Monthly Archive June 2018
How phishing scams are getting schools into deep water
While many schools are concerned about the advent of the General Data Protection Regulation (GDPR) and what it means for the collection and holding of data, permissions and consent, they may be overlooking its key purpose: to keep data safe. This is particularly relevant at a time when schools are increasingly becoming targets for cyber criminals. According to recent research by specialist schools insurer Ecclesiastical Insurance 20 per cent of educational establishments have been targeted. While universities, on the whole, are better equipped to defend against attacks, schools are significantly more vulnerable; due largely to the ‘soft target’ presented by teachers and parents who are ill-equipped to deal with online fraudsters.
The report concludes that naivity is a key problem with many school communities still being largely unsuspecting of how cyber criminals operate. This presents very real implications for the safeguarding of data and children and, by default, adherence to GDPR. Security around social media is a particular problem, providing potential hackers with detailed information with which to bait their phishing hooks.
Common attacks include phishing scams where individuals are tricked into providing information which allows criminals access to the school system. Data theft is sometimes the goal and children’s medical records are, for example, reported to be lucratively traded on the Dark Web, providing details for fraudulent official documents. Sometimes the intention behind the attack is, however, purely financial with emails requesting payments providing links to rogue websites. A new type of scam has also developed called ‘whaling’ where finance directors or bursars are conned into transferring thousands of pounds into fake accounts.
Private schools are particular targets due to the high fees and in 2017 Insurance Times reported a scam where parents were sent fake emails which conned them into sending fee payments into the criminals’ account. In these instances, private schools are particularly at risk of damaging their reputations.
Yet, in institutions which trade in education, it is education regarding online safety that is the main problem. This is because, no matter how effective the online security strategy, it is the human element which most commonly leads to system breaches. Continuous and constant education – including awareness and training programmes – need to be in place to reduce the risk.
A key element is education around social media. Schools and educational trusts should prioritise providing strict guidelines for social media postings and other forms of publishing. This is because phishing expeditions frequently start with social media. Hackers use the information posted online to send relevant-sounding emails which create the impression of being legitimate, encouraging people to open and act upon them.
Phishing scams also enable hackers to gain access to the internal school systems. While these may be well-defended on the perimeter with firewalls and access restrictions, a simple phishing exercise can con individuals with restricted access into divulging further information. Once inside the system, cyber criminals may encounter little in the way of additional defences.
Phishing scams and social media are just one element of the problem facing schools. There are many important aspects to adhering to GDPR and building a robust online defence and we will be posting further blogs on this topic. If you wish to receive these please follow us on Linkedin.
Incident Response & Forensic Expertise Webinar – Would your business survive a cyber-attack or security breach?
As organisations endeavour to be as proactive as possible to protect themselves from a cyber attack or security incident, do you have access to the correct expertise to respond efficiently, limit the impact and minimise disruption if you were to suffer a breach?
Watch this recording of the informative webinar where Alan Batey, Head of the SRM forensic team, takes you through:
- What is a retained Incident and Forensic response service?
- Why do organisations need it?
- What is the impact of not having it?
- Why is there such a market appetite for this service in the current climate?
- Followed by a Q&A
To view, click this link.
Wondering where DPA and GDPR overlap? The Yahoo! ruling by ICO can provide some clarity
A recent investigation by the Information Commissioner’s Office (ICO) highlights an interesting aspect of the current system. Although the ruling against Yahoo! was announced on 12th June 2018, three weeks after the enactment of the General Data Protection Regulation (GDPR), the incident was considered under the Data Protection Act 1998. This is because the breach actually occurred in November 2014, although it was not publicly disclosed until September 2016, almost two years after the attack compromising 515,121 accounts had taken place. Investigated under the DPA, the fine was a modest £250,000. Naturally this would have been significantly larger had it been judged under GDPR.
However, this does mean that today’s organisations can take their foot off the gas. At the time of the investigation taking place, although it was considered under the DPA, the ICO still expects to see adherence to GDPR going forward.
This isn’t ‘new’ news to the SRM team. We had anticipated the issue and had submitted this question to the ICO months ago:
If a breach occurred before 25th May but is not discovered until after GDPR becomes effective, will the breach be considered under the DPA 1998 (when it occurred) or under GDPR (when it was discovered)?
We received this reply from the ICO:
It is likely in this instance that the breach would be assessed under the DPA, the legislation in force at the time of the breach. However, we would expect the processing of information at the time the breach was discovered to be GDPR compliant. Therefore any lessons learned or actions taken as a result of the breach would need to be in line with the GDPR.
So what does this mean in simpler terms? It means that from 25th May 2018 every aspect of an organisation’s networks and infrastructure is required to be managed in line with the requirements of GDPR. This applies even if the actual breach is judged under the rules of the old Data Protection Act (1998).
The most important point is that a notifiable breach must be reported to the ICO without undue delay, but no later than 72 hours after becoming aware of it. So even if a breach actually occurred prior to 25th May, as soon as the breach is discovered, the new 3 day reporting timescale must be adhered to. The organisation’s systems will then be scrutinised through the prism of GDPR.
Should it not be possible to obtain all of the necessary information within 72 hours, the required information can be provided in phases, as long as the investigation is conducted as a priority. The breach still needs to be reported to the ICO when the organisation becomes aware of it, and they must submit any further information at their earliest convenience.
Having a Retained Forensics engagement in place makes the whole process significantly more efficient. Not only will they have a detailed knowledge of an organisation’s systems and networks, they will have helped to set up breach notification protocols and mitigation strategies; all of which will already be in line with the requirements of GDPR.
For more information on GDPR see our website.
To find out more about Retained Forensics, register for SRM’s free webinar: Incident Response & Forensic Expertise: would your business survive a cyber-attack or security breach?
Or read our blog:
The GDPR compliance fallacy
The key to GDPR is common sense
The GDPR compliance fallacy
There is a curious irony that the enactment of the General Data Protection Regulation (GDPR), drawn up to protect the rights of individuals and their right to online privacy, has brought about an unprecedented torrent of spam. In the fortnight leading up to 25th May, inboxes were filled with emails asking people to opt in to mailing lists, supposedly so that the organisation in question could comply with the requirements of GDPR. There are two fallacies to be addressed here.
Firstly, although individuals should be given the option to be removed from any mailing list, if they have willingly provided their contact details to the organisation and that organisation has maintained a record of the data collected, with the data subject being informed about what the data would be used for and for how long it would be kept, their consent may be considered to be implicit. In these circumstances new explicit consent is not required.
Secondly, although the principles of GDPR are enshrined in UK law and failure to adhere to them can lead to significant fines, there is currently no concrete GDPR compliance process. It is expected that a GDPR compliance standard will be drawn up in the near future, but for now, organisations can use the organisational governance requirements provided by the Payment Card Industry Data Security Standard (PCI DSS) or ISO 27001 to provide a helpful framework. It is then the responsibility of the organisation’s Data Protection Officer (DPO) or Chief Information Security Officer (CISO) to ensure that the additional requirements of GDPR are included in their systems. These are just two of many fallacies surrounding the GDPR.
Having detailed information security policies and procedures is an important step, but on their own will not ensure that the requirements of GDPR are satisfied. Plans and policies simply demonstrate management intent and will be ineffective in satisfying the requirements of GDPR unless clear guidelines are provided in an easily understood format, to the grass roots of an organisation. Many businesses would do well to use some of the energy expended in communicating with their customers on ensuring a good channel of communication around GDPR with their employees.
It is important to remember that GDPR should not be seen as a burden but rather a positive force for change, focusing attention on implementing better processes for how we collect, store and manage data and thereby enhancing and building better customer relationships.
Professional expert guidance will assist in streamlining this process. SRM’s GDPR team provides a business-focused service to organisations of all types and size at all ends of the GDPR-readiness spectrum. We have operated in this arena for many years and our GDPR consultants have undertaken GCHQ certified training. We can also take on the full CISO or DPO role if required.
To gauge your level of GDPR readiness, see our step by step self-assessment guide.
See our GDPR web page.
Or visit our blog:
The key to GDPR is common sense
How PCI compliance puts you on course for GDPR
The A to E of cyber maturity
In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading system. With ‘A’ being the most robust in terms of cyber security maturity and ‘E’ being the weakest, it put the Philippines in class D. The reasoning behind this grade stems from the fact that they are reactive to attack using only the available tools and technologies. They do not proactively seek out vulnerabilities and exploit them to ascertain the extent of a weakness. Nor do they deploy cutting edge strategies or prepare for the process of remediation to address the issues ahead of time.
This reactive approach is not limited to the Philippines. Far from it. In fact, these same principles can be applied to a frightening number of organisations across the globe. Those who simply react are always behind the curve, attempting to patch and mediate the impact of attacks on an ad hoc basis. An immature organisation focuses simply on prevention and regulatory compliance but with limited co-ordination, using basic technology and simple configurations.
In contrast, those with cyber maturity demonstrate their vigilance by employing a proactive strategy rather than simply waiting for a breach to occur. So what are the characteristics of cyber maturity?
- To begin with, in a mature organisation, cyber security is not seen as something that should be done, but is already embedded within the fabric and culture.
- Information and cyber security is not the responsibility of an overstretched CISO, who reports only to the head of the IT department. It is in the hands of a CISO who is well resourced, supported and who exerts confident influence at board level.
- Information security policy and testing is documented and has a formal structure, using automated tools, regularly scanning systems and web applications to identify any vulnerabilities in a proactive way.
- A mature organisation has built-in enterprise security technology architecture and strict focus on incident prevention, detection and response; regularly undertaking advanced and manual penetration testing to uncover weaknesses in the ever-changing scope.
- Business Continuity and Disaster Recovery Planning are integral to a mature organisation, together with the associated training across all staff, not just those within an IT or infosec department.
Our recent blog post on the topic of the NHS’ response to WannaCry highlights a ‘work in progress’ but certainly an admirable move towards cyber security maturity. Their plans centre around Test and Exercise methods, and are inclusive of annual Red Team Engagements to push their plans to the limits and ensure complete peace of mind.
SRM’s Test and Exercise (T & E) team works with all sizes and types of organisation to achieve cyber maturity. With wide experience in other areas of information security consultancy the T & E programme is not conducted in isolation but within the wider context of a client’s business activity. Every project is bespoke and our team includes consultants who are CREST ethical security testers as well as those with the Offensive Security Certified Professional (OSCP) qualification. Additionally, we often work with CISOs and organisations to develop and implement proactive robust and innovative T & E plans.
For more information on our T & E team, visit our website.
See a recording of our webinar: Incident Response & Forensic Expertise – would your business survive a cyber attack or security breach?
Or see our blog:
What we can all learn from the NHS response to WannaCry
Three stages to building a robust defence against external threats
Cyber resilience: it’s a board level issue