SlideShare a Scribd company logo
Restricting
Authenticating
Tracking
User Access?
Time Is Not
On Our Side!
Page 1 of 6
The 2015 worst password list was published recently(1). The list is only one confir-
mation that leaving password controls to the end user is not secure. Verizon’s 2015
Data Breach Investigations Report(2) revealed that most breaches resulted from
harvested credentials. And recently, a former executive for the Cardinals pleaded
guilty to accessing the Astros’ player database and email system(3). He gained access
by learning the account and password from an employee who turned in their laptop.
This type of breach has become much too commonplace.
If you haven’t already, it’s time to take action and migrate to multifactor authentica-
tion. There is a sound ROI for the investment, and VIMRO is extremely committed
to helping our clients migrate to multifactor authentication in 2016!
Why Password Don’t Work
There is no shortage of case stories presenting a strong case and confirmed ROI
for moving to multifactor controls. Here are a few examples:
• In addition to the Verizon 2015 Data Breach Investigations Report we referenced
above, Wired published an article about the breaches of 2015(4). Most of the year’s
largest hacks involved weak authentication. Multifactor controls would drastically
reduce or eliminate this threat. (see reference #6)
• When the VIMRO Cyber Security Team conducts penetration tests, we almost
always gain access to our clients’ systems via captured credentials. There are so
many attack vectors to obtain passwords! Multifactor controls would considerably
reduce or eradicate the following vulnerabilities:
o Through social engineering, in which a workforce member sends us their
passwords, tells us their passwords, or enters their passwords into a simulat
ed cybercriminal fake web site;
or
o By intercepting them when conducting man-in-the-middle attacks (in
which an attacker secretly relays, often altering, the communication between
two parties who believe they are directly communicating with each other);
or
o By gaining access to the password database/file when breaching a weakly
configured or patched system, and then cracking the records with a pass
word-cracking application, such as L0phtCrack, OphtCrack, RainbowCrack,
Cain and Abel, John the Ripper, etc.
12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191
Passwords Don’t Work: Multifactor Controls Are the Answer
Learn how to demonstrate ROI
There is a sound
ROI for the
investment of
Multifactor Controls
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 2 of 6
With the right
methodology, ROI
is easy to
Demonstrate
The VIMRO security team’s work involves traveling. We overhear a lot of phone
conversations when we’re in the airport. On many occasions we overhear support
calls. Most support calls we hear involve a traveler forgetting their password, which
is understandable given the stresses and distractions of travel. We often can gather
where the individual works, their account name, and, yes, even their password,
which they typically repeat after a support person gives it to them over the phone.
Here are a few default passwords that we have recently heard in our travels:
• Winter2015! (It would be a reasonable guess that the next one is going to
be Spring2016! or some derivative.)
• “name of company”!@#abc
• “person’s name”1234
If we were criminals, or even if we were ethically conducting a social engineering
experiment by sitting in the airport and listening to calls, we’re pretty confident that
we would be able to gain unauthorized access to the individuals’ respective organi-
zations. Once again, the solution calls for multifactor controls.
ROI for Multifactor Authentication Controls is Easy to Demonstrate
All clients need to demonstrate an ROI when they present their solution to a prob-
lem. Using passwords only is a major problem. The likelihood of a breach due to
weak authentication is high, based on the following risks/threat examples:
• phishing (attempt to acquire sensitive information by masquerading as a
trustworthy entity in an electronic communication)
• man-in-the-middle
• gaining access to the password file database
The impact of a breach can be high in terms of hard costs:
• remediation/corrective action
• breach notification letters and credit monitoring for each record
compromised
• lost sales/consumer confidence
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 3 of 6
Compare,
Contrast,
Evaluate the
Products that
Meet YOUR Needs.
In most cases, when VIMRO conducts an ROI assessment for multifactor controls,
we can demonstrate to our client that the control is less expensive than the hard
costs associated with one mere breach. And this doesn’t even include implied costs:
it’s much harder to demonstrate a breach’s effect on a company’s reputation.
Indeed, in talking with most C-level executives, we learn that their company’s repu-
tation among its customers and shareholders is one of their top concerns, and that
any crack in that reputation is, in fact, associated with a high cost.
Conduct an IT Component and Sensitive Data Inventory
Demonstrating an ROI for multifactor controls is the easiest part of the project. In
the next phase of a multifactor implementation project, identify how the solution
will be used. This involves in-depth knowledge of your environment. Most clients
utilize the CIS Critical Security Controls(5) to acquire and manage this information.
Specifically:
• CSC 1: Inventory of Authorized and Unauthorized Devices
• CSC 2: Inventory of Authorized and Unauthorized Software
The inventory should include where sensitive data resides and how authentication is
currently handled. Dataflow diagrams also help provide a detailed understanding of
all of the components involved in sensitive data transmission, processing, and
storage. This enables efficient and effective implementation of the multifactor
solution.
Once the inventory is conducted, create a list of criteria that the multifactor solu-
tion must meet. We have provided a list of common requirements among VIMRO
clients in Attachment 1.
Evaluate Products that Meet Your Needs
There are many good multifactor authentication products on the market. VIMRO is
vendor-agnostic, so we help our clients research three or four or more products that
work best for their needs, but we do not promote one product over another.
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 4 of 6
Vet the strategy
by conducting a
pilot project.
One of our methods for identifying the best candidates for our clients’ evaluation is
suggesting solutions that worked well for similar organizations. We add those
vendors to the evaluation list in Attachment 1. We also identify good solution
candidates by staying current with industry reporting on these products. Some good
resources for this are:
• Search Security: http://searchsecurity.techtarget.com/feature/The-funda
mentals-of-MFA-Comparing-the-top-multifactor-authentication-products
• Forrester: https://www.forrester.com/How+To+Get+Away+With+Mur
der+Authentication+Technologies+That+Will+Help+You+Kill+Pass
words/fulltext/-/E-res126341
• Gartner: https://www.gartner.com/doc/2930517/magic-quadrant-us
er-authentication
• SANS: https://www.sans.org/reading-room/whitepapers/authentication
• SC Magazine: http://www.scmagazine.com/two-factor-authentica
tion-smart-cards-tokens/products/83/0/
Conduct a Pilot Project
VIMRO recommends that you conduct a pilot project using the one or two high-
est-scoring solutions on your evaluation sheet. Together we will select one or two
users from each of your organization’s business units. VIMRO recommends
mixed-skill pilot groups consisting of power users, intermediate users, and users
needing more support than most. This provides you with adequate feedback to
conclude whether the solution will work for your organization.
Documentation
Thorough documentation is critical to a successful implementation and lifecycle of
the multifactor solution. Dedicate resources to documenting everything. This
includes:
• Design documents
• As-built documents
• Support documents
• User instructions
• Pilot project lessons learned
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
Passwords Don’t Work:
Multifactor Controls Are the Answer
Learn how to demonstrate ROI
Page 5 of 6
...must conduct
continuous exercises
that test the
effectiveness of
training.
Awareness Training is Still Important
Multifactor controls are critical, but it is still important to have a layered defense.
This is especially true when it comes to protecting your user. Multifactor controls
can be compromised if a user shares their verification code with an attacker
through social engineering(6). It is important to conduct cyber security awareness
training with workforce members and to conduct continued exercises that test the
effectiveness of your training program. See VIMRO’s “Strengthening the Weakest
Link”(7) paper for more information.
Conclusion
Antimalware, IDS/IPS, and firewalls have become important tools to protect
businesses over the years. Breach data and research prove that ever-increasing
threats now require the use of multifactor controls to protect our businesses,
employees, and customers.
We encourage you to contact VIMRO to discuss how we can help make multifactor
controls part of your business practices.
References.
(1) 2015 Worst Password List: http://www.theguardian.com/technology/2016/-
jan/20/123456-worst-passwords-revealed
(2) Verizon 2015 Data Breach Investigations Report: http://www.verizonenterprise.com/D-
BIR/2015/
(3) Ex-Cardinal Executive Pleads Guilty to Accessing Astros’ Database: http://espn.go.com/ml-
b/story/_/id/14531169/christopher-cor-
rea-former-st-louis-cardinals-executive-pleads-guilty-hacking-houston-astros-database
(4) Wired List of 2015 Largest Hacks: http://www.wired.com/2015/12/the-years-11-big-
gest-hacks-from-ashley-madison-to-opm/
(5) CIS Critical Security Controls: https://www.sans.org/critical-security-controls
(6) Two-Factor Authentication Social Engineering Vulnerability: http://www.homelandsecuri-
tynewswire.com/dr20160204-vulnerability-found-in-in-twofactor-authentication
(7) VIMRO Strengthening the Weakest Link Paper: https://www.vimro.com/wp-content/up-
loads/2015/12/Strengthening-the-Weakest-Link-151210_2225opt.pdf
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Passwords Don’t Work:
Multifactor Controls Are the Answer
Attachment 1 – Multifactor Authentication Evaluation Requirements
Page 6 of 6

More Related Content

PDF
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
PDF
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
PDF
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
PDF
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
PDF
2014 ota databreachguide4
PPTX
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
PDF
Cybersecurity: Whose job is it anyway?
PDF
SecurityScorecard_2016_Financial_Report
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
2014 ota databreachguide4
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
Cybersecurity: Whose job is it anyway?
SecurityScorecard_2016_Financial_Report

What's hot (20)

PDF
2016 Finance industry cybersecurity report
PDF
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
PDF
The Newest Element of Risk Metrics: Social Media
PPTX
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
PPTX
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
PDF
Critical Update Needed: Cybersecurity Expertise in the Boardroom
PDF
IT Security in the Legal Sector - recruiting in a skills gap environment
PDF
Why Passwords are not strong enough
 
PDF
You Are the Target
 
PDF
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
PDF
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
PDF
Cyber Claims: GDPR and business email compromise drive greater frequencies
PDF
ultimate-guide-to-getting-started-with-appsec-veracode
PDF
Ultimate_Guide_to_getting_started_with_AppSec
PDF
RSA Monthly Online Fraud Report -- February 2014
 
PDF
Enabling a Zero Trust strategy for SMS
PDF
Cyber Review_April 2015
PDF
Forcepoint Whitepaper 2016 Security Predictions
PDF
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
PPTX
Data Breach from the Inside Out
2016 Finance industry cybersecurity report
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
The Newest Element of Risk Metrics: Social Media
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Critical Update Needed: Cybersecurity Expertise in the Boardroom
IT Security in the Legal Sector - recruiting in a skills gap environment
Why Passwords are not strong enough
 
You Are the Target
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Cyber Claims: GDPR and business email compromise drive greater frequencies
ultimate-guide-to-getting-started-with-appsec-veracode
Ultimate_Guide_to_getting_started_with_AppSec
RSA Monthly Online Fraud Report -- February 2014
 
Enabling a Zero Trust strategy for SMS
Cyber Review_April 2015
Forcepoint Whitepaper 2016 Security Predictions
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Data Breach from the Inside Out
Ad

Viewers also liked (13)

PPTX
Kevincito
RTF
Curriculum vitae
PPT
Juego educativo sobre animales en extención.
PDF
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
PDF
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
PPTX
Redes inalambricas
PDF
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
PPT
Sejarah smk gajah berang
PDF
El Periódico (13/03/2013)
PPTX
CAS State of the Project 2016
DOC
Sijil pertandingan kebersihan 2015
PPTX
Derecho Concursal y Atraso
PDF
Entrevista en El Economista (18/022013)
Kevincito
Curriculum vitae
Juego educativo sobre animales en extención.
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Redes inalambricas
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Sejarah smk gajah berang
El Periódico (13/03/2013)
CAS State of the Project 2016
Sijil pertandingan kebersihan 2015
Derecho Concursal y Atraso
Entrevista en El Economista (18/022013)
Ad

Similar to Passwords don't work multifactor controls do! (20)

PDF
Web Application Security Testing Guide | Secure Web Apps
PDF
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
PDF
network-host-reconciliation
PDF
Cyber Security Audits and Risk Management 20160119
PDF
Cyber security audits and risk management 2016
PDF
Cyber Security Audits and Risk Management 20160119
PDF
Cyber Security Audits and Risk Management 20160119
PDF
Cyber security audits and risk management 2016
PDF
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
PDF
Understanding the Role of VAPT Testing in Compliance and Regulatory Standards...
PPT
M Kamens Iia Financial Services Presentation At Disney
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
Website Security Statistics Report 2013
PPTX
Why Two-Factor Isn't Enough
PDF
Quantifying Cyber Risk, Insurance and The Value of Personal Data
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PDF
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
PPT
NH Bankers 10 08 07 Kamens
PDF
How to build a highly secure fin tech application
PDF
securityattackvectorsslidesharefinal-160405191759.pdf
Web Application Security Testing Guide | Secure Web Apps
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
network-host-reconciliation
Cyber Security Audits and Risk Management 20160119
Cyber security audits and risk management 2016
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
Cyber security audits and risk management 2016
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Understanding the Role of VAPT Testing in Compliance and Regulatory Standards...
M Kamens Iia Financial Services Presentation At Disney
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Website Security Statistics Report 2013
Why Two-Factor Isn't Enough
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
NH Bankers 10 08 07 Kamens
How to build a highly secure fin tech application
securityattackvectorsslidesharefinal-160405191759.pdf

More from FitCEO, Inc. (FCI) (13)

PDF
HIPAA and HITECH Compliance Guide
PDF
Data exfiltration so many threats 2016
PDF
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
PDF
VIMRO Cyber Security Methodology
PDF
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
PDF
The Demystification of successful cybersecurity initiatives.
PDF
Internet of Things - A Different Kind of Scary v2
PDF
Cyber Insurance - What you need to know
PDF
SCADA Exposure Will Short-Circuit US Utilities
PDF
PCI DSS Reaper - Are you ready - VIMRO
PDF
IPV6 a tale of two protocols
PDF
CODE INSPECTION VIMRO 2015 MHF
PDF
MHF-joins-VIMRO-Press-Release-FINAL3
HIPAA and HITECH Compliance Guide
Data exfiltration so many threats 2016
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
VIMRO Cyber Security Methodology
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
The Demystification of successful cybersecurity initiatives.
Internet of Things - A Different Kind of Scary v2
Cyber Insurance - What you need to know
SCADA Exposure Will Short-Circuit US Utilities
PCI DSS Reaper - Are you ready - VIMRO
IPV6 a tale of two protocols
CODE INSPECTION VIMRO 2015 MHF
MHF-joins-VIMRO-Press-Release-FINAL3

Recently uploaded (20)

PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Architecture types and enterprise applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Tartificialntelligence_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
project resource management chapter-09.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
The various Industrial Revolutions .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Module 1.ppt Iot fundamentals and Architecture
Group 1 Presentation -Planning and Decision Making .pptx
Developing a website for English-speaking practice to English as a foreign la...
Architecture types and enterprise applications.pdf
Programs and apps: productivity, graphics, security and other tools
Tartificialntelligence_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
STKI Israel Market Study 2025 version august
project resource management chapter-09.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
observCloud-Native Containerability and monitoring.pptx
WOOl fibre morphology and structure.pdf for textiles
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DP Operators-handbook-extract for the Mautical Institute
The various Industrial Revolutions .pptx

Passwords don't work multifactor controls do!

  • 1. Restricting Authenticating Tracking User Access? Time Is Not On Our Side! Page 1 of 6 The 2015 worst password list was published recently(1). The list is only one confir- mation that leaving password controls to the end user is not secure. Verizon’s 2015 Data Breach Investigations Report(2) revealed that most breaches resulted from harvested credentials. And recently, a former executive for the Cardinals pleaded guilty to accessing the Astros’ player database and email system(3). He gained access by learning the account and password from an employee who turned in their laptop. This type of breach has become much too commonplace. If you haven’t already, it’s time to take action and migrate to multifactor authentica- tion. There is a sound ROI for the investment, and VIMRO is extremely committed to helping our clients migrate to multifactor authentication in 2016! Why Password Don’t Work There is no shortage of case stories presenting a strong case and confirmed ROI for moving to multifactor controls. Here are a few examples: • In addition to the Verizon 2015 Data Breach Investigations Report we referenced above, Wired published an article about the breaches of 2015(4). Most of the year’s largest hacks involved weak authentication. Multifactor controls would drastically reduce or eliminate this threat. (see reference #6) • When the VIMRO Cyber Security Team conducts penetration tests, we almost always gain access to our clients’ systems via captured credentials. There are so many attack vectors to obtain passwords! Multifactor controls would considerably reduce or eradicate the following vulnerabilities: o Through social engineering, in which a workforce member sends us their passwords, tells us their passwords, or enters their passwords into a simulat ed cybercriminal fake web site; or o By intercepting them when conducting man-in-the-middle attacks (in which an attacker secretly relays, often altering, the communication between two parties who believe they are directly communicating with each other); or o By gaining access to the password database/file when breaching a weakly configured or patched system, and then cracking the records with a pass word-cracking application, such as L0phtCrack, OphtCrack, RainbowCrack, Cain and Abel, John the Ripper, etc. 12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191 Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI There is a sound ROI for the investment of Multifactor Controls
  • 2. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 2 of 6 With the right methodology, ROI is easy to Demonstrate The VIMRO security team’s work involves traveling. We overhear a lot of phone conversations when we’re in the airport. On many occasions we overhear support calls. Most support calls we hear involve a traveler forgetting their password, which is understandable given the stresses and distractions of travel. We often can gather where the individual works, their account name, and, yes, even their password, which they typically repeat after a support person gives it to them over the phone. Here are a few default passwords that we have recently heard in our travels: • Winter2015! (It would be a reasonable guess that the next one is going to be Spring2016! or some derivative.) • “name of company”!@#abc • “person’s name”1234 If we were criminals, or even if we were ethically conducting a social engineering experiment by sitting in the airport and listening to calls, we’re pretty confident that we would be able to gain unauthorized access to the individuals’ respective organi- zations. Once again, the solution calls for multifactor controls. ROI for Multifactor Authentication Controls is Easy to Demonstrate All clients need to demonstrate an ROI when they present their solution to a prob- lem. Using passwords only is a major problem. The likelihood of a breach due to weak authentication is high, based on the following risks/threat examples: • phishing (attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication) • man-in-the-middle • gaining access to the password file database The impact of a breach can be high in terms of hard costs: • remediation/corrective action • breach notification letters and credit monitoring for each record compromised • lost sales/consumer confidence
  • 3. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 3 of 6 Compare, Contrast, Evaluate the Products that Meet YOUR Needs. In most cases, when VIMRO conducts an ROI assessment for multifactor controls, we can demonstrate to our client that the control is less expensive than the hard costs associated with one mere breach. And this doesn’t even include implied costs: it’s much harder to demonstrate a breach’s effect on a company’s reputation. Indeed, in talking with most C-level executives, we learn that their company’s repu- tation among its customers and shareholders is one of their top concerns, and that any crack in that reputation is, in fact, associated with a high cost. Conduct an IT Component and Sensitive Data Inventory Demonstrating an ROI for multifactor controls is the easiest part of the project. In the next phase of a multifactor implementation project, identify how the solution will be used. This involves in-depth knowledge of your environment. Most clients utilize the CIS Critical Security Controls(5) to acquire and manage this information. Specifically: • CSC 1: Inventory of Authorized and Unauthorized Devices • CSC 2: Inventory of Authorized and Unauthorized Software The inventory should include where sensitive data resides and how authentication is currently handled. Dataflow diagrams also help provide a detailed understanding of all of the components involved in sensitive data transmission, processing, and storage. This enables efficient and effective implementation of the multifactor solution. Once the inventory is conducted, create a list of criteria that the multifactor solu- tion must meet. We have provided a list of common requirements among VIMRO clients in Attachment 1. Evaluate Products that Meet Your Needs There are many good multifactor authentication products on the market. VIMRO is vendor-agnostic, so we help our clients research three or four or more products that work best for their needs, but we do not promote one product over another.
  • 4. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 4 of 6 Vet the strategy by conducting a pilot project. One of our methods for identifying the best candidates for our clients’ evaluation is suggesting solutions that worked well for similar organizations. We add those vendors to the evaluation list in Attachment 1. We also identify good solution candidates by staying current with industry reporting on these products. Some good resources for this are: • Search Security: http://searchsecurity.techtarget.com/feature/The-funda mentals-of-MFA-Comparing-the-top-multifactor-authentication-products • Forrester: https://www.forrester.com/How+To+Get+Away+With+Mur der+Authentication+Technologies+That+Will+Help+You+Kill+Pass words/fulltext/-/E-res126341 • Gartner: https://www.gartner.com/doc/2930517/magic-quadrant-us er-authentication • SANS: https://www.sans.org/reading-room/whitepapers/authentication • SC Magazine: http://www.scmagazine.com/two-factor-authentica tion-smart-cards-tokens/products/83/0/ Conduct a Pilot Project VIMRO recommends that you conduct a pilot project using the one or two high- est-scoring solutions on your evaluation sheet. Together we will select one or two users from each of your organization’s business units. VIMRO recommends mixed-skill pilot groups consisting of power users, intermediate users, and users needing more support than most. This provides you with adequate feedback to conclude whether the solution will work for your organization. Documentation Thorough documentation is critical to a successful implementation and lifecycle of the multifactor solution. Dedicate resources to documenting everything. This includes: • Design documents • As-built documents • Support documents • User instructions • Pilot project lessons learned
  • 5. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders Passwords Don’t Work: Multifactor Controls Are the Answer Learn how to demonstrate ROI Page 5 of 6 ...must conduct continuous exercises that test the effectiveness of training. Awareness Training is Still Important Multifactor controls are critical, but it is still important to have a layered defense. This is especially true when it comes to protecting your user. Multifactor controls can be compromised if a user shares their verification code with an attacker through social engineering(6). It is important to conduct cyber security awareness training with workforce members and to conduct continued exercises that test the effectiveness of your training program. See VIMRO’s “Strengthening the Weakest Link”(7) paper for more information. Conclusion Antimalware, IDS/IPS, and firewalls have become important tools to protect businesses over the years. Breach data and research prove that ever-increasing threats now require the use of multifactor controls to protect our businesses, employees, and customers. We encourage you to contact VIMRO to discuss how we can help make multifactor controls part of your business practices. References. (1) 2015 Worst Password List: http://www.theguardian.com/technology/2016/- jan/20/123456-worst-passwords-revealed (2) Verizon 2015 Data Breach Investigations Report: http://www.verizonenterprise.com/D- BIR/2015/ (3) Ex-Cardinal Executive Pleads Guilty to Accessing Astros’ Database: http://espn.go.com/ml- b/story/_/id/14531169/christopher-cor- rea-former-st-louis-cardinals-executive-pleads-guilty-hacking-houston-astros-database (4) Wired List of 2015 Largest Hacks: http://www.wired.com/2015/12/the-years-11-big- gest-hacks-from-ashley-madison-to-opm/ (5) CIS Critical Security Controls: https://www.sans.org/critical-security-controls (6) Two-Factor Authentication Social Engineering Vulnerability: http://www.homelandsecuri- tynewswire.com/dr20160204-vulnerability-found-in-in-twofactor-authentication (7) VIMRO Strengthening the Weakest Link Paper: https://www.vimro.com/wp-content/up- loads/2015/12/Strengthening-the-Weakest-Link-151210_2225opt.pdf
  • 6. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Passwords Don’t Work: Multifactor Controls Are the Answer Attachment 1 – Multifactor Authentication Evaluation Requirements Page 6 of 6