However, spam can be very dangerous if it’s used as part of a phishing campaign or if it includes links to infected websites that download viruses, worms or Trojans onto the victim’s computer.
Phishing Phishing is a sophisticated form of malicious attack, whereby cybercriminals create a fake version of a genuine website such as an online banking service or a social networking site. When the victim visits the fake site, the site uses social engineering methods in order to obtain valuable information from the victim. Phishing is often used for identity theft scams and to steal money from bank accounts and credit cards.
Ransomware Ransomware Trojans are designed to extort money. Typically, the Trojan either encrypts data on the victim’s computer hard drive – so the victim can’t access their data – or totally blocks all access to the computer. The ransomware Trojan then demands payment for undoing these changes.
36 Ransomware Trojan infections can spread via phishing emails or can occur if a user simply visits a website that contains a malicious program. Because the infected websites can include legitimate sites that have been infiltrated by cybercriminals, the risks of picking up a ransomware infection are by no means limited to visits to suspicious websites.
Distributed Denial of Service Attacks (DDoS) Cybercriminals use Distributed Denial of Service Attacks in order to make a computer or network unavailable for its intended use. The targets for these attacks can vary. However, a business’s website is often the prime focus for an attack. With most businesses depending on their website to attract and interact with customers, anything that makes the site malfunction, run slowly or fail to let customers access it can be very damaging to the business. There are many different forms of DDoS attack. For example, cybercriminals can infect vast quantities of innocent users’ computers and then use them to bombard the target business’s website with a massive volume of useless traffic. This can overwhelm the computers that run the victim business’s website and cause the site to run slowly or totally fail.
37
What’s bugging business? Virtually every software application and operating system that your business runs is likely to contain ‘bugs’. Often these errors in the computer code may not cause any direct damage. However, some create vulnerabilities that cybercriminals can exploit in order to gain unauthorised access to your computers. These vulnerabilities act a little like leaving your office door open – except the cybercriminals don’t just march into your reception area, they get right into the heart of your computer. The use of such vulnerabilities to install malware is now widespread, so it’s important to keep applications updated or patched (don’t ignore those software update reminders and postpone them as a nuisance). Some security software solutions include ‘vulnerability scanning’ features – to identify any application or operating system vulnerabilities on your business’s IT network – and can help you to apply ‘patches’ that fix the vulnerabilities so cybercriminals can’t exploit them.
Understanding Other Security Risks In addition to the specific types of attack we explain in the previous section, your business needs to guard against other dangers.
38
Risks from using public Wi-Fi With hotels, airports and restaurants offering customers free access to a public Wi-Fi connection, it’s easy for you to check email and access business information when you’re out and about. However, it’s also very easy for cybercriminals to spy on public Wi-Fi networks and capture information that you send or access. This could mean cybercriminals gain direct access to your business email accounts, your business IT network and your passwords for financial transactions.
Online banking and the need for additional security Online banking has become a critically important facility for so many businesses. It’s convenient and time-saving. However, whenever you’re conducting any online financial transactions, you could be at your most vulnerable. Cybercriminals want to monitor their victims’ computers and mobile devices in order to work out when the victim is visiting a banking website or online payment service. Then special keylogger programs can capture the information you enter. That means the cybercriminal can stealthily steal your password – so they can access your account and drain it of funds, without you knowing. Thankfully, some security software products include technologies that provide additional layers of protection when you’re conducting online financial transactions.
39
Spear phishing Spear phishing is another sophisticated form of attack. The cybercriminal seeks to capture personal information – perhaps by spying on a public Wi-Fi connection. Later, the cybercriminal uses that personal information to add a veneer of credibility to a phishing email that targets a business. For example, if the cybercriminal manages to access one of your employee’s entries on a social networking site and learns some details about the employee’s recent holiday, the cybercriminal can later use that information in a phishing email. When the employee receives an email from someone pretending to be a colleague – and that email mentions some details about the employee’s holiday – it’s more likely to look like a genuine email. And, if the message asks the employee to click and confirm access to the business network, the cybercriminal can capture the necessary access passwords.
Lost laptops We’ve all read about those unfortunate individuals who’ve left their laptops in taxis, trains or restaurants. The potential for highly sensitive business information falling into the wrong hands is alarming. When this happens, it can severely damage an organisation’s business reputation and result in heavy fines. One remedy is to choose a security solution that encrypts your business information so, even if a laptop is lost or stolen, it’s virtually impossible for cybercriminals to access the information on the laptop’s hard drive.
40 Understanding encryption Encryption is a particularly cunning way of beating cybercriminals at their own game. Just like spies in the latest cinema release encode messages so that only their intended recipients can understand them, encryption enables you to encode your business’s sensitive information – so your information can’t be decoded without the necessary decryption key. This means that if any of your business’s confidential information is accessed by cybercriminals, they won’t be able to see it in its readable form – unless they have your secret decryption key. In the event that one of your staff loses their laptop or mislays a USB memory stick full of confidential information, if the data on the laptop or memory stick has already been encrypted, you can avoid the embarrassment of information leakage.
Mobile threats Individuals and businesses can both fall into the trap of thinking their smartphones and iPhones are just phones. They aren’t: they’re powerful computers that can store a lot of confidential business information – so loss or theft of a mobile device can cause serious security breaches. If a lost or stolen smartphone isn’t protected using a PIN (or, even better, a longer passcode), whoever accesses it can simply login to any online account used on the device.
41 However, some security solutions include remotely operated security features – such as giving you the ability to contact your missing phone and ‘wipe’ all data from it. If your chosen security solution also includes a data encryption capability, this can add a further layer of protection. Even if a criminal finds the phone before you’ve realised it’s missing – and you’ve not yet had a chance to wipe its data – the fact that the information on the phone has been encrypted ensures the criminal can’t read that data. Furthermore, because today’s smartphones and tablets are really computers, they’re vulnerable to a growing volume of malware and attacks that have become common on desktops and laptops – including viruses, worms, Trojans, spam and phishing. So it’s essential to use security software to protect mobile devices (to find out more, get your free copy of Mobile Security & BYOD For Dummies from www.kaspersky.com/business).
42
Chapter 4
Planning for Better Information Security In This Chapter ▶ Benefiting from a simple assessment of your
business risks ▶ Improving your staff’s awareness of security issues ▶ Understanding how cloud computing can affect
security ▶ Assessing cloud computing service providers
W
hen it comes to IT security, some people think: ‘It’s all too overwhelming. I’m going to cross my fingers and hope for the best.’ We wish them good luck with that approach. However, when their customers and business partners start suing the business as a result of a data loss incident, the company hasn’t really given its defence attorney much to work with. So, in this chapter, we look at some simple security measures that you can introduce without spending anything on software or hardware – and we consider how cloud computing can affect a business’s security strategy.
44
Risky Business? Conducting a risk assessment might sound like an onerous task that’s best undertaken by a team of boffins with white coats and clipboards. However, if you’re keen to improve information security, in this section we share some simple concepts that form the foundation of a worthwhile assessment of the risks that your business faces. Start by asking yourself a few basic questions: ✓ Where is my business’s information stored? ✓ What is the value of that information – to my business and to a potential attacker? • What would the consequences be for my business if any confidential information fell into the wrong hands? • How would a leakage of information affect my business’s relationships with customers, employees and business partners? • What would be the likely cost – in terms of financial loss / penalties and damaged business reputation? ✓ What is my business doing to protect confidential information? ✓ Are my business’s information security provisions adequate? • How do those security provisions compare with the expected norm within my market sector and for my size of business? (Don’t forget, as your business grows, you’ll probably need to implement higher levels of information security.)
45 • Would a court of law agree that my business’s security is sufficient? (An honest answer to this question can flush out any business that’s trying to sweep the whole issue under the carpet by kidding itself that inadequate security is okay!) ✓ What’s the probability of my business suffering a leakage of confidential information? (Remember, this could result from a simple event such as the loss of a laptop or smartphone. No matter how diligent you are, how careful are your employees?) Your answers will be useful in helping you to decide on how to go about improving information security.
Educating Employees in the Art of Security When it comes to protecting valuable information, ‘forewarned is forearmed’ (‘four-armed’ would also help you get more out of your working day – but, unless your business is in the bionics industry, that’s never going to happen!). So, making sure that you and your employees are aware of the wide range of security risks – and how to avoid them – is essential. It’s surprising how many companies fail to devote enough effort to spreading the news about security best practice among their staff – even though educating employees on security risks and how to avoid them can be one of the most cost-effective ways of making life more difficult for cybercriminals. Getting employees on side in the battle for better security needn’t be difficult:
46 ✓ Consider all of the potential malware and cybercrime risks that could affect your business and decide on how your employees can help to avoid these risks. Notwithstanding the sophisticated nature of today’s threats, many attacks start by simply tricking someone into doing something that jeopardises the business’s security, such as clicking on a link in a spear phishing email. ✓ Draw up and share a security policy that clearly defines how you expect your staff to behave with regard to maintaining security and eliminating unnecessary risks. ✓ Conduct staff awareness sessions on a regular basis. Aim to raise awareness of key issues, such as: • The need to use different passwords for each application and account. • The dangers of public Wi-Fi and how to avoid them. • How to spot spear phishing attempts. • The security consequences of losing a mobile device. ✓ Enforce your company’s security policy – for example, ensuring everyone uses strong passwords to protect access to business information, bank accounts and more (see the nearby sidebar ‘What makes a password stronger?’ for tips on this). ✓ Revise your security policy as and when new risks emerge or you adopt new work processes. ✓ Run refresher courses to keep security issues ‘front of mind’ for your employees. ✓ Make sure new staff receive security awareness sessions as part of their induction.
47
What makes a password stronger? If one of your employees sets up a password based on an easily remembered word or a simple sequence of numbers, a cybercriminal may easily guess that password. Strong passwords use a combination of uppercase and lowercase letters, numbers and special symbols. They should be eight characters in length, at the very least. Make sure none of your employees use the same password for several different applications and / or web accounts. If a cybercriminal manages to discover an employee’s Facebook password, that shouldn’t be the very same password that gives the cybercriminal access to the business email system.
Up in the Clouds In recent years, a buzz has been growing around cloud computing. Businesses of every shape and size have been assessing the cloud’s potential to simplify the storage of information and cut operating costs. In many cases, small and medium size businesses have been at the forefront of the move to the cloud. Sometimes smaller organisations can be quicker than larger companies to adopt new business strategies. At the same time, smaller businesses are often more acutely aware of the need to focus on their core business activities. So anything that enables the business to subcontract non-core IT activities to a third party can be seen as beneficial.
48
Cloud or no cloud, your information is your responsibility If you’re considering using cloud computing, be aware that farming out the storage of your business information – and the delivery of some or all of your applications – doesn’t absolve your business of its security responsibilities. Nor does it automatically ensure that your confidential business information is totally protected. It’s still your company’s information, regardless of where it’s stored. So the protection of that information is still your responsibility – and that’s exactly how the law views your obligations. Also consider how you’re going to access that information on a day-to-day basis. Even if your cloud services supplier has impeccable credentials and rigorous security, you still have to make sure that every device your business uses to access the information has suitable security. You need to run a local security solution that protects every desktop, laptop, server and mobile device that your business uses.
An ongoing need to be ‘security aware’ With a cloud solution, you still need to make sure that you and your employees adhere to all the security best practices that you defined in your security policy. For example, strong passwords are still required to help prevent unauthorised access to your information and your employees need to continue to guard against losing mobile devices. You also need to assess all the potential information security risks and ensure your staff are aware of simple
49 security precautions. In fact, the only thing the cloud changes is that your information is stored off-site by a third-party supplier.
Caution over cloud contract catches The cloud computing market is reasonably established with some very capable cloud services providers. However, many cloud storage solutions have been developed for consumers. In some cases, security may have been little more than an afterthought and could be insufficient for business users. Consider the following questions when you’re selecting a supplier: ✓ Who will own my business information when it’s being stored in the cloud? ✓ What happens if the cloud services provider ceases to trade? • Will I still be able to access my information? • Will there be a period of downtime, while my information is being moved to another service provider for storage? • Will the original supplier still have copies of my information – and is there some way of ensuring these copies are deleted? ✓ How do I terminate my contract? • If I terminate, how do I transfer my business information? • Is there a simple and quick process for moving my stored information to a new supplier?
50 ✓ How robust are the computers that the supplier uses to store my information and the communications systems that the supplier uses to make my information accessible when I need it? • Does the supplier guarantee continuous accessibility for my information (so I can access important information when I need to and not be affected by the supplier constantly claiming their ‘system is down’)? • Does the supplier have suitable technology to ensure a swift recovery from a major failure or an attack on their computing systems – without it affecting the security and accessibility of my information? • What level of security does the supplier offer to protect my information against loss and unauthorised access? (Remembering that I also still need to run security software on all of the computers and mobile devices I use to access that information.) ✓ Where will my information be stored? • Will offshore storage cause any legal or compliance issues for my business? You’d never contemplate leaving your child in the care of someone that you hadn’t checked out and didn’t totally trust. Similarly, if your business is your ‘baby’, you need to invest a little time in assessing any potential cloud services provider in order to ensure your business’s confidential and sensitive information will be safe in their care.
51 There can be some very compelling arguments for moving information storage – and some software applications – to the cloud. However, you need to go into it with your eyes wide open. Even though cloud computing may help to simplify some aspects of your computing, the cloud can also add a new layer of complexity when it comes to selecting and managing your cloud services provider. Cloud computing doesn’t diminish your obligations to protect sensitive information. It’s your responsibility to protect confidential information – and it’s your responsibility if you choose a supplier that lets you down through inadequate security.
52
Chapter 5
Choosing Security Software to Suit Your Business In This Chapter ▶ Selecting the right security software supplier for you ▶ Ensuring you get the support you need ▶ Thinking about how your information security needs
may change ▶ Deciding on the ideal level of security software
S
o you’ve assessed the security risks for your business and educated your staff about the importance of information security (of course, if you’re the sum total of the staff, that could be a pretty short training course). Now’s the time to choose the security software solution that’s best placed to help protect your business.
Selecting the Right Supplier When you’re trying to choose from the various commercially available IT security software products, aim to select one that’s capable of adapting to how your needs may change when your business grows.
54
Show some support! Question suppliers about what level of support you’ll get if any issues arise when you’re operating the software or if your business suffers an attack or security breach. Being able to pick up the phone and have someone guide you through any tricky issues isn’t just convenient and reassuring – it could also save you a lot of time and help you to get your computers and business processes up and running again as rapidly as possible. On the other hand, if a supplier expects you to trawl through their online knowledgebase and find your own solution to the difficulty, that could take you away from important business activities for a significant amount of time. And isn’t it amazing how these types of incidents seem to save themselves up until you’re at your busiest – with a tight deadline to complete that detailed proposal for the business deal of a lifetime?! Try to select a supplier that offers local support . . . in your local language . . . in your local time zone.
Choosing a supportive security supplier is a major part of the selection process. While the market includes some excellent packaged security software products that provide a host of anti-malware and Internet security technologies, consider what could happen when your business outgrows the package that you purchased: ✓ Will your chosen supplier be able to offer other, more comprehensive packages that you can migrate to?
55 ✓ Does the product allow you to add extra features so you can protect new additions to your IT, such as virtualised servers, without changing your security product or having to get expert help to tackle any time-consuming integration issues? These questions may not appear vital now. However, when your business grows, they could help you to avoid the disruption and costs associated with having to change from one security supplier to another.
Achieving more – in less time For any business, it’s important to identify software solutions that are easy to use. After all, who wants to spend endless hours setting up and managing security software, when a superior solution can automate many security processes and leave you with more time for other business activities? Ease of use is vital – especially if you have no in-house IT security experts. However, even as your business grows and you potentially take on specialist IT and security staff, easy-to-use security software helps to boost their productivity.
Simplifying security management The user interface for most security software is often referred to as a management console. Rather like the various dials, lights and switches on the dashboard of a car, the console should give you an at-a-glance overview of how the product’s working, indicate any issues you need to be aware of and enable you to make adjustments. Sounds simple enough – but some software suppliers don’t make things as easy as they could be.
56 Some security software suppliers expect their customers to use several different management consoles in order to control the various different protection technologies within the supplier’s product package. Sometimes this is because the security supplier has acquired different technologies, as and when they’ve purchased other security companies. Whatever the reason, the need to use multiple consoles can be time-consuming and potentially very confusing for the operator. By contrast, some security solutions enable you to view, control and set policies for all of the package’s security technologies – via a single, unified management console. This can mean you only have to become familiar with one, intuitive-to-use interface that gives you a clear view of all of the supplier’s protection technologies that are running on your computing network. If you’re personally responsible for managing your business’s security software, this level of usability and manageability means you have more time for all those other much more important aspects of running your business. However, even if you’re using an external or internal IT expert to keep your security software running as it ought to, if you have one easy-to-use management console that can help to control costs and boost efficiency.
Reporting back to you Any security product that offers you the flexibility to generate a wide range of reports on the security status and security vulnerabilities across all of your IT – including mobile devices and BYOD – can help to give you far greater visibility of any issues.
57
High Flyer or Lifestyle Business: Identifying Your Security Needs Taking a little time out to have an honest look at your business and its aspirations is really worthwhile. It may be tempting to take a gung-ho, swashbuckling view and get carried away with imagining that one day your business will be a multinational capable of rivalling the largest conglomerates. However, not every owner wants that for their business. Of course, plenty of companies have grown from humble beginnings on the kitchen table or in the garage and gone on to become world beaters. However, if yours is a ‘lifestyle business’ – whereby your prime aim is to grow your business revenue to a level where it funds a good lifestyle for you and your family – there’s definitely no shame in that. Recognising that’s what you want can help you to make the optimum choices when it comes to investing in IT and security. The trick is working out: ✓ What type of business you have now. ✓ What your business could be like in a year’s time . . . and beyond. Armed with this information, you’ll be in a far better position to decide how your information security needs may change. Then you can focus on choosing a security software product that’s right for your business now, and has sufficient flexibility and scalability to adapt as your business needs change. Choosing the wrong security solution may not be catastrophic – but it could cost you time and money, either now or in the future.
58
From Home-User Security to Business-Level Protection Security software products are available for all sizes of business. The right solution for you depends on a number of things.
Home user security products If your business’s IT started as just your own personal laptop, the chances are you were already running one of the many security solutions aimed at home users. Some excellent consumer-focused packages combine anti-malware and innovative Internet security technologies. Some even offer additional layers of protection for online banking and other web-based financial transactions. For businesses with just a few employees, a home user product could be the ideal solution. However, with no shortage of consumer products on the market, you need to spend a little time assessing the features and functions that each product offers. A solution that only delivers antivirus protection isn’t really going to cut it in today’s high-threat environment. Typically, security software that’s aimed at the home user may be fine for businesses of one to four people – provided that the software licence allows commercial entities to use the software. However, most home user packages can be difficult to manage when five or more people use them within the business. These types of packages often don’t make it easy – or quick – to apply the same security set-up and options across all the laptops, desktops and mobile devices that the business uses.
59 If you’re aiming to grow your business significantly, you could soon end up with an extensive and complex IT infrastructure. So choosing a home user security product – that can’t grow with your business – could lead to a costly and disruptive move to a new solution at a critical stage in your company’s growth.
Free-of-charge antivirus software If you’re using free antivirus software you may want to carry on using that same security software when your business starts to expand. While this could be a reasonable solution to some security requirements, it’s worth considering exactly what the free software provides – and what it doesn’t. Does it offer all of the necessary technologies to defend against the latest security threats and the sophisticated new ways that cybercriminals try to steal valuable information? If it only includes antivirus capabilities and a few Internet security add-ons, it may not be suitable to protect against the full range of threats. Many free-of-charge software packages aren’t intended for use by businesses. The terms and conditions of the free licence often preclude use by any commercial organisation. So using some free software may be illegal. In other cases, the supplier of the free software will levy a charge when that software is used by a business.
60
Free puppy to a good home . . . What a great deal! You always wanted a faithful hound at your side – and this way you’ve avoided the fees that the dog breeders command. Okay, it’s a mongrel, but it’s your mongrel and, best of all, he was totally free. Free . . . apart from the work, the mess (sorry to bring that up, but it’s your dog – so you’re going to have to clean it up!) and all those expenses. Yes, you’d factored in the cost of the inoculations and the routine visits to the vet, but did you ever think he’d chew his way through so much of your fine furniture? In reality, not a lot in life is truly free. Much like your free puppy, free security software can have hidden costs. It might be that the free version of the software keeps flashing up adverts for third-party products or spends time trying to sell you the virtues of its ‘paid for’ premium version. Either way, whether it’s a set of banner adverts or the package’s efforts to upsell you to the upgraded version of the software, those distractions could affect the productivity of your employees. Even if the software does neither of these things, you may find that when you need any support from the software provider it could be expensive.
Security solutions for large businesses Having gained an understanding of the threats out there, you may decide to cut to the chase and buy the most comprehensive security solution on the market.
61 However, that can really backfire for a smaller business. Many businesses fail to realise that, for most software products, there’s an inverse relationship between functionality and ease of use. Products that include functions that only large-scale companies would need, may be much more difficult to configure and manage when compared with products that have been developed with smaller businesses in mind. So the smaller business that decides to simplify the selection process – by just choosing the most comprehensive software product – may be making life difficult until some point in the distant future . . . when the business eventually grows into its chosen security software! On the other hand, you also need to know that, as your business grows, your chosen security vendor can help you manage your new security needs – without having to rip out your existing product and start all over again. Security solutions for large businesses may include advanced technologies that protect complex environments. However, if your IT network is relatively simple – and is likely to stay that way – you could be paying for capabilities that you’ll never use. Furthermore, an overly complex security solution can be much more complex to run . . . at every stage of its life. From initial configuration, through to ongoing management, a corporate-level solution can take skills and time that a smaller business may not have to spare. Put simply, corporate-level solutions often assume that corporate-level resources and corporate-level IT expertise are available on tap.
62
Prosumer-level security Prosumer security? Yes, it’s one of those terms dreamt up by sharp-suited marketing types – but what does it actually mean? (By the way, if you’re running a marketing agency . . . just wanted to say how good you look in that suit!) At their most effective and useful, prosumer security solutions bridge the gap between user-friendly products that have been developed for home users and those corporate-level products that can deliver extra functionality but may be more complex to set up and manage. So prosumer products aim to combine the extended capabilities that businesses require, plus the ease of use that’s necessary when the business doesn’t have a team of in-house IT security experts. When security suppliers get this balance right, prosumer products offer an irresistible combination for many businesses. There’s a marked difference between a security product that’s been developed ‘from the ground up’ to satisfy the needs of smaller businesses versus a corporate-level product that’s simply been repackaged for the smaller business market. If a supplier is merely dressing up their corporate-level product and passing it off as a prosumer product, you could find yourself with security that’s too complex and too time-consuming to run.
63 Whatever the size of your business, make sure you choose a supplier that has invested time in considering the unique challenges that your scale of organisation faces, and has developed a software solution that’s optimised for businesses like yours.
When corporate meets prosumer Just to confuse the issue even further, not all large business security products are unsuitable for smaller businesses. It’s true that products that have been developed without a thought for the particular challenges that smaller businesses face are unlikely to be suitable for organisations that don’t have in-house IT security support resources. However, there’s also a class of business security product that’s based on a simple, modular architecture. Here the supplier may offer several tiers of software packages, with each tier providing a different combination of protection technologies. The lowest tier may offer basic-level protection that’s well suited to the simple IT networks that smaller companies operate. Then higher tiers add further protection technologies, with the supplier’s ultimate product tier delivering security across the most complex IT environments – including support for multiple operating systems and multiple mobile device platforms, tailored security for virtualised environments and special technologies for protecting Internet gateways, mail servers and more.
64 With these modular products, ambitious businesses can benefit from a security solution that readily scales as they grow – without the business having to manage the disruption of migrating from a relatively small security solution to a corporate-level solution. If it seems as if you have too many choices, remember that the range of different businesses is almost limitless – and they all have different security requirements. So choice is a good thing. Even if it takes a bit of time to get your head around the pros and cons of the various options, doing so means you’re more likely to be able to select the security solution that matches your requirements.
Chapter 6
Ten Questions to Help Identify How to Protect Your Business In This Chapter ▶ Evaluating what your business needs ▶ Assessing your legal obligations ▶ Deciding on your security policy
H
ere are ten simple questions to help you work out what’s necessary to protect your business against cybercrime, malware and other security risks: ✓ Have you assessed the potential security risks for your business and identified what information and computers need to be protected? ✓ In addition to protecting computers, do you also need to protect mobile devices and a BYOD programme? ✓ Are you aware of the legal and regulatory obligations that apply to your business with regard to the security of confidential information?
66 ✓ Have you defined some basic security policies that the business can use to keep information, computers and other devices secure? ✓ Have you set up a simple education programme to help improve awareness of security issues and motivate employees to avoid security breaches? ✓ Have you evaluated the commercially available security software products – based on ease of use, the levels of protection they deliver and their ability to accommodate changing needs? ✓ Does your chosen security software supplier offer the level of support you need – in your language and your time zone? ✓ Would you benefit from additional security features that provide a further layer of protection for online banking and financial transactions? ✓ If you’re adopting cloud computing, have you checked the suitability of your chosen cloud services provider’s security and contract terms? ✓ Have you chosen a security software product capable of protecting all of the computers and mobile devices that your business uses to access the information that’s stored in the cloud? The consequences of information security breaches and cybercriminal attacks can be devastating – so make sure your business IT systems are protected by a rigorous security software product. Turn the page for more details . . .
Security Your Business Can Depend On With Kaspersky Lab’s award-winning security technologies protecting your computers, business information and mobile devices, you can spend more time on your core business activities . . . and less time worrying about malware and cybercriminals.
Security Solutions for Growing Businesses Kaspersky Endpoint Security for Business offers a tailored product to meet your business’s unique needs. Simply choose the tier that suits your business requirements. As your business grows and your IT network becomes more complex, you can move to the next tier . . . all the way to our ultimate security solution – Kaspersky Total Security for Business. Kaspersky Total Security for Business combines comprehensive security and essential systems management functions to help you manage and protect all your endpoints:
✓ Windows PCs, Macs and Linux computers ✓ Physical and virtual machines ✓ Mobile devices – Android, iOS, Windows Phone, Windows Mobile, BlackBerry and Symbian
✓ File, mail, Internet and collaboration servers To find out more about Kaspersky Endpoint Security for Business and Kaspersky Total Security for Business, please visit www.kaspersky.com/business-security