Technology is not a silver bullet

April 2016 Cyber Security

Cyber security is no longer an IT problem but rather an organisational priority. It has become such a serious issue that it costs businesses money, compromises its information and customer data and causes reputational damage. Unfortunately, there is no silver bullet against cyber onslaughts and implementing the right technology won’t cut it.

Fred Mitchell.
Fred Mitchell.

Granted, technology is important, however, in order to implement a strong line of defence, organisations need a change in mindset. The belief that ‘it won’t happen to me’ is not only outdated, but dangerous, as there is no organisation that is safe in today’s digital world.

The reality is enterprises of all sizes need proactive, intelligence-based solutions plus the relevant expertise to develop comprehensive strategies to detect, remove and remediate threats.

Preventing ‘volume fatigue’

One of the biggest challenges with traditional alert-based security solutions is that the sheer volume of threats, attacks and potential threat events has become overwhelming. Organisations receive hundreds, if not thousands, of alerts on a daily basis, many of which are false positives – this is often a tactic of cyber criminals as they test an organisation’s defences.

Realistically it is impossible to adequately address each and every alert, which leads to a state of ‘alert fatigue’ where legitimate threat events are missed. While there are technologies available for event management that can reduce these numbers, the challenge lies in determining which alerts are important and which are not.

A lack of intelligence relevant to the alerts means that while organisations are bogged down trying to sift through thousands of alerts, attackers can slip a true threat through the defences.

The sophistication challenge

Cyber threats are becoming more advanced, persistent and targeted than ever before, in retaliation to increasingly sophisticated security systems. The recent slew of ransomware attacks, such as TeslaCrypt and its various versions, confirm the sheer tenacity of today’s cyber criminals.

Intelligence-based systems help organisations move from a reactive defence to a more proactive approach. These systems utilise information on attack trends relative to industry, market sector and more, and along with real, current and trending data to understand the tactics, tools and procedures of malware and threat actors.

Only by understanding the tactics, procedures and code that attackers use, rather than the specifics of an attack, can they be detected before they cause too much damage.

In addition, organisations need to have intelligence around other enterprises’ responses to threats and what happens once they are breached, in order to benefit from existing experience around these threats. Furthermore, organisations have to implement solutions that will proactively search for vulnerabilities, to ensure that they can be fixed before they come under attack.

In today’s world, threats are specifically crafted so that they do not trigger alerts in order to ensure maximum chances of infiltrating an organisation’s defences. Enterprises therefore need to be able to detect general types of attacks, rather than specific attack signatures.

Without the ability to dynamically analyse malicious code, or a reliance on known, signature-based attacks, organisations are left vulnerable. However, technology is not a silver bullet solution, as enterprises need intelligence and strategy as well as expertise to detect existing breaches, contain them, remediate and close vulnerabilities.

Early detection is essential, and a multi-faceted approach is key. Businesses need tools that combine intelligence to detect real threats early on in their lifecycle with the ability to develop a complete strategy for dealing with malware and other security breaches.

For more information contact Drive Control Corporation, +27 (0)11 201 8927, fredm@drivecon.net





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber futures in 2020
Issue 1 2020 , Cyber Security
MJ Strydom, managing director of cybersecurity specialist company, DRS, discusses what can be expected in 2020.

Read more...
Seven security trends for 2020
Issue 1 2020 , Cyber Security
What challenges await the security professional in 2020? Lukas van der Merwe looks at the trends for the year ahead.

Read more...
Security is not a single product solution
Issue 1 2020 , Cyber Security
Adopting a phased approach to security allows companies to develop a layered security posture to help control costs as well as the complexity.

Read more...
From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec , Cyber Security, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Read more...
Minding the gaps to protect industrial PLCs from cyber threats
November 2019, AVeS Cyber Security , Cyber Security
PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.

Read more...
African trust centre launches cyber division
November 2019 , Cyber Security
Advancing cybersecurity to more stringent heights, LAWtrust has launched a new division focusing on cybersecurity services to complement its identity, encryption and digital signature offerings.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Protecting the outer perimeter with cloud services
November 2019 , Cyber Security
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services.

Read more...
Information security outsourcing service
November 2019, Condyn , Cyber Security
SearchInform launches information security outsourcing service for companies that face the problem of corporate fraud and data leakage.

Read more...
Block threats before they target your business
November 2019 , Cyber Security
The antivirus solutions of a decade ago are woefully inadequate weapons in the fight against today’s complex threats.

Read more...