Knowledge and visibility leads to security

1 August 2018 Information Security

Following on from the article on threat detection and solutions, John Mc Loughlin, CEO of J2 Software highlights the importance of knowledge in the fight against cybercrime, as well as the importance of visibility into all your systems, processes, digital assets and people. The following pointers are presented as a starting point to improved cyber awareness and security.

John Mc Loughlin.
John Mc Loughlin.

Knowledge is key

Knowing where the risks are is a great step in the fight against cyber-attacks, which must then be continually augmented with live, inline and ongoing user cyber-awareness training. Without helping your users know what they need to be aware of, they cannot be expected to be part of the fight. It is important to not simply shift the blame to the user when you have not taken adequate steps to make them aware of the threats.

Some of the areas that require visibility and actionable intelligence are:

• User activity – both on and off the corporate network.

• Access to in-house and cloud-based platforms.

• Behavioural monitoring of users and the applications they install.

• End-point protection, with correlation to global threat intelligence.

• Email access and usage. This must cater for external and internal email attacks.

• Asset detection and management with ongoing vulnerability assessment to discover where the gaps are before the compromise takes advantage of the vulnerability.

• User cybersecurity awareness that is relevant to the organisations. You cannot expect users to help prevent breaches when they do not know what to look out for.

Visibility is key

As we work in a hyper-connected world, it is no longer good enough to only monitor what happens on the corporate network. You also need to know where your assets are used out in the wild. Breaches from third-party contractors or online applications can lead to your organisation losing data because of poor cyber-hygiene or password reuse. The area of risk is vast and includes:

• The network – as in the physical network with switches, routers firewalls and similar equipment.

• The systems – as in the business applications that run your business. Some of which are in-house and some may be sitting out in the cloud.

• The equipment – as in the computers, laptops, VoIP, mobile devices that your users jump on every day to interact with the systems, customers and suppliers of your business. It is important to know where and what assets are being used across your landscape. It is more important to know whether these are vulnerable to attack and compromise.

• The people – this is the easiest part to hack. The attacker does not need to hack a system; it is far easier to hack a human. Using social engineering and deception it is easy to compromise individuals to part with their knowledge or access credentials.

• The dark web – the cyber underground is where compromised details are shared and traded. This is a critical part of the programme because if you do not know that your corporate records are being traded, you cannot take any steps to close the hole created by these breached records.

A layered solution

Layered, overlapping solutions are required to win the fight against evolving threats. It is not enough to have only a firewall and antivirus solution in place when you do not have any idea regarding access and standard behaviour. Using the layered approach, when one layer is defeated you immediately detect the breach within another. Once detected you then have the capability to update all other layers to make sure the attack is nullified in future. Some of the layers will include, but not be limited to:

• End-point protection with automated updates and behavioural monitoring.

• Inline Domain Name System (DNS) or Internet monitoring and security – on or off the network from any connection.

• Email gateway and internal security measures to identify malicious attacks via email. This must include advanced capabilities to prevent phishing, whaling, impersonation attempts and armoured attachments.

• Backup – managed and monitored backup is crucial. It is also a key aspect to make sure that you have built-in and automated ransomware protection. If it is not the corporate standard, then it cannot be encrypted. Why allow something to take hold. It is cheaper, faster and more convenient to prevent than recover.

• User activity monitoring which must include known and unknown deviations from standard behaviour.

• Network, wireless and machine intrusion detection along with the complementary vulnerability assessments and remediation.

Mc Loughlin concludes: “All of these should be tied together in order to get a single 360-degree view of the overall threat and risk landscape for your organisation. Once you have the knowledge and total visibility, you have the capability to respond. Many of the basic tasks can be automated, which also ensures consistency and immediate reaction.”

For more information contact J2 Software, +27 87 238 1870, john@j2.co.za, www.j2.co.za.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.