<img src="http://www.djkeun1bal.com/72021.png" style="display:none;">
Call 248-412-8200
LEVEL UP: NEWS & VIEWS FROM RED LEVEL

You almost became the next Equifax. Did you even know? (Part 1 of 2)

Sep 18, 2017 5:04:16 PM / by Justin F. Coffey

cyberattacks.jpg
 
While Equifax made global headlines with their cyber breach, IBM's research has shown that small and mid-sized businesses (SMBs) are the targets of 62% of all cyber attacks. That equates to 4,000 SMBs daily¹ - or in more context, nearly 1 in 4 (24.33%) of U.S. SMBs (excluding nonemployers) annually.
While an attack on your organization may not create global headlines, the impact to your organization and its' employees could be devastating. If it extends to your customers' information and records, it could negatively impact them and shatter your reputation.

How devestating? I'll share a real-world example.
 
JC1.png

That's what I saw when I put my last name and the last 6 digits of my SSN in the website Equifax set up after the breach was publicly announced. I'm not overly surprised. I had a nearly 50% chance of being one of the 143,000,000 Americans impacted by the attack. Just a flip of the coin and now I'll likely have to worry about identity theft for years to come.


The difference between the Equifax breach and the largest known cyber breach in history (remember Yahoo between 2013-14 and the 1.5 billion user accounts?) is that this one is the holy grail. The whale of whales. It includes the key ingredients (e.g. Social Security numbers, birth dates, addresses, and in some cases, driver's license numbers) to perform identity theft on roughly half of the U.S. population. For an even unluckier 209,000 consumers, it also included credit card information and dispute documents with personally identifying information (PII) for another 182,000.


As I researched the breach and began drafting this blog post, I had a sobering moment and a quote hit me from one of my all-time favorite movies.

JC2.jpg

It's a powerful scene from what I think is one of the all-time great movies: The Shawshank Redemption. Now, I'm nowhere near Brooks' age in the movie but I've seen the rapid evolution of technology and the impact it has had on our way of life. Technology is only going to expand its presence in our lives (think IoT, wearables, cloud computing). As a result, cyber attacks will continue and only become more complex. The risk is real and the chance you will be attacked is very high.

The cost of cybercrime to the global economy is estimated to reach $8 trillion by 2022.

I think the biggest misconception among non-IT (security) professionals is what hackers do in a "hack". Don't let Hollywood fool you. It's rarely super introverted, pale-skinned men in a dark basement looking to wreak havoc. Modern hackers look like you and me, have families, and live all over the world. Their motive is becoming overwhelmingly financial. According to Ann Johnson, Microsoft's Vice President of Enterprise Product & Cybersecurity Groups, the cost of cybercrime to the global economy is estimated to reach $8 trillion by 2022.

What may also surprise you (thanks again to Hollywood) is that most hackers are opportunists waiting for your employees to make a mistake - not slamming their keyboard at 200 words per minutes typing sophisticated looking scripts and commands to "break into the system" in real-time. The most common examples include falling victim to a phishing email or opening an unsafe file attachment. It's also becoming a lot more common for hackers targeting specific organizations to be more proactive and use "social engineering" techniques to trick your employees into thinking the fake email or malicious attachment are genuine.

Once inside, they'll typically follow what's known as an advanced persistent threat, or APT, which is a set of stealthy and continuous computer hacking processes (see attack chain image below). The first attack starts with the goal of identifying interesting assets and learning more about the environment (e.g. users, devices, servers). They'll continue until they're able to obtain administrative credentials (shifting to the yellow area below) to continue the attack, take over other machines, and then run remote code on other machines using the stolen credentials.

JC3.png

When the attack moves to the red, the attackers typically have full control over the environment (or at least the high-value system they're looking to break into) and the goal shifts to obtaining the data they're after. In most cyber breaches, you won't even realize you've been attacked until the mission is complete and the attacker is long gone - if you even find out.

So, how easy is it for a hacker to get control of a system? Watch this short video produced by CNN Money on how an ethical hacker was able to obtain access in under 2 minutes:

 

 

It can't be that easy, can it? Here's another great video of how easy it is to use social engineering was back in January 2015 after the Sony cyber breach (10th largest in history) when Jimmy Kimmel and his team asked random individuals what their actual passwords were on the street in Los Angeles:

 

 

 Originally posted on LinkedIn.

 

 

 

Topics: Microsoft, IT Support, IT Solutions, Equifax

Justin F. Coffey

Written by Justin F. Coffey

Red Level in the News
Awards and Accolades
Red Level Blog Posts

Subscribe to Email Updates

Popular Posts

Posts by Topic

see all
Team Red Level

The team. The team. The team. 

Meet the people who make it happen at Red Level for our clients every day. [ read more ]

Contact Us

Every great idea, project and partnership starts with a conversation. Call Red Level at 248-412-8200 and let's start changing the game.

RLN_Did_You_Know.jpg

Did You Know?

Red Level, a Microsoft Gold partner, was recognized by Microsoft as Heartland Partner and Heartland SMB Influencer Partner of the year at the Microsoft Worldwide Partner Conference on July 13, 2015. [ read more ]

RLN_List_of_Services.jpg

Red Level Stands Ready

Our team of consultants, developers and technologists are here to help your company level up.
» Technology Consulting
» Cloud Solutions
» Managed IT Services
» Application Hosting
» Disaster Recovery
» Hardware as a Service
» Infrastructure as a Service
» Managed Azure
» Managed Office 365
» Virtual CIO
» Voice & Carrier Services

 

 

RLN_ChangeTheGame.jpg

Change the Game

Continual change is the new normal. New systems and practices can create powerful advantages or big problems for companies. Red Level CEO David King takes a look at five key characteristics game changing technologies share. [ read more ]