1 / 24

Cyber Issues for Design Professionals

Cyber Issues for Design Professionals. Drew Seaman Straub, Seaman & Allen, PC 269.982.7711. Cyber Issues Are Real. 2015 – Symantech Internet Security Threat Report Over Half a Billion Personal Records Were Stolen or Lost Spear-Phishing Campaigns Targeting Employees Increased 55%

briallen
Download Presentation

Cyber Issues for Design Professionals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Issues for Design Professionals Drew Seaman Straub, Seaman & Allen, PC 269.982.7711

  2. Cyber Issues Are Real 2015 – Symantech Internet Security Threat Report • Over Half a Billion Personal Records Were Stolen or Lost • Spear-Phishing Campaigns Targeting Employees Increased 55% • 43 percent of all attacks targeted at small businesses – 1 in 220 emails - Phish • Major Security Vulnerabilities in Three Quarters of Popular Websites Put Us All at Risk – 75% of sites have unpatched vunerabilities • Ransomware Increased 35% - 992 per day – 350,000+ • New Malware variations 431 Million

  3. Targets • Individual Computers • Laptops • Unsecured Networks • Remote connections to Networks • Cloud Storage • Cell Phones • Tablets

  4. How and What • Tech Support Scams • MalAdvertising • Websites • Email SPAM – Construction Industry 54% of email is SPAM • 1 in 220 emails has Malicious File Attachment • Ransomware • DDoS – Distributed Denial of Service

  5. Risks • Australian Secret Intelligence Service building plans stolen – 2013 • Seehotel Jaegerwirt hotel in Austria – key card system hijacked • Water treatment plant hacked, chemical mix changed for tap supplies - KemuriWater Company • Michigan State – information on 400,000 students, staff, etc. • Princeton University – database wiped - ransomed • San Francisco Mass Transit hacked – ride for free

  6. What’s at Risk • Project Files • Destruction of Records • Loss of Confidential Information • Disruption of Projects • Safety of Systems after Completion • Shut Down Pump Systems • Control Traffic Lights • Control Building Systems

  7. Georgia Institute of Technology • Developed malware that can take over Water Plant • Operation • Poison the Water • Takes over PLCs and SCADA • Identified 1500 PLCs online susceptible to this approach • Issue with routers used to send PLC info??

  8. Considerations • addressing modern cybersecurity challenges has as much to do with culture and organizational structures as with technology • Create a Corporate Structure where everyone is responsible for Cyber Security • Prohibit use of Public Wi-Fi • Change passwords • Be alert to emails • Encrypt remote systems

  9. Additional Thoughts #1 Laptops and remote access #2 Email Control and Isolation #3 Network Isolation – personnel and client information #4 Project Isolation #5 Encryption #6 Data Replication and Back Up #7 Employee Negligence – Intentional Disruption

  10. Laptops, Tablets, Cell Phones, etc. • These are point of contact and accessible • Access to Office, Projects, General Network • Often not encrypted • Passwords bypassed for easy access • Survey Equipment?

  11. Project Sharing • It’s not you it’s someone else • Dyn - Dyn offers Domain Name System (DNS) services, essentially acting as an address book for the Internet – DDoS attack October 2016 • Took down Twitter, Spotify, Etsy, Pinterest, Netflix • Target – Mechanical Contractor had access – came in through email • Same approach can take down project sites • Who controls network • Procore, BIM 360, Newforma, etc.

  12. What’s it to You • Theft of funds or unauthorized fund transfer • data loss or damage to your company or to a third-party • cost to replicate any data that was lost and not properly backed up • forensic investigation fees to determine the extent of the attack and whether a data breach occurred • attorney or consultant fees to determine whether any notification requirements apply • credit monitoring fees if personal information was compromised • business interruption, lost productivity, and damage to reputation • Claims, lawsuits, or regulatory complaints – project delay, etc.

  13. What Can You Do • Manage your IT Vendors • Conduct Due Diligence Analysis of Vendor • Review Results of Security Assessment • Review Written Security Policies of Vendor • Written Agreement • Require Cyber Insurance and Indemnification • WATCH OUT – Standard Agreement is adverse to you

  14. What Can You Do • Limit Access to Data and Systems • Limit who has Remote Access and to what Level Access is Allowed • Always Require Dual Factor Authentication • Separate servers for off-site projects • Require different passwords for different projects and access levels • Consider requiring Encryption of all transmissions • Back up and Replicate your information • Off-Site Remote Backups through encrypted process

  15. What Can You Do • Educate Employees and Managers • Email Protocol – Majority of Ransomware and Phish Attacks from Emails • Don’t automatically open an attachment • Think about who it is from and circumstances of receipt • Passwords Protocols • Security Solution on Each Device • Limit access through public Wi-Fi • What is on Laptop, Tablet, or Cell Phone? • Last years financials, project financials, employee contact info, etc.

  16. NIST FRAMEWORK • National Institute of Standards and Technology • Framework for Improving Critical Infrastructure Cybersecurity • https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf • Or just type NIST Framework

  17. Identify Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. • The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs. • Examples of outcome Categories within this Function include: Asset Management; Business Environment; Governance; Risk Assessment; and Risk Management Strategy.

  18. Protect • Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. • The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. • Examples of outcome Categories within this Function include: Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology.

  19. Detect • Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. • The Detect Function enables timely discovery of cybersecurity events. • Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes.

  20. Respond • Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. • The Respond Function supports the ability to contain the impact of a potential cybersecurity event. • Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements.

  21. Recover • Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. • The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity event. • Examples of outcome Categories within this Function include: Recovery Planning; Improvements; and Communications.

  22. Regular IT updates and reviews • Cyber Insurance • Make Managers Responsible • Listen to Your IT Professional • Require updates on attacks and system status • Cloud vs. On-Site Networks

  23. Process Control System Security Guidance for the Water Sector • AWWA - http://www.awwa.org/Portals/0/files/legreg/documents/AWWACybersecurityguide.pdf • Homeland Security • Industrial Control Systems Emergency Response Team • https://ics-cert.us-cert.gov/content/overview-cyber-vulnerabilities#under

More Related