Visibility is critical

May 2018 Information Security, Infrastructure

Without full visibility, automation and proactive security approaches, organisations are just waiting to fall victim to ransomware and cyber-extortion attacks.

The cost of cybercrime is soaring, taking a staggering toll of around $600 billion on the global economy, and topping a cumulative $8 trillion between 2017 and 2022, according to Juniper Research. It is impacting up to 77% of organisations, over half of them compromised by ransomware in 2017, according to CyberEdge Group’s Cyberthreat Defense Report.

Ransomware and cyber-extortion are reported to be among the fastest-growing cybercrime tools, with ransomware-as-a-service proliferating. These are clearly lucrative endeavours, and given the low risk to the criminal who can carry out such an attack from the comfort of an armchair, the incidence of ransomware and cyber-extortion attacks will simply keep escalating.

Ransomware doesn’t just lock down data, it can be applied across sectors and in any number of ways: an incident last year saw ransomware used to lock down an Austrian hotel’s electronic key card system. Individual homeowners with state-of-the-art home security have been locked in or out of their homes by criminals using ransomware. Healthcare services have suffered ransomware attacks that locked down crucial patient files.

In our hyper-connected world, where everything from telephones and surveillance cameras to air conditioning and locks are connected, there are any number of endpoints available for exploitation by criminals.

Gaping security holes

Despite this growing risk, organisations are still depending on outdated or inadequate approaches to cybersecurity. Inexplicably, the vulnerabilities exploited by the WannaCry ransomware almost a year ago have not yet been patched in a number of local companies.

Our audits in many local organisations have found that many do not even know how many endpoints are in fact connected to their networks. We may find that while an asset register lists 1000 endpoints, the true figure may be twice or even three times that number, including PCs that IT listed as decommissioned, and telephone systems nobody thought to include in the security audits.

Mitigating risk

Firewalls, IDS and antivirus alone are not enough to protect against new attack methods. Even the increased focus on education cannot fully mitigate risk, since it is remarkably easy to target an individual within an organisation and use them to gain access to the network.

Despite the trend towards increased security spend, vulnerabilities will remain as long as users log on with simple passwords, or use publicly accessible shared environments and public cloud-based email accounts.

Without full visibility to the core, across the entire network, along with constant monitoring and assessment, you’ve basically got a phenomenal alarm system, but you’ve left the front door open.

To effectively mitigate the risks of ransomware and cyber-extortion, organisations have to achieve visibility across every device and system connected to the network. They must know who is accessing what, when and how; and they must be able to immediately identify anomalous behaviour and any changes in the environment as soon as they occur.

In addition, intelligent automation has to be applied to ensure the correct patch levels. Organisations have to become more proactive in their approach to mitigating the risk of cybercrime, addressing vulnerabilities and anomalies as they appear, rather than waiting to go into ‘firefighting mode’.

In a fast-changing and hyper-connected world, organisations cannot afford to keep ‘doing security the way it’s always been done’. Unless they overhaul and update their approach, it is only a matter of time before they too fall victim to cyber-attacks.

For more information contactJ2 Software, +27 (0)87 238 1870, john@j2.co.za, www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.