[BreachExchange] Fighting the cybersecurity knowns: 4 core components

Inga Goddijn inga at riskbasedsecurity.com
Fri Nov 25 19:08:43 EST 2016


http://www.csoonline.com/article/3144548/techology-business/fighting-the-cybersecurity-knowns-4-core-components.html

Earlier this year, SevOne fell victim to a phishing scam that resulted in
the release of W-2 wage and tax data belonging to current and former
employees of the network infrastructure monitoring company.

After learning about the breach, management apologized and urged employees
to follow “good data security” practices in order to lower their chance of
becoming victims. That was sensible advice since an unauthorized outsider
now possessed stolen sensitive personal information that could be exploited
to file false tax returns or commit other forms of identity theft.

But the after-the-fact reaction also underscored a couple of frustrating
paradoxes about contemporary cybersecurity.

   - More than 90 percent of cyberattacks are either known threats or
   variants of known threats, not zero-day attacks related to a previously
   unknown software vulnerabilities, according to AT&T threat intelligence
   data
   <https://www.business.att.com/cybersecurity/docs/cyberbreachresponse.pdf>.
   In theory, organizations should be able to detect and prevent attacks by
   employing proper defensive measures. Unfortunately, the battle is far from
   finished with cybercrime expected to cost the global economy a record $445
   billion this year.
   - While the sensational nature of headline-grabbing breaches may conjure
   up lurid scenarios of unstoppable and mysterious cyberpredators, the more
   mundane reality is that most organizations deserve some of the blame for
   their inadequate cybersecurity. And the urgency to bolster cybersecurity is
   only going to increase as enterprises digitize more of their internal and
   customer-facing operations with the adoption of the Internet of Things,
   cloud technology and mobile devices.

To be sure, adversaries are always looking for the next way into your
organization and they will probe for network weaknesses. But you can handle
the vast majority of known threats by implementing an approach to
cybersecurity that balances prevention, threat detection and response. A
newly published AT&T Cybersecurity Insights report
<https://www.business.att.com/cybersecurity/> for navigating the threat
landscape offers the following recommendations:

   1. *Invest in a multilayered approach: *Organizations should integrate
   all aspects of their digital infrastructure. That includes networks,
   systems, cloud-based services and endpoint devices, ranging from desktops
   to smartphones to smart devices connected via the IoT.
   2. *Keep patches and software apps current:* Stay current on software
   patches and updates to avoid the dangers of software vulnerabilities. Even
   though most threats are known, their variants still pose dangers.
   3. *Reduce impacts from any weak links:* Not everyone necessarily has
   the same idea about what constitutes good cybersecurity practices - and
   that includes both employees and third-party vendors. Awareness and
   education programs can help increase employee vigilance. At the same time,
   any contractors or business partners should be required to abide by clearly
   articulated policies and controls around cybersecurity as a precondition
   for working with your organization.
   4. *Make cybersecurity foundational: *This is an era of IT
   transformation in which many organizations are migrating to more flexible
   infrastructures that use cloud services and software-defined systems and
   networks. All the more reason to ensure that security is a foundational
   component of these initiatives. If they are present right from the start,
   the result will be a more agile and more secure organization.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20161125/8714751f/attachment.html>


More information about the BreachExchange mailing list