Home » Archives for Sara Herr

Author: Sara Herr

5 Reasons to Love the Advanced Security Package

If you’ve been following this blog over the last several months, you may have noticed Wind River has had an increased focus on security lately. In fact, in early 2018 we rolled out a significant update to our security program and introduced the Advanced Security Package. You might even have found yourself asking the question, “Why all the hype?”.

Well, we know internally just how much of a gamechanger ASP can be for our customers, but sometimes it helps to hear it straight from the people who have actually been using it. We recently spoke with one of our clients who’s been using ASP for a little bit now. We wanted to get their opinion on how it’s been working and what they like best.
According to them, here are they five things they think YOU should know about ASP.

  1. The ASP toolkit is easy to install.
  2. ASP saved us hundreds of dollars since there are no additional licensing fees or charges related to how many computers it can be downloaded on.
  3. The dashboard reporting is laid out in a way that makes sense and the results are easy to understand.
  4. The amount of time completing the PCI SAQ was shortened significantly for our processing environment.
  5. There is a lack of security toolkits available for businesses. Purchasing each tool individually is expensive! ASP has saved us over $500.00 a year!

It’s feedback like this that really helps us to make sure we’re offering the best services we can. In the near future, we’ll be surveying more of our customers for additional feedback about the Advanced Security package. We’ll even be giving those that participate a chance to win a $100.00 gift card or an equivalent donation to the charity of their choice.

In the meantime, for those of you interested in learning more about ASP and how it could make your life a little easier, feel free to read how mobile security has become vital to small businesses or how remote access detection can keep criminals out of your network.

Advanced Security Package Webinar Trustwave

Advanced Security Package Webinar: Get the Most of ASP

Recently, Wind River Financial and Trustwave held an educational webinar that provided a detailed look at the security tools included in Wind River Financial’s new Advanced Security Package (ASP).


ASP, powered by Trustwave and using the TrustKeeper dashboard, includes a suite of integrated security tools for you to use, including such things as remote access detection and file integrity monitoring. All of these tools are designed specifically to strengthen the data security of your business.

The Advanced Security Package webinar was put together to allow our clients a chance to have a guided walkthrough to better understand how to take advantage of these tools. Hosted by Trustwave, the webinar showcases the security tool dashboard (TrustKeeper dashboard) and was meant to familiarize users with the benefits of each tool and how they should respond to any alerts that are received.

If you have any questions after watching the Advanced Security Package webinar, please contact us or call your relationship manager. We’d be happy to help you.

Mobile Security Bring Your Own Device

What does Bring Your Own Device (BYOD) Mean for Mobile Security?

When it comes to both our work and private lives, mobile and wireless technology have become an essential part of the landscape. Businesses have to think about what route to take to enable mobility and respond to the needs of partners and employees. But with it comes a whole new wave of mobile security concerns.

Bring Your Own Device (BYOD) has Implications

In many cases, businesses have adopted a Bring Your Own Device (BYOD) approach to mobility. When you consider all the IP-connected devices on your network – Netbooks, tablets, smart phones, laptops, and VOIP phones – there are now two to five more connections per employee.

According to Verizon’s Mobile Security Index 2018, trying to find the right balance of mobile-friendliness has come with its share of challenges.

  •  39% of respondents whose organizations use employee-owned devices ranked them as their #1 security concern. 76% ranked them in the their top three.
  • 79% said that the disruption of systems that mobile creates is an even greater threat than the theft of data. Companies using IoT* that were particularly concerned.
  • Those that knew their organization was sacrificing mobile security for expedience and business performance said they were more than twice as likely to have experienced data loss or downtime.

*Internet of things (IoT) refers to any and all devices that are constantly connected and exchanging data on the network. This can include mobile and computing devices, appliances, vehicles, wearable tech and more.

Downtime and Data Loss are Being Reported

Regarding the potential loss of data, the report also notes that 35% of healthcare organizations have been impacted. Of those, over a third said they had suffered data loss or downtime due to a mobile security incident.

The challenge is that any rogue device connected to your network can give hackers access to many areas of highly sensitive data. An unsecured RJ45 network jack and improperly configured Wireless Access Point (WAP) is as good as leaving a door left unlocked and propped open.

A Good Defense Needs Detection

Any unauthorized device added to the network is considered a rogue device. The goal is to segment and control where a device can be added as well as detecting when one is trying to be added and how it should be approved. Unauthorized Device Monitoring has the capability to do that.

ASP’s Unauthorized Device Monitoring

As part of Wind River’s Advanced Security Package (ASP), you can prevent any employee or outsider from adding equipment to your network that could compromise your systems and steal data. The product dashboard alerts you to any device (or computer) on your local network that is new or not been recognized and needs to be investigated.

Once identified, you can check your internet router and any other routers, hubs or switches to see if any new cables have been plugged in. If the device is something you authorized (such as a new terminal, back-office computer, printer, etc.), you can approve the device and provide a comment describing it for future reference.

If you’d like learn more about how to keep rogue devices from accessing your data, you can get started by reading more about ASP. Existing customers can also contact their Relationship Manager. Mobile security is vital part of maintaining a Security First approach.

Remote Access Detection

The Unwanted Visitor

Have you ever had that sense of dread when you hear a knock on your door? I happened to be reading Verizon’s 2017 Data Breach Investigations Report and it made me think of how sometimes unwanted visitors knock…and even get in.

In their report, Verizon asked, “Who’s behind the breaches”? Maybe not surprising, but 75% of all breaches are perpetrated by outsiders. The other interesting statistics noted in this area of the report was that 51% of these breaches involved organized criminal groups.

How are these unwanted visitors getting in? Security Metrics posted an interesting blog that identified some key stats that shed some light on this area.
• 45% of organizations were breached through remote access
• 73% of all investigated breaches had not implemented Logging and Log Monitoring

A third statistic that was a bit staggering from the Security Metrics post was that the “average organization was vulnerable for 1,549 days” and that “Cardholder data was exfiltrated for an average of 264 day”. With these types of levels of vulnerability and with the number of breaches up significantly as was noted in our blog post “Seriously, What Are My Odds of a Data Breach?” , it really brings home the need for a “Security First” focus.

A key step in keeping away unwanted visitors is to ensure you are not an easy target. There are a number of great articles on best practices for Securing a Remote Access Application. If you are interested, in the 9 key steps recommended by Trustwave you can click here.

One immediate step you can take is to leverage the Remote Access Security capability within Wind River’s Advanced Security Package. This capability is one of the 13 tools that is part of ASP and is a service that checks your computers for common software used for remote access. The Remote Access Security tool produces alerts when remote access software has been identified so you can review and confirmed that it is authorized and secure.

For Wind River customers, ASP replaced our prior PCI program and all its capabilities are available to you. Because of our approach in packaging these capabilities for many customers, we are able to save you money compared to going and buying these tools yourself.

If you have not already taken advantage of it, you can get started by visiting our ASP landing page or contacting your Relationship Manager. We want to help you take this step in your Security First approach, helping you detect and keep away unwanted visitors.

File Integrity Monitoring Could Save Your Company

File Integrity Monitoring and How It Could Save Your Company

With the increase in data breaches, the data security world is a much scarier place today. According to the most recent stats from ITRC (Identity Theft Resource Center), 2017 was a record breaking year for data breaches, and 2018 is already on pace to be more of the same. So with threats coming left and right, what steps can you take to better protect your assets? Enter File Integrity Monitoring.

Seconds of Damage, Months of Recovery

In many cases, you may not know for a long time you have been compromised. According to CNBC, most companies aren’t aware of a breach until weeks after it has happened. This is likely due to the speed in which the incident occurs. The attacker is there and gone in seconds. Verizon’s 2016 Data Breach Investigations states that 93 percent of cases where data was stolen, systems were compromised in minutes or less, but in over 80 percent of cases, victims didn’t find the breach for weeks or more. This kind of damage to your business and reputation can take months, if not years, to repair.

Hackers Often Leave a Trail

So back to File Integrity Monitoring and why it is so critically important. File Integrity Monitoring (FIM) is the first line of defense of any organization wishing to protect its assets and data. To explain further, once a breach is under way in your network, the attacker will often do one or more of the following.

  • Modify critical systems, application binaries and configuration files
  • Access or modify data files
  • Modify or delete any log data to hide their tracks

The research done by Verizon analyzed more than 100,000 incidents and 2,260 breaches. They found that more than 90 percent of the breaches will fall into this same pattern. By having a FIM system in place, you’ll be able to monitor for these subtle changes and be instantly alerted if any of the above events have been detected.

File Integrity Monitoring Sniffs Out the Breadcrumbs

File Integrity Monitoring is such a valuable tool that we consider it a vital part of the Advanced Security Package. FIM will run every day at an inspection time determined by you and will watch for any changes within your network. A digest of the inspection report can then be emailed to you on a daily or weekly basis. Additionally, another helpful feature is a heatmap data visualization, which helps you quickly assess the state of your network. Events on this heatmap can be filtered by severity in order to help you focus on the most important events in your environment.

You Don’t Need a Fortress

A further quote from the Verizon study really drives this home. “There’s no such thing as an impenetrable system, but often even a half-decent defense will deter many cybercriminals — they’ll move on and look for an easier target. Sadly, many organizations fail to achieve even that modest ambition.”

Sometimes, it’s not about the size of your castle. It’s more about the size of your moat.

Put FIM in Place Today

File Integrity Monitoring is something that is available to all Wind River customers as part of the Advanced Security Package. If you’re interested in learning more or you’re an existing customer looking to get these tools in place, feel free to contact us today. We believe in creating Security First environments and delivering these capabilities in a way that saves you money.

Data-Security-Detection-&-Prevention

Detection and Prevention – Two Pillars of Data Security

When it comes to data security, one thing is for sure. There is no magic bullet. Although it would definitely make life easier, it’s just not that easy. So, despite its inherent challenges, where should you begin? What is your first priority when it comes to data security? Here is what over 1,600 full-time IT professionals believe should be your number one responsibility according to Trustwave’s 2017 Security Pressures Report .

Top 5 Data Security Responsibilities

1. Identifying vulnerabilities (22%)
2. Preventing Malware (20%)
3. Strengthening Remote Access and passwords (13%)
4. Detecting malicious activity and compromises (12%)
5. Patching Vulnerabilities (12%)

Previously, we mentioned that only 7% of IT professionals believe they will not be the victim of a data breach. The is a sobering statistic. It should then come as no surprise that the two most popular survey answers highlight very specific responsibilities: detection and prevention.

Keeping Up with Detection and Prevention

With the number of breaches increasing and almost 80% of the respondents stressing the importance of detection and prevention, it would seem logical that the need for resources would be a source of discussion.

In the Security Pressures Report, 51 percent of the operational pressures come down to a lack of resources:

  • lack of security skills and expertise (15%)
  • lack of budget (14%)
  • lack of staff members (13%)
  • lack of time (9%)

For many businesses, they are finding it difficult to find resources and cost-effective ways to arm themselves for the challenge.

Security Tools and Managed Services

As businesses look to be more proactive, they are looking more and more at how they can bring together the tools they need and automate parts of the detection and prevention cycle. It is a theme that we at Wind River are hearing from of our customers and prospects. We believe that in order to stay ahead of the hackers, it is important to adopt a new mindset. Instead of each company trying to “staff up” and needing the same skilled resources, it makes more sense to look to companies that focus on data security, monitoring, and prevention.

Partnering to Win the Battle

As we look to help our customers in the detection and prevention battle, we looked to find a partner that has the focus and marks of being a leader in their industry. Trustwave was recognized by Gartner by being placed in the “Leader” quadrant of their Magic Quadrant evaluation.

In partnership with Trustwave, Wind River has now launched the Advanced Security Package. It contains key tools in each of the areas of identifying vulnerabilities, preventing malware, strengthening remote access control, and detecting malicious activity.
We invite you to learn more by going to our web site. For our customers, it is easy to get started, simply click here and check out the video and 3 steps to get started or contact your relationship manager.

Does-Data-Security-Keep-You-Up-At-Night-2

Does Data Security Keep You up at Night?

Data security has caused its fair share of sleepless nights for IT departments. A recent survey of 1,600 full-time IT professionals compiled by Trustwave in their 2017 Security Pressures Report shows us exactly what’s got them tossing and turning.

6 Biggest Worries About Data Security

  1. Theft or Loss of Customer Data (30%)
  2. Data or Systems Access Restricted by Ransomware (18%)
  3. Loss of Intellectual Property (16%)
  4. DDoS Attacks/Website Offline (14%)
  5. Reputation Damage or Loss (12%)
  6. Fines or Legal Action (3%)

There are a number of interesting perspectives to be drawn from this information. First, almost half of the data security worries are focused on two key areas: data loss or theft and in-system access issues. Both these worries tend to have a common root source – being attacked. Typically those attacks come via either hacking or someone planting or accessing malware, and as we mentioned before, data breaches were up 44.7% last year.

Are you a 7%-er?

At this point, an astute reader may have noticed the above percentages only add up to 93 percent. So what about the other seven percent, you ask? Interestingly enough, the Security Pressure Report indicates that seven percent of IT professionals do not think they would be the victim of a breach.

When you realize that only seven percent of the 1,600 IT professionals surveyed believe their data security makes them “safe” from a data breach, it begins to hit home just how high the risk has become. The goal can no longer be just compliance; it is has to be about being Security First.

What’s the Impact to My Organization?

In another section of the Security Pressures Report, the survey group was asked what repercussions they fear the most if their organization was breached. Two answers dominated their answers and accounted for 80 percent of the total responses. Coming in first with 42 percent was reputation damage to the IT professional and their company, followed closely by financial damage to the company with 38 percent.

In both cases, the impact can be attributed to another core concern – customers. When a breach happens, customers lose confidence. They may also be personally impacted, resulting in the loss of their business. Perhaps not surprisingly, the ability to weather the storm created by a breach seems to be inversely related to the size of the company. The smaller the company, the less likely they are to survive.

Why Security First?

In order to combat these issues, organizations need to take a proactive posture. Part of the answer is to always be reviewing your readiness. Another is to leverage key tools and expertise to help minimize exposure. Security First means thinking about data security and its implications as a business priority.

At Wind River, we aim to arm all of our customers with additional ways to keep both themselves and their customer or patient data secure. A key first step to maintaining this Security First mindset is by leveraging the capabilities of our Advanced Security Package (ASP).

If you are interested in learning more about what ASP has to offer, contact us or check out the package’s 13 tools to help make you more secure.

 

How-Do-I-Protect-Against-Ecommerce-Malware

How Can I Protect Myself From Ecommerce Malware?

In a recent blog post, we discussed your likelihood of suffering a data breach, referencing some of the more recent statistics from the ITRC (Identity Theft Resource Center) 2017 Executive Summary. As the summary points out, data breaches are on the rise, and one of the more insidious methods is through a form of hacking known as ecommerce malware.

Overall, hacking is the number one cause for a data breach, but what exactly is hacking? The term “hacking” is actually an umbrella term that includes breach methods such as phishing, skimming and malware.

Recently, Visa came out with a security bulletin entitled “Protect Against Ecommerce Malware.” While most people are surprised to hear that ecommerce malware is a form of hacking, it is a method that is becoming much more widespread and deadly. This type of malware generally targets the website itself and not the user who visits the website.

Ecommerce malware is like an “online payment data skimmer” designed to capture personal information so it can be used and/or sold illegally. To install the code, the attacker must gain access to your ecommerce server. Most commonly, access is obtained by guessing administrator credentials or using stolen information. That may sound like a tall order until you look further at the ITRC study. Unauthorized Access makes up 10.8% of all breaches.

Additionally, Unauthorized Access can be used for more than just installing ecommerce malware. It can be used for a host of other techniques that cause damage. Between these two reports, it’s becoming even more apparent why you need to have strategies and tools to combat these types of attacks and maintain a Security First mindset.

The best way to fight hackers is by having some ethical hackers on your side. The SpiderLabs team at Trustwave are those ethical hackers. They leverage a Global Threat database and are a significant reason why Trustwave won Best Managed Security Service at the 2017 SC Awards as well as being named a “leader” in Gartner’s Magic Quadrant for Managed Security Services.

Wind River has partnered with Trustwave and the SpiderLabs team to create the Advanced Security Package, a toolkit designed to help our customers be Security First. Web Malware Monitoring and Remote Access Security, two of the 13 tools included in the package, were designed specifically to counter Unauthorized Access and ecommerce malware attacks. If you’d like to learn more, contact us today.

What-Are-My-Odds-of-a-Data-Breach

Seriously, What Are My Odds of a Data Breach?

Unfortunately, your chances of experiencing a data breach are growing each year. In fact, the trends and shifts in awareness pertaining to data security are frightening to watch unfold. I read a recent study that polled adults in the US, UK and Australia that asked if the number of criminals trying to steal personal information is increasing. Not surprisingly, the survey indicated that 85% of respondents felt that it was.

We recently discussed why having a “Security First” mindset and approach is important, and as we look at what is happening with breaches, the importance is highlighted even more.

According to the ITRC (Identity Theft Resource Center), cyberattacks and breaches have grown both in frequency and in the amount of losses sustained. Here are some of the statistics as noted in their 2017 Executive Summary.

  • Breaches again hit a new record in 2017, with 1,579 breaches tracked, up 44.7 percent from 1,091 in 2016, as businesses and government entities move toward timely reporting
  • The number of records exposed rose to about 179 million, compared with 37 million in 2016
  • Businesses saw 870 breaches (55% of the total)
  • Medical/healthcare organizations were affected by 374 breaches (23.7 percent of total breaches)
  • Banking/Credit/Financial saw 134 breaches (8.5%)

For a more detailed breakdown, you can see the year-over-year data breach numbers by sector and category.

Another key statistic from the report indicates that 59.3% of breaches were from hacking. Hacking includes methods such as phishing, malware and skimming.

With the number of breaches increasing and hacking being the number one method, it is clear that one area of your defense strategy needs to focus on identifying and mitigating the damage as quickly as possible.

Part of our “Security First” approach is to help arm all of our customers with additional ways to keep their customer or patient data safe. Our goal this year is to educate our customers about data breach risks and how they can start down the path to be “Security First.” An important component of that process will be encouraging them to take advantage of the security and monitoring tools in our Advanced Security Package.

If you’d like more information about other issues we see becoming more prevalent in the market, feel free to contact us or read about the dangers of ecommerce malware.

Is Being PCI DSS Compliant the Same as Being Secure?

Is Being Compliant the Same as Being Secure?

I was reading a study published by Javelin the other day, and a few details really stood out to me.

“The rise of information available via data breaches is particularly troublesome for the industry and a boon for fraudsters.” (Al Pascual, Senior Vice President, Research Director and Head of Fraud with Javelin Strategy & Research)

One of the implications of this statement is that fraudsters are being even more aggressive and looking for data, all kinds of data. While being PCI DSS compliant at any given point in time may seem comforting, the reality is the fight is ongoing, and it will take a higher level of diligence to not have you or your customers impacted.

How Safe Are We

The study included a frightening statistic that really emphasized current security issues.

“16.7 million Americans were victims last year, up from 15.4 million last year, the previous high.”

These are only the confirmed victims, not those with compromised information that hasn’t been used yet.

It’s Not Just Card Data

Just as sobering was the fact that the fraudsters aren’t just looking for card data.

“Large-scale compromise of existing non-card accounts in 2017 was clearly facilitated by poor controls as fraudsters capitalize on weak authentication.”

Even in the card data arena, the focus is changing.

“Card not present fraud is now 81 percent more likely than Point of Sale (POS) fraud.”

As card present counterfeit fighting capabilities improve with chip cards, the fight starts to shift online.

Compliance is the Wrong Goal

These types of statistics make it clear that the goal of being “compliant” is too small. Being PCI DSS compliant does not equal being secure. To combat these issues, organizations will need to adopt a “security first” mindset and approach, as opposed to the “finish line” approach.

Is there a silver bullet out there? Unfortunately, no.

As with most things that can be complex, it is about being diligent. Part of the answer is to always review your readiness. It also means leveraging key tools and expertise to help minimize exposure.

Are You “Security First”?

A “security first” approach can be hard, as many organizations have IT staff that are already stretched thin and aren’t able to make security their primary focus. Understandably, their role has been to focus the majority of their efforts on keeping your organization’s systems and technology running.

Advanced Security Package: A Strong Step

At Wind River Financial, we see a need to help our clients by bringing a “security first” approach. It is for this reason that we engaged with Trustwave and put together the Advanced Security Package (ASP) as strong steps toward this goal. It is too important not to take these steps.

The benefits of partnering with us and going down this path are many. It allows us to provide tools and capabilities that not only reduce your risk but save you time and money.

It’s Not Always Good to Wait

If you have not yet heard about the Advanced Security Package, you will soon. Our goal for 2018 is to reach out to every customer in order to help them in this endeavor.

This isn’t something that can wait. If you have not been contacted yet, feel free to read the details of ASP and then contact your Relationship Manager.

We look forward to helping you become “Security First.”