Anticipating Cyber Attacks

Cyber attacks, data breaches, and vulnerabilities are a mainstream problem. Since IT networks have become so much more complex, offering numerous places for a hacker to hide it means that cyber criminals can be hidden in IT networks, for days, weeks or months.  Attackers are typically able to roam around a breached environment for more than a year before being detected. 

With attackers spending so much time freely and anonymously navigating the IT environment, security teams need to shift their focus inside the network and implement tools that help detect cyber-attacks as early as possible in the  lifecycle of  a breach..

Recent analysis suggests it often takes organisations an average of 8 to 9 months to identify and contain a data breach. This gives hackers time to analyse data, infiltrating systems and steal what they see as valuable information. Sometime data breaches cannot be detected for years. In the 2018 Marriott International data breach, hackers were accessing the network for over four years before they were discovered, which resulted in the records of 339 million guests being exposed. 

The international hotel chain then suffered a second data breach this year after cyber criminals had been in the network for over one month, impacting approximately 5.2 million guests.

One the most common form of cyber crime is straightforward financial  theft. Cyber criminals aiming to steal money can  d infiltrate ATM networks, enabling transaction skimming from online banking systems. Or they can  threatening to lock up a computer unless a ransom is paid. Cyber criminals may be a single individual, but more likely complex networks of people spread around the world with multiple roles. 

It is now more important than ever for organisations to be able to analyse contextual data in order to make informed decisions regarding their network security policy. 

This is not possible without 24/7/365 Managed Detection and Response (MDR) tools for proactive threat hunting that uses event monitoring logs, automated use case data, contextual analysis, incident alerting and response and applying Tactics, Techniques and Procedures (TTPs) to identify issues that improve an organisation’s security posture.

When anticipating the unknown, cyber security analytics tools can capture data and detect evasive and malicious activity, wherever they are in the network in real-time. 

Creating detailed policies and properly enforcing them is one step security teams can take to proactively detect and remediate malicious activity immediately. With policy enforcement, attackers will have a hard time attempting to make lateral ‘east-west’ movements or remaining hidden in any part of the network, as the security team will be able to see inside the network and protect against threats across all attack surfaces across all managed endpoints with a unified multi-layer approach. This includes policy generation and enforcement MDR tools that can provide greater insight into the overall reliability, impact and success of network systems, their workload and their behaviour to identify threats and proactively respond and protect assets.

In reality, this means that security teams can take measurable steps towards controlling system access of the network environment; knowing who is in the network, who should be able to access what data and which applications, and being the first to detect Indicators Of Compromise (IOC).

"Threat hunting is a way to stay one step ahead of cyber criminals. Organisations no longer have to wait to be alerted of data breach before taking action; today it is essential to have a complete picture of the entire network in real-time." said CEO of Certes Networks, Paul German.

This should include exttending these capabilities to teleworkers, so that unusual activity can be identified and halted immediately, before any damage occurs. With strong MDR tools at the core, organisations can ensure a strong and effective security posture based on anticipating the unknown, clear visibility into vulnerabilities that pose the biggest threat and identifying barriers that prevent successful tracking and remediation.

Recorded Future:    Certes Networks:       Professional Security:        CyberArk:   

You Might Also Read:

Managing Your Cyber Security, Detection & Response:

 

« Russia's Hackers Are Masters Of Cyber Warfare
Malware Versus Ransomware: What’s the Difference? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.