Anticipating Cyber Attacks

Cyber attacks, data breaches, and vulnerabilities are a mainstream problem. Since IT networks have become so much more complex, offering numerous places for a hacker to hide it means that cyber criminals can be hidden in IT networks, for days, weeks or months.  Attackers are typically able to roam around a breached environment for more than a year before being detected. 

With attackers spending so much time freely and anonymously navigating the IT environment, security teams need to shift their focus inside the network and implement tools that help detect cyber-attacks as early as possible in the  lifecycle of  a breach..

Recent analysis suggests it often takes organisations an average of 8 to 9 months to identify and contain a data breach. This gives hackers time to analyse data, infiltrating systems and steal what they see as valuable information. Sometime data breaches cannot be detected for years. In the 2018 Marriott International data breach, hackers were accessing the network for over four years before they were discovered, which resulted in the records of 339 million guests being exposed. 

The international hotel chain then suffered a second data breach this year after cyber criminals had been in the network for over one month, impacting approximately 5.2 million guests.

One the most common form of cyber crime is straightforward financial  theft. Cyber criminals aiming to steal money can  d infiltrate ATM networks, enabling transaction skimming from online banking systems. Or they can  threatening to lock up a computer unless a ransom is paid. Cyber criminals may be a single individual, but more likely complex networks of people spread around the world with multiple roles. 

It is now more important than ever for organisations to be able to analyse contextual data in order to make informed decisions regarding their network security policy. 

This is not possible without 24/7/365 Managed Detection and Response (MDR) tools for proactive threat hunting that uses event monitoring logs, automated use case data, contextual analysis, incident alerting and response and applying Tactics, Techniques and Procedures (TTPs) to identify issues that improve an organisation’s security posture.

When anticipating the unknown, cyber security analytics tools can capture data and detect evasive and malicious activity, wherever they are in the network in real-time. 

Creating detailed policies and properly enforcing them is one step security teams can take to proactively detect and remediate malicious activity immediately. With policy enforcement, attackers will have a hard time attempting to make lateral ‘east-west’ movements or remaining hidden in any part of the network, as the security team will be able to see inside the network and protect against threats across all attack surfaces across all managed endpoints with a unified multi-layer approach. This includes policy generation and enforcement MDR tools that can provide greater insight into the overall reliability, impact and success of network systems, their workload and their behaviour to identify threats and proactively respond and protect assets.

In reality, this means that security teams can take measurable steps towards controlling system access of the network environment; knowing who is in the network, who should be able to access what data and which applications, and being the first to detect Indicators Of Compromise (IOC).

"Threat hunting is a way to stay one step ahead of cyber criminals. Organisations no longer have to wait to be alerted of data breach before taking action; today it is essential to have a complete picture of the entire network in real-time." said CEO of Certes Networks, Paul German.

This should include exttending these capabilities to teleworkers, so that unusual activity can be identified and halted immediately, before any damage occurs. With strong MDR tools at the core, organisations can ensure a strong and effective security posture based on anticipating the unknown, clear visibility into vulnerabilities that pose the biggest threat and identifying barriers that prevent successful tracking and remediation.

Recorded Future:    Certes Networks:       Professional Security:        CyberArk:   

You Might Also Read:

Managing Your Cyber Security, Detection & Response:

 

« Russia's Hackers Are Masters Of Cyber Warfare
Malware Versus Ransomware: What’s the Difference? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Cequence Security

Cequence Security

Cequence secures web, mobile, and API applications. We discover all apps, detect malicious bots, and stop attacks with an AI-integrated security platform.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.