So, the words Cyber Security Consultant get banded around easily, yet many of us donāt even understand what a Cyber Security Consultant does. I will use an encounter I found myself in recently with a client who wanted the services of a āCyber Security Consultantā.
Ā The client in question, I will refer to as āthe clientā. It is a Small business of around 25 Users. They work in the business of Ecommerce. In simple terms, they sell products online. They provide fast delivery on items that are required, even the very same day.
This business has 2 key challenges to understand ā
For context, we need to be aware that the client is receiving around 500 phishing emails per day, with around 2% of phishing email getting past the filters. That is around 10 emails per day.
While this may seem low, even the best Security Awareness Training delivered to staff wonāt guarantee that every single employee wonāt click a phishing link. After all, humans are always the weakest link in Computer Security.
The C level executive of this client, expressed his concerns about the potential downtime that may occur from a breach, the customers loss of confidence in the company and related outcomes all resulting from a breach.
In order to help the client, we had to develop a strategy that incorporated a greater level of Cyber Security. There isnāt a silver bullet one size fits all approach to this ā we needed multiple layers of defence.
Naturally, the first step we took was a full Network Audit to ascertain the technicalities and to ensure the network was in good shape. Once those things had been checked off and we were happy we had a solid baseline to build upon, we started to work through the critical business processes. We set about creating a strategy that would improve the clients security baseline significantly ā something this can be done in a few simple steps ā sometimes not.
We generally work through threats on a severity basis, then we focus efforts on the area the business is most likely to receive a threat from. We worked through the network systematically and observed how users accessed applications/web amongst other things.
The client regularly receives legitimate emails from International companies ā and with this a whole host of external phishing emails too. This was determined to be our clients most severe threat, which is also most likely to happen.
Phishing emails using international domains names is an extremely common way of sending phishing emails. Whatās more, the phishing emails had been sent from new email addresses created just for this purpose ā no spam filter would have a chance detecting these.
These emails are the scourge of Cyber Security Professionals existence, as a first line of Defence (Office 365 spam filtering in this instance) is very unlikely to block these unless the domain name within the web link is already marked as malicious in a database somewhere.
A good course of preventative action for the human element in this particular occurrence is Security Awareness Training ā which the client already had in place ā it is always rather refreshing to see that a business is taking Cyber Security Hygiene seriously. However, this risk was deemed to be too much by Management.
As the problem involved something that could not be stopped with any level of certainty, we looked to implement a next generation endpoint antimalware solution with web app blocker. This is a good start and something that was lacking, a huge improvement over the standard Windows Defender antivirus.
We pushed forward to enhance the level of protection, by setting up Advanced Threat Protection in Office 365, which supplements our endpoint Web App blocker very nicely and allows attachments and URLās to be detonated in a cloud sandbox ā a bit like a sandpit for naughty files.
Combining these 2 solutions had lowered the Phishing Threat substantially. Outlook still has some inbuilt security features which are often disabled by default. Setting Outlook to not download pictures and images from external sources it is not familiar with helps to prevent phishers from knowing you have received their email and opened it.
Our client also had particular sensitivity to a threat to do with Excel spreadsheets ā they received a tremendous amount of these a week from external sources. With management blessing, it was deemed highly desirable to disable marcosās within Excel Spreadsheets incase employeeās actually fast clicked a malicious attachment. Along with arming Outlook with a feature to rename the last 3 letters of any potential malicious file extensions which prevents excel spreadsheets that have been received from external sources from opening easily.
Our client had an available, helpful part time IT person who worked happily through the safeguard implementation on each machine using our suggested roadmap and techniques.
Given that all of these safeguards were provided with a gradual roll-out plan, our client had minimal disruption. Although these controls may seem basic individually ā once combined can create a substantial barrier for phishing / malicious emails.
When we look at the controls in place, we can give a Qualitative rating on the mitigation measures we have put in place ā itās very hard to assign a Ā£ value to this.
Long term, the solution is permanent and the client is happy with the safeguards.
Our client requested a consultation from a qualified Cyber Security Consultant for a small project, it has been a particularly interesting one because thereās been such a strong focus one particular threat vector.
Preventative is always better than cure, but this does not mean throwing everything including the kitchen sink into the mix. You need to select technical controls that wonāt have a detrimental effect on user productivity – and all changes need a check and balance mechanism.