8. Cyberthreats: CAUSES
OF THE CAUSES OF OUTAGES,
50% OF PROGRAMS
INSTALLED ON PCs IN 2013 WERE
COUNTERFEIT
92%
POSSIBILITY to lose data/money
JUST BY TYPING
"DOWNLOAD WINDOWS FOR FREE“
IN THE SEARCH BOX AND CLICKING THE LINK…
9. Cyberthreats: CAUSES
OF THE CAUSES OF OUTAGES,
WINDOWS ZVERCD
THE MOST POPULAR PIRATED
WINDOWS VERSION IN CIS
CONTAINS
63
VULNERABILITIES
INCLUDING KEY-LOGGERS,
VIRUSES AND TROJANS
12. Cyberthreats: CAUSES
28% of companies
reported regular
cyberattacks on
corporate PCs,
websites and IT
networks
Once a month
or more
in 65% of cases, corporate
employees' PC's
were revealed to contain
pirated software
13. Cyberthreats: CAUSES
27% of employees
INSTALL SOFTWARE AND APPLICATIONS
BY THEMSELVES
ON WORKPLACE PCs,
WHICH ACCOUNTS FOR
ALMOST 20%
OF ALL PIRATED SOFTWARE
IN USE BY COMPANIES
SURPRISINGLY, ONLY
14% OF COMPANIES
CONDUCT AN INVENTORY ANALYSIS OF THESE
SOFTWARE PROGRAMS
REGULARLY
14. NEW REALITY
317 million
NEW MALICIOUS PROGRAMS
WERE CREATED
DURING THE LAST YEAR
THAT AMOUNTS TO
APPROXIMATELY 1 MILLION
NEW cyberthreats
EVERYDAY
15. CONSEQUENCES
THE IT INDUSTRY LOSES
APPROXIMATELY $3 billion
a year IN CIS
WHICH IS MORE THAN
THE EARNINGS RECEIVED
BY DEVELOPERS FROM THE
EXPORT
OF IT PRODUCTS
16. TAX ISSUES
Not properly licensing/documenting commercial
software is a TAX EVASION in Latvia, Hungary,
Brazil, Russia
Even if you have not purchased something
of value but are using it, VAT is applicable
Software can be checked and taxes can be
applied as part of a tax inspection
18. Use only genuine software. Conduct
regular inventory of installed software;
Inform your employees of basic
security rules;
Install specialized security software and
hardware solutions;
Do not use out-of-date and
unsupported software and always
install the latest security updates;
Implement the SAM process.
BASIC RULES
22. NEW PROTECTION MECHANISMS
Windows Defender
• Scans the computer for malware
• Uses real-time protection for
checking of all downloaded
or executable files
Windows Firewall
• Filters information from the
Internet and blocks potential
malware
26. Provision of source codes
2002 – Russia became the first
country in the world, with which
Microsoft signed a Government
Security Program Agreement on
access to source codes of its
software
The agreement is prolonged
annually
Since 2003, a lab dedicated to
research of source codes of
Microsoft's products has been
functioning in Russia
PERMANENTLY
27. Trusted Microsoft Platform
Availability of source codes for examination
- more than 10 years
Delivery of certified updates by Russian partners
- more than 10 years
Certification for compliance with requirements of the Federal
Service for Technical and Export Control and the Federal
Security Service of Russia
- more than 10 years
No "inserts" in products
Availability of versions for work in compliance with advanced
security requirements
Notas do Editor
According to Norton Report, 2013
According to Symantec
Based on the results of Norton Report 2013:
85% Russians were exposed to cyber-criminals' activities in 2013
Kaspersky Lab and B2B research, 2014
According to the report, almost all companies (98.5%) were exposed to external threats at least once each year. Overall, the top 5 most popular threats to the SMB segment include: virus attacks and malware (75 percent), and software vulnerabilities (44 percent).
IDC research, Russia, 2013
Group-IB research, Russia, 2012
A variety of research, conducted in numerous countries, confirm a direct correlation between the situation with cybersecurity and the level of popularity of counterfeit software.
If the program is downloaded online after typing "download Windows for free" in a search engine, the user risks to lose his/her data in 92 out of 100 cases.
Obviously, it leads to significant reduction in the security level of both private and corporate users; today, cyber-criminals are using counterfeit software not supported by the manufacturer even more often than regular malware. It is no coincidence that the popular Windows XP became an object of the close attention of cyber-criminals who specialize in financial fraud, after Microsoft stopped its official support. Keep in mind that the most popular pirate version, ZverCD, is uploaded to almost every pirate website together with 63 integrated vulnerabilities.
Today, cyber-criminals represent serious international criminal groups,conducting their unlawful activities throughout the world and often "specializing" in different types of crime. For instance, cyberfraud is quite often primarily about monetary theft, however it is also a popular method for the distribution of counterfeit products, such as counterfeit medications, or the online distribution of child pornography and other types of criminal and perverted activities.
SAM CyberSecurity allows for the identification of common scenarios of IT vulnerabilities
Use of outdated software
Use of outdated software not supported by the manufacturer creates a serious risk and is a tempting target for cyber-criminals.
Not updated software. Failure to use the latest version of software or absence of the latest updates leaves the door open to cybercrime.
Absence of rules for software installation. Uncontrolled installation of software or purchase of software from an unknown vendor substantially increases the risk of the accidental downloading of malware.
Do not open suspicious messages received by email and do not follow the links they contain;
Do not download files from unverified resources (websites, memory cards) to PC;
Do not insert unknown flash drives (or USB flash drives) into corporate computers;
Do not install unverified third-party software on PCs;
Do not connect to the Internet using unverified Wi-Fi networks;
Use passwords which have the form of long phrases or sentences and contain a combination of lower-case letters, numbers and symbols etc.
Identifying common vulnerability scenarios:
Use of outdated software;
Use of older software not supported by the manufacturer;
Lack of rules on installing the software, and so forth
At the end of the project:
Plan a road map for improving cybersecurity levels
Reduction of legal risk by 98%
Savings of 15% on software over the next three years
Through the use of Excel Power Maps, as we investigated Citadel, we noticed an interesting phenomenon – the Citadel infections seemed to suddenly stop at the political border separating western Europe from eastern Europe.
We asked – HOW would a randomly spreading computer infection know where national borders are situated? To answer this question, the Digital Crimes Unit malware team conducted additional forensic analysis of the code underlying the botnet. The team identified that this program, designed to steal financial information from around the world, would check a computer’s language settings BEFORE infecting it, and would not infect computers with certain Slavic languages (Ukrainian or Russian, specifically). The criminals who created the botnet didn’t want to give their own local authorities reason, or jurisdiction, to take action against them.
Without big data and business intelligence, none of this would be possible.
Provision of source codes DOES NOT MEAN data transfer!! All user data is protected and immune!