The first computer security hack occurred in 1903, when magician and inventor Nevil Maskelyne disrupted British engineer John Ambrose Fleming’s demonstration of what was supposed to be a secure wireless telegraphy device. The hack sent insulting Morse code messages to the auditorium’s projector. Needless to say, attacks have been on the rise ever since.[i]
According to Symantec, half a billion personal records were stolen or lost due to nine mega-breaches in 2015. The number of exposed identities jumped to 429 million. That data comes only from the information reported.[ii] Even with security technology constantly improving, businesses are more vulnerable than ever. As the hackers continue to breach the barriers of security, it is on the shoulders of businesses to do everything they can to prevent attacks. But are we doing everything possible?
In May 2016, Tech Pro Research conducted an online survey focused on cybersecurity to find out what’s being done to prevent attacks and how businesses react in the event of such an attack.
- Forty-five percent of respondents said mobile devices pose the biggest security threat to their business.
- When it comes to strengthening their weakest security links, respondents believe educating end users and management is often the best solution.
- Of respondents whose companies do business overseas, 76% feel this presents an added challenge to security.
- The majority (60%) of respondents said their companies do not use digital forensics.
- Among respondents whose companies do use digital forensics, 42% said it has uncovered an issue in the past year.
- Forty percent of respondents said their business has not been the target of a cyberattack.
- Of those that have been attacked, roughly half are working with a government agency on the issue.
- Sixty-five percent of respondents are highly or moderately concerned about cyberwarfare attacks versus run-of-the-mill attacks.[iii]
The Back Door
Salesforce® is the most widely used customer relationship management (CRM) application in the world. It boasts millions of users, and offers a truly integrated platform with a global “community” to address a wide range of business areas within the sales, marketing and customer communications. However, the platform does NOT provide a way to prevent users from uploading certain types of files or scan attachments, document uploads, or chatter for viruses or malicious content.
For Salesforce, this is an intentional decision since none of the virus code gets executed on their systems as it is never executed, just stored in their database. This is where they rely on their partners to help fill the gaps in the product. Scanning viruses is not their core competency, and why they have chosen not to implement a native solution. The same goes for box.com and other applications.
As a result, there is a huge security risk for all Salesforce users, especially when a Salesforce application is publicly exposed through communities and sites.com. The last thing any company needs is a harmful file uploaded in Salesforce, infecting their network and corrupting or exporting your sensitive data. Thankfully, there is a partner solution that has been developed by certified Salesforce architects to mitigate the risk – EZProtect™ Anti-Virus Scanner.
Current Threat Vectors
Simply put, any file that is uploaded to Salesforce brings with it the opportunity to carry a virus, malware, or unintended active content. There are four main avenues for these types of files:
- Attachments (cases, leads, opportunities, etc.)
- Content Files (including Chatter)
- Static Resources
Each of these areas offers its own opportunity for virus/malware infection.
Standard Threat Scenarios
There are four standard scenarios which should be addressed within any Salesforce organization.
- Files that are uploaded by customers or partners and opened by customers or partners
- Files that are uploaded by employees and opened by customers or partners
- Files that are uploaded by customers or partners, and opened by employees
- Files uploaded by anyone which contains a virus that is not yet recognized by scanners, but is eventually.
Scenario A is probably the most severe threat. You don’t know if the customer or partner has a virus scanning capability on their documents — either on the sending or the receiving side. You don’t know if they are malicious actors trying to intentionally harm other customers or your company. You also probably want to show your own lawyers and compliance officers that you are making a best effort to protect your customers and partners.
Scenarios that deal with employees can be dangerous as well. Many companies do have policies and practices to include virus scanning software on all of their internal computers. However, this software may not be up-to-date as they are often installed on each, individual system, and current viruses will be missed. And employees increasingly bring-their-own-devices into their work, including tablets, phones and personal computers which may not include virus protection. Many company environments do not lock these devices out.
In Scenario D, at the time of initial upload, a file is scanned by a virus protection software and marked as clean as the virus was missed or not yet recognized. So, although the virus scanner marked it as clean, the file actually contained updated malicious content that the virus scanner missed. This scenario is actually quite a large threat as all virus scanners are only as good as the currently known dictionary of viruses, and hackers are constantly coming up with new pieces of malicious code.
Designed for large enterprises, EZProtect easily scans chatter files, documents, attachments and content for harmful viruses. Through careful and clean design, EZProtect makes the detection and deletion of viruses, malware, Trojan horses and other malicious threats effortless and painless. Key features include:
- File-type scanning allowing users to specify a list of file types that are allowed or denied (white list or black list)
- Scanning of static resources as well as document, attachment and content versions
- Skip scanning one or more of the file objects – attachments, documents, content versions and static resources.
- Scanning via Email – “Why do we need EZProtect when we already have a virus scanner for our email systems? All files we upload to Salesforce would have already been scanned.”
Example: Someone could easily receive an email in their email inbox (via Microsoft Outlook) that was not flagged as junk for some reason. The email, which contains a word document attachment includes a Macro with a malicious script. The document is then downloaded out of email and into Salesforce containing a malicious script and released within the network.
Answer: Scanning within email is not full proof as many viruses are missed and things can still get through. EZProtect itself is not fool proof either, but the more applications you have in place to prevent malware and viruses, the more protected a company will be.
- Triggers within Salesforce – “All you have to do is create a trigger on an Attachment object.”[iv]
Example: Your Salesforce administrator can write a Trigger on an Attachment Object to detect viruses within attachment.
The Bottom Line
Cyberwarfare is an ongoing threat that will only continue to gain more and more traction. As enterprise-level businesses continue to lock down their resources, and spend more and more money on education and infrastructure, cyber-attacks could very likely begin targeting smaller and smaller businesses, in order to gain access to their target.
In other words, no business is immune. No matter the size of the company, sector, demographic served, or type of data housed. This is especially true when companies are doing business overseas. Those employees could serve as easy marks to bring malicious code to systems, unbeknownst to anyone.
The best way to prevent an attack within Salesforce is to install EZProtect anti-virus software by visiting www.adaptus.com/ezprotect. But also, strengthen policies on education within your organization. IT staff and end users must be informed, not only on the ins and outs of how systems work, but how easy it is for outside forces to influence and break down company security. IT staff should help end users understand the security threats within Salesforce so they won’t accidentally hand over the keys to the kingdom. Leaders should educate IT staff and users on the dangers of loading unsecure documents into Salesforce and educate them on the four security holes that exist in the system. Finally, leaders should ensure everyone has read and agrees to a company policy that is frequently updated to reflect the ever-growing shift in a very challenging landscape.
[i] Cybersecurity Research: Weak Links, Digital Forensics, and International Concerns, Tech Pro Research, September 2016
[ii] Cybersecurity Research: Weak Links, Digital Forensics, and International Concerns, Tech Pro Research, September 2016
[iii] Cybersecurity Research: Weak Links, Digital Forensics, and International Concerns, Tech Pro Research, September 2016