{"id":3067,"date":"2023-10-14T18:45:43","date_gmt":"2023-10-14T18:45:43","guid":{"rendered":"https:\/\/techcafeteria.com\/new\/?page_id=3067"},"modified":"2023-10-14T19:04:12","modified_gmt":"2023-10-14T19:04:12","slug":"common-sense-security","status":"publish","type":"page","link":"https:\/\/techcafeteria.com\/?page_id=3067","title":{"rendered":"Common Sense Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3067\" class=\"elementor elementor-3067\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6032f8b8 e-flex e-con-boxed e-con e-child\" data-id=\"6032f8b8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f590472 e-flex e-con-boxed e-con e-child\" data-id=\"6f590472\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c30402b elementor-widget elementor-widget-text-editor\" data-id=\"3c30402b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center;\">Common Sense Security<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-88e2b14 e-flex e-con-boxed e-con e-parent\" data-id=\"88e2b14\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2315d3e elementor-widget elementor-widget-text-editor\" data-id=\"2315d3e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/techcafeteria.com\/?attachment_id=3069\" rel=\"attachment wp-att-3069\"><img decoding=\"async\" class=\"alignleft size-full wp-image-3069\" src=\"http:\/\/techcafeteria.com\/new\/wp-content\/uploads\/2023\/10\/Scan-Complete.png\" alt=\"\" width=\"373\" height=\"69\" srcset=\"https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/Scan-Complete.png 373w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2023\/10\/Scan-Complete-300x55.png 300w\" sizes=\"(max-width: 373px) 100vw, 373px\" \/><\/a><\/p><p>In 1974, Moore\u2019s law posited that the processing power of a computer doubles every two years, and the phrase quickly became popular shorthand for what we now call \u201cInformation Overload\u201d. Today, the biggest advancements in technology have less to do with processors and everything to do with the internet, which is now accessible from cars, TV sets, and many of our children\u2019s toys. This has provided some amazing utility to our lives, when our phones can tell us how to get home from anywhere; we can watch the news on a wristwatch, and we can see who\u2019s ringing our doorbell while vacationing in the Bahamas. The down side is that just about anything that can be plugged in or charged can now be hacked. And the best practices in information security are rapidly evolving as the definition of technology keeps expanding.<\/p><p>The basic premise that technology security was founded on was that you can put appropriate locks on your systems and only authorized users will have the keys. This assumed that you stored all of your data on your computer, or on a server in the same physical building that your computer sat in. In a world without the internet or the cloud, it was a solid approach, but in a world where those servers can be accessed through the locked doors, or one where our data no longer sits on our servers, it\u2019s not valid. And in a world where our PC\u2019s live in our backpacks or our pockets or on our wrists, it\u2019s completely invalid. We still need to physically protect our servers and system, but protecting our data is a completely different challenge.<\/p><p>Attackers either want something you have or want to use what you have to attack others. Common examples include:<\/p><p style=\"padding-left: 80px;\">\u2666 Fraudulent financial requests<\/p><p style=\"padding-left: 80px;\">\u2666 Encrypting your systems for ransom<\/p><p style=\"padding-left: 80px;\">\u2666 Using your servers to host spam and phishing sites<\/p><p style=\"padding-left: 80px;\">\u2666 Theft of sensitive constituent data<\/p><p>\u00a0Additionally, protecting data is a regulatory requirement. HIPAA, PCI, GDP \u2013 new acronyms arrive every year for measures that hold business accountable for breaches of customer\/donor data. If you want to purchase cyber-insurance (which you should), you generally have to be compliant with the NIST (the National Institute of Standards and Technology) frameworks for secure organizations.<\/p><p>We\u2019ll go over a lot of the security tools that you can implement, but it\u2019s important to understand that tools are the backup lines of defense \u2013 security awareness and informed behavior are the front lines. The best tools still rely on the user to practice discretion, and the most effective attacks play on a user\u2019s ignorance or gullibility. A common \u201cspear phishing\u201d attack is one where the attacker gets some useful information \u2013 the name, email, and email signature of your organization\u2019s CEO \u2013 and then puts that all together in a spoofed email to the CFO or Controller instructing them to wire transfer money to an account. If you are the CFO, and you don\u2019t know that this type of thing happens or how to recognize a spoofed email, then you might be susceptible to this scam.<\/p><p>A few years ago, news poured in about a <a href=\"http:\/\/www.marketwatch.com\/story\/equifax-breach-risks-143-million-americans-data-stock-plunges-13-2017-09-07\">massive security breach<\/a> at <a href=\"https:\/\/www.equifax.com\/personal\/\">Equifax<\/a>, which is one of the three agencies that maintains credit ratings for all Americans. If you have a credit card, the hackers got sensitive information about you. Equifax was hacked because they were r<a href=\"https:\/\/boingboing.net\/2017\/09\/14\/thrice-is-enemy-action.html\">unning software with a critical security flaw<\/a>. That flaw had been discovered and fixed, by the vendor, two months before the breach. But Equifax hadn&#8217;t applied the security patch. Subsequently, it was also discovered that <a href=\"https:\/\/krebsonsecurity.com\/2017\/09\/ayuda-help-equifax-has-my-data\/\">Equifax&#8217;s customer database in Argentina<\/a> was secured with the username &#8220;admin&#8221; and the password &#8220;admin&#8221; &#8211; often the default credentials that you&#8217;ll find in software or a new device.\u00a0 The full severity of Equifax&#8217;s negligence to protect our most sensitive security data will never be revealed. Was our data properly encrypted on their servers? Was access to sensitive credit data properly limited to those that need access only? Were they doing any testing to see if the data was vulnerable? These are all things that any company subject to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act\">Health Insurance Portability and Accountability Act (HIPAA)<\/a> or the <a href=\"http:\/\/Payment_Card_Industry_Data_Security_Standard\">Payment Card Industry Data Security Standard (PCI-DDS)<\/a> compliance must do, and they&#8217;re among the basic safeguards that anyone storing sensitive data on their servers should have in place.<\/p><p>Since security standards are always evolving as threats evolve, an article written three months ago with the same title as this one might well be out of date. NIST completely <a href=\"https:\/\/www.passwordping.com\/surprising-new-password-guidelines-nist\/\">rewrote the rules on passwords<\/a> about a decade ago. Gone is the requirement that passwords contain mixed case letters, numbers, and additional characters. Demoted is the recommendation that they be changed frequently. The new standards on passwords promote long passwords, more &#8220;passphrases&#8221;, instead of single words, because hacking a 25 character sentence \u2013 even if it&#8217;s as plain English as &#8220;My automobile is a Chevy Impala&#8221; &#8211; is much more difficult for hackers to crack than &#8220;sHaKespearE17$&#8221;. And putting passwords on post-it notes taped to a monitor is deadly, as is using the same password with a different digit (e.g. &#8220;SuZie123&#8221; one month and &#8220;Suzie124&#8221; the next). And, worst of all, using the same password for your work, Facebook, and online banking. These are all bad habits that were propagated by the requirement that passwords be hard to remember and changed frequently, and NIST now recognizes that the workarounds effectively defeated the purpose of the old standard rules.<\/p><p>So how should you defend against these threats today? Here are seven areas where you can focus.<\/p><p style=\"padding-left: 80px;\">\u2666 Security Awareness: Education, Testing, and Policy<\/p><p style=\"padding-left: 80px;\">\u2666 The Old Guard: Firewalls and Security Software<\/p><p style=\"padding-left: 80px;\">\u2666 Multi-Factor Authentication<\/p><p style=\"padding-left: 80px;\">\u2666 Data Encryption<\/p><p style=\"padding-left: 80px;\">\u2666 Passwords: Secure Policies and Management Tools<\/p><p style=\"padding-left: 80px;\">\u2666 Information Security Policies<\/p><p style=\"padding-left: 80px;\">\u2666 Safety in the Cloud<\/p><h4>Security Awareness: Education, Testing, and Policy<\/h4><p>The most common way that computers get breached or infected is by fooling users into installing malware. Commonly called &#8220;Phishing&#8221;, your biggest risk lies in your staff&#8217;s behavior upon receiving questionable emails and visiting malicious websites. A new class of software has arisen to help with this. Anti-phishing packages like Knowbe4, Proofpoint, and Cofense offer online training and user testing in integrated packages, allowing you to not only assign learning modules and track who has completed them, but also simulate your own phishing emails that, instead of infecting users, educate them when they&#8217;re clicked on. Knowing where your risk lies is the first step in reducing it.<\/p><h4>The Old Guard: Firewalls and Security Software<\/h4><p>You might still have data on servers in your offices, and you definitely have computers and devices that need protection, so the need for <a href=\"https:\/\/en.wikipedia.org\/wiki\/Firewall_(computing)\">firewalls<\/a> and <a href=\"https:\/\/www.pcmag.com\/article2\/0,2817,2372364,00.asp\">anti-virus software<\/a> isn\u2019t removed. You can consider <a href=\"http:\/\/www.techradar.com\/news\/top-5-best-encryption-tools\">encrypting your hard drives<\/a> (encryption tools come with the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/device-security\/bitlocker\/bitlocker-overview\">business versions of Windows<\/a>). But what is critical is that you are keeping all of your operating systems, servers, major hardware and software systems up to date with the latest security patches. Just a few years ago, the best practice was to &#8220;wait and see&#8221; on updates, in case they might introduce new issues. That is no longer the case \u2013 the frequency in which new strains of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\">ransomware<\/a> or other threats arise demands that you keep your systems fully protected. Systems management applications, like Microsoft&#8217;s <a href=\"https:\/\/www.microsoft.com\/en-us\/cloud-platform\/system-center-configuration-manager\">System Center Configuration Manager<\/a> (SCCM) can help with this.<\/p><p>Even if you are fully in the cloud, you still need a network in the form of a network directory service, which will authenticate your users to protect your resources, automate system and software updates, and enforce security policies. During the pandemic, many nonprofits ditched their physical networks and just had their users log into their cloud apps directly. Without a network, there\u2019s little way to track who is actually using those cloud applications; you can\u2019t install SSO; and your users are not secure.<\/p><h4>Multi-Factor Authentication<\/h4><p>When all is said and done, even those passphrases can be hacked, so it&#8217;s now standard security to provide additional authentication when accessing sensitive data. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\">Multi-factor authentication<\/a> (also called Dual-Factor Authentication, or &#8220;MFA&#8221;) is an additional safeguard that has you confirm your identity using, in most cases, your mobile phone. With MFA, the website vets that it&#8217;s you logging in, not some stranger sitting in a Russian cafe. Common MFA, supported by most popular websites like Google and Facebook, works with an authenticator app that provides a secure code. For computers that you use often, you can usually set them as &#8220;trusted devices&#8221; and reduce the authentications to every few eeks or monthly.<\/p><h4>Data Encryption<\/h4><p>The Federal Government mandates that <a href=\"http:\/\/www.huffingtonpost.com\/2015\/06\/08\/https-federal-websites_n_7539164.html\">all government websites be protected<\/a> by <a href=\"https:\/\/www.digicert.com\/ssl\/\">Simple Sockets Layer (SSL) encryption<\/a>. You should be doing this as well. With <a href=\"http:\/\/info.ssl.com\/article.aspx?id=12157\">multi-site SSL certificates<\/a> available for less than $200 a year (<a href=\"https:\/\/letsencrypt.org\/\">or free, even<\/a>), there&#8217;s no reason not to do this.<\/p><p>If you accept credit cards on your website, the best idea is to outsource the actual transaction to a third party like <a href=\"https:\/\/www.paypal.com\/us\/home\">Paypal<\/a>, <a href=\"https:\/\/stripe.com\/\">Stripe<\/a>, or <a href=\"http:\/\/www.networkforgood.com\/fundraising-software-tools-for-nonprofits\/\">Network for Good<\/a>. If you do collect credit card data, the transaction must be encrypted, and you should not store it on your network. Delete the credit card number once the transaction has completed.<\/p><p>Encrypting emails has traditionally been a process so complex that it made doing so a difficult proposition \u2013 nobody is going to read the email if they have to mess with encryption keys. But that&#8217;s changing with the advent of digital rights management solutions that store the data on encrypted servers and simplify the verification process. Microsoft includes this in paid Microsoft 365 subscriptions.<\/p><h4>Passwords: Secure Policies and Management Tools<\/h4><p>As mentioned above, passphrases should replace passwords, and the frequency as to when they must be changed can be reduced or removed. We all have dozens, if not hundreds of passwords these days, so software that remembers the passwords for you is a must. That can be <a href=\"https:\/\/en.wikipedia.org\/wiki\/Single_sign-on\">Single Sign-On (SSO) software<\/a>, installed for your company, or a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Password_manager\">password management<\/a> application. Both types of software store your passwords for you securely and fill them in when you load a login page, so that you can maintain complex passwords, unique to each website or application, without having to memorize them or constantly look them up.<\/p><p>An additional NIST recommendation is that passwords be checked against a list of far too common or recently breached passwords, and options for integrating these checks into Windows Server and other authentication systems are coming up. For example, Microsoft&#8217;s Azure Active Directory does <a href=\"https:\/\/www.theregister.co.uk\/2016\/05\/25\/microsoft_password_policy\/\">such a check<\/a> by default.<\/p><h6>Password Managers<\/h6><p>Popular password managers include <a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a>, Bitlocker, and <a href=\"https:\/\/www.logmeonce.com\/\">LogMeOnce<\/a>. There are personal and enterprise versions available. In addition to storing all of your passwords securely, they can generate safe passwords for you, and the best ones will alert you if you have weak or duplicate passwords, or a password that was recently subject to a breach.<\/p><h6>Single Sign-On<\/h6><p>Popular Single Sign-On applications include <a href=\"https:\/\/www.onelogin.com\/\">OneLogin<\/a>, <a href=\"https:\/\/www.okta.com\/\">OKTA<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/active-directory-whatis\">Microsoft&#8217;s Azure AD<\/a>. The latter is available as part of Microsoft 365\u2019s paid options, such as the E3 or Business Premium offerings. OneLogin and OKTA have nonprofit pricing options as well. Single Sign-On needs to be setup by your IT staff or Managed Services Provider.<\/p><h4>Information Security Policies<\/h4><p>Key to successfully protecting a network is having clear information management policies and following them. These policies should be understandable for the staff that need to comply with them, written in plain English, and regularly reviewed and modified as conditions change. Some policies will be detailed, some very simple. For example:<\/p><p style=\"padding-left: 80px;\">\u2666 A policy regarding guest accounts will establish what type of work warrants creating accounts for vendors and consultants; what type of access is appropriate; and how long the accounts will remain in effect. The famous Target hack in 2012 was accomplished by using a vendor account with far more access than was required.<\/p><p style=\"padding-left: 80px;\">\u2666 A mobile\/Bring Your Own Device policy will address what happens to company data on mobile devices should they be lost or stolen, or should the employee leave the organization.<\/p><p style=\"padding-left: 80px;\">\u2666 An Incident Response policy will outline what should happen and when should a breach occur.<\/p><h4>Safety in the Cloud<\/h4><p>Established cloud services from major providers such as Google, Microsoft, Salesforce, Adobe, etc., are as safe or safer than your own networks. Either one can be hacked, but Microsoft has far more certified cybersecurity gurus on staff than your average nonprofit. Some contracting terms should be required, such as the ability to obtain full, usable data dumps of your content and a promise that you&#8217;ll have full access should the cloud provider go under or be sold. Since most providers store your data on multiple, geographically diverse servers, your data is well-backed up, but accessing those backups in an emergency might be difficult, so <a href=\"http:\/\/searchdatabackup.techtarget.com\/tip\/Cloud-to-cloud-data-backup-How-to-pick-your-provider\">cloud-to-cloud backup vendors<\/a> should be considered for critical data. And while your data might be relatively safe from hackers or disasters, if you store data that you would not be willing to provide in response to a subpoena, you should consider keeping that data on your own servers. Cloud providers might feel obligated to comply in cases where you would not.<\/p><h4>Outsource for Safety<\/h4><p>Finally, every organization should have a relationship, if not a contract, with a Managed Services Provider (MSP). MSP\u2019s act as outsourced IT departments, managing servers and cloud applications, providing help desk, and completing technology projects for you. Techcafeteria would not advise you to outsource your IT strategy to the same firm that maintains your infrastructure. The MSP\u2019s are generally not as dialed into your mission and strategic plan, and this can create a conflict of interest, where the MSP is recommending strategies that sell their services. But outsourcing the tech maintenance is, in these times, a no-brainer. To have 24\/7 support and steady technical resources for (roughly) \u00a0the cost of one FTE beats having two or three people on staff who lack that collective knowledge and coverage. And the MSPs tend to be gurus when it comes to implementing the security measures described above.<\/p><h4>In Summary<\/h4><p>Consider that many of these security requirements also make life on the Internet easier. Single Sign-On solutions secure your applications from hackers while making it unnecessary for users to enter a password for every application. The cloud makes working from anywhere easy. If you have a long way to go to meet the standards listed here, make a game plan and roll out what you can, starting with clear policies and security training. But don\u2019t let your nonprofit get caught with its virtual pants down. Do what is prudent to protect you clients, your staff, and your organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Common Sense Security In 1974, Moore\u2019s law posited that the processing power of a computer doubles every two years, and the phrase quickly became popular shorthand for what we now call \u201cInformation Overload\u201d. Today, the biggest advancements in technology have less to do with processors and everything to do with the internet, which is now<br \/><a class=\"moretag\" href=\"https:\/\/techcafeteria.com\/?page_id=3067\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2804,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3067","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3067"}],"version-history":[{"count":4,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3067\/revisions"}],"predecessor-version":[{"id":3072,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3067\/revisions\/3072"}],"up":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/2804"}],"wp:attachment":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}