IT and Business Insights for SMB Solution Providers

The Incredible Expanding Attack Surface

The same technologies arming your clients with powerful new capabilities are also exposing them to new threats. Here’s how to mitigate those dangers. By Rich Freeman
Reader ROI: 
CLOUD-BASED SOLUTIONS and IoT devices are adding a wide range of new and often poorly protected threat vectors to SMB networks.
SHRINKING THE ATTACK SURFACE by retiring unneeded solutions and deploying NAC systems is an important remediation measure.
SO TOO IS TESTING new web-enabled devices in a lab environment prior to deployment, changing default passwords, and keeping them
RESTRICT POTENTIALLY VULNERABLE SYSTEMS to isolated network segments and equip them with strictly defined access control lists.

GOT YOUR CUSTOMERS’ PCS AND SERVERS safely protected against the latest security threats? Good! Now what about their fish tanks?

That’s right, fish tanks. In a much-discussed incident disclosed last year by security vendor Darktrace, hackers once worked their way past network defenses at a casino through a vulnerability in an aquarium equipped with an internet-enabled thermometer. Hard to blame the casino’s IT provider for failing to anticipate that exploit. These days, attacks are coming at companies large and small from some pretty unusual places.

“You have all kinds of technology entering the office, whether it’s refrigerators, or light bulbs, or keyless entry systems, [or] security cameras,” says Robert Boles, president of BLOKWORX, a managed security service provider in Reno, Nev. Moreover, he adds, the companies that make those devices tend to be far more interested in minimizing time to market than in sealing out would-be intruders.

The upshot for channel pros, of course, is a significantly bigger and more varied attack surface to monitor and protect. Shielding clients from today’s continually proliferating threat vectors is possible just the same, experts say, with the help of some new tools and old best practices.

Unacknowledged Entry Points

Ironically but perhaps predictably, the technologies responsible for the worst of today’s new risks are the same ones empowering businesses with potent new capabilities. Take cloud computing, for example. Microsoft’s Office 365 productivity suite gives users anytime, anywhere access to information and other people, but also offers cybercriminals a rich new set of data repositories to target. You’re not just getting email with Office 365, observes John Pescatore, a director at research and training organization SANS Institute who studies emerging security trends.

“You’re getting OneDrive, which is storage in the cloud. You’re getting SharePoint. You’re getting all these other services, and other ways users can inadvertently leave sensitive data [exposed],” he says.

Thanks to the Internet of Things (IoT), meanwhile, everything from thermostats and whiteboards to heating systems and fire alarm panels are now potential entry points for uninvited intruders as well. “They can use that as a launching point to get to the rest of your network, get on your desktops and your phones from there and maybe into your access points, and then be able to monitor all of the internet traffic, including when you log into your bank account,” notes Richard Stiennon, chief research analyst at security consultancy IT-Harvest.

Richard Stiennon, Chief Research Analyst, IT-Harvest

Breaching IoT hardware is often all too easy, moreover, thanks to weaknesses like default passwords that vendors say nothing about and users neglect to change. Boles, for example, recalls logging into a video surveillance system installed for one of his clients by another technology provider and finding 12 previously unknown administrator accounts in use. “The very thing that they had brought in to secure their environment was actually making them more vulnerable because the cameras that they were watching were also available to the world to watch,” he observes.

Test, Isolate, and Restrict

Boles and other security specialists point to a number of techniques channel pros can use to combat threats like that. For starters, look for every opportunity to shrink the attack surface by retiring systems no one really needs. “There’s on-premise gear that is just kept around for no compelling business reason whatsoever,” observes Ian Trump, chief technology officer for Octopi Managed Services, a Canadian managed security service provider and U.K.-based cyberthreat research lab.

About the Author

Rich Freeman's picture

Rich Freeman is ChannelPro's Executive Editor

ChannelPro SMB Magazine
SUBSCRIBE FREE!

Get an edge on the competition

With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.