IT - Security

5 Devastating Endpoint Attacks: Lessons Learned
Security Boulevard, June 3rd , 2021
Many cybersecurity attacks, including some of the biggest and most recent attacks, target corporate endpoints

"Reviewing these five large attacks that leveraged weaknesses in endpoints can teach organizations important lessons and identify a few best practices that can help them avoid becoming the next victim.

1. SUNBURST SolarWinds

SUNBURST was a fifth-generation cyberattack that targeted tech companies and U.S. government agencies. This massive supply chain attack indirectly targeted the systems of large organizations via their suppliers..."

Are Air Gapped Networks Secure?
CIOinsight, June 4th , 2021
Ours is a deeply interwoven and breachable world, which often means trouble for enterprise security

"According to IBM's 2020 Cost of a Data Breach Report, the average cyberattack costs a business $3.86 million, and the United States' average cost per breach has reached $8.6 million. There is some good news though: businesses that are investing in better network security infrastructure and policies, such as incident response and security automation, are saving anywhere from $2 million to $3.58 million when a breach does occur. Although it won't work for every business model, air gapped networks can provide one of the highest levels of security to enterprise infrastructure when they are managed closely, stopping many potential breaches in their tracks..."

I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another

"I know that when it comes to some common security bugs, despite being in our orbit since the 90s, they continue to plague our software and cause major problems, even though the (often simple) fix has been known for almost the same length of time. It truly feels like Groundhog Day, where we as an industry seem to do the same thing over and over and expect a different result.

There's another little problem, however. We're not getting realistic advice, nor the fastest solutions, to combat the non-stop onslaught that is the modern threat landscape. Of course, each breach is different in its own way and there are numerous attack vectors that can be exploited in vulnerable software. Feasible generic advice will be limited, but the best practice approach is looking more flawed by the hour..."

Many employees aren't coming back to the office. That means you must make sure your business secrets are just as secure from their home office as they were at the corporate HQ

"I know some of you are still convinced you'll soon shepherd your flock of workers back into the comfortable cubicles of the corporate office. Not going to happen. I've been following the working from home revolution closely, and, trust me, your people like working from home. A lot.

According to a FlexJobs survey, 58% of workers currently working remotely said they'd "absolutely look for a new job' if they're not allowed to continue remote work..."

With remote work becoming the new norm for many companies, organizations need to secure their employees' work-from-home (WFH) networks

"Identity access management (IAM) both secures these WFH networks and enables employees to easily access the data and applications they need for their role. A good IAM solution prevents users from turning to shadow IT practices, which have grown significantly since the COVID-19 pandemic began. Find out how your team can use IAM to secure your employees' WFH networks and keep shadow IT to a minimum.

Using IAM for remote employees

  • Create or strengthen corporate data policies
  • Review everything users can access
  • Make employees request access to critical systems
  • Choose IAM solutions with least privilege access capabilities
  • Use IAM to secure networks and enable employees

Read on for details

The pandemic exposed the need for a strong secure remote access strategy. Now, organizations need to figure out which team must make it happen.

"The COVID-19 pandemic put a spotlight on enterprise technology professionals, especially security professionals, and the resiliency of cybersecurity processes, tools and technologies. For the most part, they passed with flying colors. However, many companies have yet to scrutinize how cybersecurity teams are organized and how they should be organized. Specifically, which group is responsible for managing secure remote access? And, if it's possible to determine, which group should be managing secure remote access?..."

Why enterprises should consider zero trust security when it comes to their data privacy & security.

"Zero trust is a new way of thinking about breaches. It says that no person - not even the most important ones -- should be trusted.

In theory, if a user passes an additional barrier for access (e.g., question-answer-based multi-factor authentication), businesses can trust that they are who they claim to be.

In practice, we know this is not always true.

Hence, zero trust is emerging as a security model in many enterprises and shaking up the status quo in cybersecurity battles.

Traditional models rely on trust, but all touchpoints in a system (identities, devices, and services) are verified in a zero-trust world. It also means that a user's access is restricted to the data, systems, and applications that are necessary for their job..."

See all Archived IT - Security articles See all articles from this issue