You are on page 1of 9

TRUST

June, 2008

a HALOCK newsletter

Inside this issue:

About TRUST 2

ISO Payoff 3

Day In The Life 4

Forensic File 5

Product Spotlight 6

Security Stat 7

Talk To Us 8 Michael Miles –CEO, SeatonCorp

Note From Halock 9

ISO Payoff
Return on investment
was a secondary goal, but
www.halock.com it came to the forefront
1-866-781-7799 for SeatonCorp
Trust
Pronunciation: \ˈtrəst\ Function: noun

“reliance on the integrity, strength, ability, surety, etc., of a


person or thing; confidence”

TRUST
a HALOCK newsletter
The TRUST newsletter is published quarterly to
disseminate readable, truthful and interesting
topics and stories with a singular focus on
information security and the people who ensure it.

We hope you enjoy this inaugural issue and we look forward to


your feedback.

Please feel free to contact our editor with kudos, gripes or just
plain comments.
trust.editor@halock.com

www.halock.com
ISO Payoff Return On
(ISO)

Investment
In a business environment where companies are increasingly pres- SeatonCorp now has the mature policies, tools, processes and tech-
sured to perform rigorous due diligence on all vendors and poten- niques to consistently perform successful audits and vulnerability
tial partners, having a mature information security program is criti- assessments when asked to do so by clients.
“SeatonCorp is in a cal. Michael Miles, SeatonCorp‟s CEO, is confident that implementing
position to manage For SeatonCorp, a Chicago-based recruiting and staffing company, an ISMS will yield better and more effec-
these customer and partner requirements dictated that they build tive information security investments. For the
significant amounts their information technology systems with security as a primary Also, having purpose-built their security whole
of personally- focus from the very beginning and build a best-in-class information program from the ground up with an eye story...
identifiable data.” security program. toward ISO 27001 registration, SeatonCorp
ISO 27001 registration is the end goal for SeatonCorp as it demon- looks to pursue certification as an early
strates to clients and other stakeholders that they are serious about adopter in order to achieve market distinction and demonstrate its
information security. commitment to information security, thus creating a significant

B
ringing to bear capabilities ranging from governance ROI and market advantage.
and network architecture, to systems hardening and The primary question pondered about any business investment is
secure application development, HALOCK acted as „does this investment contribute to my company‟s bottom line‟?
SeatonCorp‟s trusted information security advisor. With this in mind, SeatonCorp has seen that because their security
SeatonCorp received guidance during various reme- program is in place, is mature and aligns with applicable industry
diation efforts and an independent audit to ensure that Seaton- standards, their customers find it easier to move toward engage-
Corp‟s scheduled client deployments were uninterrupted. A road- ment with SeatonCorp as their full-service provider of choice.
map for building a Security Program that could be registered to the
ISO 27001 standard was also developed by the partnership.
In Our Next Issue: ROI on PCI

TRUST
a HALOCK newsletter
I Hack, Day in the Life

Therefore I Am...
A Bagel and Nutella for me, Iams puppy chow for Murphy. He‟s a Now to the office to harass my boss and prank our new admin assis-
three month old, 45 pound Newfoundland and I‟m a heavier, older tant. Too easy. A little blogging on my company‟s new blog. My
Ethical Hacker. boss gets nervous about this and requires that I get his approval before
My day starts as unglamorously as everyone else‟s. Shave, shower, posting something new. Sometimes I comply.
eat, commute. One of the things that wakes me up in the
morning is the laugh I get at the „breach of the day‟ SCIENCE
For more
through my Google alerts on my cell phone while on ethical
walking Murphy. Client Number 2 is an external penetration test and presents
a slightly stickier scenario. They have „protected‟ their hacking
It never fails to entertain! training

N
network with the latest and greatest. A fair job, actually.
ext on my agenda is checking From one of our lab machines I scan the client‟s inter-
email and voicemail, scan- net-accessible IPs to find that they have an IPS
ning the security blogs and (intrusion detection device) in place and it‟s
dropping flames on a few up-to-date, secure and blocks me out.
know-it-alls. Anonymously So I move to another machine, hack one
of course. Download a new of their web-facing applications over SSL
song from iTunes and load up the Nano for and find a forgotten input field that has no
the drive to work. validation. So I validate it. I validate the
hell out of it and launch a sweet little SQL
ART injection that opens up their employee data-
base to me. Nice of them to store their pass-
Jodi is her name. She works for Client Number words in clear text. Now I‟m one of them.
1 and is responsible for the front desk, reception, Customer data, inventory data, payroll data
executive support and keeping the coffee pot full. and on and on. It all goes in the report.
Overworked and a prime target to hand me the
keys to the kingdom. I call her and convince her that I need to help
A GOOD DAY‟S WORK
her save the day by making the printers talk to the computers better.
That gets me a seat in their conference room with a wall jack. It‟s Back at home with Murphy and the wife for a screening of Cloverfield
already over. Now that I‟m jacked in, I scan the network and cherry- and a Siberian Night microbrew stout from Thirsty Dog (no endorse-
pick the servers I want to see and the data I want to steal. Stealth is ment implied). Then off to bed after powering off the Wi-Fi router.
important and leaving no footprint is critical, „cause I may want to Just in case.
come back.

In Our Next Issue: Forensics Examiner


TRUST
a HALOCK newsletter
Forensic File
TRACKING A
DATA KILLER
IT’S ALL ABOUT REACTION TIME

I I
n a large East Coast cosmetics company, n a similar situation, a manufacturer begins
Rick runs the IT department. One of the to see the tell-tale signs of a breakin. Several
servers has begun to behave suspiciously, so customers are complaining that their credit
he installs a number of tools, such as cards have been used in an unauthorized
“HijackThis” which is a well known tool used by manner. The manufacturer is a supplier for their
In Case of experts to examine a system for unwanted guests. shops, and the only one that had that card on file.
Emergency Rick is an IT manager and he is very good at what Professional forensic experts triaged the site and
1-800-925-0559 he does, but malware detection and removal on
this scale, where the fear that
after conducting network traffic analysis decided
to image the servers when a
credit card information may VOIP packet was observed ac-
have been stolen, would have Lesson Learned: Act quickly and knowledging an SMTP packet.
been better left to the experts. carefully and call in the experts as Once the infection was discov-
New tools even allow for analy- soon as possible at the first sign of a ered and isolated, it was easily
sis of physical RAM. removed from the live server.
systems breach.
Rick, while well meaning, at- One must keep in mind, how-
tempts to “fix” the server on his own and as a ever, that not all malware can be removed suc-
result he destroys any evidence that may have cessfully. But if a breach is suspected, a forensic
existed. He also incapacitates the server, destroy- image should be created before extensive over-
ing much of the networking ability and taking the hauling of the server is undertaken and, before
web server offline. restarting and rebooting a machine where an in-
fection may exist, the physical memory should be
imaged.

TRUST
a HALOCK newsletter
In Our Next Issue: The Big Breach
O
nline Web-based all enterprise and Web
applications are applications handling credit
Product Spotlight increasingly at risk card and account information
from professional must undergo an extensive
hackers who target such and costly audit of custom
applications in order to application code.
commit data theft or fraud. The Barracuda Web
Being compromised can Application Controller
damage an enterprise‟s

Cover Your
protects Web applications
reputation, result in loss of and Web services from
customers and impact the malicious attacks while
organization‟s bottom line. increasing the performance
In addition, companies that and scalability of these
transact online are faced with applications.

Ass(ets)
a host of growing industry Barracuda Web Application
regulations such as the Controllers dominate the
Payment Card Industry Data market by continuing to
Security Standard (PCI break technology and cost of
DSS), which mandates that ownership barriers.

Barracuda’s Web Application  Cross Site Scripting (XSS)  Session hijacking  Path traversal
Controllers Protect You From:  SQL injection flaws  Application DOS  Header tampering
 OS command injections  Malicious probes/crawlers  Information leakage
 Site reconnaissance  Cookie/session tampering
More

TRUST
WAC
Stuff
a HALOCK newsletter In Our Next Issue: RSA To The Rescue
Security Stat
SEND

1
$ 97 .00
Free
vulnerability
testing

TO EACH OF
YOUR CUSTOMERS
In 2007, the total average cost of a data
breach increased to $197 per compromised
record, up from $182 in 2006, and from $138
in 2005.
For each reporting company, the average cost
for a data breach was more than $6.3 million
per breach and ranged from $225,000 to $35
million.

TRUST
Source
Ponemon Institute's 2007 Annual
Study:Cost of a Data Breach
a HALOCK newsletter
Call Us Anytime
1-866-781-7799
Talk To Us

Take A Poll - 1 Question, 10 Seconds, Big Prizes

Complete a Survey - 10 Questions, 100 Seconds, Bigger Prizes

Comment, Complain, Connect - trust.editor@halock.com

Did you get this newsletter


from a friend?

Don‟t miss an issue.


Subscribe here.

TRUST
a HALOCK newsletter
TRUST
a HALOCK newsletter
Note From Halock
www.halock.com
1-866-781-7799

Building a security program during uncertain times can be tricky. Your customers Assessing risk is the next step toward a mature, robust security program. Armed
want proof that your security program is worthy, regulators need proof of security with knowledge of what needs to be protected, the focus is now on how the
standards being practiced, and the government wants you to tape a piece of paper organization is currently protecting critical information assets. The ultimate goal
to your back that says “kick me” when you suspect a breach of private data. The of this stage is to develop a security roadmap to remediate identified risks and
challenge is getting more out of your security budget as recession fears spread vulnerabilities. In many cases the organization
through all industry sectors. may choose to accept certain risks. With
these known risks, stakeholders can now
make decisions. There is now a way to
HALOCK was founded on the principal of Purpose Driven Security, a professional prioritize known risks.
services method that enables our clients to better use their resources for optimal
security. Traditional information security firms have followed the „hammer and
nail‟ approach to working with their clients. They have their tools, and their goal At this point your organization can
is to map your needs to their limited toolset. move forward with confidence that it is
investing its limited resources
correctly. There should be little
guesswork in determining the
appropriate solutions with the best
Staying Secure In Uncertain Times return on security investment.

Thank you for reading the TRUST


newsletter. We hope you find it
Purpose Driven Security, on the other hand, starts with discipline; the discipline to valuable.
harmonize all of your security requirements including legislative, regulatory,
contractual and business. Having a security charter and information security
policy in place is the first step in avoiding the temptation of the blinking lights. WORK SAFE

The structure and make up of your security organization is critical in order to


move forward on items that pose risk to stakeholders and customers. Without a
functional security team and security committee in place, your organization will
not be able to prioritize information security activities. Is there ultimately one
person in charge of your information security risks? Does that person have the ear
of the board and shareholders?

Terry Kurzynski –CEO, HALOCK Security Labs

You might also like