Laura DiDio

Stu Sjouwerman Q&A: Security

Longtime security professional, Stu Sjouwerman is the founder and CEO of KnowBe4.com a Tampa, Florida-based security startup that specializes in on-demand Internet Security Awareness Training (ISAT). The company’s goal is to enable organizations to quickly solve the increasingly urgent security problem of social engineering and avoid attacks before they occur. Sjouwerman also publishes an Electronic newsletter called Cyberheist. Prior to founding KnowBe4.com, Sjouwerman was president, CEO and founder of Sunbelt Software – now GFI Software which makes the VIPRE security package. He is also the founder and former editor of the popular WServerNews electronic newsletter which has a worldwide distribution. ITIC recently sat down and interviewed Sjouwerman about security threats and how companies can defend themselves.

Laura DiDio, ITIC: Tell us about KnowBe4.

Stu Sjouwerman: We are next generation security awareness training. That means old style security training doesn’t cut it anymore – it’s not enough to follow dos and don’ts. We do simulated phishing attacks – fully automated – for customers to let them know who the culprits are in advance of an attack. It’s preventive. We train people to be well aware of phishing attacks that are out there. Our main focus is on phishing attacks but it’s not our only focus.

ITIC: What’s the top headline in security these days?

SS: Cybercrime is big business. It’s everywhere, but it’s especially proliferating and flourishing in Eastern Europe and Russia. There are many are ex-KGB agents who have teamed up with the local organized crime; they have a very well developed and broad criminal economy. There are social networks for cyber criminals and tons of technical support sites for malware. Business is booming: it’s at least a $1B a year industry and growing every day. It’s very easy and very profitable to be a cyber criminal.

ITIC: You’ve been in the security business for 15 years now. How have the security threats changed and evolved?

SS: In the last 15 years we’ve seen five generations of threats. Today’s security hacks and attacks have evolved; they are not the work of amateurs. It used to be that teenaged hackers did it for the thrill or to make a name for themselves and get hired to work for a security firm. Ten or fifteen years ago, hacking was a means to an end. Today hacking is the end game. The hackers have gone pro. And the security threats are much more professional and stealth-like which makes detection more difficult. Many organizations and individuals don’t find out until after the fact and it’s damaged their networks. Back in the “good old days” circa 1995, a company’s worst case scenario was a DOS attack which caused the server to go down and applications to be unavailable. In 2011 – soon to be 2012 – the threats are much worse. Organizations are facing two types of damage. The first is stolen customer data, Intellectual Property, corporate designs etc. Once it’s stolen, highly sensitive data oftentimes ends up for sale to the highest bidder on criminals’ social media networks. The second, very pernicious threat is that hackers frequently install a stealthy Trojan/key logger and at regular intervals it will send the information e.g. accounting information to the hackers. They literally take control of the account and transfer out the money in small chunks usually $10K at a time. It’s then forwarded on to their “money mules” and organizations lose monies. Once a company has been the victim of a cyberheist, recovering the money, tracking and prosecuting the hackers is difficult, time consuming and expensive.

ITIC: How aware are companies of these threats and do they take them seriously?

SS: Every organization: the largest businesses, small Mom and Pop shops, academic institutions, non-profits and religious institutions are all at risk. Nothing is sacred and no one is safe. The large enterprises like banks and brokerage houses, usually have good proactive defenses in place to minimize risk, delay and thwart attacks and to alert them when an attempt to penetrate the perimeter or network occurs. Ironically, the biggest threat facing companies – particularly SMBs – is a false sense of security. Many small businesses, non-profits and churchesare operating under a serious misperception that they’re too small to be of interest to hackers and thus they won’t be targeted. The Fortune 500 firms know they’re targets and have relatively good defenses in place. But these small businesses often do lag behind a bit in security awareness training unless they’re forced by SOX or HIPPA regulations to do security awareness training because they get audited. Some organizations just do it perfunctorily to pass a required audit and that just won’t cut it.

ITIC: What’s your advice to businesses?

SS: If you are a corporate cyberheist victims are NOT insured. The FDIC does not insure corporate accounts; they insure personal accounts. So the banks and insurance companies won’t refund your money UNLESS you purchase specific cyberheist insurance policies. Otherwise you’re SOL (shit out of luck) – and if the theft is big enough, many SMBs could find themselves out of business. The hackers are also not confining themselves to SMBs – they attack non-profits, local and municipal governments and churches with equal impunity.

ITIC: What proactive measures should organizations take to protect their businesses?

SS: First make sure that you have good quality anti-malware and keep it up to date and have a good firewall and then make sure you perform good quality security awareness training. You have to constantly reinforce that they need to be tested – we recommend testing at least once a week. The weakest link in any organization will be the users. The security perimeter has been broken thanks to mobile and remote users. The network and the firewall used to be the perimeter but the consumerization of IT has changed that. The hackers are now professional. The spear fishing attacks are very sophisticated.

ITIC: What should organizations and individuals look for?

SS: This sounds mundane, but never open an attachment that you didn’t ask for or one that came from an unknown source.

Be suspicious of all your Emails, even those from so-called trusted sources and friends because their accounts may be spammed or hacked. This includes things like direct messages from people you know and are friends with on the various Social Media sites like Facebook, Twitter and Yahoo. Pay very close attention to how your Email looks e.g., be on the lookout for spelling and grammatical errors and missing elements or things that just don’t appear right.

ITIC: Do you have any last insider tidbits for our readers?

SS: Yes, be aware that currently there’s only one bank that insures business accounts from cyber criminals and cyberheists and that’s JP Morgan Chase.

URL: http://www.knowBe4.com

Based in Tampa Bay, FL.

Stu Sjouwerman Q&A: Security Read More »

Direct Edge Stock Exchange – Richard Hochron

Direct Edge Stock Exchange Uses Microsoft SQL Server 2008 Parallel Data Warehouse to Scale Trading

Business Profile: Direct Edge Stock Exchange

“Microsoft Parallel Data Warehouse is a real win for us. The combination of SQL Server 2008 R2 and the PDW appliance is extraordinarily powerful. Our stock exchange needs very high reliability, very high processing speeds, excellent security and ease of use. SQL Server 2008 R2 and PDW delivers. The deployment was as smooth and seamless as Microsoft promised. We’re purchasing something that scales into the hundreds of terabytes range.”

– Richard Hochron, Chief Technology Officer at
Direct Edge Stock Exchange in Jersey City, N.J.

Direct Edge Stock Exchange – Richard Hochron Read More »

ITIC Survey Finds CRM Usage Soars Among SMBs, SMEs

Thanks to the 300 of you who took time out of your busy schedules to respond to the joint ITIC/GFI survey on customer relationship management and for OSF-Global in assisting us in composing the questions.

The survey results showed that nearly three-quarters – 74% — of companies are currently using a CRM solution and 57% of survey participants revealed that interest in CRM is increasing significantly. And perhaps most surprising, a 52% majority of survey respondents said they use more than 51% of their CRM solution’s functionality; of that number 18% utilize over 75% of CRM features.

CRM Usage Soars Among SMBs and SMEs

Customer relationship management (CRM) solutions long a staple in large enterprises are now also being widely embraced and deployed by small and mid-sized businesses to more efficiently track and manage businesses’ interactions with customers and partners. …

ITIC Survey Finds CRM Usage Soars Among SMBs, SMEs Read More »

Spring 2011: Hackers Had a Bonanza

Hackers have had a bonanza in April, May and June (so far). Nary has a day gone by without news of yet another major attack. Here’s a partial list of some of the most publicized hacks of the last 10 weeks:

RSA Security: On April 1, in a move akin to raiding Fort Knox, RSA’s Secure ID technology (one of the industry’s gold standards in security software) was hacked. RSA executives described the hack as “very sophisticated.” They characterized it as an advanced persistent threat (APT)-type targeted attack. It used a routine tactic – a phishing Email that contained an infected attachment that was triggered when opened.

Epsilon:  This Irving, TX –based company handles customer email messaging for over 150 firms, including large banks and retailers like Best Buy, JPMorgan Chase, Citigroup and L.L.Bean. In April, millions of consumers learned that Epsilon’s networks were breached when they received Emails from their banks and credit card companies informing them that the hack might have exposed their names and Email addresses to the hackers. Epsilon released a statement assuring consumers that only Email addresses and names were compromised and that no sensitive data was disclosed. …

Spring 2011: Hackers Had a Bonanza Read More »

Security Wars: Time to Use Continuous Monitoring Tools to Thwart Hackers

It’s time for corporations to wise up and use the latest, most effective weapons to safeguard and secure their data.

High tech devices, software applications, Emails, user accounts, social media and networks – even those presumed safe — are being hacked with alarming alacrity and ease.

Security tools, encryption and updating your networks with the latest patches are certainly necessary, but they are not enough. Corporations must arm themselves with the latest security tools and devices in order to effectively combat the new breed of malware, malicious code and ever more proficient hackers. I’m referring to the new breed of continuous monitoring tools that identify, detect and shut down vulnerabilities before hackers can find and exploit them. …

Security Wars: Time to Use Continuous Monitoring Tools to Thwart Hackers Read More »

2011 in High Tech YTD Part 3: Cisco Pulls Plug on Flip, Focuses on Core Competencies

Cisco Pulls the Plug on Flip

Following two consecutive fiscal quarters, Cisco Systems shocked the industry three weeks ago with the news that it will cease to manufacture its popular Flip video camera and will lay off the division’s 550 workers, substantially reducing its consumer businesses.

Also within the past two weeks, Cisco unveiled a voluntary retirement program aimed at workers 50 years old whose age plus tenure at the company equals 60; these workers have from May 10 through June 24 to opt in. This is the first time in two years that Cisco instituted such a cost cutting policy.

Cisco recently hired Gary Moore as Chief Operating Officer to fine tune its re-focused initiatives. …

2011 in High Tech YTD Part 3: Cisco Pulls Plug on Flip, Focuses on Core Competencies Read More »

2011 in High Tech YTD Part 2: Management Shakeups at Google, HP, Microsoft etc.

Revolving Door

In contrast to Apple’s stunning success, the first calendar quarter of 2011 was a revolving door for other Silicon Valley companies and executives. There were management shifts, shakeups and ousters at Advanced Micro Devices (AMD), Google, Hewlett-Packard (HP) and Microsoft. They were variously aimed at jumpstarting product momentum (AMD, Microsoft), polishing a tarnished image and placating stockholders (HP) and providing an orderly transition of power (Google).

You need a scorecard to keep up with all the comings and goings.

AMD’s board ousted chief executive Dirk Meyer in mid-January after only 18 months on the job. It then appointed Senior Vice President and CFO Thomas Seifert, as interim CEO while the search goes on for a permanent chief executive. Siefert continues as chief financial officer and says he does not want to be considered for the permanent CEO position. This is probably a smart move. AMD’s flamboyant co-founder Jerry Sanders spent 33 years as CEO (1969 to 2002), but everyone who’s followed has had a short tenure. …

2011 in High Tech YTD Part 2: Management Shakeups at Google, HP, Microsoft etc. Read More »

2011 YTD in High Tech: Bold Aggressive Actions

It’s hard to believe but the first quarter of 2011 is now a memory and we’re well into spring. The tone for the year in high technology was set in early January: fast, bold, aggressive action and sweeping management changes.

In the first four months of the year high tech vendors moved quickly and decisively to seize opportunities in established sectors (smart phones, virtualization, back-up and disaster recovery) and emerging markets (cloud computing, tablet devices and unified storage management). As 2011 unfolds, it’s apparent that high technology vendors are willing to shift strategies and shed executives in order to stay one step ahead of or keep pace with competitors. The competition is cutthroat and unrelenting. No vendor, no matter how dominant its market share, how pristine its balance sheet or how deep its order backlog and book to bill ratio dares relax or rest on its laurels for even a nanosecond.

Recaps of some of the year’s highlights thus far are very revealing. …

2011 YTD in High Tech: Bold Aggressive Actions Read More »

ITIC 2011 Reliability Survey: Users Give IBM AIX v7, Windows Server 2008 R2 Highest Security Marks

IBM AIX v7 and Windows Server 2008 R2 Highest Security Marks

Nine out of 10 — 90% — of the 470 respondents to ITIC’s 2010-2011 Global Server Hardware and Server OS Reliability survey rated the security of Microsoft’s Windows Server 2008 R2 and IBM’s AIX v7 as “Excellent” or “Very Good.” This was the highest security ratings out of 18 different Server Operating System distributions (See Exhibit below). Three-quarters or 75% of survey participants gave HP UX 11i v3 “Excellent” or “Very Good” security ratings; this was the third highest ranking of the 18 major server OS distributions polled. This was followed by Ubuntu Server 10 and Debian GNU/Linux 5, which tied for fourth. Seven out of 10 survey participants — 71% — of those polled ranked the two most popular open source distributions’ security as “Excellent” or “Very Good.” Red Hat Enterprise Linux v 5.5 and Novell SuSE Linux Enterprise 11, the two most widely deployed Linux distributions trailed Debian and Ubuntu but were nearly tied with each other in security rankings. Just over two-thirds — 67% — of Red Hat users rated its security as “Excellent or Very Good” while 66% of survey participants judging Novell SuSE Linux Enterprise 11 security to be “Excellent” or “Very Good.”

Some 58% of Apple Mac OS X 10.6 survey respondents rated its security as “Excellent” or “Very Good,” putting it at the bottom of the pack, beating only Oracle’s Solaris 10 which was rated “Excellent” or “Very Good” by 63% of respondents, which in the past two years has been notching modest gains among corporate users.

Also noteworthy was the fact that only a very small percentage of respondents gave thumbs down “Poor” or “Unsatisfactory” security grades to their server operating system vendors. In this category, Apple had the highest percentage of respondents – 7% — who gave its Mac OS X 10.6 both “Poor” and “Unsatisfactory” marks. This might appear puzzling to some since Apple’s users have long touted the security of the platform. Apple users have long boasted about the fact that there are far fewer viruses and malicious code written targeting Macs compared to Windows. However, now that Apple is once again re-emerging as a significant presence in corporate networks, the Mac OS X 10.6 will no longer enjoy the “security by obscurity” that it claimed as a standalone consumer OS. Macs, iPhones, iPads and tablets are becoming mainstream staples as business tools. Hence, the number of exploits, including such malware as worms, Trojans and bots that target the Mac is increasing commensurately. Apple will have to respond accordingly with tighter security. …

ITIC 2011 Reliability Survey: Users Give IBM AIX v7, Windows Server 2008 R2 Highest Security Marks Read More »

ITIC 2011 Reliability Shows that Dell, HP, IBM & Stratus Score High Marks for Service & Support

Dell, HP, IBM and Stratus Technologies won high praise from corporate users for their prompt and efficient after market technical service and support in the latest ITIC 2010-2011 Global Server Hardware and Server OS Reliability survey.

The results came from a broad based survey that polled organizations worldwide on the reliability, security and technical service and support from among 14 of the leading server hardware platforms and 18 of the most widely deployed server operating system distributions.

As we said in an earlier discussion, each poll elicits some surprising and unexpected revelations. In this survey, users reserved their highest encomiums and most critical barbs for the server hardware vendors – both in terms of product performance and reliability and the service and support they receive from their respective vendors. …

ITIC 2011 Reliability Shows that Dell, HP, IBM & Stratus Score High Marks for Service & Support Read More »

Scroll to Top