Technology is not a silver bullet

April 2016 Information Security

Cyber security is no longer an IT problem but rather an organisational priority. It has become such a serious issue that it costs businesses money, compromises its information and customer data and causes reputational damage. Unfortunately, there is no silver bullet against cyber onslaughts and implementing the right technology won’t cut it.

Fred Mitchell.
Fred Mitchell.

Granted, technology is important, however, in order to implement a strong line of defence, organisations need a change in mindset. The belief that ‘it won’t happen to me’ is not only outdated, but dangerous, as there is no organisation that is safe in today’s digital world.

The reality is enterprises of all sizes need proactive, intelligence-based solutions plus the relevant expertise to develop comprehensive strategies to detect, remove and remediate threats.

Preventing ‘volume fatigue’

One of the biggest challenges with traditional alert-based security solutions is that the sheer volume of threats, attacks and potential threat events has become overwhelming. Organisations receive hundreds, if not thousands, of alerts on a daily basis, many of which are false positives – this is often a tactic of cyber criminals as they test an organisation’s defences.

Realistically it is impossible to adequately address each and every alert, which leads to a state of ‘alert fatigue’ where legitimate threat events are missed. While there are technologies available for event management that can reduce these numbers, the challenge lies in determining which alerts are important and which are not.

A lack of intelligence relevant to the alerts means that while organisations are bogged down trying to sift through thousands of alerts, attackers can slip a true threat through the defences.

The sophistication challenge

Cyber threats are becoming more advanced, persistent and targeted than ever before, in retaliation to increasingly sophisticated security systems. The recent slew of ransomware attacks, such as TeslaCrypt and its various versions, confirm the sheer tenacity of today’s cyber criminals.

Intelligence-based systems help organisations move from a reactive defence to a more proactive approach. These systems utilise information on attack trends relative to industry, market sector and more, and along with real, current and trending data to understand the tactics, tools and procedures of malware and threat actors.

Only by understanding the tactics, procedures and code that attackers use, rather than the specifics of an attack, can they be detected before they cause too much damage.

In addition, organisations need to have intelligence around other enterprises’ responses to threats and what happens once they are breached, in order to benefit from existing experience around these threats. Furthermore, organisations have to implement solutions that will proactively search for vulnerabilities, to ensure that they can be fixed before they come under attack.

In today’s world, threats are specifically crafted so that they do not trigger alerts in order to ensure maximum chances of infiltrating an organisation’s defences. Enterprises therefore need to be able to detect general types of attacks, rather than specific attack signatures.

Without the ability to dynamically analyse malicious code, or a reliance on known, signature-based attacks, organisations are left vulnerable. However, technology is not a silver bullet solution, as enterprises need intelligence and strategy as well as expertise to detect existing breaches, contain them, remediate and close vulnerabilities.

Early detection is essential, and a multi-faceted approach is key. Businesses need tools that combine intelligence to detect real threats early on in their lifecycle with the ability to develop a complete strategy for dealing with malware and other security breaches.

For more information contact Drive Control Corporation, +27 (0)11 201 8927, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...