Travel agents and staff/client cyber safety

With a number of high-profile data breaches in the headlines towards the end of 2020 – including Heathrow airport paying £120,000 in fines after an employee lost a memory stick containing personal data, and hackers making off with the personal information of more than nine million Cathay Pacific passengers – it feels as if there is still a gap in data protection education, particularly in cyber security for travel agents.

Enter Graeme McGowan, Cyber Risk & Security Consultant at ESA Risk and Senior Tutor and Advisory Council Member at the Global Cyber Academy – an online training institute offering data security courses to individuals and businesses. Here, he gives tips to help travel agencies improve their cyber security and minimise the risk of data breaches.

Staying secure

First and foremost, McGowan recommends encrypting office hardware and software – computers, social networks and chat functions. Encryption is simply the process of encoding a message or information in a way that only authorised users can access it.

“Using a PIN, passcode or fingerprint to unlock your smartphone is sufficient, as most phones have built-in end-to-end encryption,” he says.

“It’s the same for a Windows PC or laptop, and encryption is turned on by default. But it can be undermined if you have no passcode when you boot up. Apple products are all fully encrypted, as are Android phones.”

Ensuring passwords are regularly updated is just as important, he says.

“Agents should change passwords regularly and never recycle any for a PIN, safe or security box.”

Adequate antivirus software is critical too, McGowan warns, adding: “Make sure whatever software package you choose is patched and up to date. Personally – and there are many other good options out there, I use Avast Pro on my PC and other devices. It has everything you need, including a virtual private network (VPN) and some very useful tools to monitor your footprint.”

He advises agents to avoid using shared computers if they can, which may prove difficult in an agency with a limited number of machines.

“If you must use a communal computer, avoid sharing any information – do not save passwords, and employ two-factor authentication when logging into accounts.”

Two-factor authentication is an extra layer of security that requires not only a password and username but also a security token, like a code.

“For example, in online banking, you often need a PIN that’s sent by text message to complete the transaction,” he adds.

Internet threat

“Always use a secure connection,” says McGowan. “Simply having ‘https’ at the beginning of the browser’s URL bar can protect you from a large variety of potential threats.”

These include “drive-by attacks”: cyber criminals looking for insecure websites to plant malicious code on one of the pages. When agents visit the site, malware is installed on their device. Such instances are called drive-by attacks because they require no action on the part of the victim. Locking the windows and doors of your agency doesn’t mean it’s safe from attacks either, says McGowan.

“At the end of the day, shut down, or at the very least, switch off wireless and Bluetooth on all devices. This prevents hackers from accessing devices if they are connected to an open network or any other connection.”

A good example is Feherty Travel in Bangor, Northern Ireland. They have recognised the importance of keeping data secure. Company director and part owner Scott Parker has ensured his business is protected through education and implementing practical measures.

“I attended a course on general data protection regulation (GDPR), which I then wrote up and trained our staff on. We have also installed new filing cabinets with locks to keep data secure, purchased shredders and replaced door locks on our archive room,” he explains.

Protection on the go

McGowan says travel agents should warn clients about using public Wi-Fi in airports, hotels and cafes.

“Because information that’s transmitted is generally unencrypted. It’s not just the hotspot that’s public – it’s your data too. You might as well shout out your details. A compromised router can vacuum up a lot of personal material relatively simply.

“Just getting into your emails, for instance, gives hackers access to your usernames, passwords, and private messages. It’s fairly easy to set up a fake access point (AP), and it’s well worth the effort for cyber criminals.”

Using a VPN in this instance will provide a level of encryption between the user and a website, says McGowan. It makes intercepted data unreadable by a hacker without the correct decryption key.

“‘Packet sniffing’ is another method used by hackers to acquire airborne information then analyse it at their leisure. A device transmits a data packet across an unencrypted network, which can then be read by free software like Wireshark. The bottom line is, never turn your Wi-Fi or Bluetooth on in public places unless you are in a trusted area.”

Finally, for agents embarking on familiarisation trips, McGowan recommends taking a loaner device to deter cyber criminals.

“This is when the IT department would lend an agent a clean laptop or smartphone for their trip. This ‘loaner’ would be better protected if it were misplaced or stolen, as they would be able to guard the data more effectively. For a small business, buying one laptop for travel and making someone responsible for keeping its security systems updated and patched would also work.”

What can we learn from Emotet?

Although originally intended to be a banking ‘Trojan horse’, Emotet has evolved multifariously by modular Dynamic Link Libraries (DLLs) and constantly updates itself into various versions to evade detection. Emotet was designed to steal sensitive information and personal details by infecting devices with malware that then spreads to other local and linked devices.

“In the current climate it is so fantastic to see a major triumph against such a destructive and parasitic malware such as Emotet which has wreaked havoc and has cost millions in damages over a prolonged period in the international banking sector as it infected numerous devices and stole data and money. It has taken a monumental effort from a number of different countries to achieve this and it’s definitely a step in the right cyber security direction.”

Ali Twidale, Banking & Financial Fraud Consultant at ESA Risk

The malware effectively grows by multiplying itself through a network of devices. Once it gains access to one computer, it has the means to affect many others, acting as a worm. This works via email attachments, malicious links and macro-enabled document files, usually hidden as compressed files that can spread the malware in the form of .doc, .docx and .exe files. The emails are often in regard to updates to financial information or are imitations of emails from popular shipment companies.

The malspam then spreads by ransacking your contacts list and forwarding itself into the inboxes of your friends, family, co-workers and clients. Since these emails are coming from your hijacked email account, the emails look less like spam and the recipients, feeling safe, are more inclined to click bad URLs and download infected files. If a connected network is present, Emotet can also spread using lists of common passwords, finding its way onto other connected systems in a brute force attack.

Emotet is also known to arrive embedded in Word documents attached to emails, that run and install malware once the victim enables macros. These are often flagged as important, so that hackers can gain quick access into the intended device. Microsoft Outlook is also used to generate phishing emails from the infected device, continuing the cycle of malware right under the nose of the unsuspecting victim.

The rapid pace of spread is one of the most dangerous assets to Emotet, aiding the success of the malware in data theft and extortion. It is very difficult to erase from an infected computer, as attackers can update malware codes and enable the trojan to replicate itself across systems. It is undetectable by firewalls due to the nature of its encrypted channels, as well as its ability to lay dormant in a device. Emotet can evade detection from security scanners by remaining idle for extended periods of time and adapting into different versions.

The impact of Emotet

The evolving nature of the malware means it serves various functions for hackers. Notoriously, it has been used to steal banking information from individuals and companies but can also attain sensitive corporate information that is often used for ransom in exchange for a financial reward. Emotet is also often sold to other cyber criminals, extending the varieties of malware it can infect systems with.

Lotem Finkelstein of Check Point Software has revealed that Emotet has ‘sent phishing emails with more than 150,000 different subject lines and 100,000 file names for the attachments.’ Emotet campaigns have impacted global industries, including the malware TrickBot and Obot.

The impact has been enormous, with targets of Emotet including the City of Allentown in Pennsylvania which cost over $1 million to fix. The malware was initially detected in 2014 and has since enabled cyber attacks on Germany, China and Canada in particular. It tends to hide and then reappear in violent bursts, attacking in thousands of malspam messages at once.

Notable cases of Emotet attacks include that on the city of Frankfurt whereby its whole IT network had to be shut down. A similar instance was the attack on Heise Online in May 2019. The German publishing house received the typical email containing an infected Word document requesting access to edit. In turn, the domain controls were compromised so the company had to shut down IT systems in order to attempt to cleanse from infections.

Ways to avoid similar malware attacks

Although malware and trojans can often be difficult to detect and remove, there are measures you can take to avoid infection of your devices. First, ensure your device has cyber security systems installed, such as antivirus software and secure VPN. This software should block dangerous emails, but in cases that it does not, be diligent when checking your inbox. Avoid opening suspicious or unlikely messages or clicking on links that have come from an unrecognised source. Ensure your passwords are secure, you are making use of multifactor authentication and that you do not share devices that have confidential information on them with others.

According to ESA Risk’s Graeme McGowan, Cyber Risk & Security Consultant, the best ways to protect yourself from similar malware are:

  1. Keep your computer/endpoints up to date with the latest patches for Microsoft Windows. TrickBot is often delivered as a secondary Emotet payload, and TrickBot relies on the Windows Eternal Blue vulnerability to do its dirty work, so patch the vulnerability before the cybercriminals can take advantage of it.
  2. DO NOT download suspicious attachments or click a shady-looking link. Emotet can’t get that initial foothold on your system or network if you avoid those suspect emails.
  3. You can protect yourself by using multi-layered protection. If you suspect your device is infected, isolate it from any connected networks, then proceed to patch and clean the system.

Staying safe on social media

Most social media sites are free to use, and unrestricted access gives way to corrupt users or false accounts. As there is rarely a process of verification of identity, it can feel difficult to stay safe on social media sites. However, with security settings and privacy controls, users are able to monitor who and what they interact with.

Oftentimes people are too personable on social media and overshare details of their private lives. This creates the threat of online criminal activity, as situations like stalking, identity theft or hacking can occur if you do not make use of the safety precautions on social media.

There is also an increased risk of phishing, as criminals can tailor phishing emails just by looking at your social media profiles. For instance, once they know your job and some of your connections on LinkedIn, they can craft phishing emails that include company details or manager’s names to make them sound more believable. By having access to your connections on social media, hackers have information to build up an idea of a company’s employees, to either target certain individuals or identify entry points into company databases.

In cases where attackers cannot directly access company data, nor manipulate employees via phishing emails or contaminated links, they may use social media to decipher suppliers and related companies to find a different entryway. This can be done via fake profiles which give hackers access to people’s information, enabling them to spread malware or malicious links. Hackers might also use fake business pages, or fabricated job offers, to lure people in and take their personal data or set up transactions which result in financial information being exchanged, or money being sent.

How to stay safe on social media

Staying safe on social media works differently for each platform: on Facebook, users can alter their privacy settings, making their posts viewable by ‘friends and family only’. You have control over who can see your page and even search for you, as well as the amount of access they have to your friend list, which can be changed to ‘only me’.

Similarly, Instagram allows you to monitor who follows you by setting your account to ‘private’ in your settings. There is also a block feature and ‘remove follower’ feature that means you can revoke users’ access to your page. Location services can also be turned on or off when necessary, so that it is difficult from criminals to locate you or gather information about where you live and work.

On Twitter, there is also the option to remove your location from your tweets. Twitter offers various privacy and security options that protect your account and allow you to be discreet with your personal information. You can manage your contact lists, remove pre-filled contacts and put your account on private so third-party users cannot access your tweets.

LinkedIn is a platform where users can obtain a lot of information about each other, but people are often less cautious, as the site is primarily used for professional networking. Updating where you work, your current projects and places like your education history can be a goldmine for hackers and scammers. As with the other social media platforms, your safety could always be compromised, so it is important to implement security measures to avoid that.

10 tips for staying safe

  1. Never give financial information to anyone over social media.
  2. Research job offers received via LinkedIn, especially if it seems too good to be true or is made up of generic messages or unaffiliated links.
  3. Keep personal information private, such as your phone number and place of residence.
  4. Limit details about your work history online.
  5. Be cautious with who you are connecting with. A lot of people ‘over-friend’ on social media for the sake of networking, but adding strangers is not very safe.
  6. Protect your passwords. In 2012, LinkedIn lost over 100 million users’ passwords and email addresses to the dark web. Many people use the same password for every site, so vary your passwords, make them a mix of both letters and numbers and try to vary them between different social media accounts.
  7. Have a Master Key (a password storage application) to keep all your passwords secure and use ‘Last Pass’, an app that helps you keep track of your various passwords.
  8. Set up security answers (this option is available on most social media sites).
  9. Use two-factor authentication (a second barrier of security that verifies your password, for example, by sending a code to your phone number or email).
  10. Use a single sign-on, such as OpenID, which enables you to manage all your social media accounts from one place.

7 ways to avoid data breaches

According to the Ponemon Institute, the accumulated cost to a company from a data breach is $3.86 million on average. Hackers may blackmail companies with threats to leak private data by holding information hostage and demanding a ransom. Data breaches are thereby invasive and extremely costly, both financially and in terms of the damage they can have on a company’s reputation.

Stolen data could include:

  • Financial information – including bank details and investment details.
  • Personal Health Information (PHI) – medical data, details on health conditions, prescriptions and treatments.
  • Personal Identifiable Information (PII) – contact information, education, workplace, birth dates and other personal details.
  • Corporate information – details of contracts, trade secrets, business plans and marketing information.
  • IT data – system structure, encryption keys, passwords and usernames.
  • Legal information – information on court cases, acquisition details and regulatory rulings.

This data can then be sold or used for fraud and identity theft. Hackers tend to sell stolen information on the dark web, like in April 2020 when Facebook was breached, leaking the identities of 267 million users. Although passwords were not included, the hacker stole names, email addresses, dates of birth and phone numbers, all information that could be used to target the users by phishing.

Similarly, in May 2014, eBay experienced a data breach that impacted 145 million users. The attacker used three employees’ details to break in and for 229 days accessed names, addresses, dates of birth and encrypted passwords. Although credit card information remained safe, customers were required to renew their passwords and in turn, eBay’s client confidentiality was affected.

An instance of a medical breach was the NHS Highland data breach, where almost 300 patients’ details were sent to members of the public. This included contact details, dates of birth and the name of their clinic.

Breaches often occur by cyber attacks, weak passwords, malware attacks from infected emails, drive-by downloads from compromised webpages, payment card fraud and theft of office computers. It can also occur by human error through accidental insider leaks, as well as intentional disclosure by employees with access to confidential data and systems.

Attackers can use employees as their way into an organisation’s information. They usually exploit weak systems by researching the company’s infrastructure to find loopholes, or target employees by analysing their social media and constructing emails that can trick that employee into clicking on infected links or to follow phishing messages. Fraudsters also make use of phone numbers by making phone calls asking for card details pretending to be a bank employee or a service provider. So, how do you avoid a data breach and protect your sensitive information?

How to avoid a data breach

Remember that banks and regular corporations never ask for personal information over the phone or on email. Look out for correspondence that asks you to reset your password, receive compensation or tells you to act immediately to recover funds.

Ensure that:

There are now laws for companies to inform customers if they have had a data breach, in case personal information has been compromised. To avoid this happening in the first place, get good defences in place and be alert.

Working from home and cyber threats: Keeping your company safe

Most are using remote working on a much larger scale than ever before, meaning they have had to implement new rules and improvements in technology to ensure productivity, staff wellbeing and information security to ensure that working from home is safe from cyber threats.

There are many reasons data breaches are more likely to occur while working remotely. For instance, the lack of supervision can result in employee apathy. Remote workers are less aware about cyber security, using insecure Wi-Fi networks or personal laptops that may have malware or ransomware that can then infiltrate the company network. Working from home also introduces the issue of family members sharing the same PC, or employees adding home printers to the office network and using external USB drives on office computers. This consequently puts company data at risk of being leaked, unless there are the necessary technological safeguards put in place to prevent it.

Furthermore, cyber criminality is on the rise, with hackers taking every possible opportunity to steal company or personal information. The main methods used are fake warnings on social media and pop-up links on websites that urge users to click on them. Fraudulent emails containing similar malicious links are also used to spread viruses that can infect or damage your files, so it is important to be aware of what is on your screen and in your inbox.

Solutions

1. Education

Staff must be educated on the risks of viruses, phishing or cyber attacks. Whether they come in the form of online updates, scam emails or phishing links, workers should be trained to recognise suspicious activity and filter them out. It is important to note that sudden, emergent situations that require immediate action, such as being asked to update your bank details, are to be approached with caution and that workers should be mindful at all times. Ensure that security guidelines are clear, so that workers are briefed with the necessary knowledge to avoid cyber fraud. This might include paying attention to spelling and grammar mistakes in emails or noticing unsolicited attachments. Domain emails that are replicas of genuine business emails to appear credible, as well as URLs made to look like an already established URL, are also signifiers of fraudulent correspondence.

2. Passwords

Password control plays an important role in managing the potential risks of remote working. Using password screens with strong, two-factor authentication is recommended and employees should avoid writing passwords down, keeping them out of sight of other people. Password protection avoids third parties accessing confidential files, so companies should ensure maximum protection with passwords that are at least 12 characters and include uppercase and lowercase letters, numbers and symbols, as advised by The Federal Trade Commission.

3. VPN

A VPN (Virtual Private Network) enables a secure connection to another network, over the internet. It ensures protection of private information by routing traffic through the VPN server, encrypting the connection and hiding your IP address in the process. This provides anonymity from hackers, enabling safe and private browsing online. My recommendation is to invest in Firewalla – a cyber security firewall that alerts you to and protects you from cyber threats at home. It ensures that all your connected devices become part of a virtual protective network that you can see and manage from a control centre. It is also important to use protected browsers, such as Firefox or private browsing pages to avoid your data being monitored and collected by hackers.

4. Antivirus

Viruses are one of the biggest threats to businesses operating online. These arrive in the form of spyware, malware, zero-day attacks, trojans and phishing scams. Whether employees are using their own computer at home or company property, they must have installed antivirus software, from a reputable supplier such as Bitdefender, Kaspersky or Norton, ensuring it stays up to date. Antiviral software creates a firewall against viruses and alerts you when you are visiting sites that are potentially malicious. It conducts regular vulnerability scans and checks that filter out threats to your data while detecting any irregular activity. Antivirus is paramount in privacy protection, both for business and at home.

5. Shared storage

In case of attacks or breaches of company information, it is useful to keep centralised storage so that lost files can easily be recovered. Keeping data in shared storage with cloud-based backups lessens the likelihood of irrecoverable losses. The shared storage should have a firewall installed to protect all documents within it, with regular security measures taken to ensure that confidential data is safe. If a malicious third party finds a security hole in one of these cloud-based services, a lot of information is simultaneously at risk, so make sure to add extra security through encrypted cloud storage.

Deep dive for the answers you need
Or contact us on +44 (0)343 515 8686 or at advice@esarisk.com.

Deep dive for the
answers you need

Lawyers, accountants, advisors, investors, senior
management. You name them, we help them find the answers
they need. Ready to discover how we can help you?