e-Management brings commitment, expertise and proven success to every opportunity.
Solutions

Archive for April, 2010

Can you be used as a pawn?

Tuesday, April 20th, 2010

 By Douglas Pitcher, e-Management

Today, as the lines between home and work computing continue to blur, organizations need to be concerned with their employees’ security practices on their home wireless networks. The last thing you want is for a hacker to compromise an employee’s computer via an under-secured home wireless connection, and then quickly and efficiently travel down that handy remote user Virtual Private Network (VPN) tunnel straight into your business’s network. Not surprisingly, IT managers are now deploying training on wireless security, specifying wireless router hardware and/or configuration settings, and in some cases, providing firewall/VPN endpoint appliances (managed from the data center) for key employees’ in-home use. Educating employees on the secure use of wireless home networks can be as simple as reviewing the practices of “SAFE WIFI.”
isitsafephotoSSID Broadcasting “OFF”
Activate WPA2 encryption and authentication
Firewalls (and especially proxy-based firewalls) are best
Employ strong passwords

Web controls
Inactivate “automatically connect to non-preferred networks”
Filter MAC addresses “ON”
IPSec VPN as remote connection to the office

SSID broadcasting “OFF”
There is really no reason to broadcast your home wireless network SSID. Liken it to the risk you take when you put a sign outside your house with not only your last name, but the first names of all who live there. In providing your name and address, and given the ease by which criminals can obtain additional information about you on the Internet, you make a good identity theft target.

Activate WPA2 encryption & authentication
You have three standard choices for securing your wireless communications. They are, in order of increasing security: WEP, WPA, and WPA2. Also, of course, you could choose to not enable any of these, and then all it would take is someone with the right “tuner” to pick up your radio signal and “listen in” on all of your communications; or worse yet, to use your wireless signal to hack into your computer and other connected networks. WEP provides very little protection. On the other hand, WPA and WPA2 offer encryption for the initial negotiation as well as the later communication packets, with WPA2 offering stronger encryption. It is generally thought that this encryption is likely to be hacked at some point in the future, but for today’s home user, it’s a good security option for now.

Firewalls (and especially proxy-based firewalls) are best
More and more, we are seeing firewalls employed in home networks as an effective way to beef up security. Check to make sure that your wireless router has firewall capabilities, or better yet, add a firewall device in-line for better security. Looking to tighten the wrench one more turn for increased home network security? Then, your firewall should offer “proxy-technology” for true application layer security—a step above standard packet filtering.

Employ strong passwords
Today’s strong passwords are at least 13 characters, they use upper case, lower case, numbers and symbols; they use nonsense words, and have no direct connection to the user. An example of strong passwords would be:
“When U W1sh upon a St@r” or “Yr10Mth03ihtcts4us” (Year 2010 Month 03 i have to change the scheme 4 us)

Web controls
Today’s cyber attackers aren’t just adolescent pranksters. Hackers include organized crime; and it’s big business. Their tactics are sophisticated and they make special efforts to get victims to go to phony web sites that look real. Once there, they get you to enter personal information so that they can steal from you directly. Given today’s’ environment, it just makes sense to limit where you and family members visit on the Internet. Limiting Internet activity to known good areas will help you to achieve a secure home network.

Inactivate “automatically connect to non-preferred networks”
Another way that criminals can gain access to privileged information and then use it to hack into your wireless network is by setting up a rogue access point. In other words, they place an access point in range of your home and then try to get you to log on to the rogue AP. Usually, if they can reduce the signal of your wireless router enough, and you have “automatically connect to non-preferred networks” activated, then you will likely connect to the rogue without even knowing it. Therefore, to reduce threats from rogue access points, you need to inactivate this setting.

Filter MAC addresses “ON”
Another option you have is to set up your wireless router to only allow known computers to connect to the network. It is still possible to “spoof” a MAC address. So, this makes it so much harder for someone to hack into your wireless network. You get enough of these annoyances, and you are just too much trouble for the average hacker. That’s a good “problem” to have.

IPSec VPN as remote connection to the office
Why are hackers interested in your home wireless network? It depends. A few cyber crooks specialize in identity and consumer theft. Others are after bigger fish—namely, your employer. More and more employees are working from virtual or remote home offices and it is perceived that the remote network connection has more lax defenses than other network interfaces. Criminals see this is as an opportunity to penetrate the corporate network perimeter in order to reach a bigger payoff.

Did you know that entire botnet armies are set up to recruit until they find the right path into a target company? For this reason, your home network wireless security and your VPN connection to the network resources both contribute to a safe computing environment.

While there is no guarantee for 100 percent hacker-free security, the “SAFE WIFI” practices package some of the best security that is commonly available with today’s commercial products, to make your home wireless network a less attractive target for criminals. However, this is a rapidly changing environment, and you will want to keep the lines of communication open with reputable resources and your corporate IT manager so that you can enjoy the convenience of wireless communication in the home now and in the future.

Cyber Bad Guys vs. You
So, what steps are you taking to protect your home and office network from cyber bad guys? Have you been a target of hackers? If so, how did you resolve your issues? Do you have any questions for our cyber experts?

How Risky is Spring?

Wednesday, April 7th, 2010

Commonalities between IT Security Training and a Gardener’s Risk Assessment

By Rick Randall, e-Management

Spring is in the air! Garden enthusiasts in the Washington, D.C., area (like me) have been waiting all winter to begin the tasks of preparing our soil and planting cold-hardy vegetables and flowers. My young children have helped me plant radish and carrot seeds, chrysanthemum (mum) seedlings, and iris bulbs over the past few weekends. Gardeners, like artists, enjoy taking plain raw materials and converting them into something beautiful. But there is a risk that our efforts could fall flat. How do we take control of the risks? I’ll come back to this shortly.

PlantGrowingIt’s true that I am a gardener. But I am also an information technologist. In my profession, we apply many concepts in our daily work, which have similarities to the physical world. For instance, good software engineers have seen the parallels between designs in the physical world and the design of software (using a collection of concepts called design patterns) for years. Likewise, IT security trainers observe and apply learning patterns for explaining complex topics to students through stories, metaphors, and exercises.

What’s the point to all of this?
No matter how supposedly “non technical” an executive or staffer may be, there are techniques which can be used to convey technical subject matter to anyone in a comprehensible manner. For example, e-Management uses the following graphic to explain risk management concepts to federal executives having Designated Approving Authority (DAA) responsibilities for IT systems. I have a friend who recently commented on the analogies between software vulnerabilities in web applications and weeds in a garden. Both phenomena are ubiquitous.

So, does your organization have a green thumb when it comes to managing your IT or agency risks?
RiskAssessmentBack in December, e-Management presented a webinar on exploiting web applications. I would be interested in hearing your opinions as to whether you feel vulnerable software is like a “weed,” or a more menacing threat like a ravenously hungry deer, which reduces your gardening investment to ruins. Even more, what threats do you see in your IT environment, which have analogies to gardening? What is your approach to eliminating the “weeds,” or threats that put your mission at risk? Have you ever seen a successful plan to control the IT “weeds” that always seem to pop up every season?