Visibility is critical

May 2018 Information Security, Infrastructure

Without full visibility, automation and proactive security approaches, organisations are just waiting to fall victim to ransomware and cyber-extortion attacks.

The cost of cybercrime is soaring, taking a staggering toll of around $600 billion on the global economy, and topping a cumulative $8 trillion between 2017 and 2022, according to Juniper Research. It is impacting up to 77% of organisations, over half of them compromised by ransomware in 2017, according to CyberEdge Group’s Cyberthreat Defense Report.

Ransomware and cyber-extortion are reported to be among the fastest-growing cybercrime tools, with ransomware-as-a-service proliferating. These are clearly lucrative endeavours, and given the low risk to the criminal who can carry out such an attack from the comfort of an armchair, the incidence of ransomware and cyber-extortion attacks will simply keep escalating.

Ransomware doesn’t just lock down data, it can be applied across sectors and in any number of ways: an incident last year saw ransomware used to lock down an Austrian hotel’s electronic key card system. Individual homeowners with state-of-the-art home security have been locked in or out of their homes by criminals using ransomware. Healthcare services have suffered ransomware attacks that locked down crucial patient files.

In our hyper-connected world, where everything from telephones and surveillance cameras to air conditioning and locks are connected, there are any number of endpoints available for exploitation by criminals.

Gaping security holes

Despite this growing risk, organisations are still depending on outdated or inadequate approaches to cybersecurity. Inexplicably, the vulnerabilities exploited by the WannaCry ransomware almost a year ago have not yet been patched in a number of local companies.

Our audits in many local organisations have found that many do not even know how many endpoints are in fact connected to their networks. We may find that while an asset register lists 1000 endpoints, the true figure may be twice or even three times that number, including PCs that IT listed as decommissioned, and telephone systems nobody thought to include in the security audits.

Mitigating risk

Firewalls, IDS and antivirus alone are not enough to protect against new attack methods. Even the increased focus on education cannot fully mitigate risk, since it is remarkably easy to target an individual within an organisation and use them to gain access to the network.

Despite the trend towards increased security spend, vulnerabilities will remain as long as users log on with simple passwords, or use publicly accessible shared environments and public cloud-based email accounts.

Without full visibility to the core, across the entire network, along with constant monitoring and assessment, you’ve basically got a phenomenal alarm system, but you’ve left the front door open.

To effectively mitigate the risks of ransomware and cyber-extortion, organisations have to achieve visibility across every device and system connected to the network. They must know who is accessing what, when and how; and they must be able to immediately identify anomalous behaviour and any changes in the environment as soon as they occur.

In addition, intelligent automation has to be applied to ensure the correct patch levels. Organisations have to become more proactive in their approach to mitigating the risk of cybercrime, addressing vulnerabilities and anomalies as they appear, rather than waiting to go into ‘firefighting mode’.

In a fast-changing and hyper-connected world, organisations cannot afford to keep ‘doing security the way it’s always been done’. Unless they overhaul and update their approach, it is only a matter of time before they too fall victim to cyber-attacks.

For more information contactJ2 Software, +27 (0)87 238 1870, [email protected], www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...
Organisations fear AI-driven cyberattacks, but lack key defences
Kaspersky Information Security News & Events Training & Education
A recent Kaspersky study reveals that businesses are increasingly worried about the growing use of artificial intelligence in cyberattacks, with 56% of surveyed companies in South Africa reporting a rise in cyber incidents over the past year.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Vodacom Business unveils new cybersecurity report
Information Security IoT & Automation
Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
Axis introduces ACS Edge and cloud storage
Axis Communications SA Surveillance Infrastructure Products & Solutions
Axis Communications has launched two new solutions within the AXIS Camera Station ecosystem, AXIS Camera Station Edge (ACS Edge) and AXIS Camera Station Cloud Storage (ACS Cloud Storage).

Read more...